Beruflich Dokumente
Kultur Dokumente
Mohammad Alawamleh
Engineering Management, Industrial Engineering, the Un iversity of Jordan
Queen Rania AL- Abdullah Street A mman-11942, Jordan
awamleh m@uni.coventry.ac.uk
Abstract- This paper will detail the methodology used to conduct for meeting the research objectives. The main issues with
the risk management in virtual organization research. The which this research is concerned are the sources of risk that
research this paper describes is an applied research aiming to are intrinsic to Virtual Organisation (VO) co llaborations, how
find practical solutions to a problem that exists in reality rather they relate to each other and how important they are.
than being a research that is concerned with theory only. In the
first section there will be an introduction and overview of the The area to be researched for this study is comp lex and
complex study and the vital need for an innovation design and challenging and therefore the design of it needs to be
systematic approach to deal with the area of risk with. In the innovative in order to meet the challenges. A systematic
second section, the research objectives will be summarised to give
approach was taken, using the research methodology which
directions to the rest of the research. In the third section, the
design of the research includes primary and secondary research. will be fu lly exp lained in th is paper.
The approaches including quantitative, qualitative data and
triangulation discussion are taken place in the forth section. II. RESEARCH AIM
Section five will deal with the research methods used for this The aim o f this research is to give support to evaluate
kind of research, describing how the research has been collaboration as well as the risks that exist for network
undertaken using combination and triangulation of qualitative enterprise collaboration, to p rovide the means to carry out
and quantitative methods and providing a summary of assessment of risks across the network, and to analyse the
Warfield’s IS M and S aaty’s ANP before the conclusion to end
results of those calculations that impact on either the network
the paper.
or the partners in enterprises doing that by identifying those
Keywords- Risk; Virtual Organization; VO; ISM; ANP; risks that are intrinsic to collaboration between SM Es, to
Networking; SME identify any relationships between the sources of those risks
and to identify what potential impact they have. A further
I. INT RODUCTION contribution is made by using tools (ISM and ANP) to enable
The literature makes it clear that the problem that is being SMEs to understand the inter-relationships of risk sources and
discussed is hypothesized as being within the area of risk. The in that way, to provide a means to manage such risks.
research this paper describes is an applied research aiming to
find practical solutions to a problem that exists in reality In order to undertake this research, it has been necessary to
rather than being a research concerned with theory only. The use both quantitative and qualitative methods for the study of
opinion of Hakim (1987) is one with which the researcher the research objectives. For this reason there is a focus on the
agrees, namely that the difference between research into collection and analysis of both quantitative and qualitative
theory and research into what she calls ‘policy’, in reality data. In order that a balanced check could be developed, this
exists only as a matter of emphasis. According to her, the research was divided into four phases:
chief aspects distinguishing policy research fro m theoretical 1. identification of risk sources in virtual organizat ion
research are as follo ws: collaboration through the use of the literature review and a
“an emphasis on the substantive or practical importance of questionnaire to collect the opinions of experts;
research results rather than on merely ‘statistically significant’ 2. a questionnaire survey to collect information for
findings, and second, a multi-disciplinary approach which in Interpretive Structural Modeling (ISM);
turn leads to the eclectic and catholic use of any and all
research designs which might prove helpful in answering the 3. a questionnaire survey to collect information for
questions posed” (Hakim, 1987) Analytical Network Process (ANP);
The literature review, as previously stated, is crucial to the 4. data collected fro m interview that was based on case study.
research, since it provides the informat ion that allows the
researcher to come to a definition of the problem wh ich is III. RESEARCH DESIGN
being researched into, and it is therefore usually the init ial step According to Kothari (2005), research methodology
for any research study and that applies to this study also. provides a means of systematically solving the research
problem as well as providing an underlying structure for the
The phrase “research methodology” refers to the methods research process by means of taking log ical steps through the
used to undertake research as well as to the logic that appropriate stages. This research methodology has been
underpins those methods. However, each key concept that is planned in such a way that it will achieve the research
to be assessed though the use of the research methodology objectives through the use of the effective collection of data
must be fully understood and the framework for the and its analysis together with validation of the same. This
formulat ion of the results must be defined, before the procedure will make possible the continuous collection of the
methodology to undertake the research can be devised. This is knowledge that is necessary for the research process.
also an aid in reach ing an understanding of the information
that needs to be collected in order to address the problem or Where the purpose of any research is clear, it is possible to
A questionnaire that is sent through the post or using an weights of these risk sources. The respondents to the
email can be sent over a much wider geographical area than questionnaire must be able to understand the questions in the
one that is administered personally. Cost can be minimized, way that the researcher intends, have access to the information
both in terms of data collecting and of processing, and it is needed to answer them, be willing to answer them, and
free fro m having bias exerted by presence of the researcher. actually answer them in the form called for by the question. It
Since in this instance the experts that were to be questioned may therefore be necessary to alter the language of the
are located over a wide geographical area, the use of the question so that respondents find it understandable and
internet to send the questionnaire was adopted. unambiguous (Robson, 2002).
