Appari and Benaroch Pricing the IT Investment Risks Pricing the Risks of IT Investments: A Multifactor Approach Ajit Appari, PhD Candidate (aappari@syr.edu) Michel Benaroch, PhD (mbenaroc@syr.edu ) 1. INTRODUCTION Financial justification of Information Technology (IT) investments has become an imperative in the face of increasingly uncertain business dynamics and rapid pace of technological advancements. A rational investment decision, in the context of single investment or portfolio of investments, requires examining both risk and returns of proposed investment (Tanirverdi and Ruefli 2004). Recent research gives credence to the assertion that IT investments by nature are risky and increase firm’s earnings volatility (Hunter, Kobelski, and Richardson 2003). IT investments not only yield significant gain in shareholder’s wealth (Chatterjee, Pacini, and Sambamurthy 2002), but also results in losses (Ettredge and Richardson 2003). Economic valuation of IT investment could be performed using various financial tools, such as internal rate of return, return on investment, net present value, and real options. However, irrespective of the tools, it is essential to know what is the risk of the proposed IT investment and how much should be the discount rate to adjust the future payoffs. Our extensive review of research, appeared in the leading IS journals, emphasizes the critical need of developing methodology to quantify the risk and the expected return from IT investment, the fundamental steps of IT evaluation. In the past, IT risk research has essentially examined three aspects of IT risks: definition, measurement and management. Early research focus on definitional aspects of IT risks (e.g. Barki et al 1993) and identifies diverse set of risk factors1. Whereas, recent research suggests 1 A risk factor is a characteristic of the investment or its contextual environment that alters the probability distribution of an investment’s outcome. 1 Appari and Benaroch Pricing the IT Investment Risks different proxy measures of IT risks at firm level, as well at project level (Dewan, Gurbaxani and Shi 2004; Erdogmus 2000; Voshmgir 2002). However, due to inherent limitations we discuss later, these measures may not be sufficient for IT investment evaluation. Simultaneously, real options theory is shown to account for different risks in IT investment evaluation and risk management (Benaroch 2002; Benaroch and Kauffman 1999, 2000, Dos Santos 2003). But this research is limited by the fact that risk-related model parameters are assumed a priori in the absence of estimation procedures. Unfortunately, this embryonic state of IT risk measurement is crippling the ability of organizations to manage their critical resources on IT investments vis-àvis other business initiatives (Symons 2005). In this research, we attempt to resolve these limitations of extant research by answering: 1. How to model the risk-return relationship for IT investments and explicitly account for the effect of various risk factors? Broadly speaking, IT investment risk factors fall into three broad classes (which we define later): software development risks, organizational risks, and market risks (Benaroch 2002). In this research we adapt the multifactor model and arbitrage pricing theory (Ross 1976) to formalize the risk-return relationship of IT investment that accounts for the effects of these risk factors. Operationalizing this model requires estimation of the two parameters for each risk factor – premium return per unit of, and investment-specific sensitivity, to that factor. This leads us to the research questions of: 2. How to estimate the sensitivity of an IT investment to different risk factors? 3. How to estimate the risk premium for a unit risk of different IT risk factors? Recognizing that different risk factors may require different methodologies, the estimation of the parameters for all the risk factors may not be feasible within the scope of one research paper. In 2 Appari and Benaroch Pricing the IT Investment Risks this research we focus on a subset of risk factors and propose two distinct methodologies – one for estimating software development risk factors and the other for market risk factors 2. For software development risk factors, we develop a methodology that adapts a parametric cost estimation model - COCOMO (Boehm et al 2002), which by design accounts for impact of software development risk factors on development cost. The growing stream of IT value research uses event study analysis as ‘the’ empirical approach to explicate the impact of IT investments on the firm’s value and risk (Dehning, Richardson and Stratopoulos 2003). Following from this, for market risks we develop a methodology based on the event study analysis, and illustrate its use for ‘customer acceptance’ risk. This research makes a fundamental contribution to IT risk management literature by proposing a risk measurement model and estimation methodologies for a diverse set of IT risk factors. On the one hand, our research could enable IS researchers to correlate the investment level IT risk measures to firm-level aggregate IT risk measures, as Dewan et al (2004) have proposed is needed to advance our understanding of IT risk. On the other hand, we anticipate that successful quantification of all the relevant IT risk factors could lead to determination of more meaningful risk adjusted discount rates for IT valuation purpose. This in turn, may facilitate broader adoption and use of sophisticated analytical techniques such as real options analysis and portfolio management to IT investments. The rest of the paper proceeds as follows. First, we briefly review research on IT investment risk and its shortcomings vis-à-vis risk measurement. Then, we propose formalizing the risk-return relationship for IT investment based on arbitrage pricing theory. Subsequently we propose two 2 Estimation of organizational risk factors is beyond the scope of this research, as any methodology will have to depend on firm’s internal, sensitive information, which is difficult to obtain. 3 Appari and Benaroch Pricing the IT Investment Risks different empirical methodologies for estimating the risk premium for, and sensitivity to, different market risk factors and software development risk factors. Finally, we offer some concluding remarks. 2. THEORETICAL FOUNDATIONS Broadly speaking the IT risk literature, in the past three decades, has evolved into three broad streams of research – risk definition; risk measurement; investment evaluation under risk and risk management. Early research has primarily focused on defining the risk factors and developing qualitative measures that enable practitioner to prioritize risks. Lately the research has endeavored into applying financial tools, such as real options, to evaluate IT investments and manage IT risks. In this section, we briefly review these three streams of research vis-à-vis highlight some shortcomings that motivate our research. In addition, we briefly review the financial view of risk-return relationship that is adapted to IT investment level, followed by event study analysis and software cost estimation model used in this research to develop risk parameter estimation methodologies. 