AUDIT - Information Audit Theory Vs Practice

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

ARTICLE IN PRESS

International Journal of Information Management 28 (2008) 150–160


www.elsevier.com/locate/ijinfomgt

The information audit: Theory versus practice


Steven Buchanan, Forbes Gibb
Graduate School of Informatics, University of Strathclyde, 26 Richmond Street, Glasgow G1 1XH, UK

Abstract

This paper presents and discusses five information audit (IA) case studies, which tested the application and usability of an IA
methodology. The studies also trialled an IA scope matrix and incorporated process modelling. The main strengths of the IA
methodology were found to be the logical structuring of stages, provision of a comprehensive toolkit, and the flexibility to remove stages
not relevant to the client brief. A limitation of the methodology was found to be its lack of instructional depth. The IA scope matrix was
successfully trialled, and process modelling proved extremely valuable, encouraging participant involvement by focusing on readily
understandable aspects of day-to-day work, and providing an organisational model of information flow.
r 2007 Elsevier Ltd. All rights reserved.

Keywords: Information audit; Information resource management; Information strategy; Information systems; Process modelling

1. Introduction siveness and applicability of the methodology; and


secondly, three further studies conducted by independent
This is the final paper in a series of three providing a parties to test usability. This paper is, in part, a response to
comprehensive review of the information audit (IA). The Botha and Boon’s (2003) call for more methodologies to be
first paper in this series (Buchanan & Gibb, 2007) examined tested in practice.
role and scope, while the second (Buchanan & Gibb, 2008)
reviewed key methodological approaches. This paper 2. Stage one methodological testing
presents and discusses case studies from the field, focused
upon application of the Buchanan and Gibb (1998) IA Two audits conducted by the authors are presented here
methodology. This methodology has five main stages: as suitable test cases. It should be noted that neither study
was conducted solely for the purposes of methodological
1. Promote: communicating the benefits of the audit, testing as in both instances the organisations had requested
ensuring commitment and cooperation, and conducting IAs. As a consequence, the scope of the IA was dictated
a preliminary survey of the organisation. not by the auditor but by the brief provided by the
2. Identify: top-down strategic analysis followed by identi- organisation, with the methodology and approach then
fication of information resources and information flow. tailored accordingly. While this removed the opportunity
3. Analyse: analysis and evaluation of identified informa- to establish a controlled test case it ensured that the IA met
tion resources and formulation of action plans. the requirements of the participating organisation and
4. Account: cost/value analysis of information resources. maintained confidence in test results by removing the
5. Synthesise: reporting on the audit and development of opportunity for the auditor to scope the IA to suit the
the organisation information strategy. methodology, rather than the requirements of the partici-
pating organisation.
The case studies are presented in two stages: firstly, two The tool utilised for scope setting was the IA scope
studies conducted by the authors, which tested comprehen- matrix (Buchanan & Gibb, 2007), which identifies two key
dimensions to IA scope: firstly, component, which identi-
Corresponding author. fies the key orientations of an IA based upon Earl’s (2000)
E-mail address: steven.buchanan@cis.strath.ac.uk (S. Buchanan). information strategy taxonomy (information management,

0268-4012/$ - see front matter r 2007 Elsevier Ltd. All rights reserved.
doi:10.1016/j.ijinfomgt.2007.09.003
ARTICLE IN PRESS
S. Buchanan, F. Gibb / International Journal of Information Management 28 (2008) 150–160 151

information technology, information systems, information Management Technology Systems Content


content1); and secondly, perspective, which identifies the
required organisational view (strategic, process, resource). Strategic

