{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T12:08:18Z","timestamp":1762430898918,"version":"3.41.2"},"reference-count":34,"publisher":"Emerald","issue":"8","license":[{"start":{"date-parts":[[2014,8,26]],"date-time":"2014-08-26T00:00:00Z","timestamp":1409011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8,26]]},"abstract":"<jats:sec>\n               <jats:title content-type=\"abstract-heading\">Purpose<\/jats:title>\n               <jats:p> \u2013 The purpose of this paper is to propose a new assessment methodology for the African Peer Review Mechanism (APRM) using fuzzy comprehensive evaluation method (FCEM) and the Delphi technique. The proposed approach by its design simplifies the review processes and also quantifies the outcome of the assessment result for easier interpretation and benchmarking among member countries. The proposed hybrid method demonstrates how the subjective APRM thematic areas and their objectives can be efficiently tracked country by country while addressing the key identified challenges. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title>\n               <jats:p> \u2013 Using a numerical example, a demonstration of how the APRM assessment could be carried is shown using the FCEM and the Delphi method. The APRM's own thematic areas are used as the evaluation factors and the weights are assigned using Delphi technique. A novel remark set is constructed to linguistically describe the performance of a country against each or all of the thematic areas. Then in line with the maximum membership degree principle, the position of the maximum number would correspond to its respective remark element to indicate the level of performance. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Findings<\/jats:title>\n               <jats:p> \u2013 The result shows a hybrid method of FCEM and Delphi used to determine whether a member country has \u201cachieved\u201d, \u201con track\u201d, \u201cvery likely to be achieved\u201d, \u201cpossible if some changes are made\u201d or \u201coff-track\u201d on the four focus areas of the APRM. The method provides a well-organized way of tracking progress of member countries. It is also an ideal method of tracking progress of individual thematic areas and objectives. Moreover, the simplicity of the proposed method, the preciseness of the final result it generates and the clear interpretation of the result makes it a stronger alternative to the current approach for assessing member countries. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title>\n               <jats:p> \u2013 The APRM is a respected body with the backing of the heads of state in Africa. As most African countries become conscious of the pressure to meet international standards as far as governance performance is concerned, this proposed assessment methodology if adopted would go a long way in improving performance evaluation on the continent. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title>\n               <jats:p> \u2013 The proposed methodology is unique in its simplicity and its ability to evaluate any of the APRM thematic areas independent of the others. This means an overall performance can be tracked as well as that of individual evaluation factors.<\/jats:p>\n            <\/jats:sec>","DOI":"10.1108\/k-03-2014-0049","type":"journal-article","created":{"date-parts":[[2014,10,3]],"date-time":"2014-10-03T11:46:54Z","timestamp":1412336814000},"page":"1193-1208","source":"Crossref","is-referenced-by-count":17,"title":["Tracking progress of African Peer Review Mechanism (APRM) using fuzzy comprehensive evaluation method"],"prefix":"10.1108","volume":"43","author":[{"given":"Anthony","family":"Afful-Dadzie","sequence":"first","affiliation":[]},{"given":"Eric","family":"Afful-Dadzie","sequence":"additional","affiliation":[]},{"given":"Stephen","family":"Nabareseh","sequence":"additional","affiliation":[]},{"given":"Zuzana","family":"Kom\u00ednkov\u00e1 Oplatkov\u00e1","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020123000175997200_b2","doi-asserted-by":"crossref","unstructured":"Afful-Dadzie, E.