Advertisement

Key Capabilities of CIOs and IT Managers for Strategic Competitive Advantage: A Qualitative Field Research

  • Cecilia Rossignoli
  • Alessandro Zardini
  • Francesca Ricciardi
Conference paper
Part of the Lecture Notes in Information Systems and Organisation book series (LNISO, volume 7)

Abstract

A growing stream of studies is concentrating on IT management value, i.e. on how value is created not (only) through IT investment and deployment, but (also, or mainly) through the way IT is idiosyncratically managed by each specific organization. This implies that the capabilities, behaviors and organizational role of CIOs and IT managers could be crucial for the creation of strategic value. Our research question is then the following: in the emerging scenario, shaped by e-business and cloud computing, how can the IT manager’s capabilities, behaviors and organizational role influence the generation of competitive advantage? To answer this question, we conducted an explorative study based on interviews to nine managers from as many Italian organizations. The interviews were recorded, transcribed and analyzed through coding. We found that the CIO is perceived as bound to change towards more hybridized roles, whilst the IT department structure is perceived as evolving towards a much deeper cooperation with external partners and with other departments of the organization; this may imply, for example, a matrix organizational re-design. Moreover, our interviews led to the identification of 15 features of the CIO/IT manager, that are perceived as important or crucial for the generation of competitive advantage. Most of these features imply outstanding relational capabilities on the part of the IT managers.

Keywords

IT management value CIO Capabilities Qualitative research Competitive advantage 

References

  1. 1.
    Kohli, R., Grover, V.: Business value of IT: an essay on expanding research directions to keep up with the times. J. Assoc. Inf. Syst. 9(1), 23–39 (2008)Google Scholar
  2. 2.
    Piccoli, G., Ives, B.: Review: IT-dependent strategic initiatives and sustained competitive advantage: a review and synthesis of the literature. MIS Q. 29(4), 747–776 (2005)Google Scholar
  3. 3.
    Melville, N., Kraemer, K., Gurbaxani, V.: Review: information technology and organizational performance: an integrative model of IT business value. MIS Q. 28(2), 283–322 (2004)Google Scholar
  4. 4.
    Ricciardi, F., Rossignoli C., Zardini, A.: Factors influencing the strategic value of IT: a literature review. In: Proceedings of Singapore ISSGBM Conference 2012. Lecture Notes in Management Science, Social Sciences and Humanities, vol. 7, pp. 86–91. Singapore, 30–31 Dec 2012, ISBN: 978-1-61275-048-4 (2012)Google Scholar
  5. 5.
    Rockart, J.F., Ball, L., Bullen, C.V.: Future role of the information systems executive. MIS Q. (6:4), Dec82(Special Issue 1982), 1–10 (1982)Google Scholar
  6. 6.
    Gibbons Paul L.: Separate Piece. CIO, section 1, Oct 1998, pp. 50–60 (1998)Google Scholar
  7. 7.
    Earl, M.J.: Are CIOs obsolete? Harv. Bus. Rev. 78, 2 (2000)Google Scholar
  8. 8.
    Enns, H.G., Huff, S.L., Golden, B.R.: CIO influence behaviors: the impact of technical background. Inf. Manage. (40:5), 467 (2003)Google Scholar
  9. 9.
    Brennan, J.: Seeing the whole board: valuable lessons in IT thought leadership—for the CIO and CEO. CIO Mag. September 1 (2002)Google Scholar
  10. 10.
    Ricciardi, F., Rossignoli, C., De Marco, M.: IT commoditization challenging the leadership of information systems managers: an emerging issue for information systems performances. In: Proceedings of the VIII Conference of the Italian Chapter of AIS, Rome, 28–29 Sept 2012Google Scholar
  11. 11.
    CIO Insight: The CIO role. Do you have the right stuff? Ziff Davis Media Inc. http://www.cioinsight.com/article2/0,1397,1551609,00.asp (2004)
  12. 12.
    The State of the CIO 2008. http://www.cio.com (2008)
  13. 13.
    Moffat Spitze, J., Lee, J.J.: The Renaissance CIO project: the invisible factors of extraordinary success. California Manage. Rev. 4(2), 72–91 (2012)Google Scholar
  14. 14.
    Dos Santos, B.L.: Information technology investments: characteristics, choices, market risk and value. Inf. Syst. Frontiers 5(3), 289–301 (2012)CrossRefGoogle Scholar
  15. 15.
    Han, H.S., Lee, J.N., Seo, Y.W.: Analyzing the impact of a firm’s capability on outsourcing success: a process perspective. Inf. Manag. 45(1), 31–42 (2008)CrossRefGoogle Scholar
  16. 16.
    Preston, D.S., Karahanna, E.: Antecedents of IS strategic alignment: a nomological network. Inf. Syst. Res. 20(2), 159–179 (2009)CrossRefGoogle Scholar
  17. 17.
    Benbya, H., McKelvey, B.: Using coevolutionary and complexity theories to improve IS alignment: a multi-level approach. J. Inf. Technol. 21(4), 284–298 (2006)CrossRefGoogle Scholar
  18. 18.
    Chen, Q.D., Mocker, M., Preston, S.P., Teubner, A.: Information systems strategy: reconceptualization, management, and implications. MIS Q. 34(2), 233–259 (2010)Google Scholar
  19. 19.
    Bharadwaj, S., Bharadwaj, A., Bendoly, E.: The performance effects of complementarities between information systems, marketing, manufacturing, and supply chain processes. Inf. Syst. Res. 18(4), 437–453 (2007)CrossRefGoogle Scholar
  20. 20.
    Liang, T.P., You, J.J., Liu, C.C.: A resource-based perspective on information technology and firm performance: a meta-analysis. Ind. Manage. Data Syst. 110(8), 1138–1158 (2010)CrossRefGoogle Scholar
  21. 21.
    Banker, R.D., Bardhan, I. Asdemir, O.: Understanding the impact of collaboration software on product design and development. Inf. Syst. Res. (17: 4), 352–373 (2006)Google Scholar
  22. 22.
    Ross, J.W., Beath, C.M., Goodhue, D.L.: Develop long-term competitiveness through IT assets. Sloan Manag. Rev. 38(1), 31–42 (1996)Google Scholar
  23. 23.
    Klein, R., Rai, A.: Interfirm strategic information flows in logistics supply chain relationships. MIS Q. 33(4), 735–762 (2009)Google Scholar
  24. 24.
    Ray, G., Wu, D., Konana, P.: Competitive environment and the relationship between IT and vertical integration. Inf. Syst. Res. 20(4), 585–603 (2009)CrossRefGoogle Scholar
  25. 25.
    Baskerville R., Spagnoletti P., Kim, J.: Incident-centered information security: Managing a strategic balance between prevention and response. Inf. Manage. (2013)Google Scholar
  26. 26.
    Corbin, J.M., Strauss, A.: Grounded theory research: Procedures, canons, and evaluative criteria. Qual. Soc. 13(1), 3–21 (1990)CrossRefGoogle Scholar
  27. 27.
    Glaser, B.: Theoretical Sensitivity. Sociology Press, London (1978)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Cecilia Rossignoli
    • 1
  • Alessandro Zardini
    • 1
  • Francesca Ricciardi
    • 2
  1. 1.State University of VeronaVeronaItaly
  2. 2.Catholic University of MilanMilanItaly

Personalised recommendations