Process
2.1. Study one
Resource

Case study one was conducted within a University


department consisting of 37 staff, 50 researchers, and 340 Fig. 1. The IA scope matrix (Buchanan & Gibb, 2007).
students. At the time, the department was responding to a
university wide directive to better manage information preliminary survey step, which allowed the auditor to make
resources. In consideration of this directive, the sponsor a valuable preliminary assessment of the level of awareness
wanted to know what his information resources were, how and value of information among staff. The survey found
effective information flow was within the department, and evidence of poor organisational cohesion (the department
what was required to improve information flow. However, appeared to work in small, very loosely coupled groups),
when discussing the scope and stages of the IA at the initial and staff alluded to disparate administrative systems and
meeting (facilitated by the IA scope matrix), the sponsor procedures.
also indicated that he would like to conduct a strategic
review of the department’s overall goals and objectives, 2.1.2. Identify
and wanted to involve staff as much as possible in this There are six steps to this stage, which were completed in
process. To meet these requirements the IA was scoped to a workshops with the working group: definition of mission,
predominantly strategic orientation, but to include both environmental analysis, definition of organisational struc-
process and resource elements (see Fig. 1). Described ture, cultural analysis, identification of general information
another way, the IA would focus on strategic objectives, flow, and identification of information resources.
and then on those information resources and information With regard to recommended tools, Abell (1980), Porter
flows key to the achievement of those objectives. During (1980), Pellow and Wilson (1993), and PEST analysis were
this meeting the sponsor also stated that he did not require all successfully utilised to: define the business of the
costing of information resources and that the IA was to be organisation, review objectives, and conduct environmen-
completed in 12 weeks across the summer academic recess. tal analysis. The department’s mission was confirmed as
The IA methodology was tailored to these requirements part of this exercise, which was described as: ‘‘to produce
by removing the account stage, and establishing a working high calibre graduates through the best available standards
group to participate in a series of strategy-oriented work- of education, founded on a base of excellence in theory and
shops during the identify stage, supplemented by interviews practice of the subject, and advancement of knowledge
with further members of staff during the analyse stage to through research’’. The mission statement provided overall
validate working group output and to explore further strategic direction to guide more detailed objectives, and
information resource use and flow. also described the department’s main activities and key
values.
2.1.1. Promote The next step was to define the organisational structure,
There are three steps to this stage: firstly, conference or which is, according to Buchanan and Gibb (1998), the
seminar to communicate the purpose of the IA to staff; step where process modelling can substitute for more
secondly, passport letter to staff from sponsor encouraging traditional mapping of organisational structure. While an
cooperation; and thirdly, preliminary organisational survey organisational structure is necessary to define reporting
by auditor. Largely due to the previously noted time lines and to organise physical assets, an overemphasis on
constraints, this IA bypassed step one and went straight to organisational structure can create barriers to effective
step two, which it was felt could substitute for step one to a information flow and inadvertently encourage staff to
large degree. Step three occurred as per the guidelines. operate in silos, thereby constraining the overall value that
The sponsor sent out a passport letter, via email, to all can be generated by the enterprise. A process view
staff, introducing the auditor, outlining the purpose and transcends these structural boundaries as it forces the
benefits of the IA, and providing a high level summary of enterprise to look at ‘‘end-to-end’’ work and information
the schedule (effectively combining steps one and two by flow, illustrating how discrete areas must co-operate in
providing much of the information that would have been order to achieve end goals and/or overall customer
communicated by step one). The email also invited satisfaction. It was therefore deemed desirable to adopt a
volunteers to participate in the working group. Initial process view of the organisation; however, although
meetings with potential working group members, supple- Buchanan and Gibb (1998) identify process modelling
mented by early discussions with the sponsor, acted as the as an approach, they do not recommend any particular
tool or approach. As a consequence, Ould’s (1995)
1
Adapted from ‘information resource’ as per Gibb, Buchanan, and Shah STRIM process modelling methodology was identified
(2006). and (successfully) utilised.
ARTICLE IN PRESS
152 S. Buchanan, F. Gibb / International Journal of Information Management 28 (2008) 150–160

One of the initial steps in STRIM is to establish an Table 1


overall picture of the organisation. Workshop participants Objectives, critical success factors (CSF) and measures
identified seven high-level processes within the department Objective: provide a course portfolio taking account of the dynamic and
(classified according to Ould, 1995): diverse requirements of stakeholders

1. Undergraduate teaching (core) CSF Measure


2. Post graduate teaching (core) Funding SFC, grants, sponsorships, studentships
3. Research (core) Industrial links Sponsorships, placements, projects,
4. Consultancy (support) employment, student prizes
5. Administration (support) Course relevance Course reviews, graduate employment
figures
6. Facilities management (support)
Graduate knowledge Graduate employment figures, graduate
7. Strategic management (management) tracking (alumni)
Market knowledge Competitor figures, market trends,
The next step would be to map each process from start recruitment trends
to finish, identifying individual activity and associated Professional accreditation Accreditation bodies
Course range Applications, entry standards
inputs/outputs. However, this can be a time consuming
activity (Ould, 1995) and as previously noted, the IA was to
be completed in 12 weeks. Consequently, it was recom-
mended by the auditor that a key process should be definition for each sub-process, identified issues, and could
identified and prioritised with the possibility of one or substitute for, or to be used as the basis for, more detailed
more follow on exercises for the remaining processes, either process modelling (decomposition) at the next level.
as a continuation of the IA, or conducted internally by It should be noted that no database was developed for
members of the working group. the preliminary IR inventory associated with this stage as
In order to prioritise a process, there were three impo- the development effort was felt to outweigh the benefits
rtant considerations: the current and potential contribution (inventory was collated as simple MS Word tables).
of each process towards achieving the departments mission
(e.g. core value-adding processes versus support processes); 2.1.3. Analyse
the resources consumed or utilised by each process There are four steps to this stage, which were completed
(e.g. does the resource requirements or utilisation of through combination of survey, workshop, and auditor
resources give cause for concern); and the time, cost, and analysis: evaluation of information resources, production
management commitment required to model each key of detailed information flow diagrams, production of the
process (e.g. given a choice, start big or small?). The preliminary report, and formulation of action plans.
prioritised process was undergraduate teaching. As well as Identified process owners were surveyed (interviews) to
being a core process of the department, a number of discuss and validate the process model, to identify more
problems had already been identified by workshop comprehensively key information resources (based on the
participants during earlier discussions. preliminary inventory), and to model information flow for
The objectives, critical success factors (CSFs) and sub-processes. Participants were also asked to assign a
measures for the prioritised process were then identified. value on a scale of 1–5 to each identified information
Table 1 provides an example for the ‘‘provide a course resource according to its relative strategic importance or
portfolio taking account of the dynamic and diverse contribution to the associated process:
requirements of stakeholders’’ objective.
5: the information resource is critical to the process.
The next step was to develop a lifecycle model of the
4: the information resource provides significant benefits or
prioritised process identifying the sub-processes within
adds value to the process.
(see Fig. 2). The model was developed and refined
3: the information resource contributes directly to this
(iteratively) in four stages: identification of processes,
process but is not essential.
identification of linkages between processes, identification
2: the information resource provides indirect or minor
of key inputs and outputs, identification of process owners.
support to this process.
For the purposes of the IA, information flow was captured
1: the information resource is not presently used or has no
as part of this modelling step in a manner similar to Orna’s
perceived benefits.
(1990) flow-based approach through the identification of
key information inputs and outputs.
Workshop participants were then asked to describe the Information flow is illustrated in Fig. 3 for the course
function and key activities of each sub-process, and to development sub-process. The values assigned to each
identify any problems they associated with the sub-process. information resource are the mean values. The diagrams
This information was captured on a process description were developed based upon simple input/output models
template, which was developed by the auditor during this similar to Orna’s (1990) flow based approach, as per
study (see Table 2). These textual descriptions provided Buchanan and Gibb’s (1998) recommendations.
ARTICLE IN PRESS
S. Buchanan, F. Gibb / International Journal of Information Management 28 (2008) 150–160 153