\n                and \n                  Vesel\u00fd, A.\n                (2013), \u201cUser perception of security on social networking sites using fuzzy logic\u201d, BJAST, Vol. 3 No. 4, pp. 714-734.","DOI":"10.9734\/BJAST\/2013\/3296"},{"key":"key2020123000175997200_b1","doi-asserted-by":"crossref","unstructured":"Afful-Dadzie, E.\n               , \n                  Afful-Dadzie, A.\n                and \n                  Oplatkov\u00e1, Z.K.\n                (2014), \u201cMeasuring progress of the millennium development goals: a fuzzy comprehensive evaluation approach\u201d, Applied Artificial Intelligence, Vol. 28 No. 1, pp. 1-15.","DOI":"10.1080\/08839514.2014.862770"},{"key":"key2020123000175997200_b3","unstructured":"APRM\n                (2013), \u201cAPRM country review report no. 17: the united republic of Tanzania\u201d, available at: http:\/\/aprmau.org\/sites\/default\/files\/Tanzania%20Report%202012%20English%20Edition.pdf (accessed 20 December 2013)."},{"key":"key2020123000175997200_b4","doi-asserted-by":"crossref","unstructured":"Chengcheng, B.\n                and \n                  Junhai, M.\n                (2010), \u201cThe application of fuzzy comprehensive evaluation model in the performance assessment of state-owned enterprises\u201d, Proceedings of 3rd International Symposium on Computational Intelligence and Design, IEEE Computer Society, Hangzhou, pp. 96-99.","DOI":"10.1109\/ISCID.2010.38"},{"key":"key2020123000175997200_b5","unstructured":"Chia-Chien, H.\n                and \n                  Sandford, B.A.\n                (2007), \u201cThe Delphi technique making sense of consensus\u201d, Practical Assessment Research and Evaluation, Vol. 12 No. 10, pp. 1-8."},{"key":"key2020123000175997200_b6","doi-asserted-by":"crossref","unstructured":"Dahal, K.\n                (2005), \u201cLoan risk analyzer based on fuzzy logic\u201d, Proceedings of IEEE International Conference on E-Technology, E-Commerce and E-Service, IEEE Xplore, Bradford, pp. 363-366.","DOI":"10.1109\/EEE.2005.88"},{"key":"key2020123000175997200_b7","doi-asserted-by":"crossref","unstructured":"Dalkey, N.\n                and \n                  Helmer, O.\n                (1963), \u201cAn experimental application of the Delphi method to the use of experts\u201d, Management Science, Vol. 9 No. 3, pp. 458-467.","DOI":"10.1287\/mnsc.9.3.458"},{"key":"key2020123000175997200_b8","unstructured":"Dubois, D.J.\n                (1980), Fuzzy Sets and Systems: Theory and Applications, Vol. 144, Academic Press, New York, NY."},{"key":"key2020123000175997200_b9","unstructured":"Ho, Y.\n                and \n                  Wang, H.L.\n                (2008), \u201cApplying fuzzy Delphi method to select the variables of a sustainable urban system dynamics model\u201d, International Conference of the System Dynamics Society, Athens, pp. 1-21."},{"key":"key2020123000175997200_b10","doi-asserted-by":"crossref","unstructured":"Jordaan, E.\n                (2006), \u201cInadequately self-critical: Rwanda's self-assessment for the African peer review mechanism\u201d, African Affairs, Vol. 105 No. 420, pp. 333-351.","DOI":"10.1093\/afraf\/adi124"},{"key":"key2020123000175997200_b11","doi-asserted-by":"crossref","unstructured":"Kaufmann, D.\n               , \n                  Kraay, A.\n                and \n                  Mastruzzi, M.\n                (2003), \u201cGovernance matters iii: governance indicators for 1996-2002\u201d, available at: www.worldbank.org\/wbi\/governance\/govdata2002 (accessed 20 December 2013).","DOI":"10.1596\/1813-9450-3106"},{"key":"key2020123000175997200_b12","doi-asserted-by":"crossref","unstructured":"Kanbur, R.\n                (2004), \u201cThe African peer review mechanism (APRM): an assessment of concept and design\u201d, Politikon, Vol. 31 No. 2, pp. 157-166.","DOI":"10.1080\/0258934042000280706"},{"key":"key2020123000175997200_b13","doi-asserted-by":"crossref","unstructured":"Klir, G.