Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1814989_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Raquel Benbunan-Fich Author-X-Name-First: Raquel Author-X-Name-Last: Benbunan-Fich Author-Name: Kevin C. Desouza Author-X-Name-First: Kevin C. Author-X-Name-Last: Desouza Author-Name: Kim Normann Andersen Author-X-Name-First: Kim Normann Author-X-Name-Last: Andersen Title: IT-enabled innovation in the public sector: introduction to the special issue Journal: European Journal of Information Systems Pages: 323-328 Issue: 4 Volume: 29 Year: 2020 Month: 07 X-DOI: 10.1080/0960085X.2020.1814989 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1814989 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:4:p:323-328 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1740617_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Johan Magnusson Author-X-Name-First: Johan Author-X-Name-Last: Magnusson Author-Name: Dina Koutsikouri Author-X-Name-First: Dina Author-X-Name-Last: Koutsikouri Author-Name: Tero Päivärinta Author-X-Name-First: Tero Author-X-Name-Last: Päivärinta Title: Efficiency creep and shadow innovation: enacting ambidextrous IT Governance in the public sector Abstract: The current push towards increased innovation within the public sector calls for new approaches to IT Governance. However, recent findings highlight the aim to avoid trade-offs between innovation and efficiency through organisational ambidexterity. This paper reports a case study of ambidextrous IT Governance in two large government agencies. According to the findings, ambidextrous IT Governance is enacted through two separate but interrelated mechanisms that emerge simultaneously. In terms of exploitation, the “efficiency creep” mechanism creates a bias for efficiency – rather than innovation-oriented investments. In terms of exploration, the “shadow innovation” mechanism involves unsanctioned innovation activities. These two mechanisms interplay, in the enactment of ambidextrous IT Governance. The contribution of this study lies in theorising about how ambidextrous IT Governance is enacted in public sector organisations, and how efficiency creep and shadow innovation influence each other. This contribution aids future research and practice on public sector innovation and IT Governance. Journal: European Journal of Information Systems Pages: 329-349 Issue: 4 Volume: 29 Year: 2020 Month: 07 X-DOI: 10.1080/0960085X.2020.1740617 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1740617 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:4:p:329-349 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1761272_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ott Velsberg Author-X-Name-First: Ott Author-X-Name-Last: Velsberg Author-Name: Ulrika H. Westergren Author-X-Name-First: Ulrika H. Author-X-Name-Last: Westergren Author-Name: Katrin Jonsson Author-X-Name-First: Katrin Author-X-Name-Last: Jonsson Title: Exploring smartness in public sector innovation - creating smart public services with the Internet of Things Abstract: The use of the term “smartness” in the context of public service delivery indicates an ambition of the public sector to become more agile and resilient through the adoption of emerging technologies. The Internet of Things (IoT) is an emerging technology that will be key to the realisation of smart public services. The research presented in this paper explored the role of IoT in public sector innovation through a qualitative study of how IoT technology can be leveraged to create and deliver smart winter road maintenance services. We use an existing smartness framework – based on the dimensions of efficiency, effectiveness, transparency and collaboration – to examine the consequences of introducing IoT-based innovation to road maintenance services. The findings suggest that IoT enables public sector innovation and that smartness is created through the combination of technology, people and organisations. The realisation of smartness in public sector innovation requires sufficient management capabilities and robust technology strategies, along with a willingness to explore and adopt new work practices rather than simply implement emerging technologies. Journal: European Journal of Information Systems Pages: 350-368 Issue: 4 Volume: 29 Year: 2020 Month: 07 X-DOI: 10.1080/0960085X.2020.1761272 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1761272 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:4:p:350-368 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1762127_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Valerie L. Bartelt Author-X-Name-First: Valerie L. Author-X-Name-Last: Bartelt Author-Name: Andrew Urbaczewski Author-X-Name-First: Andrew Author-X-Name-Last: Urbaczewski Author-Name: Andrew G. Mueller Author-X-Name-First: Andrew G. Author-X-Name-Last: Mueller Author-Name: Suprateek Sarker Author-X-Name-First: Suprateek Author-X-Name-Last: Sarker Title: Enabling collaboration and innovation in Denver’s smart city through a living lab: a social capital perspective Abstract: Recent information technology (IT) developments have enabled cities to collect and disseminate large amounts of data to improve their public services delivery. “Smart cities” allow the public sector to leverage IT infrastructure and smart devices to increase the value of services delivered to the community. Our exploratory qualitative study involved the examination of secondary data and interviews with public administration personnel at the City and County of Denver. We used the social capital perspective and literature on knowledge transfer to interpret the empirical material and derive abstractions. We found that the Living Lab methodology adopted within the Smart City initiative facilitated a number of outcomes, including improved collaboration and innovation. Specifically, the “fail-fast” mentality was a characteristic of the Denver Living Lab that improved innovation. Journal: European Journal of Information Systems Pages: 369-387 Issue: 4 Volume: 29 Year: 2020 Month: 07 X-DOI: 10.1080/0960085X.2020.1762127 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1762127 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:4:p:369-387 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1793698_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jesse Pietz Author-X-Name-First: Jesse Author-X-Name-Last: Pietz Author-Name: Scott McCoy Author-X-Name-First: Scott Author-X-Name-Last: McCoy Author-Name: Joseph H. Wilck Author-X-Name-First: Joseph H. Author-X-Name-Last: Wilck Title: Chasing John Snow: data analytics in the COVID-19 era Abstract: During the first half of 2020, the lives of people around the world abruptly changed due to COVID-19. Data visualisations and models related to the spread of the disease became ubiquitous. In this paper, we survey 25 different data analytics dashboards, highlight the modelling approach taken by each, and develop a multi-attribute utility theory model to assess their effectiveness in communicating key features that explain the spread of infectious disease. We show that the dashboards that feature dimensions that span the categories associated with compartmental epidemiology models tend to be relatively robust data visualisations, and we highlight that information systems need to be improved to include data on actions to reduce the spread of the disease. We analyse the actions taken by countries around the world and show that when governments employ strict measures early, particularly those that enforce social distancing and include widespread testing and comprehensive contact tracing, they are more likely to experience better outcomes. Recommendations for how countries should respond in future pandemics are detailed. Journal: European Journal of Information Systems Pages: 388-404 Issue: 4 Volume: 29 Year: 2020 Month: 07 X-DOI: 10.1080/0960085X.2020.1793698 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1793698 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:4:p:388-404 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1802358_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Andrew Urbaczewski Author-X-Name-First: Andrew Author-X-Name-Last: Urbaczewski Author-Name: Young Jin Lee Author-X-Name-First: Young Jin Author-X-Name-Last: Lee Title: Information Technology and the pandemic: a preliminary multinational analysis of the impact of mobile tracking technology on the COVID-19 contagion control Abstract: This paper explores the benefits and drawbacks of government surveillance within a public health crisis, specifically the COVID-19 outbreak of 2020. We review the current state of COVID-19 infection tracking by public health authorities, and then we examine the effectiveness of voluntary and mandatory mobile contact-tracing apps by COVID-19-positive or suspected positive individuals in China, Germany, Italy, Singapore, South Korea, and the United States. Through a Difference-In-Differences test, the apps were found to be highly significantly correlated with a reduction in the spread of COVID-19 in their countries. Robustness tests were run with four alternative models and the results are kept and presented within. In light of the success of these apps, ethical implications for their use during and beyond this public health crisis are discussed, including data governance and individual privacy issues. Journal: European Journal of Information Systems Pages: 405-414 Issue: 4 Volume: 29 Year: 2020 Month: 07 X-DOI: 10.1080/0960085X.2020.1802358 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1802358 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:4:p:405-414 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1784046_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Simon Trang Author-X-Name-First: Simon Author-X-Name-Last: Trang Author-Name: Manuel Trenz Author-X-Name-First: Manuel Author-X-Name-Last: Trenz Author-Name: Welf H. Weiger Author-X-Name-First: Welf H. Author-X-Name-Last: Weiger Author-Name: Monideepa Tarafdar Author-X-Name-First: Monideepa Author-X-Name-Last: Tarafdar Author-Name: Christy M.K. Cheung Author-X-Name-First: Christy M.K. Author-X-Name-Last: Cheung Title: One app to trace them all? Examining app specifications for mass acceptance of contact-tracing apps Abstract: The current COVID-19 crisis has seen governments worldwide mobilising to develop and implement contact-tracing apps as an integral part of their lockdown exit strategies. The challenge facing policy makers is that tracing can only be effective if the majority of the population uses the one app developed; its specifications must therefore be carefully considered. We theorise on tracing apps and mass acceptance and conduct a full-factorial experiment to investigate how app installation intention is influenced by different app specifications based on three benefit appeals, two privacy designs, and two convenience designs. By applying quantile regression, we not only estimate the general effect of these app specifications but also uncover how their influence differs among citizens with different propensities for acceptance (i.e. critics, undecided, advocates) – a crucial insight for succeeding with mass acceptance. This study contributes to research in three ways: we theorise how mass acceptance differs from established app acceptance, we provide a fine-grained approach to investigating the app specifications salient for mass acceptance, and we reveal contextualised insights specific to tracing apps with multi-layered benefit structures. Our findings can guide policy makers by providing specification recommendations for facilitating mass acceptance of tracing apps during pandemics or other societal crises. Journal: European Journal of Information Systems Pages: 415-428 Issue: 4 Volume: 29 Year: 2020 Month: 07 X-DOI: 10.1080/0960085X.2020.1784046 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1784046 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:4:p:415-428 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1800417_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Lena Waizenegger Author-X-Name-First: Lena Author-X-Name-Last: Waizenegger Author-Name: Brad McKenna Author-X-Name-First: Brad Author-X-Name-Last: McKenna Author-Name: Wenjie Cai Author-X-Name-First: Wenjie Author-X-Name-Last: Cai Author-Name: Taino Bendz Author-X-Name-First: Taino Author-X-Name-Last: Bendz Title: An affordance perspective of team collaboration and enforced working from home during COVID-19 Abstract: COVID-19 has caused unprecedented challenges to our lives. Many governments have forced people to stay at home, leading to a radical shift from on-site to virtual collaboration for many knowledge workers. Existing remote working literature does not provide a thorough explanation of government-enforced working from home situations. Using an affordance lens, this study explores the sudden and enforced issues that COVID-19 has presented, and the technological means knowledge workers use to achieve their team collaboration goals. We interviewed 29 knowledge workers about their experiences of being required to work from home and introduced the term “enforced work from home”. This paper contributes to the affordance theory by providing an understanding of the substitution of affordances for team collaboration during COVID-19. The shifting of affordances results in positive and negative effects on team collaboration as various affordances of technology were perceived and actualised to sustain “business as usual”. Journal: European Journal of Information Systems Pages: 429-442 Issue: 4 Volume: 29 Year: 2020 Month: 07 X-DOI: 10.1080/0960085X.2020.1800417 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1800417 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:4:p:429-442 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_12056176_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Tamara Dinev Author-X-Name-First: Tamara Author-X-Name-Last: Dinev Title: Why would we care about privacy? Journal: European Journal of Information Systems Pages: 97-102 Issue: 2 Volume: 23 Year: 2014 Month: 3 X-DOI: 10.1057/ejis.2014.1 File-URL: http://hdl.handle.net/10.1057/ejis.2014.1 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:2:p:97-102 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_12056177_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Caroline Lancelot Miltgen Author-X-Name-First: Caroline Lancelot Author-X-Name-Last: Miltgen Author-Name: Dominique Peyrat-Guillard Author-X-Name-First: Dominique Author-X-Name-Last: Peyrat-Guillard Title: Cultural and generational influences on privacy concerns: a qualitative study in seven European countries Abstract: This research examines how European citizens decide to disclose and protect their personal data and thereby reveals cultural and generational divides. Focus group discussions featured either young people, aged 15 to 24 years, or adults, between 25 and 70 years of age, and were conducted in seven EU member states. The results of a computer-aided text analysis with two complementary software packages suggest similarities and differences in participants' views and privacy concerns (PC). Responsibility is relevant to personal data management, which represents a hotly contested issue. A geographical north-south divide appears for the importance of responsibility as opposed to trust. Moreover, people regard disclosure differently in the south (as a choice) and east (as forced) of Europe. Younger people express more positive attitudes toward data management, feel more responsible, and are more confident in their ability to prevent possible data misuse. Their lower PC and greater protective behaviours (i.e., a potential reversed privacy paradox) may help explain contradictory results in prior literature. These results offer significant and useful theoretical, managerial, and policy implications. Journal: European Journal of Information Systems Pages: 103-125 Issue: 2 Volume: 23 Year: 2014 Month: 3 X-DOI: 10.1057/ejis.2013.17 File-URL: http://hdl.handle.net/10.1057/ejis.2013.17 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:2:p:103-125 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_12056178_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Marie Caroline Oetzel Author-X-Name-First: Marie Caroline Author-X-Name-Last: Oetzel Author-Name: Sarah Spiekermann Author-X-Name-First: Sarah Author-X-Name-Last: Spiekermann Title: A systematic methodology for privacy impact assessments: a design science approach Abstract: For companies that develop and operate IT applications that process the personal data of customers and employees, a major problem is protecting these data and preventing privacy breaches. Failure to adequately address this problem can result in considerable damage to the company's reputation and finances, as well as negative effects for customers or employees (data subjects). To address this problem, we propose a methodology that systematically considers privacy issues by using a step-by-step privacy impact assessment (PIA). Existing PIA approaches cannot be applied easily because they are improperly structured or imprecise and lengthy. We argue that companies that employ our PIA can achieve ‘privacy-by-design’, which is widely heralded by data protection authorities. In fact, the German Federal Office for Information Security (BSI) ratified the approach we present in this article for the technical field of RFID and published it as a guideline in November 2011. The contribution of the artefacts we created is twofold: First, we provide a formal problem representation structure for the analysis of privacy requirements. Second, we reduce the complexity of the privacy regulation landscape for practitioners who need to make privacy management decisions for their IT applications. Journal: European Journal of Information Systems Pages: 126-150 Issue: 2 Volume: 23 Year: 2014 Month: 3 X-DOI: 10.1057/ejis.2013.18 File-URL: http://hdl.handle.net/10.1057/ejis.2013.18 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:2:p:126-150 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_12056179_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ram L. Kumar Author-X-Name-First: Ram L. Author-X-Name-Last: Kumar Author-Name: Antonis C. Stylianou Author-X-Name-First: Antonis C. Author-X-Name-Last: Stylianou Title: A process model for analyzing and managing flexibility in information systems Abstract: Competitive pressures are forcing organizations to be flexible. Being responsive to changing environmental conditions is an important factor in determining corporate performance. Earlier research, focusing primarily on IT infrastructure, has shown that organizational flexibility is closely related to IT infrastructure flexibility. Using real-world cases, this paper explores flexibility in the broader context of the IS function. An empirically derived framework for better understanding and managing IS flexibility is developed using grounded theory and content analysis. A process model for managing flexibility is presented; it includes steps for understanding contextual factors, recognizing reasons why flexibility is important, evaluating what needs to be flexible, identifying flexibility categories and stakeholders, diagnosing types of flexibility needed, understanding synergies and tradeoffs between them, and prescribing strategies for proactively managing IS flexibility. Three major flexibility categories, flexibility in IS operations, flexibility in IS systems & services development and deployment, and flexibility in IS management, containing 10 IS flexibility types are identified and described. Journal: European Journal of Information Systems Pages: 151-184 Issue: 2 Volume: 23 Year: 2014 Month: 3 X-DOI: 10.1057/ejis.2012.53 File-URL: http://hdl.handle.net/10.1057/ejis.2012.53 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:2:p:151-184 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_12056180_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Michelle Carter Author-X-Name-First: Michelle Author-X-Name-Last: Carter Author-Name: Ryan Wright Author-X-Name-First: Ryan Author-X-Name-Last: Wright Author-Name: Jason Bennett Thatcher Author-X-Name-First: Jason Bennett Author-X-Name-Last: Thatcher Author-Name: Richard Klein Author-X-Name-First: Richard Author-X-Name-Last: Klein Title: Understanding online customers' ties to merchants: the moderating influence of trust on the relationship between switching costs and e-loyalty Abstract: Fostering customer loyalty is a key objective for online businesses. Initial transactions with new customers are less profitable than transactions with existing customers, making loyalty an important strategy. Drawing on research examining online customer loyalty (termed e-loyalty), switching costs, and trust, this study provides an empirical test of the relative influence of trust vs switching costs on e-loyalty for e-service providers. We further examine whether trust moderates the relationship between switching costs and e-loyalty. We propose that in the presence of high customer trust, e-service providers should have less need to rely on switching costs as a driver of e-loyalty. We test the hypothesized relationships using data collected from 299 repeat users of online travel services. Our results confirm that trust is a more important predictor of e-loyalty than switching costs. In addition, we find that the impact of switching costs on e-loyalty depends on the level of trust felt by customers. This study extends our understanding of customer loyalty, switching costs, and trust in e-commerce environments and provides practical, theory-driven guidelines to e-businesses seeking to develop customer loyalty programmes. Journal: European Journal of Information Systems Pages: 185-204 Issue: 2 Volume: 23 Year: 2014 Month: 3 X-DOI: 10.1057/ejis.2012.55 File-URL: http://hdl.handle.net/10.1057/ejis.2012.55 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:2:p:185-204 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_12056181_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ojelanki Ngwenyama Author-X-Name-First: Ojelanki Author-X-Name-Last: Ngwenyama Author-Name: Peter Axel Nielsen Author-X-Name-First: Peter Axel Author-X-Name-Last: Nielsen Title: Using organizational influence processes to overcome IS implementation barriers: lessons from a longitudinal case study of SPI implementation Abstract: A fundamental tenet of the information systems (IS) discipline holds that: (a) a lack of formal power and influence over the organization targeted for change, (b) weak support from top management, and (c) organizational memories of prior failures are barriers to implementation success. Our research, informed by organization influence, compellingly illustrates that such conditions do not necessarily doom a project to failure. In this paper, we present an analysis of how an IS implementation team designed and enacted a coordinated strategy of organizational influence to achieve implementation success despite these barriers. Our empirical analysis also found that technology implementation and change is largely an organizational influence process (OIP), and thus technical-rational approaches alone are inadequate for achieving success. Our findings offer managers important insights into how they can design and enact OIPs to effectively manage IS implementation. Further, we show how the theory of organizational influence can enhance understanding of IS implementation dynamics and advance the development of a theory of effective IS change agentry. Journal: European Journal of Information Systems Pages: 205-222 Issue: 2 Volume: 23 Year: 2014 Month: 3 X-DOI: 10.1057/ejis.2012.56 File-URL: http://hdl.handle.net/10.1057/ejis.2012.56 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:2:p:205-222 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_12056182_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ofir Turel Author-X-Name-First: Ofir Author-X-Name-Last: Turel Author-Name: Chris Bart Author-X-Name-First: Chris Author-X-Name-Last: Bart Title: Board-level IT governance and organizational performance Abstract: Research on the strategic management of Information Technology (IT) resources has mostly focused on the oversight provided by the management team as a means to increase organizational performance. In recent years, boards of directors have also increased their involvement in IT matters, and various theoretical lenses suggest that this oversight too has the potential to influence organizational performance. Hence, this study synthesizes the resource-based and contingency views of MIS with corporate governance theories, and examines key antecedents and consequences of board-level IT governance (ITG) using a multi-method approach. Structural Equation Modelling analysis applied to organization-level data collected from 171 board members suggested that the level of ITG exercised by boards was contingent upon the organization's ‘IT use mode’, along the two dimensions of need for (a) fast and reliable IT, and (b) new innovative IT. But, the findings further suggested that the contingency approach may be suboptimal because it can cause new ways of leveraging IT to be ignored. High levels of board-level ITG, regardless of existing IT needs, increased organizational performance. This phenomenon was illuminated with applicability checks. Moreover, content analysis and structured interviews with board members further enriched these insights. Journal: European Journal of Information Systems Pages: 223-239 Issue: 2 Volume: 23 Year: 2014 Month: 3 X-DOI: 10.1057/ejis.2012.61 File-URL: http://hdl.handle.net/10.1057/ejis.2012.61 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:2:p:223-239 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934410_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Rachida Parks Author-X-Name-First: Rachida Author-X-Name-Last: Parks Author-Name: Heng Xu Author-X-Name-First: Heng Author-X-Name-Last: Xu Author-Name: Chao-Hsien Chu Author-X-Name-First: Chao-Hsien Author-X-Name-Last: Chu Author-Name: Paul Benjamin Lowry Author-X-Name-First: Paul Benjamin Author-X-Name-Last: Lowry Title: Examining the intended and unintended consequences of organisational privacy safeguards Abstract: Research shows that despite organisational efforts to achieve privacy compliance, privacy breaches continue to rise. The extant studies on organisational privacy compliance concentrate on the extent to which privacy threats can be alleviated through a combination of technical and human controls and the positive (and often intended) influences of these controls. This focus inadvertently neglects unintended consequences such as impeded workflow in medical practices. To address this research conflict, this study uses an interpretive grounded theory research approach to investigate the consequences of privacy safeguard enactment in medical practices, including whether it influences their ability to meet privacy requirements and whether workflows are impeded. Our central contribution is a theoretical framework, the unintended consequences of privacy safeguard enactment (UCPSE) framework, which explicates the process by which privacy safeguards are evaluated and subsequently bypassed and the resulting influence on organisational compliance. The UCPSE highlights the importance of the imbalance challenge, which is the result of unintended consequences outweighing the intended consequences of privacy safeguard enactment. Failure to address the imbalance challenge leads to the adoption of workarounds that may ultimately harm the organisation’s privacy compliance. Despite several research calls, the consequences and effectiveness of organisational privacy efforts are largely missing from both information systems and health informatics research. This study is one of the first attempts to both systematically identify the impacts of privacy safeguard enactment and to examine its implications for privacy compliance in the healthcare domain. The findings also have practical implications for healthcare executives on the UCPSE and how they could alleviate the imbalance challenge to thwart workarounds and the subsequent negative effects on privacy compliance. Journal: European Journal of Information Systems Pages: 37-65 Issue: 1 Volume: 26 Year: 2017 Month: 1 X-DOI: 10.1057/s41303-016-0001-6 File-URL: http://hdl.handle.net/10.1057/s41303-016-0001-6 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:1:p:37-65 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934411_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Magno Queiroz Author-X-Name-First: Magno Author-X-Name-Last: Queiroz Title: Mixed results in strategic IT alignment research: a synthesis and empirical study Abstract: The alignment of business strategy and IT has been a top managerial concern for decades. Yet despite much investigation, the effect of strategic IT alignment on organizational performance remains unclear, with mixed results reported in the literature. The purpose of this paper is to advance our understanding of mixed findings in IT alignment research. We first examine inconsistent findings reported in two streams of alignment research: the traditional firm-level IT alignment literature and the emerging literature into process-level IT alignment. We then empirically investigate whether firm- and process-level conceptualizations of IT alignment lead to different conclusions about the effect of alignment on performance. Using data from a survey of 120 firms, we show that firm-level IT alignment and process-level IT alignment yield different conclusions when testing the same theory under the same conditions. We also show that differences in firms’ strategic orientations can help explain these results. This research provides evidence that firm- and process-level conceptualizations of IT alignment are not interchangeable and that the choice of conceptualization can mean the difference between accepting and rejecting a theory. Journal: European Journal of Information Systems Pages: 21-36 Issue: 1 Volume: 26 Year: 2017 Month: 1 X-DOI: 10.1057/s41303-016-0024-z File-URL: http://hdl.handle.net/10.1057/s41303-016-0024-z File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:1:p:21-36 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934412_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Elina Niemimaa Author-X-Name-First: Elina Author-X-Name-Last: Niemimaa Author-Name: Marko Niemimaa Author-X-Name-First: Marko Author-X-Name-Last: Niemimaa Title: Information systems security policy implementation in practice: from best practices to situated practices Abstract: Organizations face institutional pressure to adopt information systems security (ISS) best practices to manage risks to their information assets. The literature shows that best practices should be contextualized, that is, translated from universal and general prescriptions into organizational documents and practices. Yet, little is known about how organizations actually make the translation from the best practices into situated practices. In this ethnographic study, we draw on practice theory and related concepts of canonical and non-canonical practices to analyze the process of translation. We explore how an IT service provider translated the ISS best practice of information classification into an ISS policy and into situated practices. We identify three translation mechanisms: (1) translating global to local, (2) disrupting and reconstructing local non-canonical practices, and (3) reconstructing and enacting local canonical practices. We find that while the translation was inhibited by incongruent practices, insufficient understanding of employees’ work, and the ISS managers’ lack of engagement in organizational practices, allowing situated practices to shape the ISS policy and actively engaging employees in the reconstruction of situated practices contributed positively to the translation. Contributions and implications for research and practice are discussed and conclusions are drawn. Journal: European Journal of Information Systems Pages: 1-20 Issue: 1 Volume: 26 Year: 2017 Month: 1 X-DOI: 10.1057/s41303-016-0025-y File-URL: http://hdl.handle.net/10.1057/s41303-016-0025-y File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:1:p:1-20 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934413_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Peter Axel Nielsen Author-X-Name-First: Peter Axel Author-X-Name-Last: Nielsen Author-Name: John Stouby Persson Author-X-Name-First: John Stouby Author-X-Name-Last: Persson Title: Useful business cases: value creation in IS projects Abstract: Business cases have become popular as part of managing value creation in IS projects. Nevertheless, business cases are often poorly linked to value creation activities and organizations struggle to develop business cases that are useful and express more than simple cost savings. This action research study seeks to improve the usefulness of business cases in IS projects. We used collaborative action research with Danish municipalities to improve their practices when developing and using business cases and to change their perceptions of what constitutes a good business case that is useful during implementation and value creation. This article presents lessons learned from our action research, lessons that we incorporated into a business case method and subsequently evaluated with IS managers. There are three lessons on (1) improving the content of business cases, (2) how to develop business cases, and (3) the use of business cases in subsequent value creation. These lessons summarize our findings and the contributions are that we in the business case method propose to (1) include minimal contents, (2) develop social commitment, and (3) structure for dynamic use during value creation. We discuss the lessons and contributions related to research on IS business cases and value creation. Journal: European Journal of Information Systems Pages: 66-83 Issue: 1 Volume: 26 Year: 2017 Month: 1 X-DOI: 10.1057/s41303-016-0026-x File-URL: http://hdl.handle.net/10.1057/s41303-016-0026-x File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:1:p:66-83 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934414_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Christoph Rosenkranz Author-X-Name-First: Christoph Author-X-Name-Last: Rosenkranz Author-Name: Roland Holten Author-X-Name-First: Roland Author-X-Name-Last: Holten Author-Name: Marc Räkers Author-X-Name-First: Marc Author-X-Name-Last: Räkers Author-Name: Wolf Behrmann Author-X-Name-First: Wolf Author-X-Name-Last: Behrmann Title: Supporting the design of data integration requirements during the development of data warehouses: a communication theory-based approach Abstract: Data warehouses (DW) form the backbone of data integration that is necessary for analytical applications, and play important roles in the information technology landscape of many industries. We introduce an approach for addressing the fundamental problem of semantic heterogeneity in the design of data integration requirements during DW development. In contrast to ontology-driven or schema-matching approaches, which propose the automatic resolution of differences ex-post, our approach addresses the core problem of data integration requirements: understanding and resolving different contextual meanings of data fields. We ground the approach firmly in communication theory and build on practices from agile software development. Besides providing relevant insights for the design of data integration requirements, our findings point to communication theory as a sound underlying foundation for a design theory of information systems development. Journal: European Journal of Information Systems Pages: 84-115 Issue: 1 Volume: 26 Year: 2017 Month: 1 X-DOI: 10.1057/ejis.2015.22 File-URL: http://hdl.handle.net/10.1057/ejis.2015.22 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:1:p:84-115 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934415_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: The Editors Title: Thanks to Reviewers Journal: European Journal of Information Systems Pages: 116-120 Issue: 1 Volume: 26 Year: 2017 Month: 1 X-DOI: 10.1057/s41303-017-0037-2 File-URL: http://hdl.handle.net/10.1057/s41303-017-0037-2 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:1:p:116-120 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934251_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Susan Gasson Author-X-Name-First: Susan Author-X-Name-Last: Gasson Author-Name: Jim Waters Author-X-Name-First: Jim Author-X-Name-Last: Waters Title: Using a grounded theory approach to study online collaboration behaviors Abstract: This paper discusses how an interpretive theory of action was explored and developed through iterative cycles of grounded theory generation. We establish our motivation for employing the grounded theory method in an area that is overflowing with theories of learning, then move on to the practicalities of generating an interpretive grounded theory by following the ‘vapor trails’ left by online learners. We describe how we incorporated the use of mixed methods into an interpretive grounded theory process, with a theoretical sampling strategy that used ‘complementary comparison’ to feed back into a new cycle of constant comparison. We discuss how constant comparison may be enhanced by researcher debate around emerging themes and categories, co-coding of data samples, coding of researcher theoretical memos, and reflection-in-action during explicit explanations of coding schemes to research assistants and the review of research process memos. Finally, we discuss how and why the substantive theory of action that was generated by this process provides an original contribution to theories of collaborative online learning by accounting for both visible and invisible learning strategies that explain the role of thought-leaders in a community of inquiry and account for vicarious learning. Journal: European Journal of Information Systems Pages: 95-118 Issue: 1 Volume: 22 Year: 2013 Month: 1 X-DOI: 10.1057/ejis.2011.24 File-URL: http://hdl.handle.net/10.1057/ejis.2011.24 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:1:p:95-118 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934252_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Chon Abraham Author-X-Name-First: Chon Author-X-Name-Last: Abraham Author-Name: Marie-Claude Boudreau Author-X-Name-First: Marie-Claude Author-X-Name-Last: Boudreau Author-Name: Iris Junglas Author-X-Name-First: Iris Author-X-Name-Last: Junglas Author-Name: Richard Watson Author-X-Name-First: Richard Author-X-Name-Last: Watson Title: Enriching our theoretical repertoire: the role of evolutionary psychology in technology acceptance Abstract: Information systems (IS) research has drawn heavily on social and cognitive psychology to explain technology adoption. Indeed, the many variations of the technology acceptance model all share these same theoretical foundations. Focusing exclusively on the socio-cognitive lens can lead to overlooking enhanced explanations of technology acceptance, such that new theoretical perspectives may be warranted. In this qualitative grounded theory study, we discovered how the lens of evolutionary psychology, as embodied in the Four-Drive model, was helpful in understanding technology acceptance across three organizational sites. We contend that evolutionary psychology is an important addition to the theoretical repertoire of IS researchers, and propose including ‘evolved psychological mechanisms’ within traditional models of technology acceptance. Journal: European Journal of Information Systems Pages: 56-75 Issue: 1 Volume: 22 Year: 2013 Month: 1 X-DOI: 10.1057/ejis.2011.25 File-URL: http://hdl.handle.net/10.1057/ejis.2011.25 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:1:p:56-75 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934253_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Emmanuelle Vaast Author-X-Name-First: Emmanuelle Author-X-Name-Last: Vaast Author-Name: Geoff Walsham Author-X-Name-First: Geoff Author-X-Name-Last: Walsham Title: Grounded theorizing for electronically mediated social contexts Abstract: Electronically mediated social contexts (EMSCs), in which interactions and activities are largely or completely computer-mediated, have become important settings for investigation by Information Systems (IS) scholars. Owing to the relative novelty and originality of EMSCs, IS researchers often lack existing theories to make sense of the processes that emerge in them. Therefore, many IS researchers have relied upon grounded theory in order to develop new theory based on empirical observations from EMSCs. This article reviews a selected set of papers concerned with grounded IS research on EMSCs. It examines how the authors of these papers handled the characteristics of EMSCs and, in particular, addresses the topics of data collection, data analysis, and theory building. The paper also draws implications and recommendations for grounded researchers interested in investigating these original and fascinating environments in their future work. For example, it calls for grounded researchers on EMSCs to reflect upon the characteristics of their domains of inquiry, to respect the logic of discovery of grounded methods, and to articulate more clearly their theoretical ambitions along the induction/abduction continuum. The paper closes by suggesting promising areas for future grounded research on EMSCs, including taking advantage of the potential for combining qualitative and quantitative analytical methods. Journal: European Journal of Information Systems Pages: 9-25 Issue: 1 Volume: 22 Year: 2013 Month: 1 X-DOI: 10.1057/ejis.2011.26 File-URL: http://hdl.handle.net/10.1057/ejis.2011.26 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:1:p:9-25 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934254_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Elisa Mattarelli Author-X-Name-First: Elisa Author-X-Name-Last: Mattarelli Author-Name: Fabiola Bertolotti Author-X-Name-First: Fabiola Author-X-Name-Last: Bertolotti Author-Name: Diego Maria Macrì Author-X-Name-First: Diego Maria Author-X-Name-Last: Macrì Title: The use of ethnography and grounded theory in the development of a management information system Abstract: This work presents new evidence on how ethnography and the grounded theory approach can be integrated within a participatory information system development process. We conducted an ethnography in a hospital unit, collecting data from observations, interviews, and documents. The discussion about emergent themes with the actors in their natural context and the development of a grounded model allowed us to identify widespread discomfort felt by personnel and to code it as process conflict, that is a particular type of conflict caused by inefficiencies in the organization of work activities. The grounded model was the starting point for conducting a series of focus groups during which the organizational actors were allowed to face process conflict while defining the requirements of a new management information system. We conclude with a discussion of the implications of our study for IS researchers and practitioners. Journal: European Journal of Information Systems Pages: 26-44 Issue: 1 Volume: 22 Year: 2013 Month: 1 X-DOI: 10.1057/ejis.2011.34 File-URL: http://hdl.handle.net/10.1057/ejis.2011.34 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:1:p:26-44 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934255_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Rangarirai Matavire Author-X-Name-First: Rangarirai Author-X-Name-Last: Matavire Author-Name: Irwin Brown Author-X-Name-First: Irwin Author-X-Name-Last: Brown Title: Profiling grounded theory approaches in information systems research Abstract: Studies claiming to use the Grounded theory methodology (GTM) have been quite prevalent in information systems (IS) literature. A cursory review of this literature reveals conflict in the understanding of GTM, with a variety of grounded theory approaches apparent. The purpose of this investigation was to establish what alternative grounded theory approaches have been employed in IS, and to what extent each has been used. In order to accomplish this goal, a comprehensive set of IS articles that claimed to have followed a grounded theory approach were reviewed. The articles chosen were those published in the widely acknowledged top eight IS-centric journals, since these journals most closely represent exemplar IS research. Articles for the period 1985-2008 were examined. The analysis revealed four main grounded theory approaches in use, namely (1) the classic grounded theory approach, (2) the evolved grounded theory approach, (3) the use of the grounded theory approach as part of a mixed methodology, and (4) the application of grounded theory techniques, typically for data analysis purposes. The latter has been the most common approach in IS research. The classic approach was the least often employed, with many studies opting for an evolved or mixed method approach. These and other findings are discussed and implications drawn. Journal: European Journal of Information Systems Pages: 119-129 Issue: 1 Volume: 22 Year: 2013 Month: 1 X-DOI: 10.1057/ejis.2011.35 File-URL: http://hdl.handle.net/10.1057/ejis.2011.35 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:1:p:119-129 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934256_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Joost F Wolfswinkel Author-X-Name-First: Joost F Author-X-Name-Last: Wolfswinkel Author-Name: Elfi Furtmueller Author-X-Name-First: Elfi Author-X-Name-Last: Furtmueller Author-Name: Celeste P M Wilderom Author-X-Name-First: Celeste P M Author-X-Name-Last: Wilderom Title: Using grounded theory as a method for rigorously reviewing literature Abstract: This paper offers guidance to conducting a rigorous literature review. We present this in the form of a five-stage process in which we use Grounded Theory as a method. We first probe the guidelines explicated by Webster and Watson, and then we show the added value of Grounded Theory for rigorously analyzing a carefully chosen set of studies; it assures solidly legitimized, in-depth analyses of empirical facts and related insights. This includes, the emergence of new themes, issues and opportunities; interrelationships and dependencies in or beyond a particular area; as well as inconsistencies. If carried out meticulously, reviewing a well-carved out piece of literature by following this guide is likely to lead to more integrated and fruitful theory emergence, something that would enrich many fields in the social sciences. Journal: European Journal of Information Systems Pages: 45-55 Issue: 1 Volume: 22 Year: 2013 Month: 1 X-DOI: 10.1057/ejis.2011.51 File-URL: http://hdl.handle.net/10.1057/ejis.2011.51 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:1:p:45-55 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934257_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Riitta Hekkala Author-X-Name-First: Riitta Author-X-Name-Last: Hekkala Author-Name: Cathy Urquhart Author-X-Name-First: Cathy Author-X-Name-Last: Urquhart Title: Everyday power struggles: living in an IOIS project Abstract: The broad aim of this interpretive study was to investigate the lived experiences of inter-organisational information system (IOIS) project members who worked in a 3-year-long IOIS project. The study presents an original longitudinal study of project member experiences. In this paper, we have described and analysed one core category, project power, which was derived from a grounded theory (GT) study. This study extends existing theories about power in organisational contexts, in particular the everyday use of power in projects. The paper shows how GT can be used to gain significant insights into a case study, and also generate new concepts. This paper gives detailed insights into the power issues as they played out in a complex IOIS project. This IOIS project spanned four user organisations, two suppliers, one national organisation, a research organisation and a government Ministry. One key finding is that, given the complexity of the project management structures in an IOIS project such as this, project members often resorted to formal authority as a means of getting things done, in the absence of informal links between organisations. The project history also had major ramifications on the use of power in this project. Journal: European Journal of Information Systems Pages: 76-94 Issue: 1 Volume: 22 Year: 2013 Month: 1 X-DOI: 10.1057/ejis.2012.43 File-URL: http://hdl.handle.net/10.1057/ejis.2012.43 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:1:p:76-94 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934258_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: David F Birks Author-X-Name-First: David F Author-X-Name-Last: Birks Author-Name: Walter Fernandez Author-X-Name-First: Walter Author-X-Name-Last: Fernandez Author-Name: Natalia Levina Author-X-Name-First: Natalia Author-X-Name-Last: Levina Author-Name: Syed Nasirin Author-X-Name-First: Syed Author-X-Name-Last: Nasirin Title: Grounded theory method in information systems research: its nature, diversity and opportunities Journal: European Journal of Information Systems Pages: 1-8 Issue: 1 Volume: 22 Year: 2013 Month: 1 X-DOI: 10.1057/ejis.2012.48 File-URL: http://hdl.handle.net/10.1057/ejis.2012.48 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:1:p:1-8 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1458065_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Pär J. Ågerfalk Author-X-Name-First: Pär J. Author-X-Name-Last: Ågerfalk Title: Whither design science research? Journal: European Journal of Information Systems Pages: 127-128 Issue: 2 Volume: 27 Year: 2018 Month: 03 X-DOI: 10.1080/0960085X.2018.1458065 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1458065 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:2:p:127-128 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1458066_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ken Peffers Author-X-Name-First: Ken Author-X-Name-Last: Peffers Author-Name: Tuure Tuunanen Author-X-Name-First: Tuure Author-X-Name-Last: Tuunanen Author-Name: Björn Niehaves Author-X-Name-First: Björn Author-X-Name-Last: Niehaves Title: Design science research genres: introduction to the special issue on exemplars and criteria for applicable design science research Abstract: We propose the definition of genres in IS design science research (DSR). In recent years DSR has become a well-accepted research paradigm within IS; however, now the diversity of purpose, methodology, and mental models has increased to a point where reviewers and editors are unsure about which standards to apply to particular research submissions. For some researchers an artefact of value is a system or system component, while for others artefacts ought to be theories or theory components. Such differences are hard to reconcile and researchers often face criticism from diverse corners of the paradigm, where beliefs and standards are very different. We observed this diversity of views among authors, editors, and reviewers while editing this special issue. The problem continues to the current day. A solution may lie in defining genres of IS DSR, each with its model for DSR processes and outcomes. We define five prototype genres, based on selected articles, along with their typical characteristics, standards, and values. Several articles in this special issue typify various potential genres. The recognition of mutually respectful DSR genres may improve researchers' ability to publish in the highest tier IS journals, as colleagues, reviewers, and editors recognize and respect genre differences. Journal: European Journal of Information Systems Pages: 129-139 Issue: 2 Volume: 27 Year: 2018 Month: 03 X-DOI: 10.1080/0960085X.2018.1458066 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1458066 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:2:p:129-139 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1395545_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Richard L. Baskerville Author-X-Name-First: Richard L. Author-X-Name-Last: Baskerville Author-Name: Mala Kaul Author-X-Name-First: Mala Author-X-Name-Last: Kaul Author-Name: Veda C. Storey Author-X-Name-First: Veda C. Author-X-Name-Last: Storey Author-Name: Ken Peffers Author-X-Name-First: Ken Author-X-Name-Last: Peffers Author-Name: Tuure Tuunanen Author-X-Name-First: Tuure Author-X-Name-Last: Tuunanen Author-Name: Björn Niehaves Author-X-Name-First: Björn Author-X-Name-Last: Niehaves Title: Aesthetics in design science research Abstract: Much research has focused on understanding design science research and providing guidelines for its successful execution. However, there is still a need for more work on the raison d’être of design science research, which is the development of artefacts that can be applied to solve real-world problems. The value of design science research thus far has been to provide practically applicable solutions, as well as a contribution to knowledge. This paper proposes aesthetics, in addition to truth and utility, as a way to advance this raison d’être. We identify the design science triad of analytics, synthetics, and aesthetics and justify why the aesthetics quality attribute should be appreciated. We then identify twelve quality criteria for articulating and assessing aesthetics in design science research. Doing so enables us to both recognise and achieve artful design so that rigour, utility, and aesthetic value can collectively justify a valuable design science research contribution. Journal: European Journal of Information Systems Pages: 140-153 Issue: 2 Volume: 27 Year: 2018 Month: 03 X-DOI: 10.1080/0960085X.2017.1395545 File-URL: http://hdl.handle.net/10.1080/0960085X.2017.1395545 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:2:p:140-153 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1445462_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Gerard De Leoz Author-X-Name-First: Gerard Author-X-Name-Last: De Leoz Author-Name: Stacie Petter Author-X-Name-First: Stacie Author-X-Name-Last: Petter Author-Name: Ken Peffers Author-X-Name-First: Ken Author-X-Name-Last: Peffers Author-Name: Tuure Tuunanen Author-X-Name-First: Tuure Author-X-Name-Last: Tuunanen Author-Name: Bjoern Niehaves Author-X-Name-First: Bjoern Author-X-Name-Last: Niehaves Title: Considering the social impacts of artefacts in information systems design science research Abstract: Design science research (DSR) is a distinct research paradigm in the information systems (IS) field that encourages the creation and evaluation of artefacts as a means for research. Yet, design science researchers often create and evaluate artefacts that tend to be techno-centric. By also considering the social impacts of a design science artefact throughout the creation and evaluation process, the researcher develops an artefact with a greater potential to thrive when the artefact is instantiated and implemented. Furthermore, the purposeful consideration of social impacts in the design science creation and evaluation process supports the researcher in developing a more complete contribution to the IS field, a field whose core foundation relates to information, technology, and social interactions. In this paper, we discuss the importance of identifying social impacts of artefacts as well as an expanded notion of artefacts in DSR. We provide guidelines for design science researchers on how to incorporate the social impacts of artefacts throughout the DSR process. Using vignettes, we demonstrate how researchers have incorporated social impacts and demonstrate the value of considering social impacts as design science researchers seek to create and evaluate artefacts to address a research problem. Journal: European Journal of Information Systems Pages: 154-170 Issue: 2 Volume: 27 Year: 2018 Month: 03 X-DOI: 10.1080/0960085X.2018.1445462 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1445462 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:2:p:154-170 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1404749_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Benjamin Klör Author-X-Name-First: Benjamin Author-X-Name-Last: Klör Author-Name: Markus Monhof Author-X-Name-First: Markus Author-X-Name-Last: Monhof Author-Name: Daniel Beverungen Author-X-Name-First: Daniel Author-X-Name-Last: Beverungen Author-Name: Sebastian Bräuer Author-X-Name-First: Sebastian Author-X-Name-Last: Bräuer Author-Name: Bjoern Niehaves Author-X-Name-First: Bjoern Author-X-Name-Last: Niehaves Author-Name: Tuure Tuunanen Author-X-Name-First: Tuure Author-X-Name-Last: Tuunanen Author-Name: Ken Peffers Author-X-Name-First: Ken Author-X-Name-Last: Peffers Title: Design and evaluation of a model-driven decision support system for repurposing electric vehicle batteries Abstract: The diffusion of electric vehicles suffers from immature and expensive battery technologies. Repurposing electric vehicle batteries for second-life application scenarios may lower the vehicles’ total costs of ownership and increases their ecologic sustainability. However, identifying the best – or even a feasible – scenario for which to repurpose a battery is a complex and unresolved decision problem. In this exaptation research, we set out to design, implement, and evaluate the first decision support system that aids decision-makers in the automobile industry with repurposing electric vehicle batteries. The exaptation is done by classifying decisions on repurposing products as bipartite matching problems and designing two binary integer linear programs that identify (a) all technical feasible assignments and (b) optimal assignments of products and scenarios. Based on an empirical study and expert interviews, we parameterize both binary integer linear programs for repurposing electric vehicle batteries. In a field experiment, we show that our decision support system considerably increases the decision quality in terms of hit rate, miss rate, precision, fallout, and accuracy. While practitioners can use the implemented decision support system when repurposing electric vehicle batteries, other researchers can build on our results to design decision support systems for repurposing further products. Journal: European Journal of Information Systems Pages: 171-188 Issue: 2 Volume: 27 Year: 2018 Month: 03 X-DOI: 10.1057/s41303-017-0044-3 File-URL: http://hdl.handle.net/10.1057/s41303-017-0044-3 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:2:p:171-188 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1404750_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Tamara Babaian Author-X-Name-First: Tamara Author-X-Name-Last: Babaian Author-Name: Jennifer Xu Author-X-Name-First: Jennifer Author-X-Name-Last: Xu Author-Name: Wendy Lucas Author-X-Name-First: Wendy Author-X-Name-Last: Lucas Author-Name: Ken Peffers Author-X-Name-First: Ken Author-X-Name-Last: Peffers Author-Name: Tuure Tuunanen Author-X-Name-First: Tuure Author-X-Name-Last: Tuunanen Author-Name: Björn Niehaves Author-X-Name-First: Björn Author-X-Name-Last: Niehaves Title: ERP prototype with built-in task and process support Abstract: Several recent studies of ERP system interfaces have confirmed that their poor usability hinders worker productivity, despite the huge investments companies make in user training and support. Usability challenges arise from the complexity of ERP systems, which are designed as a universal tool for a plethora of organizational practices and contexts. Learning to operate within an excessively vast terrain of ERP task pages and parameters is a significant challenge for most ERP users. Our proposed solution relies on the system itself to share task and process information in order to guide users through learning and performing their business tasks with the system. This perspective arises from employing the human–computer collaboration approach to the design of user interfaces, which we apply as a guiding framework for our research. In this paper, we present two interface components for providing ERP system users with task and process guidance: Automated Playback and Interactive Process Visualization. The novelty of our approach comes from using the history of past interactions to dynamically compose animated demonstrations of task interfaces and to provide an interactive graphical map of the current process being worked on by the user. Journal: European Journal of Information Systems Pages: 189-206 Issue: 2 Volume: 27 Year: 2018 Month: 03 X-DOI: 10.1057/s41303-017-0060-3 File-URL: http://hdl.handle.net/10.1057/s41303-017-0060-3 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:2:p:189-206 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1404764_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Tobias Brandt Author-X-Name-First: Tobias Author-X-Name-Last: Brandt Author-Name: Stefan Feuerriegel Author-X-Name-First: Stefan Author-X-Name-Last: Feuerriegel Author-Name: Dirk Neumann Author-X-Name-First: Dirk Author-X-Name-Last: Neumann Author-Name: Ken Peffers Author-X-Name-First: Ken Author-X-Name-Last: Peffers Author-Name: Tuure Tuunanen Author-X-Name-First: Tuure Author-X-Name-Last: Tuunanen Author-Name: Björn Niehaves Author-X-Name-First: Björn Author-X-Name-Last: Niehaves Author-Name: Anders Hjalmarsson Author-X-Name-First: Anders Author-X-Name-Last: Hjalmarsson Title: Modeling interferences in information systems design for cyberphysical systems: Insights from a smart grid application Abstract: In this paper, we analyze possible interferences that occur when developing information systems for cyberphysical systems – hybrids containing legacy technical components and added IT modules. In particular, the enhancement of electricity systems through IT components, resulting in smart grid and smart home solutions, is experiencing increasing adoption rates in advanced and developing countries alike. Due to the substantial interdependence with and reliance on often decades-old legacy infrastructure, these cyberphysical systems present particular opportunities and challenges for the associated information systems. We propose that one channel through which information systems improve cyberphysical systems is by enhancing the components of the legacy system with new features. Introducing the Design–Interference Model, we conceptualize IS design for cyberphysical systems and outline possible obstacles and interferences associated with it. Using a simulation experiment for a smart grid application as a showcase, we derive insights into how to address these challenges. We condense these results into actionable advice that, first, seeks to validate existing guidelines for design-oriented research, second, extends and focuses them on cyberphysical system applications and, third, provides guidance to researchers and practitioners in this increasingly relevant area of information system development. Journal: European Journal of Information Systems Pages: 207-220 Issue: 2 Volume: 27 Year: 2018 Month: 03 X-DOI: 10.1057/s41303-016-0030-1 File-URL: http://hdl.handle.net/10.1057/s41303-016-0030-1 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:2:p:207-220 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1404767_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Stefan Seidel Author-X-Name-First: Stefan Author-X-Name-Last: Seidel Author-Name: Leona Chandra Kruse Author-X-Name-First: Leona Author-X-Name-Last: Chandra Kruse Author-Name: Nadine Székely Author-X-Name-First: Nadine Author-X-Name-Last: Székely Author-Name: Michael Gau Author-X-Name-First: Michael Author-X-Name-Last: Gau Author-Name: Daniel Stieger Author-X-Name-First: Daniel Author-X-Name-Last: Stieger Author-Name: Ken Peffers Author-X-Name-First: Ken Author-X-Name-Last: Peffers Author-Name: Tuure Tuunanen Author-X-Name-First: Tuure Author-X-Name-Last: Tuunanen Author-Name: Björn Niehaves Author-X-Name-First: Björn Author-X-Name-Last: Niehaves Author-Name: Kalle Lyytinen Author-X-Name-First: Kalle Author-X-Name-Last: Lyytinen Title: Design principles for sensemaking support systems in environmental sustainability transformations Abstract: This paper reports on the results of a design science research (DSR) study that develops design principles for information systems (IS) that support organisational sensemaking in environmental sustainability transformations. We identify initial design principles based on salient affordances required in organisational sensemaking and revise them through three rounds of developing, demonstrating and evaluating a prototypical implementation. Through our analysis, we learn how IS can support essential sensemaking practices in environmental sustainability transformations, including experiencing disruptive ambiguity through the provision of environmental data, noticing and bracketing, engaging in an open and inclusive communication and presuming potential alternative environmentally responsible actions. We make two key contributions: First, we provide a set of theory-inspired design principles for IS that support sensemaking in sustainability transformations, and revise them empirically using a DSR method. Second, we show how the concept of affordances can be used in DSR to investigate how IS can support organisational practices. While our findings are based on the investigation of the substantive context of environmental sustainability transformation, we suggest that they might be applicable in a broader set of contexts of organisational sensemaking and thus for a broader class of sensemaking support systems. Journal: European Journal of Information Systems Pages: 221-247 Issue: 2 Volume: 27 Year: 2018 Month: 03 X-DOI: 10.1057/s41303-017-0039-0 File-URL: http://hdl.handle.net/10.1057/s41303-017-0039-0 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:2:p:221-247 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1445461_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Tanguy Coenen Author-X-Name-First: Tanguy Author-X-Name-Last: Coenen Author-Name: Liesje Coertjens Author-X-Name-First: Liesje Author-X-Name-Last: Coertjens Author-Name: Peter Vlerick Author-X-Name-First: Peter Author-X-Name-Last: Vlerick Author-Name: Marije Lesterhuis Author-X-Name-First: Marije Author-X-Name-Last: Lesterhuis Author-Name: Anneleen Viona Mortier Author-X-Name-First: Anneleen Viona Author-X-Name-Last: Mortier Author-Name: Vincent Donche Author-X-Name-First: Vincent Author-X-Name-Last: Donche Author-Name: Pieter Ballon Author-X-Name-First: Pieter Author-X-Name-Last: Ballon Author-Name: Sven De Maeyer Author-X-Name-First: Sven Author-X-Name-Last: De Maeyer Author-Name: Ken Peffers Author-X-Name-First: Ken Author-X-Name-Last: Peffers Author-Name: Tuure Tuunanen Author-X-Name-First: Tuure Author-X-Name-Last: Tuunanen Author-Name: Bjoern Niehaves Author-X-Name-First: Bjoern Author-X-Name-Last: Niehaves Title: An information system design theory for the comparative judgement of competences Abstract: A Design Science Research project is presented, describing the creation of an Information System for the assessment of human competences while supporting learning. First, requirements that emanate from current mainstream competence evaluation practice are introduced. Then, design principles are presented to address the design requirements. Finally, design features are discussed that represent a concrete instantiation of the design principles in a working system prototype. The output of the design, development, and evaluation of the artefact are presented as an Information Systems Design Theory. This theory provides principles that can be applied in different contexts where the evaluation of competences is needed. Journal: European Journal of Information Systems Pages: 248-261 Issue: 2 Volume: 27 Year: 2018 Month: 03 X-DOI: 10.1080/0960085X.2018.1445461 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1445461 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:2:p:248-261 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934394_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Anastasia Utesheva Author-X-Name-First: Anastasia Author-X-Name-Last: Utesheva Author-Name: Jason R Simpson Author-X-Name-First: Jason R Author-X-Name-Last: Simpson Author-Name: Dubravka Cecez-Kecmanovic Author-X-Name-First: Dubravka Author-X-Name-Last: Cecez-Kecmanovic Title: Identity metamorphoses in digital disruption: a relational theory of identity Abstract: Digital technologies have disrupted a variety of organizations; however, Information Systems research has yet to explore in-depth why this may be occurring or the implications of this process for those involved. In this paper we present an exemplary case of digital technology disruption in a newspaper company – an organization in the midst of an identity crisis. On the basis of ethnographic data, we explore the changes that resulted from the introduction of the digital medium, and how this has led to the evolution of the newspaper, as well as the metamorphosis of identities of the company, the company’s practitioners, and the consumers of the company’s content. Our findings suggest that shifts in the evolutionary trajectory of an organization can be traced to the rate and nature of identity metamorphoses among its key actors. Hence, in order to navigate and adapt to digital disruptions, we argue that an ongoing strategic renegotiation of the identities of all the actors involved is not only possible, but is required for an organization’s survival. In doing so, we provide a relational theory of identity. Journal: European Journal of Information Systems Pages: 344-363 Issue: 4 Volume: 25 Year: 2016 Month: 7 X-DOI: 10.1057/ejis.2015.19 File-URL: http://hdl.handle.net/10.1057/ejis.2015.19 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:4:p:344-363 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934395_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bonnie Brinton Anderson Author-X-Name-First: Bonnie Author-X-Name-Last: Brinton Anderson Author-Name: Anthony Vance Author-X-Name-First: Anthony Author-X-Name-Last: Vance Author-Name: C Brock Kirwan Author-X-Name-First: C Brock Author-X-Name-Last: Kirwan Author-Name: David Eargle Author-X-Name-First: David Author-X-Name-Last: Eargle Author-Name: Jeffrey L Jenkins Author-X-Name-First: Jeffrey L Author-X-Name-Last: Jenkins Title: How users perceive and respond to security messages: a NeuroIS research agenda and empirical study Abstract: Users are vital to the information security of organizations. In spite of technical safeguards, users make many critical security decisions. An example is users’ responses to security messages – discrete communication designed to persuade users to either impair or improve their security status. Research shows that although users are highly susceptible to malicious messages (e.g., phishing attacks), they are highly resistant to protective messages such as security warnings. Research is therefore needed to better understand how users perceive and respond to security messages. In this article, we argue for the potential of NeuroIS – cognitive neuroscience applied to Information Systems – to shed new light on users’ reception of security messages in the areas of (1) habituation, (2) stress, (3) fear, and (4) dual-task interference. We present an illustrative study that shows the value of using NeuroIS to investigate one of our research questions. This example uses eye tracking to gain unique insight into how habituation occurs when people repeatedly view security messages, allowing us to design more effective security messages. Our results indicate that the eye movement-based memory (EMM) effect is a cause of habituation to security messages – a phenomenon in which people unconsciously scrutinize stimuli that they have previously seen less than other stimuli. We show that after only a few exposures to a warning, this neural aspect of habituation sets in rapidly, and continues with further repetitions. We also created a polymorphic warning that continually updates its appearance and found that it is effective in substantially reducing the rate of habituation as measured by the EMM effect. Our research agenda and empirical example demonstrate the promise of using NeuroIS to gain novel insight into users’ responses to security messages that will encourage more secure user behaviors and facilitate more effective security message designs. Journal: European Journal of Information Systems Pages: 364-390 Issue: 4 Volume: 25 Year: 2016 Month: 7 X-DOI: 10.1057/ejis.2015.21 File-URL: http://hdl.handle.net/10.1057/ejis.2015.21 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:4:p:364-390 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934396_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Sven Laumer Author-X-Name-First: Sven Author-X-Name-Last: Laumer Author-Name: Christian Maier Author-X-Name-First: Christian Author-X-Name-Last: Maier Author-Name: Andreas Eckhardt Author-X-Name-First: Andreas Author-X-Name-Last: Eckhardt Author-Name: Tim Weitzel Author-X-Name-First: Tim Author-X-Name-Last: Weitzel Title: Work routines as an object of resistance during information systems implementations: theoretical foundation and empirical evidence Abstract: When implementing new information systems, organizations often face resistance behavior from employees who avoid or underutilize the system. We analyze the extent to which such user resistance behavior is explained by users’ perceptions of the technology compared with their perceptions of work routines. We developed a research model based on work system theory and evaluated it using a study (N=106) of a human resources information system implementation in one organization. The results show that work routines are an object of resistance during IS implementations. We identify perceived usefulness and perceived ease of executing work routines as perceptions of work routines during an IS implementation that have a strong influence on user resistance behavior. In addition, our results show that the perceived ease of executing the work routines mediates the impact of perceived ease of use on user resistance behavior. In practice, our findings imply that interventions during IT implementations should focus on both the new technology and changing work routines. Journal: European Journal of Information Systems Pages: 317-343 Issue: 4 Volume: 25 Year: 2016 Month: 7 X-DOI: 10.1057/ejis.2016.1 File-URL: http://hdl.handle.net/10.1057/ejis.2016.1 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:4:p:317-343 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934397_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Oliver Müller Author-X-Name-First: Oliver Author-X-Name-Last: Müller Author-Name: Iris Junglas Author-X-Name-First: Iris Author-X-Name-Last: Junglas Author-Name: Jan vom Brocke Author-X-Name-First: Jan vom Author-X-Name-Last: Brocke Author-Name: Stefan Debortoli Author-X-Name-First: Stefan Author-X-Name-Last: Debortoli Title: Utilizing big data analytics for information systems research: challenges, promises and guidelines Abstract: This essay discusses the use of big data analytics (BDA) as a strategy of enquiry for advancing information systems (IS) research. In broad terms, we understand BDA as the statistical modelling of large, diverse, and dynamic data sets of user-generated content and digital traces. BDA, as a new paradigm for utilising big data sources and advanced analytics, has already found its way into some social science disciplines. Sociology and economics are two examples that have successfully harnessed BDA for scientific enquiry. Often, BDA draws on methodologies and tools that are unfamiliar for some IS researchers (e.g., predictive modelling, natural language processing). Following the phases of a typical research process, this article is set out to dissect BDA’s challenges and promises for IS research, and illustrates them by means of an exemplary study about predicting the helpfulness of 1.3 million online customer reviews. In order to assist IS researchers in planning, executing, and interpreting their own studies, and evaluating the studies of others, we propose an initial set of guidelines for conducting rigorous BDA studies in IS. Journal: European Journal of Information Systems Pages: 289-302 Issue: 4 Volume: 25 Year: 2016 Month: 7 X-DOI: 10.1057/ejis.2016.2 File-URL: http://hdl.handle.net/10.1057/ejis.2016.2 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:4:p:289-302 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934398_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bjoern Niehaves Author-X-Name-First: Bjoern Author-X-Name-Last: Niehaves Author-Name: Kevin Ortbach Author-X-Name-First: Kevin Author-X-Name-Last: Ortbach Title: The inner and the outer model in explanatory design theory: the case of designing electronic feedback systems Abstract: Both Information Technology (IT) artifacts and design theories are important elements for knowledge capture in design science research in information systems. Building on a rich tradition of constructing and evaluating artifacts, recent design science research has made significant advances toward better understanding the explanatory aspect of design theory. Researchers have stressed the importance of mid-range theories that relate IT artifact features (causes) with measures and goals (effects). Against this background, design theorizing reveals certain commonalities with theorizing in the behavioral science field. In this paper, we explore differences and similarities between theorizing in these areas. We develop a framework that allows for a better understanding of the relationships between manifest design decisions, kernel theory constructs and their evaluation metrics. We identify common issues that arise from conceptual distances between these ideas and show their potential impact on both the design and evaluation of artifacts. The field of electronic feedback systems is used as an illustrative example. Journal: European Journal of Information Systems Pages: 303-316 Issue: 4 Volume: 25 Year: 2016 Month: 7 X-DOI: 10.1057/ejis.2016.3 File-URL: http://hdl.handle.net/10.1057/ejis.2016.3 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:4:p:303-316 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934228_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Raban Daphne Ruth Author-X-Name-First: Raban Daphne Author-X-Name-Last: Ruth Title: Conversation as a source of satisfaction and continuance in a question-and-answer site Abstract: Generating sustainable business value from information services is challenging on the web where free information and zero-switching costs are the norm. This study examines the role of free comments given in a commercial information service through the lens of the expectation-confirmation theory and continuance. Data from a question and answer web site are analyzed by structural equations modeling to test the theoretical model whereby customer satisfaction is key to continuance and is predicted largely by social interaction that takes place on the site. The model is supported by the field data retrieved from the site. The data show that people came with equal expectations, received equal service, and continued to use the system if they were satisfied with it. Satisfaction was predicted by conversation. Free activity emerges as an integral part of the service in a fee-based information market, improving satisfaction and continuance, and thereby leading to measurable outcomes for the commercial owners of the site. The findings, based on unobtrusive field data rather than self-report questionnaires, extend expectation confirmation theory by adding a social dimension to it. Journal: European Journal of Information Systems Pages: 427-437 Issue: 4 Volume: 21 Year: 2012 Month: 7 X-DOI: 10.1057/ejis.2011.42 File-URL: http://hdl.handle.net/10.1057/ejis.2011.42 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:4:p:427-437 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934229_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Lapo Mola Author-X-Name-First: Lapo Author-X-Name-Last: Mola Author-Name: Andrea Carugati Author-X-Name-First: Andrea Author-X-Name-Last: Carugati Title: Escaping ‘localisms’ in IT sourcing: tracing changes in institutional logics in an Italian firm Abstract: Organizations are limited in their choices by the institutional environment in which they operate. This is particularly true for IT sourcing decisions that go beyond cost considerations and are constrained by traditions, geographical location, and social networks. This article investigates how a company can disentangle itself from the constraints of the institutional environment. We do so drawing on a longitudinal case study of an Italian SME active in the steel industry that successfully changed its institutionally sound, but increasingly inefficient, IT sourcing practice. Our main result suggests that by attending steadily to institutional logics, organizations can become selective in how the institutional environment influences them and act more purposefully in their decisions. In particular, through the creation of companywide IT management competencies and targeted hiring practices, organizations can strike a balance between the different institutional logics guiding IT sourcing decisions and eventually shift from the dominant logic of localism to a logic of market efficiency. This change does not depend from a choice but rather builds on a process through which IT management competences are slowly integrated in the organization. Journal: European Journal of Information Systems Pages: 388-403 Issue: 4 Volume: 21 Year: 2012 Month: 7 X-DOI: 10.1057/ejis.2011.47 File-URL: http://hdl.handle.net/10.1057/ejis.2011.47 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:4:p:388-403 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934230_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bijan Azad Author-X-Name-First: Bijan Author-X-Name-Last: Azad Author-Name: Nelson King Author-X-Name-First: Nelson Author-X-Name-Last: King Title: Institutionalized computer workaround practices in a Mediterranean country: an examination of two organizations Abstract: Information systems research often treats computer workarounds tangentially and as temporary phenomena. This exploratory research embraces anomalous system use in general and computer workarounds in particular by suggesting why the latter can be institutionalized and how they may be manifested in practice. Anomalous use is defined as sociomaterial actions around an IT artifact not consistent with its design or related official rules that nevertheless constitute system enactment in practice. The persistence of computer workarounds might be explained by the tension between top-down pressures from the external environment and bottom-up constraints from day-to-day operational work. These insights are drawn from an up-close study of workarounds in two cases from the Mediterranean region. The workaround practices involve decoupling and loose coupling, effectively creating ‘equilibrium’ between the aforementioned top-down and bottom-up influences. This may be attributed to parity between the influence exercised by external regulatory/accrediting bodies and the constraints of day-to-day work within the focal organization (i.e., work ethos, material constraints, and discretion to decouple). Our results show why some computer workarounds exhibit institutionalized behavior and their antecedent conditions. We also suggest that constituent workaround practices may exist as twin but distinctive behavioral patterns – non-compliance (or partial compliance) with an official rule and partially (or fully) working around designed systems. Journal: European Journal of Information Systems Pages: 358-372 Issue: 4 Volume: 21 Year: 2012 Month: 7 X-DOI: 10.1057/ejis.2011.48 File-URL: http://hdl.handle.net/10.1057/ejis.2011.48 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:4:p:358-372 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934231_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ali Alper Yayla Author-X-Name-First: Ali Alper Author-X-Name-Last: Yayla Author-Name: Qing Hu Author-X-Name-First: Qing Author-X-Name-Last: Hu Title: The impact of IT-business strategic alignment on firm performance in a developing country setting: exploring moderating roles of environmental uncertainty and strategic orientation Abstract: Aligning information technology (IT) strategy with business strategy has been one of the top concerns of practitioners and scholars for decades. Although numerous studies have documented positive effects of IT-business alignment on organizational performance, our knowledge about this relationship is still limited due to the complexity of contingent factors. The extant literature is largely based on research in the context of developed countries and few studies have explicitly considered the effects of contextual factors such as market environment and competitive strategy on this relationship. In this study, we attempt to fill these gaps by testing the alignment–performance relationship in a developing country setting and investigating the moderating roles of environmental uncertainty and strategic orientation on the performance effects of strategic alignment using survey data collected in Turkey. Our analyses show that this positive effect is statistically significant in highly uncertain environments and varies across performance measures. Our results also show that the strategic alignment between IT and business has a significant impact on performance across all choices of strategic orientation – defender, prospector, or analyzer. Theoretical and practical implications are discussed and future research directions are explored. Journal: European Journal of Information Systems Pages: 373-387 Issue: 4 Volume: 21 Year: 2012 Month: 7 X-DOI: 10.1057/ejis.2011.52 File-URL: http://hdl.handle.net/10.1057/ejis.2011.52 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:4:p:373-387 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934232_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jean-Éric Pelet Author-X-Name-First: Jean-Éric Author-X-Name-Last: Pelet Author-Name: Panagiota Papadopoulou Author-X-Name-First: Panagiota Author-X-Name-Last: Papadopoulou Title: The effect of colors of e-commerce websites on consumer mood, memorization and buying intention Abstract: This paper aims at studying the effect of the colors of e-commerce websites on consumer mood, memorization and buying intention. On the basis of a literature review a conceptual model is proposed, showing the effects of the color of e-commerce websites and specifically of its components, hue and brightness on the behavioral responses of the consumer, memorization and buying intention. These responses are conveyed by mood. Data collection was carried out during a laboratory experiment in order to control for the measurement of the colored appearance of e-commerce websites. Participants visited one of the eight versions of a website designed for the research, selling music CDs. Data analysis using ANOVA, regressions and general linear models show a significant effect of color on memorization, conveyed by mood. The interaction of hue and brightness, using chromatic colors for the background and foreground supports memorization and buying intention, when contrast is based on low brightness. A negative mood infers better memorization but a decreasing buying intention. Implications for theory and practice are discussed. Journal: European Journal of Information Systems Pages: 438-467 Issue: 4 Volume: 21 Year: 2012 Month: 7 X-DOI: 10.1057/ejis.2012.17 File-URL: http://hdl.handle.net/10.1057/ejis.2012.17 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:4:p:438-467 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934233_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Marianna Sigala Author-X-Name-First: Marianna Author-X-Name-Last: Sigala Title: The impact of geocollaborative portals on group decision making for trip planning Abstract: The paper develops a framework evaluating the impact of geocollaborative portals (GCP) on travellers’ collaborative decision making by synthesising literature related to the effectiveness of group support systems, web 2.0 and geocollaborative technologies. The model was tested by measuring students’ perceptions, who participated in an experimental study that required them to use a GCP for collaboratively planning a trip. Students used Yahoo! Trip Planner (Y!TP) for forming groups and then for identifying, selecting and discussing the inclusion and scheduling of geo-referenced travel activities, places and itineraries on the top of a map. The findings confirmed the multidimensionality of the Y!TP's impact on collaborative decision making, but the respondents gave a greater importance to the process (i.e. effectiveness and community building) rather than the outcome impacts (efficiency and results) of Y!TP. Specifically, the findings show that GCP can effectively support and foster teamwork, when GCP are designed to scaffold the group tasks, manage group intelligence, as well as facilitate and nurture group communication and bonding processes. The outcome impacts of GCP related to both qualitative (e.g. group consensus) and quantitative items (e.g. time and effort savings). Finally, the study discusses the implications of the findings on further investigating the functionality and effectiveness of GCP. Journal: European Journal of Information Systems Pages: 404-426 Issue: 4 Volume: 21 Year: 2012 Month: 7 X-DOI: 10.1057/ejis.2012.22 File-URL: http://hdl.handle.net/10.1057/ejis.2012.22 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:4:p:404-426 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934234_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Nancy Pouloudi Author-X-Name-First: Nancy Author-X-Name-Last: Pouloudi Author-Name: Angeliki Poulymenakou Author-X-Name-First: Angeliki Author-X-Name-Last: Poulymenakou Author-Name: Katerina Pramatari Author-X-Name-First: Katerina Author-X-Name-Last: Pramatari Title: A profile of information systems research in the Mediterranean region Abstract: Drawing data from the Mediterranean Conference on Information Systems (MCIS), we build a profile of Mediterranean information systems (IS) research and compare the emerging research landscape with recent reviews in European and international contexts. We report on research topics addressed, research methodologies employed, local empirical contexts and the composition of the related community of authors. On the basis of this data, we problematize on the meaningfulness and nature of a regional profile for IS research. Together with the six papers selected for this special issue, we aspire to contribute to the broader discourse on the diversity of IS research orientation, methodologies and agendas across different parts of the world. Journal: European Journal of Information Systems Pages: 345-357 Issue: 4 Volume: 21 Year: 2012 Month: 7 X-DOI: 10.1057/ejis.2012.31 File-URL: http://hdl.handle.net/10.1057/ejis.2012.31 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:4:p:345-357 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934235_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Dov Te'eni Author-X-Name-First: Dov Author-X-Name-Last: Te'eni Title: What's communication got to do with IT? Journal: European Journal of Information Systems Pages: 341-344 Issue: 4 Volume: 21 Year: 2012 Month: 7 X-DOI: 10.1057/ejis.2012.34 File-URL: http://hdl.handle.net/10.1057/ejis.2012.34 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:4:p:341-344 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933512_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: The Editors Title: Information systems and interorganizational networks Journal: European Journal of Information Systems Pages: 73-74 Issue: 2 Volume: 5 Year: 1996 Month: 6 X-DOI: 10.1057/ejis.1996.13 File-URL: http://hdl.handle.net/10.1057/ejis.1996.13 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:5:y:1996:i:2:p:73-74 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933513_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: K Reimers Author-X-Name-First: K Author-X-Name-Last: Reimers Title: The non-market preconditions of electronic markets: implications for their evolution and applicability Abstract: This article asks which institutional structure is required for electronic markets to emerge. It proposes the adoption of a rather narrow concept of electronic markets, one which requires that electronic markets support the negotiation phase of a business process in order to identify those preconditions that are specific to electronic markets as compared to other inter-organizational systems. A theoretical framework is elaborated which distinguishes between the institutional regime shaping market participants' transaction behaviour, a set of meta-activities which establish and maintain the institutional regime, and a generative regime, which is the group of actors performing or promoting meta-activities. All three components constitute the notion of non-market preconditions of market systems, whether electronic or conventional. This theoretical concept is then used to identify the specific non-market preconditions of electronic markets in each of the three distinct categories. In the concluding section, the findings are related to the way in which electronic markets actually evolve and the areas of economic activity in which they provide a useful coordination instrument and in which they do not. Journal: European Journal of Information Systems Pages: 75-83 Issue: 2 Volume: 5 Year: 1996 Month: 6 X-DOI: 10.1057/ejis.1996.14 File-URL: http://hdl.handle.net/10.1057/ejis.1996.14 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:5:y:1996:i:2:p:75-83 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933514_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: M Bensaou Author-X-Name-First: M Author-X-Name-Last: Bensaou Author-Name: N Venkatraman Author-X-Name-First: N Author-X-Name-Last: Venkatraman Title: Inter-organizational relationships and information technology: a conceptual synthesis and a research framework Abstract: Inter-organizational strategies that leverage information technology capabilities are becoming more widespread but the degree of research attention is limited. This paper integrates theoretical concepts from transaction cost economics, organization theory and political economy to develop a conceptual framework to understand inter-organizational relationships, particularly those that explicitly leverage information technology capabilities. Further, we develop research directions and approaches to bridge the requirements of theory building and theory testing. Journal: European Journal of Information Systems Pages: 84-91 Issue: 2 Volume: 5 Year: 1996 Month: 6 X-DOI: 10.1057/ejis.1996.15 File-URL: http://hdl.handle.net/10.1057/ejis.1996.15 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:5:y:1996:i:2:p:84-91 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933515_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: S Klein Author-X-Name-First: S Author-X-Name-Last: Klein Title: The configuration of inter-organizational relations Abstract: Based on recent literature on the impact of inter-organizational information systems (IOS) on industrial organization, this paper proposes a framework for research into the interdependencies between IOS and coordination strategy. The elements of the framework are: (1) market structure; (2) governance forms; (3) relationship dimensions and (4) enterprise resources. It is suggested that these four elements at the same time affect and are affected by coordination strategy which focuses on inter-organizational relations. The research proposition is that inter-organizational arrangements have to be interpreted as complex, multi-layer configurations of organizational parameters. The composition and flexible adaptation of these configurations – rather than the selection of one efficient governance form – and the related design of IOS are the major tasks of coordination strategy. The design parameters are related to the elements of the framework: (1) the position of the enterprise in inter-organizational relations, be it a network, groups of networks or markets; (2) combinations of governance forms with different partners; (3) combinations of governance forms within a given network of relations referring to the different layers in inter-organizational relations, namely the institutional, operational and technical layers and (4) combinations of (inter-) organizational arrangements for the use and development of resources. EUROSELECT, a horizontal network of European grocery wholesalers, is used as an example to illustrate how different contingencies affect the inter-organizational design and why the complex configuration of relations is chosen. Journal: European Journal of Information Systems Pages: 92-102 Issue: 2 Volume: 5 Year: 1996 Month: 6 X-DOI: 10.1057/ejis.1996.16 File-URL: http://hdl.handle.net/10.1057/ejis.1996.16 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:5:y:1996:i:2:p:92-102 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933516_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: ALM Cavaye Author-X-Name-First: ALM Author-X-Name-Last: Cavaye Title: The implementation of Customer Oriented Inter-Organizational Systems: an investigation from the sponsor's perspective Abstract: Computer based systems that link an organization with its customers are becoming common, and are often considered to be competitively important. Success of customer oriented inter-organizational systems relies on adoption of these systems by customers. Hence, implementation presents a crucial stage in the development of these systems. Factors associated with adoption of these systems by customers were identified from the literature on innovation and on inter-organizational systems. The study then investigated adoption factors by collecting data on nine systems and linking adoption factors with varying adoption rates. Marketing of the system and technological awareness of customers were found to have the strongest influence on adoption by customers. Areas for further research and implications for practice are identified. Journal: European Journal of Information Systems Pages: 103-109 Issue: 2 Volume: 5 Year: 1996 Month: 6 X-DOI: 10.1057/ejis.1996.17 File-URL: http://hdl.handle.net/10.1057/ejis.1996.17 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:5:y:1996:i:2:p:103-109 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933517_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: N Reekers Author-X-Name-First: N Author-X-Name-Last: Reekers Author-Name: S Smithson Author-X-Name-First: S Author-X-Name-Last: Smithson Title: The role of EDI in inter-organizational coordination in the European automotive industry Abstract: Electronic data interchange (EDI) is an important prerequisite for inter-organizational coordination in the automotive industry. It not only affects the efficiency of coordination but also power-dependency and structural aspects of inter-organizational relationships. This study assesses the impact of EDI use on the trading relationships between car manufacturers and their suppliers based on a series of case studies in the German and UK automotive industries. The analysis is based on a multi-perspective research framework integrating three major approaches: transaction cost analysis, resource dependence theory and the network perspective. Findings suggest that EDI enables both parties to rationalise their operations. However, manufacturers still optimise their production at the expense of their suppliers. This may have a negative impact on cooperation with suppliers preventing long-term ‘true’ partnerships. Journal: European Journal of Information Systems Pages: 120-130 Issue: 2 Volume: 5 Year: 1996 Month: 6 X-DOI: 10.1057/ejis.1996.18 File-URL: http://hdl.handle.net/10.1057/ejis.1996.18 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:5:y:1996:i:2:p:120-130 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933518_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: AG Lockett Author-X-Name-First: AG Author-X-Name-Last: Lockett Author-Name: CP Holland Author-X-Name-First: CP Author-X-Name-Last: Holland Title: The formation of a virtual global bank Abstract: Banks are undergoing dramatic changes to their organization structures, operations and information systems. The banking market is also developing because information technology (IT) is enabling the banks' business customers to create new forms of organization and trade, and there is a clear trend towards the globalisation of markets and competition. Banks are responding in a variety of ways, each of which is designed to increase their ability to act internationally and more quickly. In this paper the international payments and foreign exchange markets are analysed and a case study of an international bank is presented. The traditional methods of foreign exchange dealing and subsequent payment transfer using the Society for World-wide International Funds Transfer (SWIFT) are coming under close scrutiny, and new and better ways of operating are being devised. This paper describes one approach to redesigning the international payments process. It describes the partnership strategy which is being implemented by a large international bank in cooperation with a number of regional banks, resulting in the creation of a virtual global bank. An outline is given of the evolution of the strategy, showing how a vision of the way transactions should be carried out has enabled the bank to combine its various internal strengths and develop its market network. The virtual bank system and its implementation are presented, and issues of organizational and market network change are considered. Finally the results are compared with network theory and the inter-relationships between strategy, network structure and IT are analysed. Journal: European Journal of Information Systems Pages: 131-140 Issue: 2 Volume: 5 Year: 1996 Month: 6 X-DOI: 10.1057/ejis.1996.19 File-URL: http://hdl.handle.net/10.1057/ejis.1996.19 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:5:y:1996:i:2:p:131-140 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2078743_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Giovanni Vaia Author-X-Name-First: Giovanni Author-X-Name-Last: Vaia Author-Name: Daria Arkhipova Author-X-Name-First: Daria Author-X-Name-Last: Arkhipova Author-Name: William DeLone Author-X-Name-First: William Author-X-Name-Last: DeLone Title: Digital governance mechanisms and principles that enable agile responses in dynamic competitive environments Abstract: Being an agile company today is no longer just about timely recognition of early signs of change in order to defend an existing competitive position but rather being able to perpetually transition between a series of short-lived, temporary competitive advantages. While traditional IT governance approaches have lent themselves well to extracting value from a long-lasting competitive advantage, they can become a liability if agile companies need to continuously reinvent themselves in pursuit of a new, “transient” competitive advantage. To that end, a temporal dimension of IT governance (when and how fast to decide) becomes as important as its structural (who decides what) and procedural (how to decide) aspects. In this paper, we adopt a “ternary” view on governance and build on the extant literature in IS, strategy, and organisation design as well as exemplar case studies to explore how traditional approaches to IT governance structures, processes, and relational mechanisms are altered to improve sensing, deciding, and responding capabilities in turbulent business environments. These mechanisms are then summarised into four digital governance principles to guide future research and practice. Those principles are: 1) disciplined autonomy, 2) IS-Business convergence, 3) permeable boundaries, and 4) incremental financial commitment including fast experimentation. Journal: European Journal of Information Systems Pages: 662-680 Issue: 6 Volume: 31 Year: 2022 Month: 11 X-DOI: 10.1080/0960085X.2022.2078743 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2078743 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:6:p:662-680 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2096492_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Varun Grover Author-X-Name-First: Varun Author-X-Name-Last: Grover Title: Digital agility: responding to digital opportunities Abstract: In a rapidly changing digital environment, companies must sense weak signals and respond to them. This essay focuses on how agile companies can be more responsive in a pervasively digital context. To build our argument, we discuss the ontological difference of digital (vs. IT) and then describe four tenets that characterise agile organisations: modular design and packaged capabilities, use of platforms over pipelines, ability to foster concurrency and agency through data, and a digital culture that promotes ambidexterity Journal: European Journal of Information Systems Pages: 709-715 Issue: 6 Volume: 31 Year: 2022 Month: 11 X-DOI: 10.1080/0960085X.2022.2096492 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2096492 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:6:p:709-715 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2035262_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Nadège Levallet Author-X-Name-First: Nadège Author-X-Name-Last: Levallet Author-Name: Yolande Chan Author-X-Name-First: Yolande Author-X-Name-Last: Chan Title: Uncovering a new form of digitally-enabled agility: an improvisational perspective Abstract: Agile organisations address changes with ease and speed. These changes are tackled through the concept of ongoing agility, using a sense-respond process, composed of sensing, decision-making, and acting. Increasingly, however, unexpected events require a different agility response. In this study, we propose and empirically examine how improvisational agility – conceptualised as organisation improvisational capability, the ability to sense and respond to unexpected events with speed and creativity – is a type of agility better suited for unanticipated events. Specifically, we focus on the improvisational agility sense-respond process. Using four exploratory cases, we find that organisations can leverage existing ongoing agility mechanisms for improvisational agility and, through learning, can leverage improvisational agility in ongoing agility. We also explain how different components of information management capability support improvisational agility, depending on the unexpected events and the need for speed or creativity. Journal: European Journal of Information Systems Pages: 681-708 Issue: 6 Volume: 31 Year: 2022 Month: 11 X-DOI: 10.1080/0960085X.2022.2035262 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2035262 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:6:p:681-708 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2027824_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Alain Pinsonneault Author-X-Name-First: Alain Author-X-Name-Last: Pinsonneault Author-Name: Inmyung Choi Author-X-Name-First: Inmyung Author-X-Name-Last: Choi Title: Digital-enabled strategic agility: it’s time we examine the sensing of weak signals Abstract: Information Systems research provides significant insight into how information technologies affect the strategic agility of firms. Most research to date has studied the responding element of agility at the expense of sensing. Further, extant research has mainly focused on how the sensing of formal and strong signals might influence agility. With the highly turbulent and fast-changing competitive landscape of the digital age, we argue for the need to expand the focus of this research to include examining how managers identify and make sense of weak signals, and how the sensing of weak signals influences digital-enabled strategic agility. Drawing on social network theory, this paper presents two streams of research and several research avenues that can stimulate and potentially guide research efforts on this topic. Journal: European Journal of Information Systems Pages: 653-661 Issue: 6 Volume: 31 Year: 2022 Month: 11 X-DOI: 10.1080/0960085X.2022.2027824 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2027824 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:6:p:653-661 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2102713_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Paul P Tallon Author-X-Name-First: Paul P Author-X-Name-Last: Tallon Author-Name: Magno Queiroz Author-X-Name-First: Magno Author-X-Name-Last: Queiroz Author-Name: Tim Coltman Author-X-Name-First: Tim Author-X-Name-Last: Coltman Title: Digital-Enabled Strategic Agility: The Next Frontier Journal: European Journal of Information Systems Pages: 641-652 Issue: 6 Volume: 31 Year: 2022 Month: 11 X-DOI: 10.1080/0960085X.2022.2102713 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2102713 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:6:p:641-652 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1907235_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jan Recker Author-X-Name-First: Jan Author-X-Name-Last: Recker Title: Improving the state-tracking ability of corona dashboards Abstract: Corona dashboards are interactive geospatial information systems used by billions of users to help them understand the evolution of the COVID-19 pandemic. I use a representational lens to explore how these systems can be made more useful. With this lens, the usefulness of these systems to convey information about the pandemic fundamentally depends on whether these systems are implemented as representation or state-tracking systems. I suggest that corona dashboards presently focus disproportionally on representing socially constructed properties (infection rates, deaths, levels of vaccination) of various things such as people, regions, or countries. They would become more useful if they additionally focused on tracking events (such as policy implementations) and changes in states (such as capacities of lockdown wards, usage of face masks). By applying a methodology for design science research involving design archaeology, I analyse the in situ implementation of Germany’s RKI COVID-19-Dashboard, develop new design principles to extend the state-tracking abilities of corona dashboards, and explore the importance, actability, and effectiveness of these design principles through an empirical case study. The contributions this paper makes are new and validated design principles for new feature implementations that can help making corona dashboards more effective and useful. Journal: European Journal of Information Systems Pages: 476-495 Issue: 5 Volume: 30 Year: 2021 Month: 09 X-DOI: 10.1080/0960085X.2021.1907235 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1907235 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:5:p:476-495 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1955468_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Michael D. Myers Author-X-Name-First: Michael D. Author-X-Name-Last: Myers Title: EJIS moving up in the rankings Journal: European Journal of Information Systems Pages: 475-475 Issue: 5 Volume: 30 Year: 2021 Month: 09 X-DOI: 10.1080/0960085X.2021.1955468 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1955468 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:5:p:475-475 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1816144_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Andy Nguyen Author-X-Name-First: Andy Author-X-Name-Last: Nguyen Author-Name: Tuure Tuunanen Author-X-Name-First: Tuure Author-X-Name-Last: Tuunanen Author-Name: Lesley Gardner Author-X-Name-First: Lesley Author-X-Name-Last: Gardner Author-Name: Don Sheridan Author-X-Name-First: Don Author-X-Name-Last: Sheridan Title: Design principles for learning analytics information systems in higher education Abstract: This paper reports a design science research (DSR) study that develops, demonstrates and evaluates a set of design principles for information systems (IS) that utilise learning analytics to support learning and teaching in higher education. The initial set of design principles is created from theory-inspired conceptualisation based on the literature, and they are evaluated and revised through a DSR process of demonstration and evaluation. We evaluated the developed artefact in four courses with a total enrolment of 1,173 students. The developed design principles for learning analytics information systems (LAIS) to establish a foundation for further development and implementation of learning analytics to support learning and teaching in higher education. Journal: European Journal of Information Systems Pages: 541-568 Issue: 5 Volume: 30 Year: 2021 Month: 09 X-DOI: 10.1080/0960085X.2020.1816144 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1816144 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:5:p:541-568 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1801360_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mengmeng Zhang Author-X-Name-First: Mengmeng Author-X-Name-Last: Zhang Author-Name: Honghui Chen Author-X-Name-First: Honghui Author-X-Name-Last: Chen Author-Name: Kalle Lyytinen Author-X-Name-First: Kalle Author-X-Name-Last: Lyytinen Title: Validating the coevolutionary principles of business and IS alignment via agent-based modeling Abstract: This paper provides theoretical and practical implications for the application of agent-based models (ABMs) to address the issue of coevolutionary business-IS alignment. The implications stem from the following arguments: (a) the alignment issue can be modelled by an ABM to describe the features of complex adaptive systems (CAS); (b) the coevolutionary principles of business and IS alignment stipulate individual behaviours and guide organisational order; (c) ABM development and experimentation offer guidance to better explain how organisations control the alignment trajectory with coevolutionary principles. To extend the extant coevolutionary research on alignment, this paper develops an ABM for a hierarchical organisational structure and validates three coevolutionary principles. Journal: European Journal of Information Systems Pages: 496-511 Issue: 5 Volume: 30 Year: 2021 Month: 09 X-DOI: 10.1080/0960085X.2020.1801360 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1801360 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:5:p:496-511 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1808541_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Patrick Mikalef Author-X-Name-First: Patrick Author-X-Name-Last: Mikalef Author-Name: Adamantia Pateli Author-X-Name-First: Adamantia Author-X-Name-Last: Pateli Author-Name: Rogier van de Wetering Author-X-Name-First: Rogier Author-X-Name-Last: van de Wetering Title: IT architecture flexibility and IT governance decentralisation as drivers of IT-enabled dynamic capabilities and competitive performance: The moderating effect of the external environment Abstract: A question of central importance for researchers and practitioners is how information technology (IT) can help firms survive and thrive in turbulent and constantly changing business environments. To address this issue, this study develops the idea that IT architecture flexibility helps sustain competitive performance by driving the formation of IT-enabled dynamic capabilities, and that IT governance decentralisation strengthens this relationship. IT architecture flexibility and IT governance decentralisation, therefore, develop complementary effects. We argue that IT-enabled dynamic capabilities are a core antecedent for competitive performance gains, particularly under uncertain external environmental conditions. Tests of the proposed model using survey data from 322 international firms support these ideas. Our research also shows that, under conditions of high environmental heterogeneity, the value of IT architecture flexibility and IT governance decentralisation is increased, while the impact of IT-enabled dynamic capabilities on competitive performance is amplified. Journal: European Journal of Information Systems Pages: 512-540 Issue: 5 Volume: 30 Year: 2021 Month: 09 X-DOI: 10.1080/0960085X.2020.1808541 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1808541 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:5:p:512-540 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1816145_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Yan Li Author-X-Name-First: Yan Author-X-Name-Last: Li Author-Name: Manoj a Thomas Author-X-Name-First: Manoj a Author-X-Name-Last: Thomas Author-Name: Dapeng Liu Author-X-Name-First: Dapeng Author-X-Name-Last: Liu Title: From semantics to pragmatics: where IS can lead in Natural Language Processing (NLP) research Abstract: Natural Language Processing (NLP) is now widely integrated into web and mobile applications, enabling natural interactions between humans and computers. Although there is a large body of NLP studies published in Information Systems (IS), a comprehensive review of how NLP research is conceptualised and realised in the context of IS has not been conducted. To assess the current state of NLP research in IS, we use a variety of techniques to analyse a literature corpus comprising 356 NLP research articles published in IS journals between 2004 and 2018. Our analysis indicates the need to move from semantics to pragmatics. More importantly, our findings unpack the challenges and assumptions underlying current research trends in NLP. We argue that overcoming these challenges will require a renewed disciplinary IS focus. By proposing a roadmap of NLP research in IS, we draw attention to three NLP research perspectives and present future directions that IS researchers are uniquely positioned to address. Journal: European Journal of Information Systems Pages: 569-590 Issue: 5 Volume: 30 Year: 2021 Month: 09 X-DOI: 10.1080/0960085X.2020.1816145 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1816145 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:5:p:569-590 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933623_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Galal H Galal Author-X-Name-First: Galal H Author-X-Name-Last: Galal Title: Requirements engineering: A good practice Journal: European Journal of Information Systems Pages: 124-125 Issue: 2 Volume: 9 Year: 2000 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000347 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000347 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:2:p:124-125 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933624_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ian Alexander Author-X-Name-First: Ian Author-X-Name-Last: Alexander Title: Software process improvement: Concepts and practices Journal: European Journal of Information Systems Pages: 125-126 Issue: 2 Volume: 9 Year: 2000 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000348 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000348 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:2:p:125-126 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933625_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: C James Bacon Author-X-Name-First: C James Author-X-Name-Last: Bacon Title: Process improvement and organisational learning: The role of collaboration technologies Journal: European Journal of Information Systems Pages: 126-127 Issue: 2 Volume: 9 Year: 2000 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000349 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000349 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:2:p:126-127 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933626_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ian Alexander Author-X-Name-First: Ian Author-X-Name-Last: Alexander Title: An introduction to qualitative research Journal: European Journal of Information Systems Pages: 127-128 Issue: 2 Volume: 9 Year: 2000 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000350 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000350 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:2:p:127-128 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933627_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Egon Berghout Author-X-Name-First: Egon Author-X-Name-Last: Berghout Title: Beyond the productivity paradox Journal: European Journal of Information Systems Pages: 128-128 Issue: 2 Volume: 9 Year: 2000 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000351 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000351 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:2:p:128-128 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933628_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Richard Hecks Author-X-Name-First: Richard Author-X-Name-Last: Hecks Title: IT investments in developing countries: An assessment and practical guide Journal: European Journal of Information Systems Pages: 129-129 Issue: 2 Volume: 9 Year: 2000 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000352 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000352 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:2:p:129-129 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933629_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: S Gallagher Author-X-Name-First: S Author-X-Name-Last: Gallagher Author-Name: B Webb Author-X-Name-First: B Author-X-Name-Last: Webb Title: Paradigmatic analysis as a means of eliciting knowledge to assist multimedia methodological development Abstract: We have identified two paradigms in multimedia systems design based on the software engineering and graphic design approaches. Our aim is to better inform methodological development in the field. We argue that unless and until the underlying paradigm of each community is understood, attempts to develop specific multimedia methods will be sub-optimal. ‘Paradigm’ is defined in the Kuhnian sense of a ‘disciplinary matrix’ that is composed of those shared beliefs and values that guide a ‘community’ of theorists and practitioners. This paper is based on analyses of several textbooks from both disciplines and also on interviews with software engineers and graphic designers who are actively engaged in the development of digital interactive multimedia (DIM). The results indicate that (a) Kuhn's concept of paradigm is a useful mechanism through which to examine the knowledge and approaches of these two design disciplines vis-à-vis multimedia development; and (b) that the resulting paradigms provide a useful framework from which to inform methodological development within the multimedia field. The paper concludes with a discussion of how the paradigms can assist theorists and practitioners in developing a framework for method evaluation and integration in multimedia. Journal: European Journal of Information Systems Pages: 60-71 Issue: 2 Volume: 9 Year: 2000 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000355 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000355 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:2:p:60-71 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933630_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: T Moynihan Author-X-Name-First: T Author-X-Name-Last: Moynihan Title: ‘Requirements-Uncertainty’: Is it best formulated as a latent, aggregate or profile construct? Abstract: This paper identifies the strategies that experienced information systems (IS) project managers say they use to cope with requirements-uncertainty (RU) when managing development projects for external clients. It is shown that project managers (PMs) claim to use different strategies for coping with the different dimensions of requirements-uncertainty, as this notion has been formulated in IS literature. Based on this finding, it is proposed that perhaps requirements-uncertainty should be formulated as a profile construct, and not as a latent or aggregate construct, if it is to have pragmatic validity as a guide to action for project managers. Journal: European Journal of Information Systems Pages: 82-90 Issue: 2 Volume: 9 Year: 2000 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000357 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000357 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:2:p:82-90 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933631_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: H Lou Author-X-Name-First: H Author-X-Name-Last: Lou Author-Name: W Luo Author-X-Name-First: W Author-X-Name-Last: Luo Author-Name: D Strong Author-X-Name-First: D Author-X-Name-Last: Strong Title: Perceived critical mass effect on groupware acceptance Abstract: Groupware technologies have become an important part of the business computing infrastructure in many organizations, but many groupware applications, especially those requiring significant collaboration and cooperation among users, are still not adequately used. While the successful implementation of groupware depends on many different factors, achieving a ‘critical mass’ of users has been recognised as the key for groupware acceptance. By extending the technology acceptance model (TAM), this paper advances a groupware acceptance model that incorporates perceived critical mass as an independent variable for predicting groupware acceptance. The model is empirically evaluated using survey data collected from 385 students responding about their perception of Lotus Domino Discussion Databases. The results reveal that perceived critical mass had the largest total effect (direct and indirect) on intention to use groupware. Other relationships postulated in the model were also found to be significant. These findings corroborate the belief that it is essential to create a critical mass of users in the early stages of groupware implementation. A discussion of the implications of these findings for managers and researchers is also presented. Journal: European Journal of Information Systems Pages: 91-103 Issue: 2 Volume: 9 Year: 2000 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000358 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000358 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:2:p:91-103 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933632_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: C J Atkinson Author-X-Name-First: C J Author-X-Name-Last: Atkinson Title: The ‘Soft Information Systems and Technologies Methodology’ (SISTeM): an actor network contingency approach to integrated development Abstract: This paper describes the Soft Information Systems and Technologies Methodology (SISTeM), and demonstrates its utility in integrating informational and organisational development. The methodology and its stages are illustrated with examples from recent information systems and technology (IS&T) based projects, mainly in the health sector. Its antecedents in soft systems methodology are identified. The use of the approaches underpinning concept of the human/machine activity system is described. The nature of SISTeM as a social, political and technological form of contingency methodology, working with other approaches and disciplines, is demonstrated. SISTeM, it will be argued has capacity for orchestrating the emergence, consolidation and continual development of real world actor networks. Journal: European Journal of Information Systems Pages: 104-123 Issue: 2 Volume: 9 Year: 2000 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000359 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000359 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:2:p:104-123 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933633_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: S Poon Author-X-Name-First: S Author-X-Name-Last: Poon Title: Business environment and internet commerce benefit—a small business perspective Abstract: Anecdotal evidence shows that the internet can enable a start up company to globalise and achieve multi-million dollar turnover in a couple of years. Beyond this handful of examples, small businesses find that this is not always true. It seems that certain pre-conditions need to be in place before this is possible. We studied the business environment of a small business including its suppliers, customers, partner firms and competitors focusing on internet commerce adoption and usage. Among a sample of small firms in the non-manufacturing sector, the impression of competitive advantage and information support relates positively to internet commerce benefit. Also, customer participation in internet commerce is critical to success. We therefore suggest that the nature of the business environment bears an effect on the benefit small businesses can gain from internet commerce. Journal: European Journal of Information Systems Pages: 72-81 Issue: 2 Volume: 9 Year: 2000 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000361 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000361 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:2:p:72-81 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933634_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bob O'Keefe Author-X-Name-First: Bob Author-X-Name-Last: O'Keefe Author-Name: Ray Paul Author-X-Name-First: Ray Author-X-Name-Last: Paul Title: Editorial Journal: European Journal of Information Systems Pages: 59-59 Issue: 2 Volume: 9 Year: 2000 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000364 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000364 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:2:p:59-59 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933582_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: R Suomi Author-X-Name-First: R Author-X-Name-Last: Suomi Author-Name: J Pekkola Author-X-Name-First: J Author-X-Name-Last: Pekkola Title: Inhibitors and motivators for telework: some Finnish experiences Abstract: Nordic countries have traditionally been the forerunners in both usage of telecommunication and restructuring of working life. Both elements are strongly involved in telework so there might be a lesson to be learnt from Nordic telework projects. In this article four Finnish telework initiatives are studied. The reasons for starting them are sought and their results are evaluated. Further factors making the daily telework easier or more difficult are explicated. Conclusions are drawn from the cases, and their characteristics are compared with those of other European telework initiatives. Journal: European Journal of Information Systems Pages: 221-231 Issue: 4 Volume: 7 Year: 1998 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000292 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000292 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:7:y:1998:i:4:p:221-231 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933583_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: W Huang Author-X-Name-First: W Author-X-Name-Last: Huang Author-Name: R T Watson Author-X-Name-First: R T Author-X-Name-Last: Watson Author-Name: K K Wei Author-X-Name-First: K K Author-X-Name-Last: Wei Title: Can a lean e-mail medium be used for rich communication? A psychological perspective Abstract: Media richness theory has been one of the most influential theories in media choice and use for the last decade. The theory has become a controversial research issue in recent years, because some research findings are contrary to the prediction of the theory and therefore cast doubts on it. Until now, we have not fully known why and how a lean e-mail medium can be used to convey effectively rich information in organizations, contradicting the prediction of media richness theory. This paper intends to address this issue, and, from a psychological perspective, provides a theoretical explanation of why and how rich communication in a lean e-mail medium can be realised. Journal: European Journal of Information Systems Pages: 269-274 Issue: 4 Volume: 7 Year: 1998 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000302 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000302 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:7:y:1998:i:4:p:269-274 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933584_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: J Ballantine Author-X-Name-First: J Author-X-Name-Last: Ballantine Author-Name: M Levy Author-X-Name-First: M Author-X-Name-Last: Levy Author-Name: P Powell Author-X-Name-First: P Author-X-Name-Last: Powell Title: Evaluating information systems in small and medium-sized enterprises: issues and evidence Abstract: Much empirical work has investigated the nature of information systems (IS) evaluation in large organizations. However, little work has examined the nature of evaluation in small and medium-sized enterprises (SMEs). This paper discusses IS evaluation in the context of SMEs by identifying a number of issues particularly relevant to such organizations. Drawing on the experiences of four SMEs, the paper identifies the following factors and their implications for evaluation practice: a lack of business and IS/IT strategy; limited access to capital resources; an emphasis on automating; the influence of major customers; and limited information skills. The paper draws on two frameworks of evaluation which are used to help understand evaluation practices in SMEs, and which form a structure within which future research may be placed. The paper concludes with a set of propositions which constitute a research agenda for further examining evaluation practice in SMEs. Journal: European Journal of Information Systems Pages: 241-251 Issue: 4 Volume: 7 Year: 1998 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000307 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000307 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:7:y:1998:i:4:p:241-251 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933585_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: M R Lind Author-X-Name-First: M R Author-X-Name-Last: Lind Author-Name: J M Sulek Author-X-Name-First: J M Author-X-Name-Last: Sulek Title: Undersizing software systems: third versus fourth generation software development Abstract: A critical component of information systems (IS) project management is completing projects on time; however, most software development efforts have completion time overruns. This study examines the prior research in IS project management for assessing the completion time for new software development projects and discusses a project management phenomenon where the expected time for project completion is undersized. At one firm two groups of software development projects are examined: (1) Cobol projects (third generation) and (2) Natural (fourth generation). It was found that both the Cobol and Natural projects experienced similar overruns. Undersizing is posited as the explanation. Journal: European Journal of Information Systems Pages: 261-268 Issue: 4 Volume: 7 Year: 1998 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000308 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000308 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:7:y:1998:i:4:p:261-268 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933586_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: J-N Ezingeard Author-X-Name-First: J-N Author-X-Name-Last: Ezingeard Author-Name: Z Irani Author-X-Name-First: Z Author-X-Name-Last: Irani Author-Name: P Race Author-X-Name-First: P Author-X-Name-Last: Race Title: Assessing the value and cost implications of manufacturing information and data systems: an empirical study Abstract: Although manufacturing information and data systems (MIDS) form an integral part of a manufacturing organization's infrastructure, the growth of corporate IT expenditure has left many companies questioning the value of their MIDS deployment. The use of traditional appraisal techniques to justify investments in MIDS typically relies on measures based on direct cost savings and incremental future cash flows. These techniques are considered no longer appropriate because of the largely intangible cost and benefit dimensions of many IT projects. This paper presents the results of a research study based on interviews in eighteen manufacturing companies, which investigated the methods used to assess the value and cost of MIDS investments. After showing that the concepts used to justify value vary significantly between respondents, the research indicates that intuition plays an important role in value prediction and assessment. A comparison between small and large companies indicates that the systems implementations are perceived in a better light in smaller companies. The results obtained are then compared with recent research. Journal: European Journal of Information Systems Pages: 252-260 Issue: 4 Volume: 7 Year: 1998 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000309 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000309 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:7:y:1998:i:4:p:252-260 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933587_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: K M Nelson Author-X-Name-First: K M Author-X-Name-Last: Nelson Author-Name: M Ghods Author-X-Name-First: M Author-X-Name-Last: Ghods Title: Measuring technology flexibility Abstract: This research investigates technology flexibility, which is the technology characteristic that allows or enables adjustments and other changes to the business process. We develop dimensions and determinants of this phenomenon and demonstrate a methodology for the validation and the study of flexibility. The results of a test of software system flexibility are reported. Technology flexibility has two dimensions, structural and process flexibility, encompassing both the actual technology application and the people and processes that support and use it. The flexibility of technology that supports business processes can greatly influence the organization's capacity for change. Existing technology can present opportunities for, or barriers to, business process flexibility through structural characteristics such as language, platform, and design. Technology can also indirectly affect flexibility through the relationship between the technology maintenance organization and the business process owners, change request processing, and other response characteristics. These indirect effects reflect a more organizational perspective of flexibility. Journal: European Journal of Information Systems Pages: 232-240 Issue: 4 Volume: 7 Year: 1998 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000310 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000310 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:7:y:1998:i:4:p:232-240 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933588_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: J Ledington Author-X-Name-First: J Author-X-Name-Last: Ledington Author-Name: P W J Ledington Author-X-Name-First: P W J Author-X-Name-Last: Ledington Title: Decision-Variable Partitioning: an alternative modelling approach in Soft Systems Methodology Abstract: Creating human activity system models is an essential feature of Soft Systems Methodology. It is an area of the methodology that has received very little research attention and has remained static for the past fifteen years. This paper argues the need for further development of the modelling approach involved in Soft Systems Methodology, demonstrates that conventional models are based upon functional decomposition, and presents an alternative modelling approach called Decision-Variable Partitioning. Journal: European Journal of Information Systems Pages: 55-64 Issue: 1 Volume: 8 Year: 1999 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000311 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000311 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:8:y:1999:i:1:p:55-64 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933589_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: V S Lai Author-X-Name-First: V S Author-X-Name-Last: Lai Title: A contingency examination of CASE-task fit on software developer's performance Abstract: This study examines the CASE-performance relationship, contingent on the task characteristics of software developers. Contingency theory is used here as a framework to explore the CASE-task interactions that may have been important in motivating the performance of IS professionals. The results indicate that CASE-task fit contributes significantly to the performance of software developers. Implications of the findings, from both a research and a managerial perspective, are discussed in the paper. Journal: European Journal of Information Systems Pages: 27-39 Issue: 1 Volume: 8 Year: 1999 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000312 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000312 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:8:y:1999:i:1:p:27-39 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933590_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: M I Barrett Author-X-Name-First: M I Author-X-Name-Last: Barrett Title: Challenges of EDI adoption for electronic trading in the London Insurance Market Abstract: This paper describes an in-depth case study, carried out over the period 1993–1997, of the attempts made to introduce an EDI service, LIMNET EPS, to support the placement of risk in the London Insurance Market. The research approach adopts a process-based methodology and develops a theoretical basis on the cultural assumptions of technology which draws on technological frames and structural culture. The main body of the paper then describes and analyses the initiation, development and adoption challenges of the LIMNET EPS service. It is concluded that there are significant organizational and social issues which need to be addressed in the adoption of EPS across this market. Specifically, our analysis suggests that the low levels of EPS adoption are related to incongruences in the cultural assumptions held by key market participants in three domains: the nature of technological change, the nature of business transaction, and the importance of market institutions. Finally, we believe our theoretical basis may be valuable in research and practice to assist in the early identification of new evolving forms of electronic commerce. Journal: European Journal of Information Systems Pages: 1-15 Issue: 1 Volume: 8 Year: 1999 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000313 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000313 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:8:y:1999:i:1:p:1-15 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933591_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: P Kanellis Author-X-Name-First: P Author-X-Name-Last: Kanellis Author-Name: M Lycett Author-X-Name-First: M Author-X-Name-Last: Lycett Author-Name: R J Paul Author-X-Name-First: R J Author-X-Name-Last: Paul Title: Evaluating business information systems fit: from concept to practical application Abstract: Attempting to explain information systems success and failure is a complex task. To measure it is perhaps more complex and compounded by difficulties related to the concept of measurement in a social context. The prevalent approach taken to date revolves around the concept of ‘fit’, as defined by the contingency approach in organizational theory. In reviewing this, a proposal is made for an interpretive approach to measurement. This paper attempts to provide such an approach through the development of a framework that aims to improve understanding for the researcher and practitioner alike. The formative part of the framework seeks to collect data relating to the fit of the information system and its environment along the dimensions of decision making, innovation and information acquisition and distribution. The latter part of the framework uses repertory grids to gain an understanding of both what is perceived as wrong with the system and what is perceived as wanted from the system; the latter acting as a basis for corrective action. A description of action research applying the framework in an organizational setting is given and representative empirical results are examined. The paper concludes with a discussion of the value of the framework and the major conclusions that can be drawn from its application. Journal: European Journal of Information Systems Pages: 65-76 Issue: 1 Volume: 8 Year: 1999 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000316 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000316 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:8:y:1999:i:1:p:65-76 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933592_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: T Guimaraes Author-X-Name-First: T Author-X-Name-Last: Guimaraes Author-Name: P Dallow Author-X-Name-First: P Author-X-Name-Last: Dallow Title: Empirically testing the benefits, problems, and success factors for telecommuting programmes Abstract: The benefits of telecommuting have been recognised by government and business organizations throughout the world. As companies implement their telecommuting programmes many problems are encountered which require management attention. For organizations contemplating the implementation of such programmes it has become exceedingly important to know what can be done to improve the likelihood that the many potential benefits will be derived and that the many possible problems are reduced or eliminated. What organizations should do to accomplish this was the quest for this study. The voluminous literature is mostly comprised of anecdotal evidence, personal opinions, or experience based on a single organization. A thorough survey of the relevant literature was undertaken to exhaustively identify the many potential benefits, problems, and the proposed success factors for telecommuting programmes in practice. Using the benefits derived from telecommuting programmes and their impact on company performance as the measures of programme success, six main success factors were empirically tested with a sample of 316 telecommuters from eighteen companies. The results corroborate at least partially the importance of carefully considering the characteristics of supervisors, employees, tasks, and work environments, as well as management support and problems encountered, for the success of telecommuting programmes. Journal: European Journal of Information Systems Pages: 40-54 Issue: 1 Volume: 8 Year: 1999 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000317 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000317 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:8:y:1999:i:1:p:40-54 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933593_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: H Lee Author-X-Name-First: H Author-X-Name-Last: Lee Title: Time and information technology: monochronicity, polychronicity and temporal symmetry Abstract: This paper investigates how information technology affects temporal aspects of organizational work beyond speeding up business processes. It has developed the dimensions of temporality of business processes and applied them to describe and analyse temporal changes of export-related work in trading companies using EDI. In the departments studied, information technology transformed temporal profiles of work and also created a temporal symmetry between work groups interacting with each other. This result is compared with a previous study (Barley, 1988. In Making Time, Temple University Press). This temporal