RISK ANALYSIS IN AN EXTENDED ENTERPRISE ENVIRONMENT: IDENTIFICATION OF KEY RISK FACTORS IN B2B E-COMMERCE RELATIONSHIPS Vicky Arnold University of Connecticut/University of Melbourne Clark Hampton University of Connecticut Deepak Khazanchi University of Nebraska-Omaha Steve G. Sutton University of Connecticut/University of Melbourne September 2003 Preliminary Draft Please Do Not Quote Without Permission We gratefully acknowledge financial support from the Institute of Internal Auditors. RISK ANALYSIS IN AN EXTENDED ENTERPRISE ENVIRONMENT: IDENTIFICATION OF KEY RISK FACTORS IN B2B E-COMMERCE RELATIONSHIPS SYNOPSIS In October 2001, the International Federation of Accountants (IFAC 2001) released a proposed International Audit Standard on the impact of electronic commerce on the audit of financial statements. The proposal was accepted as an International Audit Practice Statement (recommended procedures—not required) in March 2002. The audit statement focuses on four aspects of ecommerce risks: (1) legal and regulatory issues, (2) transaction integrity, (3) transaction security, and (4) process alignment (IFAC 2001, 2002b). Sutton and Hampton (2003) note that this statement is critical in two respects: (1) it is the first explicit recognition by an audit standards board of potential risks exuding from e-commerce activities, and (2) while the first three issues are arguably covered under general internal control standards, process alignment emerged for the first time as a fundamental risk category in the audit of financial statements. Within the U.S., the Sarbanes-Oxley Act has brought IT and e-commerce risks to the forefront as companies struggle to address Section 404 requirements related to reporting on internal controls. Organizations are slowly coming to the realization that requirements under Sarbanes-Oxley extend internal controls within the audit context from direct controls over financial activities to a broader enterprise risk management frame that includes strategic, operational, reputational, regulatory, and information risks (Katz 2003; Banham 2003). In a recent survey of CIOs, the largest planned increases in expenditures related to investments in security and e-commerce initiatives despite tight IT budgets (Ware 2002). Ware further notes, “Companies will take steps to shore up their security to give customers and business partners peace of mind. More than half (56%) of the panelists plan to increase their spending on security software and only 6% plan to decrease spending in this area.” In this study, the focus is on identifying the critical risk factors that can be used to assess the impact of B2B e-commerce on overall enterprise risks. The Khazanchi and Sutton (2001) framework for B2B e-commerce assurance is applied as the organizing conceptual model for the study. The framework focuses on three primary risk categories: (1) technical level risks, (2) application level risks, and (3) business level risks. These categories encapsulate, but broaden, the three categories identified by IFAC (2002a) in a white paper released around the same time as the e-commerce audit practice statement was accepted—the three categories being (1) IT infrastructure, (2) IT applications, and (3) IT business processes. To identify a critical set of B2B risk factors, structured focus groups were conducted with three internal constituency groups (corporate groups consisting of IS security, internal IT audit, and e-commerce development managers) and two external constituency groups (ecommerce consultants and external IT auditors). Tests of consistency between the internal constituency groups and then between internal constituencies and each of the external constituency groups confirm strong agreement on the identified critical B2B risk factors. Tests were also conducted on the relative importance of the critical B2B risk factors with the only substantial inconsistencies existing at the internal constituency groups versus external IT auditors group for the business-level factors. This would appear to indicate that internal business concerns over ecommerce might not have the same prioritization as do external auditors assessing enterprise risk in a financial audit environment. 1 BACKGROUND Since electronic data interchange (EDI) capability was first implemented in organizations over 30 years ago, interorganizational systems have evolved and have steadily tightened the bond between customers and buyers. The resulting relationships are often viewed as partnering or collaborative relationships—particularly in the current Internet-driven business-to-business (B2B) e-commerce environment where buyers are increasingly dependent on suppliers to perform (McIvor et al. 2003). Nonetheless, the bulk of these interorganizational systems has been EDI-driven; and, over the past decade, researchers have begun to examine the benefits and costs that arise in such situations. Researchers increasingly find that the benefits of basic B2B relationships are negligible and the true benefits come from collaboration (Lee et al. 2003); without widespread adoption of B2B application there is little payback (Iacouvou et al., 1995). The result has been that many organizations that are in a preferred power position with their suppliers (e.g., automotive manufacturers) have a tendency to force suppliers to implement B2B capability (Teo et al. 2003). Yet, forcing key suppliers to implement B2B may lead to distrust which can inhibit voluntary use and extensions of B2B applications (Hart and Saunders 1997) and in the worst case degenerate into conflict and yield a worse rather than better business linkage (Kumar and van Dissel 1996). Still, to sustain competitiveness in the contemporary business environment, B2B integration is imperative (Kurnia and Johnston 2000), necessitating a greater focus on assisting business partners in integrating new technologies and/or carefully considering the capability and willingness of new business partners to engage in effective B2B integration (Angeles and Ravinder 2000). 2 This selection and/or integration of business partners has become only more critical as organizations have implemented a variety of strategies for reducing business cycle time—such as vendor managed inventory (VMI), just-in-time (JIT) manufacturing and quick response retailing (QR) (Khazanchi and Sutton 2001). In short, the impact is that suppliers and customers become vital components of the value chains in the emerging business environment where competition is increasingly supply chain versus supply chain rather than company versus company (Papazoglou et al. 2000). This competition of supply chains induces organizations to become more selective of their business partners and to attempt to lock-in these suppliers to ensure stability of the supply chain (Grieger 2003). As a result, many companies are limiting their number of suppliers in order to improve the coordination of value/supply chains and create relationships that transcend specific transactional relationships—a concept referred to as relationalism (Grover et al. 2002). The challenge is to develop and integrate the technology across the value chain that will support the integration of business processes, information standards and information systems of all partners in the value chain (Shin and Leem 2002). While the process can be painful and costly, the implementation of such technology ultimately cements the relationship between business partners and provides stability in value chain partnering relationships (Grover et al. 2002). Despite all the perceived benefits of forging integrated business relationships, for many organizations there is still some trepidation in entering into these relationships (Iacovou et al. 1995). This trepidation can come from costs, but even more frequently is a result of perceived enterprise risks. Kumar and van Dissel (1996) summarize these risks as the costs associated with exposure to being exploited in the relationship. These risks include transaction specific capital (i.e., investment by one party that has little or no value outside of the business relationship), 3 information asymmetries (i.e., problems in monitoring performance which yields risk to shirking by a business partner), and loss of resource control (i.e., resources that are transferred in a relationship that cannot be returned or controlled in the event of termination of the relationship). These risks primarily center on loss of investment, however, which can have negative financial ramifications for an organization but are not likely in most cases to cripple an organization. Yet, in an era where the focus has been on enhancing core business processes, outsourcing activities that other organizations can do better, and developing integrated value chains, breakdowns in relationships may have far greater ramifications than simply financial losses and/or inefficiencies (Sutton and Hampton 2003). For instance, in a just-in-time environment where a vendor is responsible for managing the materials and parts inventory, failure by the vendor to deliver parts for a prolonged period of time can potentially lead to extended shutdowns of manufacturing processes. These interruptions can put the manufacturing company at risk due to the inability to produce goods, inability to meet obligations downstream in