1.1. Develop
Course

1.4. Manage
1.2. Market 1.3. Validate
Course
Course Course
Resources

1.7. Develop
1.5. Support 1.6. Recruit
Teaching
Students Students
Material

1.8. Manage
1.9. Deliver
Student
Course
Records

1.10. Assess
Students

1.11. Hold
Exam Board

1.12. Confer 1.13. Review


Awards Course

Note. Process numbers are for referencing purposes only

Fig. 2. Process model: 1. Undergraduate teaching (refined for illustrative purposes).

Table 2 information gaps were identified with both market course


Process description (illustrative): 1.1. Develop course (lack of market knowledge) and review course processes
Process: 1.1. Develop course
(lack of student employment knowledge)).
Purpose/function of this process The next step was to collate and evaluate the problems
1. To develop a full specification of a course from market need and identified by process owners in order to identify the key
statement of goals, to class descriptors and regulations, within information problems experienced by the department
identified constraints (e.g. resources) (captured as textual descriptions/statements). These were:
2. To modify the design of an existing course following output of a
review, or modifications to market need, or course constraints
complex and disparate information systems; duplicated
effort, unnecessary data entry, and inefficient data proces-
Key activities (or sub-processes) performed as part of this process sing; knowledge gaps; lack of standardisation including
1.1.1. Propose course structure several ad hoc or informal processes; no formal policy
1.1.2. Develop detailed course design statement, procedures, or operational guidelines for the
1.1.3. Produce course specification and regulations, etc.
management of information resources; and a predomi-
Problems/difficulties associated with this process nantly paper culture.
Obtaining industry partners The preliminary report was then prepared and distrib-
Complex interactions with other courses uted to the working group in preparation for formulation
Uncertainty of market assessment, etc. of action plans to improve identified problematic situa-
tions. Buchanan and Gibb (1998) refer to Checkland and
Schole’s (1990) soft systems methodology as a method
Analysis of information flow with process owners made to deal with complex, unstructured, or poorly defined
it possible to evaluate information use, information situations, but this was not adopted firstly because it was
requirements, and gaps in information (for example, felt that, through the previous stages the problem had been
ARTICLE IN PRESS
154 S. Buchanan, F. Gibb / International Journal of Information Management 28 (2008) 150–160

INPUTS PROCESS/OWNER OUTPUTS

Standards &
routes to 5
registration

Staff loading Staff loading


UG
schedule 4 schedule 4
Director

SFC funding SFC funding


5 5

SAAS Develop SAAS


funding 5 Course funding 5

EPSRC EPSRC
funding 5 funding 5

Course
Course Course
Co-ordinator
review 5 review 5
report report

Course
approval 5

Fig. 3. Information flow: 1.1. Develop course.

