SlideShare a Scribd company logo
The current issue and full text archive of this journal is available at
                                                 www.emeraldinsight.com/1463-5771.htm




BIJ
18,2                                            A fuzzy goal programming
                                                    model for strategic
                                                 information technology
172
                                                 investment assessment
                                                                                Faramak Zandi
                                      Industrial Engineering Department, Faculty of Technology and Engineering,
                                                         Alzahra University, Tehran, Iran, and
                                                                                Madjid Tavana
                                     Management Department, Lindback Distinguished Chair of Information Systems,
                                               La Salle University, Philadelphia, Pennsylvania, USA

                                     Abstract
                                     Purpose – The high expenditures in information technology (IT) and the growing usage that
                                     penetrates the core of business have resulted in a need to effectively and efficiently evaluate strategic
                                     IT investments in organizations. The purpose of this paper is to propose a novel two-dimensional
                                     approach that determines the deferrable strategy with the most value by maximizing the real option
                                     values while minimizing the risks associated with each alternative strategy.
                                     Design/methodology/approach – In the proposed approach, first, the deferrable investment
                                     strategies are prioritized according to their values using real option analysis (ROA). Then, the risks
                                     associated with each investment strategy are quantified using the group fuzzy analytic hierarchy
                                     process. Finally, the values associated with the two dimensions are integrated to determine the deferrable
                                     IT investment strategy with the most value using a fuzzy preemptive goal programming model.
                                     Findings – Managers face the difficulty that most IT investment projects are inherently risky,
                                     especially in a rapidly changing business environment. The paper proposes a framework that can be
                                     used to evaluate IT investments based on the real option concept. This simple, intuitive, generic and
                                     comprehensive approach incorporates the linkage among economic value, real option value and IT
                                     investments that could lead to a better-structured decision process.
                                     Originality/value – In contrast to the traditional ROA literature, the approach contributes to the
                                     literature by incorporating a risk dimension parameter. The paper emphasizes the importance of
                                     categorizing risk management in IT investment projects since some risk cannot be eliminated.
                                     Keywords Fuzzy control, Information technology, Value analysis, Risk analysis,
                                     Analytical hierarchy process
                                     Paper type Research paper

                                     1. Introduction
                                     Information technology (IT) investments represent the largest capital expenditure items
                                     for many organizations and have a tremendous impact on productivity by reducing costs,
                                     improving quality and increasing value to customers. As a result, many organizations
Benchmarking: An International       continue to invest large sums of money in IT in anticipation of a material return on their
Journal                              investment (Willcocks and Lester, 1996). The selection of appropriate IT investments has
Vol. 18 No. 2, 2011
pp. 172-196
q Emerald Group Publishing Limited
1463-5771
                                     The authors would like to thank the anonymous reviewers and the Editor for their insightful
DOI 10.1108/14635771111121667        comments and suggestions.
been one of the most significant business challenges of the last decade. Powell (1992)           Fuzzy goal
has studied the similarities and differences between IT investments and other capital         programming
investments in organizations. He notes that IT investments are undertaken by
organizations to gain competitive advantage, to improve productivity, to enable new ways             model
of managing and organizing and to develop new businesses. Appropriate strategic IT
investments can help companies gain and sustain a competitive advantage (Melville et al.,
2004). However, many large IT investment projects often do not meet original expectations             173
of cost, time or benefits. The rapid growth of IT investments has imposed tremendous
pressure on management to take into consideration risks and payoffs promised by the
investment in their decision making.
   A review of the current literature offers several IT investment evaluation methods
that provide frameworks for the quantification of risks and benefits. The net present
value (NPV) (Hayes and Abernathy, 1980; Kaplan and Atkinson, 1998), return on
investment (Brealey and Myers, 1998; Farbey et al., 1993; Kumar, 2002; Luehrman,
1997), cost benefit analysis (Schniederjans et al., 2004), information economics (Bakos
and Kemerer, 1992; Parker and Benson, 1989) and return on management (Chen et al.,
2006; Stix and Reiner, 2004; Strassmann, 1997) are among most widely used methods to
assess the risks and payoffs associated with IT investments.
   In addition to the above mentioned traditional quantitative approaches, there is a
stream of research studies which emphasizes real option analysis (ROA). The ROA differs
from the traditional methods in terms of priceability of the underlying investment project
(McGrath, 1997). With the traditional methods, the underlying investment project of an
option is priced as known (Black and Scholes, 1973) while in IT investment situations the
price of an underlying investment is rarely known (McGrath, 1997). The ROA uses three
basic types of data:
   (1) current and possible future investment options;
   (2) the desired capabilities sought by the organization; and
   (3) the relative risks and costs of other IT investment options that could be used.

The method can help assess the risks associated with IT investment decisions by
taking into consideration the changing nature of business strategies and
organizational requirements.
   The real options are commonly valued with the Black-Scholes option pricing formula
(Black and Scholes, 1973, 1974), the binomial option valuation method (Cox et al., 1979)
and Monte-Carlo methods (Boyle, 1977). These methods assume that the underlying
markets can be imitated accurately as a process. Although this assumption may hold for
some quite efficiently traded financial securities, it may not hold for real investments that
do not have existing markets (Collan et al., 2009). Recently, a simple novel approach to
ROA called the Datar-Mathews method (Datar and Mathews, 2004, 2007; Mathews and
Salmon, 2007) was proposed where the real option value is calculated from a pay-off
distribution, derived from a probability distribution of the NPV for an investment project
generated with a Monte-Carlo simulation. This approach does suffer from the market
process assumptions associated with the Black-Scholes method (Black and Scholes, 1974).
   When valuating an investment using ROA, it is required to estimate several
parameters (i.e. expected payoffs and costs or investment deferral time). However, the
estimation of uncertain parameters in this valuation process is often very challenging.
Most traditional methods use probability theory in their treatment of uncertainty.
BIJ    Fuzzy logic and fuzzy sets can represent ambiguous, uncertain or imprecise information
18,2   in ROA by formalizing inaccuracy in human decision making (Collan et al., 2009).
       For example, fuzzy sets allow for graduation of belonging in future cash-flow estimation
       (i.e. future cash flow at year 5 is about 5,000 dollars). Fuzzy set algebra developed by
       Zadeh (1965) is the formal body of theory that allows the treatment of imprecise
       estimates in uncertain environments.
174        In recent years, several researchers have combined fuzzy sets theory with ROA.
                            ´
       Carlsson and Fuller (2003) introduced a (heuristic) real option rule in a fuzzy setting,
       where the present values of expected cash flows and expected costs are estimated by
       trapezoidal fuzzy numbers. Chen et al. (2007) developed a comprehensive but simple
       methodology to evaluate IT investment in a nuclear power station based on fuzzy risk
       analysis and real option approach. Frode (2007) used the conceptual real option
       framework of Dixit and Pindyck (1994) to estimate the value of investment opportunities
       in the Norwegian hydropower industry. Villani (2008) combined two successful theories,
       namely real options and game theory, to value the investment opportunity and the value
       of flexibility as a real option while analyzing the competition with game theory.
       Collan et al. (2009) presented a new method for real option valuation using fuzzy numbers.
       Their method considered the dynamic nature of the profitability assessment, that is, the
       assessment changes when information changes. As cash flows taking place in the future
       come closer, information changes and uncertainty is reduced. Chrysafis and
       Papadopoulos (2009) presented an application of a new method of constructing fuzzy
       estimators for the parameters of a given probability distribution function using statistical
       data. Wang and Hwang (2007) developed a fuzzy research and development portfolio
       selection model to hedge against the environmental uncertainties. They applied fuzzy set
       theory to model uncertain and flexible project information. Since traditional project
       valuation methods often underestimate the risky project, a fuzzy compound-options
       model was used to evaluate the value of each project. Their portfolio selection problem
       was formulated as a fuzzy zero-one integer programming model that could handle both
       uncertain and flexible parameters and determine the optimal project portfolio. A new
       transformation method based on qualitative possibility theory was developed to convert
       the fuzzy portfolio selection model into a crisp mathematical model from the risk-averse
       perspective. The transformed model was solved by an optimization technique.
           We propose a novel two-dimensional approach that determines the deferrable
       strategy with the most value by maximizing the real option values while minimizing the
       risks associated with each alternative strategy. First, the deferrable investment
       strategies are prioritized according to their values using the ROA. Then, the risks
       associated with each investment strategy are quantified using the group fuzzy analytic
       hierarchy process (GFAHP). Finally, the values associated with the two dimensions are
       integrated to determine the deferrable IT investment strategy with the most value using
       a fuzzy preemptive goal programming model. The proposed framework:
            .
               addresses the gaps in the IT investment assessment literature on the effective
               and efficient evaluation of IT investment strategies;
            .
               provides a comprehensive and systematic framework that combines ROA with
               a group fuzzy approach to assess IT investment strategies;
            .
               considers fuzzy logic and fuzzy sets to represent ambiguous, uncertain or
               imprecise information; and
.
         it uses a real-world case study to demonstrate the applicability of the proposed                   Fuzzy goal
         framework and exhibit the efficacy of the procedures and algorithms.
                                                                                                          programming
This paper is organized into five sections. In Section 2, we illustrate the details of the                        model
proposed framework followed by a case study in Section 3. In Section 4, we present
discussion and practical perspectives and in Section 5, we conclude with our conclusions
and future research directions.                                                                                   175
2. The proposed framework
The mathematical notations and definitions used in our model are presented in the
Appendix. The framework shown in Figure 1 is proposed to assess alternative IT
investment strategies. The framework consists of several steps modularized into five
phases.

Phase 1: establishment of the IT investment board
We institute a strategic IT investment board to acquire pertinent investment
information. Executive management is typically responsible for creating the board,
specifying its responsibilities and defining its resources. Let us assume that l strategic
IT investment board members are selected to participate in the evaluation process:
                          ITIB ¼ ½ðITIBÞ1 ; ðITIBÞ2 ; . . . ; ðITIBÞk ; . . . ; ðITIBÞl Š

Phase 2: identification of the IT investment strategies
Next, the strategic IT investment board identifies a set of alternative deferrable IT
investment strategies. Let us assume that n alternative IT investments with the
maximum deferral time of Tm are under consideration:
                               a ¼ ½a1 ; a2 ; . . . ; ai ; . . .an Š

Phase 3: prioritization of the IT investment strategies: real option considerations
In this phase, the real options equations suggested by Dos Santos (1994) are used to
prioritize IT investments strategies. This phase is divided into the following three steps.
   Step 3.1: construction of the individual real option matrices. The following individual
real option matrices are given by each strategic IT investment board member:
                ~
                BðT 1 Þ  ~                ~          ~        ~
                         BðT 2 Þ . . . BðT m Þ CðT 1 Þ CðT 2 Þ . . . CðT m Þ ~
                    2                                                                                 3
               a1       ~k        ~K              ~k
                        B1 ðT 1 Þ B1 ðT 2 Þ . . . B1 ðT m Þ     ~k        ~k              ~k
                                                                C1 ðT 1 Þ C1 ðT 2 Þ . . . C1 ðT m Þ
          6                                                                         7
          6 ~k        ~k              ~k        ~k        ~k              ~k        7
 ~ k ¼ a2 6 B2 ðT 1 Þ B2 ðT 2 Þ . . . B2 ðT m Þ C2 ðT 1 Þ C2 ðT 2 Þ . . . C2 ðT m Þ 7
 ARO1     6                                                                         7
        . 6 .
        . 6 .             .               .         .         .               .     7 ð1Þ
        . 6 .             .               .         .         .               .     7
                          .     ...       .         .         .     ...       .     7
          4                                       k
                                                                                    5
              k
       an B ðT Þ BK ðT Þ . . . BK ðT Þ C ðT Þ C k ðT Þ . . . C k ðT Þ
                                                ~
            ~     1         2               m         m         2               m
              n        n               n          n        n               n



       For k ¼ 1; 2; . . . ; l:
Fuzzy numbers are often represented by triangular or trapezoidal fuzzy sets. In this
study, we use trapezoidal fuzzy sets. A major advantage of trapezoidal fuzzy numbers is
BIJ
                                                             Phase 1
18,2                                         Establishment of the IT investment board


                                                               Phase 2
                                           Identification of the IT investment strategies
176
                                                          Phase 3
                         Prioritization of the IT investment strategies: real option considerations

                                          Step 3.1
                          Construction of the individual real option
                                          matrices


                                                                     Step 3.2
                                                    Construction of the weighted collective real
                                                                  option matrix


                                                                                             Step 3.3
                                                                             Computation of the vector of the real option
                                                                               value for the IT investment strategies



                                                           Phase 4
                             Prioritization of the IT investment strategies: risk considerations
                                          Step 4.1
                         Identification of the criteria and sub-criteria
                                     for the GFAHP model


                                                             Step 4.2
                                           Construction of the individual fuzzy pairwise
                                                      comparison matrices

                                                                              Step 4.3
                                                             Construction of the weighted collective fuzzy
                                                                     pairwise comparison matrix


                                                                                             Step 4.4
                                                                            Computation of the vector of the risk value for
                                                                                    the IT investment strategies




                                                            Phase 5
                                         Development of the strategic IT investment plan
                                          Step 5.1
                         Determination of the goal and priority levels



                                                                     Step 5.2
                                                          Computation of the goal values


                                                                                             Step 5.3
                                                                                  Construction of the proposed goal
Figure 1.                                                                               programming model
The proposed framework
that many operations based on the max-min convolution can be replaced by direct                                                           Fuzzy goal
arithmetic operations (Dubois and Prade, 1988). The following trapezoidal fuzzy numbers
are used for the individual fuzzy present values of the expected cash flows and the cost of
                                                                                                                                        programming
the ith IT investment at time Tj by strategic IT investment board member (ITIB)k:                                                              model
                                                        b          
                                       o           a                       g
                ~ k ðT j Þ ¼ Bk ðT j Þ ; Bk ðT j Þ ; Bk ðT j Þ ; Bk ðT j Þ
                Bi             i          i           i            i
                                                  
                                                    o            
                                                                 a           b           
                                                                                           g
                                                                                                                                                177
                              ~k
                              Ci ¼       C k ðT j Þ ; C k ðT j Þ ; C k ðT j Þ ; C k ðT j Þ                                      ð2Þ
                                           i            i            i            i

                       For j ¼ 1; 2; . . . ; m:
That is, we have the following intervals:
  j            
                 o          k
                             a
     Bk ðT j Þ ; Bk ðT j Þ
        i          i              the most possible values for the expected cash flows of
                                  the ith IT investment at time Tj evaluated by strategic
                                  IT investment board member (ITIB)k.
              
                o            
                             g
      k             k
    Bi ðT j Þ þ Bi ðT j Þ         the upward potential for the expected cash flows of the
                                  ith IT investment at time Tj evaluated by strategic IT
                         b  investment board member (ITIB)k.
                o
     Bk ðT j Þ 2 Bk ðT j Þ
       i             i            the downward potential for the expected cash flows of
                                  the ith IT investment at time Tj evaluated by strategic
                                  IT investment board member (ITIB)k.
  j            
                 o          k
                             a
        k           k
     C i ðT j Þ ; C i ðT j Þ      the most possible values of the expected cost of the ith
                                  IT investment at time Tj evaluated by strategic IT
                                  investment board member (ITIB)k.
              
                o            
                              g
       k            k
    C i ðT j Þ þ C i ðT j Þ       the upward potential for the expected cost of the ith IT
                                  investment at time Tj evaluated by strategic IT
                         b  investment board member (ITIB)k.
                o
     C k ðT j Þ 2 C k ðT j Þ
       i              i           the downward potential for the expected cash flows of
                                  the ith IT investment at time Tj evaluated by strategic
                                  IT investment board member (ITIB)k.
Consequently, substituting equation (2) into matrix (1), the individual real option
matrices can be rewritten as:
                                            ~
                                           BðT i Þ                                                   ~
                                                                                                     CðT i Þ
                   2          o         a         b          g             o          a          b           g  3
                   6   Bk ðT i Þ ; Bk ðT i Þ ; Bk ðT i Þ ; Bk ðT i Þ
                        1            1             1         1               C k ðT i Þ ; C k ðT i Þ ; C k ðT i Þ ; C k ðT i Þ
                                                                               1            1              1          1             7
             a1    6                                                                                                               7
                   6 
                   6            o         a         b          g             o          a          b           g  7
                                                                                                                                    7
                        k            k             k         k
                   6 B2 ðT i Þ ; B2 ðT i Þ ; B2 ðT i Þ ; B2 ðT i Þ             k            k              k          k             7
                   6                                                         C 2 ðT i Þ ; C 2 ðT i Þ ; C 2 ðT i Þ ; C 2 ðT i Þ      7
~k
ARO1 ðT i Þ ¼ a2   6                                                                                                                7
                   6                                                                                                                7
              .    6                           .
                                               .                                                       .
                                                                                                       .                            7
              .
              .    6                           .                                                       .                            7
                   6                                                                                                           7
                   6                                                          o          a          b           g 7
             an    4 Bk ðT Þ o ; Bk ðT Þ a ; Bk ðT Þ b ; Bk ðT Þ g             k            k              k          k
                                                                             C n ðT i Þ ; C n ðT i Þ ; C n ðT i Þ ; C n ðT i Þ      5
                        n   i        n   i         n i       n    i



                                                                                                                                 ð3Þ
BIJ    Step 3.2: construction of the weighted collective real option matrix. This framework
       allows for assigning different voting power weights given to each investment board
18,2   member:
                              W ðvpÞ ¼ ½wðvpÞ1 ; wðvpÞ2 ; . . . ; wðvpÞj ; . . . ; wðvpÞl Š                         ð4Þ
       Therefore, in order to form a fuzzy weighted collective real option matrix, the individual
178    fuzzy real option matrices will be aggregated by the voting powers as follows:
                                                                  ~
                                                                  BðT i Þ       ~
                                                                                CðT i Þ
                                                              2                            3
                                                         a1     ~
                                                                B1 ðT i Þ       ~
                                                                                C1 ðT i Þ
                                                              6~                ~          7
                                                              6 B2 ðT i Þ       C2 ðT i Þ 7
                                      ARO2 ðT i Þ ¼ a2
                                      ~                       6                            7                        ð5Þ
                                                     .        6 .                    . 7
                                                     .        6 .                    . 7
                                                     .        6 .                    . 7
                                                              4                            5
                                                         an     ~
                                                                Bn ðT i Þ       ~ n ðT i Þ
                                                                                C

       where:                                                                              
                                                        Pl                      ~k
                                                          k¼1 ðwðvpÞk Þ         Bi ðT i Þ
                                          ~
                                          Bi ðT i Þ ¼          Pl                                                   ð6Þ
                                                                  k¼1 wðvpÞk
                                                        Pl                              
                                                                                ~k
                                                          k¼1 ðwðvpÞk Þ         Ci ðT i Þ
                                          ~
                                          Ci ðT i Þ ¼          Pl                                                   ð7Þ
                                                                  k¼1 wðvpÞk

