<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v3.0 20080202//EN" "journalpublishing3.dtd">
<article article-type="Research Paper" dtd-version="3.0" xml:lang="en">
			  <front>
			    <journal-meta>
			      <journal-id journal-id-type="pmc">JITM</journal-id>
			      <journal-id journal-id-type="publisher-id">دانشکده مدیریت دانشگاه تهران</journal-id>
			    	<journal-title-group>
				      <journal-title>Journal of Information Technology Management</journal-title>
			    	</journal-title-group>
			      <issn pub-type="ppub">2008-5893</issn>
			      <publisher>
			        <publisher-name>دانشکده مدیریت دانشگاه تهران</publisher-name>
			      </publisher>
			    </journal-meta>
			    <article-meta>
 			      <article-id pub-id-type="publisher-id">79</article-id>
			      <article-id pub-id-type="doi">10.22059/jitm.2015.53551</article-id>		
			      <ext-link xlink:href="https://jitm.ut.ac.ir/article_53551_b1bb480ae37ccde4f95ed9c670e61884.pdf"/>		
			      <article-categories>
			        <subj-group subj-group-type="heading">
					          		<subject>IT Implications for Change Management</subject>
			        	</subj-group>
			      </article-categories>
			      <title-group>
			        <article-title>Synergy Management Model of the Holding by Fuzzy Approach; The Role of Information Technology in its Implementation</article-title>
			        <subtitle>ارائۀ سیستم فازی به‎منظور کشف فرصت‌های هم‌افزایی در شرکت‎های مادر</subtitle>
			      </title-group>
			      
			       <contrib-group>
			       <contrib contrib-type="author" id="c1">
			          <name>
			            <surname>Azar</surname>
			            <given-names>Adel</given-names>
			          </name>
					  <aff>Professor, Industry Management, Faculty of Management, Tarbiyat Modares University, Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			       <contrib-group>
			       <contrib contrib-type="author" id="c2">
			          <name>
			            <surname>Sangi</surname>
			            <given-names>Mohammad</given-names>
			          </name>
					  <aff>PhD Candidate, Industry Management, Faculty of Economic and Management, University of Semnan, Semnan, Iran</aff>
			        </contrib>
			       </contrib-group>
			       <contrib-group>
			       <contrib contrib-type="author" id="c3" corresp="yes">
			          <name>
			            <surname>Izadkhah</surname>
			            <given-names>Mohammad Mahdi</given-names>
			          </name>
					  <aff>PhD Candidate, International Marketing, Faculty of Economic and Management, University of Semnan, Semnan, Iran</aff>
			        </contrib>
			       </contrib-group>
			       <contrib-group>
			       <contrib contrib-type="author" id="c4">
			          <name>
			            <surname>Anvari</surname>
			            <given-names>Ali</given-names>
			          </name>
					  <aff>PhD Candidate, Industry Management, Faculty of Management, Tarbiyat Modares University, Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			      <pub-date pub-type="ppub">
			        <day>21</day>
			        <month>03</month>
			        <year>2015</year>
			      </pub-date>
			      <volume>7</volume>
			      <issue>1</issue>
			      <fpage>1</fpage>
			      <lpage>22</lpage>
			      <history>
			        <date date-type="received">
			          <day>28</day>
			          <month>10</month>
			          <year>2014</year>
			        </date>
			        <date date-type="accepted">
			          <day>21</day>
			          <month>01</month>
			          <year>2015</year>
			        </date>
			      </history>
			      <permissions>
			      	<copyright-statement>Copyright &#x000a9; 2015, دانشکده مدیریت دانشگاه تهران. </copyright-statement>	
			        <copyright-year>2015</copyright-year>
			      </permissions>
			       <self-uri xlink:href="https://jitm.ut.ac.ir/article_53551.html">https://jitm.ut.ac.ir/article_53551.html</self-uri> 		
			      <abstract>
			        <p>Interactions between smaller companies in order to share capabilities and weaknesses coverage are very common in holding companies. Although holding value creation by creating synergies among subsidiaries, easy looks but unpleasant practical experiences show that in some organizations the lack of precise identification of opportunities for synergies between the companies, leading to the establishment of relationships between companies that are not only useful, but it can lead to major problems. Accordingly, the main objective of this paper is to provide a fuzzy system is to explore opportunities for synergy in holding, so that the potential opportunities and synergies between related companies specified and the organization existing information system must be developed. Therefore, based on the possible links between the activities and manageability of these relations in associated companies of holding, fuzzy matrix of exploration opportunities for synergy designed and the position of all the subsidiaries to be determined in the matrix. Finally, according to the points earned by firms in synergy matrix, identifying opportunities and improve the synergy between the companies and the managers will be announced.</p>
			      </abstract>
					<kwd-group kwd-group-type="author">
						<kwd>fuzzy measures</kwd>
						<kwd>Information Technology</kwd>
						<kwd>synergy matrix</kwd>
						<kwd>synergy opportunity</kwd>
					</kwd-group>
			    </article-meta>
			  </front>
<back>
	<ref-list>
		<ref id="R1">
			<label>1</label>
			<element-citation>Atabaki, M. (2003). Organizing Models in Holding Organizations. Tadbir Journal, 14 (139): 40-46. (in Persian)</element-citation>
		</ref>
		<ref id="R2">
			<label>2</label>
			<element-citation>Ataie, M. (2009). Fuzzy Multi Attribute Decision Making. Shahrood Industrial University, (1 ed). Iran, Shahrood: Shahrood University Press. (in Persian)</element-citation>
		</ref>
		<ref id="R3">
			<label>3</label>
			<element-citation>Azar, A. &amp; Faraji, H. (2007). Fuzzy Management Science. Iranian Center of Management and Productivity Studying. (4 ed). Tehran: Mehrban Nashr Press. (in Persian)</element-citation>
		</ref>
		<ref id="R4">
			<label>4</label>
			<element-citation>Babaie, M. Hedayati, S. (2006). Synergy in Holding Organizations. 5 (17 &amp; 18). 133-158 (in Persian)</element-citation>
		</ref>
		<ref id="R5">
			<label>5</label>
			<element-citation>Banerjee, S. &amp; Roy, T. K. (2012). Arithmetic Operations on Generalized Trapezoidal Fuzzy Number and its Applications. Turkish Journal of Fuzzy Systems, 3 (1): 16-44.</element-citation>
		</ref>
		<ref id="R6">
			<label>6</label>
			<element-citation>Coffin, M.A. &amp; Taylor, B.W. (1996). Multiple criteria R&amp;D project selection and scheduling using fuzzy logic. Computers Operation Research, 3 (23): 207– 220.</element-citation>
		</ref>
		<ref id="R7">
			<label>7</label>
			<element-citation>Delgado, M., Verdegay, J.L. &amp; Vila, M.A. (1993). Linguistic decision making models. International Journal of Intelligent Systems, 7 (5): 479–492.</element-citation>
		</ref>
		<ref id="R8">
			<label>8</label>
			<element-citation>Hanafizadeh, L.A. (1965). Fuzzy set. Information and Control, (8): 338– 353.</element-citation>
		</ref>
		<ref id="R9">
			<label>9</label>
			<element-citation>(in Persian)</element-citation>
		</ref>
		<ref id="R10">
			<label>10</label>
			<element-citation>Hanafizadeh, P. &amp; Rezaie, M. (2007). E-Commerce (Definitions, Barriers and Solutions). Tehran: Jihad University, Sharif Branch. (in Persian)</element-citation>
		</ref>
		<ref id="R11">
			<label>11</label>
			<element-citation>Herrera, F., Herrera, E., Viedma, J. &amp; Verdegay, L. (1996). A model of consensus in group decision making under linguistic assessments. Fuzzy Sets and Systems, 1 (78): 73– 87.</element-citation>
		</ref>
		<ref id="R12">
			<label>12</label>
			<element-citation>Kuchta, D. (2001). A fuzzy mode for R&amp;D project selection with benefit, outcome and resource. The Engineering Economist, 46 (3): 164-180.</element-citation>
		</ref>
		<ref id="R13">
			<label>13</label>
			<element-citation>Lin, C. &amp; Hsieh, P.J. (2004). A fuzzy decision support system for strategic portfolio management. Decision Support Systems, 38 (3): 383– 398.</element-citation>
		</ref>
		<ref id="R14">
			<label>14</label>
			<element-citation>Machacha, L.L. &amp; Bhattacharya, P. (2000). A fuzzy logic based approach to project selection. IEEE Transactions on Engineering Management, 47 (1): 65– 74.</element-citation>
		</ref>
		<ref id="R15">
			<label>15</label>
			<element-citation>Merriam-Webster. (2005). Merriam-Webster's Collegiate Dictionary (11th ed.). Springfield, MA: Merriam-Webster.</element-citation>
		</ref>
		<ref id="R16">
			<label>16</label>
			<element-citation>Noravesh, A. (2004). Comprehensive Book of Accounting and Finance. Tehran: University Press. Tehran. Iran (in Persian)</element-citation>
		</ref>
		<ref id="R17">
			<label>17</label>
			<element-citation>Parsaeeian, A. &amp; Arabi, M. (2001). Management Fundamentals. Office of Cultural Studies Press. (4 ed). Tehran. Iran. (in Persian)</element-citation>
		</ref>
		<ref id="R18">
			<label>18</label>
			<element-citation>Penros, E. T. (1959). The Theory of Growth of the Firm. Oxford University Press. New York.</element-citation>
		</ref>
		<ref id="R19">
			<label>19</label>
			<element-citation>Porter, M.E. (1987). From Competitive Advantage to Corporate. Harvard Business Review. 65 (3).</element-citation>
		</ref>
		<ref id="R20">
			<label>20</label>
			<element-citation>Prahalad, C. &amp; Doz, Y. (1987). The multi-national mission: Balancing local demands and global visions. New York, NY: Free Press.</element-citation>
		</ref>
		<ref id="R21">
			<label>21</label>
			<element-citation>Rasmy, M.H., Lee, S.M., Abd El-Wahed, W.F., Ragab, A.M. &amp; El-Sherbiny, M.M. (2002). An expert system for multi objective decision making: application of fuzzy linguistic preferences and goal programming. Fuzzy Sets and Systems, 12 (127): 209– 220.</element-citation>
		</ref>
		<ref id="R22">
			<label>22</label>
			<element-citation>René, M. (1989). Ancestors and family: the birth of a myth. Jacob Levy Moreno. 1889-1974: Father of psychodrama, sociometry, and group psychotherapy. Rutledge Press.</element-citation>
		</ref>
		<ref id="R23">
			<label>23</label>
			<element-citation>Rezaeeian, A. (2001). Fundamentals of Organizational Behavior Management. Samt Press. Tehran (in Persian)</element-citation>
		</ref>
		<ref id="R24">
			<label>24</label>
			<element-citation>Smith, C.E. (2011). Who Stole My Synergy? The Human Factors That Make Mergers works. Available in: http://libraryofprofessionalcoaching.com/ concepts /managing-stress-and-challenges/who-stole-my-synergy.</element-citation>
		</ref>
		<ref id="R25">
			<label>25</label>
			<element-citation>US Department of Energy, (1993). Public Utility holding Company Act of 1935-1992. Washington DC. 20585</element-citation>
		</ref>
	</ref-list>
		</back>
</article>
<article article-type="Research Paper" dtd-version="3.0" xml:lang="en">
			  <front>
			    <journal-meta>
			      <journal-id journal-id-type="pmc">JITM</journal-id>
			      <journal-id journal-id-type="publisher-id">دانشکده مدیریت دانشگاه تهران</journal-id>
			    	<journal-title-group>
				      <journal-title>Journal of Information Technology Management</journal-title>
			    	</journal-title-group>
			      <issn pub-type="ppub">2008-5893</issn>
			      <publisher>
			        <publisher-name>دانشکده مدیریت دانشگاه تهران</publisher-name>
			      </publisher>
			    </journal-meta>
			    <article-meta>
 			      <article-id pub-id-type="publisher-id">79</article-id>
			      <article-id pub-id-type="doi">10.22059/jitm.2015.53552</article-id>		
			      <ext-link xlink:href="https://jitm.ut.ac.ir/article_53552_280d95d80a25000d0ca1745a89e5b9bd.pdf"/>		
			      <article-categories>
			        <subj-group subj-group-type="heading">
					          		<subject>Computational intelligence: Fuzzy logic,Neural Networks,Evolutionary Algorithms,Neuro-Fuzzy Systems and other</subject>
			        	</subj-group>
			      </article-categories>
			      <title-group>
			        <article-title>A Novel Decision Support System for Discrete Cost-CO2 Emission Trade-off in Construction Projects: The Usage of Imitate Genetic Algorithm</article-title>
			        
			      </title-group>
			      
			       <contrib-group>
			       <contrib contrib-type="author" id="c1" corresp="yes">
			          <name>
			            <surname>Beheshti-Nia</surname>
			            <given-names>Mohammad Ali</given-names>
			          </name>
					  <aff>Assistant Prof., Faculty of Material and Industrial Engineering, University of Semnan, Semnan, Iran</aff>
			        </contrib>
			       </contrib-group>
			       <contrib-group>
			       <contrib contrib-type="author" id="c2">
			          <name>
			            <surname>Farazmand</surname>
			            <given-names>Nahid</given-names>
			          </name>
					  <aff>MSc. Student in MBA, Faculty of Material and Industrial Engineering, University of Semnan, Semnan, Iran</aff>
			        </contrib>
			       </contrib-group>
			      <pub-date pub-type="ppub">
			        <day>21</day>
			        <month>03</month>
			        <year>2015</year>
			      </pub-date>
			      <volume>7</volume>
			      <issue>1</issue>
			      <fpage>23</fpage>
			      <lpage>48</lpage>
			      <history>
			        <date date-type="received">
			          <day>13</day>
			          <month>11</month>
			          <year>2014</year>
			        </date>
			        <date date-type="accepted">
			          <day>03</day>
			          <month>02</month>
			          <year>2015</year>
			        </date>
			      </history>
			      <permissions>
			      	<copyright-statement>Copyright &#x000a9; 2015, دانشکده مدیریت دانشگاه تهران. </copyright-statement>	
			        <copyright-year>2015</copyright-year>
			      </permissions>
			       <self-uri xlink:href="https://jitm.ut.ac.ir/article_53552.html">https://jitm.ut.ac.ir/article_53552.html</self-uri> 		
			      <abstract>
			        <p>Under an intensive competitive environment, the construction industry is facing pressure to meet the higher customer expectations under a tighter budget. On the other hand, construction is one of the main sectors generating greenhouse gases. According to published statistics, construction industry is one of the most important resources of greenhouse emissions in the world. Therefore, based on the growing attention to the environment situation and according to the enabler capabilities of the decision support systems, in this paper, a genetic algorithm-based decision support system for solving a trade-off problem between the cost and the amount of CO2 emissions in construction projects is proposed. The genetic algorithm proposing here, is the new algorithm, named “imitate genetic algorithm”. For showing the reliability of the proposed algorithm, the results of its application have been compared with the results of classic genetic algorithm for 108 problems with different sizes. The results show the excellence of the proposed algorithm in comparison with classic genetic algorithm.</p>
			      </abstract>
					<kwd-group kwd-group-type="author">
						<kwd>carbon dioxide emission</kwd>
						<kwd>cost-CO2 emission trade-off</kwd>
						<kwd>decision support system</kwd>
						<kwd>Genetic Algorithm</kwd>
					</kwd-group>
			    </article-meta>
			  </front>
<back>
	<ref-list>
		<ref id="R1">
			<label>1</label>
			<element-citation>Acquaye, A. A. &amp; Duffy, A. P. (2010). Input–output analysis of Irish construction sector greenhouse gas emissions. Building and Environment, 45 (3): 784-791.</element-citation>
		</ref>
		<ref id="R2">
			<label>2</label>
			<element-citation>Agarwal, V., Upadhyay, R.K. &amp; Pathak, B.K. (2013). A State of Art Review on Time Cost Trade off Problems in Project Scheduling. International Journal of Application or Innovation in Engineering &amp; Management (IJAIEM), 2 (5): 36-43.</element-citation>
		</ref>
		<ref id="R3">
			<label>3</label>
			<element-citation>Buchanan, A. H. &amp; Honey, B. G. (1994). Energy and carbon dioxide implications of building construction. Energy and Buildings, 20 (3): 205-217.</element-citation>
		</ref>
		<ref id="R4">
			<label>4</label>
			<element-citation>Calhoun, C. J. (2010). Robert K. Merton: Sociology of Science and Sociology as Science, New York: Columbia UP. ISBN 978-0-231-15112-2.</element-citation>
		</ref>
		<ref id="R5">
			<label>5</label>
			<element-citation>Cole, R. J. (1999). Energy and greenhouse gas emissions associated with the construction of alternative structural systems. Building and Environment, 34 (3): 335-348.</element-citation>
		</ref>
		<ref id="R6">
			<label>6</label>
