Business unit managers often feel they need to start analytics initiatives to remain competitive. Given the budget constraints placed on business units, including the internal IT business unit, managers have to find innovative ways to pay for the analytics initiatives. Since IT departments are cost centers, this leads to business unit managers trying to launch analytics initiatives outside the purview of the internal IT department. This trend is called shadow IT.
Each ICO has an associated white paper that describes the firm's business model, market, cryptocurrency, the team behind the project, and the technology. Then investments are made in the startups. The white papers differ in scope and detail. Comprehensive white papers describing technologically-sophisticated details raised more money than superficial ones simply making claims. Examples of ICO successes and failures are described.
A case study examined the progress of a MediLedger, a blockchain-based pharmaceutical supply chain system. The team focused on how blockchain applications can be used in the enterprise context, how they can add value, and what drives their adoption. Through interviews the team discovered how the project developed over time and how the developers solved the challenges that arose. Four lessons provide guidance to other firms.
A longitudinal case study provides a rare glimpse into the development and evolution of TradeLens from 2013 to 2019. Data were collected from several sources, including interviews, conferences, focus groups, direct observation, project meetings, and field visits. The business value of this global supply chain system is still evolving, but seven valuable lessons provide guidance for future blockchain projects with interorganizational boundaries.
The researchers attempted to find out if the regulations of GDPR conflicted with the features and benefits of blockchain technology. They gathered evidence from workshops, meetings, documents, and interviews. The outcome is that third-party services that provide permissioned pseudonyms are indeed able to avoid storing personal information yet provide the shared ledgers needed for blockchains.
Research has long posited that the relationship between IT and performance can be explained by investigating overlooked key capabilities that are enabled by IT. These connections are especially not well understood in an inter-organizational (IO) context.
Firms that develop competency in managing knowledge resources across their supply chains are rewarded with higher economic benefits. A major challenge in managing IO knowledge are the competing, and often conflicting, goals of firms in the p...
The constantly growing pool of smart, connected Internet of Things (IoT) devices poses completely new challenges for business regarding security and privacy. In fact, the widespread adoption of smart products might depend on the ability of organizations to offer systems that ensure adequate sensor data integrity while guaranteeing sufficient user privacy.
Grounded theory (GTM) research aims at understanding practice issues from observing it. When researchers collaborate and use GTM, they often report their research method by stating "we did the research." This, however, does not clarify how they reconciled differences in the researchers' viewpoints and their omitted descriptions may lessen the quality of the study, possibly resulting even incorrect conclusions. Omitting details can make it difficult to observe and assess collaborative work.
This article proposes and validates a comprehensive model to understand user satisfaction with IT and software applications. The model, which used previous concepts from a heavily-used information systems success model, can provide measures at various levels of granularity. The strongest predictors of satisfaction with the system were ease of use and response time. The strongest predictor of satisfaction with the service, in the context of a PeopleSoft implementation, was accessibility and av...
More than 500 articles related to health IT were published in IS journals between 1990 and 2017. While remarkable that such a significant quantity of quality health IT research is being published in IS journals, it is nearly impossible, even for researchers who read in this area regularly, to comprehensively understand what this research has contributed.
Many modern information systems are large and complex. Analyzing or designing them means that IS professionals need to consider multiple perspectives. IS professionals use conceptual models – semi-formal graphical visualizations of real-world domains – to help build their understanding. The number and variety of different models can be large. We do not know how IS professionals can effectively and efficiently choose between different models, use them to develop an understandi...
Opportunism, devious self-interest behavior, is a persistent social problem. Attempts to restrict opportunism, such as legal and ethical codes, have shaped societies for millennia. Opportunism differs from mere profit maximizing because it takes advantage of a trusting relationship to advance self-interest. According to a previous study by three of the authors, a majority of IS consultants and their clients have observed opportunism. Such practices might include breaking promises, being untru...
Many enterprises have not progressed their blockchain solutions beyond proofs-ofconcept. Daunting managerial challenges in the areas of standards, regulations, shared governance models and viable ecosystems impede progress. We describe the strategies that LO3 Energy, Moog, Inc. and the Center for Supply Chain Studies are pursuing to address these challenges.
Many organizations are looking at blockchain technologies. However, the drawbacks of blockchain databases (e.g., scalability, capacity, latency, privacy) mean that the technology is not always appropriate. This article presents a ten-step decision path that can help determine whether the application of blockchain is justified and, if so, which kind of blockchain technology to use. We describe how this decision path was used to develop a blockchain prototype for the Danish maritime shipping in...
Data monetization occurs when companies convert data and analytics into financial returns. BBVA, a global financial group, established a data science center of excellence in 2014 to lead its data monetization activities. By 2017, BBVA had developed a rich data monetization portfolio by making preexisting data monetization activities more effective, by pursuing new data monetization approaches, and by investing in a larger number of data monetization projects. Based on BBVA’s efforts, we...