the supply chain, loss of other business partners’ trust, and decline in general reputation. Such risks could potentially jeopardize an organization’s long-term standing. Various organizations have recognized the increased prevalence of such risks and have endeavored to meet the needs of various information users wishing to mitigate the risk of ecommerce across the value chain. Harbinger, Inc., for instance has evolved from simply a valueadded network provider supporting EDI transactions to become an information source on preparedness of potential partner organizations. Within the automotive industry, Harbinger now provides reports that highlight the B2B capability and the degree of integration with underlying business processes of various small- and medium-sized enterprises (SMEs) that serve as suppliers to the major U.S. auto manufacturers. The reports help automobile manufacturers 4 identify potential suppliers that are more likely to be able to operate in their just-in-time manufacturing environments and to more effectively monitor internal business risk from partner relationships (Yost 1999). Similarly, the International Federation of Accountants (IFAC), which sets international audit practice guidelines, has recently released two documents that advise external auditors to evaluate the business risks that an organization assumes through e-commerce relationships. This risk assessment should be done as part of an overall assessment of the client organization’s business risks, financial viability, and going concern status (IFAC 2001; 2002a, 2002b). The wide variety of concerns in B2B integration led Massetti and Zmud (1996) to the conclusion, “What seems absent is a rich, tactical understanding that links strategic expectations regarding [B2B] with operational plans for potential implementation.” The focus of Massetti and Zmud’s study was on deriving factors for assessing the benefits from B2B linkage. As interorganizational systems have become more tightly coupled, a focus on the opposite side of the equation (i.e. associated business risks) seems particularly critical. While prior research has addressed a variety of general risk factors in interorganizational systems linkages (e.g., Papazoglou et al. 2000, Unal 2000, McIvor et al. 2003, Hempel and Kwong 2001, Westland 2002, Kumar and van Dissel 1996), a focused effort on identifying the specific risk factors within various general categories can aid managers in risk management, aid auditors and monitoring organizations in the measurement of potential risk, and inform future development and innovation in interorganizational systems. The purpose of this study is to explore and identify the key risk factors involved in ecommerce driven interorganizational systems that can potentially escalate an organization’s overall enterprise risk. This paper documents a study that targets directly the identification of the 5 key risk factors in B2B relationships. The paper uses the Khazanchi and Sutton (2001) model for B2B e-commerce assurance services as the conceptual model for viewing specific risk components. Initially, three structured focus groups were conducted with information systems security, IT audit, and e-commerce development staff from each of three large corporations that are heavy users of B2B e-commerce across the value chain in order to identify the key risks associated with these relationships and to determine whether a consensus exists across organizations as to what are the key risk factors. Two additional focus groups were conducted with an e-commerce consulting firm and an external audit firm in order to explore whether differences existed between corporate teams and external professionals. The results provide an agreed upon set of key risk factors for each of the three risk dimensions put forth by Khazanchi and Sutton (2001): (1) technical level risk, (2) application-user level risk, and (3) business level risk. The remainder of this paper is presented in four parts. First, an overview and discussion of the B2B e-commerce assurance service model is presented. Second, the structured focus group methodology applied in the study is discussed. The third part presents the results of the study and the fourth part discusses the implications of the results for e-commerce managers and researchers. THEORETICAL MODEL The Khazanchi and Sutton (2001) B2B e-commerce assurance model utilized in this study was developed based on an analysis of 90 SMEs that were engaged in EDI-based B2B relationships. The model was developed and refined using a combination of surveys, phone interviews and written descriptions from participating organizations and consists of three primary assurance components (see Table 1 and Figure 1): technical level assurance, application 6 user level assurance, and business level assurance. Each of these three levels is discussed further in the following subsections. [Insert Table 1 about here] [Insert Figure 1 about here] Technical Level Assurance Technical level B2B assurance deals with assisting decision makers in ensuring that the necessary technical B2B elements are in place and that integration with external and internal applications is feasible given the availability of financial and technological resources. This includes a variety of technical services such as selecting appropriate internal applications for B2B linkages, integrating multiple trading partners, mapping customer/supplier data for direct use in internal applications, ensuring that the business transaction process works and includes all electronic transaction sets, and using appropriate B2B intermediaries to support the processes. Review of B2B technical capability should also consider the level of integration with back office systems and the reliability of those systems in ensuring integrity and security of the data captured in B2B transmissions. (Khazanchi and Sutton 2001). As defined, technical level assurance captures a range of risks identified in various studies. The five key problems identified by Papazoglou and Tsalgatidou (2000) which hamper widespread use of e-commerce all fit in this category (i.e. incomplete implementations, rigid requirements for protocols, limited interoperability of systems, insufficient security, and lack of integration with business models). The technical level also embodies more general concerns such as cost effectiveness, reliability, security (Unal 2000), and trust in a partners control mechanisms (Tan and Thoen 2002). 7 Technical level risks may be of the greatest concern to SMEs who have been forced to adopt e-commerce with a limited number of partners (perhaps even one). It is also important to larger organizations that have significant concerns over partners’ controls related to data integrity and security which could lead to legal disputes over privacy and requirements for safe maintenance of data. Application-User Level Assurance The application-user level relates to ensuring that decision makers’ choices and rationale for B2B implementation are appropriate. Risks in this area focus on understanding potential benefits of B2B linkages, assessing the current business environment and internal processes, obtaining general information about B2B options, assessing organizational readiness for adopting B2B, relying on paper-based transactions for internal processes, dealing with impersonal nature of e-commerce transactions, and reliability of internal transaction processing. Finally, questions about the adequacy in preparation of an organization’s staff for B2B activities along with related education and training programs should be assessed. Application-user level risks include risks previously identified in the literature such as Angeles and Ravinder’s (2000) key factors for customers selecting among vendors for EDI relationships—i.e. readiness for high-level EDI, trading partner flexibility, and communication, and Iacovou et al.’s (1995) three factors affecting small organizations adoption of B2B ecommerce—i.e. perceived benefits of application, organizational readiness, and external pressure to adopt. These risks are of concern to SMEs who are considering adoption—including those under coercive pressures. However, larger organization may be particularly concerned about these risks relative to smaller business partners. Smaller organizations may not be able to integrate the 8 technology effectively in order to enhance flexibility in ordering and to further cut cycle times across the value chain. Weaknesses of a partner organization in either of these latter areas could warrant reconsideration by the dominant partner as to the long-term viability of the business relationship. Business Level Assurance Business level risks relate to an organization’s ability to appropriately reengineer traditional business processes to incorporate an e-commerce driven business . These risks may center around a variety of issues including the appropriateness of e-commerce for an organization, assessment of direct/indirect benefits actually being realized from e-commerce usage, adherence to legal requirements (electronic orders, signatures, trading partner agreements, information privacy laws, etc.), proper monitoring of data and transmission security/auditability, and appropriateness of workflow procedures to achievement of efficiency