			<element-citation>Dawson, E. M. &amp; Chatman, E. A. (2001). Reference group theory with implications for information studies: a theoretical essay. Information Research, 6(3). Retrieved from http://InformationR.net/6-3/paper105.html.</element-citation>
		</ref>
		<ref id="R7">
			<label>7</label>
			<element-citation>Dimoudi, A. &amp; Tompa, C. (2008). Energy and environmental indicators related to construction of office buildings. Resources, Conservation and Recycling, 53(1–2): 86-95.</element-citation>
		</ref>
		<ref id="R8">
			<label>8</label>
			<element-citation>Ding, G.K.C. (2008). Sustainable construction-the role of environmental assessment tools. Journal of Environmental Management, 86 (3): 451-464.</element-citation>
		</ref>
		<ref id="R9">
			<label>9</label>
			<element-citation>EPA (2009). Potential for reducing greenhouse gas emissions in the construction sector, Washington D.C.: Environmental Protection Agency.</element-citation>
		</ref>
		<ref id="R10">
			<label>10</label>
			<element-citation>Feng, C. W., Liu, L. &amp; Burns, S. A. (1997). Using genetic algorithms to solve construction time-cost trade-off problems. Journal of Computing in Civil Engineering, 11 (3):184-189.</element-citation>
		</ref>
		<ref id="R11">
			<label>11</label>
			<element-citation>Goldberg, DE. (1989). Genetic Algorithms in Search, Optimization, and Machine Learning, M.A., USA: Addison-Wesley.</element-citation>
		</ref>
		<ref id="R12">
			<label>12</label>
			<element-citation>González, M. J. &amp; Navarro, J. G. (2006). Assessment of the decrease of CO2 emissions in the construction field through the selection of materials: practical case study of three houses of low environmental impact, Building and Environment, 41 (7): 902-909.</element-citation>
		</ref>
		<ref id="R13">
			<label>13</label>
			<element-citation>Holton, G. (2004). Robert K. Merton - Biographical Memoirs, proceedings of the American philosophical society, 148 (4): 505-517.</element-citation>
		</ref>
		<ref id="R14">
			<label>14</label>
			<element-citation>Kalhor, Khanzadi, M., Eshtehardian, E. &amp; Afshar, A. (2011). Stochastic time–cost optimization using non-dominated archiving ant colony approach. Automation in Construction, 20 (8): 1193-1203.</element-citation>
		</ref>
		<ref id="R15">
			<label>15</label>
			<element-citation>Ke, H. &amp; Ma, J. (2014). Modeling project time–cost trade off in fuzzy random environment. Applied Soft Computing, (19): 80–85.</element-citation>
		</ref>
		<ref id="R16">
			<label>16</label>
			<element-citation>Ke, H. (2014). A genetic algorithm-based optimizing approach for project time-cost trade-off with uncertain measure. Journal of Uncertainty Analysis and Applications, 2(1):8. DOI: 10.1186/2195-5468-2-8.</element-citation>
		</ref>
		<ref id="R17">
			<label>17</label>
			<element-citation>Ke, H., Maa, W., Ni, Y. (2009). Optimization models and a GA-based algorithm for stochastic time-cost trade-off problem, Applied Mathematics and Computation, 215(1): 308-313.</element-citation>
		</ref>
		<ref id="R18">
			<label>18</label>
			<element-citation>Klanšek, U. &amp; Pšunder, M. (2012). MINLP optimization model for the nonlinear discrete time–cost trade-off problem. Advances in Engineering Software,48 (1): 6–16.</element-citation>
		</ref>
		<ref id="R19">
			<label>19</label>
			<element-citation>Lit, H. &amp; Love, P. (1997). Using improved genetic algorithms to facilitate time-cost optimization. journal of construction engineering and management, 123 (3): 233-237.</element-citation>
		</ref>
		<ref id="R20">
			<label>20</label>
			<element-citation>Liu, L., Burns, S.A. &amp; Feng, C.W. (1995). Construction time-cost trade-off analysis using LP/IP hybrid method, Journal of construction engineering and management, 121(4): 446-454.</element-citation>
		</ref>
		<ref id="R21">
			<label>21</label>
			<element-citation>Liu, S., Tao, R. &amp; Ming Tam, C. (2013). Optimizing cost and CO2 emission for construction projects using particle swarm optimization, Habitat International, 37 (1): 155-162.</element-citation>
		</ref>
		<ref id="R22">
			<label>22</label>
			<element-citation>Mokhtari, H., Baradaran Kazemzadeh, R. &amp; Salmasnia A. (2011). Time-Cost Tradeoff Analysis in Project Management: An Ant System Approach, IEEE Transactions on Engineering Management, 58 (1): 36-43.</element-citation>
		</ref>
		<ref id="R23">
			<label>23</label>
			<element-citation>Monghasemi, S., Nikoo, M. R., Khaksar Fasaee, M. A. &amp; Adamowski, J. (2014). A Novel Multi Criteria Decision Making Model for Optimizing Time-Cost-Quality Trade-off Problems in Construction Projects, Expert Systems with Applications. http://dx.doi.org/10.1016/j.eswa.2014.11.032.</element-citation>
		</ref>
		<ref id="R24">
			<label>24</label>
			<element-citation>Nabipoor Afruzi, Roghanian, E., Najafi, A.A. &amp; Mazinani, M. (2013). A multi-mode resource-constrained discrete time–cost tradeoff problem solving using an adjusted fuzzy dominance genetic algorithm. Scientia Iranica, 20 (3): 931–944.</element-citation>
		</ref>
		<ref id="R25">
			<label>25</label>
			<element-citation>Pathak, B. K. &amp; Srivastava, S. (2014). Integrated Fuzzy–HMH for project uncertainties in time–cost tradeoff problem, Applied Soft Computing, 21: 320-329.</element-citation>
		</ref>
		<ref id="R26">
			<label>26</label>
			<element-citation>Rahimi, M. &amp; Iranmanesh, H. (2008). Multi Objective Particle Swarm Optimization for a Discrete Time, Cost and Quality Trade -off Problem, World Applied Sciences Journal, 4 (2): 270-276.</element-citation>
		</ref>
		<ref id="R27">
			<label>27</label>
			<element-citation>Singh, G. &amp; Ernst, A. T. (2011). Resource constraint scheduling with a fractional shared resource. Operations Research Letters, 39 (5): 363–368.</element-citation>
		</ref>
		<ref id="R28">
			<label>28</label>
			<element-citation>Sonmez, R. &amp; Bettemir, Ö. H. (2012). A hybrid genetic algorithm for the discrete time–cost trade-off problem. Expert Systems with Applications, 39 (13): 11428–11434.</element-citation>
		</ref>
		<ref id="R29">
			<label>29</label>
			<element-citation>Tavana, M., Abtahi, A.R. &amp; Khalili-Damghani, K. (2014). A new multi-objective multi-mode model for solving preemptive time–cost–quality trade-off project scheduling problems. Expert Systems with Applications, 41 (4): 1830–1846.</element-citation>
		</ref>
		<ref id="R30">
			<label>30</label>
			<element-citation>Wuliang, P. &amp; Chengen, W. (2009). A multi-mode resource-constrained discrete time–cost tradeoff problem and its genetic algorithm based solution. International Journal of Project Management, 27 (6): 600–609.</element-citation>
		</ref>
		<ref id="R31">
			<label>31</label>
			<element-citation>Xu, J., Zheng, H., Zeng, Z., Wu, S. &amp; Shen, M. (2012). Discrete time–cost–environment trade-off problem for large-scale construction systems with multiple modes under fuzzy uncertainty and its application to Jinping-II Hydroelectric Project. International Journal of Project Management, 30 (8): 950-966.</element-citation>
		</ref>
		<ref id="R32">
			<label>32</label>
			<element-citation>Yan, H., Shen, Q., Fan, L.C.H., Wang, Y. &amp; Zhang, L. (2010). Greenhouse gas emissions in building construction: A case study of One Peking in Hong Kong. Building and Environment, 45 (4): 949-955.</element-citation>
		</ref>
	</ref-list>
		</back>
</article>
<article article-type="Research Paper" dtd-version="3.0" xml:lang="en">
			  <front>
			    <journal-meta>
			      <journal-id journal-id-type="pmc">JITM</journal-id>
			      <journal-id journal-id-type="publisher-id">دانشکده مدیریت دانشگاه تهران</journal-id>
			    	<journal-title-group>
				      <journal-title>Journal of Information Technology Management</journal-title>
			    	</journal-title-group>
			      <issn pub-type="ppub">2008-5893</issn>
			      <publisher>
			        <publisher-name>دانشکده مدیریت دانشگاه تهران</publisher-name>
			      </publisher>
			    </journal-meta>
			    <article-meta>
 			      <article-id pub-id-type="publisher-id">79</article-id>
			      <article-id pub-id-type="doi">10.22059/jitm.2015.53239</article-id>		
			      <ext-link xlink:href="https://jitm.ut.ac.ir/article_53239_c79fe6038a72c706de10b966ae5aedd2.pdf"/>		
			      <article-categories>
			        <subj-group subj-group-type="heading">
					          		<subject>Electronic Government (e-Government)</subject>
			        	</subj-group>
			      </article-categories>
			      <title-group>
			        <article-title>Developing and Identifying Possibility &amp; Plausibility of E-Government Services Scenarios in Iran by 1404</article-title>
			        <subtitle>تدوین و شناسایی سناریوهای امکان‎پذیرآیندۀ خدمات دولت الکترونیک ایران در افق 1404</subtitle>
			      </title-group>
			      
			       <contrib-group>
			       <contrib contrib-type="author" id="c1" corresp="yes">
			          <name>
			            <surname>Sghafi</surname>
			            <given-names>Fateme</given-names>
			          </name>
					  <aff>Assistant Prof., Interdisciplinary Department of Technology, Faculty of New Sciences and Technologies, University of Tehran, Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			       <contrib-group>
			       <contrib contrib-type="author" id="c2">
			          <name>
			            <surname>Aliahmadi</surname>
			            <given-names>Alireza</given-names>
			          </name>
					  <aff>Prof., Faculty of Industries, Iran University of Science and Technology, Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			       <contrib-group>
			       <contrib contrib-type="author" id="c3">
			          <name>
			            <surname>Ghazi Noory</surname>
			            <given-names>Seyed Sepehr</given-names>
			          </name>
					  <aff>Associate Prof., Economic and Management Dept., Tarbiat Modares University, Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			       <contrib-group>
			       <contrib contrib-type="author" id="c4">
			          <name>
			            <surname>Hourali</surname>
			            <given-names>Mansoureh</given-names>
			          </name>
					  <aff>Ph.D. Candidate, Industry Engineering, Payam-E Noor University, Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			      <pub-date pub-type="ppub">
			        <day>21</day>
			        <month>03</month>
			        <year>2015</year>
			      </pub-date>
			      <volume>7</volume>
			      <issue>1</issue>
			      <fpage>49</fpage>
			      <lpage>68</lpage>
			      <history>
			        <date date-type="received">
			          <day>01</day>
			          <month>07</month>
			          <year>2014</year>
			        </date>
			        <date date-type="accepted">
			          <day>10</day>
			          <month>01</month>
			          <year>2015</year>
			        </date>
			      </history>
			      <permissions>
			      	<copyright-statement>Copyright &#x000a9; 2015, دانشکده مدیریت دانشگاه تهران. </copyright-statement>	
			        <copyright-year>2015</copyright-year>
			      </permissions>
			       <self-uri xlink:href="https://jitm.ut.ac.ir/article_53239.html">https://jitm.ut.ac.ir/article_53239.html</self-uri> 		
			      <abstract>
			        <p>Many documents in the field of e-government services in Iran have been developed and recently approved, but these documents were ignored future trends and scenarios. The aim of research is developing futures scenario of e-government services by 1404. In this study, using the global network business and success factors, the important uncertainties are identified by expert’s opinions. Population is of 50 Iranian e-government experts and futurists. The current research is the compound research. Using questionnaires and analysis of documents and expert panel, the required data are gathered. Validity of the questionnaire assessed using the panel of experts and the Cronbach&#039;s alpha was used for validation. With determination of three uncertainty composed of trust, interoperability and world trade market entry according to the expert&#039;s views as the main scenario, eight scenarios were extracted. Then, with the help of experts, four scenario with higher degree of feasibility were selected which allows policymakers to deal with the best possible of future situation.</p>
			      </abstract>
					<kwd-group kwd-group-type="author">
						<kwd>e-government scenario method</kwd>
						<kwd>Futures Studies</kwd>
						<kwd>uncertainty</kwd>
					</kwd-group>
			    </article-meta>
			  </front>
<back>
	<ref-list>
		<ref id="R1">
			<label>1</label>
			<element-citation>Abzari, M., Ghorbani, H., Khajeh-zadeh, H. &amp; Makinian, E. (2011). An AHP Methodology for Ranking the Factors Influencing Trust in the Internet. Quarterly Journal of Information technology management, 3(7): 1-18. </element-citation>
		</ref>
		<ref id="R2">
			<label>2</label>
			<element-citation>(in Persian)</element-citation>
		</ref>
		<ref id="R3">
			<label>3</label>
			<element-citation>Alizadeh, A., Vahidi Motlagh, V. &amp; Nazemi, A. (2008). Scenario based Planning, Institute for International Energy Studies, Tehran: Iran. (in Persian)</element-citation>
		</ref>
		<ref id="R4">
			<label>4</label>
			<element-citation>Arcade, J., Godet, M., Meunier, F., &amp; Roubelat, F. (1999). Structural analysis with the MICMAC method &amp; Actor's strategy with MACTOR method. Futures Research Methodology, American Council for the United Nations University: The Millennium Project, 1-69.</element-citation>
		</ref>
		<ref id="R5">
			<label>5</label>
			<element-citation>Bicking, M., Janssen, M., &amp; Wimmer, M. (2006). Scenarios for governments in 2020: Towards a roadmap for future e-government research in Europe. In P. Cunningham &amp; M. Cunningham (Eds.), Exploiting the knowledge economy: Issues, applications, case studies. Amsterdam: IOS Press.</element-citation>
		</ref>
		<ref id="R6">
			<label>6</label>
			<element-citation>Bood, R. &amp; Postma, T. (1997). Strategic learning with scenarios. European Management Journal, 15(6): 633-647.</element-citation>
		</ref>
		<ref id="R7">
			<label>7</label>
			<element-citation>Borjeson, L.M. &amp; Hojer, K. &amp; Dreborg. M. (2006). Scenario types &amp; techniques: towards a user’s guide. Futures, 38 (7): 723-739.</element-citation>
		</ref>
		<ref id="R8">
			<label>8</label>
			<element-citation>Bretschneider, S. (2003). Information Technology, E–Government, and Institutional Change. Public Administration Review, 63 (6): 738-741.</element-citation>
		</ref>
		<ref id="R9">
			<label>9</label>
			<element-citation>Fahey, L. &amp; Robert M. R. (1998). Learning from the future, competitive foresightscenarios, Canada: John wiley &amp; sons Inc.</element-citation>
		</ref>
		<ref id="R10">
			<label>10</label>
			<element-citation>Fallahi, M. (2007). The Obstacles and Guidelines of Establishing E-government in Iran: case study: Ministry of Commerce, MSc Thesis, and Tarbiat Modares University Faculty of Engineering Lulea University of Technology. </element-citation>
		</ref>
		<ref id="R11">
			<label>11</label>
			<element-citation>(in Persian)</element-citation>
		</ref>
		<ref id="R12">
			<label>12</label>
			<element-citation>Gao, S., Krogstie, J. &amp; Gransæther, P.A. (2008). Mobile Services Acceptance Model, International Conference on Convergence and Hybrid Information Technology, IEEE, AUG.</element-citation>
		</ref>
		<ref id="R13">
			<label>13</label>
			<element-citation>Gausemeier, J., Fink, A. &amp; Schlake, O. (1996). Szenario-Management - Planen und Führen. Munich: Carl Hanser Verlag.</element-citation>
		</ref>
		<ref id="R14">
			<label>14</label>
			<element-citation>Ghyasi, F. (2004). Uses of Mobile Government in Developing Countries, 2th Mobile Government Lab (MGOVLAB) &amp; International University of Japan, Niigata, Japan.</element-citation>
		</ref>
		<ref id="R15">
			<label>15</label>
			<element-citation>Kushchu, I. &amp; Borucki, C. (2003). A mobility response model for government. In the proceeding of European conference on E-Government (ECEG 2003), Trinity College, Dublin.</element-citation>
		</ref>
		<ref id="R16">
			<label>16</label>
			<element-citation>Moghimi, M. &amp; Alaei Ardakani, M. (2011). Measuring good goverance factors and e-government role in enhancing it. Quarterly Journal of Information technology management, 3(8): 171–188. (in Persian)</element-citation>
		</ref>
		<ref id="R17">
			<label>17</label>
			<element-citation>Mohammadi, f., Afsar, A., Taghizadeh, J. &amp; Bagheri Dehnavi, M. (2013). Evaluation of Effective Factors on e-Loyalty in Organizations Providing Electronic Services using Fuzzy AHP Method. Quarterly Journal of Information technology management, 4(13): 135-156. (in Persian)</element-citation>
		</ref>
		<ref id="R18">
			<label>18</label>
			<element-citation>Mukherjee, A. &amp; Biswas, A. (2005). Simple Implementation Framework for m-Government Services, International third Conference on Mobile Business (ICMB’05), IEEE.</element-citation>