2.1. IT Risk Definition Traditionally IT risk is defined in terms of negative consequences (Barki et al. 1993, Boehm 1989); e.g., lack of skilled analyst could lead to poor system design. However, risk may also reflect positive opportunities, such as an unexpected increase in customer response can lead to higher market share (Benaroch 2002; Vitale 1986). Therefore, this research views risk as the variation in the attainment of IT investment goals, consistent with rational decision theoretic view (Bernstein 1996). This variation materializes due to the presence (or absence) of specific characteristics in the contextual environment of IT investment, known as risk factors, e.g. lack of 4 Appari and Benaroch Pricing the IT Investment Risks developing similar business application may result in increased learning time, effort and money leading to over-budget and schedule slippage. The definitional stream of IT risk research, focusing solely on software development risks, has produced several risk taxonomies varying from ‘top n risks’ (McFarlan 1974; Boehm 1989) to empirically validated risk factors (Barki et al. 1993; Schmidt et al. 2001). To the best of our knowledge, very limited research has studied other forms of risk that influence payoff from IT investments (Benaroch 2002; Vitale 1986). Given the diverse list of risk taxonomies, we adapt a high-level risk taxonomy (Benaroch 2002) that spans the risk factors most commonly identified by earlier research and is amenable to financial analysis (see figure 1). In this taxonomy, IT risks are classified into firm-specific risks (software development risks, organizational risks) and market risks. The firm-specific risks are endogenous to the organization undertaking an IT investment, while market risk factors are exogenous and affects all firms that consider (or have already made) the same IT investment. This notion of classifying risks into firm-specific risks and market risk is consistent with risk classification approach common in finance research where risk is divided into market risk and unique risks of an asset (Brealey and Myers 2002). Firm-Specific Risks Firm-specific risks of IT investment are due to the uncertainty of various factors internal to the firm investing in IT that affect it’s ability to successfully realize the payoff from IT investment. In particular, Software Development Risks are due to uncertain endogenous capability factors associated with software development activities that affect the ability of the investing firm to effectively realize an investment opportunity (Benaroch 2002), e.g. requirements uncertainty, complexity, and programmer skill. The Organizational Risks are due the misfit between the IT investment and internal operating environment of the organization. Even if the IT system is 5 Appari and Benaroch Pricing the IT Investment Risks designed and implemented correctly, these risks may influence the realization of anticipated benefits from IT investment, e.g. organizational politics, user support, and structural fit. Figure 1: IT Risk Classification [adapted from Benaroch 2002] Market Risks Market risks are due to uncertain exogenous factors that affect the ability of every firm, considering the same investment, to obtain the payoffs from a realized investment opportunity, e.g. competition, customer acceptance of technology investment, supplier’s resistance to technology investment, regulatory changes, and security of data. 2.2. IT Risk Measurement Early IT Risk research focuses on non-financial measures to prioritize risks during the software development (e.g. Boehm 1989). This stream of research quantifies risk using the concept of risk exposure measured as the product of probability of an unsatisfactory outcome, and the loss potential of the outcome. On the one hand, the estimation of risk probability remains an arduous task (Kitchenham and Linkman 1997) as it requires extensive data collection and efficient metrics management program in place. On the other hand, the risk measures proposed by this 6 Appari and Benaroch Pricing the IT Investment Risks stream of research lack the capability of integrating with any of the financial techniques for evaluating (managing) IT investments (IT risks). Recent research proposes different proxy measures of IT risk(s): subjective measures (Voshmgir 2002), an industry level aggregate measure (Dewan et al 2004), and twin security3 based measure (Erdogmus 2000). Voshmgir (2002) conceptualizes IT project risk as a function of three uncorrelated IT risks – market risk, project risk, and conversion effectiveness. This notion of risk classification is similar to Benaroch (2002) but uses a more restrictive definition for each of the risk component. The market risk is a function of the firm’s bargaining power vis-à-vis customers, suppliers, and its competitive position in the market. The technical risk is a function of project management capabilities to successfully complete the project; and complexity of the project in terms of number of transactions supported and number of business partners. The risk of conversion effectiveness is a function of management commitment and organization’s ability to cope with transformational changes. In this measurement framework all the component predictors of different risks (e.g. bargaining power with customer, management commitment, and project management capability) are measured on a nominal scale of 0 to 1, thus restricting its usage to qualitative judgment. More recently, Dewan et al (2004) proposed an industry level aggregate measure of IT risk that is hypothesized to reflect market risk of IT investment, and confirmed that firms with higher IT risk require substantially higher premium return compare to the firms with low IT risk. However, this risk measure, estimated at industry level, is limited in its use and may bias evaluation of individual IT investment. 3 A twin security is a security or portfolio of securities that has the same risk profile as that of the asset under consideration. 