Pricing and advertisement are two of the most important instruments for online retailers (e-tailers) to attract and compete for customers. At the same time, these two dimensions have a considerable impact on the costs and profitability of such firms. Knowing such strategies and their impacts is key in maintaining competitive advantage. In order to attract customers, it is essential to consider not only consumer behavior and market segment, but also competitor`s strategic response.
Online petitions play an increasingly important role in the political life of many countries. They are a powerful tool for motivating political change, allowing people to easily participate in the political discourse and eventually influence policy- and decision making. Despite their growing popularity, the success rate of online petitions is still regrettably low.
To better understand what differentiates successful from unsuccessful petitions, this paper investigates how textual information...
It is widely accepted that information systems have an influence on performance. However, literature is still in disagreement about the strength and direction of the influence. Does system use affects users’ task performance positively, negatively, or insignificantly? This knowledge gap makes it difficult for us to understand the deeper interrelations between system use and task performance.
The unresolved situation makes it hard for practitioners to justify IT investments by expected ...
Organizations are vulnerable to insider threats when their members conceal information about adverse behaviours. Even members without malicious intent might still conceal potentially adverse behaviours, e.g., non-compliance with security policies. Identifying those cases is very challenging. Organizations have reported how their current measures incur too many false positives, are often too slow or even non-existent.
If you do not have access to your favorite social networking site (SNS) like Facebook or Instagram, does this mean that you simply miss a tool that you sometimes need in your daily life or does it touch you more deeply? It is an important observation of recent research that the use of social networking sites over several hours per day has to be understood as something more substantial than just the usage of a tool.
This article builds on the idea that information technology, here specificall...
New platforms often struggle to get stakeholders to use it because of its newness and lack of legitimacy. Legitimacy is traditionally considered as a social and relational quality among people. The question addressed by this article is: “how can legitimacy be designed into the technology?” Specifically, it is concerned with how to design a platform so that different key users perceive it as legitimate and wants to engage in it.
There are two main challenges to address in designin...
Many online shoppers search social networks for information before making a purchase. The study, therefore, examines how shoppers use their social networks—that is, core network of online friends or extended network of strangers—to search for information.
There is a need for high-quality research findings that can be applied to problems encountered by information technology (IT) practitioners. The practical difficulties associated with gaining access to IT executives often limit the practicality of such research. As an IT executive, it’s one thing to know what you’re thinking and what your organization is doing, but quite another to know what others in similar leadership positions have on their minds and what are their organization...
The development of services, products, and information systems should focus on customer needs and preferences. Understanding the customers requires frequent interactions with them. However, this procedure is often perceived costly, difficult, and even unproductive. Because of these issues, companies may fail to acquire important requirements from potential key customers. Missing such valuable insights during design and development is likely to lead in sub-optimal performance of the outcomes.
Facing novel information technology (IT), organizations must invest in exploiting existing resources and assets to impact organizational performance. However, organizations must also invest in innovative, emerging technologies to strengthen their IT portfolios. Given the importance of both investments in IT capabilities and investments in digital-business intensity, the question concerning how the two types of investments interrelate arises.
Companies increasingly use enterprise content management (ECM) systems to manage unstructured information assets, but employees often avoid using the new ECM systems in favor of other means of managing unstructured information, such as local file systems. However, such workarounds can lead to problems at the individual and organizational levels (e.g., poor collaboration). Against this background, the study explores how low levels of user satisfaction may result from poor information quality, ...
Companies are increasingly expected to implement IT-based environmental strategies, either to reduce the negative environmental impacts that result from the use of IT (“green IT strategies”) or to increase the positive impacts that the use of IT can have on sustainability (“IT-enabled green strategies”). However, since the execution of both green IT strategies and IT-enabled green strategies is time-consuming, requires considerable financial investment, and adds comple...
Information technology enables supply-chain partners to share information, thereby fostering supply-chain performance. However, only a few organizations fully exploit their supply-chain partners’ information resources, leading to a large gap between the potential and practice of inter-organizational information systems. This study asks why only a few organizations benefit from their partners’ information.
Information systems can assist organizational sensemaking, which is crucial as organizations seek to improve their processes. In making sense, people collaboratively frame and label problems and situations through communication, and they do so to understand the past and to prepare for the future. But how can organizations implement systems that support organizational sensemaking?
Business firms are increasingly part of inter-organisational networks, and information systems provide an essential infrastructure for these networks. Traditionally, strong alignment between information systems and business strategies is seen as prerequisite for organisational performance. But, how to reach IS-business alignment in case of several business strategies as they exist in inter-organisational networks?