gains. Accordingly, internal control systems should be assessed for viability in assuring continuous maintenance of controls over privacy of data, reliability of systems, and security of electronic transmissions. (Khazanchi and Sutton 2001). The importance of the business level dimension has been noted in part in other recent research studies. Business model integration has been noted as a key concern by Papazoglou et al. (2000) and Hempel and Kwong (2001). Kumar and van Dissel (1996) emphasize the importance of individual partner’s performance when there is sequential interdependence among a chain of partners. Breakdowns by a single partner will inevitably affect adjacent partners in the sequential chain and may possibly impact all subsequent downstream partners in the value chain. Assessment of business level risks would appear to be of critical importance to organizations potentially at risk. All organizations should be concerned that their own systems is 9 properly implemented and that transactions are secure, electronic funds transfers are complete, internal recording of business transactions are accurate and complete, and inefficiencies are identified. At the same time, similar failures by business partners can also have major effects on an organization. Thus, risk assessment of partner systems is also of great importance— particularly as systems become increasingly complex and partners become increasingly dependent on each other for successful execution of the supply chain. Identifying Key Risk Factors The three components of the B2B e-commerce assurance model appear to provide a reasonable means for assessing risks associated with an organization’s B2B e-commerce activities. While the model provides a good conceptual foundation for examining e-commerce risks, understanding the key risk factors in each category is still general and non-specific. Identifying a set of specific factors for each of the three risk components could enhance the value of the model to managers and researchers assessing the riskiness of potential trading partners. Before the risks can be quantitatively measured, the specific risk factors that should be measured must be identified. The factors that make up the set of critical factors for assessing ecommerce risk within each of the three categories are unknown? Is there a consistent set of factors applicable to most or all organizations? In seeking to identify whether such a set of factors exist, this study adopts a philosophy consistent with that of total quality management (TQM). Such a philosophy is based on the belief that the best way to monitor and improve a process is to engage the individuals who regularly perform the process in the development of quality factors (Havelka et al. 1998). These individuals are in the best position to understand the key factors that affect a systems’ ability to function properly and in a quality manner (Lampe and Sutton 1994a). In the case of e-commerce 10 activities, five key constituencies are identified as being in a position to monitor and assess the processes. The three internal constituencies are e-commerce developers, IS security staff, and IT auditors. The external constituencies are e-commerce consultants (who develop, implement and maintain e-commerce systems) and external auditors (IT audit specialists who assess risk in assurance and audit engagements). Four key results are critical for risk factors identified by these various constituencies to be generalizable to other organizations. These four key results are: 1. Consistency among internal constituencies as to the critical risk factors for each of the three model components. 2. Agreement among internal constituencies as to the critical risk factors for each of the three model components. 3. Consistency between internal constituencies and each of the external constituencies as to the critical risk factors for each of the three model components. 4. Agreement between internal constituencies and each of the external constituencies as to the critical risk factors for each of the three model components. A methodology consistent with the TQM philosophy is proposed for purposes of identifying key risk factor. The proposed methodology is discussed in the following section. STRUCTURED FOCUS GROUP METHODOLOGY The research method used in this study has been adopted from Havelka et al. (1998). The methodology was originally adapted from Adam et al. (1986) and subsequently refined and validated in a series of studies examining key quality factors in auditing (Lampe and Sutton 1994a, 1994b, Sutton and Lampe 1991; Sutton 1993) and information requirements definition 11 (Havelka et al. 1998). The short form of the methodology as used by Havelka et al. is applied in this study for risk factor identification in e-commerce environments. Given the differences between quality factor identification and risk factor identification (albeit similar), validation testing is also completed using the data aggregated from the focus groups in this study. Focus Group Process The risk factor identification methodology uses a blend of focus groups with the structured approach of nominal group techniques (Van de Ven and Delbecq 1971; 1974). The method is based on the TQM concept that the important factors embedded in a process that impact success are most readily observable and identifiable by those individuals involved in the process (Adam et al. 1986). A four step structured focus group conducted over a single threefour hour session is used in this study to identify key risk factors impacting successful ecommerce processes across the three dimensions of technical, application-user and business level risk. The process is initially completed with internal constituency groups that include IS security staff, e-commerce developers, and IT auditors. Follow-up sessions are conducted with external constituency groups that include either external IT audit specialists or e-commerce consultants. The first step in the structured focus group is an open forum by the group participants to generally discuss their individual roles, the types of applications with which they have been involved, their perspectives on the success of e-commerce ventures, and the impact of ecommerce on their particular organization’s business and overall industry. This open discussion acclimates the various participants and group leaders (i.e. the researchers) to the terminology used by the various participants and their general perspectives as they enter into the group discussion. It also allows time to discuss the model for e-commerce and to assure there is consensus on the meaning of each of the model’s components. 12 The second step in the structured focus group consists of a silent brainstorming session at the individual level. The participants are provided with the component of interest (i.e. technical, application-user or business level risk) and asked to identify all factors that they believe have an impact on a successful e-commerce system/process. They are also instructed to consider all factors regardless of whether they may be characteristic of implementations at the initial start-up phase, integration phase, or mature phase (consistent with that prescribed by Khazanchi and Sutton 2001). The participants are further instructed that at this point they should focus on identifying all factors and not in trying to filter out any that they think might not be particularly critical.1 The participants list out their risk factors on a sheet of paper that includes a heading reminding them of the component of interest in the model at this stage of the process. The silent generation period provides time for adequate reflection, social facilitation (i.e. the tension created by watching others busily working and generating lists of risk factors), avoidance of interruption, avoidance of prematurely focusing on the first ideas generated by the group, sufficient time for search and recall, avoidance of competition, avoidance of status pressures, avoidance of conformity pressures, and avoidance of choosing between ideas prematurely (Delbecq et al. 1982). The third step is a round-robin recording of the ideas generated. An aggregate list of the participant’s identified risk factors is generated by taking one idea off each person’s list in a continuous around the room pattern until all participants’ lists are exhausted. As each risk factor is read out, one of the group leaders types the factor into a synthesizing document that is projected to the front of the room where all participants can view the composite list of risk factors. As each risk factor is read out, participants share in forming an understandable phrase 1 While participants are likely to focus on factors that mirror their personal experiences and, therefore, the industries in which they participate, the subjects were not instructed to limit their listing of factors to those they have faced nor those that would be specifically applicable to their industry. 