       Step 3.3: Computation of the vector of the real option value for the IT investment
       strategies. The real option values of the investment strategies at times T 1 ; T 2 ; . . . ; T m
       can be determined by the following fuzzy real option value matrix:
                                              T1                    T2               ...          Tm
                                      2                                                                         3
                                 a1       FROV 1 ðT 1 Þ       FROV 1 ðT 2 Þ          ...        FROV 1 ðT m Þ
                               6                                                                                7
                               6 FROV 2 ðT 1 Þ FROV 2 ðT 2 Þ                         ...        FROV 2 T m      7
                    AFROV ¼ a2 6
                    ~                                                                                           7   ð8Þ
                             . 6
                             . 6     .
                                     .             .
                                                   .                                               .
                                                                                                   .
                                                                                                                7
                                                                                                                7
                             . 6     .             .                                 ...           .            7
                               4                                                                                5
                            a4 FROV n ðT 1 Þ FROV n ðT 2 Þ                           ...        FROV n T m

       or:
                         2                                                                     3 2               3
                           ~                                  ~
                      a1 B1 ðT i Þ·e 2dT i ·N ðD11 ðT i ÞÞ2 C1 ðT i Þ·e 2rT i ·NðD21 ðT i ÞÞ       FROV 1 ðT i Þ
                         6~                                   ~                                7 6               7
                      a2 6 B2 ðT i Þ·e 2dT i ·N ðD12 ðT i ÞÞ2 C2 ðT i Þ·e 2rT i ·NðD22 ðT i ÞÞ 7 6 FROV 2 ðT i Þ 7
                         6                                                                     7 6               7
        AFROV ðT i Þ ¼ . 6
        ~                                                   .                                  7¼6     .         7 ð9Þ
                       .6
                       .6                                   .
                                                            .
                                                                                               7 6
                                                                                               7 6     .
                                                                                                       .
                                                                                                                 7
                                                                                                                 7
                         4                                                                     5 4               5
                           ~                                  ~
                      a4 Bn ðT i Þ·e 2dT i ·N ðD1n ðT i ÞÞ2 Cn ðT i Þ·e 2rT i ·NðD2n ðT i ÞÞ       FROV n ðT i Þ
where the IT investment strategy ith cumulative normal probabilities for the D1and D2                                                                         Fuzzy goal
are as follows:
                                                                                                                                                            programming
                                                                     NðD1 ðT i ÞÞ         N ðD2 ðT i ÞÞ                                                            model
                                                                2                                              3
                                                        a1          N ðD11 ðT i ÞÞ        N ðD21 ðT i ÞÞ
                                                  6                                                      7
                                                  6 N ðD12 ðT i ÞÞ
                                 ARO3 ðT i Þ ¼ a2 6
                                                                                          N ðD22 ðT i ÞÞ 7
                                                                                                         7                                      ð10Þ
                                                                                                                                                                    179
                                                . 6
                                                . 6      .
                                                         .                                     .
                                                                                               .
                                                                                                         7
                                                                                                         7
                                                . 6      .                                     .         7
                                                  4                                                      5
                                               an N ðD1n ðT i ÞÞ                          N ðD2n ðT i ÞÞ

                                                                          D1 ðT i Þ      D2 ðT i Þ
                                                                     2                                  3
                                                                a1       D11 ðT i Þ      D21 ðT i Þ
                                                      6                                             7
                                                      6 D ðT Þ                           D22 ðT i Þ 7
                                        ARO4 ðTÞ ¼ a2 6 12 i                                        7                                           ð11Þ
                                                    . 6
                                                    . 6   .
                                                          .                                  .
                                                                                             .
                                                                                                    7
                                                                                                    7
                                                    . 6   .                                  .      7
                                                      4                                             5
                                                   an D1n ðT i Þ                         D2n ðT i Þ

or equivalently:
                                                       D1 ðT i Þ                                            D2 ðT i Þ
                  a1 2                                                                                                                                  3
                              ~            ~
                         LnðEðB1 ðT i ÞÞ=EðC1 ðT i ÞÞÞþð ðr 1 2d1 þs2 ðT i ÞÞ=2Þ · T i                     ~
                                                                                         LnðEðB1 ðT i ÞÞ=EðC1 ðT i ÞÞÞþð ðr1 2d1 2s2 ðT i ÞÞ=2Þ · T i
                                                                                              ~
                                                        pffiffiffiffi       1                                                       pffiffiffiffi  1
                 6                       s1 ðT i Þ T i                                                          s2 ðT i Þ     Ti                       7
                 6                                                                                               1
                                                                                                                                                       7
              a2 6 LnðEðB2 ðT i ÞÞ=EðC2 ðT i ÞÞÞþð ðr2 2d2 þs2 ðT i ÞÞ=2Þ · T i
                 6      ~            ~                                                                     ~
                                                                                         LnðEðB2 ðT i ÞÞ=EðC2 ðT i ÞÞÞþð ðr2 2d2 2s2 ðT i ÞÞ=2Þ · T i
                                                                                              ~                                                        7
                                                                                                                                                       7
                 6                                pffiffiffiffi      2                                                           pffiffiffi      2
                                                                                                                                                       7
ARO4 ðT i Þ ¼    6                       s2 ðT i Þ T i                                                          s2 ðT i Þ T                            7
                 6                                                                                                                                     7
               . 6
               . 6
                                                .
                                                .                                                                      .
                                                                                                                       .
                                                                                                                                                       7
                                                                                                                                                       7
               . 6                              .                                                                      .                               7
                 6 LnðEðB ðT ÞÞ=EðC ðT ÞÞÞþ r 2d þs2 ðT Þ =2 · T
                                     ~n                                                                    ~                                           7
                 4      ~n i               i      ð ðffiffiffiffi n n i Þ Þ i
                                                  pn                                     LnðEðBn ðT i ÞÞ=EðCn ðT i ÞÞÞþð ðr n 2dn 2s2 ðT i ÞÞ=2Þ · T i 5
                                                                                              ~
                                                                                                                         pffiffiffiffi      n
              an
                                                sn ðT i Þ T i                                                   sn ðT i Þ T i


                                                                                                                                                 ð12Þ
                            2
where E and s denote the possibilistic mean value and possibilistic variance
operators as follows:
                                                                ~
                                                              EðBðT i ÞÞ             ~
                                                                                   EðCðT i ÞÞ         s 2 ðT i Þ
                                                        2                                                            3
                                                  a1          ~
                                                            EðB1 ðT i ÞÞ             ~
                                                                                   EðC1 ðT i ÞÞ         s2 ðT i Þ
                                                                                                         1
                                                    6                                                     7
                                                    6 EðB ðT ÞÞ                      ~          s2 ðT i Þ 7
                           ARO5 ðT i Þ ¼ a2         6 ~2 i                         EðC2 ðT i ÞÞ  2        7                                     ð13Þ
                                                    6                                                     7
                                          .
                                          .         6     .                            .            . 7
                                          .         6     .
                                                          .                            .
                                                                                       .            . 7
                                                                                                    . 7
                                                    6
                                                    4                                                     5
                                                        ~
                                                  an EðBn ðT i ÞÞ                    ~
                                                                                   EðCn ðT i ÞÞ s2 ðT i Þ
                                                                                                 n
˜      ˜
BIJ    Since Bi and Ci are trapezoidal fuzzy numbers, we use the formulas proposed by
                        ´
       Carlsson and Fuller (2003) to find their expected value and the variance:
18,2
           ~            ðBðT j ÞÞo þ ðBðT j ÞÞa ðBðT j ÞÞg 2 ðBðT j ÞÞb
         EðBi ðT j ÞÞ ¼                         þ
                                   2                          6
                                 o            a
           ~            ðCðT j ÞÞ þ ðCðT j ÞÞ      ðCðT j ÞÞ 2 ðCðT j ÞÞb
                                                            g
180      EðCi ðT j ÞÞ ¼                         þ
                                   2                          6
                        ððBðT j ÞÞa 2 ðBðT j ÞÞo Þ2 ððBðT j ÞÞa 2 ðBðT j ÞÞo ÞððBðT j ÞÞb þ ðBðT j ÞÞg Þ
           s2 ðT j Þ ¼
             i                                     þ
                                     4                                       6
                          ððBðT j ÞÞb þ ðBðT j ÞÞg Þ2
                        þ
                                       24
                                                                                                     ð14Þ

       Phase 4: prioritization of the IT investment strategies: risk considerations
       In this phase, the strategic IT investment board identifies the evaluation criteria and
       sub-criteria and uses GFAHP to measure the risk for each criterion and sub-criterion
       associated with the investment projects. This phase is divided into the following four
       steps.
           Step 4.1: identification of the criteria and sub-criteria for the GFAHP model. In this
       step, the strategic IT investment board will determine a list of the criteria and
       sub-criteria for the GFAHP model. Let c1 ; c2 ; . . . ; cp and sc1 ; sc2 ; . . . ; scq be the criteria
       and sub-criteria, respectively.
           Step 4.2: construction of the individual fuzzy pairwise comparison matrices. The
       hierarchal structure for ranking the IT Investments strategies in the risk dimension
       consists of four levels. The top level consists of a single element and each element of a
       given level dominates or covers some or all of the elements in the level immediately
       below. At the second level, the individual fuzzy pairwise comparison matrix of the p
       criteria of IT investment risk evaluated by strategic IT investment board member
       (ITIB)k will be as follows:
                                                     c1 c2 . . . cp
                                                2 k                      3
                                                   ~    ~k           ~k
                                             c1 6 b11 b12 . . . b1p 7
                                   2 k        6                        7
                                             c 6 ~k ~k               ~k 7
                                   AR ¼ 2 6 b21 b22 . . . b2p 7
                                    ~                                                                    ð15Þ
                                              . 6 .
                                              . 6 .       .
                                                                         7
                                                                       . 7
                                              . 6 .       . ... . 7
                                                          .            . 7
                                                6
                                                4 k
                                             cp b         k            k 5
                                                   ~    ~
                                                        b       ... b~
                                                       p1    p2           pp



       Let the individual fuzzy comparison qualification between criteria i and j evaluated by
       strategic IT investment board member (ITIB)k be the following trapezoidal fuzzy
       numbers:
                                             
                                            o      a      b      g
                                ~k ¼
                                bij     bk ; bk ; bk ; bk                                ð16Þ
                                         ij     ij     ij     ij
Consequently, substituting equation (18) into matrix (17), the individual fuzzy                                                              Fuzzy goal
comparison qualification between criteria i and j evaluated by strategic IT investment
board member (ITIB)k can be rewritten as:
                                                                                                                                           programming
                                                                                                                                                  model
               C1                                              c2                              ...                         Cp
          c1
               2                                                                                                                       3
            ððbk Þo ;ðbk Þa ;ðbk Þb ;ðbk Þg Þ ððbk Þo ;ðbk Þa ;ðbk Þb ;ðbk Þg Þ
               11      11      11      11        12      12      12      12               ... ððbk Þo ;ðbk Þa ;ðbk Þb ;ðbk Þg Þ
                                                                                                 1p      1p      1p      1p

   2 k
          6
       c2 6 ððbk Þo ;ðbk Þa ;ðbk Þb ;ðbk Þg Þ ððbk Þo ;ðbk Þa ;ðbk Þb ;ðbk Þg Þ
                                                                                                                                7
                                                                                          ... ððbk Þo ;ðbk Þa ;ðbk Þb ;ðbk Þg Þ 7
                                                                                                                                                   181
ðAR Þ ¼ 6 21
 ~
          6
                       21      21      21        22      22      22      22                      2p      2p      2p      2p     7
                                                                                                                                7
        .6
        .
        .6
                            .
                            .                                 .
                                                              .                                               .
                                                                                                              .
                                                                                                                                7
                                                                                                                                7
          6                 .                                 .                           ...                 .                 7
          4                                                                                                                     5
       cp ððbk Þo ;ðbk Þa ;ðbk Þb ;ðbk Þg Þ ððbk Þo ;ðbk Þa ;ðbk Þb ;ðbk Þg Þ                    k o     k a     k b     k g
                                                                                          ... ððbpp Þ ;ðbpp Þ ;ðbpp Þ ;ðbpp Þ Þ
               p1      p1      p1      p1        p2      p2      p2      p2


                                                                                                                              ð17Þ
At the third level, the individual fuzzy pairwise comparison matrix of IT investment
risk sub-criteria with respect to p IT investment risk criteria evaluated by strategic IT
investment board member (ITIB)k will be as follows:
                                                 sc1                  sc2      ...            scq
                                              2 k                  k                     k
                                                                                                 3
                                                 d~                  ~
                                                                     d12       ...           ~
                                                                                             d1q
                                  sc1         6  11 P              k P                   P 7
                            3 k             6 k                                                7
                            ~     sc          6 d ~                  ~
                                                                     d22       ...           ~k
                                                                                             d2q 7
                            AR ¼ 2            6 21 P                                             7                           ð18Þ
                                   .          6                          P                     P7
                                   .
                                   .          6     .                  .                    .    7
                                              6     .                  .                    .    7
                                              6 .                  k.      ...        k.  7
                                  scq         4 ~k                   ~                    ~      5
                                                 dq1                 dq2       ...        dqq
                                                           P             P                             P


The individual fuzzy comparison qualification between sub-criterions i with
sub-criterion j with respect to criterion p evaluated by strategic IT investment board
member (ITIB)k are the following trapezoidal fuzzy numbers:
                        k   o  a  b  g 
                                 
                        dij ¼ dk ; dk ; d k ; d k
                         ~
                                     ij     ij      ij     ij                     ð19Þ
                                        p                                                          p

Therefore, we have:
                     sc1                                        sc2                            ...                scq

         sc1 2                                                                                                                     3
              ððdk Þo ;ðdk Þa ;ðdk Þb ;ðdk Þg Þp ððd k Þo ;ðdk Þa ;ðd k Þb ;ðd k Þg Þp
                 11      11      11      11          12      12       12       12        ... ððdk Þo ;ðd k Þa ;ðdk Þb ;ðdk Þg Þp
                                                                                                1q       1q      1q      1q
            6                                                                                                                     7
            6 ððdk Þo ;ðdk Þa ;ðdk Þb ;ðdk Þg Þ ððd k Þo ;ðdk Þa ;ðd k Þb ;ðd k Þg Þ     ... ððd k Þo ;ðd k Þa ;ðdk Þb ;ðdk Þg Þ 7
            6 21         21      21      21    p     22      22       22       22    p            2q       2q      2q      2q     7
 ~3     sc 6                                                                                                                      7
ðAR Þk ¼ 2 6                   .                                   .                                            .                 7
         . 66                  .                                   .                                            .                 7
         .
         . 4
                               .                                   .                     ...                    .                 7
                                                                                                                                  5
              ððdq1 Þ ;ðdq1 Þ ;ðdq1 Þ ;ðdq1 Þ Þp ððdq2 Þ ;ðdq2 Þ ;ðd k Þb ;ðd k Þg Þp
                 k o     k a     k b     k g        k o      k a
                                                                      q2       q2        ... ððd k Þo ;ðd k Þa ;ðdk Þb ;ðdk Þg Þp
                                                                                                 qq       qq      qq      qq
        scq

                                                                                                                                ð20Þ
At the fourth level, the individual fuzzy pairwise comparison matrix of n IT investment
strategies with respect to q IT investment risk sub-criteria evaluated by strategic
IT investment board member (ITIB)k will be as follows:
BIJ                                                                    a1               a2            ...    an
18,2                                                2À k Á                          À         Á             À         Á 3
                                                      r
                                                      ~                                 ~k
                                                                                        r12           ...       ~k
                                                                                                                r1n
                                                 a1 6 11 q                                        q
                                                                                                                   7
                                                                                                                       q

                                           4 k    6À k Á                          À    k
                                                                                           Á                À   Á 7
                                           ~     a2 6 r21 q
                                                    6 ~                                 r22
                                                                                        ~         q
                                                                                                      ...    ~k 7
                                                                                                             r2n q 7
                                           AR ¼     6                                                              7                                  ð21Þ
182                                               . 6 .
                                                  . 6 .                                  .                     . 7
                                                  . 6 .                                  .
                                                                                         .            ...      . 7
                                                                                                               . 7
                                                    6                                                              7
                                                    4À k Á                          À         Á             À kÁ 5
                                                 an   rn1 q
                                                      ~                                 ~k
                                                                                        rn2       q
                                                                                                      ...    rnn q
                                                                                                             ~


       The individual fuzzy comparison qualification between IT investment strategies i with
       IT investment strategy j with respect to sub-criterion q evaluated by strategic IT
       investment board member (ITIB)k are the following trapezoidal fuzzy numbers:
                                                 o  a  b  g 
                                                     
                                               ~k       k      k      k      k
                                               rij ¼ r ij ; r ij ; r ij ; r ij                                                                        ð22Þ
                                                       q                                                               q

       or equivalently:

                                a1                                             a2                                ...                             an
                 a1
                      2                                                                                                                                      3
                          ððr 11 Þo ;ðr11 Þa ;ðr11 Þb ;ðr 11 Þg Þq ððr 12 Þo ;ðr12 Þa ;ðr 12 Þb ;ðr 12 Þg Þq ... ððr 1n Þo ;ðr 1n Þa ;ðr1n Þb ;ðr 1n Þg Þq
                              k        k        k         k            k        k         k         k                k         k        k         k

                    6                                                                                                                       7
                    6 ððr k Þo ;ðr k Þa ;ðr k Þb ;ðr k Þg Þ ððr k Þo ;ðr k Þa ;ðr k Þb ;ðr k Þg Þ ... ððr k Þo ;ðr k Þa ;ðr k Þb ;ðr k Þg Þ 7
       ðAR Þ k ¼ a2 6 21
        ~4          6             21       21       21     q   22       22       22       22     q       2n       2n       2n       2n     q7
                                                                                                                                            7
                    6                                                                                                                       7
                  . 6
                  . 6                    .
                                         .                                     .
                                                                               .                                         .
                                                                                                                         .                  7
                  . 6                    .                                     .                   ...                   .                  7
                                                                                                                                            7
                    4                                                                                                                       5
                         k o       k a      k b      k g       k o       k a      k b      k g           k o       k a      k b      k g
                 an ððr n1 Þ ;ðr n1 Þ ;ðrn1 Þ ;ðrn1 Þ Þq ððrn2 Þ ;ðrn2 Þ ;ðr n2 Þ ;ðrn2 Þ Þq ... ððrnn Þ ;ðrnn Þ ;ðrnn Þ ;ðrnn Þ Þq

                                                                                                                                                       ð23Þ

       Step 4.3: construction of the weighted collective fuzzy pairwise comparison matrix.
       At the second level, the fuzzy weighted collective pairwise comparison matrix of p IT
       investment risk criteria will be as follows:

                                       c1                                     c2                                ...                       cp

               c1 2                                                                                                                                          3
                      ððb11 Þo ;ðb11 Þa ;ðb11 Þb ;ðb11 Þg Þ ððb12 Þo ;ðb12 Þa ;ðb12 Þb ;ðb12 Þg Þ ... ððb1p Þo ;ðb1p Þa ;ðb1p Þb ;ðb1p Þg Þ
              6                                                                                                                       7
              6 ððb Þo ;ðb Þa ;ðb Þb ;ðb Þg Þ ððb Þo ;ðb Þa ;ðb Þb ;ðb Þg Þ ... ððb Þo ;ðb Þa ;ðb Þb ;ðb Þg Þ 7
              6 21          21       21       21         22       22       22       22             2p       2p       2p       2p      7
              6                                                                                                                       7
       ~2 c
       AR ¼ 2 6                                                                                                                       7
              6                   .
                                  .                                     .
                                                                        .                                         .
                                                                                                                  .                   7
            .6
            .6
                                  .                                     .                   ...                   .                   7
                                                                                                                                      7
            .4                                                                                                                        5
                ððbp1 Þo ;ðbp1 Þa ;ðbp1 Þb ;ðbp1 Þg Þ ððbp2 Þo ;ðbp2 Þa ;ðbp2 Þb ;ðbp2 Þg Þ ... ððbpp Þo ;ðbpp Þa ;ðbpp Þb ;ðbpp Þg Þ
           cp