well documented and defined; and secondly, that after  How important an influence it is on the objective
extensive process modelling the working group would not (identifying priority).
have welcomed another modelling exercise. Instead an adap-  What action is required (formulating action plans).
tation of force field analysis was adopted for this final work-
shop, as recommended by Buchanan and Gibb (1998), but The output of this step (particularly the action plans)
more commonly associated with a previous stage of the IA. was recorded for incorporation in the final synthesise stage,
Force field analysis (Lewin, 1947) was used to visually conducted by the auditors.
highlight the positive or negative impact each CSF had on its
associated strategic objective. Three steps were as follows:
2.1.4. Synthesise
1. Each objective was positioned on a scale of 0–100% The main output of this IA was the IA report, which
according to approximate group estimates of current included: revised strategic objectives and goals, a detailed
achievement of the objective. process model for undergraduate teaching, a series of
2. Associated CSFs (see Table 1) were identified as either associated information flow diagrams, and the identifica-
strengths or weaknesses based on evaluation of the tion and evaluation of key information resources.
previously identified process and information problems. The key IA recommendations were: to establish an
For example (see Fig. 4), for the ‘‘provide a course information policy, to initiate systems analysis to rationa-
portfolio taking account of the dynamic and diverse lise and manage disparate administrative database and
requirements of stakeholders’’, professional accredita- information systems, and to establish an intranet/content
tion was considered a strength, but market knowledge management system.
was considered a weakness. The IA was completed on schedule within the allocated
3. For each CSF, a shaded bar identified its relative 12-week period. Four members of staff participated in the
strength or weakness. workshops and a further nine in interviews. Twenty-two
attended the post audit meeting. In total, the resource
Finally, each weak CSF was then examined to determine: requirement for the participating organisation was 22
full time equivalent (FTE) days (not including post
 Why it is a weakness (referring to the identified audit meeting). Auditor time for this IA amounted to 15
problems). FTEs.
ARTICLE IN PRESS
S. Buchanan, F. Gibb / International Journal of Information Management 28 (2008) 150–160 155

Provide a course portfolio taking account of the dynamic and diverse requirements of
stakeholders.

Current Position (estimate)

0% 100%
STRENGTH WEAKNESS

Funding
Graduate Knowledge
Industrial Links
Market Knowledge
Course Relevance

Course Range & Level 

Professional Accreditation

Fig. 4. Force field analysis.

2.1.5. Participant feedback and auditor observation The sponsor wanted the IA to further explore these
Sponsor and participant feedback was extremely posi- problems and produce a series of recommendations which
tive. A post audit meeting was held with the working group could be incorporated into a planned change management
and sponsor, which explored participation and perceived programme. The organisation’s business strategy was to be
value of IA output. The strengths of the IA, as stated by taken as a given, as outlined in their Corporate Strategy
participants, were as follows: document; however, given that two of the four recommen-
dations from the organisational review related to process
 Staff benefited from the facilitated workshop approach. issues, it was agreed that major processes should form the
The structured top-down process-based approach (and background to the IA prior to more detailed analysis of
tools/techniques adopted) was simple to follow, greatly information usage and flow. Similar to case study one, the
increased participant understanding of department goals sponsor stated that he did not require costing of informa-
and requirements, and helped illustrate the role of tion resources. The audit was to be completed in eight
effective information management. weeks so as not to delay the planned start date for the
 Through the working group, wider interviews and change programme.
regular communications, staff felt involved at all stages. To meet these requirements the IA was scoped to be
 The short timeframe facilitated quick results, and limited primarily resource orientated but to include the process
the impact on staff. Focusing on a prioritised process perspective (see Fig. 5).
shortened the project duration, and demonstrated max- The IA methodology was tailored to these requirements
imum value by focusing on the area of greatest perceived by once more removing the account stage. In-depth
impact. Process descriptions for sub-processes substituted interviews followed by a structured survey were the main
for more time-consuming process modelling. data gathering methods.

Notably, systems support staff immediately recognised 2.2.1. Promote2


the value of IA output to systems analysis, particularly the The sponsor sent out a passport letter via email to all
process models and information flow diagrams. This aligns staff, introducing the auditors, outlining the purpose and
with the authors’ recommendations for greater synergy in benefits of the IA, and providing a high level summary of
this area (Buchanan & Gibb, 2007). the schedule of activity. The initial meetings with potential
participants to explain the IA process, supplemented by
2.2. Case study two early discussions with the Director, once again acted as the
preliminary survey step of this stage. The survey found
For case study two, the participating organisation was a staff frustrated with information flow, organisational
public body within the arts sector consisting of 90 staff. communication, and ICT provision.
The agency had recently undergone an external review,
which had identified, at a high level, several issues with the 2.2.2. Identify
management and processing of information and had been As per the brief, business strategy was to be taken as a
critical of their core management information system. The given with no strategic analysis required. This removed the
review had recommended that the organisation: become need for the initial two steps of this stage. However, it
more transparent and accountable, reduce time to process
applications, streamline evaluation and approval processes, 2
Summaries for each of these respective stages will not be repeated
and improve communication between stakeholders. (see Sections 2.1.1–4).
ARTICLE IN PRESS
156 S. Buchanan, F. Gibb / International Journal of Information Management 28 (2008) 150–160