		</ref>
		<ref id="R19">
			<label>19</label>
			<element-citation>Puglisi, M. (2012). The Study of the Futures: An Overview of Futures Studies Methodologies. SURF (Centre for Sustainable Urban and Regional Futures); pp.445-454. http://om.ciheam.org/om/pdf/a44/02001611.pdf.</element-citation>
		</ref>
		<ref id="R20">
			<label>20</label>
			<element-citation>Rekola, K.  &amp; Pohjanpalo, P., (2002). Developing regulation for the IT regime, proceeding of 4th International Financial Law Review, Finland, pp.69-77.</element-citation>
		</ref>
		<ref id="R21">
			<label>21</label>
			<element-citation>Saghafi, F. (2011). Clarification of E-government Critical Success Factor with future study approach, PhD Dissertation in Industrial Engineering, Industrial Faculty, Iran Univarsity of Science and Technolog.</element-citation>
		</ref>
		<ref id="R22">
			<label>22</label>
			<element-citation>Saghafi, F., Aliahmadi, A., Ghazinoory, S. &amp; Hourali, M. (2014a). Designing and Implementing Backcasting Reference Model for Identifying Critical Factors for Success (CFS) of Iran’s Electronic Government Services, Strategic studies of Globalization Journal, 5(14): 205-240. (in Persian)</element-citation>
		</ref>
		<ref id="R23">
			<label>23</label>
			<element-citation>Saghafi, F., Aliahmadi, A., Ghazinoory, S. &amp; Hourali, M. (2014b). Achieving the desired future e-government services of Iran based on the backcasting, Iranian journal of management sciences, 9 (34): 125-144. (in Persian)</element-citation>
		</ref>
		<ref id="R24">
			<label>24</label>
			<element-citation>Sandy, G. A. &amp; McMillan, S. (2005). A Success Factors Model for M-Government. The 5th European Conference on Mobile Government, pp. 349-358.</element-citation>
		</ref>
		<ref id="R25">
			<label>25</label>
			<element-citation>Schwartz, P. (1996). The art of the long view: paths to strategic insight for yourself and your company. Broadway Business.</element-citation>
		</ref>
		<ref id="R26">
			<label>26</label>
			<element-citation>Tolbert, C. J., &amp; Mossberger, K. (2006). The effects of e-government on trust and confidence in government. Public Administration Review, 66 (3): 354-369.</element-citation>
		</ref>
		<ref id="R27">
			<label>27</label>
			<element-citation>Van Notten, P. W., Rotmans, J., Van Asselt, M. B. &amp; Rothman, D. S. (2003). An updated scenario typology. Futures, 35(5): 423-443.</element-citation>
		</ref>
		<ref id="R28">
			<label>28</label>
			<element-citation>Von der Gracht, H.A. (2008). The Future of Logistics: Scenarios for 2025. Frankfurt/ Main: Gabler Edition Wissenschaft.</element-citation>
		</ref>
		<ref id="R29">
			<label>29</label>
			<element-citation>Wang, Y. S. &amp; Liao, Y. W. (2007). The Conceptualization and Measurement of M-Commerce User Satisfaction. Computers in Human Behavior, 23 (1): 381-398.</element-citation>
		</ref>
		<ref id="R30">
			<label>30</label>
			<element-citation>Wei, X. &amp; Zhao, J. (2005). Citizens' requirement analysis in Chinese e-Government. In Proceedings of the 7th international conference on Electronic commerce, China, pp.525-428, ACM.</element-citation>
		</ref>
		<ref id="R31">
			<label>31</label>
			<element-citation>Welch, E. W. &amp; Wong, W. (2001). Global information technology pressure and government accountability: the mediating effect of domestic context on website openness. Journal of Public Administration Research and Theory, 11(4): 509-538.</element-citation>
		</ref>
		<ref id="R32">
			<label>32</label>
			<element-citation>Zali, N. (2010). Regional Development Foresight with Emphasis on Scenario- base Planning Approach, Phd Dissertation, Humanity and Siial Science, University of Tabriz.</element-citation>
		</ref>
		<ref id="R33">
			<label>33</label>
			<element-citation>Zarei, B., Saghafi, F., Zarrin, L. (2013). Measuring the Amount of Effects of Capability Approach on Developing E-government. Quarterly Journal of Information technology management, 5(2): 75-94. (in Persian)</element-citation>
		</ref>
	</ref-list>
		</back>
</article>
<article article-type="Research Paper" dtd-version="3.0" xml:lang="en">
			  <front>
			    <journal-meta>
			      <journal-id journal-id-type="pmc">JITM</journal-id>
			      <journal-id journal-id-type="publisher-id">دانشکده مدیریت دانشگاه تهران</journal-id>
			    	<journal-title-group>
				      <journal-title>Journal of Information Technology Management</journal-title>
			    	</journal-title-group>
			      <issn pub-type="ppub">2008-5893</issn>
			      <publisher>
			        <publisher-name>دانشکده مدیریت دانشگاه تهران</publisher-name>
			      </publisher>
			    </journal-meta>
			    <article-meta>
 			      <article-id pub-id-type="publisher-id">79</article-id>
			      <article-id pub-id-type="doi">10.22059/jitm.2015.53553</article-id>		
			      <ext-link xlink:href="https://jitm.ut.ac.ir/article_53553_9fc45424ade969d62d1367b600a05d88.pdf"/>		
			      <article-categories>
			        <subj-group subj-group-type="heading">
					          		<subject>IT Project Management (ITPM)</subject>
			        	</subj-group>
			      </article-categories>
			      <title-group>
			        <article-title>Investigation and Prioritizing Outsourcing of Information and Communication Technology (ICT) Projects (Case Study: ICT Infrastructure Projects)</article-title>
			        
			      </title-group>
			      
			       <contrib-group>
			       <contrib contrib-type="author" id="c1" corresp="yes">
			          <name>
			            <surname>Khansarizadeh</surname>
			            <given-names>Seyed Ehsan</given-names>
			          </name>
					  <aff>MSc. Graduated In Information Technology Management, Institude of Higher Education of Mehralborz, Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			       <contrib-group>
			       <contrib contrib-type="author" id="c2">
			          <name>
			            <surname>Shirmohammadi</surname>
			            <given-names>Mehdi</given-names>
			          </name>
					  <aff>Assistant Prof ,Management Group ,Institude of Higher Education of Ershad, Damavand, Iran</aff>
			        </contrib>
			       </contrib-group>
			      <pub-date pub-type="ppub">
			        <day>21</day>
			        <month>03</month>
			        <year>2015</year>
			      </pub-date>
			      <volume>7</volume>
			      <issue>1</issue>
			      <fpage>69</fpage>
			      <lpage>84</lpage>
			      <history>
			        <date date-type="received">
			          <day>12</day>
			          <month>10</month>
			          <year>2014</year>
			        </date>
			        <date date-type="accepted">
			          <day>03</day>
			          <month>02</month>
			          <year>2015</year>
			        </date>
			      </history>
			      <permissions>
			      	<copyright-statement>Copyright &#x000a9; 2015, دانشکده مدیریت دانشگاه تهران. </copyright-statement>	
			        <copyright-year>2015</copyright-year>
			      </permissions>
			       <self-uri xlink:href="https://jitm.ut.ac.ir/article_53553.html">https://jitm.ut.ac.ir/article_53553.html</self-uri> 		
			      <abstract>
			        <p>Outsourcing IT functions is being developed as a replacement for implementing IT projects or rendering IT services within organizations. Organizations’ past experiences in outsourcing indicate that this process poses variety of risks and problems. This study is aimed to identify and prioritize the risks of outsourcing IT infrastructure projects. Classifying risks of outsourcing along with incorporating thematic experts’ experiences through the Delphi method, reveals various risks associated with the employer and the contractor as the primary sources of risks as well as general risks and chronological risks which occur in the periods before, during and after contracts. A total of 22 main risks were identified and categorized. Afterwards, based on the opinions obtained from thematic experts and using the Analytic Hierarchy Process, different types of risks were prioritized. The results suggest that those risks arising due to failings of structure and content are more important than those of technical and contextual knowledge.</p>
			      </abstract>
					<kwd-group kwd-group-type="author">
						<kwd>AHP</kwd>
						<kwd>Contract</kwd>
						<kwd>Delphi</kwd>
						<kwd>IT outsourcing</kwd>
						<kwd>Risk Management</kwd>
					</kwd-group>
			    </article-meta>
			  </front>
<back>
	<ref-list>
		<ref id="R1">
			<label>1</label>
			<element-citation>Abdullah, L. M. &amp; Verner, J. M. (2008). Risk framework for outsourced strategic IT system development from the client perspective. Software Metrics European Forum, Milan, Italy.</element-citation>
		</ref>
		<ref id="R2">
			<label>2</label>
			<element-citation>Abdullah, L. M. &amp; Verner, J. M. (2012). Analysis and application of an outsourcing risk framework. Journal of Systems and Software, 85(8): 1930-1952.</element-citation>
		</ref>
		<ref id="R3">
			<label>3</label>
			<element-citation>Akomode, O. J., Lees, B. &amp; Irgens, C. (1998). Constructing customised models and providing information to support IT outsourcing decisions. Logistics Information Management, 11(2): 114-127.</element-citation>
		</ref>
		<ref id="R4">
			<label>4</label>
			<element-citation>Aundhe, M. D. &amp; Mathew, S.K. (2009). Risks in offshore IT outsourcing: A service provider perspective. European Management Journal, 27 (6): 418-428.</element-citation>
		</ref>
		<ref id="R5">
			<label>5</label>
			<element-citation>Bahli, B. &amp; Rivard, S. (2005). Validating measures of information technology outsourcing risk factors. Omega, 33(2): 175-187.</element-citation>
		</ref>
		<ref id="R6">
			<label>6</label>
			<element-citation>Bhattacharya, S., Behara, R.S. &amp; Gundersen, D.E. (2003). Business risk perspectives on information systems outsourcing. International Journal of Accounting Information Systems, 4(1): 75-93.</element-citation>
		</ref>
		<ref id="R7">
			<label>7</label>
			<element-citation>Brandas, C. (2010). Risks and audit objectives for IT outsourcing. Informatica Economica Journal, 14(1): 113-118.</element-citation>
		</ref>
		<ref id="R8">
			<label>8</label>
			<element-citation>Chou, D. C. &amp; Chou, A. Y. (2009). Information systems outsourcing life cycle and risks analysis. Computer Standards &amp; Interfaces, 31(5): 1036-1043.</element-citation>
		</ref>
		<ref id="R9">
			<label>9</label>
			<element-citation>Cong, G. &amp; Chen, T. (2014). A Novel Dynamic Algorithm for IT Outsourcing Risk Assessment Based on Transaction Cost Theory. Discrete Dynamics in Nature and Society 501:325890.</element-citation>
		</ref>
		<ref id="R10">
			<label>10</label>
			<element-citation>Currie, W. L. (2003). A knowledge-based risk assessment framework for evaluating web-enabled application outsourcing projects. International Journal of Project Management, 21(3): 207-217.</element-citation>
		</ref>
		<ref id="R11">
			<label>11</label>
			<element-citation>Lacity, M. C., Khan, S. A. &amp; Willcocks, L.P. (2009). A review of the IT outsourcing literature: Insights for practice." The Journal of Strategic Information Systems, 18(3): 130-146.</element-citation>
		</ref>
		<ref id="R12">
			<label>12</label>
			<element-citation>Lingmin, J. &amp; Ruiqiong, Z. (2014). ITO Risks Preliminary Analysis Model of IT Outsourcing Corporations in China.School of Informatics, Guangdong University.</element-citation>
		</ref>
		<ref id="R13">
			<label>13</label>
			<element-citation>Mikaeili, F. &amp; Sedaghati, H. (2006). Assess the risks of outsourcing IT projects. Industrial Management Studies, 22(13): 19-40 (in Persian).</element-citation>
		</ref>
		<ref id="R14">
			<label>14</label>
			<element-citation>Nakatsu, R. T. &amp; Iacovou, C. L. (2009). A comparative study of important risk factors involved in offshore and domestic outsourcing of software development projects: A two-panel Delphi study. Information &amp; Management, 46(1): 57-68.</element-citation>
		</ref>
		<ref id="R15">
			<label>15</label>
			<element-citation>Satty, T. L. (1980). The analytic hierarchy process, New York: McGraw-Hill.</element-citation>
		</ref>
		<ref id="R16">
			<label>16</label>
			<element-citation>Tajari, J., Valmohammadi, C. &amp; Mohammadi, M. (2014). Identification and Prioritization of Outsourcing Risks of Information Technology Projects (Case Study: Iran Technical and Vocational Universit). International Journal of Basic Sciences &amp; Applied Research, 3 (2): 85-89.</element-citation>
		</ref>
		<ref id="R17">
			<label>17</label>
			<element-citation>Tesch, D., Kloppenborg, T. J. &amp; Frolick, M. N. (2007). IT project risk factors: the project management professionals perspective. Journal of computer information systems, 47(4): 61-69.</element-citation>
		</ref>
		<ref id="R18">
			<label>18</label>
			<element-citation>Tho , I. (2005). Managing the risk of IT outsourcing, Butterworth-Heinemann.</element-citation>
		</ref>
		<ref id="R19">
			<label>19</label>
			<element-citation>Tschinkel, B. (2011). Information Technology Project Risk Management: How Risk Management Impacts the IT Project. Seidenberg School of CSIS, Pace University, White Plains, NY.</element-citation>
		</ref>
		<ref id="R20">
			<label>20</label>
			<element-citation>Venkatesh, V., Thong, J. Y. &amp; Xu, X. (2012). Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS quarterly, 36(1): 157-178.</element-citation>
		</ref>
		<ref id="R21">
			<label>21</label>
			<element-citation>Willcocks, L. P., Lacity, M. C. &amp; Kern, T. (1999). Risk mitigation in IT outsourcing strategy revisited: longitudinal case research at LISA. The Journal of Strategic Information Systems, 8(3): 285-314.</element-citation>
		</ref>
		<ref id="R22">
			<label>22</label>
			<element-citation>Wu, D., Wu, D. D., Zhang, Y. &amp; Olson, D. L. (2013). Supply chain outsourcing risk using an integrated stochastic-fuzzy optimization approach. Information Sciences, 235: 242-258.</element-citation>
		</ref>
		<ref id="R23">
			<label>23</label>
			<element-citation>Xi, X., Xu, Y. &amp; Todo, H. (2013). The Present Situation of IT Outsourcing and Countermeasure. Journal of Software Engineering and Applications, 6 (8): 426.</element-citation>
		</ref>
		<ref id="R24">
			<label>24</label>
			<element-citation>Yang, C. &amp; Huang, J.B. (2000). A decision model for IS outsourcing. International Journal of Information Management, 20(3): 225-239.</element-citation>
		</ref>
	</ref-list>
		</back>
</article>
<article article-type="Research Paper" dtd-version="3.0" xml:lang="en">
			  <front>
			    <journal-meta>
			      <journal-id journal-id-type="pmc">JITM</journal-id>
			      <journal-id journal-id-type="publisher-id">دانشکده مدیریت دانشگاه تهران</journal-id>
			    	<journal-title-group>
				      <journal-title>Journal of Information Technology Management</journal-title>
			    	</journal-title-group>
			      <issn pub-type="ppub">2008-5893</issn>
			      <publisher>
			        <publisher-name>دانشکده مدیریت دانشگاه تهران</publisher-name>
			      </publisher>
			    </journal-meta>
			    <article-meta>
 			      <article-id pub-id-type="publisher-id">79</article-id>
			      <article-id pub-id-type="doi">10.22059/jitm.2015.53554</article-id>		
			      <ext-link xlink:href="https://jitm.ut.ac.ir/article_53554_836cb21c23cb72440ce5b49b34ac826e.pdf"/>		
			      <article-categories>
			        <subj-group subj-group-type="heading">
					          		<subject>Information Systems Development:Business Modeling,Requirement Management,System Analysis,Design,Implementation,Tes</subject>
			        	</subj-group>
			      </article-categories>
			      <title-group>
			        <article-title>Designing an Adaptive Nuero-Fuzzy Inference System for Evaluating the Business Intelligence System Implementation in Software Industry</article-title>
			        <subtitle>طراحی سیستم استنتاج فازی-عصبی انطباقی برای ارزیابی استقرار سیستم هوشمندی کسب و کار در صنعت تولید نرم افزار</subtitle>
			      </title-group>
			      
			       <contrib-group>
			       <contrib contrib-type="author" id="c1" corresp="yes">
			          <name>
			            <surname>Raeesi Vanani</surname>
			            <given-names>Iman</given-names>
			          </name>
					  <aff>Assistant Prof., Industrial  Management, Allameh Tabataba’i University, Management and Accounting College ,Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			       <contrib-group>
			       <contrib contrib-type="author" id="c2">
			          <name>
			            <surname>Ganjalikhan Hakemi</surname>
			            <given-names>Fatemeh</given-names>
			          </name>
					  <aff>MSc., Information Technology Management, University of Tehran, Management College, Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			      <pub-date pub-type="ppub">
			        <day>21</day>
			        <month>03</month>
			        <year>2015</year>
			      </pub-date>
			      <volume>7</volume>