13 representing the factor and an agreed upon definition of the factor (which is recorded off-screen by one of the researchers). The benefits of the round-robin approach to listing risk factors includes the following: equal participation in presentation of risk factor items, depersonalization of ideas from personalities as the list gets combined and grows, ability to deal with a large number of ideas, tolerance of conflicting ideas, encouragement of new risk factor generation based on fellow participant’s ideas, and provision of a written record and glossary of the risk factors presented (Delbecq et al. 1982). The second and third steps are briefly repeated to seek new risk factors that are identified based on ideas that derive from other participants’ generated lists of risk factors. The fourth step is to evaluate the long list of risk factors and identify a subset of factors that are considered particularly critical to the success of e-commerce processes. Each focus group participant, at the individual level, first sorts the list of risk factors into a list of critical factors versus those that are not critical risk factors. This process represents a Q-sorting approach (Kerlinger 1986). Subsequently, individual participants rank each of the critical risk factors s/he has selected based on importance to the model component being examined. This is an extreme version of the Q-sort whereby each item is essentially placed into a classification by itself (Sutton 1993). The four-step procedure is repeated for each of the three components in the model. After completion of the focus group, the researchers aggregate the rankings into a composite list of critical risk factors; and this composite list is used in subsequent analysis. There is evidence to support the use of this type of method for aggregating individual rankings into a composite group rating when the intent of the research is to generate a true group preference (Huber and Delbecq 14 1972; Sutton 1993). Thus, the output of the structured focus group is a consensus set of critical risk factors for each of the three components. Validation of the Methodology for Risk Factor Identification Recall from the discussion of the theoretical model that the robustness of the critical risk factors identified is contingent in large part by whether there is consensus between different organizations on the identified risk factors. The validity of the structured focus groups for risk factor identification is predicated on the belief that groups from different organizations will generate similar lists of critical risk factors for each of the model components. At the most fundamental level, there should be agreement among individuals in similar positions across different organizations—i.e. among IS security staff, e-commerce developers and IT auditors from each of the three organizations participating in the study. Stated in null form, the hypothesis relates specifically to the validation of the method and can be stated as: H1: The risk factors selected as critical by one organization’s focus group will be independent of those selected by another organization’s focus group. The perceptions regarding relative importance of each of the critical risk factors is also important as the two focus groups should not only feel similarly regarding the critical risk factors, but also the relative importance of the critical factors (i.e. the ranking). As such, H2 relates to the ranking of factors as a measure of the strength of agreement among the groups. H2: The importance placed on each of the risk factors selected as critical by one organization’s focus group will be independent of the importance placed on each of the risk factors by other organizations’ focus groups. From an analysis standpoint, each of the three components of the model is addressed separately since the focus groups also rank factors in each of the model components separately. This leads to three testable hypotheses: H2a: The importance placed on each of the technical level risk factors selected as critical by one organization’s focus groups will be independent of the 15 importance placed on each of the risk factors by other organizations’ focus groups. H2b: The importance placed on each of the application-user level risk factors selected as critical by one organization’s focus groups will be independent of the importance placed on each of the risk factors by other organizations’ focus groups. H2c: The importance placed on each of the business level risk factors selected as critical by one organization’s focus groups will be independent of the importance placed on each of the risk factors by other organizations’ focus groups. While the relationship among each of the organizations is important to the validity of the structured focus group in generating e-commerce risk factors, the breadth of the validity would be enhanced to the degree that an external e-commerce consulting group and an external IT audit group are also consistent in the identification of key risk factors. Similar to the examination at the internal constituency level, the relative ranking of risk factors further adds validity to the selected factors. Stated in null form, the hypotheses again relate specifically to extending the validation of the method and can be stated as: H3: The risk factors selected as critical by organizations’ focus groups will be independent of those selected by an e-commerce consultants’ focus group. H4: The importance placed on each of the risk factors selected as critical by organizations’ focus groups will be independent of the importance placed on each of the risk factors by an e-commerce consultants’ focus group. H5: The risk factors selected as critical by organizations’ focus groups will be independent of those selected by an external IT audit focus group. H6: The importance placed on each of the risk factors selected as critical by organizations’ focus groups will be independent of the importance placed on each of the risk factors by an external IT audit focus group. From an analysis standpoint, each of the three components of the model is addressed separately when considering the relative importance of the factors in H4 and H6. This leads to six testable hypotheses: 16 H4a: The importance placed on each of the technical level risk factors selected as critical by organizations’ focus groups will be independent of the importance placed on each of the risk factors by an e-commerce consultants’ focus group. H4b: The importance placed on each of the application-user level risk factors selected as critical by organizations’ focus groups will be independent of the importance placed on each of the risk factors by an e-commerce consultants’ focus group. H4c: The importance placed on each of the business level risk factors selected as critical by organizations’ focus groups will be independent of the importance placed on each of the risk factors by an e-commerce consultants’ focus group. H6a: The importance placed on each of the technical level risk factors selected as critical by organizations’ focus groups will be independent of the importance placed on each of the risk factors by an external IT audit focus group. H6b: The importance placed on each of the application-user level risk factors selected as critical by organizations’ focus groups will be independent of the importance placed on each of the risk factors by an external IT audit focus group. H6c: The importance placed on each of the business level risk factors selected as critical by organizations’ focus groups will be independent of the importance placed on each of the risk factors by an external IT audit focus group. Focus Group Participants Completion and validation of the methodology for identifying key e-commerce risk factors within the framework put forth by Khazanchi and Sutton (2001) requires the involvement of internal constituency groups involved in the development, implementation and evaluation of corporate B2B systems and along with the relationships with external constituencies (ecommerce consultants and external IT auditors) who facilitate the development and implementation, and/or the audit and assurance of such systems. The internal constituency groups were designed to capture the perspectives of e-commerce developers, IS security staff, 17 and internal IT/B2B auditors. Three internal constituency groups were selected for participation in an effort to get a diversified set of perspectives. 1. Group 1 was from a large insurance company that interacts with a variety of service providers, medical entities, and co-insurance partners. Five individuals participated in the group process representing the director of internal audit, an IS security officer, an audit supervisor, and two information systems managers (one of whom was an EDI specialist). 2. Group 2 was from a large food manufacturer that interacts with a variety of suppliers as well as a variety of customers including a number of very large chains such as Wal-Mart. Seven individuals participated in the group process with two from web services, an information security officer, auditor in charge of infrastructure reviews, one B2B application developer, one tech support officer for B2B applications and the director of internal audit. 