Management Technology Systems Content


Opinions and issues gathered during the interviews were
mapped to the process with which they were most
Strategic associated, rather than simply to the functional units from
Process
which the interviewees were nominated (interviewees were
provided with the list of processes in advance). Process
Resource information was captured (which included verification of
the processes) and subsequently documented according to:
Fig. 5. The IA scope matrix (Buchanan & Gibb, 2007). description of process, inputs, outputs, and associated
issues. The template used (see Table 3) was an evolution of
should be noted that the auditor did conduct key document the one developed for the first case study (see Table 2),
analysis to confirm strategy and to provide overarching capturing more descriptive information than its predeces-
strategic direction, and that this is a recommended step in sor in lieu of detailed process modelling (including the
these instances. process cycle or sub-process of the process, which would
This stage, which as per the brief, would focus on facilitate later modelling if required). Information flow was
information use and flow, was completed primarily also captured textually through definition of process inputs
through in-depth interviews and a structured survey. Initial and outputs.
interviews were held with two senior managers to discuss Interviews were then followed by a questionnaire, which
general information use and flow (e.g. initial exploratory was distributed to all members of staff. The questionnaire
discussion), and to identify processes at a high-level. focused on the following aspects of user role and
Fourteen key processes were identified, discussed and information use:
classified:
1. Main responsibility
1. Administering funding applications (core) 2. Other important activities
2. Administering grants (core) 3. Distribution of activity (talking to people, using a
3. Developing arts strategies (core) computer, handling paper)
4. Performing advocacy (core) 4. Contacts
5. Disseminating information (core) 5. Importance and accessibility of sources of information
6. Servicing customer enquiries (core) 6. Proportion of information that is sent out from
7. Performing audits and compliance (management) internal and external sources
8. Developing corporate strategy (management) 7. Proportion of information that is received from
9. Managing estates (support) internal and external sources
10. Managing financial resources (support) 8. The usefulness, frequency and difficulty experienced in
11. Managing human resources (support) receiving information
12. Managing information resources (support) 9. The usefulness, frequency and difficulty experienced in
13. Performing research (support) sending information
14. Providing secretarial support (support) 10. Serious barriers when using or sharing information
11. Quality of information
Processes were captured, but not modelled, as this was 12. Current and future preferences
not part of the brief. The focus was on capturing process 13. Awareness of information related policy and proce-
information rather than process modelling, which would dures
have been impractical regardless given the limited time-
frame. Similar to case study one, Ould’s (1995) methodol-
ogy was followed, although adapted to describe rather than Respondents could complete the questionnaire on screen
model process (and proving amendable to this adaptation). and return it via email, or print it out and return it via
Follow on interviews with a further 11 (representative) internal post. Thirty-eight of the 90 questionnaires
members of staff were semi-structured open-ended discus- distributed were completed and returned (a 42% response
sions framed around the following questions: rate).
As previously discussed, information use was to be pri-
1. What information do you use in your job? marily identified through in-depth interview and structured
2. What are the key barriers to obtaining and sharing this
Table 3
information?
Process description template
3. What do you do with this information?
4. What information do you supply to colleagues? Process:
5. How could your job be made easier from an information Description:
perspective? Lifecycle:
Inputs: Outputs:
6. What works well: what are examples of best practice in Issues:
this area that could be built upon?
ARTICLE IN PRESS
S. Buchanan, F. Gibb / International Journal of Information Management 28 (2008) 150–160 157