7 Appari and Benaroch Pricing the IT Investment Risks In finance literature it is suggested that valuation of an asset with unknown risk can be accomplished by using the discount rate of an equivalently risky asset (Brealey & Myers 2002). Erdogmus (2002) used this concept, twin security or mimicking portfolio, to develop a portfolio index of publicly traded technology firm’s stocks that are in the business of same software technology, e.g. Java. The variance of returns on this index quantifies the risk of the underlying technology. Even though this risk measure can be used as input to some financial tools, such as real option; it is not a panacea of risk measurement issues due to several reasons. First, technology risk is just one of the market risks. Second, this measure is vendor based and heavily depends on the arbitrary weights given to each vendor’s stock in portfolio construction. Third, this measure fails to price the risk and does not help in determining the sensitivity of investment being considered by firms. In summary, past IS research has proposed several IT risk measures, however from operationalization viewpoint none of these measures is a suitable input to finance-based techniques for decision making at the investment level, perhaps with the exception of the twin security measure. Moreover this stream of research does not prescribe any procedure to price the individual risk factors. This inability to quantify the impact of various risk factors, specifically in relation to the expected returns from an IT investment, is plausibly a key deterrent to widespread adoption of finance-based techniques like IT portfolio management and real options analysis. In this research we attempt to address this gap by paving a way to measure IT risks in terms that can be used in finance based evaluation models. 2.3. IT Evaluation under Risk and IT Risk Management The intense dynamics of IT, highly uncertain business environment, and irreversibility of implementation cost has rendered traditional investment valuation approaches – e.g., payback 8 Appari and Benaroch Pricing the IT Investment Risks period, discounted cash flow (DCF), and net present value (NPV) – ineffective for investment decision-making. However, recognizing that managers do have flexibility of timing and structuring the IT investments, Dos Santos (1991) introduced real options theory to IT evaluation by viewing IT project as an option to exchange risky assets. Since then this growing stream of research has seen application of real options to evaluate the IT investments in the presence of risks (Benaroch and Kauffman 1999, 2000; Dos Santos 2003), to manage the IT risks by structuring optimal configuration of options into the investment (Benaroch 2002), and to value and prioritize portfolio of IT investments (Bardhan, Bagchi and Sougstad 2004). Majority of these research focuses on justifying applicability of real options to IT investment decisions for a single project or portfolio of projects, with the exception of Benaroch (2002) that demonstrates how to leverage real options philosophy to manage IT risks. It is demonstrated that managers can actively configure IT investments by creating a set of options (e.g. prototype, defer, stage, abandon, scale up/ down, outsource, lease, and growth) into investment that maximizes the value vis-à-vis the risks of IT investment (Benaroch 2002). However, this stream of research faces two key difficulties: (1) it requires estimation of riskrelated parameters for which currently IS research does not prescribe any procedure, and (2) the inclusion of multiple risk factors renders the analysis approach intractable. Even for a small set of risk factors, testing the robustness of investment evaluation using simulation-based sensitivity analysis requires distributional values for risk-related model parameters. In this light, our research seeks to address some of the key IT risk measurement issues having to do with how to model the risk-return relationship of an IT investment and how to estimate the model parameters – sensitivity and risk premium of risk factors. In the next section we briefly elaborate on the 9 Appari and Benaroch Pricing the IT Investment Risks financial view of the relationship between expected return of an asset vis-à-vis its exposure to multiple risk factors. 2.4. Financial View of Risk – Return Relationship In corporate finance literature, risk of an investment is defined as the variation of payoff from the investment. Economic theories ex ante predict a positive correlation between the risk of and the return from an asset under the assertion that investor seeks higher returns for bearing high risk (Brealey & Myers 2003). Conceptually, the risk of an asset can be divided into – unique (idiosyncratic) risk, and market (systematic) risk. The unique risks are diversifiable by creating a portfolio of assets which eliminates the effect of unique risks. However, systematic risks (market risks) cannot be diversified away. Finance literature predominantly focus on pricing the market risks in terms of beta (), that indicates sensitivity of the asset to market movements, and the market risk premium measured as the difference between expected return on market portfolio of unit beta and risk free rate (rm – rf). In competitive market, according to capital asset pricing model (Sharpe 1964), the expected risk premium from an asset is proportional to the asset’s beta. Alternatively per multifactor model, the underlying model for arbitrage pricing theory (APT), the expected return in excess of the risk free interest rate from an asset, r, having exposure to {J} risk factors is given by (Ross 1976): r b1f1 b 2f 2 ...... b jf j ..... b J f J (1) where bj is sensitivity of the investment to the jth risk factor, and fj is the unexpected change in the level of the jth risk factor. Assuming j is the risk premium (or market price) for a unit risk of the jth factor, under the equilibrium assumption of APT the equation (1) can be rewritten as: 10 Appari and Benaroch Pricing the IT Investment Risks r 1b1 2 b 2 ...... jb j ..... J b J (2) These economic models assume that idiosyncratic risks are completely diversified away by investors and hence the investors’ market prices the systematic risk only. However, recent empirical studies in finance suggest idiosyncratic risks of asset are also priced by market and the price of idiosyncratic risk for an individual stock depends on its correlation with aggregated undiversified idiosyncratic return, alike market risk (Malkiel and Xu 2002; King, Sentana, and Wadhwani 1994). This suggests that by adapting the procedures of empirical finance, it would be possible to price the idiosyncratic risk in the context of IT investments. Elton & Gruber (2001) suggest that if we can specify a set of factors, fj’s, (firm characteristics) that affect expected return, then equation 2 can be used to estimate the sensitivities, bj’s, and subsequently equation 3 can be used to estimate risk premium, j, of each factor. Recently Vermeulen, Spronk and Wijst (1996) adopted the concept of multifactor model to analyze risk and expected level of firm performance. In a similar vein, in this research, we adapt the multifactor approach to define the risk-return relationship of IT investments. Further, we propose event study based estimation methodology to estimate parameters of market risk factors (i.e. sensitivity and risk premium); and adapt COCOMO model to estimate software development risk factors. In the next section we briefly discuss the extant IS research that has used event study analysis in the context of IT investments. Subsequently we discuss a cost estimation model that is adapted in this research to estimate parameters of software development risks. 