Three questionnaires based on questions were designed to Questionnaires have both advantages and disadvantages.
obtain the respondents’ views on the relat ionships and the Table (I-2) illustrates the main advantages and limitations.
TABLE I-2 ADVANTAGES AND LIMITATIONS OD QUESTIONNAIRES (ROBSON, 2002)
Advantages Limitations
Less expensive than other methods Do not allow probing or clarification
Produce fast results Motivate respondents to participate
Can be completed at the respondent’s convenience Researcher does not know whether the intended person answered the questions
Anonymity Impossible to check question order followed
Less opportunity for bias No opportunity to collect further information via observation
Stable, consistent, uniform measure No supervision therefore partial response possible
Objectivity Questionnaire requires simple questions to be asked
Wide Coverage Not as good for providing new insights and ideas as interviews
It does not require a trained interviewer Low response rate to questionnaires
Although accepting the potential weaknesses of the case The case study inquiry as defined by Yin (1994):
study model, its strengths were compatible with being used to
examine the research question. The research is appropriate for • is able to cope with the technically d istinctive situation
case study methodologies because “the focus is on a which will have a number of variab les proving of mo re
contemporary phenomenon within some real-life context” interest than data points are able to, giving one result;
(Yin, 1994). Making a similar point Mitchell (1983) states that • relies on many sources for evidence with data needing to
by choosing to undertake a case study, the researcher has come together as in triangulation, g iving another result;
acknowledged the potential that the case study has to illustrate • the preparatory development of theoretical propositions to
a particular theoretical princip le. A lso the use of a qualitative guide data collection and analysis wh ich is beneficial to a
case study methodology has been supported by the emp irical case study.
work that has been done and Yin (1994) suggests the use of a
case study in circu mstances where the researcher specifically To summarize, the important points of case study research
needs to deal with context. are that (Robson, 2002):
Eisenhardt (1989), when examin ing the approach taken in 1. a strategy, i.e. a stance or approach, rather than a method,
a number of research studies that have used this method, such as observation or interview;
concludes that the combination of methods that are used, 2. concerned with research, in a broad sense and including,
including historical records, internal documents, quantitative for examp le, evaluation;
analysis, interviews and observations, constitutes the strength 3. emp irical in that it relies on the collection of ev idence in
of this approach with the validity of the findings being relation to what is happening;
underpinned by corroboration and triangulation. Today, rather
than being seen as an a preparatory undertaking to quantitative 4. about the particular: a study of that specific case;
studies that have limited value in their own right, case studies 5. focused on a phenomenon in context, typically in
are considered to be a valid form of enquiry (Sarantakos, 1998; situations where the boundary between the phenomenon
Robson, 2002). Their validity is particularly justified in a and its context is not clear;
situation where the context of the research is too complicated 6. undertaken using mult iple methods of evidence or data
for survey studies or experimental approaches, but where the collection.
researcher wishes to investigate the structure, processes and
outcomes of a single unit (Sarantakos, 1998). The points listed above support the view that case study is
very appropriate for research into the risks in VOs.
In real life situations, it is not always possible to separate
phenomenon and context, but the case study employs a set of C. Control 2k as a Case Study
technical characteristics, including data collection and data Along with their numerous advantages, virtual
analysis strategies, which can be seen as its defining features. organizations (VOs) together with the virtual integration of
Loss of Communication
• The experience gained from Control 2K case study has supplied the evidence that where enterprises make it easier for there to be
frequent interaction and communication using video conferencing and emails, this leads to enhanced cooperation.
• Poor communication has been significantly detrimental to trust and therefore damaging to relationships, with partners not feeling
able to place reliance on work, demonstrating that any unreliable partner impedes progress.
• Control 2k also made it clear that communication is crucial to collaboration and without it there is, in effect, no relationship.
• Ontology is concerned with the structure of relationships and with the relationships existing between subsets and therefore the use
of different ontologies will have an impact on the collaboration agreement. Where the collaboration agreement itself is poor
communication will suffer, with inaccurate communication having potentially more adverse effects than no communication at all.
Re search
• Communication between partners is made easier where the structure and design of the VO is clear since the partners will be aware
Findings
of the common framework.
• Information sharing is made possible by effective communication and it is also possible to establish good trust.
• Communication is so critical where it is the only link between the independent and dependent risk sources, between geographic
locations, between cultures and ontology differences, between inadequate collaboration agreement and structure and design, and in
circumstances where differences between partners have led to problems with design and structure.
• Loss of communication may result in adverse impacts on other apparently dependent risk sources, such as lack of top management
commitment, of trust and information sharing, as well as bidding simultaneously for several VOs, and having lack of knowledge
about the risks involved and engaging in a poor selection of partners.