survey. In practice, the interviews provided an opportunity Table 4


to identify and explore processes in more depth, while the Identifying common themes
structured survey provided more detailed data regarding 1. Dissemination of information (internal)
information use, flow, and value, which was then statis-
tically analysed and graphically presented in the final Issues Requirements
report. In combination, the interviews and survey provided
 Too much e-mail is distributed on a  Better targeting of
a comprehensive profile of information use and flow. scatter-gun basis. e-mail.
 E-mail is often distributed without  E-mail etiquette.
2.2.3. Analyse guidance on how it should be  Understanding of costs
handled. to receiver need to be
As previously noted, information flow was captured as  People are unaware of certain key demonstrated.
part of the process descriptions, the analysis of which developments (both internal and  Online alerts.
naturally preceded the evaluation of information resources, external).  Automatic posting of
as process provides valuable context, and respects the top-  Different versions of documents can new documents and
exist. proposals on intranet.
down nature of the Buchanan and Gibb (1998) methodo-
 Director requires key figures to be  Key statistics on
logy. One other variation from Buchanan and Gibb’s pushed to desktop. applications, grants,
methodology is that no preliminary report was produced,  Content and structure of intranet overall financial
purely due to time constraints (but key findings were and web-site needs to be agreed. position, etc.
verified). It is also important to note that although a degree  Comprehensive coverage
and commitment of
of quantitative data was provided by the structured survey,
departments.
this stage predominantly involved qualitative data analysis.
Miles and Huberman (1994) identify three major phases to Recommendations
qualitative data analysis: data reduction, data display, and 1. Corporate information policy document required which, interalia,
conclusion drawing and verification, which were incorpo- defines how e-mail should be used, and establishes clear accountability
and ownership of information.
rated into this stage.
2. An intranet should be established as a matter of priority.
Analysis of the findings from the in-depth interviews and 3. An e-bulletin or news area should be a feature of the intranet where
survey identified several shared issues and requirements, key developments could be announced.
which through the process of data reduction, were grouped 4. An EIS should be considered which extracts figures from underlying
and categorised as follows: systems.
5. Web content should include: corporate information, policy
information, news information, jobs information. key external links,
1. Dissemination of information (internal) funding information, publications and administrative documents, plus
2. Dissemination of information (external) facilities to register, provide contact information, and complete
3. Information management and organisation applications forms and audit forms online.
6. The intranet should have similar coverage (but including documents
4. Information acquisition
for internal circulation only) plus access to underlying systems.
5. Research and query handling
6. Funding
7. Organisational issues
8. ICT
the IA scope for this IA (see Fig. 5). In summary, these
recommendations were:
Each category of findings was displayed in tabular
format as illustrated in Table 4. The complete sets of tables  Management
were discussed with a representative selection of partici- o Create an enhanced information service
pants as part of the conclusion drawing and verification o Develop a corporate information policy
step (substituting for one of the key purposes of the o Define information processes and accountability
preliminary report, e.g. confirmation of findings). Findings o Create a Chief Information Officer (CIO) role at
were accepted and verified, all emergent conclusions agreed senior management level
with.  Content
o Specify an information architecture to organise and
2.2.4. Synthesise navigate information
The key outputs of this IA were: identification, descrip- o Enhance research and monitoring of the external
tions and classification of key organisational processes; environment and make accessible to staff and
process-based analysis of information flow, an inventory of stakeholders
key information resources; and detailed action plans and o Define information flows and processes integral to
recommendations. The recommendations were then further core and peripheral functions
extrapolated and categorised according to Earl’s (2000)  System
taxonomy of information strategy components to provide o Two new related database components are required
an overarching strategic framework and to be traceable to to support critical data requirements: one to manage
ARTICLE IN PRESS
158 S. Buchanan, F. Gibb / International Journal of Information Management 28 (2008) 150–160

contacts, and one to hold statistical data for detailed 3. Stage two usability trials
analysis, decision support, and responding to external
mandatory requests Three usability trials were conducted in total. All three
o Create mechanism for completing grant applications auditors had no previous IA experience, but all had
and audit forms online (including website upgraded successfully completed post-graduate level studies in
to an extranet) Information Management and were about to embark on
o Develop a content/document management system careers within the information profession (two were
o Establish a single contacts application accessible employees of the audited organisations). All were volun-
to all tary participants invited to participate through an online
 Technology University forum, which described the proposed research.
o Create a central intranet, accessible to all, based on For the usability trials, volunteering organisations were
clear ownership and accountability for documents invited to participate through a letter and/or email to the
o Technologies should be implemented which facilitate appropriate head of business, explaining the proposed
browser-based intranet access to extract information research and outlining the IA process. Similar to the stage
from underlying systems one studies, IA scope and approach was dictated by the
o Establish an extranet brief provided by each organisation. Scope was set by
o Create an electronic log form on the intranet auditor and client utilising the IA scope matrix.
The author adopted an observational, non-participatory
The IA was completed on schedule within the allocated role throughout each trial. Once each trial was completed,
8-week period. Fifteen members of staff participated in semi-structured interviews were held with each auditor to
interviews and a further 38 completed the questionnaire. discuss the general IA experience and usability of the IA
Eighteen attended the post audit seminar. In total, this methodology.
IA required approximately 12 FTEs from the auditor, For the first of the usability trials, the participating
and 5.75 FTEs from the participating organisation organisation was a public body in the education sector. The
(not including the post audit meeting). A notable observa- organisation had recently completed a small, high-level
tion was the significantly reduced resource requirement knowledge audit, as a precursor to the development of a
(from 22 FTEs to 5.75 FTEs) for the participating knowledge strategy, which had highlighted several general
organisation where interviews replaced workshops information management problems and shortcomings. In
(and strategic analysis was out of scope). However, the parallel to the knowledge audit, the organisation was also
time saving for the auditor was less dramatic (from 15 to initiating a process-reengineering project to look at new
12) as some workshop savings were offset by the need to ways of developing new products and services, with the
prepare for and conduct multiple interviews. dual goals of promoting greater reuse of existing products/
services, and reaching markets faster with new products/
2.2.5. Participant feedback and auditor observation services. The findings of the knowledge audit had serious
The overall IA experience could once again be described implications for the success of this new process, so more
as positive. Interviewees appeared comfortable with the IA detailed investigation of information flow and require-
process, and welcomed the opportunity to consider ways in ments was called for.
which to improve organisational processes and information In the initial scoping session, the sponsor confirmed that
management. In the post-report seminar, which was the IA should focus on the product and service develop-
provided for the senior management team (the majority ment process, and identify and evaluate associated
of which had participated in the interviews), there were two information resources (a process oriented IA). The sponsor
notable points of feedback: viewed the IA as a follow on activity from the knowledge
audit, which had included strategic analysis; consequently,
 Staff expressed confidence in the methodological process the sponsor felt there was no need for this activity as part
undertaken to conduct the IA, considering it to be both of the IA identify stage. The sponsor also did not require
understandable and comprehensive. the account stage. The primary means of investigation
 Staff appreciated the two levels of recommendations, established by the auditor was in-depth interviews,
and the use of Earl’s taxonomy to structure and simplify supplemented with a follow-up questionnaire, and includ-
the information strategy. ing analysis of key documents provided by the sponsor.
The final output was the information report for the
The shift from in-depth process modelling to capturing prioritised process, which included: the product and service
process descriptions for all organisational processes development process model and sub-process descriptions,
worked well and is recommended. The only exception process-based information flow models, key information
would be where participating organisations include re- resources, issues and requirements, and recommendations.
quirements in their brief which call for process modelling; For the second usability trial, the participating Uni-
for example, resolving specific process-related problems, versity department was only 12 months old and had been
automating manual processes, etc. formed from the merger of five existing non-academic
ARTICLE IN PRESS
S. Buchanan, F. Gibb / International Journal of Information Management 28 (2008) 150–160 159