transformation of work by information technology has rarely been explored in information systems research as well as organizational studies. At this stage of research, it is difficult to decide which temporality, monochronicity or polychronicity, information technology facilitates, or whether information technology will always create temporal symmetry. More research on the relationship between time and information technology is required. Whatever temporal consequences of information technology are supported by future research, it is believed that this temporal consideration has value in information systems development and implementation. By taking into account polychronicity, monochronicity and temporal symmetry, we will be able to develop information systems which better fit users' temporal behaviour. Journal: European Journal of Information Systems Pages: 16-26 Issue: 1 Volume: 8 Year: 1999 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000318 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000318 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:8:y:1999:i:1:p:16-26 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934119_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Vera Kartseva Author-X-Name-First: Vera Author-X-Name-Last: Kartseva Author-Name: Joris Hulstijn Author-X-Name-First: Joris Author-X-Name-Last: Hulstijn Author-Name: Jaap Gordijn Author-X-Name-First: Jaap Author-X-Name-Last: Gordijn Author-Name: Yao-Hua Tan Author-X-Name-First: Yao-Hua Author-X-Name-Last: Tan Title: Control patterns in a health-care network Abstract: To keep a network of enterprises sustainable, inter-organizational control measures are needed to detect or prevent opportunistic behaviour of network participants. We present a requirements engineering method for understanding control problems and designing solutions, based on an economic value perspective. The methodology employs a library of so-called control patterns, inspired by design patterns in software engineering. A control pattern is a generic solution for a common control problem. The usefulness and adequacy of the control patterns is demonstrated by a case study of the governance and control mechanisms of the Dutch public health insurance network for exceptional medical expenses (AWBZ). Journal: European Journal of Information Systems Pages: 320-343 Issue: 3 Volume: 19 Year: 2010 Month: 6 X-DOI: 10.1057/ejis.2010.13 File-URL: http://hdl.handle.net/10.1057/ejis.2010.13 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:3:p:320-343 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934120_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Rui Huang Author-X-Name-First: Rui Author-X-Name-Last: Huang Author-Name: Robert W Zmud Author-X-Name-First: Robert W Author-X-Name-Last: Zmud Author-Name: R Leon Price Author-X-Name-First: R Leon Author-X-Name-Last: Price Title: Influencing the effectiveness of IT governance practices through steering committees and communication policies Abstract: Information technology (IT) governance practices involve efforts by an organization's leadership to influence IT-related decisions through the location of decision rights and the structure of decision processes. Our focus is on two specific aspects of IT governance: IT steering committees and IT-related communication policies. Adopting an inductive research strategy examining qualitative data, we provide evidence on the influence of these governance practices from three small-/medium-sized organizations. While each firm evidenced a centralized IT governance posture, differences in these firms’ IT steering committees and governance-related communication policies were found to explain differences in the firms’ IT use outcomes. Inferences from our findings are presented in the form of propositions informing future research. Journal: European Journal of Information Systems Pages: 288-302 Issue: 3 Volume: 19 Year: 2010 Month: 6 X-DOI: 10.1057/ejis.2010.16 File-URL: http://hdl.handle.net/10.1057/ejis.2010.16 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:3:p:288-302 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934121_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ojelanki Ngwenyama Author-X-Name-First: Ojelanki Author-X-Name-Last: Ngwenyama Author-Name: Jacob Nørbjerg Author-X-Name-First: Jacob Author-X-Name-Last: Nørbjerg Title: Software process improvement with weak management support: an analysis of the dynamics of intra-organizational alliances in IS change initiatives Abstract: Software Process Improvement (SPI) projects are large-scale, complex organization-wide change initiatives. They require considerable investments in personnel, time and money and impact just about every aspect of software firms. The group charged with conducting an SPI project has, however, little formal authority to influence or force software professionals to engage in SPI work or to define and implement changes. The SPI literature suggests that successful SPI initiatives depend on strong commitment from top management. But what should the SPI group do if management support is weak? In this paper, we present an analysis of how an SPI group can use alliances to obtain influence and succeed when management support is weak. Our study is based on a 3-year longitudinal field study of SPI change initiatives at Denmark Electronics. Our findings show that a lack of top management support is not necessarily incompatible with success. This research opens an important new area of research on intra-organizational alliances and information system (IS) implementation. It has the potential to offer new theories and practical advice on how IS implementation projects can be more effectively managed. Journal: European Journal of Information Systems Pages: 303-319 Issue: 3 Volume: 19 Year: 2010 Month: 6 X-DOI: 10.1057/ejis.2010.18 File-URL: http://hdl.handle.net/10.1057/ejis.2010.18 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:3:p:303-319 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934122_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mutaz M Al-Debei Author-X-Name-First: Mutaz M Author-X-Name-Last: Al-Debei Author-Name: David Avison Author-X-Name-First: David Author-X-Name-Last: Avison Title: Developing a unified framework of the business model concept Abstract: Recent rapid advances in Information and Communication Technologies (ICTs) have highlighted the rising importance of the Business Model (BM) concept in the field of Information Systems (IS). Despite agreement on its importance to an organization's success, the concept is still fuzzy and vague, and there is little consensus regarding its compositional facets. Identifying the fundamental concepts, modeling principles, practical functions, and reach of the BM relevant to IS and other business concepts is by no means complete. This paper, following a comprehensive review of the literature, principally employs the content analysis method and utilizes a deductive reasoning approach to provide a hierarchical taxonomy of the BM concepts from which to develop a more comprehensive framework. This framework comprises four fundamental aspects. First, it identifies four primary BM dimensions along with their constituent elements forming a complete ontological structure of the concept. Second, it cohesively organizes the BM modeling principles, that is, guidelines and features. Third, it explains the reach of the concept showing its interactions and intersections with strategy, business processes, and IS so as to place the BM within the world of digital business. Finally, the framework explores three major functions of BMs within digital organizations to shed light on the practical significance of the concept. Hence, this paper links the BM facets in a novel manner offering an intact definition. In doing so, this paper provides a unified conceptual framework for the BM concept that we argue is comprehensive and appropriate to the complex nature of businesses today. This leads to fruitful implications for theory and practice and also enables us to suggest a research agenda using our conceptual framework. Journal: European Journal of Information Systems Pages: 359-376 Issue: 3 Volume: 19 Year: 2010 Month: 6 X-DOI: 10.1057/ejis.2010.21 File-URL: http://hdl.handle.net/10.1057/ejis.2010.21 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:3:p:359-376 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934123_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Pär J Ågerfalk Author-X-Name-First: Pär J Author-X-Name-Last: Ågerfalk Title: Getting pragmatic Journal: European Journal of Information Systems Pages: 251-256 Issue: 3 Volume: 19 Year: 2010 Month: 6 X-DOI: 10.1057/ejis.2010.22 File-URL: http://hdl.handle.net/10.1057/ejis.2010.22 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:3:p:251-256 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934124_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Nicholas Berente Author-X-Name-First: Nicholas Author-X-Name-Last: Berente Author-Name: Uri Gal Author-X-Name-First: Uri Author-X-Name-Last: Gal Author-Name: Youngjin Yoo Author-X-Name-First: Youngjin Author-X-Name-Last: Yoo Title: Erratum: Dressage, control, and enterprise systems: the case of NASA's Full Cost initiative Journal: European Journal of Information Systems Pages: 377-377 Issue: 3 Volume: 19 Year: 2010 Month: 6 X-DOI: 10.1057/ejis.2010.27 File-URL: http://hdl.handle.net/10.1057/ejis.2010.27 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:3:p:377-377 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934125_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Chee Wei Phang Author-X-Name-First: Chee Wei Author-X-Name-Last: Phang Author-Name: Atreyi Kankanhalli Author-X-Name-First: Atreyi Author-X-Name-Last: Kankanhalli Author-Name: Karthik Ramakrishnan Author-X-Name-First: Karthik Author-X-Name-Last: Ramakrishnan Author-Name: Krishnamurthy S Raman Author-X-Name-First: Krishnamurthy S Author-X-Name-Last: Raman Title: Customers’ preference of online store visit strategies: an investigation of demographic variables Abstract: There is significant interest among marketers and academics to understand how to segment online consumers to better fulfill their needs. Previous literature on brick-and-mortar shopping has advocated demographic variables as simple yet valuable indicators to understand consumers and segment them accordingly. However, research in the online shopping context has produced mixed findings about the effects of demographics, which limit their utility to online merchants. As an attempt to address the ambiguity, the study proposes a more comprehensive approach to investigate the effects of demographic variables in the online shopping context. This is done by considering the demographic variables in combinations and using clickstream data to more accurately derive online shoppers’ surfing behaviour for segmentation purposes. Following this approach, our study investigates the effects of the demographic variables of gender, age, income, and education, based on the theories of media naturalness and consumer trait and involvement. The results reveal various effects of age, income, and education on online consumers’ needs being reflected in their store visit strategies. Implications are suggested for e-commerce research and practice. Journal: European Journal of Information Systems Pages: 344-358 Issue: 3 Volume: 19 Year: 2010 Month: 6 X-DOI: 10.1057/ejis.2010.32 File-URL: http://hdl.handle.net/10.1057/ejis.2010.32 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:3:p:344-358 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934126_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Gove Allen Author-X-Name-First: Gove Author-X-Name-Last: Allen Author-Name: Jianan Wu Author-X-Name-First: Jianan Author-X-Name-Last: Wu Title: How well do shopbots represent online markets? A study of shopbots’ vendor coverage strategy Abstract: Consumers often use shopbots to search for information when making purchase decisions in Internet markets. Although they have varying sensitivity to shopbot bias, consumers generally prefer accurate market representation. However, in choosing the accuracy of market representation, shopbots must balance the desires of consumers with the costs of providing their services and with the desires of the vendors, who are often the largest source of their revenue. In this paper, we study how accurately shopbots represent a market and analyze the strategies shopbots adopt to achieve market representativeness. We theoretically identify two important drivers in shopbot vendor coverage strategy – how many vendors it covers (shopbot size) and which vendors it covers (shopbot affiliation) – and analytically show how the drivers affect shopbot market representativeness. We report the results of a large-scale study in which we collected 2.2 million vendor price listings from eight shopbots and develop metrics for measuring shopbot size, shopbot affiliation, and shopbot market representativeness. We found that (1) shopbots do not represent markets equally well; (2) size drives a shopbot's market representativeness positively whereas affiliation drives a shopbot's market representativeness negatively; (3) shopbots follow differnet vendor representative strategies to pursue market representativeness. Journal: European Journal of Information Systems Pages: 257-272 Issue: 3 Volume: 19 Year: 2010 Month: 6 X-DOI: 10.1057/ejis.2010.6 File-URL: http://hdl.handle.net/10.1057/ejis.2010.6 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:3:p:257-272 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934127_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Kieran Conboy Author-X-Name-First: Kieran Author-X-Name-Last: Conboy Title: Project failure en masse: a study of loose budgetary control in ISD projects Abstract: This paper investigates the tightness of budgetary control over projects in a large systems development multinational. This represents a case of extreme information systems development (ISD) failure en masse, where all but two of the 22 projects in a business unit went over budget, causing senior executives to refocus their strategic priorities and cancel all current and potential projects that followed. This study focuses specifically on the two best performing (12 and 4% under budget) and worst performing (223 and 320% over budget) of these projects. Using a framework drawn from control systems theory, this study examines the ‘tightness’ of budgetary control exerted over each project, and what was done or could have been done to avert such failure. The study then identifies a set of emerging factors affecting tight budgetary control in ISD. Journal: European Journal of Information Systems Pages: 273-287 Issue: 3 Volume: 19 Year: 2010 Month: 6 X-DOI: 10.1057/ejis.2010.7 File-URL: http://hdl.handle.net/10.1057/ejis.2010.7 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:3:p:273-287 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933979_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mohamed Khalifa Author-X-Name-First: Mohamed Author-X-Name-Last: Khalifa Author-Name: Vanessa Liu Author-X-Name-First: Vanessa Author-X-Name-Last: Liu Title: Online consumer retention: contingent effects of online shopping habit and online shopping experience Abstract: In this study, we further develop the information systems continuance model in the context of online shopping, using a contingency theory that accounts for the roles of online shopping habit and online shopping experience. Specifically, we argue and empirically demonstrate that although conceptually distinct, online shopping habit and online shopping experience have similar effects on repurchase intention. They both have positive mediated effects through satisfaction and moderate the relationship between satisfaction and online repurchase intention. The results of a survey study involving 122 online customers provide strong support for our research model. We also identify after-sale service, transaction efficiency, security, convenience, and cost savings as important online shopping usefulness drivers. Theoretical and practical implications include establishing a contingency theory to more fully explain online customer retention as well as guidelines for development of customer relationship management initiatives. Journal: European Journal of Information Systems Pages: 780-792 Issue: 6 Volume: 16 Year: 2007 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000711 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000711 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:6:p:780-792 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933980_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Cynthia LeRouge Author-X-Name-First: Cynthia Author-X-Name-Last: LeRouge Author-Name: Vasiliki Mantzana Author-X-Name-First: Vasiliki Author-X-Name-Last: Mantzana Author-Name: E Vance Wilson Author-X-Name-First: E Vance Author-X-Name-Last: Wilson Title: Healthcare information systems research, revelations and visions Journal: European Journal of Information Systems Pages: 669-671 Issue: 6 Volume: 16 Year: 2007 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000712 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000712 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:6:p:669-671 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933981_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Tina Blegind Jensen Author-X-Name-First: Tina Blegind Author-X-Name-Last: Jensen Author-Name: Margunn Aanestad Author-X-Name-First: Margunn Author-X-Name-Last: Aanestad Title: Hospitality and hostility in hospitals: a case study of an EPR adoption among surgeons Abstract: The purpose of this paper is to discuss the adoption of healthcare information systems (HIS) from a user perspective. Our case study concerns how a group of orthopaedic surgeons experienced and reacted to the adoption and mandatory use of an Electronic Patient Record system in a Danish hospital. We propose to use the concepts of hospitality and hostility to turn our attention to the interaction between the host (the surgeons) and the guest (the information system) and consider how the boundaries between them evolved in the everyday work practices. As an alternative to previous studies on technology adoption, these concepts help us appreciate and put special emphasis on particular aspects of the adoption process: the mutual and co-constitutive relationship between the users and the technology and the continued co-existence of both positive and negative attitudes among the users. The findings suggest an alternative way of thinking about an adoption process that is considered relevant to managers who strive to ensure successful adoption of HIS. Journal: European Journal of Information Systems Pages: 672-680 Issue: 6 Volume: 16 Year: 2007 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000713 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000713 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:6:p:672-680 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933982_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: John L Reardon Author-X-Name-First: John L Author-X-Name-Last: Reardon Author-Name: Elizabeth Davidson Author-X-Name-First: Elizabeth Author-X-Name-Last: Davidson Title: An organizational learning perspective on the assimilation of electronic medical records among small physician practices Abstract: Small physician practices play an essential role in the healthcare delivery system but are least likely to adopt health information technologies such as electronic medical records (EMRs). Factors contributing to low adoption include investment cost, productivity loss, and lack of financial incentives. However, these factors do not explain why some small practices, which face similar challenges nonetheless assimilate EMRs, while others do not. We investigated the assimilation of EMRs from the theoretic perspective of organizational learning in a survey of small physician practices and evaluated whether characteristics associated with organizational learning barriers are related to EMR assimilation. We found that learning-related scale, related knowledge, and diversity were positively associated with small physician practices' stage of assimilation of EMR technology. Our findings suggest that some small practices are able to overcome the substantial learning barriers presented by EMRs but that others will require support to develop sufficient learning capacity. We consider implications for practice from this research and areas requiring further research. Journal: European Journal of Information Systems Pages: 681-694 Issue: 6 Volume: 16 Year: 2007 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000714 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000714 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:6:p:681-694 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933983_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jeanette Van Akkeren Author-X-Name-First: Jeanette Author-X-Name-Last: Van Akkeren Author-Name: Bruce Rowlands Author-X-Name-First: Bruce Author-X-Name-Last: Rowlands Title: An epidemic of pain in an Australian radiology practice Abstract: This paper presents findings from a study of an organisationally mandated assimilation process of an enterprise-wide information system in a radiology practice in Australia. A number of interviews with radiologists, radiographers and administrative staff are used to explore the impact of institutional structures on the assimilation process. The case study develops an argument that culture within and outside the Australian Radiology Practice (ARP), social structures within the ARP and organisational-level management mandates have impacted on the assimilation process. The study develops a theoretical framework that integrates elements of social actor theory (Lamb & Kling, 2003) to provide a more fine-grained analysis concentrating on the relationships among the radiology practitioners, the technology (an enterprise-wide Health Information System), and a larger social milieu surrounding its use. This study offers several theoretical and practical implications for technology assimilation in the health and radiology industry regarding the important roles social interactions, individual self-perceptions, organisational mandates and policies can play in assimilating new ICTs. Journal: European Journal of Information Systems Pages: 695-711 Issue: 6 Volume: 16 Year: 2007 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000715 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000715 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:6:p:695-711 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933984_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Cheon-Pyo Lee Author-X-Name-First: Cheon-Pyo Author-X-Name-Last: Lee Author-Name: Jung P Shim Author-X-Name-First: Jung P Author-X-Name-Last: Shim Title: An exploratory study of radio frequency identification (RFID) adoption in the healthcare industry Abstract: This study examines the radio frequency identification (RFID) adoption decision process and proposes a model predicting the likelihood of adopting RFID within organizations in the healthcare industry. A considerable number of studies have been conducted regarding organizational information technology (IT) adoption, but the nature of the organizational IT adoption process is still not well understood. Especially, although there are a number of variables and categories that have been found empirically to be related to adoption behavior, there is little in the way of evidence to suggest the origin or motivation behind the adoption. Thus, this study investigates the underlying motivations and driving forces behind the adoption of RFID using the theory of technology-push and need-pull. In this study, an organizational RFID adoption model is proposed and empirically tested by a survey using a sample of 126 senior executives in U.S. hospitals. The model posits that three categories of factors, technology push, need pull, and presence of champions, determine the likelihood of adopting RFID within organizations. This study also found that the relationships between those three categories and the likelihood of adopting RFID are strengthened or weakened by organizational readiness. Journal: European Journal of Information Systems Pages: 712-724 Issue: 6 Volume: 16 Year: 2007 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000716 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000716 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:6:p:712-724 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933985_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Anol Bhattacherjee Author-X-Name-First: Anol Author-X-Name-Last: Bhattacherjee Author-Name: Neset Hikmet Author-X-Name-First: Neset Author-X-Name-Last: Hikmet Title: Physicians' resistance toward healthcare information technology: a theoretical model and empirical test Abstract: This paper presents a theoretical model of physician resistance of healthcare information technology (HIT) usage by integrating the technology acceptance and resistance to change literatures, using a dual-factor model of technology usage. This model elaborates the interdependent and asymmetric effects of inhibiting usage perceptions, such as resistance, on HIT usage intentions relative to enabling perceptions, such as perceived usefulness and perceived ease of use. It also proposes perceived threat as a predictor of resistance, perceived compatibility as predicting perceived usefulness, and related knowledge as predicting perceived ease of use. The resulting model is empirically supported using a field survey of a computerized physician order entry system among 129 practicing physicians at a large acute-care hospital. Our study illustrates the importance of incorporating user resistance in technology usage studies in general and HIT usage studies in particular, grounds resistance research within extant theories of technology usage, and provides a preliminary model of resistance that can serve as the starting point for future research in this relatively unexplored yet potentially fertile area of research. Journal: European Journal of Information Systems Pages: 725-737 Issue: 6 Volume: 16 Year: 2007 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000717 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000717 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:6:p:725-737 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933986_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Sunyoung Cho Author-X-Name-First: Sunyoung Author-X-Name-Last: Cho Author-Name: Lars Mathiassen Author-X-Name-First: Lars Author-X-Name-Last: Mathiassen Title: The role of industry infrastructure in telehealth innovations: a multi-level analysis of a telestroke program Abstract: The information-intensive nature of the healthcare industry and the potential of information technology (IT) to reduce costs and improve quality of services have increased the focus on IT-based innovations. Yet, our ability to understand and manage how IT-based innovations unfold in the context of healthcare is still limited. In this paper, we apply Van de Ven's industry infrastructure framework to investigate a telehealth innovation that provides remote medical assistance to stroke patients in a network of collaborating hospitals. The resulting multi-level analysis contributes to understanding the innovation by revealing a highly complex process of interactions between key stakeholders and healthcare industry infrastructure. Despite the innovation's strong potential, the process is mainly push-driven with minimal pull from potential adopters. Moreover, the push is created by a small group of medical innovators with limited technological and financial resources and little infrastructural support. The study contributes with contextual insights into the telehealth innovation, suggesting complementary explanations of why the healthcare industry despite considerable investments continues to lag behind other industries in adoption of IT-based innovations. The study also adapts Van de Ven's framework by applying it to a single case of innovation rather than as originally conceived to several instances of an innovation within an industry. The analysis shows how some of the components of the framework were adapted to and interpreted in the context of telehealth innovations. Journal: European Journal of Information Systems Pages: 738-750 Issue: 6 Volume: 16 Year: 2007 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000718 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000718 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:6:p:738-750 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933987_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Richard Klein Author-X-Name-First: Richard Author-X-Name-Last: Klein Title: An empirical examination of patient-physician portal acceptance Abstract: Healthcare providers have recently begun deploying Internet-based patient–physician portals. These applications allow patients to both communicate with their providers and access personal medical information, such as laboratory results. Research within medical informatics explores, and debates, the utility of such functions from the patient and physician perspectives. However, work does not examine factors influencing patient use, assuming that once built and deployed patients will come. Hence, the current research empirically investigates patient behavioral intentions (BI) with respect to (a) use of electronic communications functions and (b) accessing of individual medical information through an Internet-based patient–physician portal. Surveying 294 patients, this work incorporates individual factors, namely computer self-efficacy and personal innovativeness in the domain of information technology, with technology-based factors identified in the Technology Acceptance Model. The analysis finds that usefulness and innovativeness have a positive direct effect on BI with respect to both functions, namely communications and information access. Additionally, patients with greater healthcare needs foresee increased use of portals to access their personal medical information. Finally, patients in primary care, as opposed to specialist, provider settings intend to engage in electronic communications. Journal: European Journal of Information Systems Pages: 751-760 Issue: 6 Volume: 16 Year: 2007 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000719 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000719 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:6:p:751-760 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933988_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Hanifa Shah Author-X-Name-First: Hanifa Author-X-Name-Last: Shah Author-Name: Alan Eardley Author-X-Name-First: Alan Author-X-Name-Last: Eardley Author-Name: Trevor Wood-Harper Author-X-Name-First: Trevor Author-X-Name-Last: Wood-Harper Title: ALTAR: achieving learning through action research Abstract: This paper describes a collaborative action research (AR) study that took place between a U.K. university and a large U.K. manufacturing organisation, Britvic Soft Drinks Ltd. The ALTAR (Achieving Learning Through Action Research) project involved a number of AR cycles involving participants at different levels of the collaborating organisation. Britvic was already in the process of adopting knowledge management (KM) software but it was recognised that they could better exploit KM technologies by undertaking the AR project described in the paper. The project involved developing academic theory into practical concepts that influenced actions in the organisation and fed back into the academic research. The ALTAR approach and findings are described in this paper and conclusions are drawn about the AR study and its implications for AR, KM and for the future study of organisational learning through AR. The conclusions of the work are of practical use to managers in a variety of organisations and will inform academic research into cognate disciplines using the AR process. Journal: European Journal of Information Systems Pages: 761-770 Issue: 6 Volume: 16 Year: 2007 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000720 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000720 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:6:p:761-770 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933989_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Hanifa Shah Author-X-Name-First: Hanifa Author-X-Name-Last: Shah Author-Name: Alan Eardley Author-X-Name-First: Alan Author-X-Name-Last: Eardley Author-Name: Trevor Wood-Harper Author-X-Name-First: Trevor Author-X-Name-Last: Wood-Harper Title: ALTAR in action: knowledge management Abstract: This paper describes the knowledge management (KM) aspects of an action research (AR) project that took place in a large U.K. manufacturing organisation, Britvic Soft Drinks Ltd. The ALTAR (Achieving Learning Through Action Research) approach described in an earlier paper was developed through the KM project described in this paper. The ALTAR approach was intended to facilitate organisational learning and academic research and the study involved a number of AR cycles at different levels of the collaborating organisation. Theoretical concepts were taken from the academic literature and were developed for practical use and fed back into the academic research. The knowledge value chain, in particular, helped the organisation to focus on the essential aspects of KM. The research-led thinking was useful in helping Britvic staff to define and understand the importance of knowledge, to identify what knowledge assets they owned and to understand how that knowledge could be harnessed. The research facilitated individuals' understanding of how better to access the knowledge of others and to share their own knowledge to benefit the whole organisation. From an academic point of view, the AR project facilitated academic research, stimulated organisational change and learning provided useful material for research outputs, teaching and learning and promoted future research opportunities. Journal: European Journal of Information Systems Pages: 771-779 Issue: 6 Volume: 16 Year: 2007 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000721 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000721 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:6:p:771-779 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933990_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ray J Paul Author-X-Name-First: Ray J Author-X-Name-Last: Paul Title: Time for a change Journal: European Journal of Information Systems Pages: 667-668 Issue: 6 Volume: 16 Year: 2007 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000722 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000722 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:6:p:667-668 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933991_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jo Hanisch Author-X-Name-First: Jo Author-X-Name-Last: Hanisch Author-Name: Brian Corbitt Author-X-Name-First: Brian Author-X-Name-Last: Corbitt Title: Impediments to requirements engineering during global software development Abstract: Developing software when team members are located in widely distributed geographic locations poses many challenges for developers, particularly during the requirements engineering (RE) phase. Using a case study of a large software development project with users located in the UK and software developers from an international software house based in New Zealand, the paper argues that while global RE using electronic communication media may be desirable in achieving economy of resources, social and cultural aspects of RE need to be considered so that lasting relationships with clients may be formed, and RE activities achieved. The main impediments to the process of RE during global software development are communication resulting from differences in shared meanings and context associated with the following: distribution of the clients and the development team; distribution of the development team; cultural differences between the clients and the development team; and cultural differences among the development team. Journal: European Journal of Information Systems Pages: 793-805 Issue: 6 Volume: 16 Year: 2007 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000723 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000723 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:6:p:793-805 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933992_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Chad Lin Author-X-Name-First: Chad Author-X-Name-Last: Lin Author-Name: Yu-An Huang Author-X-Name-First: Yu-An Author-X-Name-Last: Huang Author-Name: Janice Burn Author-X-Name-First: Janice Author-X-Name-Last: Burn Title: Realising B2B e-commerce benefits: the link with IT maturity, evaluation practices, and B2BEC adoption readiness Abstract: Actual realisation of business-to-business electronic commerce (B2B e-commerce) benefits from IT investments has been a critical issue for large organisations. However, relatively little research has been undertaken to determine the drivers for realising B2B e-commerce benefits within these organisations. A survey research was conducted to examine the relationships between B2B e-commerce benefits, IT investment evaluation methodologies (IEM), IT benefit realisation processes (BRP), B2B e-commerce adoption readiness, and IT maturity in large Australian organisations. An IT investment management model was developed to test these relationships. The results had empirically validated the model and indicate that a higher level of BRP adoption and increased level of B2B e-commerce adoption readiness had a significant direct relationship with B2B e-commerce benefits. In addition, the level of B2B e-commerce adoption readiness, and the level of IEM and BRP adoption were significantly influenced by the level of IT maturity. However, the use of IEM alone had only an indirect positive influence on B2B e-commerce benefits through the higher level of BRP adoption and increased level of B2B e-commerce adoption readiness. Journal: European Journal of Information Systems Pages: 806-819 Issue: 6 Volume: 16 Year: 2007 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000724 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000724 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:6:p:806-819 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933993_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Melissa Cole Author-X-Name-First: Melissa Author-X-Name-Last: Cole Author-Name: David Avison Author-X-Name-First: David Author-X-Name-Last: Avison Title: The potential of hermeneutics in information systems research Abstract: This paper puts forward a case for using hermeneutics in information systems (IS) research. Unlike case study and action research, which could now be described as ‘mainstream’ interpretive research in IS, hermeneutics is neither well accepted nor much practiced in IS research. A suitable hermeneutic approach is described in detail. A brief account of hermeneutics in action is provided through a description of research investigating notions of convenience in home Internet shopping. The hermeneutic circle enabled the researcher to reveal unexpectedly the practice of using surrogates in Internet shopping and this example illustrates some of the potential of the approach in IS research. Journal: European Journal of Information Systems Pages: 820-833 Issue: 6 Volume: 16 Year: 2007 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000725 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000725 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:6:p:820-833 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934031_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Steven Alter Author-X-Name-First: Steven Author-X-Name-Last: Alter Title: Defining information systems as work systems: implications for the IS field Abstract: The lack of an agreed upon definition of information system (IS) is one of many obstacles troubling the academic IS discipline. After listing a number of definitions of IS, this paper defines IS as a special case of work system as defined in Alter (1999a). This definition has many desirable characteristics: it is easy to understand; differentiates IS from information technology (IT); covers totally manual, partially automated, and totally automated ISs; links to a life cycle model that generates many insights about development and implementation problems; provides a simple guideline that helps in interpreting common IS/IT jargon; and has other useful implications related to IS concepts, IS terminology, and the analysis and design of ISs. The paper presents the proposed IS definition and evaluates the definition in terms of simplicity, clarity, scope, systematic power, explanatory power, validity, reliability, and fruitfulness. An Appendix summarizes previously published concepts and two frameworks that flow from the proposed definition and are useful for appreciating many points in the evaluation section. Journal: European Journal of Information Systems Pages: 448-469 Issue: 5 Volume: 17 Year: 2008 Month: 10 X-DOI: 10.1057/ejis.2008.37 File-URL: http://hdl.handle.net/10.1057/ejis.2008.37 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:5:p:448-469 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934032_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Kevin Williams Author-X-Name-First: Kevin Author-X-Name-Last: Williams Author-Name: Samir Chatterjee Author-X-Name-First: Samir Author-X-Name-Last: Chatterjee Author-Name: Matti Rossi Author-X-Name-First: Matti Author-X-Name-Last: Rossi Title: Design of emerging digital services: a taxonomy Abstract: There has been a gigantic shift from a product based economy to one based on services, specifically digital services. From every indication it is likely to be more than a passing fad and the changes these emerging digital services represent will continue to transform commerce and have yet to reach market saturation. Digital services are being designed for and offered to users, yet very little is known about the design process that goes behind these developments. Is there a science behind designing digital services? By examining 12 leading digital services, we have developed a design taxonomy to be able to classify and contrast digital services. What emerged in the taxonomy were two broad dimensions; a set of fundamental design objectives and a set of fundamental service provider objectives. This paper concludes with an application of the proposed taxonomy to three leading digital services. We hope that the proposed taxonomy will be useful in understanding the science behind the design of digital services. Journal: European Journal of Information Systems Pages: 505-517 Issue: 5 Volume: 17 Year: 2008 Month: 10 X-DOI: 10.1057/ejis.2008.38 File-URL: http://hdl.handle.net/10.1057/ejis.2008.38 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:5:p:505-517 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934033_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Karthikeyan Umapathy Author-X-Name-First: Karthikeyan Author-X-Name-Last: Umapathy Author-Name: Sandeep Purao Author-X-Name-First: Sandeep Author-X-Name-Last: Purao Author-Name: Russell R Barton Author-X-Name-First: Russell R Author-X-Name-Last: Barton Title: Designing enterprise integration solutions: effectively Abstract: The design of large and complex enterprise integration solutions is a difficult task. It can require solutions that are unique because of constraints from the current set of legacy applications. Design knowledge for enterprise integration solutions is, therefore, difficult to articulate and reuse. In particular, the nature and form of knowledge for conceptual design of integration solutions is difficult to pin down. In this paper, we investigate whether design knowledge for enterprise integration in the form of patterns can be reused to develop systems integration solutions, and whether such reuse leads to more effective design outcomes. The research follows design science guidelines in which we describe a research artifact, and evaluate it to assess whether it meets the intended goals. The results indicate that approaches to facilitate reuse of conceptual design knowledge are feasible in the domain of enterprise integration, and that such reuse does, in fact, lead to more effective design solutions. Journal: European Journal of Information Systems Pages: 518-527 Issue: 5 Volume: 17 Year: 2008 Month: 10 X-DOI: 10.1057/ejis.2008.39 File-URL: http://hdl.handle.net/10.1057/ejis.2008.39 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:5:p:518-527 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934034_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bill Kuechler Author-X-Name-First: Bill Author-X-Name-Last: Kuechler Author-Name: Vijay Vaishnavi Author-X-Name-First: Vijay Author-X-Name-Last: Vaishnavi Title: On theory development in design science research: anatomy of a research project Abstract: The common understanding of design science research in information systems (DSRIS) continues to evolve. Only in the broadest terms has there been consensus: that DSRIS involves, in some way, learning through the act of building. However, what is to be built – the definition of the DSRIS artifact – and how it is to be built – the methodology of DSRIS – has drawn increasing discussion in recent years. The relationship of DSRIS to theory continues to make up a significant part of the discussion: how theory should inform DSRIS and whether or not DSRIS can or should be instrumental in developing and refining theory. In this paper, we present the exegesis of a DSRIS research project in which creating a (prescriptive) design theory through the process of developing and testing an information systems artifact is inextricably bound to the testing and refinement of its kernel theory. Journal: European Journal of Information Systems Pages: 489-504 Issue: 5 Volume: 17 Year: 2008 Month: 10 X-DOI: 10.1057/ejis.2008.40 File-URL: http://hdl.handle.net/10.1057/ejis.2008.40 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:5:p:489-504 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934035_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Fergle D'Aubeterre Author-X-Name-First: Fergle Author-X-Name-Last: D'Aubeterre Author-Name: Rahul Singh Author-X-Name-First: Rahul Author-X-Name-Last: Singh Author-Name: Lakshmi Iyer Author-X-Name-First: Lakshmi Author-X-Name-Last: Iyer Title: Secure activity resource coordination: empirical evidence of enhanced security awareness in designing secure business processes Abstract: Systems development methodologies incorporate security requirements as an afterthought in the non-functional requirements of systems. The lack of appropriate access control on information exchange among business activities can leave organizations vulnerable to information assurance threats. The gap between systems development and systems security leads to software development efforts that lack an understanding of security risks. We address the research question: how can we incorporate security as a functional requirement in the analysis and modeling of business processes? This study extends the Semantic approach to Secure Collaborative Inter-Organizational eBusiness Processes in D'Aubeterre et al. (2008). In this study, we develop the secure activity resource coordination (SARC) artifact for a real-world business process. We show how SARC can be used to create business process models characterized by the secure exchange of information within and across organizational boundaries. We present an empirical evaluation of the SARC artifact against the Enriched-Use Case (Siponen et al., 2006) and standard UML-Activity Diagram to demonstrate the utility of the proposed design method. Journal: European Journal of Information Systems Pages: 528-542 Issue: 5 Volume: 17 Year: 2008 Month: 10 X-DOI: 10.1057/ejis.2008.42 File-URL: http://hdl.handle.net/10.1057/ejis.2008.42 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:5:p:528-542 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934036_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ivan Aaen Author-X-Name-First: Ivan Author-X-Name-Last: Aaen Title: Essence: facilitating software innovation Abstract: This paper suggests ways to facilitate creativity and innovation in software development. The paper applies four perspectives – Product, Project, Process, and People – to identify an outlook for software innovation. The paper then describes a new facility – Software Innovation Research Lab (SIRL) – and a new method concept for software innovation – Essence – based on views, modes, and team roles. Finally, the paper reports from an early experiment using SIRL and Essence and identifies further research. Journal: European Journal of Information Systems Pages: 543-553 Issue: 5 Volume: 17 Year: 2008 Month: 10 X-DOI: 10.1057/ejis.2008.43 File-URL: http://hdl.handle.net/10.1057/ejis.2008.43 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:5:p:543-553 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934037_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Robert Winter Author-X-Name-First: Robert Author-X-Name-Last: Winter Title: Design science research in Europe Journal: European Journal of Information Systems Pages: 470-475 Issue: 5 Volume: 17 Year: 2008 Month: 10 X-DOI: 10.1057/ejis.2008.44 File-URL: http://hdl.handle.net/10.1057/ejis.2008.44 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:5:p:470-475 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934038_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Richard Baskerville Author-X-Name-First: Richard Author-X-Name-Last: Baskerville Title: What design science is not Journal: European Journal of Information Systems Pages: 441-443 Issue: 5 Volume: 17 Year: 2008 Month: 10 X-DOI: 10.1057/ejis.2008.45 File-URL: http://hdl.handle.net/10.1057/ejis.2008.45 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:5:p:441-443 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934039_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Judith Weedman Author-X-Name-First: Judith Author-X-Name-Last: Weedman Title: Client as designer in collaborative design science research projects: what does social science design theory tell us? Abstract: This paper reports a study of a design science research project in which researchers in computer science and earth science collaborated to attack a looming problem in the earth sciences – the need to analyze data of different types (satellite data at various resolutions, text, raster, and vector). The motivations of the two partners appeared complementary – the computer scientists needed a hard problem to solve to focus their research, and the earth scientists had a hard problem in need of solution. This study uses theory and research on design from the social sciences to explore the experience of users who are included as partners in a design project. It finds that it is very difficult for a client partner to enter the ‘design world’ as full collaborators. Journal: European Journal of Information Systems Pages: 476-488 Issue: 5 Volume: 17 Year: 2008 Month: 10 X-DOI: 10.1057/ejis.2008.46 File-URL: http://hdl.handle.net/10.1057/ejis.2008.46 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:5:p:476-488 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934040_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ray J Paul Author-X-Name-First: Ray J Author-X-Name-Last: Paul Title: The only duty we owe to history is to rewrite it: reflections on Bob Galliers’ article ‘A discipline for a stage?’ Abstract: In an opinion paper in the preceding issue of the European Journal of Information Systems, history is used to illustrate some differences in the research plot and performance of the Information Systems field. In this response, history is rewritten to show that the differences are natural, even to be welcomed, and that an understanding of their origins is sufficient for peace to break out and for harmony to be the natural state. Journal: European Journal of Information Systems Pages: 444-447 Issue: 5 Volume: 17 Year: 2008 Month: 10 X-DOI: 10.1057/ejis.2008.47 File-URL: http://hdl.handle.net/10.1057/ejis.2008.47 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:5:p:444-447 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933878_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Gamel O Wiredu Author-X-Name-First: Gamel O Author-X-Name-Last: Wiredu Author-Name: Carsten Sørensen Author-X-Name-First: Carsten Author-X-Name-Last: Sørensen Title: The dynamics of control and mobile computing in distributed activities Abstract: Mobile technologies are increasingly finding a place in a multitude of organisational settings. As they are intimately associated with the individuals carrying them, they can potentially play a significant role in the remote control of activities. The aim of this paper is to analyse how the balance of control between local and remote authorities shapes the use of mobile technology in a distributed activity. Based on 1-year action research study of work-integrated learning within a British National Health Service (NHS) project, we discuss the use of mobile technology as a function of control and human mobility. The aim of the project was to pilot the establishment of a new NHS profession, the Perioperative Specialist Practitioner (PSP). The article explores how the contradicting goals of the London-based project management team and of the everyday activities of the surgical teams across Great Britain hosting the PSP trainees critically shaped the unsuccessful use of mobile technology in the project. Based on a theoretical analysis using Activity Theory we outline four analytical categories of local-remote control configurations; (1) territorial dispute; (2) strong local control; (3) strong remote control; and (4) shared harmonious control. We apply these in a discussion of how the use of mobile technology is shaped by contradicting or harmonious motives between object and advanced activities. Journal: European Journal of Information Systems Pages: 307-319 Issue: 3 Volume: 15 Year: 2006 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000577 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000577 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:3:p:307-319 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933879_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Geoff Walsham Author-X-Name-First: Geoff Author-X-Name-Last: Walsham Title: Doing interpretive research Abstract: Interpretive research in information systems (IS) is now a well-established part of the field. However, there is a need for more material on how to carry out such work from inception to publication. I published a paper a decade ago (Walsham, 1995) which addressed the nature of interpretive IS case studies and methods for doing such research. The current paper extends this earlier contribution, with a widened scope of all interpretive research in IS, and through further material on carrying out fieldwork, using theory and analysing data. In addition, new topics are discussed on constructing and justifying a research contribution, and on ethical issues and tensions in the conduct of interpretive work. The primary target audience for the paper is less-experienced IS researchers, but I hope that the paper will also stimulate reflection for the more-experienced IS researcher and be of relevance to interpretive researchers in other social science fields. Journal: European Journal of Information Systems Pages: 320-330 Issue: 3 Volume: 15 Year: 2006 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000589 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000589 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:3:p:320-330 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933880_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ned Kock Author-X-Name-First: Ned Author-X-Name-Last: Kock Author-Name: Gary S Lynn Author-X-Name-First: Gary S Author-X-Name-Last: Lynn Author-Name: Kevin E Dow Author-X-Name-First: Kevin E Author-X-Name-Last: Dow Author-Name: Ali E Akgün Author-X-Name-First: Ali E Author-X-Name-Last: Akgün Title: Team adaptation to electronic communication media: evidence of compensatory adaptation in new product development teams Abstract: Prior research on the use of electronic communication media by teams performing complex tasks has led to contradictory findings. Much research has suggested that electronic communication media, due to not incorporating important elements found in face-to-face communication, pose obstacles for communication in comparison with the face-to-face medium. On the other hand, research has also suggested that teams interacting primarily electronically could perform quite well, sometimes even better, than face-to-face teams. A new theoretical framework, which builds on the notion of compensatory adaptation, has recently been advanced to explain these contradictory findings, arguing that (a) electronic communication media do pose obstacles to communication, and (b) individuals working in teams often compensate for obstacles posed by electronic communication media, which sometimes leads to team outcomes that are just as good or even better than those achieved by similar groups interacting primarily face-to-face. This study tests compensatory adaptation theory through a survey of 462 new product development teams, and finds general support for the theory. Important implications for research and practice are also discussed. Journal: European Journal of Information Systems Pages: 331-341 Issue: 3 Volume: 15 Year: 2006 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000612 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000612 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:3:p:331-341 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933881_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Hans van der Heijden Author-X-Name-First: Hans Author-X-Name-Last: van der Heijden Author-Name: Iris Junglas Author-X-Name-First: Iris Author-X-Name-Last: Junglas Title: Introduction to the special issue on mobile user behaviour Journal: European Journal of Information Systems Pages: 249-251 Issue: 3 Volume: 15 Year: 2006 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000613 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000613 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:3:p:249-251 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933882_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Catherine A Middleton Author-X-Name-First: Catherine A Author-X-Name-Last: Middleton Author-Name: Wendy Cukier Author-X-Name-First: Wendy Author-X-Name-Last: Cukier Title: Is mobile email functional or dysfunctional? Two perspectives on mobile email usage Abstract: This paper offers a study of contradiction in the usage of mobile email. Using qualitative data, the paper identifies mobile email usage patterns that are dangerous, distracting, anti-social and that infringe on work-life boundaries. Mobile email users were forthcoming in describing these dysfunctional usage patterns, but they made a convincing argument that their mobile devices are highly functional and allow them to be efficient, to multitask without disruption to others, and to respond immediately to messages, as well as offering them the freedom to work from anywhere. These dual perspectives on mobile email (dys)functionality are explored through a metaphorical lens, showing how organisational cultures can reinforce the functional perspective while simultaneously suppressing the dysfunctional view. It is argued that it is important to understand and explore the dysfunctional perspective of mobile email adoption. The paper concludes with a series of questions that challenge organisations to reflect critically on their assumptions about mobile email usage. Journal: European Journal of Information Systems Pages: 252-260 Issue: 3 Volume: 15 Year: 2006 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000614 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000614 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:3:p:252-260 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933883_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Rens Scheepers Author-X-Name-First: Rens Author-X-Name-Last: Scheepers Author-Name: Helana Scheepers Author-X-Name-First: Helana Author-X-Name-Last: Scheepers Author-Name: Ojelanki K Ngwenyama Author-X-Name-First: Ojelanki K Author-X-Name-Last: Ngwenyama Title: Contextual influences on user satisfaction with mobile computing: findings from two healthcare organizations Abstract: Mobile information technologies (IT) are transforming individual work practices and organizations. These devices are extending not only the boundaries of the ‘office’ in space and time, but also the social context within which use occurs. In this paper, we investigate how extra-organizational influences can impact user satisfaction with mobile systems. The findings from our longitudinal study highlight the interrelatedness of different use contexts and their importance in perceptions of user satisfaction. The data indicate that varying social contexts of individual use (individual as employee, as professional, as private user, and as member of society) result in different social influences that affect the individual's perceptions of user satisfaction with the mobile technology. While existing theories explain user satisfaction with IT within the organizational context, our findings suggest that future studies of mobile IT in organizations should accommodate such extra-organizational contextual influences. Journal: European Journal of Information Systems Pages: 261-268 Issue: 3 Volume: 15 Year: 2006 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000615 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000615 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:3:p:261-268 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933884_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: C Ranganathan Author-X-Name-First: C Author-X-Name-Last: Ranganathan Author-Name: DongBack Seo Author-X-Name-First: DongBack Author-X-Name-Last: Seo Author-Name: Yair Babad Author-X-Name-First: Yair Author-X-Name-Last: Babad Title: Switching behavior of mobile users: do users' relational investments and demographics matter? Abstract: Mobile user switching has become a critical issue facing mobile service providers. This study examines the switching behavior of mobile users who are not under any contractual obligations to stay with a provider. Drawing upon the literature on relationship marketing and switching costs, we examine if the relational investments made by mobile users in a user-provider relationship and demographics influence their switching behavior. Based on data on over 30,590 mobile users, we examine our research questions. Statistical analysis supports significant associations between mobile users' service usage, service bundling and their switching behavior. Support was also found for the influence of age and gender on mobile user switching. Journal: European Journal of Information Systems Pages: 269-276 Issue: 3 Volume: 15 Year: 2006 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000616 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000616 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:3:p:269-276 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933885_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Elpida Prasopoulou Author-X-Name-First: Elpida Author-X-Name-Last: Prasopoulou Author-Name: Athanasia Pouloudi Author-X-Name-First: Athanasia Author-X-Name-Last: Pouloudi Author-Name: Niki Panteli Author-X-Name-First: Niki Author-X-Name-Last: Panteli Title: Enacting new temporal boundaries: the role of mobile phones Abstract: This paper examines how the use of mobile phones influences the temporal boundaries that people enact in order to regulate and coordinate their work and non-work activities. We investigate both the structural and interpretive aspects of socio-temporal order, so as to gain a fuller appreciation of the changes induced by the use of mobile phones. With specific reference to professionals working in traditional, physically based and hierarchically structured organizations, we found that mobile phone users are becoming more vulnerable to organizational claims and that as a result ‘the office’ is always present as professionals, because of the use of mobile phones, become available ‘anytime’. This is enabled by the characteristics of the technology itself but also by users’ own behaviour. In the paper, we discuss the properties of the emerging socio-temporal order and show how mobile phones may render the management of the social spheres in which professionals participate more challenging. Journal: European Journal of Information Systems Pages: 277-284 Issue: 3 Volume: 15 Year: 2006 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000617 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000617 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:3:p:277-284 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933886_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jennifer Blechar Author-X-Name-First: Jennifer Author-X-Name-Last: Blechar Author-Name: Ioanna D Constantiou Author-X-Name-First: Ioanna D Author-X-Name-Last: Constantiou Author-Name: Jan Damsgaard Author-X-Name-First: Jan Author-X-Name-Last: Damsgaard Title: Exploring the influence of reference situations and reference pricing on mobile service user behaviour Abstract: Despite widespread proliferation of mobile devices providing access to a variety of advanced and data-rich services, adoption of those services remains low in most of the Western world. Thus, research related to the acceptance and use of mobile technology and services continues to develop. Traditional research in this domain has been useful for exploring adoption and use related to individual technologies or novel services. However, our research efforts indicate that users often reflect on former experiences with similar technologies or services when choosing mobile services. This suggests that when exploring mobile service usage decisions, focus cannot be placed on mobile services alone. Through two longitudinal field studies conducted in Denmark during 2004 and 2005, this article further explores the manner in which users' choices of mobile services are influenced by their reference situations and reference prices. The article suggests that users cognitive referencing is an influential factor that must be considered when exploring their usage behaviour in the mobile services market. Journal: European Journal of Information Systems Pages: 285-291 Issue: 3 Volume: 15 Year: 2006 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000618 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000618 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:3:p:285-291 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933887_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Robin L Wakefield Author-X-Name-First: Robin L Author-X-Name-Last: Wakefield Author-Name: Dwayne Whitten Author-X-Name-First: Dwayne Author-X-Name-Last: Whitten Title: Mobile computing: a user study on hedonic/utilitarian mobile device usage Abstract: Intrinsic motivators of technology beliefs have received scant attention in the technology acceptance literature despite indications of their efficacy. This study uses the framework of TAM to explore the effect of intrinsic variables on technology beliefs and user behavior. Specifically, we examine the effect of cognitive absorption and playfulness on user beliefs including perceived enjoyment and perceived usefulness within the context of mobile devices. Moreover, we manipulate the hedonic and utilitarian purpose of the mobile device to determine how the nature of the device influences user beliefs. Findings indicate that cognitive absorption and user playfulness significantly impact beliefs and that the hedonic or utilitarian orientation of the technology has implications for maximizing use. Journal: European Journal of Information Systems Pages: 292-300 Issue: 3 Volume: 15 Year: 2006 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000619 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000619 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:3:p:292-300 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933888_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Elaine Ferneley Author-X-Name-First: Elaine Author-X-Name-Last: Ferneley Author-Name: Ben Light Author-X-Name-First: Ben Author-X-Name-Last: Light Title: Secondary user relations in emerging mobile computing environments Abstract: Mobile technologies are enabling access to information in diverse environments, and are exposing a wider group of individuals to said technology. Therefore, this paper proposes that a wider view of user relations than is usually considered in information systems research is required. Specifically, we examine the potential effects of emerging mobile technologies on end-user relations with a focus on the ‘secondary user’, those who are not intended to interact directly with the technology but are intended consumers of the technology's output. For illustration, we draw on a study of a U.K. regional Fire and Rescue Service and deconstruct mobile technology use at Fire Service incidents. Our findings provide insights, which suggest that, because of the nature of mobile technologies and their context of use, secondary user relations in such emerging mobile environments are important and need further exploration. Journal: European Journal of Information Systems Pages: 301-306 Issue: 3 Volume: 15 Year: 2006 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000620 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000620 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:3:p:301-306 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933889_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: David Avison Author-X-Name-First: David Author-X-Name-Last: Avison Author-Name: Guy Fitzgerald Author-X-Name-First: Guy Author-X-Name-Last: Fitzgerald Author-Name: Philip Powell Author-X-Name-First: Philip Author-X-Name-Last: Powell Title: An opportunity for editors of I.S. journals to relate their experiences and offer advice. The editorial view of David Avison Guy Fitzgerald and Philip Powell, Editors: of the Information Systems Journal: Second in a series Journal: European Journal of Information Systems Pages: 241-243 Issue: 3 Volume: 15 Year: 2006 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000625 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000625 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:3:p:241-243 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933890_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Frantz Rowe Author-X-Name-First: Frantz Author-X-Name-Last: Rowe Title: An opportunity for editors of I.S. Journals to relate their experiences and offer advice. The editorial view of Frantz Rowe, Editor in Chief: of Systèmes d’Information et Management. Third in a series – On dissemination, national language and interacting with practitioners Journal: European Journal of Information Systems Pages: 244-248 Issue: 3 Volume: 15 Year: 2006 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000626 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000626 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:3:p:244-248 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933891_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ray J Paul Author-X-Name-First: Ray J Author-X-Name-Last: Paul Title: Views, change and changing views Journal: European Journal of Information Systems Pages: 239-240 Issue: 3 Volume: 15 Year: 2006 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000627 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000627 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:3:p:239-240 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933701_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: C-P Wei Author-X-Name-First: C-P Author-X-Name-Last: Wei Author-Name: P J Hu Author-X-Name-First: P J Author-X-Name-Last: Hu Author-Name: Y-X Dong Author-X-Name-First: Y-X Author-X-Name-Last: Dong Title: Managing document categories in e-commerce environments: an evolution-based approach Abstract: Management of textual documents obtained from various online sources represents a challenge in emerging e-commerce environments, where individuals and organisations have to perform continual surveillance of important events or trends pertinent to multiple topic areas of interest. Observations of textual document management by individuals and organisations have suggested the popularity of using categories to organise, archive and access documents. The sheer volume and availability of documents obtained from the internet make manual document-category management prohibitively tedious, if practicable or effective at all. An automated approach underpinned by appropriate artificial intelligence techniques has potential for solving this problem. In this vein, a critical challenge is the preservation of the user's perspective on semantic coherence in different documents and thus supports his or her preferred practice for document groupings. Motivated by the significance of, and the need for automated document-category management, the current research proposed and experimentally examined an evolution-based approach for supporting user-centric document-category management in e-commerce environments. Specifically, we designed and implemented the Category Evolution (CE) technique, capable of supporting personalised document-category management by taking into account categories previously established by the user. Our evaluation results suggest that CE exhibited satisfactory effectiveness and reasonable robustness in different scenarios and achieved a performance level better than that recorded by the benchmark technique using complete category discovery. Journal: European Journal of Information Systems Pages: 208-222 Issue: 3 Volume: 11 Year: 2002 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000429 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000429 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:11:y:2002:i:3:p:208-222 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933702_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: J J Jahng Author-X-Name-First: J J Author-X-Name-Last: Jahng Author-Name: H Jain Author-X-Name-First: H Author-X-Name-Last: Jain Author-Name: K Ramamurthy Author-X-Name-First: K Author-X-Name-Last: Ramamurthy Title: Personality traits and effectiveness of presentation of product information in e-business systems Abstract: Consumer interaction with product information is one of the critical components in business-to-consumer (B2C) e-commerce environments. Online consumers' characteristics can be expected to play an important role when designing how product information is presented in such e-commerce environments. We suggest that online consumers' personality traits impact effectiveness of the presentation of product information on e-commerce sites and the extent to which the various e-commerce environments are effective. In this article, we propose and empirically validate relationships among online consumers' personality traits, product information presentation richness and on-line consumer behaviour in e-commerce environments. Results show that effectiveness of product information presentation varies by online consumers' psychological types, and that rich product information presentation significantly influences the online buying behaviour of intuitive types, and feeling types, rather than sensing and thinking types. Discussion of the results and their implications for theory and practice as well as limitations and future research directions are presented. Journal: European Journal of Information Systems Pages: 181-195 Issue: 3 Volume: 11 Year: 2002 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000431 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000431 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:11:y:2002:i:3:p:181-195 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933703_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: A M Aladwani Author-X-Name-First: A M Author-X-Name-Last: Aladwani Title: The development of two tools for measuring the easiness and usefulness of transactional Web sites Abstract: The worldwide diffusion of Electronic Commerce shifts the exchange relationship between buyers and sellers from the face-to-face model to the face-to-screen model; and it is, therefore, important for organisations to consider the Web attributes that attract users. Yet, conceptualising, empirically testing, and refining tools for measuring the easiness and usefulness of transactional Web sites are lacking. The present study tries to fill this gap in the literature by describing the development of two tools for measuring perceived easiness and usefulness in a Web context. The findings of exploratory and confirmatory factor analyses reveal that the two instruments demonstrate sound measurement properties and would be useful to organisations interested in setting up an electronic business, and to scholars interested in Web research. Journal: European Journal of Information Systems Pages: 223-234 Issue: 3 Volume: 11 Year: 2002 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000432 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000432 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:11:y:2002:i:3:p:223-234 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933704_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Patrick Y K Chau Author-X-Name-First: Patrick Y K Author-X-Name-Last: Chau Title: For the Special Issue on ‘Personal Aspects of E-Business’ Journal: European Journal of Information Systems Pages: 179-180 Issue: 3 Volume: 11 Year: 2002 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000433 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000433 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:11:y:2002:i:3:p:179-180 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933705_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: S Rafaeli Author-X-Name-First: S Author-X-Name-Last: Rafaeli Author-Name: A Noy Author-X-Name-First: A Author-X-Name-Last: Noy Title: Online auctions, messaging, communication and social facilitation: a simulation and experimental evidence Abstract: This is a study of social facilitation effects in online auctions. We focus on the growth in online auctions, and the emergence of instant messaging and communication availability technologies. These two trends merge to provide a collaborative online social framework in which computer mediated communication may affect the behaviour of participants in online auctions. The interaction between buyers and sellers in traditional, face-to-face markets creates phenomena such as social facilitation, where the presence of others impacts behaviour and performance. In this study we attempt to replicate and measure social facilitation effects under the conditions of virtual presence. Does social facilitation apply to online auctions, and if so, how can it influence the design of online settings? We developed and used a simulated, Java-based Internet Dutch auction. Our findings indicate that social facilitation does indeed occur. In an experimental examination, participants improve their results and stay longer in the auction under conditions of higher virtual presence. Participants also indicate a preference for auction arrangements with higher degrees of virtual presence. Theoretically, this study contributes to the study of social facilitation, adding evidence of the effect when the presence is virtual. Journal: European Journal of Information Systems Pages: 196-207 Issue: 3 Volume: 11 Year: 2002 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000434 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000434 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:11:y:2002:i:3:p:196-207 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1627488_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Federica Ceci Author-X-Name-First: Federica Author-X-Name-Last: Ceci Author-Name: Andrea Masini Author-X-Name-First: Andrea Author-X-Name-Last: Masini Author-Name: Andrea Prencipe Author-X-Name-First: Andrea Author-X-Name-Last: Prencipe Title: Impact of IT offerings strategies and IT integration capability on IT vendor value creation Abstract: While IT integration is recognised as an important capability, the mechanisms through which it creates value and the contingencies that delimit its effectiveness are unclear – particularly, in the case of firms that deliver solutions embodying both products and services. We focus on IT vendors to investigate the effectiveness of IT integration capability with respect to three aspects of IT solution offerings: breadth, modularity and customisation. We find a complementarity effect between IT integration capability and management of the IT offer strategy: IT integration is fundamental regardless of whether the firm relies on customisation or a broad set of heterogeneous knowledge bases. However, when IT vendors adopt a modular design strategy, IT integration is made redundant and can be counterproductive. Journal: European Journal of Information Systems Pages: 591-611 Issue: 6 Volume: 28 Year: 2019 Month: 11 X-DOI: 10.1080/0960085X.2019.1627488 File-URL: http://hdl.handle.net/10.1080/0960085X.2019.1627488 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:6:p:591-611 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1627489_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: John Qi Dong Author-X-Name-First: John Qi Author-X-Name-Last: Dong Author-Name: Chia-Han Yang Author-X-Name-First: Chia-Han Author-X-Name-Last: Yang Title: Information technology and innovation outcomes: is knowledge recombination the missing link? Abstract: Firms’ use of information technology (IT) has been suggested to be an important enabler of knowledge production, leading to innovation outcomes in the form of patent inventions. However the innovation process through which IT use influences patent inventions is largely unclear. We draw on the knowledge recombination perspective and develop a model that explains the innovation process through which IT use influences innovation outcomes by looking into a firm’s efforts to recombine existing knowledge (i.e., knowledge recombinant intensity) and the scope of knowledge that is recombined by a firm (i.e., knowledge recombinant diversity). We also distinguish innovation outcomes in terms of patent quantity and quality. Using a large-scale panel dataset, we show that IT use has a stronger impact on knowledge recombinant intensity relative to knowledge recombinant diversity. Moreover, knowledge recombinant intensity and knowledge recombinant diversity play key mediating roles in the relationships between IT use and patent inventions. The impact of IT use on patent quantity is partially mediated, while the impact of IT use on patent quality is fully mediated. Our findings indicate that while IT use can directly affect patent quantity, its impact on patent quality must be channelled through a firm’s knowledge recombinant efforts and scope. Journal: European Journal of Information Systems Pages: 612-626 Issue: 6 Volume: 28 Year: 2019 Month: 11 X-DOI: 10.1080/0960085X.2019.1627489 File-URL: http://hdl.handle.net/10.1080/0960085X.2019.1627489 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:6:p:612-626 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1666038_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: David Gefen Author-X-Name-First: David Author-X-Name-Last: Gefen Author-Name: Ofir Ben-Assuli Author-X-Name-First: Ofir Author-X-Name-Last: Ben-Assuli Author-Name: Mark Stehr Author-X-Name-First: Mark Author-X-Name-Last: Stehr Author-Name: Bruce Rosen Author-X-Name-First: Bruce Author-X-Name-Last: Rosen Author-Name: Yaron Denekamp Author-X-Name-First: Yaron Author-X-Name-Last: Denekamp Title: Governmental intervention in Hospital Information Exchange (HIE) diffusion: a quasi-experimental ARIMA interrupted time series analysis of monthly HIE patient penetration rates Abstract: This study examines changes in the monthly penetration rates of a Health Information Exchange (HIE) in a large Health Maintenance Organisation (HMO) in Israel after its successful adoption, and how those rates changed in anticipation of a government policy to turn this HIE into a national system. Penetration rate is the proportion of patients whose data have been accessed through the HIE. We apply the Bass model to the penetration data and estimate an ARIMA interrupted time series analysis on the resulting dependent variable. In the Bass model, the diffusion of new products or services over time follows an S curve, where the proportion of non-users who take up the new technology is assumed to be a linear function of the proportion who are already users. The results indicate (1) that also HIE penetration shows a Bass model pattern, thus extending previous research that indicated that the adoption rate of an HIE (i.e. its initial installation) shows a Bass model pattern, and (2) that there was a significant one-time increase in penetration in this HMO when hospitals in other HMOs started training towards adopting this HIE in preparation for it becoming the national system. Implications are discussed. Journal: European Journal of Information Systems Pages: 627-645 Issue: 6 Volume: 28 Year: 2019 Month: 11 X-DOI: 10.1080/0960085X.2019.1666038 File-URL: http://hdl.handle.net/10.1080/0960085X.2019.1666038 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:6:p:627-645 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1669494_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jongwoo Kim Author-X-Name-First: Jongwoo Author-X-Name-Last: Kim Author-Name: Sunyoung Cho Author-X-Name-First: Sunyoung Author-X-Name-Last: Cho Author-Name: Balasubramaniam Ramesh Author-X-Name-First: Balasubramaniam Author-X-Name-Last: Ramesh Title: IT-leveraged network value cocreation: a case study of the value cocreation process and value capture in the South Korean broadcast advertising industry Abstract: Organisations operate in increasingly dynamic environments, internetworked in cooperative arrangements that cocreate value. They pursue the cocreation of value through collaborative networks, rather than in isolation. However, there is insufficient understanding of how networked organisations cocreate value in the network through the innovative use of information systems (IS): existing multi-firm studies are largely concerned with dyadic relationships. In terms of capturing value from the cocreation process, many studies have reported either enhanced organisational efficiencies (exploitative capability) or resulting innovations (explorative capability), but rarely both aspects simultaneously. This study attempts to draw a comprehensive picture of IS-based value leverage by reporting both the value cocreation process (network level) and value capture (organisational level) through a case study of innovative IS use in a large business network. This network links a public hub organisation with a large number of firms in the South Korean broadcast advertising industry. Drawing on Grover and Kohli’s framework for value cocreation, the case study investigates the detailed process by which network-level value cocreation occurs in the four layers of relational arrangements. It also highlights, from an organisational ambidexterity perspective, how the cocreated value is appropriated through ambidextrous activities by the networked organisations. Journal: European Journal of Information Systems Pages: 646-662 Issue: 6 Volume: 28 Year: 2019 Month: 11 X-DOI: 10.1080/0960085X.2019.1669494 File-URL: http://hdl.handle.net/10.1080/0960085X.2019.1669494 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:6:p:646-662 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1673972_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Palash Bera Author-X-Name-First: Palash Author-X-Name-Last: Bera Author-Name: Geert Poels Author-X-Name-First: Geert Author-X-Name-Last: Poels Title: How quickly do we learn conceptual models? Abstract: In organisations, conceptual models are used for understanding domain concepts. Learning the domain from models is crucial for the analysis and design of information systems that are intended to support the domain. Past research has proposed theories to structure conceptual models in order to improve learning. It has, however, never been investigated how quickly domain knowledge is acquired when using theory-guided conceptual models. Based on theoretical arguments, we hypothesise that theory-guided conceptual models expedite the initial stages of learning. Using the REA ontology pattern as an example of theoretical guidance, we show in a laboratory experiment how an eye-tracking procedure can be used to investigate the effect of using theory-guided models on the speed of learning. Whereas our experiment shows positive effects on both outcome and speed of learning in the initial stages of learning, the real contribution of our paper is methodological, i.e. an eye-tracking procedure to observe the process of learning from conceptual models. Journal: European Journal of Information Systems Pages: 663-680 Issue: 6 Volume: 28 Year: 2019 Month: 11 X-DOI: 10.1080/0960085X.2019.1673972 File-URL: http://hdl.handle.net/10.1080/0960085X.2019.1673972 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:6:p:663-680 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1673672_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Owen Eriksson Author-X-Name-First: Owen Author-X-Name-Last: Eriksson Author-Name: Paul Johannesson Author-X-Name-First: Paul Author-X-Name-Last: Johannesson Author-Name: Maria Bergholtz Author-X-Name-First: Maria Author-X-Name-Last: Bergholtz Title: The case for classes and instances - a response to representing instances: the case for reengineering conceptual modelling grammars Abstract: In “Representing instances: The case for reengineering conceptual modelling grammars”, Lukyanenko et al. (2019) argue that conceptual modelling has been biased towards a focus on knowledge about general phenomena (classes) rather than about specific instances. While we agree that more attention needs to be paid to instances, we critically reflect on their underlying assumptions about instances and classes. Lukyanenko et al. (2019) assume that instances are mainly material things, and also assume that class-based modelling typically requires that class definitions include comprehensive attribute structures that are expected to be stable over time. Based on these assumptions, they conclude that classes are not needed for modelling instances. As an alternative to these assumptions, we suggest that instances can be viewed as language constructs, i.e., as objects that may be anything that is uniquely referred to and identified in human communication. Based on this assumption, we introduce an identity-oriented view of classes, implying that classes are required for modelling objects (instances). We agree with Lukyanenko et al. (2019) that a reengineering of conceptual modelling grammars is required. This reengineering would benefit from approaches such as an identity-oriented view of classes and a class-instance modelling grammar. Journal: European Journal of Information Systems Pages: 681-693 Issue: 6 Volume: 28 Year: 2019 Month: 11 X-DOI: 10.1080/0960085X.2019.1673672 File-URL: http://hdl.handle.net/10.1080/0960085X.2019.1673672 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:6:p:681-693 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1470776_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Nik Rushdi Hassan Author-X-Name-First: Nik Rushdi Author-X-Name-Last: Hassan Author-Name: John Mingers Author-X-Name-First: John Author-X-Name-Last: Mingers Author-Name: Bernd Stahl Author-X-Name-First: Bernd Author-X-Name-Last: Stahl Title: Philosophy and information systems: where are we and where should we go? Journal: European Journal of Information Systems Pages: 263-277 Issue: 3 Volume: 27 Year: 2018 Month: 5 X-DOI: 10.1080/0960085X.2018.1470776 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1470776 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:3:p:263-277 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1436025_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mustapha Cheikh-Ammar Author-X-Name-First: Mustapha Author-X-Name-Last: Cheikh-Ammar Author-Name: Nik Rushdi Hassan Author-X-Name-First: Nik Rushdi Author-X-Name-Last: Hassan Author-Name: John Mingers Author-X-Name-First: John Author-X-Name-Last: Mingers Author-Name: Bernd Stah Author-X-Name-First: Bernd Author-X-Name-Last: Stah Title: The IT artifact and its spirit: a nexus of human values, affordances, symbolic expressions, and IT features Abstract: This article theorises the IT artifact using a new conceptualisation of IT Spirit that highlights the interrelationships between IT Features, Affordances, and Symbolic Expressions. Although these concepts have been discussed in the IS literature, researchers have mostly examined them independently. Drawing on the philosophical theories of Aristotle and Heidegger, this article discusses the “essence of technology” by conceptualising the IT artifact in terms of the intertwining relationships that exist between IT Features, their Symbolic Expressions, the Affordances connected to them at different levels of abstraction, and the Values that emerge from the enactment of their action possibilities within a user group. It is argued that these essential components of the IT artifact operate at variant levels of abstraction, instigate user sense-making, and subsequently form the overarching IT Spirit. The latter is presented as the incorporeal essence of a technology that shapes – and is itself shaped by – user sense-making and appropriation. With the emphasis that it gives to human values, the concept of IT Spirit offers researchers a high-level unit of analysis to tackle the IT artifact and a systematic framework that facilitates the identification of its prominent action possibilities. Journal: European Journal of Information Systems Pages: 278-294 Issue: 3 Volume: 27 Year: 2018 Month: 5 X-DOI: 10.1080/0960085X.2018.1436025 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1436025 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:3:p:278-294 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1435233_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Paul Beynon-Davies Author-X-Name-First: Paul Author-X-Name-Last: Beynon-Davies Author-Name: Nik Rushdi Hassan Author-X-Name-First: Nik Rushdi Author-X-Name-Last: Hassan Author-Name: John Mingers Author-X-Name-First: John Author-X-Name-Last: Mingers Author-Name: Bernd Stahl Author-X-Name-First: Bernd Author-X-Name-Last: Stahl Title: What’s in a face? Making sense of tangible information systems in terms of Peircean semiotics Abstract: Within this paper, we utilise a delimited area of philosophy to help make sense of a delimited area of design science as it pertains to a class of contemporary information systems. The philosophy is taken from that of Charles Sanders Peirce; the design science is directed at the construction of visual devices in that area known as visual management. The utilisation of such devices within their wider visual management systems we take to be instances of what we refer to as tangible information systems. Tangible information systems use tangible artefacts, such as whiteboards and magnetic tokens, to accomplish information. We particularly use Peircean semiotics to analyse the use of tangible emoticons articulated upon performance boards within a large-scale manufacturing facility. We infer from our analysis of these informative artefacts that certain integrated aspects of Peircean philosophy offers an alternative way of framing notions of a proper design science, design theory, and design artefact for the discipline of information systems. Journal: European Journal of Information Systems Pages: 295-314 Issue: 3 Volume: 27 Year: 2018 Month: 5 X-DOI: 10.1080/0960085X.2018.1435233 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1435233 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:3:p:295-314 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1435231_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Clay K. Williams Author-X-Name-First: Clay K. Author-X-Name-Last: Williams Author-Name: Donald E. Wynn Author-X-Name-First: Donald E. Author-X-Name-Last: Wynn Author-Name: Nik Rushdi Hassan Author-X-Name-First: Nik Rushdi Author-X-Name-Last: Hassan Author-Name: John Mingers Author-X-Name-First: John Author-X-Name-Last: Mingers Author-Name: Bernd Stahl Author-X-Name-First: Bernd Author-X-Name-Last: Stahl Title: A critical realist script for creative theorising in information systems Abstract: Research in information systems (IS) has been dominated by an epistemic script that leads to a variety of negative consequences related to the novelty, creativity, and nature of theory produced. While having matured as a field, theory and theorising in IS tend to lack diversity, struggle in balancing the role of reference theory and empirics, inadequately internalise the information technology (IT) artefact into theories developed, and lack clear relationships to what practitioners actually experience. Our premise is that critical realism (CR), based on specific ontological and epistemological foundations, affords the potential to establish alternative epistemic scripts that can enhance the theory product in IS research. We discuss the basic concepts of theory and theorising and relate these to the current state of theory developed in IS research. Next, we review the fundamental principles of CR and describe how a research script based on this philosophy of science addresses the negative consequences posed by the current dominant script. Lastly, we demonstrate the potential value of CR in terms of generating novel and substantive theory as manifest in two examples of published research that adopt the CR script. Journal: European Journal of Information Systems Pages: 315-325 Issue: 3 Volume: 27 Year: 2018 Month: 5 X-DOI: 10.1080/0960085X.2018.1435231 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1435231 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:3:p:315-325 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1473932_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Aurélie Leclercq-Vandelannoitte Author-X-Name-First: Aurélie Author-X-Name-Last: Leclercq-Vandelannoitte Author-Name: Emmanuel Bertin Author-X-Name-First: Emmanuel Author-X-Name-Last: Bertin Title: From sovereign IT governance to liberal IT governmentality? A Foucauldian analogy Abstract: Changes in the technological and societal environments that surround organisations have disrupted the classic governance frameworks that corporate and information technology (IT) managers have designed to align IT uses with organisational missions, strategy, and values. The formerly “sovereign territory” of IT departments has been invaded, jeopardised by the autonomy of individual users and the changing nature of IT. Thus questions of IT governance in the age of IT consumerisation are highly critical. In response, this theoretical article introduces an alternative approach, relying on the philosophy of Michel Foucault and his concept of governmentality. The proposed liberal model of IT governance provides a sound foundation to address the challenges associated with modern technological and societal environments in which today’s organisations must evolve. The inferences and analytic implications related to this new liberal model of IT governance lead to the development of a set of governance principles and propositions to guide practice and further research. Journal: European Journal of Information Systems Pages: 326-346 Issue: 3 Volume: 27 Year: 2018 Month: 5 X-DOI: 10.1080/0960085X.2018.1473932 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1473932 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:3:p:326-346 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1435229_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ojelanki Ngwenyama Author-X-Name-First: Ojelanki Author-X-Name-Last: Ngwenyama Author-Name: Stefan Klein Author-X-Name-First: Stefan Author-X-Name-Last: Klein Author-Name: Nik Rushdi Hassan Author-X-Name-First: Nik Rushdi Author-X-Name-Last: Hassan Author-Name: John Mingers Author-X-Name-First: John Author-X-Name-Last: Mingers Author-Name: Bernd Stahl Author-X-Name-First: Bernd Author-X-Name-Last: Stahl Title: Phronesis, argumentation and puzzle solving in IS research: illustrating an approach to phronetic IS research practice Abstract: The embedding of information systems (IS) infrastructure into everyday social activity is creating intractable value conflicts for society. However, IS research largely focuses on: (1) episteme, explanatory and predictive theories; and (2) techné, theories of action for implementation and management of IS technologies. Consequently, we lack applicable knowledge for deliberating about IS value conflicts. The third type of knowledge, phronesis, which Aristotle proposed to inform ethical application of episteme and techné, has not been given much attention in our discipline. Presently, we are experiencing a critical limitation in our capabilities for generating ethically applicable IS knowledge in the face of increasing value conflicts arising from pervasive digitalisation. In this paper, we introduce phronesis, discuss its philosophical foundations and illustrate an approach to phronetic enquiry into the underlying value conflicts of a failed national IS infrastructure project. Our aim is to strengthen and expand IS research methods for systematic critical enquiry into social-values dilemmas resulting from continued embedding of IS technologies into our social world. Journal: European Journal of Information Systems Pages: 347-366 Issue: 3 Volume: 27 Year: 2018 Month: 5 X-DOI: 10.1080/0960085X.2018.1435229 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1435229 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:3:p:347-366 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1435232_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mike Chiasson Author-X-Name-First: Mike Author-X-Name-Last: Chiasson Author-Name: Elizabeth Davidson Author-X-Name-First: Elizabeth Author-X-Name-Last: Davidson Author-Name: Jenifer Winter Author-X-Name-First: Jenifer Author-X-Name-Last: Winter Author-Name: Nik Rushdi Hassan Author-X-Name-First: Nik Rushdi Author-X-Name-Last: Hassan Author-Name: John Mingers Author-X-Name-First: John Author-X-Name-Last: Mingers Author-Name: Bernd Stahl Author-X-Name-First: Bernd Author-X-Name-Last: Stahl Title: Philosophical foundations for informing the future(S) through IS research Abstract: Information systems (IS) scholars have suggested IS researchers have a responsibility to consider how information and communication technologies could, in the future, influence sociotechnical practices and outcomes. However, research focused specifically on “the future” has yet to gain a strong foothold within the scholarly IS field. In this essay, we suggest a philosophical foundation and epistemological basis for futures-oriented research to advance such scholarship in the IS field. We first highlight epistemic assumptions about futures-oriented research drawn from the discourse of futures studies. We then draw on Feenberg’s philosophy of “potentiality and actuality” of technology as a foundation to consider how knowledge generated through IS research about the sociotechnical past and present might inform futures-oriented inquiry. We illustrate these arguments with examples from the emerging arena of “big data” research. Journal: European Journal of Information Systems Pages: 367-379 Issue: 3 Volume: 27 Year: 2018 Month: 5 X-DOI: 10.1080/0960085X.2018.1435232 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1435232 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:3:p:367-379 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1471789_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Frantz Rowe Author-X-Name-First: Frantz Author-X-Name-Last: Rowe Title: Being critical is good, but better with philosophy! From digital transformation and values to the future of IS research Journal: European Journal of Information Systems Pages: 380-393 Issue: 3 Volume: 27 Year: 2018 Month: 5 X-DOI: 10.1080/0960085X.2018.1471789 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1471789 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:3:p:380-393 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934308_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mikko Siponen Author-X-Name-First: Mikko Author-X-Name-Last: Siponen Author-Name: Anthony Vance Author-X-Name-First: Anthony Author-X-Name-Last: Vance Title: Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations Abstract: The information systems (IS) field continues to debate the relative importance of rigor and relevance in its research. While the pursuit of rigor in research is important, we argue that further effort is needed to improve practical relevance, not only in terms of topics, but also by ensuring contextual relevance. While content validity is often performed rigorously, validated survey instruments may still lack contextual relevance and be out of touch with practice. We argue that IS behavioral research can improve its practical relevance without loss of rigor by carefully addressing a number of contextual issues in instrumentation design. In this opinion article, we outline five guidelines – relating to both rigor and relevance – designed to increase the contextual relevance of field survey research, using case examples from the area of IS security. They are: (1) inform study respondents that a behavior is an ISP violation, (2) measure specific examples of ISP violations, (3) ensure that ISP violations are important ISP problems in practice, (4) ensure the applicability of IS security violations to the organizational context, and (5) consider the appropriate level of specificity and generalizability for instrumentation. We review previous behavioral research on IS security and show that no existing study meets more than three of these five guidelines. By applying these guidelines where applicable, IS scholars can increase the contextual relevance of their instrumentation, yielding results more likely to address important problems in practice. Journal: European Journal of Information Systems Pages: 289-305 Issue: 3 Volume: 23 Year: 2014 Month: 5 X-DOI: 10.1057/ejis.2012.59 File-URL: http://hdl.handle.net/10.1057/ejis.2012.59 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:3:p:289-305 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934309_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Anol Bhattacherjee Author-X-Name-First: Anol Author-X-Name-Last: Bhattacherjee Author-Name: Sang Cheol Park Author-X-Name-First: Sang Cheol Author-X-Name-Last: Park Title: Why end-users move to the cloud: a migration-theoretic analysis Abstract: This study presents and empirically validates a model of end-user migration from client-hosted computing to cloud computing. Synthesizing key findings from IT adoption and post-adoption research, switching research, and cloud computing studies, it builds an integrative framework of cloud migration using migration theory as a theoretical lens, and postulates interdependencies among these predictors. A longitudinal survey of Google Apps adoption among student subjects in South Korea validates our proposed model. This study contributes to our nascent body of knowledge on IT migration by drawing attention to this emerging phenomenon, demonstrating how migration research is different from IT adoption research, identifying salient factors that enable or hinder cloud migration, elaborating interdependencies between these different predictors, and bringing in migration theory as a referent theory to the information systems literature. Journal: European Journal of Information Systems Pages: 357-372 Issue: 3 Volume: 23 Year: 2014 Month: 5 X-DOI: 10.1057/ejis.2013.1 File-URL: http://hdl.handle.net/10.1057/ejis.2013.1 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:3:p:357-372 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934310_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Paul P Tallon Author-X-Name-First: Paul P Author-X-Name-Last: Tallon Title: Do you see what I see? The search for consensus among executives’ perceptions of IT business value Abstract: Since firms rarely collect data on the precise economic or financial impacts of information technology (IT), perceptions play a key role in assessing IT impacts. To the extent that executives in the same firm evaluate IT impacts similarly, it can be easier to approve future IT investments or to initiate corrective action for failing IT investments. In this study, we use distributed sensemaking theory to investigate the conditions under which executives will reach a consensus as to the extent and locus of firm and process-level IT impacts in their firm. Using data from surveys of 133 top-level business executives in 13 firms, we show that consensus is a function of CIO-led sensegiving in the form of IT promotion, CIO leadership, information systems (IS) engagement with end users, and IS-business communications. The absence of consensus – discord – suggests IS disengagement, a lack of effective CIO leadership, weak IT-business communications, and ineffective promotion of the role of IT. Sensegiving does not mean telling executives what to think about IT but rather how to think about IT and its impacts at various points within the firm. Whether IT impacts are rated high or low, efforts to create increased consensus among executives can greatly enhance value from IT. Journal: European Journal of Information Systems Pages: 306-325 Issue: 3 Volume: 23 Year: 2014 Month: 5 X-DOI: 10.1057/ejis.2013.2 File-URL: http://hdl.handle.net/10.1057/ejis.2013.2 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:3:p:306-325 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934311_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Marcus Keutel Author-X-Name-First: Marcus Author-X-Name-Last: Keutel Author-Name: Bjoern Michalik Author-X-Name-First: Bjoern Author-X-Name-Last: Michalik Author-Name: Janek Richter Author-X-Name-First: Janek Author-X-Name-Last: Richter Title: Towards mindful case study research in IS: a critical analysis of the past ten years Abstract: Case study research (CSR) has gained strong acceptance in information systems (IS) research in the recent decades. This article examines how CSR has been used in IS research practice. Contrasting the currently used CSR approaches to methodological prescriptions can lead to recommendations for researchers applying this research strategy as well as to advances in the methodological literature. Our study design comprises two steps. First, we identified case studies published in six major IS journals from 2001 to 2010. Second, we critically examined CSR practices in the identified studies. We observed a dualism, as CSR currently consists of a positivist and an equally strong interpretive research stream. Case studies with other philosophical underpinnings were rarely found. We describe the CSR practice and contrast it to the methodological prescriptions. Thereby, we clearly point out the shortcomings, aiming to initiate a debate on how our community should further develop its use of CSR to become more mindful. This study is the first broad examination of CSR in IS (focusing on more than just the positivist research stream) and thus contributes to the methodological literature by providing recommendations for improvements. Journal: European Journal of Information Systems Pages: 256-272 Issue: 3 Volume: 23 Year: 2014 Month: 5 X-DOI: 10.1057/ejis.2013.26 File-URL: http://hdl.handle.net/10.1057/ejis.2013.26 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:3:p:256-272 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934312_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Robert Wayne Gregory Author-X-Name-First: Robert Wayne Author-X-Name-Last: Gregory Author-Name: Mark Keil Author-X-Name-First: Mark Author-X-Name-Last: Keil Title: Blending bureaucratic and collaborative management styles to achieve control ambidexterity in IS projects Abstract: Managing information systems (IS) projects requires what we refer to as ‘control ambidexterity’, which is the use of different types of control to meet conflicting demands. This leads to the use of contrasting styles of IS project management and creates tensions in managerial practice, neither of which are well understood. We address this theoretical gap in our understanding based on an exploratory case study of an IS implementation project in the financial services industry. Adopting the lens of management styles as a meta-theoretical perspective, we sought to address two research questions: (1) Which management style(s) do IS project managers draw upon in practice and why? (2) What kinds of tensions result for IS project managers and team members from drawing upon contrasting management styles in combination – and how do IS project managers and team members deal with these tensions? Two contrasting styles of management emerged from our data – bureaucratic and collaborative – that are drawn upon by IS project managers to achieve control ambidexterity. Furthermore, drawing upon these two different styles in combination within the confines of a single project creates tensions. We explore these tensions and present an illustrative example of how IS project managers can deal with these tensions successfully in practice. Specifically, we find that they can be dealt with effectively by a tandem of two project managers who share responsibility for managing the IS project. The findings of this study have important implications for our understanding of control ambidexterity in IS projects. Journal: European Journal of Information Systems Pages: 343-356 Issue: 3 Volume: 23 Year: 2014 Month: 5 X-DOI: 10.1057/ejis.2013.3 File-URL: http://hdl.handle.net/10.1057/ejis.2013.3 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:3:p:343-356 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934313_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Yang Chen Author-X-Name-First: Yang Author-X-Name-Last: Chen Author-Name: Yi Wang Author-X-Name-First: Yi Author-X-Name-Last: Wang Author-Name: Saggi Nevo Author-X-Name-First: Saggi Author-X-Name-Last: Nevo Author-Name: Jiafei Jin Author-X-Name-First: Jiafei Author-X-Name-Last: Jin Author-Name: Luning Wang Author-X-Name-First: Luning Author-X-Name-Last: Wang Author-Name: Wing S Chow Author-X-Name-First: Wing S Author-X-Name-Last: Chow Title: IT capability and organizational performance: the roles of business process agility and environmental factors Abstract: The business value of information technology (IT) has been one of the top concerns of both practitioners and scholars for decades. Numerous studies have documented the positive effects of IT capability on organizational performance but our knowledge of the processes through which such gains are achieved remains limited due to a lack of focus on the business environment. Such a linkage therefore remains the subject of debate in the information systems literature. In this study, we fill this gap by investigating the mediating role of business process agility and the moderating roles of environmental factors. On the basis of matched survey data obtained from 214 IT and business executives from manufacturing firms in China, our analyses show that even though firm-wide IT capability presents the characteristics of rarity, appropriability, non-reproducibility, and non-substitutability, its impact on organizational performance is fully mediated by business process agility. Our results also show that the impact of the environment is multifaceted and nuanced. In particular, environmental hostility weakens the effect of IT capability on business process agility, while environmental complexity strengthens it. The theoretical and practical implications of this study, and its limitations, are also discussed. Journal: European Journal of Information Systems Pages: 326-342 Issue: 3 Volume: 23 Year: 2014 Month: 5 X-DOI: 10.1057/ejis.2013.4 File-URL: http://hdl.handle.net/10.1057/ejis.2013.4 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:3:p:326-342 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934314_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Kai Riemer Author-X-Name-First: Kai Author-X-Name-Last: Riemer Author-Name: Robert B Johnston Author-X-Name-First: Robert B Author-X-Name-Last: Johnston Title: Rethinking the place of the artefact in IS using Heidegger's analysis of equipment Abstract: The IT artefact, conceived as a bundle of features or properties, is frequently seen as the core object of interest in IS. We argue that this view of IT derives from a worldview that stresses a duality between the individual and the external world. Using a stylized account of an IT implementation project, we show how this worldview conditions the phenomena that show up as most central in the IS discipline and the way mainstream theories and research approaches make sense of these phenomena. Retelling the same story through the lens of Heidegger's analysis of equipment in Being and Time (1927/1962), we present an alternative conception of IT as equipment holistically interwoven with other equipment, user practices, and individual identities. This allows rethinking what are central and peripheral concepts and phenomena in the IS discipline, and outline implications of such a shift for IS theorising, research practice and design. Journal: European Journal of Information Systems Pages: 273-288 Issue: 3 Volume: 23 Year: 2014 Month: 5 X-DOI: 10.1057/ejis.2013.5 File-URL: http://hdl.handle.net/10.1057/ejis.2013.5 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:3:p:273-288 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934315_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Frantz Rowe Author-X-Name-First: Frantz Author-X-Name-Last: Rowe Title: What literature review is not: diversity, boundaries and recommendations Journal: European Journal of Information Systems Pages: 241-255 Issue: 3 Volume: 23 Year: 2014 Month: 5 X-DOI: 10.1057/ejis.2014.7 File-URL: http://hdl.handle.net/10.1057/ejis.2014.7 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:3:p:241-255 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1831834_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Likoebe M. Maruping Author-X-Name-First: Likoebe M. Author-X-Name-Last: Maruping Author-Name: Sabine Matook Author-X-Name-First: Sabine Author-X-Name-Last: Matook Title: The evolution of software development orchestration: current state and an agenda for future research Journal: European Journal of Information Systems Pages: 443-457 Issue: 5 Volume: 29 Year: 2020 Month: 09 X-DOI: 10.1080/0960085X.2020.1831834 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1831834 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:5:p:443-457 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1782277_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Anna Wiedemann Author-X-Name-First: Anna Author-X-Name-Last: Wiedemann Author-Name: Manuel Wiesche Author-X-Name-First: Manuel Author-X-Name-Last: Wiesche Author-Name: Heiko Gewald Author-X-Name-First: Heiko Author-X-Name-Last: Gewald Author-Name: Helmut Krcmar Author-X-Name-First: Helmut Author-X-Name-Last: Krcmar Title: Understanding how DevOps aligns development and operations: a tripartite model of intra-IT alignment Abstract: A top priority of organisations around the globe is to achieve IT-business alignment at all levels of the organisation. This paper addresses operational alignment within IT functions. Traditionally, IT functions are divided into highly independent subunits. In the face of pressure to adapt to rapidly changing customer demands and to manage increasingly complex IT architectures, many organisations have begun implementing joint, cross-functional DevOps teams, which integrate tasks, knowledge and skills pertaining to planning, building, and running software product activities. In this study, we examine eight cases of DevOps implementation. We apply grounded theory to identify three mechanisms comprising a tripartite model of intra-IT alignment: individual componentization, integrated responsibility, and multidisciplinary knowledge. Our model provides insights into how alignment between development and operations can be achieved in DevOps teams within the IT function. Journal: European Journal of Information Systems Pages: 458-473 Issue: 5 Volume: 29 Year: 2020 Month: 09 X-DOI: 10.1080/0960085X.2020.1782277 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1782277 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:5:p:458-473 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1782276_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Aymeric Hemon-Hildgen Author-X-Name-First: Aymeric Author-X-Name-Last: Hemon-Hildgen Author-Name: Frantz Rowe Author-X-Name-First: Frantz Author-X-Name-Last: Rowe Author-Name: Laetitia Monnier-Senicourt Author-X-Name-First: Laetitia Author-X-Name-Last: Monnier-Senicourt Title: Orchestrating automation and sharing in DevOps teams: a revelatory case of job satisfaction factors, risk and work conditions Abstract: Agile can be seen as an accelerator to develop software, yet it suffers from bottlenecks between development and operations. DevOps can overcome bottlenecks between agile development teams and operations, notably by providing continuous integration, delivery and deployment, thus improving end-to-end processes between development and operations functions. However, literature on DevOps effects is scant. Using job design characteristics theory and Herzberg’s job satisfaction theory, this paper investigates perceptions of job (dis)satisfaction, risks and work conditions among 59 employees working within 12 agile and DevOps teams in the same firm. Findings show that DevOps provides greater job satisfaction than agile alone. However, this case study also unveiled an effect of risk amplification with DevOps, and the greater need to orchestrate automation and sharing, contingent on work conditions. We theorise that orchestration of interactions between automation and sharing and related risks must be managed to improve job satisfaction when agile teams transition to DevOps. Journal: European Journal of Information Systems Pages: 474-499 Issue: 5 Volume: 29 Year: 2020 Month: 09 X-DOI: 10.1080/0960085X.2020.1782276 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1782276 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:5:p:474-499 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1756003_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Poonacha K. Medappa Author-X-Name-First: Poonacha K. Author-X-Name-Last: Medappa Author-Name: Shirish C. Srivastava Author-X-Name-First: Shirish C. Author-X-Name-Last: Srivastava Title: Ideological shifts in open source orchestration: examining the influence of licence choice and organisational participation on open source project outcomes Abstract: Though volunteer-driven Free (Libre) and Open Source Software (FLOSS) development were founded on the ideological beliefs of “openness” and “absence of any commercial appropriation”, in recent years, FLOSS movement has witnessed two ideological shifts. First, the emergence of “permissive FLOSS licences” that allow commercial appropriation of the collaboratively developed code, and second, “organisational ownership” of FLOSS projects. Because ideological beliefs shape the motivational needs of the volunteer contributors, and motivational needs influence the dominant work structures, it is expected that ideological shifts could influence the mechanisms through which work is orchestrated in FLOSS projects. Motivated by the need to understand the impact of these ideological shifts, we theorise the mechanisms through which the two ideological shifts alter the influence of FLOSS work structures on project outcomes of popularity and survival. Adopting an instrument variable approach, our analysis of projects hosted on GitHub confirms the significance of both the ideological shifts with some interesting contextual differences across the two project outcomes. Specifically, we find that the ideological shift pertaining to licence type has a significant influence on both the examined project outcomes, whereas organisational ownership has a significant influence only on the popularity of FLOSS projects. Journal: European Journal of Information Systems Pages: 500-520 Issue: 5 Volume: 29 Year: 2020 Month: 09 X-DOI: 10.1080/0960085X.2020.1756003 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1756003 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:5:p:500-520 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1782275_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Xiaolei Wang Author-X-Name-First: Xiaolei Author-X-Name-Last: Wang Author-Name: Terence T. Ow Author-X-Name-First: Terence T. Author-X-Name-Last: Ow Author-Name: Luning Liu Author-X-Name-First: Luning Author-X-Name-Last: Liu Author-Name: Yuqiang Feng Author-X-Name-First: Yuqiang Author-X-Name-Last: Feng Author-Name: Yuan Liang Author-X-Name-First: Yuan Author-X-Name-Last: Liang Title: Effects of peers and network position on user participation in a firm-hosted software community: the moderating role of network centrality Abstract: Customers have become co-creators of value in software development and improvement. The intensifying integration of social networks and online communities requires an understanding of social influence on user participation. Drawing upon social capital theory, we studied the influence of peers and network position on user participation in a firm-hosted software community. Based on an analysis of longitudinal data on the knowledge seeking and knowledge contribution behaviours of 2,192 users, we found that an individual’s quantity of friends’ participation is positively related to his or her participation. The source credibility from expert friends’ participation negatively affects user participation. We especially found that network centrality which depicts an individual’s relative position in the network significantly moderates the effects of peers. Interestingly, closeness centrality and betweenness centrality exert different moderating effects on the peer effects. Closeness centrality strengthens the influence of friends’ participation on knowledge seeking but has no effect on knowledge contribution. Betweenness centrality does not affect the effects of friends’ participation. The effects of source credibility from expert friends are weaker for users with lower closeness centrality and higher betweenness centrality. This study yields a better understanding of social influence on user participation and provides insights for software community managers. Journal: European Journal of Information Systems Pages: 521-544 Issue: 5 Volume: 29 Year: 2020 Month: 09 X-DOI: 10.1080/0960085X.2020.1782275 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1782275 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:5:p:521-544 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1803155_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Frantz Rowe Author-X-Name-First: Frantz Author-X-Name-Last: Rowe Author-Name: Ojelanki Ngwenyama Author-X-Name-First: Ojelanki Author-X-Name-Last: Ngwenyama Author-Name: Jean-Loup Richet Author-X-Name-First: Jean-Loup Author-X-Name-Last: Richet Title: Contact-tracing apps and alienation in the age of COVID-19 Abstract: Using a core idea of critical social theory, alienation, we interrogate the failure in the design and adoption of a Stop-COVID app in France. We analyse the political and scientific discourse, to develop an understanding of the conditions giving rise to this failure in this unprecedented moment. We argue that the digital-first solutionist approach taken by the government failed because, as in all Western countries, most stakeholders were alienated from the reality of the COVID-19 pandemic and lacked concrete knowledge of it. Furthermore, the French government and its COVID-19 council excluded relevant scientific experts in favour of quantitative modelling based on abstract partial knowledge. This along with coercion and lack of transparency about the app, reinforced alienation, undermined effectiveness in managing the crisis and resulted in the digital design failure. We suggest that such alienation will prevail in the COVID-19 era characterised by regimes of control, rampant abusive location tracking, and data collection, and where public officials are more concerned with managing effects than seeking causal explanations. The digital-first solutionist approach was adopted, not because digital solutions (to contact tracing) are superior to traditional ones, but by default due to alienation and lack of interdisciplinary cooperation. Journal: European Journal of Information Systems Pages: 545-562 Issue: 5 Volume: 29 Year: 2020 Month: 09 X-DOI: 10.1080/0960085X.2020.1803155 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1803155 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:5:p:545-562 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1814680_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Janine Hacker Author-X-Name-First: Janine Author-X-Name-Last: Hacker Author-Name: Jan vom Brocke Author-X-Name-First: Jan Author-X-Name-Last: vom Brocke Author-Name: Joshua Handali Author-X-Name-First: Joshua Author-X-Name-Last: Handali Author-Name: Markus Otto Author-X-Name-First: Markus Author-X-Name-Last: Otto Author-Name: Johannes Schneider Author-X-Name-First: Johannes Author-X-Name-Last: Schneider Title: Virtually in this together – how web-conferencing systems enabled a new virtual togetherness during the COVID-19 crisis Abstract: Regulations to contain the spread of COVID-19 have affected corporations, institutions, and individuals to a degree that most people have never seen before. Information systems researchers have initiated a discourse on information technology’s role in helping people manage this situation. This study informs and substantiates this discourse based on an analysis of a rich dataset: Starting in March 2020, we collected about 3 million tweets that document people’s use of web-conferencing systems (WCS) like Zoom during the COVID-19 crisis. Applying text-mining techniques to Twitter data and drawing on affordance theory, we derive five affordances of and five constraints to the use of WCS during the crisis. Based on our analysis, our argument is that WCS emerged as a social technology that led to a new virtual togetherness by facilitating access to everyday activities and contacts that were “locked away” because of COVID-19-mitigation efforts. We find that WCS facilitated encounters that could not have taken place otherwise and that WCS use led to a unique blending of various aspects of people’s lives. Using our analysis, we derive implications and directions for future research to address existing constraints and realise the potentials of this period of forced digitalisation. Journal: European Journal of Information Systems Pages: 563-584 Issue: 5 Volume: 29 Year: 2020 Month: 09 X-DOI: 10.1080/0960085X.2020.1814680 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1814680 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:5:p:563-584 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1814171_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mihoko Sakurai Author-X-Name-First: Mihoko Author-X-Name-Last: Sakurai Author-Name: Hameed Chughtai Author-X-Name-First: Hameed Author-X-Name-Last: Chughtai Title: Resilience against crises: COVID-19 and lessons from natural disasters Abstract: Pandemics and natural disasters – what do they have in common? Both disrupt social and organisational practices. Both call for resilience in society. Information systems can foster and enhance the resilience of people, communities and organisations by strengthening their ability to adapt to uncertainty, enabling a transition towards an appropriate restoration of order in society. COVID-19 has caused significant disturbances at all societal levels. The impacts range from national lockdowns to social distancing and self-isolation. Everyday practices and business processes are severed or have been halted. Resilience is needed. But how can we foster resilience in the face of a pandemic? What lessons can we learn from other crises like natural disasters? The purpose of this brief communication is to identify important insights from a study of the Great East Japan Earthquake of 2011 and illustrate how they are relevant to the current crisis. We identify the role of information systems in fostering resilience against crisis, and suggest some recommendations regarding transformation for resilience more generally. Journal: European Journal of Information Systems Pages: 585-594 Issue: 5 Volume: 29 Year: 2020 Month: 09 X-DOI: 10.1080/0960085X.2020.1814171 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1814171 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:5:p:585-594 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1814681_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Martin Adam Author-X-Name-First: Martin Author-X-Name-Last: Adam Author-Name: Dominick Werner Author-X-Name-First: Dominick Author-X-Name-Last: Werner Author-Name: Charlotte Wendt Author-X-Name-First: Charlotte Author-X-Name-Last: Wendt Author-Name: Alexander Benlian Author-X-Name-First: Alexander Author-X-Name-Last: Benlian Title: Containing COVID-19 through physical distancing: the impact of real-time crowding information Abstract: With the rise of COVID-19, decision support systems (DSS) increasingly display crowding information (CI) (e.g. how crowded a medical practice is) to encourage physical distancing when users select locations. Despite important implications for containing COVID-19, little is known about the causal effect of CI on user selection behaviour and how the immediacy of CI (e.g. “updated 2 minutes ago“) as well as users’ health anxiety further influence the effect of CI. Drawing on literature on digital choice environments and construal level theory, we conducted a multi-national online experiment to investigate the effect of CI on selecting differently crowded medical practices. Our results demonstrate that present (vs. absent) CI in DSS increases the likelihood of users selecting less crowded medical practices, while the effect is strongest when employed with real-time (vs. historical average) CI and, surprisingly, when users’ health anxiety is low (vs. high). Overall, our study adds to the growing body of research on IS in the age of pandemics and provides actionable insights for DSS providers and policymakers to endow users with information to identify and select less crowded locations, thus containing COVID-19 through improved physical distancing without paternalistically restricting users’ freedom of choice. Journal: European Journal of Information Systems Pages: 595-607 Issue: 5 Volume: 29 Year: 2020 Month: 09 X-DOI: 10.1080/0960085X.2020.1814681 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1814681 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:5:p:595-607 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934236_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: José-Rodrigo Córdoba Author-X-Name-First: José-Rodrigo Author-X-Name-Last: Córdoba Author-Name: Alan Pilkington Author-X-Name-First: Alan Author-X-Name-Last: Pilkington Author-Name: Edward W N Bernroider Author-X-Name-First: Edward W N Author-X-Name-Last: Bernroider Title: Information systems as a discipline in the making: comparing EJIS and MISQ between 1995 and 2008 Abstract: This paper aims to shed light on the dynamics of information systems (IS) as a discipline in the making. We use the ideas of the sociologist Abbott to propose three different stages of a discipline's development: differentiation, competition, and absorption. These stages reflect how disciplines go through different cycles and how they acquire, consolidate or lose elements of knowledge. We map these stages using citation and co-citation analyses of two main IS academic journals (EJIS and MISQ) from 1995 to 2008. Our results indicate that IS is currently in a stage of absorption, with research being consolidated around the theme of ‘IS acceptance’. Dominant models and frameworks related to this theme are predictive and thus lend themselves usable for positivistic and quantitative research. In this stage there is also a healthy degree of variety in IS including dormant elements which could reignite. Implications derived from our findings aim to help in the consolidation and extension of knowledge about IS in both academia and practice. Journal: European Journal of Information Systems Pages: 479-495 Issue: 5 Volume: 21 Year: 2012 Month: 9 X-DOI: 10.1057/ejis.2011.58 File-URL: http://hdl.handle.net/10.1057/ejis.2011.58 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:5:p:479-495 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934237_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ofir Turel Author-X-Name-First: Ofir Author-X-Name-Last: Turel Author-Name: Alexander Serenko Author-X-Name-First: Alexander Author-X-Name-Last: Serenko Title: The benefits and dangers of enjoyment with social networking websites Abstract: Information Systems enjoyment has been identified as a desirable phenomenon, because it can drive various aspects of system use. In this study, we argue that it can also be a key ingredient in the formation of adverse outcomes, such as technology-related addictions, through the positive reinforcement it generates. We rely on several theoretical mechanisms and, consistent with previous studies, suggest that enjoyment can lead to presumably positive outcomes, such as high engagement. Nevertheless, it can also facilitate the development of a strong habit and reinforce it until it becomes a ‘bad habit’, that can help forming a strong pathological and maladaptive psychological dependency on the use of the IT artifact (i.e., technology addiction). We test and validate this dual effect of enjoyment, with a data set of 194 social networking website users analyzed with SEM techniques. The potential duality of MIS constructs and other implications for research and practice are discussed. Journal: European Journal of Information Systems Pages: 512-528 Issue: 5 Volume: 21 Year: 2012 Month: 9 X-DOI: 10.1057/ejis.2012.1 File-URL: http://hdl.handle.net/10.1057/ejis.2012.1 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:5:p:512-528 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934238_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mei-Lien Young Author-X-Name-First: Mei-Lien Author-X-Name-Last: Young Author-Name: Feng-Yang Kuo Author-X-Name-First: Feng-Yang Author-X-Name-Last: Kuo Author-Name: Michael D Myers Author-X-Name-First: Michael D Author-X-Name-Last: Myers Title: To share or not to share: a critical research perspective on knowledge management systems Abstract: This paper looks at Knowledge Management Systems (KMS) from the perspective of critical research. Using the concepts of ‘gaze’ and ‘face’, we examine the development and use of a web-based KMS in Taiwan. The findings indicate that, although a web-based KMS was developed to enable knowledge sharing, the capabilities for surveillance inherent in the KMS severely limited sharing. This study raises broader questions about the relationship between cultural values and the production of knowledge in KMS. Journal: European Journal of Information Systems Pages: 496-511 Issue: 5 Volume: 21 Year: 2012 Month: 9 X-DOI: 10.1057/ejis.2012.10 File-URL: http://hdl.handle.net/10.1057/ejis.2012.10 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:5:p:496-511 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934239_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Laurie Novak Author-X-Name-First: Laurie Author-X-Name-Last: Novak Author-Name: JoAnn Brooks Author-X-Name-First: JoAnn Author-X-Name-Last: Brooks Author-Name: Cynthia Gadd Author-X-Name-First: Cynthia Author-X-Name-Last: Gadd Author-Name: Shilo Anders Author-X-Name-First: Shilo Author-X-Name-Last: Anders Author-Name: Nancy Lorenzi Author-X-Name-First: Nancy Author-X-Name-Last: Lorenzi Title: Mediating the intersections of organizational routines during the introduction of a health IT system Abstract: Public interest in the quality and safety of health care has spurred examination of specific organizational routines believed to yield risk in health care work. Medication administration routines, in particular, have been the subject of numerous improvement projects involving information technology development, and other forms of research and regulation. This study draws from ethnographic observation to examine how the common routine of medication administration intersects with other organizational routines, and why understanding such intersections is important. We present three cases describing intersections between medication administration and other routines, including a pharmacy routine, medication administration on the next shift and management reporting. We found that each intersection had ostensive and performative dimensions; and furthermore, that IT-enabled changes to one routine led to unintended consequences in its intersection with others, resulting in misalignment of ostensive and performative aspects of the intersection. Our analysis focused on the activities of a group of nurses who provide technology use mediation (TUM) before and after the rollout of a new health IT system. This research offers new insights on the intersection of organizational routines, demonstrates the value of analyzing TUM activities to better understand the relationship between IT introduction and changes in routines, and has practical implications for the implementation of technology in complex practice settings. Journal: European Journal of Information Systems Pages: 552-569 Issue: 5 Volume: 21 Year: 2012 Month: 9 X-DOI: 10.1057/ejis.2012.2 File-URL: http://hdl.handle.net/10.1057/ejis.2012.2 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:5:p:552-569 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934240_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bill Doolin Author-X-Name-First: Bill Author-X-Name-Last: Doolin Author-Name: Laurie McLeod Author-X-Name-First: Laurie Author-X-Name-Last: McLeod Title: Sociomateriality and boundary objects in information systems development Abstract: Information systems (IS) development is a complex organisational activity involving multiple stakeholders who interact with various artefacts in order to facilitate understanding and cooperation across diverse knowledge domains. A considerable body of work has analysed such artefacts as boundary objects, focusing on their interpretive flexibility across communities of practice. Increasing interest in the materiality of organisational practices directs attention to how such objects result from the performance of sociomaterial relations. This paper draws on these two strands of research to complement the analysis of project-related artefacts as boundary objects with a sociomaterial perspective on such objects and the practices within which they are constituted. The contribution of this combined approach is illustrated using the findings of a longitudinal case study of IS development. We trace the production and use of a prototype, the various people and practices with which it was associated, the multiple sociomaterial configurations that constituted it as a boundary object, and the social and material consequences of its use. The utilisation of sociomateriality as a theoretical lens enables us to further our understanding of how project-related artefacts act as boundary objects, and in doing so, constitute IS development as a sociomaterial practice. Journal: European Journal of Information Systems Pages: 570-586 Issue: 5 Volume: 21 Year: 2012 Month: 9 X-DOI: 10.1057/ejis.2012.20 File-URL: http://hdl.handle.net/10.1057/ejis.2012.20 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:5:p:570-586 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934241_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Frantz Rowe Author-X-Name-First: Frantz Author-X-Name-Last: Rowe Title: Toward a richer diversity of genres in information systems research: new categorization and guidelines Journal: European Journal of Information Systems Pages: 469-478 Issue: 5 Volume: 21 Year: 2012 Month: 9 X-DOI: 10.1057/ejis.2012.38 File-URL: http://hdl.handle.net/10.1057/ejis.2012.38 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:5:p:469-478 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934242_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Pamela Y Abbott Author-X-Name-First: Pamela Y Author-X-Name-Last: Abbott Author-Name: Matthew R Jones Author-X-Name-First: Matthew R Author-X-Name-Last: Jones Title: Everywhere and nowhere: nearshore software development in the context of globalisation Abstract: Offshore software development has been identified as one of the most striking manifestations of contemporary globalisation and as evidence of placelessness, the idea that information and communication technologies have rendered location irrelevant. Research in the International Business and Information Systems fields, in contrast, has suggested that all locations are not equal and has identified a number of characteristics that may influence the attractiveness of a location for multinational investment and offshoring, respectively. These literatures, however, focus almost exclusively on quantitative, economic characteristics that are seen as fixed and applying uniformly throughout a whole country. They therefore offer little guidance on the suitability of particular locations as offshoring destinations, especially in countries without a track record in offshore software development. Drawing on two cases of nearshore software development centres set up by offshore service providers in the Caribbean, this paper illustrates that, while the initial decision to establish the ventures reflected a logic of placelessness, characteristics of these particular locations affected their subsequent success. Through the findings, we therefore develop a typology of espoused, unanticipated and remediable locational characteristics, which illustrates that locational attractiveness may vary significantly within countries and that offshore service providers and government agencies can modify locational characteristics to their advantage. Journal: European Journal of Information Systems Pages: 529-551 Issue: 5 Volume: 21 Year: 2012 Month: 9 X-DOI: 10.1057/ejis.2012.7 File-URL: http://hdl.handle.net/10.1057/ejis.2012.7 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:5:p:529-551 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934371_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Martin Wiener Author-X-Name-First: Martin Author-X-Name-Last: Wiener Author-Name: Ulrich Remus Author-X-Name-First: Ulrich Author-X-Name-Last: Remus Author-Name: Jakob Heumann Author-X-Name-First: Jakob Author-X-Name-Last: Heumann Author-Name: Magnus Mähring Author-X-Name-First: Magnus Author-X-Name-Last: Mähring Title: The effective promotion of informal control in information systems offshoring projects Abstract: As firms increasingly engage in interorganizational information systems (IS) projects, including IS offshoring projects, the challenge for client firms of effectively exercising control across organizational boundaries becomes critical. Although the importance of informal controls (clan and self-control) in this context has been recognized, prior research has focused primarily on formal controls. Consequently, our understanding of the use of clan and self-control in interorganizational IS projects is scarce, and partly inconsistent or contradictory. This study focuses the client’s role in promoting informal controls in interorganizational projects involving distant client–vendor relationships as well as the effectiveness of such controls. We use matched-pair survey data from 86 IS offshoring projects involving client and vendor relationship managers. Our results show an interesting pattern: while clan control is considerably more difficult to promote than self-control in client–vendor project relationships, only clan control has a direct positive impact on project performance. Moreover, formal control modes, national cultural values, and project context factors moderate both the promotion and the effectiveness of informal controls. Our study’s main contributions lie in establishing the relevance of the distinction between informal control given and received, and the importance of the client’s role in promoting informal controls. Journal: European Journal of Information Systems Pages: 569-587 Issue: 6 Volume: 24 Year: 2015 Month: 11 X-DOI: 10.1057/ejis.2014.16 File-URL: http://hdl.handle.net/10.1057/ejis.2014.16 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:6:p:569-587 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934372_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Yujong Hwang Author-X-Name-First: Yujong Author-X-Name-Last: Hwang Author-Name: William J Kettinger Author-X-Name-First: William J Author-X-Name-Last: Kettinger Author-Name: Mun Y Yi Author-X-Name-First: Mun Y Author-X-Name-Last: Yi Title: Personal information management effectiveness of knowledge workers: conceptual development and empirical validation Abstract: What critical factors contribute to knowledge workers’ effective information management and consequent job performance? This paper begins to address this important question by developing a conceptual definition of a new construct called personal information management effectiveness (PIME) and its constituent dimensions. Specifically, we theorize that PIME consists of two underlying dimensions: personal information management motivation (PIMM) and personal information management capability (PIMC). Synthesizing the extant literature on information management and information orientation, we further conceptualize PIMM as having four sub-dimensions of proactiveness, sharing, transparency, and formality, and PIMC as possessing five sub-dimensions of sensing, collecting, organizing, processing, and maintaining. Moreover, we develop a theoretical model that positions PIME as a mediator between two selected individual characteristics (IT self-efficacy and need-for-cognition) and job performance. New measures for PIME dimensions were developed and shown to have strong psychometric properties. The proposed model was empirically tested using data collected from 352 knowledge workers. As theorized, PIME was found to have significant effects on job performance (41%) and fully mediate the effects that the selected individual characteristics have on job performance. Responding to recent calls for advanced research on personal information management, the measures of PIMM and PIMC developed in this study have practical value as research and diagnostic tools and the findings provide useful insights to help organizations improve knowledge workers’ information management practices. Journal: European Journal of Information Systems Pages: 588-606 Issue: 6 Volume: 24 Year: 2015 Month: 11 X-DOI: 10.1057/ejis.2014.24 File-URL: http://hdl.handle.net/10.1057/ejis.2014.24 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:6:p:588-606 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934373_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Chi-Wen Chen Author-X-Name-First: Chi-Wen Author-X-Name-Last: Chen Author-Name: Marios Koufaris Author-X-Name-First: Marios Author-X-Name-Last: Koufaris Title: The impact of decision support system features on user overconfidence and risky behavior Abstract: There is considerable research on how Decision Support Systems (DSSs) enable users to make better decisions. However, there is less focus on the possibility that some of their features may introduce biases and encourage suboptimal user behavior. We report on an experimental study that examines three DSS features that are generally considered beneficial to the user: the degree of choice the system provides to the user, the presence of competition among concurrent users, and the use of training to increase system familiarity. We hypothesize that the three DSS features may increase risky behavior (measured as the amount invested in a stock investment task with random outcomes) and overconfidence, conceptualized as the illusion of control, the phenomenon whereby people believe their chances of success at a task are greater than would be warranted by objective analysis. Our results confirm the effects of the three DSS features on risky behavior but only degree of choice impacts overconfidence. Moreover, overconfidence does not appear to mediate the impact of the DSS features on risky behavior. Finally, we hypothesize and confirm that, controlling for the effect of actual performance, overconfidence increases user satisfaction with the decision-making process and outcome. Journal: European Journal of Information Systems Pages: 607-623 Issue: 6 Volume: 24 Year: 2015 Month: 11 X-DOI: 10.1057/ejis.2014.30 File-URL: http://hdl.handle.net/10.1057/ejis.2014.30 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:6:p:607-623 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934374_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Andrew Burton-Jones Author-X-Name-First: Andrew Author-X-Name-Last: Burton-Jones Author-Name: Ephraim R McLean Author-X-Name-First: Ephraim R Author-X-Name-Last: McLean Author-Name: Emmanuel Monod Author-X-Name-First: Emmanuel Author-X-Name-Last: Monod Title: Theoretical perspectives in IS research: from variance and process to conceptual latitude and conceptual fit Abstract: There has been growing interest in theory building in Information Systems (IS) research. We extend this literature by examining theory building perspectives. We define a perspective as a researcher’s choice of the types of concepts and relationships used to construct a theory, and we examine three perspectives – process, variance, and systems. We contribute by clarifying these perspectives and explaining how they can be used more flexibly in future research. We illustrate the value of this more flexible approach by showing how researchers can use different theoretical perspectives to critique and extend an existing theoretical model (in our case, the IS Success Model). Overall, we suggest a shift from the traditional process-variance dichotomy to a broader view defined by conceptual latitude (the types of concepts and relationships available) and conceptual fit (the types of concepts and relationships appropriate for a given study). We explain why this shift should help researchers as they engage in the knowledge generation process. Journal: European Journal of Information Systems Pages: 664-679 Issue: 6 Volume: 24 Year: 2015 Month: 11 X-DOI: 10.1057/ejis.2014.31 File-URL: http://hdl.handle.net/10.1057/ejis.2014.31 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:6:p:664-679 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934375_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Gaurav Bansal Author-X-Name-First: Gaurav Author-X-Name-Last: Bansal Author-Name: Fatemeh ‘Mariam’ Zahedi Author-X-Name-First: Fatemeh ‘Mariam’ Author-X-Name-Last: Zahedi Author-Name: David Gefen Author-X-Name-First: David Author-X-Name-Last: Gefen Title: The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern Abstract: Privacy policy statements and privacy assurance cues are among the most important website features that online providers use to increase individuals’ trust and willingness to disclose private information online. The focus of this study is a comprehensive examination of the process by which privacy assurance mechanisms influence trust and the moderating role of privacy concern in this process. We use the lens of the Elaboration Likelihood Model to investigate the way different individuals perceive and process privacy assurance mechanisms. We argue that the trust-enhancing role of these mechanisms depends on the individual’s privacy concern. The results of this study articulate the process by which various privacy assurance mechanisms operate in enhancing an individual’s trust, and show that there are distinct behavioral differences between individuals with high- vs low-privacy concern when forming their trust to disclose private information. The paper sheds new light on the role of elaboration in the trust building process, and shows why privacy assurance mechanisms have different impacts depending on individuals’ privacy concerns. Journal: European Journal of Information Systems Pages: 624-644 Issue: 6 Volume: 24 Year: 2015 Month: 11 X-DOI: 10.1057/ejis.2014.41 File-URL: http://hdl.handle.net/10.1057/ejis.2014.41 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:6:p:624-644 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934376_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ole Hanseth Author-X-Name-First: Ole Author-X-Name-Last: Hanseth Author-Name: Bendik Bygstad Author-X-Name-First: Bendik Author-X-Name-Last: Bygstad Title: Flexible generification: ICT standardization strategies and service innovation in health care Abstract: Standards have played an important but often unrecognized role in the development of modern organizations. This role is accentuated by today’s growth of large business and government infrastructures, in the turbulent processes of globalization. In this paper, we investigate the relationships – and tensions – between standardization strategies and service innovation in the health-care sector. Our empirical material is seven longitudinal case studies in the Norwegian health-care sector, collected and analysed over a period of 20 years. We identify three generic standardization strategies; anticipatory standardization, integrated solutions and flexible generification. We argue that the first two strategies do not support service innovation while the strategy of flexible generification does so. We consider our results important for the evolution of the future ICT-enabled service economy. Journal: European Journal of Information Systems Pages: 645-663 Issue: 6 Volume: 24 Year: 2015 Month: 11 X-DOI: 10.1057/ejis.2015.1 File-URL: http://hdl.handle.net/10.1057/ejis.2015.1 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:6:p:645-663 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934377_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Dov Te'eni Author-X-Name-First: Dov Author-X-Name-Last: Te'eni Author-Name: Frantz Rowe Author-X-Name-First: Frantz Author-X-Name-Last: Rowe Author-Name: Pär J Ågerfalk Author-X-Name-First: Pär J Author-X-Name-Last: Ågerfalk Author-Name: Jong Seok Lee Author-X-Name-First: Jong Seok Author-X-Name-Last: Lee Title: Publishing and getting published in EJIS: marshaling contributions for a diversity of genres Journal: European Journal of Information Systems Pages: 559-568 Issue: 6 Volume: 24 Year: 2015 Month: 11 X-DOI: 10.1057/ejis.2015.20 File-URL: http://hdl.handle.net/10.1057/ejis.2015.20 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:6:p:559-568 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934197_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mark I Hwang Author-X-Name-First: Mark I Author-X-Name-Last: Hwang Author-Name: Frank L Schmidt Author-X-Name-First: Frank L Author-X-Name-Last: Schmidt Title: Assessing moderating effect in meta-analysis: a re-analysis of top management support studies and suggestions for researchers Abstract: Meta-analysis has been increasingly used as a knowledge cumulation tool by IS researchers. In recent years many meta-analysts have conducted moderator analyses in an attempt to develop and test theories. These studies suffer from several methodological problems and, as a result, may have contributed to rather than resolved inconsistent research findings. For example, a previous meta-analysis reports that task interdependence moderates the effect of top management support to render it a non-critical component in systems implementation projects when task interdependence is low. We show that this conclusion is the result of uncorrected measurement error and an erroneous application of a fixed effects regression analysis. We discuss other pitfalls in the detection and confirmation of moderators including the use of the Q statistic and significance tests. Our recommended approach is to break the sample into subgroups and compare their credibility and confidence intervals. This approach is illustrated in a re-analysis of the top management support literature. Our results indicate that top management support is important in both high and low task interdependence groups and in fact may be equally important in both groups. Guidelines are developed to help IS researchers properly conduct moderator analyses in future meta-analytic studies. Journal: European Journal of Information Systems Pages: 693-702 Issue: 6 Volume: 20 Year: 2011 Month: 11 X-DOI: 10.1057/ejis.2011.12 File-URL: http://hdl.handle.net/10.1057/ejis.2011.12 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:6:p:693-702 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934198_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: John D'Arcy Author-X-Name-First: John Author-X-Name-Last: D'Arcy Author-Name: Tejaswini Herath Author-X-Name-First: Tejaswini Author-X-Name-Last: Herath Title: A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings Abstract: Deterrence theory is one of the most widely applied theories in information systems (IS) security research, particularly within behavioral IS security studies. Based on the rational choice view of human behavior, the theory predicts that illicit behavior can be controlled by the threat of sanctions that are certain, severe, and swift. IS scholars have used deterrence theory to predict user behaviors that are either supportive or disruptive of IS security, and other IS security-related outcome variables. A review of this literature suggests an uneven and often contradictory picture regarding the influence of sanctions and deterrence theory in general in the IS security context. In this paper, we set out to make sense of the discrepant findings in the IS deterrence literature by drawing upon the more mature body of deterrence literature that spans multiple disciplines. In doing so, we speculate that a set of contingency variables and methodological and theoretical issues can shed light on the inconsistent findings and inform future research in this area. The review and analysis presented in this paper facilitates a deeper understanding of deterrence theory in the IS security domain, which can assist in cumulative theory-building efforts and advance security management strategies rooted in deterrence principles. Journal: European Journal of Information Systems Pages: 643-658 Issue: 6 Volume: 20 Year: 2011 Month: 11 X-DOI: 10.1057/ejis.2011.23 File-URL: http://hdl.handle.net/10.1057/ejis.2011.23 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:6:p:643-658 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934199_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Katharina Krell Author-X-Name-First: Katharina Author-X-Name-Last: Krell Author-Name: Sabine Matook Author-X-Name-First: Sabine Author-X-Name-Last: Matook Author-Name: Fiona Rohde Author-X-Name-First: Fiona Author-X-Name-Last: Rohde Title: Development of an IS change reason–IS change type combinations matrix Abstract: Firms change their information systems (IS) for various reasons, ranging from compliance with government regulations to the development of new capabilities. When making these changes a firm can choose between four different IS change types: IS introduction, IS extension, IS replacement, and IS merger. This paper proposes that change reasons and change types are interrelated, and that certain reason-type combinations are more likely than others to result in a successful IS change. To identify these combinations, an IS change reason–IS change type matrix is developed. While the matrix is created from prior IS research, we conducted a focus group study of IS professionals to further explore and refine the matrix. The findings from the focus group study reveal that some IS change reason–IS change type combinations are more appropriate than others to carry out the IS change project successfully. We also present three examples of IS change projects to illustrate the use and value of the matrix in practice. Journal: European Journal of Information Systems Pages: 629-642 Issue: 6 Volume: 20 Year: 2011 Month: 11 X-DOI: 10.1057/ejis.2011.28 File-URL: http://hdl.handle.net/10.1057/ejis.2011.28 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:6:p:629-642 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934200_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ricky Y K Chan Author-X-Name-First: Ricky Y K Author-X-Name-Last: Chan Author-Name: Jennifer W M Lai Author-X-Name-First: Jennifer W M Author-X-Name-Last: Lai Title: Does ethical ideology affect software piracy attitude and behaviour? An empirical investigation of computer users in China Abstract: This study empirically examines Chinese computer users’ ethical ideology and its relationship to their software piracy attitude and behaviour. The investigation reveals several important findings. First, cluster analysis results show that Chinese computer users can be divided into four ethical ideology types (i.e., situationists, absolutists, subjectivists, and exceptionists) reasonably consistent with Forsyth's taxonomy. Second, when compared with situationists, absolutists, and exceptionists, subjectivists are found to have the least unfavourable attitude towards software piracy and are most frequently engaged in software piracy. Third, Chinese computer users’ ideological relativism exerts a stronger influence on their software piracy attitude and behaviour than does their ideological idealism. The findings suggest that the government, and authentic software developers and vendors should focus on subjectivists as their target audience of anti-software piracy communications. These policy makers and practitioners should also make concerted efforts to help subjectivists better realise how their software piracy act may damage parties ‘proximate’ to themselves so as to lower the rate of software piracy. Journal: European Journal of Information Systems Pages: 659-673 Issue: 6 Volume: 20 Year: 2011 Month: 11 X-DOI: 10.1057/ejis.2011.31 File-URL: http://hdl.handle.net/10.1057/ejis.2011.31 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:6:p:659-673 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934201_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Nannette P Napier Author-X-Name-First: Nannette P Author-X-Name-Last: Napier Author-Name: Lars Mathiassen Author-X-Name-First: Lars Author-X-Name-Last: Mathiassen Author-Name: Daniel Robey Author-X-Name-First: Daniel Author-X-Name-Last: Robey Title: Building contextual ambidexterity in a software company to improve firm-level coordination Abstract: Software organizations increasingly face contradictory strategic choices as they develop customized and packaged solutions for the market. They need to improve efficiency of development processes while at the same time adapting to emerging customer needs; they need to exploit software products in relation to existing customers while simultaneously exploring new technology and market opportunities; and, they need to consider both incremental and radical innovations. While the integration of such opposing strategies requires software organizations to become ambidextrous, there is limited actionable advice on how managers can develop such capability. Against this backdrop, we report from a two-year action research study into a small software firm, TelSoft. Based on Pettigrew's contextualist inquiry, we develop a framework that integrates existing theory on contextual ambidexterity with a generic process for improving software organizations, and we apply this framework to analyze how TelSoft improved its coordination of products, projects, and innovation efforts. As a result, we offer principles for how software managers can build ambidextrous capability to improve firm-level coordination. Journal: European Journal of Information Systems Pages: 674-690 Issue: 6 Volume: 20 Year: 2011 Month: 11 X-DOI: 10.1057/ejis.2011.32 File-URL: http://hdl.handle.net/10.1057/ejis.2011.32 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:6:p:674-690 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934202_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ray J Paul Author-X-Name-First: Ray J Author-X-Name-Last: Paul Title: Quality changes Journal: European Journal of Information Systems Pages: 625-628 Issue: 6 Volume: 20 Year: 2011 Month: 11 X-DOI: 10.1057/ejis.2011.38 File-URL: http://hdl.handle.net/10.1057/ejis.2011.38 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:6:p:625-628 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934203_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Rajeev Sharma Author-X-Name-First: Rajeev Author-X-Name-Last: Sharma Author-Name: Phillip Yetton Author-X-Name-First: Phillip Author-X-Name-Last: Yetton Title: Top management support and IS implementation: further support for the moderating role of task interdependence Abstract: Sharma and Yetton, in 2003, hypothesized and found empirical support for the moderating effect of task interdependence on the relationship between management support and implementation success. In this issue of EJIS, Hwang and Schmidt critique Sharma and Yetton's meta-analysis protocol, arguing that a random-effects model should have been employed, rather than the fixed-effect model they used. Further, Hwang and Schmidt claim that the moderating effect hypothesized by Sharma and Yetton is not supported when a random-effects model is employed. We re-analyze Sharma and Yetton's data by employing a dedicated, commercially available package for conducting random-effects meta-analysis. Our analysis finds no support for Hwang and Schmidt's claim. The random-effects meta-analysis supports Sharma and Yetton's original findings: task interdependence moderates the effect of management support on implementation success. Journal: European Journal of Information Systems Pages: 703-712 Issue: 6 Volume: 20 Year: 2011 Month: 11 X-DOI: 10.1057/ejis.2011.39 File-URL: http://hdl.handle.net/10.1057/ejis.2011.39 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:6:p:703-712 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934204_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Joe Nandhakumar Author-X-Name-First: Joe Author-X-Name-Last: Nandhakumar Author-Name: Richard Baskerville Author-X-Name-First: Richard Author-X-Name-Last: Baskerville Title: Moderating a discourse on the moderating effects in the study of top management support Journal: European Journal of Information Systems Pages: 691-692 Issue: 6 Volume: 20 Year: 2011 Month: 11 X-DOI: 10.1057/ejis.2011.40 File-URL: http://hdl.handle.net/10.1057/ejis.2011.40 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:6:p:691-692 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934205_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Xiang Fang Author-X-Name-First: Xiang Author-X-Name-Last: Fang Author-Name: John ‘Skip’ Benamati Author-X-Name-First: John ‘Skip’ Author-X-Name-Last: Benamati Author-Name: Albert L Lederer Author-X-Name-First: Albert L Author-X-Name-Last: Lederer Title: Erratum: Coping with rapid information technology change in different national cultures Journal: European Journal of Information Systems Pages: 713-713 Issue: 6 Volume: 20 Year: 2011 Month: 11 X-DOI: 10.1057/ejis.2011.45 File-URL: http://hdl.handle.net/10.1057/ejis.2011.45 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:6:p:713-713 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934399_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ann-Frances Cameron Author-X-Name-First: Ann-Frances Author-X-Name-Last: Cameron Author-Name: Jane Webster Author-X-Name-First: Jane Author-X-Name-Last: Webster Author-Name: Henri Barki Author-X-Name-First: Henri Author-X-Name-Last: Barki Author-Name: Ana Ortiz de Guinea Author-X-Name-First: Ana Ortiz Author-X-Name-Last: de Guinea Title: Four common multicommunicating misconceptions Abstract: Multicommunicating (MC) represents a form of multitasking in which employees such as IS analysts and managers engage in multiple conversations at the same time (e.g., by sending texts while on a telephone call). MC can occur either during group meetings or during one-on-one conversations: the present paper focuses on the latter, termed dyadic MC. MC is increasingly prevalent in the workplace and is often useful in today’s business world, for example by making it possible to respond in a timely manner to urgent communications. Nonetheless, the efficacy of MC behaviors can also be questioned as they have been found to negatively affect performance and workplace relationships, as well as causing stress. During our investigations of this phenomenon, we often heard IS practitioners say ‘So what? I do this all the time, it’s no problem!’ which suggests that certain misconceptions regarding MC behaviors may be prevalent. Arising from research findings in multiple disciplines, we examine four such practitioner beliefs regarding MC behaviors: MC makes employees more accessible, it enhances productivity, it is required in most jobs, and rudeness is not an issue when MC. Further, we suggest recommendations to IS employees and managers so that they can better manage MC. Journal: European Journal of Information Systems Pages: 465-471 Issue: 5 Volume: 25 Year: 2016 Month: 9 X-DOI: 10.1057/ejis.2016.8 File-URL: http://hdl.handle.net/10.1057/ejis.2016.8 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:5:p:465-471 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934400_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ofir Turel Author-X-Name-First: Ofir Author-X-Name-Last: Turel Title: Untangling the complex role of guilt in rational decisions to discontinue the use of a hedonic Information System Abstract: The discontinuance of the use of hedonic information systems (IS) has become somewhat prevalent. Nevertheless, little is known about why some individuals might decide to discontinue using a technology which they often use frequently and the use of which is typically intrinsically rewarding. Prior research has alluded to the ideas that (1) IS discontinuance merits its own theorizing, possibly separate from continuance and that (2) guilt feelings is a unique driver of IS discontinuance decisions. However, the literature still lacks cohesive models that explain discontinuance and especially the complex processes through which guilt influences such decisions, and perhaps that further illuminate differences between the processes underlying IS discontinuance and continuance. This study bridges these gaps and proposes and examines a model that explicates the complex effects of guilt and theory of planned behavior (TPB) predictors on the discontinuance of an instance of mostly hedonic IS, namely Social Networking Sites (SNS). In order to develop this model it is proposed that guilt, which is a self-reflective moral emotion that can influence cognition, is associated with attitudinal, normative, and control perceptions regarding the discontinuance act in a complex network of partial-mediation and moderation effects. The proposed model was tested and largely validated with structural equation modeling applied to data collected from 487 SNS users. It also pointed to possible unique features of the TPB as applied to IS discontinuance. Applicability checks further illuminated sources of guilt in this context. Decomposing the guilt effects on discontinuance and integrating them with the TPB is important since it not only extends theory both in IS and social sciences and hints at differences in planned behavior processes between IS continuance and discontinuance, but also because the findings point to mechanisms which can be used for attenuating guilt and planned behavior effects on IS discontinuance. Overall, this study validates a rationale-based theory of IS discontinuance, and can serve as a platform for further studying this notable, yet under-examined corrective behavior. Journal: European Journal of Information Systems Pages: 432-447 Issue: 5 Volume: 25 Year: 2016 Month: 9 X-DOI: 10.1057/s41303-016-0002-5 File-URL: http://hdl.handle.net/10.1057/s41303-016-0002-5 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:5:p:432-447 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934401_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Gregory Vial Author-X-Name-First: Gregory Author-X-Name-Last: Vial Author-Name: Suzanne Rivard Author-X-Name-First: Suzanne Author-X-Name-Last: Rivard Title: A process explanation of the effects of institutional distance between parties in outsourced information systems development projects Abstract: Outsourced information systems development (OISD) projects are challenging endeavors, and the literature suggests differences between the parties involved as critical hinderers of such projects. Using institutional theory as a foundational theory, we propose a process explanation of the effects of differences between parties in OISD projects. Our explanation relies on the interaction of four components: (1) the IS development and project management institutional profiles of the parties involved; (2) the institutional distance between practices within these profiles; (3) instances of conflicting institutional demands when institutional distance becomes salient; and (4) the repertoire of institutional strategic responses available to parties to address those instances. We suggest that the constitutive elements of institutional distance and the degree to which parties envision their collaboration beyond the project at hand contribute to explaining the enactment of strategic responses. Accounting for the fact that practices, as well as the institutional logics that drive their enactment, may differ between parties, we make a theoretical contribution to the literature on OISD by building a fine-grained explanation of the effects of differences between parties in OISD projects. Journal: European Journal of Information Systems Pages: 448-464 Issue: 5 Volume: 25 Year: 2016 Month: 9 X-DOI: 10.1057/s41303-016-0021-2 File-URL: http://hdl.handle.net/10.1057/s41303-016-0021-2 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:5:p:448-464 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934402_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Matthias Lange Author-X-Name-First: Matthias Author-X-Name-Last: Lange Author-Name: Jan Mendling Author-X-Name-First: Jan Author-X-Name-Last: Mendling Author-Name: Jan Recker Author-X-Name-First: Jan Author-X-Name-Last: Recker Title: An empirical analysis of the factors and measures of Enterprise Architecture Management success Abstract: Enterprise Architecture Management (EAM) is discussed in academia and industry as a vehicle to guide IT implementations, alignment, compliance assessment, or technology management. Still, a lack of knowledge prevails about how EAM can be successfully used, and how positive impact can be realized from EAM. To determine these factors, we identify EAM success factors and measures through literature reviews and exploratory interviews and propose a theoretical model that explains key factors and measures of EAM success. We test our model with data collected from a cross-sectional survey of 133 EAM practitioners. The results confirm the existence of an impact of four distinct EAM success factors, ‘EAM product quality’, ‘EAM infrastructure quality’, ‘EAM service delivery quality’, and ‘EAM organizational anchoring’, and two important EAM success measures, ‘intentions to use EAM’ and ‘Organizational and Project Benefits’ in a confirmatory analysis of the model. We found the construct ‘EAM organizational anchoring’ to be a core focal concept that mediated the effect of success factors such as ‘EAM infrastructure quality’ and ‘EAM service quality’ on the success measures. We also found that ‘EAM satisfaction’ was irrelevant to determining or measuring success. We discuss implications for theory and EAM practice. Journal: European Journal of Information Systems Pages: 411-431 Issue: 5 Volume: 25 Year: 2016 Month: 9 X-DOI: 10.1057/ejis.2014.39 File-URL: http://hdl.handle.net/10.1057/ejis.2014.39 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:5:p:411-431 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934403_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Norman A Johnson Author-X-Name-First: Norman A Author-X-Name-Last: Johnson Author-Name: Randolph B Cooper Author-X-Name-First: Randolph B Author-X-Name-Last: Cooper Author-Name: Richard D Holowczak Author-X-Name-First: Richard D Author-X-Name-Last: Holowczak Title: The impact of media on how positive, negative, and neutral communicated affect influence unilateral concessions during negotiations Abstract: In the online environment, audio and instant messaging (IM) media are quite commonly used by people to communicate with each other and make offers as they negotiate. While we know much about how IM and audio differ, we know very little about how offers that are favorable to the recipient (termed unilateral concessions) are affected by what and how people communicate over these media. The purpose of this study is twofold – (1) to examine how such concessions are influenced by communication that is either neutral, or positive, or negative in affect; and (2) to determine how the use of IM, relative to the use of audio, influences the effects of these types of communication on unilateral concessions. We develop a research model based on prosocial theory, which suggests that negotiators using audio are predisposed to interpret their partners’ motivations and behaviors in a positive (prosocial) light while negotiators using IM are predisposed to interpret their partners’ motivations and behaviors in a negative (competitive) light. We manipulate the use of IM and audio in anexperiment designed to test predictions based on this theory. Our work provides theoretical and empirical support for the idea that communications other than concessions (such as positive, neutral, and negative affect) can lead to more or less self-sacrifice depending on the medium employed, and thereby motivate negotiators to make greater or fewer unilateral concessions. Specifically, we found that (1) positive affect comments can increase unilateral concession independent of the medium used by negotiators; (2) neutral affect comments can increase unilateral concession when negotiators use audio, but have little impact when they use IM; and (3) negative affect comments can decrease unilateral concession when negotiators use audio, but can increase unilateral concession when they use IM. These results provide insights to researchers and practical guidance for negotiators. Journal: European Journal of Information Systems Pages: 391-410 Issue: 5 Volume: 25 Year: 2016 Month: 9 X-DOI: 10.1057/ejis.2016.4 File-URL: http://hdl.handle.net/10.1057/ejis.2016.4 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:5:p:391-410 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1803775_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Hillol Bala Author-X-Name-First: Hillol Author-X-Name-Last: Bala Author-Name: Mohammad Mobashar Hossain Author-X-Name-First: Mohammad Mobashar Author-X-Name-Last: Hossain Author-Name: Akshay Bhagwatwar Author-X-Name-First: Akshay Author-X-Name-Last: Bhagwatwar Author-Name: Xuan Feng Author-X-Name-First: Xuan Author-X-Name-Last: Feng Title: Ownership and governance, scope, and empowerment: how does context affect enterprise systems implementation in organisations in the Arab World? Abstract: Research on enterprise systems (ES) implementation has focused on different aspects of implementation challenges, employee reactions, and system success. Much of this research has been conducted in developed countries and a few developing countries. This raises an obvious question about the applicability of findings to other contexts with different social and organisational cultures. We examine ES implementations in 12 organisations in Saudi Arabia, an important economic and political frontier and a unique sociocultural context in the Arab World. Using sociotechnical systems theory and institutional theory and the literature on contextualisation, we studied contextual aspects of three important factors related to ES implementations – i.e., ownership and governance, scope management, and employee empowerment. We found that the nature of ownership and governance plays a significant hindering role during implementation. Further, Saudi organisations implementing ES faced major challenges in managing the scope of implementation due to interferences from the top management and/or owners, and lack of justification by the consultants. Finally, we found that owners and top management were deeply concerned about losing their control over employees following ES implementations. We extend prior research and theories by offering contextual explanations unearthed from a context that is different from developed and many developing countries. Journal: European Journal of Information Systems Pages: 425-451 Issue: 4 Volume: 30 Year: 2021 Month: 07 X-DOI: 10.1080/0960085X.2020.1803775 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1803775 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:4:p:425-451 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1920857_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jiesen Lin Author-X-Name-First: Jiesen Author-X-Name-Last: Lin Author-Name: Lemuria Carter Author-X-Name-First: Lemuria Author-X-Name-Last: Carter Author-Name: Dapeng Liu Author-X-Name-First: Dapeng Author-X-Name-Last: Liu Title: Privacy concerns and digital government: exploring citizen willingness to adopt the COVIDSafe app Abstract: Contact tracing is a key public health intervention during the coronavirus pandemic. While government contact tracing apps (e.g., COVIDSafe) may enforce personal information protection, privacy concerns remain among citizens. To date, few studies have investigated the adoption of contact tracing technology and corresponding citizen information privacy concerns. To address this gap, we propose a research model to explore the impact of individual privacy concerns, trust, and risk perceptions on citizen’s willingness to download a federal contact tracing app. To test the model, we administer a survey to Australian citizens to assess their perceptions of the government’s “COVIDSafe” app. The results of this study indicate that relative advantage, compatibility and trusting beliefs increase adoption intentions. The study provides recommendations for governments tackling COVID-19 and guidance for contact tracing strategies in preparation for future pandemics. Journal: European Journal of Information Systems Pages: 389-402 Issue: 4 Volume: 30 Year: 2021 Month: 07 X-DOI: 10.1080/0960085X.2021.1920857 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1920857 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:4:p:389-402 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1891004_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Munir Mandviwalla Author-X-Name-First: Munir Author-X-Name-Last: Mandviwalla Author-Name: Richard Flanagan Author-X-Name-First: Richard Author-X-Name-Last: Flanagan Title: Small business digital transformation in the context of the pandemic Abstract: The pandemic is a major crisis for small businesses. Digital transformation (DT) offers a lifeline for some small businesses. In this paper, we outline a rapidly conceived and implemented research project to digitalise small business. We apply action design research using the DT lens to intervene and impact 42 different small businesses over an intense six-month period. Three detailed case studies illustrate the problem, drivers, mechanisms, and challenges of DT. The results illustrate how small businesses can engage, sell, and deliver using technology, and the factors that influence the transformation process. We also discuss limitations and identify research opportunities in relation to the DT, platform, and small business literature. The paper demonstrates how IS can have an immediate impact on the livelihoods of the businesses in our community during the pandemic. Journal: European Journal of Information Systems Pages: 359-375 Issue: 4 Volume: 30 Year: 2021 Month: 07 X-DOI: 10.1080/0960085X.2021.1891004 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1891004 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:4:p:359-375 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1811786_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Shan L. Pan Author-X-Name-First: Shan L. Author-X-Name-Last: Pan Author-Name: Mingwei Li Author-X-Name-First: Mingwei Author-X-Name-Last: Li Author-Name: L.G. Pee Author-X-Name-First: L.G. Author-X-Name-Last: Pee Author-Name: M.S. Sandeep Author-X-Name-First: M.S. Author-X-Name-Last: Sandeep Title: Sustainability Design Principles for a Wildlife Management Analytics System: An Action Design Research Abstract: Wildlife management is becoming increasingly critical to improving the sustainability of biodiversity and the welfare of human beings. This paper uses affordance as a lens to explore the design of information systems that can assist in managing wildlife in protected areas. Through an action design research (ADR) study with a forest department, we develop and test design principles for a class of wildlife management analytics system (WMAS). We identify the initial design principles, including elements of the action potential, materiality, and boundary condition, and iteratively refine them based on an instantiation of WMAS through two iterations of design and implementation cycles. Through our work, we contribute to design knowledge by abstracting the artefacts, design principles in particular, and the ADR approach by generalising two new activities and corresponding principles when designing analytical models. Our findings can also be used to address a class of similar problems and systems in practice. Journal: European Journal of Information Systems Pages: 452-473 Issue: 4 Volume: 30 Year: 2021 Month: 07 X-DOI: 10.1080/0960085X.2020.1811786 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1811786 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:4:p:452-473 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1803154_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jungwon Kuem Author-X-Name-First: Jungwon Author-X-Name-Last: Kuem Author-Name: Soumya Ray Author-X-Name-First: Soumya Author-X-Name-Last: Ray Author-Name: Pei-Fang Hsu Author-X-Name-First: Pei-Fang Author-X-Name-Last: Hsu Author-Name: Lara Khansa Author-X-Name-First: Lara Author-X-Name-Last: Khansa Title: Smartphone Addiction and Conflict: An Incentive-Sensitisation Perspective of Addiction for Information Systems Abstract: This study seeks to develop and test a theory-driven model of technology addiction within the context of smartphone use. Drawing on incentive-sensitisation theory, we proposed a nomological network that centres on a second-order factor of smartphone addiction from a psychological perspective. We empirically evaluated the proposed model against longitudinal data collected from 441 smartphone users. Our analysis from structural equation modelling indicates that our two-factor measurement of smartphone addiction (heightened desire and mobile social interaction) is a parsimonious alternative to the four-factor model. In addition, our findings suggest that addiction and its negative consequences differ in their effects on subsequent perceptions, such as perceived usefulness and perceived enjoyment. We also found that personal innovativeness in information technology and a perception of loneliness explain a large amount of variation in smartphone addiction. Overall, the present study significantly contributes to the information systems literature by offering a refined model of smartphone addiction that effectively describes pathological smartphone use while correcting critical biases in existing models. Journal: European Journal of Information Systems Pages: 403-424 Issue: 4 Volume: 30 Year: 2021 Month: 07 X-DOI: 10.1080/0960085X.2020.1803154 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1803154 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:4:p:403-424 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1946252_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Michael D. Myers Author-X-Name-First: Michael D. Author-X-Name-Last: Myers Title: Is there a shift from positivity to negativity about technology in the field of IS? Journal: European Journal of Information Systems Pages: 357-358 Issue: 4 Volume: 30 Year: 2021 Month: 07 X-DOI: 10.1080/0960085X.2021.1946252 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1946252 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:4:p:357-358 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1895682_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Sebastian W. Schuetz Author-X-Name-First: Sebastian W. Author-X-Name-Last: Schuetz Author-Name: Tracy Ann Sykes Author-X-Name-First: Tracy Ann Author-X-Name-Last: Sykes Author-Name: Viswanath Venkatesh Author-X-Name-First: Viswanath Author-X-Name-Last: Venkatesh Title: Combating COVID-19 fake news on social media through fact checking: antecedents and consequences Abstract: The onset of the COVID-19 pandemic was accompanied with a pandemic of fake news spreading over social media (SM). Fact checking might help combat fake news and a plethora of fact-checking platforms exist, yet few people actually use them. Moreover, whether fact checking is effective in preventing citizens from falling for fake news, particularly COVID-19 related, is unclear. Against this backdrop, we examine potential antecedents to fact checking that can be a target for interventions and establish that fact checking is actually effective for preventing the public from falling for harmful COVID-19 fake news. We use a representative U.S. sample collected in April of 2020 and find that awareness of fake news and patterns of active SM use (e.g., commenting on content instead of reading it) increases the fact checking of COVID-19 fake news, whereas SM homophily reduces fact checking and the effects of SM use as users are trapped in “echo chambers”. We also find that fact checking helps users identify accurate information on how to protect themselves against COVID-19 instead of false and often harmful claims propagated on SM. These findings highlight the importance of fact checking for combating COVID-19 fake news and help identify potential interventions. Journal: European Journal of Information Systems Pages: 376-388 Issue: 4 Volume: 30 Year: 2021 Month: 07 X-DOI: 10.1080/0960085X.2021.1895682 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1895682 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:4:p:376-388 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933519_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jonathan Liebenau Author-X-Name-First: Jonathan Author-X-Name-Last: Liebenau Author-Name: Steve Smithson Author-X-Name-First: Steve Author-X-Name-Last: Smithson Title: Conference calls Journal: European Journal of Information Systems Pages: 141-142 Issue: 3 Volume: 5 Year: 1996 Month: 9 X-DOI: 10.1057/ejis.1996.20 File-URL: http://hdl.handle.net/10.1057/ejis.1996.20 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:5:y:1996:i:3:p:141-142 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933520_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: L Willcocks Author-X-Name-First: L Author-X-Name-Last: Willcocks Author-Name: G Fitzgerald Author-X-Name-First: G Author-X-Name-Last: Fitzgerald Author-Name: M Lacity Author-X-Name-First: M Author-X-Name-Last: Lacity Title: To outsource IT or not?: recent research on economics and evaluation practice Abstract: The paper reports findings from 26 longitudinal case studies of information technology (IT) outsourcing researched in the 1993–95 period. The primary focus is on evaluation practices in the lead up to making IT sourcing decisions. The pre-existing IT evaluation system was found to be a help or a major hindrance as a basis from which to assess outsourcing vendor bids. Difficulties experienced in evaluating in-house performance are highlighted. Issues include evaluating total IT contribution, identifying full costs, benchmarking and external comparisons, the role of charging systems, and the adoption of service level agreements by the in-house operation. Organizational experiences on assessing vendor bids against in-house options are then detailed. These are presented in distilled form as ‘a rich picture’ representative case study, together with additional lessons derived from the research. Finally we highlight the emerging evaluation approach shared by organizations that made effective sourcing decisions. Journal: European Journal of Information Systems Pages: 143-160 Issue: 3 Volume: 5 Year: 1996 Month: 9 X-DOI: 10.1057/ejis.1996.21 File-URL: http://hdl.handle.net/10.1057/ejis.1996.21 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:5:y:1996:i:3:p:143-160 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933521_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: T Reponen Author-X-Name-First: T Author-X-Name-Last: Reponen Author-Name: J Pärnistö Author-X-Name-First: J Author-X-Name-Last: Pärnistö Author-Name: J Viitanen Author-X-Name-First: J Author-X-Name-Last: Viitanen Title: Personality's impact on information management strategy formulation Abstract: This study aimed to examine the impact of a decision maker's personality on the ways the decision maker formulates information resource strategies. The basic hypothesis is that different personalities make different decisions in the same environment. An empirical test was made with a group of 20 managers participating in an Executive Education Programme. Using the results of the Myers and Briggs Type Indicator test the managers were divided into two groups of intuitive–extrovert and sensing–introvert types. Both groups were given the same assignment – creating an information resource strategy for a case company – and conclusions were drawn from their behaviour during the process and the results of their work. This test shows that the personality has a strong influence on both the working methods and results of the planning process. The main conclusion is that the decision maker's personality should be taken into consideration in the strategic planning processes. Journal: European Journal of Information Systems Pages: 161-171 Issue: 3 Volume: 5 Year: 1996 Month: 9 X-DOI: 10.1057/ejis.1996.22 File-URL: http://hdl.handle.net/10.1057/ejis.1996.22 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:5:y:1996:i:3:p:161-171 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933522_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: N Zinatelli Author-X-Name-First: N Author-X-Name-Last: Zinatelli Author-Name: PB Cragg Author-X-Name-First: PB Author-X-Name-Last: Cragg Author-Name: ALM Cavaye Author-X-Name-First: ALM Author-X-Name-Last: Cavaye Title: End user computing sophistication and success in small firms Abstract: End user computing (EUC) is becoming an increasingly important activity in small firms. This paper explores factors influencing the sophistication and success of EUC in small businesses. Case studies of eight small manufacturing firms revealed both positive and negative influences of intra-organizational and extra-organizational factors on EUC sophistication and success. In addition, the case study results indicate a strong need for training and both internal and external EUC support for small firms. Journal: European Journal of Information Systems Pages: 172-181 Issue: 3 Volume: 5 Year: 1996 Month: 9 X-DOI: 10.1057/ejis.1996.23 File-URL: http://hdl.handle.net/10.1057/ejis.1996.23 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:5:y:1996:i:3:p:172-181 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933523_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: R Vetschera Author-X-Name-First: R Author-X-Name-Last: Vetschera Author-Name: H Walterscheid Author-X-Name-First: H Author-X-Name-Last: Walterscheid Title: The evaluation of managerial support systems in German companies Abstract: The development and evaluation processes of managerial support systems were studied in a survey of German companies. This paper concentrates on influences between variables within the evaluation process and external factors. Within the evaluation process, there was only weak evidence of the relationship between evaluation criteria and methods often postulated in the theoretical literature. In contrast, there were several strong influences from external factors. Interdependencies exist between the type of system (management information system vs decision support system) and the criteria used for evaluation. There is also a strong influence from the initiators of the system on criteria, especially when systems are initiated by functional departments rather than top management. Further connections were established between characteristics of the development process and evaluation methods. Journal: European Journal of Information Systems Pages: 182-195 Issue: 3 Volume: 5 Year: 1996 Month: 9 X-DOI: 10.1057/ejis.1996.24 File-URL: http://hdl.handle.net/10.1057/ejis.1996.24 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:5:y:1996:i:3:p:182-195 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933524_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: C Ferioli Author-X-Name-First: C Author-X-Name-Last: Ferioli Author-Name: P Migliarese Author-X-Name-First: P Author-X-Name-Last: Migliarese Title: Supporting organizational relations through information technology in innovative organizational forms Abstract: The paper analyses some of the main organizational changes which have emerged in the last few years as an answer to the new economic environment calling for global, time-based competition: reduction of hierarchy levels, elimination of slack resources, enlargement of decisional autonomy of organizational units/offices and of lateral communication and coordination mechanisms. The paper affirms a new role of information technology (IT) connected to these organizational transformations. Three main areas for new IT support are recognised: (i) facilities for middle manager decisions; (ii) tools for improving the decisional autonomy of organizational units; and (iii) supports to lateral mechanisms of communication and coordination. For analysing and identifying these new areas of support, a new method of organizational analysis is proposed: the relational method of organizational analysis. This new multidimensional method and perspective overcomes difficulties deriving from the reductionism of the existing methods, looking only to the ‘economic’, ‘formal’ or ‘interpersonal’ components of the relation. Instead the proposed relational method is able to analyse simultaneously the several dimensions of a relation and to discover and to explain the new role of IT in innovative firms. Journal: European Journal of Information Systems Pages: 196-207 Issue: 3 Volume: 5 Year: 1996 Month: 9 X-DOI: 10.1057/ejis.1996.25 File-URL: http://hdl.handle.net/10.1057/ejis.1996.25 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:5:y:1996:i:3:p:196-207 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933525_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: GM Marakas Author-X-Name-First: GM Author-X-Name-Last: Marakas Author-Name: S Hornik Author-X-Name-First: S Author-X-Name-Last: Hornik Title: Passive resistance misuse: overt support and covert recalcitrance in IS implementation Abstract: A major postulate in many theoretical perspectives of information technology (IT) implementation is the rational assumption that resistance to change is an observable behaviour and that it is mutually exclusive of supportive behaviour. This perspective assumes that any resistance manifesting itself in a covert manner is generally dysfunctional and is motivated more by either criminal intent or opportunities for personal gain.The purpose of this paper is to focus attention on a form of covert resistance to the IT implementation process that is neither couched in criminal intent nor motivated by personal gain. We define passive resistance misuse (PRM) to be a recalcitrant, covert behaviour that results from both fear and stress stemming from the intrusion of the technology into the previously stable world of the user. Such behaviour takes the form of overt cooperation and acceptance of the proposed system combined with covert resistance and likely sabotage of the implementation effort. We offer two related theoretical foundations to assist in explaining the phenomenon of PRM: (1) passive-aggressive behaviour theory and (2) action science's espoused theories vs theories in use. Through these two theoretical lenses we describe PRM, provide examples of PRM behaviour as well as its proposed causes and offer a framework for inclusion of this construct into an information system (IS) design and implementation research agenda. Journal: European Journal of Information Systems Pages: 208-219 Issue: 3 Volume: 5 Year: 1996 Month: 9 X-DOI: 10.1057/ejis.1996.26 File-URL: http://hdl.handle.net/10.1057/ejis.1996.26 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:5:y:1996:i:3:p:208-219 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933635_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Brent Work Author-X-Name-First: Brent Author-X-Name-Last: Work Title: Doing research in Business and Management: An Introduction to process and method Journal: European Journal of Information Systems Pages: 201-202 Issue: 3 Volume: 9 Year: 2000 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000353 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000353 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:3:p:201-202 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933636_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ian Colville Author-X-Name-First: Ian Author-X-Name-Last: Colville Title: Future organizational design: the scope for IT-based enterprise Journal: European Journal of Information Systems Pages: 202-203 Issue: 3 Volume: 9 Year: 2000 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000354 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000354 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:3:p:202-203 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933637_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: A Brown Author-X-Name-First: A Author-X-Name-Last: Brown Title: The IT value quest: How to capture the business value of IT-based infrastructure Journal: European Journal of Information Systems Pages: 203-204 Issue: 3 Volume: 9 Year: 2000 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000360 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000360 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:3:p:203-204 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933638_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: L A Tai Author-X-Name-First: L A Author-X-Name-Last: Tai Author-Name: R Phelps Author-X-Name-First: R Author-X-Name-Last: Phelps Title: CEO and CIO perceptions of information systems strategy: evidence from Hong Kong Abstract: Studies in the literature indicate that many organizations have experienced a crisis of confidence in information systems (IS) functions and IS executives. We address the issue of joint chief executive/IT executive responsibility in building a corporate culture to overcome resistance to technological changes. This paper reports a study of differences in IT perceptions between chief executives and IS executives. The results suggest a similarity of views in three major dimensions of perception: IT vision, organizational IS issues and IT support for knowledge management. The study also suggests that national culture, industry type and the chief executive/IT executive relationship contribute to differences in IT perception. Journal: European Journal of Information Systems Pages: 163-172 Issue: 3 Volume: 9 Year: 2000 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000362 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000362 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:3:p:163-172 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933639_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: S J Simon Author-X-Name-First: S J Author-X-Name-Last: Simon Title: The reorganization of the information systems of the US Naval Construction Forces: an action research project Abstract: Organization change is a difficult task under the best of circumstances. Change dictated from outside the organization makes a reorganization project even more difficult. This study follows the information systems reorganization of the US Naval Construction Forces whose restructuring was directed as a result of budget cuts and military ‘right-sizing’. The process was conducted through the use of action research, an intensive investigative method seeing limited use in information system's research. This method directly involves the researcher in the organizational change effort while placing organization members in close collaboration with the researcher. The study describes the action research methodology while illustrating the research strategy in phases and recounts the successful migration from a highly centralised to a decentralised organization. Journal: European Journal of Information Systems Pages: 148-162 Issue: 3 Volume: 9 Year: 2000 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000363 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000363 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:3:p:148-162 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933640_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Phil Seltsikas Author-X-Name-First: Phil Author-X-Name-Last: Seltsikas Title: System development: A strategic framework Journal: European Journal of Information Systems Pages: 204-204 Issue: 3 Volume: 9 Year: 2000 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000365 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000365 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:3:p:204-204 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933641_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Chaomei Chen Author-X-Name-First: Chaomei Author-X-Name-Last: Chen Title: Bringing global information systems into business Journal: European Journal of Information Systems Pages: 204-205 Issue: 3 Volume: 9 Year: 2000 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000366 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000366 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:3:p:204-205 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933642_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Egon Berghout Author-X-Name-First: Egon Author-X-Name-Last: Berghout Title: Information technology standards and standardization: A global perspective Journal: European Journal of Information Systems Pages: 205-205 Issue: 3 Volume: 9 Year: 2000 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000367 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000367 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:3:p:205-205 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933643_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: J Damsgaard Author-X-Name-First: J Author-X-Name-Last: Damsgaard Author-Name: D Truex Author-X-Name-First: D Author-X-Name-Last: Truex Title: Binary trading relations and the limits of EDI standards: the Procrustean bed of standards Abstract: This paper provides a critical examination of electronic data interchange (EDI) standards and their application in different types of trading relationships. It argues that EDI standards are not directly comparable to more stable sets of technical standards in that they are dynamically tested and negotiated in use with each trading exchange. It takes the position that EDI standards are an emergent language form and must mean different things at the institutional and local levels. Using the lens of emergent linguistic analysis it shows how the institutional and local levels must always be distinct and yet can coexist. EDI standards can never represent the creation of an ‘Esperanto of institutional communication’. Instead we believe that standards must be developed such that they support and accommodate general basic grammatical forms that can be customised to individual needs. The analysis is supported by a set of exemplary cases. Journal: European Journal of Information Systems Pages: 173-188 Issue: 3 Volume: 9 Year: 2000 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000368 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000368 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:3:p:173-188 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933644_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: R P Marble Author-X-Name-First: R P Author-X-Name-Last: Marble Title: Operationalising the implementation puzzle: an argument for eclecticism in research and in practice Abstract: Efforts to implement organizational information systems (IS) have evolved through the years from purely technical processes to multi-faceted organizational change activities. Largely in reaction to implementation failures, numerous research models have been developed to prescribe appropriate implementation strategies and tactics. A multiple of such contributions has made the theory quite diverse and somewhat chaotic. This paper presents a survey of implementation models, research approaches, and investigation methods that have surfaced in the literature of the field. Using an implementation framework of Swanson (1988), an eclectic perspective of IS research, and an expert knowledge integration approach, a perspective is proposed that demonstrates the possibility of a unified view of IS implementation theory. Journal: European Journal of Information Systems Pages: 132-147 Issue: 3 Volume: 9 Year: 2000 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000369 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000369 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:3:p:132-147 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933645_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bob O'Keefe Author-X-Name-First: Bob Author-X-Name-Last: O'Keefe Author-Name: Ray Paul Author-X-Name-First: Ray Author-X-Name-Last: Paul Title: Editorial Journal: European Journal of Information Systems Pages: 131-131 Issue: 3 Volume: 9 Year: 2000 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000370 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000370 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:3:p:131-131 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933646_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: A Brown Author-X-Name-First: A Author-X-Name-Last: Brown Title: Book review/viewpoint on Ian Angell's book—‘The New Barbarian Manifesto: How to Survive in the Information Age’ Journal: European Journal of Information Systems Pages: 189-200 Issue: 3 Volume: 9 Year: 2000 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000371 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000371 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:3:p:189-200 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934052_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Peter Meso Author-X-Name-First: Peter Author-X-Name-Last: Meso Author-Name: Philip Musa Author-X-Name-First: Philip Author-X-Name-Last: Musa Author-Name: Detmar Straub Author-X-Name-First: Detmar Author-X-Name-Last: Straub Author-Name: Victor Mbarika Author-X-Name-First: Victor Author-X-Name-Last: Mbarika Title: Information infrastructure, governance, and socio-economic development in developing countries Abstract: There is growing interest in the role and contribution of national information infrastructure (NII) to the quality of governance and the socio-economic development of nation states. In this paper, we use publicly available archival data to explore the relationships among NII, governance, and socio-economic development in developing countries. Results substantiate a significant relationship between NII and governance, and NII and socio-economic development. The findings suggest that NII have the capacity to contribute to country development, both directly (via impacts on socio-economic development) and indirectly (via its impacts on governance, which in turn influences socio-economic development). Journal: European Journal of Information Systems Pages: 52-65 Issue: 1 Volume: 18 Year: 2009 Month: 2 X-DOI: 10.1057/ejis.2008.56 File-URL: http://hdl.handle.net/10.1057/ejis.2008.56 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:1:p:52-65 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934053_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Selamawit Molla Mekonnen Author-X-Name-First: Selamawit Molla Author-X-Name-Last: Mekonnen Author-Name: Sundeep Sahay Author-X-Name-First: Sundeep Author-X-Name-Last: Sahay Title: Erratum: An institutional analysis on the dynamics of the interaction between standardizing and scaling processes: a case study from Ethiopia Journal: European Journal of Information Systems Pages: 98-98 Issue: 1 Volume: 18 Year: 2009 Month: 2 X-DOI: 10.1057/ejis.2008.59 File-URL: http://hdl.handle.net/10.1057/ejis.2008.59 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:1:p:98-98 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934054_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Anita Mangan Author-X-Name-First: Anita Author-X-Name-Last: Mangan Author-Name: Séamas Kelly Author-X-Name-First: Séamas Author-X-Name-Last: Kelly Title: Information systems and the allure of organisational integration: a cautionary tale from the Irish financial services sector Abstract: In this paper we draw on evidence from an in-depth, longitudinal, interpretive study of an ambitious attempt to implement a large-scale information systems (IS) infrastructure (the ILCUTECH Standard Information System (ISIS) project) within the Irish credit union movement, to explore some of the difficulties and contradictions associated with information and communication technology (ICT)-enabled organisational integration. We argue that, in their enthusiasm for facilitating IS innovation, the leadership of the movement neglected more deep-seated organisational issues that were, to that point, largely unarticulated. In an attempt to get to the heart of these issues, we synthesise a distinctive theoretical perspective that draws mainly on institutional theory. This helps untangle the complex institutional heritage of the credit union movement, which resulted in the emergence of an interesting hybridity of institutional logics and latent contradictions. These contradictions provoked the emergence of a particular kind of institutional entrepreneurship, which was deeply implicated in reshaping institutionalised ways of thinking and doing. We emphasise the political nature of the change process and argue that the institutional arrangements for governing the ISIS project, which also underpinned the governance of the broader movement, were not well suited to manage the risk associated with such an enterprise. We conclude by suggesting that the case described might be an example of the workings of a broader kind of change dynamics around ICT. Specifically, the scale and scope of the change project acted as a trigger that brought tensions underlying existing competing institutional logics to a head, thus provoking institutional reform. Journal: European Journal of Information Systems Pages: 66-78 Issue: 1 Volume: 18 Year: 2009 Month: 2 X-DOI: 10.1057/ejis.2008.60 File-URL: http://hdl.handle.net/10.1057/ejis.2008.60 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:1:p:66-78 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934055_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Eduardo Redondo Author-X-Name-First: Eduardo Author-X-Name-Last: Redondo Author-Name: Elizabeth Daniel Author-X-Name-First: Elizabeth Author-X-Name-Last: Daniel Author-Name: John Ward Author-X-Name-First: John Author-X-Name-Last: Ward Title: Combining the rational and relational perspectives of electronic trading Abstract: Many organisations make extensive use of electronic linkages to facilitate their trading exchanges with partners such as suppliers, distributors and customers. This research explores how the use of inter-organisational systems (IOS) both affects, and is affected by, the relationships between trading partners. In doing this, it brings together two existing but distinct perspectives and literatures; the rational view informed by IOS research, and the behavioural or relationship perspective embodied in inter-organisational relationships (IOR) literature. The research was undertaken in the European paper industry by means of six dyadic case studies. The dyads studied covered both traditional electronic data interchange systems and newer e-marketplace environments. A framework was derived from existing literature that integrates the two perspectives of interest. The framework was used to analyse the case studies undertaken and enabled the inter-relationship between IOS use and IOR to be explained. Journal: European Journal of Information Systems Pages: 79-97 Issue: 1 Volume: 18 Year: 2009 Month: 2 X-DOI: 10.1057/ejis.2008.61 File-URL: http://hdl.handle.net/10.1057/ejis.2008.61 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:1:p:79-97 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934056_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ting Li Author-X-Name-First: Ting Author-X-Name-Last: Li Author-Name: Eric van Heck Author-X-Name-First: Eric Author-X-Name-Last: van Heck Author-Name: Peter Vervest Author-X-Name-First: Peter Author-X-Name-Last: Vervest Title: Information capability and value creation strategy: advancing revenue management through mobile ticketing technologies Abstract: Using the process-oriented view and resource-based theory, we investigate how mobile ticketing technologies can successfully enable revenue management. We collect data from 17 cases worldwide in which smart cards and mobile devices have been adopted in the public transport industry over the last decade. The use of these technologies allows service providers to capture real-time and complete information of customers' actual travel. This enables service providers to employ advanced price differentiation and service expansion strategies and achieve new ‘best practice’ in revenue management. The results demonstrate that service providers that use more sophisticated mobile ticketing technologies are more likely to adopt advanced strategies to create value. Further, they are more likely to achieve higher performance gains. Journal: European Journal of Information Systems Pages: 38-51 Issue: 1 Volume: 18 Year: 2009 Month: 2 X-DOI: 10.1057/ejis.2009.1 File-URL: http://hdl.handle.net/10.1057/ejis.2009.1 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:1:p:38-51 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934057_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Sigi Goode Author-X-Name-First: Sigi Author-X-Name-Last: Goode Author-Name: Shirley Gregor Author-X-Name-First: Shirley Author-X-Name-Last: Gregor Title: Rethinking organisational size in IS research: meaning, measurement and redevelopment Abstract: While organisational size is a popular construct in information systems (IS) research, findings from its use have been inconsistent. Few studies have explored this inconsistency or attempted to address this problem. This paper uses Churchill's measure development paradigm to conduct three separate but related investigations into the size construct. Study 1 explored the domain and dimensions of size. Some 2000 research papers published in six leading IS journals over an 11-year period were read in order to determine what researchers thought size meant and how they measured it. The study found 21 constructs underpinning the size construct and 25 ways of measuring size, but no clear relationship between size meaning and measurement. Study 2 assessed the construct's content validity using a concept map exercise involving 41 participants. Multidimensional scaling clustered the constructs into three conceptual groups. Study 3 administered the size construct in a survey with a sample of 163 Australian firms. The study found that the data supported the constructs observed in Study 2 and that a group of eight constructs could be used to differentiate between smaller and larger firms in the sample. Analysis revealed that organisational levels, risk aversion, geographic distribution and employment reflected respondents’ self-nominated size. Journal: European Journal of Information Systems Pages: 4-25 Issue: 1 Volume: 18 Year: 2009 Month: 2 X-DOI: 10.1057/ejis.2009.2 File-URL: http://hdl.handle.net/10.1057/ejis.2009.2 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:1:p:4-25 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934058_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Richard Baskerville Author-X-Name-First: Richard Author-X-Name-Last: Baskerville Title: The EJIS editorial organisation and submissions Journal: European Journal of Information Systems Pages: 1-3 Issue: 1 Volume: 18 Year: 2009 Month: 2 X-DOI: 10.1057/ejis.2009.3 File-URL: http://hdl.handle.net/10.1057/ejis.2009.3 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:1:p:1-3 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934059_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Joshua M Davis Author-X-Name-First: Joshua M Author-X-Name-Last: Davis Author-Name: William J Kettinger Author-X-Name-First: William J Author-X-Name-Last: Kettinger Author-Name: Dimitar G Kunev Author-X-Name-First: Dimitar G Author-X-Name-Last: Kunev Title: When users are IT experts too: the effects of joint IT competence and partnership on satisfaction with enterprise-level systems implementation Abstract: Enterprise-level information systems (IS) are fundamental to businesses. Unfortunately, implementing these large-scale systems is a complex and risky endeavor. As a result, these initiatives must tap the expertise and active involvement of both the IS department and the enterprise's functional areas. Past studies focusing on IS implementation teams consistently identify the IS department as the source of technical expertise and leadership, while functional department team members are typically relegated to the role of business experts. However, unlike the past, many business professionals are knowledgeable about information technology (IT) and are increasingly capable of contributing to IS implementations from a technical perspective as well as a business perspective. This study examines how IT competence held by both the IS department and the user department stakeholders contributes to user satisfaction with the enterprise-level system implementation. Specifically, this research introduces a theoretically grounded construct, joint IT competence, which emerges when the IS department and user department stakeholders integrate their individually held IT competences. The study's results empirically demonstrate that joint IT competence is a key driver of user satisfaction in enterprise-level IS implementations. Although not as significant as joint IT competence, results show that partner-based leadership between the IS department and user stakeholders also influences user satisfaction with IS implementations. Journal: European Journal of Information Systems Pages: 26-37 Issue: 1 Volume: 18 Year: 2009 Month: 2 X-DOI: 10.1057/ejis.2009.4 File-URL: http://hdl.handle.net/10.1057/ejis.2009.4 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:1:p:26-37 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934060_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: The Editors Title: Thank you to Reviewers Journal: European Journal of Information Systems Pages: 99-99 Issue: 1 Volume: 18 Year: 2009 Month: 2 X-DOI: 10.1057/ejis.2009.5 File-URL: http://hdl.handle.net/10.1057/ejis.2009.5 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:1:p:99-99 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934020_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Nicolas Lesca Author-X-Name-First: Nicolas Author-X-Name-Last: Lesca Author-Name: Marie-Laurence Caron-Fasan Author-X-Name-First: Marie-Laurence Author-X-Name-Last: Caron-Fasan Title: Strategic scanning project failure and abandonment factors: lessons learned Abstract: This article aims to explore factors contributing to the failure and abandonment of strategic scanning projects and operational systems. Thirty-nine projects that were studied using action research methods are analyzed. The results suggest that failure and abandonment are provoked by combinations of factors relating to stakeholders' qualifications and experience, to the management and organization of the project system, as well as to strategic alignment and changes in the organization's internal structure. These factors include poor project impetus, uninvolved management, unqualified people, inaccurate expectations, project mismanagement, strategy misalignment, poor participation, hostile culture, insufficient budget, conflating technical and managerial problems, previous project trauma and underestimated complexity. Journal: European Journal of Information Systems Pages: 371-386 Issue: 4 Volume: 17 Year: 2008 Month: 8 X-DOI: 10.1057/ejis.2008.21 File-URL: http://hdl.handle.net/10.1057/ejis.2008.21 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:4:p:371-386 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934021_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Norman A Johnson Author-X-Name-First: Norman A Author-X-Name-Last: Johnson Author-Name: Randolph B Cooper Author-X-Name-First: Randolph B Author-X-Name-Last: Cooper Author-Name: Wynne W Chin Author-X-Name-First: Wynne W Author-X-Name-Last: Chin Title: The effect of flaming on computer-mediated negotiations Abstract: There is an increasing use of computer media for negotiations. However, the use of computer-mediated channels increases the hostile expressions of emotion, termed flaming. Although researchers agree that flaming has important effects on negotiation, predictions concerning these effects are inconsistent, suggesting a need for further investigation. We address this need by extending current flaming and negotiation research in two ways. First, we identify two different types of flaming: that which is motivated by perceptions concerning the negotiating opponent (e.g., he/she is unfair) and that which is motivated by perceptions concerning the negotiating context (e.g., the communication channel is too slow). Second, we differentiate between the effects of flaming on the concession behaviors of the flame sender and the flame recipient, and the effects of these behaviors on negotiated agreement. Via a laboratory study, we demonstrate that flames directed at the negotiation opponent slightly decrease the likelihood of reaching an agreement, and when an agreement is reached, it result in outcomes significantly favoring the flame recipient rather than the flame sender. In contrast, flames directed at the negotiation context significantly increase the likelihood of agreement, although outcomes still favor the flame recipient over the flame sender. These results suggest that flame senders are generally worse off than flame recipients, which provides an important basis for the strategic use of flaming in negotiations. Journal: European Journal of Information Systems Pages: 417-434 Issue: 4 Volume: 17 Year: 2008 Month: 8 X-DOI: 10.1057/ejis.2008.22 File-URL: http://hdl.handle.net/10.1057/ejis.2008.22 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:4:p:417-434 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934022_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Andrea Carugati Author-X-Name-First: Andrea Author-X-Name-Last: Carugati Title: Erratum: System development activities and inquiring systems: an integrating framework Journal: European Journal of Information Systems Pages: 435-435 Issue: 4 Volume: 17 Year: 2008 Month: 8 X-DOI: 10.1057/ejis.2008.23 File-URL: http://hdl.handle.net/10.1057/ejis.2008.23 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:4:p:435-435 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934023_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Iris A Junglas Author-X-Name-First: Iris A Author-X-Name-Last: Junglas Author-Name: Norman A Johnson Author-X-Name-First: Norman A Author-X-Name-Last: Johnson Author-Name: Christiane Spitzmüller Author-X-Name-First: Christiane Author-X-Name-Last: Spitzmüller Title: Personality traits and concern for privacy: an empirical study in the context of location-based services Abstract: For more than a century, concern for privacy (CFP) has co-evolved with advances in information technology. The CFP refers to the anxious sense of interest that a person has because of various types of threats to the person's state of being free from intrusion. Research studies have validated this concept and identified its consequences. For example, research has shown that the CFP can have a negative influence on the adoption of information technology; but little is known about factors likely to influence such concern. This paper attempts to fill that gap. Because privacy is said to be a part of a more general ‘right to one's personality’, we consider the so-called ‘Big Five’ personality traits (agreeableness, extraversion, emotional stability, openness to experience, and conscientiousness) as factors that can influence privacy concerns. Protection motivation theory helps us to explain this influence in the context of an emerging pervasive technology: location-based services. Using a survey-based approach, we find that agreeableness, conscientiousness, and openness to experience each affect the CFP. These results have implications for the adoption, the design, and the marketing of highly personalized new technologies. Journal: European Journal of Information Systems Pages: 387-402 Issue: 4 Volume: 17 Year: 2008 Month: 8 X-DOI: 10.1057/ejis.2008.29 File-URL: http://hdl.handle.net/10.1057/ejis.2008.29 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:4:p:387-402 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934024_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Robert D Galliers Author-X-Name-First: Robert D Author-X-Name-Last: Galliers Title: A discipline for a stage? A Shakespearean reflection on the research plot and performance of the Information Systems field Abstract: The different traditions of European and North American Information Systems research are highlighted and traditional means of measuring research quality (including citation patterns and journal impact factors) are questioned. Shakespearean metaphors are used to highlight these distinctions. The article concludes with a call for greater diversity and appreciation of alternative research traditions and cultures, and of the journals that publish such research. Journal: European Journal of Information Systems Pages: 330-335 Issue: 4 Volume: 17 Year: 2008 Month: 8 X-DOI: 10.1057/ejis.2008.30 File-URL: http://hdl.handle.net/10.1057/ejis.2008.30 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:4:p:330-335 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934025_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ray J Paul Author-X-Name-First: Ray J Author-X-Name-Last: Paul Title: Measuring research quality: the United Kingdom Government's Research Assessment Exercise Abstract: Can research quality be measured meaningfully? Whether it can or not does not interfere with the desire to do so if the motivation is strong enough. This paper discusses the United Kingdom (U.K.) Government's approach to measuring research quality in U.K. universities, known in the U.K. as the Research Assessment Exercise (RAE). The RAE is held at irregular intervals of time, the latest being held in 2008 (RAE 2008). The motivation is accountability of government spending, but in fact many different objectives are ascribed to the exercise. RAE 2008 is fully described so that it can be used to raise debating issues around the general issue of research quality, a subject that appears to be of universal interest in Information Systems. One major conclusion appears to be that journal rankings are not a good indicator of the quality of any paper published in that journal, nor necessarily of the combined quality of all the papers. Journal: European Journal of Information Systems Pages: 324-329 Issue: 4 Volume: 17 Year: 2008 Month: 8 X-DOI: 10.1057/ejis.2008.31 File-URL: http://hdl.handle.net/10.1057/ejis.2008.31 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:4:p:324-329 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934026_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Aristeidis Theotokis Author-X-Name-First: Aristeidis Author-X-Name-Last: Theotokis Author-Name: Pavlos A Vlachos Author-X-Name-First: Pavlos A Author-X-Name-Last: Vlachos Author-Name: Katerina Pramatari Author-X-Name-First: Katerina Author-X-Name-Last: Pramatari Title: The moderating role of customer–technology contact on attitude towards technology-based services Abstract: Previous studies in information systems research and service marketing treat customer behaviour towards technology-based services (TBS) homogeneously. However, recent studies recognize that users have different attitude towards different technologies even if these technologies used to support the same service. Drawing on literature from service marketing (i.e. customer contact theory), information systems (unified theory of technology acceptance), and organizational behaviour (task complexity theory), this study proposes a construct that classifies TBS according to the level of customer–technology interaction they require, namely the customer–technology contact (CTC). The moderating effect of this construct on the relationship between individual characteristics – that is technology readiness and attitude towards TBS – is examined through an empirical study. Technology-based retail services scenarios, with different levels of technology contact, are presented to supermarket shoppers (n=600). Results show that CTC, as a unique service attribute, moderates the effect of personality traits to customers’ attitude. The current study introduces this new service attribute that is applicable to ubiquitous computing services, application and design. Journal: European Journal of Information Systems Pages: 343-351 Issue: 4 Volume: 17 Year: 2008 Month: 8 X-DOI: 10.1057/ejis.2008.32 File-URL: http://hdl.handle.net/10.1057/ejis.2008.32 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:4:p:343-351 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934027_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Colin Ashurst Author-X-Name-First: Colin Author-X-Name-Last: Ashurst Author-Name: Neil F Doherty Author-X-Name-First: Neil F Author-X-Name-Last: Doherty Author-Name: Joe Peppard Author-X-Name-First: Joe Author-X-Name-Last: Peppard Title: Improving the impact of IT development projects: the benefits realization capability model Abstract: The return that organizations derive from investments in information systems and technology continues to disappoint. While there are many theoretical prescriptions as to how the planned benefits from an information technology (IT) project might best be realized, there is very little empirical evidence, as to whether such advice is being heeded in practice. Drawing on the resource-based view of the firm, a conceptual model of a benefits realization capability is presented and developed. In this model, the benefits realization capability is operationalized through four distinct competences, each of which is underpinned by a variety of socially defined practices. The model was populated by using a thorough review of the literature to identify and categorize those specific practices that have the potential to contribute to the effective achievement of benefits from IT investment projects. These practices are then studied in an empirical examination of 25 IT projects. The analysis finds no evidence of benefits realization practices being adopted in any consistent, comprehensive or coherent manner. Effective benefits realization requires an ongoing commitment to, and focus upon, the benefits, rather than the technology, throughout a system's development, implementation and operation. Journal: European Journal of Information Systems Pages: 352-370 Issue: 4 Volume: 17 Year: 2008 Month: 8 X-DOI: 10.1057/ejis.2008.33 File-URL: http://hdl.handle.net/10.1057/ejis.2008.33 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:4:p:352-370 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934028_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Guy Paré Author-X-Name-First: Guy Author-X-Name-Last: Paré Author-Name: Simon Bourdeau Author-X-Name-First: Simon Author-X-Name-Last: Bourdeau Author-Name: Josianne Marsan Author-X-Name-First: Josianne Author-X-Name-Last: Marsan Author-Name: Hamid Nach Author-X-Name-First: Hamid Author-X-Name-Last: Nach Author-Name: Shadi Shuraida Author-X-Name-First: Shadi Author-X-Name-Last: Shuraida Title: Re-examining the causal structure of information technology impact research Abstract: About 20 years ago, Markus and Robey noted that most research on IT impacts had been guided by deterministic perspectives and had neglected to use an emergent perspective, which could account for contradictory findings. They further observed that most research in this area had been carried out using variance theories at the expense of process theories. Finally, they suggested that more emphasis on multilevel theory building would likely improve empirical reliability. In this paper, we reiterate the observations and suggestions made by Markus and Robey on the causal structure of IT impact theories and carry out an analysis of empirical research published in four major IS journals, Management Information Systems Quarterly (MISQ), Information Systems Research (ISR), the European Journal of Information Systems (EJIS), and Information and Organization (I&O), to assess compliance with those recommendations. Our final sample consisted of 161 theory-driven articles, accounting for approximately 21% of all the empirical articles published in these journals. Our results first reveal that 91% of the studies in MISQ, ISR, and EJIS focused on deterministic theories, while 63% of those in I&O adopted an emergent perspective. Furthermore, 91% of the articles in MISQ, ISR, and EJIS adopted a variance model; this compares with 71% from I&O that applied a process model. Lastly, mixed levels of analysis were found in 14% of all the surveyed articles. Implications of these findings for future research are discussed. Journal: European Journal of Information Systems Pages: 403-416 Issue: 4 Volume: 17 Year: 2008 Month: 8 X-DOI: 10.1057/ejis.2008.34 File-URL: http://hdl.handle.net/10.1057/ejis.2008.34 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:4:p:403-416 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934029_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Zahir Irani Author-X-Name-First: Zahir Author-X-Name-Last: Irani Author-Name: Tony Elliman Author-X-Name-First: Tony Author-X-Name-Last: Elliman Title: Creating social entrepreneurship in local government Abstract: The public sector is often considered synonym with inefficiency and a lack of motivation to be innovative. This paper seeks to contribute towards the literature surrounding social entrepreneurship in the public sector, through using institutional theory to underpin an e-Innovations model that promotes social entrepreneurship, while recognising how the adoption of innovation within the public sector is fostered. The proposed model seeks to serve as a process that threatens the conservative and risk-averse culture endemic in the public sector. Journal: European Journal of Information Systems Pages: 336-342 Issue: 4 Volume: 17 Year: 2008 Month: 8 X-DOI: 10.1057/ejis.2008.35 File-URL: http://hdl.handle.net/10.1057/ejis.2008.35 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:4:p:336-342 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934030_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Richard Baskerville Author-X-Name-First: Richard Author-X-Name-Last: Baskerville Title: Research quality, project failure, and privacy threats: spitting, yelling, and cussing Journal: European Journal of Information Systems Pages: 321-323 Issue: 4 Volume: 17 Year: 2008 Month: 8 X-DOI: 10.1057/ejis.2008.36 File-URL: http://hdl.handle.net/10.1057/ejis.2008.36 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:4:p:321-323 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933777_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Hugh Preston Author-X-Name-First: Hugh Author-X-Name-Last: Preston Title: Social and Economic Transformation in the Digital Era Journal: European Journal of Information Systems Pages: 315-316 Issue: 4 Volume: 13 Year: 2004 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000498 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000498 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:4:p:315-316 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933778_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Stephen Smith Author-X-Name-First: Stephen Author-X-Name-Last: Smith Title: e-Business Journal: European Journal of Information Systems Pages: 317-318 Issue: 4 Volume: 13 Year: 2004 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000505 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000505 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:4:p:317-318 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933779_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: David Arnott Author-X-Name-First: David Author-X-Name-Last: Arnott Title: Decision support systems evolution: framework, case study and research agenda Abstract: Evolutionary development has been central to the theory and practice of decision support systems (DSS) since the inception of the field. Terms such as ‘adaptive’ and ‘evolutionary’ capture the organic nature of the development of a decision support system. However, the terms are rarely defined and their meaning varies widely in the research literature. The aim of this paper is to contribute to decision support systems theory by investigating and clearly specifying the nature of the evolutionary process of a DSS. Using insights from other disciplines and prior DSS research, a framework for understanding DSS evolution is developed based on the aetiology, lineage, and tempo of evolution. The descriptive validity of the framework is demonstrated by applying it to published DSS studies and to an intensive case study of DSS development. The framework and the case study findings are used to define a research agenda that is important for evolutionary DSS development. Journal: European Journal of Information Systems Pages: 247-259 Issue: 4 Volume: 13 Year: 2004 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000509 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000509 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:4:p:247-259 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933780_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jeremy Fisher Author-X-Name-First: Jeremy Author-X-Name-Last: Fisher Author-Name: G Harindranath Author-X-Name-First: G Author-X-Name-Last: Harindranath Title: Regulation as a barrier to electronic commerce in Europe: the case of the European fund management industry Abstract: This paper presents results of exploratory research into the question of whether the distribution of investment funds via the Internet in Europe is being deterred by regulatory barriers. The paper examines the theoretical underpinnings behind financial services regulation and then asks if current regulation in place within the European Union and its Member States is consistent with this theory or indeed if regulation is acting as a barrier. Using both primary data and secondary sources, this exploratory study argues that European fund management firms face different regulatory obstacles, often the result of protectionism and the inconsistent application of financial regulations, in different EU countries. As a result, they are unable to reap the benefits that electronic commerce should bring in an industry that appears highly suited for it. Journal: European Journal of Information Systems Pages: 260-272 Issue: 4 Volume: 13 Year: 2004 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000510 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000510 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:4:p:260-272 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933781_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Gary Hackbarth Author-X-Name-First: Gary Author-X-Name-Last: Hackbarth Author-Name: William J Kettinger Author-X-Name-First: William J Author-X-Name-Last: Kettinger Title: Strategic aspirations for net-enabled business Abstract: The net-enabled business innovation cycle (NEBIC) model describes a path by which firms employ dynamic capabilities to leverage net-enablement. Some firms strategically aspire to follow this path in a more gradual fashion striving for business process improvements (incremental strategy) while others aspire to exploit rapidly net-enablement to achieve business innovation (leapfrogging strategy) that offers completely new market opportunities. Study results suggest that firms adopt accelerated leapfrogging strategies when faced with more severe external competitive pressures. This combined with strong leadership, a propensity to embrace internal user involvement, IT maturity, and an accommodating firm structure, as indicated by path accelerators, result in higher aspirations for business innovation. Firms shying away from leapfrogging strategies tend to protect existing customers and employees from more radical changes. These firms sometimes lacked the internal capability to enact more aggressive strategies and thus had to acquire the necessary capabilities before aspiring for business innovation. Journal: European Journal of Information Systems Pages: 273-285 Issue: 4 Volume: 13 Year: 2004 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000511 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000511 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:4:p:273-285 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933782_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Teresa Lynch Author-X-Name-First: Teresa Author-X-Name-Last: Lynch Author-Name: Shirley Gregor Author-X-Name-First: Shirley Author-X-Name-Last: Gregor Title: User participation in decision support systems development: Influencing system outcomes Abstract: Despite the widely held view that systems are more likely to be successful if users are involved during systems development, there is uncertainty about the exact nature of the relationship between user participation and system outcomes. There has been considerable research activity in this area but findings are inconclusive. Comparatively little qualitative research has been reported. This paper reports an interpretive study that examined the development process for 38 decision support systems in the Australian agricultural sector. The relationship between user participation and system outcome was explored. The degree of user influence in the design process was found to be an important component of this relationship. Degree of user influence was a result of both the type and depth of user participation. Much previous research has focused on whether users were involved in development without detailed consideration of the degree of influence on design features resulting from this participation. The results from this study are significant in that they yield theoretical insights into the phenomenon of user participation and related system outcomes. In addition, the results have practical significance for practitioners developing decision support software. Journal: European Journal of Information Systems Pages: 286-301 Issue: 4 Volume: 13 Year: 2004 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000512 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000512 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:4:p:286-301 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933783_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Adamantia G Pateli Author-X-Name-First: Adamantia G Author-X-Name-Last: Pateli Author-Name: George M Giaglis Author-X-Name-First: George M Author-X-Name-Last: Giaglis Title: A research framework for analysing eBusiness models Abstract: As eBusiness is moving towards maturity, research interests shift to the investigation of opportunities for market exploitation of eBusiness technologies. As a result, the debate around business models naturally becomes more topical. However, while many researchers and practitioners are contemplating business models, there is an alarming lack of theoretical tools in the literature to structure and codify knowledge in the area. This paper draws on an extensive review of the literature to propose an analytic framework that decomposes the area of business models into eight research sub-domains. The proposed framework is then applied to organize and critically review existing research under each sub-domain as well as to define an agenda of future challenges on business model research. The framework can benefit future research by allowing researchers to better concentrate their efforts and place their contributions in an overall context, thus assisting in building a coherent body of knowledge in the challenging research domain of business models. Journal: European Journal of Information Systems Pages: 302-314 Issue: 4 Volume: 13 Year: 2004 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000513 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000513 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:4:p:302-314 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933784_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ray J Paul, Author-X-Name-First: Ray J Author-X-Name-Last: Paul, Title: Time, change and EJIS Journal: European Journal of Information Systems Pages: 245-246 Issue: 4 Volume: 13 Year: 2004 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000514 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000514 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:4:p:245-246 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934110_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Vicky Arnold Author-X-Name-First: Vicky Author-X-Name-Last: Arnold Author-Name: Tanya Benford Author-X-Name-First: Tanya Author-X-Name-Last: Benford Author-Name: Clark Hampton Author-X-Name-First: Clark Author-X-Name-Last: Hampton Author-Name: Steve G Sutton Author-X-Name-First: Steve G Author-X-Name-Last: Sutton Title: Competing pressures of risk and absorptive capacity potential on commitment and information sharing in global supply chains Abstract: Organizations’ competitiveness and success are no longer dependent solely on their own performance, but rather are dependent on the competitiveness of the supply chains in which they participate. Increasingly, these supply chains are globally distributed introducing the possibility of greater benefits, as well as greater risk. This study examines the countervailing impact of a global supply chain partner's business-to-business e-commerce business risk and absorptive capacity on an organization's willingness to commit to and share information with that supply chain partner. We survey 207 organizations on their perceptions of specific offshore outsourcing and supply chain partners across dimensions of risk, absorptive capacity, commitment, and information sharing. The results support the theorized relationships indicating that a supply chain partner's increased levels of perceived risk has a strong negative effect on an organization's commitment and information sharing; conjointly, increases in a supply chain partner's absorptive capacity has a strong positive effect on commitment and information sharing. For both risk and absorptive capacity, commitment partially mediates the relationship with information sharing. Testing for systemic effects from geographical/cultural location on the relationship factors provides no evidence of a regional effect on measured items. Journal: European Journal of Information Systems Pages: 134-152 Issue: 2 Volume: 19 Year: 2010 Month: 4 X-DOI: 10.1057/ejis.2009.49 File-URL: http://hdl.handle.net/10.1057/ejis.2009.49 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:2:p:134-152 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934111_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Hsiao-Lan Wei Author-X-Name-First: Hsiao-Lan Author-X-Name-Last: Wei Author-Name: Eric T G Wang Author-X-Name-First: Eric T G Author-X-Name-Last: Wang Title: The strategic value of supply chain visibility: increasing the ability to reconfigure Abstract: To understand the role of supply chain visibility in creating strategic value, this study uses the dynamic capabilities view to uncover the nature of supply chain visibility. The study identifies four important constructs of supply chain visibility that are helpful in driving supply chain reconfigurability and thus improving supply chain strategic performance. They are visibility for sensing, visibility for learning, visibility for coordinating, and visibility for integrating. The results show that visibility for sensing has direct impact on supply chain strategic performance. Empirical evidence also supports that visibility for learning, visibility for coordinating, and visibility for integrating are important for enhancing supply chain reconfigurability, thus creating strategic value in supply chains. Supply chain visibility therefore enables firms to reconfigure their supply chain resources for greater competitive advantage. Implications of the results regarding the nature and the role of supply chain visibility in enhancing supply chain strategic performance are provided. Journal: European Journal of Information Systems Pages: 238-249 Issue: 2 Volume: 19 Year: 2010 Month: 4 X-DOI: 10.1057/ejis.2010.10 File-URL: http://hdl.handle.net/10.1057/ejis.2010.10 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:2:p:238-249 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934112_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Dominic M Thomas Author-X-Name-First: Dominic M Author-X-Name-Last: Thomas Author-Name: Robert P Bostrom Author-X-Name-First: Robert P Author-X-Name-Last: Bostrom Title: Team leader strategies for enabling collaboration technology adaptation: team technology knowledge to improve globally distributed systems development work Abstract: Active management of team adaptation of collaboration technologies offers an important lever for influencing success rates in distributed project work, particularly in settings characterized by high task interdependence, such as information systems development (ISD). Substantial uncertainty exists as to how a leader might influence such technology adaptation during project work. Prior research indicates that a major leader resource to accomplish technology adaptation in these settings would be team technology knowledge (TTK). This empirical field study develops a five-factor model of strategies regarding awareness of TTK that team leaders take in intervening to affect technology adaptation in distributed ISD projects. The analysis indicates insights into when and why these strategies are effective and how they relate to each other as well as the leader's awareness of TTK. The study provides a way for ISD team leaders to approach improving team collaboration from a socio-technical perspective as well as insights into potential levers for improving team technology adaptation and the efficacy of ISD projects. Journal: European Journal of Information Systems Pages: 223-237 Issue: 2 Volume: 19 Year: 2010 Month: 4 X-DOI: 10.1057/ejis.2010.14 File-URL: http://hdl.handle.net/10.1057/ejis.2010.14 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:2:p:223-237 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934113_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Clay Posey Author-X-Name-First: Clay Author-X-Name-Last: Posey Author-Name: Paul Benjamin Lowry Author-X-Name-First: Paul Benjamin Author-X-Name-Last: Lowry Author-Name: Tom L Roberts Author-X-Name-First: Tom L Author-X-Name-Last: Roberts Author-Name: T Selwyn Ellis Author-X-Name-First: T Selwyn Author-X-Name-Last: Ellis Title: Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities Abstract: The global use of online communities has exploded to involve hundreds of millions of users. Despite the tremendous social impact and business opportunities afforded by these communities, little information systems (IS) research has addressed them – especially in a cross-cultural context. Our research proposes an online community self-disclosure model, tested in a cross-cultural setting using data provided by French and British working professionals. Our model is based on social exchange theory (SET) and social penetration theory (SPT), as well as on cross-cultural theory related to individualism-collectivism. SET explains that individuals engage in relationships when the perceived costs associated with the relationship are less than the expected benefits. SPT extends SET to explain that individuals participate in self-disclosure to foster relationships – reciprocation is the primary benefit of self-disclosure, whereas risk is the foundational cost of self-disclosure. Our study established several important findings: positive social influence to use an online community increases online community self-disclosure; reciprocity increases self-disclosure; online community trust increases self-disclosure; and privacy risk beliefs decrease self-disclosure. Meanwhile, a tendency toward collectivism increases self-disclosure. We further found that French participants had higher scores on horizontal individualism than British participants. Several other findings and their implications for practice are also discussed. Journal: European Journal of Information Systems Pages: 181-195 Issue: 2 Volume: 19 Year: 2010 Month: 4 X-DOI: 10.1057/ejis.2010.15 File-URL: http://hdl.handle.net/10.1057/ejis.2010.15 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:2:p:181-195 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934114_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Nicholas C Romano Author-X-Name-First: Nicholas C Author-X-Name-Last: Romano Author-Name: James B Pick Author-X-Name-First: James B Author-X-Name-Last: Pick Author-Name: Narcyz Roztocki Author-X-Name-First: Narcyz Author-X-Name-Last: Roztocki Title: A motivational model for technology-supported cross-organizational and cross-border collaboration Abstract: The academic popularity of the topic of electronic cross-organizational and cross-border collaboration is perhaps best evident in the large number of publications on this topic. For example, a systematic review of 1180 papers published between 2000 and 2007 in only six information systems (IS) journals reveals that 80 papers are related to electronic cross-organizational and cross-border collaboration. This EJIS special issue attracted a record number of 66 paper submissions of which eight were finally accepted for publication. In the context of this special issue, we define the focus of interest as ‘the integration of people, systems, processes and infrastructure across organizations, borders, nations and world regions to enable productive teamwork towards accomplishing mutual goals’. Journal: European Journal of Information Systems Pages: 117-133 Issue: 2 Volume: 19 Year: 2010 Month: 4 X-DOI: 10.1057/ejis.2010.17 File-URL: http://hdl.handle.net/10.1057/ejis.2010.17 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:2:p:117-133 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934115_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Saonee Sarker Author-X-Name-First: Saonee Author-X-Name-Last: Sarker Author-Name: Suprateek Sarker Author-X-Name-First: Suprateek Author-X-Name-Last: Sarker Author-Name: Debasish Jana Author-X-Name-First: Debasish Author-X-Name-Last: Jana Title: The impact of the nature of globally distributed work arrangement on work–life conflict and valence: the Indian GSD professionals’ perspective Abstract: While there is a rich literature exploring the various facets of Globally Distributed Systems Development (GSD), there is scant attention given to the human resource issues such as work–life conflict (WLC) faced by GSD professionals and their valence toward globally distributed work. In this study, we attempt to identify factors that influence offshore GSD workers’ WLC and their valence toward globally distributed work. Specifically, we focus on factors related to the nature of the distributed work arrangements as experienced by offshore Indian workers involved in GSD. On the basis of survey data, we find support for the impact of a number of distribution-related variables on WLC and valence. Journal: European Journal of Information Systems Pages: 209-222 Issue: 2 Volume: 19 Year: 2010 Month: 4 X-DOI: 10.1057/ejis.2010.20 File-URL: http://hdl.handle.net/10.1057/ejis.2010.20 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:2:p:209-222 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934116_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Joyce Y H Lee Author-X-Name-First: Joyce Y H Author-X-Name-Last: Lee Author-Name: Niki Panteli Author-X-Name-First: Niki Author-X-Name-Last: Panteli Title: Business strategic conflict in computer-mediated communication Abstract: In this paper, we introduce the concept of business strategic conflict and examine its influence on communication media selection and use in inter-organisational collaborations. In doing so, we show the inherent complexities in the computer-mediated interactions between synergistic companies in the same industry. The work draws on a field study carried out for 5 months in a case of a product design collaboration between two large high-tech corporations in Taiwan and Korea. Findings show that at an early stage of the collaboration, the use of media has shifted substantially from FTF meetings to email, while it is also found that, due to the competitive nature of the inter-organisational collaboration involved, business strategic conflict significantly influences media selection and, in turn, it is influenced by the selected media. Our results contribute to media selection theories that have so far neglected the coopetitive inter-organisational environment. Journal: European Journal of Information Systems Pages: 196-208 Issue: 2 Volume: 19 Year: 2010 Month: 4 X-DOI: 10.1057/ejis.2010.4 File-URL: http://hdl.handle.net/10.1057/ejis.2010.4 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:2:p:196-208 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934117_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Sangeeta S Bharadwaj Author-X-Name-First: Sangeeta S Author-X-Name-Last: Bharadwaj Author-Name: Kul Bhushan C Saxena Author-X-Name-First: Kul Bhushan C Author-X-Name-Last: Saxena Author-Name: Murthy D Halemane Author-X-Name-First: Murthy D Author-X-Name-Last: Halemane Title: Building a successful relationship in business process outsourcing: an exploratory study Abstract: In the past decade, business process outsourcing (BPO) has emerged as an important economic and business issue. Successful offshoring and outsourcing of business processes to low-cost destinations has made BPO a strategic decision. Inconsistencies at the client and service provider levels globally are requiring clients to build competencies in outsourcing management. Clients are further pushing service providers to build capabilities such as business process management and information technology management competencies. A research survey is carried out with European clients to identify the critical competencies of the service provider and clients for building a successful relationship. The survey indicates that the clients’ focus is on BPO outcome delivery for building successful relationship and not so much on the service provider's competencies. Journal: European Journal of Information Systems Pages: 168-180 Issue: 2 Volume: 19 Year: 2010 Month: 4 X-DOI: 10.1057/ejis.2010.8 File-URL: http://hdl.handle.net/10.1057/ejis.2010.8 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:2:p:168-180 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934118_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Rajiv D Banker Author-X-Name-First: Rajiv D Author-X-Name-Last: Banker Author-Name: Hsihui Chang Author-X-Name-First: Hsihui Author-X-Name-Last: Chang Author-Name: Yi-Ching Kao Author-X-Name-First: Yi-Ching Author-X-Name-Last: Kao Title: Evaluating cross-organizational impacts of information technology – an empirical analysis Abstract: This paper documents information technology (IT) impacts that extend across organizational boundaries based on the economic theory. It evaluates how a firm's production cost is affected by the IT decisions of its business partners, over which it has no direct control. Using cross-sectional data on 100 audit engagements for the 100 largest continuing clients of a leading international public accounting firm's main office, it empirically evaluates the impact of the clients’ IT choices on their supplier's (the public accounting firm's) production costs, professional allocations and product prices. The results indicate, other things being equal, that the higher intensity or complexity a client's IT exhibits, the more effort public accounting professionals need to exert, thus, the higher the production cost incurred by the public accounting firm. In contrast, the better documentation or security a client's IT furnishes, the lower the cost the public accounting firm sustains. Furthermore, such differences in production cost are eventually passed on to the client via differences in product price. Journal: European Journal of Information Systems Pages: 153-167 Issue: 2 Volume: 19 Year: 2010 Month: 4 X-DOI: 10.1057/ejis.2010.9 File-URL: http://hdl.handle.net/10.1057/ejis.2010.9 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:2:p:153-167 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933785_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Neil F Doherty Author-X-Name-First: Neil F Author-X-Name-Last: Doherty Author-Name: Malcolm King Author-X-Name-First: Malcolm Author-X-Name-Last: King Title: From technical to socio-technical change: tackling the human and organizational aspects of systems development projects Journal: European Journal of Information Systems Pages: 1-5 Issue: 1 Volume: 14 Year: 2005 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000517 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000517 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:1:p:1-5 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933786_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Elizabeth Davidson Author-X-Name-First: Elizabeth Author-X-Name-Last: Davidson Author-Name: Mike Chiasson Author-X-Name-First: Mike Author-X-Name-Last: Chiasson Title: Contextual influences on technology use mediation: a comparative analysis of electronic medical record systems Abstract: Developing, implementing and assimilating information technologies into organizational practices pose significant technical and social challenges. In this paper, we explore technology use mediation (TUM) processes in two cases of electronic medical record system use in two healthcare organizations. In our analysis, we examine contextual influences on mediation and consider TUM processes and outcomes in projects utilizing modern systems development methods. We found that crucial TUM actions occurred during systems development phases as well as during system use, that mediation was vitally important with these specialized IT artefacts, and that system configuration required changes to software infrastructure and code. Organizational size influenced the availability and the effectiveness of mediation resources; with adequate resources committed to the task, the institutional environment presented substantial, but not insurmountable, challenges to technology use mediation. We consider implications for practice and suggest future research directions. Journal: European Journal of Information Systems Pages: 6-18 Issue: 1 Volume: 14 Year: 2005 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000518 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000518 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:1:p:6-18 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933787_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bongsug Chae Author-X-Name-First: Bongsug Author-X-Name-Last: Chae Author-Name: Marshall Scott Poole Author-X-Name-First: Marshall Scott Author-X-Name-Last: Poole Title: The surface of emergence in systems development: agency, institutions, and large-scale information systems Abstract: There is a strong tendency in the systems development literature to focus primarily on the system under development and to underemphasize the role of pre-existing information systems. Pre-existing information systems are treated largely as black boxes that serve as resources or constraints on development. A case study of a large-scale information system within a major university system in the U.S. is used to explore the role of pre-existing information systems in the development and emergence of a new system. The case study develops the argument that pre-existing information systems are active forces in systems development. Their influence occurs both through the material constraints and directions inherent in existing systems and through the experiences and learning from previous systems, which shape developers' approaches to building the new system. The study also develops a theoretical framework that integrates elements of structuration theory and actor-network theory to provide a more fine-grained analysis of how information technologies and institutional features interact in the structuring of organizational information systems. This study offers several theoretical and practical implications for IS development. Journal: European Journal of Information Systems Pages: 19-36 Issue: 1 Volume: 14 Year: 2005 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000519 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000519 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:1:p:19-36 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933788_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Julia Kotlarsky Author-X-Name-First: Julia Author-X-Name-Last: Kotlarsky Author-Name: Ilan Oshri Author-X-Name-First: Ilan Author-X-Name-Last: Oshri Title: Social ties, knowledge sharing and successful collaboration in globally distributed system development projects Abstract: Traditionally, the main focus of the information system (IS) literature has been on technical aspects related to system development projects. Furthermore, research in the IS field has mainly focused on co-located project teams. In this respect, social aspects involved in IS projects were neglected or scarcely reported. To fill this gap, this paper studies the contribution of social ties and knowledge sharing to successful collaboration in distributed IS development teams. Data were drawn from two successful globally distributed system development projects at SAP and LeCroy. Data collected were codified using Atlas.ti software. The results suggest that human-related issues, such as rapport and transactive memory, were important for collaborative work in the teams studied. The paper concludes by discussing the implications for theory and suggesting a practical guide to enhance collaborative work in globally distributed teams. Journal: European Journal of Information Systems Pages: 37-48 Issue: 1 Volume: 14 Year: 2005 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000520 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000520 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:1:p:37-48 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933789_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Angela Lin Author-X-Name-First: Angela Author-X-Name-Last: Lin Author-Name: Leiser Silva Author-X-Name-First: Leiser Author-X-Name-Last: Silva Title: The social and political construction of technological frames Abstract: It is widely accepted that the successful adoption of an information system depends to a great extent on users' perceptions of the information system. It follows then that an understanding of users' cognitive frames should be a key factor in managing the adoption of information systems. To reach such an understanding is not an easy task as cognitive frames are dynamic phenomena. For example, what an individual perceives as ‘ease of use’ and ‘usefulness’ may depend not only on intrinsic qualities of the information system but also on the changing contexts in which the information system is evaluated. This work argues that the management of information systems' adoption is a social and political process in which stakeholders frame and reframe their perceptions of an information system. A case study carried out in a European bank illustrates how the Bank's technical team influenced users' technological frames, including those of senior management in order to ensure a smooth implementation process. In conclusion, the paper introduces a set of theoretical propositions relating to the social and political processes that occur during information systems adoption. Journal: European Journal of Information Systems Pages: 49-59 Issue: 1 Volume: 14 Year: 2005 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000521 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000521 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:1:p:49-59 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933790_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Tally Hatzakis Author-X-Name-First: Tally Author-X-Name-Last: Hatzakis Author-Name: Mark Lycett Author-X-Name-First: Mark Author-X-Name-Last: Lycett Author-Name: Robert D Macredie Author-X-Name-First: Robert D Author-X-Name-Last: Macredie Author-Name: Valerie A Martin Author-X-Name-First: Valerie A Author-X-Name-Last: Martin Title: Towards the development of a social capital approach to evaluating change management interventions Abstract: Many of the issues associated with the inefficiency and ineffectiveness of information systems development (ISD) have been attributed to the poor relationship between business and IT colleagues. Relational issues relating to collaboration and communication before, during and after ISD lead to dissatisfaction with information systems and services. To address these relational issues, many organisations have introduced relationship management initiatives (RM). Yet, their effects have been debatable. This paper argues that this is partly because there is no appropriate evaluative framework for RM. In response, this paper proposes a framework, based on social capital theory, for conceptualising the effects of change management interventions in the poor relationship between business and IT colleagues. The research adopts a case study approach to this end. It explores the strengths and limitations of the approach and suggests new directions for its further development. Overall, the research shows that there is a potential merit in using a social capital approach for the evaluation of change management interventions that aim to improve the collaboration between business and IT, during ISD and beyond. Journal: European Journal of Information Systems Pages: 60-74 Issue: 1 Volume: 14 Year: 2005 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000522 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000522 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:1:p:60-74 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933791_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Gwanhoo Lee Author-X-Name-First: Gwanhoo Author-X-Name-Last: Lee Author-Name: Weidong Xia Author-X-Name-First: Weidong Author-X-Name-Last: Xia Title: The ability of information systems development project teams to respond to business and technology changes: a study of flexibility measures Abstract: The socio-technical perspective suggests that information systems development projects (ISDPs) involve both organizational and technical dimensions. As both the organizational and technical aspects of ISDPs frequently change, the ISDP team's flexibility in responding to these changes has become a critical success factor for system development. While the importance of ISDP team flexibility has increased, the research literature lacks a consistent definition and validated measures of the construct. Drawing upon the socio-technical and the capability-based perspectives and using a systematic multi-stage approach, we identified major business and technology changes and developed measurement scales of ISDP team flexibility along two dimensions: Response Extensiveness and Response Efficiency. The results of a confirmatory factor analysis using survey data from 505 ISDP managers suggested that the final measurement scales exhibited adequate levels of measurement properties including unidimensionality, reliability, discriminant validity, factorial invariance and nomological validity. In addition, our results revealed an interesting negative relationship between Response Extensiveness and Response Efficiency, indicating a trade-off between the two dimensions of flexibility. Our result indicated that while the ISDP teams experienced and responded more extensively to business changes than technology changes, they were much less efficient in dealing with business changes than technology changes. Journal: European Journal of Information Systems Pages: 75-92 Issue: 1 Volume: 14 Year: 2005 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000523 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000523 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:1:p:75-92 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933792_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Luis F Luna-Reyes Author-X-Name-First: Luis F Author-X-Name-Last: Luna-Reyes Author-Name: Jing Zhang Author-X-Name-First: Jing Author-X-Name-Last: Zhang Author-Name: J Ramón Gil-García Author-X-Name-First: J Author-X-Name-Last: Ramón Gil-García Author-Name: Anthony M Cresswell Author-X-Name-First: Anthony M Author-X-Name-Last: Cresswell Title: Information systems development as emergent socio-technical change: a practice approach Abstract: Many information systems development (ISD) initiatives fail to deliver the expected benefits. An important percentage of these are the result of social and organizational factors, not simply technical failures. This paper explores the dynamics of these social and organizational factors to better understand the causes of success and failure. Based on data from a detailed case analysis of an ISD project, the paper depicts the ISD process as an emergent and dynamic one, characterized by continuous local adaptations. The paper ends with a proposal of a feedback-rich framework, based on a practice view of socio-technical change that offers theoretical insights and practical heuristics to system developers and project managers. Journal: European Journal of Information Systems Pages: 93-105 Issue: 1 Volume: 14 Year: 2005 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000524 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000524 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:1:p:93-105 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933693_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: J J Jiang Author-X-Name-First: J J Author-X-Name-Last: Jiang Author-Name: G Klein Author-X-Name-First: G Author-X-Name-Last: Klein Author-Name: R Discenza Author-X-Name-First: R Author-X-Name-Last: Discenza Title: Pre-project partnering impact on an information system project, project team and project manager Abstract: Information system (IS) managers have long recognised the need to use project management approaches in the design and delivery of their system development projects. The result has been the widespread use of project teams headed by a project leader or manager. However, given the fact that there has been a low success rate for IS projects, there is a growing need to seek out new methods and controls for projects. One approach involves the practice of altering the project environment prior to the commencement of project tasks. To determine whether such pre-project activities may be effective, a model is proposed and tested relating the activities to the performance of the project manager and characteristics of an effective project team. Data from a sample of 186 project team members indicate that the pre-project activities lead to more effective teams and managers and eventually to project success. Thus, it is important that organisations begin work on projects at an earlier stage. Journal: European Journal of Information Systems Pages: 86-97 Issue: 2 Volume: 11 Year: 2002 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000420 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000420 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:11:y:2002:i:2:p:86-97 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933694_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: R C-W Kwok Author-X-Name-First: R C-W Author-X-Name-Last: Kwok Author-Name: J-N Lee Author-X-Name-First: J-N Author-X-Name-Last: Lee Author-Name: M Q Huynh Author-X-Name-First: M Q Author-X-Name-Last: Huynh Author-Name: S-M Pi Author-X-Name-First: S-M Author-X-Name-Last: Pi Title: Role of GSS on collaborative problem-based learning: a study on knowledge externalisation Abstract: Based on the success of using Group Support Systems (GSS) to support collaborative work, a growing community of GSS researchers investigates the potential of GSS in business education with special attention to collaborative learning. This paper extends their works and proposes a model of collaborative problem-based learning (CPBL). Based on the proposed model, we explain the effects of GSS on CPBL in general, and externalisation of learners' contributions (initiated ideas, questions and feedback) in particular. A controlled experiment was carried out to investigate the effects of GSS on externalization of the learners' contributions in a CPBL environment. The results indicate that learners in an anonymous GSS-supported CPBL environment externalise more initiated ideas, fewer questions, and fewer but better feedback than those in a non-GSS supported one. Journal: European Journal of Information Systems Pages: 98-107 Issue: 2 Volume: 11 Year: 2002 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000421 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000421 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:11:y:2002:i:2:p:98-107 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933695_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: H Hussin Author-X-Name-First: H Author-X-Name-Last: Hussin Author-Name: M King Author-X-Name-First: M Author-X-Name-Last: King Author-Name: P Cragg Author-X-Name-First: P Author-X-Name-Last: Cragg Title: IT alignment in small firms Abstract: This study focused on the alignment of business strategy and IT strategy among 256 small UK manufacturing firms. An instrument was developed and used to measure IT alignment in small firms. Evidence was gained of high IT alignment in some firms. The study also indicated that IT alignment was related to the firm's level of IT maturity and the level of the CEO's software knowledge, but did not seem to be linked to the CEO's involvement or the firm's sources of external IT expertise. Journal: European Journal of Information Systems Pages: 108-127 Issue: 2 Volume: 11 Year: 2002 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000422 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000422 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:11:y:2002:i:2:p:108-127 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933696_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: T Thanasankit Author-X-Name-First: T Author-X-Name-Last: Thanasankit Title: Requirements engineering—exploring the influence of power and Thai values Abstract: This paper explores the impact of Thai social status and hierarchical decision-making processes during Requirements Engineering (RE) in business information systems development projects. The paper illustrates the interaction of RE processes and national culture and shows that culture can change the way processes are implemented, rather than process changing culture. Thai culture is naturally inherent in Thai daily life and Thais bring that into their work information practices. The concepts of power in Thai culture contributes toward hierarchical forms of communication and hierarchical relationships between systems analysts and decision-making process in Thai software houses, especially during RE, where information systems (IS) requirements need to be established for further development. The research shows that power significantly influences the decision making process and the construction of social status between clients and systems analysts in Thailand. The hierarchical structure of Thai organisations also contributes to a bureaucratic, elongated decision-making process during information systems development (ISD). Understanding the influence of power in Thai culture on RE will assist multinational IS consulting organisations to select, adapt, better manage, or change RE process methodologies. Journal: European Journal of Information Systems Pages: 128-141 Issue: 2 Volume: 11 Year: 2002 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000423 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000423 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:11:y:2002:i:2:p:128-141 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933697_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: J-M Choe Author-X-Name-First: J-M Author-X-Name-Last: Choe Title: The organisational learning effects of management accounting information under advanced manufacturing technology Abstract: This study empirically examined the organisational learning effects of the nonfinancial performance information provided by management accounting information systems (MAISs) under advanced manufacturing technology (AMT). In this study, a target costing system and the frequent and quick reporting of information were considered the facilitators of learning. First, we examined the relationships between AMT level and the amount of nonfinancial performance information produced by MAISs. The empirical results showed that there are significant positive relationships between the level of AMT and nonfinancial performance information. With a systems approach, we also proved the impact of the relationships among AMT levels, nonfinancial performance information and learning facilitators on the organisational performance of a firm. The results of our research suggest that under a high level of AMT, for the provision of information to result in an increase of performance through organisational learning, a target costing system must be introduced and a large amount of information should be provided frequently and quickly. The results of this study also showed that although AMT level may be low, fairly well-arranged facilitators and a moderately large amount of information may be necessary for the improvement of performance. In conclusion, effective organisational learning depends on the provision of relevant information as well as efficient learning support mechanisms. Journal: European Journal of Information Systems Pages: 142-158 Issue: 2 Volume: 11 Year: 2002 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000424 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000424 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:11:y:2002:i:2:p:142-158 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933698_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: D Allen Author-X-Name-First: D Author-X-Name-Last: Allen Author-Name: T Kern Author-X-Name-First: T Author-X-Name-Last: Kern Author-Name: D Mattison Author-X-Name-First: D Author-X-Name-Last: Mattison Title: Culture, power and politics in ICT outsourcing in higher education institutions Abstract: UK public sector policy changes have driven Higher Education Institutions (HEI) towards a competitive and often turbulent market-focused environment. To respond to these dramatic institutional changes, many institutions began to strategically re-focus their management efforts on adapting and surviving in this environment. As part of their efforts, HEIs identified their Information and Communication Technology (ICT) function as an essential function to survive in this environment. This implied that HEIs had to address the institutional role of ICT by defining detailed strategies that aligned the ICT function to the HEIs educational goals. On the other hand, HEIs had to make sure their ICT could support their technology and service requirements, for which they considered pursing a more radical approach, that of outsourcing their ICT to a third party supplier. This research paper reports on embryonic attempts by three British Universities to outsource their ICT, highlighting in particular the ‘cultural, power and political’ issues that arose when public sector institutions follow the example of private sector organisations—by outsourcing to a third party service supplier. Journal: European Journal of Information Systems Pages: 159-173 Issue: 2 Volume: 11 Year: 2002 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000425 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000425 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:11:y:2002:i:2:p:159-173 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933699_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bob O'Keefe Author-X-Name-First: Bob Author-X-Name-Last: O'Keefe Title: Editorial Journal: European Journal of Information Systems Pages: 85-85 Issue: 2 Volume: 11 Year: 2002 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000427 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000427 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:11:y:2002:i:2:p:85-85 