                                                                                                                                                      ð24Þ
or:                                                                                                                                                                      Fuzzy goal
                                                                         c1    c2          . . . cp
                                                                                                                                                                       programming
                                                                    2~          ~                    ~ 3                                                                      model
                                                              c1      b11       b12        ...       b1p
                                                                    6~          ~                    ~ 7
                                                  ~2   c            6 b21       b22        ...       b2p 7
                                                  AR ¼ 2            6                                    7                                                ð25Þ
                                                                    6 .                                . 7
                                                        .
                                                        .           6 .
                                                                    6 .
                                                                                    .
                                                                                    .                  . 7                                                                     183
                                                        .                           .      ...         . 7
                                                                    4                                    5
                                                              cp      ~
                                                                      bp1       ~
                                                                                bp2        ...       ~
                                                                                                     bpp

where:
                                                                   Pl                   k !
                                                                                          ~
                                                                         k¼1 ðwðvpÞk Þ   bij
                                                                                             j
                                                   ~
                                                  ðbij Þj ¼                Pl                                                                             ð26Þ
                                                                               k¼1 wðvpÞk

At the third level, the fuzzy weighted collective pairwise comparison matrix of the IT
investment risk sub-criteria with respect to the p IT investment risk criteria will be as
follows:
                                            sc1                                     sc2                       ...                     scq
            2          o         a          b         g                  o      a          b         g                                                             3
      sc1     ððd 11 Þ ; ðd 11 Þ ; ðd 11 Þ ; ðd 11 Þ Þp       ððd 12 Þ ; ðd 12 Þ ; ðd12 Þ ; ðd 12 Þ Þp        ...   ððd 1q Þ ; ðd 1q Þa ; ðd 1q Þb ; ðd 1q Þg Þp
                                                                                                                            o

            6                                                                                                                                                     7
~3  sc      6 ððd 21 Þo ; ðd 21 Þa ; ðd 21 Þb ; ðd 21 Þg Þp   ððd 22 Þo ; ðd 22 Þa ; ðd22 Þb ; ðd 22 Þg Þp    ...    ððd 2q Þo ; ðd 2q Þa ; ðd 2q Þb ; ðd 2q Þg Þ 7
AR ¼ 2      6                                                                                                                                                     7
     .      6                       .                                               .                                                     .                       7
     .      6                       .                                               .                                                     .                       7
     .      6                       .                                               .                         ...                         .                       7
            4                                                                                                                                                     5
      scq     ððd q1 Þ ; ðd q1 Þ ; ðd q1 Þb ; ðd q1 Þg Þp
                      o          a
                                                              ððd q2 Þo ; ðd q2 Þa ; ðdq2 Þb ; ðd q2 Þg Þp    ...           o          a          b
                                                                                                                    ððd qq Þ ; ðd qq Þ ; ðd qq Þ ; ðd qq Þ Þpg



                                                                                                                                                            ð27Þ
or:
                                                                   sc1         sc2             ...           scq
                                                          2 ~                  ~                          ~      3
                                                   sc1      ðd11 ÞP           ðd12 ÞP          ...       ðd1q ÞP
                                                          6 ~                  ~                          ~      7
                                      ~3  sc              6 ðd21 ÞP           ðd22 ÞP          ...       ðd2q ÞP 7
                                      AR ¼ 2              6                                                      7                                        ð28Þ
                                           .              6 .                       .                       . 7
                                           .              6 .                       .                       . 7
                                           .              6 .                       .          ...          . 7
                                                          4                                                      5
                                                   scq       ~
                                                            ðdq1 ÞP            ~
                                                                              ðdq2 ÞP          ...        ~
                                                                                                         ðdqq ÞP

where:
                                                                   Pl                   k !
                                                                                         ~
                                                                             ðwðvpÞk Þ dij
                                                                         k¼1
                                                                                           p
                                                   ~
                                                  ðdij Þj ¼                  Pl                                                                           ð29Þ
                                                                               k¼1 wðvpÞk

At the fourth level, the fuzzy weighted collective pairwise comparison matrix of the n
IT investment strategies with respect to the q IT investment risk sub-criteria will be as
follows:
BIJ           a1
                                               a1                                    a2                     ...               an
                   2                                                                                                                              3
18,2                   ððr 11 Þ ;ðr 11 Þ ;ðr 11 Þ ;ðr 11 Þ Þq ððr 12 Þ ;ðr 12 Þ ;ðr12 Þ ;ðr 12 Þ Þq ... ððr 1n Þ ;ðr 1n Þ ;ðr 1n Þb ;ðr1n Þg Þq
                              o       a        b        g              o         a        b          g                 o      a

               6                                                                                                                                    7
               6 ððr 21 Þo ;ðr 21 Þa ;ðr 21 Þb ;ðr 21 Þg Þq ððr 22 Þo ;ðr 22 Þa ;ðr22 Þb ;ðr 22 Þg Þq ... ððr 2n Þo ;ðr 2n Þa ;ðr 2n Þb ;ðr2n Þg Þq 7
       AR ¼ a2 6
       ~4                                                                                                                                           7
               6
             . 6                      .                                          .                                             .                    7
             . 6                      .                                          .                                             .                    7
             .                        .                                          .                    ...                      .                    7
               4                                                                                                                                    5
184                      o         a         b         g            o         a        b         g                o         a
            an ððr n1 Þ ;ðr n1 Þ ;ðr n1 Þ ;ðrn1 Þ Þq ððr n2 Þ ;ðr n2 Þ ;ðrn2 Þ ;ðrn2 Þ Þq ... ððr nn Þ ;ðrnn Þ ;ðr nn Þ ;ðr nn Þ Þq   b        g



                                                                                                                                              ð30Þ
       or:
                                                                  a1              a2          ...          an
                                                             2                                                     3
                                                       a1        ð~11 Þq
                                                                  r             ð~12 Þq
                                                                                 r            ...        ð~1n Þq
                                                                                                          r
                                                     6                                                           7
                                                     6 ð~21 Þq
                                                        r                       ð~22 Þq
                                                                                 r            ...        ð~2n Þq 7
                                                                                                          r
                                            A 4 ¼ a2 6
                                            ~                                                                    7                           ð31Þ
                                                     6 .
                                                   . 6 .                             .                      . 7
                                                   . 6 .
                                                   .                                 .
                                                                                     .        ...           . 7
                                                                                                            . 7
                                                     4                                                           5
                                                  an ð~n1 Þq
                                                        r                       ð~n2 Þq
                                                                                 r            ...        ð~nn Þq
                                                                                                          r

       where:                                                                            
                                                                    Pl
                                                                           k¼1 ðwðvpÞk Þ rk
                                                                                          ~ij
                                                            rij ¼
                                                            ~               Pl                                                               ð32Þ
                                                                               k¼1 wðvpÞk

       Step 4.4: computation of the vector of the risk value for the IT investment strategies. The
       fuzzy composite vector of the deferrable IT investment strategies at the fourth level
       will be calculated based on the corresponding eigenvectors:
                                        ~ ~         ~2
                                  FRV ¼ A 4 · A 3 · W R ¼ ½ FRV 1                         FRV 2            ...     FRV n ŠT                  ð33Þ
       or:

       FRV ¼ ½ððFRV Þo ; ðFRV Þa ; ðFRV Þb ; ðFRV Þg ÞR1

       ððFRV Þo ; ðFRV Þa ; ðFRV Þb ; ðFRV Þg ÞR2                              . . . ððFRV Þo ; ðFRV Þa ; ðFRV Þb ; ðFRV Þg ÞRn ÞŠT
                                                                                                                                             ð34Þ
       where:
                                                    ~      ~4
                                                    A4 ¼ b W R 1               ~4
                                                                               W R2       ...       ~4
                                                                                                    W Rq c                                   ð35Þ

                                                    ~       ~3
                                                    A 3 ¼ b W R1               ~3
                                                                               W R2       ...       ~3
                                                                                                    W Rp c                                   ð36Þ
                                                                     h    
                                                                  ~2
                                                                  AR · e
                                                   ~2
                                                   W R ¼ Lim       2 h                            h!1                                      ð37Þ
                                                                    ~
                                                             e T · AR · e
h
                                            ~3
                                            AR · e                                                 Fuzzy goal
                           ~3
                           W Rp   ¼ Lim      3 h                     h!1                ð38Þ   programming
                                        eT · A~    ·e     R                                             model
                                            4 h
                                             ~
                                             AR · e
                           ~4
                           W Rq   ¼ Lim       4 h                    h!1                ð39Þ
                                               ~                                                         185
                                        e T · AR · e

                                    e ¼ ð1        1       . . . 1 ÞT                      ð40Þ


Phase 5: development of the strategic IT investment plan
Decision makers also must consider the interaction between the real option and the
investment risks. Therefore, in this phase, the IT investment strategy with the most
value is determined in terms of real option and risk values in Phases 2 and 3. For this
purpose, they are considered as the coefficients of the objective functions in the
following fuzzy preemptive goal programming model with a series of applicable
constraints. This phase is divided into the following three steps.
    Step 5.1: determination of the goal and priority levels. The goals in the fuzzy
preemptive goal programming model can be written as follows:
    For the first priority level, there are two goals. These goals are equally important so
they can have the same weight:

Max Z 1 ¼ E½FROV 1 ðT 1 ÞŠ · x11 þ E½FROV 1 ðT 2 ÞŠ · x12 þ · · · þ E½FROV 1 ðT m ÞŠ · x1m þ
            E½FROV 2 ðT 1 ÞŠ · x21 þ E½FROV 2 ðT 2 ÞŠ · x22 þ · · · þ E½FROV 2 ðT m ÞŠ · x2m þ
                                                      .
                                                      .
                                                      .

           E½FROV n ðT 1 ÞŠ · xn1 þ E½FROV n ðT 2 ÞŠ · xn2 þ · · · þ E½FROV n ðT m ÞŠ · xnm

 Min Z 2 ¼ EðFRV 1 Þ · ðx11 þ x12 þ · · · þ x1m Þ þ EðFRV 2 Þ · ðx21 þ x22 þ · · · þ x2m Þþ
             · · · þ EðFRV n Þ · ðxn1 þ xn2 þ · · · þ xnm Þ

For the second priority level, we have:

                                  f 1 ðx11 ; x12 ; . . . ; xnm Þ # 0

                                  f 2 ðx11 ; x12 ; . . . ; xnm Þ # 0
                                                      .
                                                      .
                                                      .

                                  f r ðx11 ; x12 ; . . . ; xnm Þ # 0
                                  xi ¼ 0; 1 ði ¼ 1; 2; . . . ; nÞ
BIJ    Max Z 1 ¼ E½FROV 1 ðT 1 ÞŠ · x11 þ E½FROV 1 ðT 2 ÞŠ · x12 þ · · · þ E½FROV 1 ðT m ÞŠ · x1m þ
18,2              E½FROV 2 ðT 1 ÞŠ · x21 þ E½FROV 2 ðT 2 ÞŠ · x22 þ · · · þ E½FROV 2 ðT m ÞŠ · x2m þ
                                                 .
                                                 .
                                                 .
                 E½FROV n ðT 1 ÞŠ · xn1 þ E½FROV n ðT 2 ÞŠ · xn2 þ · · · þ E½FROV n ðT m ÞŠ · xnm
186
               Min Z 2 ¼ EðFRV 1 Þ · ðx11 þ x12 þ · · · þ x1m Þ þ EðFRV 2 Þ · ðx21 þ x22 þ
                           · · · þ x2m Þ þ · · · þ EðFRV n Þ · ðxn1 þ xn2 þ · · · þ xnm Þ
       Subject to: (Model P)
                                          x11 þ x12 þ · · · þ x1m # 1
                                          x21 þ x22 þ · · · þ x2m # 1
                                                       .
                                                       .
                                                       .
                                          xn1 þ xn2 þ · · · þ xnm # 1

                                          f 1 ðx11 ; x12 ; . . . ; xnm Þ # 0
                                          f 2 ðx11 ; x12 ; . . . ; xnm Þ # 0
                                                            .
                                                            .
                                                            .
                                          f r ðx11 ; x12 ; . . . ; xnm Þ # 0

                             xij ¼ 0; 1     ði ¼ 1; 2; . . . ; n; j ¼ 1; 2; . . . ; mÞ
       where f i ðx1 ; x2 ; . . . ; xn Þ are given functions of the n investments.
          Step 5.2: computation of the goal values. In this step, instead of trying to optimize
       each objective function, the strategic IT investment board will specify a realistic goal
       or target value that is the most desirable value for that function.
          Step 5.3: construction of the proposed goal programming model. The first objective
       function is to be maximized and the second objective function is to be minimized.
       Therefore, the proposed fuzzy goal programming model for the above two-objective
       strategic IT investment decision will be the following single-objective model:
                                                 À         Á
                                  Min D ¼ P 1 sþ þ s2 þ P 2 s2 þ · · · þ P rþ2 s2
                                                   1     2        3              r

       Subject to: (Model F)

             E½FROV 1 ðT 1 ÞŠ · x11 þ E½FROV 1 ðT 2 ÞŠ · x12 þ · · · þ E½FROV 1 ðT m ÞŠ · x1m þ
             E½FROV 2 ðT 1 ÞŠ · x21 þ E½FROV 2 ðT 2 ÞŠ · x22 þ · · · þ E½FROV 2 ðT m ÞŠ · x2m þ
                                                    .
                                                    .
                                                    .
             E½FROV n ðT 1 ÞŠ · xn1 þ E½FROV n ðT 2 ÞŠ · xn2 þ · · · þ E½FROV n ðT m ÞŠ · xnm

                                                 S2 2 Sþ ¼ l1
                                                  1    1
EðFRV 1 Þ · ðx11 þ x12 þ · · · þ x1m Þ þ EðFRV 2 Þ · ðx21 þ x22 þ                        Fuzzy goal
          · · · þ x2m Þ þ · · · þ EðFRV n Þ · ðxn1 þ xn2 þ · · · þ xnm Þ þ s2 2 sþ ¼ u1
                                                                            2    2           programming
                           f 1 ðx11 ; x12 ; . . . ; xnm Þ þ sþ þ sþ ¼ 0                             model
                                                             3    3
                          f 2 ðx11 ; x12 ; . . . ; xnm Þ þ sþ þ s2 ¼ 0
                                                            4    4
                                                 .
                                                 .
                                                 .
                                                                                                     187
                         f r ðx11 ; x12 ; . . . ; xnm Þ þ sþ þ s2 ¼ 0
                                                           rþ2  rþ2

                                  x11 þ x12 þ · · · þ x1m # 1
                                  x21 þ x22 þ · · · þ x2m # 1
                                               .
                                               .
                                               .
                                  xn1 þ xn2 þ · · · þ xnm # 1

                     xij ¼ 0; 1     ði ¼ 1; 2; . . . ; n; j ¼ 1; 2; . . . ; mÞ
                            sþ ; s2
                             h    h   $0     ðh ¼ 1; 2; . . . ; r þ 2Þ
                                           sþ · s2 ¼ 0
                                            h    h


The optimal solution for model (F) is the deferrable IT investment strategy with the
most values at the time Ti. Next, we present a numerical example to demonstrate the
implementation process of this framework.

3. Case study
We implemented the proposed model at Mornet[1], a large mortgage company in the
city of Philadelphia with an urgent need to select an optimal IT investment strategy for
their deferrable investment opportunities.
   In Phase 1, the chief executive officer instituted a committee of four strategic IT
investment board members, including:
   (ITIB)1. The chief operating officer.
   (ITIB)2. The chief information officer.
   (ITIB)3. The heads of the business unit.
   (ITIB)4. The chief financial officer.
In Phase 2, the investment board identifies five different types of deferrable investment
opportunities with the following characteristics (Table I) as suggested by Carlsson et al.
(2007):
   a1. Project 1 has a large negative estimated NPV (due to huge uncertainties) and
       can be deferred up to two years (v(FNPV) , 0, T ¼ 2).
   a2. Project 2 includes positive NPV with low risks and has no deferral flexibility
       (v(FNPV) . 0, T ¼ 0).
BIJ                             a3. Project 3 has revenues with large upward potentials and managerial flexibility,
18,2                                but its “reserve costs” (c) are very high.
                                a4. Project 4 requires a large capital expenditure once it has been undertaken and
                                    has a deferral flexibility of a maximum of one year.
                                a5. Project 5 represents a small flexible project with low revenues, but it opens the
188                                 possibility of further projects that are much more profitable.
                           In Phase 3, the fuzzy real option values of the five different deferrable investment
                           opportunities shown in Figure 2 were determined for years 1 and 2.
                              In Phase 4, the strategic IT investment board determined the GFAHP three criteria
                           of firm-specific risks, development risks and external environment risks as
                           suggested by Benaroch (2002). The firm-specific risks were further divided into four
                           sub-criteria: organizational risks, user risks, requirement risks and structural risks.