service departments (the merger had arisen from the techniques for data gathering in all cases were interviews
recommendations of an organisation wide review which and questionnaires, which aligns with the findings from
had called for increased synergy and coordinated effort previous published case studies (Buchanan & Gibb, 2008).
across the five departments). The sponsor was primarily The IA scope matrix proved to be extremely useful when
focused on issues of integration, most notably to create tailoring the methodology as it helped the auditors to
synergy across individual units and to improve organisa- understand and focus the scope of the audit; and secondly,
tional communication and information flow. In the initial to identify appropriate tools and techniques to select for
walkthrough session between auditor and sponsor, a each of the stages (e.g. strategic analysis tools and/or
process-oriented approach was agreed as most appropriate, process modelling tools).
including mapping of information flow for core processes. However, while methodological flexibility was proven,
The sponsor felt this should take priority over detailed problems were noted by all three auditors regarding the
information resource inventory and analysis, and did not tools and techniques provided to support each of the
feel the need for the account stage. The sponsor acknowl- stages. The first auditor commented (Kassenova, 2005):
edged the importance of the promote stage and wished to
involve staff as much as possible in the IA processes. The author would recommend Buchanan & Gibb to
Again, the primary means of investigation was in-depth expand the level of details, as currently it is a
interviews, supplemented with follow-up questionnaire, summarised version and not easy to use, especially for
and including analysis of key documents provided by the people new to the information audit. All key stages
the sponsor. The final output was the IA report, which would benefit from templates, examples and case studies
included: organisation process model and process descrip- to support and explain how to use them y
tions; process-based information flow models; key asso- The second auditor commented (Roussakis, 2005):
ciated information resources; and recommendations.
For the third and final usability trial, the participating The significance of the (Buchanan & Gibb, 1998)
organisation was a private sector legal firm. The sponsor methodology is the initiation of tools and techniques
confirmed that the IA should focus on a single department to be followed during the stages of the IA process. The
within the organisation (the corporate library), and identify author feels the need to remark that it would have been
and evaluate information services and associated informa- more useful during the whole process if there were
tion resources. In contrast to the previous organisations, information concerning the use of the tools and the
which had all recently undergone either change or review, benefits of using them, in the IA process. y It is
this organisation was experiencing neither. The organisa- strongly believed that y for the benefit of the IA
tion simply wished to review its core information service. process (there is) publication of further research,
The sponsor felt there was no need for strategic analysis including analytic descriptions of tools and techniques.
as part of the IA identify stage, or for costing of If this occurs, then the author believes that the
information resources and/or associated services, which methodology can provide a standard approach to
consequently removed the need for the account stage. The information auditing.
sponsor indicated a preference for selected individual
interviews over workshops, as this was considered easier The third auditor commented (Martin, 2005):
to manage from a resource and cost management Were Buchanan & Gibb able to outline each of these
perspective. It was also agreed that an online structured external models within the text of their own methodol-
questionnaire would be developed for wider participation ogy, and how best to tailor it for the information audit
and feedback. There was no requirement for an informa- rather than for the more specific situations for which
tion strategy. The final output was the IA report, which they were designed, this would result in a more self-
included: service model, key information resources, service contained methodology. This would, in turn, make the
evaluation, and recommendations. extra reading an option rather than a requirement, and
In all three trials, selection of the Buchanan and Gibb permit the more time-constrained auditor the option of
(1998) methodology by the auditors was based on a more comprehensive audit.
perceived flexibility of approach and incorporation of
comprehensive tools and techniques to support each of the The main limitation of the methodology, from a user
IA stages. Tailoring of the methodology proved to be a perspective, was its lack of instructional depth, particularly
straightforward task with none of the auditors conducting with regard to tools and techniques; ironically considered a
the usability trials noting any problems. The methodology strength by each auditor during initial selection of the
proved extremely flexible in this respect, allowing the methodology. The auditors highlighted a particular need
auditors to tailor to individual requirements, with all three for further guidance regarding: strategic analysis; interview
trials adopting a similar tailored approach: promote preparation; process modelling; and qualitative data
completed in full, identify streamlined, analyse completed analysis. It is also highly likely that the account stage
in full, account omitted, and an IA report produced but would have presented similar challenges had it been
no information strategy produced. The dominant tools/ required by any of the participating organisations.
ARTICLE IN PRESS
160 S. Buchanan, F. Gibb / International Journal of Information Management 28 (2008) 150–160