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933700_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: R J Paul Author-X-Name-First: R J Author-X-Name-Last: Paul Title: (IS)3: Is Information Systems an intellectual subject? Abstract: Is Information Systems an Intellectual Subject, or an Academic Subject, or an Academic Discipline? And does it matter? Taking the particular perspective of the author, this paper discusses these questions with a view to raising debate in the Information Systems (IS) community about some of the current pitfalls in IS, such as inappropriate claiming of expertise in other disciplines, and the widespread malpractice concerning research methods and methodologies. The issue of change is addressed from the perspective of misuses (Exaggerations, Explanations and Enigmas) of the issue and how this adds to the pitfalls. A particular definition of research is examined, whose inclusiveness provides some potential relief. The conclusions offer hope and a way forward. Journal: European Journal of Information Systems Pages: 174-177 Issue: 2 Volume: 11 Year: 2002 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000428 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000428 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:11:y:2002:i:2:p:174-177 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933867_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Sabine Madsen Author-X-Name-First: Sabine Author-X-Name-Last: Madsen Author-Name: Karlheinz Kautz Author-X-Name-First: Karlheinz Author-X-Name-Last: Kautz Author-Name: Richard Vidgen Author-X-Name-First: Richard Author-X-Name-Last: Vidgen Title: A framework for understanding how a unique and local IS development method emerges in practice Abstract: Within the field of information systems development (ISD) most contributions concern formalised development methods and focus either on how they should be or on how they are used. In contrast, this paper explores the relationship between what influences and shapes a unique and local method and how it consequently emerges. Based on a synthesis of prominent IS literature, an analytical framework is developed using three perspectives: (1) the structuralist, (2) the individualist and (3) the interactive process perspective. Each perspective supplies a set of key concepts for conceptual understanding and empirical exploration of method emergence in practice. The analytical framework is applied to a longitudinal case study of method emergence in a web-based ISD project in a case company where the Multiview methodology was adopted. The case study account is supported by the development and use of a graphical mapping technique, called method emergence mapping for representing the complex interplay between structural elements, human action and the emergent method as it unfolded over time. The contribution of this paper to ISD theory is the development of an analytical framework that can be applied as a lens for explaining how a unique and local method emerges in practice. Also lessons for ISD practice are identified: no ‘one’ is in control of an ISD project, projects should organise around a vision rather than a fixed plan; and methods should be used as guiding frameworks for action rather than prescriptions. Journal: European Journal of Information Systems Pages: 225-238 Issue: 2 Volume: 15 Year: 2006 Month: 4 X-DOI: 10.1057/palgrave.ejis.3000593 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000593 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:2:p:225-238 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933868_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Eric Overby Author-X-Name-First: Eric Author-X-Name-Last: Overby Author-Name: Anandhi Bharadwaj Author-X-Name-First: Anandhi Author-X-Name-Last: Bharadwaj Author-Name: V Sambamurthy Author-X-Name-First: V Author-X-Name-Last: Sambamurthy Title: Enterprise agility and the enabling role of information technology Abstract: In turbulent environments, enterprise agility, that is, the ability of firms to sense environmental change and respond readily, is an important determinant of firm success. We define and deconstruct enterprise agility, delineate enterprise agility from similar concepts in the business research literature, explore the underlying capabilities that support enterprise agility, explicate the enabling role of information technology (IT) and digital options, and propose a method for measuring enterprise agility. The concepts in this paper are offered as foundational building blocks for the overall research program on enterprise agility and the enabling role of IT. Journal: European Journal of Information Systems Pages: 120-131 Issue: 2 Volume: 15 Year: 2006 Month: 4 X-DOI: 10.1057/palgrave.ejis.3000600 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000600 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:2:p:120-131 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933869_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Marcel van Oosterhout Author-X-Name-First: Marcel Author-X-Name-Last: van Oosterhout Author-Name: Eric Waarts Author-X-Name-First: Eric Author-X-Name-Last: Waarts Author-Name: Jos van Hillegersberg Author-X-Name-First: Jos Author-X-Name-Last: van Hillegersberg Title: Change factors requiring agility and implications for IT Abstract: The current highly dynamic business environment requires businesses to be agile. Business agility is the ability to swiftly and easily change businesses and business processes beyond the normal level of flexibility to effectively manage unpredictable external and internal changes. This study reports on a cross-industry analysis of change factors requiring agility and assesses agility gaps that companies are facing in four industry sectors in the Netherlands. A framework was constructed to measure the perceived gaps between the current level of business agility and the required level of business agility. The questionnaire and in-depth interviews held reveal that today's businesses perceive to lack the agility required to quickly respond to changes, whose speed and requirements are difficult to predict. The paper presents rankings of generic and sector-specific agility gaps. These show that although some generic change factors requiring agility exist, the change factors requiring agility that cause agility gaps differ across industry sectors. Among the factors that enable or hinder business agility, the existence of inflexible legacy systems is perceived to be a very important disabler in achieving more business agility. A number of basic principles and directions are discussed to transform Information Technology from barrier into key enabler for increased agility in organizations and business networks. Journal: European Journal of Information Systems Pages: 132-145 Issue: 2 Volume: 15 Year: 2006 Month: 4 X-DOI: 10.1057/palgrave.ejis.3000601 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000601 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:2:p:132-145 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933870_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Magnus Holmqvist Author-X-Name-First: Magnus Author-X-Name-Last: Holmqvist Author-Name: Kalevi Pessi Author-X-Name-First: Kalevi Author-X-Name-Last: Pessi Title: Agility through scenario development and continuous implementation: a global aftermarket logistics case Abstract: This paper examines a business and IS/IT initiative at Volvo that involves managing the development and implementation of an agile aftermarket supply chain. The case is based on Volvo's global initiative to create a platform, Web services, and a Web portal for selling spare parts over the Internet. Creating and integrating a new platform is difficult, and establishing new relations in global aftermarket logistics is even more challenging. Agility relates to an organisation's ability to sense and respond rapidly to unpredictable events in order to satisfy changing customer demands. Volvo's effort illustrates agility as achieved by working continuously with scenario development and keeping implementation projects to a comprehendible size in order to nurture learning. The effort involved direct actions to manage both the technology and the relations among supply chain actors. As this case shows, continuous implementation projects can deliver innovation in new relations and through new channels – particularly if projects address agility from the start. Journal: European Journal of Information Systems Pages: 146-158 Issue: 2 Volume: 15 Year: 2006 Month: 4 X-DOI: 10.1057/palgrave.ejis.3000602 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000602 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:2:p:146-158 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933871_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Anna Börjesson Author-X-Name-First: Anna Author-X-Name-Last: Börjesson Author-Name: Fredrik Martinsson Author-X-Name-First: Fredrik Author-X-Name-Last: Martinsson Author-Name: Magnus Timmerås Author-X-Name-First: Magnus Author-X-Name-Last: Timmerås Title: Agile improvement practices in software organizations Abstract: Inspired by the chasm between early adopters and early majority in diffusion of technological innovations, this paper investigates how agile improvement practices can help software organizations successfully implement new processes. An action research-based improvement initiative implemented a new change-request process and tool at the telecom company Ericsson AB in Gothenburg, Sweden. The study identifies a ‘guerilla tactic’ that change agents can use in software organizations to cross the chasm, and it discusses lessons learned in relation to literature on diffusion of innovation and software agility. The contribution of the study is that the guerrilla tactic supports agile improvement practices and facilitates successful implementation. Journal: European Journal of Information Systems Pages: 169-182 Issue: 2 Volume: 15 Year: 2006 Month: 4 X-DOI: 10.1057/palgrave.ejis.3000603 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000603 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:2:p:169-182 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933872_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Kalle Lyytinen Author-X-Name-First: Kalle Author-X-Name-Last: Lyytinen Author-Name: Gregory M Rose Author-X-Name-First: Gregory M Author-X-Name-Last: Rose Title: Information system development agility as organizational learning Abstract: Information System Development (ISD) agility is concerned with why and how ISD organizations sense and respond swiftly as they develop and maintain Information System applications. We outline a theory of ISD agility that draws upon a model of IT innovation and organizational learning. The theory adopts March's concepts of exploration and exploitation to investigate agility in the context of ISD organizations. Depending on their learning focus, ISD organizations make choices as to what sensing and responding swiftly means. This is reflected in how they value speed in relation to other ISD process goals, including quality, cost, risk and innovative content. The paper examines two specific Research Propositions: (1) ISD organizations locate themselves into different innovation regimes with respect to their need for exploration and exploitation, and (2) their perceptions of agility differ in those regimes as reflected in their process goal priorities. We validate these propositions through an empirical investigation of changes in ISD organizations' process goals and innovation practices over a period of over 4 years (1999–2003), during which time they shied away from exploration to exploitation while innovating with Internet computing. These ISD organizations viewed agility differently during the studied time periods as reflected in how they traded innovative content or speed vis-à-vis the other process goals of cost, risk, and product quality. In conclusion, this paper discusses implications for future research on agility in ISD organizations. Journal: European Journal of Information Systems Pages: 183-199 Issue: 2 Volume: 15 Year: 2006 Month: 4 X-DOI: 10.1057/palgrave.ejis.3000604 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000604 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:2:p:183-199 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933873_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Brian Fitzgerald Author-X-Name-First: Brian Author-X-Name-Last: Fitzgerald Author-Name: Gerard Hartnett Author-X-Name-First: Gerard Author-X-Name-Last: Hartnett Author-Name: Kieran Conboy Author-X-Name-First: Kieran Author-X-Name-Last: Conboy Title: Customising agile methods to software practices at Intel Shannon Abstract: Tailoring of methods is commonplace in the vast majority of software development projects and organisations. However, there is not much known about the tailoring and engineering of agile methods, or about how these methods can be used to complement each other. This study investigated tailoring of the agile methods, eXtreme programming (XP) and Scrum, at Intel Shannon, and involved experienced software engineers who continuously monitored and reflected on these methods over a 3-year period. The study shows that agile methods may individually be incomplete in supporting the overall development process, but XP and Scrum complement each other well, with XP providing support for technical aspects and Scrum providing support for project planning and tracking. The principles of XP and Scrum were carefully selected (only six of the 12 XP key practices were implemented, for example) and tailored to suit the needs of the development environment at Intel Shannon. Thus, the study refutes the suggestion that agile methods are not divisible or individually selectable but achieve their benefits through the synergistic combination of individual agile practices; rather, this study shows that an a la carte selection and tailoring of practices can work very well. In the case of Scrum, some local tailoring has led to a very committed usage by developers, in contrast to many development methods whose usage is limited despite being decreed mandatory by management. The agile practices that were applied did lead to significant benefits, including reductions in code defect density by a factor of 7. Projects of 6-month and 1-year duration have been delivered ahead of schedule, which bodes well for future ability to accurately plan development projects. Journal: European Journal of Information Systems Pages: 200-213 Issue: 2 Volume: 15 Year: 2006 Month: 4 X-DOI: 10.1057/palgrave.ejis.3000605 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000605 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:2:p:200-213 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933874_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Dirk S Hovorka Author-X-Name-First: Dirk S Author-X-Name-Last: Hovorka Author-Name: Kai R Larsen Author-X-Name-First: Kai R Author-X-Name-Last: Larsen Title: Enabling agile adoption practices through network organizations Abstract: As distributed organizations increasingly rely on technological innovations to enhance organizational efficiency and competitiveness, interest in agile practices that enable adoption of information technology (IT) based innovations has grown. This study examines the influence of a network organization environment on the ability to develop agile adoption practices. An exploratory case study design was used to investigate the interactions between network structure, social information processing, organizational similarity (homophily), and absorptive capacity during the adoption of a large-scale IT system in two network organization environments within New York State. The data suggest that network organization characteristics and communication processes that reinforced social influence and supported knowledge transfer positively influenced adoption agility. We propose a model of agile adoption practices and discuss implications for the development of theory about network organization characteristics and capabilities to adopt IT-based innovations. Journal: European Journal of Information Systems Pages: 159-168 Issue: 2 Volume: 15 Year: 2006 Month: 4 X-DOI: 10.1057/palgrave.ejis.3000606 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000606 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:2:p:159-168 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933875_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Lars Mathiassen Author-X-Name-First: Lars Author-X-Name-Last: Mathiassen Author-Name: Jan Pries-Heje Author-X-Name-First: Jan Author-X-Name-Last: Pries-Heje Title: Business agility and diffusion of information technology Journal: European Journal of Information Systems Pages: 116-119 Issue: 2 Volume: 15 Year: 2006 Month: 4 X-DOI: 10.1057/palgrave.ejis.3000610 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000610 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:2:p:116-119 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933876_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Keith S Horton Author-X-Name-First: Keith S Author-X-Name-Last: Horton Author-Name: Trevor A Wood-Harper Author-X-Name-First: Trevor A Author-X-Name-Last: Wood-Harper Title: The shaping of I.T. trajectories: evidence from the U.K. public sector Abstract: This paper reports upon I.T. initiatives in the U.K. public sector where choices were made, decisions taken, major investment authorised, and new I.T. introduced. The research investigation followed practice over several years in three Police Forces as new information technologies were introduced. We focus on these I.T. trajectories, and in particular the actions, interactions and events within and across groups of people. We argue that practices surrounding I.T. choice are socially shaped. Indeed, the choices and subsequent acquisition can be viewed as part of a process of ongoing configuration. We argue that Social Worlds Theory has much to offer in understanding what happens as I.T. trajectories evolve in organisations. The empirical part of the paper reports upon the findings from a longitudinal, cross-case analysis within the three Police Forces – institutions that are often characterised as bureaucratic in form, and culture. In each case, the I.T. trajectories were followed utilising a variety of qualitative techniques. Drawing upon social worlds theory, and boundary objects, we consider the influence of certain ‘objects’ upon I.T. outcomes, and the way in which other boundary objects become a focus for the construction of apparent facades of formality. Journal: European Journal of Information Systems Pages: 214-224 Issue: 2 Volume: 15 Year: 2006 Month: 4 X-DOI: 10.1057/palgrave.ejis.3000611 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000611 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:2:p:214-224 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933877_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Richard L Baskerville Author-X-Name-First: Richard L Author-X-Name-Last: Baskerville Title: Artful planning Journal: European Journal of Information Systems Pages: 113-115 Issue: 2 Volume: 15 Year: 2006 Month: 4 X-DOI: 10.1057/palgrave.ejis.3000622 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000622 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:2:p:113-115 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933654_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Sarmad Alshawi Author-X-Name-First: Sarmad Author-X-Name-Last: Alshawi Title: Oracle8i Data Warehousing Journal: European Journal of Information Systems Pages: 67-67 Issue: 1 Volume: 10 Year: 2001 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000356 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000356 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:10:y:2001:i:1:p:67-67 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933655_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: L P Baldwin Author-X-Name-First: L P Author-X-Name-Last: Baldwin Author-Name: Z Irani Author-X-Name-First: Z Author-X-Name-Last: Irani Author-Name: P E D Love Author-X-Name-First: P E D Author-X-Name-Last: Love Title: Outsourcing information systems: drawing lessons from a banking case study Abstract: Financial and costs benefits are often put forward as the reasons why organisations decide to outsource. Emerging patterns and trends indicate that today's outsourcing decisions are often motivated by factors other than cost. Thus, the decision-making process is more complex than it may at first appear. This paper presents findings from a case study from an organisation in the UK banking sector that was motivated to outsource aspects of its information technology/information system (IT/IS). The underlying motives and decision-making process that influenced the bank outsource its IT/IS are presented and discussed. Findings from the case study suggest political perspectives, as well as human and organisational issues influenced the bank's strategic decision-making to outsource certain aspects of its business. An examination of the case study findings suggests that cost alone is not always responsible for decisions to outsource, as it was found the bank's outsourcing decision was driven by a series of complex, interrelated motives in a bid to reduce the risks and uncertainties of managing its own technology. Considering the complex nature of the outsourcing process a frame of reference that can be used to assist managers with their decision to outsource IT/IS is propagated. The case study is used to present an organisation's experiences as to how and why it decided to outsource its IS and thus offers a learning opportunity for other organisations facing similar difficulties. In addition, the case study findings highlight the need to focus greater attention on discriminating between the short and long-term consequences of IT/IS decision-making. Journal: European Journal of Information Systems Pages: 15-24 Issue: 1 Volume: 10 Year: 2001 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000372 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000372 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:10:y:2001:i:1:p:15-24 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933656_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: S Duhan Author-X-Name-First: S Author-X-Name-Last: Duhan Author-Name: M Levy Author-X-Name-First: M Author-X-Name-Last: Levy Author-Name: P Powell Author-X-Name-First: P Author-X-Name-Last: Powell Title: Information systems strategies in knowledge-based SMEs: the role of core competencies Abstract: Research into the sources of competitive advantage identifies two competing views. The first concerns industry structure, and the role of information systems (IS) in enabling competitive advantage is to lower cost, build barriers to entry and tie in customers and suppliers. The second view is resource-based. This argues that competitive advantage arises from the ability to accumulate resources and capabilities that are rare, valuable, non-substitutable and difficult to imitate. This paper discusses the role of IS as firm resources and the role of such resources in small firms (SMEs). It uses as a vehicle, the identification and development of an information systems strategy (ISS) in a knowledge-based SME. The use of core competencies or capabilities, a key aspect of resources, as a basis for an ISS is contrasted with the use of a structural approach exemplified here by the value chain. Using participant observation research in a not-for-profit organisation that provides consultancy in social housing, this paper investigates these approaches. The paper concludes by identifying a number of areas for further research including the operationalisation of the core competence perspective in developing an ISS. Journal: European Journal of Information Systems Pages: 25-40 Issue: 1 Volume: 10 Year: 2001 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000379 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000379 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:10:y:2001:i:1:p:25-40 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933657_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: G H Galal Author-X-Name-First: G H Author-X-Name-Last: Galal Title: From contexts to constructs: the use of grounded theory in operationalising contingent process models Abstract: In software and systems engineering, process models have been suggested that partly develop artifacts and then deploy them to evaluate the degree of their success in satisfying requirements, using the results of the evaluation to inform further engineering efforts. This paper discusses the important role of evaluation in non-sequential process models, and suggests an interpretive framework for effecting such evaluation, as well as the determination of risks and constraints to operationalise such models. We outline a particular mode of the Grounded Systems Engineering Methodology (GSEM) which aims at supporting the application of non-sequential process models, thus enabling them to be more responsive to the development context. GSEM utilises the philosophy and procedures of the Grounded Theory method, an interpretive research strategy which is being widely used for the inductive analysis of qualitative data in theory building. An illustrative case study is used to show how the framework can be applied in practice. Journal: European Journal of Information Systems Pages: 2-14 Issue: 1 Volume: 10 Year: 2001 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000381 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000381 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:10:y:2001:i:1:p:2-14 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933658_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Frank Land Author-X-Name-First: Frank Author-X-Name-Last: Land Title: Measuring Information Technology Investment Payoff: a Contemporary Approach Journal: European Journal of Information Systems Pages: 68-68 Issue: 1 Volume: 10 Year: 2001 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000383 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000383 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:10:y:2001:i:1:p:68-68 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933659_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Z Irani Author-X-Name-First: Z Author-X-Name-Last: Irani Author-Name: A M Sharif Author-X-Name-First: A M Author-X-Name-Last: Sharif Author-Name: P E D Love Author-X-Name-First: P E D Author-X-Name-Last: Love Title: Transforming failure into success through organisational learning: an analysis of a manufacturing information system Abstract: This paper describes the idiosyncracies of a case study company, through highlighting issues and problems experienced during their attempts to evaluate, implement and realise the holistic implications of a manufacturing information system. Although the Information System (IS) was operational for a period of time, it was eventually deemed a failure. The reason for this was that a range of human and organisational factors prevented the organisation from embracing the full impact of the system. The eventual success of their information system was realised through a bespoke implementation, based upon a traditional systems development lifecycle that indirectly addressed learning issues following the earlier failed deployment. The paper highlights key issues relating to business success and failure, and then contrasts them alongside the presented case study. In doing so, the authors conclude by proposing methods through which manufacturing information systems can be transformed for business success. This is described achievable through both a realisation in the positioning of the organisation relative to technology management, and the related mapping of human and technological constructs that support information systems related success. Journal: European Journal of Information Systems Pages: 55-66 Issue: 1 Volume: 10 Year: 2001 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000384 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000384 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:10:y:2001:i:1:p:55-66 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933660_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Brian W Hollocks Author-X-Name-First: Brian W Author-X-Name-Last: Hollocks Title: Handbook on Electronic Commerce Journal: European Journal of Information Systems Pages: 69-69 Issue: 1 Volume: 10 Year: 2001 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000386 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000386 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:10:y:2001:i:1:p:69-69 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933661_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: J Korn Author-X-Name-First: J Author-X-Name-Last: Korn Title: Design and delivery of information Abstract: The notion of property from a linguistic point of view, the constituent parts of change of state and product as a means to execute the change, are described. Information plus medium is regarded as a product. Based on previously given definition, the structure of information is introduced together with units, meaning and precision as measures of its effectiveness in changing mental states. The design of a bundle of information as part of a problem solving scheme is described. The method of linguistic modelling is introduced for modelling delivery of information and medium from a sender to receiver. Uncertainties associated with construction and delivery of information are taken into consideration through a certainty theory. Journal: European Journal of Information Systems Pages: 41-54 Issue: 1 Volume: 10 Year: 2001 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000388 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000388 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:10:y:2001:i:1:p:41-54 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933662_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bob O'Keefe Author-X-Name-First: Bob Author-X-Name-Last: O'Keefe Author-Name: Ray Paul Author-X-Name-First: Ray Author-X-Name-Last: Paul Title: Editorial Volume 10, Issue 1 Journal: European Journal of Information Systems Pages: 1-1 Issue: 1 Volume: 10 Year: 2001 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000389 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000389 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:10:y:2001:i:1:p:1-1 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934404_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Yong Liu Author-X-Name-First: Yong Author-X-Name-Last: Liu Author-Name: Hongxiu Li Author-X-Name-First: Hongxiu Author-X-Name-Last: Li Author-Name: Jorge Goncalves Author-X-Name-First: Jorge Author-X-Name-Last: Goncalves Author-Name: Vassilis Kostakos Author-X-Name-First: Vassilis Author-X-Name-Last: Kostakos Author-Name: Bei Xiao Author-X-Name-First: Bei Author-X-Name-Last: Xiao Title: Fragmentation or cohesion? Visualizing the process and consequences of information system diversity, 1993–2012 Abstract: In information systems (IS) literature, there is ongoing debate as to whether the field has become fragmented and lost its identity in response to the rapid changes of the field. The paper contributes to this discussion by providing quantitative measurement of the fragmentation or cohesiveness level of the field. A co-word analysis approach aiding in visualization of the intellectual map of IS is applied through application of clustering analysis, network maps, strategic diagram techniques, and graph theory for a collection of 47,467 keywords from 9551 articles, published in 10 major IS journals and the proceedings of two leading IS conferences over a span of 20 years, 1993 through 2012. The study identified the popular, core, and bridging topics of IS research for the periods 1993–2002 and 2003–2012. Its results show that research topics and subfields underwent substantial change between those two periods and the field became more concrete and cohesive, increasing in density. Findings from this study suggest that the evolution of the research topics and themes in the IS field should be seen as part of the natural metabolism of the field, rather than a process of fragmentation or disintegration. Journal: European Journal of Information Systems Pages: 509-533 Issue: 6 Volume: 25 Year: 2016 Month: 11 X-DOI: 10.1057/ejis.2016.5 File-URL: http://hdl.handle.net/10.1057/ejis.2016.5 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:6:p:509-533 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934405_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Arno Nuijten Author-X-Name-First: Arno Author-X-Name-Last: Nuijten Author-Name: Mark Keil Author-X-Name-First: Mark Author-X-Name-Last: Keil Author-Name: Harry Commandeur Author-X-Name-First: Harry Author-X-Name-Last: Commandeur Title: Collaborative partner or opponent: How the messenger influences the deaf effect in IT projects Abstract: Prior research suggests that information technology (IT) project escalation can result from the deaf effect, a phenomenon in which decision makers fail to heed risk warnings communicated by others. Drawing inspiration from stewardship theory, we posited that when messengers carrying risk warnings about a project are seen as collaborative partners, decision makers are more likely to heed the message. Conversely, we theorized that when messengers are seen as opponents, decision makers are more likely to exhibit the deaf effect. We further posited that certain psychological factors (i.e., framing and perceived control) would moderate the effect of the messenger-recipient relationship on the deaf effect. To test these ideas, we conducted two experiments. When messengers were seen as collaborative partners, recipients assigned more relevance to the risk warning and perceived a higher risk, making them less willing to continue the project. Framing the outcomes associated with redirecting or continuing the project in terms of losses (rather than gains) weakened this effect. However, when recipients perceived a high degree of control over the project the effect was strengthened. Implications for both research and practice are discussed. Journal: European Journal of Information Systems Pages: 534-552 Issue: 6 Volume: 25 Year: 2016 Month: 11 X-DOI: 10.1057/ejis.2016.6 File-URL: http://hdl.handle.net/10.1057/ejis.2016.6 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:6:p:534-552 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934406_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bernhard R Katzy Author-X-Name-First: Bernhard R Author-X-Name-Last: Katzy Author-Name: Gordon Sung Author-X-Name-First: Gordon Author-X-Name-Last: Sung Author-Name: Kevin Crowston Author-X-Name-First: Kevin Author-X-Name-Last: Crowston Title: Alignment in an inter-organisational network: the case of ARC transistance Abstract: We consider the processes of achieving alignment in coordinated inter-organizational networks through a case study of a system development project in ARC Transistance, a network of European automobile clubs that cooperate to provide pan-European service. The theoretical contribution of the paper is, first, an extended strategic alignment model for inter-organizational networks that distinguishes between integration of IS with business strategy and infrastructure, and what we label ‘accordance’ between the strategies and infrastructures of the network and the member firms. Second, we propose that for a network organization, network and member strategies might be complementary as well as tightly coupled. We similarly argue that IS architectures for networks should strive for being ‘business strategy-neutral’ to more easily accommodate the diversity of members. Finally, we discuss how the process of developing a network information system can be a driver towards network alignment, but how the lack of effective governance structures makes alignment harder to achieve. Journal: European Journal of Information Systems Pages: 553-568 Issue: 6 Volume: 25 Year: 2016 Month: 11 X-DOI: 10.1057/ejis.2016.9 File-URL: http://hdl.handle.net/10.1057/ejis.2016.9 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:6:p:553-568 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934407_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Gabriele Piccoli Author-X-Name-First: Gabriele Author-X-Name-Last: Piccoli Title: Triggered essential reviewing: the effect of technology affordances on service experience evaluations Abstract: This paper responds to the recent call for understanding the nature and consequences of the digital mediation of everyday experiences. We do so in the context of online opinion sharing. We propose that the unique design features of mobile computing devices and the intention and purpose of their users, meld into a technology affordance we label: Triggered essential reviewing. We empirically investigate the effect of this technology affordance on opinion characteristics (i.e., timing and length), and outcomes (i.e., opinion valence and content). We find that triggered essential reviewing engenders opinions that cover a narrower range of aspects of the experience and that it produces a negative evaluative bias—a bias that mitigates over time. Our work makes two contributions to the application of affordance theory in Information Systems. First, it shows the importance of IT design in studying experiential computing. While not taking a deterministic view of technology, we validate the notion that different technology designs produce a variation of effects around a predictable central tendency. Second, it empirically demonstrates that the affordances of embodied digital experiences have an effect on actual behavior as well as on the outcome of the experience itself. Journal: European Journal of Information Systems Pages: 477-492 Issue: 6 Volume: 25 Year: 2016 Month: 11 X-DOI: 10.1057/s41303-016-0019-9 File-URL: http://hdl.handle.net/10.1057/s41303-016-0019-9 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:6:p:477-492 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934408_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Guy Paré Author-X-Name-First: Guy Author-X-Name-Last: Paré Author-Name: Mary Tate Author-X-Name-First: Mary Author-X-Name-Last: Tate Author-Name: David Johnstone Author-X-Name-First: David Author-X-Name-Last: Johnstone Author-Name: Spyros Kitsiou Author-X-Name-First: Spyros Author-X-Name-Last: Kitsiou Title: Contextualizing the twin concepts of systematicity and transparency in information systems literature reviews Abstract: Recently there has been a great deal of advice published for information systems researchers aiming to conduct standalone literature reviews, and this advice has been, at times, confusing, contradictory and contested. In this opinion paper, we harmonize and resolve some crucial elements of this debate. In our view, literature review articles need to adhere to the same high standards of quality and trustworthiness as other empirical studies. We argue that a systematic approach, accompanied by transparent reporting, is essential for positivist as well as interpretivist reviews, regardless of their specific type, scope and methods. In terms of structure, we first recap the main genres of review articles used by information systems scholars, and present a high-level framework of the steps required to develop a literature review article. For each step, we then explain how the twin concepts of systematicity and transparency should be understood and embedded in the process of developing review papers across a wide range of genres, including positivist aggregative reviews as well as interpretive syntheses using iterative, inductive and abductive approaches. Journal: European Journal of Information Systems Pages: 493-508 Issue: 6 Volume: 25 Year: 2016 Month: 11 X-DOI: 10.1057/s41303-016-0020-3 File-URL: http://hdl.handle.net/10.1057/s41303-016-0020-3 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:6:p:493-508 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934409_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Dov Te’eni Author-X-Name-First: Dov Author-X-Name-Last: Te’eni Title: Contextualization and problematization, gamification and affordance: a traveler’s reflections on EJIS Journal: European Journal of Information Systems Pages: 473-476 Issue: 6 Volume: 25 Year: 2016 Month: 11 X-DOI: 10.1057/s41303-016-0028-8 File-URL: http://hdl.handle.net/10.1057/s41303-016-0028-8 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:6:p:473-476 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934188_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Christophe M Elie-Dit-Cosaque Author-X-Name-First: Christophe M Author-X-Name-Last: Elie-Dit-Cosaque Author-Name: Detmar W Straub Author-X-Name-First: Detmar W Author-X-Name-Last: Straub Title: Opening the black box of system usage: user adaptation to disruptive IT Abstract: According to Benbasat and Barki (2007), systems usage has remained a black box in spite of the fact that the construct lies at the heart of a host of studies in the field. We know very little about how exactly users cope with information technology (IT), especially disruptive IT. To answer such questions, we grounded our current work in Beaudry and Pinsonneault's Coping Model of User Adaptation (2005; CMUA), a model that explains user strategies appraising an IT event. These strategies are a response to threats and opportunities embedded in the IT event and are impacted by the level of control users have over the situation. In the current study, following CMUA, we develop and test measures for a deeper understanding of systems usage and user adaptation to IT through a 2 × 2 laboratory experiment. Overall, we found strong support for the CMUA model. Journal: European Journal of Information Systems Pages: 589-607 Issue: 5 Volume: 20 Year: 2011 Month: 9 X-DOI: 10.1057/ejis.2010.23 File-URL: http://hdl.handle.net/10.1057/ejis.2010.23 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:5:p:589-607 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934189_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Kalle Lyytinen Author-X-Name-First: Kalle Author-X-Name-Last: Lyytinen Author-Name: Jan Damsgaard Author-X-Name-First: Jan Author-X-Name-Last: Damsgaard Title: Inter-organizational information systems adoption – a configuration analysis approach Abstract: In this article we propose a new complementary approach to investigate Inter-Organizational Information Systems (IOIS) adoption called configuration analysis. We motivate the need for a new approach by the common observation that the structure and the strategy of an IOIS are interdependent and that the IOIS adoptions consequently cluster orderly. For example, an IOIS setup with a powerful customer as a hub and many suppliers as spokes frequently surfaces across diffusion studies. Yet, this fact has not been integrated into existing analyses, and its implications have not been fully developed. We propose that IOIS scholars need to look beyond the single adopting organization in IOIS adoption studies and in contrast consider adoption units what we call an adoption configuration. Each such configuration can be further characterized along the following dimensions: (1) vision, (2) key functionality, (3) mode of interaction, (4) structure and (5) mode of appropriation. In addition, these dimensions do not co-vary independently. For example, a particular organizing vision assumes a specific inter-organizational structure. A typology of IOIS configurations for adoption analysis is laid out consisting of dyadic, hub and spoke, industry and community configurations. Specific forms or adoption analysis are suggested for each type of configuration. Overall, configuration analysis redirects IOIS adoption studies both at the theoretical and the methodological level, and a corresponding research agenda is sketched. Journal: European Journal of Information Systems Pages: 496-509 Issue: 5 Volume: 20 Year: 2011 Month: 9 X-DOI: 10.1057/ejis.2010.71 File-URL: http://hdl.handle.net/10.1057/ejis.2010.71 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:5:p:496-509 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934190_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Reeva Lederman Author-X-Name-First: Reeva Author-X-Name-Last: Lederman Author-Name: Robert B Johnston Author-X-Name-First: Robert B Author-X-Name-Last: Johnston Title: Decision support or support for situated choice: lessons for system design from effective manual systems Abstract: In a number of organisational settings where work is highly skilled but substantially routine, certain entrenched manual systems have resisted digitisation. These systems include card-based systems in emergency despatch, the paper flight progress strips system used in air traffic control, the Kanban system and whiteboard systems used in hospital wards. Research to understand or replace these systems has frequently regarded them as decision support systems (DSS). We report here a detailed case study of a manual whiteboard-based bed allocation system in the ICU of a large general hospital, which shows that the support it provides for users’ action choices cannot be validly conceived as decision support. This system and other effective manual systems may be better understood as a ‘situated choice support system’ (SCSS). Whereas DSS provide actors with a model of the action environment in order to support reasoning about the consequences of alternative actions, SCSS provide actors with structured work environments that reduce possible actions and cue-providing information resources to support a reactive choice between these limited alternatives. The findings warn of the danger of uncritically applying the DSS design paradigm to supporting action choice in skilled routine work, and provide an alternative design theory, which can potentially inform new ICT-based designs. Journal: European Journal of Information Systems Pages: 510-528 Issue: 5 Volume: 20 Year: 2011 Month: 9 X-DOI: 10.1057/ejis.2011.11 File-URL: http://hdl.handle.net/10.1057/ejis.2011.11 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:5:p:510-528 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934191_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Alexander Benlian Author-X-Name-First: Alexander Author-X-Name-Last: Benlian Title: Is traditional, open-source, or on-demand first choice? Developing an AHP-based framework for the comparison of different software models in office suites selection Abstract: Until recently, organizations planning to acquire application software (AS) have had no choice but to adopt proprietary, on-premises software. With the advent of open-source and on-demand solutions, new models for developing and distributing software have entered the stage providing IS managers with more options in AS selection. On the basis of an Analytic Hierarchy Process model, we propose a framework including software package and implementation attributes on different hierarchy levels to examine how IS managers evaluate the relative fulfilment of key selection criteria by traditional, open-source, and on-demand office suites. By testing the framework with a random sample of 254 IS managers of 166 smaller and 88 mid-sized/larger firms, we validate its validity and usefulness in evaluating different software delivery models. Our empirical results show that open-source office suites were consistently perceived to be superior in meeting ease of customization (i.e., extensibility and adaptability) and cost criteria (i.e., acquisition and maintenance cost), whereas traditional software models were superior in fulfilling functionality, ease of use, and support requirements. On-demand office suites excelled in the fulfilment of time-to-value and data recoverability. We discuss further results of the comparison of the three software models, and derive practical and research implications for office suite selection. Journal: European Journal of Information Systems Pages: 542-559 Issue: 5 Volume: 20 Year: 2011 Month: 9 X-DOI: 10.1057/ejis.2011.14 File-URL: http://hdl.handle.net/10.1057/ejis.2011.14 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:5:p:542-559 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934192_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Aurélie Dudezert Author-X-Name-First: Aurélie Author-X-Name-Last: Dudezert Author-Name: Dorothy E Leidner Author-X-Name-First: Dorothy E Author-X-Name-Last: Leidner Title: Illusions of control and social domination strategies in knowledge mapping system use Abstract: In recent years, the overload of information has driven companies to develop visualization technologies as a way to graphically represent knowledge for decision making. On the basis of visualization technologies and on knowledge modeling techniques, knowledge maps (Kmaps) help represent the knowledge assets of a company as graphical discrete objects. Yet such systems, because of their visual representation of knowledge, are prone to creating illusions. Using a case study of three firms’ use of Kmaps in their Human Resource departments and drawing upon Bourdieu's social theory, illusion of control theory, and IS as signal and symbol theory, our study provides a critical perspective on the use of Kmaps by groups of actors to reinforce their social domination in business organizations. We find that Kmap use can lead to illusions of knowledge control and illusions of executive control and that in response to the potential for knowledge illusions, three social domination strategies – a signal and symbol strategy, an avoidance strategy and an evidence strategy – are employed. Implications of these results on Knowledge Management and Information Systems Management future research are discussed. Journal: European Journal of Information Systems Pages: 574-588 Issue: 5 Volume: 20 Year: 2011 Month: 9 X-DOI: 10.1057/ejis.2011.17 File-URL: http://hdl.handle.net/10.1057/ejis.2011.17 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:5:p:574-588 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934193_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Calvin M L Chan Author-X-Name-First: Calvin M L Author-X-Name-Last: Chan Author-Name: Ray Hackney Author-X-Name-First: Ray Author-X-Name-Last: Hackney Author-Name: Shan L Pan Author-X-Name-First: Shan L Author-X-Name-Last: Pan Author-Name: Tzu-Chuan Chou Author-X-Name-First: Tzu-Chuan Author-X-Name-Last: Chou Title: Managing e-Government system implementation: a resource enactment perspective Abstract: The research presents a theoretical and empirical analysis of an e-Government system implementation. The resource-based view and the enactment concept were leveraged as a theoretical sense-making lens to study the system through its planning, development and operation phases. Consequently, a process model of resource enactment was developed to theorize how organizational resources were mobilized for successful implementation. It was found that the environmental climate at each phase gave rise to a particular focal capability. This was developed through the symbiotic enactment of a focal resource in conjunction with other complementary resources. Specifically, knowledge, social and leadership resources were found to be pertinently enacted in developing the focal capabilities. When observed across the phases, such symbiotic enactment of complementary resources followed a co-evolutionary path. The empirical research was conducted through a qualitative case analysis. This research would therefore be of interest to both academics and practitioners as it contributes to cumulative theoretical development and provides practical grounded insights to inform and advance e-Government system implementation. Journal: European Journal of Information Systems Pages: 529-541 Issue: 5 Volume: 20 Year: 2011 Month: 9 X-DOI: 10.1057/ejis.2011.19 File-URL: http://hdl.handle.net/10.1057/ejis.2011.19 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:5:p:529-541 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934194_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Xiang Fang Author-X-Name-First: Xiang Author-X-Name-Last: Fang Author-Name: John “Skip” Benamati Author-X-Name-First: John “Skip” Author-X-Name-Last: Benamati Author-Name: Albert L Lederer Author-X-Name-First: Albert L Author-X-Name-Last: Lederer Title: Coping with rapid information technology change in different national cultures Abstract: Coping with rapid information technology change challenges IT organizations throughout the world. National culture theory based on the GLOBE study suggests that culture affects the coping with such change in China and the United States, but does not cogently suggest that coping mechanisms differ in effectiveness across the two cultures. Analysis of data from 71 IT executives and managers in China and 246 in the United States suggests that Chinese IT organizations employ coping mechanisms of vendor support, education and training, and internal procedures more extensively than do U.S. IT organizations. IT organizations in both countries apply education and training as well as internal procedures to successfully deal with the problems of rapid IT change. Vendor support additionally predicted success in Chinese but not U.S. organizations, whereas in both U.S. and Chinese organizations endurance predicted lack of success. The research thus extends national culture theory by proposing that culture affects successful coping. Implications for research suggest the identification of actions to overcome the impact of cultural differences. Implications for practice suggest that multinational corporations deal with rapid IT change differently in divisions in different cultures, regardless of whether in China, the United States, Europe, or elsewhere. Journal: European Journal of Information Systems Pages: 560-573 Issue: 5 Volume: 20 Year: 2011 Month: 9 X-DOI: 10.1057/ejis.2011.20 File-URL: http://hdl.handle.net/10.1057/ejis.2011.20 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:5:p:560-573 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934195_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Frantz Rowe Author-X-Name-First: Frantz Author-X-Name-Last: Rowe Title: Towards a greater diversity in writing styles, argumentative strategies and genre of manuscripts Journal: European Journal of Information Systems Pages: 491-495 Issue: 5 Volume: 20 Year: 2011 Month: 9 X-DOI: 10.1057/ejis.2011.29 File-URL: http://hdl.handle.net/10.1057/ejis.2011.29 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:5:p:491-495 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934196_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bongsik Shin Author-X-Name-First: Bongsik Author-X-Name-Last: Shin Author-Name: Gimun Kim Author-X-Name-First: Gimun Author-X-Name-Last: Kim Title: Investigating the reliability of second-order formative measurement in information systems research Abstract: Recently, a few studies empirically explored the stability of first-order formative measurement, and raised concerns with its estimation reliability. Interpretational confounding, the disparity in the nominal and empirical meaning of a formatively measured construct, is at the center stage of the concern. Our study examines the issue in the context of the higher-order abstraction, focusing on the formatively defined relationship between the second-order construct and its indicators (i.e., first-order latent variables). Although the second-order formative abstraction is a widely accepted practice in structural equation modeling, the estimation results have been given a blind faith with no attempt to evaluate their integrity. Our empirical test, therefore, constitutes an attempt to fill the void. This study observed moderations of the theoretical relationship between reflectively designed first-order constructs and formatively defined second-order constructs when there is a change of endogenous variables. For this, two different formatively defined second-order constructs (i.e., IT management capabilities and IT personnel expertise) are utilized for the empirical testing. The estimation reveals that, while there was a considerable moderation of weights between IT management capabilities and its first-order constructs, those between IT personnel expertise and its first-order constructs remained relatively stable. These results demonstrate that the formatively defined relationship between the first- and second-order constructs can be precarious depending on the choice of the dependent variables. The analysis, therefore, revealed a significant presence of interpretational confounding and a higher chance of Type 1 error in model estimation. This implies that it becomes difficult to retain the construct validity and external validity of a formatively defined second-order construct. Thus, researchers are encouraged to exercise caution in mobilizing the formatively defined second-order measurement. Journal: European Journal of Information Systems Pages: 608-623 Issue: 5 Volume: 20 Year: 2011 Month: 9 X-DOI: 10.1057/ejis.2011.7 File-URL: http://hdl.handle.net/10.1057/ejis.2011.7 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:5:p:608-623 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934366_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ahmed Driouchi Author-X-Name-First: Ahmed Author-X-Name-Last: Driouchi Author-Name: Mingzhu Wang Author-X-Name-First: Mingzhu Author-X-Name-Last: Wang Author-Name: Tarik Driouchi Author-X-Name-First: Tarik Author-X-Name-Last: Driouchi Title: Determinants of software piracy under risk aversion: a model with empirical evidence Abstract: This paper studies the determinants of software piracy in world economies from a risk avoidance perspective. A risk aversion model for the commercialization of pirated software is developed to account for behavioral elements of risk and uncertainty avoidance among countries’ software pirates (i.e., counterfeiters and suppliers) and test empirically for the effects of country characteristics on piracy levels. Panel regression analysis is conducted to identify the determinants of software piracy using this model on a data set of 87 countries during 2007–2011. The empirical results confirm those obtained in prior research (e.g., the inverted U-shaped relationship between GDP per capita and piracy rates) but divulge that the behavioral-country component capturing the attitudes towards risk of software pirates improves the explanatory power of the statistical regressions after controlling for country performance and institutional factors. We also show that human development and good country governance reduce piracy rates. Besides providing support for our risk aversion-based piracy model and hinting at the need to consider population behavior in policy-making, these findings underline the relevance of human development and country institutions in explaining software piracy rates. Journal: European Journal of Information Systems Pages: 519-530 Issue: 5 Volume: 24 Year: 2015 Month: 9 X-DOI: 10.1057/ejis.2014.14 File-URL: http://hdl.handle.net/10.1057/ejis.2014.14 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:5:p:519-530 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934367_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Isabelle Walsh Author-X-Name-First: Isabelle Author-X-Name-Last: Walsh Title: Using quantitative data in mixed-design grounded theory studies: an enhanced path to formal grounded theory in information systems Abstract: This article discusses a key development in the use of grounded theory (GT) in information systems (IS) – the use of quantitative data in mixed studies to build on and elaborate theories. We examine the design of one of our research projects and describe how this mixed-design GT project helped elaborate emerging theories using slices of qualitative and quantitative data. Our contributions are threefold: (i) we show that the use of mixed data and techniques can be leveraged to help build credible theories in IS because it allows researchers to build theories of greater abstraction and scope: it helps sense-making in the drive from substantive to parsimonious formal theories; (ii) in line with classic GT, we propose a mixed typological design to help build a pathway to formal grounded theories in rupture with existing literature; and (iii) we highlight GT as a meta-theory of research design and revisit some of its main principles in a mixed-design perspective. Journal: European Journal of Information Systems Pages: 531-557 Issue: 5 Volume: 24 Year: 2015 Month: 9 X-DOI: 10.1057/ejis.2014.23 File-URL: http://hdl.handle.net/10.1057/ejis.2014.23 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:5:p:531-557 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934368_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Christian Maier Author-X-Name-First: Christian Author-X-Name-Last: Maier Author-Name: Sven Laumer Author-X-Name-First: Sven Author-X-Name-Last: Laumer Author-Name: Andreas Eckhardt Author-X-Name-First: Andreas Author-X-Name-Last: Eckhardt Author-Name: Tim Weitzel Author-X-Name-First: Tim Author-X-Name-Last: Weitzel Title: Giving too much social support: social overload on social networking sites Abstract: As the number of messages and social relationships embedded in social networking sites (SNS) increases, the amount of social information demanding a reaction from individuals increases as well. We observe that, as a consequence, SNS users feel they are giving too much social support to other SNS users. Drawing on social support theory (SST), we call this negative association with SNS usage ‘social overload’ and develop a latent variable to measure it. We then identify the theoretical antecedents and consequences of social overload and evaluate the social overload model empirically using interviews with 12 and a survey of 571 Facebook users. The results show that extent of usage, number of friends, subjective social support norms, and type of relationship (online-only vs offline friends) are factors that directly contribute to social overload while age has only an indirect effect. The psychological and behavioral consequences of social overload include feelings of SNS exhaustion by users, low levels of user satisfaction, and a high intention to reduce or even stop using SNS. The resulting theoretical implications for SST and SNS acceptance research are discussed and practical implications for organizations, SNS providers, and SNS users are drawn. Journal: European Journal of Information Systems Pages: 447-464 Issue: 5 Volume: 24 Year: 2015 Month: 9 X-DOI: 10.1057/ejis.2014.3 File-URL: http://hdl.handle.net/10.1057/ejis.2014.3 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:5:p:447-464 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934369_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jennifer E Gerow Author-X-Name-First: Jennifer E Author-X-Name-Last: Gerow Author-Name: Jason Bennett Thatcher Author-X-Name-First: Jason Bennett Author-X-Name-Last: Thatcher Author-Name: Varun Grover Author-X-Name-First: Varun Author-X-Name-Last: Grover Title: Six types of IT-business strategic alignment: an investigation of the constructs and their measurement Abstract: Top management has been concerned with IT-business strategic alignment (hereafter referred to as alignment) for the past 30 years. Consequently, alignment researchers have developed many models to explain how alignment generates value for firms. However, these models use inconsistent definitions and measures of alignment, which has led to conflicting results and has potentially inhibited the progress of research on this critical topic. This paper emphasizes the importance of demarcating the six alignment types that are sometimes confused in the literature into a single, unified model. It also reports on the development of definitions and measures of these six types of alignment including alignment between IT and business strategies (i.e., intellectual alignment), between IT and business infrastructures and processes (i.e., operational alignment), and across these two domains such that strategies are linked with infrastructures and processes (i.e., four types of cross-domain alignment). Analyzing survey data collected from 140 Chief Information Officers, we found each measure possesses desirable psychometric properties. Implications for theory and practice are discussed. Journal: European Journal of Information Systems Pages: 465-491 Issue: 5 Volume: 24 Year: 2015 Month: 9 X-DOI: 10.1057/ejis.2014.6 File-URL: http://hdl.handle.net/10.1057/ejis.2014.6 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:5:p:465-491 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934370_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Zixing Shen Author-X-Name-First: Zixing Author-X-Name-Last: Shen Author-Name: Kalle Lyytinen Author-X-Name-First: Kalle Author-X-Name-Last: Lyytinen Author-Name: Youngjin Yoo Author-X-Name-First: Youngjin Author-X-Name-Last: Yoo Title: Time and information technology in teams: a review of empirical research and future research directions Abstract: Information technology (IT) is intricately bound up with time in teams. Yet a comprehensive review of what is known about time in IT-mediated teams is lacking. This paper addresses this gap. We classify time into three categories: conceptions of time, mapping activities to time, and actors relating to time. Drawing upon this framework, we review empirical information systems (IS) research on IT-mediated teams over the past three decades. Our review reveals that the research has approached time predominantly using the clock view and has examined exclusively how to map a single activity to the continuum of time. As a result, most studies operate within a simplified temporal context by conceiving time as an objective attribute that ticks away. Meanwhile, a void exists in research that recognizes time as interpretive and experienced. Our analyses also indicate that past research has been primarily interested in the differences between face-to-face and IT-mediated teams and the communication function of IT. Overall, IT remains roughly conceptualized, and research has produced fragmented insights that have small cumulative effects. To advance more substantive theory building, we propose several research directions that invite richer theorizing about how IT is related to time in teams. Journal: European Journal of Information Systems Pages: 492-518 Issue: 5 Volume: 24 Year: 2015 Month: 9 X-DOI: 10.1057/ejis.2014.8 File-URL: http://hdl.handle.net/10.1057/ejis.2014.8 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:5:p:492-518 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934243_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Sang Cheol Park Author-X-Name-First: Sang Cheol Author-X-Name-Last: Park Author-Name: Mark Keil Author-X-Name-First: Mark Author-X-Name-Last: Keil Author-Name: Jong UK Kim Author-X-Name-First: Jong UK Author-X-Name-Last: Kim Author-Name: Gee-Woo Bock Author-X-Name-First: Gee-Woo Author-X-Name-Last: Bock Title: Understanding overbidding behavior in C2C auctions: an escalation theory perspective Abstract: With millions of online auctions per day, sites such as eBay have revolutionized how consumers buy and sell goods. Despite the benefits associated with online consumer-to-consumer (C2C) auctions, there can be drawbacks. Consumers who purchase goods in online auctions may get caught up in auction fever, causing them to engage in overbidding, and sometimes leading to what has been referred to as the winner's curse. While several theoretical explanations have been proposed to explain overbidding behavior (OB), there has been little empirical work in this area. Drawing on escalation theory, this study develops and tests a model of the OB exhibited by individuals in online auction settings. Our model posits that certain escalation drivers such as sunk cost (SC), the completion effect (CE), and self-justification affect an individual's willingness to continue bidding (WCB) which, in turn, influences OB. Survey data collected from 250 online auction participants were used to test the model using partial least squares analysis. SC and CE were found to have significant impacts on OB that were either partially or fully mediated by WCB. We also found that competition intensity moderates the relationship between willingness to continue and OB such that when competition is more intense, the relationship becomes even stronger. The implications of these findings for both research and practice are discussed. Journal: European Journal of Information Systems Pages: 643-663 Issue: 6 Volume: 21 Year: 2012 Month: 11 X-DOI: 10.1057/ejis.2012.11 File-URL: http://hdl.handle.net/10.1057/ejis.2012.11 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:6:p:643-663 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934244_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ting Li Author-X-Name-First: Ting Author-X-Name-Last: Li Author-Name: Till Unger Author-X-Name-First: Till Author-X-Name-Last: Unger Title: Willing to pay for quality personalization? Trade-off between quality and privacy Abstract: Online personalization presents recommendations of products and services based on customers’ past online purchases or browsing behavior. Personalization applications reduce information overload and provide value-added services. However, their adoption is hindered by customers’ concerns about information privacy. This paper reports on research undertaken to determine whether a high-quality recommendation service will encourage customers to use online personalization. We collected data through a series of online experiments to examine the impacts of privacy and quality on personalization usage and on users’ willingness to pay and to disclose information when using news and financial services. Our findings suggest that under certain circumstances, perceived personalization quality can outweigh the impact of privacy concerns. This implies that service providers can improve the perceived quality of personalization services being offered in order to offset customer privacy concerns. Nevertheless, the impact of perceived quality on personalization usage is weaker for customers who have experienced privacy invasion in the past. The results show that customers who are likely to use online personalization are also likely to pay for the service. This finding suggests that, despite privacy concerns, there is an opportunity for businesses to monetize high-quality personalization. Journal: European Journal of Information Systems Pages: 621-642 Issue: 6 Volume: 21 Year: 2012 Month: 11 X-DOI: 10.1057/ejis.2012.13 File-URL: http://hdl.handle.net/10.1057/ejis.2012.13 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:6:p:621-642 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934245_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jose Benitez-Amado Author-X-Name-First: Jose Author-X-Name-Last: Benitez-Amado Author-Name: Rita M Walczuch Author-X-Name-First: Rita M Author-X-Name-Last: Walczuch Title: Information technology, the organizational capability of proactive corporate environmental strategy and firm performance: a resource-based analysis Abstract: The study of the relationships between information technology (IT), environmental organizational issues and firm performance is a cutting-edge research topic for the information systems (IS) community. However, at present we know very little about these relationships. Drawing on the perspective of IT-enabled organizational capabilities and the literature on organizations and the natural environment, our study introduces conceptually the construct organizational capability of proactive corporate environmental strategy to the IS field. We propose that IT capability may enable the implementation of a proactive environmental strategy and that this strategy could play a significant role in determining the business value of IT. Using structural equations modeling with data collected from 63 firms, we find that IT capability is an enabler of proactive environmental strategy and that this strategy plays a significant role in mediating the effects of IT on firm performance. Our study provides initial evidence on the role of IT in the implementation of proactive environmental practices. Our results suggest to IT executives that their decisions matter in shaping environmental sustainability, which in turn will generate business value from IT. Journal: European Journal of Information Systems Pages: 664-679 Issue: 6 Volume: 21 Year: 2012 Month: 11 X-DOI: 10.1057/ejis.2012.14 File-URL: http://hdl.handle.net/10.1057/ejis.2012.14 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:6:p:664-679 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934246_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jiming Wu Author-X-Name-First: Jiming Author-X-Name-Last: Wu Author-Name: Hongwei Du Author-X-Name-First: Hongwei Author-X-Name-Last: Du Title: Toward a better understanding of behavioral intention and system usage constructs Abstract: To understand user behavior, researchers have examined intention to use, and system usage through some common conceptualizations such as actual usage, reported usage, and assessed usage. Although this entire body of research has produced important findings, it has yet to appreciably advance our theoretical understanding of behavioral intention (BI) and usage constructs. To fill this gap, this paper critically examines and compares these core variables as well as their relationships with key technology acceptance determinants. We find that (1) BI has a much higher correlation with the determinants than does usage, and thus more variance in BI than in usage can be explained; (2) BI is not a good surrogate for usage; (3) among the three usage constructs, assessed usage is the most and actual usage is the least highly correlated with BI; and (4) researchers should examine both actual usage and assessed usage in their every single study to bring to light the true relationships between system usage and its antecedents. This study thus helps IS scholars expand their baseline knowledge of these core variables, interpret the important messages conveyed by the extant literature, and conduct more fruitful and illuminating future research on user behavior. Journal: European Journal of Information Systems Pages: 680-698 Issue: 6 Volume: 21 Year: 2012 Month: 11 X-DOI: 10.1057/ejis.2012.15 File-URL: http://hdl.handle.net/10.1057/ejis.2012.15 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:6:p:680-698 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934247_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Hope Koch Author-X-Name-First: Hope Author-X-Name-Last: Koch Author-Name: Ester Gonzalez Author-X-Name-First: Ester Author-X-Name-Last: Gonzalez Author-Name: Dorothy Leidner Author-X-Name-First: Dorothy Author-X-Name-Last: Leidner Title: Bridging the work/social divide: the emotional response to organizational social networking sites Abstract: Organizations seem to be split on their policies governing social networking sites (SNSs) in the workplace. Recent surveys indicate that while many organizations severely restrict or ban SNSs (i.e., Facebook and Twitter) at work, a large majority are actively using, or evaluating the use of SNSs. The purpose of this study is to investigate the implementation of an internal SNS designed to help a large financial institution's IT new hire program. On the basis of a case study informed by boundary theory and the theory of positive emotions, the research describes the SNS, its uses and how it impacted both the employees and the organization. We found that SNSs blur the boundary between work life and social life and that this boundary blurring creates positive emotions for the employees that use the system. These emotions create personal resources, which then have organizational impacts. While some of the non-users of the system, the IT middle managers, experienced isolation, frustration and resentment, the executives overseeing this SNS attribute improved morale, better employee engagement and even reduced employee turnover to the internal SNS. Journal: European Journal of Information Systems Pages: 699-717 Issue: 6 Volume: 21 Year: 2012 Month: 11 X-DOI: 10.1057/ejis.2012.18 File-URL: http://hdl.handle.net/10.1057/ejis.2012.18 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:6:p:699-717 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934248_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Kennedy Njenga Author-X-Name-First: Kennedy Author-X-Name-Last: Njenga Author-Name: Irwin Brown Author-X-Name-First: Irwin Author-X-Name-Last: Brown Title: Conceptualising improvisation in information systems security Abstract: Information Systems Security (ISS) has constantly been ranked as a key concern for Information Systems (IS) managers. Research in the field has largely assumed rational choice (functional) approaches to managing ISS. Such approaches do not give due recognition to the role of improvisation in ISS work. Empirical evidence in organisations suggests that in the context of dynamic, volatile and uncertain environments practitioners are both rational and adaptive (a manifestation of improvisation). In this paper, we conceptualise and demonstrate the manifestation of improvisation in ISS. In order to develop a better understanding of improvisation in ISS activities, hermeneutical and exegetical techniques were employed. Empirical data were collected through in-depth interviews in a single case study. The data obtained were analysed and interpreted hermeneutically. Generally it was found that improvisation is manifested in ISS activities. Implications of these and other findings for the scholarly community and for practical use are discussed. Journal: European Journal of Information Systems Pages: 592-607 Issue: 6 Volume: 21 Year: 2012 Month: 11 X-DOI: 10.1057/ejis.2012.3 File-URL: http://hdl.handle.net/10.1057/ejis.2012.3 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:6:p:592-607 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934249_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Richard Baskerville Author-X-Name-First: Richard Author-X-Name-Last: Baskerville Title: Reviving the IT in the IS Journal: European Journal of Information Systems Pages: 587-591 Issue: 6 Volume: 21 Year: 2012 Month: 11 X-DOI: 10.1057/ejis.2012.46 File-URL: http://hdl.handle.net/10.1057/ejis.2012.46 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:6:p:587-591 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934250_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Eric Monteiro Author-X-Name-First: Eric Author-X-Name-Last: Monteiro Author-Name: Knut H Rolland Author-X-Name-First: Knut H Author-X-Name-Last: Rolland Title: Trans-situated use of integrated information systems Abstract: Practice-based perspectives have established the situated nature of how technology is appropriated, enacted, and improvised in organisations. Empirical studies demonstrate how the same technology produces different results in different contexts of use. However, practice-based research has, to date, less to offer in terms of accounting for the relationship between instances of situated use (i.e., work practices) that are separated in space and/or time. The term trans-situated use is intended to highlight this blind spot. We focus on one type of relationship, viz., significant degrees of similarities between technologically mediated, geographically dispersed work practices. This degree of similarity is achieved through a process of commensurability consisting of (i) standardisation (addressing interdependencies between multiple instances of the ‘same’ work practice at geographically dispersed sites); and (ii) heterogeneity (addressing the entanglement of one work practice with apparently unrelated work practices and modules). Empirically, we report on a longitudinal, interpretative case study (1998–2004) of a company strategically targeting an integrated information system as a principal vehicle to establish similar services globally. Journal: European Journal of Information Systems Pages: 608-620 Issue: 6 Volume: 21 Year: 2012 Month: 11 X-DOI: 10.1057/ejis.2012.8 File-URL: http://hdl.handle.net/10.1057/ejis.2012.8 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:6:p:608-620 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934421_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: David Avison Author-X-Name-First: David Author-X-Name-Last: Avison Author-Name: Julien Malaurent Author-X-Name-First: Julien Author-X-Name-Last: Malaurent Author-Name: Philippe Eynaud Author-X-Name-First: Philippe Author-X-Name-Last: Eynaud Title: A narrative approach to publishing information systems research: inspiration from the French New Novel tradition Abstract: In this paper, we suggest an alternative way of producing Information Systems (IS) case studies in which researchers act as narrators of stories following the spirit and techniques of the French New Novel (FNN). As such, authors attempt to represent the richness of a problem situation. The readers’ role is more demanding compared to traditional case studies, as they have to play detectives to discover meaning from the narrative. Hence, readers need to expose different interpretations from the text rather than accept a complete story by the author or an author-provided set of alternative interpretations. Following a discussion of the FNN, we present an extract of a narrative that follows this approach. It concerns use of technology in team meetings in a research project on the potential impact of climate change on organic farming in France. Based on this example, we discuss the techniques used in its construction, ways in which the text might be interpreted, and how it may become part of publishing qualitative case study research within IS. Journal: European Journal of Information Systems Pages: 260-273 Issue: 3 Volume: 26 Year: 2017 Month: 5 X-DOI: 10.1057/s41303-016-0022-1 File-URL: http://hdl.handle.net/10.1057/s41303-016-0022-1 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:3:p:260-273 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934422_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: James Love Author-X-Name-First: James Author-X-Name-Last: Love Author-Name: Rudy Hirschheim Author-X-Name-First: Rudy Author-X-Name-Last: Hirschheim Title: Crowdsourcing of information systems research Abstract: This paper addresses how technology-mediated mass collaboration offers a dramatically innovative alternative for producing IS research. We refer to this emerging genre as the crowdsourced research genre and develop a framework to structure discourse on how it may affect the production of IS research. After systematically traversing the alternative genre’s landscape using the framework, we propose a research agenda of the most substantial and imminent issues for the successful development of the genre, including contributor incentives, scholarly contribution assessment, anonymity, governance, intellectual property ownership, and value propositions. In addressing this research agenda, we reflect on what might be learned from other areas in which crowdsourcing has been established with success. Journal: European Journal of Information Systems Pages: 315-332 Issue: 3 Volume: 26 Year: 2017 Month: 5 X-DOI: 10.1057/s41303-017-0036-3 File-URL: http://hdl.handle.net/10.1057/s41303-017-0036-3 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:3:p:315-332 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934423_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Elpida Prasopoulou Author-X-Name-First: Elpida Author-X-Name-Last: Prasopoulou Title: A half-moon on my skin: a memoir on life with an activity tracker Abstract: Experiential computing shifts the focus of IS research on how humans encounter information technologies in everyday life. For this, it invites explorations on the role of the body and its affective propulsions as the locus of human experience. I argue, in this article, that this embodied perspective, studied through the lens of enchanted materialism (Bennett in The enchantment of modern life: attachments, crossings, and ethics. Princeton University Press, Princeton, 2001), needs to be combined with an alternative writing genre to fruitfully explore life in experiential computing. It is for this reason that I present my research as a memoir on the use of wearables – an instantiation of the Internet of Things – in everyday life. The aim is to show that, when studying emerging technologies, an open-ended non-fictional genre like the memoir can produce astute and imaginative insights that may be as informative as traditional academic writing. The memoir produces a thick description of the way people interact with digital devices in experiential computing; their expectations and the subsequent effort to entangle the data in their daily lives. This way, it problematises current organising visions of a data-driven life. I conclude the article with reflections on the contribution that enchanted materialism makes to information systems, as well as the memoir’s potential for academic research. Journal: European Journal of Information Systems Pages: 287-297 Issue: 3 Volume: 26 Year: 2017 Month: 5 X-DOI: 10.1057/s41303-017-0040-7 File-URL: http://hdl.handle.net/10.1057/s41303-017-0040-7 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:3:p:287-297 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934424_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mads Bødker Author-X-Name-First: Mads Author-X-Name-Last: Bødker Title: “What else is there…?”: reporting meditations in experiential computing Abstract: Compelled by Yoo’s (MIS Q, 34:213–231, 2010) call for research on experiential computing, the paper suggests meditations as a genre for both doing and reporting on fieldwork. Meditations are used to engender passionate renderings of research encounters that are part introspective and reflective and part causative and instructive. The meditations weave together everyday experiences with IT with theoretical reflections on embodiment and affect, and suggest the potential for a new scholarly sensuousness. The paper suggests that paying attention to feelings related to technology in everyday life and the use of alternative representational tactics and theoretical motifs can be generative of new matters for empirical research. Emphasizing the senses and the body and their importance in developing a sensory apprenticeship in IS, the paper suggests alternative routes to knowledge and representation. Journal: European Journal of Information Systems Pages: 274-286 Issue: 3 Volume: 26 Year: 2017 Month: 5 X-DOI: 10.1057/s41303-017-0041-6 File-URL: http://hdl.handle.net/10.1057/s41303-017-0041-6 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:3:p:274-286 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934425_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Michelle Lynn Kaarst-Brown Author-X-Name-First: Michelle Lynn Author-X-Name-Last: Kaarst-Brown Title: Once upon a time: Crafting allegories to analyze and share the cultural complexity of strategic alignment Abstract: Allegories are fictional tales that convey meaning not explicitly set out in their narratives. In writing them, researchers move beyond the “realistic” tale to frame coherent organizational metaphors and symbols and to offer a multi-layered truth that lies “between the lines” in the often subconscious spaces of organizational life. As such, this genre offers an evocative, yet concise alternative to traditional approaches for information systems research. Drawing on a 2-year cultural study of strategic alignment of IT in two insurance organizations as illustrative context, the allegory is introduced and demonstrated in five steps to guide researchers in creating their own allegories. This illustration uses allegory to recast diverse cultural and historical data into short stories that involve magic dragons and wizards, thereby demonstrating the usefulness of the genre for comparative, multi-case designs to translate organizational features to achieve a common representation. In conclusion, the paper offers reflections on how the genre of allegory may contribute to future information systems research, to alternative styles of presentation, and to reflexive practices. Journal: European Journal of Information Systems Pages: 298-314 Issue: 3 Volume: 26 Year: 2017 Month: 5 X-DOI: 10.1057/s41303-017-0042-5 File-URL: http://hdl.handle.net/10.1057/s41303-017-0042-5 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:3:p:298-314 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934426_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Richard J. Boland Author-X-Name-First: Richard J. Author-X-Name-Last: Boland Author-Name: Kalle Lyytinen Author-X-Name-First: Kalle Author-X-Name-Last: Lyytinen Title: The limits to language in doing systems design Abstract: We employ a conversational genre of performative research in order to explore foundational issues of language and design in information system practice. Initially, Sir Geoffrey Vickers (†2004), C. West Churchman (†1999), Hans-Georg Gadamer (†1982) and Jurgen Habermas are portrayed as engaging in a roundtable discussion on the topic: “Are there Limits to Language in Doing System Design?” We employ an updated, AI-enhanced version of Memex, an intelligent agent originally described by Vannevar Bush at the end of WWII, to serve as a plausible digital platform for enabling a discussion among intelligent agents, both living and dead. The Memex system conducts a spirited conversation among the four scholars and later brings Pierre Bourdieu (†2002) and Bruno Latour into the discussion in order to enrich the unfolding conversation. After the roundtable, Jurgen Habermas and Sir Geoffrey Vickers synthesize the learning from their perspectives. Journal: European Journal of Information Systems Pages: 248-259 Issue: 3 Volume: 26 Year: 2017 Month: 5 X-DOI: 10.1057/s41303-017-0043-4 File-URL: http://hdl.handle.net/10.1057/s41303-017-0043-4 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:3:p:248-259 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934427_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Dov Te’eni Author-X-Name-First: Dov Author-X-Name-Last: Te’eni Title: Digital natives and immigrant editors, and special issues Journal: European Journal of Information Systems Pages: 237-239 Issue: 3 Volume: 26 Year: 2017 Month: 5 X-DOI: 10.1057/s41303-017-0050-5 File-URL: http://hdl.handle.net/10.1057/s41303-017-0050-5 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:3:p:237-239 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934428_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Michel Avital Author-X-Name-First: Michel Author-X-Name-Last: Avital Author-Name: Lars Mathiassen Author-X-Name-First: Lars Author-X-Name-Last: Mathiassen Author-Name: Ulrike Schultze Author-X-Name-First: Ulrike Author-X-Name-Last: Schultze Title: Alternative genres in information systems research Abstract: In this special issue, we advocate a critical stance toward the presentational conventions that we – as authors, reviewers, and editors – accept as the academic article genre. We seek to highlight and illustrate the generative capacity and the significant role of genres in the production of knowledge. Furthermore, we wish to encourage Information Systems (IS) scholars to leverage a wider array of alternative genres to present their research in order to develop new insights on subject matters of interest to the IS discipline, as well as expand on how contemporary and emergent phenomena of interest are conceived and studied. Adopting a broad view of alternative genres, we solicited articles that apply unconventional presentational modalities to expand or challenge the prevailing modus operandi of communicating IS scholarship and practice. Six articles survived a rather lengthy and challenging review process. We briefly discuss the nature of the academic article genre and the role of alternative ways of writing. We also introduce the six exemplars of alternative genres in the special issue, namely conversation, French new novel, meditation, memoir, allegory, and crowdsourced research. We highlight key insights and contemplate their implications for current and future IS research. Journal: European Journal of Information Systems Pages: 240-247 Issue: 3 Volume: 26 Year: 2017 Month: 5 X-DOI: 10.1057/s41303-017-0051-4 File-URL: http://hdl.handle.net/10.1057/s41303-017-0051-4 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:3:p:240-247 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1841574_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Paul Benjamin Lowry Author-X-Name-First: Paul Benjamin Author-X-Name-Last: Lowry Author-Name: Stacie Petter Author-X-Name-First: Stacie Author-X-Name-Last: Petter Author-Name: Jan Marco Leimeister Author-X-Name-First: Jan Marco Author-X-Name-Last: Leimeister Title: Desperately seeking the artefacts and the foundations of native theory in gamification research: why information systems researchers can play a legitimate role in this discourse and how they can better contribute Journal: European Journal of Information Systems Pages: 609-620 Issue: 6 Volume: 29 Year: 2020 Month: 11 X-DOI: 10.1080/0960085X.2020.1841574 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1841574 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:6:p:609-620 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1780963_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ali Khan Author-X-Name-First: Ali Author-X-Name-Last: Khan Author-Name: Farzam Boroomand Author-X-Name-First: Farzam Author-X-Name-Last: Boroomand Author-Name: Jane Webster Author-X-Name-First: Jane Author-X-Name-Last: Webster Author-Name: Xerxes Minocher Author-X-Name-First: Xerxes Author-X-Name-Last: Minocher Title: From Elements to Structures: An Agenda for Organisational Gamification Abstract: Gamification is gaining popularity in organisational settings, yet it is unclear if investments in organisational gamification will pay off, given that reports of mixed results are commonplace in the literature. It is important that potential factors behind any mixed results from the initial wave of gamification research be identified and addressed before organisational scholars and practitioners start investing valuable resources into large-scale gamification projects. In this Issues and Opinions paper, we identify and discuss several reasons that may be contributing to the problem of mixed results. We ground our arguments in an umbrella review of the gamification literature. In line with the theme of “Putting more than mere ‘Fun and Games’ into Systems” for this special issue, we propose a framework grounded in Adaptive Structuration Theory and present a set of research questions that can help guide future organisational gamification research. Further, based on the strengths and limitations of our work, we identify several additional avenues to stimulate future research and produce fresh practical insights. Journal: European Journal of Information Systems Pages: 621-640 Issue: 6 Volume: 29 Year: 2020 Month: 11 X-DOI: 10.1080/0960085X.2020.1780963 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1780963 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:6:p:621-640 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1796531_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Sofia Marlena Schöbel Author-X-Name-First: Sofia Marlena Author-X-Name-Last: Schöbel Author-Name: Andreas Janson Author-X-Name-First: Andreas Author-X-Name-Last: Janson Author-Name: Matthias Söllner Author-X-Name-First: Matthias Author-X-Name-Last: Söllner Title: Capturing the complexity of gamification elements: a holistic approach for analysing existing and deriving novel gamification designs Abstract: Gamification is a well-known approach that refers to the use of elements to increase the motivation of information systems users. A remaining challenge in gamification is that no shared understanding of the meaning and classification of gamification elements currently exists. This impedes guidance concerning analysis and development of gamification concepts, and often results in non-effective gamification designs. The goal of our research is to consolidate current gamification research and rigorously develop a taxonomy, as well as to demonstrate how a systematic classification of gamification elements can provide guidance for the gamification of information systems and improve understanding of existing gamification concepts. To achieve our goal, we develop a taxonomic classification of gamification elements before evaluating this taxonomy using expert interviews. Furthermore, we provide evidence as to the taxonomy’s feasibility using two practical cases: First, we show how our taxonomy helps to analyse existing gamification concepts; second, we show how our taxonomy can be used for guiding the gamification of information systems. We enrich theory by introducing a novel taxonomy to better explain the characteristics of gamification elements, which will be valuable for both gamification analysis and design. This paper will help guide practitioners to select and combine gamification elements for their gamification concepts. Journal: European Journal of Information Systems Pages: 641-668 Issue: 6 Volume: 29 Year: 2020 Month: 11 X-DOI: 10.1080/0960085X.2020.1796531 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1796531 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:6:p:641-668 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1797546_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ersin Dincelli Author-X-Name-First: Ersin Author-X-Name-Last: Dincelli Author-Name: InduShobha Chengalur-Smith Author-X-Name-First: InduShobha Author-X-Name-Last: Chengalur-Smith Title: Choose your own training adventure: designing a gamified SETA artefact for improving information security and privacy through interactive storytelling Abstract: Online self-disclosure (OSD) on social networking sites can leave individuals and organisations vulnerable to security threats. Following a design science research (DSR) method, we created a gamified, “choose your own adventure” style security education, training, and awareness (SETA) artefact using two formats: text and visual. Both artefacts were designed to identify the security threats that trainees are most susceptible to, debrief them about the threat and its potential consequences, and facilitate behaviour change by letting trainees re-evaluate their decisions. Using a longitudinal randomised controlled experiment, we compared these two artefacts to no intervention and traditional security warning emails by assessing both instrumental (changes in attitudes, intentions, and OSD behaviour) and experiential (memorability and user experience) outcomes. Our survey of 1,718 employees showed that the text-based artefact was better at improving instrumental outcomes, and the visual-based artefact was better at improving experiential outcomes. This study provides a more granular understanding of the linkages between technology artefacts and human experiences through the application of design science thinking. The findings contribute to DSR by developing design principles, testable propositions, and realistic performance evaluation metrics for gamified SETA artefacts, and present practical recommendations for regulating employees’ information security and privacy behaviours inside and outside the workplace. Journal: European Journal of Information Systems Pages: 669-687 Issue: 6 Volume: 29 Year: 2020 Month: 11 X-DOI: 10.1080/0960085X.2020.1797546 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1797546 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:6:p:669-687 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1808539_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Zachary J. Sheffler Author-X-Name-First: Zachary J. Author-X-Name-Last: Sheffler Author-Name: De Liu Author-X-Name-First: De Author-X-Name-Last: Liu Author-Name: Shawn P. Curley Author-X-Name-First: Shawn P. Author-X-Name-Last: Curley Title: Ingredients for successful badges: evidence from a field experiment in bike commuting Abstract: Despite the popularity of badges in gamification applications, there is a lack of research on how to design badges to increase target behaviour. Motivated by this gap, we conduct a large-scale field experiment in a commuting-by-bicycle programme to explore efficacies of different badge designs in motivating ridership. We systematically vary the rewards, signifiers, and completion logic components of badges. We find adding an option for sharing a badge on Facebook, as a reward for badge attainment, increases ridership. Changing the badge signifier from a self-interested frame to a pro-environmental frame does not make a difference. Changing completion logic from a fixed to a relative goal increases ridership only among frequent riders. These findings have direct implications for gamification design and provide useful directions for research into the motivations behind the design elements. Journal: European Journal of Information Systems Pages: 688-703 Issue: 6 Volume: 29 Year: 2020 Month: 11 X-DOI: 10.1080/0960085X.2020.1808539 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1808539 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:6:p:688-703 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1808540_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Laura Amo Author-X-Name-First: Laura Author-X-Name-Last: Amo Author-Name: Ruochen Liao Author-X-Name-First: Ruochen Author-X-Name-Last: Liao Author-Name: Rajiv Kishore Author-X-Name-First: Rajiv Author-X-Name-Last: Kishore Author-Name: Hejamadi R. Rao Author-X-Name-First: Hejamadi R. Author-X-Name-Last: Rao Title: Effects of structural and trait competitiveness stimulated by points and leaderboards on user engagement and performance growth: A natural experiment with gamification in an informal learning environment Abstract: Rooted in theories of competitiveness and social comparison, we model the effects of users’ structural and trait competitiveness on their engagement and performance growth in an informal learning environment. We hypothesise that game elements of points and leaderboards stimulate users’ structural competitiveness, which affects users’ engagement and has an inverted-U effect on performance growth. We further hypothesise that these effects are stronger among individuals with higher trait competitiveness. We tested our hypotheses using data from a natural experiment conducted over 300 days on 88,310 unique users who made 215,920 game interactions within the Cyber Detectives exhibit at the Tech Interactive museum in California. Our results are based on two objective measures of trait-competitiveness as both behaviour and outcome (percentile ranking on total time spent and number of badges earned, respectively), multiple objective measures of user engagement (time spent per attempt, number of reattempts, and daily user attempts), and an objective measure of performance growth (points). Results provide overall support to our hypotheses. We contribute to the gamification literature by providing strong causal evidence of points and leaderboards triggering structural and trait competitiveness, which interact to affect both engagement and performance growth in informal learning contexts. Journal: European Journal of Information Systems Pages: 704-730 Issue: 6 Volume: 29 Year: 2020 Month: 11 X-DOI: 10.1080/0960085X.2020.1808540 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1808540 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:6:p:704-730 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1819898_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Kai Riemer Author-X-Name-First: Kai Author-X-Name-Last: Riemer Author-Name: Raffaele Ciriello Author-X-Name-First: Raffaele Author-X-Name-Last: Ciriello Author-Name: Sandra Peter Author-X-Name-First: Sandra Author-X-Name-Last: Peter Author-Name: Daniel Schlagwein Author-X-Name-First: Daniel Author-X-Name-Last: Schlagwein Title: Digital contact-tracing adoption in the COVID-19 pandemic: IT governance for collective action at the societal level Abstract: The COVID-19 pandemic has created a need for rapid, population-wide digital contact tracing. One solution, Bluetooth-enabled digital proximity tracing using smartphones, promises to preserve individual privacy while helping to contain society-wide viral outbreaks. However, this digital solution works effectively only if adopted by the majority of the population. This poses a collective action problem: everyone would benefit from wide-spread proximity tracing, but the benefits for the individual are indirect and limited. To facilitate such collective action at the societal level, this paper conceptualises the option space of IT governance actions for proximity tracing adoption along two dimensions: decision-making entities (who will govern the roll-out) and accountability enforcement (how strictly will adoption and use be enforced). Examining coherent governance approaches that arise from the framework, we show that there are no globally ideal approaches but only locally contextualised ones that depend on immediate health risk, prior experience with pandemics, societal values and national culture, role of government, trust in government and trust in technology in each society. The paper contributes specific propositions for governing digital contact tracing in the COVID-19 pandemic and general theoretical implications for IT governance for collective action at the societal level. Journal: European Journal of Information Systems Pages: 731-745 Issue: 6 Volume: 29 Year: 2020 Month: 11 X-DOI: 10.1080/0960085X.2020.1819898 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1819898 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:6:p:731-745 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1820912_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Aurélie Leclercq-Vandelannoitte Author-X-Name-First: Aurélie Author-X-Name-Last: Leclercq-Vandelannoitte Author-Name: Jeremy Aroles Author-X-Name-First: Jeremy Author-X-Name-Last: Aroles Title: Does the end justify the means?Information systems and control society in the age of pandemics Abstract: As the COVID-19 pandemic unfolds, governments across the globe are enforcing various Information Systems (IS)-based systems of control that, we contend, augur a new organisation of our freedoms, raising concerns related to issues of surveillance and control. Presented as ways to curb the immediate progression of the pandemic, these systems have progressively appertained our lives, thus becoming the new “normal”. Drawing from the concept of “control societies” developed by Deleuze, we explore how, through a logic of “the end justifies the means”, these new systems are being normalised. Beyond Deleuzian studies that describe modern society as a control society, we contend that Deleuze provides useful insights to critically analyse the progressive “normalization” of new forms of digitally enabled control, as well as the implications of this normalisation process. The analysis of this normalisation process highlights the ways in which the current pandemic and its response (i.e., new forms of technological control) are “sociomaterially constructed” through a historic, discursive, and material process. Contributing to MIS research on privacy and surveillance, this reflection on the sociomaterial construction of the control society and of its digitally enabled control systems during the current COVID-19 crisis paves the way to possible forms of resistance and solutions. Journal: European Journal of Information Systems Pages: 746-761 Issue: 6 Volume: 29 Year: 2020 Month: 11 X-DOI: 10.1080/0960085X.2020.1820912 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1820912 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:6:p:746-761 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1832868_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Andrea Carugati Author-X-Name-First: Andrea Author-X-Name-Last: Carugati Author-Name: Lapo Mola Author-X-Name-First: Lapo Author-X-Name-Last: Mola Author-Name: Loïc Plé Author-X-Name-First: Loïc Author-X-Name-Last: Plé Author-Name: Marion Lauwers Author-X-Name-First: Marion Author-X-Name-Last: Lauwers Author-Name: Antonio Giangreco Author-X-Name-First: Antonio Author-X-Name-Last: Giangreco Title: Exploitation and exploration of IT in times of pandemic: from dealing with emergency to institutionalising crisis practices Abstract: When looking at changes in IT adoption and use in organisations, our theories rely – for the most part – on slow adoption timespans or – to a lesser extent – abrupt crises of short duration. We lack a model of IT adoption during a crisis of extended duration. This paper tackles this gap by looking at the IT-explorative and -exploitative teaching-related practices of university lecturers in response to the COVID-19 crisis. Based on qualitative data from three European higher education institutions and their responses to the COVID-19 crisis, we propose a process model of IT exploration/exploitation under a condition of extended crisis. The model shows that IT use and practices in response to a prolonged crisis go through phases, presenting predictable challenges that management can alleviate with a well-timed approach. Journal: European Journal of Information Systems Pages: 762-777 Issue: 6 Volume: 29 Year: 2020 Month: 11 X-DOI: 10.1080/0960085X.2020.1832868 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1832868 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:6:p:762-777 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1598609_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Robert F. Otondo Author-X-Name-First: Robert F. Author-X-Name-Last: Otondo Title: How long can this party last? What the rise and fall of OR/MS can teach us about the future of business analytics Abstract: Business analytics (BA) is an important organisational activity and research discipline. However, history has shown that information systems (IS)-related disciplines with promising futures do not always flourish as expected. The troubled history of one such discipline (i.e., operations research/management science, or OR/MS) serves as a cautionary tale for the BA community because it warns of the dangers of an unquestioning faith in the power of mathematical modelling and analysis. This cautionary tale is especially alarming given the methodological similarities between BA and OR/MS, as well as the sizeable investments organisations have made in their BA capabilities. It is, therefore, appropriate and prudent to ask if a similar fate could befall BA and how such a fate can be avoided. Those questions are addressed in this article by extracting “lessons learned” from the OR/MS literature and applying them to BA. The lessons highlight opportunities and challenges to BA which are then framed within a widely cited research agenda. Theoretical propositions are forwarded to encourage research that can help promote the future of BA – both as an organisational practice and research stream – through a wider, broad-based, and balanced critical discourse among scholars and practitioners. Journal: European Journal of Information Systems Pages: 473-495 Issue: 5 Volume: 28 Year: 2019 Month: 9 X-DOI: 10.1080/0960085X.2019.1598609 File-URL: http://hdl.handle.net/10.1080/0960085X.2019.1598609 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:5:p:473-495 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1614739_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Christian Maier Author-X-Name-First: Christian Author-X-Name-Last: Maier Author-Name: Sven Laumer Author-X-Name-First: Sven Author-X-Name-Last: Laumer Author-Name: Jakob Wirth Author-X-Name-First: Jakob Author-X-Name-Last: Wirth Author-Name: Tim Weitzel Author-X-Name-First: Tim Author-X-Name-Last: Weitzel Title: Technostress and the hierarchical levels of personality: a two-wave study with multiple data samples Abstract: Even though IS use has numerous benefits for users and organisations, such as improved user performance and greater productivity, an increasing number of users experience technostress. Since technostress can result in decreased user well-being, it is important to understand what leads users to perceive it. Recent technostress research points to the relationship between personality traits and the perception of technostress as a research gap. Given that personality traits are structured hierarchically, we study how and which levels of user personality influence the perception of technostress. In developing our research model, we select personality traits from the three hierarchical levels of personality: neuroticism, personal innovativeness in IT (PIIT), and IT mindfulness. The results of 2 two-wave studies analysing data collected in an organisational setting (sample 1) and through mTurk (sample 2) reveal that all three personality traits influence the perception of technostress, with IT mindfulness having the strongest impact. This study contributes by revealing that user personality and, primarily, IT mindfulness influence the perception of technostress. Additionally, our findings reveal an inverted u-curved influence of techno-stressors on user performance, deepening our understanding of how the perception of technostress influences user reactions. Journal: European Journal of Information Systems Pages: 496-522 Issue: 5 Volume: 28 Year: 2019 Month: 9 X-DOI: 10.1080/0960085X.2019.1614739 File-URL: http://hdl.handle.net/10.1080/0960085X.2019.1614739 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:5:p:496-522 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1620477_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Inkyoung Hur Author-X-Name-First: Inkyoung Author-X-Name-Last: Hur Author-Name: Karlene C. Cousins Author-X-Name-First: Karlene C. Author-X-Name-Last: Cousins Author-Name: Bernd Carsten Stahl Author-X-Name-First: Bernd Carsten Author-X-Name-Last: Stahl Title: A critical perspective of engagement in online health communities Abstract: Many individuals go to online health communities to obtain emotional and information support. This study employs critical discourse analysis (CDA) to examine the discourse in five online childhood immunization forums to identify online practices related to engagement and emancipation. We identify four online engagement discourse types in online health communities: cognitive, emotional, behavioural, and political. Consistent with our critical perspective, we identify drivers and obstacles to emancipation. The obstacles to emancipation include the adverse consequences of building online knowledge and collective intelligence, shifts in patient–physician relationships, and “Big” institutional power. Members’ suggestions for empowering community members include encouraging members to conduct their own research on childhood immunization and to differentiate between facts and opinions. These findings suggest that sensemaking is one way to emancipate online health community members, while highlighting the challenges of using online communities to promote emancipation. Journal: European Journal of Information Systems Pages: 523-548 Issue: 5 Volume: 28 Year: 2019 Month: 9 X-DOI: 10.1080/0960085X.2019.1620477 File-URL: http://hdl.handle.net/10.1080/0960085X.2019.1620477 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:5:p:523-548 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1620649_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Nanda Chingleput Surendra Author-X-Name-First: Nanda Chingleput Author-X-Name-Last: Surendra Author-Name: Salman Nazir Author-X-Name-First: Salman Author-X-Name-Last: Nazir Title: Creating “informating” systems using Agile development practices: an action research study Abstract: We use action research to understand the concepts of automating and informating, and study whether agile development practices could be an enabler of informating functionalities. Two questions based on these contrasts and connections motivate this research. Our first research question is: What are the characteristics of an informating functionality and how does an informating functionality differ from an automating functionality? Our second research question is: What role could agile practices play in the development of informating functionalities? In this paper, we discuss the actions, reflections and lessons learned from three action research iterations while developing an admissions application for a business college. Journal: European Journal of Information Systems Pages: 549-565 Issue: 5 Volume: 28 Year: 2019 Month: 9 X-DOI: 10.1080/0960085X.2019.1620649 File-URL: http://hdl.handle.net/10.1080/0960085X.2019.1620649 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:5:p:549-565 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1624141_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Marko Niemimaa Author-X-Name-First: Marko Author-X-Name-Last: Niemimaa Author-Name: Elina Niemimaa Author-X-Name-First: Elina Author-X-Name-Last: Niemimaa Title: Abductive innovations in information security policy development: an ethnographic study Abstract: Developing organisational information security (InfoSec) policies that account for international best practices but are contextual is as much an opportunity for improving InfoSec as it is a challenge. Previous research indicates that organisations should create InfoSec policies based on best practices (top-down) and simultaneously encourages participatory development (bottom-up). These contradictory suggestions place managers in a dilemma: Should they follow a top-down or bottom-up approach? In this research, we build on an ethnographic approach to study how an innovative engineering company (MachineryCorp) managed the contradiction when the firm developed an InfoSec policy. Drawing on the dialectical theory of organisations as a lens, the findings suggest the InfoSec policy development is a recurrent process consisting of three phases: (1) drawing interpretations of InfoSec requirements from best practices (deductive adoption) and (2) constructing possibilities for local implementation (inductive adjustment) (3) that engender tensions between best practices and local contingencies facilitating innovative local resolutions (synthetic innovation). We call this process abductive innovation. At MachineryCorp, a triangle of tensions surfaced due to economic realities, infrastructure affordances, and social arrangements, and were necessary in explaining how the InfoSec policy gradually and iteratively materialised and resulted in an organisationally contingent policy. Journal: European Journal of Information Systems Pages: 566-589 Issue: 5 Volume: 28 Year: 2019 Month: 9 X-DOI: 10.1080/0960085X.2019.1624141 File-URL: http://hdl.handle.net/10.1080/0960085X.2019.1624141 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:5:p:566-589 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934266_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Amany Elbanna Author-X-Name-First: Amany Author-X-Name-Last: Elbanna Title: Top management support in multiple-project environments: an in-practice view Abstract: Top management support has generally been considered the most critical factor for the success of IS projects. Typically, there have developed implicit or explicit assumptions that top management support has to be constant and consistent during the entire life of an IS implementation project. However, previous research investigating this issue has been based mainly on a ‘single project’ perspective, although contemporary organisational settings have increasingly involved many projects taking place simultaneously. Such multiple-project environments bring into question the feasibility of the previous assumptions and invite revisiting them. This paper aims to do this by examining the materialisation of top management support in a multiple-project environment. To this end, it investigates the interactions between a project to implement an Enterprise Resource Planning system and other projects and programmes in a prominent international organisation. It applies a framework from Actor Network Theory to explore the different aspects of what is involved in being in a multiple-project environment and the nature of the materialisation of top management support. The findings unravel some of the complexity surrounding top management support in this contemporary organisational setting. Some important implications for theory and practice are highlighted and discussed. Journal: European Journal of Information Systems Pages: 278-294 Issue: 3 Volume: 22 Year: 2013 Month: 5 X-DOI: 10.1057/ejis.2012.16 File-URL: http://hdl.handle.net/10.1057/ejis.2012.16 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:3:p:278-294 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934267_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Tamara Dinev Author-X-Name-First: Tamara Author-X-Name-Last: Dinev Author-Name: Heng Xu Author-X-Name-First: Heng Author-X-Name-Last: Xu Author-Name: Jeff H Smith Author-X-Name-First: Jeff H Author-X-Name-Last: Smith Author-Name: Paul Hart Author-X-Name-First: Paul Author-X-Name-Last: Hart Title: Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts Abstract: Privacy is one of the few concepts that has been studied across many disciplines, but is still difficult to grasp. The current understanding of privacy is largely fragmented and discipline-dependent. This study develops and tests a framework of information privacy and its correlates, the latter often being confused with or built into definitions of information privacy per se. Our framework development was based on the privacy theories of Westin and Altman, the economic view of the privacy calculus, and the identity management framework of Zwick and Dholakia. The dependent variable of the model is perceived information privacy. The particularly relevant correlates to information privacy are anonymity, secrecy, confidentiality, and control. We posit that the first three are tactics for information control; perceived information control and perceived risk are salient determinants of perceived information privacy; and perceived risk is a function of perceived benefits of information disclosure, information sensitivity, importance of information transparency, and regulatory expectations. The research model was empirically tested and validated in the Web 2.0 context, using a survey of Web 2.0 users. Our study enhances the theoretical understanding of information privacy and is useful for privacy advocates, and legal, management information systems, marketing, and social science scholars. Journal: European Journal of Information Systems Pages: 295-316 Issue: 3 Volume: 22 Year: 2013 Month: 5 X-DOI: 10.1057/ejis.2012.23 File-URL: http://hdl.handle.net/10.1057/ejis.2012.23 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:3:p:295-316 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934268_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jennifer E Gerow Author-X-Name-First: Jennifer E Author-X-Name-Last: Gerow Author-Name: Ramakrishna Ayyagari Author-X-Name-First: Ramakrishna Author-X-Name-Last: Ayyagari Author-Name: Jason Bennett Thatcher Author-X-Name-First: Jason Bennett Author-X-Name-Last: Thatcher Author-Name: Philip L Roth Author-X-Name-First: Philip L Author-X-Name-Last: Roth Title: Can we have fun @ work? The role of intrinsic motivation for utilitarian systems Abstract: Since the introduction of the Motivational Technology Acceptance Model in 1992, many researchers have considered both extrinsic and intrinsic motivation as antecedents of intent to use and actual use of a system. However, it has been a long-standing and largely unchallenged assumption that intrinsic motivation (i.e., fun or enjoyment) is a more dominant predictor of hedonic (fun) application use and that extrinsic motivation (i.e., usefulness) is a more dominant predictor of utilitarian (practical) application use. In this article, we probe whether system type serves as a boundary condition (i.e., moderator) for understanding an individual’s interaction with information technology. Specifically, we examine whether perceived enjoyment’s influence on perceived ease of use, perceived usefulness, intention, and use varies with system type. On the basis of a meta-analytic structural equation modeling analysis of 185 studies between 1992 and February 2011, our findings suggest intrinsic motivation is equally relevant for predicting intentions toward using and actual use of both hedonic and utilitarian systems. Therefore, our meta-analytic results call into question the rigidity of the assumption that system type is a ‘boundary condition’ for understanding individuals’ interaction with information technology. The implications of these results for research and practice are discussed. Journal: European Journal of Information Systems Pages: 360-380 Issue: 3 Volume: 22 Year: 2013 Month: 5 X-DOI: 10.1057/ejis.2012.25 File-URL: http://hdl.handle.net/10.1057/ejis.2012.25 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:3:p:360-380 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934269_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Robert C Nickerson Author-X-Name-First: Robert C Author-X-Name-Last: Nickerson Author-Name: Upkar Varshney Author-X-Name-First: Upkar Author-X-Name-Last: Varshney Author-Name: Jan Muntermann Author-X-Name-First: Jan Author-X-Name-Last: Muntermann Title: A method for taxonomy development and its application in information systems Abstract: A fundamental problem in many disciplines is the classification of objects in a domain of interest into a taxonomy. Developing a taxonomy, however, is a complex process that has not been adequately addressed in the information systems (IS) literature. The purpose of this paper is to present a method for taxonomy development that can be used in IS. First, this paper demonstrates through a comprehensive literature survey that taxonomy development in IS has largely been ad hoc. Then the paper defines the problem of taxonomy development. Next, the paper presents a method for taxonomy development that is based on taxonomy development literature in other disciplines and shows that the method has certain desirable qualities. Finally, the paper demonstrates the efficacy of the method by developing a taxonomy in a domain in IS. Journal: European Journal of Information Systems Pages: 336-359 Issue: 3 Volume: 22 Year: 2013 Month: 5 X-DOI: 10.1057/ejis.2012.26 File-URL: http://hdl.handle.net/10.1057/ejis.2012.26 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:3:p:336-359 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934270_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Matthias Trier Author-X-Name-First: Matthias Author-X-Name-Last: Trier Author-Name: Judith Molka-Danielsen Author-X-Name-First: Judith Author-X-Name-Last: Molka-Danielsen Title: Sympathy or strategy: social capital drivers for collaborative contributions to the IS community Abstract: Despite growing interest in delineating the social identity of Information Systems (IS) research and the network structures of its scholarly community, little is known about how the IS community network is shaped by individual conceptions and what motivates IS researchers to engage in research collaboration. Using an exploratory theoretical framework that is based on three dimensions of social capital theory, we examined 32 years of scientific co-authorship in an international IS researcher community. We formulated propositions to empirically examine the multi-level relationships between personal drivers and the resulting complex network organization of the IS community. Our propositions are refined with qualitative interviews and tested using a survey. This process revealed a collaborative research culture with several individual dispositions, including a strategic structural focus, a cognitive focus and a relational focus. These exist among actors displaying a range of differing behaviours such as active engagement and passive serendipity. Our study indicates individual differences at the conception stage of engaging in academic collaboration impact on the resulting network-level configuration. We identified that regional preference, maturity life cycles and lack of small-world properties highlight the important role of senior members as structural backbones and brokers within the IS community. Journal: European Journal of Information Systems Pages: 317-335 Issue: 3 Volume: 22 Year: 2013 Month: 5 X-DOI: 10.1057/ejis.2012.27 File-URL: http://hdl.handle.net/10.1057/ejis.2012.27 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:3:p:317-335 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934271_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Véronique Guilloux Author-X-Name-First: Véronique Author-X-Name-Last: Guilloux Author-Name: Joanne Locke Author-X-Name-First: Joanne Author-X-Name-Last: Locke Author-Name: Alan Lowe Author-X-Name-First: Alan Author-X-Name-Last: Lowe Title: Digital business reporting standards: mapping the battle in France Abstract: Government agencies use information technology extensively to collect business data for regulatory purposes. Data communication standards form part of the infrastructure with which businesses must conform to survive. We examine the development of, and emerging competition between, two open business reporting data standards adopted by government bodies in France; Electronic Data Interchange for Administration, Commerce and Transport (EDIFACT) (incumbent) and eXtensible Business Reporting Language (XBRL) (challenger). The research explores whether an incumbent may be displaced in a setting in which the contest is unresolved. Latour's translation map is applied to trace the enrollments and detours in the battle. We find that regulators play an important role as allies in the development of the standards. The antecedent networks in which the standards are located embed strong beliefs that become barriers to collaboration and fuel the battle. One of the key differentiating attitudes is whether speed is more important than legitimacy. The failure of collaboration encourages competition. The newness of XBRL's technology just as regulators need to respond to an economic crisis and its adoption by French regulators not using EDIFACT create an opportunity for the challenger to make significant network gains over the longer term. ANT also highlights the importance of the preservation of key components of EDIFACT in ebXML. Journal: European Journal of Information Systems Pages: 257-277 Issue: 3 Volume: 22 Year: 2013 Month: 5 X-DOI: 10.1057/ejis.2012.5 File-URL: http://hdl.handle.net/10.1057/ejis.2012.5 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:3:p:257-277 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934272_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Pär J Ågerfalk Author-X-Name-First: Pär J Author-X-Name-Last: Ågerfalk Title: Embracing diversity through mixed methods research Journal: European Journal of Information Systems Pages: 251-256 Issue: 3 Volume: 22 Year: 2013 Month: 5 X-DOI: 10.1057/ejis.2013.6 File-URL: http://hdl.handle.net/10.1057/ejis.2013.6 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:3:p:251-256 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2085200_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jannis Beese Author-X-Name-First: Jannis Author-X-Name-Last: Beese Author-Name: Kazem Haki Author-X-Name-First: Kazem Author-X-Name-Last: Haki Author-Name: Raphael Schilling Author-X-Name-First: Raphael Author-X-Name-Last: Schilling Author-Name: Martin Kraus Author-X-Name-First: Martin Author-X-Name-Last: Kraus Author-Name: Stephan Aier Author-X-Name-First: Stephan Author-X-Name-Last: Aier Author-Name: Robert Winter Author-X-Name-First: Robert Author-X-Name-Last: Winter Title: Strategic alignment of enterprise architecture management – how portfolios of control mechanisms track a decade of enterprise transformation at Commerzbank Abstract: Enterprise architecture management (EAM) is commonly employed by large organisations to coordinate local information system development efforts in line with organisation-wide strategic objectives while simultaneously avoiding redundancies and inconsistencies. Even though EAM tools and processes have become increasingly mature over the past decade, many organisations still struggle to generate impact from their EAM initiatives. To this end, we describe how enterprise architects at Commerzbank, a major international bank, employed a control mechanism portfolio perspective to more effectively anchor EAM within the organisation. This approach allows to purposefully combine a wide range of different formal and informal EAM control mechanisms, thereby going beyond the formal, top-down driven mechanisms predominantly discussed in EAM literature. Furthermore, such EAM control mechanism portfolios provide an effective means to purposefully realign EAM in reaction to major strategic shifts. The application of this perspective is demonstrated by tracing the evolution of EAM at Commerzbank for more than a decade (2008 to 2018) through a turbulent and challenging competitive environment, resulting in several major strategic realignments that required corresponding adjustments in EAM. We believe that such consciously designed and diversified EAM control mechanism portfolios also provide a useful means for other large organisations to more effectively conduct EAM. Journal: European Journal of Information Systems Pages: 92-105 Issue: 1 Volume: 32 Year: 2023 Month: 01 X-DOI: 10.1080/0960085X.2022.2085200 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2085200 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:1:p:92-105 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2096490_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Polyxeni Vassilakopoulou Author-X-Name-First: Polyxeni Author-X-Name-Last: Vassilakopoulou Author-Name: Arve Haug Author-X-Name-First: Arve Author-X-Name-Last: Haug Author-Name: Leif Martin Salvesen Author-X-Name-First: Leif Martin Author-X-Name-Last: Salvesen Author-Name: Ilias O. Pappas Author-X-Name-First: Ilias O. Author-X-Name-Last: Pappas Title: Developing human/AI interactions for chat-based customer services: lessons learned from the Norwegian government Abstract: Advancements in human/AI interactions led to smartification of public services via the use of chatbots. Here, we present findings from a clinical inquiry research project in a key public service organisation in Norway. In this project, researchers and practitioners worked together to generate insights on the action possibilities offered to human service agents by chatbots and the potential for creating hybrid human/AI service teams. The project sensitised service agents to discover affordances based on their actual practices, rather than on the predefined use of chatbots. The different affordances identified can be useful for practitioners who design and deploy chatbot-based services. The action possibilities afforded by chatbots provide new ways for service agents and chatbots to work as a team addressing citizens’ needs. Drawing from the whole research process, we offer three lessons learned from the Norwegian Government on human/AI partnerships, theory-based interventions, and institutionalised collaborative research that can be useful for researchers that want to engage with practice and organisations that want to evolve their technology use, stimulate innovation, and engage with research. Journal: European Journal of Information Systems Pages: 10-22 Issue: 1 Volume: 32 Year: 2023 Month: 01 X-DOI: 10.1080/0960085X.2022.2096490 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2096490 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:1:p:10-22 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2088414_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: James Kotsias Author-X-Name-First: James Author-X-Name-Last: Kotsias Author-Name: Atif Ahmad Author-X-Name-First: Atif Author-X-Name-Last: Ahmad Author-Name: Rens Scheepers Author-X-Name-First: Rens Author-X-Name-Last: Scheepers Title: Adopting and integrating cyber-threat intelligence in a commercial organisation Abstract: Cyber-attacks are increasingly perpetrated by organised, sophisticated and persistent entities such as crime syndicates and paramilitary forces. Even commercial firms that fully comply with industry “best practice” cyber security standards cannot cope with military-style cyber-attacks. We posit that the primary reason is the increasing asymmetry between the cyber-offensive capability of attackers and the cyber-defensive capability of commercial organisations. A key avenue to resolve this asymmetry is for organisations to leverage cyber-threat intelligence (CTI) to direct their cyber-defence. How can commercial organisations adopt and integrate CTI to routinely defend their information systems and resources from increasingly advanced cyber-attacks? There is limited know-how on how to package CTI to inform the practices of enterprise-wide stakeholders. This clinical research describes a practitioner-researcher’s experiences in directing a large multinational finance corporation to adopt and integrate CTI to transform cybersecurity-related practice and behaviour. The research contributes practical know-how on the organisational adoption and integration of CTI, enacted through the transformation of cybersecurity practice, and enterprise-wide implementation of a novel solution to package CTI for commercial contexts. The study illustrates the inputs, processes, and outputs in clinical research as a genre of action research. Journal: European Journal of Information Systems Pages: 35-51 Issue: 1 Volume: 32 Year: 2023 Month: 01 X-DOI: 10.1080/0960085X.2022.2088414 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2088414 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:1:p:35-51 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2088415_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Fredrik Svahn Author-X-Name-First: Fredrik Author-X-Name-Last: Svahn Author-Name: Martin Kristensson Author-X-Name-First: Martin Author-X-Name-Last: Kristensson Title: Unpacking digital options thinking for innovation renewal: a clinical inquiry into car connectivity Abstract: Options thinking is a powerful approach for managing uncertainty and change in digital environments. It is recognised as a structured process for identifying, developing, and realising options into novel products and services. At Volvo Cars, we have learned it can also become a powerful instrument for innovation renewal, although it can be difficult to apply because it challenges existing firm practices. We elaborate this tension by presenting digital options strategizing as a process of applying options thinking to negotiate capability gaps and configure innovation resources. Our clinical study reveals that this facilitates innovation renewal through emergent processes, practice-oriented design, and opportunity-driven management. Journal: European Journal of Information Systems Pages: 23-34 Issue: 1 Volume: 32 Year: 2023 Month: 01 X-DOI: 10.1080/0960085X.2022.2088415 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2088415 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:1:p:23-34 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2088417_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: David Rueckel Author-X-Name-First: David Author-X-Name-Last: Rueckel Author-Name: Barbara Krumay Author-X-Name-First: Barbara Author-X-Name-Last: Krumay Author-Name: Ewald Dannerer Author-X-Name-First: Ewald Author-X-Name-Last: Dannerer Title: Developing a collaboration system for pancreatic cancer research: a clinical design science study Abstract: Great potential exists for the use of information systems (IS) in medical research, as they already form the backbone of several long-term medical research projects. IS can potentially support practitioner-researchers (practitioners who conduct research in their areas of practice) by enabling collaboration, particularly when the number of cases is low and the treatment strategy is centralised. However, practitioner-researchers and academic researchers differ in their research approaches. In this clinical IS research effort, we designed an IS, together with a local hospital, for supporting research on pancreatic cancer by applying a design science research (DSR) approach. We also observed how DSR is accepted and used by practitioner-researchers in this context. Consequently, we not only developed an IS but also gained insights into the benefits of DSR in projects with heterogeneous participants, namely those from various fields with different experiences and requirements. The results show that DSR contributes to mutual understanding, transparency in the design process and long-term benefits for all parties involved, which was further confirmed by post-hoc interviews. Journal: European Journal of Information Systems Pages: 81-91 Issue: 1 Volume: 32 Year: 2023 Month: 01 X-DOI: 10.1080/0960085X.2022.2088417 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2088417 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:1:p:81-91 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2088413_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Kazem Haki Author-X-Name-First: Kazem Author-X-Name-Last: Haki Author-Name: Annamina Rieder Author-X-Name-First: Annamina Author-X-Name-Last: Rieder Author-Name: Lorena Buchmann Author-X-Name-First: Lorena Author-X-Name-Last: Buchmann Author-Name: Alexander W.Schneider Author-X-Name-First: Alexander Author-X-Name-Last: W.Schneider Title: Digital nudging for technical debt management at Credit Suisse Abstract: Technical debt (TD) is a technical compromise wherein the ability to maintain information technology (IT) applications over the long term is sacrificed for short-term goals. TD occurs when software development teams undergo constant pressure to release applications swiftly, on a tight schedule. The accumulation of TD, which often leads to a significant cost surplus, presents a ubiquitous challenge in technology-driven organisations. To keep TD levels under control, many organisations implement top-down mechanisms that impose enterprise-wide principles on software development teams. This clinical research presents a complementary but distinct approach to managing TD. A digital nudge was introduced at Credit Suisse, a global financial services company, to help raise awareness and understanding, and stimulate actions related to TD decision-making in software development teams. This paper reports on the nudge’s clinical design, implementation, impact, and evaluation. As the nudge was effective in reducing TD in IT applications after one year of use, we demonstrate that digital nudges are viable means for guiding collective decisions in complex decision environments like that of TD management. Our findings have several implications for research and practice. Journal: European Journal of Information Systems Pages: 64-80 Issue: 1 Volume: 32 Year: 2023 Month: 01 X-DOI: 10.1080/0960085X.2022.2088413 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2088413 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:1:p:64-80 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2088416_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: James Wallace Author-X-Name-First: James Author-X-Name-Last: Wallace Author-Name: Matthew T Mullarkey Author-X-Name-First: Matthew T Author-X-Name-Last: Mullarkey Author-Name: Alan Hevner Author-X-Name-First: Alan Author-X-Name-Last: Hevner Title: Patient health locus of control: the design of information systems for patient-provider interactions Abstract: Patient locus of control (LOC) is a strong determinant of health outcomes, yet healthcare systems rarely use patient LOC to devise treatment plans. Our clinical research applies action design research methods to design and evaluate healthcare information systems to improve paths and outcomes of patient care. Socio-technical synergies between the interior (technical) and exterior (socio) designs support effective human-computer interfaces and interactions. Rigorous focus group evaluations of the systems for capturing LOC information and using that information in treatment plans are performed and system refinements are implemented. The practitioner organisation has future plans for full implementation of the designed systems. Journal: European Journal of Information Systems Pages: 52-63 Issue: 1 Volume: 32 Year: 2023 Month: 01 X-DOI: 10.1080/0960085X.2022.2088416 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2088416 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:1:p:52-63 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2126030_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Richard Baskerville Author-X-Name-First: Richard Author-X-Name-Last: Baskerville Author-Name: Jan vom Brocke Author-X-Name-First: Jan Author-X-Name-Last: vom Brocke Author-Name: Lars Mathiassen Author-X-Name-First: Lars Author-X-Name-Last: Mathiassen Author-Name: Helana Scheepers Author-X-Name-First: Helana Author-X-Name-Last: Scheepers Title: Clinical research from information systems practice Abstract: An increasing presence of practitioners with doctoral degrees in Information Systems and related disciplines holds promise to advance Information Systems research. The prospect is to gain more knowledge from the practical experience of developing, using, and managing information systems in context. To scientifically capitalise on this opportunity, this EJIS special issue introduces the research genre of “Information Systems Clinical Research”. The genre presents knowledge generated from practitioner-researcher interventions to achieve desired outcomes in information systems development, use, and management practice contexts. In this editorial, we introduce and conceptualise the genre; we present a research framework that defines its four key elements; and we discuss how to address its key challenges in research projects. As a result, we derive ten criteria for rigorous Information Systems Clinical Research and provide examples on how the articles published in the special issue have addressed these criteria. We conclude with a call to further advance clinical research as an important part of the Information Systems discipline. Journal: European Journal of Information Systems Pages: 1-9 Issue: 1 Volume: 32 Year: 2023 Month: 01 X-DOI: 10.1080/0960085X.2022.2126030 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2126030 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:1:p:1-9 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933605_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: F Wilson Author-X-Name-First: F Author-X-Name-Last: Wilson Title: Flogging a dead horse: the implications of epistemological relativism within information systems methodological practice Abstract: The supporters of the realist principles of information system methodological development argue, that what makes our theories and beliefs about information systems design true or false is the way they stand in relation to reality and not just the way reality is ‘constructed’ in accordance with a particular cultural world-view, descriptive scheme or belief system. In contrast are the views of the anti-realists and epistemological relativists for whom such an argument is nonsensical—involving as it does the appeal to truths outside or beyond our best current knowledge. In this paper, using recent work from within the area, the realist