{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:04:32Z","timestamp":1754161472671,"version":"3.41.2"},"reference-count":56,"publisher":"Emerald","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,5,18]]},"abstract":"<jats:sec>\n                  <jats:title>Purpose<\/jats:title>\n                  <jats:p>The purpose of this paper is to explore and analyze the views of top financial executives on the information systems (IS) in their organizations and to study the critical information technology issues facing organizations. Specifically, it aims to study critical issues over the period 2006 to 2010, as well as the effect of company size on the criticality of issue.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Design\/methodology\/approach<\/jats:title>\n                  <jats:p>The paper uses an analysis of secondary data obtained from the 2006 and 2010 Financial Executives International (FEI) comprehensive survey-based research on technology issues for financial executives. The study was conducted by the FEI and in conjunction with Computer Sciences Corporation in 2006. Factorial analysis of variance (ANOVA) and other statistical methods are used.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Findings<\/jats:title>\n                  <jats:p>The findings confirm critical issues that are facing organizations today. The study also finds that company size generally does not play a significant role in the criticality of information technology (IT) issues and that generally, there has been variation in the relative importance of issues between 2006 and 2010.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Research limitations\/implications<\/jats:title>\n                  <jats:p>The study can be used as a basis for further exploration on critical IT issues, as well as the influences on company size on criticality of issues. It can also serve as a preliminary model to analyze firm IS over time. Limitations of the study include that the only group included in the survey were financial executives and the study is primarily based on US company responses.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Practical implications<\/jats:title>\n                  <jats:p>The findings can be used to guide management teams in emphasizing areas that need attention and are of critical importance to all organizations. The article is extremely topical and useful for practitioners in understanding what are the major issues facing IT today. The longitudinal analysis and size study are particularly important in confirming the importance of the relevant IT issues.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Originality\/value<\/jats:title>\n                  <jats:p>The paper analyzes a large current sample set which empirically reviews a cross-section of major corporations, IS departments and their returns. In addition, it begins to explore longitudinal and size effects on critical IT issues<\/jats:p>\n               <\/jats:sec>","DOI":"10.1108\/02635571211232389","type":"journal-article","created":{"date-parts":[[2012,5,20]],"date-time":"2012-05-20T10:39:55Z","timestamp":1337510395000},"page":"808-827","source":"Crossref","is-referenced-by-count":16,"title":["An analysis of critical information technology issues facing organizations"],"prefix":"10.1108","volume":"112","author":[{"given":"Alan R.","family":"Peslak","sequence":"first","affiliation":[{"name":"Penn State University, Dunmore, Pennsylvania, USA"}]}],"member":"140","reference":[{"key":"2025072819560467300_b100","unstructured":"AICPA\n           (2011), \u201c2011 top ten technology initiatives\u201d, available at: www.aicpa.org\/InterestAreas\/InformationTechnology\/Resources\/TopTechnologyInitiatives\/Pages\/TopTenTechInitiatives.aspx."},{"issue":"4","key":"2025072819560467300_b2","first-page":"263","article-title":"Diagnosing the gap in IT \u2013 business strategic alignment: a qualitative analysis among public shareholding firms in Jordan","volume":"8","author":"Al majali","year":"2010","journal-title":"International Journal of Electronic Business Management"},{"issue":"4","key":"2025072819560467300_b3","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MITP.2010.138","article-title":"Business investments in IT: managing integration risks","volume":"13","author":"Asakiewicz","year":"2011","journal-title":"IT Professional Magazine"},{"issue":"1","key":"2025072819560467300_b4","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MSP.2007.11","article-title":"Is information security under control? Investigating quality in information security management","volume":"5","author":"Baker","year":"2007","journal-title":"Security & Privacy, IEEE"},{"issue":"2","key":"2025072819560467300_b5","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1080\/07421222.2004.11045803","article-title":"Prioritizing a portfolio of information technology investment","volume":"21","author":"Bardhan","year":"2004","journal-title":"Projects Journal of Management Information Systems"},{"issue":"4","key":"2025072819560467300_b6","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1108\/09555341011056168","article-title":"A longitudinal and contextual analysis of media representation of business ethics","volume":"22","author":"Barkemeyer","year":"2010","journal-title":"European