4. Conclusions Checkland, P., & Scholes, J. (1990). Soft systems methodology in action.
Chichester: Wiley.
Earl, M. J. (2000). In D. A. Marchand, T. H. Davenport, & T. Dickson
The main strengths of the Buchanan and Gibb (1998)
(Eds.), Mastering information management (pp. 16–22). London:
methodology are the logical structuring of stages, provision Financial Times Prentice-Hall.
of the toolkit, and the flexibility to tailor the methodology Gibb, F., Buchanan, S., & Shah, S. (2006). An integrated approach to
to the brief. A weakness of the methodology is its limited process and service management. International Journal of Information
instructional depth; however, aside from process model- Management, 26, 44–58.
ling, direction is provided to appropriate tools and Henczel, S. (2001). The information audit: A practical guide. London:
K.G. Saur.
techniques for each of the stages/steps. Kassenova, A. (2005). Information audit at the British Council. Unpub-
The Buchanan and Gibb (2007) IA scope matrix has lished MSc dissertaion, University of Strathclyde.
proven extremely useful. Process modelling has also proven Lewin, K. (1947). Frontiers in group dynamics: Concepts, method, and
extremely valuable, encouraging user involvement by reality in social science; social equilibria and social change. Human
focusing on readily understandable aspects of day-to-day Relations, 1(1), 23–32.
Martin, E. (2005). Information audit at MacFarlanes Law Firm.
work, and providing an organisational model of informa- Unpublished MSc dissertation, University of Strathclyde.
tion flow. Earl’s (2000) IS taxonomy can also be used to Miles, M. B., & Huberman, A. M. (1994). Qualitative data analysis (2nd
structure recommendations and provide traceability back ed.). Newbury Park, CA: Sage.
to the IA scope matrix. Orna, E. (1990). Practical information policies: How to manage information
flow in organisations. Aldershot: Gower.
A notable observation was that none of the participating
Orna, E. (1999). Practical information policies (2nd ed.). Aldershot:
organisations felt the need for the account stage. As a Gower.
consequence this stage remains untested, but it also raises Ould, M. A. (1995). Business processes: Modelling and analysis for
the question as to whether or not formal accounting is re-engineering and improvement. Chichester: Wiley.
required for the purposes of information auditing. While Pellow, A., & Wilson, T. D. (1993). The management information
this research has not been extensive enough to be requirements of heads of university departments: A critical success
factors approach. Journal of Information Science, 19(6), 425–437.
conclusive on this matter, the evidence gathered thus far Porter, M. E. (1980). Competitive strategy: Techniques for analysing
does suggest that a formal account stage is not always industries and competitors. New York: Free Press.
necessary, and that simple value tables can substitute in Roussakis, C. (2005). Information audit at the Office of Marketing
those instances (aligning with the methodological ap- and Communication. Unpublished MSc dissertation, University of
Strathclyde.
proaches of both Orna (1999) and Henczel (2001)).

References Steven Buchanan is an Information Systems Lecturer in the Graduate


School of Informatics, University of Strathclyde. He has carried out
Abell, D. F. (1980). Defining the business: The starting point of strategic extensive consultancy work and research in the areas of information
planning. Englewood Cliffs, NJ: Prentice-Hall. strategy, enterprise architecture, information systems, and information
Botha, H., & Boon, J. A. (2003). The information audit: Principles and audits. He has worked across Europe and throughout Australasia for a
guidelines. Library Review, 53(1), 23–38. number of public and private sector organisations, spanning telecommu-
Buchanan, S., & Gibb, F. (1998). The information audit: An integrated nications, finance, education, government, and microelectronics.
strategic approach. The International Journal of Information Manage-
ment, 18(1), 29–47.
Buchanan, S., & Gibb, F. (2007). The information audit: Role and scope. Forbes Gibb is a Professor of Information Science in the Graduate School
The International Journal of Information Management (in press). of Informatics, University of Strathclyde. He has been involved in several
Buchanan, S., & Gibb, F. (2008). The information audit: Methodology major EU funded research projects (SIMPR, STAMP, AUTOSOFT,
selection. The International Journal of Information Management MIND) and teaches in the areas of information strategy, service
(in press). management and content management.

You might also like