			      <issue>1</issue>
			      <fpage>85</fpage>
			      <lpage>104</lpage>
			      <history>
			        <date date-type="received">
			          <day>30</day>
			          <month>01</month>
			          <year>2015</year>
			        </date>
			        <date date-type="accepted">
			          <day>04</day>
			          <month>03</month>
			          <year>2015</year>
			        </date>
			      </history>
			      <permissions>
			      	<copyright-statement>Copyright &#x000a9; 2015, دانشکده مدیریت دانشگاه تهران. </copyright-statement>	
			        <copyright-year>2015</copyright-year>
			      </permissions>
			       <self-uri xlink:href="https://jitm.ut.ac.ir/article_53554.html">https://jitm.ut.ac.ir/article_53554.html</self-uri> 		
			      <abstract>
			        <p>The main goal of research is designing an adaptive nuero-fuzzy inference system for evaluating the implementation of business intelligence systems in software industry. Iranian software development organizations have been facing a lot of problems in case of implementing business intelligence systems. This system would be helpful in recognizing the conditions and prerequisites of success or failure. Organizations can recalculate the neuro-fuzzy system outputs with some considerations on various inputs to figure out which inputs have the most effect on the implementation outputs. By resolving the problems on inputs, organizations can achieve a better level of implementation success. The designed system has been trained by a data set and afterwards, it has been evaluated. The trained system has reached the error value of 0.08. Eventually, some recommendations have been provided for software development firms on the areas that might need more considerations and improvements.</p>
			      </abstract>
					<kwd-group kwd-group-type="author">
						<kwd>adaptive nuero-fuzzy inference system</kwd>
						<kwd>Business Intelligence</kwd>
						<kwd>Critical Success Factors</kwd>
						<kwd>system implementation</kwd>
					</kwd-group>
			    </article-meta>
			  </front>
<back>
	<ref-list>
		<ref id="R1">
			<label>1</label>
			<element-citation>Aghajani, H., Samadi Miarkolaei, H., Khanzadeh, M. &amp; Samadi Miarkolaei, H. (2013). Feasibility Study of ERP System Implementation (Case Study: National Oil Product Distribution Company Sary District). Journal of Information Technology Management, 6(2): 161-186. (in Persian)</element-citation>
		</ref>
		<ref id="R2">
			<label>2</label>
			<element-citation>Arnott, D. (2008). Success factors for data warehouse and business intelligence systems. ACIS 2008 Proceedings, 19th Australasian Conference on Information Systems, 3-5 Dec 2008, Christchurch.</element-citation>
		</ref>
		<ref id="R3">
			<label>3</label>
			<element-citation>Bosilj Vukšić, V., Indihar Štemberger, M. &amp; Kovačič, A. (2008). Business process management and business intelligence as performance measurement drivers. 10 (1): 338-343.</element-citation>
		</ref>
		<ref id="R4">
			<label>4</label>
			<element-citation>Boyer, J., Frank, B., Green, B., Harris, T., &amp; Van De Vanter, K. (2010). Business Intelligence Strategy: A Practical Guide for Achieving BI Excellence. MC Press, USA.</element-citation>
		</ref>
		<ref id="R5">
			<label>5</label>
			<element-citation>Chee, T., Chan, L. K., Chuah, M. H., Tan, C. S., Wong, S. F. &amp; Yeoh, W. (2009). Business intelligence systems: state-of-the-art review and contemporary applications. In Symposium on Progress in Information &amp; Communication Technology, 2 (4): 16-30.</element-citation>
		</ref>
		<ref id="R6">
			<label>6</label>
			<element-citation>Fotache, M. V. &amp; Fotache, G. (2012). The Economic Recovery of the SME’s by Implementing BI Technologies. Economy Transdisciplinarity Cognition, 15 (1): 273-278.</element-citation>
		</ref>
		<ref id="R7">
			<label>7</label>
			<element-citation>Guillaume, S. (2001). Designing fuzzy inference systems from data: an interpretability- oriented review. Fuzzy Systems, IEEE Transactions on, 9(3): 426-443.</element-citation>
		</ref>
		<ref id="R8">
			<label>8</label>
			<element-citation>Hribar Rajterič, I. (2010). Overview of business intelligence maturity models. Management: Journal of Contemporary Management Issues, 15(1): 47-67.</element-citation>
		</ref>
		<ref id="R9">
			<label>9</label>
			<element-citation>Khanlari, A. &amp; Kafaei, O. (2013). Surveying Effect of Structural Demotions on ERP System Success in Iranian Organization using this System, Journal of Information Technology Management, 6(1): 47-70. (in Persian)</element-citation>
		</ref>
		<ref id="R10">
			<label>10</label>
			<element-citation>Kia, Seyed Mostafa. (2010). Fuzzy Logic in MATLAB, Tehran: Kian Rayaneh Sabz publication. (in Persian)</element-citation>
		</ref>
		<ref id="R11">
			<label>11</label>
			<element-citation>Paswan, A. (2010). Business intelligence success: an empirical evaluation of the role of BI capabilities and the decision environment. Doctoral dissertation, University of North Texas.</element-citation>
		</ref>
		<ref id="R12">
			<label>12</label>
			<element-citation>Petrini, M. &amp; Pozzebon, M. (2009). Managing sustainability with the support of business intelligence: Integrating socio-environmental indicators and organisational context. The Journal of Strategic Information Systems, 18(4): 178-191.</element-citation>
		</ref>
		<ref id="R13">
			<label>13</label>
			<element-citation>Popovič, A., Hackney, R., Coelho, P. S. &amp; Jaklič, J. (2012). Towards business intelligence systems success: Effects of maturity and culture on analytical decision making. Decision Support Systems, 54(1): 729-739.</element-citation>
		</ref>
		<ref id="R14">
			<label>14</label>
			<element-citation>Presthus, W., Ghinea, G. &amp; Utvik, K. R. (2012). The More, the Merrier: The Interaction of Critical Success Factors in Business Intelligence Implementations. International Journal of Business Intelligence Research (IJBIR), 3(2): 34-48.</element-citation>
		</ref>
		<ref id="R15">
			<label>15</label>
			<element-citation>Ranjan, J. (2008). Business justification with business intelligence. Vine, 38(4): 461-475.</element-citation>
		</ref>
		<ref id="R16">
			<label>16</label>
			<element-citation>Ranjan, J. (2009). Business intelligence: concepts, components, techniques and benefits. Journal of Theoretical and Applied Information Technology, 9(1): 60-70.</element-citation>
		</ref>
		<ref id="R17">
			<label>17</label>
			<element-citation>Rouhani, S., Ghazanfari, M. &amp; Jafari, M. (2012). Evaluation model of business intelligence for enterprise systems using fuzzy TOPSIS. Expert Systems with Applications, 39(3): 3764-3771.</element-citation>
		</ref>
		<ref id="R18">
			<label>18</label>
			<element-citation>Shafia, M., Manian, A., Raeesi Vanani, I. (2013). Designing Fuzzy Inference System for Predicting Success of ERP Solution, Journal of Information Technology Management, 5(1): 89-106. (in Persian)</element-citation>
		</ref>
		<ref id="R19">
			<label>19</label>
			<element-citation>Tajfar, A.H., Mahmoodi Meimand, M., Rezasoltani, F. &amp; Rezasoltani, P. (2014). Scoring ISMS Implementation Obstacles &amp; Surveying Exploration Management Readiness, Journal of Information Technology Management, 6(4): 551-566. (in Persian)</element-citation>
		</ref>
		<ref id="R20">
			<label>20</label>
			<element-citation>Bosilj-Vuksic, V., Indihar-Stemberger, M.. (2009). Business Process Management and Business Intelligence as Performance Measurement Drivers, University of Zagreb, Croatia.</element-citation>
		</ref>
		<ref id="R21">
			<label>21</label>
			<element-citation>Vieira, J., Dias, F. M. &amp; Mota, A. (2004). Neuro-fuzzy systems: A survey. In 5th WSEAS NNA International Conference on Neural Networks and Applications, Udine, Italia.</element-citation>
		</ref>
		<ref id="R22">
			<label>22</label>
			<element-citation>Vodapalli, N. K. (2009). Critical success factors of BI implementation. IT University of Copenhagen. Retrieved from: http://www.itu.dk/~navvod/ CSFs OfBIimpl.pdf.</element-citation>
		</ref>
		<ref id="R23">
			<label>23</label>
			<element-citation>Yan, S. L., Wang, Y. &amp; Liu, J. C. (2012). Research on the comprehensive evaluation of business intelligence system based on BP neural network. Systems Engineering Procedia, 4: 275-281.</element-citation>
		</ref>
		<ref id="R24">
			<label>24</label>
			<element-citation>Yeoh, W., Koronios, A., Gao, J. (2007). Critical Success Factors for Implementation of Business Intelligence Systems: A study of Engineering Asset Management Organizations, University of South Australia, Mawson Lakes, 5095 Australia.</element-citation>
		</ref>
		<ref id="R25">
			<label>25</label>
			<element-citation>Yeoh, W. &amp; Koronios, A. (2010). Critical success factors for business intelligence systems. Journal of computer information systems, 50(3): 23-32.</element-citation>
		</ref>
		<ref id="R26">
			<label>26</label>
			<element-citation>Yeoh, W., Koronios, A. &amp; Gao, J. (2008). Managing the implementation of business intelligence systems: a critical success factors framework. International Journal of Enterprise Information Systems (IJEIS), 4(3): 79-94.</element-citation>
		</ref>
	</ref-list>
		</back>
</article>
<article article-type="Research Paper" dtd-version="3.0" xml:lang="en">
			  <front>
			    <journal-meta>
			      <journal-id journal-id-type="pmc">JITM</journal-id>
			      <journal-id journal-id-type="publisher-id">دانشکده مدیریت دانشگاه تهران</journal-id>
			    	<journal-title-group>
				      <journal-title>Journal of Information Technology Management</journal-title>
			    	</journal-title-group>
			      <issn pub-type="ppub">2008-5893</issn>
			      <publisher>
			        <publisher-name>دانشکده مدیریت دانشگاه تهران</publisher-name>
			      </publisher>
			    </journal-meta>
			    <article-meta>
 			      <article-id pub-id-type="publisher-id">79</article-id>
			      <article-id pub-id-type="doi">10.22059/jitm.2015.53326</article-id>		
			      <ext-link xlink:href="https://jitm.ut.ac.ir/article_53326_d8907782cd05090f43a5373f9824c758.pdf"/>		
			      <article-categories>
			        <subj-group subj-group-type="heading">
					          		<subject>Managerial Implications of Information Systems Implementation</subject>
			        	</subj-group>
			      </article-categories>
			      <title-group>
			        <article-title>Measuring Enterprise Systems Benefits in Contractor Companies Procurement Process, Using Action Research Strategy</article-title>
			        <subtitle>سنجش مزایای سیستم‌های سازمانی در فرایند تأمین شرکت‌های پیمانکاری با استفاده از اقدام‎پژوهی</subtitle>
			      </title-group>
			      
			       <contrib-group>
			       <contrib contrib-type="author" id="c1" corresp="yes">
			          <name>
			            <surname>Sarkhosh</surname>
			            <given-names>Reza</given-names>
			          </name>
					  <aff>MSc  in Management of Information Technology, Faculty of Management, University of Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			      <pub-date pub-type="ppub">
			        <day>21</day>
			        <month>03</month>
			        <year>2015</year>
			      </pub-date>
			      <volume>7</volume>
			      <issue>1</issue>
			      <fpage>105</fpage>
			      <lpage>124</lpage>
			      <history>
			        <date date-type="received">
			          <day>07</day>
			          <month>11</month>
			          <year>2014</year>
			        </date>
			        <date date-type="accepted">
			          <day>21</day>
			          <month>02</month>
			          <year>2015</year>
			        </date>
			      </history>
			      <permissions>
			      	<copyright-statement>Copyright &#x000a9; 2015, دانشکده مدیریت دانشگاه تهران. </copyright-statement>	
			        <copyright-year>2015</copyright-year>
			      </permissions>
			       <self-uri xlink:href="https://jitm.ut.ac.ir/article_53326.html">https://jitm.ut.ac.ir/article_53326.html</self-uri> 		
			      <abstract>
			        <p>The benefits of Enterprise Systems (ES) are very varied and have been studied by scientists in this field over the years. But one aspect that is less noticed is the benefit result of the ES implementation in the procurement process, which is very important to the contractor companies. The main objective and the purpose of this research is to address this important issue. Other objective of the study is to find out the main reason for accepting ES and to provide a benefit evaluation framework using the balanced scorecard framework. This article seeks to provide a framework using a full review of the literature, and the proposed framework will be assessed in the contractor company projects through action research strategy and finally the benefit of the implementation will be offered. Except of localized definition of ES benefits framework and assessment of the benefits, the findings of present study includes the mixed research methodology with two positivism and interpretativism approaches through two full cycles of action research.</p>
			      </abstract>
					<kwd-group kwd-group-type="author">
						<kwd>action research</kwd>
						<kwd>contractor copmpanies</kwd>
						<kwd>enterprice systems</kwd>
						<kwd>measuring benefits</kwd>
						<kwd>procurement process</kwd>
					</kwd-group>
			    </article-meta>
			  </front>
<back>
	<ref-list>
		<ref id="R1">
			<label>1</label>
			<element-citation>Baroudi, J. &amp; Orlikowski , W. (1989). The problem of statistical power in MIS. MIS Quartely, 13 (1): 87-106.</element-citation>
		</ref>
		<ref id="R2">
			<label>2</label>
			<element-citation>Baskerville, R. (1999). Investigating Information Systems with Action Research. Communications of AIS, 2 (3): 1-32.</element-citation>
		</ref>
		<ref id="R3">
			<label>3</label>
			<element-citation>Baskerville, R., Wood-Harper, A. T. (1996). A Critical Perspective on Action Research as a Method for Information Systems Research. Journal of Information Technology, 11(3): 235-246.</element-citation>
		</ref>
		<ref id="R4">
			<label>4</label>
			<element-citation>Chand, D., Hachey, G., Hunton, J., Owhoso, V., Vasudevan, S. (2005). A balanced scorecard based framework for assessing the strategic impacts of ERP systems. Computers in Industry, 56 (6): 558-572.</element-citation>
		</ref>
		<ref id="R5">
			<label>5</label>
			<element-citation>Costello Patrick, J. (2006). Action research. Translator Shadroo M. Tehran: Agah. (in Persian)</element-citation>
		</ref>
		<ref id="R6">
			<label>6</label>
			<element-citation>Danaeifard, H., Alvani, S.M., Azar, A. (2004). Quantative research methodology; a comprehensive approach, 1 ed. Tehran: Safar Press. (in Persian).</element-citation>
		</ref>
		<ref id="R7">
			<label>7</label>
			<element-citation>Habermas, J. (1990). A Review of Gadamers Truth and Method. in Ormiston G.L. &amp; Schrift A. D. The Hermeneutic Tradition, New York: SUNY Press, Albany.</element-citation>
		</ref>
		<ref id="R8">
			<label>8</label>
			<element-citation>Kaplan, R. S, Norton, D. P. (1992). The balanced scorecard - measures that drive performance. Harvard Business Review, 70(1) : 71-79.</element-citation>
		</ref>
		<ref id="R9">
			<label>9</label>
			<element-citation>Kim, Y. (2003). Strategic advantages of information technology in construction. S.M. Thesis, Dep. of Civil and Environmental Engineering. Available in: http://dspace.mit.edu/handle/1721.1/29569.</element-citation>
		</ref>
		<ref id="R10">
			<label>10</label>
			<element-citation>Lee, S., Arif, A. &amp; Halpin, D. (2002). Simulation Modeling by Enterprise Resource Planning implementation in Medium Sized Corporation. First International Conference on Construction in the 21st Century- CITC-2002. Miami, Florida.</element-citation>
		</ref>
		<ref id="R11">
			<label>11</label>
			<element-citation>Mabert, V. M., Soni, A. &amp; Venkataramanan, M. A. (2000). Enterprise Resource Planning Survey of US Manufacturing Firms. Production and Inventory Management Journal, 41(20): 52-58.</element-citation>
		</ref>
		<ref id="R12">
			<label>12</label>
			<element-citation>Markus, M., Tanis, C. (2000). The Enterprise Systems Experience- From Adoption to Success. Framing the domains of IT research: Glimpsing the future through the past, 173: 207-173.</element-citation>
		</ref>
		<ref id="R13">
			<label>13</label>
			<element-citation>Momeni, M., Faal Ghayomi, A. (2008). Statistical Analysis with SPSS Software 2ed. Tehran: Ketab e Now. (in Persian)</element-citation>
		</ref>
		<ref id="R14">
			<label>14</label>
			<element-citation>Poston, R. &amp; Grabski, S. (2001). Financial impacts of enterprise resource planning implementations. International Journal of Accounting Information Systems, 2 (2): 271-294.</element-citation>
		</ref>
		<ref id="R15">
			<label>15</label>