Business Review"},{"issue":"4","key":"2025072819560467300_b8","doi-asserted-by":"crossref","first-page":"550","DOI":"10.1108\/02635571011039025","article-title":"Information technology-enabled intrapreneurship culture and firm performance","volume":"110","author":"Benitez-Amado","year":"2010","journal-title":"Industrial Management + Data Systems"},{"issue":"53","key":"2025072819560467300_b9","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1086\/426407","article-title":"Firm size matters: growth and productivity growth in African manufacturing","volume":"3","author":"Biesebroeck","year":"2005","journal-title":"Economic Development and Cultural Change"},{"issue":"3","key":"2025072819560467300_b10","doi-asserted-by":"crossref","first-page":"299","DOI":"10.2307\/249620","article-title":"The influence of IT management practice on IT use in large organizations","volume":"18","author":"Boynton","year":"1994","journal-title":"MIS Quarterly"},{"issue":"7","key":"2025072819560467300_b11","doi-asserted-by":"crossref","first-page":"925","DOI":"10.1108\/02635570710816676","article-title":"Competitive analysis of enterprise integration strategies","volume":"107","author":"Briggs","year":"2007","journal-title":"Industrial Management & Data Systems"},{"issue":"2","key":"2025072819560467300_b12","doi-asserted-by":"crossref","first-page":"159","DOI":"10.2307\/249750","article-title":"The implications of information technology infrastructure for business process redesign","volume":"23","author":"Broadbent","year":"1999","journal-title":"MIS Quarterly"},{"issue":"11","key":"2025072819560467300_b13","first-page":"33","article-title":"Innovation in China's furniture industry","volume":"56","author":"Cao","year":"2006","journal-title":"Forest Products Journal"},{"issue":"9","key":"2025072819560467300_b14","doi-asserted-by":"crossref","first-page":"72","DOI":"10.5539\/ijbm.v5n9p72","article-title":"Performance impact of intellectual capital: a study of Indian it sector","volume":"5","author":"Choudhury","year":"2010","journal-title":"International Journal of Business and Management"},{"key":"2025072819560467300_b15","unstructured":"Chowdhury, M.W.\n           and Iqbal, M.Z. (2004), \u201cIntegration of legacy systems in software architecture\u201d, Proceedings of 2004 Specification and Verification of Component-Based Systems, Newport Beach, CA."},{"issue":"1","key":"2025072819560467300_b16","first-page":"61","article-title":"2011 IT tech and strategy trends","volume":"13","author":"Costello","year":"2011","journal-title":"IT Professional Magazine"},{"issue":"2","key":"2025072819560467300_b17","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/s10799-010-0067-0","article-title":"IT, productivity and organizational practices: large sample, establishment-level evidence","volume":"11","author":"Cozzarin","year":"2010","journal-title":"Information Technology and Management"},{"key":"2025072819560467300_b19","unstructured":"Davenport, T.\n           (1993), Process Innovation: Reengineering Work through Information Technology, Harvard Business School Press, Cambridge, MA."},{"issue":"2","key":"2025072819560467300_b21","first-page":"13","article-title":"Aligning information technology within the framework of corporate governance to increase corporate value in Mexico","volume":"14","author":"Estrada","year":"2010","journal-title":"International Journal of Management and Information Systems"},{"issue":"3","key":"2025072819560467300_b22","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1177\/107769900708400309","article-title":"What Katrina revealed: a visual analysis of the hurricane coverage by news wires and US newspapers","volume":"8","author":"Fahmy","year":"2007","journal-title":"Journalism and Mass Communication Quarterly"},{"key":"2025072819560467300_b23","unstructured":"FEI\n           (2006a), About FEI, available at: www.financialexecutivesinternational.org."},{"key":"2025072819560467300_b101","unstructured":"FEI\n           (2006b), Financial Executives International Annual Survey of Members, Financial Executive International, Morristown, NJ."},{"issue":"4","key":"2025072819560467300_b25","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1108\/02635571011038981","article-title":"The role of industry perceptions in competitive responses","volume":"110","author":"Fouskas","year":"2010","journal-title":"Industrial Management + Data Systems"},{"key":"2025072819560467300_b26","doi-asserted-by":"crossref","unstructured":"Gonz\u00e1lez-Benito, J.