3. Group 3 was from a large railroad and transportation company that deals with a large number of customers and ancillary transportation providers. Five individuals participated including three IT auditors with B2B experience, a project manager for e-commerce implementations, and a programmer involved heavily with the development and maintenance of the pricing exchange. The external constituency groups were selected based on the desire for additional external risk factor validation via e-commerce consultants and external IT auditors involved in assessing the impact of IT risk on overall enterprise risk. Two additional groups participated: 1. Group 4 was from a regional e-commerce consulting company specializing in the design and implementation of e-commerce systems. Four individuals participated including the 18 lead project managers in infrastructure implementation, database management, application design, and marketing services. 2. Group 5 was from a Big Four audit firm and consisted primarily of the partners and managers in IT audit of one region in the U.S. Six individuals participated including one partner, four managers, and the associate CIO for global firm operations. The five groups (three internal constituency and two external constituency) provide a rich source of data for identifying the key e-commerce risk factors. Active involvement by all group members yielded a long list of potential key factors that should be considered in assessing the business risk evolving from B2B relationships with business partner organizations. RESULTS OF THE VALIDATION TESTING Data analysis was conducted in accordance with the two-phase validation procedure examining first, the consistency among internal constituency groups, and second, internal constituency groups’ consistency with external constituency groups. Specifically, Phase I validation using internal constituency groups relates to H1 and H2, while Phase II validation with external constituency groups relates to H3-H6. The results provide support for rejecting all six null hypotheses, consistent with the expectations underlying the applied methodology. Phase I Validation: Internal Constituency Groups The structured focus group processes were completed independently with each of the three internal constituency groups consisting of a variety of e-commerce interested participants. The first condition necessary for reliance on the identified set of key factors is the existence of a high level of agreement between different groups in different corporate environments as to the factors selected as critical. To test H1, a chi-square test of independence is used. Because the chisquare test is designed to compare two groups, all pair wise combinations of the three groups are 19 tested. The chi-square test of independence uses a 2x2 contingency table that focuses on both the commonalities (items selected/not selected by both groups) and the differences (items selected by only one of the two groups) between the two organizations being compared. The results provided in Table 2 indicate significant agreement between all pair wise combinations in the selection of key e-commerce risk factors, leading to the rejection of H1. [Please insert Table 2 about here] While agreement on the selection of factors captures one dimension of consistency between the groups, a second dimension should also be considered—the relative ranking placed on each identified factor by each of the groups. To test H2, a Spearman’s rank correlation test is used. Because the groups ranked each of the three dimensions of the risk model (i.e. technical level, application user level, and business level) separately, the Spearman’s rank correlation test must accordingly be used within each dimension (i.e. H2a-H2c). Using rank values provides greater statistical power than does categorization by selected/not selected as is used in the chisquare test. Similar to the tests for H1, all pair wise combinations of the three groups are tested. The results provided in Table 3 indicate significant agreement on rankings of the key ecommerce risk factors between all pair wise combinations of internal constituency groups, leading to the rejection of H2a-H2c, and therefore H2. [Please insert Table 3 about here] In combination, the results from testing H1 and H2 indicate that there is agreement among groups from diverse organizations (i.e. insurance, food manufacturing, and transportation/logistics) on a set of critical factors affecting the overall enterprise risk from ecommerce relationships. This also implies that these critical factors can be used to assess the risk inherent in conducting e-commerce relationships with other organizations. These critical factors 20 should also be important to the external auditors of such organizations in making their enterprise risk assessments during audit planning and by e-commerce consultants who inherit related liability during development and implementation of such systems. This leads to the Phase II validation testing. Phase II Validation: External Constituency Groups Two external constituency groups were identified as major stakeholders having interest in e-commerce risks associated with corporate systems—consultants and external IT auditors. First, many such systems are developed and implemented by outside consultants. By assuming a certain level of responsibility for specific applications, e-commerce consultants are expected to be particularly alert to risks arising at the technical level and application-user level. Second and as noted earlier, IFAC international audit statements specify the importance of the external auditor assessing the implications of the risk from e-commerce systems on the assessment of overall enterprise risk during a financial statement audit. External auditors are expected to be particularly concerned with business level risks and the corresponding effect on the financial condition of the organization. The results of the structured focus groups conducted with e-commerce consultants and external IT auditors are compared individually with the aggregate results of the three internal constituency groups. Testing of H3 and H5 are the equivalent to that used in testing H1, but examine agreement by the e-commerce consultant group with the internal constituency groups and by the external IT auditor group with the internal constituency groups. As such, the same chi-square test of independence using a 2x2 contingency table focusing on both the commonalities (items selected/not selected by the internal constituency groups and the consultants [external IT audit] group) and the differences (items selected by only one of the 21 constituencies) is used. The results displayed in Table 2 indicate significant agreement by both the consulting group (H3) and the external IT audit group (H5) with the internal constituency groups, leading to the rejection of both hypotheses. While agreement on the selection of factors captures one dimension of consistency between the groups, with both the e-commerce consultants and the external IT auditors, the relative ranking of each identified factor remains an important dimension for assessing agreement. As such, Spearman’s rank correlation tests are again used to test H4 and H6 (agreement between the e-commerce consultant group and external IT auditor group, respectively, with the internal constituency groups). The tests are run separately for each level of the risk model (i.e. technical, application-user, and business) based on the separate ranking processes (i.e. H4a-H4c and H6a-H6c). The results provided in Table 4 indicate significant agreement on rankings of the key B2B e-commerce risk factors between the e-commerce consultant group and the internal constituency groups for both the technical level (H4a) and application-user level (H4b), but not significantly related for business level (H4c) risks. The results provided in Table 4 also indicate significant agreement on rankings of risk factors between the external IT audit group and the internal constituency groups for technical level risks (H6a), but only marginally significant agreement at the application-user level (H6b) and business level (H6c). While there is mixed evidence, on an overall basis there does seem to be reasonable support for rejecting H4 and H6. [Please insert Table 4 about here] In combination, the results for testing H3-H6 indicate that there is a set of risk factors that can be agreed upon between internal constituency groups and varied external constituency groups (i.e. e-commerce consultants and external IT auditors) that represent the critical factors 22 affecting the overall risk from B2B e-commerce relationships. This reinforces the belief that a set of key risk factors exists that could be used in assessing the risk inherited from such relationships. These risk assessments should be of importance to both internal and external stakeholders. CRITICAL B2B E-COMMERCE RISK FACTORS While the robustness of the methodology for identifying critical e-commerce risk factors is important to adding legitimacy to the identified factors, the primary purpose of this study is to identify the critical set of factors. Completion of the five sets of focus groups resulted in the identification of 49 key risk factors with 18 at the technical level (see Table 5), 16 at the application-user level (see Table 6), and 15 at the business level (see Table 7). [Please insert Tables 5, 6 & 7 about here] The technical level factors are listed in Table 5 along with a marking of each of the items identified as critical by each of the participant groups. Note that consistent with the test results for consistency 8 of the 18 factors are identified by at least 3 of the 5 groups. A review