\n                and \n                  Yuan, B.\n                (1995), Fuzzy Sets and Fuzzy Logic, Vol. 4, Prentice Hall, NJ.","DOI":"10.1109\/45.468220"},{"key":"key2020123000175997200_b14","unstructured":"Linstone, H.A.\n                and \n                  Turoff, M.\n                (2002), The Delphi Method: Techniques and Applications, Addison-Wesley Publishing Company Inc., Reading, MA."},{"key":"key2020123000175997200_b15","unstructured":"Lin, J.\n               , \n                  Li, T.\n               , \n                  Zhao, Z.\n               , \n                  Zheng, W.\n                and \n                  Liu, T.\n                (2012), \u201cAssessment on power system black-start schemes based on entropy-weighted fuzzy comprehensive evaluation model\u201d, Power System Technology, Vol. 36 No. 2, pp. 115-120, p. -."},{"key":"key2020123000175997200_b16","doi-asserted-by":"crossref","unstructured":"Lu, Z.\n                and \n                  Shen, Y.\n                (2011), \u201cThe study on venture capital project appraisal using AHP-fuzzy comprehensive evaluation methods\u201d, International Journal of Advancements in Computing Technology, Vol. 3 No. 8, pp. 50-56.","DOI":"10.4156\/ijact.vol3.issue8.6"},{"key":"key2020123000175997200_b17","unstructured":"Masterson, G.\n                (2005), \u201cAn analysis of the implementation of the African peer review mechanism in Ghana, Kenya and Mauritius\u201d, Electoral Institute for Sustainability of Democracy in Africa (EISA), Occasional Paper, No 29."},{"key":"key2020123000175997200_b18","unstructured":"Masterson, G.E.T.\n                (2004), Governance Quality and Government Commitment to the NEPAD African Peer Review Mechanism, EISA Johannesburg."},{"key":"key2020123000175997200_b19","doi-asserted-by":"crossref","unstructured":"Okoli, C.\n                and \n                  Pawlowski, S.D.\n                (2004), \u201cThe Delphi method as a research tool: an example, design considerations and applications\u201d, Information & Management, Vol. 42 No. 1, pp. 15-29.","DOI":"10.1016\/j.im.2003.11.002"},{"key":"key2020123000175997200_b20","unstructured":"Pedrycz, W.\n                (1993), Fuzzy Control and Fuzzy Systems, Research Studies Press Ltd, Taunton, Summerset."},{"key":"key2020123000175997200_b21","doi-asserted-by":"crossref","unstructured":"Peidro, D.\n               , \n                  Mula, J.\n               , \n                  Poler, R.\n                and \n                  Verdegay, J.\n                (2009), \u201cFuzzy optimization for supply chain planning under supply, demand and process uncertainties\u201d, Fuzzy Sets and Systems, Vol. 160 No. 18, pp. 2640-2657.","DOI":"10.1016\/j.fss.2009.02.021"},{"key":"key2020123000175997200_b22","doi-asserted-by":"crossref","unstructured":"Qiu-Ying, L.\n               , \n                  Hai-Feng, Q.\n                and \n                  Bao-Sen, W.\n                (2011), \u201cStudy of the supply chain operational risk based on fuzzy comprehensive evaluation\u201d, Journal of Convergence Information Technology, Vol. 6 No. 10, pp. 71-78.","DOI":"10.4156\/jcit.vol6.issue10.10"},{"key":"key2020123000175997200_b23","unstructured":"RAND\n                (2011), \u201cDelphi method\u201d, available at: www.rand.org\/topics\/delphi-method.html (accessed 9 November 2013)."},{"key":"key2020123000175997200_b24","doi-asserted-by":"crossref","unstructured":"Saaty, T.L.\n                (2000), Fundamentals of Decision Making and Priority Theory with the Analytic Hierarchy Process, Vol. 6, Pittsburgh RWS Publications.","DOI":"10.1007\/978-94-015-9799-9_2"},{"key":"key2020123000175997200_b25","doi-asserted-by":"crossref","unstructured":"Sarkanjac, S.J.\n                and \n                  Dukovska, S.C.\n                (2013), \u201cElection candidates fuzzy multi-agent recommender system\u201d, Journal of Intelligent and Fuzzy Systems, Vol. 25 No. 4, pp. 941-734.","DOI":"10.3233\/IFS-120696"},{"key":"key2020123000175997200_b26","doi-asserted-by":"crossref","unstructured":"Schmidt, R.C.