                           Deferral
                           time             Project 1              Project 2             Project 3             Project 4             Project 5

                           0          FNPV ¼ ((75%), FNPV ¼ (12%, FNPV ¼ (5%,        FNPV ¼ ((12%), FNPV ¼ ((5%),
Table I.                              17%, 15%, 126%) 20%, 45%, 56%) 24%, 17%, 218%) 85%, 71%, 6%) 12%, 4%, 358%)
The five deferrable IT      1                 U                              U              U             U
investment opportunities   2                 U                              U                            U




                               Deferral         Project              Project               Project               Project             Project
                                time               1                    2                     3                     4                   5




                                  0
                                                 FNPV =                 FNPV =              FNPV =              FNPV =                FNPV =
                                          ((75%),17%,15%,126%)    (12%,20%,45%,56%)   (5%,24%,17%,218%)   ((12%),85%,71%,6%)    ((5%),12%,4%,358%)
                                               M = (10.5%)            M = 17.8%           M = 48.0%            M = 25.7%             M = 62.5%
                                                s = 71.5%              s = 24%             s = 56.0%           s = 62.0%             s = 81.0%




                                  1
                                                 FROV1 =                                   FROV1 =              FROV1 =               FROV1 =
                                          ((90%),20%,18%,151%)                        (6%,26%,19%,240%)   ((15%),106%,89%,8%)   ((6%),13%,4%,394%)
                                               M = (12.6%)                                M = 52.8%            M = 32.1%             M = 68.8%
                                                s = 85.8%                                  s = 61.6%           s = 77.5%             s = 89.1%




Figure 2.
The fuzzy real option             2
values of the five                                FROV2 =                                   FROV2 =                                    FROV2 =
deferrable IT investment                  ((104%),23%,21%,174%)                       (7%,31%,23%,288%)                         ((7%),14%,5%,433%)
                                                M = (14.5%)                               M = 63.4%                                  M = 75.7%
opportunities                                    s = 98.7%                                 s = 73.9%                                 s = 98.0%
The development risks were further divided into two sub-criteria: team risks and                                      Fuzzy goal
complexity risks. External environment risks were further divided into two sub-criteria:
competition risks and market risks.
                                                                                                                    programming
   Next, the possibilistic mean risk values of the investment opportunities presented in                                   model
Table II were calculated.
   In Phase 5, assuming a per annum investment, the deferrable IT investment strategy
with the most value was determined using the following two-objective decision-making                                               189
model:
  Min Z 2 ¼ 0:45ðx10 þ x11 þ x12 Þ þ 0:1x20 þ 0:35ðx30 þ x31 þ x32 Þ þ 0:15ðx40 þ x41 Þ
            þ 0:05ðx50 þ x51 þ x52 Þ
Subject to: (Model P)
                                         x10 þ x11 þ x12 # 1
                                                 x21 # 1
                                         x30 þ x31 þ x32 # 1
                                             x40 þ x41 # 1
                                         x50 þ x51 þ x52 # 1
                                x10 þ x20 þ x30 þ x40 þ x50 # 1
                                     x11 þ x31 þ x41 þ x51 # 1
                                         x12 þ x32 þ x52 # 1
                 x10 ; x11 ; x12 ; x20 ; x30 ; x31 ; x32 ; x40 ; x41 ; x50 ; x51 ; x52 ¼ 0; 1
Therefore, the goal programming model for the above two-objective strategic IT
investment decision will be the following single objective model:
                                             À         Á
                               Min D ¼ P 1 · s2 þ sþ
                                                1    2
Subject to: (Model F)
     ð20:105Þx10 þ ð20:126Þ · x11 þ ð20:145Þ · x12 þ 0:178x20 þ 0:48x30 þ 0:528x31
        þ 0:634x32 þ 0:257x40 þ 0:321x41 þ 0:625x50 þ 0:688x51 þ 0:757x52
          À         Á
        þ s2 2 sþ ¼ 1:5
            1     1

        0:45ðx10 þ x11 þ x12 Þ þ 0:1x20 þ 0:35ðx30 þ x31 þ x32 Þ þ 0:15ðx40 þ x41 Þ
                                       À        Á
           þ 0:05ðx50 þ x51 þ x52 Þ þ s2 2 sþ ¼ 0:6
                                         2    2

                                         x10 þ x11 þ x12 # 1
                                                 x20 # 1
                                                                                                                                Table II.
Project 1               Project 2                Project 3                 Project 4               Project 5       The possibilistic mean
                                                                                                                      risk value of the IT
E(FRV1) ¼ 0.45     E(FRV2) ¼ 0.10            E(FRV3) ¼ 0.35            E(FRV4) ¼ 0.15           E(FRV5) ¼ 0.05   investment opportunities
BIJ                                                                x30 þ x31 þ x32 # 1
18,2                                                                   x40 þ x41 # 1
                                                                   x50 þ x51 þ x52 # 1
                                                          x10 þ x20 þ x30 þ x40 þ x50 # 1
190                                                            x11 þ x31 þ x41 þ x51 # 1
                                                                   x12 þ x32 þ x52 # 1
                                           x10 ; x11 ; x12 ; x20 ; x30 ; x31 ; x32 ; x40 ; x41 ; x50 ; x51 ; x52 ¼ 0; 1
                                                                    sþ ; s2 ; sþ ; s2 $ 0
                                                                     1    1    2    2

                                                                         sþ · s2 ¼ 0
                                                                          1    1

                                                                         sþ · s2 ¼ 0
                                                                          2    2

                           The optimal solution for model (F) given in Table III shows Projects 1 and 2 were
                           rejected. Project 3 was approved for to start immediately, Project 4 was approved to start
                           next year and Project 5 was approved to start in two years.

                           4. Discussion and practical perspectives
                           It is hard to say for sure which IT investment strategy is the best, but, we can make the
                           selection process more comprehensive and systematic. The group decision process used
                           at Mornet was intended to enhance decision making and promote consensus. Our four
                           investment board members were highly educated; three of them held graduate degrees
                           in business and one of them held a doctorate in economics. To this end, a more logical and
                           persuasive multi-criteria decision-making method was necessary to gain their
                           confidence and support. Although our board members were educated and creative,
                           their managerial judgment and intuition was limited by background and experience.
                           One manager lacked strategic management skills while another had limited experience
                           in banking. Upon completion of the IT investment strategy selection process, we held a
                           meeting with the board to discuss the results and finalize our recommendation. The four
                           board members unanimously agreed that the proposed framework provided invaluable
                           analysis aids and information processing support. They were convinced that the result
                           was unbiased and consistent.
                               Armed with this feedback, we were confident that we could sell our recommendation
                           to the top management. Nevertheless, we were all aware that consensus building at
                           Mornet was a gradual process and could not be achieved overnight. We knew that
                           building internal alliances and selecting an IT investment strategy that could cut across
                           different functional areas was a difficult task. The board members agreed to target
                           various groups and key people at Mornet in order to gain their support. They began

                           Deferral time      Project 1            Project 2            Project 3             Project 4   Project 5

Table III.                 0                                                                U
The optimal solution for   1                                                                                     U
model (F)                  2                                                                                                 U
building internal alliances with functional units and focused their efforts on getting          Fuzzy goal
other line managers on board. This process involved fostering collaboration and               programming
avoiding alienation of potential internal allies. The board also decided to get the line
managers on board. Gaining the line management support resulted in the dedication of                 model
some line budget to the implementation process. This led to a virtuous circle since the
fact that some line mangers agreed to pay for some of the implementation expenses
increased their commitment. This encouraged other line managers to jump on the                        191
bandwagon and participate in the selection process.
   The internal alliance building process would not be complete without top
management support. Our board was adamant about the importance of gaining support
from the top management. Gaining the top management support was easier than it may
seem from the outside. The board members had already built internal alliances and
support of various key people and line managers. We discussed the overwhelming
internal support and the tangible and intangible benefits of our IT investment strategy
with the top management who in turn agreed to implement our recommendation. We
were also required to develop a long-term plan to measure the IT investment selection
success through qualitative and quantitative measures.
   The analysis of this case study allows the articulation of a series of key factors that
can be considered as important in contributing to the successful selection and
implementation of IT investment strategies. The first is building internal alliances. The
second element is getting the line managers on board. The third factor is the full and
continual support given by top management. The fourth key ingredient is the persistent
and systematic processes in place to measure the IT investment success.

5. Conclusions and future research directions
IT investments represent the largest capital expenditure items for many organizations
and have a tremendous impact on productivity by reducing costs, improving quality
and increasing value to customers. As a result, many organizations continue to invest
large sums of money in IT in anticipation of a material return on their investment. The
selection of appropriate IT investments has been one of the most significant business
challenges of the last decade.
   In this paper, we proposed a novel two-dimensional approach that determined
the deferrable strategy with the most value by maximizing the real option values
while minimizing the risks associated with each alternative strategy. First, the deferrable
investment strategies were prioritized according to their values using the ROA. Then, the
risks associated with each investment strategy were quantified using the GFAHP. Finally,
the values associated with the two dimensions were integrated to determine the deferrable
IT investment strategy with the most value using a fuzzy preemptive goal programming
model. This framework can be easily generalized to N-dimensional problems. We have
developed a framework that can be used to evaluate IT investments based on the real
option concept. This approach incorporates the linkage among economic value, real option
value and IT investments that could lead to a better-structured decision process.
   The proposed approach provides guidelines for managing IT investment projects.
Managers face the difficulty that most IT investment projects are inherently risky,
especially in a rapidly changing business environment. Over the past several years,
increasingly sophisticated analytical techniques have been developed for selecting the IT
investments, but not implemented within organizations. Our approach provides a simple,
BIJ    intuitive, generic and comprehensive investment management tool. The trapezoidal fuzzy
18,2   numbers used in this study allows the proposed model to be implemented easily with the
       most commonly used spreadsheet software. Managers can easily understand how to
       implement the proposed approach to assess their technology portfolio requirements.
           In contrast to the traditional ROA literature, our approach contributes to the
       literature by incorporating a risk dimension parameter. We emphasize the importance
192    of categorizing risk management in IT investment projects since some risk cannot be
       eliminated. After estimating the possibility and severity of each risk factor, we obtain
       an overall risk level for each IT investment under consideration. This assumes by
       implication that all risk factors are independent. However, in practice, there may be
       some interaction between different risk factors and their influence on the expected
       payoffs could be not independent. Future research considering correlation coefficients
       between risk factors is rather challenging but necessary to gain insight into this
       interaction influence in the application of ROA to IT investment decisions.
           We have developed a framework that can be used to evaluate IT investment
       strategies based on the real option concept. This approach incorporates the linkage
       among economic value, real option value and IT investments that could lead to a
       better-structured decision process. The overall contributions of the novel framework
       proposed in this study are threefold:
           (1) Our framework addresses the gaps in the IT investment planning literature on
               the effective and efficient assessment of IT investment opportunities.
           (2) Our framework provides a comprehensive and systematic framework that
               combines ROA with a fuzzy group multi-criteria approach to assess IT
               investment strategies.
           (3) Current IT investment assessment models are somewhat limited in their ability
               to come to grips with issues of inference and fuzziness. Our framework
               considers fuzzy logic and fuzzy sets to represent ambiguous, uncertain or
               imprecise information in the It investment evaluation process.

       Future research considering correlation coefficients between the risk and benefit factors
       is rather challenging but necessary to gain insight into this interaction influence in the
       application of ROA to strategic IT investment decision in organizations. Another
       possible future research direction is to investigate other drivers that influence the IT
       investment decisions. These value drivers could also be incorporated into the model
       proposed in this study.

       Note
        1. The name is changed to protect the anonymity of the company.

       References
       Bakos, Y. and Kemerer, C.F. (1992), “Recent applications of economic theory in information
             technology research”, Decision Support Systems, Vol. 8 No. 5, pp. 365-86.
       Benaroch, M. (2002), “Managing information technology investment risk: a real options
             perspective”, Journal of Management Information Systems, Vol. 19 No. 2, pp. 43-84.
       Black, F. and Scholes, M. (1973), “The pricing of options and corporate liabilities”, The Journal of
             Political Economy, Vol. 81, pp. 637-54.
Black, F. and Scholes, M. (1974), “The effects of dividend yield and dividend policy on common             Fuzzy goal
      stock prices and returns”, Journal of Financial Economics, Vol. 1 No. 1, pp. 1-22.
                                                                                                         programming
Boyle, P.P. (1977), “Options: a Monte Carlo approach”, Journal of Financial Economics, Vol. 4
      No. 3, pp. 323-38.                                                                                        model
Brealey, R.A. and Myers, S.C. (1998), Principles of Corporate Finance, McGraw-Hill, New York, NY.
                       ´
Carlsson, C. and Fuller, R. (2003), “A fuzzy approach to real option valuation”, Fuzzy Sets and
      Systems, Vol. 139 No. 2, pp. 297-312.                                                                      193
                  ´              ¨
Carlsson, C., Fuller, R., Heikkila, M. and Majlender, P. (2007), “A fuzzy approach to RD project
      portfolio selection”, International Journal of Approximate Reasoning, Vol. 44 No. 2, pp. 93-105.
Chen, T., Zhang, J., Liu, S. and Yu, B. (2007), “Fuzzy real option analysis for IT investment in
      nuclear power station”, Computational Science – ICCS 2007, Springer, Berlin, pp. 953-9.
Chen, Y., Liang, L., Yang, F. and Zhu, J. (2006), “Evaluation of information technology
      investment: a data envelopment analysis approach”, Computers  Operations Research,
      Vol. 33 No. 5, pp. 1368-79.
Chrysafis, K.A. and Papadopoulos, B.K. (2009), “On theoretical pricing of options with fuzzy
      estimators”, Journal of Computational and Applied Mathematics, Vol. 223 No. 2, pp. 552-66.
                ´
Collan, M., Fuller, R. and Mezei, J. (2009), “A fuzzy pay-off method for real option valuation”,
      Journal of Applied Mathematics and Decision Sciences, Vol. 2009.
Cox, J., Ross, S. and Rubinstein, M. (1979), “Option pricing: a simplified approach”, Journal of
       Financial Economics, Vol. 7 No. 3, pp. 229-63.
Datar, V. and Mathews, S. (2004), “European real options: an intuitive algorithm for the Black
      Scholes formula”, Journal of Applied Finance, Vol. 14 No. 1, pp. 45-51.
Datar, V. and Mathews, S. (2007), “A practical method for valuing real options: the Boeing
      approach”, Journal of Applied Corporate Finance, Vol. 19 No. 2, pp. 95-104.
Dixit, A. and Pindyck, R.S. (1994), Investment Under Uncertainty, Princeton University Press,
       Princeton, NJ.
Dos Santos, B.L. (1994), Assessing the Value of Strategic Information Technology Investments,
     Chapman  Hall, London.
Dubois, D. and Prade, H. (1988), Possibility Theory: An Approach to Computerized Processing of
     Uncertainty, Plenum Press, New York, NY.
Farbey, B., Land, F. and Targett, D. (1993), How to Assess Your IT Investment: A Study of
     Methods and Practice, Butterworth-Heinemann, Oxford.
Frode, K. (2007), “A real option analysis of investments in hydropower: the case of Norway”,
      Energy Policy, Vol. 35 No. 11, pp. 5901-8.
Hayes, R. and Abernathy, W. (1980), “Managing our way to economic decline”, Harvard Business
     Review, Vol. 58 No. 4, p. 67.
Kaplan, R.S. and Atkinson, A.A. (1998), Advanced Management Accounting, 3rd ed.,
     Prentice-Hall, Upper Saddle River, NJ, pp. 593-603.
Kumar, R.L. (2002), “Managing risks in IT projects: an options perspective”, Information 
     Management, Vol. 40 No. 1, pp. 63-74.
Luehrman, T.A. (1997), “What’s it worth? A general manager’s guide to valuation”, Harvard
     Business Review, Vol. 75 No. 3, pp. 132-42.
McGrath, R.G. (1997), “A real options logic for initiating technology positioning investments”,
     Academy of Management Review, Vol. 22 No. 4, pp. 974-96.
BIJ    Mathews, S. and Salmon, J. (2007), “Business engineering: a practical approach to valuing
             high-risk, high-return projects using real options”, in Gray, P. (Ed.), Tutorials in
18,2         Operations Research, Informs, Hanover, MD.
       Melville, N., Kraemer, K. and Gurbaxani, V. (2004), “Information technology and organizational
             performance: an integrative model of it business value”, MIS Quarterly, Vol. 28 No. 2,
             pp. 283-322.
194    Parker, M. and Benson, R. (1989), “Enterprisewide information economics: latest concepts”,
             Journal of Information Systems Management, Vol. 6 No. 4, pp. 7-13.
       Powell, P. (1992), “Information technology appraisal: is it different?”, The Journal of the
             Operational Research Society, Vol. 43 No. 1, pp. 29-42.
       Schniederjans, M.J., Hamaker, J.L. and Schniederjans, A.M. (2004), Information Technology
             Investment: Decision-Making Methodology, World Scientific, Singapore.
       Stix, V. and Reiner, J. (2004), “IT appraisal methods and methodologies: a critical literature
             review”, in Khosrowpour, M. (Ed.), Innovations through Information Technology, Idea
             Group, Hershey, PA, pp. 37-40.
       Strassmann, P.A. (1997), The Squandered Computer: Evaluating the Business Alignment of
             Information Technologies, Information Economic Press, New Canaan, CT.
       Villani, G. (2008), “An RD investment game under uncertainty in real option analysis”,
             Computational Economics, Vol. 32 Nos 1/2, pp. 199-219.
       Wang, J. and Hwang, W.-L. (2007), “A fuzzy set approach for RD portfolio selection using a real
             options valuation model”, Omega, Vol. 35 No. 3, pp. 247-57.
       Willcocks, L.P. and Lester, S. (1996), “The evaluation and management of information systems
             investments: from feasibility to routine operations”, in Willcocks, L.P. (Ed.), Investing in
             Information Systems, Chapman and Hall, London, pp. 15-36.
       Zadeh, L.A. (1965), “Fuzzy sets”, Information and Control, Vol. 8, pp. 338-53.

       Further reading
       Wu, L.-C. and Ong, C.-S. (2007), “Management of information technology investment:
            a framework based on a real options and mean-variance theory perspective”,
            Technovation, Vol. 28 No. 3, pp. 122-34.

       Appendix. The mathematical notations
       Let us introduce the following mathematical notations and definitions used throughout this
       paper:
          cj          The jth criterion.
          ai          The ith IT investment strategy.
          p           The number of IT investment risk criteria.
          q           The number of IT investment risk sub-criteria.
          l           The number of IT investment board members.
          n           The number of alternative IT investment strategies.
          Ti          The time to maturity of the ith IT investment strategy.
          Tm          The maximum deferral time of the IT investments.
          T1          The minimum deferral time of the IT investments.
ri             The risk-free interest rate.                                                          Fuzzy goal
w(vp)K         The voting power of the IT investment board member (ITIB)k (K ¼ 1,2, . . . , l ).   programming
~k
Bi ðT j Þ      The individual fuzzy present value of the expected cash flows of the ith IT                 model
               investment strategy at time Tj evaluated by strategic IT investment board
               member (ITIB)k.
˜
Bi(Tj)         The weighted collective fuzzy present value of the expected cash flows of the ith            195
               IT investment strategy at time Tj.
  ˜
E(Bi(Tj))      The possibilistic mean value of the weighted collective present value of expected
               cash flows of the ith IT investment strategy at time Tj.
~k
Ci ðT j Þ      The individual fuzzy present value of the expected cost of the ith IT investment
               strategy at time Tj evaluated by strategic IT investment board member (ITIB)k.
˜
Ci(Tj)         The weighted collective fuzzy present value of the expected cost of the ith IT
               investment strategy at time Tj.
  ˜
E(Ci(Tj))      The possibilistic mean value of the weighted collective expected costs of the ith
               IT investment strategy at time Tj.
di             The value loss over the duration of the option.
      2
(s (Tj))i      The variance of the weighted collective fuzzy present value of expected cash
               flows of the ith IT investment strategy at time Tj evaluated by strategic IT
               investment board member (ITIB)k.
N(D1i(Tj)) The IT investment strategy ith cumulative normal probability for the D1.
N(D2i(Tj)) The IT investment strategy ith cumulative normal probability for the D2.
~k
bij            The individual fuzzy comparison qualification between criterion i with criterion j
               evaluated by strategic IT investment board member (ITIB)k.
 k
 ~
 dij           The individual fuzzy comparison qualification between sub-criterion i with
          p
               sub-criterion j with respect to criterion p evaluated by strategic IT investment
               board member (ITIB)k.
 
 rk
 ~ij           The individual fuzzy comparison qualification between IT investment strategy i
          q
               with IT investment strategy j with respect to sub-criterion q evaluated by
               strategic IT investment board member (ITIB)k.
~
bij            The weighted fuzzy collective comparison qualification between criterion i with
               criterion j.
 ~
ðdij Þj        The weighted fuzzy collective comparison qualification between sub-criterion i
               with sub-criterion j with respect to criterion j.
ð~ij Þj
 r             The weighted fuzzy collective comparison qualification between IT investment
               strategy i with IT investment strategy j with respect to sub-criterion j.
sþ
 h             The amount by which we numerically exceed the hth goal.
s2
 h             The amount by which we numerically fall short of the hth goal.
         K
     ~2
     AR        The individual fuzzy pairwise comparison matrix of p criteria of IT investment
               risk evaluated by strategic IT investment board member (ITIB)k.
K
              ~3
BIJ           AR        The individual fuzzy pairwise comparison matrix of IT investment risk
                        sub-criteria with respect to the p IT investment risk criteria evaluated by
18,2                    strategic IT investment board member (ITIB)k.
                  K
              ~4
              AR        The individual fuzzy pairwise comparison matrix of n IT investment strategies
                        with respect to the q IT investment risk sub-criteria evaluated by strategic IT
                        investment board member (ITIB)k.
                  