Companies are increasingly expected to implement IT-based environmental strategies, either to reduce the negative environmental impacts that result from the use of IT (“green IT strategies”) or to increase the positive impacts that the use of IT can have on sustainability (“IT-enabled green strategies”). However, since the execution of both green IT strategies and IT-enabled green strategies is time-consuming, requires considerable financial investment, and adds comple...
Business firms are increasingly part of inter-organisational networks, and information systems provide an essential infrastructure for these networks. Traditionally, strong alignment between information systems and business strategies is seen as prerequisite for organisational performance. But, how to reach IS-business alignment in case of several business strategies as they exist in inter-organisational networks?
A case study examined the progress of a MediLedger, a blockchain-based pharmaceutical supply chain system. The team focused on how blockchain applications can be used in the enterprise context, how they can add value, and what drives their adoption. Through interviews the team discovered how the project developed over time and how the developers solved the challenges that arose. Four lessons provide guidance to other firms.
Information systems can assist organizational sensemaking, which is crucial as organizations seek to improve their processes. In making sense, people collaboratively frame and label problems and situations through communication, and they do so to understand the past and to prepare for the future. But how can organizations implement systems that support organizational sensemaking?
Information technology enables supply-chain partners to share information, thereby fostering supply-chain performance. However, only a few organizations fully exploit their supply-chain partners’ information resources, leading to a large gap between the potential and practice of inter-organizational information systems. This study asks why only a few organizations benefit from their partners’ information.
A longitudinal case study provides a rare glimpse into the development and evolution of TradeLens from 2013 to 2019. Data were collected from several sources, including interviews, conferences, focus groups, direct observation, project meetings, and field visits. The business value of this global supply chain system is still evolving, but seven valuable lessons provide guidance for future blockchain projects with interorganizational boundaries.
Business unit managers often feel they need to start analytics initiatives to remain competitive. Given the budget constraints placed on business units, including the internal IT business unit, managers have to find innovative ways to pay for the analytics initiatives. Since IT departments are cost centers, this leads to business unit managers trying to launch analytics initiatives outside the purview of the internal IT department. This trend is called shadow IT.
Research has long posited that the relationship between IT and performance can be explained by investigating overlooked key capabilities that are enabled by IT. These connections are especially not well understood in an inter-organizational (IO) context.
Firms that develop competency in managing knowledge resources across their supply chains are rewarded with higher economic benefits. A major challenge in managing IO knowledge are the competing, and often conflicting, goals of firms in the p...
Grounded theory (GTM) research aims at understanding practice issues from observing it. When researchers collaborate and use GTM, they often report their research method by stating "we did the research." This, however, does not clarify how they reconciled differences in the researchers' viewpoints and their omitted descriptions may lessen the quality of the study, possibly resulting even incorrect conclusions. Omitting details can make it difficult to observe and assess collaborative work.
Pricing and advertisement are two of the most important instruments for online retailers (e-tailers) to attract and compete for customers. At the same time, these two dimensions have a considerable impact on the costs and profitability of such firms. Knowing such strategies and their impacts is key in maintaining competitive advantage. In order to attract customers, it is essential to consider not only consumer behavior and market segment, but also competitor`s strategic response.
Online petitions play an increasingly important role in the political life of many countries. They are a powerful tool for motivating political change, allowing people to easily participate in the political discourse and eventually influence policy- and decision making. Despite their growing popularity, the success rate of online petitions is still regrettably low.
To better understand what differentiates successful from unsuccessful petitions, this paper investigates how textual information...
Companies increasingly use enterprise content management (ECM) systems to manage unstructured information assets, but employees often avoid using the new ECM systems in favor of other means of managing unstructured information, such as local file systems. However, such workarounds can lead to problems at the individual and organizational levels (e.g., poor collaboration). Against this background, the study explores how low levels of user satisfaction may result from poor information quality, ...
It is widely accepted that information systems have an influence on performance. However, literature is still in disagreement about the strength and direction of the influence. Does system use affects users’ task performance positively, negatively, or insignificantly? This knowledge gap makes it difficult for us to understand the deeper interrelations between system use and task performance.
The unresolved situation makes it hard for practitioners to justify IT investments by expected ...
Facing novel information technology (IT), organizations must invest in exploiting existing resources and assets to impact organizational performance. However, organizations must also invest in innovative, emerging technologies to strengthen their IT portfolios. Given the importance of both investments in IT capabilities and investments in digital-business intensity, the question concerning how the two types of investments interrelate arises.
There is a need for high-quality research findings that can be applied to problems encountered by information technology (IT) practitioners. The practical difficulties associated with gaining access to IT executives often limit the practicality of such research. As an IT executive, it’s one thing to know what you’re thinking and what your organization is doing, but quite another to know what others in similar leadership positions have on their minds and what are their organization...