2.5. Events Study in IT Value Research In accounting and finance literature, an extensive body of research uses event study analysis to quantify the effect of an event on firm’s value and / or risk by examining the firm’s stock price 11 Appari and Benaroch Pricing the IT Investment Risks movements around the event date (Binder 1998). The crux of event study analysis, according to the semi-strong efficient market hypothesis, is that the market value of a firm fully reflects all publicly available information (Fama et al 1969). This assertion implies that an abnormal stock return associated with an unexpected event should be observed and measurable if the event has information content, that forces investors to adjust the stock price. Prior IS research suggests that public news of events associated with IT investment having positive information generally cause an increase in firm’s stock price (Chatterjee, Pacini & Sambamurthy 2002; Dos Santos et al. 1993; and Subramani & Walden 2001). In addition a distinct difference (more favorable) in market reaction to infrastructure investments vis-à-vis IT application is discovered, supporting the conjecture that infrastructure investments have growth options (Chatterjee et al 2002). Conversely, stock market reacts negatively to public news of events that contains negative information related to IT investments, e.g. business disruption due to hacker’s attack (Ettredge & Richardson 2003; Hovav & D’Arcy 2003). This stream of research, focusing on security threats, suggests that the stock market punishes the firms, across industries, who have disclosed security breaches as well the other firms who weren’t hacked but are vulnerable. In summary, there is a growing interest in applying event study analysis in IT value research to explicate effect of IT investments on firm’s value and risk by examining relevant events. In view of the limitations observed on extant measures of IT risks in the earlier section, and recognizing that event study analysis captures both value and risk of firm (Dehning et al 2003), we use event study analysis to develop estimation methodology for quantifying IT market risks such as customer acceptance. For customer acceptance risk, we use a third party performance rating announcements, GomezPro Scorecard™ (GPSC). 12 Appari and Benaroch Pricing the IT Investment Risks 2.6. Software Cost Estimation and Risk Software engineering cost models could be used for budgeting, project planning and control, and risk tradeoff analysis (Boehm et al 2000). In the past three decades several cost estimation models have become prevalent, including COCOMO, SEER (see Boehm et al 2000 for details). Majority of these cost models are proprietary with the exception of COCOMO. These models are designed to account for the effect of different risk factors to estimate the expected cost of developing a software of given size. In a comparative study, Boehm et al (2000) conclude that none of the cost estimation models is best for all situations and all of them are continuously challenged by rapid advances in technology. In this research, we adapt the COCOMO model as a base model to demonstrate the feasibility of estimating risk parameters. The COCOMO (COnstructive COst MOdel) was initially published in Boehm (1981) and became one of the most popular parametric cost estimation models. Recent innovations in software engineering – e.g. rapid application development process, software reuse, object oriented design, and web based development – have rendered the estimation accuracy of COCOMO poorer. Consequently the model is continually upgraded to account for these changes (Boehm et al 2002). The revised model COCOMO has two submodels – Early Design Model (EDM), and Post Architecture Model (PAM). The EDM is applicable at the investment decision level when only the aggregate level information is available on the new project. The PAM is a detailed model that can be used when high level design is established. This COCOMO model has been calibrated to a database of 161 projects collected from Commercial, Aerospace, Government and non-profit organizations using the Bayesian analysis approach (Chulani et al 1999). In addition several variants of COCOMO are under development that accounts for specifics of rapid application development process (CORADMO), and components based 13 Appari and Benaroch Pricing the IT Investment Risks development (COCOTS). This suggests, a risk estimation methodology based on COCOMO model can accommodate advances in software engineering. According to COCOMO model, the expected cost (E), measured in person-months, to build software of size K kilo source lines of code is - E AK 5 B 0.01 S j n j1 Ci (3) i 1 where Sj and Ci are weights for scale factors and cost drivers, A, and B are calibration constants of model and n = 7 for Early Design model and 17 for Post Architecture model. The scale factors and cost drivers are akin to various risk factors identified in IS literature. The scale factors for both EDM and PAM are same, while five of the cost drivers in the EDM are aggregate of cost drivers in the PAM as shown in figure 2. Early Design Post Architecture Reliability (REL) Early Design Product Reliability & Complexity (RCPX) Database size (DATA) Application Experience (APEX) Product Complexity (CPLX) Documentation to life-cycle needs (DOCU) Personnel Experience (PREX) Language & Tool Experience (LTEX) Platform Experience (PLEX) Platform Difficulty (PDIF) Execution time constraint (TIME) Main storage constraint (STOR) Platform volatility (PVOL) Facility (FCIL) Use of Software Tools (TOOL) Multi-site Development (SITE) Analyst Capability (ACAP) Personnel Capability (PERS) Programmers Capability (PCAP) Personnel Continuity (PCON) Developed for Reusability (PERS)* Required Development Schedule (SCED)* * Same as Post Architecture Model Figure 2: Mapping of Early Design Cost Drivers to Post Architecture Cost Drivers 14 Appari and Benaroch Pricing the IT Investment Risks The COCOMO model provides extensive guidelines on how to rate the risk factors on a nominal scale – from extremely low, through nominal, to extremely high. At each rating level the risk factors are assigned a specific weight that has been determined by wideband Delphi approach and calibrated using Bayesian analysis (Chulani et al 2002). For scale factors the weight varies from 0 (for extremely high level) to 7.8 (for very low level). For cost drivers the weight assumes a value of 1 for nominal level, and then increases (or decreases) depending on the direction of effect the cost driver has on cost, e.g. Reliability changes from 0.86 (for very low level) to 1.26 (for very high level) whereas for Analyst capability the weight changes from 1.42 (for very low level) to 0.71 (for very high level). In this research, we use a generalized version of the COCOMO model to derive sensitivity estimates of each project to different risk factors and risk premium of risk factor, to be discussed later in detail. 