196           ~2
              AR        The weighted fuzzy collective pairwise comparison matrix of the p IT investment
                        risk criteria.
                  
              ~3
              AR        The weighted fuzzy collective pairwise comparison matrix of IT investment risk
                        sub-criteria with respect to the p IT investment risk criteria.
                  
              ~4
              AR        The weighted fuzzy collective pairwise comparison matrix of the n IT investment
                        strategies with respect to the q IT investment risk sub-criteria.
                  K
              ~2
              AR        The weighted fuzzy collective IT investment risk matrix evaluated by strategic
                        IT investment board member (ITIB)k.
          FROVi(Tj) The fuzzy real option value of the ith IT investment strategy at time Tj.
          FRVi          The fuzzy risk value of the ith IT investment strategy.
          ˜
          AFROV         The fuzzy real option value matrix of the deferrable IT investment strategies.
          FRV           The fuzzy risk value vector of the IT investment strategies.


       About the authors
       Faramak Zandi is an Assistant Professor of Information Systems and Chairman of the Industrial
       Engineering Department at Alzahra University in Iran. He holds a PhD in Industrial
       Engineering. His research interests include IT, enterprise architectures, decision making, quality
       management systems and transportation planning. He has published in the International Journal
       of Business Information Systems, International Journal of Mathematics in Operational Research,
       International Journal of Information Technology and Management, IEEE Computer Society,
       Journal of Tehran University and Amirkabir Journal of Science  Technology and Quarterly
       Journal of Educational Innovations.
          Madjid Tavana is a Professor of Management Information Systems and Decision Sciences and
       the Lindback Distinguished Chair of Information Systems at La Salle University where he served
       as Chairman of the Management Department and Director of the Center for Technology and
       Management. He has been a distinguished Faculty Fellow at NASA’s Kennedy Space Center,
       NASA’s Johnson Space Center, Naval Research Laboratory – Stennis Space Center and Air Force
       Research Laboratory. He was awarded the prestigious Space Act Award by NASA. He holds an
       MBA, a PMIS and a PhD in Management Information Systems. He received his Post-doctoral
       Diploma in strategic information systems from the Wharton School of the University of
       Pennsylvania. He is the Editor-in-Chief for the International Journal of Strategic Decision Sciences,
       The International Journal of Enterprise Information Systems and The International Journal of
       Applied Decision Sciences. He has published in journals such as Decision Sciences, Interfaces,
       Information Systems, Information and Management, Computers and Operations Research, Journal
       of the Operational Research Society and Advances in Engineering Software, among others.
       Madjid Tavana is the corresponding author and can be contacted at: tavana@lasalle.edu


       To purchase reprints of this article please e-mail: reprints@emeraldinsight.com
       Or visit our web site for further details: www.emeraldinsight.com/reprints

More Related Content

PPT
Dr prasanna karhade
PDF
Actionable Knowledge Discovery
PPTX
Case study
PDF
The Optimization of choosing Investment in the capital markets using artifici...
PPTX
Case study
PDF
Drivers of e business value creation in
DOCX
Employee Engagement within the IT Industry
PDF
EMPLOYEE ATTRITION PREDICTION IN INDUSTRY USING MACHINE LEARNING TECHNIQUES
Dr prasanna karhade
Actionable Knowledge Discovery
Case study
The Optimization of choosing Investment in the capital markets using artifici...
Case study
Drivers of e business value creation in
Employee Engagement within the IT Industry
EMPLOYEE ATTRITION PREDICTION IN INDUSTRY USING MACHINE LEARNING TECHNIQUES

What's hot (18)

PPTX
1505 Statistical Thinking course extract
PDF
Applying Information Economics
PDF
OpLossModels_A2015
PDF
Amcis2015 erf strategic_informationsystemsevaluationtrack_improvingenterprise...
PDF
Recursos TIC e Educação
PDF
Data mining in support of fraud management
PDF
APPLICATIONS OF DEEP LEARNING AND MACHINE LEARNING IN HEALTHCARE DOMAIN – A L...
PDF
Clustering Prediction Techniques in Defining and Predicting Customers Defecti...
PDF
Voluntary Disclosure, Ownership Structure, Information Asymmetry and Cost of ...
PDF
IRJET- Financial Analysis using Data Mining
PDF
Applying Convolutional-GRU for Term Deposit Likelihood Prediction
PDF
Selecting Experts Using Data Quality Concepts
PDF
An Explanation Framework for Interpretable Credit Scoring
PDF
COMPARISON OF BANKRUPTCY PREDICTION MODELS WITH PUBLIC RECORDS AND FIRMOGRAPHICS
PDF
ICEB 2019 Presentation
PDF
Corporate bankruptcy prediction using Deep learning techniques
PDF
IRJET - Bankruptcy Score Indexing
PDF
Amr assignment goutam shit - roll 11
1505 Statistical Thinking course extract
Applying Information Economics
OpLossModels_A2015
Amcis2015 erf strategic_informationsystemsevaluationtrack_improvingenterprise...
Recursos TIC e Educação
Data mining in support of fraud management
APPLICATIONS OF DEEP LEARNING AND MACHINE LEARNING IN HEALTHCARE DOMAIN – A L...
Clustering Prediction Techniques in Defining and Predicting Customers Defecti...
Voluntary Disclosure, Ownership Structure, Information Asymmetry and Cost of ...
IRJET- Financial Analysis using Data Mining
Applying Convolutional-GRU for Term Deposit Likelihood Prediction
Selecting Experts Using Data Quality Concepts
An Explanation Framework for Interpretable Credit Scoring
COMPARISON OF BANKRUPTCY PREDICTION MODELS WITH PUBLIC RECORDS AND FIRMOGRAPHICS
ICEB 2019 Presentation
Corporate bankruptcy prediction using Deep learning techniques
IRJET - Bankruptcy Score Indexing
Amr assignment goutam shit - roll 11
Ad

Viewers also liked (8)

PDF
5.supply chain
PDF
4.a combined
DOCX
Ie mba#3
PDF
4.besp –
PDF
2.benchmarking efficiency
PDF
4.determining the
PDF
6.the interview
PDF
2.safety performance
5.supply chain
4.a combined
Ie mba#3
4.besp –
2.benchmarking efficiency
4.determining the
6.the interview
2.safety performance
Ad

Similar to 1.a fuzzy (20)

PDF
Chen, t., j. zhang and k.k. lai, 2009. an integrated real options evaluating ...
PDF
The Generic IS/IT Bussiness Value Category : Cases In Indonesia
PDF
A System Approach For Defining Data Center Value Proposition.pdf
PDF
00251740510626254
PDF
Analysis of Trends in Stock Market.pdf
PDF
3.roadmapping the
PDF
1569251281
PDF
Risk Return Analysis - IT infrastructure - Risk Management
DOCX
81119, 10(43 AMOriginality ReportPage 1 of 7httpsucum.docx
PDF
L017257987
PDF
Evaluating Total Cost of Ownership for University Enterprise Resource Plannin...
PDF
JUSTIFICATION OF, AND BENEFITS REALIZATION BEYOND IT INVESTMENTS: ANALYSIS F...
PDF
Data Mining Applications And Feature Scope Survey
PDF
“CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENT...
PDF
CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENTS...
PDF
Knowledge Management and Predictive Analytics in IT Project Risks
PPTX
Thesis presentation.pptx
DOCX
Adomavicius et al.Technology Trends in the IT LandscapeSP.docx
PDF
Multi-objective IT Project Selection Model for Improving SME Strategy Deploym...
PDF
Ciso organizational priorities to build a resilient bimodal it
Chen, t., j. zhang and k.k. lai, 2009. an integrated real options evaluating ...
The Generic IS/IT Bussiness Value Category : Cases In Indonesia
A System Approach For Defining Data Center Value Proposition.pdf
00251740510626254
Analysis of Trends in Stock Market.pdf
3.roadmapping the
1569251281
Risk Return Analysis - IT infrastructure - Risk Management
81119, 10(43 AMOriginality ReportPage 1 of 7httpsucum.docx
L017257987
Evaluating Total Cost of Ownership for University Enterprise Resource Plannin...
JUSTIFICATION OF, AND BENEFITS REALIZATION BEYOND IT INVESTMENTS: ANALYSIS F...
Data Mining Applications And Feature Scope Survey
“CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENT...
CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENTS...
Knowledge Management and Predictive Analytics in IT Project Risks
Thesis presentation.pptx
Adomavicius et al.Technology Trends in the IT LandscapeSP.docx
Multi-objective IT Project Selection Model for Improving SME Strategy Deploym...
Ciso organizational priorities to build a resilient bimodal it

More from libfsb (20)

PDF
Principles of food beverage and labor cost controls
PDF
Principles of food beverage and labor cost controls
PDF
Foodbeverage
PDF
Food and beverage_operations
PDF
Food safety basics a reference guide for foodservice operators
PDF
The bar & beverage book
PDF
The bar & beverage book
PDF
Introduction.to.management.in.the.hospitality.industry.10th.edition
PDF
Hotel front office management 3rd edition
PDF
4.the singularity
PDF
3.great profits
PDF
2.pleasing all
PDF
1.the recession,
PDF
9.greener library
PDF
8.moving on
PDF
7.let them
PDF
6.dealing with
PDF
5.the management
PDF
4.making the
PDF
2.free electronic
Principles of food beverage and labor cost controls
Principles of food beverage and labor cost controls
Foodbeverage
Food and beverage_operations
Food safety basics a reference guide for foodservice operators
The bar & beverage book
The bar & beverage book
Introduction.to.management.in.the.hospitality.industry.10th.edition
Hotel front office management 3rd edition
4.the singularity
3.great profits
2.pleasing all
1.the recession,
9.greener library
8.moving on
7.let them
6.dealing with
5.the management
4.making the
2.free electronic