\n           and Gonz\u00e1lez-Benito, \u00d3. (2010), \u201cA study of determinant factors of stakeholder environmental pressure perceived by industrial companies\u201d, Business Strategy and the Environment, Vol. 19, pp. 164-81.","DOI":"10.1002\/bse.631"},{"issue":"2","key":"2025072819560467300_b28","first-page":"109","article-title":"The enabling role of E-business technologies in strategic operations management","volume":"19","author":"Gupta","year":"2010","journal-title":"Journal of International Technology and Information Management"},{"issue":"5","key":"2025072819560467300_b29","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1108\/09685220010353150","article-title":"Disaster recovery planning: a strategy for data security","volume":"8","author":"Hawkins","year":"2000","journal-title":"Information Management and Computer Security"},{"issue":"8","key":"2025072819560467300_b30","doi-asserted-by":"crossref","first-page":"1045","DOI":"10.1108\/02635570810904604","article-title":"Expectation and reality in ERP implementation: consultant and solution provider perspective","volume":"108","author":"Helo","year":"2008","journal-title":"Industrial Management + Data Systems"},{"issue":"2","key":"2025072819560467300_b32","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1108\/02635571011020287","article-title":"Barriers to innovation adoption: a study of e-markets","volume":"110","author":"Johnson","year":"2010","journal-title":"Industrial Management + Data Systems"},{"issue":"7","key":"2025072819560467300_b33","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1108\/02635571011069077","article-title":"Relationship between information systems sophistication and performance measurement","volume":"110","author":"Jusoh","year":"2010","journal-title":"Industrial Management + Data Systems"},{"issue":"2","key":"2025072819560467300_b34","doi-asserted-by":"crossref","first-page":"16","DOI":"10.4018\/jegr.2009040102","article-title":"Determining types of services and targeted users of emerging e-government strategies: the case of Tanzania","volume":"5","author":"Kaaya","year":"2009","journal-title":"International Journal of Electronic Government Research"},{"issue":"1","key":"2025072819560467300_b35","doi-asserted-by":"crossref","first-page":"37","DOI":"10.4018\/irmj.2004010103","article-title":"A multi-objective, multi-criteria approach for evaluating IT investments: results from two case studies","volume":"17","author":"Kearns","year":"2004","journal-title":"Information Resources Management Journal"},{"issue":"2","key":"2025072819560467300_b37","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1007\/s11042-009-0289-5","article-title":"Collaborative virtual learning environments: design and evaluation","volume":"44","author":"Konstantinidis","year":"2009","journal-title":"Multimedia Tools and Applications"},{"issue":"7","key":"2025072819560467300_b38","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1108\/03074800810888212","article-title":"Challenges for science and society in the digital age","volume":"109","author":"Koren","year":"2008","journal-title":"New Library World"},{"key":"2025072819560467300_b39","unstructured":"Krigsman, M.\n           (2008), \u201cStudy: 68 percent of IT projects fail\u201d, available at: www.zdnet.com\/blog\/projectfailures\/study-68-percent-of-it-projects-fail\/1175."},{"issue":"2","key":"2025072819560467300_b40","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1108\/02635571011020340","article-title":"The effect of organizational support on ERP implementation","volume":"110","author":"Lee","year":"2010","journal-title":"Industrial Management + Data Systems"},{"issue":"1","key":"2025072819560467300_b42","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1108\/13563280310458894","article-title":"Financial reporting on the internet by leading Japanese companies","volume":"8","author":"Marston","year":"2003","journal-title":"Corporate Communications"},{"issue":"2","key":"2025072819560467300_b43","doi-asserted-by":"crossref","first-page":"283","DOI":"10.2307\/25148636","article-title":"Information technology and organizational performance: an integrative model of IT business value","volume":"28","author":"Melville","year":"2004","journal-title":"MIS Quarterly"},{"issue":"1","key":"2025072819560467300_b44","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1142\/S021759591100303X","article-title":"Multiple criteria analysis for evaluation of information system risk","volume":"28","author":"Olson","year":"2011","journal-title":"Asia-Pacific Journal of Operational Research"},{"issue":"2","key":"2025072819560467300_b45","first-page":"141","article-title":"Factors influencing corporate compliance with financial reporting requirements in New Zealand","volume":"15","author":"Owusu-Ansah","year":"2005","journal-title":"International Journal of Commerce & Management"},{"issue":"10","key":"2025072819560467300_b46","doi-asserted-by":"crossref","first-page":"1023","DOI":"10.1016\/j.infsof.2011.05.006","article-title":"Business process archeology using MARBLE","volume":"53","author":"P\u00e9rez-Castillo","year":"2011","journal-title":"Information and Software Technology"},{"issue":"1","key":"2025072819560467300_b47","doi-asserted-by":"crossref","first-page":"81","DOI":"10.2307\/3250980","article-title":"Factors that influence the social dimension of alignment between business and information technology objectives","volume":"24","author":"Reich","year":"2000","journal-title":"MIS Quarterly"},{"issue":"2","key":"2025072819560467300_b48","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MS.2009.41","article-title":"Modeling usage: techniques and tools","volume":"6","author":"Riedemann","year":"2009","journal-title":"IEEE Software"},{"issue":"3","key":"2025072819560467300_b49","first-page":"52","article-title":"Consumer perceptions of product quality revisited: made in China","volume":"18","author":"Schniederjans","year":"2011","journal-title":"The Quality Management Journal"},{"issue":"4","key":"2025072819560467300_b50","doi-asserted-by":"crossref","first-page":"570","DOI":"10.1108\/02635571111133551","article-title":"The