3. RISK-RETURN MODEL FOR IT INVESTMENTS In this section, building on the past research in IS and Finance, we present a formal model to describe the risk – return relationship for an IT investment. Let us assume that an IT investment is exposed to {J} risk factors that includes n S software development risks, nO organizational risks and nM market risks ( nS + nO + nM = J). Consider a firm having portfolio of n IT investments. Each IT investment is exposed to these {J} risk factors according to its sensitivity to each of the risk factors, defined as the risk profile (RPi) of the investment: RPi (bi ,1 , bi , 2 ,....., bi , 2 ,.......bi , J ) i = 1, ..,n (4) Suppose at time t, the {J} risk factors assume values as Ft ( F1,t , F2,t ,..., F j ,t ,.......FJ ,t ) and the unexpected change in the factor values is given by f t ( f1,t , f 2,t ,..., f j ,t ,....... f J ,t ) with E(fj,t) = 0 15 Appari and Benaroch Pricing the IT Investment Risks Then by Multifactor model the expected return in excess of the risk free interest rate from an IT investment, ri, having a risk profile RPi is (we drop the time subscript for convenience): ri bi ,1 f 1 bi , 2 f 2 ...... bi , j f j ..... bi , J f J ei (5) where ei is a random error with mean zero and variance equal ei2 . If j is the extra expected return required from the IT investment for being exposed to j th risk factor, then by APT the equation (5) can be rewritten as: ri 1bi ,1 2 bi , 2 ...... j bi , j ..... J bi , J (6) With knowledge of the parameters (bi,j, j) involved in equations (5) and (6), organizations can evaluate IT investments and even manage their portfolio of IT investments. Following the three classes of IT risk factors (figure 1), the equations (5) and (6) can be rewritten as: nS nO nM j 1 k 1 l 1 nS nO nM j 1 k 1 l 1 ri bi , j f j bi , k f k bi , l f l ri i , j b j i , k bk l bl (7) (8) Alternatively the equations (7) and (8) can be represented as: r~ rSD ~ rOR ~ rM (9) where ~ rSD , ~ rOR and ~ rM are expected returns due to software development, organizational, and market risks respectively. 4. RISK PARAMETER ESTIMATION Our next goal is to develop and demonstrate estimation methodologies that can be used to quantify parameters of IT risk factors, namely sensitivity of investment to, and premium of the risk factor. The estimation of risk premium and sensitivity for software development risks and 16 Appari and Benaroch Pricing the IT Investment Risks organizational risks would normally require internal firm-specific data. By contrast, the same parameters for market risk factors could be quantified based on publicly available market data. With this research being the first of its kind, and having lack of access to firm’s internal data, we focus hereafter only on those risk factors for which data is available in the public domain. 4.1. Parameters Estimation for Market Risks Factors Past IT value research have used event study analysis to establish the economic value of IT investment announcements (e.g. Chatterjee et al. 2002, Dos Santos et al. 1991) and hackers attack (Hovav & D’Arcy 2003). This research offers evidence that IT investment does have an influence on the value and risk profile of an investing firm. In empirical finance research, scholars have devised a two-pass methodology for estimating parameters (sensitivity and risk premium) of risk factors (see Elton & Gruber 2001). In this research, we combine the two and suggest a methodology for estimating the parameters for market risk factors, as outlined below: (1) Event Identification: [a] Identify the event(s) and variable(s) that capture one or more type of market risks related to IT investments of interest, [b] Identify the publicly traded firms that are affected by these events and have made similar IT investments. (2) Determine the abnormal daily returns for those firms around the event dates by using a Capital Asset Pricing Model that is estimated with 200 days daily returns prior to the event window. (3) Estimate Sensitivity: regress event day abnormal returns on firm characteristics and the mean centered risk indicator variables identified in step 1. The coefficient of each indicator variable would be an estimate of the sensitivity of the IT investment or the firm to a specific market risk factor. 17 Appari and Benaroch Pricing the IT Investment Risks (4) Estimate Risk Premium: regress the event day abnormal returns on the sensitivity obtained in step (3) for the risk factor by constructing an equally weighted and/or a value weighted portfolio of securities. Next, we explain how to estimate parameters of ‘customer demand’ risk using this methodology. Estimating ‘Customer Demand’ Risk Barua, Konana and Whinston (2005) suggest superior customer centric online capability plays a significant role in sustaining satisfied and loyal customers leading to superior business performance. Recent empirical research has developed and validated a multidimensional metric – comprising ease of use, information availability, privacy & security, and quality – as a key determinant of customer’s acceptance of or preference to B2C channel (Devaraj, Fan and Kohli 2002). Gomez, currently owned by WatchFire.com, publishes benchmark score, known as GomezPro ScoreCard ™ (GPSC) reflecting evaluation of online services offered by financial industries from the customer perspective on four dimensions – functionality, ease of use, privacy & security, quality & availability. The firms are ranked by an overall weighted score normalized to 1 – 10 scale (with weights of 40% to functionality, 35% to ease of use, 15% to privacy & security, 10% to quality & availability). More recently several scholars have used GPSC scores, as measure of online channel capabilities, to examine key drivers of switching cost (Chen and Hitt 2002), and to study effect of IT investment performance on firm’s competitive advantage (Kotha, Rajgopal and Venkatachalm 2004). In addition, several business publications indicate GPSC as a key industry benchmark used to gauge competitor’s investment in online channel (PR Newswire 2003). Therefore I hypothesize that GPSC announcements do convey important information to investors leading to stock price movements, and the unexpected change in rank 18 Appari and Benaroch Pricing the IT Investment Risks scores can be considered as indicator variable for customer acceptance risk of investments in online channel. Empirical Analysis The sample data contains a total of 63 GPSC announcements for 6 financial services industries (banks, insurance, mortgage, brokerage and credit cards) made between April 1999 and October 2004. From November 2004, GomezPro has changed the computation of overall rank score, hence we limit to the period Oct-1999 to Oct-2004. In the first two years (1999, 2000) Gomez published rankings on quarterly basis, and thereafter switched to bi-annual basis (see figure 3 for summary statistics on market to book value ratio (MBV), total assets, and GPSC scores). * number of firms listed in each announcements are given next to announcement date Figure 3: Summary Statistics of FSS firms