1.a fuzzy

  • 1. The current issue and full text archive of this journal is available at www.emeraldinsight.com/1463-5771.htm BIJ 18,2 A fuzzy goal programming model for strategic information technology 172 investment assessment Faramak Zandi Industrial Engineering Department, Faculty of Technology and Engineering, Alzahra University, Tehran, Iran, and Madjid Tavana Management Department, Lindback Distinguished Chair of Information Systems, La Salle University, Philadelphia, Pennsylvania, USA Abstract Purpose – The high expenditures in information technology (IT) and the growing usage that penetrates the core of business have resulted in a need to effectively and efficiently evaluate strategic IT investments in organizations. The purpose of this paper is to propose a novel two-dimensional approach that determines the deferrable strategy with the most value by maximizing the real option values while minimizing the risks associated with each alternative strategy. Design/methodology/approach – In the proposed approach, first, the deferrable investment strategies are prioritized according to their values using real option analysis (ROA). Then, the risks associated with each investment strategy are quantified using the group fuzzy analytic hierarchy process. Finally, the values associated with the two dimensions are integrated to determine the deferrable IT investment strategy with the most value using a fuzzy preemptive goal programming model. Findings – Managers face the difficulty that most IT investment projects are inherently risky, especially in a rapidly changing business environment. The paper proposes a framework that can be used to evaluate IT investments based on the real option concept. This simple, intuitive, generic and comprehensive approach incorporates the linkage among economic value, real option value and IT investments that could lead to a better-structured decision process. Originality/value – In contrast to the traditional ROA literature, the approach contributes to the literature by incorporating a risk dimension parameter. The paper emphasizes the importance of categorizing risk management in IT investment projects since some risk cannot be eliminated. Keywords Fuzzy control, Information technology, Value analysis, Risk analysis, Analytical hierarchy process Paper type Research paper 1. Introduction Information technology (IT) investments represent the largest capital expenditure items for many organizations and have a tremendous impact on productivity by reducing costs, improving quality and increasing value to customers. As a result, many organizations Benchmarking: An International continue to invest large sums of money in IT in anticipation of a material return on their Journal investment (Willcocks and Lester, 1996). The selection of appropriate IT investments has Vol. 18 No. 2, 2011 pp. 172-196 q Emerald Group Publishing Limited 1463-5771 The authors would like to thank the anonymous reviewers and the Editor for their insightful DOI 10.1108/14635771111121667 comments and suggestions.
  • 2. been one of the most significant business challenges of the last decade. Powell (1992) Fuzzy goal has studied the similarities and differences between IT investments and other capital programming investments in organizations. He notes that IT investments are undertaken by organizations to gain competitive advantage, to improve productivity, to enable new ways model of managing and organizing and to develop new businesses. Appropriate strategic IT investments can help companies gain and sustain a competitive advantage (Melville et al., 2004). However, many large IT investment projects often do not meet original expectations 173 of cost, time or benefits. The rapid growth of IT investments has imposed tremendous pressure on management to take into consideration risks and payoffs promised by the investment in their decision making. A review of the current literature offers several IT investment evaluation methods that provide frameworks for the quantification of risks and benefits. The net present value (NPV) (Hayes and Abernathy, 1980; Kaplan and Atkinson, 1998), return on investment (Brealey and Myers, 1998; Farbey et al., 1993; Kumar, 2002; Luehrman, 1997), cost benefit analysis (Schniederjans et al., 2004), information economics (Bakos and Kemerer, 1992; Parker and Benson, 1989) and return on management (Chen et al., 2006; Stix and Reiner, 2004; Strassmann, 1997) are among most widely used methods to assess the risks and payoffs associated with IT investments. In addition to the above mentioned traditional quantitative approaches, there is a stream of research studies which emphasizes real option analysis (ROA). The ROA differs from the traditional methods in terms of priceability of the underlying investment project (McGrath, 1997). With the traditional methods, the underlying investment project of an option is priced as known (Black and Scholes, 1973) while in IT investment situations the price of an underlying investment is rarely known (McGrath, 1997). The ROA uses three basic types of data: (1) current and possible future investment options; (2) the desired capabilities sought by the organization; and (3) the relative risks and costs of other IT investment options that could be used. The method can help assess the risks associated with IT investment decisions by taking into consideration the changing nature of business strategies and organizational requirements. The real options are commonly valued with the Black-Scholes option pricing formula (Black and Scholes, 1973, 1974), the binomial option valuation method (Cox et al., 1979) and Monte-Carlo methods (Boyle, 1977). These methods assume that the underlying markets can be imitated accurately as a process. Although this assumption may hold for some quite efficiently traded financial securities, it may not hold for real investments that do not have existing markets (Collan et al., 2009). Recently, a simple novel approach to ROA called the Datar-Mathews method (Datar and Mathews, 2004, 2007; Mathews and Salmon, 2007) was proposed where the real option value is calculated from a pay-off distribution, derived from a probability distribution of the NPV for an investment project generated with a Monte-Carlo simulation. This approach does suffer from the market process assumptions associated with the Black-Scholes method (Black and Scholes, 1974). When valuating an investment using ROA, it is required to estimate several parameters (i.e. expected payoffs and costs or investment deferral time). However, the estimation of uncertain parameters in this valuation process is often very challenging. Most traditional methods use probability theory in their treatment of uncertainty.
  • 3. BIJ Fuzzy logic and fuzzy sets can represent ambiguous, uncertain or imprecise information 18,2 in ROA by formalizing inaccuracy in human decision making (Collan et al., 2009). For example, fuzzy sets allow for graduation of belonging in future cash-flow estimation (i.e. future cash flow at year 5 is about 5,000 dollars). Fuzzy set algebra developed by Zadeh (1965) is the formal body of theory that allows the treatment of imprecise estimates in uncertain environments. 174 In recent years, several researchers have combined fuzzy sets theory with ROA. ´ Carlsson and Fuller (2003) introduced a (heuristic) real option rule in a fuzzy setting, where the present values of expected cash flows and expected costs are estimated by trapezoidal fuzzy numbers. Chen et al. (2007) developed a comprehensive but simple methodology to evaluate IT investment in a nuclear power station based on fuzzy risk analysis and real option approach. Frode (2007) used the conceptual real option framework of Dixit and Pindyck (1994) to estimate the value of investment opportunities in the Norwegian hydropower industry. Villani (2008) combined two successful theories, namely real options and game theory, to value the investment opportunity and the value of flexibility as a real option while analyzing the competition with game theory. Collan et al. (2009) presented a new method for real option valuation using fuzzy numbers. Their method considered the dynamic nature of the profitability assessment, that is, the assessment changes when information changes. As cash flows taking place in the future come closer, information changes and uncertainty is reduced. Chrysafis and Papadopoulos (2009) presented an application of a new method of constructing fuzzy estimators for the parameters of a given probability distribution function using statistical data. Wang and Hwang (2007) developed a fuzzy research and development portfolio selection model to hedge against the environmental uncertainties. They applied fuzzy set theory to model uncertain and flexible project information. Since traditional project valuation methods often underestimate the risky project, a fuzzy compound-options model was used to evaluate the value of each project. Their portfolio selection problem was formulated as a fuzzy zero-one integer programming model that could handle both uncertain and flexible parameters and determine the optimal project portfolio. A new transformation method based on qualitative possibility theory was developed to convert the fuzzy portfolio selection model into a crisp mathematical model from the risk-averse perspective. The transformed model was solved by an optimization technique. We propose a novel two-dimensional approach that determines the deferrable strategy with the most value by maximizing the real option values while minimizing the risks associated with each alternative strategy. First, the deferrable investment strategies are prioritized according to their values using the ROA. Then, the risks associated with each investment strategy are quantified using the group fuzzy analytic hierarchy process (GFAHP). Finally, the values associated with the two dimensions are integrated to determine the deferrable IT investment strategy with the most value using a fuzzy preemptive goal programming model. The proposed framework: . addresses the gaps in the IT investment assessment literature on the effective and efficient evaluation of IT investment strategies; . provides a comprehensive and systematic framework that combines ROA with a group fuzzy approach to assess IT investment strategies; . considers fuzzy logic and fuzzy sets to represent ambiguous, uncertain or imprecise information; and
  • 4. . it uses a real-world case study to demonstrate the applicability of the proposed Fuzzy goal framework and exhibit the efficacy of the procedures and algorithms. programming This paper is organized into five sections. In Section 2, we illustrate the details of the model proposed framework followed by a case study in Section 3. In Section 4, we present discussion and practical perspectives and in Section 5, we conclude with our conclusions and future research directions. 175 2. The proposed framework The mathematical notations and definitions used in our model are presented in the Appendix. The framework shown in Figure 1 is proposed to assess alternative IT investment strategies. The framework consists of several steps modularized into five phases. Phase 1: establishment of the IT investment board We institute a strategic IT investment board to acquire pertinent investment information. Executive management is typically responsible for creating the board, specifying its responsibilities and defining its resources. Let us assume that l strategic IT investment board members are selected to participate in the evaluation process: ITIB ¼ ½ðITIBÞ1 ; ðITIBÞ2 ; . . . ; ðITIBÞk ; . . . ; ðITIBÞl Š Phase 2: identification of the IT investment strategies Next, the strategic IT investment board identifies a set of alternative deferrable IT investment strategies. Let us assume that n alternative IT investments with the maximum deferral time of Tm are under consideration: a ¼ ½a1 ; a2 ; . . . ; ai ; . . .an Š Phase 3: prioritization of the IT investment strategies: real option considerations In this phase, the real options equations suggested by Dos Santos (1994) are used to prioritize IT investments strategies. This phase is divided into the following three steps. Step 3.1: construction of the individual real option matrices. The following individual real option matrices are given by each strategic IT investment board member: ~ BðT 1 Þ ~ ~ ~ ~ BðT 2 Þ . . . BðT m Þ CðT 1 Þ CðT 2 Þ . . . CðT m Þ ~ 2 3 a1 ~k ~K ~k B1 ðT 1 Þ B1 ðT 2 Þ . . . B1 ðT m Þ ~k ~k ~k C1 ðT 1 Þ C1 ðT 2 Þ . . . C1 ðT m Þ 6 7 6 ~k ~k ~k ~k ~k ~k 7 ~ k ¼ a2 6 B2 ðT 1 Þ B2 ðT 2 Þ . . . B2 ðT m Þ C2 ðT 1 Þ C2 ðT 2 Þ . . . C2 ðT m Þ 7 ARO1 6 7 . 6 . . 6 . . . . . . 7 ð1Þ . 6 . . . . . . 7 . ... . . . ... . 7 4 k 5 k an B ðT Þ BK ðT Þ . . . BK ðT Þ C ðT Þ C k ðT Þ . . . C k ðT Þ ~ ~ 1 2 m m 2 m n n n n n n For k ¼ 1; 2; . . . ; l: Fuzzy numbers are often represented by triangular or trapezoidal fuzzy sets. In this study, we use trapezoidal fuzzy sets. A major advantage of trapezoidal fuzzy numbers is
  • 5. BIJ Phase 1 18,2 Establishment of the IT investment board Phase 2 Identification of the IT investment strategies 176 Phase 3 Prioritization of the IT investment strategies: real option considerations Step 3.1 Construction of the individual real option matrices Step 3.2 Construction of the weighted collective real option matrix Step 3.3 Computation of the vector of the real option value for the IT investment strategies Phase 4 Prioritization of the IT investment strategies: risk considerations Step 4.1 Identification of the criteria and sub-criteria for the GFAHP model Step 4.2 Construction of the individual fuzzy pairwise comparison matrices Step 4.3 Construction of the weighted collective fuzzy pairwise comparison matrix Step 4.4 Computation of the vector of the risk value for the IT investment strategies Phase 5 Development of the strategic IT investment plan Step 5.1 Determination of the goal and priority levels Step 5.2 Computation of the goal values Step 5.3 Construction of the proposed goal Figure 1. programming model The proposed framework
  • 6. that many operations based on the max-min convolution can be replaced by direct Fuzzy goal arithmetic operations (Dubois and Prade, 1988). The following trapezoidal fuzzy numbers are used for the individual fuzzy present values of the expected cash flows and the cost of programming the ith IT investment at time Tj by strategic IT investment board member (ITIB)k: model b o a g ~ k ðT j Þ ¼ Bk ðT j Þ ; Bk ðT j Þ ; Bk ðT j Þ ; Bk ðT j Þ Bi i i i i o a b g 177 ~k Ci ¼ C k ðT j Þ ; C k ðT j Þ ; C k ðT j Þ ; C k ðT j Þ ð2Þ i i i i For j ¼ 1; 2; . . . ; m: That is, we have the following intervals: j o k a Bk ðT j Þ ; Bk ðT j Þ i i the most possible values for the expected cash flows of the ith IT investment at time Tj evaluated by strategic IT investment board member (ITIB)k. o g k k Bi ðT j Þ þ Bi ðT j Þ the upward potential for the expected cash flows of the ith IT investment at time Tj evaluated by strategic IT b investment board member (ITIB)k. o Bk ðT j Þ 2 Bk ðT j Þ i i the downward potential for the expected cash flows of the ith IT investment at time Tj evaluated by strategic IT investment board member (ITIB)k. j o k a k k C i ðT j Þ ; C i ðT j Þ the most possible values of the expected cost of the ith IT investment at time Tj evaluated by strategic IT investment board member (ITIB)k. o g k k C i ðT j Þ þ C i ðT j Þ the upward potential for the expected cost of the ith IT investment at time Tj evaluated by strategic IT b investment board member (ITIB)k. o C k ðT j Þ 2 C k ðT j Þ i i the downward potential for the expected cash flows of the ith IT investment at time Tj evaluated by strategic IT investment board member (ITIB)k. Consequently, substituting equation (2) into matrix (1), the individual real option matrices can be rewritten as: ~ BðT i Þ ~ CðT i Þ 2 o a b g o a b g 3 6 Bk ðT i Þ ; Bk ðT i Þ ; Bk ðT i Þ ; Bk ðT i Þ 1 1 1 1 C k ðT i Þ ; C k ðT i Þ ; C k ðT i Þ ; C k ðT i Þ 1 1 1 1 7 a1 6 7 6 6 o a b g o a b g 7 7 k k k k 6 B2 ðT i Þ ; B2 ðT i Þ ; B2 ðT i Þ ; B2 ðT i Þ k k k k 7 6 C 2 ðT i Þ ; C 2 ðT i Þ ; C 2 ðT i Þ ; C 2 ðT i Þ 7 ~k ARO1 ðT i Þ ¼ a2 6 7 6 7 . 6 . . . . 7 . . 6 . . 7 6 7 6 o a b g 7 an 4 Bk ðT Þ o ; Bk ðT Þ a ; Bk ðT Þ b ; Bk ðT Þ g k k k k C n ðT i Þ ; C n ðT i Þ ; C n ðT i Þ ; C n ðT i Þ 5 n i n i n i n i ð3Þ
  • 7. BIJ Step 3.2: construction of the weighted collective real option matrix. This framework allows for assigning different voting power weights given to each investment board 18,2 member: W ðvpÞ ¼ ½wðvpÞ1 ; wðvpÞ2 ; . . . ; wðvpÞj ; . . . ; wðvpÞl Š ð4Þ Therefore, in order to form a fuzzy weighted collective real option matrix, the individual 178 fuzzy real option matrices will be aggregated by the voting powers as follows: ~ BðT i Þ ~ CðT i Þ 2 3 a1 ~ B1 ðT i Þ ~ C1 ðT i Þ 6~ ~ 7 6 B2 ðT i Þ C2 ðT i Þ 7 ARO2 ðT i Þ ¼ a2 ~ 6 7 ð5Þ . 6 . . 7 . 6 . . 7 . 6 . . 7 4 5 an ~ Bn ðT i Þ ~ n ðT i Þ C where: Pl ~k k¼1 ðwðvpÞk Þ Bi ðT i Þ ~ Bi ðT i Þ ¼ Pl ð6Þ k¼1 wðvpÞk Pl ~k k¼1 ðwðvpÞk Þ Ci ðT i Þ ~ Ci ðT i Þ ¼ Pl ð7Þ k¼1 wðvpÞk Step 3.3: Computation of the vector of the real option value for the IT investment strategies. The real option values of the investment strategies at times T 1 ; T 2 ; . . . ; T m can be determined by the following fuzzy real option value matrix: T1 T2 ... Tm 2 3 a1 FROV 1 ðT 1 Þ FROV 1 ðT 2 Þ ... FROV 1 ðT m Þ 6 7 6 FROV 2 ðT 1 Þ FROV 2 ðT 2 Þ ... FROV 2 T m 7 AFROV ¼ a2 6 ~ 7 ð8Þ . 6 . 6 . . . . . . 7 7 . 6 . . ... . 7 4 5 a4 FROV n ðT 1 Þ FROV n ðT 2 Þ ... FROV n T m or: 2 3 2 3 ~ ~ a1 B1 ðT i Þ·e 2dT i ·N ðD11 ðT i ÞÞ2 C1 ðT i Þ·e 2rT i ·NðD21 ðT i ÞÞ FROV 1 ðT i Þ 6~ ~ 7 6 7 a2 6 B2 ðT i Þ·e 2dT i ·N ðD12 ðT i ÞÞ2 C2 ðT i Þ·e 2rT i ·NðD22 ðT i ÞÞ 7 6 FROV 2 ðT i Þ 7 6 7 6 7 AFROV ðT i Þ ¼ . 6 ~ . 7¼6 . 7 ð9Þ .6 .6 . . 7 6 7 6 . . 7 7 4 5 4 5 ~ ~ a4 Bn ðT i Þ·e 2dT i ·N ðD1n ðT i ÞÞ2 Cn ðT i Þ·e 2rT i ·NðD2n ðT i ÞÞ FROV n ðT i Þ
  • 8. where the IT investment strategy ith cumulative normal probabilities for the D1and D2 Fuzzy goal are as follows: programming NðD1 ðT i ÞÞ N ðD2 ðT i ÞÞ model 2 3 a1 N ðD11 ðT i ÞÞ N ðD21 ðT i ÞÞ 6 7 6 N ðD12 ðT i ÞÞ ARO3 ðT i Þ ¼ a2 6 N ðD22 ðT i ÞÞ 7 7 ð10Þ 179 . 6 . 6 . . . . 7 7 . 6 . . 7 4 5 an N ðD1n ðT i ÞÞ N ðD2n ðT i ÞÞ D1 ðT i Þ D2 ðT i Þ 2 3 a1 D11 ðT i Þ D21 ðT i Þ 6 7 6 D ðT Þ D22 ðT i Þ 7 ARO4 ðTÞ ¼ a2 6 12 i 7 ð11Þ . 6 . 6 . . . . 7 7 . 6 . . 7 4 5 an D1n ðT i Þ D2n ðT i Þ or equivalently: D1 ðT i Þ D2 ðT i Þ a1 2 3 ~ ~ LnðEðB1 ðT i ÞÞ=EðC1 ðT i ÞÞÞþð ðr 1 2d1 þs2 ðT i ÞÞ=2Þ · T i ~ LnðEðB1 ðT i ÞÞ=EðC1 ðT i ÞÞÞþð ðr1 2d1 2s2 ðT i ÞÞ=2Þ · T i ~ pffiffiffiffi 1 pffiffiffiffi 1 6 s1 ðT i Þ T i s2 ðT i Þ Ti 7 6 1 7 a2 6 LnðEðB2 ðT i ÞÞ=EðC2 ðT i ÞÞÞþð ðr2 2d2 þs2 ðT i ÞÞ=2Þ · T i 6 ~ ~ ~ LnðEðB2 ðT i ÞÞ=EðC2 ðT i ÞÞÞþð ðr2 2d2 2s2 ðT i ÞÞ=2Þ · T i ~ 7 7 6 pffiffiffiffi 2 pffiffiffi 2 7 ARO4 ðT i Þ ¼ 6 s2 ðT i Þ T i s2 ðT i Þ T 7 6 7 . 6 . 6 . . . . 7 7 . 6 . . 7 6 LnðEðB ðT ÞÞ=EðC ðT ÞÞÞþ r 2d þs2 ðT Þ =2 · T ~n ~ 7 4 ~n i i ð ðffiffiffiffi n n i Þ Þ i pn LnðEðBn ðT i ÞÞ=EðCn ðT i ÞÞÞþð ðr n 2dn 2s2 ðT i ÞÞ=2Þ · T i 5 ~ pffiffiffiffi n an sn ðT i Þ T i sn ðT i Þ T i ð12Þ 2 where E and s denote the possibilistic mean value and possibilistic variance operators as follows: ~ EðBðT i ÞÞ ~ EðCðT i ÞÞ s 2 ðT i Þ 2 3 a1 ~ EðB1 ðT i ÞÞ ~ EðC1 ðT i ÞÞ s2 ðT i Þ 1 6 7 6 EðB ðT ÞÞ ~ s2 ðT i Þ 7 ARO5 ðT i Þ ¼ a2 6 ~2 i EðC2 ðT i ÞÞ 2 7 ð13Þ 6 7 . . 6 . . . 7 . 6 . . . . . 7 . 7 6 4 5 ~ an EðBn ðT i ÞÞ ~ EðCn ðT i ÞÞ s2 ðT i Þ n