			<element-citation>Rosemann, M., Wiese, J. (1999). Measuring the performance of ERP software a balanced scorecard approach. Proceedings of the 10th Australasian Conference on Information Systems, Wellington. pp. 773–784.</element-citation>
		</ref>
		<ref id="R16">
			<label>16</label>
			<element-citation>Seddon, P.B., Calvert, C., Yang, S. (2010). A multi-project model of key factors affecting organizational benefits from enterprise systems. MIS quarterly, 34 (2): 305-328.</element-citation>
		</ref>
		<ref id="R17">
			<label>17</label>
			<element-citation>Sein, M.K., Henfridsson, O., Purao, S., Rossi, M. &amp; Lindgren, R. (2011). Action Design Research. MIS Quarterly, 35(1): 37-56.</element-citation>
		</ref>
		<ref id="R18">
			<label>18</label>
			<element-citation>Shang, S. &amp; Seddon, P.B. (2002). Assessing and managing the benefits of enterprise systems: the business manager’s perspective. Information Systems Journal, 12(2): 271-299.</element-citation>
		</ref>
		<ref id="R19">
			<label>19</label>
			<element-citation>Shi, J. &amp; Halpin, D. W. (2003). Enterprise Resource Planning for Construction Business Management. Journal of Construction Engineering and Management, 129 (2): 214-221.</element-citation>
		</ref>
		<ref id="R20">
			<label>20</label>
			<element-citation>Spathis, C. (2006). Enterprise systems implementation and accounting benefits. Journal of Enterprise Information Management, 19 (1): 67-82.</element-citation>
		</ref>
		<ref id="R21">
			<label>21</label>
			<element-citation>Stefanou, J. (2002). Accounting information systems (AIS) development/ acquisition approaches by Greek SMEs. paper presented at the European Conference on Accounting Information Systems (ECAIS), Copenhagen.</element-citation>
		</ref>
		<ref id="R22">
			<label>22</label>
			<element-citation>Wood-Harper, T., Antill, L., Avison, D. E. (1985). Information Systems Definition: The Multiview Approach. Translator Scientific, B. Oxford: UK: J. Wiley.</element-citation>
		</ref>
	</ref-list>
		</back>
</article>
<article article-type="Research Paper" dtd-version="3.0" xml:lang="en">
			  <front>
			    <journal-meta>
			      <journal-id journal-id-type="pmc">JITM</journal-id>
			      <journal-id journal-id-type="publisher-id">دانشکده مدیریت دانشگاه تهران</journal-id>
			    	<journal-title-group>
				      <journal-title>Journal of Information Technology Management</journal-title>
			    	</journal-title-group>
			      <issn pub-type="ppub">2008-5893</issn>
			      <publisher>
			        <publisher-name>دانشکده مدیریت دانشگاه تهران</publisher-name>
			      </publisher>
			    </journal-meta>
			    <article-meta>
 			      <article-id pub-id-type="publisher-id">79</article-id>
			      <article-id pub-id-type="doi">10.22059/jitm.2015.53240</article-id>		
			      <ext-link xlink:href="https://jitm.ut.ac.ir/article_53240_62545e47664395644a092208c593492d.pdf"/>		
			      <article-categories>
			        <subj-group subj-group-type="heading">
					          		<subject>Strategic Information Systems (SIS)</subject>
			        	</subj-group>
			      </article-categories>
			      <title-group>
			        <article-title>IRAN E-GOVERNMENT MODEL IN 2025</article-title>
			        <subtitle>مدل توسعۀ دولت الکترونیک در ایران 1404</subtitle>
			      </title-group>
			      
			       <contrib-group>
			       <contrib contrib-type="author" id="c1" corresp="yes">
			          <name>
			            <surname>Faghihi</surname>
			            <given-names>Mahdi</given-names>
			          </name>
					  <aff>Ph.D. Student in public Administration, Faculty of Management and Economic, Islamic Azad University, sciences and researches Branch,Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			       <contrib-group>
			       <contrib contrib-type="author" id="c2">
			          <name>
			            <surname>Memar-Zadeh</surname>
			            <given-names>Gholamreza</given-names>
			          </name>
					  <aff>Associate Prof., Faculty of Management and Economic, Islamic Azad University, sciences and researches Branch,Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			      <pub-date pub-type="ppub">
			        <day>21</day>
			        <month>03</month>
			        <year>2015</year>
			      </pub-date>
			      <volume>7</volume>
			      <issue>1</issue>
			      <fpage>125</fpage>
			      <lpage>142</lpage>
			      <history>
			        <date date-type="received">
			          <day>01</day>
			          <month>07</month>
			          <year>2014</year>
			        </date>
			        <date date-type="accepted">
			          <day>10</day>
			          <month>01</month>
			          <year>2015</year>
			        </date>
			      </history>
			      <permissions>
			      	<copyright-statement>Copyright &#x000a9; 2015, دانشکده مدیریت دانشگاه تهران. </copyright-statement>	
			        <copyright-year>2015</copyright-year>
			      </permissions>
			       <self-uri xlink:href="https://jitm.ut.ac.ir/article_53240.html">https://jitm.ut.ac.ir/article_53240.html</self-uri> 		
			      <abstract>
			        <p>In this research by applying the theoretical framework of socio-technical systems and literature review using the form of e-government has been identified as a core component. To realize the model results and the results indicated that each of the six components of e-government in 1404 particularly in the areas of communication and access to digital content. Based on the results of the highest priority among the components of e-government development infrastructure is owned by the component, based on interviews with managers and theme analysis performed on each component of the realization of e-government development has been proposed.</p>
			      </abstract>
					<kwd-group kwd-group-type="author">
						<kwd>E-Government</kwd>
						<kwd>socio-technical systems</kwd>
						<kwd>Theme Analysis</kwd>
						<kwd>vision document</kwd>
					</kwd-group>
			    </article-meta>
			  </front>
<back>
	<ref-list>
		<ref id="R1">
			<label>1</label>
			<element-citation>Abtin, A. (2011). Study new ways of entrepreneurship in Sistan and Baluchestan, Businessand Society, 135 (1): 55-76. (in Persian)</element-citation>
		</ref>
		<ref id="R2">
			<label>2</label>
			<element-citation> Anttiroiko, A.V. (2007). Encyclopedia of Digital Government, Volume 1: Idea Group. ّFinland.</element-citation>
		</ref>
		<ref id="R3">
			<label>3</label>
			<element-citation>Bertalenfi, L. (1987). General systems theory. Tondar Publication, (in Persian)</element-citation>
		</ref>
		<ref id="R4">
			<label>4</label>
			<element-citation>Bostrom, R. &amp; Heinen, J. S. (1977). MIS Problems and Failures: A Socio-Technical Perspective part i: the causes. MIS Quarterly, 1 (3): 17- 32.</element-citation>
		</ref>
		<ref id="R5">
			<label>5</label>
			<element-citation>Boulding, K. E. (1956). General systems theory-the skeleton of science. Management science, 2 (3): 197-208.</element-citation>
		</ref>
		<ref id="R6">
			<label>6</label>
			<element-citation>Braun, V. and Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3 (2): 77-101.</element-citation>
		</ref>
		<ref id="R7">
			<label>7</label>
			<element-citation>Brown, M. &amp; Garson, G. (2013). Public Information Management and E-Government: Policy and Issues. Idea Group Inc (IGI).</element-citation>
		</ref>
		<ref id="R8">
			<label>8</label>
			<element-citation>Dabagh, S. &amp; Nafari, N. (2009). Good concept in good governance. Public Administration Journal, 3 (1): 3-18. (in Persian)</element-citation>
		</ref>
		<ref id="R9">
			<label>9</label>
			<element-citation>Kettani, D. &amp; Moulin, B. (2014). E-Government for Good Governance in Developing Countries: Empirical Evidence from the EFez Project.  Anthem Press,Outawa.</element-citation>
		</ref>
		<ref id="R10">
			<label>10</label>
			<element-citation>Economist Intelligence Unit (EIU) (2009) e-Readiness rankings 2009: The usage imperative, A report from the Economist Intelligence Unit.</element-citation>
		</ref>
		<ref id="R11">
			<label>11</label>
			<element-citation>Faghihi, M. (2011). Introduction of laws and regulations related to information and communication technology, Tehran: Majlis research center. (in Persian)</element-citation>
		</ref>
		<ref id="R12">
			<label>12</label>
			<element-citation>Faghihi, M. &amp; Rajabi, A. (2012). Survey ofICTindicatorsin IRAN and the world. Tehran: Majlis research center. (in Persian)</element-citation>
		</ref>
		<ref id="R13">
			<label>13</label>
			<element-citation>Faghihi, M. &amp; Rajabi, A. (2013). Assessing the quality of the laws and regulations of ICT in Iran compared with other countries in Southeast Asia. Tehran: Majlis research center. (in Persian)</element-citation>
		</ref>
		<ref id="R14">
			<label>14</label>
			<element-citation>Garson, D. (2006). Public Information Technology and E-Governance: Managing the Virtual State. Canada: Jones &amp; Bartlett publisher.</element-citation>
		</ref>
		<ref id="R15">
			<label>15</label>
			<element-citation>Ghazinuri, S., Olfat, L. &amp; Amiri, M. (2010). An experimental study of the relationship between IT strategy with business strategy and performance in electronics Industry of Iran. Journal ofScience and Technology Policy, 3(2): 1-19. (in Persian)</element-citation>
		</ref>
		<ref id="R16">
			<label>16</label>
			<element-citation>Hanafi-zadeh, P. (2011). Design methodology developed in the e-readiness assessment. Sharif special for engineering sciences, 24(45): 97-110.</element-citation>
		</ref>
		<ref id="R17">
			<label>17</label>
			<element-citation>(in Persian)</element-citation>
		</ref>
		<ref id="R18">
			<label>18</label>
			<element-citation>Hanafi-zadeh, P. (2011). Evolution models of e-readiness and the digital divide from the viewpoint of methodology. Journalof IRAN Management Sciences, 23 (1): 51-80. (in Persian)</element-citation>
		</ref>
		<ref id="R19">
			<label>19</label>
			<element-citation>Qatar E-government Athourity (Hokumi) (2014). Qatar National ICT Strategy. Doha, Qatar: Hokumi.</element-citation>
		</ref>
		<ref id="R20">
			<label>20</label>
			<element-citation>Holman, D., Wall, T. D., Clegg, C. W., Sparrow, P., &amp; Howard, A. (2002). The New Workplace: A Guide to the Human Impact of Modern Working Practices. WILY Press, West Sussex, UK.</element-citation>
		</ref>
		<ref id="R21">
			<label>21</label>
			<element-citation>Imani Jajarmi, H. (2002), Civic culture, social capital and the role of NGOs. Journalof Public Culture, 31 (1): 34-20. (in Persian)</element-citation>
		</ref>
		<ref id="R22">
			<label>22</label>
			<element-citation>International Telecommunication Union (ITU) (2009). E-Government implementation toolkit. https://www.itu.int/pub/D-STR-GOV.E_GOV-11-2010.</element-citation>
		</ref>
		<ref id="R23">
			<label>23</label>
			<element-citation>Kazemi, M. (2010). Barriers establishment of e-government in public organizations, Journal of Management Studies, 1(2): 185-204. (in Persian)</element-citation>
		</ref>
		<ref id="R24">
			<label>24</label>
			<element-citation>Khalifa, M. &amp; Shen, K. N. (2004). System design effects on social presence and telepresence in virtual communities. Twenty-Fifth International Conference on Information Systems. Washington, 43</element-citation>
		</ref>
		<ref id="R25">
			<label>25</label>
			<element-citation>Kvale, J. (1996). Inter Views: Introduction to qualitative research, Thousand­ Oaks, CA: Sage.</element-citation>
		</ref>
		<ref id="R26">
			<label>26</label>
			<element-citation>Memar-zadeh, Gh., Faghihi, M. (2012). E-Government. Tehran: Andishehaye Goharbar Publication. (in Persian)</element-citation>
		</ref>
		<ref id="R27">
			<label>27</label>
			<element-citation>Saghafi, F., Zareie, B. &amp; Dibaj, M. (2011). National model of e-government development, Journal ofScience and Technology Policy, 4(2): 27-40.</element-citation>
		</ref>
		<ref id="R28">
			<label>28</label>
			<element-citation>(in Persian)</element-citation>
		</ref>
		<ref id="R29">
			<label>29</label>
			<element-citation>Sharif-Zadeh, F. &amp; Gholipour, R. (2003). Good governance and the role of government, management. organizational culture Journal, 2 (1): 11-32.</element-citation>
		</ref>
		<ref id="R30">
			<label>30</label>
			<element-citation>(in Persian)</element-citation>
		</ref>
		<ref id="R31">
			<label>31</label>
			<element-citation>United Nations Development Program (UNDP) (2012). United Nations E-Government Survey 2012: E-Government for the People.</element-citation>
		</ref>
		<ref id="R32">
			<label>32</label>
			<element-citation>Van der Merwe, R. (2010). Technical Report:Investigating direct deliberative governance in online social media. The Open University.</element-citation>
		</ref>
		<ref id="R33">
			<label>33</label>
			<element-citation>Waseda University (2013). Waseda University International e-Government 2013. Available in: http://www.e-gov.waseda.ac.jp/pdf/Press_Released_on_e-Gov_ ranking_ 2013.pdf.</element-citation>
		</ref>
		<ref id="R34">
			<label>34</label>
			<element-citation>Whitworth, B. (2009). A brief introduction to socio-technical systems, Encyclopedia of Information Science and Technology. 2 ed, Ed Claude Ghaoui, Hershey: Idea Group Publishing.</element-citation>
		</ref>
		<ref id="R35">
			<label>35</label>
			<element-citation>Whitworth, B. (2009). The Social Requirements of Technical Systems, Chapter 1 of Whitworth, B. and Moor, A. D. (eds.). Handbook of Research on Socio-Technical Design and Social Networking Systems. IGI, Hershey, PA. DOI: 10.4018/978-1-60566-264-0.ch001.</element-citation>
		</ref>
		<ref id="R36">
			<label>36</label>
			<element-citation>Whitworth, B. &amp; Moor, A. D. (2009). Handbook of Research on Socio-Technical Design and Social Networking Systems. IGI, Hershey, PA. ISBN: 978-1-60566-264-0.</element-citation>
		</ref>
		<ref id="R37">
			<label>37</label>
			<element-citation>Zahedi, Sh., Yaghoobi, N. (2004). Reinventing the Government in the Information Age. Industrial Management Studies Journal, 6 : 45-64. (in Persian)  </element-citation>
		</ref>
	</ref-list>
		</back>
</article>
<article article-type="Research Paper" dtd-version="3.0" xml:lang="en">
			  <front>
			    <journal-meta>
			      <journal-id journal-id-type="pmc">JITM</journal-id>
			      <journal-id journal-id-type="publisher-id">دانشکده مدیریت دانشگاه تهران</journal-id>
			    	<journal-title-group>
				      <journal-title>Journal of Information Technology Management</journal-title>
			    	</journal-title-group>
			      <issn pub-type="ppub">2008-5893</issn>
			      <publisher>
			        <publisher-name>دانشکده مدیریت دانشگاه تهران</publisher-name>
			      </publisher>
			    </journal-meta>
			    <article-meta>
 			      <article-id pub-id-type="publisher-id">79</article-id>
			      <article-id pub-id-type="doi">10.22059/jitm.2015.52456</article-id>		
			      <ext-link xlink:href="https://jitm.ut.ac.ir/article_52456_7cd00b81086d515fa4f91fedcd134bc2.pdf"/>		
			      <article-categories>
			        <subj-group subj-group-type="heading">
					          		<subject>Managerial Approaches in Information Technology</subject>
			        	</subj-group>
			      </article-categories>
			      <title-group>
			        <article-title>A Method for Developing Enterprise Architecture Frameworks: An Interpretive Phenomenology Study</article-title>
			        <subtitle>تدوین روش توسعۀ چارچوب معماری سازمانی: مطالعۀ پدیدارشناسی تفسیری</subtitle>
			      </title-group>
			      
			       <contrib-group>
			       <contrib contrib-type="author" id="c1">
			          <name>
			            <surname>Moeini</surname>
			            <given-names>Ali</given-names>
			          </name>
					  <aff>Associate Prof., Faculty of Engineering, University of Tehran, Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			       <contrib-group>
			       <contrib contrib-type="author" id="c2" corresp="yes">
			          <name>
			            <surname>Merati</surname>
			            <given-names>Ehsan</given-names>
			          </name>
					  <aff>Ph.D. Candidate in Systems  Management, Faculty of Management, University of Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			      <pub-date pub-type="ppub">
			        <day>21</day>
			        <month>03</month>
			        <year>2015</year>
			      </pub-date>
			      <volume>7</volume>
			      <issue>1</issue>
			      <fpage>143</fpage>
			      <lpage>162</lpage>
			      <history>
			        <date date-type="received">
			          <day>21</day>
			          <month>06</month>
			          <year>2014</year>
			        </date>
			        <date date-type="accepted">
			          <day>17</day>
			          <month>08</month>
			          <year>2014</year>
			        </date>
			      </history>
			      <permissions>
			      	<copyright-statement>Copyright &#x000a9; 2015, دانشکده مدیریت دانشگاه تهران. </copyright-statement>	
			        <copyright-year>2015</copyright-year>
			      </permissions>