of the factors selected by the most groups is indicative of broad concern over security of access to applications and networks along with the appropriate level of expertise and change management controls to ensure continued security. Also of interests are the concerns by external constituencies over robustness of systems over time (both in terms of systems and personnel) that are not as prevalent among internal constituencies. The application-user level factors along with a marking of each of the items identified as critical by each of the participant groups are listed in Table 6. Consistent with the test results for consistency, 8 of the 16 factors are identified by at least 3 of the 5 groups. The factors at this level are less concentrated than for the technical level factors as a broad range of application 23 related issues are identified by multiple groups as critical, including: staffing issues and management champions, architecture compatibility and capacity issues, partner benefits and market sustainability, and testing for/controls over application reliability. While the external constituencies have more unique factors at the technical level (see Table 5), they appear to be much more in-line with the internal constituency groups in selecting critical risk factors at the application level. The business level factors along with the marking of each of the items identified as critical by each of the participant groups are listed in Table 7. Consistent with the results of the tests for consistency, the factor identification at the business level yields good consistency among the groups for identification of key factors (9 of the 15 factors are identified by 3 or more groups). As would be expected, broad range of issues are covered at the business level, including regulatory, legal, cost/benefit analysis, business process integration, due diligence, risk management, monitoring controls and management leadership in IT. Yet, despite the breadth there is strong agreement on the critical factors affecting business level risks. On the other hand, as might be expected, there is not necessarily strong agreement between internal constituencies and external constituencies as to the relative importance of the individual factors identified. DISCUSSION AND IMPLICATIONS In the emerging Internet-driven B2B environment, the true benefits appear to come from tight collaboration with trading partners (Lee et al. 2003), but at the same time significant enterprise risks emerge from the corresponding increased dependence on a smaller set of trading partners (Khazanchi and Sutton 2001; McIvor et al. 2003; Sutton and Hampton 2003). While prior research raises many concerns and recognizes a variety of general risk factors related to the tight coupling of interorganizational systems (e.g., Papazoglou et al. 2000; Unal 2000; McIvor et 24 al. 2003; Hempel and Kwong 2001; Westland 2002; Kumar and van Dissel 1996), the extant research does not provide a focused examination of specific factors that can be utilized by corporate chiefs for effective enterprise risk management, nor for auditors and other monitoring organizations that must evaluate the riskiness of B2B activities to the viability of the organization. The research reported in this paper focuses on the identification of critical factors that can be used by management, auditors and other related parties to monitor and assess the overall enterprise risk arising from B2B interaction with a particular focus on interorganizational systems. The study applies the Khazanchi and Sutton (2001) framework for B2B assurance, focusing across the three levels of risk: (1) technical level, (2) application-user level, and (3) business level risks. Based on a series of structured focus groups with internal constituency groups representing information systems security, internal IT audit, and e-commerce development and representing three diverse industries, a set of critical factors were identified for each of the three levels in the framework. The set of critical factors were further refined and validated using two external constituency focus groups (e.g. e-commerce consultants and external IT auditors). The results of the study show strong consistency between all of the groups in the identification of critical risk factors, strong agreement between internal constituency groups on the relative importance of factors. The results also reflect some difference between internal constituency groups and external constituency groups as to the relative importance of the factors. These statistical results support the desired objective of identifying a set of critical factors that are applicable across a broad range of organizations having concerns related to ecommerce activities. The 49 critical factors consisting of 18 technical level factors, 16 application user level factors and 15 business level factors would appear to provide broad 25 coverage of the important factors to be considered while at the same time maintaining a relatively parsimonious set of factors at each level. There are limitations to the research that should be considered when reviewing the output of the factor identification process. First, application of the structured focus group methodology necessitates the use of small groups. While attempts were made to gather data from a comprehensive set of constituencies within each of the internal and external groups, generalizations to other organization members and to other organizations cannot be assured. However, the use of a diverse set of organizations from different industries along with two unique external entities (e-commerce consultants and external IT auditors) should help minimize this risk. Second, consensus based measures do not necessarily assure accuracy even when highly experienced and knowledgeable participants are included. Third, many of the factors that have been identified have been previously noted in prior research, the business press and textbooks. However, many of the factors that were excluded as key risk factors by the participating groups have also been identified in such sources. The research presented here provides the additional information necessary to better understand the relative importance of various risk factors mentioned in various publications and provides guidance to managers, ecommerce developers and auditors on the selection of a more parsimonious set of factors that capture the key risk dimensions. The results provide insights that should be useful to managers, developers, auditors and other researchers. Our results should be of particular value to both corporate chief officers in addressing enterprise risk management concerns and information systems managers concerned with secure and effective interorganizational systems. While the factors provide a specific frame for viewing B2B risks, measures for each of the factors will need to be developed and tailored to the specific 26 interorganizational system of interest. Consideration should also be given as to which factors might be automated, which factors require human monitoring, and how this human monitoring might take place. For those measures that can be automated, continuous assurance mechanisms should be considered. This type of automated continuous assurance would seem particularly feasible at the technical level. For those factors requiring human monitoring, consideration should be given to whether such monitoring is possible and most desirable from internal IT auditors examining trading partners systems and operations, external auditors or other independent providers assure/certify trading partners, or some other alternative method. The key is that it would appear to be critical that corporate chief officers and information systems managers consider the risks that exude from interorganizational systems and take appropriate steps to mitigate such risks to an acceptable level. With the recent global spate of corporate frauds and mismanagement, there is certainly a heightened focus on overall enterprise risk management. The focus on enterprise risk management goes beyond just the concerns of corporate chief officers to the auditors who are saddled with the responsibility to protect the public interest. The results of this study provide a framework of e-commerce risk factors that should be considered under the broad guidelines of the IFAC audit statements on e-commerce risk assessment. Further, in the U.S. where national standards take precedence in guiding audits, the results provide guidance for further revision of SAS 70 on assurance over service organizations and SAS 94 on the impact of IT on internal control systems to encompass the impact of e-commerce trading partners on enterprise risk—a step that the recent release of SAS 98 intended to update the standards to address a changing risk environment did not encompass. Yet, clearly contemporary audit approaches that our focused on 27 business measurement and enterprise risk models should include consideration of the risks absorbed from such interorganizational relationships. There are also implications for researchers as further research on e-commerce risk is still of great need. While the research presented in this paper documents specific risk factors across each of the three levels in the assurance framework, there may be other