The demographic and relevant financial data of firm are collected from COMPUSTAT, CRSP and EDGAR databases. The daily stock returns are queried by using PERMNO, a unique identifier used by CRSP for each firm, for each event date by specifying 300 days before the event date and 10 days after the event date. We purposely keep this longer calendar interval to ensure that we get at least 200 trading days before each event date and 5 days after the event 19 Appari and Benaroch Pricing the IT Investment Risks date. Following the protocol of past event study research, I exclude all the (event date, firm) combination for which either the event date is within + 7 days of any firm specific significant date, including quarterly earnings announcement, merger and acquisition announcement, and stock split or the firm is not traded for more than 60 days before the event. This elimination procedure yielded 809 useful (event date, firm) combinations. The risk free rate (i.e. 30 days-T bill rate) is obtained from the data library maintained by Kenneth French on his website. The analysis is done in two stages – first stage involves determination of abnormal returns by estimating a market model and test of significance of mean abnormal returns; stage 2 involves estimating sensitivity of each firm to the ‘customer acceptance’ risk factor followed by the estimation of risk premium (steps (3) and (4) respectively of the methodology ). Stage 1: Determination of Abnormal Returns The abnormal returns during the event window are obtained as the difference between the observed returns and those predicted by capital asset pricing model (CAPM): ARi ,t ri ,t rˆi ,t (10) where rˆi , t is predicted from ri , t i , 0 i rm , t i , t E[i , t ] 0, and V [i , t ] i2 (11a) where ri ,t and rm ,t are daily returns and market returns in excess of risk free rate; ˆ i and ˆ i are firm’s estimated parameters of CAPM over an estimation period preceding the event. Several studies have reported that daily stock returns exhibit heteroscedastic error pattern (Brockett, Chen & Garven 1999; Schwert and Seguin 1990), and not adjusting for conditional heteroscedasticity may seriously compromise statistical inferences (Corhay and Rad 1996). On 20 Appari and Benaroch Pricing the IT Investment Risks examining the market model residuals of the equation (11a), using Lagrange Multiplier approach, a strong evidence of ARCH properties was revealed in about 25% cases 4. Therefore, we correct for conditional heterscedasticity by using GARCH (1,1) model, as it has been shown by past research to better fit the daily stock returns than general GARCH(p, q) models with p +q 3 (Corhay and Rad 1996): ri , t i , 0 i (rm , t rf , t ) i , t i , t i , t ei , t (11b) i2, t 1i2, t 1 1i2, t 1 where ei , t ~ iid N(0,1) Test Statistics for Abnormal Returns The GPSC event data is a classic example of clustered events, as several firms were listed on each of the 67 announcement dates, leading to cross-correlation of abnormal returns. The test statistic (z0) is the ratio of the day ‘0’ mean abnormal return to its estimated standard deviation, assumed to be unit normal under null hypothesis, as the degrees of freedom exceeds 200 (Brown and Warner 1985). N0 AR0 z0 ˆ AR0 ˆ AR0 where AR 0 4 ARt AR t 250 AR i , 0 i 1 N0 (12) 4 2 and AR t 244 AR i , t t 250 247 Alternatively, we test for significance of the cumulative mean abnormal return for each event date over the event window (–3, +3) by: 3 z ARt / t 3 S 3 ˆ 2AR0 t 3 similar results were obtained through White’s test for heterscedasticity (Greene 2003) 21 (13) Appari and Benaroch Pricing the IT Investment Risks The statistic (z) is assumed to follow unit normal under null hypothesis. The analysis of abnormal returns for each industry separately indicates 6 out of 12 announcements for banks, 9 out of 11 announcements for credit cards, 8 out of 14 announcements for discount brokerages, 5 out of 9 announcements for full-service brokerages, 4 out of 8 announcements for insurance, and 5 out of 10 announcements for mortgages have yielded significant market reaction. Stage 2: Determination of Sensitivity and Risk Premium The abnormal returns are regressed on unexpected deviation in GPSC score (C); and natural log of total assets (ln[TA]), and market to book value ratio (ln[MBV]): AR i , t i C,i Ci , t LTA ln[ TA i , t ] LMBV ,i ln[ MBVi , t ] i , t (14) Due to lack of adequate time series of GPSC scores for each firm, the unexpected deviation is computed as the percentage change of current GPSC score from its immediate past GPSC score. And we exclude the first listing of every firm from analysis. In addition, we segregate the firms, within an industry, based on their size into three segments – large firms, medium firms, and small firms – corresponding to upper, inter-quartile and lower quartile range of ln[TA]. As the dependent variable in the equation (14) is not directly observed but predicted from the equations (10 & 11b), we use Weighted Least Square (WLS) regression with weights being the MSE (mean square error) of the equation (11b) obtained for each (event date, firm) combination. In addition, for each industry, firms listed on the same announcement date may fall under different segments resulting in possible cross correlation of errors for the equation (14) across the segments. To account for cross-correlated errors, we simultaneously estimate the equation (14) for all the industries segments by following seemingly unrelated regression (SUR) estimation 22 Appari and Benaroch Pricing the IT Investment Risks procedure (Greene 2003). The coefficient of C gives the sensitivity of firms (hence of the IT investment) within an industry segment to the customer acceptance risk. Subsequently to estimate the risk premium of ‘customer acceptance’ risk we use WLS approach to regress the abnormal returns on thus obtained sensitivities: ARi ,t i CC ,i i ,t (15) The analysis is still in progress, and preliminary summarized result is shown in Table 1. Sensitivity Estimates Industry Type Firm Size Large Banks Credit Cards 0.0013 -0.0005 Discount Brokers 0.0082 Full-Service Brokers 0.001 Insurance Mortgages -0.0078 0.011* Medium 0.0002 0.0005 0.0163 0.0346* 0.0056 -0.0079* Small 0.020* 0.0923* 0.0185* -0.0261 -0.0141 0.0029 Table 01: Sensitivity estimates and Risk Premium estimate for ‘customer acceptance’ risk Clearly sensitivity to ‘customer acceptance’ risk, in general, is significantly positive for smaller firms in the banking, credit card, and discount brokerage industries. For full-service brokerage and mortgage industries the sensitivities are significant for medium size firms with mortgage firms having a negative exposure. 