  • 9. ˜ ˜ BIJ Since Bi and Ci are trapezoidal fuzzy numbers, we use the formulas proposed by ´ Carlsson and Fuller (2003) to find their expected value and the variance: 18,2 ~ ðBðT j ÞÞo þ ðBðT j ÞÞa ðBðT j ÞÞg 2 ðBðT j ÞÞb EðBi ðT j ÞÞ ¼ þ 2 6 o a ~ ðCðT j ÞÞ þ ðCðT j ÞÞ ðCðT j ÞÞ 2 ðCðT j ÞÞb g 180 EðCi ðT j ÞÞ ¼ þ 2 6 ððBðT j ÞÞa 2 ðBðT j ÞÞo Þ2 ððBðT j ÞÞa 2 ðBðT j ÞÞo ÞððBðT j ÞÞb þ ðBðT j ÞÞg Þ s2 ðT j Þ ¼ i þ 4 6 ððBðT j ÞÞb þ ðBðT j ÞÞg Þ2 þ 24 ð14Þ Phase 4: prioritization of the IT investment strategies: risk considerations In this phase, the strategic IT investment board identifies the evaluation criteria and sub-criteria and uses GFAHP to measure the risk for each criterion and sub-criterion associated with the investment projects. This phase is divided into the following four steps. Step 4.1: identification of the criteria and sub-criteria for the GFAHP model. In this step, the strategic IT investment board will determine a list of the criteria and sub-criteria for the GFAHP model. Let c1 ; c2 ; . . . ; cp and sc1 ; sc2 ; . . . ; scq be the criteria and sub-criteria, respectively. Step 4.2: construction of the individual fuzzy pairwise comparison matrices. The hierarchal structure for ranking the IT Investments strategies in the risk dimension consists of four levels. The top level consists of a single element and each element of a given level dominates or covers some or all of the elements in the level immediately below. At the second level, the individual fuzzy pairwise comparison matrix of the p criteria of IT investment risk evaluated by strategic IT investment board member (ITIB)k will be as follows: c1 c2 . . . cp 2 k 3 ~ ~k ~k c1 6 b11 b12 . . . b1p 7 2 k 6 7 c 6 ~k ~k ~k 7 AR ¼ 2 6 b21 b22 . . . b2p 7 ~ ð15Þ . 6 . . 6 . . 7 . 7 . 6 . . ... . 7 . . 7 6 4 k cp b k k 5 ~ ~ b ... b~ p1 p2 pp Let the individual fuzzy comparison qualification between criteria i and j evaluated by strategic IT investment board member (ITIB)k be the following trapezoidal fuzzy numbers: o a b g ~k ¼ bij bk ; bk ; bk ; bk ð16Þ ij ij ij ij
  • 10. Consequently, substituting equation (18) into matrix (17), the individual fuzzy Fuzzy goal comparison qualification between criteria i and j evaluated by strategic IT investment board member (ITIB)k can be rewritten as: programming model C1 c2 ... Cp c1 2 3 ððbk Þo ;ðbk Þa ;ðbk Þb ;ðbk Þg Þ ððbk Þo ;ðbk Þa ;ðbk Þb ;ðbk Þg Þ 11 11 11 11 12 12 12 12 ... ððbk Þo ;ðbk Þa ;ðbk Þb ;ðbk Þg Þ 1p 1p 1p 1p 2 k 6 c2 6 ððbk Þo ;ðbk Þa ;ðbk Þb ;ðbk Þg Þ ððbk Þo ;ðbk Þa ;ðbk Þb ;ðbk Þg Þ 7 ... ððbk Þo ;ðbk Þa ;ðbk Þb ;ðbk Þg Þ 7 181 ðAR Þ ¼ 6 21 ~ 6 21 21 21 22 22 22 22 2p 2p 2p 2p 7 7 .6 . .6 . . . . . . 7 7 6 . . ... . 7 4 5 cp ððbk Þo ;ðbk Þa ;ðbk Þb ;ðbk Þg Þ ððbk Þo ;ðbk Þa ;ðbk Þb ;ðbk Þg Þ k o k a k b k g ... ððbpp Þ ;ðbpp Þ ;ðbpp Þ ;ðbpp Þ Þ p1 p1 p1 p1 p2 p2 p2 p2 ð17Þ At the third level, the individual fuzzy pairwise comparison matrix of IT investment risk sub-criteria with respect to p IT investment risk criteria evaluated by strategic IT investment board member (ITIB)k will be as follows: sc1 sc2 ... scq 2 k k k 3 d~ ~ d12 ... ~ d1q sc1 6 11 P k P P 7 3 k 6 k 7 ~ sc 6 d ~ ~ d22 ... ~k d2q 7 AR ¼ 2 6 21 P 7 ð18Þ . 6 P P7 . . 6 . . . 7 6 . . . 7 6 . k. ... k. 7 scq 4 ~k ~ ~ 5 dq1 dq2 ... dqq P P P The individual fuzzy comparison qualification between sub-criterions i with sub-criterion j with respect to criterion p evaluated by strategic IT investment board member (ITIB)k are the following trapezoidal fuzzy numbers: k o a b g dij ¼ dk ; dk ; d k ; d k ~ ij ij ij ij ð19Þ p p Therefore, we have: sc1 sc2 ... scq sc1 2 3 ððdk Þo ;ðdk Þa ;ðdk Þb ;ðdk Þg Þp ððd k Þo ;ðdk Þa ;ðd k Þb ;ðd k Þg Þp 11 11 11 11 12 12 12 12 ... ððdk Þo ;ðd k Þa ;ðdk Þb ;ðdk Þg Þp 1q 1q 1q 1q 6 7 6 ððdk Þo ;ðdk Þa ;ðdk Þb ;ðdk Þg Þ ððd k Þo ;ðdk Þa ;ðd k Þb ;ðd k Þg Þ ... ððd k Þo ;ðd k Þa ;ðdk Þb ;ðdk Þg Þ 7 6 21 21 21 21 p 22 22 22 22 p 2q 2q 2q 2q 7 ~3 sc 6 7 ðAR Þk ¼ 2 6 . . . 7 . 66 . . . 7 . . 4 . . ... . 7 5 ððdq1 Þ ;ðdq1 Þ ;ðdq1 Þ ;ðdq1 Þ Þp ððdq2 Þ ;ðdq2 Þ ;ðd k Þb ;ðd k Þg Þp k o k a k b k g k o k a q2 q2 ... ððd k Þo ;ðd k Þa ;ðdk Þb ;ðdk Þg Þp qq qq qq qq scq ð20Þ At the fourth level, the individual fuzzy pairwise comparison matrix of n IT investment strategies with respect to q IT investment risk sub-criteria evaluated by strategic IT investment board member (ITIB)k will be as follows:
  • 11. BIJ a1 a2 ... an 18,2 2À k Á À Á À Á 3 r ~ ~k r12 ... ~k r1n a1 6 11 q q 7 q 4 k 6À k Á À k Á À Á 7 ~ a2 6 r21 q 6 ~ r22 ~ q ... ~k 7 r2n q 7 AR ¼ 6 7 ð21Þ 182 . 6 . . 6 . . . 7 . 6 . . . ... . 7 . 7 6 7 4À k Á À Á À kÁ 5 an rn1 q ~ ~k rn2 q ... rnn q ~ The individual fuzzy comparison qualification between IT investment strategies i with IT investment strategy j with respect to sub-criterion q evaluated by strategic IT investment board member (ITIB)k are the following trapezoidal fuzzy numbers: o a b g ~k k k k k rij ¼ r ij ; r ij ; r ij ; r ij ð22Þ q q or equivalently: a1 a2 ... an a1 2 3 ððr 11 Þo ;ðr11 Þa ;ðr11 Þb ;ðr 11 Þg Þq ððr 12 Þo ;ðr12 Þa ;ðr 12 Þb ;ðr 12 Þg Þq ... ððr 1n Þo ;ðr 1n Þa ;ðr1n Þb ;ðr 1n Þg Þq k k k k k k k k k k k k 6 7 6 ððr k Þo ;ðr k Þa ;ðr k Þb ;ðr k Þg Þ ððr k Þo ;ðr k Þa ;ðr k Þb ;ðr k Þg Þ ... ððr k Þo ;ðr k Þa ;ðr k Þb ;ðr k Þg Þ 7 ðAR Þ k ¼ a2 6 21 ~4 6 21 21 21 q 22 22 22 22 q 2n 2n 2n 2n q7 7 6 7 . 6 . 6 . . . . . . 7 . 6 . . ... . 7 7 4 5 k o k a k b k g k o k a k b k g k o k a k b k g an ððr n1 Þ ;ðr n1 Þ ;ðrn1 Þ ;ðrn1 Þ Þq ððrn2 Þ ;ðrn2 Þ ;ðr n2 Þ ;ðrn2 Þ Þq ... ððrnn Þ ;ðrnn Þ ;ðrnn Þ ;ðrnn Þ Þq ð23Þ Step 4.3: construction of the weighted collective fuzzy pairwise comparison matrix. At the second level, the fuzzy weighted collective pairwise comparison matrix of p IT investment risk criteria will be as follows: c1 c2 ... cp c1 2 3 ððb11 Þo ;ðb11 Þa ;ðb11 Þb ;ðb11 Þg Þ ððb12 Þo ;ðb12 Þa ;ðb12 Þb ;ðb12 Þg Þ ... ððb1p Þo ;ðb1p Þa ;ðb1p Þb ;ðb1p Þg Þ 6 7 6 ððb Þo ;ðb Þa ;ðb Þb ;ðb Þg Þ ððb Þo ;ðb Þa ;ðb Þb ;ðb Þg Þ ... ððb Þo ;ðb Þa ;ðb Þb ;ðb Þg Þ 7 6 21 21 21 21 22 22 22 22 2p 2p 2p 2p 7 6 7 ~2 c AR ¼ 2 6 7 6 . . . . . . 7 .6 .6 . . ... . 7 7 .4 5 ððbp1 Þo ;ðbp1 Þa ;ðbp1 Þb ;ðbp1 Þg Þ ððbp2 Þo ;ðbp2 Þa ;ðbp2 Þb ;ðbp2 Þg Þ ... ððbpp Þo ;ðbpp Þa ;ðbpp Þb ;ðbpp Þg Þ cp ð24Þ
  • 12. or: Fuzzy goal c1 c2 . . . cp programming 2~ ~ ~ 3 model c1 b11 b12 ... b1p 6~ ~ ~ 7 ~2 c 6 b21 b22 ... b2p 7 AR ¼ 2 6 7 ð25Þ 6 . . 7 . . 6 . 6 . . . . 7 183 . . ... . 7 4 5 cp ~ bp1 ~ bp2 ... ~ bpp where: Pl k ! ~ k¼1 ðwðvpÞk Þ bij j ~ ðbij Þj ¼ Pl ð26Þ k¼1 wðvpÞk At the third level, the fuzzy weighted collective pairwise comparison matrix of the IT investment risk sub-criteria with respect to the p IT investment risk criteria will be as follows: sc1 sc2 ... scq 2 o a b g o a b g 3 sc1 ððd 11 Þ ; ðd 11 Þ ; ðd 11 Þ ; ðd 11 Þ Þp ððd 12 Þ ; ðd 12 Þ ; ðd12 Þ ; ðd 12 Þ Þp ... ððd 1q Þ ; ðd 1q Þa ; ðd 1q Þb ; ðd 1q Þg Þp o 6 7 ~3 sc 6 ððd 21 Þo ; ðd 21 Þa ; ðd 21 Þb ; ðd 21 Þg Þp ððd 22 Þo ; ðd 22 Þa ; ðd22 Þb ; ðd 22 Þg Þp ... ððd 2q Þo ; ðd 2q Þa ; ðd 2q Þb ; ðd 2q Þg Þ 7 AR ¼ 2 6 7 . 6 . . . 7 . 6 . . . 7 . 6 . . ... . 7 4 5 scq ððd q1 Þ ; ðd q1 Þ ; ðd q1 Þb ; ðd q1 Þg Þp o a ððd q2 Þo ; ðd q2 Þa ; ðdq2 Þb ; ðd q2 Þg Þp ... o a b ððd qq Þ ; ðd qq Þ ; ðd qq Þ ; ðd qq Þ Þpg ð27Þ or: sc1 sc2 ... scq 2 ~ ~ ~ 3 sc1 ðd11 ÞP ðd12 ÞP ... ðd1q ÞP 6 ~ ~ ~ 7 ~3 sc 6 ðd21 ÞP ðd22 ÞP ... ðd2q ÞP 7 AR ¼ 2 6 7 ð28Þ . 6 . . . 7 . 6 . . . 7 . 6 . . ... . 7 4 5 scq ~ ðdq1 ÞP ~ ðdq2 ÞP ... ~ ðdqq ÞP where: Pl k ! ~ ðwðvpÞk Þ dij k¼1 p ~ ðdij Þj ¼ Pl ð29Þ k¼1 wðvpÞk At the fourth level, the fuzzy weighted collective pairwise comparison matrix of the n IT investment strategies with respect to the q IT investment risk sub-criteria will be as follows:
  • 13. BIJ a1 a1 a2 ... an 2 3 18,2 ððr 11 Þ ;ðr 11 Þ ;ðr 11 Þ ;ðr 11 Þ Þq ððr 12 Þ ;ðr 12 Þ ;ðr12 Þ ;ðr 12 Þ Þq ... ððr 1n Þ ;ðr 1n Þ ;ðr 1n Þb ;ðr1n Þg Þq o a b g o a b g o a 6 7 6 ððr 21 Þo ;ðr 21 Þa ;ðr 21 Þb ;ðr 21 Þg Þq ððr 22 Þo ;ðr 22 Þa ;ðr22 Þb ;ðr 22 Þg Þq ... ððr 2n Þo ;ðr 2n Þa ;ðr 2n Þb ;ðr2n Þg Þq 7 AR ¼ a2 6 ~4 7 6 . 6 . . . 7 . 6 . . . 7 . . . ... . 7 4 5 184 o a b g o a b g o a an ððr n1 Þ ;ðr n1 Þ ;ðr n1 Þ ;ðrn1 Þ Þq ððr n2 Þ ;ðr n2 Þ ;ðrn2 Þ ;ðrn2 Þ Þq ... ððr nn Þ ;ðrnn Þ ;ðr nn Þ ;ðr nn Þ Þq b g ð30Þ or: a1 a2 ... an 2 3 a1 ð~11 Þq r ð~12 Þq r ... ð~1n Þq r 6 7 6 ð~21 Þq r ð~22 Þq r ... ð~2n Þq 7 r A 4 ¼ a2 6 ~ 7 ð31Þ 6 . . 6 . . . 7 . 6 . . . . ... . 7 . 7 4 5 an ð~n1 Þq r ð~n2 Þq r ... ð~nn Þq r where: Pl k¼1 ðwðvpÞk Þ rk ~ij rij ¼ ~ Pl ð32Þ k¼1 wðvpÞk Step 4.4: computation of the vector of the risk value for the IT investment strategies. The fuzzy composite vector of the deferrable IT investment strategies at the fourth level will be calculated based on the corresponding eigenvectors: ~ ~ ~2 FRV ¼ A 4 · A 3 · W R ¼ ½ FRV 1 FRV 2 ... FRV n ŠT ð33Þ or: FRV ¼ ½ððFRV Þo ; ðFRV Þa ; ðFRV Þb ; ðFRV Þg ÞR1 ððFRV Þo ; ðFRV Þa ; ðFRV Þb ; ðFRV Þg ÞR2 . . . ððFRV Þo ; ðFRV Þa ; ðFRV Þb ; ðFRV Þg ÞRn ÞŠT ð34Þ where: ~ ~4 A4 ¼ b W R 1 ~4 W R2 ... ~4 W Rq c ð35Þ ~ ~3 A 3 ¼ b W R1 ~3 W R2 ... ~3 W Rp c ð36Þ h ~2 AR · e ~2 W R ¼ Lim 2 h h!1 ð37Þ ~ e T · AR · e
  • 14. h ~3 AR · e Fuzzy goal ~3 W Rp ¼ Lim 3 h h!1 ð38Þ programming eT · A~ ·e R model 4 h ~ AR · e ~4 W Rq ¼ Lim 4 h h!1 ð39Þ ~ 185 e T · AR · e e ¼ ð1 1 . . . 1 ÞT ð40Þ Phase 5: development of the strategic IT investment plan Decision makers also must consider the interaction between the real option and the investment risks. Therefore, in this phase, the IT investment strategy with the most value is determined in terms of real option and risk values in Phases 2 and 3. For this purpose, they are considered as the coefficients of the objective functions in the following fuzzy preemptive goal programming model with a series of applicable constraints. This phase is divided into the following three steps. Step 5.1: determination of the goal and priority levels. The goals in the fuzzy preemptive goal programming model can be written as follows: For the first priority level, there are two goals. These goals are equally important so they can have the same weight: Max Z 1 ¼ E½FROV 1 ðT 1 ÞŠ · x11 þ E½FROV 1 ðT 2 ÞŠ · x12 þ · · · þ E½FROV 1 ðT m ÞŠ · x1m þ E½FROV 2 ðT 1 ÞŠ · x21 þ E½FROV 2 ðT 2 ÞŠ · x22 þ · · · þ E½FROV 2 ðT m ÞŠ · x2m þ . . . E½FROV n ðT 1 ÞŠ · xn1 þ E½FROV n ðT 2 ÞŠ · xn2 þ · · · þ E½FROV n ðT m ÞŠ · xnm Min Z 2 ¼ EðFRV 1 Þ · ðx11 þ x12 þ · · · þ x1m Þ þ EðFRV 2 Þ · ðx21 þ x22 þ · · · þ x2m Þþ · · · þ EðFRV n Þ · ðxn1 þ xn2 þ · · · þ xnm Þ For the second priority level, we have: f 1 ðx11 ; x12 ; . . . ; xnm Þ # 0 f 2 ðx11 ; x12 ; . . . ; xnm Þ # 0 . . . f r ðx11 ; x12 ; . . . ; xnm Þ # 0 xi ¼ 0; 1 ði ¼ 1; 2; . . . ; nÞ
  • 15. BIJ Max Z 1 ¼ E½FROV 1 ðT 1 ÞŠ · x11 þ E½FROV 1 ðT 2 ÞŠ · x12 þ · · · þ E½FROV 1 ðT m ÞŠ · x1m þ 18,2 E½FROV 2 ðT 1 ÞŠ · x21 þ E½FROV 2 ðT 2 ÞŠ · x22 þ · · · þ E½FROV 2 ðT m ÞŠ · x2m þ . . . E½FROV n ðT 1 ÞŠ · xn1 þ E½FROV n ðT 2 ÞŠ · xn2 þ · · · þ E½FROV n ðT m ÞŠ · xnm 186 Min Z 2 ¼ EðFRV 1 Þ · ðx11 þ x12 þ · · · þ x1m Þ þ EðFRV 2 Þ · ðx21 þ x22 þ · · · þ x2m Þ þ · · · þ EðFRV n Þ · ðxn1 þ xn2 þ · · · þ xnm Þ Subject to: (Model P) x11 þ x12 þ · · · þ x1m # 1 x21 þ x22 þ · · · þ x2m # 1 . . . xn1 þ xn2 þ · · · þ xnm # 1 f 1 ðx11 ; x12 ; . . . ; xnm Þ # 0 f 2 ðx11 ; x12 ; . . . ; xnm Þ # 0 . . . f r ðx11 ; x12 ; . . . ; xnm Þ # 0 xij ¼ 0; 1 ði ¼ 1; 2; . . . ; n; j ¼ 1; 2; . . . ; mÞ where f i ðx1 ; x2 ; . . . ; xn Þ are given functions of the n investments. Step 5.2: computation of the goal values. In this step, instead of trying to optimize each objective function, the strategic IT investment board will specify a realistic goal or target value that is the most desirable value for that function. Step 5.3: construction of the proposed goal programming model. The first objective function is to be maximized and the second objective function is to be minimized. Therefore, the proposed fuzzy goal programming model for the above two-objective strategic IT investment decision will be the following single-objective model: À Á Min D ¼ P 1 sþ þ s2 þ P 2 s2 þ · · · þ P rþ2 s2 1 2 3 r Subject to: (Model F) E½FROV 1 ðT 1 ÞŠ · x11 þ E½FROV 1 ðT 2 ÞŠ · x12 þ · · · þ E½FROV 1 ðT m ÞŠ · x1m þ E½FROV 2 ðT 1 ÞŠ · x21 þ E½FROV 2 ðT 2 ÞŠ · x22 þ · · · þ E½FROV 2 ðT m ÞŠ · x2m þ . . . E½FROV n ðT 1 ÞŠ · xn1 þ E½FROV n ðT 2 ÞŠ · xn2 þ · · · þ E½FROV n ðT m ÞŠ · xnm S2 2 Sþ ¼ l1 1 1
  • 16. EðFRV 1 Þ · ðx11 þ x12 þ · · · þ x1m Þ þ EðFRV 2 Þ · ðx21 þ x22 þ Fuzzy goal · · · þ x2m Þ þ · · · þ EðFRV n Þ · ðxn1 þ xn2 þ · · · þ xnm Þ þ s2 2 sþ ¼ u1 2 2 programming f 1 ðx11 ; x12 ; . . . ; xnm Þ þ sþ þ sþ ¼ 0 model 3 3 f 2 ðx11 ; x12 ; . . . ; xnm Þ þ sþ þ s2 ¼ 0 4 4 . . . 187 f r ðx11 ; x12 ; . . . ; xnm Þ þ sþ þ s2 ¼ 0 rþ2 rþ2 x11 þ x12 þ · · · þ x1m # 1 x21 þ x22 þ · · · þ x2m # 1 . . . xn1 þ xn2 þ · · · þ xnm # 1 xij ¼ 0; 1 ði ¼ 1; 2; . . . ; n; j ¼ 1; 2; . . . ; mÞ sþ ; s2 h h $0 ðh ¼ 1; 2; . . . ; r þ 2Þ sþ · s2 ¼ 0 h h The optimal solution for model (F) is the deferrable IT investment strategy with the most values at the time Ti. Next, we present a numerical example to demonstrate the implementation process of this framework. 3. Case study We implemented the proposed model at Mornet[1], a large mortgage company in the city of Philadelphia with an urgent need to select an optimal IT investment strategy for their deferrable investment opportunities. In Phase 1, the chief executive officer instituted a committee of four strategic IT investment board members, including: (ITIB)1. The chief operating officer. (ITIB)2. The chief information officer. (ITIB)3. The heads of the business unit. (ITIB)4. The chief financial officer. In Phase 2, the investment board identifies five different types of deferrable investment opportunities with the following characteristics (Table I) as suggested by Carlsson et al. (2007): a1. Project 1 has a large negative estimated NPV (due to huge uncertainties) and can be deferred up to two years (v(FNPV) , 0, T ¼ 2). a2. Project 2 includes positive NPV with low risks and has no deferral flexibility (v(FNPV) . 0, T ¼ 0).
  • 17. BIJ a3. Project 3 has revenues with large upward potentials and managerial flexibility, 18,2 but its “reserve costs” (c) are very high. a4. Project 4 requires a large capital expenditure once it has been undertaken and has a deferral flexibility of a maximum of one year. a5. Project 5 represents a small flexible project with low revenues, but it opens the 188 possibility of further projects that are much more profitable. In Phase 3, the fuzzy real option values of the five different deferrable investment opportunities shown in Figure 2 were determined for years 1 and 2. In Phase 4, the strategic IT investment board determined the GFAHP three criteria of firm-specific risks, development risks and external environment risks as suggested by Benaroch (2002). The firm-specific risks were further divided into four sub-criteria: organizational risks, user risks, requirement risks and structural risks. Deferral time Project 1 Project 2 Project 3 Project 4 Project 5 0 FNPV ¼ ((75%), FNPV ¼ (12%, FNPV ¼ (5%, FNPV ¼ ((12%), FNPV ¼ ((5%), Table I. 17%, 15%, 126%) 20%, 45%, 56%) 24%, 17%, 218%) 85%, 71%, 6%) 12%, 4%, 358%) The five deferrable IT 1 U U U U investment opportunities 2 U U U Deferral Project Project Project Project Project time 1 2 3 4 5 0 FNPV = FNPV = FNPV = FNPV = FNPV = ((75%),17%,15%,126%) (12%,20%,45%,56%) (5%,24%,17%,218%) ((12%),85%,71%,6%) ((5%),12%,4%,358%) M = (10.5%) M = 17.8% M = 48.0% M = 25.7% M = 62.5% s = 71.5% s = 24% s = 56.0% s = 62.0% s = 81.0% 1 FROV1 = FROV1 = FROV1 = FROV1 = ((90%),20%,18%,151%) (6%,26%,19%,240%) ((15%),106%,89%,8%) ((6%),13%,4%,394%) M = (12.6%) M = 52.8% M = 32.1% M = 68.8% s = 85.8% s = 61.6% s = 77.5% s = 89.1% Figure 2. The fuzzy real option 2 values of the five FROV2 = FROV2 = FROV2 = deferrable IT investment ((104%),23%,21%,174%) (7%,31%,23%,288%) ((7%),14%,5%,433%) M = (14.5%) M = 63.4% M = 75.7% opportunities s = 98.7% s = 73.9% s = 98.0%
  • 18. The development risks were further divided into two sub-criteria: team risks and Fuzzy goal complexity risks. External environment risks were further divided into two sub-criteria: competition risks and market risks. programming Next, the possibilistic mean risk values of the investment opportunities presented in model Table II were calculated. In Phase 5, assuming a per annum investment, the deferrable IT investment strategy with the most value was determined using the following two-objective decision-making 189 model: Min Z 2 ¼ 0:45ðx10 þ x11 þ x12 Þ þ 0:1x20 þ 0:35ðx30 þ x31 þ x32 Þ þ 0:15ðx40 þ x41 Þ þ 0:05ðx50 þ x51 þ x52 Þ Subject to: (Model P) x10 þ x11 þ x12 # 1 x21 # 1 x30 þ x31 þ x32 # 1 x40 þ x41 # 1 x50 þ x51 þ x52 # 1 x10 þ x20 þ x30 þ x40 þ x50 # 1 x11 þ x31 þ x41 þ x51 # 1 x12 þ x32 þ x52 # 1 x10 ; x11 ; x12 ; x20 ; x30 ; x31 ; x32 ; x40 ; x41 ; x50 ; x51 ; x52 ¼ 0; 1 Therefore, the goal programming model for the above two-objective strategic IT investment decision will be the following single objective model: À Á Min D ¼ P 1 · s2 þ sþ 1 2 Subject to: (Model F) ð20:105Þx10 þ ð20:126Þ · x11 þ ð20:145Þ · x12 þ 0:178x20 þ 0:48x30 þ 0:528x31 þ 0:634x32 þ 0:257x40 þ 0:321x41 þ 0:625x50 þ 0:688x51 þ 0:757x52 À Á þ s2 2 sþ ¼ 1:5 1 1 0:45ðx10 þ x11 þ x12 Þ þ 0:1x20 þ 0:35ðx30 þ x31 þ x32 Þ þ 0:15ðx40 þ x41 Þ À Á þ 0:05ðx50 þ x51 þ x52 Þ þ s2 2 sþ ¼ 0:6 2 2 x10 þ x11 þ x12 # 1 x20 # 1 Table II. Project 1 Project 2 Project 3 Project 4 Project 5 The possibilistic mean risk value of the IT E(FRV1) ¼ 0.45 E(FRV2) ¼ 0.10 E(FRV3) ¼ 0.35 E(FRV4) ¼ 0.15 E(FRV5) ¼ 0.05 investment opportunities
  • 19. BIJ x30 þ x31 þ x32 # 1 18,2 x40 þ x41 # 1 x50 þ x51 þ x52 # 1 x10 þ x20 þ x30 þ x40 þ x50 # 1 190 x11 þ x31 þ x41 þ x51 # 1 x12 þ x32 þ x52 # 1 x10 ; x11 ; x12 ; x20 ; x30 ; x31 ; x32 ; x40 ; x41 ; x50 ; x51 ; x52 ¼ 0; 1 sþ ; s2 ; sþ ; s2 $ 0 1 1 2 2 sþ · s2 ¼ 0 1 1 sþ · s2 ¼ 0 2 2 The optimal solution for model (F) given in Table III shows Projects 1 and 2 were rejected. Project 3 was approved for to start immediately, Project 4 was approved to start next year and Project 5 was approved to start in two years. 4. Discussion and practical perspectives It is hard to say for sure which IT investment strategy is the best, but, we can make the selection process more comprehensive and systematic. The group decision process used at Mornet was intended to enhance decision making and promote consensus. Our four investment board members were highly educated; three of them held graduate degrees in business and one of them held a doctorate in economics. To this end, a more logical and persuasive multi-criteria decision-making method was necessary to gain their confidence and support. Although our board members were educated and creative, their managerial judgment and intuition was limited by background and experience. One manager lacked strategic management skills while another had limited experience in banking. Upon completion of the IT investment strategy selection process, we held a meeting with the board to discuss the results and finalize our recommendation. The four board members unanimously agreed that the proposed framework provided invaluable analysis aids and information processing support. They were convinced that the result was unbiased and consistent. Armed with this feedback, we were confident that we could sell our recommendation to the top management. Nevertheless, we were all aware that consensus building at Mornet was a gradual process and could not be achieved overnight. We knew that building internal alliances and selecting an IT investment strategy that could cut across different functional areas was a difficult task. The board members agreed to target various groups and key people at Mornet in order to gain their support. They began Deferral time Project 1 Project 2 Project 3 Project 4 Project 5 Table III. 0 U The optimal solution for 1 U model (F) 2 U