and relativist models of information systems research and methodological design are identified. Following this an analysis is presented which debates whether relativism in information systems design, as a model of epistemology, provides practitioners and researchers with directions for achieving the epistemological state it describes. Finally, the tenet that practitioners and researchers are able to learn and adhere to the principles of relativism and from this will be able to provide an improved methodology for information systems design is questioned. Journal: European Journal of Information Systems Pages: 161-169 Issue: 3 Volume: 8 Year: 1999 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000323 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000323 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:8:y:1999:i:3:p:161-169 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933606_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: P Beynon-Davies Author-X-Name-First: P Author-X-Name-Last: Beynon-Davies Author-Name: C Carne Author-X-Name-First: C Author-X-Name-Last: Carne Author-Name: H Mackay Author-X-Name-First: H Author-X-Name-Last: Mackay Author-Name: D Tudhope Author-X-Name-First: D Author-X-Name-Last: Tudhope Title: Rapid application development (RAD): an empirical review Abstract: Rapid application development (RAD) is an approach to information systems (IS) development which is much discussed in the practitioner literature. However, there is comparatively little research data on this topic. This paper forms a report of the results of a multi-disciplinary research project which has been studying this development approach for the last three years. The paper discusses seven case studies of RAD projects and compares each to issues relating to a number of RAD principles as represented in methodologies such as the recent open standard known as dynamic systems development method. We conclude with a discussion of a number of important questions relating to further research on RAD. Journal: European Journal of Information Systems Pages: 211-223 Issue: 3 Volume: 8 Year: 1999 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000325 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000325 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:8:y:1999:i:3:p:211-223 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933607_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: A Panteli Author-X-Name-First: A Author-X-Name-Last: Panteli Author-Name: J Stack Author-X-Name-First: J Author-X-Name-Last: Stack Author-Name: M Atkinson Author-X-Name-First: M Author-X-Name-Last: Atkinson Author-Name: H Ramsay Author-X-Name-First: H Author-X-Name-Last: Ramsay Title: The status of women in the UK IT industry: an empirical study Abstract: In this paper we analyse the state of women in IT occupations in the UK. Although the growing UK IT industry is experiencing skills shortages, there is a declining trend in the representation of women. Using data from nationwide surveys and case study research, the paper aims to increase our understanding of gender occupational segregation in the UK IT industry. Our findings suggest that even though the IT industry does not exclude women, it does little to promote them or even to retain them in the field. Journal: European Journal of Information Systems Pages: 170-182 Issue: 3 Volume: 8 Year: 1999 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000326 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000326 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:8:y:1999:i:3:p:170-182 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933608_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: T Ravichandran Author-X-Name-First: T Author-X-Name-Last: Ravichandran Title: Software reusability as synchronous innovation: a test of four theoretical models Abstract: Information systems departments are being challenged to improve systems delivery performance. Software reuse is a potential strategy to address recurring systems development problems such as high development cost, low programmer productivity and long systems delivery lead time. However, the barriers associated with reuse implementation are significant. A better understanding of the administrative changes that facilitate reuse implementation is required to further research and practice in this area. We conceptualise reusability as a software process innovation that constitutes administrative and technological dimensions. Drawing from the synchronous innovation concepts, four theoretical models of the interrelationships between these dimensions of reusability and systems delivery performance are developed. Using the data collected through a postal survey these models are empirically evaluated. The results strongly suggest that administrative innovations intervene in the relationship between technological innovations and systems delivery performance and vice versa. This implies that synergies exists between administrative and technological dimensions of reusability which are more important in explaining variance in systems delivery performance than these dimensions individually. Implications of the study for IS theory, future research and practice are identified and discussed. Journal: European Journal of Information Systems Pages: 183-199 Issue: 3 Volume: 8 Year: 1999 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000332 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000332 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:8:y:1999:i:3:p:183-199 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933609_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: S Hitchman Author-X-Name-First: S Author-X-Name-Last: Hitchman Title: Ternary relationships—to three or not to three, is there a question? Abstract: Recent empirical research offers general data modelling guidance, claiming to show that object-oriented modelling is less effective than entity-relationship modelling. The use of ternary relationship notation in these empirical experiments is examined in detail to reveal that assumptions made by researchers result in findings that are divorced from current modelling practice, cannot be generalised, and are misleading. Research assumptions are shown to be encouraged by inappropriate research methods and this supports the argument of some writers for the adoption of different research methods that inform practice. Journal: European Journal of Information Systems Pages: 224-231 Issue: 3 Volume: 8 Year: 1999 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000333 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000333 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:8:y:1999:i:3:p:224-231 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933610_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: T S H Teo Author-X-Name-First: T S H Author-X-Name-Last: Teo Author-Name: W R King Author-X-Name-First: W R Author-X-Name-Last: King Title: An empirical study of the impacts of integrating business planning and information systems planning Abstract: This study reports on a follow-up analysis of a prior study (Teo & King, 1996, Information and Management) of the impact of the integration of information systems planning (ISP) with business planning (BP) on organizational performance. The empirical data are re-analysed using path analysis in order to determine the direct and indirect impacts of BP-ISP integration on intermediate performance measures related to ISP process and output problems, as well as on five perceptual measures of organizational performance. The results empirically substantiate the importance of BP-ISP integration, since higher levels of integration were found to have a significant inverse relationship with the extent of both process and output varieties of ISP problems and a significant positive relationship with each of the five perceptual measures of the extent of IS contributions to overall organization performance. Journal: European Journal of Information Systems Pages: 200-210 Issue: 3 Volume: 8 Year: 1999 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000334 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000334 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:8:y:1999:i:3:p:200-210 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1869507_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Arash Saghafi Author-X-Name-First: Arash Author-X-Name-Last: Saghafi Author-Name: Yair Wand Author-X-Name-First: Yair Author-X-Name-Last: Wand Author-Name: Jeffrey Parsons Author-X-Name-First: Jeffrey Author-X-Name-Last: Parsons Title: Skipping class: improving human-driven data exploration and querying through instances Abstract: With the growing focus on business analytics and data-driven decision-making, there is a greater need for humans to interact effectively with data. We propose that presenting data to human users in terms of instances and attributes provides a more flexible and usable structure for querying, exploring, and analysing data. Compared to a traditional representation, an instance-based representation does not impose any predefined classification schema over the data when it is presented to users. This paper examines the potential utility of instance-based data through two laboratory experiments – the first focusing on exploration of data for pattern discovery (open-ended tasks) and the second on retrieval of information (closed-ended tasks). In both cases, participants were able to achieve better results in tasks using instance-based data than using class-based representations. Given the growing need for self-service analytics, as well as using information for purposes not anticipated when it was collected, we show that instance-based representations can be an effective way to satisfy the emerging needs of information users. Journal: European Journal of Information Systems Pages: 463-491 Issue: 4 Volume: 31 Year: 2022 Month: 07 X-DOI: 10.1080/0960085X.2020.1869507 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1869507 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:4:p:463-491 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1868952_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: David Murungi Author-X-Name-First: David Author-X-Name-Last: Murungi Author-Name: Rudy Hirschheim Author-X-Name-First: Rudy Author-X-Name-Last: Hirschheim Title: THEORY THROUGH ARGUMENT: APPLYING ARGUMENT MAPPING TO FACILITATE THEORY BUILDING Abstract: This paper proposes an extension of Fletcher and Huff’s (1990) argument mapping technique, which focuses on an examination of individual arguments, to depict the broader argumentative terrain of a theoretical discourse. To illustrate the utility of argument mapping as a literature review technique, we demonstrate an application of this approach to the domain of Technology Frames of Reference (TFR) research. We then compare the insights derived from this approach to those derived from a more traditional literature review of this domain. Findings of this comparison suggest that an argument-centred approach could contribute the following new insights into a theoretical domain: (1) provide a means of weighting contributions to a theoretical discourse by depicting these contributions in terms of levels of argumentation; (2) identify new “types” of argument-centred gaps in the literature; (3) offer a structural and progressive view of theory development in a particular domain that could be used to could be used to link and compare insights derived from competing theoretical lenses; and (4) propose a closer linkage between theory testing and theory building by focusing the testing on “arguable” aspects of a theoretical claim. Journal: European Journal of Information Systems Pages: 437-462 Issue: 4 Volume: 31 Year: 2022 Month: 07 X-DOI: 10.1080/0960085X.2020.1868952 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1868952 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:4:p:437-462 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1869915_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mohammad S. Najjar Author-X-Name-First: Mohammad S. Author-X-Name-Last: Najjar Author-Name: William J. Kettinger Author-X-Name-First: William J. Author-X-Name-Last: Kettinger Author-Name: Lynda D. Kettinger Author-X-Name-First: Lynda D. Author-X-Name-Last: Kettinger Title: IS incident recovery and service value: a service-dominant logic view Abstract: IS service delivery failures inside companies are value diminishing events. Information systems service providers seek to limit this value destruction but lack guidance on IS incident resolution actions that satisfy users and preserve IS service value. We apply Service-Dominant Logic (SDL) to explore what is relevant to users’ recovery service experiences while interacting with IS service providers. We use an integrated research approach including qualitative and quantitative data. We uncover actions that lead to a satisfying incident recovery and categorise them into three recovery components (responsive handling interactions, supportive communicating interactions, and effective resolving actions) that reflect IS provider resource exchanges of information, knowledge, and service skills with users in resolving incidents. We integrate these three recovery components as factors in our research model and test direct and moderating effects on value outcomes. We find that users’ recovery satisfaction results from both a “fix it fast and fully” perspective and a sense of effort and fairness conveyed. Results point to managers preserving overall IS service satisfaction and service quality by facilitating proper resource exchanges during an incident recovery. Journal: European Journal of Information Systems Pages: 492-524 Issue: 4 Volume: 31 Year: 2022 Month: 07 X-DOI: 10.1080/0960085X.2020.1869915 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1869915 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:4:p:492-524 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1886613_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Wael Jabr Author-X-Name-First: Wael Author-X-Name-Last: Jabr Title: Review credibility as a safeguard against fakery: the case of Amazon Abstract: Online reviews remain a reliable source for customers when making purchase decisions. Yet, the pervasiveness of fake reviews jeopardises this reliability and questions the quality of this content. In this paper, we provide empirical evidence from a major online retailer that mitigation against fakery can be successful. To that end, we proposed, tested, and validated an approach, based on existing safeguards, to quantify the credibility of reviews and thus reliably reduce product uncertainty. We also showed that reviews with sufficient credibility signals were effective at influencing product sales, and this influence was prevalent for both niche and new products on the market. As such, this study offers a novel approach to mitigate the impact of fakery in reviews posted to online infomediaries. Our work focuses primarily on Amazon as a major retailer but also provides further support by drawing on Yelp, another major review platform. Journal: European Journal of Information Systems Pages: 525-545 Issue: 4 Volume: 31 Year: 2022 Month: 07 X-DOI: 10.1080/0960085X.2021.1886613 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1886613 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:4:p:525-545 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933663_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: H Karsten Author-X-Name-First: H Author-X-Name-Last: Karsten Author-Name: K Lyytinen Author-X-Name-First: K Author-X-Name-Last: Lyytinen Author-Name: M Hurskainen Author-X-Name-First: M Author-X-Name-Last: Hurskainen Author-Name: T Koskelainen Author-X-Name-First: T Author-X-Name-Last: Koskelainen Title: Crossing boundaries and conscripting participation: representing and integrating knowledge in a paper machinery project Abstract: In large, complex knowledge management tasks, representing and integrating knowledge present major challenges. To understand these, we studied two processes: perspective taking across communities of knowing with boundary objects and perspective making within a community by the use of conscription devices. A mutually modifiable object, with sufficient complexity and manageability, appeared to be of crucial importance within a community. Between communities, the role of representations and negotiation over their meaning were emphasised. Implications for computer support point towards combining free form and structure, open and controlled access and modifiability, and parallel synchronised and unregulated communication. Journal: European Journal of Information Systems Pages: 89-98 Issue: 2 Volume: 10 Year: 2001 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000395 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000395 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:10:y:2001:i:2:p:89-98 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933664_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: D Randall Author-X-Name-First: D Author-X-Name-Last: Randall Author-Name: J Hughes Author-X-Name-First: J Author-X-Name-Last: Hughes Author-Name: J O'Brien Author-X-Name-First: J Author-X-Name-Last: O'Brien Author-Name: M Rouncefield Author-X-Name-First: M Author-X-Name-Last: Rouncefield Author-Name: P Tolmie Author-X-Name-First: P Author-X-Name-Last: Tolmie Title: ‘Memories are made of this’: explicating organisational knowledge and memory Abstract: It is a commonplace that in the ‘Information Age’, knowledge is the most important factor in the long-term success of an organisation. Such an emphasis is increasingly important as businesses confront a series of intransigent organisational problems connected with the retention and provision of organisational histories, knowledge and skills. ‘Organisational memory’ and its sister concept, ‘knowledge management’, are common glosses for the analysis and treatment of these problems. We analyse some of the conceptual and empirical issues that must precede attempts to provide support for ‘memory’ and ‘knowledge’ in the wider organisational context. Journal: European Journal of Information Systems Pages: 113-121 Issue: 2 Volume: 10 Year: 2001 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000396 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000396 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:10:y:2001:i:2:p:113-121 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933665_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: D C Sutton Author-X-Name-First: D C Author-X-Name-Last: Sutton Title: What is knowledge and can it be managed? Abstract: Philosophical and linguistic debates about the nature of knowledge, information and data should be of more than academic interest to the practice of knowledge management. Grounds are proposed for showing that not all enterprise-critical knowledge can be captured and transferred by the use of data warehouses or knowledge repositories. A key difference highlighted is that between the natural execution of a task and the ability to talk about a task which is discussed as a distinction between ‘thrown’ and ‘breakdown’ behaviour. It is shown that this contrast renders even that which can be codified an incomplete representation of the knowledge concerned. Knowledge management must therefore concern itself with both tangible issues and artefacts (such as codified representations that can be secured) and intangible features such as the skills which people require to interpret and exploit those representations. Furthermore, as organisational structures and procedures themselves represent codified knowledge, they must be designed to be inherently changeable in order to permit the enterprise continuously to adapt as new knowledge is acquired. Journal: European Journal of Information Systems Pages: 80-88 Issue: 2 Volume: 10 Year: 2001 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000397 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000397 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:10:y:2001:i:2:p:80-88 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933666_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: N Marshall Author-X-Name-First: N Author-X-Name-Last: Marshall Author-Name: T Brady Author-X-Name-First: T Author-X-Name-Last: Brady Title: Knowledge management and the politics of knowledge: illustrations from complex products and systems Abstract: While there is an increasing recognition of the social character of knowledge in segments of the literature on knowledge management, this paper argues that there has been a limited engagement with issues surrounding the politics of knowledge. There is now a well-established critique of technically-led knowledge management practices in which knowledge is treated in passive, objectivised, and static terms. A key element of this critique concerns the limits of codification strategies directed at making tacit knowledge explicit. This is founded upon an interpretative conceptualisation of inter-subjective understanding as always provisional, incomplete, and embedded in contexts of social action. While sympathetic to this position, it is argued that there is more to considering knowledge practices than the problem of understanding. Shared understanding, where participants to an interaction achieve a satisfactory interpretation of their respective positions, in no way implies mutual agreement about the validity of these positions. Drawing on insights from Habermas about models of social action and knowledge-guiding interests, we offer a series of concepts encouraging sensitivity to the relationship between knowledge, power, and interests. Aspects of the argument are then illustrated with case examples drawn from research into organisational knowledge in companies producing and using complex products and systems. Journal: European Journal of Information Systems Pages: 99-112 Issue: 2 Volume: 10 Year: 2001 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000398 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000398 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:10:y:2001:i:2:p:99-112 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933667_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: G P Huber Author-X-Name-First: G P Author-X-Name-Last: Huber Title: Transfer of knowledge in knowledge management systems: unexplored issues and suggested studies Abstract: The management practice literature is replete with reports of practices being used to motivate a firm's knowledge workers to transfer knowledge into and out of the firm's computer resident knowledge repositories, ie, to participate with commitment in the firm's Knowledge Management System. Unfortunately, little is known with any certainty about which of these practices have what effects under which conditions. It appears that in many cases the practices are ill suited for the particular situations where they are employed, with unknown but perhaps sizeable losses in opportunities foregone because valuable knowledge is not as fully or completely transferred as is possible. In addition, it seems that some of these practices are likely to be interfering with the effectiveness of other practices, just as some drugs interfere with the potentially positive effects of other drugs. About these matters, our knowledge is exceeded by our ignorance. The paper identifies some major problems associated with knowledge transfer, and articulates some of the most important issues associated with these problems. Eight research questions are raised that, if answered with sound studies, would enable organisations to be more effective in their transfer of knowledge. Journal: European Journal of Information Systems Pages: 72-79 Issue: 2 Volume: 10 Year: 2001 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000399 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000399 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:10:y:2001:i:2:p:72-79 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933668_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: John Edwards Author-X-Name-First: John Author-X-Name-Last: Edwards Title: Editorial Journal: European Journal of Information Systems Pages: 71-71 Issue: 2 Volume: 10 Year: 2001 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000400 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000400 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:10:y:2001:i:2:p:71-71 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933851_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: B W Hollocks Author-X-Name-First: B W Author-X-Name-Last: Hollocks Title: Implementing Collaboration Technologies in Industry Journal: European Journal of Information Systems Pages: 105-105 Issue: 1 Volume: 15 Year: 2006 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000497 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000497 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:1:p:105-105 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933852_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Geoffrey Elliott Author-X-Name-First: Geoffrey Author-X-Name-Last: Elliott Title: The Global Information Technology Report: Efficiency in an Increasingly Connected World Journal: European Journal of Information Systems Pages: 103-103 Issue: 1 Volume: 15 Year: 2006 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000526 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000526 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:1:p:103-103 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933853_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Stephen Smith Author-X-Name-First: Stephen Author-X-Name-Last: Smith Title: Organizational knowledge and technology Journal: European Journal of Information Systems Pages: 104-104 Issue: 1 Volume: 15 Year: 2006 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000535 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000535 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:1:p:104-104 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933854_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Brian Hollocks Author-X-Name-First: Brian Author-X-Name-Last: Hollocks Title: Strategic Knowledge Management Technology Journal: European Journal of Information Systems Pages: 111-112 Issue: 1 Volume: 15 Year: 2006 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000536 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000536 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:1:p:111-112 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933855_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Egon Berghout Author-X-Name-First: Egon Author-X-Name-Last: Berghout Title: Information Technology: Strategic Decision Making for Managers Journal: European Journal of Information Systems Pages: 109-110 Issue: 1 Volume: 15 Year: 2006 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000550 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000550 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:1:p:109-110 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933856_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Geoffrey Elliott Author-X-Name-First: Geoffrey Author-X-Name-Last: Elliott Title: Consumer Driven Electronic Transformation Journal: European Journal of Information Systems Pages: 108-108 Issue: 1 Volume: 15 Year: 2006 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000588 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000588 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:1:p:108-108 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933857_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Hugh Preston Author-X-Name-First: Hugh Author-X-Name-Last: Preston Title: Information Systems: Achieving Success by Avoiding Failure Journal: European Journal of Information Systems Pages: 106-107 Issue: 1 Volume: 15 Year: 2006 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000591 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000591 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:1:p:106-107 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933858_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Susan Gasson Author-X-Name-First: Susan Author-X-Name-Last: Gasson Title: A genealogical study of boundary-spanning IS design Abstract: This paper presents the design of a business-aligned information system (IS) from an actor-network perspective, viewing non-human intermediaries jointly as inscriptions and boundary objects. This field study presents a situated view of IS design over time. The design process is assessed through analyzing the intersected activities of a team of seven organizational managers who were defining changes to business processes, information technology, and organizational roles and responsibilities. This view of design presents a very different view to the rational, analytical process that is usually encountered in the IS literature. Instead of an orderly progression, we see a trajectory of design definition, as the team responds to the contingencies and instrumentalities that prevail during the course of a design inquiry. These managers enacted a new reality through their interactions with external stakeholders, senior managers, specifications, procedures, business documents, and IT systems. This study provides much needed rich insights into the complexities of systems definition and negotiation, explaining the situated rationalities underlying IS design as the co-design of business and IT systems. A fifth form of boundary object is suggested by this analysis, which is based on the need to align interests across a network of actors. Journal: European Journal of Information Systems Pages: 26-41 Issue: 1 Volume: 15 Year: 2006 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000594 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000594 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:1:p:26-41 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933859_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Fahri Yetim Author-X-Name-First: Fahri Author-X-Name-Last: Yetim Title: Acting with genres: discursive-ethical concepts for reflecting on and legitimating genres Abstract: The concept of genre represents a meaningful pattern of communication, which has been applied in the information systems field. Genres are socially constructed: they may consequently be socially more or less acceptable or contested. This paper focuses on the concept of communicative genre and addresses the issue of how meta-communication processes guided by discursive-ethical principles can promote a rational and legitimate definition, design and structuring of genres. Such a meta-communication process has not yet been thoroughly discussed in relation to the concept of genre as a means for structuring (organizational) communication. This paper claims to make the following contributions: firstly, it provides a wider spectrum of discursive concepts for critically reflecting on and discursive evaluation of the content and structures of genres and genre instances. Secondly, it demonstrates how different kinds of meta-communications (ex ante, in-action, and ex post) can be used to legitimate genres in a manner compatible with the discourse ethics. It illustrates the discourse-ethical viewpoint concerning the legitimacy of genre structuring processes and thus, also, the legitimacy of resultant norms and contents of communication, especially in global contexts. Journal: European Journal of Information Systems Pages: 54-69 Issue: 1 Volume: 15 Year: 2006 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000595 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000595 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:1:p:54-69 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933860_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Fredrik Karlsson Author-X-Name-First: Fredrik Author-X-Name-Last: Karlsson Author-Name: Kai Wistrand Author-X-Name-First: Kai Author-X-Name-Last: Wistrand Title: Combining method engineering with activity theory: theoretical grounding of the method component concept Abstract: The complex and demanding business of developing information systems often involves the use of different systems development methods such as the Rational Unified Process or the Microsoft Solution Framework. Through these methods the development organisation can be viewed as a collective of actors following different rules in the form of prescribed actions in order to guide a work process in accord with activity theory. Very often standardised systems development methods need tailoring for unique projects and strategies for this process have been labelled method engineering. Method configuration, a sub-discipline to method engineering, is applicable in situations where a single base method is used as a starting point for the engineering process. A meta-method (method for method configuration) has been developed addressing these issues. A fundamental part of this meta-method is the method component construct as a means to facilitate efficient and rationally motivated modularisation of systems development methods. This paper is an exploration of possible benefits of combining activity theory and method engineering as theoretical grounding of the method component concept. Journal: European Journal of Information Systems Pages: 82-90 Issue: 1 Volume: 15 Year: 2006 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000596 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000596 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:1:p:82-90 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933861_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Peter Rittgen Author-X-Name-First: Peter Author-X-Name-Last: Rittgen Title: A language-mapping approach to action-oriented development of information systems Abstract: Two important views in the development of information systems are the action view and the reaction view which govern the areas of business process modelling and information systems modelling, respectively. We suggest an approach to mediate between these partially conflicting views by specifying a language-mapping framework. In other words, we specify a transition from a process model with human actors to an IS model with inanimate agents. Journal: European Journal of Information Systems Pages: 70-81 Issue: 1 Volume: 15 Year: 2006 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000597 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000597 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:1:p:70-81 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933862_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: John Krogstie Author-X-Name-First: John Author-X-Name-Last: Krogstie Author-Name: Guttorm Sindre Author-X-Name-First: Guttorm Author-X-Name-Last: Sindre Author-Name: Håvard Jørgensen Author-X-Name-First: Håvard Author-X-Name-Last: Jørgensen Title: Process models representing knowledge for action: a revised quality framework Abstract: A semiotic framework for evaluating the quality of conceptual models was proposed by (Lindland OI, Sindre G and Sølvberg A (1994) Understanding Quality in Conceptual Modelling, IEEE Software 11(2), 41–49) and has later been extended in several works. While the extensions have fixed some of the limitations of the initial framework, other limitations remain. In particular, the framework is too static in its view upon semantic quality, mainly considering models, not modelling activities, and comparing these models to a static domain rather than seeing the model as a facilitator for changing the domain. Also, the framework's definition of pragmatic quality is quite narrow, focusing on understanding, in line with the semiotics of Morris, while newer research in linguistics and semiotics has focused beyond mere understanding, on how the model is used and impact its interpreters. The need for a more dynamic view in the semiotic quality framework is particularly evident when considering process models, which themselves often prescribe or even enact actions in the problem domain, hence a change to the model may also change the problem domain directly. This paper discusses the quality framework in relation to active process models and suggests a revised framework based on this. Journal: European Journal of Information Systems Pages: 91-102 Issue: 1 Volume: 15 Year: 2006 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000598 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000598 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:1:p:91-102 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933863_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Peter Bøgh Andersen Author-X-Name-First: Peter Bøgh Author-X-Name-Last: Andersen Title: Activity-based design Abstract: In many types of activities, communicative and material activities are so intertwined that the one cannot be understood without taking the other into account. This is true of maritime and hospital work that are used as examples in the paper. The spatial context of the activity is also important: what you can do depends upon where you are. Finally, human and automatic machinery alternate in filling certain roles in the activity: sometime the officer maintains the course, sometimes the autopilot. Such activities require us to rethink the traditional oppositions between communication and instrumental actions, between human and non-human participants, and between an activity and its spatio-temporal context. The advent of pervasive technologies, where active or passive systems become embedded in our working and living spaces, from where they offer their services to us, puts the need to reconsider these basic oppositions high on the research agenda. This paper presents a consistent framework called habitats for understanding communicative and material activities and their interplay, for understanding how activities can be associated to physical surroundings, and for understanding how humans and automatic machinery can replace one another in an activity. It also gives an example of how to use the framework for design. Journal: European Journal of Information Systems Pages: 9-25 Issue: 1 Volume: 15 Year: 2006 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000599 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000599 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:1:p:9-25 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933864_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Pär J Ågerfalk Author-X-Name-First: Pär J Author-X-Name-Last: Ågerfalk Author-Name: Göran Goldkuhl Author-X-Name-First: Göran Author-X-Name-Last: Goldkuhl Author-Name: Brian Fitzgerald Author-X-Name-First: Brian Author-X-Name-Last: Fitzgerald Author-Name: Liam Bannon Author-X-Name-First: Liam Author-X-Name-Last: Bannon Title: Reflecting on action in language, organisations and information systems Journal: European Journal of Information Systems Pages: 4-8 Issue: 1 Volume: 15 Year: 2006 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000607 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000607 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:1:p:4-8 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933865_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Tanya V Bondarouk Author-X-Name-First: Tanya V Author-X-Name-Last: Bondarouk Title: Action-oriented group learning in the implementation of information technologies: results from three case studies Abstract: This paper is about the influence of group inter-action processes known as group learning on the implementation of information technologies (IT). Aiming at a conceptualisation of the role of user interactions in IT implementation, a theoretical framework based on the experiential learning cycle is developed that includes five processes: collective acting, group reflecting, knowledge disseminating, sharing understanding and mutual adjustment. This theoretical framework is illustrated by the findings from three case studies. Analysis of 87 interviews revealed a unique function of group learning in IT implementation. It showed that group learning emerges immediately after a new IT is introduced to the targeted users and that it can take different standpoints (for or against adoption of the technology); it can also develop during the IT implementation and either progress or take a turn for the worse. The overall conclusion is that group learning is a ‘hidden’ mechanism that may speed up, slow down or even terminate an IT implementation project; and that therefore it is essential to appreciate its importance during IT projects and to steer it in a constructive direction. Journal: European Journal of Information Systems Pages: 42-53 Issue: 1 Volume: 15 Year: 2006 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000608 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000608 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:1:p:42-53 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933866_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ray J Paul Author-X-Name-First: Ray J Author-X-Name-Last: Paul Title: Changing issues: sixes and specials Journal: European Journal of Information Systems Pages: 1-3 Issue: 1 Volume: 15 Year: 2006 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000609 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000609 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:1:p:1-3 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933684_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Brian W Hollocks Author-X-Name-First: Brian W Author-X-Name-Last: Hollocks Title: Qualitative Research in IS: Issues and Trends Journal: European Journal of Information Systems Pages: 83-83 Issue: 1 Volume: 11 Year: 2002 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000404 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000404 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:11:y:2002:i:1:p:83-83 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933685_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: B Work Author-X-Name-First: B Author-X-Name-Last: Work Title: Patterns of software quality management in TickIT certified firms Abstract: This study is a type of practice research known as repertoire building. Its aim is to identify patterns in the way software companies approach quality management in pursuit of ISO certification. This study examines eight UK software companies, all of which were early users of TickIT guidance for gaining ISO certification. It uses a research method which combines multiple, embedded case studies with grounded theory in order to identify patterns in the ways in which these companies perform software quality management. The study finds that each company has adopted either a policing, an advisory, or a hybrid approach towards software quality management. A company's attitudes towards both internal and external auditing characterise these approaches. The approach selected by a company affects the structure and the tasks of its quality department. These approaches reflect senior management's reasons for seeking TickIT certification. Once a company adopts an approach, it is unlikely to change unless there is new management. The study concludes that the TickIT guidance provides a suitable baseline for software quality control. This requires a company to attain Level 2 in the Capability Maturity Model. However, once a company obtains certification, TickIT does not encourage further improvement in its processes. As a result, most companies focus on product quality and largely ignore process quality. In fact it appears that none of these approaches include an adequate mechanism for software quality improvement. Hence, the failure to address process innovation in the TickIT guidelines may explain why it was difficult to distinguish among the effectiveness of these three approaches. Journal: European Journal of Information Systems Pages: 61-73 Issue: 1 Volume: 11 Year: 2002 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000410 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000410 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:11:y:2002:i:1:p:61-73 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933686_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Z Irani Author-X-Name-First: Z Author-X-Name-Last: Irani Author-Name: P E D Love Author-X-Name-First: P E D Author-X-Name-Last: Love Title: Developing a frame of reference for ex-ante IT/IS investment evaluation Abstract: Investment appraisal techniques are an integral part of many traditional capital budgeting processes. However, the adoption of Information Systems (IS) and the development of resulting infrastructures are being increasingly viewed on the basis of consumption. Consequently, decision-makers are now moving away from the confines of rigid capital budgeting processes, which have traditionally compared IS with non-IS-related investments. With this in mind, the authors seek to dissect investment appraisal from the broader capital budgeting process to allow a deeper understanding of the mechanics involved with IS justification. This analysis presents conflicting perspectives surrounding the scope and sensitivity of traditional appraisal methods. In contributing to this debate, the authors present taxonomies of IS benefit types and associated natures, and discuss the resulting implications of using traditional appraisal techniques during the IS planning and decision-making process. A frame of reference that can be used to navigate through the variety of appraisal methods available to decision-makers is presented and discussed. Taxonomies of appraisal techniques that are classified by their respective characteristics are also presented. Perspectives surrounding the degree of involvement that financial appraisal should play during decision making and the limitations surrounding investment appraisal techniques are identified. Journal: European Journal of Information Systems Pages: 74-82 Issue: 1 Volume: 11 Year: 2002 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000411 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000411 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:11:y:2002:i:1:p:74-82 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933687_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Y Merali Author-X-Name-First: Y Author-X-Name-Last: Merali Title: The role of boundaries in knowledge processes Abstract: Advances in communications and information technology deliver an increasingly dynamic and interconnected competitive context. To survive and prosper in this environment, organisations must be innovative and adaptive. Intellectual and relational capital comprise key resources for competitive success. This paper concerns the knowledge processes that enable organisations to undergo transformational change in an interconnected world whilst retaining the integrity of their organisational identity. It views organisations as complex adaptive systems, and uses a case study example to demonstrate the importance of boundary phenomenology in defining organisational knowledge processes. The underlying conceptual framework draws on Maturana and Varela's concept of autopoietic unity as a metaphor to explore issues of organisational identity and integrity, and uses Merali's Cognitive Congruence Framework to examine the cognitive infrastructures underpinning adaptive behaviour. The discussion reflects on the implications of this work for knowledge management practice in emergent competitive contexts, and in concluding, advocates active boundary management. Journal: European Journal of Information Systems Pages: 47-60 Issue: 1 Volume: 11 Year: 2002 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000413 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000413 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:11:y:2002:i:1:p:47-60 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933688_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: T Kern Author-X-Name-First: T Author-X-Name-Last: Kern Author-Name: L Willcocks Author-X-Name-First: L Author-X-Name-Last: Willcocks Title: Exploring relationships in information technology outsourcing: the interaction approach Abstract: Information technology (IT) outsourcing ventures have been termed successful or less successful in achieving their expected outsourcing objectives according to the operational effectiveness of the ensuing client–upplier relationship. Yet researchers and practitioners share no consistent understanding of the actual operational characteristics of these IT outsourcing relationships. The paper bridges this gap by adopting the International Marketing and Purchasing (IMP) group's dyadic ‘interaction Approach’, which delineates carefully the context, parties, interaction and behavioural dimensions of buyer–supplier-type relationships. Applied to outsourcing, this ‘approach’ enables us to shed some light on the crucial dimensions of IT outsourcing relationships. Exploratory research into 12 organisations identifies the potential of the ‘interaction approach’, in providing a comprehensive, consistent, holistic set of constructs to guide analysis. The constructs of ‘interaction’ and ‘atmosphere’ proved particularly useful in providing in-depth insights. However, other interaction constructs of ‘environment’, ‘parties’ and ‘institutionalisation and adaptation’ were limited in their operationalisability. The paper suggests how these can be supplemented, and how IT outsourcing relationships can then be studied over time more satisfactorily. The interaction approach, as applied to the qualitative research data, also helped to identify a number of management issues that warrant careful consideration if IT outsourcing relationship management is to be improved. At the same time, the research identified certain factors in IT outsourcing relationships not captured satisfactorily by the interaction approach, namely the centrality of the contract, the importance of formal processes, and the hidden costs of relationship management. One suggested way forward is to combine interaction, contract and transaction cost perspectives. Journal: European Journal of Information Systems Pages: 3-19 Issue: 1 Volume: 11 Year: 2002 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000415 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000415 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:11:y:2002:i:1:p:3-19 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933689_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: David E Cook Author-X-Name-First: David E Author-X-Name-Last: Cook Title: Information Security Management: Global Changes in the New Millennium Journal: European Journal of Information Systems Pages: 83-84 Issue: 1 Volume: 11 Year: 2002 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000416 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000416 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:11:y:2002:i:1:p:83-84 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933690_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: M K Ahuja Author-X-Name-First: M K Author-X-Name-Last: Ahuja Title: Women in the information technology profession: a literature review, synthesis and research agenda Abstract: Gender differences in IT careers appear to be affecting the competitiveness of companies globally. It is posited that given the current labor shortage in the IT industry, it has become more important than ever to reduce sources of leakage in the IT career paths of women. A model of barriers faced by women in the field of information technology is presented. Three distinct career stages of career choices, persistence and advancement are analyzed. At each stage, the effects of social and structural factors which may act as barriers are identified and discussed. Social factors include social expectations, work–family conflict and informal networks, while the structural factors are occupational culture, lack of role models and mentors, demographic composition and institutional structures. A proposed research agenda is offered. It is suggested that these social and structural factors as well as their interactions will result in turnover of women in IT. Journal: European Journal of Information Systems Pages: 20-34 Issue: 1 Volume: 11 Year: 2002 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000417 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000417 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:11:y:2002:i:1:p:20-34 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933691_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: H Akkermans Author-X-Name-First: H Author-X-Name-Last: Akkermans Author-Name: K van Helden Author-X-Name-First: K Author-X-Name-Last: van Helden Title: Vicious and virtuous cycles in ERP implementation: a case study of interrelations between critical success factors Abstract: ERP implementations are complex undertakings. Recent research has provided us with plausible critical success factors (CSFs) for such implementations. This article describes how one list of CSFs (Somers & Nelson, 2001) was used to analyse and explain project performance in one ERP implementation in the aviation industry. In this particular case, poor project performance led to a serious project crisis but this situation was turned around into a success. The list of CSFs employed was found to be helpful and appropriate in explaining both the initial failure and the eventual success of the implementation. CSFs in this case appeared to be highly correlated, ie changes in any one of them would influence most of the others as well. The reversal in performance after the project crisis was caused by substantial changes in attitudes with most of the stakeholders involved, such as top management, project management, project champion and software vendor. Journal: European Journal of Information Systems Pages: 35-46 Issue: 1 Volume: 11 Year: 2002 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000418 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000418 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:11:y:2002:i:1:p:35-46 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933692_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bob O'Keefe Author-X-Name-First: Bob Author-X-Name-Last: O'Keefe Author-Name: Ray Paul Author-X-Name-First: Ray Author-X-Name-Last: Paul Title: Editorial Volume 11, Issue 1 Journal: European Journal of Information Systems Pages: 1-2 Issue: 1 Volume: 11 Year: 2002 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000419 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000419 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:11:y:2002:i:1:p:1-2 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933793_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Thomas Puschmann Author-X-Name-First: Thomas Author-X-Name-Last: Puschmann Author-Name: Rainer Alt Author-X-Name-First: Rainer Author-X-Name-Last: Alt Title: Developing an integration architecture for process portals Abstract: Many companies still use portals to mange link lists or to present HTML pages to an anonymous group of users. This paper argues that a portal's benefits strongly depend on its personalisation along the individual user processes. Besides customer profiles and histories relevant design issues are also the operational collaboration processes and the link of the embedded services to the internal and/or external providers in the upstream supply chain. These process portals not only require an in-depth process analysis, but also the efficient integration of heterogeneous applications on the information systems level. The goal is to provide an integrated, role-based and process-oriented access to all relevant applications. For this purpose integration architectures add one layer to existing application architectures and need to be linked to existing process and application architectures. In view of an estimated growing diffusion of process portals, this article argues that the available approaches to integration architecture in the literature and in practice do not adequately address inter-organisational requirements, and develops an extended architecture model. The components required to implement this architecture are illustrated using an example of a major automobile manufacturer. Journal: European Journal of Information Systems Pages: 121-134 Issue: 2 Volume: 14 Year: 2005 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000527 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000527 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:2:p:121-134 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933794_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Olga Volkoff Author-X-Name-First: Olga Author-X-Name-Last: Volkoff Author-Name: Diane M Strong Author-X-Name-First: Diane M Author-X-Name-Last: Strong Author-Name: Michael B Elmes Author-X-Name-First: Michael B Author-X-Name-Last: Elmes Title: Understanding enterprise systems-enabled integration Abstract: A key touted benefit of enterprise systems (ES) is organizational integration of both business processes and data, which is expected to reduce processing time and increase control over operations. In our 3-year longitudinal case study of a phased ES implementation, we employed a grounded theory methodology to discover organizational effects of ES. As we coded and analyzed our field data, we observed many integration effects. Further analysis revealed underlying dimensions of ES-enabled integration. ES-enabled integration varied depending on the relationship between the integrated business units (similar plants, stages in a business process, or dissimilar functional areas) and on whether processes or data were integrated. Turning to the literature, we realized that Thompson's three types of interdependence, pooled, sequential, and reciprocal, captured the business relationships revealed in our data. Thus, we describe the salient characteristics of ES-enabled integration using Thompson's interdependence types applied to process and data integration. We also identify dimensions of differentiation between business units that contribute to integration problems. Viewing our field data through the lens of these salient characteristics and dimensions of differentiation provided theoretical explanations for observed integration problems. These findings also help managers understand and anticipate ES-enabled integration opportunities and problems. Journal: European Journal of Information Systems Pages: 110-120 Issue: 2 Volume: 14 Year: 2005 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000528 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000528 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:2:p:110-120 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933795_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Elizabeth M Daniel Author-X-Name-First: Elizabeth M Author-X-Name-Last: Daniel Author-Name: Andrew White Author-X-Name-First: Andrew Author-X-Name-Last: White Title: The future of inter-organisational system linkages: findings of an international Delphi study Abstract: To perform effectively in markets that are becoming increasingly turbulent and volatile, organisations should form information system linkages with their business partners. This study seeks to produce a ‘vision’ for the future of such linkages. A number of recent developments in information systems and technology (IS/IT) appear to promise the ability to make improvements in this domain. These are electronic hubs, web services, widespread adoption of common enterprise resource planning (ERP) systems and enterprise portals. This study, which is carried out by means of the Delphi technique, explores the expected future role and use of these information systems. The expert participants in the study believe that the focus of enterprise systems is shifting from an internal to an external orientation. They suggest that ERP systems may be reaching a structural limit concerning their capabilities and adjunct technologies will be required to integrate multiple inter-organisational operations. The participants expect that the three other systems and technologies considered can provide those necessary adjunct technologies, either used singly, or more likely in combination. Finally, we find that the transition to a greater external orientation is expected to include an extension in the types of organisations that will be integrated electronically into networks. Journal: European Journal of Information Systems Pages: 188-203 Issue: 2 Volume: 14 Year: 2005 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000529 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000529 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:2:p:188-203 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933796_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Wing Lam Author-X-Name-First: Wing Author-X-Name-Last: Lam Title: Investigating success factors in enterprise application integration: a case-driven analysis Abstract: This paper investigates Critical Success Factors (CSFs) in Enterprise Application Integration (EAI). An initial set of CSFs for EAI projects was created based on a review and synthesis of the literature in the general area of integration, including Enterprise Resource Planning (ERP) projects. A case analysis, involving a large financial services provider integrating its consumer banking systems, was used to validate the CSFs. The findings resulted in a more structured and holistic CSF model which identifies three broad groups of CSFs, namely (1) top management support, (2) overall integration strategy, and (3) EAI project planning and execution. Although EAI projects share many of the same CSFs as ERP projects and other information systems projects, issues related to the selection of the right EAI tool and emphasis on technology planning and enterprise architecture are distinguishing features of EAI projects. Some of practical implications of the research are that EAI projects require personnel with specific skills and expertise, business integration should precede technology integration, that availability of adapters is an important criteria in EAI tool selection and that some custom adapter development may be unavoidable if custom applications need to be integrated. Journal: European Journal of Information Systems Pages: 175-187 Issue: 2 Volume: 14 Year: 2005 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000530 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000530 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:2:p:175-187 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933797_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Eric T K Lim Author-X-Name-First: Eric T K Author-X-Name-Last: Lim Author-Name: Shan Ling Pan Author-X-Name-First: Shan Ling Author-X-Name-Last: Pan Author-Name: Chee Wee Tan Author-X-Name-First: Chee Wee Author-X-Name-Last: Tan Title: Managing user acceptance towards enterprise resource planning (ERP) systems – understanding the dissonance between user expectations and managerial policies Abstract: Discourse on enterprise resource planning (ERP) systems acceptance is rife among MIS scholars as they seek to comprehend the underlying psychological and environmental factors influencing user adoption behavior. Researchers are especially keen to understand why the utilization of ERP among organizational members often remains at a perfunctory level. As such, the objective of this case study on GlobalMNC's SAP implementation experience hopes to address this concern by exploring ERP users' motivational dynamics from an Expectancy perspective. Specifically, this article investigates the components of Effort-Performance Expectancy, Performance-Outcome Instrumentality and Outcome Valence as experienced by ERP users and the potential managerial actions affecting each corresponding motivational factor that may result in counter-productive dissonances. Journal: European Journal of Information Systems Pages: 135-149 Issue: 2 Volume: 14 Year: 2005 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000531 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000531 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:2:p:135-149 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933798_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Yujong Hwang Author-X-Name-First: Yujong Author-X-Name-Last: Hwang Title: Investigating enterprise systems adoption: uncertainty avoidance, intrinsic motivation, and the technology acceptance model Abstract: Enterprise systems are gaining interest from both practitioners and researchers because of their potential linkages to organizational and individual user's productivity. Information systems (IS) researchers have been investigating the implementation and adoption issues of enterprise systems based on the organizational IS management perspectives. However, there are few papers that investigate enterprise systems management and implementation issues based on the informal control mechanisms, although the enterprise systems are control tools in the organization. Specifically, this paper applies Enterprise Resource Planning (ERP) adoption and implementation to the informal controls, such as cultural control and self-control, which can be viewed as a tacit perspective in knowledge management. Uncertainty avoidance and perceived enjoyment are used as informal controls in the ERP implementation in this paper, and are linked to the technology acceptance variables to investigate the relationships among them. Sociotechnical design, organizational control mechanism, knowledge management, and individual motivation are reviewed to support this potential linkage in the model. Field data via the online survey of ERP systems user group (n=101) are analyzed with partial least squares and supported our hypotheses. Uncertainty avoidance cultural control and intrinsic motivation as self-control are the important antecedents of ERP systems adoption. Furthermore, the result helps the systems manager understand that informal controls should be applied to the ERP systems implementation to enhance tacit and social aspects of IS management. Journal: European Journal of Information Systems Pages: 150-161 Issue: 2 Volume: 14 Year: 2005 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000532 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000532 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:2:p:150-161 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933799_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Amir M Sharif Author-X-Name-First: Amir M Author-X-Name-Last: Sharif Author-Name: Zahir Irani Author-X-Name-First: Zahir Author-X-Name-Last: Irani Author-Name: Peter E D Love Author-X-Name-First: Peter E D Author-X-Name-Last: Love Title: Integrating ERP using EAI: a model for post hoc evaluation Abstract: In recent years there has been an increased focus on improving the capability and flexibility of organisational information systems through improving, and where necessary, re-engineering inter- and intra-organisational information flows. In doing so, many firms have realised that the cornerstone of their information systems capability is dependent upon core systems such as Enterprise Resource Planning (ERP). In realising this, it has forced businesses to acknowledge the need to integrate ERP systems with existing disparate legacy systems. Technology solutions such as Enterprise Application Integration (EAI) have been seen as a panacea to facilitate integration through the use of technologies that allow corporate IS subsystems to communicate with one another. In the context of using enterprise technologies to integrate ERP with other organisational business systems, this paper analyses and extends previously published work through presenting the failure of an industrial automation business to integrate its ERP system with legacy processes when using an EAI approach. In doing so, the authors present a post hoc evaluation model that can be used by others as a frame of reference; a tool for reflection. The presented model seeks to provide further insight to the failed approach to ERP integration, within the given case study organisation. This proposed model, is constructed in terms of Technical, Organisational and Tailorability components. It is anticipated that this will be a useful tool for both practitioners and academics, who wish to gain a deeper understanding of ERP/EAI implementation approaches, as well as providing insights into how the componentisation and extension of ERP functionalities can be achieved, towards so-called ERPII. Journal: European Journal of Information Systems Pages: 162-174 Issue: 2 Volume: 14 Year: 2005 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000533 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000533 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:2:p:162-174 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933800_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Marinos Themistocleous Author-X-Name-First: Marinos Author-X-Name-Last: Themistocleous Author-Name: Ed Watson Author-X-Name-First: Ed Author-X-Name-Last: Watson Title: EJIS special issue on making enterprise systems work Journal: European Journal of Information Systems Pages: 107-109 Issue: 2 Volume: 14 Year: 2005 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000534 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000534 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:2:p:107-109 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933950_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Derrick J Neufeld Author-X-Name-First: Derrick J Author-X-Name-Last: Neufeld Author-Name: Linying Dong Author-X-Name-First: Linying Author-X-Name-Last: Dong Author-Name: Chris Higgins Author-X-Name-First: Chris Author-X-Name-Last: Higgins Title: Charismatic leadership and user acceptance of information technology Abstract: Although there is widespread agreement that leadership has important effects on information technology (IT) acceptance and use, relatively little empirical research to date has explored this phenomenon in detail. This paper integrates the unified theory of acceptance and use of technology (UTAUT) with charismatic leadership theory, and examines the role of project champions influencing user adoption. PLS analysis of survey data collected from 209 employees in seven organizations that had engaged in a large-scale IT implementation revealed that project champion charisma was positively associated with increased performance expectancy, effort expectancy, social influence and facilitating condition perceptions of users. Theoretical and managerial implications are discussed, and suggestions for future research in this area are provided. Journal: European Journal of Information Systems Pages: 494-510 Issue: 4 Volume: 16 Year: 2007 Month: 8 X-DOI: 10.1057/palgrave.ejis.3000682 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000682 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:4:p:494-510 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933951_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mark Lycett Author-X-Name-First: Mark Author-X-Name-Last: Lycett Author-Name: Esperanza Marcos Author-X-Name-First: Esperanza Author-X-Name-Last: Marcos Author-Name: Veda Storey Author-X-Name-First: Veda Author-X-Name-Last: Storey Title: Model-driven systems development: an introduction Journal: European Journal of Information Systems Pages: 346-348 Issue: 4 Volume: 16 Year: 2007 Month: 8 X-DOI: 10.1057/palgrave.ejis.3000684 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000684 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:4:p:346-348 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933952_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Yuehua Lin Author-X-Name-First: Yuehua Author-X-Name-Last: Lin Author-Name: Jeff Gray Author-X-Name-First: Jeff Author-X-Name-Last: Gray Author-Name: Frédéric Jouault Author-X-Name-First: Frédéric Author-X-Name-Last: Jouault Title: DSMDiff: a differentiation tool for domain-specific models Abstract: Model differentiation techniques, which provide the capability to identify mappings and differences between models, are essential to many model development and management practices. There has been initial research toward model differentiation applied to Unified Modeling Language (UML) diagrams, but differentiation of domain-specific models has not been explored deeply in the modeling community. Traditional modeling practice using the UML relies on a single fixed general-purpose language (i.e., all UML diagrams conform to a single metamodel). In contrast, Domain-Specific Modeling (DSM) is an emerging model-driven paradigm in which multiple metamodels are used to define various modeling languages that represent the key concepts and abstractions for particular domains. Therefore, domain-specific models may conform to various metamodels, which requires model differentiation algorithms be metamodel-independent and able to apply to multiple domain-specific modeling languages. This paper presents metamodel-independent algorithms and associated tools for detecting mappings and differences between domain-specific models, with facilities for graphical visualization of the detected differences. Journal: European Journal of Information Systems Pages: 349-361 Issue: 4 Volume: 16 Year: 2007 Month: 8 X-DOI: 10.1057/palgrave.ejis.3000685 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000685 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:4:p:349-361 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933953_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Dennis Wagelaar Author-X-Name-First: Dennis Author-X-Name-Last: Wagelaar Author-Name: Ragnhild Van Der Straeten Author-X-Name-First: Ragnhild Author-X-Name-Last: Van Der Straeten Title: Platform ontologies for the model-driven architecture Abstract: The model-driven architecture enables the deployment of software applications on different platforms. It is based on a pattern in which a platform-independent model is transformed into a platform-specific model, given a platform model (PM). Currently, the model transformations used for this task implicitly assume this PM, which makes it unclear whether a model transformation can be used for platforms other than the one assumed. In order to target very specific platforms and platform variants, model transformations must be reusable beyond their assumed platform. We propose an explicit PM that can be used to reason about platform dependencies of model transformations and their applicability to specific platforms. In addition, we show how PMs can be integrated in a model-driven configuration management framework. Journal: European Journal of Information Systems Pages: 362-373 Issue: 4 Volume: 16 Year: 2007 Month: 8 X-DOI: 10.1057/palgrave.ejis.3000686 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000686 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:4:p:362-373 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933954_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Eduardo Fernández-Medina Author-X-Name-First: Eduardo Author-X-Name-Last: Fernández-Medina Author-Name: Juan Trujillo Author-X-Name-First: Juan Author-X-Name-Last: Trujillo Author-Name: Mario Piattini Author-X-Name-First: Mario Author-X-Name-Last: Piattini Title: Model-driven multidimensional modeling of secure data warehouses Abstract: Data Warehouses (DW), Multidimensional (MD) databases, and On-Line Analytical Processing (OLAP) applications provide companies with many years of historical information for the decision-making process. Owing to the relevant information managed by these systems, they should provide strong security and confidentiality measures from the early stages of a DW project in the MD modeling and enforce them. In the last years, there have been some proposals to accomplish the MD modeling at the conceptual level. Nevertheless, none of them considers security measures as an important element in their models, and therefore, they do not allow us to specify confidentiality constraints to be enforced by the applications that will use these MD models. In this paper, we present an Access Control and Audit (ACA) model for the conceptual MD modeling. Then, we extend the Unified Modeling Language (UML) with this ACA model, representing the security information (gathered in the ACA model) in the conceptual MD modeling, thereby allowing us to obtain secure MD models. Moreover, we use the OSCL (Object Security Constraint Language) to specify our ACA model constraints, avoiding in this way an arbitrary use of them. Furthermore, we align our approach with the Model-Driven Architecture, the Model-Driven Security and the Model-Driven Data Warehouse, offering a proposal highly compatible with the more recent technologies. Journal: European Journal of Information Systems Pages: 374-389 Issue: 4 Volume: 16 Year: 2007 Month: 8 X-DOI: 10.1057/palgrave.ejis.3000687 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000687 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:4:p:374-389 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933955_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Liang Xiao Author-X-Name-First: Liang Author-X-Name-Last: Xiao Author-Name: Des Greer Author-X-Name-First: Des Author-X-Name-Last: Greer Title: Towards agent-oriented model-driven architecture Abstract: Model-Driven Architecture (MDA) supports the transformation from reusable models to executable software. Business representations, however, cannot be fully and explicitly represented in such models for direct transformation into running systems. Thus, once business needs change, the language abstractions used by MDA (e.g. object constraint language/action semantics), being low level, have to be edited directly. We therefore describe an agent-oriented MDA (AMDA) that uses a set of business models under continuous maintenance by business people, reflecting the current business needs and being associated with adaptive agents that interpret the captured knowledge to behave dynamically. Three contributions of the AMDA approach are identified: (1) to Agent-oriented Software Engineering, a method of building adaptive Multi-Agent Systems; (2) to MDA, a means of abstracting high-level business-oriented models to align executable systems with their requirements at runtime; (3) to distributed systems, the interoperability of disparate components and services via the agent abstraction. Journal: European Journal of Information Systems Pages: 390-406 Issue: 4 Volume: 16 Year: 2007 Month: 8 X-DOI: 10.1057/palgrave.ejis.3000688 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000688 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:4:p:390-406 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933956_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Susana Montero Author-X-Name-First: Susana Author-X-Name-Last: Montero Author-Name: Paloma Díaz Author-X-Name-First: Paloma Author-X-Name-Last: Díaz Author-Name: Ignacio Aedo Author-X-Name-First: Ignacio Author-X-Name-Last: Aedo Title: From requirements to implementations: a model-driven approach for web development Abstract: Model-Driven Development (MDD) is an appropriate paradigm for web development since interoperability and flexibility are required to cope with implementation technologies and functionalities that are in permanent evolution. In this paper, we describe and illustrate the MDD process of the ADM (Ariadne Development Method) hypermedia/web engineering method. The two cornerstones of the ADM are the Labyrinth++ meta-meta-model, which formalizes the core constructs used within all the design meta-models, and the meta-meta-model specification as an ontology that provides semantics and reasoning not only for model transformations but also for consistency checking and model validation. These features have been essential in the development of a CASE tool, called AriadneTool that supports the different abstract levels of modeling, model transformations as well as the generation of light prototypes in different web implementation technologies. Journal: European Journal of Information Systems Pages: 407-419 Issue: 4 Volume: 16 Year: 2007 Month: 8 X-DOI: 10.1057/palgrave.ejis.3000689 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000689 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:4:p:407-419 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933957_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Cristina Cachero Castro Author-X-Name-First: Cristina Author-X-Name-Last: Cachero Castro Author-Name: Santiago Meliá Author-X-Name-First: Santiago Author-X-Name-Last: Meliá Author-Name: Marcela Genero Author-X-Name-First: Marcela Author-X-Name-Last: Genero Author-Name: Geert Poels Author-X-Name-First: Geert Author-X-Name-Last: Poels Author-Name: Coral Calero Author-X-Name-First: Coral Author-X-Name-Last: Calero Title: Towards improving the navigability of Web applications: a model-driven approach Abstract: Navigability in use, defined as the efficiency, effectiveness and satisfaction with which a user navigates through the system in order to fulfil her goals under specific conditions, has a definite impact on the overall success of Web applications. This quality attribute can be measured based on the navigational model (NM) provided by Web engineering (WE) methodologies. Most of the measures currently defined for NMs are tightly coupled with particular WE methodologies, however. Furthermore, modifications to the design of the NM, carried out with the aim of improving navigability, are performed manually. Both practices have seriously hampered the reusability and adoption of proposed navigability measures and improvement techniques. In this paper, we present a Model-Driven Engineering approach to solving these problems. On the one hand, we propose a generic approach for the definition of navigability measurement models that can be integrated into any WE methodology. On the other hand, we present a model-driven improvement process for the NM design that incurs no increase in costs or in time-to-market of Web applications. This process is divided into two phases: evaluation (i.e. assessment of the model through objective measures) and evolution (i.e. transformation of the model when the measurement results do not fall inside the boundaries set by certain quality decision criteria that have been defined previously). Journal: European Journal of Information Systems Pages: 420-447 Issue: 4 Volume: 16 Year: 2007 Month: 8 X-DOI: 10.1057/palgrave.ejis.3000690 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000690 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:4:p:420-447 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933958_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Nathalie Moreno Vergara Author-X-Name-First: Nathalie Moreno Author-X-Name-Last: Vergara Author-Name: José M Troya Linero Author-X-Name-First: José M Troya Author-X-Name-Last: Linero Author-Name: Antonio Vallecillo Moreno Author-X-Name-First: Antonio Vallecillo Author-X-Name-Last: Moreno Title: Model-driven component adaptation in the context of Web Engineering Abstract: Currently, Web-based applications are no longer monolithic and isolated systems but, rather, distributed applications that need to interoperate with third-party systems, such as external Web services, LDAP repositories or legacy applications. When one component provides a service that the Web application requires, it is often not possible to bind the two systems together if they were not programmed to have compatible collaboration specifications. Modeling the adaptation between a Web application and external assets becomes therefore an essential issue in any realistic model-driven development scenario. However, most of the existing Web Engineering proposals do not take this issue into account, or they simply address it at the implementation level (in a platform-specific way). In this work, we discuss the problems involved in dealing with component adaptation within the context of Model-Driven Web Engineering and show how design patterns can help addressing it. We first identify the major interoperability problems that can happen when integrating third-party application or legacy systems into our Web systems, and then propose the mechanisms that need to be put in place at the design level to generate the appropriate specification of adapters that compensate for the possible mismatches and differences. We base our proposal on well-known design patterns as they are established solutions to recurring problems, and the generation of code from them is normally straightforward. Journal: European Journal of Information Systems Pages: 448-459 Issue: 4 Volume: 16 Year: 2007 Month: 8 X-DOI: 10.1057/palgrave.ejis.3000691 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000691 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:4:p:448-459 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933959_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Karlene C Cousins Author-X-Name-First: Karlene C Author-X-Name-Last: Cousins Author-Name: Daniel Robey Author-X-Name-First: Daniel Author-X-Name-Last: Robey Author-Name: Ilze Zigurs Author-X-Name-First: Ilze Author-X-Name-Last: Zigurs Title: Managing strategic contradictions in hybrid teams Abstract: It has become a common practice to organize work teams to include members in multiple geographic locations. In contrast to co-located teams and purely virtual teams, these ‘hybrid’ teams combine face-to-face communication with computer-mediated interaction. In this paper, we report a qualitative study of management practices in three hybrid teams in one organization. We adopt the theoretical approach of strategic contradiction, in which apparently contradictory pairs of elements can be managed by attending to their possible synergies or clarifying their distinctions so as to make balanced trade-offs over time. Our data reveal four sets of paradoxical frames in hybrid teams: remoteness–closeness, cultural uniformity–cultural diversity, rationality–emotionality, and control–empowerment. In referencing these paradoxical frames, teams engaged in three cognitive processes: (a) integrating to produce synergies between opposing tensions, (b) differentiating to clarify distinctions between opposing tensions and to balance trade-offs over time, and (c) polarizing to remove tensions between opposing elements by using one element to reduce the effects of another. Both integrating and differentiating processes were found to be instrumental to sustaining contradictions as interdependent dualities, whereas polarizing processes were found to preserve contradictions as dualisms. Our findings advance the understanding of managing strategic contradictions by showing how managers influence cognitive processes that paradoxically emphasize remoteness and closeness, cultural uniformity and cultural diversity, rationality and emotionality, and control and empowerment. Journal: European Journal of Information Systems Pages: 460-478 Issue: 4 Volume: 16 Year: 2007 Month: 8 X-DOI: 10.1057/palgrave.ejis.3000692 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000692 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:4:p:460-478 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933960_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mahmood Hussain Shah Author-X-Name-First: Mahmood Hussain Author-X-Name-Last: Shah Author-Name: Ashley Braganza Author-X-Name-First: Ashley Author-X-Name-Last: Braganza Author-Name: Vincenzo Morabito Author-X-Name-First: Vincenzo Author-X-Name-Last: Morabito Title: A survey of critical success factors in e-Banking: an organisational perspective Abstract: We investigate organisational factors critical to the success of e-Banking (EB). Scholars report that a variety of factors are vital to EB success. A shortcoming in the extant EB literature is that much of the research focuses on a small subset of success factors and an overall ranking of factors is still missing. Our aim, therefore, is to synthesise and test the critical success factors (CSFs) identified in the existing literature, thus, substantiating or not the factors purported to be critical. To achieve our aim, we created a survey instrument from a synthesis of CSFs identified from existing EB and e-commerce literature. We draw upon the e-commerce body of knowledge to take in the widest set of CSFs that can affect EB. Data were collected from U.K.-based financial sector organisations that offer EB services. We found the most critical factors for success in EB are: quick responsive products/services, organisational flexibility, services expansion, systems integration and enhanced customer service. Our research shows that organisations need to manage their EB initiative at a strategic level and treat it as business critical rather than simply a technical or operational issue. They need to pay attention to internal integration, which includes channels, technology and business process integration, and improving the overall services to their customers. Journal: European Journal of Information Systems Pages: 511-524 Issue: 4 Volume: 16 Year: 2007 Month: 8 X-DOI: 10.1057/palgrave.ejis.3000693 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000693 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:4:p:511-524 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933961_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jing Zhang Author-X-Name-First: Jing Author-X-Name-Last: Zhang Author-Name: Sue R Faerman Author-X-Name-First: Sue R Author-X-Name-Last: Faerman Title: Distributed leadership in the development of a knowledge sharing system Abstract: This paper studies leadership dynamics in the development of a knowledge sharing system. We apply the concept of distributed leadership, examining how leadership roles are distributed across different individuals in the organisation during developing and implementing a knowledge sharing system. The results of a case study demonstrate that the leadership was fulfilled by the interdependent and emergent roles played by several individuals: the spearheading and coordinating roles of a knowledgeable and persistent project leader, the supporting and steering roles carried by a group of perceptive and collaboration-inclined executives, and the knowledge sharing and momentum driving roles performed by knowledge champions. Each of these leadership influences was indispensable. None of the leaders could have accomplished this task individually, without the active involvement of the other types of leaders. This research makes its contribution to the understanding of the emergence and dynamics of distributed leadership in the information system environment, and demonstrates the importance of a full awareness of distributed leadership as tasks are carried out in developing a knowledge sharing system. Journal: European Journal of Information Systems Pages: 479-493 Issue: 4 Volume: 16 Year: 2007 Month: 8 X-DOI: 10.1057/palgrave.ejis.3000694 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000694 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:4:p:479-493 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933962_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Kalle Lyytinen Author-X-Name-First: Kalle Author-X-Name-Last: Lyytinen Author-Name: Richard Baskerville Author-X-Name-First: Richard Author-X-Name-Last: Baskerville Author-Name: Juhani Iivari Author-X-Name-First: Juhani Author-X-Name-Last: Iivari Author-Name: Dov Te'eni Author-X-Name-First: Dov Author-X-Name-Last: Te'eni Title: Why the old world cannot publish? Overcoming challenges in publishing high-impact IS research Abstract: We review the status of European publishing in high-impact Information System (IS) journals finding that the European publication record is disappointing. We consider popular explanations to this state of affairs and find them neither credible nor useful for improving the European record. We propose several constructive reasons for this including (1) the lack of appreciation of the article genre, (2) weak publishing cultures, (3) inadequate Ph.D. preparation for article publishing, (4) weak reviewing practices, (5) poorer command of research methods, (6) poorer understanding of the reviewing protocols, and (7) institutional shaping of research funding in Europe. We formulate several recommendations to affect these causes at the individual, institutional, journal, and European community level. Journal: European Journal of Information Systems Pages: 317-326 Issue: 4 Volume: 16 Year: 2007 Month: 8 X-DOI: 10.1057/palgrave.ejis.3000695 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000695 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:4:p:317-326 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933963_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: John Mingers Author-X-Name-First: John Author-X-Name-Last: Mingers Author-Name: Anne-Wil Harzing Author-X-Name-First: Anne-Wil Author-X-Name-Last: Harzing Title: Ranking journals in business and management: a statistical analysis of the Harzing data set Abstract: Creating rankings of academic journals is an important but contentious issue. It is of especial interest in the U.K. at this time (2007) as we are only one year away from getting the results of the next Research Assessment Exercise (RAE) the importance of which, for U.K. universities, can hardly be overstated. The purpose of this paper is to present a journal ranking for business and management based on a statistical analysis of the Harzing data set which contains 13 rankings. The primary aim of the analysis is two-fold – to investigate relationships between the different rankings, including that between peer rankings and citation behaviour; and to develop a ranking based on four groups that could be useful for the RAE. Looking at the different rankings, the main conclusions are that there is in general a high degree of conformity between them as shown by a principal components analysis. Cluster analysis is used to create four groups of journals relevant to the RAE. The higher groups are found to correspond well with previous studies of top management journals and also gave, unlike them, equal coverage to all the management disciplines. The RAE Business and Management panel have a huge and unenviable task in trying to judge the quality of over 10,000 publications and they will inevitably have to resort to some standard mechanistic procedures to do so. This work will hopefully contribute by producing a ranking based on a statistical analysis of a variety of measures. Journal: European Journal of Information Systems Pages: 303-316 Issue: 4 Volume: 16 Year: 2007 Month: 8 X-DOI: 10.1057/palgrave.ejis.3000696 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000696 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:4:p:303-316 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933964_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Joe Peppard Author-X-Name-First: Joe Author-X-Name-Last: Peppard Title: The conundrum of IT management Abstract: This paper presents a robust argument as to why it can be difficult for chief information officers (CIOs) to generate business value from investments that their organizations make in information technology (IT) with contemporary organizational structures, authority patterns, processes and mindsets. This argument is built on the subtle premise that organizations should not seek to merely manage IT but to manage the delivery of business value through IT. It takes the view that this latter quest is knowledge-based and that the knowledge resources to successfully deliver this value are distributed throughout the organization. Crucially, this knowledge is not located solely within the IT function, presenting a challenge for the CIO for its integration and coordination. With the CIO having little or no jurisdiction over all required knowledge, its deployment will therefore be fragmented. The conundrum of IT management is how to generate value through IT without having access and authority over necessary resources. Research and practitioner implications of this analysis are highlighted. Journal: European Journal of Information Systems Pages: 336-345 Issue: 4 Volume: 16 Year: 2007 Month: 8 X-DOI: 10.1057/palgrave.ejis.3000697 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000697 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:4:p:336-345 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933965_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Zahir Irani Author-X-Name-First: Zahir Author-X-Name-Last: Irani Author-Name: Tony Elliman Author-X-Name-First: Tony Author-X-Name-Last: Elliman Author-Name: Paul Jackson Author-X-Name-First: Paul Author-X-Name-Last: Jackson Title: Electronic transformation of government in the U.K.: a research agenda Abstract: This paper presents the findings of an exploratory research project into future e-Government (electronic Government) initiatives. The Virtual Institute for Electronic Government Research (VIEGO) project aimed at identifying and further developing the research agenda of e-Government based on a solid practical ground. As such, the paper offers a novel methodology in identifying the road map for future e-Government initiatives based on a series of workshops organised around the U.K. hosting a mixture of stakeholders involving both academics and practitioners. The analysis of the VIEGO workshops depicted that an e-Government research agenda involves a combination of social, technological and organisational issues at both governmental and individual citizen level, ultimately driven by empirical case-based experience and active participation in e-Government processes. Unlike other propositions for the future of e-Government offered in the e-Government literature, it raised research questions not only originated from an analysis of e-Government literature but also on the outcome of brainstorming, reflections and contemplations throughout the duration of the project. Journal: European Journal of Information Systems Pages: 327-335 Issue: 4 Volume: 16 Year: 2007 Month: 8 X-DOI: 10.1057/palgrave.ejis.3000698 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000698 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:4:p:327-335 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933966_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ray J Paul Author-X-Name-First: Ray J Author-X-Name-Last: Paul Title: Changing the challenge: To challenge makes you larger and being challenged makes you small Journal: European Journal of Information Systems Pages: 299-302 Issue: 4 Volume: 16 Year: 2007 Month: 8 X-DOI: 10.1057/palgrave.ejis.3000705 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000705 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:4:p:299-302 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934101_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: David Kreps Author-X-Name-First: David Author-X-Name-Last: Kreps Title: My social networking profile: copy, resemblance, or simulacrum? A poststructuralist interpretation of social information systems Abstract: This paper offers an introduction to poststructuralist interpretivist research in information systems, through a poststructuralist theoretical reading of the phenomenon and experience of social networking websites, such as Facebook. This is undertaken through an exploration of how loyally a social networking profile can represent the essence of an individual, and whether Platonic notions of essence, and loyalty of copy, are disturbed by the nature of a social networking profile, in ways described by poststructuralist thinker Deleuze's notions of the reversal of Platonism. In bringing a poststructuralist critique to such hugely successful and popular social information systems, the paper attempts to further open up the black box of the computer ‘user’, extend interpretive approaches to information systems research to embrace poststructuralism, and explore how notions of the Self might be reflected through engagement with information system (IS), and how an IS appreciation of the phenomenon of global social networking may benefit from embracing such a poststructuralist approach. Journal: European Journal of Information Systems Pages: 104-115 Issue: 1 Volume: 19 Year: 2010 Month: 2 X-DOI: 10.1057/ejis.2009.46 File-URL: http://hdl.handle.net/10.1057/ejis.2009.46 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:1:p:104-115 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934102_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Nicholas Berente Author-X-Name-First: Nicholas Author-X-Name-Last: Berente Author-Name: Uri Gal Author-X-Name-First: Uri Author-X-Name-Last: Gal Author-Name: Youngjin Yoo Author-X-Name-First: Youngjin Author-X-Name-Last: Yoo Title: Dressage, control, and enterprise systems: the case of NASA's Full Cost initiative Abstract: In 2004, National Aeronautics and Space Administration (NASA) implemented Full Cost, an activity-based accounting program through an agency-wide enterprise resource planning (ERP) implementation. We apply Foucault’s notion of ‘dressage’ to highlight aspects of demonstrative control associated with this implementation effort and to outline the different dimensions along which control was distributed. We suggest that some elements of Full Cost and the ERP system were geared toward satisfying disciplinary requirements without necessarily contributing to productive activity. We term these elements dressage-as-control. Our findings indicate that dressage-as-control breeds dressage-as-response: employees’ responses to control imperatives that are intended merely to satisfy the demand for control by exhibiting public compliance, but make no direct contribution to the execution of work. Accordingly, we propose that the ideal of complete enterprise control remains unattainable, as aspects of demonstrative control are inevitably implicated within broader enterprise-wide control systems within contemporary organizations. We conclude with implications for research and practice. Journal: European Journal of Information Systems Pages: 21-34 Issue: 1 Volume: 19 Year: 2010 Month: 2 X-DOI: 10.1057/ejis.2009.47 File-URL: http://hdl.handle.net/10.1057/ejis.2009.47 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:1:p:21-34 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934103_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Chitu Okoli Author-X-Name-First: Chitu Author-X-Name-Last: Okoli Author-Name: Victor W A Mbarika Author-X-Name-First: Victor W A Author-X-Name-Last: Mbarika Author-Name: Scott McCoy Author-X-Name-First: Scott Author-X-Name-Last: McCoy Title: The effects of infrastructure and policy on e-business in Latin America and Sub-Saharan Africa Abstract: This study investigates experts' assessments of the pertinent factors affecting e-business in developing countries from a theory-based national infrastructure perspective. We surveyed experts (business people, academicians, and officials of governmental and non-governmental organizations) in e-business in Latin America (LA) and Sub-Saharan Africa (SSA). Our partial least squares analysis shows that experts believed that policies targeted specifically toward e-business are important in affecting e-business capabilities and in obtaining value from e-business, more so than non-specific general information and communication technologies (ICT) policies, which are not significantly influential. ICT infrastructure generally affects e-business capabilities, though this was not found to be the case in Brazil. Experts believed that national government institutions positively affect e-business value in SSA, but not in LA. Experts did not believe that commercial infrastructure significantly affects e-business value. This study theoretically and empirically distinguishes between two different dimensions of e-business outcomes: specific capabilities and value derived from e-business. It operationalizes the effects of national government institutions and commercial infrastructure on e-business outcomes and empirically tests for their effects. The study provides empirical support for conceptual arguments for the need of ICT policies specific to the needs of e-business. Journal: European Journal of Information Systems Pages: 5-20 Issue: 1 Volume: 19 Year: 2010 Month: 2 X-DOI: 10.1057/ejis.2009.48 File-URL: http://hdl.handle.net/10.1057/ejis.2009.48 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:1:p:5-20 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934104_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Liqiong Deng Author-X-Name-First: Liqiong Author-X-Name-Last: Deng Author-Name: Douglas E Turner Author-X-Name-First: Douglas E Author-X-Name-Last: Turner Author-Name: Robert Gehling Author-X-Name-First: Robert Author-X-Name-Last: Gehling Author-Name: Brad Prince Author-X-Name-First: Brad Author-X-Name-Last: Prince Title: User experience, satisfaction, and continual usage intention of IT Abstract: The purpose of this paper is to develop and test a research model that investigates the effects of user experience with information technology (IT) on user satisfaction with and continual usage intention of the technology. The research model uses the concept of cognitive absorption (CA) to conceptualize the optimal holistic experience that users feel when using IT. A set of hypotheses are proposed regarding the direct and indirect effects of CA on user satisfaction through the perceived utilitarian and hedonic performance and expectation disconfirmation of IT. An online survey was conducted to test the model and its associated hypotheses. The results provided support for the hypothesized effects of CA and indicated its importance for the formation of post-adoption satisfaction and continuance intention with IT. Journal: European Journal of Information Systems Pages: 60-75 Issue: 1 Volume: 19 Year: 2010 Month: 2 X-DOI: 10.1057/ejis.2009.50 File-URL: http://hdl.handle.net/10.1057/ejis.2009.50 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:1:p:60-75 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934105_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Philip Seltsikas Author-X-Name-First: Philip Author-X-Name-Last: Seltsikas Author-Name: Robert M O'Keefe Author-X-Name-First: Robert M Author-X-Name-Last: O'Keefe Title: Expectations and outcomes in electronic identity management: the role of trust and public value Abstract: This paper is concerned with the issues facing stakeholders attempting to develop, implement and maintain electronic identity management (IdM) systems in government. It argues that perceptions of electronic IdM vary, and thus a single conceptualisation of the concept is difficult. Using data collected from stakeholders in 17 European countries, Canada, New Zealand and the U.S.A. from 2003 through 2007, a qualitative analysis identifies 10 dominant stakeholder areas of concern which we term ‘themes’. These are then mapped onto a framework of public value due to Grimsley and Meehan which relates services to outcomes and the development of trust. We conclude by questioning the conceptualisation of trust within the context of IdM, and suggesting that considering trust as the mitigation of relational risk is more appropriate. We also consider the usefulness of public value as a notion for informing IdM and highlight the lack of national differences in our diverse data set. Journal: European Journal of Information Systems Pages: 93-103 Issue: 1 Volume: 19 Year: 2010 Month: 2 X-DOI: 10.1057/ejis.2009.51 File-URL: http://hdl.handle.net/10.1057/ejis.2009.51 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:1:p:93-103 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934106_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Michele Zappavigna Author-X-Name-First: Michele Author-X-Name-Last: Zappavigna Author-Name: Jon Patrick Author-X-Name-First: Jon Author-X-Name-Last: Patrick Title: Eliciting tacit knowledge about requirement analysis with a Grammar-targeted Interview Method (GIM) Abstract: The assumption that tacit knowledge cannot be articulated remains dominant in knowledge elicitation. This paper, however, claims that linguistic theory does not support such a position and that language should not be factored out of accounts of tacit knowledge. We argue that Polanyi's (1966, p. 4) widely cited notion that ‘we know more than we can tell’ uses a folk model of language. This model does not acknowledge the linguistic patterns that competent language speakers deploy without direct awareness. This paper draws upon Systemic Functional Linguistics (SFL) to propose a Grammar-targeted Interview Method (GIM). The GIM uses SFL to unpack linguistic patterning, which we refer to as ‘under-representation’, to reveal tacit assumptions. It is a strategy that can be applied within a traditional interview method when the interviewer feels that there is confusion resulting from assumptions, such as those often embedded in terminology, that have not been directly expressed. This paper reports findings from an empirical study of tacit knowledge about requirements analysis in a Content Management System redevelopment. We compared the GIM with a Content-motivated Interview Method (CMIM) and show that, when the GIM is used, interviewees respond with less nominalised talk, that is the less nominalised content has more meaning unpacked as verbs and agents rather than hidden tacitly in nouns. Journal: European Journal of Information Systems Pages: 49-59 Issue: 1 Volume: 19 Year: 2010 Month: 2 X-DOI: 10.1057/ejis.2010.1 File-URL: http://hdl.handle.net/10.1057/ejis.2010.1 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:1:p:49-59 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934107_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Richard Baskerville Author-X-Name-First: Richard Author-X-Name-Last: Baskerville Title: Third-degree conflicts: information warfare Journal: European Journal of Information Systems Pages: 1-4 Issue: 1 Volume: 19 Year: 2010 Month: 2 X-DOI: 10.1057/ejis.2010.2 File-URL: http://hdl.handle.net/10.1057/ejis.2010.2 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:1:p:1-4 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934108_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Federico Iannacci Author-X-Name-First: Federico Author-X-Name-Last: Iannacci Title: When is an information infrastructure? Investigating the emergence of public sector information infrastructures Abstract: Drawing on the notion of information infrastructure as a relational concept, this paper endeavours to highlight the links between data standards and institutional facts. Although social science studies have emphasised the interplay between socio-technical factors, the author suggests that such approaches have overlooked the role that institutional facts play in the development of information infrastructures. An in-depth, qualitative case study of a recent episode of institutional change within the criminal justice system of England and Wales reveals how institutional facts are entangled with data standards through iterative sets of constitutive rules that are mirrored by their associated logical messages in an isomorphic fashion. Journal: European Journal of Information Systems Pages: 35-48 Issue: 1 Volume: 19 Year: 2010 Month: 2 X-DOI: 10.1057/ejis.2010.3 File-URL: http://hdl.handle.net/10.1057/ejis.2010.3 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:1:p:35-48 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934109_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jan Recker Author-X-Name-First: Jan Author-X-Name-Last: Recker Title: Continued use of process modeling grammars: the impact of individual difference factors Abstract: Process modeling grammars are used by analysts to describe information systems domains in terms of the business operations an organization is conducting. While prior research has examined the factors that lead to continued usage behavior, little knowledge has been established as to what extent characteristics of the users of process modeling grammars inform usage behavior. In this study, a theoretical model is advanced that incorporates determinants of continued usage behavior as well as key antecedent individual difference factors of the grammar users, such as modeling experience, modeling background and perceived grammar familiarity. Findings from a global survey of 529 grammar users support the hypothesized relationships of the model. The study offers three central contributions. First, it provides a validated theoretical model of post-adoptive modeling grammar usage intentions. Second, it discusses the effects of individual difference factors of grammar users in the context of modeling grammar usage. Third, it provides implications for research and practice. Journal: European Journal of Information Systems Pages: 76-92 Issue: 1 Volume: 19 Year: 2010 Month: 2 X-DOI: 10.1057/ejis.2010.5 File-URL: http://hdl.handle.net/10.1057/ejis.2010.5 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:1:p:76-92 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934061_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Liisa Myyry Author-X-Name-First: Liisa Author-X-Name-Last: Myyry Author-Name: Mikko Siponen Author-X-Name-First: Mikko Author-X-Name-Last: Siponen Author-Name: Seppo Pahnila Author-X-Name-First: Seppo Author-X-Name-Last: Pahnila Author-Name: Tero Vartiainen Author-X-Name-First: Tero Author-X-Name-Last: Vartiainen Author-Name: Anthony Vance Author-X-Name-First: Anthony Author-X-Name-Last: Vance Title: What levels of moral reasoning and values explain adherence to information security rules? An empirical study Abstract: It is widely agreed that employee non-adherence to information security policies poses a major problem for organizations. Previous research has pointed to the potential of theories of moral reasoning to better understand this problem. However, we find no empirical studies that examine the influence of moral reasoning on compliance with information security policies. We address this research gap by proposing a theoretical model that explains non-compliance in terms of moral reasoning and values. The model integrates two well-known psychological theories: the Theory of Cognitive Moral Development by Kohlberg and the Theory of Motivational Types of Values by Schwartz. Our empirical findings largely support the proposed model and suggest implications for practice and research on how to improve information security policy compliance. Journal: European Journal of Information Systems Pages: 126-139 Issue: 2 Volume: 18 Year: 2009 Month: 4 X-DOI: 10.1057/ejis.2009.10 File-URL: http://hdl.handle.net/10.1057/ejis.2009.10 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:2:p:126-139 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934062_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Younghwa Lee Author-X-Name-First: Younghwa Author-X-Name-Last: Lee Author-Name: Kai R Larsen Author-X-Name-First: Kai R Author-X-Name-Last: Larsen Title: Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software Abstract: This study presents an empirical investigation of factors affecting small- and medium-sized business (SMB) executives’ decision to adopt anti-malware software for their organizations. A research model was developed by adopting and expanding the protection motivation theory from health psychology, which has successfully been used to investigate the effect of threat and coping appraisal on protective actions. A questionnaire-based field survey with 239 U.S. SMB executives was conducted, and the data were analyzed using partial least squares (PLS). This study demonstrates that threat and coping appraisal successfully predict SMB executives’ anti-malware software adoption intention, leading to SMB adoption. In addition, considerable variance in adoption intention and actual SMB adoption is addressed by social influence from key stakeholders and situation-specific variables, such as IT budget and vendor support. Further, the generalizability of the model was tested using industry type and IS expertise. The adoption intention of IS experts and IT intensive industries was mainly affected by threat appraisal and social influence, while that of non-IS experts and non-IT intensive industries was significantly influenced by coping appraisal and IT budget. Vendor support was a key facilitator of the anti-malware adoption for IS experts and IT intensive industry groups, while IT budget was for non-IS expert and non-IT intensive industry groups. Key implications for theory and practice are discussed. Journal: European Journal of Information Systems Pages: 177-187 Issue: 2 Volume: 18 Year: 2009 Month: 4 X-DOI: 10.1057/ejis.2009.11 File-URL: http://hdl.handle.net/10.1057/ejis.2009.11 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:2:p:177-187 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934063_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Merrill Warkentin Author-X-Name-First: Merrill Author-X-Name-Last: Warkentin Author-Name: Robert Willison Author-X-Name-First: Robert Author-X-Name-Last: Willison Title: Behavioral and policy issues in information systems security: the insider threat Journal: European Journal of Information Systems Pages: 101-105 Issue: 2 Volume: 18 Year: 2009 Month: 4 X-DOI: 10.1057/ejis.2009.12 File-URL: http://hdl.handle.net/10.1057/ejis.2009.12 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:2:p:101-105 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934064_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Tejaswini Herath Author-X-Name-First: Tejaswini Author-X-Name-Last: Herath Author-Name: H Raghav Rao Author-X-Name-First: H Raghav Author-X-Name-Last: Rao Title: Protection motivation and deterrence: a framework for security policy compliance in organisations Abstract: Enterprises establish computer security policies to ensure the security of information resources; however, if employees and end-users of organisational information systems (IS) are not keen or are unwilling to follow security policies, then these efforts are in vain. Our study is informed by the literature on IS adoption, protection-motivation theory, deterrence theory, and organisational behaviour, and is motivated by the fundamental premise that the adoption of information security practices and policies is affected by organisational, environmental, and behavioural factors. We develop an Integrated Protection Motivation and Deterrence model of security policy compliance under the umbrella of Taylor-Todd's Decomposed Theory of Planned Behaviour. Furthermore, we evaluate the effect of organisational commitment on employee security compliance intentions. Finally, we empirically test the theoretical model with a data set representing the survey responses of 312 employees from 78 organisations. Our results suggest that (a) threat perceptions about the severity of breaches and response perceptions of response efficacy, self-efficacy, and response costs are likely to affect policy attitudes; (b) organisational commitment and social influence have a significant impact on compliance intentions; and (c) resource availability is a significant factor in enhancing self-efficacy, which in turn, is a significant predictor of policy compliance intentions. We find that employees in our sample underestimate the probability of security breaches. Journal: European Journal of Information Systems Pages: 106-125 Issue: 2 Volume: 18 Year: 2009 Month: 4 X-DOI: 10.1057/ejis.2009.6 File-URL: http://hdl.handle.net/10.1057/ejis.2009.6 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:2:p:106-125 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934065_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Carol W Hsu Author-X-Name-First: Carol W Author-X-Name-Last: Hsu Title: Frame misalignment: interpreting the implementation of information systems security certification in an organization Abstract: Although several studies have discussed the framework and value of information systems (IS) security standards and certification, there has been relatively little empirical research on how different groups of stakeholders in an organization interpret and behave during the implementation process. In an attempt to fill this research gap, this study employs a socio-cognitive perspective, namely the concept of frames analysis, to investigate how the managers and employees of a financial institution make sense of IS security certification, BS 7799 Part 2, and how these interpretations influence their actions. Using an interpretive case study approach, the findings show that the expectations of management have a strong impact on the implementation of the certification process. Moreover, the incongruence between the perceptions of managers and those of the certification team and other employees means that IS security management concepts may not be fully embedded in the organization's work practices and routines. This article argues that during the certification process, managers should place more emphasis on the identification of frame incongruence and undertake early intervention to align frames in order to achieve overall security effectiveness in the organization. Journal: European Journal of Information Systems Pages: 140-150 Issue: 2 Volume: 18 Year: 2009 Month: 4 X-DOI: 10.1057/ejis.2009.7 File-URL: http://hdl.handle.net/10.1057/ejis.2009.7 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:2:p:140-150 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934066_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Scott R Boss Author-X-Name-First: Scott R Author-X-Name-Last: Boss Author-Name: Laurie J Kirsch Author-X-Name-First: Laurie J Author-X-Name-Last: Kirsch Author-Name: Ingo Angermeier Author-X-Name-First: Ingo Author-X-Name-Last: Angermeier Author-Name: Raymond A Shingler Author-X-Name-First: Raymond A Author-X-Name-Last: Shingler Author-Name: R Wayne Boss Author-X-Name-First: R Wayne Author-X-Name-Last: Boss Title: If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security Abstract: Information security has become increasingly important to organizations. Despite the prevalence of technical security measures, individual employees remain the key link – and frequently the weakest link – in corporate defenses. When individuals choose to disregard security policies and procedures, the organization is at risk. How, then, can organizations motivate their employees to follow security guidelines? Using an organizational control lens, we build a model to explain individual information security precaution-taking behavior. Specific hypotheses are developed and tested using a field survey. We examine elements of control and introduce the concept of ‘mandatoriness,’ which we define as the degree to which individuals perceive that compliance with existing security policies and procedures is compulsory or expected by organizational management. We find that the acts of specifying policies and evaluating behaviors are effective in convincing individuals that security policies are mandatory. The perception of mandatoriness is effective in motivating individuals to take security precautions, thus if individuals believe that management watches, they will comply. Journal: European Journal of Information Systems Pages: 151-164 Issue: 2 Volume: 18 Year: 2009 Month: 4 X-DOI: 10.1057/ejis.2009.8 File-URL: http://hdl.handle.net/10.1057/ejis.2009.8 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:2:p:151-164 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934067_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jie Zhang Author-X-Name-First: Jie Author-X-Name-Last: Zhang Author-Name: Xin Luo Author-X-Name-First: Xin Author-X-Name-Last: Luo Author-Name: Somasheker Akkaladevi Author-X-Name-First: Somasheker Author-X-Name-Last: Akkaladevi Author-Name: Jennifer Ziegelmayer Author-X-Name-First: Jennifer Author-X-Name-Last: Ziegelmayer Title: Improving multiple-password recall: an empirical study Abstract: As one of the most common authentication methods, passwords help secure information by granting access only to authorized parties. To be effective, passwords should be strong, secret, and memorable. While password strength can be enforced by automated information technology policies, users frequently jeopardize secrecy to improve memorability. The password memorability problem is exacerbated by the number of different passwords a user is required to remember. While short-term memory theories have been applied to individual-password management problems, the relationship between memory and the multiple-password problem has not been examined. This paper treats the multiple-password management crisis as a search and retrieval problem involving human beings’ long-term memory. We propose that interference between different passwords is one of the major challenges to multiple-password recall and that interference alleviation methods can significantly improve multiple-password recall. A lab experiment was conducted to examine the effectiveness of two interference alleviation methods: the list reduction method and the unique identifier method. While both methods improve multiple-password recall performance, the list reduction method leads to statistically significant improvement. The results demonstrate the potential merit of practices targeting multiple-password interference. By introducing long-term memory theory to multiple-password memorability issues, this study presents implications benefiting users and serves as the potential starting point for future research. Journal: European Journal of Information Systems Pages: 165-176 Issue: 2 Volume: 18 Year: 2009 Month: 4 X-DOI: 10.1057/ejis.2009.9 File-URL: http://hdl.handle.net/10.1057/ejis.2009.9 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:2:p:165-176 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933746_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Susan J Winter Author-X-Name-First: Susan J Author-X-Name-Last: Winter Author-Name: Carol Saunders Author-X-Name-First: Carol Author-X-Name-Last: Saunders Author-Name: Paul Hart Author-X-Name-First: Paul Author-X-Name-Last: Hart Title: Electronic window dressing: impression management with Websites Abstract: Businesses have embraced the Internet to reap economic advantages through the use of Websites. Most Website design guidelines fail to address issues of branding and identity formation, focusing instead on concerns adapted from previous technologies. However, many firms are not getting their desired results from the Website investments they have made following design guidelines reflecting graphic layout and system usability issues. We suggest that Websites should be considered ‘electronic storefronts’ or public work areas providing frames of symbolic representations that create impressions of their sponsoring firms. Our exploratory study shows that Websites influence potential customers' impressions of firms' legitimacy, innovation and caring, and that these impressions vary significantly across firms and industries. Website visitors encounter symbols that are compared to mental models stored in memory and used to form impressions of the site and to draw inferences about the firm. These inferences have previously been found to influence purchasing behavior. Designers should be cognizant of these aspects of e-Business and executives should recognize the power of Web-based impression management. Identity management must take center stage in creating a Web presence. Journal: European Journal of Information Systems Pages: 309-322 Issue: 4 Volume: 12 Year: 2003 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000470 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000470 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:4:p:309-322 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933747_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Kevin Zhu Author-X-Name-First: Kevin Author-X-Name-Last: Zhu Author-Name: Kenneth Kraemer Author-X-Name-First: Kenneth Author-X-Name-Last: Kraemer Author-Name: Sean Xu Author-X-Name-First: Sean Author-X-Name-Last: Xu Title: Electronic business adoption by European firms: a cross-country assessment of the facilitators and inhibitors Abstract: In this study, we developed a conceptual model for studying the adoption of electronic business (e-business or EB) at the firm level, incorporating six adoption facilitators and inhibitors, based on the technology–organization–environment theoretical framework. Survey data from 3100 businesses and 7500 consumers in eight European countries were used to test the proposed adoption model. We conducted confirmatory factor analysis to assess the reliability and validity of constructs. To examine whether adoption patterns differ across different e-business environments, we divided the full sample into high EB-intensity and low EB-intensity countries. After controlling for variations of industry and country effects, the fitted logit models demonstrated four findings: (1) Technology competence, firm scope and size, consumer readiness, and competitive pressure are significant adoption drivers, while lack of trading partner readiness is a significant adoption inhibitor. (2) As EB-intensity increases, two environmental factors – consumer readiness and lack of trading partner readiness – become less important, while competitive pressure remains significant. (3) In high EB-intensity countries, e-business is no longer a phenomenon dominated by large firms; as more and more firms engage in e-business, network effect works to the advantage of small firms. (4) Firms are more cautious in adopting e-business in high EB-intensity countries – it seems to suggest that the more informed firms are less aggressive in adopting e-business, a somehow surprising result. Explanations and implications are offered. Journal: European Journal of Information Systems Pages: 251-268 Issue: 4 Volume: 12 Year: 2003 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000475 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000475 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:4:p:251-268 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933748_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Colin G Ash Author-X-Name-First: Colin G Author-X-Name-Last: Ash Author-Name: Janice M Burn Author-X-Name-First: Janice M Author-X-Name-Last: Burn Title: Assessing the benefits from e-business transformation through effective enterprise management Abstract: This paper reports on research carried out in 1999–2001 on the use of e-business applications in enterprise resource planning (ERP)-based organisations. Multiple structured interviews were used to collect data on 11 established organisations from a diverse range of industries. The findings are analysed according to the level of sophistication of e-business models and their transformational impact on the organisation. Early adopters of e-business show a trend towards cost reductions and administrative efficiencies from e-procurement and self-service applications used by customers and employees. More mature users focus on strategic advantage and generate this through an evolutionary model of organisational change. Two complex case studies of e-business integration with global suppliers and their corporate customers are analysed to identify specific stages of benefits accrual through the e-business transformation process. Collectively, the set of case studies is used to demonstrate the increased benefits derived from an e-business architecture based on a network of ERP-enabled organisations. Journal: European Journal of Information Systems Pages: 297-308 Issue: 4 Volume: 12 Year: 2003 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000476 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000476 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:4:p:297-308 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933749_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Marinos Themistoceleous Author-X-Name-First: Marinos Author-X-Name-Last: Themistoceleous Title: E-business applications: technologies for tomorrow's solutions Journal: European Journal of Information Systems Pages: 323-324 Issue: 4 Volume: 12 Year: 2003 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000477 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000477 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:4:p:323-324 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933750_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Elizabeth M Daniel Author-X-Name-First: Elizabeth M Author-X-Name-Last: Daniel Author-Name: Hugh N Wilson Author-X-Name-First: Hugh N Author-X-Name-Last: Wilson Title: The role of dynamic capabilities in e-business transformation Abstract: The domain of e-business is characterised by rapid change and in such markets managers can no longer rely on the resources that they have assembled to provide their extant competitive position. Instead they must be able to combine resources in new ways, gain additional resources and dispose of superfluous resources, and to do this repeatedly and rapidly if they are to compete successfully. The term ‘dynamic capabilities’ is emerging in the strategic management literature for these skills. This study seeks to identify the dynamic capabilities that are necessary for e-business transformation and to identify practices in developing these capabilities that are both effective and common across companies, and might therefore be considered as ‘best practice’. Eight distinct dynamic capabilities are identified, each appearing to address either innovative or integrative aspects of e-business transformation. Consistent with previous studies of dynamic markets it was found that ‘best practice’ involved simple, experiential and iterative approaches to these necessary capabilities. Journal: European Journal of Information Systems Pages: 282-296 Issue: 4 Volume: 12 Year: 2003 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000478 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000478 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:4:p:282-296 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933751_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Chee Wee Tan Author-X-Name-First: Chee Wee Author-X-Name-Last: Tan Author-Name: Shan L Pan Author-X-Name-First: Shan L Author-X-Name-Last: Pan Title: Managing e-transformation in the public sector: an e-government study of the Inland Revenue Authority of Singapore (IRAS) Abstract: Continuous organizational transformation is becoming a common phenomenon as public agencies rapidly embrace new information technologies (IT) to streamline and re-invent their obsolete operations. However, due to the overwhelming extent of the necessary changes as well as the sheer diversity of stakeholders involved in transforming corporate functions, practitioners are finding it difficult to manage the level of dynamism required in the effort. In an attempt to shed some light on the phenomenon of managing e-transformation, this paper examines in-depth an e-government initiative. Through the study of how one organization in the public sector adapts to the dynamic customer relations brought about by e-transformation, the case serves to identify the governing factors for successful organization–stakeholder relations, and how these may have a bearing on the development of effective e-transformation strategies. An important contribution of this study is the proposal of a development model of relationships in organizations for an understanding into how organization–stakeholder relationships can be efficiently managed to bring about an effective overhaul of business processes. Journal: European Journal of Information Systems Pages: 269-281 Issue: 4 Volume: 12 Year: 2003 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000479 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000479 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:4:p:269-281 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933752_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ali Farhoomand Author-X-Name-First: Ali Author-X-Name-Last: Farhoomand Author-Name: Rolf Wigand Author-X-Name-First: Rolf Author-X-Name-Last: Wigand Title: Special section on managing e-business transformation Journal: European Journal of Information Systems Pages: 249-250 Issue: 4 Volume: 12 Year: 2003 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000481 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000481 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:4:p:249-250 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934360_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Anol Bhattacherjee Author-X-Name-First: Anol Author-X-Name-Last: Bhattacherjee Author-Name: Chieh-Peng Lin Author-X-Name-First: Chieh-Peng Author-X-Name-Last: Lin Title: A unified model of IT continuance: three complementary perspectives and crossover effects Abstract: This study presents a unified model of information technology (IT) continuance, by drawing upon three alternative influences that are presumed to shape continuance behavior: reasoned action, experiential response, and habitual response. Using a longitudinal survey of workplace IT continuance among insurance agents at a large insurance company in Taiwan, we demonstrate that the above influences are interdependent, complementary, and have crossover effects. This study advances IT continuance research by theorizing and validating a unifying model that extends prior perspectives and by explaining interrelationships between these perspectives. Journal: European Journal of Information Systems Pages: 364-373 Issue: 4 Volume: 24 Year: 2015 Month: 7 X-DOI: 10.1057/ejis.2013.36 File-URL: http://hdl.handle.net/10.1057/ejis.2013.36 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:4:p:364-373 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934361_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Tim Barnett Author-X-Name-First: Tim Author-X-Name-Last: Barnett Author-Name: Allison W Pearson Author-X-Name-First: Allison W Author-X-Name-Last: Pearson Author-Name: Rodney Pearson Author-X-Name-First: Rodney Author-X-Name-Last: Pearson Author-Name: Franz W Kellermanns Author-X-Name-First: Franz W Author-X-Name-Last: Kellermanns Title: Five-factor model personality traits as predictors of perceived and actual usage of technology Abstract: Understanding the adoption and use of technology is extremely important in the field of information systems. Not surprisingly, there are several conceptual models that attempt to explain how and why individuals use technology. Until recently, however, the role of personality in general, and the five-factor model (FFM) of personality in particular, had remained largely unexplored. Our study takes an interactional psychology perspective, linking components of the FFM to the use of technology within the conceptual framework of the Unified Theory of Acceptance and Use of Technology (UTAUT). After empirically confirming previous research findings linking performance expectancy, effort expectancy, and social influence to technology use, we test direct relationships between FFM personality traits and technology use in the context of a web-based classroom technological system, utilizing measures of perceived and actual use of technology. Consistent with expectations, conscientiousness and neuroticism are associated with perceived and actual use of technology, with conscientiousness demonstrating a positive association with both perceived and actual use and neuroticism, a negative association. Extraversion was also significantly associated with actual use, although not in the positive direction expected. Further, the significant relationships between the personality traits and the actual use of technology were direct and not mediated by expressed intentions to use the system. Journal: European Journal of Information Systems Pages: 374-390 Issue: 4 Volume: 24 Year: 2015 Month: 7 X-DOI: 10.1057/ejis.2014.10 File-URL: http://hdl.handle.net/10.1057/ejis.2014.10 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:4:p:374-390 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934362_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ofir Turel Author-X-Name-First: Ofir Author-X-Name-Last: Turel Title: Quitting the use of a habituated hedonic information system: a theoretical model and empirical examination of Facebook users Abstract: Much research has been devoted to the early adoption and the continued and habituated use of information systems (IS). Nevertheless, less is known about quitting the use of IS by individuals, especially in habituated hedonic settings, that is, IS discontinuance. This study focuses on this phenomenon, and argues that in hedonic IS use contexts (1) IS continuance and discontinuance can be considered simultaneously yet independently by current users, and that (2) IS continuance and discontinuance drivers can have differential effects on the respective behavioral intentions. Specifically, social cognitive theory is used to point to key unique drivers of website discontinuance intentions: guilt feelings regarding the use of the website and website-specific discontinuance self-efficacy, which counterbalance the effects of continuance drivers: habit and satisfaction. The distinctiveness of continuance and discontinuance intentions and their respective nomological networks, as well as the proposed research model, were then empirically validated in a study of 510 Facebook users. The findings indicate that satisfaction reduces discontinuance intentions directly and indirectly through habit formation. However, habit can also facilitate the development of ‘addiction’ to the use of the website, which produces guilt feelings and reduces one’s self-efficacy to quit using the website. These factors, in turn, drive discontinuance intentions and possibly the quitting of the use of the website. Journal: European Journal of Information Systems Pages: 431-446 Issue: 4 Volume: 24 Year: 2015 Month: 7 X-DOI: 10.1057/ejis.2014.19 File-URL: http://hdl.handle.net/10.1057/ejis.2014.19 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:4:p:431-446 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934363_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Tao Hu Author-X-Name-First: Tao Author-X-Name-Last: Hu Author-Name: William J Kettinger Author-X-Name-First: William J Author-X-Name-Last: Kettinger Author-Name: Robin S Poston Author-X-Name-First: Robin S Author-X-Name-Last: Poston Title: The effect of online social value on satisfaction and continued use of social media Abstract: Social media offers customers a unique service value proposition. Recognizing service value as a pivotal concept, this study develops an aggregate construct of online social value, whereby customers evaluate utilitarian and hedonic benefits relative to what they must sacrifice in effort and risk in deriving a value calculation of online social networking services which predicts satisfaction and continued use of online social media, such as Facebook. By empirically testing a model that explains online social value, this research contributes to information systems (IS) theory by introducing a customer value perspective in the social media context and helps service providers by identifying factors predicting satisfaction and continued use that might be employed to improve offerings to keep customers coming back. Journal: European Journal of Information Systems Pages: 391-410 Issue: 4 Volume: 24 Year: 2015 Month: 7 X-DOI: 10.1057/ejis.2014.22 File-URL: http://hdl.handle.net/10.1057/ejis.2014.22 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:4:p:391-410 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934364_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Chao-Min Chiu Author-X-Name-First: Chao-Min Author-X-Name-Last: Chiu Author-Name: Hsin-Yi Huang Author-X-Name-First: Hsin-Yi Author-X-Name-Last: Huang Title: Examining the antecedents of user gratification and its effects on individuals’ social network services usage: the moderating role of habit Abstract: User loyalty or continued use is critical to the survival and development of any website. Focusing on the social network services (SNSs) context, this study proposes a research model for investigating individuals’ use motivations and the moderating role of habit with regard to gratification and continuance intention. This research integrates two influential media communication theories, media system dependency (MSD) and uses and gratifications, to examine SNSs-related behaviors. To comprehend online users’ motivations in depth, three motivations derived from MSD (understanding, orientation and play dependency relations) are operationalized as reflective, second-order constructs. The three motivations are theorized to affect parasocial interaction positively, and parasocial interaction is hypothesized to positively affect the gratification that individuals derive from SNSs usage. Furthermore, this study hypothesizes that gratification positively affects individuals’ continuance intention. Finally, we theorize that habit moderates the impact of gratification on continuance intention. Data collected from 657 Facebook users provide strong support for all six hypotheses. The results indicate that individuals’ motivations (i.e., the understanding, orientation and play dependency relations) positively affect parasocial interaction, which in turn has a positive effect on gratification, and subsequently continuance intention. In addition, the results show that habit has a small but negative moderating effect on the relationship between gratification and continuance intention. Implications for theory and practice are discussed, and suggestions are made for future research. Journal: European Journal of Information Systems Pages: 411-430 Issue: 4 Volume: 24 Year: 2015 Month: 7 X-DOI: 10.1057/ejis.2014.9 File-URL: http://hdl.handle.net/10.1057/ejis.2014.9 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:4:p:411-430 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934365_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Dov Te'eni Author-X-Name-First: Dov Author-X-Name-Last: Te'eni Title: Current issue and future submissions, contextualized Journal: European Journal of Information Systems Pages: 361-363 Issue: 4 Volume: 24 Year: 2015 Month: 7 X-DOI: 10.1057/ejis.2015.8 File-URL: http://hdl.handle.net/10.1057/ejis.2015.8 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:4:p:361-363 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934180_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Dubravka Cecez-Kecmanovic Author-X-Name-First: Dubravka Author-X-Name-Last: Cecez-Kecmanovic Title: Doing critical information systems research – arguments for a critical research methodology Abstract: Critical information systems (IS) research, it is argued, does not have a distinct methodological identity. While some research methods are closely related to the positivist research paradigm (experiments, surveys, and structural equation modelling) and others to the interpretivist paradigm (field study, ethnography, and action research), the critical paradigm is not identified with specific ‘critical methods’ and typically relies on the appropriation of interpretivist methods (such as critical ethnography). The criticism of the critical research paradigm in IS has often focused on the lack of distinctly critical research methods and even the neglect of methodological issues (Klein; McGrath). This paper questions the notion of and the arguments behind the quest for ‘critical research methods’ defined in contrast to positivist and