If you do not have access to your favorite social networking site (SNS) like Facebook or Instagram, does this mean that you simply miss a tool that you sometimes need in your daily life or does it touch you more deeply? It is an important observation of recent research that the use of social networking sites over several hours per day has to be understood as something more substantial than just the usage of a tool.
This article builds on the idea that information technology, here specificall...
New platforms often struggle to get stakeholders to use it because of its newness and lack of legitimacy. Legitimacy is traditionally considered as a social and relational quality among people. The question addressed by this article is: “how can legitimacy be designed into the technology?” Specifically, it is concerned with how to design a platform so that different key users perceive it as legitimate and wants to engage in it.
There are two main challenges to address in designin...
The development of services, products, and information systems should focus on customer needs and preferences. Understanding the customers requires frequent interactions with them. However, this procedure is often perceived costly, difficult, and even unproductive. Because of these issues, companies may fail to acquire important requirements from potential key customers. Missing such valuable insights during design and development is likely to lead in sub-optimal performance of the outcomes.
The researchers attempted to find out if the regulations of GDPR conflicted with the features and benefits of blockchain technology. They gathered evidence from workshops, meetings, documents, and interviews. The outcome is that third-party services that provide permissioned pseudonyms are indeed able to avoid storing personal information yet provide the shared ledgers needed for blockchains.
Many online shoppers search social networks for information before making a purchase. The study, therefore, examines how shoppers use their social networks—that is, core network of online friends or extended network of strangers—to search for information.
Organizations are vulnerable to insider threats when their members conceal information about adverse behaviours. Even members without malicious intent might still conceal potentially adverse behaviours, e.g., non-compliance with security policies. Identifying those cases is very challenging. Organizations have reported how their current measures incur too many false positives, are often too slow or even non-existent.
Many modern information systems are large and complex. Analyzing or designing them means that IS professionals need to consider multiple perspectives. IS professionals use conceptual models – semi-formal graphical visualizations of real-world domains – to help build their understanding. The number and variety of different models can be large. We do not know how IS professionals can effectively and efficiently choose between different models, use them to develop an understandi...
The constantly growing pool of smart, connected Internet of Things (IoT) devices poses completely new challenges for business regarding security and privacy. In fact, the widespread adoption of smart products might depend on the ability of organizations to offer systems that ensure adequate sensor data integrity while guaranteeing sufficient user privacy.
Data monetization occurs when companies convert data and analytics into financial returns. BBVA, a global financial group, established a data science center of excellence in 2014 to lead its data monetization activities. By 2017, BBVA had developed a rich data monetization portfolio by making preexisting data monetization activities more effective, by pursuing new data monetization approaches, and by investing in a larger number of data monetization projects. Based on BBVA’s efforts, we...
Many organizations are looking at blockchain technologies. However, the drawbacks of blockchain databases (e.g., scalability, capacity, latency, privacy) mean that the technology is not always appropriate. This article presents a ten-step decision path that can help determine whether the application of blockchain is justified and, if so, which kind of blockchain technology to use. We describe how this decision path was used to develop a blockchain prototype for the Danish maritime shipping in...
Each ICO has an associated white paper that describes the firm's business model, market, cryptocurrency, the team behind the project, and the technology. Then investments are made in the startups. The white papers differ in scope and detail. Comprehensive white papers describing technologically-sophisticated details raised more money than superficial ones simply making claims. Examples of ICO successes and failures are described.
Many enterprises have not progressed their blockchain solutions beyond proofs-ofconcept. Daunting managerial challenges in the areas of standards, regulations, shared governance models and viable ecosystems impede progress. We describe the strategies that LO3 Energy, Moog, Inc. and the Center for Supply Chain Studies are pursuing to address these challenges.
This article proposes and validates a comprehensive model to understand user satisfaction with IT and software applications. The model, which used previous concepts from a heavily-used information systems success model, can provide measures at various levels of granularity. The strongest predictors of satisfaction with the system were ease of use and response time. The strongest predictor of satisfaction with the service, in the context of a PeopleSoft implementation, was accessibility and av...
Opportunism, devious self-interest behavior, is a persistent social problem. Attempts to restrict opportunism, such as legal and ethical codes, have shaped societies for millennia. Opportunism differs from mere profit maximizing because it takes advantage of a trusting relationship to advance self-interest. According to a previous study by three of the authors, a majority of IS consultants and their clients have observed opportunism. Such practices might include breaking promises, being untru...
More than 500 articles related to health IT were published in IS journals between 1990 and 2017. While remarkable that such a significant quantity of quality health IT research is being published in IS journals, it is nearly impossible, even for researchers who read in this area regularly, to comprehensively understand what this research has contributed.