4.2. Parameter Estimation of Software Development Risk Factors Consider a firm with history of m projects, each having risk profile based on COCOMO: RPi S i ,1 ,....S i ,5 , C i ,1 ,.........C i ,17 (16) A generalized version of the COCOMO model, based on equation (4) that accounts for effect of risk factors, could be derived from COCOMO database as: E K 5 1 jS j 17 j1 Ci i i 1 23 (17) Appari and Benaroch Pricing the IT Investment Risks where E is cost estimated in terms of effort (man months), K is software size in kilo lines of code, Sj and Ci are weights for scale factors and cost drivers, respectively. A project with all the risk factors rated as nominal is analogous to a ‘risk free’ asset in financial economics, though not free from risk. If an organization uses COCOMO as a base model to estimate cost, then the total cost premium incurred on bearing the development risk factors due to unexpected changes during the course of development project could be computed as a ratio: rSD ERPactual ERPestimated ERPestimated (18) where ERPactual and ERPestimated are the development cost with respect to actual risk profile at the end of the project, and estimated risk profile before the start of project. This ratio rSD is analogous to daily return on a stock which is computed as (today’s closing price – previous day’s closing)/ previous day’s closing price. For each of the m projects, the sensitivity (bx) to the xth risk factor (scale factor or cost driver) can be estimated by evaluating the partial derivative of equation (17): bx rSD x E / x ERPestimated RPactual (19) RPactual The estimates of sensitivity of each project to different software risk factors would yield a cross sectional dataset for m projects as: Total Cost Premium Risk Sensitivity Profile rSD ,1 : {b1,1 , b2,1 .........bnS ,1 } rSD , 2 : {b1, 2 , b2, 2 .......bnS , 2 } ...... ...... ...... {b1, m , b2, m .....bnS , m } rSD , m : Figure 4: Cross sectional dataset of Software development risk 24 Appari and Benaroch Pricing the IT Investment Risks A cross sectional OLS regression of rSD on estimated risk sensitivities will yield the risk premium for respective software development risk factors: rSD,i 1b1,i 2b2,i ..... n bn S S ,i (20) Event though the approach discussed here is in the context of COCOMO model, it is generic enough to be applied to any cost model, accounting for the effects of risk factors. To demonstrate the viability of this approach, we shall use Boehm’s (1981) dataset of 63 projects. 5. VALIDATION OF PARAMETERS ESTIMATES – BOOTSTRAPPING The estimation of risk parameters for ‘customer acceptance’ and software development risks discussed in the previous section involves relatively smaller samples when compared with typical sample sizes used in empirical finance to estimate risk parameters. This arguably raises questions of validity of the estimated values. In addition, for customer risks, the sample set of IT investments considered are relatively similar across the financial services industries. Whereas for software risks, the sample database considered contains projects executed in the decade of 1970 and have information on only a subset of risk factors. The risk parameter estimation would have been improved, if a broader variety of IT investments were considered. Past IS research has used bootstrapping procedure to ensure robustness of path coefficients in structural models (e.g. Subramani 2004; Teo, Wei, & Benbasat 2003). Hence to improve the robustness of the parameter estimates, in light of small sample size, we propose to Bootstrap the regression equations (14) and (15) for ‘customer acceptance’ risk, as suggested in Mooney & Duval (1993): (a) Generate B sub-samples of size n from the original dataset used for parameter estimation. (b) Estimate equation (14) and (15) in sequence as discussed in earlier section on each subsample. 25 Appari and Benaroch Pricing the IT Investment Risks (c) Convert the bootstrapped regression coefficients (i.e. sensitivity and risk premium) into an estimate of sampling distribution of the parameter estimates by placing a probability of 1/B to each value of the coefficient estimate. For software development risks, we bootstrap the equation (17) using 63 sample projects of COCOMO database. For each run of bootstrap, the project wise sensitivities are computed and using the equation (20) risk premium for each risk factor is obtained. Subsequently, following the step (c), we estimate the sampling distribution of risk premiums. 6. RESEARCH CONTRIBUTION Risk measurement is the weakest link in IT risks management research. This research makes a fundamental contribution to the literature on the management of IT risks and IT investment evaluation, by proposing a risk measurement model and estimation methodologies for a diverse set of IT risk factors. The ability to quantify critical risk factors based on the proposed methodologies could benefit IS research in several areas. First, it could lead research to develop and demonstrate the feasibility of applying finance-style portfolio management models and techniques to IT investment problems. Second, at the individual investment level, this research provides estimation of risk parameters that could be used with analytical real option models to address a larger set of risk factors simultaneously. Finally, our research could enable IS researchers to correlate IT investment level risk measures to firm-level aggregate risk measures, as Dewan et al (2004) have proposed is needed to advance our understanding of IT risk. This research has significant implications for practitioners engaged in IT investment decision making processes. A recent survey of top executives indicates a progressive growth in applying portfolio management concepts to IT investments (Jeffery and Leliveld 2004), though the majority of them lacks the know-how of IT risk estimation at the level of rigor used in financial 26 Appari and Benaroch Pricing the IT Investment Risks portfolio management. We believe that this research helps to fill this knowledge gap by providing necessary tools and techniques to quantify IT risks. Last but not least, successful quantification of all relevant IT risk factors could help managers to determine more accurate risk-adjusted discount rates for investment evaluation, thereby enabling them to make more judicious allocations of critical resources to competing investments. 