interpretivist methods. Instead, the paper argues that it is a critical research methodology – understood as an overall strategy of conceptualizing and conducting an inquiry, engaging with studied phenomena, and constructing and justifying socially relevant knowledge, which distinguishes critical from other research paradigms. Building on a Kleinian argument regarding the need for common principles across diverse critical IS inquiries (Klein; Myers & Klein) this paper proposes a framework that describes key dimensions of a critical research methodology that distinguish critical from other research paradigms and provide methodological guidance in the doing of critical research. Journal: European Journal of Information Systems Pages: 440-455 Issue: 4 Volume: 20 Year: 2011 Month: 7 X-DOI: 10.1057/ejis.2010.67 File-URL: http://hdl.handle.net/10.1057/ejis.2010.67 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:4:p:440-455 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934181_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: François-Xavier de Vaujany Author-X-Name-First: François-Xavier Author-X-Name-Last: de Vaujany Author-Name: Isabelle Walsh Author-X-Name-First: Isabelle Author-X-Name-Last: Walsh Author-Name: Nathalie Mitev Author-X-Name-First: Nathalie Author-X-Name-Last: Mitev Title: An historically grounded critical analysis of research articles in IS Abstract: In order to explore scientific writing in Information Systems (IS) journals, we adopt a combination of historical and rhetorical approaches. We first investigate the history of universities, business schools, learned societies and scientific articles. This perspective allows us to capture the legacy of scientific writing standards, which emerged in the 18th and 19th centuries. Then, we focus on two leading IS journals (EJIS and MISQ). An historical analysis of both outlets is carried out, based on data related to their creation, evolution of editorial statements, and key epistemological and methodological aspects. We also focus on argumentative strategies found in a sample of 436 abstracts from both journals. Three main logical anchorages (sometimes combined) are identified, and related to three argumentative strategies: ‘deepening of knowledge’, ‘solving an enigma’ and ‘addressing a practical managerial issue’. We relate these writing norms to historical imprints of management and business studies, in particular: enigma-focused rhetorics, interest in institutionalized literature, neglect for managerially grounded rhetoric and lack of reflexivity in scientific writing. We explain this relation as a quest for academic legitimacy. Lastly, some suggestions are offered to address the discrepancies between these writing norms and more recent epistemological and theoretical stances adopted by IS researchers. Journal: European Journal of Information Systems Pages: 395-417 Issue: 4 Volume: 20 Year: 2011 Month: 7 X-DOI: 10.1057/ejis.2011.13 File-URL: http://hdl.handle.net/10.1057/ejis.2011.13 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:4:p:395-417 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934182_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Rudy Hirschheim Author-X-Name-First: Rudy Author-X-Name-Last: Hirschheim Author-Name: Kalle Lyytinen Author-X-Name-First: Kalle Author-X-Name-Last: Lyytinen Author-Name: Michael D Myers Author-X-Name-First: Michael D Author-X-Name-Last: Myers Title: Special issue on the Kleinian approach to information system research – foreword Journal: European Journal of Information Systems Pages: 418-421 Issue: 4 Volume: 20 Year: 2011 Month: 7 X-DOI: 10.1057/ejis.2011.15 File-URL: http://hdl.handle.net/10.1057/ejis.2011.15 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:4:p:418-421 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934183_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Duane Truex Author-X-Name-First: Duane Author-X-Name-Last: Truex Author-Name: Michael Cuellar Author-X-Name-First: Michael Author-X-Name-Last: Cuellar Author-Name: Hirotoshi Takeda Author-X-Name-First: Hirotoshi Author-X-Name-Last: Takeda Author-Name: Richard Vidgen Author-X-Name-First: Richard Author-X-Name-Last: Vidgen Title: The scholarly influence of Heinz Klein: ideational and social measures of his impact on IS research and IS scholars Abstract: Heinz Klein was a fine scholar and mentor whose work and life have inspired us to explore the notion of ‘scholarly influence’ which we cast as ‘ideational’ and ‘social influence’. We adopt a portfolio of measures approach, using the Hirsch family of statistics to assess ideational influence and Social Network Analysis centrality measures for social influence to profile Heinz Klein's contribution to information systems (IS) research. The results show that Heinz was highly influential in both ideational terms (a significant body of citations) and social terms (he is close to the heart of the IS research community). Reflecting on the major research themes and scholarly values espoused by Klein we define a ‘Kleinian view of IS research’, grounded in Habermas’ Theory of Communicative Action, and use that to frame four affirmative propositions to address what we observe to be a distortion and attenuation of the academic discourse on the evaluation of scholarly production. This paper argues that focus should be shifted from the venue of publication of the research to the uptake of the ideas contained in it, thus increasing the openness of the discourse, participation in the discourse, truthfulness, and reduction of the inequities in power distribution within academia. Journal: European Journal of Information Systems Pages: 422-439 Issue: 4 Volume: 20 Year: 2011 Month: 7 X-DOI: 10.1057/ejis.2011.16 File-URL: http://hdl.handle.net/10.1057/ejis.2011.16 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:4:p:422-439 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934184_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Andrew Basden Author-X-Name-First: Andrew Author-X-Name-Last: Basden Title: Enabling a Kleinian integration of interpretivist and socio-critical IS research: the contribution of Dooyeweerd's philosophy Abstract: This paper suggests how interpretivist, socio-critical and positivist approaches in information systems (IS) research might be integrated. Heinz Klein's approach to IS was a significant advance on earlier ones, bringing together a number of issues discussed in interpretivist and socio-critical circles, with philosophical groundings. He believed IS research would benefit from integration of interpretivist and socio-critical approaches, but found no philosophical grounding for this. Interpretivism's reluctance to consider normativity might be a ‘Trojan horse’ that undermines integration. This paper employs Dooyeweerd's philosophy to expose and expel the Trojan horse and sketch how a philosophically grounded integration of interpretivist, socio-critical and even positivist approaches might proceed. Journal: European Journal of Information Systems Pages: 477-489 Issue: 4 Volume: 20 Year: 2011 Month: 7 X-DOI: 10.1057/ejis.2011.18 File-URL: http://hdl.handle.net/10.1057/ejis.2011.18 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:4:p:477-489 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934185_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Nik R Hassan Author-X-Name-First: Nik R Author-X-Name-Last: Hassan Title: Is information systems a discipline? Foucauldian and Toulminian insights Abstract: Following the Kleinian spirit, this study takes a critical view of the existing orthodoxy within information systems (IS) and reframes the ongoing discussion concerning the intellectual core, identity and disciplinary status of IS using the disciplinary analysis of Michel Foucault and Stephen Toulmin. Instead of limiting the discussion to specific paradigms, topics, subjects or content, it focuses on the characteristics, rules and goals of IS as an academic field. A disciplinary lens is used to frame what it means to be a field, discipline and science, and in the process the study uncovers four doxas that have shaped the development of the IS field: (1) the IS research community sees no difference between fields, disciplines or sciences; (2) IT changes so rapidly, and thus the IS field needs to change to remain relevant; (3) disciplines are by definition rigid, inflexible and uni-theoretical and (4) because IS is pluralistic, IS should not become a discipline. This study's analyses of the IS field's discursive formation and intellectual ideals offer novel perspectives that allow for the integration of the IS field's plurality and diversity. To transform the IS field from its multimodal existence into a vibrant, diverse, academically and socially relevant and influential discipline, the study proposes actionable strategies that include (1) agreeing on the intellectual ideals for IS, (2) focusing on conceptual formation, (3) focusing on theory construction, (4) erecting genealogical boundaries and (5) fostering the development of professional bodies. Journal: European Journal of Information Systems Pages: 456-476 Issue: 4 Volume: 20 Year: 2011 Month: 7 X-DOI: 10.1057/ejis.2011.2 File-URL: http://hdl.handle.net/10.1057/ejis.2011.2 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:4:p:456-476 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934186_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bernd Carsten Stahl Author-X-Name-First: Bernd Carsten Author-X-Name-Last: Stahl Author-Name: Monica Chiarini Tremblay Author-X-Name-First: Monica Chiarini Author-X-Name-Last: Tremblay Author-Name: Cynthia M LeRouge Author-X-Name-First: Cynthia M Author-X-Name-Last: LeRouge Title: Focus groups and critical social IS research: how the choice of method can promote emancipation of respondents and researchers Abstract: Critical social research in information systems has been gaining prominence for some time and is increasingly viewed as a valid research approach. One problem with the critical tradition is a lack of empirical research. A contributing factor to this gap in the literature is the lack of agreement on what constitutes appropriate methodologies for critical research. The present paper contributes to this debate by exploring the role that focus group research can play in the critical approach. This paper outlines the main characteristics of critical research with an emphasis on its emancipatory faculties. It then reviews the focus group method from the perspective of critical approach and provides a critical account of two research projects that used focus groups as a method of data collection. The paper presents the argument that focus groups, if designed and executed in light of a critical approach, can contribute to the emancipation of researchers and respondents. This argument is built upon the critical theories of the two most influential theorists in critical social information systems research, namely Jürgen Habermas and Michel Foucault. Critically oriented focus groups have the potential to improve communication and move real discourses closer to Habermas's ideal speech situation. At the same time, they can contribute to challenging the prevailing orthodoxy and thereby overcome established regimes of truth in the Foucauldian tradition. The paper ends by developing a set of guiding questions that provide a means for researchers to ensure that the emancipatory potential of focus group research can be achieved. Journal: European Journal of Information Systems Pages: 378-394 Issue: 4 Volume: 20 Year: 2011 Month: 7 X-DOI: 10.1057/ejis.2011.21 File-URL: http://hdl.handle.net/10.1057/ejis.2011.21 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:4:p:378-394 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934187_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Richard Baskerville Author-X-Name-First: Richard Author-X-Name-Last: Baskerville Title: Information design Journal: European Journal of Information Systems Pages: 375-377 Issue: 4 Volume: 20 Year: 2011 Month: 7 X-DOI: 10.1057/ejis.2011.22 File-URL: http://hdl.handle.net/10.1057/ejis.2011.22 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:4:p:375-377 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1429370_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Pär J. Ågerfalk Author-X-Name-First: Pär J. Author-X-Name-Last: Ågerfalk Title: Going through changes Journal: European Journal of Information Systems Pages: 1-2 Issue: 1 Volume: 27 Year: 2018 Month: 1 X-DOI: 10.1080/0960085X.2018.1429370 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1429370 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:1:p:1-2 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1386833_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Nicole Forsgren Author-X-Name-First: Nicole Author-X-Name-Last: Forsgren Author-Name: Rajiv Sabherwal Author-X-Name-First: Rajiv Author-X-Name-Last: Sabherwal Author-Name: Alexandra Durcikova Author-X-Name-First: Alexandra Author-X-Name-Last: Durcikova Author-Name: Frantz Rowe Author-X-Name-First: Frantz Author-X-Name-Last: Rowe Author-Name: Andrew Hardin Author-X-Name-First: Andrew Author-X-Name-Last: Hardin Title: Knowledge exchange roles and EKR performance impact: extending the theory of knowledge reuse Abstract: Organisations are spending considerable resources on electronic knowledge repositories (EKRs) that should have a positive effect on employees’ EKR performance impact. Seeking to build on and extend the theory of knowledge reuse, this paper focuses on the various roles individuals play in knowledge exchange, and how the knowledge exchange role mediates the effect of previously studied individual perceptual variables (perceived time pressure, extrinsic and intrinsic rewards, and knowledge contribution self-efficacy) on EKR performance impact. In order to identify the various knowledge exchange roles, we simultaneously consider both knowledge contribution process (embedded vs. separate activity) and knowledge reuse (internal EKR, external EKR, colleagues, manuals, knowledge self-reliance). When work is highly specialised and technical as in the context of system administrators, we observed four roles: Self-reliant Contributors, Detached Moderates, Involved Brokers, and Reluctant Limited Users. Results indicate that the effects of intrinsic rewards and knowledge contribution self-efficacy on EKR performance impact are fully mediated by knowledge exchange role. Perceived time pressure does not influence either knowledge exchange roles or EKR performance impact. Overall, the paper provides insights into roles individuals play in knowledge exchange, and extends the theory of knowledge reuse. Journal: European Journal of Information Systems Pages: 3-21 Issue: 1 Volume: 27 Year: 2018 Month: 1 X-DOI: 10.1080/0960085X.2017.1386833 File-URL: http://hdl.handle.net/10.1080/0960085X.2017.1386833 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:1:p:3-21 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1387349_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Greta L. Polites Author-X-Name-First: Greta L. Author-X-Name-Last: Polites Author-Name: Elena Karahanna Author-X-Name-First: Elena Author-X-Name-Last: Karahanna Author-Name: Larry Seligman Author-X-Name-First: Larry Author-X-Name-Last: Seligman Author-Name: Pär Ågerfalk Author-X-Name-First: Pär Author-X-Name-Last: Ågerfalk Author-Name: Iris Junglas Author-X-Name-First: Iris Author-X-Name-Last: Junglas Title: Intention–behaviour misalignment at B2C websites: when the horse brings itself to water, will it drink? Abstract: We examine factors leading to intention-behaviour misalignment during the current website visit for two groups of website visitors: (1) “directed buyers” who visit with an a priori intention to purchase on the current visit but end up not doing so, and (2) “search/deliberators” who visit with an a priori intention to only gather information for a specific future purchase but end up making a purchase during the current visit. A qualitative study analysed responses by 2660 visitors to the websites of a large hotel management company, 749 of whom acted against their a priori purchase intentions. Based on the results, we propose a theoretical model of factors influencing the intention-behaviour relationship, emphasising those factors that have received little attention in extant research and that have noticeably different impacts for each group, in either facilitating or inhibiting purchasing behaviour. We further explore the interrelationships between various types of uncertainty, anticipated action and inaction regret, and disconfirmed expectations in distorting the intention-behaviour relationship. We close with suggested topics for future research. Journal: European Journal of Information Systems Pages: 22-45 Issue: 1 Volume: 27 Year: 2018 Month: 1 X-DOI: 10.1080/0960085X.2017.1387349 File-URL: http://hdl.handle.net/10.1080/0960085X.2017.1387349 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:1:p:22-45 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1387713_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: David Gefen Author-X-Name-First: David Author-X-Name-Last: Gefen Author-Name: René Riedl Author-X-Name-First: René Author-X-Name-Last: Riedl Author-Name: Dov Te’eni Author-X-Name-First: Dov Author-X-Name-Last: Te’eni Author-Name: Ryad Titah Author-X-Name-First: Ryad Author-X-Name-Last: Titah Title: Adding background music as new stimuli of interest to information systems research Abstract: Music is a self-evident crucial part of the human experience across cultures, with artefacts dating as far back as the last Ice Age. Music is, as well, an essential aspect of human communication, profoundly influencing the meaning of communication, perception, and behaviour. Music’s critical role is recognised in many disciplines, including anthropology, sociology, psychology, neuroscience, medicine, and marketing. The objective of this Issues and Opinions paper is to discuss theoretical insights concerning the effects of music stimuli, and to describe how that insight applies to Information and Communication Technology (ICT) contexts. As ICT becomes ever more ubiquitous, and as background music becomes ever more an integral part of ICT interfaces, including music in IS research presents increasing theoretical and practical importance. Journal: European Journal of Information Systems Pages: 46-61 Issue: 1 Volume: 27 Year: 2018 Month: 1 X-DOI: 10.1080/0960085X.2017.1387713 File-URL: http://hdl.handle.net/10.1080/0960085X.2017.1387713 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:1:p:46-61 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1390187_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Hanmei Fan Author-X-Name-First: Hanmei Author-X-Name-Last: Fan Author-Name: Reeva Lederman Author-X-Name-First: Reeva Author-X-Name-Last: Lederman Author-Name: Frantz Rowe Author-X-Name-First: Frantz Author-X-Name-Last: Rowe Author-Name: Sabine Matook Author-X-Name-First: Sabine Author-X-Name-Last: Matook Title: Online health communities: how do community members build the trust required to adopt information and form close relationships? Abstract: Online Health Communities (OHCs) have become a popular avenue for people to share common concerns about a health topic. However, because users of these forums tend not to have formal medical training, they often cannot verify objectively the soundness of the advice provided. Thus, there is a need to understand better the mechanism through which people trust and utilise information found on these forums. In testing a theory-based trust model, we find that forum users accept advice more readily as they develop cognitive trust (trust based on a cognitive assessment) and/or affective trust (trust based on an emotional connection). Affective trust is also closely related to formation of relational closeness. This indicates that, while both forms of trust are important, the development of emotional connections provides for long-term OHCs interactions. Findings here, indicate that prior exchanges are not needed to access and utilise OHC community resources. However, trust (developed through prior exchanges) is required for a recipient to leverage the contributor’s social capital for information adoption and relational closeness. These findings allow the distribution of social capital to be viewed in terms of an asymmetrical model where it is possible to accept capital, in the form of advice, without first demonstrating trustworthiness. In the OHC setting the onus is on the contributor of advice to establish trustworthiness, whereas traditionally social capital theory requires receivers of capital to establish trust. These findings are important for site designers and provide insight to managers and developers of OHCs regarding the behaviours and motivations of forum users. Journal: European Journal of Information Systems Pages: 62-89 Issue: 1 Volume: 27 Year: 2018 Month: 1 X-DOI: 10.1080/0960085X.2017.1390187 File-URL: http://hdl.handle.net/10.1080/0960085X.2017.1390187 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:1:p:62-89 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1390188_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Sven Kepes Author-X-Name-First: Sven Author-X-Name-Last: Kepes Author-Name: Manoj A. Thomas Author-X-Name-First: Manoj A. Author-X-Name-Last: Thomas Author-Name: Frantz Rowe Author-X-Name-First: Frantz Author-X-Name-Last: Rowe Author-Name: Mark Silver Author-X-Name-First: Mark Author-X-Name-Last: Silver Title: Assessing the robustness of meta-analytic results in information systems: publication bias and outliers Abstract: Meta-analytic studies serve to generate cumulative knowledge and guide evidence-based practice. However, publication bias and outliers threaten the accuracy and robustness of meta-analytic results. Unfortunately, most meta-analytic studies in information systems (IS) research do not assess the presence of these phenomena. Furthermore, some methods commonly used for the detection of publication bias are now recognised as inappropriate. We conduct a comprehensive assessment of four previously published meta-analytic studies in IS. We use multiple methods to assess the effects of publication bias and outliers on the meta-analytic results. Our findings indicate that publication bias and/or outliers have affected the results of three of the four meta-analytic studies. Some methods indicate that select meta-analytic means were misestimated by potentially more than 100%. Our analyses offer methodological exemplars that can be followed to assess the potential adverse effects of publication bias and outliers on meta-analytic results, including their combined effects. We make additional contributions to scientific knowledge by evaluating the performance of different publication bias assessment methods used across scientific disciplines. In brief, we highlight the importance of a rigorous assessment of publication bias and outliers on meta-analytic results to improve the trustworthiness of our cumulative knowledge and evidence-based practice. Journal: European Journal of Information Systems Pages: 90-123 Issue: 1 Volume: 27 Year: 2018 Month: 1 X-DOI: 10.1080/0960085X.2017.1390188 File-URL: http://hdl.handle.net/10.1080/0960085X.2017.1390188 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:1:p:90-123 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1425658_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: The Editors Title: Thanks to Reviewers Journal: European Journal of Information Systems Pages: 124-126 Issue: 1 Volume: 27 Year: 2018 Month: 1 X-DOI: 10.1080/0960085X.2018.1425658 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1425658 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:1:p:124-126 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934259_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Daqing Zheng Author-X-Name-First: Daqing Author-X-Name-Last: Zheng Author-Name: Jin Chen Author-X-Name-First: Jin Author-X-Name-Last: Chen Author-Name: Lihua Huang Author-X-Name-First: Lihua Author-X-Name-Last: Huang Author-Name: Cheng Zhang Author-X-Name-First: Cheng Author-X-Name-Last: Zhang Title: E-government adoption in public administration organizations: integrating institutional theory perspective and resource-based view Abstract: We develop and test a theoretical model to investigate the adoption of government-to-government (G2G) information systems in public administration organizations. Specifically, this model explains how top management commitment (TMC) mediates the impact of external institutional pressures on internal organizational resource allocation, which finally leads to the adoption decision. The hypotheses were tested using survey data from public administration organizations in China. Results from partial least squares analyses suggest that coercive and normative pressures positively affect TMC, which then positively affects financial and information technology (IT) human resources in the G2G adoption process. In turn, financial and IT human resources are confirmed to positively affect the intention to adopt G2G. Surprisingly, we do not find support for our hypothesis that mimetic pressures directly influence TMC. Rather, a post hoc analysis implies that mimetic pressures indirectly influence TMC via the influence of coercive pressures. Our findings provide important managerial implications for public administration organizations. Journal: European Journal of Information Systems Pages: 221-234 Issue: 2 Volume: 22 Year: 2013 Month: 3 X-DOI: 10.1057/ejis.2012.28 File-URL: http://hdl.handle.net/10.1057/ejis.2012.28 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:2:p:221-234 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934260_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Sarah S Khan Author-X-Name-First: Sarah S Author-X-Name-Last: Khan Author-Name: Moutaz Khouja Author-X-Name-First: Moutaz Author-X-Name-Last: Khouja Author-Name: Ram L Kumar Author-X-Name-First: Ram L Author-X-Name-Last: Kumar Title: Effects of time-inconsistent preferences on information technology infrastructure investments with growth options Abstract: Increasing information technology (IT) infrastructure spending and the capability of such projects to provide a platform for a firm to realize value from IT marks their importance. Effective management of IT infrastructure investments includes identification of embedded growth options in the infrastructure, and exercising them in a timely manner. Extant research has recognized that while managers could use real options thinking in IT investment management, managerial bias could affect the timing of option exercise and their realized value. We analyze the effect of time-inconsistent preferences of present-biased managers on the exercise time of real growth options and the realized value using a discrete time option valuation model. The results show that present-biased managers are more likely to exercise options early when the net payoffs are low, the option payoffs have high volatility, and the risk free discount rate is small. In addition, present biased managers are more likely to exercise a growth option early in its life when the project is performing well. We provide implications for practice and IT governance. Journal: European Journal of Information Systems Pages: 206-220 Issue: 2 Volume: 22 Year: 2013 Month: 3 X-DOI: 10.1057/ejis.2012.4 File-URL: http://hdl.handle.net/10.1057/ejis.2012.4 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:2:p:206-220 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934261_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Guido Schryen Author-X-Name-First: Guido Author-X-Name-Last: Schryen Title: Revisiting IS business value research: what we already know, what we still need to know, and how we can get there Abstract: The business value of investments in Information Systems (IS) has been, and is predicted to remain, one of the major research topics for IS researchers. While the vast majority of research papers on IS business value find empirical evidence in favour of both the operational and strategic relevance of IS, the fundamental question of the causal relationship between IS investments and business value remains partly unexplained. Three research tasks are essential requisites on the path towards addressing this epistemological question: the synthesis of existing knowledge, the identification of a lack of knowledge and the proposition of paths for closing the knowledge gaps. This paper considers each of these tasks. Research findings include that correlations between IS investments and productivity vary widely among companies and that the mismeasurement of IS investment impact may be rooted in delayed effects. Key limitations of current research are based on the ambiguity and fuzziness of IS business value, the neglected disaggregation of IS investments, and the unexplained process of creating internal and competitive value. Addressing the limitations we suggest research paths, such as the identification of synergy opportunities of IS assets, and the explanation of relationships between IS innovation and change in IS capabilities. Journal: European Journal of Information Systems Pages: 139-169 Issue: 2 Volume: 22 Year: 2013 Month: 3 X-DOI: 10.1057/ejis.2012.45 File-URL: http://hdl.handle.net/10.1057/ejis.2012.45 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:2:p:139-169 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934262_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Edward W N Bernroider Author-X-Name-First: Edward W N Author-X-Name-Last: Bernroider Title: Effective ERP adoption processes: the role of project activators and resource investments Abstract: The aim of this paper is to demonstrate whether stakeholders activating a project shape team building, the structure and magnitude of resource investment levels, and to what extent these levels impact ERP project effectiveness. The process view of an ERP project includes project initiation, system justification and funding, implementation, and early system use. Results from a nationwide empirical survey conducted in Austria (N=88) show that activating actors influence team formation and resource investments, which impact project effectiveness levels. Resource-intensive justification and funding phases tend to precede resource-intensive implementations in heavy-weight projects, which seem to be less effective than light-weight projects. Resource and change conflicts are associated with lower project effectiveness and are more common in resource-intensive ERP projects, where early system use appears to be relatively less stable. Journal: European Journal of Information Systems Pages: 235-250 Issue: 2 Volume: 22 Year: 2013 Month: 3 X-DOI: 10.1057/ejis.2012.51 File-URL: http://hdl.handle.net/10.1057/ejis.2012.51 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:2:p:235-250 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934263_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Greg Filbeck Author-X-Name-First: Greg Author-X-Name-Last: Filbeck Author-Name: Matthew Swinarski Author-X-Name-First: Matthew Author-X-Name-Last: Swinarski Author-Name: Xin Zhao Author-X-Name-First: Xin Author-X-Name-Last: Zhao Title: Shareholder reaction to firm investments in the capability maturity model: an event study Abstract: This study investigates the differential effects of successfully completed capability maturity model (CMM) appraisals on a firm's short-term and long-term stock performance. Our results indicate a positive share price response on the days surrounding the appraisal date for the stocks of companies obtaining the CMM appraisal. Stocks of firms successfully completing CMM appraisals generally outperform the S&P 500 index over longer-holding periods, although they do not outperform a matched sample. We find support that firms from the information technology industry, firms that are larger, firms of higher CMM maturity levels, and firms completing multiple appraisals are more likely to experience both short-term and long-term benefits from their investing in the CMM. Journal: European Journal of Information Systems Pages: 170-190 Issue: 2 Volume: 22 Year: 2013 Month: 3 X-DOI: 10.1057/ejis.2012.54 File-URL: http://hdl.handle.net/10.1057/ejis.2012.54 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:2:p:170-190 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934264_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ken Peffers Author-X-Name-First: Ken Author-X-Name-Last: Peffers Author-Name: Brian L Dos Santos Author-X-Name-First: Brian L Dos Author-X-Name-Last: Santos Title: Research opportunities in information technology funding and system justification Abstract: This article reviews IT funding and system justification practice and research in two dimensions, previews papers in the special issue on ‘Information technology funding and system justification in the organization’, and identifies opportunities for research in IT funding. IT funding decisions have been hard problems for firms and, because IT investments are so pervasive, they have been very important. Here we review IT funding decisions and research about IT funding historically, using two dimensions, justification dynamism and justification evidence. Over time, the IT funding decisions have changed from static, one time events to iterative and even continuous efforts. Early IT funding decisions were based on finance and accounting models, but changes in the purposes of new systems have necessitated justification based on a variety of qualitative measures. We preview the six papers in the special issue, with an eye to introducing them to readers and also to looking for areas that represent opportunites for future IS research. Finally, we identify eight areas that should represent good opportunities for future research in IT funding and systems justification. Journal: European Journal of Information Systems Pages: 131-138 Issue: 2 Volume: 22 Year: 2013 Month: 3 X-DOI: 10.1057/ejis.2012.60 File-URL: http://hdl.handle.net/10.1057/ejis.2012.60 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:2:p:131-138 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934265_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Lan Cao Author-X-Name-First: Lan Author-X-Name-Last: Cao Author-Name: Kannan Mohan Author-X-Name-First: Kannan Author-X-Name-Last: Mohan Author-Name: Balasubramaniam Ramesh Author-X-Name-First: Balasubramaniam Author-X-Name-Last: Ramesh Author-Name: Sumantra Sarkar Author-X-Name-First: Sumantra Author-X-Name-Last: Sarkar Title: Adapting funding processes for agile IT projects: an empirical investigation Abstract: Agile software development that provides software development organizations, the ability to respond to changes in turbulent business environments, has been gaining wide adoption. Agile software development projects are characterized by ‘just enough’ planning and lack of upfront commitment to scope, cost, and schedule. These characteristics pose conflicting demands on managers responsible for making funding decisions, because traditional approaches to funding IT projects are often based on well-defined scope, cost, and schedule. These conflicts demand the adaptation of traditional funding processes to suit to agile projects. We draw from Adaptive Structuration Theory to understand the nature of conflicts between traditional IT project funding processes and the dynamic nature of agile projects, and how these conflicts are addressed by practices that are appropriated in the process of social interaction between funding decision makers and development teams. On the basis of a multisite case study, we present a framework that explains how organizations adapt traditional IT funding approaches to accommodate the unique characteristics of agile IT projects. Journal: European Journal of Information Systems Pages: 191-205 Issue: 2 Volume: 22 Year: 2013 Month: 3 X-DOI: 10.1057/ejis.2012.9 File-URL: http://hdl.handle.net/10.1057/ejis.2012.9 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:2:p:191-205 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1581441_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Earl H. McKinney Author-X-Name-First: Earl H. Author-X-Name-Last: McKinney Author-Name: Charles J. Yoos Author-X-Name-First: Charles J. Author-X-Name-Last: Yoos Title: Information as a difference: toward a subjective theory of information Abstract: We propose a difference theory of information that extends Gregory Bateson’s definition that information is any difference that makes a difference. Information arises from conception of difference, criteria, and meta criteria. Individuals perceive differences and conceive information from those differences. A first difference is a perceived difference that leads to a second difference – a changing mind. The difference theory provides a theoretical foundation for distinguishing the terms data and information. Additionally, it describes how individuals inform in uncertainty by applying and sometimes recursively applying criteria levels. We apply the difference theory to IS practice and research contexts. Journal: European Journal of Information Systems Pages: 355-369 Issue: 4 Volume: 28 Year: 2019 Month: 7 X-DOI: 10.1080/0960085X.2019.1581441 File-URL: http://hdl.handle.net/10.1080/0960085X.2019.1581441 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:4:p:355-369 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1547853_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Gohar Feroz Khan Author-X-Name-First: Gohar Feroz Author-X-Name-Last: Khan Author-Name: Matthias Trier Author-X-Name-First: Matthias Author-X-Name-Last: Trier Title: Assessing the long-term fragmentation of information systems research with a longitudinal multi-network analysis Abstract: Over the decades, the evolving information systems (IS) research community and its academic output has greatly expanded. This paper offers an integrated analysis of multiple dimensions of network interconnectedness of the growing IS discipline. In line with the social and intellectual dimensions of the underlying theory of science, we synthesise multiple network views on authors, institutions, journal outlets, citations, and themes into a multi-dimensional knowledge network infrastructure analysis of collaborative networks of IS researchers and their academic output. We further introduce two fragmentation types to better address the dynamics of the IS discourse discussed in previous research. Based on a corpus of all 3587 AIS basket of 8 journal articles over 20 years, we use the analytical framework to study whether the fast growth of the IS discipline resulted in a reduced coherence of the overall academic collaboration and the research themes. The analysis reveals that the sampled IS researcher community developed a large core component with influential bridging people who mitigate fragmentation and centralisation. This IS community structure constitutes a valuable asset to cope with fragmentation tendencies in the intellectual dimension (research topics) resulting from many short-term topic bursts and from centralisation of conceptual terms. Journal: European Journal of Information Systems Pages: 370-393 Issue: 4 Volume: 28 Year: 2019 Month: 7 X-DOI: 10.1080/0960085X.2018.1547853 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1547853 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:4:p:370-393 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1560920_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Björn Ross Author-X-Name-First: Björn Author-X-Name-Last: Ross Author-Name: Laura Pilz Author-X-Name-First: Laura Author-X-Name-Last: Pilz Author-Name: Benjamin Cabrera Author-X-Name-First: Benjamin Author-X-Name-Last: Cabrera Author-Name: Florian Brachten Author-X-Name-First: Florian Author-X-Name-Last: Brachten Author-Name: German Neubaum Author-X-Name-First: German Author-X-Name-Last: Neubaum Author-Name: Stefan Stieglitz Author-X-Name-First: Stefan Author-X-Name-Last: Stieglitz Title: Are social bots a real threat? An agent-based model of the spiral of silence to analyse the impact of manipulative actors in social networks Abstract: Information systems such as social media strongly influence public opinion formation. Additionally, communication on the internet is shaped by individuals and organisations with various aims. This environment has given rise to phenomena such as manipulated content, fake news, and social bots. To examine the influence of manipulated opinions, we draw on the spiral of silence theory and complex adaptive systems. We translate empirical evidence of individual behaviour into an agent-based model and show that the model results in the emergence of a consensus on the collective level. In contrast to most previous approaches, this model explicitly represents interactions as a network. The most central actor in the network determines the final consensus 60–70% of the time. We then use the model to examine the influence of manipulative actors such as social bots on public opinion formation. The results indicate that, in a highly polarised setting, depending on their network position and the overall network density, bot participation by as little as 2–4% of a communication network can be sufficient to tip over the opinion climate in two out of three cases. These findings demonstrate a mechanism by which bots could shape the norms adopted by social media users. Journal: European Journal of Information Systems Pages: 394-412 Issue: 4 Volume: 28 Year: 2019 Month: 7 X-DOI: 10.1080/0960085X.2018.1560920 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1560920 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:4:p:394-412 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1581440_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Audrey Grace Author-X-Name-First: Audrey Author-X-Name-Last: Grace Author-Name: Rob Gleasure Author-X-Name-First: Rob Author-X-Name-Last: Gleasure Author-Name: Patrick Finnegan Author-X-Name-First: Patrick Author-X-Name-Last: Finnegan Author-Name: Tom Butler Author-X-Name-First: Tom Author-X-Name-Last: Butler Title: Enabling service co-production: a theory-building case study Abstract: Service co-production between professionals and customers is an increasingly popular alternative to traditional “off the shelf” models of service delivery. There is, however, little empirical research describing how services are co-produced with individual customers, nor the most suitable roles for IS/IT in this co-production. This study unpacks how services are co-produced by developing a substantive Theory of Service Co-Production activities (and mediating contextual factors) in the financial services sector. A two-phase theory-building approach is employed. First, a preliminary model is derived based on Activity Theory and extant research. Second, this preliminary model is refined and elaborated upon through an extensive empirical analysis of the co-production of financial services. The study further reveals four key contradictions driving service co-production. These contradictions highlight the incomplete alignment of motives and goals between service professionals and customers, as well as the trickle-down IS/IT impact of this misalignment. The study concludes by discussing the enabling and constraining influence of IS/IT in service co-production. Journal: European Journal of Information Systems Pages: 413-438 Issue: 4 Volume: 28 Year: 2019 Month: 7 X-DOI: 10.1080/0960085X.2019.1581440 File-URL: http://hdl.handle.net/10.1080/0960085X.2019.1581440 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:4:p:413-438 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1589964_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Zeyu Peng Author-X-Name-First: Zeyu Author-X-Name-Last: Peng Author-Name: Xitong Guo Author-X-Name-First: Xitong Author-X-Name-Last: Guo Title: A multilevel investigation on antecedents for employees’ exploration of enterprise systems Abstract: Employees’ system exploration behaviour is critical for contemporary firms to fully derive benefits from investments in an enterprise system (ES). Based on the adaptive structuration theory (AST), it is proposed that employees’ exploration of an ES is mainly influenced by three fundamental components at different theoretical levels: task, technology, and the organisational environment. Accordingly, we develop a multilevel research model to interpret how task variety, system modularity, and local management commitment jointly affect employees’ system exploration. Our model is tested with a survey of ES users in 35 business units of six firms that have already implemented enterprise resource planning (ERP) systems, and several meaningful findings were discovered. At the individual level, both system modularity and task variety can directly affect employees’ system exploration, and the direct effect of system modularity is positively moderated by task variety. Further, unit-level local management commitment can either directly affect, or positively moderate, the relationship between task variety and system exploration. Limitations and implications for research and practice are discussed. Journal: European Journal of Information Systems Pages: 439-456 Issue: 4 Volume: 28 Year: 2019 Month: 7 X-DOI: 10.1080/0960085X.2019.1589964 File-URL: http://hdl.handle.net/10.1080/0960085X.2019.1589964 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:4:p:439-456 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1557373_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Tomoaki Shimada Author-X-Name-First: Tomoaki Author-X-Name-Last: Shimada Author-Name: James Ang Soo-Keng Author-X-Name-First: James Author-X-Name-Last: Ang Soo-Keng Author-Name: Darren Ee Author-X-Name-First: Darren Author-X-Name-Last: Ee Title: Exploring the impact of IS function maturity and IS planning process on IS planning success: an ACE analysis Abstract: We examine the impact of information system (IS) function maturity and IS planning process on IS planning success in an exploratory approach. We conducted non-linear regression analysis using the Alternating Conditional Expectations algorithm, and found significant non-linear relationships between the dimensions of IS function maturity/IS planning process and those of IS planning success. We also visualised how various IS planning success measures can evolve with low or high values of determinant variables. We used four dimensions of capabilities, analysis, cooperation, and alignment to evaluate IS planning success. We also employed four dimensions to analyse each of IS function maturity and IS planning process. IS function maturity consists of IT planning mode, IT integration, IT industry practice, and IT perspective. On the other hand, IS planning process is composed of long-range planning, medium-range managerial planning, short-range operational planning, and organisational IT potential. Journal: European Journal of Information Systems Pages: 457-472 Issue: 4 Volume: 28 Year: 2019 Month: 7 X-DOI: 10.1080/0960085X.2018.1557373 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1557373 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:4:p:457-472 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934416_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Balasubramaniam Ramesh Author-X-Name-First: Balasubramaniam Author-X-Name-Last: Ramesh Author-Name: Lan Cao Author-X-Name-First: Lan Author-X-Name-Last: Cao Author-Name: Jongwoo Kim Author-X-Name-First: Jongwoo Author-X-Name-Last: Kim Author-Name: Kannan Mohan Author-X-Name-First: Kannan Author-X-Name-Last: Mohan Author-Name: Tabitha L. James Author-X-Name-First: Tabitha L. Author-X-Name-Last: James Title: Conflicts and complements between eastern cultures and agile methods: an empirical investigation Abstract: Agile methods have been widely adopted around the world – particularly in the Eastern world, where cultural scripts differ from that of the West from where agile methods originated. However, there is a lack of understanding of the interplay between the basic tenets of agile methods and the Eastern cultures. This understanding is crucial for the effective use of the methods in these cultures. To examine how Eastern cultural phenomena interplay with agile methods, we followed an emic approach in a multisite case study. We examined the adaptation of agile practices in organizations in China, India, and South Korea. We developed a framework describing how Eastern cultural scripts often express the collectivist response to cultural theoretical concepts and how the cultural response interacts in complementary and conflicting ways with agile methods. To explore how conflicts are mitigated, we examined the ways organizations develop ambidextrous practices. Journal: European Journal of Information Systems Pages: 206-235 Issue: 2 Volume: 26 Year: 2017 Month: 3 X-DOI: 10.1057/s41303-016-0023-0 File-URL: http://hdl.handle.net/10.1057/s41303-016-0023-0 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:2:p:206-235 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934417_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Sabine Dernbecher Author-X-Name-First: Sabine Author-X-Name-Last: Dernbecher Author-Name: Roman Beck Author-X-Name-First: Roman Author-X-Name-Last: Beck Title: The concept of mindfulness in information systems research: a multi-dimensional analysis Abstract: The concept of mindfulness has garnered increasing attention during the last decade. Initially proposed within the scope of information systems (IS) research as a means of creating a deeper knowledge foundation for decision making regarding information technology (IT) innovations, it soon became broadly applied throughout IS research. To gain a better understanding of the evolved diversity of this concept, this paper reviews and analyzes extant IS research by means of (a) the investigated IS themes, (b) the purpose of using the concept, (c) the level of application of the concept, and (d) the tendency to focus either on mindfulness, mindlessness, or both. By synthesizing research findings, we derive a high-level IS mindfulness theory. We then propose future research opportunities, such as the explanation of the relationships between different levels of mindfulness, applying mindfulness to bridge the different phases of the software development process, and the identification of guidelines for designing information systems that facilitate mindfulness. As the first review on the application of mindfulness in IS research, we contribute to the overall understanding of mindfulness and address the four abovementioned dimensions from which mindfulness emerges in order to demonstrate that mindfulness provides a meaningful platform for generating knowledge. Journal: European Journal of Information Systems Pages: 121-142 Issue: 2 Volume: 26 Year: 2017 Month: 3 X-DOI: 10.1057/s41303-016-0032-z File-URL: http://hdl.handle.net/10.1057/s41303-016-0032-z File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:2:p:121-142 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934418_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Damien Power Author-X-Name-First: Damien Author-X-Name-Last: Power Author-Name: Richard L. Gruner Author-X-Name-First: Richard L. Author-X-Name-Last: Gruner Title: Variable use of standards-based IOS enabling technologies in Australian SMEs: an examination of deliberate and emergent decision making processes Abstract: Use of inter-organizational systems (IOS) is widely recognized as pivotal to organizational success. However, the nature of decision making processes regarding the adoption and use of IOS-enabling technologies has received little research attention. The authors explore approaches to decision making relating to SMEs’ use of these technologies and outline the drivers and implications of such decision making. Data were collected through two crosssectional surveys and multiple case studies. The surveys allowed for the identification of two groups of three SMEs each—the first group increased and the second group decreased the use of IOS-enabling technologies over time. This identification provided the context of strategic change or transition in the use of these technologies over time. The study’s results challenge widely held assumptions about the performance benefits of higher-level, deliberate planning over functional-level, emergent decision making regarding SMEs’ technological choices. Results also show that SME managers mainly use flexible IOS technology adoption and implementation strategies to promote organizational performance. Further, two main factors drive flexible decision making: a lack of managerial power and a lack of financial resources. Overall, the study offers insights into the link between IOS-enabling technology use and organizational strategy, and advances research concerning the contingencies influencing SMEs’ decision making in this context. Journal: European Journal of Information Systems Pages: 164-184 Issue: 2 Volume: 26 Year: 2017 Month: 3 X-DOI: 10.1057/s41303-017-0034-5 File-URL: http://hdl.handle.net/10.1057/s41303-017-0034-5 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:2:p:164-184 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934419_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Carl Erik Moe Author-X-Name-First: Carl Erik Author-X-Name-Last: Moe Author-Name: Mike Newman Author-X-Name-First: Mike Author-X-Name-Last: Newman Author-Name: Maung Kyaw Sein Author-X-Name-First: Maung Kyaw Author-X-Name-Last: Sein Title: The public procurement of information systems: dialectics in requirements specification Abstract: When acquiring information systems, public entities face a dilemma. On the one hand, they want to procure the system that best suits their needs, which often requires lengthy dialogues with vendors. At the same time, they are restricted by government regulations that mandate limited dialogue in the interests of transparency and equal opportunities for all vendors. To examine how public entities deal with this, we followed three procurement projects in Norway. We show that this dilemma manifests itself as a dialectic between the thesis of getting the system requirements right and the antithesis of strictly adhering to regulations. Public entities search for a resolution of this dialectic through two syntheses: selecting an appropriate tendering procedure, and learning how to specify requirements through networks of peer public entities. Our findings reveal that the syntheses are possible because the dialectic is actually complimentary, both the thesis and the antithesis are needed to create the joint outcome that satisfies both. The resolution of the dialectic unfolds differently over time. Our study contributes to the relatively neglected stream of IS research on dialectics that explicitly searches for a synthesis while revealing the complementarity of the dialectic. We show how time plays a nuanced role in the resolution of the dialectic situation. Journal: European Journal of Information Systems Pages: 143-163 Issue: 2 Volume: 26 Year: 2017 Month: 3 X-DOI: 10.1057/s41303-017-0035-4 File-URL: http://hdl.handle.net/10.1057/s41303-017-0035-4 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:2:p:143-163 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934420_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bangho Cho Author-X-Name-First: Bangho Author-X-Name-Last: Cho Author-Name: Sung Yul Ryoo Author-X-Name-First: Sung Yul Author-X-Name-Last: Ryoo Author-Name: Kyung Kyu Kim Author-X-Name-First: Kyung Kyu Author-X-Name-Last: Kim Title: Interorganizational dependence, information transparency in interorganizational information systems, and supply chain performance Abstract: To explain the large disparity between the potential and practice of interorganizational information systems (IOSs), this study investigates asymmetric information transparency in an IOS from a dyadic perspective. When there is asymmetric dependency in a dyad, an IOS may not completely eliminate asymmetric information transparency between supply chain (SC) partners but may change the nature of information asymmetry. Consistent with resource dependence theory, this study includes joint dependence and dependence asymmetry as antecedents of information transparency in an IOS. The data used in this study were collected from 111 matched pairs of intermediate component manufacturers and their immediate suppliers in heavy manufacturing industries. The results show that asymmetric information transparency in an IOS is prevalent in SC relationships. Regarding the antecedents of information transparency in an IOS, both joint dependence and each partner’s dependence advantage are significant. Furthermore, information transparency in an IOS positively influences SC performance measured by SC relationship quality and relationship-specific performance, whereas asymmetric information transparency negatively influences joint profit performance. Journal: European Journal of Information Systems Pages: 185-205 Issue: 2 Volume: 26 Year: 2017 Month: 3 X-DOI: 10.1057/s41303-017-0038-1 File-URL: http://hdl.handle.net/10.1057/s41303-017-0038-1 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:2:p:185-205 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_12056169_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bernd Carsten Stahl Author-X-Name-First: Bernd Carsten Author-X-Name-Last: Stahl Title: Interpretive accounts and fairy tales: a critical polemic against the empiricist bias in interpretive IS research Abstract: In 1995, Geoff Walsham wrote one of the most important and most widely cited papers on interpretivism in information systems (IS). Walsham's paper, along with his further work, represents a cornerstone of the discourse surrounding interpretive research. It has set the tone for further publications in the area and has more recently been followed up by a detailed practical account of how to undertake interpretive research by the same author. Using Walsham's position as a starting point, the present paper questions some basic assumptions of interpretivism. Drawing on the philosophical background of interpretivism in hermeneutics and phenomenology, the paper questions the status of empirical research in the interpretivist tradition. Using quality criteria of different research streams related to interpretivism, the paper compares the role of empirical data in different types of research accounts with fairy tales, noting that interpretive IS research shares at least as many quality features with fairy tales as with positivist narratives. The paper concludes by discussing which consequences this position has for interpretive and other research in IS. Journal: European Journal of Information Systems Pages: 1-11 Issue: 1 Volume: 23 Year: 2014 Month: 1 X-DOI: 10.1057/ejis.2012.58 File-URL: http://hdl.handle.net/10.1057/ejis.2012.58 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:1:p:1-11 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_12056170_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Geoff Walsham Author-X-Name-First: Geoff Author-X-Name-Last: Walsham Title: Empiricism in interpretive IS research: a response to Stahl Abstract: This short article is a response to that of Stahl (2013) who argued that there is an empiricist ‘bias’ in interpretive IS research, not justified by its philosophical roots in hermeneutics and phenomenology. Stahl calls for a wider range and quantity of non-empirical approaches. I am broadly supportive of this call but, in this response, I also argue for the value of studies based on empirical data. In addition, I think that Stahl overstates his empiricist case somewhat and I identify a range of existing non-empirical genres of publication including theoretical papers, literature reviews, polemics and future-oriented speculations. However, I do like the idea of extending non-empirical approaches and I suggest some ideas for the future including short stories and novels, plays and artistic comparisons. I end with a brief discussion of the feasibility of such ideas bearing in mind the politics of academic publishing. Journal: European Journal of Information Systems Pages: 12-16 Issue: 1 Volume: 23 Year: 2014 Month: 1 X-DOI: 10.1057/ejis.2012.57 File-URL: http://hdl.handle.net/10.1057/ejis.2012.57 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:1:p:12-16 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_12056171_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Edgar A. Whitley Author-X-Name-First: Edgar A. Author-X-Name-Last: Whitley Author-Name: Uri Gal Author-X-Name-First: Uri Author-X-Name-Last: Gal Author-Name: Annemette Kjaergaard Author-X-Name-First: Annemette Author-X-Name-Last: Kjaergaard Title: Who do you think you are? A review of the complex interplay between information systems, identification and identity Abstract: This paper introduces the special issue on information systems, identity and identification. In addition to introducing the papers in the special issue, it provides a state-of-the-art review of research into identity and identification to contextualise the contributions of the special issue papers. The paper reviews research themes in personal and organisational identity as well as research challenges in identification before considering the interplay between these two strands. Journal: European Journal of Information Systems Pages: 17-35 Issue: 1 Volume: 23 Year: 2014 Month: 1 X-DOI: 10.1057/ejis.2013.34 File-URL: http://hdl.handle.net/10.1057/ejis.2013.34 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:1:p:17-35 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_12056172_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Heiko Roßnagel Author-X-Name-First: Heiko Author-X-Name-Last: Roßnagel Author-Name: Jan Zibuschka Author-X-Name-First: Jan Author-X-Name-Last: Zibuschka Author-Name: Oliver Hinz Author-X-Name-First: Oliver Author-X-Name-Last: Hinz Author-Name: Jan Muntermann Author-X-Name-First: Jan Author-X-Name-Last: Muntermann Title: Users' willingness to pay for web identity management systems Abstract: Electronic services such as virtual communities or electronic commerce demand user authentication. Several more or less successful federated identity management systems have emerged to support authentication across diverse service domains in recent years. In this paper, we explore the determinants for success and failure of such systems with a focus on Germany representing one of the largest markets in Europe. To achieve this goal, we analyze the preferences and willingness to pay of prospective users by conducting a choice-based conjoint analysis. Our results indicate that users prefer simple systems where an intermediary takes care of their data. An additional market analyses confirms these findings and contradicts the assumptions of many researchers, especially in the fields of engineering and computer science, supporting systems with higher and higher levels of privacy and security. Journal: European Journal of Information Systems Pages: 36-50 Issue: 1 Volume: 23 Year: 2014 Month: 1 X-DOI: 10.1057/ejis.2013.33 File-URL: http://hdl.handle.net/10.1057/ejis.2013.33 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:1:p:36-50 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_12056173_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Aurélie Leclercq-Vandelannoitte Author-X-Name-First: Aurélie Author-X-Name-Last: Leclercq-Vandelannoitte Title: Interrelationships of identity and technology in IT assimilation Abstract: Even as organizational literature increasingly studies the role of identity in organizations, the interrelationships of identity and technology in the context of information technology (IT) assimilation demand greater exploration, particularly in light of limitations in prior research that have prevented a full understanding of this relationship. This article aims to deepen understanding of the processes by which technology and identity co-evolve in the IT assimilation process over time. The proposed alternative framework relies on the philosophy of Michel Foucault, applied to a longitudinal, qualitative case study of a French company involved in the deployment of a geolocation technology. The analysis reveals diverse patterns of interaction among the managerial discourses used to shape technicians' ascribed identity and the identity that technicians design for themselves, which then result in distinct IT assimilation types that contribute to the further evolution of their identity. Journal: European Journal of Information Systems Pages: 51-68 Issue: 1 Volume: 23 Year: 2014 Month: 1 X-DOI: 10.1057/ejis.2013.16 File-URL: http://hdl.handle.net/10.1057/ejis.2013.16 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:1:p:51-68 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_12056174_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Michael Tyworth Author-X-Name-First: Michael Author-X-Name-Last: Tyworth Title: Organizational identity and information systems: how organizational ICT reflect who an organization is Abstract: The work reported here contributes to our understanding of organizational identity regarding its influence on organizational action related to the development of information and communications technologies (ICT). The empirical basis of this work comes from case studies of integrated criminal justice information systems (IJIS). IJIS are organizational and technological ensembles created to facilitate inter-organizational information sharing among criminal justice agencies. The focus of these case studies was to examine how organizational identity shapes organizational ICT. This research found that organizational identity shapes an organization's ICT-related processes and is reflected in the material configurations of an organization's ICT; and that organizations with different identities exhibit those differences in their ICT. Three implications of this research are that organizational identity serves as both an enabler and constraint on organizational ICT development; organizational identity commitments will likely serve as a barrier to large-scale integration of different organizations' systems; organizational identity is relatively static and difficult to change. Journal: European Journal of Information Systems Pages: 69-83 Issue: 1 Volume: 23 Year: 2014 Month: 1 X-DOI: 10.1057/ejis.2013.32 File-URL: http://hdl.handle.net/10.1057/ejis.2013.32 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:1:p:69-83 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_12056175_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ulrike Schultze Author-X-Name-First: Ulrike Author-X-Name-Last: Schultze Title: Performing embodied identity in virtual worlds Abstract: Embodied identity, that is, who we are as a result of our interactions with the world around us with and through our bodies, is increasingly challenged in online environments where identity performances are seemingly untethered from the user's body that is sitting at the computer. Even though disembodiment has been severely criticized in the literature, most conceptualizations of the role of users' bodies in virtuality nevertheless reflect a representational logic, which fails to capture contemporary users' experience of cyborgism. Relying on data collected from nine entrepreneurs in the virtual world Second Life (SL), this paper asks how embodied identity is performed in virtual worlds. Contrasting representationalism with performativity, this study highlights that the SL entrepreneurs intentionally re-presented in their avatars some of the attributes of physical bodies, but that they also engaged in habitual practices in-world, thereby unconsciously enacting embodied identities in both their ‘real’ and virtual lives. Journal: European Journal of Information Systems Pages: 84-95 Issue: 1 Volume: 23 Year: 2014 Month: 1 X-DOI: 10.1057/ejis.2012.52 File-URL: http://hdl.handle.net/10.1057/ejis.2012.52 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:1:p:84-95 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933594_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: M Lycett Author-X-Name-First: M Author-X-Name-Last: Lycett Author-Name: R J Paul Author-X-Name-First: R J Author-X-Name-Last: Paul Title: Information systems development: a perspective on the challenge of evolutionary complexity Abstract: This conceptual paper proposes that the methodical approach to information system development leads us to design systems that are unable to deal with the challenge of evolutionary complexity. This is examined through the use of a systemic framework that describes evolutionary complexity in terms of interaction between the concepts of distinction/connection and variation/selection. In applying these concepts to the social world we are led to conclude (a) that social regularities are emergent and not a priori given and (b) that these emergent regularities are constantly shifting and evolving. This has strong implications for the methodical approach to development, which we argue assumes social structures, mechanisms and processes as ‘invariant regularities’ that only have to be revealed to be understood. This difference leads methodical development to produce static systems that have to work in a dynamic world. The paper concludes by outlining a proposition in response to the challenge of evolutionary complexity, one where design is considered as an inherently ongoing process. Journal: European Journal of Information Systems Pages: 127-135 Issue: 2 Volume: 8 Year: 1999 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000315 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000315 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:8:y:1999:i:2:p:127-135 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933595_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: C Avgerou Author-X-Name-First: C Author-X-Name-Last: Avgerou Author-Name: J Siemer Author-X-Name-First: J Author-X-Name-Last: Siemer Author-Name: N Bjørn-Andersen Author-X-Name-First: N Author-X-Name-Last: Bjørn-Andersen Title: The academic field of information systems in Europe Abstract: This paper reviews the institutional and cognitive profile of the information systems (IS) field in Europe, using the results of a survey of IS academics in 18 European countries. The emerging picture suggests that the study of IS in European academia is dispersed in small units with various names, which are hosted in various disciplines across the science/social science spectrum. Our survey confirms the widespread view that the IS field is concerned with the study of a wide range of themes, from developing technologies per se, to assessing the social impact of new information and communication technologies. Moreover, a variety of research perspectives and approaches is found to be pursued, drawing from both the positivist and interpretative epistemological traditions. Reflecting upon the survey findings, we argue that while the institutional dispersion is a weakness that requires remedying action, the cognitive diversity should not be considered as a characteristic of immaturity. In Europe, the diversity of themes and research perspectives probably manifests more fundamental differences of the socioeconomic context which gives rise to, and sustains, different types of IS research in different countries. Journal: European Journal of Information Systems Pages: 136-153 Issue: 2 Volume: 8 Year: 1999 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000319 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000319 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:8:y:1999:i:2:p:136-153 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933596_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Christopher J Hemingway Author-X-Name-First: Christopher J Author-X-Name-Last: Hemingway Title: Human-Computer Interface Design (Second Edition) Journal: European Journal of Information Systems Pages: 156-157 Issue: 2 Volume: 8 Year: 1999 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000320 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000320 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:8:y:1999:i:2:p:156-157 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933597_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: J Peppard Author-X-Name-First: J Author-X-Name-Last: Peppard Title: Information management in the global enterprise: an organising framework Abstract: Much has been written over the last decade on managing global enterprises. While the predominant concern of this literature has been strategic in orientation, the management of information is a neglected area. By drawing on a diverse range of literature in the international business, strategic management, organization design, and information system (IS) disciplines this paper develops a conceptual framework for analysing information management in the global enterprise, providing a basis for organising existing literature on the topic and for creating a map of the field. This framework is structured around four domains: global business drivers, global business strategy, global business model and global information strategy. It highlights the role of information technology (IT) as supporting global business strategies while at the same time IT can also be a major catalyst in the globalisation process itself. In the context of the global information strategy, the paper develops a distinction between business infostructure, IT infrastructure and the IS/IT suprastructure. Significant relationships between the four domains of the framework are surfaced and an agenda for action developed. Journal: European Journal of Information Systems Pages: 77-94 Issue: 2 Volume: 8 Year: 1999 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000321 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000321 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:8:y:1999:i:2:p:77-94 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933598_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: G A Forgionne Author-X-Name-First: G A Author-X-Name-Last: Forgionne Title: An AHP model of DSS effectiveness Abstract: Empirical studies have reported equivocal, or even dysfunctional, results from the use of decision support systems (DSS). Recent examples are the Davis, Kottemann, and Remus production planning experiments. According to the researchers, these experiments demonstrate that DSS what-if analysis creates an ‘illusion of control’ that causes users to overestimate its effectiveness. Such experimental findings are contrary to case-supported DSS theory. This paper examines the discrepancy. It first overviews the decision-making process, presents a generic DSS, identifies the theoretical role of the DSS in improving decision making, develops a multiple criteria model of DSS effectiveness, and gives a DSS for delivering the model to users. Illustrating with recent empirical investigations and the Davis, Kottemann, and Remus studies, the DSS-delivered model is used to reconcile the incongruity between the experimental findings and the case-supported theory. The paper concludes with a discussion of the article's implications for information systems research and practice. Journal: European Journal of Information Systems Pages: 95-106 Issue: 2 Volume: 8 Year: 1999 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000322 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000322 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:8:y:1999:i:2:p:95-106 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933599_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: P Gottschalk Author-X-Name-First: P Author-X-Name-Last: Gottschalk Title: Strategic information systems planning: the IT strategy implementation matrix Abstract: The need for improved implementation of information technology (IT) strategy has been emphasised in both empirical and prescriptive research studies. In this study, ten content characteristics of formal information technology strategy are identified from the research literature as potential implementation predictors. These are descriptions of: (i) resources needed for the implementation; (ii) user involvement during the implementation; (iii) analyses of the organization; (iv) anticipated changes in the environment; (v) solutions to potential resistance during the implementation; (vi) information technology to be implemented; (vii) projects' relevance to the business plan; (viii) responsibility for the implementation; (ix) management support for the implementation; and (x) clarity of the documentation. An IT strategy implementation matrix is introduced to illustrate the relationship between the expired time horizon and the IT strategy implementation extent. The matrix can be used by organizations to monitor their IT strategy implementation performance over time. A survey was conducted in Norway whereupon the return of 471 completed questionnaires resulted in a satisfactory response rate of 43%. Formal IT strategy was reported in 40% of these organizations. The two significant predictors in the testing of hypotheses proved to be the description of responsibility for the implementation and the description of user involvement during the implementation. Journal: European Journal of Information Systems Pages: 107-118 Issue: 2 Volume: 8 Year: 1999 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000324 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000324 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:8:y:1999:i:2:p:107-118 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933600_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: G Walsham Author-X-Name-First: G Author-X-Name-Last: Walsham Author-Name: D J Protti Author-X-Name-First: D J Author-X-Name-Last: Protti Title: Management, Information and Power: A Narrative of the Involved Manager Journal: European Journal of Information Systems Pages: 154-155 Issue: 2 Volume: 8 Year: 1999 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000327 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000327 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:8:y:1999:i:2:p:154-155 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933601_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Paul Samet Author-X-Name-First: Paul Author-X-Name-Last: Samet Title: In the Beginning: Recollections of Software Pioneers Journal: European Journal of Information Systems Pages: 156-156 Issue: 2 Volume: 8 Year: 1999 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000328 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000328 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:8:y:1999:i:2:p:156-156 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933602_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ernst Ellmer Author-X-Name-First: Ernst Author-X-Name-Last: Ellmer Title: Collaborative Technologies & Organizational Learning Journal: European Journal of Information Systems Pages: 158-158 Issue: 2 Volume: 8 Year: 1999 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000329 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000329 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:8:y:1999:i:2:p:158-158 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933603_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ian Alexander Author-X-Name-First: Ian Author-X-Name-Last: Alexander Title: The Soft Edge: A Natural History and Future of the Information Revolution Journal: European Journal of Information Systems Pages: 158-159 Issue: 2 Volume: 8 Year: 1999 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000330 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000330 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:8:y:1999:i:2:p:158-159 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933604_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: R Hackney Author-X-Name-First: R Author-X-Name-Last: Hackney Author-Name: S Little Author-X-Name-First: S Author-X-Name-Last: Little Title: Opportunistic strategy formulation for IS/IT planning Abstract: Existing models and frameworks for information systems and information technology (IS/IT) planning are not robust enough to explain or predict strategic gains and many organizations are wary of investing further in their information infrastructure. Because technology is not the only ingredient of success, a complete and rigorous reconsideration of the techniques, options and approaches to IS/IT planning linked to business strategy is needed. It is argued that this can only be achieved through consideration of the recent organizational processes involved for creating a successful IS/IT strategy. This paper reviews aspects of both the literature on business strategy and IS/IT planning and considers case examples from two organizations in which the contrasting outcomes from the same technical innovation illustrate the dynamics of opportunistic strategy formulation. Journal: European Journal of Information Systems Pages: 119-126 Issue: 2 Volume: 8 Year: 1999 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000331 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000331 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:8:y:1999:i:2:p:119-126 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933617_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: H Salmela Author-X-Name-First: H Author-X-Name-Last: Salmela Author-Name: A L Lederer Author-X-Name-First: A L Author-X-Name-Last: Lederer Author-Name: T Reponen Author-X-Name-First: T Author-X-Name-Last: Reponen Title: Information systems planning in a turbulent environment Abstract: The information systems (IS) planning literature suggests two competing theories of effective planning in a turbulent environment. One predicts that organizations using a formal, comprehensive planning approach will be more successful. The other predicts that organizations using an informal, incremental approach will be more successful in such an environment. The action research described here in two real-world organizations examined actual IS planning practices in a turbulent environment. One practised formal and comprehensive IS planning, while the other relied more on an informal and incremental approach. Their experiences suggest that in a turbulent environment, comprehensive IS planning may be more successful than incremental planning. Such a conclusion perhaps appears surprising. Nevertheless, it provides contributions for practice and implications for future research. It contributes to practice by showing IS planners the importance of understanding their environment and also the potential of comprehensive planning practices. It contributes to research by demonstrating how comprehensive practices can contribute to planning in a turbulent environment. However, it is only one study and of merely two organizations. Thus, it should also be interpreted as motivating future research to examine the theories from different perspectives. Journal: European Journal of Information Systems Pages: 3-15 Issue: 1 Volume: 9 Year: 2000 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000339 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000339 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:1:p:3-15 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933618_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: V Torvinen Author-X-Name-First: V Author-X-Name-Last: Torvinen Author-Name: K Jalonen Author-X-Name-First: K Author-X-Name-Last: Jalonen Title: Stimulating power games as a part of systems development Abstract: The biggest problems of information system development (ISD) are not in the construction of technical artefacts. The real challenges to development are the social and political aspects of change. Imagining new organizational structures is difficult because knowledge about existing structures is often objectified. Furthermore, the power structures of organizations make such imagination more difficult or even forbidden. This paper describes a study in which a prototype of an information systems (IS) development method, called the Labour Game, was evaluated in field experiments. The paper describes the method and demonstrates how it succeeded in shifting the focus of discussions from technical development to issues which typically increased the competence of employees and modified the power structures of the work processes. The paper advocates the use of ‘soft’ methods, which help users and managers to talk about the social structures of work and consequently about different IS requirements in the early phases of systems development. Journal: European Journal of Information Systems Pages: 16-24 Issue: 1 Volume: 9 Year: 2000 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000342 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000342 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:1:p:16-24 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933619_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: M Fan Author-X-Name-First: M Author-X-Name-Last: Fan Author-Name: J Stallaert Author-X-Name-First: J Author-X-Name-Last: Stallaert Author-Name: A B Whinston Author-X-Name-First: A B Author-X-Name-Last: Whinston Title: The adoption and design methodologies of component-based enterprise systems Abstract: One of the major investments of information technologies in large companies in the past decade has been the enterprise system. Although the enterprise system has the advantages of managing and integrating almost all of the business processes in the whole company, there have been strong criticisms that the enterprise system often imposes its own logic or business process on a company and lacks flexibility and adaptability in today's dynamic business environment. The goal of this paper is to outline a new approach in enterprise system development. We analyse the factors that affect the adoption of enterprise systems. Market and business changes, and advances in information technologies call for a more flexible, open, and scalable enterprise architecture. We describe the process that Dell Computer Corporation took in adopting its component-based enterprise system architecture. The Dell example has demonstrated the importance of fit between business information systems and fundamental organizational dimensions of the company including strategy, business environment, and organizational structure. We also discuss the design methodologies for component-based enterprise system design. We take a coordination perspective, both at the software level and the organizational level, in addressing the design methodologies for component-based enterprise system development. Journal: European Journal of Information Systems Pages: 25-35 Issue: 1 Volume: 9 Year: 2000 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000343 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000343 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:1:p:25-35 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933620_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: J S Edwards Author-X-Name-First: J S Author-X-Name-Last: Edwards Author-Name: Y Duan Author-X-Name-First: Y Author-X-Name-Last: Duan Author-Name: P C Robins Author-X-Name-First: P C Author-X-Name-Last: Robins Title: An analysis of expert systems for business decision making at different levels and in different roles Abstract: This paper begins by analysing decision making activities and information requirements at three organizational levels and the characteristics of expert systems (ESs) intended for the two different roles of supporting and replacing a decision maker. It goes on to review the evidence from many years of commercial use of ESs at different levels and in different roles, and to analyse the evidence obtained from a pilot experiment involving developing ESs to fulfil two different roles in the same domain. The research finds that ESs in a replacement role prove to be effective for operational and tactical decisions, but have limitations at the strategic level. ESs in a support role, as advisory systems, can help to make better decisions, but their effectiveness can only be fulfilled through their users. In the experiments, an expert advisory system did not save a user's time, contrary to the expectations of many of its users, but an ES in a replacement role did improve the efficiency of decision making. In addition, the knowledge bases of the ESs in the different roles need to be different. Finally, the practical implications of the experience gained from developing and testing two types of ESs are discussed. Journal: European Journal of Information Systems Pages: 36-46 Issue: 1 Volume: 9 Year: 2000 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000344 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000344 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:1:p:36-46 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933621_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: S Sawyer Author-X-Name-First: S Author-X-Name-Last: Sawyer Title: Packaged software: implications of the differences from custom approaches to software development Abstract: This paper contributes to the literature on software development in two ways. First, by discussing the packaged software domain relative to the more commonly studied custom information systems (IS) domain. Second, this paper presents our speculations on the implications of these differences between packaged and custom IS development. Regarding the first issue, while the two domains share many commonalities, the differences are also important to understand. To make this clear we discuss the differences at four levels: industry forces, approaches to software development, work culture and development team efforts. At each level, data from three case studies are used to illustrate the differences between the two domains. To develop our speculations, we contend that the differences between packaged software and the traditional, custom, approach to information systems development will be profound for five stakeholder groups: software development organizations, software development teams, software developers, software consumers and for researchers interested in software development. Journal: European Journal of Information Systems Pages: 47-58 Issue: 1 Volume: 9 Year: 2000 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000345 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000345 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:1:p:47-58 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933622_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bob O'Keefe Author-X-Name-First: Bob Author-X-Name-Last: O'Keefe Author-Name: Ray Paul Author-X-Name-First: Ray Author-X-Name-Last: Paul Title: Editorial Journal: European Journal of Information Systems Pages: 1-2 Issue: 1 Volume: 9 Year: 2000 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000346 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000346 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:1:p:1-2 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933552_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: W Huang Author-X-Name-First: W Author-X-Name-Last: Huang Author-Name: K K Wei Author-X-Name-First: K K Author-X-Name-Last: Wei Title: Task as a moderator for the effects of group support systems on group influence processes Abstract: This research studied the interacting effects of group support systems (GSS) and task type on small groups. It focused on group influence processes rather than group outcomes, which has been largely neglected in GSS research literature. The results of this research indicated that GSS significantly affected group influence processes: GSS reduced the dominance significance (i.e., the influence dominance) among group members; and it increased the amount of influence behaviour and resulted in a less even influence distribution in intellective task groups, but not in decision-making task groups. Therefore, the findings suggest that task type may play an important role in moderating the GSS effects. An important implication of the findings is that organizational GSS users should be careful when they adopt and use GSS to support a variety of tasks. They should carefully examine the characteristics of the various tasks to be performed, and then choose suitable GSS structures to support these tasks. Journal: European Journal of Information Systems Pages: 208-217 Issue: 4 Volume: 6 Year: 1997 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000271 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000271 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:6:y:1997:i:4:p:208-217 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933553_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: V Grover Author-X-Name-First: V Author-X-Name-Last: Grover Title: An extension of the tri-core model of information systems innovation: strategic and technological moderators Abstract: There has been significant empirical work on information systems (IS) innovation. With the advent of a myriad of new and diverse technologies being introduced into contemporary organizations this work is only going to increase in its importance. Unfortunately, results of prior empirical work have been fragmented. Many of these studies treat IS innovations as homogeneous entities and do not effectively integrate notions of IS innovation with general organizational innovation. Swanson (1994) proposes a tri-core model and theory of IS innovation that can help integrate the isolated studies in this area, and can form the foundation on which future study of IS innovation can be based. This paper, in the spirit of a cumulative research tradition, presents and builds on Swanson's framework by incorporating contingencies that might affect the model. Specifically, notions of strategy (strategic push) and technology impact are discussed in the context of the framework. We hope that continued inquiry into this area will facilitate formulation of rich theory that will enable focused inquiry on IS innovation. Journal: European Journal of Information Systems Pages: 232-242 Issue: 4 Volume: 6 Year: 1997 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000274 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000274 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:6:y:1997:i:4:p:232-242 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933554_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: J Lindström Author-X-Name-First: J Author-X-Name-Last: Lindström Author-Name: A Moberg Author-X-Name-First: A Author-X-Name-Last: Moberg Author-Name: B Rapp Author-X-Name-First: B Author-X-Name-Last: Rapp Title: On the classification of telework Abstract: Information and communication technology (ICT) provides organizations with a whole range of new possibilities for performing work and structuring the organization. The technical, and to a certain extent the organizational development, has been rapid and there has not been the time for any consensus on concepts to evolve. This article is concentrated to a limited part of the area of organizations and ICT, telework and concepts related to telework. It is argued that many of these concepts—notably telework—have been used by so many authors in so many different ways that they have lost their specifity. They are defined in so many ways in different studies that they in each instance need to be further defined to clarify exactly what is being studied. The aim of the article is therefore not to propose new definitions but to show instead how it is possible to discriminate among telework situations by using dimensions, along which new ways of doing work can be further specified. We distinguish among forms of organizations such as telecommuting, multiflex, mobile work, satellite office, and virtual organization. We also discuss concepts regarding work places, such as neighbourhood work centres, resort offices, satellite work centres and mobile workplaces. We discriminate between the telework situations by discussing dimensions for forms of organization and workplaces, respectively. Journal: European Journal of Information Systems Pages: 243-255 Issue: 4 Volume: 6 Year: 1997 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000275 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000275 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:6:y:1997:i:4:p:243-255 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933555_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: G J Udo Author-X-Name-First: G J Author-X-Name-Last: Udo Author-Name: R C Kick Author-X-Name-First: R C Author-X-Name-Last: Kick Title: The determinants of the critical success factors of information systems downsizing Abstract: Competitive advantage in the information age is based, in large part, on a firm's capability to acquire and use quality information as well as effective and efficient services, with its information technology resources at the least possible cost. One possible strategy for improving the cost-performance ratio of information technology resources is known as downsizing. The downsizing effort is a strategic move that is believed by many organizations to be capable of yielding significant benefits. It can also be a costly endeavour which may leave a firm worse off. Therefore, careful planning and control must be exercised if information systems downsizing is to succeed. This paper reports the results of a study whose purpose is to identify and explain the critical success factors for a downsizing effort. Results of the study show that information systems downsizing may produce benefits such as improved information systems, improved organizational structure, higher productivity, and lower cost. The results also indicate that downsizing success is dependent upon complex linkages of communications, action plans, needs for downsizing as perceived by employees, and the specific method of downsizing used. Journal: European Journal of Information Systems Pages: 218-231 Issue: 4 Volume: 6 Year: 1997 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000276 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000276 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:6:y:1997:i:4:p:218-231 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933556_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: W-G Tan Author-X-Name-First: W-G Author-X-Name-Last: Tan Author-Name: G G Gable Author-X-Name-First: G G Author-X-Name-Last: Gable Title: Maintaining centralised application systems: a cross-country, cross-sector, cross-platform comparison Abstract: Past studies of software maintenance issues have largely concentrated on the average North American firm. While they have made a substantial contribution to good information system management practice, it is believed that further segmentation of sample data and cross-country comparisons will help to identify patterns of behaviour more akin to many less average organizations in North America and elsewhere. This paper compares the Singapore maintenance scene with the reported North American experience. Comparisons are also made between: Government organizations, Singapore corporations and multinational corporations (MNCs); mainframe and minicomputer installations; and fourth-generation language (4GL) and non-4GL computer installations. Study findings, while in many cases were similar to earlier US studies, do show the importance of Singapore's young application portfolio, the widespread usage of 4GLs and the severe maintenance personnel problems. Journal: European Journal of Information Systems Pages: 193-207 Issue: 4 Volume: 6 Year: 1997 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000277 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000277 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:6:y:1997:i:4:p:193-207 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933557_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: P D Chatzoglou Author-X-Name-First: P D Author-X-Name-Last: Chatzoglou Title: Use of methodologies: an empirical analysis of their impact on the economics of the development process Abstract: Despite the increase in the number of commercially available development methodologies, there are still many projects where none is used. This problem can be attributed to the fact that many practitioners ignore the beneficial role of using such methodologies to both the quality of the end product and the economics of the development process. This paper, which is the second of a series, reports on a survey of information systems development practice carried out to provide evidence about the effect of using development methodologies on the economics of the development process. Data concerning 72 projects, obtained through a mail survey within the UK are analysed. The focus of the analysis is to provide evidence of how the use of methodologies affect economic parameters, such as time, cost, effort, number of people involved and outputs (in terms of requirements captured). The results show that the use of any methodology is generally proved to be a better option than using no methodology. However, the use of methodologies is not a panacea but specific methodologies can help towards achieving better results in specific areas. Journal: European Journal of Information Systems Pages: 256-270 Issue: 4 Volume: 6 Year: 1997 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000283 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000283 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:6:y:1997:i:4:p:256-270 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1832867_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Lars Mathiassen Author-X-Name-First: Lars Author-X-Name-Last: Mathiassen Author-Name: Anna Sandberg Author-X-Name-First: Anna Author-X-Name-Last: Sandberg Title: Complementary Technology Traces in Software Practice: A Retrospective Reflection over Sixteen Years of Evolution at Ericsson Abstract: To advance knowledge about evolution of practices within a software organisation, we offer a retrospective reflection based on several years of research into a software unit at Ericsson AB. Covering 16 years of evolution, we developed multiple publications from continuously expanding sources of software technology implementation data. While these publications report from specific junctures of software practice evolution at the unit, our retrospective reflection allows us to consider the impacts of the unit’s investments into two technology paradigms over the sixteen-year period: first into CMM-RUP with a focus on discipline and structured practices and years later into Agile-Lean with a focus on flexibility and responsive practices. Hence, we adopt retrospective reflection to investigate how imprints from the two paradigms, despite considerable timespan between the related technology implementations, eventually complemented each other in the unit’s software practices. Because one paradigm focuses on discipline and structured practices and the other on flexibility and responsive practices, our retrospective reflections consider how the two paradigms together impacted the software unit’s ambidextrous capability. As a result, we advance the idea that as software organisations over time invest in complementary technology paradigms they leave important technology traces with sustainable impacts on their software practices. Journal: European Journal of Information Systems Pages: 642-658 Issue: 6 Volume: 30 Year: 2021 Month: 11 X-DOI: 10.1080/0960085X.2020.1832867 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1832867 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:6:p:642-658 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1816146_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Connie S Barber Author-X-Name-First: Connie S Author-X-Name-Last: Barber Author-Name: Silvia Cristina Bettez Author-X-Name-First: Silvia Cristina Author-X-Name-Last: Bettez Title: Exposing patterns of adult solicitor behaviour: towards a theory of control within the cybersexual abuse of youth Abstract: The online solicitation of youth has been established as an unintended consequence of the connectedness afforded individuals through computer-mediated conversation. Information systems research focused on the behavioural patterns of online solicitors of youth is scant and lacks a strong theoretical foundation. We address this gap through an evolved grounded theory analysis of 90 Perverted Justice transcripts to extract the behavioural patterns that emerge when online solicitors use instant messaging to enact behaviours of grooming, predation, offending, and control. The aims of the research are: (1) delineate between grooming behaviour, predatory behaviour, and offending behaviour; (2) differentiate between passive and controlling solicitor language; (3) disentangle these behaviours from what the technology permits; (4) extend the current understanding of cybersexual abuse to show grooming as only one aspect of a phenomenon that also includes predation and offence; and (5) identify how these results are important for academics and software developers. Journal: European Journal of Information Systems Pages: 591-622 Issue: 6 Volume: 30 Year: 2021 Month: 11 X-DOI: 10.1080/0960085X.2020.1816146 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1816146 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:6:p:591-622 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1857666_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jonas Soluk Author-X-Name-First: Jonas Author-X-Name-Last: Soluk Author-Name: Nadine Kammerlander Author-X-Name-First: Nadine Author-X-Name-Last: Kammerlander Title: Digital transformation in family-owned Mittelstand firms: A dynamic capabilities perspective Abstract: Digital technologies are increasingly affecting industries worldwide in many ways. Although the adoption of digital technologies by firms has been studied extensively from a technical point of view, previous research lacks insight into the managerial aspects of digital transformation, which, given the transformation’s interdisciplinarity, might have substantial implications for information systems research. In particular, it is unclear how small and medium-sized family-controlled firms (known as family-owned Mittelstand firms) with resource constraints handle digital transformation. This paper addresses this gap by drawing on rich data from 127 semi-structured interviews in a multiple case study of 15 family-owned Mittelstand firms from Germany, Austria, and Switzerland. All of these firms are active in the manufacturing industry but vary in terms of their digital transformation progress. Based on within-case and cross-case pattern analysis, we propose that the digital transformation of Mittelstand firms is a process consisting of three stages, namely, process digitalisation, product and service digitalisation, and business model digitalisation, and we reveal triggers for each stage and the dynamic capabilities needed throughout this process. Moreover, we identify three combinations of enablers and barriers that support or hinder the development of dynamic capabilities and thus accelerate or impede the advancement of the digital transformation process. Journal: European Journal of Information Systems Pages: 676-711 Issue: 6 Volume: 30 Year: 2021 Month: 11 X-DOI: 10.1080/0960085X.2020.1857666 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1857666 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:6:p:676-711 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1817802_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Christine Moser Author-X-Name-First: Christine Author-X-Name-Last: Moser Author-Name: Dirk Deichmann Author-X-Name-First: Dirk Author-X-Name-Last: Deichmann Title: Knowledge sharing in two cultures: the moderating effect of national culture on perceived knowledge quality in online communities Abstract: Online communities have been identified as key platforms for innovation and knowledge sharing. While many studies have consistently identified that social capital and cultural factors are important for online knowledge sharing, their joint effect has to date received less attention. Addressing this gap helps us to move away from a one-size-fits-all approach of managing online communities to one which takes into account that social capital (i.e., trust, reciprocity, and a shared vision) may have differential effects on the sharing of high-quality knowledge. We therefore ask: To what extent does national culture shape the effect of social capital on perceived knowledge quality? We use survey data from two online communities from Germany and the Netherlands and demonstrate that the relationship between social capital and perceived knowledge quality differs in the two different national cultures, in particular for effects of reciprocity and shared vision. Besides practical contributions, we add to the literature by first integrating a social capital and online knowledge sharing lens and highlighting the moderating effect of national culture. Second, we provide a fine-grained understanding of the influence of national culture on knowledge sharing by delving deeper into differences between national cultures often regarded as similar. Journal: European Journal of Information Systems Pages: 623-641 Issue: 6 Volume: 30 Year: 2021 Month: 11 X-DOI: 10.1080/0960085X.2020.1817802 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1817802 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:6:p:623-641 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1854061_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Hameed Chughtai Author-X-Name-First: Hameed Author-X-Name-Last: Chughtai Title: Instrumental aspects of play at work in information technology organisations Abstract: Conventional wisdom suggests that play is the antithesis of work. But in the information technology (IT) industry, companies such as Google, Facebook and Microsoft have positively integrated play into the workplace. In an era when the digital is ubiquitous and where play with IT has become commonplace, exploring the nature of play at work could shed light on the broader question of how humans exist in the world. This is an essential question for contemporary Information Systems scholarship. Drawing on the critical hermeneutics of Hans-Georg Gadamer, I offer a narrative account of the instrumental aspects of play at work. I conducted an ethnographic study of the everyday practices of young IT professionals, revealing that workplace play has multiple instrumental aspects which are related to the temporality, spatiality, materiality and sociality of IT work practices. Journal: European Journal of Information Systems Pages: 659-675 Issue: 6 Volume: 30 Year: 2021 Month: 11 X-DOI: 10.1080/0960085X.2020.1854061 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1854061 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:6:p:659-675 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1890529_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jennifer Jewer Author-X-Name-First: Jennifer Author-X-Name-Last: Jewer Author-Name: Deborah R Compeau Author-X-Name-First: Deborah R Author-X-Name-Last: Compeau Title: Understanding information systems success: a hybrid view Abstract: The information systems (IS) success model, introduced in 1992, provided IS research with a comprehensive set of dependent variables for project success. While the model addresses both process and variance considerations, the latter has dominated the research. Concurrently, the benefits of hybrid theories have been discussed in the literature, and there have been calls for an integrated view of IS success that includes the process perspective. We build on this momentum by presenting a hybrid model based on a longitudinal case study of the development and implementation of a patient-flow decision-support system at a large not-for-profit hospital. Our model remains true to the DeLone and McLean framing but elaborates on the process elements. The hybrid model expands our ability to analyse multiple dimensions of IS success and integrates diverse research findings into the IS success model, providing a revised version for future research to extend. Journal: European Journal of Information Systems Pages: 577-596 Issue: 5 Volume: 31 Year: 2022 Month: 09 X-DOI: 10.1080/0960085X.2021.1890529 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1890529 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:5:p:577-596 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2100061_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Aymeric Hemon-Hildgen Author-X-Name-First: Aymeric Author-X-Name-Last: Hemon-Hildgen Author-Name: Frantz Rowe Author-X-Name-First: Frantz Author-X-Name-Last: Rowe Title: Conceptualising and defining DevOps: a review for understanding, not a framework for practitioners Journal: European Journal of Information Systems Pages: 568-574 Issue: 5 Volume: 31 Year: 2022 Month: 09 X-DOI: 10.1080/0960085X.2022.2100061 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2100061 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:5:p:568-574 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2108199_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Michael D. Myers Author-X-Name-First: Michael D. Author-X-Name-Last: Myers Title: Updating the EJIS word limit Journal: European Journal of Information Systems Pages: 547-547 Issue: 5 Volume: 31 Year: 2022 Month: 09 X-DOI: 10.1080/0960085X.2022.2108199 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2108199 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:5:p:547-547 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1997100_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Michael Gall Author-X-Name-First: Michael Author-X-Name-Last: Gall Author-Name: Federico Pigni Author-X-Name-First: Federico Author-X-Name-Last: Pigni Title: Taking DevOps mainstream: a critical review and conceptual framework Abstract: Agile development and operations (DevOps) is a model for delivering software as a service that comprises a set of practices and tools combining the responsibilities for both developing and operating the software into a single team. DevOps has been shown to offer advantages over traditional, waterfall-based software development methods. Agile software development practices have radically changed how developers realize software, breaking traditional structures. DevOps enables the team to continuously deliver software. The scope of DevOps is different, as it focuses on the relation between the development and operations teams. Both the academic literature and business press opine on DevOps implementation challenges and failures. The literature on DevOps is abundant but fails to convey with clarity what DevOps is. The lack of a homogeneous and clear conceptualization of DevOps is considered a major obstacle to the diffusion of this methodology.We perform a systematic literature review to identify, review, and synthesise all the relevant studies published in the field of information systems and software engineering between 2012 and 2020. As a result of our review, we derive a conceptual model providing a logical categorisation and a clear definition of the conceptual elements of DevOps. Journal: European Journal of Information Systems Pages: 548-567 Issue: 5 Volume: 31 Year: 2022 Month: 09 X-DOI: 10.1080/0960085X.2021.1997100 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1997100 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:5:p:548-567 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1907232_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Lapo Mola Author-X-Name-First: Lapo Author-X-Name-Last: Mola Author-Name: Andrea Carugati Author-X-Name-First: Andrea Author-X-Name-Last: Carugati Author-Name: Antonio Giangreco Author-X-Name-First: Antonio Author-X-Name-Last: Giangreco Author-Name: Joao Viera Da Cunha Author-X-Name-First: Joao Viera Author-X-Name-Last: Da Cunha Title: Learning from unexpected technological success: an extended model of supply-side diffusion Abstract: Researchers have studied the diffusion of information technology (IT) mainly as a process of adoption. However, the practices of supply-side agents of diffusion are just as critical to guaranteeing the adaptation of technology to the changing needs of the adopters. The execution of these practices over time and across multiple supply-side agents is both complex and understudied. Therefore, this study investigates IT diffusion practices from the perspective of supply-side agents. Drawing from a longitudinal case of development, sale, and institutionalisation of a healthcare information system, this article proposes a model of the supply side of technology diffusion. The model shows that diffusion depends on supply-side agents engaging in practices that are both demanding and possibly misaligned with traditional agent practices. Accordingly, the study provides an additional explanation for the complexity of technological diffusion and extends the theoretical framework of technology diffusion by adding supply-side dynamics. Journal: European Journal of Information Systems Pages: 597-616 Issue: 5 Volume: 31 Year: 2022 Month: 09 X-DOI: 10.1080/0960085X.2021.1907232 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1907232 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:5:p:597-616 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2100062_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Michael Gall Author-X-Name-First: Michael Author-X-Name-Last: Gall Author-Name: Federico Pigni Author-X-Name-First: Federico Author-X-Name-Last: Pigni Title: On conceptualising and defining DevOps: short comments to Hemon-Hildgen and Rowe Journal: European Journal of Information Systems Pages: 575-576 Issue: 5 Volume: 31 Year: 2022 Month: 09 X-DOI: 10.1080/0960085X.2022.2100062 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2100062 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:5:p:575-576 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1907233_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Nikhil Mehta Author-X-Name-First: Nikhil Author-X-Name-Last: Mehta Author-Name: Sumedha Chauhan Author-X-Name-First: Sumedha Author-X-Name-Last: Chauhan Author-Name: Inderjeet Kaur Author-X-Name-First: Inderjeet Author-X-Name-Last: Kaur Title: Extending the story of IS success: a meta-analytic investigation of contingency factors at individual and organisational levels Abstract: In the last decade, a diverse array of information systems (IS) has emerged to help organisations achieve their performance goals. As a result, global spending on information technology (IT) has increased manifold. These developments have reopened the fundamental question of how IS success is shaped at the organisational level. Scholars and practitioners would also like to understand if, compared to the individual level, IS success patterns differ at the organisational level. The last meta-analysis of IS success was conducted nearly a decade ago and it could not examine IS success at the organisational level. There is also a need to gain a deeper understanding of key contingencies influencing success at the organisational level. Based on a comprehensive meta-analysis of research studies conducted in the last decade, we not only report how IS success patterns are shaped at the organisational level but also show how these patterns compare to success configurations at the individual level. Additionally, we conduct detailed multi-level meta-analyses of system complexity and user type as two key contingencies influencing success at both individual as well as organisational levels. Findings of our moderation analyses reveal distinct constructions of IS success across both levels. Journal: European Journal of Information Systems Pages: 617-640 Issue: 5 Volume: 31 Year: 2022 Month: 09 X-DOI: 10.1080/0960085X.2021.1907233 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1907233 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:5:p:617-640 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933505_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: A Poulymenakou Author-X-Name-First: A Author-X-Name-Last: Poulymenakou Author-Name: A Holmes Author-X-Name-First: A Author-X-Name-Last: Holmes Title: A contingency framework for the investigation of information systems failure Abstract: Despite the increasing sophistication of information technologies, information systems (IS) continue to fail either during development, or at the points of implementation and use. This paper argues that effective practices to deal with, or prevent, such failure require wider organizational awareness and a deeper understanding of the nature, phenomena and implications of IS failure. The paper suggests that the social nature of IS needs to be a central feature in the study, analysis and action to mitigate failure. Following this view, context plays a significant role in the development of an understanding of failure incidents and in the adoption of relevant action. These concerns can be accommodated within a contingency perspective for the investigation of IS failure. The paper proposes a framework of concepts that support this perspective and then moves on to provide examples of how such a perspective could inform study of, and action upon, IS failure. Journal: European Journal of Information Systems Pages: 34-46 Issue: 1 Volume: 5 Year: 1996 Month: 3 X-DOI: 10.1057/ejis.1996.10 File-URL: http://hdl.handle.net/10.1057/ejis.1996.10 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:5:y:1996:i:1:p:34-46 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933506_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: O Fredriksson Author-X-Name-First: O Author-X-Name-Last: Fredriksson Author-Name: M Vilgon Author-X-Name-First: M Author-X-Name-Last: Vilgon Title: Evolution of inter-organizational information systems in industrial distribution: the cases of Luna and Pappersgruppen Abstract: Many of the best known and most successful examples of competitively advantageous information systems are those that link the focal organizations with their suppliers, distributors or end-users; so called inter-organizational information systems. There is little published research describing the evolutionary processes of such systems. This article presents two, earlier unpublished, longitudinal Swedish case studies of successful evolution of inter-organizational information systems. On the basis of the comparative analysis of the cases, future research is proposed to focus on dynamic aspects and applying relationship (or industrial network) perspectives. Journal: European Journal of Information Systems Pages: 47-61 Issue: 1 Volume: 5 Year: 1996 Month: 3 X-DOI: 10.1057/ejis.1996.11 File-URL: http://hdl.handle.net/10.1057/ejis.1996.11 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:5:y:1996:i:1:p:47-61 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933507_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: J Nandhakumar Author-X-Name-First: J Author-X-Name-Last: Nandhakumar Title: Design for success?: critical success factors in executive information systems development Abstract: Much of the literature on executive information systems (EIS) development provides lists of factors critical to the successful EIS development. This gives only limited insights into the relationship between the success factors and the development process. By drawing on an in-depth study of EIS development in a large manufacturing company, this paper seeks to provide a theoretically-based explanation of the process by which the relationship between key success factors and the EIS development operated. The rich insights gained from this empirical study are used to critique the main assumptions of the factor approach. This paper argues that a better understanding of the relationship between key success factors and the EIS development is required if success factors are to be of any guidance to the practitioners to develop effective information systems. Journal: European Journal of Information Systems Pages: 62-72 Issue: 1 Volume: 5 Year: 1996 Month: 3 X-DOI: 10.1057/ejis.1996.12 File-URL: http://hdl.handle.net/10.1057/ejis.1996.12 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:5:y:1996:i:1:p:62-72 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933508_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: The Editors Title: A new partnership Journal: European Journal of Information Systems Pages: 1-1 Issue: 1 Volume: 5 Year: 1996 Month: 3 X-DOI: 10.1057/ejis.1996.6 File-URL: http://hdl.handle.net/10.1057/ejis.1996.6 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:5:y:1996:i:1:p:1-1 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933509_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: J Backhouse Author-X-Name-First: J Author-X-Name-Last: Backhouse Author-Name: G Dhillon Author-X-Name-First: G Author-X-Name-Last: Dhillon Title: Structures of responsibility and security of information systems Abstract: Our research suggests an improved theoretical and conceptual foundation for analysing information systems security. We argue that an analysis of structures of responsibility in organizations leads to the development of secure information systems. The paper surveys the existing approaches to security and proposes an alternative perspective for viewing organizational and security issues. Journal: European Journal of Information Systems Pages: 2-9 Issue: 1 Volume: 5 Year: 1996 Month: 3 X-DOI: 10.1057/ejis.1996.7 File-URL: http://hdl.handle.net/10.1057/ejis.1996.7 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:5:y:1996:i:1:p:2-9 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933510_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: JA Sena Author-X-Name-First: JA Author-X-Name-Last: Sena Author-Name: DH Olson Author-X-Name-First: DH Author-X-Name-Last: Olson Title: Decision support for the administrative man: a prototype DSS case Abstract: In this paper we focus on the practical and conceptual design factors and implementation features of a prototype decision support system for a typical ‘administrative man’. We discuss the parameters and design principles that we found significant for the creation, inclusion and visualisation of mental models to aid the change management process for a particular manager. In related research we formulated a prescriptive model for this manager. Using this formulation we created a design for the change management subset of the decision maker's environment. Our goal is to provide a framework that supports decision situations where complexity and vagueness constrain the decision making process. Journal: European Journal of Information Systems Pages: 10-23 Issue: 1 Volume: 5 Year: 1996 Month: 3 X-DOI: 10.1057/ejis.1996.8 File-URL: http://hdl.handle.net/10.1057/ejis.1996.8 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:5:y:1996:i:1:p:10-23 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933511_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: B Cox Author-X-Name-First: B Author-X-Name-Last: Cox Author-Name: S Ghoneim Author-X-Name-First: S Author-X-Name-Last: Ghoneim Title: Drivers and barriers to adopting EDI: a sector analysis of UK industry Abstract: This paper presents the results of research comparing the effects of Electronic Data Interchange (EDI) on seven UK industry sectors. The sectors investigated were retail, manufacturing, distribution, utilities, pharmaceutical, government and services. The analysis focuses in particular on similarities and differences in the implementation process and examines the difficulties experienced and benefits achieved by the various industry sectors. Further, the level of EDI integration with internal business processes is investigated. A framework is described which is based on a survey, a case study of successful EDI implementation and interviews with both service providers and users. It provides a potential tool for practitioners covering important aspects of EDI implementation and integration. Journal: European Journal of Information Systems Pages: 24-33 Issue: 1 Volume: 5 Year: 1996 Month: 3 X-DOI: 10.1057/ejis.1996.9 File-URL: http://hdl.handle.net/10.1057/ejis.1996.9 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:5:y:1996:i:1:p:24-33 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933801_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: John D Wells Author-X-Name-First: John D Author-X-Name-Last: Wells Author-Name: William L Fuerst Author-X-Name-First: William L Author-X-Name-Last: Fuerst Author-Name: Jonathan W Palmer Author-X-Name-First: Jonathan W Author-X-Name-Last: Palmer Title: Designing consumer interfaces for experiential tasks: an empirical investigation Abstract: In the early adoption phase of business-to-consumer (B2C) ecommerce, the tasks that proved most conducive to online consumer interaction typically were goal-directed, being clear in sequence and structure. A key challenge in ecommerce is the ability to design interfaces that support experiential tasks in addition to goal-directed tasks. Most of the ecommerce research on interface design, however, has focused on goal-directed tasks and has not addressed experiential tasks. Based on the literature from interface metaphors and mental models, this paper explores the use of tangible attributes derived from the physical business domain as a technique for designing an interface that effectively supports experiential tasks. A laboratory experiment was designed and conducted to test the impact of two types of interfaces and business domain familiarity when completing an experiential task. Because consumers need to retain and recall information to evaluate products/services or to make brand associations, retention/recall of information was measured on both the day of the treatment and after a 2-day lag. Results revealed that the interface based upon the business domain metaphor stimulated higher levels of retention and recall of information and thus provided the desired support for experiential tasks. Further, users with weaker domain familiarity showed the greatest improvement in retention and recall, particularly after a 2-day lag, when using the interface with the business domain metaphor design. Journal: European Journal of Information Systems Pages: 273-287 Issue: 3 Volume: 14 Year: 2005 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000516 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000516 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:3:p:273-287 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933802_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Surendra N Singh Author-X-Name-First: Surendra N Author-X-Name-Last: Singh Author-Name: Nikunj Dalal Author-X-Name-First: Nikunj Author-X-Name-Last: Dalal Author-Name: Nancy Spears Author-X-Name-First: Nancy Author-X-Name-Last: Spears Title: Understanding Web home page perception Abstract: A home page is the gateway to an organization's Web site. To design effective Web home pages, it is necessary to understand the fundamental drivers of user's perception of Web pages. Not only do designers have to understand potential users' frame of mind, they also have at their choosing a stupefying array of attributes – including numerous font types, audio, video, and graphics – all of which can be arranged on a page in different ways, compounding the complexity of the design task. A theoretical model capable of explaining user reactions at a molar level should be invaluable to Web designers as a complement to prevalent intuitive and heuristic approaches. Such a model transcends piecemeal page attributes to focus on overall Web page perceptions of users. Reasoning that people perceive the cyberspace of Web pages in ways similar to their perception of physical places, we use Kaplan and Kaplan's informational model of place perception from the field of environmental psychology to predict that only two dimensions: understanding of information on a Web page, and the involvement potential of a Web page, should adequately capture Web page perception at a molar level. We empirically verify the existence of these dimensions and develop valid scales for measuring them. Using a home page as a stimulus in a lab experiment, we find that understanding and involvement together account for a significant amount of the variance in the attitude toward the Web page and in the intention to browse the underlying Web site. We show that the informational model is a parsimonious and powerful theoretical framework to measure users' perceptions of Web home pages and it could potentially serve as a guide to Web page design and testing efforts. Journal: European Journal of Information Systems Pages: 288-302 Issue: 3 Volume: 14 Year: 2005 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000525 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000525 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:3:p:288-302 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933803_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mikko T Siponen Author-X-Name-First: Mikko T Author-X-Name-Last: Siponen Title: An analysis of the traditional IS security approaches: implications for research and practice Abstract: Scholars have developed several modern information systems security (ISS) methods. Yet the traditional ISS methods – ISS checklists, ISS standards, ISS maturity criteria, risk management (RM) and formal methods (FM) – are still among the most used ISS methods. This study makes sense of these traditional ISS methods by comparing their underlying key assumptions. The main finding is that the traditional ISS methods regurgitate several features and assumptions that are required to be dealt with by traditional ISS methods developers and practitioners. Journal: European Journal of Information Systems Pages: 303-315 Issue: 3 Volume: 14 Year: 2005 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000537 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000537 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:3:p:303-315 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933804_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Zahir Irani Author-X-Name-First: Zahir Author-X-Name-Last: Irani Author-Name: Amir M Sharif Author-X-Name-First: Amir M Author-X-Name-Last: Sharif Author-Name: Peter E D Love Author-X-Name-First: Peter E D Author-X-Name-Last: Love Title: Linking knowledge transformation to Information Systems evaluation Abstract: The evaluation and assessment of Information Systems (IS) is rapidly becoming an important and significant topic for study as well as practice. As such, the application of appraisal frameworks within technology management scenarios in industrial organizations is vital to determining IS project success and/or failure. The information and knowledge requirements of evaluation appear to suggest that mapping benefits, risks and costs to organizational objectives and strategy should result in a clearer and more rational appraisal process. However, in doing so, it is not clear from the extant literature within the field of IS evaluation what aspects of knowledge relate to human and organizational factors in this decision-making task. Hence, in order to elucidate this issue, the authors attempt to highlight those extant components of knowledge that contribute to the overall ISE process, within a case organization. This is achieved via an analysis of case study data against the well-known knowledge transformation model proposed by Nonaka and Takeuchi. As a result of this, the authors present a model detailing these factors in the context of the IS evaluation lifecycle. Journal: European Journal of Information Systems Pages: 213-228 Issue: 3 Volume: 14 Year: 2005 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000538 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000538 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:3:p:213-228 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933805_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mike Newman Author-X-Name-First: Mike Author-X-Name-Last: Newman Author-Name: Chris Westrup Author-X-Name-First: Chris Author-X-Name-Last: Westrup Title: Making ERPs work: accountants and the introduction of ERP systems Abstract: In the last 10 years, the majority of large companies have attempted to install Enterprise Resource Planning (ERP) systems, replacing functional systems with a standardised company-wide system. However, making an ERP system work, we contend, is more than an issue of technical expertise or social accommodation: it is an ongoing, dynamic interaction between the ERP system, different groups in an organisation and external groups, such as vendors, management consultants and shareholders. This paper builds this argument using the example of management accountants in the U.K. based on evidence from a survey and several case studies. Drawing on work by Scarbrough and Corbett, we apply and develop a model, the technology power loop, linking technology, the control of technology and expertise to explain issues of how ERP systems are made to work and how expert groups seek to influence this development. We show, using empirical evidence from a survey and several case studies, that the relationship of accountants and technologies such as ERPs has become increasingly intertwined, but accountants continue to use their position to reshape their professional expertise wherever possible. However, our evidence also shows that neglect in this area allows other groups to wrest control from management accountants and make ERPs work for themselves. Journal: European Journal of Information Systems Pages: 258-272 Issue: 3 Volume: 14 Year: 2005 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000539 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000539 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:3:p:258-272 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933806_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ela Klecun Author-X-Name-First: Ela Author-X-Name-Last: Klecun Author-Name: Tony Cornford Author-X-Name-First: Tony Author-X-Name-Last: Cornford Title: A critical approach to evaluation Abstract: Within information systems, the question of evaluation remains as a major contentious issue, and perhaps even more so in the field of health informatics where the traditions of medicine meet and mingle with the information systems field. A review of the literature in these areas indicates that there is little agreement on the essential role of evaluation, a ‘best way’ to evaluate, on what and how to evaluate, whom to involve and within what paradigm to proceed. Reflecting on discussion within both traditions, this paper develops an approach to evaluation broadly based on critical theory, and argues that such an approach, while not offering a solution to all the problems of evaluation, does bring into focus fundamental questions relating to evaluation process and content. To illustrate this, the paper reflects on the strengths and weaknesses of an evaluation of a primary care intranet, and suggests how a critical approach might lead to a more meaningful evaluation and provide more significant and useful findings. Journal: European Journal of Information Systems Pages: 229-243 Issue: 3 Volume: 14 Year: 2005 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000540 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000540 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:3:p:229-243 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933807_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Guy Fitzgerald Author-X-Name-First: Guy Author-X-Name-Last: Fitzgerald Author-Name: Nancy L Russo Author-X-Name-First: Nancy L Author-X-Name-Last: Russo Title: The turnaround of the London Ambulance Service Computer-Aided Despatch system (LASCAD) Abstract: The implementation of the Computer-Aided Despatch system at the London Ambulance Service has been one of the most notorious cases of failure within the information systems (IS) literature. What is less well known is that there followed, some time later, a much more successful implementation, described as a turnaround. This paper, based on a case study approach, describes the context and detail of that implementation. A framework from the literature, used in an analysis of the initial failure, is used to analyse and compare the similarities and differences in the development of the two systems. The framework provides four interacting elements and relationships for analysis. These elements are Supporters, Project Organisation, Information System, and the Environment in which they operate. The turnaround system was found to address directly almost all the issues identified as problematic in the failure. These included the approach taken by management to understand the needs of users, including issues unrelated to the system itself, their involvement in the development process, an improvement in the availability of resources (brought about in some part because of the previous failure), the ability to follow a relaxed timeline driven by users' acceptance levels, the preparation of infrastructure projects to develop confidence, participation and prototyping, thorough testing, phased and simple implementation, and trust building. Certain environmental factors could not be so directly addressed but nevertheless were overcome by attention to detail and internal needs. Conclusions indicate that the factors addressed are not new and are to be found in the success literature. What is unusual is that they were implemented in this case in such unlikely circumstances. Journal: European Journal of Information Systems Pages: 244-257 Issue: 3 Volume: 14 Year: 2005 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000541 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000541 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:3:p:244-257 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933808_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ray J Paul Author-X-Name-First: Ray J Author-X-Name-Last: Paul Title: Editor's View: an opportunity for editors of IS journals to relate their experiences and offer advice. The Editorial View of Ray J Paul. First in a series Abstract: This opinion paper discusses the objectives of this series of Editor's Views and introduces this particular view, the first in the series. After reminding readers of the objectives of this journal, the European Journal of Information Systems, some experiences concerning the range of submissions the Journal receives are presented. Based on these experiences, some advice is offered to help prospective authors improve their chance of being accepted by the Journal. How the advice impacts on the review process is next described to assist prospective authors in determining the suitability and acceptability of a planned submission. The paper ends with planned improvements to the journal, and how authors can help the European Journal of Information Systems continue its successful progress as one of the leading IS journals. Journal: European Journal of Information Systems Pages: 207-212 Issue: 3 Volume: 14 Year: 2005 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000542 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000542 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:3:p:207-212 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933809_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Marinos Themistocleous Author-X-Name-First: Marinos Author-X-Name-Last: Themistocleous Title: Editorial Journal: European Journal of Information Systems Pages: 205-206 Issue: 3 Volume: 14 Year: 2005 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000543 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000543 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:3:p:205-206 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933669_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: George Magoulas Author-X-Name-First: George Author-X-Name-Last: Magoulas Title: Model-based design and evaluation of interactive applications Journal: European Journal of Information Systems Pages: 175-175 Issue: 3 Volume: 10 Year: 2001 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000385 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000385 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:10:y:2001:i:3:p:175-175 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933670_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ian Alexander Author-X-Name-First: Ian Author-X-Name-Last: Alexander Title: Handbook of Action Research Participative Inquiry and Practice Journal: European Journal of Information Systems Pages: 176-177 Issue: 3 Volume: 10 Year: 2001 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000387 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000387 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:10:y:2001:i:3:p:176-177 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933671_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Hugh Preston Author-X-Name-First: Hugh Author-X-Name-Last: Preston Title: Managing Electronic Services; A Public Sector Perspective Journal: European Journal of Information Systems Pages: 178-178 Issue: 3 Volume: 10 Year: 2001 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000390 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000390 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:10:y:2001:i:3:p:178-178 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933672_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: David E Cook Author-X-Name-First: David E Author-X-Name-Last: Cook Title: The Component-based Business: Plug and Play Journal: European Journal of Information Systems Pages: 179-179 Issue: 3 Volume: 10 Year: 2001 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000391 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000391 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:10:y:2001:i:3:p:179-179 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933673_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Geoffrey Elliott Author-X-Name-First: Geoffrey Author-X-Name-Last: Elliott Title: Market-oriented Technology Management—Innovating for Profit in Entrepreneurial Times Journal: European Journal of Information Systems Pages: 180-180 Issue: 3 Volume: 10 Year: 2001 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000392 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000392 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:10:y:2001:i:3:p:180-180 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933674_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: W L Currie Author-X-Name-First: W L Author-X-Name-Last: Currie Author-Name: P Seltsikas Author-X-Name-First: P Author-X-Name-Last: Seltsikas Title: Exploring the supply-side of IT outsourcing: evaluating the emerging role of application service providers Abstract: The paper explores the supply-side of IT outsourcing by focusing upon the emerging role of application service providers (ASPs). It traces the transition from first wave IT outsourcing in the 1960s, to business-centric outsourcing in the 1980s and 90s to application outsourcing in the 21st century. Drawing from empirical research on a taxonomy of ASPs, the paper explores how application outsourcing is currently changing the nature of the outsourcing contract and relationship between client and supplier. This will have significant implications for traditional outsourcing and ERP vendors in the software and computing services industry, in addition to presenting new opportunities to SMEs with little history or experience of outsourcing. Journal: European Journal of Information Systems Pages: 123-134 Issue: 3 Volume: 10 Year: 2001 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000393 