			       <self-uri xlink:href="https://jitm.ut.ac.ir/article_52456.html">https://jitm.ut.ac.ir/article_52456.html</self-uri> 		
			      <abstract>
			        <p>Nowadays, many of organizations, who are involved in enterprise architecting, make their own architecture framework or customize existing frameworks. These endeavors are based on the knowledge and the experience of each organization, and there is no defined method for developing the enterprise architecture framework. Therefore, a method for developing architecture framework is presented in this qualitative research. For this reason, 15 versions of 5 most used architecture frameworks are analyzed based on the interpretive phenomenology. Based on this analysis, a method for developing architecture frameworks is introduced which contains 8 disciplines and 6 phases. Analyzing the qualitative data of the research and also the validation of the research are carried out using the guidelines of Van Manen in the interpretive phenomenology.</p>
			      </abstract>
					<kwd-group kwd-group-type="author">
						<kwd>architecture framework</kwd>
						<kwd>enterprise architecture</kwd>
						<kwd>enterprise architecture development method</kwd>
						<kwd>interpretive phenomenology</kwd>
						<kwd>method</kwd>
					</kwd-group>
			    </article-meta>
			  </front>
<back>
	<ref-list>
		<ref id="R1">
			<label>1</label>
			<element-citation>بازرگان ، ع. (1387). مقدمه‎ای ‎بر روشهای تحقیق کیفی و آمیخته. تهران: نشر دیدار.</element-citation>
		</ref>
		<ref id="R2">
			<label>2</label>
			<element-citation>مرآتی، ا. (1391). روش توسعۀ چارچوب معماری نیروهای مسلح، نشریۀ سیاست دفاعی، 14:60-33.</element-citation>
		</ref>
		<ref id="R3">
			<label>3</label>
			<element-citation>Abdallah, S. &amp; Galal-Edeen, G. (2006). Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection. Proceedings of the Fourth International Conference on Informatics and Systems. Cairo University, Cairo, Egypt.</element-citation>
		</ref>
		<ref id="R4">
			<label>4</label>
			<element-citation>Boland, R. (1979). Control, Causality and Information System Requirements. Accounting, Accounting, Organization and Society, 4 (4): 259-272.</element-citation>
		</ref>
		<ref id="R5">
			<label>5</label>
			<element-citation>Chen, P. &amp; El-Sakka, A. (2000). Context Analysis and Principles Study, Department of Defence. New Yourk: DSTO.</element-citation>
		</ref>
		<ref id="R6">
			<label>6</label>
			<element-citation>Cohen, A. (2001). Review of literature: Responses to "Empirical and hermeneutic approaches to phenomenological research in psychology, a comparison". Gestalt, 5(2). Retrieved from http://www.g-gej.org/5-2/reviewlit.html.</element-citation>
		</ref>
		<ref id="R7">
			<label>7</label>
			<element-citation>Giorgi, A. (1999). The status of Husserlian phenomenology in caring research. Scandinavian Journal of Caring Sciences, 14 (1): 3-10.</element-citation>
		</ref>
		<ref id="R8">
			<label>8</label>
			<element-citation>Graves, T. (2007). Whole-of-Enterprise Architecture: Extending Enterprise-Architecture Beyond IT, Tetradian Consulting.</element-citation>
		</ref>
		<ref id="R9">
			<label>9</label>
			<element-citation>Guirguis, A. (2008). A Concept of Enterprise Architecture: Establishment of an EA Program, Requirements on EA, and Architecture Maintenance at IT Area R&amp;D at Scania CV AB (Master Thesis). Dept. of Industrial Information and Control Systems KTH, Royal Institute of Technology. Stockholm, Sweden.</element-citation>
		</ref>
		<ref id="R10">
			<label>10</label>
			<element-citation>Harmer, B.M. (2003). Culture at the Edge: An Exploration of Cultural Adaptation and Sense-making Across Workgroup Boundaries in Complex Organizations. Communications Studies, Wellington.</element-citation>
		</ref>
		<ref id="R11">
			<label>11</label>
			<element-citation>Infosys (2007). Enterprise architecture is maturing. Infosys enterprise architecture survey. Retrieved from http://www.infosys.com/consulting /architecture-services/ea-survey/enterprise-architecture-trends.pdf.</element-citation>
		</ref>
		<ref id="R12">
			<label>12</label>
			<element-citation>Institute for Enterprise Architecture Developments (2005). Trends in Enterprise Architecture 2005: How are Organizations Progressing? Retrieved from http://www.ea-consulting.com/Reports/Enterprise%20Architecture%20 Survey %202005%20IFEAD%20v10.pdf.</element-citation>
		</ref>
		<ref id="R13">
			<label>13</label>
			<element-citation>Introna, L.D. &amp; Whittaker, L. (2002). The Phenomenology of IS Evaluation. in Proceedings of the Global and Organizational Discourse about Information Technology. Barcelona, Spain, p. 155-175.</element-citation>
		</ref>
		<ref id="R14">
			<label>14</label>
			<element-citation>Källgren, A., Ullberg, J. &amp; Johnson, P. (2009). A Method for Constructing a Company Specific Enterprise Architecture Model Framework, 10th ACIS International Conference on Software Engineering, Artificial Intelligences, Networking and Parallel/Distributed Computing, indexed in IEEE Computer Society.</element-citation>
		</ref>
		<ref id="R15">
			<label>15</label>
			<element-citation>Karlsson, F. (2002). Meta-Method for Method Configuration: A RUP Case. Department of Computer and Information Science, Master Thesis, Linköpings universitet, Linköping, Sweden.</element-citation>
		</ref>
		<ref id="R16">
			<label>16</label>
			<element-citation>Kim, J., Kwon J., Kim, Y., Kim, H. &amp; Baik, D. (2006). EAFoC: Enterprise Architecture Framework Based on Commonality. Journal of Computer Science &amp; technology, 6  (???): 952-964.</element-citation>
		</ref>
		<ref id="R17">
			<label>17</label>
			<element-citation>Mamaghani, N., Madani, F. &amp; Sharifi, A. (2012). Customer oriented enterprise IT architecture framework. Telematics and Informatics, 29  (???): 219-232.</element-citation>
		</ref>
		<ref id="R18">
			<label>18</label>
			<element-citation>Moreno Jr., V. (1999). A Phenomenological Study of Individual Experiences of BPR Processes. Information Technology &amp; People. 12(4): 359-388.</element-citation>
		</ref>
		<ref id="R19">
			<label>19</label>
			<element-citation>Myers, M. (2009). Qualitative research in business and management, London: Sage Publication.</element-citation>
		</ref>
		<ref id="R20">
			<label>20</label>
			<element-citation>Nagarajan, P. (2010). Enterprise Architecture Ontology: A Shared Vocabulary for Efficient Decision Making for Software Development Organizations. Master Thesis. The Ohio State University, Ohio.</element-citation>
		</ref>
		<ref id="R21">
			<label>21</label>
			<element-citation>Pfeiffer, D. &amp; Niehaves, B. (2005, May). Evaluation of Conceptual Models: A Structuralist Approach. Proceedings of the 13th European Conference on Information Systems, Information Systems in a Rapidly Changing Economy. Regensburg, Germany.</element-citation>
		</ref>
		<ref id="R22">
			<label>22</label>
			<element-citation>Reimen, D. J. (1986). The essential structure of a caring interaction: Doing phenomenology. In P. M. Munhall &amp; C. J. Oiler (Eds.). Nursing research: A qualitative perspective (pp. 85-105). Norwalk, CT: Appleton-Century-Crofts.</element-citation>
		</ref>
		<ref id="R23">
			<label>23</label>
			<element-citation>Sarkar, P. &amp; Cybulski, J. (2004). Evaluation of phenomenological findings in IS research: a study in developing web-based IS. in European IS profession in the global networking environment: proceedings of the 12th European Conference on Information Systems, June 14 - 16, Turku, Finland.</element-citation>
		</ref>
		<ref id="R24">
			<label>24</label>
			<element-citation>Schekkerman, J. (2004). How to survive in the jungle of Enterprise Architecture Frameworks. Victoria: Trafford.</element-citation>
		</ref>
		<ref id="R25">
			<label>25</label>
			<element-citation>Schulman, J. (2004). Architecture Frameworks Provide System Road Maps, Gartner, ID Number: G00125007.</element-citation>
		</ref>
		<ref id="R26">
			<label>26</label>
			<element-citation>Sharkey, P. (2001). Hermeneutic phenomenology. In R. Barnacle (Ed.), Phenomenology. Melbourne: RMIT Publications.</element-citation>
		</ref>
		<ref id="R27">
			<label>27</label>
			<element-citation>Tang, A., Han, J. &amp; Chen, P. (2004, December). A comparative analysis of architecture frameworks. Proceedings of the 11th Asia-Pacific Software Engineering Conference, Busan, Korea.</element-citation>
		</ref>
		<ref id="R28">
			<label>28</label>
			<element-citation>Tasmanian Government (2003). Development of a Framework for Enterprise Architecture in the Tasmanian Government, Retrieved from www.go.tas. gov.au.</element-citation>
		</ref>
		<ref id="R29">
			<label>29</label>
			<element-citation>Tolvanen, J. P. (1996). Method engineering: current research directions and implications for future research, Proceedings of the IFIP Working Conference on Method Engineering, Chapman, Atlanta, USA.</element-citation>
		</ref>
		<ref id="R30">
			<label>30</label>
			<element-citation>Van Manen, M. (1990). From meaning to method. Qualitative Health Research, 7 (???): 345-369.</element-citation>
		</ref>
		<ref id="R31">
			<label>31</label>
			<element-citation>Van Manen, M. (1997). Researching lived experience: Human science for an action sensitive pedagogy, (2nd edition). London: Althouse Press.</element-citation>
		</ref>
		<ref id="R32">
			<label>32</label>
			<element-citation>Van Manen, M. (2003). Researching lived experience: Human science for an action sensitive pedagogy (3nd edition). Albany: NewYork Press.</element-citation>
		</ref>
		<ref id="R33">
			<label>33</label>
			<element-citation>Vishnavi, V. &amp; Kuechler W. (2008). Design Science Research Methods and Patterns. Auerbach Publications. Boston, MA: Auerbach Pub.</element-citation>
		</ref>
		<ref id="R34">
			<label>34</label>
			<element-citation>Walsham, G. (1993). Interpreting IS in Organizations. London: Wiley.</element-citation>
		</ref>
		<ref id="R35">
			<label>35</label>
			<element-citation>Weiss, D. (2006). Battleground of the Enterprise Architecture Frameworks, Research Publication, available at, http://www.gartner.com/0CFCD66C-34AE-4B78- 9403-45AF3BE14C79/FinalDownload/DownloadId- 151BF0 D726021B9F1D944A0A88FE30C5/0CFCD66C-34AE-4B78-9403- 45AF 3BE14C79/teleconferences/attributes/attr_155698_115.pdf.</element-citation>
		</ref>
		<ref id="R36">
			<label>36</label>
			<element-citation>Westbrock, T. (2009). Do Frameworks Really Matter? EA directions. Retrived from ww.eadirections.com/EAdirections%20Frameworks.pdf.</element-citation>
		</ref>
		<ref id="R37">
			<label>37</label>
			<element-citation>Zandi, F. &amp; Tavana, M. (2012). A fuzzy group multi-criteria EA framework selection, Expert Systems with Applications, 39(???): 1165-1173.</element-citation>
		</ref>
		<ref id="R38">
			<label>38</label>
			<element-citation>Zellner, G. (2011). A structured evaluation of business process approaches, Business Process Management Journal, 17 (2): 203- 237.</element-citation>
		</ref>
	</ref-list>
		</back>
</article>
<article article-type="Research Paper" dtd-version="3.0" xml:lang="en">
			  <front>
			    <journal-meta>
			      <journal-id journal-id-type="pmc">JITM</journal-id>
			      <journal-id journal-id-type="publisher-id">دانشکده مدیریت دانشگاه تهران</journal-id>
			    	<journal-title-group>
				      <journal-title>Journal of Information Technology Management</journal-title>
			    	</journal-title-group>
			      <issn pub-type="ppub">2008-5893</issn>
			      <publisher>
			        <publisher-name>دانشکده مدیریت دانشگاه تهران</publisher-name>
			      </publisher>
			    </journal-meta>
			    <article-meta>
 			      <article-id pub-id-type="publisher-id">79</article-id>
			      <article-id pub-id-type="doi">10.22059/jitm.2015.53555</article-id>		
			      <ext-link xlink:href="https://jitm.ut.ac.ir/article_53555_e7d253571231a0e9a2c9ef8db5456a67.pdf"/>		
			      <article-categories>
			        <subj-group subj-group-type="heading">
					          		<subject>Decision Support System (DSS)</subject>
			        	</subj-group>
			      </article-categories>
			      <title-group>
			        <article-title>Identifying Organizational Information Security Risks Using Fuzzy Delphi</article-title>
			        <subtitle>شناسایی ریسک‌های امنیت اطلاعات سازمانی با استفاده از روش دلفی فازی در صنعت بانکداری</subtitle>
			      </title-group>
			      
			       <contrib-group>
			       <contrib contrib-type="author" id="c1" corresp="yes">
			          <name>
			            <surname>Mousavi</surname>
			            <given-names>Parisa</given-names>
			          </name>
					  <aff>MSc. Student, Information Technology Management, Faculty of Accounting and  Management, Kharazmi University of Tehran</aff>
			        </contrib>
			       </contrib-group>
			       <contrib-group>
			       <contrib contrib-type="author" id="c2">
			          <name>
			            <surname>Yousefizenouz</surname>
			            <given-names>Reza</given-names>
			          </name>
					  <aff>Assistant Prof., Faculty of Accounting and  Management, Kharazmi University, Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			       <contrib-group>
			       <contrib contrib-type="author" id="c3">
			          <name>
			            <surname>Hasanpoor</surname>
			            <given-names>Akbar</given-names>
			          </name>
					  <aff>Assistant Prof., Faculty of Accounting and  Management, Kharazmi University, Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			      <pub-date pub-type="ppub">
			        <day>21</day>
			        <month>03</month>
			        <year>2015</year>
			      </pub-date>
			      <volume>7</volume>
			      <issue>1</issue>
			      <fpage>163</fpage>
			      <lpage>184</lpage>
			      <history>
			        <date date-type="received">
			          <day>13</day>
			          <month>09</month>
			          <year>2014</year>
			        </date>
			        <date date-type="accepted">
			          <day>28</day>
			          <month>02</month>
			          <year>2015</year>
			        </date>
			      </history>
			      <permissions>
			      	<copyright-statement>Copyright &#x000a9; 2015, دانشکده مدیریت دانشگاه تهران. </copyright-statement>	
			        <copyright-year>2015</copyright-year>
			      </permissions>
			       <self-uri xlink:href="https://jitm.ut.ac.ir/article_53555.html">https://jitm.ut.ac.ir/article_53555.html</self-uri> 		
			      <abstract>
			        <p>Most organizations need to information systems to survive and thrive. Therefore, they should seriously protect their information assets. Creating structured and justifiable exchanges between cost, security and mission control systems security risks is essential. This is important in the planning and development of such systems. Initial appropriate decisions can reduce costs and increase ease of control risk. The first step in the risk management process is the identification of risk. The purpose of this study is identifying the most important enterprise information security risks. This study is application and view research method is descriptive. In this study, a model is presented to identify information security risks, according to ISO 27002 and cobit 4 and study the documents and using by fuzzy Delphi method and opinions of experts, which include 10 of the IT professionals of the Bank, have been presented. In this template 6 factors and 20 subfactors of information security risk factors have been identified for the Bank.</p>
			      </abstract>
					<kwd-group kwd-group-type="author">
						<kwd>Fuzzy Delphi</kwd>
						<kwd>information security</kwd>
						<kwd>risk identifying</kwd>
						<kwd>Risk Management</kwd>
					</kwd-group>
			    </article-meta>
			  </front>
<back>
	<ref-list>
		<ref id="R1">
			<label>1</label>
			<element-citation>Avalincharsooghi, S. Doostari, M. Yazdianvarjani, A. &amp; Mahdaviardestani, A. (2013). Use of artificial neural networks in the information security risk assessment. Journal of Electronic &amp; Cyber Defense, 1(1): 1-14. (in Persian)</element-citation>
		</ref>
		<ref id="R2">
			<label>2</label>
			<element-citation>Biglarian, P. (2012). Compilation of information security evaluation criteria's (Case Study: Exchange Organization of Tehran). Master Thesis, Azahra, Iran.</element-citation>
		</ref>
		<ref id="R3">
			<label>3</label>
			<element-citation>(in Persian)</element-citation>
		</ref>
		<ref id="R4">
			<label>4</label>
			<element-citation>Broderick, J. S. ISMS. (2006). security standards and security regulations. Information Security Technical Report.</element-citation>
		</ref>
		<ref id="R5">
			<label>5</label>
			<element-citation>BS 7799-2, BS ISO/IEC27001. (2005). Information technology-Security techniques-Information security management systems. Available in: http://www.iso.org /iso/catalogue_ detail?csnumber=42103.</element-citation>