characteristics of trading partner relationships that provide insight into why such risks fluctuate. For instance, Hart and Saunders (1997) found that differences in trust and power within EDI-based relationships were related to the diversity of transactions used between trading partners and imbalances could affect voluntary use of EDI. Such factors certainly could also influence many of the identified risk factors as trading partners weigh the expense of maintaining secure, integrated, and wellmanaged interorganizational systems. Understanding these relationships would be highly beneficial in attempts to control variations in risks that may affect overall enterprise risk— particularly to the degree that such factors help assess risks associated with a potential trading partner prior to entering into a relationship. Design science based research examining the methods for implementing continuous assurance systems for automated monitoring would also be beneficial. One challenge for organizations wishing to implement measures of these risk factors through an automated monitoring process is to determine a feasible means by which to implement monitoring across internet linkages, embedded in trading partners’ systems, without increasing the trading partners’ risk of systems failure or reduced integrity. Instantiation of a working system could aid practical implementation by helping to establish feasible alternatives. 28 REFERENCES Adam, E.E., Jr., Hershauer, J. and Ruch, W. Productivity and Quality Measurement as a Basis for Improvement. University of Missouri College of Business Research Center, Columbia, Missouri, 1986. Angeles, R. and Ravinder, N. “An Empirical Study of EDI Trading Partner Selection Criteria in Customer-supplier Relationships,” Information & Management (37), 2000, pp. 241-255. Banham, R. 2003. Fear factor: Sarbanes-Oxley offers one more reason to tackle enterprise risk management. CFO Magazine (June 1). Delbecq, A.L., Van de Ven, A.H. and Gustafson, D.H. “Guidelines for Conducting NGT Meetings,” in Organizational Behavior and the Practice of Management (4th Ed.), D.R. Hampton, C. E. Summer, and R.A. Webber (eds.), Scott, Foresman, and Company, Glenview, IL, 1982, pp. 279-298. Greiger, M. “Electronic Marketplaces: A Literature Review and a Call for Supply Chain Management Research,” European Journal of Operational Research (144), 2003, pp. 280-294. Grover, V., Teng, J.T.C. and Fiedler, K.D. “Investigating the Role of Information Technology in Building Buyer-Supplier Relationships,” Journal of the Association for Information Systems (3), 2002, pp. 217-245. Hart P.J. and C.S. Saunders (1997) Power and trust: Critical factors in the adoption and use of electronic data interchange. Organization Science 8(1): 23-42 Havelka, D., Sutton, S.G. and Arnold, V. “A Methodology for Developing Measurement Criteria for Assurance Services: An Application in Information Systems Assurance,” Auditing, A Journal of Practice & Theory (17), 1998, pp. 73-92. Hempel, P.S. and Kwong, Y.K. “B2B e-Commerce in Emerging Economies: i-metal.com’s Nonferrous Metals Exchange in China,” Journal of Strategic Information Systems (10), 2001, pp. 335-355. Huber, G. and Delbecq, A.L. “Guidelines for Combining the Judgements of Individual Group Members in Decision Conferences,” Academy of Management Journal (15), 1972, pp. XXXXX. IFAC (2001) Electronic Commerce Using the Internet or Other Public Networks - Effect on the Audit of Financial Statements (Proposed International Auditing Standard—International Federation of Accountants) October. IFAC (2002a) e-Business and the Accountant, (International Federation of Accountants), March. 29 IFAC (2002b) International Audit Practice Statement 1013, (International Federation of Accountants). Iacovou, C.L., Benbasat, I. and Dexter, A.S. “Electronic Data Interchange and Small Organizations: Adoption and Impact of Technology,” MIS Quarterly (December), 1995, pp. 465-485. Katz, D.M. 2003. What you don’t know about Sarbanes-Oxley: Snares, pitfalls, and trapdoors. CFO.com (April 22). Khazanchi, D. and Sutton, S.G. “Assurance Services for Business-to-Business Electronic Commerce: A Framework and Implications,” Journal of the Association for Information Systems (1), 2001, pp. 1-53. Kumar, K. and van Dissel, H.G. “Sustainable Collaboration: Managing Conflict and Cooperation in Interorganizational Systems,” MIS Quarterly (September), 1996, pp. 279-300. Kurnia, S. and Johnston, R.B. “The Need for a Processual View of Inter-organizational Systems Adoption,” Journal of Strategic Information Systems (9), 2000, pp. 295-319. Lampe, J.C. and Sutton, S.G. Developing Quality Measurement Systems for Internal Auditing Departments, Institute of Internal Auditors Research Foundation, Altamonte Springs, Florida, 1994a. Lampe, J.C. and Sutton, S.G. “Evaluating the Work of Internal Audit: A Comparison of Standards and Empirical Evidence,” Accounting and Business Research (Autumn), 1994b, pp. 335-348. Lee, S.C., Pak, B.Y. and Lee, H.G. “Business Value of B2B Electronic Commerce: The Critical Role of Inter-firm Collaboration,” Electronic Commerce Research and Applications (1), 2003, www.ComputerScienceWeb.com. Massetti, B. and Zmud, R. “Measuring the Extent of EDI Usage in Complex Organizations: Strategies and Illustrative Examples,” MIS Quarterly (September), 1996, pp. 331-345. McIvor, R., Humphreys, P. and McCurry, L. “Electronic Commerce: Supporting Collaboration in the Supply Chain?” Journal of Materials Processing Technology (6736), 2003, pp. 1-6. Papazoglou, M.P., Ribbers, P. and Tsalgatidou, A. “Integrated Value Chains and Their Implications from a Business and Technology Standpoint,” Decision Support Systems (29), 2000, pp. 323-342. Papazoglou, M.P. and Tsalgatidou, A. “Editorial: Business to Business Electronic Commerce Issues and Solutions,” Decision Support Systems (29), 2000, pp. 301-304. Shin, K. and Leem, C.S. “A Reference System for Internet Based Inter-enterprise Electronic Commerce,” The Journal of Systems and Software (60), 2002, pp. 195-209. 30 Sutton, S. G. “Toward an Understanding of the Factors Affecting Audit Quality,” Decision Sciences (January-February), 1993, pp. 88-105. Sutton, S.G. and C. Hampton. 2003. Risk assessment in an extended enterprise environment: redefining the audit model. International Journal of Accounting Information Systems 4(1). Sutton, S.G. and Lampe, J.C. “A Framework for Evaluating Process Quality for Audit Engagements,” Accounting and Business Research (Summer), 1991, pp. 275-288. Tan, Y.H. and Thoen, W. “Formal Aspects of a Generic Model of Trust for Electronic Commerce,” Decision Support Systems (33), 2002, pp. 233-246. Teo, H.H., Wei, K.K. and Benbasat, I. “Predicting Intention to Adopt Interorganizational Linkages: An Institutional Perspective,” MIS Quarterly (27:1), 2003, pp. 19-49. Ünal, A. “Electronic Commerce and Multi-enterprise Supply/Value/Business Chains,” Information Sciences (127), 2000, pp. 63-68. Van de Ven, A.H. and Delbecq, A.F. “Nominal versus Interacting Group Processes for Committee Decision Making Effectiveness,” Academy of Management Journal (14:2), 1971, pp. 203-212. Van de Ven, A.H. and Delbecq A.F. “The Effectiveness of Nominal, Delphi, and Interacting Group Decision Making Processes,” Academy of Management Journal (17:4), 1974, pp. 605-621. Ware, L.C. 2002. Security and e-business will dominate 2003 IT spending. Computerworld (December 2). Westland, J.C. “Transaction Risk in Electronic Commerce,” Decision Support Systems (33), 2002, pp. 87-103. Yost, P. “E-Business Web Portals and Their Role in Supply Chain Management,” Presentation at Idea to Action: Numetrix’99, Atlanta, September 1999. 31 Figure 1: B2B Assurance Services (Khazanchi & Sutton 2001) B2B ASSURANCE SERVICES Application-User Level Business Level 32 Technical Level Table 1. B2B Assurance Services (Khazanchi and Sutton 2001) Category of Assurance Purpose of Assurance ApplicationUser Level The services at this level will focus on assuring that trading partners trust and use EDI for conducting B2B commerce. This may include assurance issues relating to establishing relationships with new trading partners, developing “good business practices” and related policies. Business Level The services at this level will focus on assuring that business processes, internal controls, and policies are amenable to EDI adoption and that the processes are altered to allow for seamless integration with the EDI application. This will include addressing legal, privacy of data, and administrative issues for conducting reliable, secure and safe electronic commerce with trading partners, transmission security and auditability of B2B (EDI) transactions. Technical Level The services at this level will focus on assuring that all technical elements of EDI are in place and that EDI is seamlessly integrated with internal applications. This will include issues relating to transaction integrity, choice of applications, expansion of trading partner base and transaction volume, system reliability, data security (risk assessment) and encryption, and transmission error. 