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000393 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:10:y:2001:i:3:p:123-134 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933675_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: P Panagiotidis Author-X-Name-First: P Author-X-Name-Last: Panagiotidis Author-Name: J S Edwards Author-X-Name-First: J S Author-X-Name-Last: Edwards Title: Organisational learning—a critical systems thinking discipline Abstract: This paper deals with the application of critical systems thinking in the domain of organisational learning and knowledge management. Its viewpoint is that deep organisational learning only takes place when the business systems' stakeholders reflect on their actions and thus inquire about their purpose(s) in relation to the business system and the other stakeholders they perceive to exist. This is done by reflecting both on the sources of motivation and/or deception that are contained in their purpose, and also on the sources of collective motivation and/or deception that are contained in the business system's purpose. The development of an organisational information system that captures, manages and institutionalises meaningful information—a knowledge management system—cannot be separated from organisational learning practices, since it should be the result of these very practices. Although Senge's five disciplines provide a useful starting-point in looking at organisational learning, we argue for a critical systems approach, instead of an uncritical Systems Dynamics one that concentrates only on the organisational learning practices.We proceed to outline a methodology called Business Systems Purpose Analysis (BSPA) that offers a participatory structure for team and organisational learning, upon which the stakeholders can take legitimate action that is based on the force of the better argument. In addition, the organisational learning process in BSPA leads to the development of an intrinsically motivated information organisational system that allows for the institutionalisation of the learning process itself in the form of an organisational knowledge management system. This could be a specific application, or something as wide-ranging as an Enterprise Resource Planning (ERP) implementation. Examples of the use of BSPA in two ERP implementations are presented. Journal: European Journal of Information Systems Pages: 135-146 Issue: 3 Volume: 10 Year: 2001 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000394 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000394 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:10:y:2001:i:3:p:135-146 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933676_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: N F Doherty Author-X-Name-First: N F Author-X-Name-Last: Doherty Author-Name: M King Author-X-Name-First: M Author-X-Name-Last: King Title: An investigation of the factors affecting the successful treatment of organisational issues in systems development projects Abstract: A review of the relevant literature confirms the importance of treating organisational issues in order to avoid information systems development failures. To investigate how such issues are treated in practice and the factors associated with their successful treatment, a large-scale survey was conducted. A questionnaire was mailed to senior IS executives and over 600 responses were received. A majority of the respondents (60%) perceived that organisational issues were more important than technical issues and a similar proportion reported treating these issues explicitly, although there was noticeable variation in the frequency with which specific types of issues were treated. However, only 50% felt that organisational issues were successfully dealt with in more than 30% of the projects for which they were responsible. This proportion seems to be independent of the type of organisation or the general development approach adopted, but the results also indicate that using an approach to treating organisational issues which is explicit, frequent and covers a wide range of specific issues is associated with higher levels of success. These results suggest that senior IT executives need to go further in ensuring that the treatment of organisational issues is given greater time, resource and level of priority. Journal: European Journal of Information Systems Pages: 147-160 Issue: 3 Volume: 10 Year: 2001 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000401 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000401 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:10:y:2001:i:3:p:147-160 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933677_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: J C Huang Author-X-Name-First: J C Author-X-Name-Last: Huang Author-Name: S Newell Author-X-Name-First: S Author-X-Name-Last: Newell Author-Name: S-L Pan Author-X-Name-First: S-L Author-X-Name-Last: Pan Title: The process of global knowledge integration: a case study of a multinational investment bank's Y2K program Abstract: In this paper we examine the phenomenon of Y2K as an example of cross-functional knowledge integration. We start with the observation that although an enormous amount of investment was made for year 2000 (Y2K) readiness, a smooth millennium rollover has ended with widespread debates about the worthiness of the investment. These debates not only reflect a common perception that the Y2K investment has been a waste of money, but also indicate that organisations often fail to learn from what they have done in the past in order to prepare for future actions. A case study of a multinational investment bank's Y2K program was conducted to analyse its main features and conceptualise the underlying cross-functional knowledge integration process. Based on our findings, we identified the following as the main processes involved in knowledge integration: (1) the penetration of different boundaries to obtain required knowledge and support; (2) the expansion of different paradigms to achieve shared understanding; (3) the reconfiguration of organisational memory to create new organisational routines and knowledge. Journal: European Journal of Information Systems Pages: 161-174 Issue: 3 Volume: 10 Year: 2001 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000402 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000402 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:10:y:2001:i:3:p:161-174 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933678_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ian Alexander Author-X-Name-First: Ian Author-X-Name-Last: Alexander Title: Managing Industrial Knowledge; Creation, Transfer and Utilization Journal: European Journal of Information Systems Pages: 181-181 Issue: 3 Volume: 10 Year: 2001 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000403 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000403 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:10:y:2001:i:3:p:181-181 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934041_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Thompson S H Teo Author-X-Name-First: Thompson S H Author-X-Name-Last: Teo Author-Name: Bing Men Author-X-Name-First: Bing Author-X-Name-Last: Men Title: Knowledge portals in Chinese consulting firms: a task–technology fit perspective Abstract: Although knowledge management (KM) has been examined in previous research, the utilization of KM technologies is still not well understood. Hence, in this study, a model was developed to investigate the utilization of KM technologies, specifically, knowledge portals, from the task–technology fit (TTF) perspective. An empirical study was conducted in the Chinese consulting industry to test the validity of the model. The results show that knowledge tacitness, output quality, and compatibility are positively related to utilization. Utilization and compatibility are positively related to performance. TTF is more strongly related to performance than to utilization. Implications of the results are discussed. Journal: European Journal of Information Systems Pages: 557-574 Issue: 6 Volume: 17 Year: 2008 Month: 12 X-DOI: 10.1057/ejis.2008.41 File-URL: http://hdl.handle.net/10.1057/ejis.2008.41 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:6:p:557-574 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934042_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Kari Smolander Author-X-Name-First: Kari Author-X-Name-Last: Smolander Author-Name: Matti Rossi Author-X-Name-First: Matti Author-X-Name-Last: Rossi Author-Name: Sandeep Purao Author-X-Name-First: Sandeep Author-X-Name-Last: Purao Title: Software architectures: Blueprint, Literature, Language or Decision? Abstract: This study questions the traditional view of software architecture as a specification that needs only be understood by software architects and engineers. Based on an intensive study of three software-producing organizations, we identify multiple metaphors (‘Blueprint,’ ‘Literature,’ ‘Language’ and ‘Decision’) that stakeholders use to understand the term software architecture, which in turn, allows them to effectively participate in its creation and use. Our results point to new research directions that may better encompass a broader view of software architecture. Journal: European Journal of Information Systems Pages: 575-588 Issue: 6 Volume: 17 Year: 2008 Month: 12 X-DOI: 10.1057/ejis.2008.48 File-URL: http://hdl.handle.net/10.1057/ejis.2008.48 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:6:p:575-588 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934043_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Sunyoung Cho Author-X-Name-First: Sunyoung Author-X-Name-Last: Cho Author-Name: Lars Mathiassen Author-X-Name-First: Lars Author-X-Name-Last: Mathiassen Author-Name: Agneta Nilsson Author-X-Name-First: Agneta Author-X-Name-Last: Nilsson Title: Contextual dynamics during health information systems implementation: an event-based actor-network approach Abstract: Despite its information-intensive nature and considerable investments, healthcare continues to lag behind other industries in effectively exploiting information technology (IT). This paradox suggests that the healthcare industry presents particular challenges for successful implementation of information systems. As a result, there is an increasing interest in research into how information systems implementation efforts are shaped in interaction with the healthcare context. This paper contributes to this emerging body of knowledge by applying Actor-Network Theory (ANT) to explore the implementation of a radiology network system in a Swedish hospital. The analysis of the process reveals how complex contextual dynamics had disruptive effects. First, we identified important dynamics related to implementation content; these were mainly expressed as tensions between the radiology network system and medical work practices. Second, we found important dynamics related to implementation context; these were mainly expressed as tensions between shifting networks of actors within the implementation project and the broader institutional setting. Seeking to understand contextual dynamics during healthcare information systems implementation, we use events to focus, structure, and present the ANT analysis. This event-based approach furthers our understanding of how researchers can apply ANT to study IT-based change in general. Journal: European Journal of Information Systems Pages: 614-630 Issue: 6 Volume: 17 Year: 2008 Month: 12 X-DOI: 10.1057/ejis.2008.49 File-URL: http://hdl.handle.net/10.1057/ejis.2008.49 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:6:p:614-630 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934044_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Kalle Lyytinen Author-X-Name-First: Kalle Author-X-Name-Last: Lyytinen Author-Name: Mike Newman Author-X-Name-First: Mike Author-X-Name-Last: Newman Title: Explaining information systems change: a punctuated socio-technical change model Abstract: We outline a Punctuated Socio-Technical Information System Change model. The model recognizes both incremental and punctuated socio-technical change in the context of information systems at multiple levels – the work system level, the building system level, and the organizational environment. It uses socio-technical event sequences and their properties to explain how a change outcome emerged. The critical events in these sequences correspond to gaps in socio-technical systems. By conceiving information system (IS) change as a multi-level and punctuated sequence of socio-technical events, IS researchers can conceive plausible and accurate process explanations of IS change outcomes, including IS failures. Such explanations are located in the middle range and thus avoid the highly abstract and stylized closed-boxed factor models of change, but go beyond the idiographic open box histories of singular change processes. Journal: European Journal of Information Systems Pages: 589-613 Issue: 6 Volume: 17 Year: 2008 Month: 12 X-DOI: 10.1057/ejis.2008.50 File-URL: http://hdl.handle.net/10.1057/ejis.2008.50 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:6:p:589-613 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934045_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Randolph B Cooper Author-X-Name-First: Randolph B Author-X-Name-Last: Cooper Author-Name: Russell Haines Author-X-Name-First: Russell Author-X-Name-Last: Haines Title: The Influence of workspace awareness on group intellective decision effectiveness Abstract: Workspace awareness is an understanding of members’ interactions within a shared workspace, and has been a fundamental concern to researchers examining how groups using group support systems can be more effective as they design and develop physical artifacts. We provide theoretical and empirical evidence that workspace awareness can be a significant factor influencing the effectiveness of groups employing group support systems for the development of intangible artifacts, such as decision quality and consensus. The workspace awareness literature typically does not examine causal relationships within awareness. We develop a theoretical model that divides workspace awareness into three elements (presence, behavior, and insight awareness), which are important for group decision tasks, and provide empirical evidence that: (1) understanding the reasons behind group member behaviors (insight awareness) is key to increasing decision quality and consensus; (2) greater insight awareness can be obtained when an individual is better able to track and characterize others’ behaviors (behavior awareness); and (3) behavior awareness depends on an individual's ability to identify and distinguish among the different individuals within the group (presence awareness). Empirical support is derived from a laboratory experiment. Journal: European Journal of Information Systems Pages: 631-648 Issue: 6 Volume: 17 Year: 2008 Month: 12 X-DOI: 10.1057/ejis.2008.51 File-URL: http://hdl.handle.net/10.1057/ejis.2008.51 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:6:p:631-648 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934046_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Antony Bryant Author-X-Name-First: Antony Author-X-Name-Last: Bryant Title: The future of information systems – Thinking Informatically Abstract: Many of those who are active within the academic field of information systems (IS) are constantly seeking a firm disciplinary basis for their endeavours. In many respects, such efforts are based upon a mistaken view of how disciplines are actually constituted, and the purposes that they serve. In many respects, it would be far more fruitful if those working within the field of IS were to accept a more fluid and contingent notion of a discipline; simultaneously recognizing the contested nature of many of the core concepts – particularly information, communication and technology. In so doing, we will be Thinking Informatically. Journal: European Journal of Information Systems Pages: 695-698 Issue: 6 Volume: 17 Year: 2008 Month: 12 X-DOI: 10.1057/ejis.2008.52 File-URL: http://hdl.handle.net/10.1057/ejis.2008.52 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:6:p:695-698 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934047_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Edgar A Whitley Author-X-Name-First: Edgar A Author-X-Name-Last: Whitley Author-Name: Ian R Hosein Author-X-Name-First: Ian R Author-X-Name-Last: Hosein Title: Doing the politics of technological decision making: due process and the debate about identity cards in the U.K. Abstract: The U.K. Government, in presenting its proposals for biometric identity cards, made strong claims about the technology and science underlying the proposed National Identity Scheme. In this paper, we use insights from science and technology studies (STS), particularly Latour's ‘Politics of Nature’ argument, to analyse the parliamentary debates about the technological and scientific aspects of the proposals. The authors were part of a team that produced a report that raised a series of perplexities about the Scheme in an attempt to counter the short-circuiting of discussion of these perplexities in the parliamentary debate. The paper analyses the government's attempts at short-circuiting in light of Latour's argument and the introduction of perplexities by our report. It demonstrates the extent to which this form of STS can enhance political debate about technological decisions. Journal: European Journal of Information Systems Pages: 668-677 Issue: 6 Volume: 17 Year: 2008 Month: 12 X-DOI: 10.1057/ejis.2008.53 File-URL: http://hdl.handle.net/10.1057/ejis.2008.53 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:6:p:668-677 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934048_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Richard Baskerville Author-X-Name-First: Richard Author-X-Name-Last: Baskerville Title: Introduction to the Opinion Paper: Bryant's ‘The future of information systems’ Journal: European Journal of Information Systems Pages: 694-694 Issue: 6 Volume: 17 Year: 2008 Month: 12 X-DOI: 10.1057/ejis.2008.54 File-URL: http://hdl.handle.net/10.1057/ejis.2008.54 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:6:p:694-694 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934049_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Dewi Rooslani Tojib Author-X-Name-First: Dewi Rooslani Author-X-Name-Last: Tojib Author-Name: Ly-Fie Sugianto Author-X-Name-First: Ly-Fie Author-X-Name-Last: Sugianto Author-Name: Sen Sendjaya Author-X-Name-First: Sen Author-X-Name-Last: Sendjaya Title: User satisfaction with business-to-employee portals: conceptualization and scale development Abstract: The purpose of this paper is to develop and validate the business-to-employee portal user satisfaction (B2EPUS) measure. Five sequential stages of scale development were undertaken to achieve this purpose: conceptual model development, item generation, content validation, exploratory study, and confirmatory study. Confirmatory factor analysis confirmed the five dimensions of the B2EPUS, namely Usefulness, Confidentiality, Ease of Use, Convenience of Access, and Portal Design as the dimensions of the construct. Competing model analysis indicates that the second-order factor model is the better fitting for the B2EPUS construct. The theoretical and practical implications of the study as well as directions for future research are discussed in the concluding sections of this paper. Journal: European Journal of Information Systems Pages: 649-667 Issue: 6 Volume: 17 Year: 2008 Month: 12 X-DOI: 10.1057/ejis.2008.55 File-URL: http://hdl.handle.net/10.1057/ejis.2008.55 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:6:p:649-667 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934050_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Yogesh K Dwivedi Author-X-Name-First: Yogesh K Author-X-Name-Last: Dwivedi Author-Name: Jasna Kuljis Author-X-Name-First: Jasna Author-X-Name-Last: Kuljis Title: Profile of IS research published in the European Journal of Information Systems Abstract: This paper profiles the types of research activity that have been published in EJIS from 1997 to 2007. Our analysis includes variables such as the most productive authors, citation analysis, universities associated with the most research publications, geographic diversity, authors’ background, subject areas most often investigated, unit of analysis and research methodologies. The classification of the topics and methodologies used by the most highly published authors will help prospective authors gauge whether their paper is suitable for EJIS. The major geographical source of information system (IS) research published in EJIS is from AIS region 2 (Europe, the Middle East and Africa), but with a substantial AIS region 1 (American-based researchers and universities) and AIS region 3 (Asia–Pacific) contribution. The most common research method used is the case study approach, with other methods such as surveys and library research also used frequently. IS management and IS development are the two most researched IS topics published in EJIS. This research and results reported in this paper are comparable with a previous paper published about the Information Systems Journal. Any further such studies will thus be able to make similar comparisons between these journals and any others that have subsequently been covered in this way. The paper concludes with the need for more substantive research on the topic if journal comparisons are to achieve their potential. Journal: European Journal of Information Systems Pages: 678-693 Issue: 6 Volume: 17 Year: 2008 Month: 12 X-DOI: 10.1057/ejis.2008.57 File-URL: http://hdl.handle.net/10.1057/ejis.2008.57 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:6:p:678-693 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934051_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Hans van der Heijden Author-X-Name-First: Hans Author-X-Name-Last: van der Heijden Title: Editorial Journal: European Journal of Information Systems Pages: 555-556 Issue: 6 Volume: 17 Year: 2008 Month: 12 X-DOI: 10.1057/ejis.2008.58 File-URL: http://hdl.handle.net/10.1057/ejis.2008.58 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:6:p:555-556 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934068_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Claudio Vitari Author-X-Name-First: Claudio Author-X-Name-Last: Vitari Author-Name: Aurelio Ravarini Author-X-Name-First: Aurelio Author-X-Name-Last: Ravarini Title: A longitudinal analysis of trajectory changes in the software industry: the case of the content management application segment Abstract: The software industry is changing as a result of the rising influence both of packaged and of Free/Libre/Open Source Software (FLOSS), but the change trajectory of the industry is still not well understood. This paper aims to contribute to clarifying software industry evolution through a longitudinal study, using Industry Change Trajectory Theory to explain and predict the evolution of the Content Management Systems (CMS) segment and the extent to which its results can be generalized to the overall software industry. Our data analysis shows that CMS players are experiencing a modification of their segments’ change trajectory. While McGahan in 2004 recognized that the software industry was in a creative change trajectory, it has subsequently faced strong competition on its core assets, (i.e. applications) and the empirical results of our longitudinal study from 2002 to 2007 show the CMS segment is now in a radical change trajectory, due to the rapid obsolescence of its core activities. Changes affecting the segment include the continuous development of CMS applications, the faster extension of functions for FLOSS CMS than for packaged CMS, the diffusion of the practice of providing services as well as delivering of software solutions. Journal: European Journal of Information Systems Pages: 249-263 Issue: 3 Volume: 18 Year: 2009 Month: 6 X-DOI: 10.1057/ejis.2009.13 File-URL: http://hdl.handle.net/10.1057/ejis.2009.13 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:3:p:249-263 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934069_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Fernando Alonso-Mendo Author-X-Name-First: Fernando Author-X-Name-Last: Alonso-Mendo Author-Name: Guy Fitzgerald Author-X-Name-First: Guy Author-X-Name-Last: Fitzgerald Author-Name: Enrique Frias-Martinez Author-X-Name-First: Enrique Author-X-Name-Last: Frias-Martinez Title: Understanding web site redesigns in small- and medium-sized enterprises (SMEs): a U.K.-based study on the applicability of e-commerce Stage Models Abstract: Despite the efforts of governments and the various support programmes, achievement of advanced stages of e-commerce by small- and medium-sized enterprises (SMEs) is still very low. There have been some attempts to study the dynamic nature of websites, but there is still little research evidence to explain why and how SMEs evolve their web presence. This paper aims to develop a comprehensive classification of drivers for web site redesign based on interviews with various members of staff from SMEs in the U.K. that have recently redesigned their web sites. A sequential mixed-methodological analysis, involving the use of qualitative and quantitative data analysis, was used to develop the classification. This enabled the development of a framework that classified seven main categories of drivers for web site redesign. The drivers identified were: changing business requirements, evolving internet strategies, addressing user needs, maintenance, changing technology, pressure from peers/competitors, and the influence of developers. However, only the first four were found to be significant in the study. The categorisation and the findings suggest a number of key determinants not explicitly addressed by other work. In addition, the findings provide little support for the staged approach to e-commerce progression as few companies reported the implementation of sophisticated internet technology features as a main reason for their web site redesigns. The contributions of this paper are firstly, to provide an instrument to the academic and practitioner communities interested in the topic of web site evolution. Secondly, the categorisation of drivers for redesign and the individual reasons found in this study are expected to provide assistance to SME managers to justify, plan and strategise internet investments realistically and effectively. Journal: European Journal of Information Systems Pages: 264-279 Issue: 3 Volume: 18 Year: 2009 Month: 6 X-DOI: 10.1057/ejis.2009.14 File-URL: http://hdl.handle.net/10.1057/ejis.2009.14 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:3:p:264-279 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934070_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Israr Qureshi Author-X-Name-First: Israr Author-X-Name-Last: Qureshi Author-Name: Yulin Fang Author-X-Name-First: Yulin Author-X-Name-Last: Fang Author-Name: Elaine Ramsey Author-X-Name-First: Elaine Author-X-Name-Last: Ramsey Author-Name: Patrick McCole Author-X-Name-First: Patrick Author-X-Name-Last: McCole Author-Name: Patrick Ibbotson Author-X-Name-First: Patrick Author-X-Name-Last: Ibbotson Author-Name: Deborah Compeau Author-X-Name-First: Deborah Author-X-Name-Last: Compeau Title: Understanding online customer repurchasing intention and the mediating role of trust – an empirical investigation in two developed countries Abstract: Although e-commerce adoption and customers’ initial purchasing behavior have been well studied in the literature, repeat purchase intention and its antecedents remain understudied. This study proposes a model to understand the extent to which trust mediates the effects of vendor-specific factors on customers’ intention to repurchase from an online vendor. The model was tested and validated in two different country settings. We found that trust fully mediates the relationships between perceived reputation, perceived capability of order fulfillment, and repurchasing intention, and partially mediates the relationship between perceived website quality and repurchasing intention in both countries. Moreover, multi-group analysis reveals no significant between-country differences of the model with regards to the antecedents and outcomes of trust, except the effect of reputation on trust. Academic and practical implications and future research are discussed. Journal: European Journal of Information Systems Pages: 205-222 Issue: 3 Volume: 18 Year: 2009 Month: 6 X-DOI: 10.1057/ejis.2009.15 File-URL: http://hdl.handle.net/10.1057/ejis.2009.15 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:3:p:205-222 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934071_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Fay Cobb Payton Author-X-Name-First: Fay Cobb Author-X-Name-Last: Payton Author-Name: James Kiwanuka-Tondo Author-X-Name-First: James Author-X-Name-Last: Kiwanuka-Tondo Title: Contemplating public policy in HIV/AIDS online content, then where is the technology spirit? Abstract: Adaptive structuration theory (AST) has long been an accepted framework for investigating structures within technological artifacts and work environments. Information systems, organization science and communication scholars have prefaced AST context in terms of collaborative, group decision support systems. The social structures, however, can be characterized by features of rules, resources and capabilities along with a communicative spirit. Spirit is said to enable the user to better understand and interpret the meaning of a technology. Our research varies from the traditional focus of AST studies given that our context is not in single, for-profit organization with a common corporate mission or objective. Rather, we concentrate on the HIV/AIDS pandemic among Black women and the spirit communicated to this population by a principal government healthcare website. By interacting with a group of healthcare experts and practitioners during a 14-month period, we sought to understand the site's meaning and indications as its mission is to disseminate HIV/AIDS and other pertinent medical information. Further, our findings suggest that AST is a research framework that functions as a source for the notion of spirit. The (un)intended spirit inscribed on information and communication technologies (ICT) may be (ex)inclusive with regard to the population or society it intends to serve. Hence, grassroots approaches and audiences can, in fact, offer effective insight into user-centered designs focused on educational and prevention content among those most affected and infected by chronic diseases, such as HIV. Journal: European Journal of Information Systems Pages: 192-204 Issue: 3 Volume: 18 Year: 2009 Month: 6 X-DOI: 10.1057/ejis.2009.16 File-URL: http://hdl.handle.net/10.1057/ejis.2009.16 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:3:p:192-204 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934072_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mohammed Ibrahim Author-X-Name-First: Mohammed Author-X-Name-Last: Ibrahim Author-Name: Pieter M Ribbers Author-X-Name-First: Pieter M Author-X-Name-Last: Ribbers Title: The impacts of competence-trust and openness-trust on interorganizational systems Abstract: Trust can have imperative influences on the use of interorganizational systems (IOSs). Management, sociology and psychology literature distinguish different types of trust and attribute distinctive impacts to these types. However, little is known regarding the influences of different types of trust on IOSs usage. This paper focuses on how trust based on partner competence and trust based on partner openness influence the use of IOS-related resources. Hypotheses are constructed relying on the use of the resource-based view and transaction-cost economics to analyse influences on relationship specificity of four types of IOS-related resources: business processes, human knowledge, organizational domain knowledge and IOS infrastructure. Three case studies are conducted on interorganizational relationships employing IOSs. Competence-trust is found to positively influence the use of human-knowledge resources, resources related to interlinkage of business processes and organizational domain knowledge resources. Openness-trust is found to positively influence use of human-knowledge resources and organizational domain-knowledge resources. Journal: European Journal of Information Systems Pages: 223-234 Issue: 3 Volume: 18 Year: 2009 Month: 6 X-DOI: 10.1057/ejis.2009.17 File-URL: http://hdl.handle.net/10.1057/ejis.2009.17 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:3:p:223-234 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934073_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bjarne Berg Author-X-Name-First: Bjarne Author-X-Name-Last: Berg Author-Name: Antonis C Stylianou Author-X-Name-First: Antonis C Author-X-Name-Last: Stylianou Title: Factors considered when outsourcing an IS system: an empirical examination of the impacts of organizational size, strategy and the object of a decision Abstract: As IT expenditures have been growing over the last few years, organizations have started to scrutinize them more closely and some are deciding to outsource parts of their Information Systems (IS) operations. Unfortunately, there is a lack of research on the impact that the object of an outsourcing decision may have on the factors considered when making such a decision. The impact of organizational size and the firm's strategy has also not been conclusively established in the literature. This paper examines and compares the different supplier, internal, technology and cost factors considered when outsourcing Online Transaction Processing (OLTP) or Decision Support Systems (DSSs) (the object of a decision). It also examines the divergent decision factors for large, medium and small organizations, and the competitive strategy's impact on the factors that are considered. The paper is based on a study with samples from four large SAP Conferences and includes 1889 individuals working in organizations that use enterprise resource planning software. This research found that the object being outsourced, the firm's competitive strategies, and the organizational size are factors that significantly influence the outsourcing decision process. We found that the relative importance of decision factors for the outsourcing of OLTP is significantly different from those for a DSS and that, where the outsourcing object is of strategic importance, there is a closer attention to internal factors. Our findings confirm that outsourcing strategies are aligned with organizational strategies. For example, cost factors dominate in the outsourcing decision among organizations that employ a low-costs strategy as compared to those following a differentiation or niche strategy. Also, compared to firms pursuing other competitive strategies, for the outsourcing of DSS, differentiators place a significantly higher emphasis on supplier factors. Regarding the role of company size, we found significant differences in the importance given to supplier, internal, technology, and cost factors by organizations of different sizes. For example, compared to smaller organizations, larger organizations gave less importance to supplier and technology factors and more importance to cost factors. Journal: European Journal of Information Systems Pages: 235-248 Issue: 3 Volume: 18 Year: 2009 Month: 6 X-DOI: 10.1057/ejis.2009.18 File-URL: http://hdl.handle.net/10.1057/ejis.2009.18 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:3:p:235-248 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934074_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ray J Paul Author-X-Name-First: Ray J Author-X-Name-Last: Paul Title: What is published in our journals cannot change unless we do Journal: European Journal of Information Systems Pages: 189-191 Issue: 3 Volume: 18 Year: 2009 Month: 6 X-DOI: 10.1057/ejis.2009.21 File-URL: http://hdl.handle.net/10.1057/ejis.2009.21 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:3:p:189-191 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933967_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Pnina Soffer Author-X-Name-First: Pnina Author-X-Name-Last: Soffer Author-Name: Irit Hadar Author-X-Name-First: Irit Author-X-Name-Last: Hadar Title: Applying ontology-based rules to conceptual modeling: a reflection on modeling decision making Abstract: Conceptual modeling represents a domain independently of implementation considerations for purposes of understanding the problem at hand and communicating about it. However, different people may construct different models given the same domain. Variations among correct models, while known and familiar in practice, have hardly been investigated in the literature. Their roots are in the decisions made during the modeling process, where modelers face the need to map reality into modeling constructs. This paper reports an empirical study whose aim is to explore model variations and in particular to examine possible directions for reducing them. Specifically, the study uses a multimethod research paradigm to examine the effect of applying ontology-based modeling rules on modeling decisions as reflected in resulting model variations. The findings of the study provide insights into the variations phenomenon, as well as to the application of ontology-based modeling rules. Journal: European Journal of Information Systems Pages: 599-611 Issue: 5 Volume: 16 Year: 2007 Month: 10 X-DOI: 10.1057/palgrave.ejis.3000683 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000683 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:5:p:599-611 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933968_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Suzanne D Pawlowski Author-X-Name-First: Suzanne D Author-X-Name-Last: Pawlowski Author-Name: Evgeny A Kaganer Author-X-Name-First: Evgeny A Author-X-Name-Last: Kaganer Author-Name: John J Cater Author-X-Name-First: John J Author-X-Name-Last: Cater Title: Focusing the research agenda on burnout in IT: social representations of burnout in the profession Abstract: Despite the pervasiveness and high costs of burnout in IT, our understanding of this problem remains limited. Review of IS research on job stress/burnout reveals that this body of work has relied heavily on general OB theory (parsimonious models generalizable across a variety of occupations and social contexts). More recently, scholars have argued for the addition of an occupation-specific approach to complement general OB theory, incorporating factors and concerns particular to a profession/work environment to increase explanatory power and relevance. The purpose of the exploratory study in this paper is to provide a foundation for such an occupation-specific research agenda on burnout in the IT profession. As an initial step, we employ social representations theory and methods to understand how IT professionals today make sense of and assign meaning to burnout in the context of their work. Transcripts from in-depth interviews of 20 IT professionals were content-analyzed and 22 key topics (concepts) were identified. Quantitative methods, including analysis of similarity, were used to create a social representations ‘map’ reflecting these professionals' views of burnout. The study contributes to the development of a renewed research agenda by pinpointing highly salient issues and specific work contexts warranting priority in future investigations. Journal: European Journal of Information Systems Pages: 612-627 Issue: 5 Volume: 16 Year: 2007 Month: 10 X-DOI: 10.1057/palgrave.ejis.3000699 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000699 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:5:p:612-627 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933969_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Siew Kien Sia Author-X-Name-First: Siew Kien Author-X-Name-Last: Sia Author-Name: Christina Soh Author-X-Name-First: Christina Author-X-Name-Last: Soh Title: An assessment of package–organisation misalignment: institutional and ontological structures Abstract: Even with today's ‘best practice’ software, commercial packages continue to pose significant alignment challenges for many organisations. This paper proposes a conceptual framework, based on institutional theory and systems ontology, to assess the misalignments between package functionality and organisational requirements. We suggest that these misalignments can arise from incompatibility in the externally imposed or voluntarily adopted structures embedded in the organisation and package, as well as differences in the way the meaning of organisational reality is ontologically represented in the deep or surface structure of packages. The synthesis of the institutional-ontological dimensions leads us to identify four types of misalignments with varying degrees of severity – imposed-deep, imposed-surface, voluntary-deep, and voluntary-surface – and to predict their likely resolution. We test the predictions using over 400 misalignments from package implementations at three different sites. The findings support the predictions: the majority of imposed-deep misalignments were resolved via package customisation. Imposed-surface and voluntary-deep misalignments were more often resolved via organisational adaptation and voluntary-surface misalignments were almost always resolved via organisational adaptation. The extent of project success also appeared to be influenced by the number of misalignments and the proportion of imposed-deep misalignments. We conclude by suggesting strategies that implementing organisations and package vendors may pursue. Journal: European Journal of Information Systems Pages: 568-583 Issue: 5 Volume: 16 Year: 2007 Month: 10 X-DOI: 10.1057/palgrave.ejis.3000700 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000700 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:5:p:568-583 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933970_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: M W Chiasson Author-X-Name-First: M W Author-X-Name-Last: Chiasson Author-Name: L W Green Author-X-Name-First: L W Author-X-Name-Last: Green Title: Questioning the IT artefact: user practices that can, could, and cannot be supported in packaged-software designs Abstract: The purchase of packaged software has brought new opportunities and challenges to the development of information systems. An important question for packaged software consumers is how a software package will support, change or inhibit practices. To address this question, our paper focuses on the decisions made by a team developing four different software prototypes, with increasingly relaxed constraints on data content and structure. Each prototype significantly enlarged the number of health promotion planners that could be supported by the software. Consistent with the literature, the software designers balanced specificity (constraint) and generality (opening) in the software to incorporate a desire to serve a broad audience, and a need to be relevant to various sub-groups within this audience. Given a detailed knowledge of the software artefact, including the data content and structural choices made by designers, we hope to enable software consumers to question IT artefacts and their spokespeople, so they can make active and informed choices about software generality and specificity. We also suggest that this questioning process is shared across both customised and packaged software, and that the inscription of technology by designers may be either deterministic and detailed, or emergent and general. The implications for packaged software research and practice are considered. Journal: European Journal of Information Systems Pages: 542-554 Issue: 5 Volume: 16 Year: 2007 Month: 10 X-DOI: 10.1057/palgrave.ejis.3000701 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000701 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:5:p:542-554 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933971_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Duncan R Shaw Author-X-Name-First: Duncan R Author-X-Name-Last: Shaw Title: Manchester United Football Club: developing a Network Orchestration Model Abstract: This paper investigates a particular type of coordination role called ‘network orchestration’. It uses a revelatory case study of the very large network orchestrated by Manchester United Football Club, a global sporting and entertainment brand that is partnered by some of the most successful consumer brands in the world and has an estimated 70 million fans (MUFC, 2007). We use business process modelling and systems theoretical concepts to investigate the complex horizontal and vertical relationships between partner firms and then develop a multi-level model of network operation, sustainability and governance. Inter-organisational networks are open systems that are sustained far from equilibrium by the constant flow of materials, energy and information that we have called a ‘value flow system’. Here we model the flow of commercial ‘value’ through the network that sustains it in a far from equilibrium state. The contribution for managers of orchestrator firms is an architectural model of the properties and mechanisms of network orchestration that aids value flow for network building and maintenance. The implication for coordination researchers is a development of Malone and Crowston's coordination theory (1994) via the novel introduction of Hierarchy Theory to this domain. Journal: European Journal of Information Systems Pages: 628-642 Issue: 5 Volume: 16 Year: 2007 Month: 10 X-DOI: 10.1057/palgrave.ejis.3000702 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000702 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:5:p:628-642 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933972_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Lai Xu Author-X-Name-First: Lai Author-X-Name-Last: Xu Author-Name: Sjaak Brinkkemper Author-X-Name-First: Sjaak Author-X-Name-Last: Brinkkemper Title: Concepts of product software Abstract: Both the impact of software on life and our dependence on software is rapidly increasing. Using product software is an everyday phenomenon and product software is a major worldwide industry. Yet, there are very few scientific studies reported on the engineering of product software specifically. In this paper, we discuss specifics of the software business, the various terms used for product software and provide our definition of product software. Moreover, we explain difference between product software and tailor-made software from a software development perspective and provide a new framework for the categorization of product software. This paper points out the urgent need for more research on product software and the directions. Journal: European Journal of Information Systems Pages: 531-541 Issue: 5 Volume: 16 Year: 2007 Month: 10 X-DOI: 10.1057/palgrave.ejis.3000703 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000703 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:5:p:531-541 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933973_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Huoy Min Khoo Author-X-Name-First: Huoy Author-X-Name-Last: Min Khoo Author-Name: Daniel Robey Author-X-Name-First: Daniel Author-X-Name-Last: Robey Title: Deciding to upgrade packaged software: a comparative case study of motives, contingencies and dependencies Abstract: Packaged software is widely adopted and has become an integral part of most organizations’ IT portfolios. Once packaged software is adopted, upgrades to subsequent versions appear to be inevitable. To date, research on packaged software has not paid attention to the upgrade decision process. To explore this area, we studied cases of upgrades to two widely used packaged software products (SAP and Windows) in a multi-billion dollar division of a Fortune 500 company. From an analysis of the cases, we induced a theoretical model explaining the influences affecting the decisions to upgrade. Our model suggests that upgrade decisions are the outcome of interaction between motivating forces that can originate from internal and external environments, and contingency forces. Business need was found to be one of the key internal requirements, along with organizational risk mitigation policies. Organizational reliance on packaged software also creates dependence on vendors that gives them influence over the organization's upgrade decision. The decision to upgrade is also contingent on the availability of internal resources. Although scarcity of internal resources can postpone an upgrade when the need to upgrade is deferrable, organizations will prioritize internal resources when the upgrade is deemed necessary. Journal: European Journal of Information Systems Pages: 555-567 Issue: 5 Volume: 16 Year: 2007 Month: 10 X-DOI: 10.1057/palgrave.ejis.3000704 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000704 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:5:p:555-567 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933974_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ben Light Author-X-Name-First: Ben Author-X-Name-Last: Light Author-Name: Steve Sawyer Author-X-Name-First: Steve Author-X-Name-Last: Sawyer Title: Locating packaged software in information systems research Journal: European Journal of Information Systems Pages: 527-530 Issue: 5 Volume: 16 Year: 2007 Month: 10 X-DOI: 10.1057/palgrave.ejis.3000706 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000706 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:5:p:527-530 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933975_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Tally Hatzakis Author-X-Name-First: Tally Author-X-Name-Last: Hatzakis Author-Name: Mark Lycett Author-X-Name-First: Mark Author-X-Name-Last: Lycett Author-Name: Alan Serrano Author-X-Name-First: Alan Author-X-Name-Last: Serrano Title: A programme management approach for ensuring curriculum coherence in IS (higher) education Abstract: This paper examines IS higher education, concentrating on issues of ‘coherence’ in IS curricula. While curriculum coherence can be jeopardized by poor curriculum design, misalignment between module content and/or misalignment between module or course aims can cause serious coherence issues over time. Misalignment of this type is exacerbated by the traditional processes of curriculum (re)design, which rely heavily on the (singular) interpretation of highly abstract documents, such as module syllabi and course specifications – often produced by curriculum designers in isolation. To improve curriculum coherence, this paper examines the use of a programme management framework as a means of (a) ‘humanizing’ the abstract aims and goals of curricula schemes and (b) managing the delivery and evolution of curricula in relation to the stakeholders in the process of delivery. The practical use of the framework is examined in the context of a Masters-level course in ‘Information Systems Management’. An action research approach is used to demonstrate the practical utility of the framework in terms of (a) improving communication of curricula, (b) improving the coherence between modules and between modules and course and (c) removing content redundancy. Analysis of outcomes demonstrates a significant positive impact of the use of the framework in relation to the above points from the perspective of all stakeholders. Guidelines are presented that generalize the findings in order that key practices may be adopted by others. Journal: European Journal of Information Systems Pages: 643-657 Issue: 5 Volume: 16 Year: 2007 Month: 10 X-DOI: 10.1057/palgrave.ejis.3000707 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000707 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:5:p:643-657 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933976_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Paul C van Fenema Author-X-Name-First: Paul C Author-X-Name-Last: van Fenema Author-Name: Otto R Koppius Author-X-Name-First: Otto R Author-X-Name-Last: Koppius Author-Name: Peter J van Baalen Author-X-Name-First: Peter J Author-X-Name-Last: van Baalen Title: Implementing packaged enterprise software in multi-site firms: intensification of organizing and learning Abstract: Packaged enterprise software, in contrast with custom-built software, is a ready-made mass product aimed at generic customer groups in a variety of industries and geographical areas. The implementation of packaged software usually leads to a phase of appropriation and customization. As the associated processes remain ill understood, particularly for multi-site implementations, the objective of this paper is to understand the impact of packaged software in a multi-site organization. Adopting a case study method, this paper reports on a multi-site project that was analyzed at the group, site, and corporate level. Our findings suggest that as organizational units face the unsettling experience of having to implement a single source code across globally distributed sites, packaged software intensifies organizing and learning processes across these levels. The paper identifies specific processes for these levels and concludes with implications for research and practice. Our research extends IS research on packaged software implementation with an emphasis on multi-site firms. Journal: European Journal of Information Systems Pages: 584-598 Issue: 5 Volume: 16 Year: 2007 Month: 10 X-DOI: 10.1057/palgrave.ejis.3000708 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000708 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:5:p:584-598 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933977_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ben Light Author-X-Name-First: Ben Author-X-Name-Last: Light Title: Introducing Masculinity Studies to Information Systems Research: the case of Gaydar Abstract: I believe that studies of men's gendered experiences of information systems are needed. In order to support this claim, I introduce the area of Masculinity Studies to Information Systems research and, using this, present an exploratory analysis of an internet dating website for gay men – Gaydar. The information system, which forms part of the Gaydar community, is shown to shape, and be shaped by the members as they accept and challenge aspects of it as related to their identities. In doing this, I show how the intertwined processes of information systems development and use contribute to the creation of diverse interpretations of masculinity within a group of men. In sum, my analysis highlights different kinds of men and different versions of masculinity that can sometimes be associated with different experiences of information systems. The implications of this work centre on the need to expand our knowledge of men's gendered experiences with information systems, to reflect upon processes of technology facilitated categorisation and to consider the influences that contribute to the roll out of particular software features along with the underlying rationales for market segmentation in the software and software-based services industries. Journal: European Journal of Information Systems Pages: 658-665 Issue: 5 Volume: 16 Year: 2007 Month: 10 X-DOI: 10.1057/palgrave.ejis.3000709 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000709 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:5:p:658-665 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933978_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ray J Paul Author-X-Name-First: Ray J Author-X-Name-Last: Paul Title: Changeover and celebrating change: 20 reasons for celebrating 20 years Journal: European Journal of Information Systems Pages: 525-526 Issue: 5 Volume: 16 Year: 2007 Month: 10 X-DOI: 10.1057/palgrave.ejis.3000710 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000710 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:5:p:525-526 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1545883_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Frantz Rowe Author-X-Name-First: Frantz Author-X-Name-Last: Rowe Author-Name: M. Lynne Markus Author-X-Name-First: M. Lynne Author-X-Name-Last: Markus Title: Taking on sacred cows: openness, fair critique, and retaining value when revising classics Journal: European Journal of Information Systems Pages: 623-628 Issue: 6 Volume: 27 Year: 2018 Month: 11 X-DOI: 10.1080/0960085X.2018.1545883 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1545883 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:6:p:623-628 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1472196_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Camille Grange Author-X-Name-First: Camille Author-X-Name-Last: Grange Author-Name: Izak Benbasat Author-X-Name-First: Izak Author-X-Name-Last: Benbasat Title: Opinion seeking in a social network-enabled product review website: a study of word-of-mouth in the era of digital social networks Abstract: This paper challenges a long-held assumption of prior research – that online word-of-mouth is anonymous and impersonal – by examining shoppers’ opinion seeking in the context of using a product review website connected to a digital social network (SN). Motivated by the need to account for the idiosyncratic resources available in each shopper’s SN, we distinguish between two types of opinion-seeking behaviours: (i) exploiting, seeking peers’ opinions in one’s core network (ie, online friends), and (ii) exploring, seeking peers’ opinions from one’s extended network (ie, strangers). Using SN theory, we specify what drives these behaviours, and how they influence shoppers’ utilitarian and hedonic experiences in an online product selection task. A free-simulation study, conducted with a restaurant review website connected to the Facebook SN, provided three key insights: (1) Exploitation has a stronger beneficial effect on shoppers’ utilitarian and hedonic experiences than exploration, (2) there is a strong positive influence of social capital (both structural and relational) on shoppers’ propensity to engage in exploitation, and (3) high social capital does not induce the expected extensive substitution of exploration with exploitation. Overall, this study enhances our understanding of online shoppers’ opinion seeking in the increasingly prevalent SN-enabled settings. Journal: European Journal of Information Systems Pages: 629-653 Issue: 6 Volume: 27 Year: 2018 Month: 11 X-DOI: 10.1080/0960085X.2018.1472196 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1472196 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:6:p:629-653 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1475876_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Steven Bellman Author-X-Name-First: Steven Author-X-Name-Last: Bellman Author-Name: Kyle B. Murray Author-X-Name-First: Kyle B. Author-X-Name-Last: Murray Title: Feedback, task performance, and interface preferences Abstract: Interface preferences are influenced by switching costs, including cognitive switching costs of thinking and task performance. In this research, we use feedback intervention theory to predict that feedback can have psychological effects that override the lock-in effect of cognitive switching costs on interface preference. To demonstrate this effect, we use normative feedback, which compares a user’s task performance to the performance of others. This focuses attention on the user’s self-concept and away from task performance. We use a hedonic information systems (IS) interface – an online game – as feedback valence should have a stronger effect on preferences for hedonic IS as opposed to utilitarian IS. Hedonic IS are preferred for their enjoyment value, as well as their productivity, and positive feedback should be more enjoyable than negative feedback. Results from an online experiment that manipulated the presence of feedback and feedback valence, for a sample of 482 users, support our hypotheses. The theoretical and managerial implications of these results are discussed. Journal: European Journal of Information Systems Pages: 654-669 Issue: 6 Volume: 27 Year: 2018 Month: 11 X-DOI: 10.1080/0960085X.2018.1475876 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1475876 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:6:p:654-669 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1485619_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Samir Chatterjee Author-X-Name-First: Samir Author-X-Name-Last: Chatterjee Author-Name: Jongbok Byun Author-X-Name-First: Jongbok Author-X-Name-Last: Byun Author-Name: Kaushik Dutta Author-X-Name-First: Kaushik Author-X-Name-Last: Dutta Author-Name: Rasmus Ulslev Pedersen Author-X-Name-First: Rasmus Ulslev Author-X-Name-Last: Pedersen Author-Name: Akshay Pottathil Author-X-Name-First: Akshay Author-X-Name-Last: Pottathil Author-Name: Harry (Qi) Xie Author-X-Name-First: Harry (Qi) Author-X-Name-Last: Xie Title: Designing an Internet-of-Things (IoT) and sensor-based in-home monitoring system for assisting diabetes patients: iterative learning from two case studies Abstract: The ageing of the global population is creating a crisis in chronic disease management. In the USA, 29 million people (or 9.3% of the population) suffer from the chronic disease of diabetes; according to the WHO, globally around 200 million people are diabetic. Left unchecked, diabetes can lead to acute and long-term complications and ultimately death. Diabetes prevalence tends to be the highest among those aged 65 and older (nearly 20.6%), a population which often lacks the cognitive resources to deal with the daily self-management regimens. In this paper, we discuss the design and implementation of an Internet-of-Things (IoT) and wireless sensor system which patients use in their own homes to capture daily activity, an important component in diabetes management. Following Fogg’s 2009 persuasion theory, we mine the activity data and provide motivational messages to the subjects with the intention of changing their activity and dietary behaviour. We introduce a novel idea called “persuasive sensing” and report results from two home implementations that show exciting promise. With the captured home monitoring data, we also develop analytic models that can predict blood glucose levels for the next day with an accuracy of 94%. We conclude with lessons learned from these two home case studies and explore design principles for creating novel IoT systems. Journal: European Journal of Information Systems Pages: 670-685 Issue: 6 Volume: 27 Year: 2018 Month: 11 X-DOI: 10.1080/0960085X.2018.1485619 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1485619 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:6:p:670-685 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1476015_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Tuure Tuunanen Author-X-Name-First: Tuure Author-X-Name-Last: Tuunanen Author-Name: Ken Peffers Author-X-Name-First: Ken Author-X-Name-Last: Peffers Title: Population targeted requirements acquisition Abstract: We use social science theories, design science research methodology, and our experience in five development projects to design principles for selecting or adapting requirements acquisition (RA) techniques for use with populations of customers and users. The information systems (IS) literature has not systematically focused on the adaption of RA techniques to particular populations. We developed a nascent design theory for RA to target specific populations to define functional requirements for new IS. Five reference theories – personal construct theory, theory of disability, diffusion of innovations, social actor theory, and media richness and information synchronicity theory – support the design. The theory was evaluated iteratively with five client organisations, involving more than 200 participants. Journal: European Journal of Information Systems Pages: 686-711 Issue: 6 Volume: 27 Year: 2018 Month: 11 X-DOI: 10.1080/0960085X.2018.1476015 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1476015 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:6:p:686-711 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934280_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Carla L Wilkin Author-X-Name-First: Carla L Author-X-Name-Last: Wilkin Author-Name: John Campbell Author-X-Name-First: John Author-X-Name-Last: Campbell Author-Name: Stephen Moore Author-X-Name-First: Stephen Author-X-Name-Last: Moore Title: Creating value through governing IT deployment in a public/private-sector inter-organisational context: a human agency perspective Abstract: Harnessing value from Information Technology (IT) has long been a focus of research, but evidence is lacking about how effective practice of Information Technology Governance (ITG) contributes to creating value for stakeholders in inter-organisational contexts. This is especially so for public/private sector partnerships. In this study we used ISO/IEC 38500:2008, the corporate governance of IT standard, to direct analysis of how ITG was practised in deployment of a large IT project in an inter-organisational public/private sector context. The findings demonstrate that ITG strategies related to human agency contribute to the realisation of value for participating stakeholders, particularly through pre-emptive stakeholder participation in evaluating IT functionality of the old system and iteratively in deployment of the new system. Further, our investigation shows that ISO/IEC 38500:2008 has merit as an analytical framework to objectively evaluate corporate governance of IT, although there is need for some enhancement. Journal: European Journal of Information Systems Pages: 498-511 Issue: 5 Volume: 22 Year: 2013 Month: 9 X-DOI: 10.1057/ejis.2012.21 File-URL: http://hdl.handle.net/10.1057/ejis.2012.21 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:5:p:498-511 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934281_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jinghua Xiao Author-X-Name-First: Jinghua Author-X-Name-Last: Xiao Author-Name: Kang Xie Author-X-Name-First: Kang Author-X-Name-Last: Xie Author-Name: Qing Hu Author-X-Name-First: Qing Author-X-Name-Last: Hu Title: Inter-firm IT governance in power-imbalanced buyer–supplier dyads: exploring how it works and why it lasts Abstract: Using a multiple case study design, we investigate the issue of inter-firm IT governance and its impact on information sharing in buyer–supplier dyadic relationships. We interviewed 38 managers of operations, purchasing, and IT in five dyadic relationships, and identified and examined one type of inter-firm IT governance: unilateral IT governance. In this type of IT governance, one party of the dyad dominates the relationship and the decision rights regarding inter-firm IT systems and data sharing. We find that unilateral inter-firm IT governance develops under contract-based and relationship-supplemented inter-firm governance arrangements in which significant power imbalance exists. However, contrary to the prediction of resource dependence theory, power-imbalanced governance can survive and thrive over a long period of time. We find that the inter-firm relational norms and trust that develop between these dyads constrain opportunistic and myopic behaviors in both parties, thus sustaining the seemingly unstable unilateral inter-firm IT governance. We also find that the operational necessity of the buyers and the IT capability of the suppliers are two primary factors that constrain inter-firm information sharing in these dyads. On the basis of these findings, we propose a process model for understanding and managing this type of inter-firm IT governance. Journal: European Journal of Information Systems Pages: 512-528 Issue: 5 Volume: 22 Year: 2013 Month: 9 X-DOI: 10.1057/ejis.2012.40 File-URL: http://hdl.handle.net/10.1057/ejis.2012.40 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:5:p:512-528 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934282_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Hyung Jin Kim Author-X-Name-First: Hyung Author-X-Name-Last: Jin Kim Author-Name: Bongsik Shin Author-X-Name-First: Bongsik Author-X-Name-Last: Shin Author-Name: Hogeun Lee Author-X-Name-First: Hogeun Author-X-Name-Last: Lee Title: The mediating role of psychological contract breach in IS outsourcing: inter-firm governance perspective Abstract: A substantial body of previous research on the client–vendor relationship has identified inter-organizational partnerships and formal contracts as important governance mechanisms for outsourcing performance. Successful IS development through outsourcing, however, may be more dependent on the people who execute the project in the field than on inter-firm relationships and agreed-upon formalities. Among individual-level variables, the special importance of psychological contracts has recently been noted in IS literature. This study investigates the mediating role of psychological contract breach between these two firm-level governance factors and outsourcing performance. By analyzing matched responses from project managers, vendor participants, and system users, we found that the effects of explicit legal contracts and partnership quality on outsourcing outcome are fully mediated by the client's perception of breach by the vendor. This study offers an extended theoretical perspective on the governance of firm-level collaboration, especially revealing that the benefits of formal contracts and inter-organizational partnerships eventually translate into satisfactory outsourcing outcomes for system users through each party's perception of breach on the individual level. Moreover, discrepancy was observed in this study between the client and vendor regarding the impact of legal contracts on individuals’ psychological contract while that of partnership was prominent in both sides. Journal: European Journal of Information Systems Pages: 529-547 Issue: 5 Volume: 22 Year: 2013 Month: 9 X-DOI: 10.1057/ejis.2012.41 File-URL: http://hdl.handle.net/10.1057/ejis.2012.41 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:5:p:529-547 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934283_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Lorraine Morgan Author-X-Name-First: Lorraine Author-X-Name-Last: Morgan Author-Name: Joseph Feller Author-X-Name-First: Joseph Author-X-Name-Last: Feller Author-Name: Patrick Finnegan Author-X-Name-First: Patrick Author-X-Name-Last: Finnegan Title: Exploring value networks: theorising the creation and capture of value with open source software Abstract: The emergence of open source software (OSS) as a form of peer production and innovation challenges theories of organisation and strategy due to its non-reliance on traditional governance mechanisms to organise production. OSS requires firms to rethink the processes that facilitate value creation and capture. The objective of this paper is to theorise how firms create and capture value from OSS. We derive a model from extant research and refine it through the study of three inter-organisational networks. The findings reveal how a firm's ability to access a value network of complementors is crucial for effective value creation and capture. Two types of networks are evident: a high-density network of familiar partners and a low-density network of multiple, often unfamiliar, partners. Leveraging these networks depends on the level of commitment, volume of knowledge exchange and the alignment of objectives among participant firms. Effective governance is revealed as critical for creating and capturing value within both types of network; and depends on both formal and informal mechanisms. Journal: European Journal of Information Systems Pages: 569-588 Issue: 5 Volume: 22 Year: 2013 Month: 9 X-DOI: 10.1057/ejis.2012.44 File-URL: http://hdl.handle.net/10.1057/ejis.2012.44 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:5:p:569-588 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934284_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Nelson King Author-X-Name-First: Nelson Author-X-Name-Last: King Title: Exploring the impact of operating model choice on the governance of inter-organizational workflow: the U.S. e-prescribing network Abstract: Inter-organizational networks play an increasing role in delivering computer-mediated public services such as healthcare. Many networks govern through an infomediary (i.e., electronic broker) that brings together disparate member organizations. These networks can resemble an enterprise where standards and incentives for use are imposed on its partners. This study seeks to extend an enterprise IT governance (ITG) concept to the U.S. e-prescribing network as it transitions from a paper-based network to a computer-mediated one. The operating model, proposed by Ross et al (2006), emphasizes choices in standardization and integration to align strategy with operational processes to improve enterprise performance. Missing in their work is evidence that macro-level choices embedded in the operating model directly impact network workflow. A comparative synthesis traces the changes made to the U.S. e-prescribing operating model to their impact upon the roles and relationships among network members. Some workflow mis-alignments were traceable to the operating philosophy imposed by healthcare policy-makers. The study suggests IT alignment in networks may be better achieved through governing operating models rather than the traditional ITG focus on organizational forms. Journal: European Journal of Information Systems Pages: 548-568 Issue: 5 Volume: 22 Year: 2013 Month: 9 X-DOI: 10.1057/ejis.2012.47 File-URL: http://hdl.handle.net/10.1057/ejis.2012.47 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:5:p:548-568 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934285_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Gerald Grant Author-X-Name-First: Gerald Author-X-Name-Last: Grant Author-Name: Felix B Tan Author-X-Name-First: Felix B Author-X-Name-Last: Tan Title: Governing IT in inter-organizational relationships: Issues and future research Journal: European Journal of Information Systems Pages: 493-497 Issue: 5 Volume: 22 Year: 2013 Month: 9 X-DOI: 10.1057/ejis.2013.21 File-URL: http://hdl.handle.net/10.1057/ejis.2013.21 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:5:p:493-497 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1524417_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mahdi Fahmideh Author-X-Name-First: Mahdi Author-X-Name-Last: Fahmideh Author-Name: Farhad Daneshgar Author-X-Name-First: Farhad Author-X-Name-Last: Daneshgar Author-Name: Fethi Rabhi Author-X-Name-First: Fethi Author-X-Name-Last: Rabhi Author-Name: Ghassan Beydoun Author-X-Name-First: Ghassan Author-X-Name-Last: Beydoun Title: A generic cloud migration process model Abstract: The cloud computing literature provides various ways to utilise cloud services, each with a different viewpoint and focus and mostly using heterogeneous technical-centric terms. This hinders efficient and consistent knowledge flow across the community. Little, if any, research has aimed on developing an integrated process model which captures core domain concepts and ties them together to provide an overarching view of migrating legacy systems to cloud platforms that is customisable for a given context. We adopt design science research guidelines in which we use a metamodeling approach to develop a generic process model and then evaluate and refine the model through three case studies and domain expert reviews. This research benefits academics and practitioners alike by underpinning a substrate for constructing, standardising, maintaining, and sharing bespoke cloud migration models that can be applied to given cloud adoption scenarios. Journal: European Journal of Information Systems Pages: 233-255 Issue: 3 Volume: 28 Year: 2019 Month: 5 X-DOI: 10.1080/0960085X.2018.1524417 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1524417 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:3:p:233-255 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1512945_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Raquel Benbunan-Fich Author-X-Name-First: Raquel Author-X-Name-Last: Benbunan-Fich Title: An affordance lens for wearable information systems Abstract: The proliferation of wearable technologies calls for the development of conceptual lenses to understand the drivers of their success. This research employs an affordance lens rooted in the individual perspective of Activity Theory to examine personal information systems built around wearable sensors. Since wearable devices have size constraints, designers have produced a variety of simple technology products lacking screens and buttons, but supplemented with customised apps. Due to their novelty, the impact of these minimalist wearables on the quality of the user experience is not yet well understood. To investigate this issue, this study proposes a theoretically driven framework of affordances and applies it to qualitatively analyse a sample of online user reviews from a specific fitness tracker wristband. The findings suggest that minimalist wearables produce a more complex user experience if affordances are not properly balanced and combined. Specific usability challenges stem from affordance integration failures and inconsistencies. These results have theoretical and practical implications. Overall, an affordance lens offers a unified view of user experience that is valuable for researchers and practitioners seeking to understand what makes modern wearable information systems transparent to use at the physical and digital level. Journal: European Journal of Information Systems Pages: 256-271 Issue: 3 Volume: 28 Year: 2019 Month: 5 X-DOI: 10.1080/0960085X.2018.1512945 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1512945 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:3:p:256-271 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1524419_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jie Ren Author-X-Name-First: Jie Author-X-Name-Last: Ren Author-Name: Jeffrey V. Nickerson Author-X-Name-First: Jeffrey V. Author-X-Name-Last: Nickerson Title: Arousal, valence, and volume: how the influence of online review characteristics differs with respect to utilitarian and hedonic products Abstract: Online reviews influence consumers’ purchase decisions. Product type – specifically, whether a product is utilitarian or hedonic – can help explain how consumers react to reviews. Characteristics of reviews – in particular, valence, measured by ratings, the arousal level of the language used in the text and the volume of the reviews – provide heuristics that consumers may use in making purchase decisions. Product type moderates the effect of these characteristics. Empirical evidence for this claim comes from multiple sources: a panel data analysis of 26,357 Amazon products and an online experiment with 541 participants. The findings of studies based on this evidence show that product type (hedonic or utilitarian) moderates the effect of the three heuristic attributes of online reviews (valence, volume, and arousal) on sales. The analysis uses OLS-fixed effects models and Granger causality tests. These findings explain why past studies have found that sometimes online review valence is more influential than volume and arousal with respect to sales and why sometimes this is reversed. Our findings have significant theoretical and practical implications for the design of choice architectures in online review systems. Journal: European Journal of Information Systems Pages: 272-290 Issue: 3 Volume: 28 Year: 2019 Month: 5 X-DOI: 10.1080/0960085X.2018.1524419 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1524419 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:3:p:272-290 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1529374_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Christian Peukert Author-X-Name-First: Christian Author-X-Name-Last: Peukert Title: Determinants and heterogeneity of switching costs in IT outsourcing: estimates from firm-level data Abstract: We study how firms decide whether to continue an existing relationship or switch the vendor of outsourced services. Because of incomplete contracts and relationship-specific investments, client organisations may face switching costs, which in some cases may be large enough to render vendor switching an unattractive option. Based on an extensive review of the literature, we develop hypotheses about relationship-, firm-, and market-specific determinants of switching costs. We then develop an econometric model to identify those determinants and their relative importance and estimate the magnitude of switching costs. In the empirical study, we observe accounting data of 1318 US credit unions (CUs) and follow their IT outsourcing choices over 11 years. We find that the largest portion of switching costs is due to relationship- and firm-specific factors, while market-specific variables are much less important. Our estimates suggest that average switching costs account for one-third of the average annual expenditure for professional services. We further highlight that the average hides substantial heterogeneity. Switching costs of CUs that decide to switch vendors are about 50% lower than those of CUs that stay. Looking more closely at stayers, our most conservative estimate of the lock-in effect, i.e., the difference in switching costs of deliberate and non-deliberate stayers, is equivalent to about 70% of the average annual expenditure for professional services. Journal: European Journal of Information Systems Pages: 291-317 Issue: 3 Volume: 28 Year: 2019 Month: 5 X-DOI: 10.1080/0960085X.2018.1529374 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1529374 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:3:p:291-317 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1534039_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Claire Ingram Bogusz Author-X-Name-First: Claire Author-X-Name-Last: Ingram Bogusz Author-Name: Robin Teigland Author-X-Name-First: Robin Author-X-Name-Last: Teigland Author-Name: Emmanuelle Vaast Author-X-Name-First: Emmanuelle Author-X-Name-Last: Vaast Title: Designed entrepreneurial legitimacy: the case of a Swedish crowdfunding platform Abstract: Digital entrepreneurs face the liability of newness, like any other entrepreneur. However, this liability of newness is manifested differently: it is mediated by an artefact, in this case a platform. This paper examines how a digital entrepreneur mediated by a platform can build legitimacy, something hitherto thought to be embedded within a social relationship (that is, one that a digital platform may be unable to have). Based on a qualitative research design, we develop the concept of “designed legitimacy”, and we point to how trust may not be enough to overcome the liability of newness. Rather, legitimacy is needed to attract users and resources, and thus for growth and success. We further highlight the means through which a platform may come to be seen as legitimate, namely by designing with legitimacy in mind: by using symbols in design, asymmetric legitimacy building, and sequential two-stage legitimacy building. We end the paper with propositions for further study and the implications of this research for digital entrepreneurship and platforms. Journal: European Journal of Information Systems Pages: 318-335 Issue: 3 Volume: 28 Year: 2019 Month: 5 X-DOI: 10.1080/0960085X.2018.1534039 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1534039 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:3:p:318-335 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1547354_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Xiaofei Zhang Author-X-Name-First: Xiaofei Author-X-Name-Last: Zhang Author-Name: Xitong Guo Author-X-Name-First: Xitong Author-X-Name-Last: Guo Author-Name: Kee-hung Lai Author-X-Name-First: Kee-hung Author-X-Name-Last: Lai Author-Name: Wu Yi Author-X-Name-First: Wu Author-X-Name-Last: Yi Title: How does online interactional unfairness matter for patient–doctor relationship quality in online health consultation? The contingencies of professional seniority and disease severity Abstract: In recent years, the development of online health-consultation platforms has drawn significant research attention to online patient–doctor relationship development, particularly in developing countries, where there are limited health care resources for each patient. However, online interactional unfairness in patient–doctor relationship development has been largely overlooked in the context of information and communication technology (ICT). This study proposes and tests a model that examines how online interactional unfairness (ie, interpersonal unfairness and informational unfairness) influences online patient–doctor relationship quality and the contingent roles of a doctor’s professional seniority and a patient’s disease severity. Using archival data with 83,553 observations from a leading online health-consultation platform in China, this study employed rare-event logistic regression to test the model. The results show that online interpersonal unfairness and online informational unfairness have negative and positive effects on relationship-quality incentive, respectively, in the Chinese health care context and that a doctor’s professional seniority and a patient’s disease severity strengthen the link between unfairness perceptions and relationship-quality incentive. This study advances the knowledge of online patient–doctor relationship development in ICT-based health care in China and provides practical insights for online health care stakeholders for managing unfairness in the health care context. Journal: European Journal of Information Systems Pages: 336-354 Issue: 3 Volume: 28 Year: 2019 Month: 5 X-DOI: 10.1080/0960085X.2018.1547354 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1547354 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:3:p:336-354 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934434_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Tobias Mettler Author-X-Name-First: Tobias Author-X-Name-Last: Mettler Author-Name: Michaela Sprenger Author-X-Name-First: Michaela Author-X-Name-Last: Sprenger Author-Name: Robert Winter Author-X-Name-First: Robert Author-X-Name-Last: Winter Title: Service robots in hospitals: new perspectives on niche evolution and technology affordances Abstract: Changing demands in society and the limited capabilities of health systems have paved the way for robots to move out of industrial contexts and enter more human-centered environments such as health care. We explore the shared beliefs and concerns of health workers on the introduction of autonomously operating service robots in hospitals or professional care facilities. By means of Q-methodology, a mixed research approach specifically designed for studying subjective thought patterns, we identify five potential end-user niches, each of which perceives different affordances and outcomes from using service robots in their working environment. Our findings allow for better understanding resistance and susceptibility of different users in a hospital and encourage managerial awareness of varying demands, needs, and surrounding conditions that a service robot must contend with. We also discuss general insights into presenting the Q-methodology results and how an affordance-based view could inform the adoption, appropriation, and adaptation of emerging technologies. Journal: European Journal of Information Systems Pages: 451-468 Issue: 5 Volume: 26 Year: 2017 Month: 9 X-DOI: 10.1057/s41303-017-0046-1 File-URL: http://hdl.handle.net/10.1057/s41303-017-0046-1 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:5:p:451-468 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934435_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Joseph K. Nwankpa Author-X-Name-First: Joseph K. Author-X-Name-Last: Nwankpa Author-Name: Pratim Datta Author-X-Name-First: Pratim Author-X-Name-Last: Datta Title: Balancing exploration and exploitation of IT resources: the influence of Digital Business Intensity on perceived organizational performance Abstract: Facing a barrage of novel information technology (IT), organizations must invest on the basis of the impact of IT capabilities on the organization’s performance. This research extends Bharadwaj’s (MIS Quarterly 169–196, 2000) resource-based view of the relationship between IT capability and performance by introducing both the mediating and moderating effects of Digital Business Intensity (DBI). Empirical data collected from CIO’s from US firms reveal that although IT capability positively influences organizational performance, this relationship may differ in strength at different levels of DBI. Our study also finds that IT capability is important in determining DBI, which in turn influences organizational performance. Findings highlight tensions between DBI exploration and IT capabilities exploitation. Results also suggest that companies that leverage their existing IT capabilities to drive DBI are more adept at securing performance returns. However, when DBI investments do not complement existing IT capabilities, DBI appears to dampen performance, further accentuated for high-DBI firms. Journal: European Journal of Information Systems Pages: 469-488 Issue: 5 Volume: 26 Year: 2017 Month: 9 X-DOI: 10.1057/s41303-017-0049-y File-URL: http://hdl.handle.net/10.1057/s41303-017-0049-y File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:5:p:469-488 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934436_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ricky Y. K. Chan Author-X-Name-First: Ricky Y. K. Author-X-Name-Last: Chan Author-Name: Katherine H. Y. Ma Author-X-Name-First: Katherine H. Y. Author-X-Name-Last: Ma Title: Impact of executive compensation on the execution of IT-based environmental strategies under competition Abstract: Drawing on agency theory and the contingent natural resource-based theory, this study employs firm-level archival and survey data of US manufacturing firms to examine the impact of CEO compensation forms on the execution of IT-based environmental strategies and the moderating influence of competitive intensity on this impact. The findings reveal that CEO fixed pay and bonus negatively affect the execution of the two types of IT-based environmental strategies, green IT strategies and IT-enabled green strategies, whereas CEO stock option positively influences such execution. The moderation analysis further highlights that while competitive intensity reinforces the positive impact of CEO stock option on both strategies, it weakens the negative impact of CEO fixed pay and bonus only on IT-enabled green strategies. The findings suggest that a highly competitive operating setting represents an ideal setting for using stock option to motivate CEOs to execute these two strategies. At the minimum, this setting helps mitigate the deterrent effect of fixed pay and bonus on CEOs’ execution of IT-enabled green strategies. The findings also suggest that firms should align their CEO compensation package with the characteristics of high uncertainty and long payback periods of IT-based environmental strategic endeavors and the competitive conditions they face. Journal: European Journal of Information Systems Pages: 489-508 Issue: 5 Volume: 26 Year: 2017 Month: 9 X-DOI: 10.1057/s41303-017-0052-3 File-URL: http://hdl.handle.net/10.1057/s41303-017-0052-3 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:5:p:489-508 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934437_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ryan T. Wright Author-X-Name-First: Ryan T. Author-X-Name-Last: Wright Author-Name: Nicholas Roberts Author-X-Name-First: Nicholas Author-X-Name-Last: Roberts Author-Name: David Wilson Author-X-Name-First: David Author-X-Name-Last: Wilson Title: The role of context in IT assimilation: A multi-method study of a SaaS platform in the US nonprofit sector Abstract: Nonprofit organizations (NPOs) operate in environments characterized by growing competition for resources and greater stakeholder demands for accountability, which makes deploying and maintaining information systems a struggle. In this competitive, resource-constrained environment, enterprise Software-as-a-Service (SaaS) platforms offer NPOs a cost-effective way access reliable, low-maintenance information technology services. Thus, the extent to which NPOs assimilate SaaS is an important area of inquiry. Yet despite the wealth of research on organizational IT assimilation, we know little regarding whether, when, and how NPOs assimilate IT innovations. We further our understanding of NPO assimilation of SaaS by conducting a context-based study. To do so, we employ multiple methods with data collected from US-based NPOs executives. Our first study showed that organizational factors (e.g., readiness, top management participation) and environmental factors (e.g., social gains, industry) affect the degree to which NPOs assimilate SaaS. However, we also found that technological factors do not appear to play a significant role in NPO SaaS assimilation. We conducted a phenomenological analysis to shed further light on this unexpected finding. Our analysis found that readiness to adopt SaaS, perceptions about SaaS complexity, and the use of outside consultants all played a key role in NPOs’ assimilation process. Journal: European Journal of Information Systems Pages: 509-539 Issue: 5 Volume: 26 Year: 2017 Month: 9 X-DOI: 10.1057/s41303-017-0053-2 File-URL: http://hdl.handle.net/10.1057/s41303-017-0053-2 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:5:p:509-539 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934329_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Armin Vermerris Author-X-Name-First: Armin Author-X-Name-Last: Vermerris Author-Name: Martin Mocker Author-X-Name-First: Martin Author-X-Name-Last: Mocker Author-Name: Eric van Heck Author-X-Name-First: Eric Author-X-Name-Last: van Heck Title: No time to waste: the role of timing and complementarity of alignment practices in creating business value in IT projects Abstract: Despite significant research progress, alignment-related issues are among the top concerns of executives. Previous studies mostly focus on a company-wide strategic level of alignment; while this ‘top-down’ view has benefits, it largely ignores the operational practices that help achieve alignment in IT projects as well as the impact that timing and complementarity of practices have on achieving alignment. In our research we apply four alignment practices – communication, shared understanding, management commitment and IT investment evaluation – to individual IT projects rather than at a company level; specifically, we look at the role of timing and complementarity for these alignment practices throughout different project phases. A detailed analysis of six IT projects carried out at three companies in the telecommunications industry reveals that IT projects creating higher business value employ all four alignment practices immediately from the start. No project was able to recover from failing to establish these four alignment practices in the first phase. While supporting the importance of complementarity of alignment practices, our findings also add the importance of the earliness of this complementarity. Journal: European Journal of Information Systems Pages: 629-654 Issue: 6 Volume: 23 Year: 2014 Month: 11 X-DOI: 10.1057/ejis.2013.11 File-URL: http://hdl.handle.net/10.1057/ejis.2013.11 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:6:p:629-654 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934330_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Shirley Gregor Author-X-Name-First: Shirley Author-X-Name-Last: Gregor Author-Name: Ahmed Imran Author-X-Name-First: Ahmed Author-X-Name-Last: Imran Author-Name: Tim Turner Author-X-Name-First: Tim Author-X-Name-Last: Turner Title: A ‘sweet spot’ change strategy for a least developed country: leveraging e-Government in Bangladesh Abstract: Information systems have the potential to improve societal conditions in developing countries, and yet design theory to inform interventions to encourage uptake and use of these systems is sparse. This paper reports on an action design research project that addressed the problem of limited adoption of e-Government in Bangladesh. Inadequate knowledge of the nature of e-Government systems had been identified as an underlying cause of many other problems in this ‘wicked’ problem context. The project aimed to reduce knowledge deficiencies among key decision makers through activities that included the delivery of a custom-made training program and a handbook targeted at senior government officers. The project had modest resources and yet yielded significant outcomes. Critical reflection established a number of design principles for a ‘sweet spot change strategy’ for interventions of this type, with the most important principle being to first identify a ‘sweet spot’, a point of maximum leverage, and then to act on it. Journal: European Journal of Information Systems Pages: 655-671 Issue: 6 Volume: 23 Year: 2014 Month: 11 X-DOI: 10.1057/ejis.2013.14 File-URL: http://hdl.handle.net/10.1057/ejis.2013.14 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:6:p:655-671 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934331_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: John F Veiga Author-X-Name-First: John F Author-X-Name-Last: Veiga Author-Name: Marcus M Keupp Author-X-Name-First: Marcus M Author-X-Name-Last: Keupp Author-Name: Steven W Floyd Author-X-Name-First: Steven W Author-X-Name-Last: Floyd Author-Name: Franz W Kellermanns Author-X-Name-First: Franz W Author-X-Name-Last: Kellermanns Title: The longitudinal impact of enterprise system users’ pre-adoption expectations and organizational support on post-adoption proficient usage Abstract: Although enterprise systems (ES) are ubiquitous, many firms report less than stellar payoffs from these costly investments, with underutilization often attributed to failures in the implementation process. Unfortunately, research has not provided sufficient insights into these failures, in part because it has focused on actual usage, as opposed to proficient usage, as the benchmark for successful implementation. Moreover, research has not generally examined how the adoption process unfolds over time, thus overlooking potential underlying mechanisms that may help explain how adopters achieve proficiency. To begin addressing these shortcomings, we study how adopters’ pre-adoption expectations, enacted over time, can influence their post-adoption proficiency, by shaping how and why they spend time using the system during the adoption period. We analyzed time-lagged survey data from 153 financial analysts, required to adopt new ES-based software, at a multinational bank. We found that adopters who hold pre-adoption expectations reflecting greater internal and external motives to adopt the system as well as systematically integrate it into their work routines are more apt to use the system in ways that enhance their cumulative knowledge of it, and subsequently develop higher levels of proficiency post-adoption. Moreover, greater organizational support enhanced the impact of adopters’ expectations on proficiency, except when their actual use is low in which case organizational support had an adverse effect. Journal: European Journal of Information Systems Pages: 691-707 Issue: 6 Volume: 23 Year: 2014 Month: 11 X-DOI: 10.1057/ejis.2013.15 File-URL: http://hdl.handle.net/10.1057/ejis.2013.15 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:6:p:691-707 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934332_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Björn Niehaves Author-X-Name-First: Björn Author-X-Name-Last: Niehaves Author-Name: Ralf Plattfaut Author-X-Name-First: Ralf Author-X-Name-Last: Plattfaut Title: Internet adoption by the elderly: employing IS technology acceptance theories for understanding the age-related digital divide Abstract: Information technology (IT) allows members of the growing elderly population to remain independent longer. However, while technology becomes more and more pervasive, an age-related underutilisation of IT remains observable. For instance, elderly people (65 years of age and older) are significantly less likely to use the Internet than the average population (see, for instance, European Commission, 2011). This age-related digital divide prevents many elderly people from using IT to enhance their quality of life through tools, such as Internet-based service delivery. Despite the significance of this phenomenon, the information systems (IS) literature lacks a comprehensive consideration and explanation of technology acceptance in general and more specifically, Internet adoption by the elderly. This paper thus studies the intentions of the elderly with regard to Internet use and identifies important influencing factors. Four alternative models based on technology acceptance theory are tested in the context of comprehensive survey data. As a result, a model that explains as much as 84% of the variance in technology adoption among the elderly is developed. We discuss the contribution of our analyses to the research on Internet adoption (and IT adoption in general) by the elderly, on the digital divide, and on technology acceptance and identify potentially effective paths for future research and theoretical development. Journal: European Journal of Information Systems Pages: 708-726 Issue: 6 Volume: 23 Year: 2014 Month: 11 X-DOI: 10.1057/ejis.2013.19 File-URL: http://hdl.handle.net/10.1057/ejis.2013.19 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:6:p:708-726 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934333_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Gabriele Piccoli Author-X-Name-First: Gabriele Author-X-Name-Last: Piccoli Author-Name: Tsz-Wai Lui Author-X-Name-First: Tsz-Wai Author-X-Name-Last: Lui Title: The competitive impact of information technology: can commodity IT contribute to competitive performance? Abstract: Despite polarizing arguments on the strategic potential of information technology (IT), academic research has yet to demonstrate clearly that information systems initiatives can lead to sustained competitive performance (CP). We investigate this question using data from 165 hotels affiliated with two brands of an international lodging chain. We study the effect of successful use and unreliability of an incremental IT-enabled self-service channel on overall CP. We find that the effect of the incremental service channel depends on the firm’s organizational resources. We also show that different organizations experience significantly different use and unreliability rates. Further, we find that the positive association between the use of an IT-enabled self-service channel and CP endures over a 2-year period, despite competitors’ widespread adoption of the technology enabling the incremental service channel (self-service kiosks). Our findings corroborate research on the strategic role of IT resources when appropriately coupled with complementary resources. They lead us to question the notion that IT is a strategic commodity. Indeed, the findings suggest that IT-dependent strategic initiatives have the potential to generate sustained CP, even when the technology that enables them appears ‘simple’. These findings suggest the need for a theoretical explanation of the complementarities and interaction among the elements of IT-dependent strategic initiatives. Journal: European Journal of Information Systems Pages: 616-628 Issue: 6 Volume: 23 Year: 2014 Month: 11 X-DOI: 10.1057/ejis.2013.20 File-URL: http://hdl.handle.net/10.1057/ejis.2013.20 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:6:p:616-628 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934334_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Christos D Melas Author-X-Name-First: Christos D Author-X-Name-Last: Melas Author-Name: Leonidas A Zampetakis Author-X-Name-First: Leonidas A Author-X-Name-Last: Zampetakis Author-Name: Anastasia Dimopoulou Author-X-Name-First: Anastasia Author-X-Name-Last: Dimopoulou Author-Name: Vassilis S Moustakis Author-X-Name-First: Vassilis S Author-X-Name-Last: Moustakis Title: An empirical investigation of Technology Readiness among medical staff based in Greek hospitals Abstract: Technology readiness (TR) represents an individual’s mental readiness to accept new technologies. Although the TR scale has been used in many studies, its application in the healthcare context is limited. This paper focuses on identifying the TR profiles of medical staff and to model preference TR variations with respect to computer use, computer knowledge and computer feature demands. The study reports results from a nationwide study conducted in Greece, during a three-year period, which sampled responses from 604 physicians and nurses working in 14 Greek hospitals. Exploratory Structural Equation Modelling analysis is used in order to confirm the structure of the Technology Readiness Index. The results confirm the five groups of the TR taxonomy. Statistical differences were found between classes in information and communication technology (ICT) knowledge, ICT feature demands, hours of use per week as well as ICT use performance, but not in the general use of ICT. The results facilitate comprehension of the factors, which influence the use of ICT by medical staff and, in addition, they convey important policy and managerial implications. In conclusion, medical staff should be treated according to its TR taxonomy classes in order to expedite the acceptance and use of an ICT system. Journal: European Journal of Information Systems Pages: 672-690 Issue: 6 Volume: 23 Year: 2014 Month: 11 X-DOI: 10.1057/ejis.2013.23 File-URL: http://hdl.handle.net/10.1057/ejis.2013.23 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:6:p:672-690 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934335_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Nik R Hassan Author-X-Name-First: Nik R Author-X-Name-Last: Hassan Title: Paradigm lost … paradigm gained: a hermeneutical rejoinder to Banville and Landry’s ‘Can the Field of MIS be Disciplined?’ Abstract: This study offers an alternative interpretation to Banville and Landry’s (B&L, 1989) Can the Field of MIS Be Disciplined?, the canonical text that argued persuasively against the adoption of the Kuhnian view of scientific progress for the information systems (IS) field. Much has transpired in the quarter of a century since its publication, which provides us with new sources of understanding about paradigms and how they relate to the challenges faced by the IS field. On the basis of the hermeneutical principles of tradition, prejudice, temporal distance, history of effect and application, this study describes the context from which B&L was written, its dependence on Whitley’s (1984) The Intellectual and Social Organization of the Sciences, and examines several of its claims and assertions. In contrast to B&L, this study finds the Kuhnian model of scientific progress well suited for a multidisciplinary and pluralistic field like IS and concludes with guidelines on how to reclaim the more transformative aspects of the paradigm concept, engender a culture of contextual borrowing from reference disciplines, and encourage conceptual development and autonomous theory construction. Journal: European Journal of Information Systems Pages: 600-615 Issue: 6 Volume: 23 Year: 2014 Month: 11 X-DOI: 10.1057/ejis.2013.29 File-URL: http://hdl.handle.net/10.1057/ejis.2013.29 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:6:p:600-615 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934336_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Pär J Ågerfalk Author-X-Name-First: Pär J Author-X-Name-Last: Ågerfalk Title: Insufficient theoretical contribution: a conclusive rationale for rejection? Journal: European Journal of Information Systems Pages: 593-599 Issue: 6 Volume: 23 Year: 2014 Month: 11 X-DOI: 10.1057/ejis.2014.35 File-URL: http://hdl.handle.net/10.1057/ejis.2014.35 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:6:p:593-599 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934352_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Liwei Chen Author-X-Name-First: Liwei Author-X-Name-Last: Chen Author-Name: J J Po-An Hsieh Author-X-Name-First: J J Po-An Author-X-Name-Last: Hsieh Author-Name: Evert Van de Vliert Author-X-Name-First: Evert Author-X-Name-Last: Van de Vliert Author-Name: Xu Huang Author-X-Name-First: Xu Author-X-Name-Last: Huang Title: Cross-national differences in individual knowledge-seeking patterns: a climato-economic contextualization Abstract: Electronic Knowledge Repository (EKR) is one of the most commonly deployed knowledge management technologies, yet its success hinges upon employees’ continued use and is further complicated in today’s multinational context. We integrate multiple theoretical linkages into a research model, conceptualizing knowledge-seeking as an instrumental behavior, adopting the technology acceptance model to characterize the individual-level continued EKR knowledge-seeking behavioral model, and drawing on the climato-economic theory to explain cross-national behavioral differences. Using hierarchical linear modeling (HLM), we test the model with data from 1352 randomly sampled knowledge workers across 30 nations. We find that two national-level factors, climate harshness and national wealth, interactively moderate the individual-level relationship between perceived usefulness (PU) and behavioral intention (BI) to continue seeking knowledge from EKR, such that the difference in the strength of this relationship is larger between poor-harsh and poor-temperate nations than between rich-harsh and rich-temperate nations. We find similar cross-level cross-national differences for the link between perceived ease of use (PEOU) and PU but not for the link between PEOU and BI. Implications for research and practice are discussed. Journal: European Journal of Information Systems Pages: 314-336 Issue: 3 Volume: 24 Year: 2015 Month: 5 X-DOI: 10.1057/ejis.2014.26 File-URL: http://hdl.handle.net/10.1057/ejis.2014.26 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:3:p:314-336 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934353_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Zhongyun Zhou Author-X-Name-First: Zhongyun Author-X-Name-Last: Zhou Author-Name: Xiao-Ling Jin Author-X-Name-First: Xiao-Ling Author-X-Name-Last: Jin Author-Name: Yulin Fang Author-X-Name-First: Yulin Author-X-Name-Last: Fang Author-Name: Doug Vogel Author-X-Name-First: Doug Author-X-Name-Last: Vogel Title: Toward a theory of perceived benefits, affective commitment, and continuance intention in social virtual worlds: cultural values (indulgence and individualism) matter Abstract: In this study we examine the contingent effects of two cultural values, indulgence and individualism, on the relationships between perceived benefits (utilitarian value, hedonic value, and relational capital), affective commitment, and continuance intention in social virtual worlds. We test our theoretical model in multi-group analyses using SmartPLS 2.0, based on a sample of 414 Second Life users from the U.S.A., Great Britain, and numerous other countries. By comparing the high- vs the low-indulgence subsamples, we find that indulgence weakens the effect of utilitarian value, but strengthens the effect of hedonic value, on affective commitment. Furthermore, compared with low-individualism users, the users with high-individualism showed a weaker effect of relational capital on affective commitment, as well as a weaker effect of affective commitment on continuance intention. The theoretical, empirical, and practical implications of these findings are also discussed. Journal: European Journal of Information Systems Pages: 247-261 Issue: 3 Volume: 24 Year: 2015 Month: 5 X-DOI: 10.1057/ejis.2014.27 File-URL: http://hdl.handle.net/10.1057/ejis.2014.27 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:3:p:247-261 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934354_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Yu-Wei Chang Author-X-Name-First: Yu-Wei Author-X-Name-Last: Chang Author-Name: Ping-Yu Hsu Author-X-Name-First: Ping-Yu Author-X-Name-Last: Hsu Author-Name: Wen-Lung Shiau Author-X-Name-First: Wen-Lung Author-X-Name-Last: Shiau Author-Name: Chung-Chih Tsai Author-X-Name-First: Chung-Chih Author-X-Name-Last: Tsai Title: Knowledge sharing intention in the United States and China: a cross-cultural study Abstract: In today’s knowledge-based economy, most of the knowledge-sharing studies have investigated the effects of cultural values at the national level. However, individual beliefs and behaviors might also be influenced and modified by individual cultural values. To understand the effects of cultural values, cultural effects at both the individual and country levels should be considered. This study is to investigate the integrative effects of the individual’s and country’s cultural values on knowledge sharing. We examine motivational factors affecting knowledge-sharing intentions based on social exchange theory and incorporate individualism/collectivism and uncertainty avoidance as moderators. On the basis of a survey of 394 employees conducted in the United States and China, the results show that rewards are significantly related to knowledge-sharing intentions for Chinese employees but not for American employees. Reciprocity and knowledge self-efficacy significantly impact knowledge-sharing intentions in the two countries. Our results also demonstrate that the individual’s and country’s cultural values play important roles in knowledge sharing. In the United States, individualism/collectivism is found to moderate the relationship between rewards and knowledge-sharing intentions. In China, individualism/collectivism is found to moderate the relationship between reputation and knowledge-sharing intentions, while uncertainty avoidance is found to moderate the relationship between knowledge self-efficacy and knowledge-sharing intentions. Journal: European Journal of Information Systems Pages: 262-277 Issue: 3 Volume: 24 Year: 2015 Month: 5 X-DOI: 10.1057/ejis.2014.28 File-URL: http://hdl.handle.net/10.1057/ejis.2014.28 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:3:p:262-277 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934355_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Tuure Tuunanen Author-X-Name-First: Tuure Author-X-Name-Last: Tuunanen Author-Name: I-Te Kuo Author-X-Name-First: I-Te Author-X-Name-Last: Kuo Title: The effect of culture on requirements: a value-based view of prioritization Abstract: This paper examines how culture affects requirements and their prioritization. We analyze the requirements of a mobile service, which were collected from Helsinki, Hong Kong, and Las Vegas. We argue that the current prioritization techniques for requirements do not sufficiently account for the cultural effects, nor does the literature offer information on ways of prioritizing such requirements according to users’ values. We see this as problematic because the literature suggests that culture should be viewed as a set of values. Our findings support the argument that we should use a value-based approach in prioritizing requirements. Furthermore, by focusing on the links between needs and values, we should be able to develop prioritization techniques not only for multicultural settings but also for information systems (IS) development projects that involve subcultures, such as adolescent users or members of specific organizations. Our findings show that this can be a powerful way of understanding the differences between various subcultures of IS users. In addition, we demonstrate how the laddering interviewing technique can be used to support this work. The proposed value-based requirements prioritization approach is also ready for industry applications and it is agnostic to the underlying IS development method used by developers. Journal: European Journal of Information Systems Pages: 295-313 Issue: 3 Volume: 24 Year: 2015 Month: 5 X-DOI: 10.1057/ejis.2014.29 File-URL: http://hdl.handle.net/10.1057/ejis.2014.29 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:3:p:295-313 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934356_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Carol Hsu Author-X-Name-First: Carol Author-X-Name-Last: Hsu Author-Name: Yu-Tzu Lin Author-X-Name-First: Yu-Tzu Author-X-Name-Last: Lin Author-Name: Tawei Wang Author-X-Name-First: Tawei Author-X-Name-Last: Wang Title: A legitimacy challenge of a cross-cultural interorganizational information system Abstract: This paper studies the adoption and diffusion of a cross-cultural Interorganizational Information System (IOS), which is used to streamline the processing of financial transactions between European investment fund companies and Taiwanese banks. Drawing from institutional and organizational legitimacy theory, we argue that the adoption and implementation of technological innovation is contingent upon its alignment with three institutional pillars in different countries and the deployment of legitimation strategies by stakeholders. Departing from classical innovation diffusion theory, our empirical investigation reveals that the implementation of a cross-cultural IOS is a dynamic process involving the recognition, understanding, and management of the regulative, normative, and cognitive challenges arising in two different institutional settings. This paper contributes to the growing body of research that highlights the significance of social and institutional influences on the adoption of IOS in a global environment. Journal: European Journal of Information Systems Pages: 278-294 Issue: 3 Volume: 24 Year: 2015 Month: 5 X-DOI: 10.1057/ejis.2014.33 File-URL: http://hdl.handle.net/10.1057/ejis.2014.33 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:3:p:278-294 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934357_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Hartmut Hoehle Author-X-Name-First: Hartmut Author-X-Name-Last: Hoehle Author-Name: Xiaojun Zhang Author-X-Name-First: Xiaojun Author-X-Name-Last: Zhang Author-Name: Viswanath Venkatesh Author-X-Name-First: Viswanath Author-X-Name-Last: Venkatesh Title: An espoused cultural perspective to understand continued intention to use mobile applications: a four-country study of mobile social media application usability Abstract: As most mobile applications are tailored for worldwide consumption, it is a significant challenge to develop applications that satisfy individuals with various cultural backgrounds. To address this issue, we drew on a recently developed conceptualization and associated instrument of mobile application usability to develop a model examining the impact of mobile social media application usability on continued intention to use. Drawing on Hofstede’s five cultural values, we incorporated espoused cultural values of masculinity/femininity, individualism/collectivism, power distance, uncertainty avoidance, and long-term orientation into our model as moderators. To test the model, we collected data from 1,844 consumers in four countries – the U.S., Germany, China, and India – who use mobile social media applications on their smartphones. The results provided support for the role of espoused national cultural values in moderating the impact of mobile social media application usability on continued intention to use and the model, with espoused cultural values explaining significantly more variance in continued intention to use (i.e., 38%) than the main effects-only model (i.e., 19%). Interestingly, our results demonstrated that culture at the national level did not play a significant role in affecting the relationship between usability constructs and continued intention to use, thus underscoring the importance of espoused culture. Journal: European Journal of Information Systems Pages: 337-359 Issue: 3 Volume: 24 Year: 2015 Month: 5 X-DOI: 10.1057/ejis.2014.43 File-URL: http://hdl.handle.net/10.1057/ejis.2014.43 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:3:p:337-359 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934358_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: M N Ravishankar Author-X-Name-First: M N Author-X-Name-Last: Ravishankar Title: The realignment of offshoring frame disputes (OFD): an ethnographic ‘cultural’ analysis Abstract: In Information Systems (IS) research on cross-cultural issues, cultural categories are typically introduced as analytical labels that explain why and how organizational groups in different parts of the world act and think differently. However, broad cultural categories can also be discursively mobilized by organizational members as strategic adaptive resources. Drawing on an ethnographic study of offshoring frame disputes (OFD) in an Indian subsidiary unit of a large Western information technology (IT) organization, this paper explores how members actively invoke a series of beliefs about Western culture and implicitly position them as the binary opposite of Eastern (or Indian) culture. The findings demonstrate how the mobilization of such beliefs eventually plays a vital role in the reconciliation of four different types of OFD. Drawing on this analysis, I build a social–psychological process model that explains how frame extensions trigger a cognitive reorganization process, leading to the accomplishment of OFD realignment. The paper argues that discursively invoked binary cultural categories help maintain non-confrontational definitions of situations and sustain working relationships in IT offshoring environments. Furthermore, interpretations linked to cultural notions seem to reflexively take the offshore–onshore power differentials into account. Journal: European Journal of Information Systems Pages: 234-246 Issue: 3 Volume: 24 Year: 2015 Month: 5 X-DOI: 10.1057/ejis.2014.5 File-URL: http://hdl.handle.net/10.1057/ejis.2014.5 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:3:p:234-246 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934359_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Merrill Warkentin Author-X-Name-First: Merrill Author-X-Name-Last: Warkentin Author-Name: Brigitte Charles-Pauvers Author-X-Name-First: Brigitte Author-X-Name-Last: Charles-Pauvers Author-Name: Patrick Y K Chau Author-X-Name-First: Patrick Y K Author-X-Name-Last: Chau Title: Cross-cultural IS research: perspectives from Eastern and Western traditions Journal: European Journal of Information Systems Pages: 229-233 Issue: 3 Volume: 24 Year: 2015 Month: 5 X-DOI: 10.1057/ejis.2015.7 File-URL: http://hdl.handle.net/10.1057/ejis.2015.7 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:3:p:229-233 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934171_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Thomas F Stafford Author-X-Name-First: Thomas F Author-X-Name-Last: Stafford Author-Name: Aykut Hamit Turan Author-X-Name-First: Aykut Hamit Author-X-Name-Last: Turan Title: Online tax payment systems as an emergent aspect of governmental transformation Abstract: The achievement of governmental transformation through the use of electronically delivered services is a worthy goal that requires significant planning and research to achieve. In order to reach transformational paradigm shifts in governmental operation, it will first be necessary to understand and optimize present governmental e-Service provisions. Of these, the revenue function of taxation is paramount. This paper describes factors related to the use and acceptance by accounting professionals of information technology intended to facilitate electronic tax filing systems. Though tested in the context of governmental tax management systems in Turkey, our findings on the use and acceptance of e-Tax systems are relevant and applicable to a great number of nations and contexts as the ongoing electronic transformation of the governmental revenue system contributes to efforts to transform governments through alternative services delivery venues and channels. We discover that intention to use automated systems as part of the governmental treasury function transformation is hindered by factors that mediate actual plans to do so, mostly in terms of normative pressures and perceptions of behavioral control, which training and education may well ameliorate. Hence, transformation of the treasury function in Turkey is only partially complete and will require additional support, direction and training on the part of the government in its interactions with the tax professionals who interact with the emergent automated system. Journal: European Journal of Information Systems Pages: 343-357 Issue: 3 Volume: 20 Year: 2011 Month: 5 X-DOI: 10.1057/ejis.2010.63 File-URL: http://hdl.handle.net/10.1057/ejis.2010.63 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:3:p:343-357 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934172_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Janice C Sipior Author-X-Name-First: Janice C Author-X-Name-Last: Sipior Author-Name: Burke T Ward Author-X-Name-First: Burke T Author-X-Name-Last: Ward Author-Name: Regina Connolly Author-X-Name-First: Regina Author-X-Name-Last: Connolly Title: The digital divide and t-government in the United States: using the technology acceptance model to understand usage Abstract: This paper applies the technology acceptance model to explore the digital divide and transformational government (t-government) in the United States. Successful t-government is predicated on citizen adoption and usage of e-government services. The contribution of this research is to enhance our understanding of the factors associated with the usage of e-government services among members of a community on the unfortunate side of the divide. A questionnaire was administered to members, of a techno-disadvantaged public housing community and neighboring households, who partook in training or used the community computer lab. The results indicate that perceived access barriers and perceived ease of use (PEOU) are significantly associated with usage, while perceived usefulness (PU) is not. Among the demographic characteristics, educational level, employment status, and household income all have a significant impact on access barriers and employment is significantly associated with PEOU. Finally, PEOU is significantly related to PU. Overall, the results emphasize that t-government cannot cross the digital divide without accompanying employment programs and programs that enhance citizens’ ease in using such services. Journal: European Journal of Information Systems Pages: 308-328 Issue: 3 Volume: 20 Year: 2011 Month: 5 X-DOI: 10.1057/ejis.2010.64 File-URL: http://hdl.handle.net/10.1057/ejis.2010.64 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:3:p:308-328 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934173_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Joseph Feller Author-X-Name-First: Joseph Author-X-Name-Last: Feller Author-Name: Patrick Finnegan Author-X-Name-First: Patrick Author-X-Name-Last: Finnegan Author-Name: Olof Nilsson Author-X-Name-First: Olof Author-X-Name-Last: Nilsson Title: Open innovation and public administration: transformational typologies and business model impacts Abstract: Extant research demonstrates that e-Government initiatives often fall short of achieving innovative forms of government and governance due to a techno-centric focus that limits such initiatives to minor improvements in service delivery. While it is evident that innovation is central to modernising and transforming governmental organisations, and that the co-creation of services by public authorities and community groups is an essential component of realising the benefits of investment in information and communication technology, there is little research focusing on the nature of innovation in transforming governmental organisations and services. Addressing this gap in the literature, this paper explores how open innovation strategies can transform public administration by examining how a network of municipalities in Sweden transforms value creation and service delivery by collaborating with each other and with external parties to accelerate the creation and exploitation of innovation. Using a case study with embedded units of analysis, four emerging typologies of governmental transformation based on open innovation are identified. The paper illustrates how these open innovation typologies (i) transform the organisation of the municipalities and (ii) help them deliver high quality co-created services to citizens. By examining the strategic and operational aspects that facilitate such activities, the analysis reveals the impact of open innovation on the business models of public authorities. The paper concludes that open innovation practices represent a more radical manifestation of transformational government than previously envisaged; signalling not only fundamental change in the nature of value creation and service delivery by public authorities, but potentially in the nature of their organisation. Journal: European Journal of Information Systems Pages: 358-374 Issue: 3 Volume: 20 Year: 2011 Month: 5 X-DOI: 10.1057/ejis.2010.65 File-URL: http://hdl.handle.net/10.1057/ejis.2010.65 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:3:p:358-374 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934174_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Merrill Warkentin Author-X-Name-First: Merrill Author-X-Name-Last: Warkentin Author-Name: Allen C Johnston Author-X-Name-First: Allen C Author-X-Name-Last: Johnston Author-Name: Jordan Shropshire Author-X-Name-First: Jordan Author-X-Name-Last: Shropshire Title: The influence of the informal social learning environment on information privacy policy compliance efficacy and intention Abstract: Throughout the world, sensitive personal information is now protected by regulatory requirements that have translated into significant new compliance oversight responsibilities for IT managers who have a legal mandate to ensure that individual employees are adequately prepared and motivated to observe policies and procedures designed to ensure compliance. This research project investigates the antecedents of information privacy policy compliance efficacy by individuals. Using Health Insurance Portability and Accountability Act compliance within the healthcare industry as a practical proxy for general organizational privacy policy compliance, the results of this survey of 234 healthcare professionals indicate that certain social conditions within the organizational setting (referred to as external cues and comprising situational support, verbal persuasion, and vicarious experience) contribute to an informal learning process. This process is distinct from the formal compliance training procedures and is shown to influence employee perceptions of efficacy to engage in compliance activities, which contributes to behavioural intention to comply with information privacy policies. Implications for managers and researchers are discussed. Journal: European Journal of Information Systems Pages: 267-284 Issue: 3 Volume: 20 Year: 2011 Month: 5 X-DOI: 10.1057/ejis.2010.72 File-URL: http://hdl.handle.net/10.1057/ejis.2010.72 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:3:p:267-284 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934175_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: David H Brown Author-X-Name-First: David H Author-X-Name-Last: Brown Author-Name: Sheryl Thompson Author-X-Name-First: Sheryl Author-X-Name-Last: Thompson Title: Priorities, policies and practice of e-government in a developing country context: ICT infrastructure and diffusion in Jamaica Abstract: This paper presents the findings of recent research into e-government policies and initiatives undertaken by the Government of Jamaica within the context of selective intervention facilitated through financial and technical assistance. In the specific context of a developing economy it highlights the use of infrastructure building and government intervention to aid diffusion of information and communication technology (ICT) and draws attention to the differences between developed and developing countries in their approach to e-government. A case of the Jamaica Customs Department is provided to exemplify the implementation of e-government in practice. Using institutional factor analysis for IT innovation the interaction of policy and practice is analysed. Four significant themes are identified that characterise the context for e-government policy, together with the associated institutional factors. The relative importance of these factors is demonstrated with Innovation Directive, Standards and Subsidy shown to be prime. These findings contribute to both institutional factor analysis for IT innovation and to ICT adoption theory, and together signal the importance of the inclusion of policy-based intervention in a future research agenda for e-government in a developing country context. Journal: European Journal of Information Systems Pages: 329-342 Issue: 3 Volume: 20 Year: 2011 Month: 5 X-DOI: 10.1057/ejis.2011.3 File-URL: http://hdl.handle.net/10.1057/ejis.2011.3 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:3:p:329-342 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934176_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bart van den Hooff Author-X-Name-First: Bart Author-X-Name-Last: van den Hooff Author-Name: Maarten de Winter Author-X-Name-First: Maarten Author-X-Name-Last: de Winter Title: Us and them: a social capital perspective on the relationship between the business and IT departments Abstract: In this paper, a social capital perspective is applied to the relationship between the IT department and the Business organization. IT and Business are conceptualized as different occupational communities, with different understandings of their work. Our focus is on the level of social capital and the process of knowledge sharing between these occupational communities. We analyze the role that these factors play in reaching a mutual understanding within the process of IS development, and the influence this has on the perceived performance of the IT organization. Our study, combining qualitative and quantitative methods, points out that a lack of social capital (structural, relational as well as cognitive) can serve as an explanation for the often problematic relationship between these communities. Our analyses also show that social capital is especially relevant for the Business organization's perception of IT performance, whereas the IT department's perception is that performance is primarily dependent on the exchange of information. Journal: European Journal of Information Systems Pages: 255-266 Issue: 3 Volume: 20 Year: 2011 Month: 5 X-DOI: 10.1057/ejis.2011.4 File-URL: http://hdl.handle.net/10.1057/ejis.2011.4 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:3:p:255-266 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934177_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mark O Lewis Author-X-Name-First: Mark O Author-X-Name-Last: Lewis Author-Name: Lars Mathiassen Author-X-Name-First: Lars Author-X-Name-Last: Mathiassen Author-Name: Arun Rai Author-X-Name-First: Arun Author-X-Name-Last: Rai Title: Scalable growth in IT-enabled service provisioning: a sensemaking perspective Abstract: Vendors of IT-enabled services must address equivocal and changing requirements from diverse customers while simultaneously making a profit. However, our knowledge of how these organizations can achieve the necessary scalability is limited. Against this backdrop, we leverage organizational sensemaking to investigate how a large vendor attempted to create a scalable service infrastructure through three sequential strategies. This in-depth case study reveals key factors that challenged the efficacy of each strategy. First, addressing equivocality through structural separation exacerbated the organization’s challenges because of misaligned collective identities between business units. Second, reducing equivocality through market segmentation proved to be inadequate because individual-level cognitive constraints shaped pre-packaged solutions that lacked functionality. Third, responding to equivocality through service modularization was challenged due to lack of social interaction about standardization of component interfaces, system and process redundancies, and inflexible process architectures. We offer a detailed analysis of these strategies and discuss implications in relation to theory and practice. Journal: European Journal of Information Systems Pages: 285-302 Issue: 3 Volume: 20 Year: 2011 Month: 5 X-DOI: 10.1057/ejis.2011.5 File-URL: http://hdl.handle.net/10.1057/ejis.2011.5 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:3:p:285-302 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934178_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ahmad Ghoneim Author-X-Name-First: Ahmad Author-X-Name-Last: Ghoneim Author-Name: Zahir Irani Author-X-Name-First: Zahir Author-X-Name-Last: Irani Author-Name: Sofiane Sahraoui Author-X-Name-First: Sofiane Author-X-Name-Last: Sahraoui Title: Guest Editorial Journal: European Journal of Information Systems Pages: 303-307 Issue: 3 Volume: 20 Year: 2011 Month: 5 X-DOI: 10.1057/ejis.2011.6 File-URL: http://hdl.handle.net/10.1057/ejis.2011.6 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:3:p:303-307 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934179_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Richard Baskerville Author-X-Name-First: Richard Author-X-Name-Last: Baskerville Title: Individual information systems as a research arena Journal: European Journal of Information Systems Pages: 251-254 Issue: 3 Volume: 20 Year: 2011 Month: 5 X-DOI: 10.1057/ejis.2011.8 File-URL: http://hdl.handle.net/10.1057/ejis.2011.8 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:3:p:251-254 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933723_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Thompson S H Teo Author-X-Name-First: Thompson S H Author-X-Name-Last: Teo Author-Name: Yujun Pian Author-X-Name-First: Yujun Author-X-Name-Last: Pian Title: A contingency perspective on Internet adoption and competitive advantage Abstract: Firms adopt the Internet for different purposes, ranging from simple Internet presence to using the Internet to transform business operations. This paper examines the contingency factors that affect levels of Internet adoption and their impact on competitive advantage. A questionnaire was used to gather data for this study; 159 usable responses were obtained from a sample of 566 firms in Singapore. Results indicate that most firms are still exploring the business use of the Internet. A proactive business technology strategy was found to be positively associated with the level of Internet adoption. Technology compatibility and top management support were found to have no significant relationships with the level of Internet adoption. Further, the level of Internet adoption had a significant positive relationship with competitive advantage. These results provide a better understanding of the contingency factors affecting the level of Internet adoption, as well as providing some evidence of the positive impact of Internet adoption on competitive advantage. Journal: European Journal of Information Systems Pages: 78-92 Issue: 2 Volume: 12 Year: 2003 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000448 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000448 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:2:p:78-92 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933724_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bruce R Lewis Author-X-Name-First: Bruce R Author-X-Name-Last: Lewis Author-Name: Terry Anthony Byrd Author-X-Name-First: Terry Anthony Author-X-Name-Last: Byrd Title: Development of a measure for the information technology infrastructure construct Abstract: The goal of this research was to operationalize the information technology infrastructure (ITI) concept by identifying its underlying dimensions and establishing a valid and reliable measure for the construct. In order to accomplish this task with the highest degree of certainty, two approaches were sequentially applied: exploratory factor analysis and confirmatory factor analysis. In evaluating the confirmatory factor model, a step-by-step process was employed, assessing unidimensionality, reliability, discriminant validity, and nomological validity. The dimensions of ITI were determined to be: Chief Information Officer, IT Planning, IT Security, Technology Integration, Advisory Committee, Enterprise Model, and Data Administration. Researchers may now make use of this validated ITI measure to conduct investigations of ITI and other organizational measures. Implications of the ITI measure with other organizational initiatives such as electronic commerce and knowledge management are explored. Journal: European Journal of Information Systems Pages: 93-109 Issue: 2 Volume: 12 Year: 2003 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000449 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000449 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:2:p:93-109 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933725_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Rosane Pagano Author-X-Name-First: Rosane Author-X-Name-Last: Pagano Title: Knowledge and Business Process Management Journal: European Journal of Information Systems Pages: 159-160 Issue: 2 Volume: 12 Year: 2003 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000452 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000452 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:2:p:159-160 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933726_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Shantanu Bagchi Author-X-Name-First: Shantanu Author-X-Name-Last: Bagchi Author-Name: Shivraj Kanungo Author-X-Name-First: Shivraj Author-X-Name-Last: Kanungo Author-Name: Subhasish Dasgupta Author-X-Name-First: Subhasish Author-X-Name-Last: Dasgupta Title: Modeling use of enterprise resource planning systems: a path analytic study Abstract: In this research, we evaluated user participation and involvement in the context of enterprise resource planning (ERP) systems. Since ERP systems are enterprise-wide in scope, these systems have a high level of complexity, and require a different implementation methodology. While most studies analyze implementation at an organization or industry level, there is a dearth in research in ERP system adoption at the individual or user level. In our study, we examine ERP system acceptance at the individual level. In this research, we expected to find differences in the nature of user participation and involvement in ERP compared to other information systems. Using Barki and Hartwick's extension of the theory of reasoned action, a revised model was developed and tested empirically. While Barki and Hartwick's model explains user behavior vis-à-vis user participation and involvement, a more parsimonious model demonstrates that usage dynamics in ERP implementation are different. We complemented our statistical analysis by three case studies. Based on our results we believe that, given the nature of ERP and its implementation, traditionally formalized links between influencers of users' attitude and involvement may need to be revised. We have discussed why we need to seek alternate forms of influencers. In doing so, we suggest that investments be made in preparatory work practices and employee development prior to ERP decisions. Such investments are complementary to information technology and are widespread throughout the firm. We believe that such investments will play a significant role in influencing the attitude of users toward any system and also their involvement. Journal: European Journal of Information Systems Pages: 142-158 Issue: 2 Volume: 12 Year: 2003 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000453 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000453 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:2:p:142-158 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933727_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mário M Caldeira Author-X-Name-First: Mário M Author-X-Name-Last: Caldeira Author-Name: John M Ward Author-X-Name-First: John M Author-X-Name-Last: Ward Title: Using resource-based theory to interpret the successful adoption and use of information systems and technology in manufacturing small and medium-sized enterprises Abstract: The purpose of this paper is to consider how resource-based theory can be used to explain success with the adoption and use of information systems and information technology (IS/IT) in manufacturing small and medium-sized enterprises (SMEs). A number of authors have explored the applicability of resource-based theory to the IS/IT domain, mainly at a conceptual level. Overall they infer that the key differentiators for long-term successful IS/IT deployment reside within the internal context of an organisation, based on organisational competences. This paper is based on in-depth case study research in 12 Portuguese manufacturing SMEs, which identified two factors that, from the empirical evidence, appeared to be the determinants of the different levels of success in IS/IT adoption and use. These factors were also primarily associated with the internal context of the organisations. Therefore, the findings were analysed from the perspective of resource-based theory, to understand why and how the attributes of these factors caused the differential levels of IS/IT success in the firms studied. Journal: European Journal of Information Systems Pages: 127-141 Issue: 2 Volume: 12 Year: 2003 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000454 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000454 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:2:p:127-141 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933728_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Alec Morton Author-X-Name-First: Alec Author-X-Name-Last: Morton Author-Name: Fran Ackermann Author-X-Name-First: Fran Author-X-Name-Last: Ackermann Author-Name: Valerie Belton Author-X-Name-First: Valerie Author-X-Name-Last: Belton Title: Technology-driven and model-driven approaches to group decision support: focus, research philosophy, and key concepts Abstract: There are (at least) two distinct traditions within group decision support: what we will call the ‘Technology-driven’ tradition, which originates in the Information Systems discipline, and what we will call the ‘Model-driven’ tradition, which originates in OR/MS. Although proponents of the two traditions share many of the same objectives, in the past there has been little communication between the two groups. In this paper, we describe the basic distinction between the two traditions in terms of two primary themes: research focus (i.e., what the researchers find of interest) and research philosophy and methodology (i.e., how researchers