		</ref>
		<ref id="R6">
			<label>6</label>
			<element-citation>BS ISO/IEC27005. (2008). Information technology-Security techniques-Information security risk management. Available in: http://www.iso.org/iso/catalogue_ detail? csnumber=42107.</element-citation>
		</ref>
		<ref id="R7">
			<label>7</label>
			<element-citation>Cheng, CH. &amp; Hsue, Y. (2002). Evaluating the best mail battle tank using fuzzy decision theory. European Journal of Operational Research, 142 (1): 174-186.</element-citation>
		</ref>
		<ref id="R8">
			<label>8</label>
			<element-citation>Chin, K.S., Tang, D.W., Wong, Sh. Y., Wang, H. (2009).  Assessing new product development project risk by Bayesian network with a systematic probability generation methodology. Expert Systems with Applications, 36 (6):  9879-9890.</element-citation>
		</ref>
		<ref id="R9">
			<label>9</label>
			<element-citation>Crossler, R., Johnston, A., Lowry, P., Warkentin, M., Baskerville, R. &amp; Qing, H. (2013). Future directions for behavioural information security research. Computers &amp; security, 32: 90-101.</element-citation>
		</ref>
		<ref id="R10">
			<label>10</label>
			<element-citation>Feng, N., Jiannan Wang, H. &amp; Li, M. (2014). A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis. Information Sciences, 256: 57-73.</element-citation>
		</ref>
		<ref id="R11">
			<label>11</label>
			<element-citation>GE Xiao, Y., Yuan,Y.,  &amp;  Lu Li, L. (2011).  An Information Security Maturity Evaluation Model. Procedia Engineering, 24: 335 – 339.</element-citation>
		</ref>
		<ref id="R12">
			<label>12</label>
			<element-citation>Ghazanfari, M., Fathian, M. &amp; Raeissafari, M. (2008). COBIT framework  useful tool for measuring the maturity of IT governance in organizations (public banks in case study). The Association Information and Communication Technology of Iran, 1 (1&amp;2): 55-64. (in Persian)</element-citation>
		</ref>
		<ref id="R13">
			<label>13</label>
			<element-citation>Houmb, S., Franqueira, V. &amp; Erlend A. (2010).  Quantifying security risk level from CVSS estimates of frequency and impact. The Journal of Systems and Software, 83(9): 1622-1634.</element-citation>
		</ref>
		<ref id="R14">
			<label>14</label>
			<element-citation>Iesavi, H. (2011). Evaluation of operational risks related to information security in the modern banking system. Master Thesis, Gilan, Iran. (in Persian)</element-citation>
		</ref>
		<ref id="R15">
			<label>15</label>
			<element-citation>IT Governance Institute, (2007). CobiT 4.1: Control Objectives, Management Guidelines,  Maturity Models.</element-citation>
		</ref>
		<ref id="R16">
			<label>16</label>
			<element-citation>Jafarnejad, A. &amp; yousefizenouz, R. (2008). The risk Ranking fuzzy Model in the drilling project of Petropars. Journal of Industrial Management of Tehran University, 1(1): 21-38. (in Persian)</element-citation>
		</ref>
		<ref id="R17">
			<label>17</label>
			<element-citation>Jamali, GH., Hashemi, M. (2012). Assessment of risk factors on the bank's IT projects Bushehr techniques using fuzzy Dematel. Journal of Information Technology Management, 3(9): 21-40. (in Persian)</element-citation>
		</ref>
		<ref id="R18">
			<label>18</label>
			<element-citation>Karimi, Z. (2006). Conceptual Model of information security risk assessment. (Case Study: Bank Sepah). Master Thesis, Azahra, Iran. (in Persian)</element-citation>
		</ref>
		<ref id="R19">
			<label>19</label>
			<element-citation>Lo, Ch. &amp; Chen, W. (2012).  Hybrid information security risk assessment procedure considering interdependences between controls. Expert Systems with Applications, 39: 247-257.</element-citation>
		</ref>
		<ref id="R20">
			<label>20</label>
			<element-citation>Malekalkalami, M. (2013). Evaluating the performance of information security management at the central libraries of public universities in Tehran, according to the international standard-ISO / IEC. Journal of Information Processing and Management, 28 (4): 895-916. (in Persian)</element-citation>
		</ref>
		<ref id="R21">
			<label>21</label>
			<element-citation>Mirbaha, M. (2008). IT Governance in Financial Services and Manufacturing, Industrial Information and Control Systems at the Royal Institute of Technology ITGI. Master Thesis, Stockholm, Sweden.</element-citation>
		</ref>
		<ref id="R22">
			<label>22</label>
			<element-citation>Mireskandari, M. (2010). Information Security Management System and the necessity of its use in organizations. Processor magazine. 11(107 ): 30-39.</element-citation>
		</ref>
		<ref id="R23">
			<label>23</label>
			<element-citation>(in Persian)</element-citation>
		</ref>
		<ref id="R24">
			<label>24</label>
			<element-citation>Niekerk, J.F. &amp; Solms, R. (2010).  Information security culture: A management perspective. Computers &amp; security, 29(4): 476 -486.</element-citation>
		</ref>
		<ref id="R25">
			<label>25</label>
			<element-citation>Ozkan, S. &amp; Karabacak, B. (2010).  Collaborative risk method for information security management practices: A case context within Turkey.  International Journal of Information Management, 30: 567-572.</element-citation>
		</ref>
		<ref id="R26">
			<label>26</label>
			<element-citation>Saleh, M. &amp; Alfantookh, A. (2011).A new comprehensive framework for enterprise information security risk management. Computing and Informatics, 9: 107-118.</element-citation>
		</ref>
		<ref id="R27">
			<label>27</label>
			<element-citation>Sanayeei, A. Ghazifard, A. &amp; Sobhanmanesh, F. (2011). Factors affecting the development of identification technology by radio frequency in Electronic supply chain management. Journal of New Marketing Research, 1(1): 41-70. (in Persian)</element-citation>
		</ref>
		<ref id="R28">
			<label>28</label>
			<element-citation>Shafieinikabadi, M., Jafarian, A. &amp; Jalilibolhasani, A. (2010). Impact of information security management on the integrity of organizational processes in the supply chain. Journal of Information Processing and Management, 27(2): 27-44. (in Persian)</element-citation>
		</ref>
		<ref id="R29">
			<label>29</label>
			<element-citation>Shahrivari, SH. (2011). Providing the model of information security governance maturity for supply chain management. Master Thesis, Tarbiyat modares, Iran. (in Persian)</element-citation>
		</ref>
		<ref id="R30">
			<label>30</label>
			<element-citation>Shaw, N. E., Burgess, T. F. &amp; Mattos, C. D. (2005). Risk assessment of option performance for new product and process development projects in the chemical industry: A case study. Journal of Risk Research, 8(7-8): 693-711.</element-citation>
		</ref>
		<ref id="R31">
			<label>31</label>
			<element-citation>Standard Institute and Industrial Research of Iran. (2008). IT- security technologies- and information security management procedures. (in Persian)</element-citation>
		</ref>
		<ref id="R32">
			<label>32</label>
			<element-citation>Sungho, K, S., Jang, J.L. &amp; Kim, S. (2007). Common defects in information security management system of Korean companies. The Journal of Systems and Software, 80(10):1631-1638.</element-citation>
		</ref>
		<ref id="R33">
			<label>33</label>
			<element-citation>Taghva,M., izadi,M. (2013). Security investigate in security system developed using service-oriented architecture. Journal of Information Technology Management of Tehran University, 5(3): 25-42. (in Persian)</element-citation>
		</ref>
		<ref id="R34">
			<label>34</label>
			<element-citation>Wu, DD., Kefan, X., Gang, C. &amp; Ping, G. (2010). A risk analysis model in concurrent engineering product development. Journal of Risk Analysis, 30 (9): 1440-1453.</element-citation>
		</ref>
		<ref id="R35">
			<label>35</label>
			<element-citation>yuan, T.  &amp; Chen, P. (2012).  Data Mining Applications in E-Government Information Security. Procedia Engineering, 29: 235–240.</element-citation>
		</ref>
		<ref id="R36">
			<label>36</label>
			<element-citation>Yue, W.T., Cakanyildirim, M., Ryu, Y.U., &amp; Liu, D. (2007).Network externalities, layered protection and IT security risk management. Decision Support Systems, 44(1): 1-16.</element-citation>
		</ref>
	</ref-list>
		</back>
</article>
<article article-type="Research Paper" dtd-version="3.0" xml:lang="en">
			  <front>
			    <journal-meta>
			      <journal-id journal-id-type="pmc">JITM</journal-id>
			      <journal-id journal-id-type="publisher-id">دانشکده مدیریت دانشگاه تهران</journal-id>
			    	<journal-title-group>
				      <journal-title>Journal of Information Technology Management</journal-title>
			    	</journal-title-group>
			      <issn pub-type="ppub">2008-5893</issn>
			      <publisher>
			        <publisher-name>دانشکده مدیریت دانشگاه تهران</publisher-name>
			      </publisher>
			    </journal-meta>
			    <article-meta>
 			      <article-id pub-id-type="publisher-id">79</article-id>
			      <article-id pub-id-type="doi">10.22059/jitm.2015.51911</article-id>		
			      <ext-link xlink:href="https://jitm.ut.ac.ir/article_51911_cafdc196327a904774c5294b30bfef0b.pdf"/>		
			      <article-categories>
			        <subj-group subj-group-type="heading">
					          		<subject>Information Systems and Business Strategy Alignment</subject>
			        	</subj-group>
			      </article-categories>
			      <title-group>
			        <article-title>Estimation of Monetary Value of Information on the Internet</article-title>
			        <subtitle>برآورد ارزش پولی اطلاعات در اینترنت</subtitle>
			      </title-group>
			      
			       <contrib-group>
			       <contrib contrib-type="author" id="c1">
			          <name>
			            <surname>Nazari</surname>
			            <given-names>Mohsen</given-names>
			          </name>
					  <aff>Associate Prof., Faculty of Management, University of Tehran, Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			       <contrib-group>
			       <contrib contrib-type="author" id="c2" corresp="yes">
			          <name>
			            <surname>Tabatabaie Kalejahi</surname>
			            <given-names>Seyed Vahid</given-names>
			          </name>
					  <aff>Ph.D. Candidate, Marketing Management, Faculty of Management, University of Tehran, Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			      <pub-date pub-type="ppub">
			        <day>21</day>
			        <month>03</month>
			        <year>2015</year>
			      </pub-date>
			      <volume>7</volume>
			      <issue>1</issue>
			      <fpage>185</fpage>
			      <lpage>198</lpage>
			      <history>
			        <date date-type="received">
			          <day>14</day>
			          <month>06</month>
			          <year>2014</year>
			        </date>
			        <date date-type="accepted">
			          <day>04</day>
			          <month>02</month>
			          <year>2015</year>
			        </date>
			      </history>
			      <permissions>
			      	<copyright-statement>Copyright &#x000a9; 2015, دانشکده مدیریت دانشگاه تهران. </copyright-statement>	
			        <copyright-year>2015</copyright-year>
			      </permissions>
			       <self-uri xlink:href="https://jitm.ut.ac.ir/article_51911.html">https://jitm.ut.ac.ir/article_51911.html</self-uri> 		
			      <abstract>
			        <p>This research estimates the monetary value of internet information for each type of information and services by using Hedonic pricing method. The statistic social of this research is high-speed internet users in Tehran. Based on the results, high speed internet users of Tehran consider a positive monetary value for some information types in the internet, in descendent respect, such as film downloading, gaming, News, social network, and music. Also, the results indicates that people with higher education level and people who are subscribed to high speed internet earlier than other people consider more monetary value to use the internet. For generalizing the result of this research, it’s suggested to do this research at other cities of Iran. At last, some applicable suggestions made.</p>
			      </abstract>
					<kwd-group kwd-group-type="author">
						<kwd>Hedonic pricing</kwd>
						<kwd>Information Value</kwd>
						<kwd>Internet</kwd>
						<kwd>information goods</kwd>
					</kwd-group>
			    </article-meta>
			  </front>
<back>
	<ref-list>
		<ref id="R1">
			<label>1</label>
			<element-citation>Altmann, J., Rupp, B. &amp; Varaiya, P. (2001). Effects of pricing on Internet user behavior. Netnomics, 3 (1): 67-84.</element-citation>
		</ref>
		<ref id="R2">
			<label>2</label>
			<element-citation>Apavaloaie, E. I. (2012). Marketing research regarding the Internet usage among the population of the Mures County. Procedia Economics and Finance, 3: 928 – 934.</element-citation>
		</ref>
		<ref id="R3">
			<label>3</label>
			<element-citation>Biczók, G., Kardos, S. &amp; Trinh, T. A. (2010). Pricing Internet access in the presence of user loyalty. Netnomics, 11 (2): 119-147.</element-citation>
		</ref>
		<ref id="R4">
			<label>4</label>
			<element-citation>Gerrard, P., Cunningham, J. B. &amp; Devlin, J. F. (2006). Why consumers are not using internet banking: a qualitative study. Journal of Services Marketing, 20 (3): 160-168.</element-citation>
		</ref>
		<ref id="R5">
			<label>5</label>
			<element-citation>Gholipour, A., Rasouli, H. (2011). Effect of IT on Organizational Behavior: Effect of e-mail on Professors` Evaluation of Students. Journal of Information Technology Management, 3 (7):115-132.(in Persian)</element-citation>
		</ref>
		<ref id="R6">
			<label>6</label>
			<element-citation>Grewal, D., Roggeveen, A. L., Compeau, L. D. &amp; Levy, M. (2011). Evolving pricing practices: the role of new business models. Journal of Product &amp; Brand Management, 20 (7): 510-513.</element-citation>
		</ref>
		<ref id="R7">
			<label>7</label>
			<element-citation>Lancaster, K. J. (1966). A New Approach to Consumer Theory. Journal of Political Economy, 74 (2): 132- 157.</element-citation>
		</ref>
		<ref id="R8">
			<label>8</label>
			<element-citation>Lee, H. S., Park, K. &amp; Kim, S. Y. (2003). Estimation of information value on the Internet: application of hedonic price model. Electronic Commerce Research and Applications, 2 (1): 73-80.</element-citation>
		</ref>
		<ref id="R9">
			<label>9</label>
			<element-citation>Masoumi Lari, S.A., Hoseini, M. (2013). Web 2.0 Business Models Taxonomy and its Relation with Web 2.0 Features. Journal of Information Technology Management, 3 (7):169-190.(in Persian)</element-citation>
		</ref>
		<ref id="R10">
			<label>10</label>
			<element-citation>Mo, J., Kim, W. &amp; Park, H. (2013). Internet Service Pricing: Flat or Volume? Journal of Network and Systems Management, 21 (2): 298-325.</element-citation>
		</ref>
		<ref id="R11">
			<label>11</label>
			<element-citation>Momeni, M., Fa'al Ghayumi, A. (2010). Statistical Analyses by SPSS Software, 3rd Edition. Tehran: Moalef Publication.</element-citation>
		</ref>
		<ref id="R12">
			<label>12</label>
			<element-citation>Nazari, M. &amp; Tabatabaie Kalejahi, S. (2011). Comparing Laptop price estimators in the Iran Market: Hedonic Regression and Artificial Neural Network. Conference paper. Gottenheim, Germany.</element-citation>
		</ref>
		<ref id="R13">
			<label>13</label>
			<element-citation>PiranNejad, A., Gholipour, A., Pourezzat, A. &amp; Hanafizadeh, P. (2013). Exploring the Effect of ICTs Penetration on Social Development. Journal of Information Technology Management, 5 (3):1-24.(in Persian)</element-citation>
		</ref>
		<ref id="R14">
			<label>14</label>
			<element-citation>Raeesi, I. &amp; Farzaneh, M. (2011). A Comprehensive Evaluation of the Impact of Most Applied Services on News Websites Quality. Journal of Information Technology Management, 3 (7):37-54.(in Persian)</element-citation>
		</ref>
		<ref id="R15">
			<label>15</label>
			<element-citation>Rosen, S. (1974). Hedonic Prices and Implicit Market:Product Differentiation in Pure Competition. Journal of Political Economy, 82: 34-55.</element-citation>
		</ref>
		<ref id="R16">
			<label>16</label>
			<element-citation>Simsim, M. T. (2011). Internet usage and user preferences in Saudi Arabia. Journal of King Saud University – Engineering Sciences, 23 (2): 101-107.</element-citation>
		</ref>
		<ref id="R17">
			<label>17</label>
			<element-citation>Sohrabi-Haghighat, M. (2011). New Media and Social-political Change in Iran. Cyber Orient, 5(1). Available in: http://www.cyberorient.net/article.do? articleId=6187.</element-citation>
		</ref>
		<ref id="R18">
			<label>18</label>
			<element-citation>Steiger, D. M. (1997). Using Non-Traditional Approaches to Statistical Classification and Regression in DSS Model Analysis. Annals of Operations Research, 74 (0): 269-276.</element-citation>
		</ref>
		<ref id="R19">
			<label>19</label>
			<element-citation>Sundararajan, A. (2004, December). Nonlinear Pricing of Information Goods. Management Science, 50 (12): 1660–1673.</element-citation>