  • 20. building internal alliances with functional units and focused their efforts on getting Fuzzy goal other line managers on board. This process involved fostering collaboration and programming avoiding alienation of potential internal allies. The board also decided to get the line managers on board. Gaining the line management support resulted in the dedication of model some line budget to the implementation process. This led to a virtuous circle since the fact that some line mangers agreed to pay for some of the implementation expenses increased their commitment. This encouraged other line managers to jump on the 191 bandwagon and participate in the selection process. The internal alliance building process would not be complete without top management support. Our board was adamant about the importance of gaining support from the top management. Gaining the top management support was easier than it may seem from the outside. The board members had already built internal alliances and support of various key people and line managers. We discussed the overwhelming internal support and the tangible and intangible benefits of our IT investment strategy with the top management who in turn agreed to implement our recommendation. We were also required to develop a long-term plan to measure the IT investment selection success through qualitative and quantitative measures. The analysis of this case study allows the articulation of a series of key factors that can be considered as important in contributing to the successful selection and implementation of IT investment strategies. The first is building internal alliances. The second element is getting the line managers on board. The third factor is the full and continual support given by top management. The fourth key ingredient is the persistent and systematic processes in place to measure the IT investment success. 5. Conclusions and future research directions IT investments represent the largest capital expenditure items for many organizations and have a tremendous impact on productivity by reducing costs, improving quality and increasing value to customers. As a result, many organizations continue to invest large sums of money in IT in anticipation of a material return on their investment. The selection of appropriate IT investments has been one of the most significant business challenges of the last decade. In this paper, we proposed a novel two-dimensional approach that determined the deferrable strategy with the most value by maximizing the real option values while minimizing the risks associated with each alternative strategy. First, the deferrable investment strategies were prioritized according to their values using the ROA. Then, the risks associated with each investment strategy were quantified using the GFAHP. Finally, the values associated with the two dimensions were integrated to determine the deferrable IT investment strategy with the most value using a fuzzy preemptive goal programming model. This framework can be easily generalized to N-dimensional problems. We have developed a framework that can be used to evaluate IT investments based on the real option concept. This approach incorporates the linkage among economic value, real option value and IT investments that could lead to a better-structured decision process. The proposed approach provides guidelines for managing IT investment projects. Managers face the difficulty that most IT investment projects are inherently risky, especially in a rapidly changing business environment. Over the past several years, increasingly sophisticated analytical techniques have been developed for selecting the IT investments, but not implemented within organizations. Our approach provides a simple,
  • 21. BIJ intuitive, generic and comprehensive investment management tool. The trapezoidal fuzzy 18,2 numbers used in this study allows the proposed model to be implemented easily with the most commonly used spreadsheet software. Managers can easily understand how to implement the proposed approach to assess their technology portfolio requirements. In contrast to the traditional ROA literature, our approach contributes to the literature by incorporating a risk dimension parameter. We emphasize the importance 192 of categorizing risk management in IT investment projects since some risk cannot be eliminated. After estimating the possibility and severity of each risk factor, we obtain an overall risk level for each IT investment under consideration. This assumes by implication that all risk factors are independent. However, in practice, there may be some interaction between different risk factors and their influence on the expected payoffs could be not independent. Future research considering correlation coefficients between risk factors is rather challenging but necessary to gain insight into this interaction influence in the application of ROA to IT investment decisions. We have developed a framework that can be used to evaluate IT investment strategies based on the real option concept. This approach incorporates the linkage among economic value, real option value and IT investments that could lead to a better-structured decision process. The overall contributions of the novel framework proposed in this study are threefold: (1) Our framework addresses the gaps in the IT investment planning literature on the effective and efficient assessment of IT investment opportunities. (2) Our framework provides a comprehensive and systematic framework that combines ROA with a fuzzy group multi-criteria approach to assess IT investment strategies. (3) Current IT investment assessment models are somewhat limited in their ability to come to grips with issues of inference and fuzziness. Our framework considers fuzzy logic and fuzzy sets to represent ambiguous, uncertain or imprecise information in the It investment evaluation process. Future research considering correlation coefficients between the risk and benefit factors is rather challenging but necessary to gain insight into this interaction influence in the application of ROA to strategic IT investment decision in organizations. Another possible future research direction is to investigate other drivers that influence the IT investment decisions. These value drivers could also be incorporated into the model proposed in this study. Note 1. The name is changed to protect the anonymity of the company. References Bakos, Y. and Kemerer, C.F. (1992), “Recent applications of economic theory in information technology research”, Decision Support Systems, Vol. 8 No. 5, pp. 365-86. Benaroch, M. (2002), “Managing information technology investment risk: a real options perspective”, Journal of Management Information Systems, Vol. 19 No. 2, pp. 43-84. Black, F. and Scholes, M. (1973), “The pricing of options and corporate liabilities”, The Journal of Political Economy, Vol. 81, pp. 637-54.
  • 22. Black, F. and Scholes, M. (1974), “The effects of dividend yield and dividend policy on common Fuzzy goal stock prices and returns”, Journal of Financial Economics, Vol. 1 No. 1, pp. 1-22. programming Boyle, P.P. (1977), “Options: a Monte Carlo approach”, Journal of Financial Economics, Vol. 4 No. 3, pp. 323-38. model Brealey, R.A. and Myers, S.C. (1998), Principles of Corporate Finance, McGraw-Hill, New York, NY. ´ Carlsson, C. and Fuller, R. (2003), “A fuzzy approach to real option valuation”, Fuzzy Sets and Systems, Vol. 139 No. 2, pp. 297-312. 193 ´ ¨ Carlsson, C., Fuller, R., Heikkila, M. and Majlender, P. (2007), “A fuzzy approach to RD project portfolio selection”, International Journal of Approximate Reasoning, Vol. 44 No. 2, pp. 93-105. Chen, T., Zhang, J., Liu, S. and Yu, B. (2007), “Fuzzy real option analysis for IT investment in nuclear power station”, Computational Science – ICCS 2007, Springer, Berlin, pp. 953-9. Chen, Y., Liang, L., Yang, F. and Zhu, J. (2006), “Evaluation of information technology investment: a data envelopment analysis approach”, Computers Operations Research, Vol. 33 No. 5, pp. 1368-79. Chrysafis, K.A. and Papadopoulos, B.K. (2009), “On theoretical pricing of options with fuzzy estimators”, Journal of Computational and Applied Mathematics, Vol. 223 No. 2, pp. 552-66. ´ Collan, M., Fuller, R. and Mezei, J. (2009), “A fuzzy pay-off method for real option valuation”, Journal of Applied Mathematics and Decision Sciences, Vol. 2009. Cox, J., Ross, S. and Rubinstein, M. (1979), “Option pricing: a simplified approach”, Journal of Financial Economics, Vol. 7 No. 3, pp. 229-63. Datar, V. and Mathews, S. (2004), “European real options: an intuitive algorithm for the Black Scholes formula”, Journal of Applied Finance, Vol. 14 No. 1, pp. 45-51. Datar, V. and Mathews, S. (2007), “A practical method for valuing real options: the Boeing approach”, Journal of Applied Corporate Finance, Vol. 19 No. 2, pp. 95-104. Dixit, A. and Pindyck, R.S. (1994), Investment Under Uncertainty, Princeton University Press, Princeton, NJ. Dos Santos, B.L. (1994), Assessing the Value of Strategic Information Technology Investments, Chapman Hall, London. Dubois, D. and Prade, H. (1988), Possibility Theory: An Approach to Computerized Processing of Uncertainty, Plenum Press, New York, NY. Farbey, B., Land, F. and Targett, D. (1993), How to Assess Your IT Investment: A Study of Methods and Practice, Butterworth-Heinemann, Oxford. Frode, K. (2007), “A real option analysis of investments in hydropower: the case of Norway”, Energy Policy, Vol. 35 No. 11, pp. 5901-8. Hayes, R. and Abernathy, W. (1980), “Managing our way to economic decline”, Harvard Business Review, Vol. 58 No. 4, p. 67. Kaplan, R.S. and Atkinson, A.A. (1998), Advanced Management Accounting, 3rd ed., Prentice-Hall, Upper Saddle River, NJ, pp. 593-603. Kumar, R.L. (2002), “Managing risks in IT projects: an options perspective”, Information Management, Vol. 40 No. 1, pp. 63-74. Luehrman, T.A. (1997), “What’s it worth? A general manager’s guide to valuation”, Harvard Business Review, Vol. 75 No. 3, pp. 132-42. McGrath, R.G. (1997), “A real options logic for initiating technology positioning investments”, Academy of Management Review, Vol. 22 No. 4, pp. 974-96.
  • 23. BIJ Mathews, S. and Salmon, J. (2007), “Business engineering: a practical approach to valuing high-risk, high-return projects using real options”, in Gray, P. (Ed.), Tutorials in 18,2 Operations Research, Informs, Hanover, MD. Melville, N., Kraemer, K. and Gurbaxani, V. (2004), “Information technology and organizational performance: an integrative model of it business value”, MIS Quarterly, Vol. 28 No. 2, pp. 283-322. 194 Parker, M. and Benson, R. (1989), “Enterprisewide information economics: latest concepts”, Journal of Information Systems Management, Vol. 6 No. 4, pp. 7-13. Powell, P. (1992), “Information technology appraisal: is it different?”, The Journal of the Operational Research Society, Vol. 43 No. 1, pp. 29-42. Schniederjans, M.J., Hamaker, J.L. and Schniederjans, A.M. (2004), Information Technology Investment: Decision-Making Methodology, World Scientific, Singapore. Stix, V. and Reiner, J. (2004), “IT appraisal methods and methodologies: a critical literature review”, in Khosrowpour, M. (Ed.), Innovations through Information Technology, Idea Group, Hershey, PA, pp. 37-40. Strassmann, P.A. (1997), The Squandered Computer: Evaluating the Business Alignment of Information Technologies, Information Economic Press, New Canaan, CT. Villani, G. (2008), “An RD investment game under uncertainty in real option analysis”, Computational Economics, Vol. 32 Nos 1/2, pp. 199-219. Wang, J. and Hwang, W.-L. (2007), “A fuzzy set approach for RD portfolio selection using a real options valuation model”, Omega, Vol. 35 No. 3, pp. 247-57. Willcocks, L.P. and Lester, S. (1996), “The evaluation and management of information systems investments: from feasibility to routine operations”, in Willcocks, L.P. (Ed.), Investing in Information Systems, Chapman and Hall, London, pp. 15-36. Zadeh, L.A. (1965), “Fuzzy sets”, Information and Control, Vol. 8, pp. 338-53. Further reading Wu, L.-C. and Ong, C.-S. (2007), “Management of information technology investment: a framework based on a real options and mean-variance theory perspective”, Technovation, Vol. 28 No. 3, pp. 122-34. Appendix. The mathematical notations Let us introduce the following mathematical notations and definitions used throughout this paper: cj The jth criterion. ai The ith IT investment strategy. p The number of IT investment risk criteria. q The number of IT investment risk sub-criteria. l The number of IT investment board members. n The number of alternative IT investment strategies. Ti The time to maturity of the ith IT investment strategy. Tm The maximum deferral time of the IT investments. T1 The minimum deferral time of the IT investments.
  • 24. ri The risk-free interest rate. Fuzzy goal w(vp)K The voting power of the IT investment board member (ITIB)k (K ¼ 1,2, . . . , l ). programming ~k Bi ðT j Þ The individual fuzzy present value of the expected cash flows of the ith IT model investment strategy at time Tj evaluated by strategic IT investment board member (ITIB)k. ˜ Bi(Tj) The weighted collective fuzzy present value of the expected cash flows of the ith 195 IT investment strategy at time Tj. ˜ E(Bi(Tj)) The possibilistic mean value of the weighted collective present value of expected cash flows of the ith IT investment strategy at time Tj. ~k Ci ðT j Þ The individual fuzzy present value of the expected cost of the ith IT investment strategy at time Tj evaluated by strategic IT investment board member (ITIB)k. ˜ Ci(Tj) The weighted collective fuzzy present value of the expected cost of the ith IT investment strategy at time Tj. ˜ E(Ci(Tj)) The possibilistic mean value of the weighted collective expected costs of the ith IT investment strategy at time Tj. di The value loss over the duration of the option. 2 (s (Tj))i The variance of the weighted collective fuzzy present value of expected cash flows of the ith IT investment strategy at time Tj evaluated by strategic IT investment board member (ITIB)k. N(D1i(Tj)) The IT investment strategy ith cumulative normal probability for the D1. N(D2i(Tj)) The IT investment strategy ith cumulative normal probability for the D2. ~k bij The individual fuzzy comparison qualification between criterion i with criterion j evaluated by strategic IT investment board member (ITIB)k. k ~ dij The individual fuzzy comparison qualification between sub-criterion i with p sub-criterion j with respect to criterion p evaluated by strategic IT investment board member (ITIB)k. rk ~ij The individual fuzzy comparison qualification between IT investment strategy i q with IT investment strategy j with respect to sub-criterion q evaluated by strategic IT investment board member (ITIB)k. ~ bij The weighted fuzzy collective comparison qualification between criterion i with criterion j. ~ ðdij Þj The weighted fuzzy collective comparison qualification between sub-criterion i with sub-criterion j with respect to criterion j. ð~ij Þj r The weighted fuzzy collective comparison qualification between IT investment strategy i with IT investment strategy j with respect to sub-criterion j. sþ h The amount by which we numerically exceed the hth goal. s2 h The amount by which we numerically fall short of the hth goal. K ~2 AR The individual fuzzy pairwise comparison matrix of p criteria of IT investment risk evaluated by strategic IT investment board member (ITIB)k.
  • 25. K ~3 BIJ AR The individual fuzzy pairwise comparison matrix of IT investment risk sub-criteria with respect to the p IT investment risk criteria evaluated by 18,2 strategic IT investment board member (ITIB)k. K ~4 AR The individual fuzzy pairwise comparison matrix of n IT investment strategies with respect to the q IT investment risk sub-criteria evaluated by strategic IT investment board member (ITIB)k. 196 ~2 AR The weighted fuzzy collective pairwise comparison matrix of the p IT investment risk criteria. ~3 AR The weighted fuzzy collective pairwise comparison matrix of IT investment risk sub-criteria with respect to the p IT investment risk criteria. ~4 AR The weighted fuzzy collective pairwise comparison matrix of the n IT investment strategies with respect to the q IT investment risk sub-criteria. K ~2 AR The weighted fuzzy collective IT investment risk matrix evaluated by strategic IT investment board member (ITIB)k. FROVi(Tj) The fuzzy real option value of the ith IT investment strategy at time Tj. FRVi The fuzzy risk value of the ith IT investment strategy. ˜ AFROV The fuzzy real option value matrix of the deferrable IT investment strategies. FRV The fuzzy risk value vector of the IT investment strategies. About the authors Faramak Zandi is an Assistant Professor of Information Systems and Chairman of the Industrial Engineering Department at Alzahra University in Iran. He holds a PhD in Industrial Engineering. His research interests include IT, enterprise architectures, decision making, quality management systems and transportation planning. He has published in the International Journal of Business Information Systems, International Journal of Mathematics in Operational Research, International Journal of Information Technology and Management, IEEE Computer Society, Journal of Tehran University and Amirkabir Journal of Science Technology and Quarterly Journal of Educational Innovations. Madjid Tavana is a Professor of Management Information Systems and Decision Sciences and the Lindback Distinguished Chair of Information Systems at La Salle University where he served as Chairman of the Management Department and Director of the Center for Technology and Management. He has been a distinguished Faculty Fellow at NASA’s Kennedy Space Center, NASA’s Johnson Space Center, Naval Research Laboratory – Stennis Space Center and Air Force Research Laboratory. He was awarded the prestigious Space Act Award by NASA. He holds an MBA, a PMIS and a PhD in Management Information Systems. He received his Post-doctoral Diploma in strategic information systems from the Wharton School of the University of Pennsylvania. He is the Editor-in-Chief for the International Journal of Strategic Decision Sciences, The International Journal of Enterprise Information Systems and The International Journal of Applied Decision Sciences. He has published in journals such as Decision Sciences, Interfaces, Information Systems, Information and Management, Computers and Operations Research, Journal of the Operational Research Society and Advances in Engineering Software, among others. Madjid Tavana is the corresponding author and can be contacted at: tavana@lasalle.edu To purchase reprints of this article please e-mail: reprints@emeraldinsight.com Or visit our web site for further details: www.emeraldinsight.com/reprints