33 TABLE 2 Results of Chi-Square Test of Independence for Key Factor Selection (H1, H3, H5) Internal Constituency (Corporate) Groups (H1) Organization 1 vs. Organization 2 Organization 1 vs. Organization 3 Organization 2 vs. Organization 3 External Constituency Groups (H3 and H5) Internal Constituency Groups vs. External Audit Group Internal Constituency Groups vs. E-commerce Consultant Group 34 Chi-Square 31.622 12.119 11.943 p-value <.001 .007 .008 48.083 <.001 44.567 <.001 TABLE 3 Results of Spearman Rank Correlation Tests for Internal Constituency Groups (H2) Technical Level (H2a) Organization 1 vs. Organization 2 Organization 1 vs. Organization 3 Organization 2 vs. Organization 3 Application-User Level (H2b) Organization 1 vs. Organization 2 Organization 1 vs. Organization 3 Organization 2 vs. Organization 3 Business Level (H2c) Organization 1 vs. Organization 2 Organization 1 vs. Organization 3 Organization 2 vs. Organization 3 35 Spearman’s rho .601 .716 .431 p-value <.001 <.001 .003 .293 .426 .443 .033 .003 .002 .588 .562 .681 <.001 <.001 <.001 TABLE 4 Results of Spearman Rank Correlation Tests for External Constituencies (H4, H6) Technical Level Internal Constituency Groups vs. E-commerce Consultants Group (H4a) Internal Constituency Groups vs. External IT Auditors Group (H6a) Application-User Level Internal Constituency Groups vs. E-commerce Consultants Group (H4b) Internal Constituency Groups vs. External IT Auditors Group (H6b) Business Level Internal Constituency Groups vs. E-commerce Consultants Group (H4c) Internal Constituency Groups vs. External IT Auditors Group (H6c) 36 Spearman’s rho .333 p-value .018 .324 .021 .717 <.001 .250 .060 .169 .177 .259 .076 TABLE 5 Critical Technical Level B2B E-Commerce Risk Factors Critical Risk Factor Change management processes in place to assure maintenance of security and integrity of systems as technology evolves rapidly. Trading partner’s security over all networks and network interactions ensure transmission integrity and provide guaranteed delivery transaction to the correct trading partner. Technology sophistication/expertise differential between trading partners and related selection of appropriate standards and hardware/software by the right people in this trading partner’s organization. Trading partner’s maintenance of data accuracy during systems conversion and application usage. Completeness and accuracy of trading partner’s data processing activities. Metrics related to capacity, resiliency, and monitoring in order to better predict/control performance by trading partner. Security of communication technology (infrastructure) --including vulnerability of ISP and/or public internet, vulnerability to malicious code (e.g. viruses), security vendors expected survival and the trading partner’s general security model. Trading partner’s vulnerability to loss of availability of data, systems, applications, etc., whether loss is accidental, intentional, or by poor design. Trading partner’s setting of appropriate user profiles to assure information is appropriately compartmentalized by information types and classified by access levels. Controls to enforce compliance with regulatory requirements and to enforce regulations Comprehensive access management to applications/operating systems protected via controls (e.g. firewalls) in place to assure confidentiality, availability, and integrity (e.g. unauthorized access). Channel security through appropriate controls (e.g. encryption implemented according to regulations) including validation and authentication of transaction partner. Ease of transition of information to new B2B systems, ease of integration with trading partner's systems, consistency in methods of partner, and ability to efficiently route B2B transactions to the right internal applications. Flexibility and scalability of the trading partner’s system (hardware/software independence). Redundancy and failover of trading partner’s systems (in relation to downtime tolerance). Adequacy of trading partner’s disaster recovery plan. Adequate staff expertise available on an as-needed basis. Comprehensive systems documentation of trading partner’s systems. 37 Transportation & Logistics Company Insurance Company Food Manufacturer Company E-Commerce Consultancy Firm ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● External IT Audit Firm ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● TABLE 6 Critical Application-User Level B2B E-Commerce Risk Factors Critical Risk Factor Appropriate level of training for trading partner’s users and related cost constraints. Will the target trading partner (TP) use a proposed B2B system (considering such issues of whether there is a champion for the project, sufficient IT sophistication to integrate within TP's systems environment, and ease of use of application)? When upgrading systems based on new technologies or business partner request, the trading partner has sufficient coordination and change control procedures in place to maintain reliability and protect transaction validation procedures. Trading partner’s understanding of and agreement on data structure/scope/business rules for exchange of information. Is there benefit of B2B ventures to the trading partner and is the e-commerce marketplace sustainable? Clear and sufficient contract documentation on policies, procedures, connectivity guidelines, limitations, review plan, etc. (Service Level Agreements). Application controls in place for completeness, accuracy, and processing integrity (i.e. trading partner’s applications function as intended). Trading partner’s implementation of new B2B applications include testing for assurances on hardware/software capability to support applications, availability of supporting applications 24/7, and performance and capacity of data exchange. Third party assurance of transaction validity. Marketing cost to sell the trading partner on a given B2B application Privacy of data agreements. Alignment of trading partner’s business processes with implemented B2B e-commerce technologies. Adequacy of the security over access to trading partner’s business application systems. Inaccurate, inadequate or outdated documentation on systems software/hardware provided by trading partner. Trading partner’s inability to have an enterprise view of the full range of trading partner relationships. Trust in trading partner (internal or external). 38 Transportation & Logistics Company Insurance Company Food Manufacturer Company E-Commerce Consultancy Firm External IT Audit Firm ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● TABLE 7 Critical Business Level B2B E-Commerce Risk Factors Critical Risk Factor Understanding by trading partner (TP) of their business processes, where e-commerce fits into those processes, value of business process integration with TPs, and where benefits are derived. Trading partner’s ability to assess the use/success of technology and the benefits of B2B implementation/technology investment (including return on investment). Trading partner’s costs of meeting regulatory requirements and their organization's understanding of associated risks of non-compliance (including inter- and Intra- state compliance issues). Trading partner’s technical understanding at a level that facilitates creation of a transformational vision for change and the ability to implement successful change management strategies to achieve objectives, gain acceptance, and support sustainability of the change. Trading partner’s understanding of the intended functionality of a system at the analysis/requirements stage and tying of the system to business processes that are evolved or engineered accordingly to meet the business objective. Trading partner’s level of adherence to contractual requirements including such things as product volume, sales prices, time/service commitments, and settlement (including legal agreements such as non-repudiation and the level of legal binding). Trading partner’s due diligence in implementing B2B relationships at the business, technology and security levels to assure users understand data classification/ownership/security when handling partner data and the partner maintains appropriate segregation of data to appropriate users. Trading partner’s understanding of risks associated with their projects and accordingly executing effective project management. Trading partner’s understanding of the technical complexities and associated costs of B2B development, implementation, and maintenance; and the legal ramifications, costs of implementing vs. not implementing non-repudiation agreements, costs of new business rules, and loss of personal marketing contacts. Trading partner’s team expertise for guiding all aspects of B2B e-commerce projects along with training for project teams and users. Trading partner’s broad management involvement in IT/business planning while maintaining independence in the selection of technology preferences. Trading partner’s integration of applications into organizational procedures and guidelines – including comprehensive documentation. Auditability of trading partner’s system based on effective monitoring controls and audit trail (history of electronic data, updates, changes). 39 Transportation & Logistics Company Insurance Company Food Manufacturer Company ● ● ● ● ● ● ● ● ● ● E-Commerce Consultancy Firm External IT Audit Firm ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● Trading partner’s ability to protect a distinguished Brand in an e-commerce environment. Trading partner’s resilience to a business interruption. 40 ● ●