		</ref>
		<ref id="R20">
			<label>20</label>
			<element-citation>Taha, D. S. (2013). The influence of social networks in visiting, planning and living in cities. Alexplore: A pilot project in Alexandria. Alexandria Engineering Journal, 52 (3): 479-488.</element-citation>
		</ref>
		<ref id="R21">
			<label>21</label>
			<element-citation>Viswanathan, S. &amp; Anandalingam, G. (2005). Pricing strategies for information goods. Sadhana, 30 (2-3): 257–274.</element-citation>
		</ref>
		<ref id="R22">
			<label>22</label>
			<element-citation>Zhang, Z., Ye, Q. &amp; Law, R. (2011). Determinants of hotel room price: An exploration of travelers’ hierarchy of accommodation needs. International Journal of Contemporary Hospitality Management, 23 (7): 972-981.</element-citation>
		</ref>
	</ref-list>
		</back>
</article>
<article article-type="Research Paper" dtd-version="3.0" xml:lang="en">
			  <front>
			    <journal-meta>
			      <journal-id journal-id-type="pmc">JITM</journal-id>
			      <journal-id journal-id-type="publisher-id">دانشکده مدیریت دانشگاه تهران</journal-id>
			    	<journal-title-group>
				      <journal-title>Journal of Information Technology Management</journal-title>
			    	</journal-title-group>
			      <issn pub-type="ppub">2008-5893</issn>
			      <publisher>
			        <publisher-name>دانشکده مدیریت دانشگاه تهران</publisher-name>
			      </publisher>
			    </journal-meta>
			    <article-meta>
 			      <article-id pub-id-type="publisher-id">79</article-id>
			      <article-id pub-id-type="doi">10.22059/jitm.2015.53318</article-id>		
			      <ext-link xlink:href="https://jitm.ut.ac.ir/article_53318_459b5e91cc8e8095c1064dd5ef759ba5.pdf"/>		
			      <article-categories>
			        <subj-group subj-group-type="heading">
					          		<subject>Knowledge Management:Knowledge creation/Capture/Elicitation/Acquisition/Processing/Compaction/Storage/Retrieval/Sharing</subject>
			        	</subj-group>
			      </article-categories>
			      <title-group>
			        <article-title>The Effect of Leadership Style and Organizational Climate on the Knowledge Management; The Role of Organizational Structure and Social Reaction (Survey about the Mellat Bank Headquarters)</article-title>
			        
			      </title-group>
			      
			       <contrib-group>
			       <contrib contrib-type="author" id="c1">
			          <name>
			            <surname>Yazdani</surname>
			            <given-names>Hamidreza</given-names>
			          </name>
					  <aff>Assistant Prof., Faculty of Management &amp; Accounting , pardis compus tehran university, Qom, Iran</aff>
			        </contrib>
			       </contrib-group>
			       <contrib-group>
			       <contrib contrib-type="author" id="c2">
			          <name>
			            <surname>Hamidizadeh</surname>
			            <given-names>Ali</given-names>
			          </name>
					  <aff>Assistant Professor, Faculty of Management &amp; Accounting , pardis compus tehran university, Qom, Iran</aff>
			        </contrib>
			       </contrib-group>
			       <contrib-group>
			       <contrib contrib-type="author" id="c3" corresp="yes">
			          <name>
			            <surname>kameli</surname>
			            <given-names>Alireza</given-names>
			          </name>
					  <aff>MSc. Student, Faculty of Management &amp; Accounting, Farabi Campus University of Tehran, Iran</aff>
			        </contrib>
			       </contrib-group>
			      <pub-date pub-type="ppub">
			        <day>21</day>
			        <month>03</month>
			        <year>2015</year>
			      </pub-date>
			      <volume>7</volume>
			      <issue>1</issue>
			      <fpage>199</fpage>
			      <lpage>216</lpage>
			      <history>
			        <date date-type="received">
			          <day>01</day>
			          <month>09</month>
			          <year>2014</year>
			        </date>
			        <date date-type="accepted">
			          <day>08</day>
			          <month>02</month>
			          <year>2015</year>
			        </date>
			      </history>
			      <permissions>
			      	<copyright-statement>Copyright &#x000a9; 2015, دانشکده مدیریت دانشگاه تهران. </copyright-statement>	
			        <copyright-year>2015</copyright-year>
			      </permissions>
			       <self-uri xlink:href="https://jitm.ut.ac.ir/article_53318.html">https://jitm.ut.ac.ir/article_53318.html</self-uri> 		
			      <abstract>
			        <p>Leadership style and organizational climate are considered as a substructure framework in successful performance of knowledge management. The purpose of this research is investigating both the effect of leadership style and organizational climate on knowledge management and the moderate role of organization structure and social interaction in affecting leadership style and organizational climate on knowledge management. This study has been done as a sample of 210 main employers of Tehran Mellat bank office. The descriptive- survey research is management type and used tool is questionnaire. We used modeling method of structural equations by Lisrel software data analysis. Research findings show leadership style doesn’t effect on knowledge management positively but organization climate has a positive effect on knowledge management. On other word, leadership style has a positive effect on organization structure and its own has a positive effect on social interaction. But, in this research, moderate variable couldn’t play an easy role in affecting leadership style over knowledge management.</p>
			      </abstract>
					<kwd-group kwd-group-type="author">
						<kwd>Knowledge Management</kwd>
						<kwd>leadership style</kwd>
						<kwd>Organizational climate</kwd>
						<kwd>Organizational structure</kwd>
						<kwd>social interaction</kwd>
					</kwd-group>
			    </article-meta>
			  </front>
<back>
	<ref-list>
		<ref id="R1">
			<label>1</label>
			<element-citation>Alavi, M.&amp;  Leidner, D. (2001). Review: KM and KM systems: conceptual foundations and research issues. MIS Quarterly, 25(1): 36-107.</element-citation>
		</ref>
		<ref id="R2">
			<label>2</label>
			<element-citation>Bartol, K. M. &amp; Srivastava, A. (2002). Encouraging knowledge sharing: The role of organizational reward systems. Journal of Leadership. 9(1): 64-76.</element-citation>
		</ref>
		<ref id="R3">
			<label>3</label>
			<element-citation>Bass, B. M. &amp; Avoloo, B. J. (2000). Potential Biases in leadership Measures: How Prototypis. Leniency and General Satisfaction Relate Rating and Rankings of Transformational and Transactional Leadership Construct Educational and Psychological Measurement. 49(12): 112-132.</element-citation>
		</ref>
		<ref id="R4">
			<label>4</label>
			<element-citation>Bass, B. M. &amp; Bass, R. (2008). The bass handbook of leadership: theory, research, and managerial applications, 4th. New York: Free Press.</element-citation>
		</ref>
		<ref id="R5">
			<label>5</label>
			<element-citation>Chen, C. J. &amp; Huang, J. W. (2007). How organizational climate and structure affect knowledge management- social interaction perspective. international journal of information management, 27 (2): 104-118.</element-citation>
		</ref>
		<ref id="R6">
			<label>6</label>
			<element-citation>Chen, C. J., Huang, J.W. &amp; Hsiao, Y.C. (2010). Knowledge management and innovativeness:the role of organizational climate and structure. international journal of manpowe. 31(8): 848-870.</element-citation>
		</ref>
		<ref id="R7">
			<label>7</label>
			<element-citation>Chen, C. &amp; Lin, B. (2004). The effects of environment, knowledge attribute, organizational climate, and firm characteristics on knowledge sourcing decisions. R&amp;D Management. 34(2): 137-146.</element-citation>
		</ref>
		<ref id="R8">
			<label>8</label>
			<element-citation>Ganesh, D. (2002). Management strategies for individual knowledge and organizational knowledge. journal of knowledge management. 6(1): 31-39.</element-citation>
		</ref>
		<ref id="R9">
			<label>9</label>
			<element-citation>Ghani, K.A., Jayabalan, V. &amp; Sugumar, M. (2002). Impact of advanced manufacturing technology on organizational structure. The Journal of High Technology Management Research,13 (2): 157-175.</element-citation>
		</ref>
		<ref id="R10">
			<label>10</label>
			<element-citation>Grant, R. (1996). Toward a knowledge- based theory of the firm, Strategy Management Journal, 17 (S2): 109-111.</element-citation>
		</ref>
		<ref id="R11">
			<label>11</label>
			<element-citation>Hoegl, M., Parboteeah, K. P. &amp; Munson, C. L. (2003). Team-level antecedents of individuals’ knowledge networks. Decision Sciences. 34(4): 741-770.</element-citation>
		</ref>
		<ref id="R12">
			<label>12</label>
			<element-citation>Huang, J. W. &amp; Li, Y. H. (2009). The mediating effect of knowledge management on social interaction and innovation performance. international journal of manpower. 30(3): 285-301.</element-citation>
		</ref>
		<ref id="R13">
			<label>13</label>
			<element-citation>Ibarra, H. (1993). Network centrality, power, and innovation involvement: Determinants of technical and administrative roles. Academy of Management Journal, 36(3): 471-501.</element-citation>
		</ref>
		<ref id="R14">
			<label>14</label>
			<element-citation>Janz, B. D. &amp; Prasarnphanich, P. (2003). Understanding the antecedents of effective knowledge management: the importance of a knowledge-centered culture. Decision Sciences. 34(2): 351-384.</element-citation>
		</ref>
		<ref id="R15">
			<label>15</label>
			<element-citation>Koenig Michael, E. &amp; Srikantaiah, T. (2007). KM: lesson learned, American Society for Information Science and Technology. Second printing. USA: information today inc.</element-citation>
		</ref>
		<ref id="R16">
			<label>16</label>
			<element-citation>Lee, C. C. &amp; Grover, V. (2000). Exploring mediation between environmental and structural attributes: the penetration of communication technologies in manufacturing organizations. Journal Management Information System, 16(3): 187-317.</element-citation>
		</ref>
		<ref id="R17">
			<label>17</label>
			<element-citation>Liao, C., Chuang, S. &amp; To, P. (2011). How KM mediates the relationship between environment and organizational structure. Journal of Business Research. 64 (7): 728-736.</element-citation>
		</ref>
		<ref id="R18">
			<label>18</label>
			<element-citation>Long, D. (2000). Diagnosing cultural barriers to knowledge management. The Academy of Management Executive. 14(4): 113-128.</element-citation>
		</ref>
		<ref id="R19">
			<label>19</label>
			<element-citation>Mahmoudsalehi, M., Dari, B. &amp; Safari, K. (2012). Investigating role of mediator social interaction in the influence of organizational climate and structure on knowledge management (case study: iran's automobile industry). Journal of information technology management, 4(11): 69-92. (in Persian)</element-citation>
		</ref>
		<ref id="R20">
			<label>20</label>
			<element-citation>Mahmoudsalehi, M., Moradkhannejad, R. &amp; Safari, K. (2012). How knowledge management is affected by organizational structure. The learning organization, 19(6): 518-528.</element-citation>
		</ref>
		<ref id="R21">
			<label>21</label>
			<element-citation>McGrath, R. G. (2001). Exploratory learning, innovative capacity, and managerial oversight. Academy of Management Journal, 44(1): 118-134.</element-citation>
		</ref>
		<ref id="R22">
			<label>22</label>
			<element-citation>Monavarian, A., Kheyrandish, M., Asgari., N. (2011). Developing structural dimensions in accordance with knowledge management. Journal of information technology management. 7(3): 133-150. (in Persian)</element-citation>
		</ref>
		<ref id="R23">
			<label>23</label>
			<element-citation>Nahapiet, J. &amp; Ghoshal, S. (1998).Social capital, intellectual capital and the organizational advantage. Academy of Management Review, 23(2): 242-266.</element-citation>
		</ref>
		<ref id="R24">
			<label>24</label>
			<element-citation>Oliver, R. L. &amp; Anderson, E. (1994). An empirical test of the consequences of behavior- and outcome-based sales control systems. Journal of Marketing, 58(4): 53-67.</element-citation>
		</ref>
		<ref id="R25">
			<label>25</label>
			<element-citation>Rastogi, P. (2000). Knowledge management and intellectual capital — the new virtuous reality. Human System Management, 19(1): 39-49</element-citation>
		</ref>
		<ref id="R26">
			<label>26</label>
			<element-citation>Robbins, S.P. (1990). Organization Theory: Structure Designs and Applications. Prentice-Hall ,Englewood Cliffs.</element-citation>
		</ref>
		<ref id="R27">
			<label>27</label>
			<element-citation>Rowold, J. (2009). Relationship Between Leadership Style and Followers Emotional Experience and Effectiveness in the Voluntary Sector. Nonprofit and Voluntary Sector Quarterly, 38(2): 270-289.</element-citation>
		</ref>
		<ref id="R28">
			<label>28</label>
			<element-citation>Schneider, B. (1990). The climate for service: An application of the climate construct. Organizational climate and culture, 383-412.</element-citation>
		</ref>
		<ref id="R29">
			<label>29</label>
			<element-citation>Scott, E. B. (2003). The role of transformational and transactional leadership in creatig,sharing and exploiting organizational knowledge. The journal of leadership and organizational studied. 9(4): 32.</element-citation>
		</ref>
		<ref id="R30">
			<label>30</label>
			<element-citation>Shoghi, B. &amp; Shoghi, A. (2012). Leadership Styles (Concepts, Definitions,and Theories).Tehran: Raznahan Publications. (in Persian)</element-citation>
		</ref>
		<ref id="R31">
			<label>31</label>
			<element-citation>Shoghi, B., Asgarani, M. &amp; Ashnagar, N. (2013). Mediating effect of structure on the relationship between manager's leadership style and employee's creativity (case study:metal industerial of kaveh induastrial city). International journal of learning&amp; development. 3(3): 63-80.</element-citation>
		</ref>
		<ref id="R32">
			<label>32</label>
			<element-citation>Sivadas, E. &amp; Dwyer, F. R. (2000). An examination of organizational factors influencing new product success in internal and alliance-based processes. Journal of Marketing. 61(4): 31-50.</element-citation>
		</ref>
		<ref id="R33">
			<label>33</label>
			<element-citation>Skakon, J., Nielsen, K., Borg, V. &amp; Guzman, J. (2010). Are leaders wellbeing,behaviors and style associated with the affective wellbeing of their employees? A systematic review of three decades of research. Work &amp; Stress. 24(2): 139-147</element-citation>
		</ref>
		<ref id="R34">
			<label>34</label>
			<element-citation>Slater, S. F. &amp; Narver, J. C. (1995). Market orientation and the learning organization. Journal of Marketing, 59 (3): 63-74.</element-citation>
		</ref>
		<ref id="R35">
			<label>35</label>
			<element-citation>Sparrowe, R. T., Liden, R. C. &amp; Kraimer, M. L. (2001). Social networks and the performance of individuals and groups. Academy of Management Journal, 44(2): 316-325.</element-citation>
		</ref>
		<ref id="R36">
			<label>36</label>
			<element-citation>Sveiby, K. E. &amp; Simons, R. (2002). Collaborative climate and effectiveness of knowledge work—An empirical study. Journal of Knowledge Management. 6(5): 420-433.</element-citation>
		</ref>
		<ref id="R37">
			<label>37</label>
			<element-citation>Szulanski, G. (1996). Exploring internal stickiness: Impediments to the transfer of best practice within the firm. Strategic Management journal. 17(10): 27-43.</element-citation>
		</ref>
		<ref id="R38">
			<label>38</label>
			<element-citation>Tian, J., Nakamon, Y. R. &amp; Wierzbicky, A. (2009). Knowledge management and knowledge creation in academia: A study based on surveys in a japanes research university. journal of knowledge management, 13(2): 76-92.</element-citation>
		</ref>
		<ref id="R39">
			<label>39</label>
			<element-citation>Tsai, W. (2002). Social structure of coopetition within a multiunit organization: Coordination, competition, and intra-organizational knowledge sharing. Organization Science. 13(2): 179-190.</element-citation>
		</ref>
		<ref id="R40">
			<label>40</label>
			<element-citation>Tsai, W. &amp; Ghoshal, S. (1998). Social capital and value creation: The role of intrafirm networks. Academy of Management Journal. 41(4): 464-476.</element-citation>
		</ref>
		<ref id="R41">
			<label>41</label>
			<element-citation>Uzzi, B. &amp; Lancaster, R. (2003). Relational embeddedness and learning: the case of bank loan managers and their clients. Management Science. 9(4): 383-399.</element-citation>
		</ref>
		<ref id="R42">
			<label>42</label>
			<element-citation>Zheng, W., Yang, B. &amp; Mclean, G. (2010). Linking organizational culture, structure, strategy and organizational effectiveness: mediating role of km. journal of business research, 63 (7): 763-771.</element-citation>
		</ref>
	</ref-list>
		</back>
</article>