more secure the better? A study of information security readiness","volume":"111","author":"Sun","year":"2011","journal-title":"Industrial Management + Data Systems"},{"issue":"1","key":"2025072819560467300_b51","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/s10799-007-0024-8","article-title":"Inside the adaptive enterprise: an information technology capabilities perspective on business process agility","volume":"9","author":"Tallon","year":"2008","journal-title":"Information Technology and Management"},{"issue":"4","key":"2025072819560467300_b52","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1016\/j.jsis.2007.09.001","article-title":"Understanding the influence of information systems competencies on process innovation: a resource-based view","volume":"16","author":"Tarafdar","year":"2007","journal-title":"The Journal of Strategic Information Systems"},{"key":"2025072819560467300_b53","unstructured":"Trading Economics\n           (2011), \u201cInformation and communication technology expenditure (% of GDP) in the United States\u201d, available at: www.tradingeconomics.com\/united-states\/information-and-communication-technology-expenditure-percent-of-gdp-wb-data.html."},{"issue":"3","key":"2025072819560467300_b54","first-page":"21","article-title":"Modeling business goal for business\/it alignment using requirements engineering","volume":"51","author":"Ullah","year":"2011","journal-title":"The Journal of Computer Information Systems"},{"key":"2025072819560467300_frd1","doi-asserted-by":"crossref","unstructured":"Al-Mabrouk, J.S.\n           (2009), \u201cAn analysis of the major issues for successful information technology transfer in Arab countries\u201d, Journal of Enterprise Information Management, Vol. 22, pp. 504-22.","DOI":"10.1108\/17410390910993518"},{"issue":"3","key":"2025072819560467300_frd2","doi-asserted-by":"crossref","first-page":"355","DOI":"10.2307\/249647","article-title":"Supporting the information technology champion","volume":"15","author":"Beath","year":"1991","journal-title":"MIS Quarterly"},{"issue":"5","key":"2025072819560467300_frd3","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1016\/S0378-7206(99)00052-X","article-title":"What small business executives have learned about managing information technology","volume":"37","author":"Cynthia","year":"2000","journal-title":"Information & Management"},{"issue":"3","key":"2025072819560467300_frd4","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1080\/10196780701503195","article-title":"Organizational adoption of XBRL","volume":"17","author":"Doolin","year":"2007","journal-title":"Electronic Markets"},{"issue":"8","key":"2025072819560467300_frd5","doi-asserted-by":"crossref","first-page":"803","DOI":"10.1108\/02686900810899536","article-title":"The effect of IT controls on financial reporting","volume":"23","author":"Grant","year":"2008","journal-title":"Managerial Auditing Journal"},{"issue":"2","key":"2025072819560467300_frd6","doi-asserted-by":"crossref","first-page":"80","DOI":"10.5539\/ibr.v4n2p80","article-title":"The adoption of mobile commerce service among employed mobile phone users in Bangladesh: self-efficacy as a moderator","volume":"4","author":"Islam","year":"2011","journal-title":"International Business Research"},{"issue":"5","key":"2025072819560467300_frd7","doi-asserted-by":"crossref","first-page":"1296","DOI":"10.1377\/hlthaff.24.5.1296","article-title":"Transforming care: medical practice design and information technology","volume":"24","author":"Kilo","year":"2005","journal-title":"Health Affairs"},{"issue":"1","key":"2025072819560467300_frd8","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1080\/07421222.1993.11517992","article-title":"Measuring the organizational impact of information technology investment: an exploratory study","volume":"10","author":"Mahmood","year":"1993","journal-title":"Journal of Management Information Systems."},{"issue":"1","key":"2025072819560467300_frd9","doi-asserted-by":"crossref","first-page":"185","DOI":"10.2308\/jis.2011.25.1.185","article-title":"Information security and Sarbanes Oxley compliance: an exploratory study","volume":"25","author":"Wallace","year":"2011","journal-title":"Journal of Information Systems"}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/02635571211232389","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635571211232389\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/imds\/article-pdf\/112\/5\/808\/1258438\/02635571211232389.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/imds\/article-pdf\/112\/5\/808\/1258438\/02635571211232389.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T23:56:19Z","timestamp":1753746979000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/imds\/article\/112\/5\/808\/183905\/An-analysis-of-critical-information-technology"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5,18]]},"references-count":56,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2012,5,18]]}},"URL":"https:\/\/doi.org\/10.1108\/02635571211232389","relation":{},"ISSN":["0263-5577","1758-5783"],"issn-type":[{"type":"print","value":"0263-5577"},{"type":"electronic","value":"1758-5783"}],"subject":[],"published":{"date-parts":[[2012,5,18]]}}}