\n                (1997), \u201cManaging Delphi surveys using nonparametric statistical techniques\u201d, Decision Sciences Journal, Vol. 28 No. 3, pp. 763-774.","DOI":"10.1111\/j.1540-5915.1997.tb01330.x"},{"key":"key2020123000175997200_b28","unstructured":"Shiguang, Z.\n                (2012), \u201cThe fuzzy comprehensive evaluation method of civil servants in the application of evaluation\u201d, International Proceedings of Economics Development and Research, IPEDR, Hengshui, pp. 46-49."},{"key":"key2020123000175997200_b30","unstructured":"Sun, M.\n               , \n                  Li, T.\n               , \n                  Ji, B.\n               , \n                  Jiao, Y.\n                and \n                  Tang, S.\n                (2012), \u201cEvaluation research on assessment of clinical nursing teaching quality based on fuzzy comprehensive evaluation method\u201d, Journal of Convergence Information Technology, Vol. 8, pp. 82-91."},{"key":"key2020123000175997200_b31","unstructured":"Von Altrock, C.\n                (1995), Fuzzy Logic and Neuro Fuzzy Applications Explained, Prentice-Hall, Englewood Cliffs, NJ."},{"key":"key2020123000175997200_b32","doi-asserted-by":"crossref","unstructured":"Xiaoyan, L.\n               , \n                  Guoping, H.\n                and \n                  Xuan, M.\n                (2010), \u201cResearch on evaluation model applied in recruitment process of civil servants\u201d, Proceedings of 1st International Conference on Computer Application and System Modeling (lCCASM 2010), IEEE Computer Society, Taiyuan, pp. 228-232.","DOI":"10.1109\/ICCASM.2010.5622331"},{"key":"key2020123000175997200_b33","doi-asserted-by":"crossref","unstructured":"Zadeh, L.A.\n                (1965), \u201cFuzzy sets\u201d, Information and Control, Vol. 8 No. 3, pp. 338-353.","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"key2020123000175997200_b34","doi-asserted-by":"crossref","unstructured":"Zhen-min, Z.H.O.U.\n               , \n                  Xue-chao, W.\n                and \n                  Ke, Z.\n                (2011), \u201cWater environment evaluation based on fuzzy comprehensive method\u201d, Second International Conference on Mechanic Automation and Control Engineering (MACE), IEEE, Inner Mongolia, pp. 2813-2815.","DOI":"10.1109\/MACE.2011.5987571"},{"key":"key2020123000175997200_frd1","doi-asserted-by":"crossref","unstructured":"Shao, C.\n                (2009), \u201cThe implication of fuzzy comprehensive evaluation method in evaluating internal financial control of enterprise\u201d, International Business Research Journal, Vol. 2 No. 1, pp. 210-214.","DOI":"10.5539\/ibr.v2n1p210"},{"key":"key2020123000175997200_frd2","doi-asserted-by":"crossref","unstructured":"Sivanandam, S.N.\n               , \n                  Sumathi, S.\n                and \n                  Deepa, S.N.\n                (2007), Introduction to Fuzzy Logic Using MATLAB, Springer, New York, NY.","DOI":"10.1007\/978-3-540-35781-0"}],"container-title":["Kybernetes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/K-03-2014-0049","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/K-03-2014-0049\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/K-03-2014-0049\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:47:11Z","timestamp":1753393631000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/k\/article\/43\/8\/1193-1208\/265259"}},"subtitle":[],"editor":[{"given":"Dr","family":"Mourad Oussalah","sequence":"first","affiliation":[]},{"given":"Professor","family":"Ali Hessami","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2014,8,26]]},"references-count":34,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2014,8,26]]}},"alternative-id":["10.1108\/K-03-2014-0049"],"URL":"https:\/\/doi.org\/10.1108\/k-03-2014-0049","relation":{},"ISSN":["0368-492X"],"issn-type":[{"type":"print","value":"0368-492X"}],"subject":[],"published":{"date-parts":[[2014,8,26]]}}}