7. REFERENCES 1. Bardhan, I., Bagchi, S., and Sougstad, R. (2004), Prioritization of a Portfolio of Information Technology Projects, Journal of Management Information Systems, 21, 2, 33 – 60 2. Barki, H., Rivard, S., and Talbot, J., (1993) Toward an Assessment of Software Development Risk, Journal of Management Information Systems, 10, 2, 203 – 225 3. Barua, A., Konana, P., Whinston, A.B., and Yin, F. (2004), An empirical investigation of Net-enabled business value, MIS Quarterly, 28, 4, 585 - 620 4. Benaroch, M. (2002) Managing information technology investment risk: a real options perspective, Journal of Management Information Systems, 19, 2, 43 – 84 5. Benaroch, M. and Kauffman R.J. (1999) A case for using real option pricing analysis to evaluate information technology project investments, Information Systems Research, 10, 1, 70 – 86 6. Benaroch, M. and Kauffman R.J. (2000) Justifying electronic banking network expansion using real options analysis, MIS Quarterly, 24, 2, 197 – 225 7. Bernstein, P. L. (1996) Against the Gods: The remarkable story of risk, John Wiley, New York 8. Binder, J. J., (1998) The Event study methodology since 1969, Review of Quantitative Finance and Accounting, 11, 2, 111 – 137 9. Boehm, B.W. (1989) Software risk management, IEEE Computer Society Press, Piscataway, NJ, 10. Boehm, B.W., Abts, C., and Chulani, S., (2000), Software development cost estimation approaches: A survey, technical report, USC Center for Software Engineering, USC-CSE-2000-505 27 Appari and Benaroch Pricing the IT Investment Risks 11. Boehm, B.W., Abts, C., Brown, A. W., Chulani, S., and Clark, B. K., (2002) Software cost estimation with COCOMO , Prentice Hall, New Jersey 12. Brealey, R.A., and Myers, S.C., (2003), Principles of corporate finance, 7 th edition, McGraw Hill 13. Brockett, P.L., Chen, H.M., and Garven, J.R. (1999) A new stochastically flexible event methodology with application to Proposition 103, Insurance: Mathematics and Economics, 25, 197 – 217 14. Brown, S.J., and Warner, J.B., (1985), Using daily stock returns: The case of event studies, Journal of Financial Economics, 14, 3 – 31 15. Chatterjee, D. Pacini, C. and Sambamurthy, V. (2002) The shareholder-wealth and trading volume effects of information technology infrastructure investments, Journal of Management Information Systems, 19, 2 16. Chen, P., and Hitt, L., (2002), Measuring switching costs and the determinants of customer retention in internet enabled businesses: A study of online brokerage industry, Information Systems Research, 13, 3 17. Chulani, S., Boehm, B., and Steece, B. (1999) Bayesian Analysis of Empirical Software Engineering Cost Models, IEEE Transactions on Software Engineering, 25, 4, 573-583 18. Corhay, A. and Rad, T.A. (1996), Conditional heteroskedascticity adjusted market model and an event study, The Quarterly Review of Economics and Finance, 36, 4, 529 – 538 19. Dehning, B., Richardson, V.J., and Stratopoulos, T. (2003),Reviewing event studies in MIS: An application of the firm value framework, Proceedings of 36th Hawa Inernational Conference on system Sciences 20. Devaraj S., Fan, M., and Kohli, R. (2002) Antecedents of B2C channel satisfaction and preference: Validating e-commerce metric, Information Systems Research, 13, 3, 316 – 333 21. Dewan, S., Gurbaxani, V. and Shi, C. (2004) Investigating the Risk-Return relationship of Information Technology investment: Firm-level empirical analysis, American Accounting Association Annual Meeting, Orlando, August 8 – 11 22. Dos Santos, B.L. (2003) Information technology investments: Characteristics, choices, market risks and value, Information Systems Frontiers, 5, 3 23. Dos Santos, B.L., (1991) Justifying investments in new information technologies, Journal of Management Information Systems, 7, 71 – 90 28 Appari and Benaroch Pricing the IT Investment Risks 24. Dos Santos, B.L., Peffers, K., and Mauer, D. C., (1993) The impact of information technology investment announcements on the market value of the firm, Information Systems Research, 4, 1, 1 – 23 25. Elton and Gruber (2001) Modern Portfolio Theory and Investment Analysis, 26. Erdogmus, H. (2000) Value of commercial software development under technology risk, The Financier, 7 27. Ettredge, M. and Richardson, V.J. (2003), Information Transfer among Internet Firms: The Case of Hacker Attacks, Journal of Information Systems 28. Fama, E., Fisher, L., Jensen, M. C., and Roll, R., (1969) The adjustment of stock prices to new information, International Economics Review, 10, 1, 1 – 21 29. Greene, W.H. (2003), Econometric analysis, 5 th edition, Prentice Hall 30. Hovav, A. , and D'Arcy, J., (2003) The impact of denial-of-service attack announcement on the market value of firms, Risk Management and Insurance Review, 6, 2, 97 – 121 31. Hunter, S., Kobelsky, K., and Richardson, V. J., Information technology and the volatility of firm performance, working paper 4449-03, MIT Sloan School of Management, 2003, 32. Jeffery, M. and Leliveld I., (2004) Best Practices in IT Portfolio Management, Sloan Management Review 33. King, M., Sentana, E., and Wadhwani, S., (1994), Volatility and links between National Stock Markets, Econometrica, 62, 4, 901 – 933 34. Kitchenham, B., and Linkman, S., (1997), Estimates, uncertainty, and risk, IEEE Software, 14, 3, 69 – 74 35. Kotha S., Rajagopal, S., and Venkatachalam, M. (2004) The role of online buying experience as a competitive advantage: evidence from third party ratings for ecommerce firms, Journal Of Business, 77, 2 36. Malkiel, B.G. and Xu Y. (2002) Idiosyncratic risk and security returns, working paper, University of Texas 37. McFarlan, W., Portfolio approach to information systems, Harvard Business Review, 1974, 38. Mooney, C.Z., and Duval, R.D., (1993), Bootstrapping: A Nonparametric approach to statistical inference, (SAGE University Paper series on Quantitative Applications in the Social Sciences, series no. 07-095), Newbury Park, CA: Sage 39. PR Newswire (2003), Two InQuira customers in top 5 internet banking sites – Gomez study finds, April 16 40. Ross, S. (1976) The arbitrage theory of capital asset pricing, Journal of Economic Theory, 13, 341 – 360 29 Appari and Benaroch Pricing the IT Investment Risks 41. Schmidt, R , Lyytinen, K., Keil, M, and Cule, P, (2001) Identifying software project risks: An International Delphi study, Journal of Management Information Systems, 17, 4, 5 – 36 42. Schwert, W.G., and Seguin, P.J., (1990), ‘Heteroscedasticity in stock returns, Journal of Finance, 45, 1129 43. Sharpe, W. F. (1964) Capital asset prices: A theory of market equilibrium under conditions of risk, Journal of Finance, x, 19, 425 – 442 44. Subramani, M. (2004) How do suppliers benefit from information technology use in supply chain relationships?”, MIS Quarterly, 28, 1, 45 – 73 45. Subramani, M., and Walden, E., (2001), The Impact of e-commerce Announcements on the Market Value of Firms, Information Systems Research, 12, 2, 135 – 154 46. Symons C. (2005) IT measurement is still immature, CIO 47. Tanirverdi H., and Ruefli T.W. (2004), The role of information technology in risk/return relations of firms, Journal of the AIS, 5, 11-12, 421 – 447 48. Telang, R., and Wattal, S. (2005), Impact of vulnerability disclosure on market value of software vendors: An empirical analysis, 4th Workshop on Economics and Information Security, Boston, June 1-3 49. Teo, H.H., Wei, K.K, and Benbasat, I., (2003) Predicting Predisposition Toward IT-Based Interorganizational Linkages: An Institutional Perspective, Management Information Systems Quarterly, 50. Vermeulen, E.M., Spronk, J., and Wijst N.V. (1996) Analyzing Risk and Performance Using the Multifactor Concept, European Journal of Operational Research, 93, 1, 173 – 184 51. Vitale, M. R., (1986) The growing risks of information system success, MIS Quarterly, 10, 4,, 327 – 334. 52. Voshmgir, S. (2002) Assessing the risk of IT investment project with network externalities, Americas Conference on Information Systems, Aug 9 – 11 30