go about studying their chosen subject matter); and we trace these implications of these differences through the key concepts of each tradition. We conclude by arguing that there are many opportunities for synergy between the two traditions. Journal: European Journal of Information Systems Pages: 110-126 Issue: 2 Volume: 12 Year: 2003 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000455 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000455 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:2:p:110-126 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933729_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Zahir Irani Author-X-Name-First: Zahir Author-X-Name-Last: Irani Title: The Relationship Advantage: Information Technologies, Sourcing, and Management Journal: European Journal of Information Systems Pages: 161-162 Issue: 2 Volume: 12 Year: 2003 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000456 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000456 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:2:p:161-162 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933730_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ian Alexander Author-X-Name-First: Ian Author-X-Name-Last: Alexander Title: Visualizing Argumentation: Software Tools for Collaborative and Educational Sense-making Journal: European Journal of Information Systems Pages: 163-164 Issue: 2 Volume: 12 Year: 2003 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000457 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000457 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:2:p:163-164 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933731_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Guy Fitzgerald Author-X-Name-First: Guy Author-X-Name-Last: Fitzgerald Title: Erratum: Information Systems Outsourcing: Enduring Themes, Emergent Patterns and Future Directions Journal: European Journal of Information Systems Pages: 165-165 Issue: 2 Volume: 12 Year: 2003 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000458 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000458 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:2:p:165-165 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933732_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ray J Paul Author-X-Name-First: Ray J Author-X-Name-Last: Paul Title: Time, change and paradoxes Journal: European Journal of Information Systems Pages: 77-77 Issue: 2 Volume: 12 Year: 2003 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000459 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000459 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:2:p:77-77 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933994_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Astrid Dickinger Author-X-Name-First: Astrid Author-X-Name-Last: Dickinger Author-Name: Mitra Arami Author-X-Name-First: Mitra Author-X-Name-Last: Arami Author-Name: David Meyer Author-X-Name-First: David Author-X-Name-Last: Meyer Title: The role of perceived enjoyment and social norm in the adoption of technology with network externalities Abstract: The emergence of highly interactive media and the increased connectivity among people call for an investigation of usage behaviour of those media. People tend to rely heavily on peer-to-peer interaction influencing the adoption of new media formats that enhance this interactivity. The first explorative phase of this research consists of interviews with experts and focus groups and builds the basis of the proposed framework and measurement model. Then, a Structural Equation Modelling approach is used to assess the relative importance and the strength between different constructs, including perceived enjoyment, social norm, usefulness, ease of use and intention to use. The results indicate that perceived enjoyment and social norm are important antecedents for the adoption of technology with network externalities. Journal: European Journal of Information Systems Pages: 4-11 Issue: 1 Volume: 17 Year: 2008 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000726 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000726 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:1:p:4-11 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933995_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Vijay Kasi Author-X-Name-First: Vijay Author-X-Name-Last: Kasi Author-Name: Mark Keil Author-X-Name-First: Mark Author-X-Name-Last: Keil Author-Name: Lars Mathiassen Author-X-Name-First: Lars Author-X-Name-Last: Mathiassen Author-Name: Keld Pedersen Author-X-Name-First: Keld Author-X-Name-Last: Pedersen Title: The post mortem paradox: a Delphi study of IT specialist perceptions Abstract: While post mortem evaluation (PME) has long been advocated as a means of improving development practices by learning from IT project failures, few organizations conduct PMEs. The purpose of the study is to explain this discrepancy between theory and practice. This paper integrates findings from a Delphi study of what experienced practitioners perceive as the most important barriers to conducting PMEs with insights from organizational learning theory. The results suggest that there are critical tensions between development practices and learning contexts in many organizations, and adopting PMEs in these cases is likely to reinforce organizational learning dysfunctions rather than improve current development practices. Based on these findings, we argue that the PME literature has underestimated the limits to learning in most IT organizations and we propose to explore paradoxical thinking to help researchers frame continued inquiry into PME and to help managers overcome learning dysfunctions as they push for more widespread use of PMEs. Journal: European Journal of Information Systems Pages: 62-78 Issue: 1 Volume: 17 Year: 2008 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000727 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000727 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:1:p:62-78 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933996_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Corinne M Karuppan Author-X-Name-First: Corinne M Author-X-Name-Last: Karuppan Author-Name: Muthu Karuppan Author-X-Name-First: Muthu Author-X-Name-Last: Karuppan Title: Resilience of super users’ mental models of enterprise-wide systems Abstract: Research on information system training has focused primarily on methods, while neglecting the effects of interruption intervals between training and system implementation. This empirical study examines the resilience of accurate mental models of an enterprise-wide system in a large health care facility. Accurate mental models were shown to withstand the passage of time and resulted in superior field performance following a crash conversion. Consistent with prior experimental research, certain types of learners were more likely to acquire these sounder mental models. In large organisations where the simultaneous training of users on a complex system is virtually impossible, scheduling is an important facet of the training paradigm. The main practical implications of this study involve the development of: (1) training programmes emphasising performance on far-transfer tasks, (2) training schedules designed to minimise knowledge erosion, and (3) criteria for selecting highly capable super users. Journal: European Journal of Information Systems Pages: 29-46 Issue: 1 Volume: 17 Year: 2008 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000728 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000728 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:1:p:29-46 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933997_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Pratim Datta Author-X-Name-First: Pratim Author-X-Name-Last: Datta Author-Name: Sutirtha Chatterjee Author-X-Name-First: Sutirtha Author-X-Name-Last: Chatterjee Title: The economics and psychology of consumer trust in intermediaries in electronic markets: the EM-Trust Framework Abstract: The rise of electronic markets (EM) and e-commerce came with the promise of disintermediation. Yet, from aggregators to authenticators, the online landscape today is scattered with intermediaries such as EBay and Verisign, aiming to streamline e-commerce transactions and building consumer trust in EM. The central theme of this paper is to understand the contextual factors that lead to consumers’ need to trust intermediaries. In developing our arguments, the paper synthesizes perspectives from information economics, transaction cost economics, and literature on institution-based trust to develop the EM-Trust Framework. Drawing from information economics, the paper contends that EM embody certain inefficiencies, which in turn contribute towards heightening consumer uncertainty, especially under conditions of high information specificity. Heightened consumer uncertainty subsequently reduces consumer trust in EM. It is only in the face of uncertainty and a loss of trust in EM that consumers transfer their need to trust in intermediaries. However, the transference of trust is complete only if agency costs from intermediation lie within consumer thresholds. A mini-case of online mortgage marketplaces is used to illustrate the EM-Trust Framework, thus creating threads for more insightful investigations in the future. Journal: European Journal of Information Systems Pages: 12-28 Issue: 1 Volume: 17 Year: 2008 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000729 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000729 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:1:p:12-28 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933998_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Hee-Dong Yang Author-X-Name-First: Hee-Dong Author-X-Name-Last: Yang Author-Name: Hye-Ryun Kang Author-X-Name-First: Hye-Ryun Author-X-Name-Last: Kang Author-Name: Robert M Mason Author-X-Name-First: Robert M Author-X-Name-Last: Mason Title: An exploratory study on meta skills in software development teams: antecedent cooperation skills and personality for shared mental models Abstract: Shared mental models (SMMs) provide an approach to improving team learning and performance. SMM means that team members share common expectations about the team processes, results, !and individual roles in achieving the team's objective. Our model of antecedents and consequences of SMMs demonstrates how cognitive capabilities contribute to effective software development teams. Higher scores on two meta-level cognitive skills (A-shaped skills and T-shaped skills) and a personality characteristic (agreeableness), which help teammates coordinate their skills and knowledge, enhance the development of an SMM and thereby enhance team performance. The results open new and important areas for research into both the meta-level cognitive skills and the agreeable characteristic required for team effectiveness. There is also promise for new approaches to team building. Journal: European Journal of Information Systems Pages: 47-61 Issue: 1 Volume: 17 Year: 2008 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000730 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000730 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:1:p:47-61 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933999_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Tsai-Hsin Chu Author-X-Name-First: Tsai-Hsin Author-X-Name-Last: Chu Author-Name: Daniel Robey Author-X-Name-First: Daniel Author-X-Name-Last: Robey Title: Explaining changes in learning and work practice following the adoption of online learning: a human agency perspective Abstract: Online learning applications are typically introduced with expectations that they will be used to improve learning and work practices, yet they often fall short of expectations following implementation. Numerous empirical studies have reported unintended use (and nonuse) of new IT applications, providing initial support for practice-based research for viewing emergent changes in work practices. Human agency is a core concept in theories of practice, which seek to explain how recurring patterns of action develop in social contexts such as work settings. However, current applications of theories of practice do not provide satisfactory explanations for the reasons underlying changes in work practice. In this study, we investigate changes in learning and work practices associated with the implementation of an online learning system in a Taiwanese hospital. We apply a temporal theory of human agency that disaggregates agency into elements reflecting actors' orientations to the past, present, and future. We use this theory to address the following research question: why do learning and work practices change following the implementation of online learning? The case study reveals that actors face pressures to respond to the attractions of new ways of learning while preserving traditional work practices. In addition, technological features and social structures constrain the exercise of human agency. As a result, use of the online learning system declined in the period following implementation. Our analysis adds explanatory power to the practice perspective by incorporating human agency, technological constraints, and structural conditions that affect practice. Journal: European Journal of Information Systems Pages: 79-98 Issue: 1 Volume: 17 Year: 2008 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000731 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000731 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:1:p:79-98 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934000_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Richard Baskerville Author-X-Name-First: Richard Author-X-Name-Last: Baskerville Title: Changing the challenge: measure what makes you better and be better at what you measure Journal: European Journal of Information Systems Pages: 1-3 Issue: 1 Volume: 17 Year: 2008 Month: 2 X-DOI: 10.1057/ejis.2008.1 File-URL: http://hdl.handle.net/10.1057/ejis.2008.1 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:1:p:1-3 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934075_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Daniel Port Author-X-Name-First: Daniel Author-X-Name-Last: Port Author-Name: Tung Bui Author-X-Name-First: Tung Author-X-Name-Last: Bui Title: Simulating mixed agile and plan-based requirements prioritization strategies: proof-of-concept and practical implications Abstract: In this paper, we address the efficacy and pragmatics of mixing two primary strategies for requirements prioritization in order to incorporate the benefits of both plan-based (PB) and agile development methods while avoiding their drawbacks. As it is intractable to directly study the performance of strategies on real projects, we conducted a comprehensive empirically based simulation under a variety of conditions of requirements dynamism, project size, and duration. Simulation results suggest that a mixed strategy for requirements prioritization seems to work best in all but cost for typical levels of dynamism on average. Our findings also indicate that, as theorized, PB and agile strategies perform well within opposite extremes of dynamism. However, they do not outperform the mixed strategies even within their home grounds – that is large and complex systems with stable requirements for PB, and small and dynamic projects for agile methods. Given the unknown, unknowable, or variable nature of dynamism and the dramatic differences in effectiveness for agile and PB strategies under extreme development scenarios, a mixed strategy appears to yield the best results overall. We introduce two mixed strategies – simply adding cost–benefit (CB) to the agile approach, and a more sophisticated ‘hybrid’ (HY) approach that modulates development iteration size to maximize the expected CB for each iteration. We propose a step-by-step method to implement this HY strategy. We provide a structured analysis of the benefits and assumptions of agile and PB requirements prioritization methods (e.g., Pareto optimization), and outline a framework for analyzing and assessing the effectiveness of strategies including several new metrics. This research can furthermore serve as a framework for future validation of the proposed mixed strategies using actual software projects. Journal: European Journal of Information Systems Pages: 317-331 Issue: 4 Volume: 18 Year: 2009 Month: 8 X-DOI: 10.1057/ejis.2009.19 File-URL: http://hdl.handle.net/10.1057/ejis.2009.19 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:4:p:317-331 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934076_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Fredrik Karlsson Author-X-Name-First: Fredrik Author-X-Name-Last: Karlsson Author-Name: Pär Ågerfalk Author-X-Name-First: Pär Author-X-Name-Last: Ågerfalk Title: Exploring agile values in method configuration Abstract: The Method for Method Configuration (MMC) has been proposed as a method engineering approach to tailoring information systems development methods. This meta-method has been used on a variety of methods, but none of these studies have focused on the ability to manage method tailoring with the intention to promote specific values and goals, such as agile ones. This paper explores how MMC has been used during three software development projects to manage method tailoring with the intention to promote agile goals and values. Through content examples of method configurations we have shown that it is possible to use MMC and its conceptual framework on eXtreme Programming and we report on lessons learned with regard to maintaining coherency with the overall goals of the original method. Journal: European Journal of Information Systems Pages: 300-316 Issue: 4 Volume: 18 Year: 2009 Month: 8 X-DOI: 10.1057/ejis.2009.20 File-URL: http://hdl.handle.net/10.1057/ejis.2009.20 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:4:p:300-316 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934077_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: John McAvoy Author-X-Name-First: John Author-X-Name-Last: McAvoy Author-Name: Tom Butler Author-X-Name-First: Tom Author-X-Name-Last: Butler Title: The role of project management in ineffective decision making within Agile software development projects Abstract: Decision making in traditional software development lies with the project manager. In contrast, Agile software development teams are empowered to make decisions, while the role of project manager has changed from one of command and control (i.e. to make decisions and ensure they are implemented) to one of a facilitator. This article argues that decision making in software development is not characterised by a sequence of isolated or exclusive decisions; rather, decisions are inter-related, with each decision leading to further decisions, the chain of which often spans the entire duration of a project. Over this extended period, there are several potential factors that can negatively affect the efficacy of decision making by Agile teams. One of the findings of this exploratory longitudinal study is that the high level of empowerment of a cohesive software development team undertaking an Agile project may be one of these negative factors, as empowered, cohesive teams can exhibit problems such as groupthink or the Abilene Paradox. This article therefore argues that the role of project manager in Agile development initiatives needs to be reassessed, with project managers taking on the role of devil's advocate in the decision-making process. Journal: European Journal of Information Systems Pages: 372-383 Issue: 4 Volume: 18 Year: 2009 Month: 8 X-DOI: 10.1057/ejis.2009.22 File-URL: http://hdl.handle.net/10.1057/ejis.2009.22 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:4:p:372-383 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934078_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: George Mangalaraj Author-X-Name-First: George Author-X-Name-Last: Mangalaraj Author-Name: RadhaKanta Mahapatra Author-X-Name-First: RadhaKanta Author-X-Name-Last: Mahapatra Author-Name: Sridhar Nerur Author-X-Name-First: Sridhar Author-X-Name-Last: Nerur Title: Acceptance of software process innovations – the case of extreme programming Abstract: Extreme programming (XP), arguably the most popular agile development methodology, is increasingly finding favor among software developers. Its adoption and acceptance require significant changes in work habits inculcated by traditional approaches that emphasize planning, prediction, and control. Given the growing interest in XP, it is surprising that there is a paucity of research articles that examine the factors that facilitate or hinder its adoption and eventual acceptance. This study aims to fill this void. Using a case study approach, we provide insights into individual, team, technological, task, and environmental factors that expedite or impede the organization-wide acceptance of XP. In particular, we study widely differing patterns of adherence to XP practices within an organization, and tease out the various issues and challenges posed by the adoption of XP. Based on our findings, we evolve factors and discuss their implications on the acceptance of XP practices. Journal: European Journal of Information Systems Pages: 344-354 Issue: 4 Volume: 18 Year: 2009 Month: 8 X-DOI: 10.1057/ejis.2009.23 File-URL: http://hdl.handle.net/10.1057/ejis.2009.23 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:4:p:344-354 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934079_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Likoebe M Maruping Author-X-Name-First: Likoebe M Author-X-Name-Last: Maruping Author-Name: Xiaojun Zhang Author-X-Name-First: Xiaojun Author-X-Name-Last: Zhang Author-Name: Viswanath Venkatesh Author-X-Name-First: Viswanath Author-X-Name-Last: Venkatesh Title: Role of collective ownership and coding standards in coordinating expertise in software project teams Abstract: Software development is a complex undertaking that continues to present software project teams with numerous challenges. Software project teams are adopting extreme programming (XP) practices in order to overcome the challenges of software development in an increasingly dynamic environment. The ability to coordinate software developers' efforts is critical in such conditions. Expertise coordination has been identified as an important emergent process through which software project teams manage non-routine challenges in software development. However, the extent to which XP enables software project teams to coordinate expertise is unknown. Drawing on the agile development and expertise coordination literatures, we examine the role of collective ownership and coding standards as processes and practices that govern coordination in software project teams. We examine the relationship between collective ownership, coding standards, expertise coordination, and software project technical quality in a field study of 56 software project teams comprising 509 software developers. We found that collective ownership and coding standards play a role in improving software project technical quality. We also found that collective ownership and coding standards moderated the relationship between expertise coordination and software project technical quality, with collective ownership attenuating the relationship and coding standards strengthening the relationship. Theoretical and practical implications of the findings are discussed. Journal: European Journal of Information Systems Pages: 355-371 Issue: 4 Volume: 18 Year: 2009 Month: 8 X-DOI: 10.1057/ejis.2009.24 File-URL: http://hdl.handle.net/10.1057/ejis.2009.24 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:4:p:355-371 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934080_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Saonee Sarker Author-X-Name-First: Saonee Author-X-Name-Last: Sarker Author-Name: Charles L Munson Author-X-Name-First: Charles L Author-X-Name-Last: Munson Author-Name: Suprateek Sarker Author-X-Name-First: Suprateek Author-X-Name-Last: Sarker Author-Name: Suranjan Chakraborty Author-X-Name-First: Suranjan Author-X-Name-Last: Chakraborty Title: Assessing the relative contribution of the facets of agility to distributed systems development success: an Analytic Hierarchy Process approach Abstract: Recent studies have sought to identify different types/facets of agility that can potentially contribute to distributed Information Systems Development (ISD) project success. However, prior research has not attempted to assess the relative importance of the various types of agility with respect to different ISD success measures. We believe that such an assessment is critical, since this information can enable organizations to direct scarce organizational resources to the types of agility that are most relevant. To this end, we use the Analytic Hierarchy Process to unearth, from the perspectives of two stakeholder groups of distributed software development projects, managers, and technical staff members, as to which agility facets facilitate (and to what degree) on-time completion of projects and effective collaboration in distributed ISD teams. Furthermore, noting that there is a need for an overall set of prioritized agility facets (by integrating managerial and technically oriented perspectives), we present three ways to aggregate the preferences of the two groups. Journal: European Journal of Information Systems Pages: 285-299 Issue: 4 Volume: 18 Year: 2009 Month: 8 X-DOI: 10.1057/ejis.2009.25 File-URL: http://hdl.handle.net/10.1057/ejis.2009.25 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:4:p:285-299 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934081_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Lan Cao Author-X-Name-First: Lan Author-X-Name-Last: Cao Author-Name: Kannan Mohan Author-X-Name-First: Kannan Author-X-Name-Last: Mohan Author-Name: Peng Xu Author-X-Name-First: Peng Author-X-Name-Last: Xu Author-Name: Balasubramaniam Ramesh Author-X-Name-First: Balasubramaniam Author-X-Name-Last: Ramesh Title: A framework for adapting agile development methodologies Abstract: Agile development methodologies such as Extreme Programming are becoming increasingly popular due to their focus on managing time to market constraints and the ability to accommodate changes during the software development life cycle. However, such methodologies need to be adapted to suit the needs of different contexts. Past literature has paid little attention to examine the adaptation of agile methodologies. Using adaptive structuration theory as a lens to analyze data from a multisite case study, we examine how the structure of agile methods, projects, and organizations affect the adaptation of agile methodologies. We describe the various sources of structure that affect appropriation of agile practices, the set of appropriated practices and their characteristics, and their link to process outcomes. Based on our findings, we provide prescriptions for adapting agile development methodologies. We also discuss how adapted agile practices can address several challenges faced by agile development teams. Journal: European Journal of Information Systems Pages: 332-343 Issue: 4 Volume: 18 Year: 2009 Month: 8 X-DOI: 10.1057/ejis.2009.26 File-URL: http://hdl.handle.net/10.1057/ejis.2009.26 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:4:p:332-343 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934082_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Pekka Abrahamsson Author-X-Name-First: Pekka Author-X-Name-Last: Abrahamsson Author-Name: Kieran Conboy Author-X-Name-First: Kieran Author-X-Name-Last: Conboy Author-Name: Xiaofeng Wang Author-X-Name-First: Xiaofeng Author-X-Name-Last: Wang Title: ‘Lots done, more to do’: the current state of agile systems development research Journal: European Journal of Information Systems Pages: 281-284 Issue: 4 Volume: 18 Year: 2009 Month: 8 X-DOI: 10.1057/ejis.2009.27 File-URL: http://hdl.handle.net/10.1057/ejis.2009.27 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:4:p:281-284 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933753_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Erja Mustonen-ollila Author-X-Name-First: Erja Author-X-Name-Last: Mustonen-ollila Author-Name: Kalle Lyytinen Author-X-Name-First: Kalle Author-X-Name-Last: Lyytinen Title: How organizations adopt information system process innovations: a longitudinal analysis Abstract: This paper describes how three organizations adopted information system (IS) process innovations (ISPI) using a sample of over 200 adoptions over a period of four decades. Four distinct periods that roughly follow Friedman's and Cornford's categorization of IS development eras are analysed in terms of the rate and distribution of ISPI adoptions. These eras include early computing (1954–1965), mainframe (1965–1983), office computing (1983–1991), and distributed applications (1991–1997). We distinguish the following four types of ISPIs: base line technologies (T); tools (TO); description methods (D); and managerial innovations (M). We analyse for each era the rate of adopting different types of ISPIs, identify who made adoption decisions for those ISPI types and determine whether these ISPIs originated internally or externally. Within the three organizations, the types and rates of ISPI adoptions varied significantly. These variations can be attributed to learning mechanisms, the influence of legacy platforms and differences in the boundary spanning activities. With the exception of base line technologies, project managers were the most prominent decision-maker group, suggesting a situated ISPI adoption process. In most ISPI adoptions, internal search and experiments were the main source of innovation. The variation in ISPI adoptions can thus be partly explained by development environments, the types of IS involved and attention bias. Journal: European Journal of Information Systems Pages: 35-51 Issue: 1 Volume: 13 Year: 2004 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000467 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000467 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:1:p:35-51 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933754_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: David H Brown Author-X-Name-First: David H Author-X-Name-Last: Brown Author-Name: Nigel Lockett Author-X-Name-First: Nigel Author-X-Name-Last: Lockett Title: Potential of critical e-applications for engaging SMEs in e-business: a provider perspective Abstract: Against a background of the low engagement of small and medium-sized enterprises (SMEs) in e-business, this paper investigates the emergence of, and potential for, critical e-applications defined as ‘an e-business application, promoted by a trusted third party, which engages a significant number of SMEs by addressing an important shared business concern within an aggregation.’ By a review of secondary data and empirical investigation with service providers and other intermediaries, the research shows that such applications can facilitate the engagement of SME aggregations. There are three key findings, namely: the emergence of aggregation-specific e-business applications; the emergence of collaboratively based ‘one to many’ business models; and the importance of trusted third parties in the adoption of higher-level complexity e-business applications by SMEs. Significantly, this work takes a deliberately provider perspective and complements the already considerable literature on SME IT adoption from a user and network perspective. In terms of future research, the importance of a better conceptual understanding of the impact of complexity on the adoption of information technologies by SMEs is highlighted. Journal: European Journal of Information Systems Pages: 21-34 Issue: 1 Volume: 13 Year: 2004 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000480 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000480 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:1:p:21-34 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933755_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: W Andrew Taylor Author-X-Name-First: W Andrew Author-X-Name-Last: Taylor Title: Computer-mediated knowledge sharing and individual user differences: an exploratory study Abstract: Prior research has shown that individual differences in users' cognitive style and gender can have a significant effect on their usage and perceived usefulness of management information systems. We argue that these differences may also extend to computer-mediated knowledge management systems (KMS), although previous research has not tested this empirically. Where employees are expected to use KMS for acquiring and sharing knowledge, we posit that some will gain more benefit than others, due to their innate personal characteristics, specifically gender and cognitive style. Based on a sample of 212 software developers in one large IS organization, we re-open these dormant debates about the effects of cognitive style and gender on technology usage. The paper contains four main findings. First, we present support for the proposition that cognitive style has an impact on KMS usage, although not for all components of the system. Second, that gender significantly affects KMS usage, with males being more likely to use such systems than females. Third, we find a small interaction effect between cognitive style and gender, but only for the use of data mining. Finally, the data suggest that there is a strong association between KMS usage levels and perceived usefulness. We conclude that if organizations do not recognize the inherent diversity of the workforce, and accommodate gender and cognitive style differences into their knowledge management strategies, they may be likely to propagate an intrinsic disadvantage, to the detriment of females and intuitive thinkers. Journal: European Journal of Information Systems Pages: 52-64 Issue: 1 Volume: 13 Year: 2004 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000484 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000484 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:1:p:52-64 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933756_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Suprateek Sarker Author-X-Name-First: Suprateek Author-X-Name-Last: Sarker Author-Name: Sundeep Sahay Author-X-Name-First: Sundeep Author-X-Name-Last: Sahay Title: Implications of space and time for distributed work: an interpretive study of US–Norwegian systems development teams Abstract: In this paper, utilizing the often taken-for-granted notions of space and time, we develop an understanding of how collaboration is possible among virtual team-members spread across the globe. We do so by interpretively examining the actual experiences and work practices of virtual team-members located in the US & Norway, engaged in information systems development (ISD) projects. We identify a number of collaboration inhibitors, along with strategies used by team-members to address the challenges posed by the mismatch in time zones and the lack of physical proximity. Journal: European Journal of Information Systems Pages: 3-20 Issue: 1 Volume: 13 Year: 2004 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000485 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000485 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:1:p:3-20 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933757_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Pär J Ågerfalk Author-X-Name-First: Pär J Author-X-Name-Last: Ågerfalk Author-Name: Owen Eriksson Author-X-Name-First: Owen Author-X-Name-Last: Eriksson Title: Action-oriented conceptual modelling Abstract: The aim of this paper is to show how speech act theory can be used in systems development as a theoretical foundation for conceptual modelling. With the traditional notion of the conceptual model as an image of reality, the predominant modelling problem is to analyse how the external reality should be mapped into, and represented in, the system in a ‘true’ way. In contrast to this, we maintain that the main modelling problem should be to analyse the communication acts performed by use of the system within its business context. This implies an integration of traditional conceptual modelling with action-oriented business modelling based on speech act theory. With such an approach, it is possible to reconcile traditional conceptual modelling and the pragmatic aspects of language and computer use. It is argued that such reconciliation is essential to arrive at systems that provide relevant information to users and in which users can trace responsibilities for information, actions and commitments made. Journal: European Journal of Information Systems Pages: 80-92 Issue: 1 Volume: 13 Year: 2004 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000486 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000486 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:1:p:80-92 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933758_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Michael Barrett Author-X-Name-First: Michael Author-X-Name-Last: Barrett Author-Name: Susan Scott Author-X-Name-First: Susan Author-X-Name-Last: Scott Title: Electronic trading and the process of globalization in traditional futures exchanges: a temporal perspective Abstract: This paper develops a temporal perspective to examine information and communication technologies (ICT) adoption and processes of globalization. The foundations of our theoretical approach explicitly draw upon three intersecting planes of temporality implicit in structuration; namely reversibility, irreversibility and institutionalization. We further develop our theoretical perspective by extending the scope of structuration to incorporate temporal features of Adam's social theory on ‘global time’. We then use this temporal perspective to examine the emergence of electronic trading and the process of globalization across London and Chicago futures exchanges. Our analysis provides insights into the IT-enabled reconfiguration of these exchanges during processes of reproduction and change associated with globalization. We conclude with some key implications for e-trading strategy and consider changes in trader work life associated with the adoption of e-trading. Journal: European Journal of Information Systems Pages: 65-79 Issue: 1 Volume: 13 Year: 2004 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000487 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000487 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:1:p:65-79 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933759_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Richard Baskerville, Author-X-Name-First: Richard Author-X-Name-Last: Baskerville, Title: An Editor's Values Journal: European Journal of Information Systems Pages: 1-2 Issue: 1 Volume: 13 Year: 2004 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000488 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000488 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:1:p:1-2 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933934_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Yurong Yao Author-X-Name-First: Yurong Author-X-Name-Last: Yao Author-Name: Lisa Murphy Author-X-Name-First: Lisa Author-X-Name-Last: Murphy Title: Remote electronic voting systems: an exploration of voters' perceptions and intention to use Abstract: Coupling telephone and web interfaces with computers for balloting outside the polling place, remote electronic voting systems (REVS) give the voter a choice: polling booth, absentee ballot, or remote voting. Not only does this e-Government technology raises issues such as security, voter participation, and accessibility, REVS technologies themselves differ in features and enabling conditions. How users (voters) perceive REVS's availability, mobility, accuracy, privacy protection, and ease of use, is likely to affect their use intention. Intention to use or not to use a voting technology can translate into a decision to vote or not – and there are no ‘do-overs’. We develop a model and report on a survey of potential voters – people waiting to be impaneled on a jury – in regard to the impact of REVS characteristics on voting intentions and how the two most discussed REVS technologies of telephone- and web-based interfaces are perceived. Journal: European Journal of Information Systems Pages: 106-120 Issue: 2 Volume: 16 Year: 2007 Month: 4 X-DOI: 10.1057/palgrave.ejis.3000672 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000672 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:2:p:106-120 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933935_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: J Ramon Gil-Garcia Author-X-Name-First: J Author-X-Name-Last: Ramon Gil-Garcia Author-Name: InduShobha Chengalur-Smith Author-X-Name-First: InduShobha Author-X-Name-Last: Chengalur-Smith Author-Name: Peter Duchessi Author-X-Name-First: Peter Author-X-Name-Last: Duchessi Title: Collaborative e-Government: impediments and benefits of information-sharing projects in the public sector Abstract: Information-sharing projects are becoming increasingly important in both public and private organizations. Generally, organizations base their decision to move forward with an information-sharing project on the project's expected benefits such as better services, operational savings, and increased program effectiveness. Clearly, potential impediments particular to the government environment could limit the attainment of benefits, jeopardizing the project's business case and even the project itself. Yet, we know very little about how users’ perceived impediments affect a project's expected benefits in collaborative digital government initiatives. Using data from six public sector information-sharing projects, this paper reveals how some managerial and cultural impediments (e.g., control-oriented management) limit perceptions of expected benefits. Surprisingly, political impediments were not found to significantly affect the expectations of benefits. Additionally, the paper provides managers with specific advice on how to better understand users’ perceptions and expectations. The paper should be of interest to both academicians and practitioners who are interested in government information technology implementation, in general, and collaborative e-Government, in particular. Journal: European Journal of Information Systems Pages: 121-133 Issue: 2 Volume: 16 Year: 2007 Month: 4 X-DOI: 10.1057/palgrave.ejis.3000673 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000673 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:2:p:121-133 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933936_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mike Grimsley Author-X-Name-First: Mike Author-X-Name-Last: Grimsley Author-Name: Anthony Meehan Author-X-Name-First: Anthony Author-X-Name-Last: Meehan Title: e-Government information systems: Evaluation-led design for public value and client trust Abstract: e-Government systems differ from commercial information systems (IS) in that they frequently encompass strategic goals that go beyond efficiency, effectiveness and economy, and include political and social objectives such as trust in government, social inclusion, community regeneration, community well-being and sustainability. Designing e-Government systems that help to meet these objectives is a significant challenge for the future. This paper develops an evaluative design framework for e-Government projects that complements traditional approaches to IS evaluation. The framework is based upon Moor's concept of public value. It focuses upon citizens' and clients' experiences of service provision and service outcomes as contributors to the formation of public trust. Trust is shown to be related to the extent to which people feel that an e-Government service enhances their sense of being well-informed, gives them greater personal control, and provides them with a sense of influence or contingency. The framework's development and validation are founded upon analyses of a two live case studies in south-east England and London, U.K. Journal: European Journal of Information Systems Pages: 134-148 Issue: 2 Volume: 16 Year: 2007 Month: 4 X-DOI: 10.1057/palgrave.ejis.3000674 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000674 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:2:p:134-148 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933937_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Zhenyu Huang Author-X-Name-First: Zhenyu Author-X-Name-Last: Huang Title: A comprehensive analysis of U.S. counties’ e-Government portals: development status and functionalities Abstract: This research presents a comprehensive analysis of U.S. counties’ adoption of e-Government and the functions of the websites. By using content analysis methodology, the services and functions of U.S. county e-Government portals are scrutinized. The investigation instrument is based on political and technological theories, an e-Government stage model, and the review of literature. The research finds that U.S. counties’ adoption of e-Government is highly associated with certain socioeconomic factors; in addition, the functionalities of U.S. county e-Government portals are significantly related to six socioeconomic factors according to the multiple regression analysis. The research provides insights for government officials and practitioners to understand and improve e-Government practice. It also sheds light on e-Government research by bringing in a valuable research instrument and comprehensive data about e-Government adoption. The implications for future research are discussed. Journal: European Journal of Information Systems Pages: 149-164 Issue: 2 Volume: 16 Year: 2007 Month: 4 X-DOI: 10.1057/palgrave.ejis.3000675 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000675 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:2:p:149-164 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933938_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Richard Heeks Author-X-Name-First: Richard Author-X-Name-Last: Heeks Author-Name: Carolyne Stanforth Author-X-Name-First: Carolyne Author-X-Name-Last: Stanforth Title: Understanding e-Government project trajectories from an actor-network perspective Abstract: A number of models have been offered to help explain the trajectories of e-Government projects: their frequent failures and their rarer successes. Most, though, lack a sense of the political interaction of stakeholders that is fundamental to understanding the public sector. This paper draws on actor-network theory to provide a perspective that is used to explain the trajectory of an e-Government case study. This perspective is found to provide a valuable insight into the local and global actor-networks that surround e-Government projects. The mobilisation, interaction and disintegration of these networks underpins the course of such projects, and can itself be understood in relation to network actor power: not through a static conception of ‘power over’ others but through the dynamic-enacted concept of ‘power to’. As well as providing a research tool for analysis of e-Government project trajectories, the local/global networks approach also offers insights into e-Government leadership as a process of network formation and maintenance; and into the tensions between network stabilisation and design stabilisation. Journal: European Journal of Information Systems Pages: 165-177 Issue: 2 Volume: 16 Year: 2007 Month: 4 X-DOI: 10.1057/palgrave.ejis.3000676 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000676 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:2:p:165-177 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933939_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ray Hackney Author-X-Name-First: Ray Author-X-Name-Last: Hackney Author-Name: Steve Jones Author-X-Name-First: Steve Author-X-Name-Last: Jones Author-Name: Andrea Lösch Author-X-Name-First: Andrea Author-X-Name-Last: Lösch Title: Towards an e-Government efficiency agenda: the impact of information and communication behaviour on e-Reverse auctions in public sector procurement Abstract: The research in this paper explores how the general context and management information and communication behaviour in electronic Reverse Auctions (e-RAs) may impact on organizational efficiency to ensure procurement excellence. There is evidence that e-RAs improve procurement success by achieving considerable price reductions of externally sourced goods through direct, real-time and transparent competition between suppliers. This paper investigates the conditions for the successful adoption of e-RAs in the U.K. public sector generally and Welsh Unitary Authorities (WUAs) in particular. The research illustrates how e-RAs can support the procurement function and thus, can contribute to organizational efficiency in the context of electronic government (e-Government). A national U.K. survey and an exploratory case analysis in a WUA (Conwy) were undertaken to determine the conditions for the e-RA process. The findings underline the critical importance of the adequate preparation of the e-RA through appropriate information and communication behaviour. Consequently, the paper identifies a set of enabling factors and corresponding guidelines that could be used for the successful adoption of e-RAs in the public sector. The contribution of the research will be of benefit to both academics and practitioners engaged in procurement research and implementation. Journal: European Journal of Information Systems Pages: 178-191 Issue: 2 Volume: 16 Year: 2007 Month: 4 X-DOI: 10.1057/palgrave.ejis.3000677 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000677 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:2:p:178-191 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933940_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Zahir Irani Author-X-Name-First: Zahir Author-X-Name-Last: Irani Author-Name: Peter E D Love Author-X-Name-First: Peter E D Author-X-Name-Last: Love Author-Name: Ali Montazemi Author-X-Name-First: Ali Author-X-Name-Last: Montazemi Title: e-Government: past, present and future Journal: European Journal of Information Systems Pages: 103-105 Issue: 2 Volume: 16 Year: 2007 Month: 4 X-DOI: 10.1057/palgrave.ejis.3000678 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000678 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:2:p:103-105 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933810_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jong Han Park Author-X-Name-First: Jong Han Author-X-Name-Last: Park Author-Name: Jae Kyu Lee Author-X-Name-First: Jae Kyu Author-X-Name-Last: Lee Author-Name: Jung Soo Yoo Author-X-Name-First: Jung Soo Author-X-Name-Last: Yoo Title: A framework for designing the balanced supply chain scorecard Abstract: Effective measurements of Supply Chain Management (SCM) in the context of the Balanced Scorecard (BSC) have become more important. In the existing SCM performance studies, there are three limitations. First, the SCM measures are not reconciled with the BSC. Second, SCM measures have not comprehensively considered the goals that can be achieved by SCM strategies and solutions. Third, the measures have not identified the characteristics of industry, product, and production strategy. In this paper, we propose a framework for the Balanced Supply Chain Scorecard that considers the literature on the BSC and SCM, SCM solutions, and product characteristics. We analyze the causal relationships between the SCM solutions and product characteristics against measures. The identified relationship between the measures and SCM solutions can be used to evaluate the impact of SCM solutions. Using a case study, we find that the importance of measures significantly depends on the product characteristics. This study can be used to expand the BSC into the area of Strategic Enterprise Management systems, thus to relate performance measures to business activities. Journal: European Journal of Information Systems Pages: 335-346 Issue: 4 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000544 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000544 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:4:p:335-346 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933811_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Paulus Insap Santosa Author-X-Name-First: Paulus Insap Author-X-Name-Last: Santosa Author-Name: Kwok Kee Wei Author-X-Name-First: Kwok Kee Author-X-Name-Last: Wei Author-Name: Hock Chuan Chan Author-X-Name-First: Hock Chuan Author-X-Name-Last: Chan Title: User involvement and user satisfaction with information-seeking activity Abstract: This paper presents the result of an empirical study that investigates user involvement and user satisfaction in the context of information-seeking activity. This study adopts the definition of user involvement as the psychological state of the importance and personal relevance that users attach to a given system. Following Celsi and Olson, intrinsic and situational motivators were considered as two antecedents of user involvement. These two types of motivator were treated as formative exogenous variables, while user involvement and user satisfaction were treated as reflective mediating endogenous variable and final endogenous variable, respectively. Five hypotheses were proposed, and all were supported by the data from a laboratory experiment. This paper also reports two other interesting findings. First, intrinsic motivators have a stronger positive effect on user involvement than situational motivators have. Second, situational motivators have a stronger positive effect on user satisfaction than intrinsic motivators have. The discussion part explains these interesting findings. Journal: European Journal of Information Systems Pages: 361-370 Issue: 4 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000545 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000545 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:4:p:361-370 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933812_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Wasana Bandara Author-X-Name-First: Wasana Author-X-Name-Last: Bandara Author-Name: Guy G Gable Author-X-Name-First: Guy G Author-X-Name-Last: Gable Author-Name: Michael Rosemann Author-X-Name-First: Michael Author-X-Name-Last: Rosemann Title: Factors and measures of business process modelling: model building through a multiple case study Abstract: Business process modelling has gained widespread acceptance as a valuable design and management technique for a variety of purposes. While there has been much research on process modelling techniques and corresponding tools, there has been little empirical research into the success factors of effective process modelling, and the post hoc evaluation of process modelling success. This paper reports on the first attempt to identify process modelling success factors and measures, as empirically evidenced in case studies of nine process modelling projects in three leading Australian organizations. Journal: European Journal of Information Systems Pages: 347-360 Issue: 4 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000546 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000546 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:4:p:347-360 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933813_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Hsiao-Lan Wei Author-X-Name-First: Hsiao-Lan Author-X-Name-Last: Wei Author-Name: Eric T G Wang Author-X-Name-First: Eric T G Author-X-Name-Last: Wang Author-Name: Pei-Hung Ju Author-X-Name-First: Pei-Hung Author-X-Name-Last: Ju Title: Understanding misalignment and cascading change of ERP implementation: a stage view of process analysis Abstract: When adopting an enterprise resource planning (ERP) system, experiencing misalignments between the functionality offered by the package and that required by the firm is common. Implementing an ERP package often necessitates disruptive organizational change, and the outcome of implementation is largely determined by the resolution of misalignment problems. This study draws upon data from a case study to understand the misalignments of ERP adoption and the associated change dynamics from a stage view. The results reveal that industry-, company-, and regulation-specific misalignments often occurred in the chartering phase; misalignments of input, control, data, process, output, and schedule are the major problems in the project phase; misalignments of information and new business requirements are the main concerns in the shakedown phase and onward and upward phase. The cascading effects of misalignments and change actions are illustrated, the misalignment resolution strategies examined, and the implications discussed. Journal: European Journal of Information Systems Pages: 324-334 Issue: 4 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000547 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000547 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:4:p:324-334 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933814_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Patrick Y K Chau Author-X-Name-First: Patrick Y K Author-X-Name-Last: Chau Author-Name: Lihua Huang Author-X-Name-First: Lihua Author-X-Name-Last: Huang Author-Name: Ting-Peng Liang Author-X-Name-First: Ting-Peng Author-X-Name-Last: Liang Title: Information systems research in the Asia Pacific region Abstract: Research in information systems (IS) in the Asia Pacific has experienced fast progress in the past 10 years. A major driving force is the Pacific Asia Conference on Information Systems. In this paper, we provide an overview of the IS research in the Asia Pacific and in China and four best papers selected from the 2004 Pacific Asia Conference on Information System Shanghai Conference. Journal: European Journal of Information Systems Pages: 317-323 Issue: 4 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000548 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000548 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:4:p:317-323 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933815_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Sanjay Gosain Author-X-Name-First: Sanjay Author-X-Name-Last: Gosain Author-Name: Zoonky Lee Author-X-Name-First: Zoonky Author-X-Name-Last: Lee Author-Name: Yongbeom Kim Author-X-Name-First: Yongbeom Author-X-Name-Last: Kim Title: The management of cross-functional inter-dependencies in ERP implementations: emergent coordination patterns Abstract: This paper reports a study examining cross-functional coordination in enterprise resource planning (ERP) projects. We collected primary data related to ERP implementations at four large organizations representing different industries and implementation strategies. These are presented through rich descriptions organized on the basis of an emergent process theory framework. Our case studies suggest that there are three main patterns of managing functional inter-dependencies: A lean coordination pattern that involves intricately planned ‘vanilla’ implementations using reference process models and strong methodologiesA rich coordination pattern that is based on managing inter-dependencies through organizing arrangements and cultural interventions, andA mediation pattern that is based on executive mandate or a dominant functional unit laying out the rules of engagement.This study provides practical implications for industry managers engaged in large-scale enterprise system implementations. It also significantly advances theory by outlining and characterizing cross-functional coordination patterns. Our findings confirm that studying surface regularities as well as the underlying situated phenomena, in combination, can help in generating new insights for guiding ERP projects. Journal: European Journal of Information Systems Pages: 371-387 Issue: 4 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000549 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000549 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:4:p:371-387 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933816_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Denise E Gengatharen Author-X-Name-First: Denise E Author-X-Name-Last: Gengatharen Author-Name: Craig Standing Author-X-Name-First: Craig Author-X-Name-Last: Standing Title: A framework to assess the factors affecting success or failure of the implementation of government-supported regional e-marketplaces for SMEs Abstract: Regional electronic marketplaces (REMs) have been used to promote e-commerce uptake by small and medium enterprises (SMEs). However, the community and regional economic development motives underpinning REM creation can cause complexities. While REM development and management can be informed by existing theoretical frameworks, there is no comprehensive framework that can be used to examine the factors affecting the success or failure of government-supported SME-REMs. The objective of this paper is to construct such a framework that can be used to examine these factors. The literature on e-marketplaces and IT/IS/e-commerce adoption by SMEs is examined to determine the appropriateness of existing theoretical frameworks, the key constructs of which are synthesised to form an integrated theoretical framework. The value of the framework is confirmed by content analysis of published case studies and empirical results from in-depth case studies of two SME-REMs. The most significant factors affecting success or failure of government-supported SME-REMs are as follows: SME-owner innovativeness; REM ownership structure and governance that engender trust and build critical mass by including SMEs in REM development and management; matching REM focus and structure with regional profile by leveraging community ties and existing business relationships; adopting a staged approach to REM development; and ensuring REM benefits are understood by SMEs. Journal: European Journal of Information Systems Pages: 417-433 Issue: 4 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000551 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000551 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:4:p:417-433 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933817_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bruce R Lewis Author-X-Name-First: Bruce R Author-X-Name-Last: Lewis Author-Name: Gary F Templeton Author-X-Name-First: Gary F Author-X-Name-Last: Templeton Author-Name: Terry Anthony Byrd Author-X-Name-First: Terry Anthony Author-X-Name-Last: Byrd Title: A methodology for construct development in MIS research Abstract: This paper presents a comprehensive methodology for developing constructs in MIS research. It is applicable to both individual and organizational levels of analysis, depending on the nature of the concept under study. The methodology is presented as a research guide progressing through three stages: (1) domain definition, (2) instrument construction, and (3) evaluation of measurement properties. The methodology addresses six key measurement properties (content validity, factorial validity, reliability, convergent validity, discriminant validity, nomological validity), which are discussed in detail. An assessment of the proposed methodology indicates that its adoption in MIS research would greatly improve the rigor of construct development projects. This is evidenced by the wide range of quality publications that have used its techniques and its performance when compared to a number of prominent standards for assessing construct development research. Journal: European Journal of Information Systems Pages: 388-400 Issue: 4 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000552 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000552 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:4:p:388-400 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933818_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Shirin Madon Author-X-Name-First: Shirin Author-X-Name-Last: Madon Title: Governance lessons from the experience of telecentres in Kerala Abstract: Telecentres are seen as essential components of governance reform in the international development community and great optimism has been expressed in academic and policy literature regarding their developmental potential. The scope of our paper is to move beyond the confines of conventional governance ideology and to propose a broader conceptual lens through which to study the complexity of issues that need to be addressed in order to make telecentres sustainable. Following several years of experience with these projects, evidence shows that their long-term survival depends upon how interactions are managed between a host of players including the government, private entrepreneurs, international donors, telecommunications suppliers, local companies, civil society organisations and individual community members. This paper proposes that the sociology of governance approach is highly relevant for a study of telecentre sustainability. This theoretical approach is used as a lens through which to investigate issues regarding the sustainability of the Akshaya telecentre project in Kerala in terms of interactions between various groups of players. We adopt a practical reflexive-interpretive methodological approach to encourage the development and reshaping of theoretical ideas about governance through our empirical data. We identify five critical issues currently affecting sustainability of the Akshaya project focusing on how relations and exchanges have been managed over time. Our analysis has important theoretical and policy implications for the Akshaya project and more generally for telecentre initiatives launched as part of governance reform in developing countries. Journal: European Journal of Information Systems Pages: 401-416 Issue: 4 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000576 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000576 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:4:p:401-416 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933679_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: S Jones Author-X-Name-First: S Author-X-Name-Last: Jones Author-Name: J Hughes Author-X-Name-First: J Author-X-Name-Last: Hughes Title: Understanding IS evaluation as a complex social process: a case study of a UK local authority Abstract: The increasing concern from both IS practitioners and academics about the lack of confidence in the returns on IS investment is evidenced in the IS literature and is further illustrated by the growing number of methods and initiatives in this area. This is particularly evident in the UK public sector where national and local government have a duty to ensure that public money is spent appropriately. In this paper the authors explore the area of IS evaluation by categorising the methods available for use and considering the underlying assumptions of these categories. Building on recent research work with interpretative IS evaluation in the private sector, the authors specifically consider UK local government initiatives and use an in-depth case study of one UK Local Authority to elicit lessons for IS practice. The authors contend that there is currently a prevailing paradigm for understanding IS evaluation based on mechanistic and functional principles that are flawed in practice. On the basis of the case material and from the literature, the authors argue that a complementary approach to this paradigm based on situated practice provides a richer view and a more practically oriented approach to IS evaluation. Journal: European Journal of Information Systems Pages: 189-203 Issue: 4 Volume: 10 Year: 2001 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000405 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000405 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:10:y:2001:i:4:p:189-203 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933680_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: A Al-Mudimigh Author-X-Name-First: A Author-X-Name-Last: Al-Mudimigh Author-Name: M Zairi Author-X-Name-First: M Author-X-Name-Last: Zairi Author-Name: M Al-Mashari Author-X-Name-First: M Author-X-Name-Last: Al-Mashari Title: ERP software implementation: an integrative framework Abstract: ERP implementation is a socio-technical challenge that requires a fundamentally different outlook from technologically-driven innovation, and will depend on a balanced perspective where the organisation as a total system is considered. ERP implementation is considered to rely on behavioural processes and actions. It is a process that involves macro-implementation at the strategic level, and micro-implementation at the operational level. This therefore means that implementation in the context of ERP systems is not possible through an ON/OFF approach whereby deployment of the new systems will necessarily yield the desired and expected results. Understanding the implementation process through a balanced perspective will therefore prevent any unpleasant surprises, and will ensure and guide the change process to be embedded in a painless fashion. The balanced perspective means that socio-technical considerations must be borne in mind; the strategic, tactical and operational steps clearly defined; and the expected benefits evaluated and tracked through creating seamless and solid integration. This paper proposes an integrative framework for ERP implementation based on an extensive review of the factors and the essential elements that contribute to success in the context of ERP implementation. Journal: European Journal of Information Systems Pages: 216-226 Issue: 4 Volume: 10 Year: 2001 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000406 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000406 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:10:y:2001:i:4:p:216-226 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933681_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: C J Stefanou Author-X-Name-First: C J Author-X-Name-Last: Stefanou Title: A framework for the ex-ante evaluation of ERP software Abstract: It has been widely reported that a large number of ERP implementations fail to meet expectations. This is indicative, firstly, of the magnitude of the problems involved in ERP systems implementation and, secondly, of the importance of the ex-ante evaluation and selection process of ERP software. This paper argues that ERP evaluation should extend its scope beyond operational improvements arising from the ERP software/product per se to the strategic impact of ERP on the competitive position of the organisation. Due to the complexity of ERP software, the intangible nature of both costs and benefits, which evolve over time, and the organisational, technological and behavioural impact of ERP, a broad perspective of the ERP systems evaluation process is needed. The evaluation has to be both quantitative and qualitative and requires an estimation of the perceived costs and benefits throughout the life-cycle of ERP systems. The paper concludes by providing a framework of the key issues involved in the selection process of ERP software and the associated costs and benefits. Journal: European Journal of Information Systems Pages: 204-215 Issue: 4 Volume: 10 Year: 2001 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000407 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000407 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:10:y:2001:i:4:p:204-215 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933682_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Z Irani Author-X-Name-First: Z Author-X-Name-Last: Irani Author-Name: P E D Love Author-X-Name-First: P E D Author-X-Name-Last: Love Title: Information systems evaluation: past, present and future Journal: European Journal of Information Systems Pages: 183-188 Issue: 4 Volume: 10 Year: 2001 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000408 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000408 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:10:y:2001:i:4:p:183-188 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933683_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: N Shin Author-X-Name-First: N Author-X-Name-Last: Shin Title: The impact of information technology on financial performance: the importance of strategic choice Abstract: Information technology (IT) may not automatically improve firm profitability. It is an essential tool, but not sufficient in itself, and should therefore be coupled with organisational factors such as business strategies. A firm can maximise the value from its IT investments by aligning them with business strategies because IT improves scope economies and coordination. This paper examines empirically the contribution of IT to financial performance as measured by net profit, ROA, and ROE by focusing on the alignment of IT with business strategies such as vertical disintegration and diversification. Empirical analysis shows that IT does not directly improve financial performance. In conjunction with vertical disintegration and diversification, however, it does improve financial performance as measured by net profit. Financial performance ratios such as ROA and ROE, however, are not correlated with the alignment (or interaction) factor of IT with vertical disintegration and diversification. The results indicate that increased IT spending improves net profit, but not performance ratios such as ROA and ROE, of firms with decreased vertical integration and higher diversification. Journal: European Journal of Information Systems Pages: 227-236 Issue: 4 Volume: 10 Year: 2001 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000409 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000409 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:10:y:2001:i:4:p:227-236 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1889346_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Michael D. Myers Author-X-Name-First: Michael D. Author-X-Name-Last: Myers Title: The way forward Journal: European Journal of Information Systems Pages: 1-2 Issue: 1 Volume: 30 Year: 2021 Month: 01 X-DOI: 10.1080/0960085X.2021.1889346 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1889346 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:1:p:1-2 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1747365_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: André Hanelt Author-X-Name-First: André Author-X-Name-Last: Hanelt Author-Name: Sebastian Firk Author-X-Name-First: Sebastian Author-X-Name-Last: Firk Author-Name: Björn Hildebrandt Author-X-Name-First: Björn Author-X-Name-Last: Hildebrandt Author-Name: Lutz M. Kolbe Author-X-Name-First: Lutz M. Author-X-Name-Last: Kolbe Title: Digital M&A, digital innovation, and firm performance: an empirical investigation Abstract: Aiming to support digital innovation endeavours, industrial-age companies increasingly acquire firms that heavily build upon digital technologies. Related research has raised serious concerns regarding the prospects of such plans, yet has not focused the particular context of digital mergers and acquisitions (M&A). Drawing on a knowledge-based perspective as well as the particularities of digital technologies and the context of digital innovation, we theorise the link between digital M&A, a digital knowledge base on the part of the acquirer, and the consequences for digital innovation and firm performance. We employ panel data regressions to a longitudinal dataset of the world’s largest automobile manufacturers. Our findings suggest that executing digital M&A contributes to building the digital knowledge base of industrial-age firms, which in turn enables them to drive digital innovation. Our findings further indicate that digital innovation improves firm performance of industrial-age firms. We discuss implications for information systems research about M&A and digital innovation as well as recommendations for managerial practice. Journal: European Journal of Information Systems Pages: 3-26 Issue: 1 Volume: 30 Year: 2021 Month: 01 X-DOI: 10.1080/0960085X.2020.1747365 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1747365 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:1:p:3-26 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1793696_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Matthew L. Jensen Author-X-Name-First: Matthew L. Author-X-Name-Last: Jensen Author-Name: Alexandra Durcikova Author-X-Name-First: Alexandra Author-X-Name-Last: Durcikova Author-Name: Ryan T Wright Author-X-Name-First: Ryan T Author-X-Name-Last: Wright Title: Using susceptibility claims to motivate behaviour change in IT security Abstract: Organisations face growing IT security risks with substantial consequences for missteps in business continuity, data loss, reputational harm, and future competitive advantage. To improve precaution-taking among organisation members, leaders frequently turn to susceptibility claims embedded in security education, training, and awareness (SETA) initiatives to motivate change. However, prior studies have produced mixed empirical results concerning the role of susceptibility in motivating precaution-taking. To deepen theorising about using susceptibility claims to change behaviour, we argue that threat characteristics (overt versus furtive attacks) shape individuals’ attitudes of the threat, and these attitudes subsequently anchor how individuals respond to new claims about the threats. We introduce social judgement theory (SJT) to argue that when individuals participate in SETA initiatives, susceptibility claims that are too distant from individuals’ existing attitudes will be ignored, while claims that are more proximal are more likely to be accepted and result in behaviour change. Using a longitudinal field experiment, we found that susceptibility claims motivated precaution taking against phishing (overt attack) but did not against password cracking (furtive attack). These results support SJT predictions and imply latitudes of acceptability and rejection into which susceptibility claims are placed. Implications for researchers, organisation leaders, and SETA developers are discussed. Journal: European Journal of Information Systems Pages: 27-45 Issue: 1 Volume: 30 Year: 2021 Month: 01 X-DOI: 10.1080/0960085X.2020.1793696 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1793696 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:1:p:27-45 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1746202_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Hameed Chughtai Author-X-Name-First: Hameed Author-X-Name-Last: Chughtai Title: Taking the human body seriously Abstract: The intention of this article is to open up a dialogue on the importance of giving explicit attention to the human body when studying information systems phenomena. The human body influences the ways in which a person interprets and uses technology. Although we bodily engage with our world (people, things and places), we generally take our bodies for granted, and view them as passive recipients in studies on information technologies and organisational phenomena. Theoretical frameworks built on embodiment indicate that human beings are embedded in their social context, but they do not often include the human body with its somatic aspects (such as orientation, position and movement). Using a theoretically informed ethnographic case, I draw attention to how the human body affects the ways in which we interpret and use technology. The findings suggest revisiting the idiosyncratic view of human embodiment, which often overlooks somatic orientations and modes of engagement. The article contributes a theoretical framework relevant for inquiry into the structure of somatic practices in information systems. I conclude with a discussion of the implications for theory and practice. Journal: European Journal of Information Systems Pages: 46-68 Issue: 1 Volume: 30 Year: 2021 Month: 01 X-DOI: 10.1080/0960085X.2020.1746202 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1746202 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:1:p:46-68 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1829512_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Kevin Carillo Author-X-Name-First: Kevin Author-X-Name-Last: Carillo Author-Name: Gaëlle Cachat-Rosset Author-X-Name-First: Gaëlle Author-X-Name-Last: Cachat-Rosset Author-Name: Josianne Marsan Author-X-Name-First: Josianne Author-X-Name-Last: Marsan Author-Name: Tania Saba Author-X-Name-First: Tania Author-X-Name-Last: Saba Author-Name: Alain Klarsfeld Author-X-Name-First: Alain Author-X-Name-Last: Klarsfeld Title: Adjusting to epidemic-induced telework: empirical insights from teleworkers in France Abstract: The covid-19 pandemic crisis presents unprecedented challenges and has profound implications for the way people live and work. Information and communication technologies have been playing a crucial role in ensuring business continuity as lockdown measures have suddenly forced employees from across the globe to telework, often leaving them unprepared and ill-equipped. This paper develops an epidemic-induced telework adjustment model derived from the theory of Work Adjustment and the Interactional Model of Individual Adjustment. It is tested on a sample of 1574 teleworkers in France. The results demonstrate the superiority of the influence of crisis-specific variables that are professional isolation, telework environment, work increase and stress. Implications for research are discussed while concrete and actionable recommendations for organisations are provided. Journal: European Journal of Information Systems Pages: 69-88 Issue: 1 Volume: 30 Year: 2021 Month: 01 X-DOI: 10.1080/0960085X.2020.1829512 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1829512 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:1:p:69-88 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1841572_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ella Hafermalz Author-X-Name-First: Ella Author-X-Name-Last: Hafermalz Author-Name: Kai Riemer Author-X-Name-First: Kai Author-X-Name-Last: Riemer Title: Productive and connected while working from home: what client-facing remote workers can learn from telenurses about ‘belonging through technology’ Abstract: Client-facing work is challenging at the best of times, but the sudden shift to remote work during the COVID-19 pandemic has created additional difficulties. Concerns about how employee productivity and wellbeing are negatively impacted by the unfamiliar remote work context abound. We draw on a study of skilled remote workers that was conducted before the pandemic to theorise how client-facing work can be conducted effectively. In particular we examine how client-facing employees can foster a sense of belonging when they are not co-located. We use an abductive research approach, combining empirical material from interviews with tele-nurses with theoretical material from Goffman’s categories of “communication out of character”. We thereby theorise what we call “belonging through technology”, as the outcome of four types of team communication that contribute to the performance of effective client-facing work in a remote context. We distinguish and conceptualise functions of such team communication as coping, learning, plotting, and positioning, which together create belonging. We argue that “belonging” relates to both wellbeing and productivity, because belonging to one’s team (wellbeing) and belonging to one’s work role (productivity) are inherently connected in the performance of client-facing work. We offer insights to help practitioners in such remote work contexts. Journal: European Journal of Information Systems Pages: 89-99 Issue: 1 Volume: 30 Year: 2021 Month: 01 X-DOI: 10.1080/0960085X.2020.1841572 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1841572 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:1:p:89-99 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1841573_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Barbara Prommegger Author-X-Name-First: Barbara Author-X-Name-Last: Prommegger Author-Name: Jason Bennett Thatcher Author-X-Name-First: Jason Author-X-Name-Last: Bennett Thatcher Author-Name: Manuel Wiesche Author-X-Name-First: Manuel Author-X-Name-Last: Wiesche Author-Name: Helmut Krcmar Author-X-Name-First: Helmut Author-X-Name-Last: Krcmar Title: When your data has COVID-19: how the changing context disrupts data collection and what to do about it Abstract: Global crises, such as the COVID-19 pandemic, change the context for research and bring with them many professional challenges for IS researchers – not the least of which is disrupting carefully thought-out data collection efforts. In this confessional tale, we describe how moving from an “open research ecosystem” to a “socially distanced research ecosystem” has affected a long-planned data collection effort. While government orders to socially distance and physically isolate may have made the world “stand still” for some, we found that these orders had dynamic and consequential effects for our in-process research. Against the backdrop of significant threats posed by the contextual change to our data collection, we explain how the crisis also opened up opportunities to invigorate our understanding of how the environment affects how we conduct research. We conclude our tale with guidelines for how to successfully respond when your research is interrupted by a change of context. Journal: European Journal of Information Systems Pages: 100-118 Issue: 1 Volume: 30 Year: 2021 Month: 01 X-DOI: 10.1080/0960085X.2020.1841573 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1841573 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:1:p:100-118 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1869914_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Simon Trang Author-X-Name-First: Simon Author-X-Name-Last: Trang Author-Name: Markus Mandrella Author-X-Name-First: Markus Author-X-Name-Last: Mandrella Author-Name: Mauricio Marrone Author-X-Name-First: Mauricio Author-X-Name-Last: Marrone Author-Name: Lutz M. Kolbe Author-X-Name-First: Lutz M. Author-X-Name-Last: Kolbe Title: Co-creating business value through IT-business operational alignment in inter-organisational relationships: empirical evidence from regional networks Abstract: IT alignment research has remained limited primarily to intra-organisational alignment, leaving much to learn about the value-creation potential of its largely neglected inter-organisational counterpart. This study addresses this gap by investigating the role of IT-business operational alignment in inter-organisational relationships (IOR). Drawing on IT-based value-co creation and IT alignment literature, we propose that IOR IT-business operational alignment is an immediate source for co-creating business value and can be established through a capability-building process. Using a sample of 241 regional network collaborations in Germany, we find that IOR IT-business operational alignment directly affects relationship performance. Moreover, we find that three IOR IT capabilities – IT infrastructure integration, information exchange capability, and IT-enabled coordination – enable the development of IOR IT-business operational alignment. This study contributes to IS research on value co-creation by integrating the concept of IT-business alignment into a nomological network with well-established IOR IT capabilities. We provide theoretical explanations and empirical evidence that IT infrastructure integration, information exchange capability, and IT-enabled coordination indirectly affect relationship performance over an operational alignment process. For practice, we highlight the importance of monitoring IT-business operational alignment in IOR and provide recommendations on how to expand existing alignment efforts. Journal: European Journal of Information Systems Pages: 166-187 Issue: 2 Volume: 31 Year: 2022 Month: 03 X-DOI: 10.1080/0960085X.2020.1869914 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1869914 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:2:p:166-187 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1866442_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Hajar Mozaffar Author-X-Name-First: Hajar Author-X-Name-Last: Mozaffar Author-Name: Niki Panteli Author-X-Name-First: Niki Author-X-Name-Last: Panteli Title: The online community knowledge flows: distance and direction Abstract: Whilst the role of online communities (OCs) in knowledge exchange and generation has been widely discussed, limited research exists on the distance and direction of OC knowledge flows. In this paper, we examine this issue by taking the case of an industry-founded OC that rendered around the use of a specific Enterprise Resource Planning (ERP) module used by public sector organisations. Through a grounded analysis approach, we extend literature on OCs by identifying user-generated practices that enable knowledge flows in the online space as well as by examining the travels of these knowledge flows, taking particular account of the distance they cover and the direction they take. Findings point to within, outwards and inwards travels of OC-related knowledge flows showing a widely spread OC knowledge impact. The theoretical and practical implications of the study are discussed. Journal: European Journal of Information Systems Pages: 227-240 Issue: 2 Volume: 31 Year: 2022 Month: 03 X-DOI: 10.1080/0960085X.2020.1866442 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1866442 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:2:p:227-240 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1876534_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mohamed Abouzahra Author-X-Name-First: Mohamed Author-X-Name-Last: Abouzahra Author-Name: Maryam Ghasemaghaei Author-X-Name-First: Maryam Author-X-Name-Last: Ghasemaghaei Title: Effective use of information technologies by seniors: the case of wearable device use Abstract: Healthcare is an area that has benefitted from the developments in wearable device technology. Seniors, who usually suffer from multiple comorbidities, are among the target users of these devices, and research has shown potential health benefits for seniors when they use these devices effectively. However, the adoption rate of wearable devices is low, especially among seniors, preventing the full utilisation of their data in healthcare. In this study, we interviewed forty-four seniors across North America and collected data from their wearable devices to develop a theoretical affordance network-based model to explain seniors’ effective use of wearable devices. Our model indicates that despite the apparent simplicity of wearable devices, they have multiple affordances that help seniors achieve several goals, including activity monitoring, activity planning, and activity improvement. Furthermore, we identified factors that enable seniors to actualise the affordances of wearable devices and achieve their goals. The results of this study suggest a strong relationship between seniors’ mental and physical capabilities and their willingness to use and benefit from wearable devices. We join other researchers in their call for a contextual study on consumer technology use. Journal: European Journal of Information Systems Pages: 241-255 Issue: 2 Volume: 31 Year: 2022 Month: 03 X-DOI: 10.1080/0960085X.2021.1876534 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1876534 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:2:p:241-255 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1860655_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Kieran Conboy Author-X-Name-First: Kieran Author-X-Name-Last: Conboy Author-Name: Rob Gleasure Author-X-Name-First: Rob Author-X-Name-Last: Gleasure Author-Name: Lorraine Morgan Author-X-Name-First: Lorraine Author-X-Name-Last: Morgan Title: When crowds play god: a Promethean perspective on crowdfunding Abstract: Crowdfunding projects have been the subject of contrasting narratives. To many, they are the antithesis of predatory bottom-line business ventures, and to others, they are an under-regulated vehicle for immature, or unscrupulous project owners to exploit inexperienced and vulnerable investors. These differences are significant, given many use crowdfunding to build public awareness and project a positive image. We use the myth of Prometheus – the Greek god associated with “defiant progress” and technological advancement – as a sensitising lens to build a set of competing, dialectic archetypes. We then apply these archetypes through a Hegelian dialectic analysis of three high-profile crowdfunding campaigns. The overarching contribution of the study is that it provides a foundation for discussion of the positive and negative narratives surrounding crowdfunded project owners and explicates the limitations of crowdfunding as an enabler of positive systemic change. The dialectic approach provides a systematic means of identifying the essence of disagreement between narratives. While it may be too early to predict the outcomes for emerging technology-driven initiatives such as crowdfunding, the use of myth offers a sophisticated means to look for “rhyming” phenomena, where the phenomena at play are similar to the grand frailties of humankind throughout history. Journal: European Journal of Information Systems Pages: 207-226 Issue: 2 Volume: 31 Year: 2022 Month: 03 X-DOI: 10.1080/0960085X.2020.1860655 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1860655 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:2:p:207-226 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1829511_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Wael Jabr Author-X-Name-First: Wael Author-X-Name-Last: Jabr Author-Name: Zhiqiang (Eric) Zheng Author-X-Name-First: Zhiqiang (Eric) Author-X-Name-Last: Zheng Title: Exploring firm strategy using financial reports: performance impact of inward and outward relatedness with digitisation Abstract: A firm’s success critically hinges on its strategies in selecting its portfolio of products and services. In this paper, we study how differentiation and market alignment at the offering level impact firm performance. To that end, we mine firms’ 10-K filings to characterise the portfolio of offerings through the lens of outward relatedness, inward relatedness, and digitisation. We define outward relatedness as a measure of alignment of firm offerings within its market space, inward relatedness as a measure of differentiation of firm offerings with its own past offerings, and digitisation as a measure of the firm’s focus on IT. We find that markets react positively to firms that operate with high levels of outward relatedness, low levels of inward relatedness and high levels of digitisation. However, we find that highly digitised firms do not have to conform to peers’ offerings. Digitisation enables these firms to differentiate by internally diversifying their offerings. Interestingly, our results show that only firms already highly digitised benefit from further digitisation. Journal: European Journal of Information Systems Pages: 145-165 Issue: 2 Volume: 31 Year: 2022 Month: 03 X-DOI: 10.1080/0960085X.2020.1829511 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1829511 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:2:p:145-165 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1850185_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Liran Politi Author-X-Name-First: Liran Author-X-Name-Last: Politi Author-Name: Shlomi Codish Author-X-Name-First: Shlomi Author-X-Name-Last: Codish Author-Name: Iftach Sagy Author-X-Name-First: Iftach Author-X-Name-Last: Sagy Author-Name: Lior Fink Author-X-Name-First: Lior Author-X-Name-Last: Fink Title: Substitution and complementarity in the use of health information exchange and electronic medical records Abstract: While considerable literature has addressed the separate use of health information systems, limited research has examined how the use of one system changes following the implementation of another. We address this gap in the literature by developing and testing hypotheses about substitution and complementarity in physicians’ use of health information exchange (HIE), which merges patient data from multiple sources, following the implementation of a local electronic medical record (EMR) system. The hypotheses are anchored in theories foundational to understanding the motivation for information seeking behaviour. The hypotheses are tested with unique data, recorded in system log files, that describe HIE use by physicians in an emergency department before and after EMR implementation. The findings confirm that system use is characterised by substitution when it is defined dichotomously as whether the system is accessed or not (lower HIE access rates after EMR implementation) and by complementarity when it is defined as the extent of system use (higher volume and duration of HIE use after EMR implementation). Our findings suggest that the information seeking literature has underestimated the explanatory value of the cost-benefit approach and the occurrence of complementarity in system use because of its overreliance on a narrow definition of use. Journal: European Journal of Information Systems Pages: 188-206 Issue: 2 Volume: 31 Year: 2022 Month: 03 X-DOI: 10.1080/0960085X.2020.1850185 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1850185 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:2:p:188-206 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933544_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: J Ang Author-X-Name-First: J Author-X-Name-Last: Ang Author-Name: T S H Teo Author-X-Name-First: T S H Author-X-Name-Last: Teo Title: CSFs and sources of assistance and expertise in strategic IS planning: a Singapore perspective Abstract: Strategic information systems (IS) planning is not an easy task and knowing which critical areas to manage certainly enhances IS planning success. Studies of critical success factors (CSFs) usually dealt with specific systems or management technique implementation, such as manufacturing resource planning (MRP) and total quality management (TQM). There exists little empirical research on CSFs per se in strategic IS planning. This paper is an effort to enhance existing knowledge on how strategic IS planning should be effectively managed. Using data from a survey on IS planning conducted in 1996 by the National University of Singapore, we identified and rank-ordered the CSFs in strategic IS planning in the Singapore context. We also examined the sources of assistance and expertise that companies undertaking IS planning in Singapore can tap. Journal: European Journal of Information Systems Pages: 164-171 Issue: 3 Volume: 6 Year: 1997 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000263 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000263 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:6:y:1997:i:3:p:164-171 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933545_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: J J Kaasbøll Author-X-Name-First: J J Author-X-Name-Last: Kaasbøll Title: How evolution of information systems may fail: many improvements adding up to negative effects Abstract: It has been observed in case studies that computer systems evolve through three main processes: initial development, adaptive maintenance, and replacement. Often one system replaces several existing ones. Models of system evolution should therefore include these processes for all the systems being affected. Sometimes, the cumulative effect of small improvements made during adaptive maintenance was dysfunctional; for example, recurrent changes produced spaghetti code which no one dared to change. Possible negative effects of many small changes can be foreseen through improved planning and organization of maintenance. This indicates that systems should be replaced before they deteriorate through amendments. Replacement seems to be easier to carry out than initial development, due to easier requirements engineering. In fifteen out of sixteen processes where computer systems were replaced with newer ones, the new systems were replicas of the old systems with some functionality added. Through repeated replacements, the organizational structure is reinforced. Repeated replacements may therefore result in an inefficient and rigid organization in the long run. Thus many easy-to-accomplish replacements of program code, each of which were intended to improve efficiency, may cause the counter result in the end. Journal: European Journal of Information Systems Pages: 172-180 Issue: 3 Volume: 6 Year: 1997 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000264 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000264 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:6:y:1997:i:3:p:172-180 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933546_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: S Hitchman Author-X-Name-First: S Author-X-Name-Last: Hitchman Title: Using DEKAF to understand data modelling in the practitioner domain Abstract: Despite the ubiquitous use of entity-relationship modelling for more than twenty years, there is surprisingly little evidence of how effective data modelling is in the commercial domain, and this evidence suggests that modelling is problematic. This paper evaluates the literature on the effectiveness of data modelling in the practitioner domain, showing that implicit objectivist assumptions about narrative are questionable. A domain expert knowledge approach framework (DEKAF) is described in the context of overcoming problems of research generalisability. DEKAF provides both a useful way of understanding and thinking about the data modelling process and a way of making assumptions explicit in a particular practitioner domain. A summary of the findings of action research shows that DEKAF can be successfully used and can give insight into effective practitioner domain modelling. Journal: European Journal of Information Systems Pages: 181-189 Issue: 3 Volume: 6 Year: 1997 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000265 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000265 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:6:y:1997:i:3:p:181-189 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933547_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Dan Remenyi Author-X-Name-First: Dan Author-X-Name-Last: Remenyi Title: Information Technology Outsourcing Transactions—Process, Strategies, and Contracts Journal: European Journal of Information Systems Pages: 190-190 Issue: 3 Volume: 6 Year: 1997 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000266 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000266 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:6:y:1997:i:3:p:190-190 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933548_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Frank Land Author-X-Name-First: Frank Author-X-Name-Last: Land Title: Escalation in Decision Making: The Tragedy of Taurus Journal: European Journal of Information Systems Pages: 190-191 Issue: 3 Volume: 6 Year: 1997 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000267 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000267 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:6:y:1997:i:3:p:190-191 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933549_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Brent Work Author-X-Name-First: Brent Author-X-Name-Last: Work Title: Advanced Smalltalk: Introduction to Data Structures and Algorithms with CAA Journal: European Journal of Information Systems Pages: 191-192 Issue: 3 Volume: 6 Year: 1997 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000268 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000268 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:6:y:1997:i:3:p:191-192 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933550_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: J Bryant Author-X-Name-First: J Author-X-Name-Last: Bryant Title: Requirements capture using SODA Abstract: This paper demonstrates the use of an established management science framework for system requirements elicitation within a broad groupware development project. It explains how this framework, strategic options development and analysis (SODA) was used, and illustrates the outcomes produced within a demonstrator setting in a health authority that formed part of the project. The approach is examined and evaluated as an element within the overall system development process. Journal: European Journal of Information Systems Pages: 155-163 Issue: 3 Volume: 6 Year: 1997 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000269 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000269 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:6:y:1997:i:3:p:155-163 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933551_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: K Fletcher Author-X-Name-First: K Author-X-Name-Last: Fletcher Author-Name: G Wright Author-X-Name-First: G Author-X-Name-Last: Wright Title: Strategic and organizational determinants of information system sophistication: an analysis of the uptake of database marketing in the financial services industry Abstract: This paper investigates strategic and organizational determinants of adoption/non-adoption of strategic marketing information systems that differ in degree of sophistication. We identify potentially relevant variables and relate them to the use of database marketing (DBM) systems. Using an obtained sample of 49% of all major banks, building societies and insurance companies in the UK, we compare users and non-users and, within the users, we identify intercorrelations with those variables linked to degree of sophistication.Adoption of DBM systems is closely associated with the organization placing a greater strategic importance on direct marketing decisions, strategic integration of information technology (IT) and marketing, the possession of a large direct marketing grouping and a strong marketing and information orientation. These factors, coupled with a greater degree of organizational slack and weaker organization control of resources and more decisive decision making, which separate adopting organizations from non-adopters.Once adoption has occurred, greater DBM sophistication is closely linked to the power of the direct marketing function, the importance placed on the strategic integration of IT and marketing, the size of the direct marketing grouping, and the organization's overall information orientation. Journal: European Journal of Information Systems Pages: 141-154 Issue: 3 Volume: 6 Year: 1997 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000270 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000270 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:6:y:1997:i:3:p:141-154 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934429_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Gregory D. Moody Author-X-Name-First: Gregory D. Author-X-Name-Last: Moody Author-Name: Paul Benjamin Lowry Author-X-Name-First: Paul Benjamin Author-X-Name-Last: Lowry Author-Name: Dennis F. Galletta Author-X-Name-First: Dennis F. Author-X-Name-Last: Galletta Title: It’s complicated: explaining the relationship between trust, distrust, and ambivalence in online transaction relationships using polynomial regression analysis and response surface analysis Abstract: Trust and distrust are considered crucial elements affecting online relationships – particularly those involving electronic transactions. Although some studies propose that they are distinct, others claim that they are merely opposite ends of one continuum. Further adding to the debate is the possibility of ambivalence, a topic that has not been examined in electronic transaction relationships. Unfortunately, current models of trust and distrust have limitations that impede explanations of how – or even if – ambivalence is generated by feelings of trust and distrust and how these two constructs can best coexist. We thus propose a hybrid model which considers the limitations and strengths of previous models. Namely, we posit that trust and distrust can coexist as separate components with related continua. We use polynomial regression analysis (PRA) and response surface analysis (RSA) to test these complex relationships. Using an empirical study of online consumer behaviour with 521 experienced online consumers, strong empirical validation is found for the model. We examine the effects of ambivalence on the truster’s intentions towards a website and find a small positive effect which increases such intentions. PRA and RSA confirm that trust and distrust are most likely separate components – not opposite ends of a continuum – with related continua. The continua within the subconstructs of trust and distrust likely have more complex and interesting relationships than have been considered previously. These findings lead to interesting future research opportunities on trust, distrust and ambivalence using advanced techniques such as PRA and RSA. Journal: European Journal of Information Systems Pages: 379-413 Issue: 4 Volume: 26 Year: 2017 Month: 7 X-DOI: 10.1057/s41303-016-0027-9 File-URL: http://hdl.handle.net/10.1057/s41303-016-0027-9 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:4:p:379-413 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934430_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Sven Laumer Author-X-Name-First: Sven Author-X-Name-Last: Laumer Author-Name: Christian Maier Author-X-Name-First: Christian Author-X-Name-Last: Maier Author-Name: Tim Weitzel Author-X-Name-First: Tim Author-X-Name-Last: Weitzel Title: Information quality, user satisfaction, and the manifestation of workarounds: a qualitative and quantitative study of enterprise content management system users Abstract: In this paper, we focus on a critical aspect of work in organizations: using information in work tasks which is provided by information systems (IS) such as enterprise content management (ECM) systems. Our study based on the IS success model, 34 interviews, and an empirical study of 247 ECM system users at a financial service provider indicates that it is appropriate to differentiate between contextual and representational information quality as two information quality dimensions. Furthermore, we reveal that in addition to system quality, the two information quality dimensions are important in determining end-user satisfaction, which in turn influences the manifestation of workarounds. Our study also finds that employees using workarounds to avoid an ECM system implemented several years is negatively related to individual net benefits of the ECM system. Hence, we conclude that when investigating large-scale IS such as ECM systems, it is important to differentiate among information quality dimensions to more deeply understand end-user satisfaction and the resulting manifestation of workarounds. Moreover, this research guides organizations in implementing the most appropriate countermeasures based on the importance of either contextual or representational information quality. Journal: European Journal of Information Systems Pages: 333-360 Issue: 4 Volume: 26 Year: 2017 Month: 7 X-DOI: 10.1057/s41303-016-0029-7 File-URL: http://hdl.handle.net/10.1057/s41303-016-0029-7 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:4:p:333-360 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934431_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Hung-pin Shih Author-X-Name-First: Hung-pin Author-X-Name-Last: Shih Author-Name: Kee-hung Lai Author-X-Name-First: Kee-hung Author-X-Name-Last: Lai Author-Name: T. C. E. Cheng Author-X-Name-First: T. C. E. Author-X-Name-Last: Cheng Title: Constraint-based and dedication-based mechanisms for encouraging online self-disclosure: Is personalization the only thing that matters? Abstract: Consumer-generated self-disclosure is better than firm-generated advertising and sales reports in increasing contact opportunities and also more credible for firms to foster alignment with future market expectations. Previous research mostly assesses online self-disclosure from the rational approach of anticipated benefits and privacy risks without considering the “privacy paradox” phenomenon (users behave contrarily to privacy concern) in social networking sites (SNSs). We develop a theoretical model, grounded in constraint-based (lock-in) and dedication-based (trust-building) mechanisms and social identity theory, to predict online self-disclosure. We test the proposed theoretical model by surveying 395 consumers with participation experience in an online SNS. Different from the rational approach behind personalization, we advance knowledge on how to apply social identity, as well as constraint-based and dedication-based mechanisms, to motivate online self-disclosure induced by consumers. We provide theoretical and practical insights based on our research findings for managing the motivational mechanisms of online self-disclosure. Journal: European Journal of Information Systems Pages: 432-450 Issue: 4 Volume: 26 Year: 2017 Month: 7 X-DOI: 10.1057/s41303-016-0031-0 File-URL: http://hdl.handle.net/10.1057/s41303-016-0031-0 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:4:p:432-450 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934432_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Roozmehr Safi Author-X-Name-First: Roozmehr Author-X-Name-Last: Safi Author-Name: Yang Yu Author-X-Name-First: Yang Author-X-Name-Last: Yu Title: Online product review as an indicator of users’ degree of innovativeness and product adoption time: a longitudinal analysis of text reviews Abstract: Online reviews have become extremely valuable sources of information about products and their customers as electronic commerce continues to proliferate rapidly. Previous research has shown that reviews of a product change and evolve over its life. Identifying and understanding patterns of change in reviews and the forces that shape them is an underexplored topic with substantial potential for predicting and improving the market performance of products. In this study, we analyze review text of nearly 50 products over the course of their lives. Our longitudinal analysis of reviews reveals changes in certain personality-related characteristics of buyers in ways that are consistent with the predictions of product adoption and diffusion theories. The main findings and conclusions still hold when we replicate the same procedure on reviews of a different product category. Accordingly, based on online user-generated content in the form of online reviews, this research introduces a novel empirical method for identifying the product adoption and diffusion stage. Implications of the study for theory, methodology, and practice are discussed. Journal: European Journal of Information Systems Pages: 414-431 Issue: 4 Volume: 26 Year: 2017 Month: 7 X-DOI: 10.1057/s41303-017-0045-2 File-URL: http://hdl.handle.net/10.1057/s41303-017-0045-2 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:4:p:414-431 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934433_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Matthias Wenzel Author-X-Name-First: Matthias Author-X-Name-Last: Wenzel Author-Name: Heinz-Theo Wagner Author-X-Name-First: Heinz-Theo Author-X-Name-Last: Wagner Author-Name: Jochen Koch Author-X-Name-First: Jochen Author-X-Name-Last: Koch Title: The funeral industry and the Internet: on the historical emergence and destabilization of strategic paths Abstract: Although IS research acknowledges the importance of path dependence with the generalized response that “history matters,” this broad understanding does not substitute for a more systematic historical analysis of how paths emerge and how technological change breaks them. In this context, we draw on the theory of strategic path dependence from organization and management research to develop a more nuanced understanding of path dependence and then explore how technological change breaks these strategic paths. Based on a narrative analysis of the strategic development of incumbents in the funeral industry, we reconstruct the core components of strategic paths – strategic patterns and self-reinforcing mechanisms – and scrutinize the Internet’s role in breaking these paths. We suggest that technological change helps break strategic paths by destabilizing the very self-reinforcing mechanisms that led to their emergence and reproduction in the first place. Furthermore, by showing that breaking strategic paths involves a subsequent critical event that destabilizes the strategic pattern, we advance a process understanding of how strategic paths are broken. This paper thus provides much-needed historical analyses of IS-related phenomena, offers a more precise and systematic understanding of path dependence in IS research, and yields insights into the process of how strategic paths are broken. Journal: European Journal of Information Systems Pages: 361-378 Issue: 4 Volume: 26 Year: 2017 Month: 7 X-DOI: 10.1057/s41303-017-0048-z File-URL: http://hdl.handle.net/10.1057/s41303-017-0048-z File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:4:p:361-378 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1721947_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Pär J. Ågerfalk Author-X-Name-First: Pär J. Author-X-Name-Last: Ågerfalk Title: Artificial intelligence as digital agency Journal: European Journal of Information Systems Pages: 1-8 Issue: 1 Volume: 29 Year: 2020 Month: 1 X-DOI: 10.1080/0960085X.2020.1721947 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1721947 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:1:p:1-8 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1708218_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jan vom Brocke Author-X-Name-First: Jan Author-X-Name-Last: vom Brocke Author-Name: Alan Hevner Author-X-Name-First: Alan Author-X-Name-Last: Hevner Author-Name: Pierre Majorique Léger Author-X-Name-First: Pierre Majorique Author-X-Name-Last: Léger Author-Name: Peter Walla Author-X-Name-First: Peter Author-X-Name-Last: Walla Author-Name: René Riedl Author-X-Name-First: René Author-X-Name-Last: Riedl Title: Advancing a NeuroIS research agenda with four areas of societal contributions Abstract: On the 10th anniversary of the NeuroIS field, we reflect on accomplishments but, more importantly, on the future of the field. This commentary presents our thoughts on a future NeuroIS research agenda with the potential for high impact societal contributions. Four key areas for future information systems (IS) research are: (1) IS design, (2) IS use, (3) emotion research, and (4) neuro-adaptive systems. We reflect on the challenges of each area and provide specific research questions that serve as important directions for advancing the NeuroIS field. The research agenda supports fellow researchers in planning, conducting, publishing, and reviewing high impact studies that leverage the potential of neuroscience knowledge and tools to further information systems research. Journal: European Journal of Information Systems Pages: 9-24 Issue: 1 Volume: 29 Year: 2020 Month: 1 X-DOI: 10.1080/0960085X.2019.1708218 File-URL: http://hdl.handle.net/10.1080/0960085X.2019.1708218 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:1:p:9-24 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1708821_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jie Mein Goh Author-X-Name-First: Jie Mein Author-X-Name-Last: Goh Author-Name: Alvaro E. Arenas Author-X-Name-First: Alvaro E. Author-X-Name-Last: Arenas Title: IT value creation in public sector: how IT-enabled capabilities mitigate tradeoffs in public organisations Abstract: Governments today are striving to improve services in the public sector through digital transformation programs but face tremendous pressures from multiple fronts (economy, national security, healthcare, education, etc.). Even when worldwide enterprise IT spending for the government and education markets has been increasing and is expected to surpass $652 billion in 2023 to cater to such transformation programs, 80% of the government transformation efforts failed to achieve expected results. A plausible reason for this lacklustre performance could be the presence of tradeoffs or conflicts that is particularly salient in public organisations. To better understand the mechanisms by which IT enables or inhibits capabilities of the public organisations in attaining public value, we adopt a conflict resolution lens to study how information technology (IT) enabled capabilities to mitigate these tradeoffs. Using a dataset collected from public organisations in a European country unreeling from a financial crisis, we examine the processes by which IT enables public organisations to manage the tradeoffs arising from conflicting value-based goals. We identify three mitigation strategies facilitated via IT-enabled organisational capabilities – bias, tunnelling and hybridisation. This paper contributes to the understanding of how IT mitigates value-based tradeoffs in public organisations to achieve public value. Journal: European Journal of Information Systems Pages: 25-43 Issue: 1 Volume: 29 Year: 2020 Month: 1 X-DOI: 10.1080/0960085X.2019.1708821 File-URL: http://hdl.handle.net/10.1080/0960085X.2019.1708821 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:1:p:25-43 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1709575_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Babajide Osatuyi Author-X-Name-First: Babajide Author-X-Name-Last: Osatuyi Author-Name: Ofir Turel Author-X-Name-First: Ofir Author-X-Name-Last: Turel Title: Conceptualisation and validation of system use reduction as a self-regulatory IS use behaviour Abstract: Focusing on social networking site (SNS) users, this research conceptualizes, theorizes on and tests information systems (IS) use reduction herein defined as users’ attempt to reduce their use of an IS to levels that seem reasonable to them to avoid negative implications. IS use reduction is more realistic for many users than full discontinuance, more prevalent than many other corrective behaviors, and can have many desirable outcomes. Yet, knowledge regarding this behavior has been limited. It therefore warrants more attention in IS research and a growing need to develop interventions aimed at helping users reducing excessive IS use such as SNSs. We suggest that IS use reduction can be motivated by negative consequences of excessive SNS use and that the way users translate such states into SNS use reduction intentions can be explained by a contextual and nuanced adaptation of Bandura’s self-regulation of motivation and self-reactive framework. A survey study (study 1, n=257) was used to theorize and test the determinants of SNS use reduction intentions, and a longitudinal experimental study (study 2, n=127) extended the validity of the survey study findings, established causality and examined whether the manipulation the survey study predictors can produce actual SNS use reduction. Journal: European Journal of Information Systems Pages: 44-64 Issue: 1 Volume: 29 Year: 2020 Month: 1 X-DOI: 10.1080/0960085X.2019.1709575 File-URL: http://hdl.handle.net/10.1080/0960085X.2019.1709575 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:1:p:44-64 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1685737_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Antti Salovaara Author-X-Name-First: Antti Author-X-Name-Last: Salovaara Author-Name: Bikesh Raj Upreti Author-X-Name-First: Bikesh Raj Author-X-Name-Last: Upreti Author-Name: Jussi Ilmari Nykänen Author-X-Name-First: Jussi Ilmari Author-X-Name-Last: Nykänen Author-Name: Jani Merikivi Author-X-Name-First: Jani Author-X-Name-Last: Merikivi Title: Building on shaky foundations? Lack of falsification and knowledge contestation in IS theories, methods, and practices Abstract: Among the defining characteristics of a healthy research discipline is the ability to correct its knowledge if more recent evidence creates grounds for this. Studies that reveal errors in earlier theories demonstrate, in line with Karl Popper’s thinking, an approach called falsificationism. They complement approaches aimed at developing and expanding knowledge by generalising empirical observations or postulating new contributions and testing them. The paper presents an analysis that applies this categorisation to abstracts of research papers (N = 5,202) in the eight leading IS journals. Machine-learning-based classification determined that only 7.0% of the papers manifested any clear form of knowledge-contestation, such as falsification, in the approach or findings presented. In light of this, we call on IS researchers to increase the falsification and knowledge-contestation in their research, to nurture more valid theories, methods, and practices, thereby achieving greater societal impact. We present two suitable IS research designs accordingly: knowledge-contesting comparisons and knowledge-contesting replications. We also discuss how these designs, exemplifying opportunities to increase the number of knowledge-contesting studies in the field, can be applied in both positivist and interpretivist research epistemology. Journal: European Journal of Information Systems Pages: 65-83 Issue: 1 Volume: 29 Year: 2020 Month: 1 X-DOI: 10.1080/0960085X.2019.1685737 File-URL: http://hdl.handle.net/10.1080/0960085X.2019.1685737 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:1:p:65-83 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1701956_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Neetu Singh Author-X-Name-First: Neetu Author-X-Name-Last: Singh Author-Name: Upkar Varshney Author-X-Name-First: Upkar Author-X-Name-Last: Varshney Title: IT-based reminders for medication adherence: systematic review, taxonomy, framework and research directions Abstract: IT-based reminders have been one of the most promising interventions to improve medication adherence. Even with considerable research, it is not clear what types of reminders are effective for different patients and diseases and how much improvement in adherence is sustainable over time. To answer this, we conduct a systematic literature review of IT-based reminders. We utilise a six-step process reflecting the systematicity and transparency which is implemented using PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses). Then, we develop a taxonomy of reminders, using Nickerson’s method, including thirteen characteristics categorised in four different dimensions. The findings are used in deciding when and where and how to use reminders with what type of patients for how long in improving medication adherence. The subsequent detailed analysis of the articles brought numerous insights leading to the development of Comprehensive Framework for Medication Reminders (CFMR). The framework can be used by the IS researchers for developing theoretical models to study the effectiveness of interventions for improving medication adherence. The taxonomy can be extended to a multi-level taxonomy using the proposed framework and research directions and can be further evaluated using domain experts. Journal: European Journal of Information Systems Pages: 84-108 Issue: 1 Volume: 29 Year: 2020 Month: 1 X-DOI: 10.1080/0960085X.2019.1701956 File-URL: http://hdl.handle.net/10.1080/0960085X.2019.1701956 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:1:p:84-108 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1586189_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Kieran Conboy Author-X-Name-First: Kieran Author-X-Name-Last: Conboy Title: Being Promethean Journal: European Journal of Information Systems Pages: 119-125 Issue: 2 Volume: 28 Year: 2019 Month: 3 X-DOI: 10.1080/0960085X.2019.1586189 File-URL: http://hdl.handle.net/10.1080/0960085X.2019.1586189 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:2:p:119-125 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1496883_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Helena Wenninger Author-X-Name-First: Helena Author-X-Name-Last: Wenninger Author-Name: Hanna Krasnova Author-X-Name-First: Hanna Author-X-Name-Last: Krasnova Author-Name: Peter Buxmann Author-X-Name-First: Peter Author-X-Name-Last: Buxmann Title: Understanding the role of social networking sites in the subjective well-being of users: a diary study Abstract: Given the rising popularity of social networking sites (SNSs), the influence of these platforms on the subjective well-being (SWB) of their users is an emerging topic in information systems research. Building on the norm of reciprocity and the social functional approach to positive emotions, we posit that targeted reciprocity-evoking forms of SNS activities are best suited to promote users’ positive emotions. The favourable potential of these activities is likely to be particularly pronounced among adolescents who pay special attention to social acceptance, which can be channelled with the help of reciprocal communication. Therefore, we conducted a quantitative 7-day diary study of 162 adolescent Facebook users attending German schools, looking at the impact of their daily SNS activities on their SWB. Based on a linear mixed model analysis, our results confirm a positive link between targeted reciprocity-evoking activities – such as chatting, giving and receiving feedback – and adolescents’ positive emotions. Our findings provide a reassuring perspective on the implications of the sociotechnical design of SNS communication channels. Specifically, by encouraging targeted activities, providers, users, and other stakeholders can ensure the beneficial impact of this technology on users’ SWB. Journal: European Journal of Information Systems Pages: 126-148 Issue: 2 Volume: 28 Year: 2019 Month: 3 X-DOI: 10.1080/0960085X.2018.1496883 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1496883 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:2:p:126-148 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1524418_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Raffaele Fabio Ciriello Author-X-Name-First: Raffaele Fabio Author-X-Name-Last: Ciriello Author-Name: Alexander Richter Author-X-Name-First: Alexander Author-X-Name-Last: Richter Author-Name: Gerhard Schwabe Author-X-Name-First: Gerhard Author-X-Name-Last: Schwabe Title: The paradoxical effects of digital artefacts on innovation practices Abstract: Digital artefacts are increasingly used for supporting innovation practices, implying a growing need to better understand their role in different contexts. In this paper, we study how digital artefacts enable and constrain innovation practices by means of an in-depth, multi-year qualitative field study at a software firm. Analysing the usage of PowerPoint, as a dominant digital innovation artefact, we identify three paradoxes – conflicting yet interdependent tensions of digital artefacts in innovation practices: (1) Freedom and Captivity, (2) Clarity and Ambiguity, and (3) Scarcity and Abundance. Via a dialectic synthesis of the three paradoxes and an extension to modelling tools, we develop a substantive theory of the paradoxical effects of digital artefacts on innovation practices. We discuss theoretical implications for research on affordances and outline a path for research on IT paradoxes. We also offer practical implications by illustrating the paradoxical effects of using digital innovation artefacts and suggesting appropriate coping strategies. Journal: European Journal of Information Systems Pages: 149-172 Issue: 2 Volume: 28 Year: 2019 Month: 3 X-DOI: 10.1080/0960085X.2018.1524418 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1524418 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:2:p:149-172 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1512944_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Carmen Leong Author-X-Name-First: Carmen Author-X-Name-Last: Leong Author-Name: Shan L. Pan Author-X-Name-First: Shan L. Author-X-Name-Last: Pan Author-Name: Shamshul Bahri Author-X-Name-First: Shamshul Author-X-Name-Last: Bahri Author-Name: Ali Fauzi Author-X-Name-First: Ali Author-X-Name-Last: Fauzi Title: Social media empowerment in social movements: power activation and power accrual in digital activism Abstract: Social media assume a role in activism by enabling the powerless to voice widely shared grievances and organise unequally distributed resources. However, the predominant focus on the episodic effect of social media in the digital activism literature presents a limited understanding of how social media can play a role at different level of grassroots involvement and for movement continuity. By adopting a multidimensional empowerment perspective and extending the temporal scope in examining social media-enabled social movements, this study expounds on the logic of connective action (in contrast to the conventional logic of collective action) to offer a theory of social media empowerment. The study builds on a case study of an environmental movement to derive two key contributions: (1) it extends our knowledge of grassroots organising through a conceptualisation of the processes of how social media can allow individuals to assume a more proactive role in driving a social movement and (2) it provides a new understanding of the use of social media to sustain activism over time through the conceptualisation of social media empowerment mechanisms. A framework for social media empowerment in social movements is offered with implications for the mobilising practices of grassroots leaders and organisations. Journal: European Journal of Information Systems Pages: 173-204 Issue: 2 Volume: 28 Year: 2019 Month: 3 X-DOI: 10.1080/0960085X.2018.1512944 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1512944 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:2:p:173-204 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1524420_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mostafa Mesgari Author-X-Name-First: Mostafa Author-X-Name-Last: Mesgari Author-Name: Chitu Okoli Author-X-Name-First: Chitu Author-X-Name-Last: Okoli Title: Critical review of organisation-technology sensemaking: towards technology materiality, discovery, and action Abstract: More than two decades of sensemaking research has brought thorough knowledge of how people understand organisational phenomena and attach meaning to them. This stream of research explores varied social and cognitive aspects of the process in the context of organisations and information technology (IT). However, such a large body of literature exhibits some significant shortcomings: there is a lack of IT materiality; a neglect of the discovery aspect of perception; and a lack of action orientation. So, there is limited understanding of the role that the material artefact plays in shaping users’ sensemaking of new IT, as well as how users’ actions affect their sensemaking. Moreover, while the literature mostly focuses on sensemaking as the creation of new meanings to rationalise user experiences, it neglects the discovery aspect of sensemaking that refers to perception of the meaning already available. To address these issues, this article provides a thorough review of the literature on organisation-technology sensemaking and synthesises our current understanding of the phenomenon. It then analyses the major shortcomings in our knowledge and highlights the need to address those shortcomings. It subsequently discusses an ecological approach consistent with the tenets of critical realism that can address some of the existing shortcomings. Journal: European Journal of Information Systems Pages: 205-232 Issue: 2 Volume: 28 Year: 2019 Month: 3 X-DOI: 10.1080/0960085X.2018.1524420 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1524420 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:2:p:205-232 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934273_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bjarne Rerup Schlichter Author-X-Name-First: Bjarne Rerup Author-X-Name-Last: Schlichter Author-Name: Jeremy Rose Author-X-Name-First: Jeremy Author-X-Name-Last: Rose Title: Trust dynamics in a large system implementation: six theoretical propositions Abstract: A large information systems implementation (such as Enterprise Resource Planning systems) relies on the trust of its stakeholders to succeed. Such projects impact diverse groups of stakeholders, each with their legitimate interests and expectations. Levels of stakeholder trust can be expected to vary in large-scale implementations (which can take several years), and cannot be taken for granted. Previous studies have largely focused on the taxonomic deconstruction of the trust construct, through point-in-time variance studies. They have identified the relationship between trust and project outcomes, but largely ignored the dynamics of trust relations. Giddens, as part of his study of modernity, theorises trust dynamics in relation to abstract social systems, though without focusing on information systems. We use Giddens’ concepts to investigate evolving trust relationships in a longitudinal case analysis of a large Integrated Hospital System implementation for the Faroe Islands. Trust relationships suffered a serious breakdown, but the project was able to recover and meet its goals. We develop six theoretical propositions theorising the relationship between trust and project outcomes, the maintenance, breakdown and restoration of trust, the role of the information system in restoring trust, and the emergent and reciprocal nature of trust and project outcomes. Journal: European Journal of Information Systems Pages: 455-474 Issue: 4 Volume: 22 Year: 2013 Month: 7 X-DOI: 10.1057/ejis.2012.24 File-URL: http://hdl.handle.net/10.1057/ejis.2012.24 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:4:p:455-474 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934274_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Marjolein van Offenbeek Author-X-Name-First: Marjolein Author-X-Name-Last: van Offenbeek Author-Name: Albert Boonstra Author-X-Name-First: Albert Author-X-Name-Last: Boonstra Author-Name: DongBack Seo Author-X-Name-First: DongBack Author-X-Name-Last: Seo Title: Towards integrating acceptance and resistance research: evidence from a telecare case study Abstract: There is wide agreement that acceptance and resistance are crucial factors in information system (IS) adoption. Research has yielded many theories that have focused on either acceptance or resistance, often implicitly assuming that these are opposites. This paper proposes a two-factor view on acceptance and resistance, and shows how this idea may advance our knowledge of IS adoption. In developing a user reactions framework, we take a first step towards integrating the IS literature on acceptance and on resistance. This framework distinguishes between two behavioural dimensions, namely, acceptance, ranging from high use to non-use, and a dimension that ranges from enthusiastic support to aggressive resistance. Combining the two dimensions leads to four categories of user reactions. We show the framework's usefulness by analysing data from a telecare implementation project. The findings identify ambivalent reactions. Many clients are identified as supporting but non-using, while we also find telenurses and care coordinators that show themselves to be resisting but using. These findings support the view that non-acceptance and resistance are conceptually non-equivalent. Our data suggest voluntariness as one determinant of the variation in behavioural reactions encountered. We argue that the concepts are also functionally different: IS implementers will have to adapt their strategies to the different reactions described. Journal: European Journal of Information Systems Pages: 434-454 Issue: 4 Volume: 22 Year: 2013 Month: 7 X-DOI: 10.1057/ejis.2012.29 File-URL: http://hdl.handle.net/10.1057/ejis.2012.29 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:4:p:434-454 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934275_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: M N Ravishankar Author-X-Name-First: M N Author-X-Name-Last: Ravishankar Author-Name: Shan L Pan Author-X-Name-First: Shan L Author-X-Name-Last: Pan Author-Name: Michael D Myers Author-X-Name-First: Michael D Author-X-Name-Last: Myers Title: Information technology offshoring in India: a postcolonial perspective Abstract: In recent years India has become the information technology (IT) offshoring destination of choice for many Western organizations. From the perspective of vendor organizations in India, however, the IT offshoring phenomenon is more than just a business relationship with Western firms. It is also embedded within the context of the longstanding imbalances of power in the relationship between the West and the East, the implications of which have been largely ignored in empirical work on offshoring within the information systems (IS) discipline. Drawing on concepts from postcolonial theory and using data from our ethnographic fieldwork, we explore the experiences and responses of one Indian vendor organization to asymmetries of power in its relationship with Western client organizations. Our analysis demonstrates how a postcolonial reading and interpretation of IT offshoring adds an important new dimension to previous IS research and also helps to develop a more comprehensive understanding of the strategies deployed by vendor organizations. Journal: European Journal of Information Systems Pages: 387-402 Issue: 4 Volume: 22 Year: 2013 Month: 7 X-DOI: 10.1057/ejis.2012.32 File-URL: http://hdl.handle.net/10.1057/ejis.2012.32 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:4:p:387-402 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934276_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jianan Wu Author-X-Name-First: Jianan Author-X-Name-Last: Wu Author-Name: Edgardo Arturo Ayala Gaytán Author-X-Name-First: Edgardo Arturo Ayala Author-X-Name-Last: Gaytán Title: The role of online seller reviews and product price on buyers' willingness-to-pay: a risk perspective Abstract: Third-party interpersonal communications such as online seller reviews play an important role in buyers’ purchase decisions in online markets. Although it is empirically clear that seller reviews (volume and valence) and product price contribute to buyers’ willingness-to-pay (WTP) differently across various studies, it is theoretically less understood why such effects qualitatively differ (e.g., positive vs negative), rendering unclear managerial implications for online marketers. In this paper, we study the role of online seller reviews and product price in buyers’ WTP. We offer a conceptual framework from a risk perspective in which we argue that the different effects of seller reviews and product price on buyers’ WTP may emerge simultaneously in an online market. We highlight two important drivers for such qualitatively different effects: a difference in buyers’ risk attitudes (averse, neutral, or seeking) and a difference in WTP measures (absolute or relative). We test our hypotheses and find good support for them both internally (an experimental study) and externally (an empirical study). Our research enhances the understanding of the relationship between online user reviews and online price dispersions while shedding light on better management of online user reviews for market makers. Journal: European Journal of Information Systems Pages: 416-433 Issue: 4 Volume: 22 Year: 2013 Month: 7 X-DOI: 10.1057/ejis.2012.33 File-URL: http://hdl.handle.net/10.1057/ejis.2012.33 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:4:p:416-433 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934277_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Lars Mathiassen Author-X-Name-First: Lars Author-X-Name-Last: Mathiassen Author-Name: Anna Sandberg Author-X-Name-First: Anna Author-X-Name-Last: Sandberg Title: How a professionally qualified doctoral student bridged the practice-research gap: a confessional account of Collaborative Practice Research Abstract: Information Systems (IS) is a profession-based discipline that constantly seeks new ways to bridge the practice-research gap. These efforts include enacting scholar-practitioner roles across institutional boundaries, developing and disseminating new knowledge, and engaging professionally qualified doctoral students. Against this backdrop, we provide a confessional account of 10 years of Collaborative Practice Research (CPR) between Anna, an IS practitioner, and Lars, an IS researcher. The collaboration was initiated when Anna, while working full-time, engaged as doctoral student with Lars as supervisor. Combining social process modeling with theories of change and learning, we show how Anna and Lars responded to the experienced challenges and opportunities, how Anna's action strategies developed as she grew into becoming a practitioner-researcher, how the collaboration impacted the practice context, and, how the research resulted in traditional publication outcomes. On the basis of these analyses, we discuss how to engage professionally qualified doctoral students within the IS discipline. In addition, we offer lessons on how CPR can help bridge the practice-research gap as a path towards becoming a practitioner-researcher. Journal: European Journal of Information Systems Pages: 475-492 Issue: 4 Volume: 22 Year: 2013 Month: 7 X-DOI: 10.1057/ejis.2012.35 File-URL: http://hdl.handle.net/10.1057/ejis.2012.35 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:4:p:475-492 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934278_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Joshua M Davis Author-X-Name-First: Joshua M Author-X-Name-Last: Davis Title: Leveraging the IT competence of non-IS workers: social exchange and the good corporate citizen Abstract: Organizational IT competence is fundamental to achieving strategic value through technology investments. Importantly, as business users continually gain experience with enterprise systems and a new generation of tech-savvy workers enters the labour force, IT competence is increasingly distributed beyond the IS department. Despite its strategic potential however, IT competence residing within the functional areas of the firm is essentially untapped until it is volunteered by functional area knowledge workers. Addressing the changing landscape of IT competence across the enterprise, the current study examines factors that drive business professionals to volunteer their IT competences to the firm. This research introduces the concept of IT competence volunteering, which is conceptualized as a form of organizational citizenship behaviour that is not explicitly contracted by the firm and may not be directly rewarded. Guided by social exchange theory, a multi-foci model is introduced that positions IT competence as well as workplace exchange relationships as antecedents of IT competence volunteering intention. Overall, the study's results empirically demonstrate the important impacts that user-IS department exchange and perceived organizational support have on the business professional's intention to volunteer his/her IT competence to the firm. Journal: European Journal of Information Systems Pages: 403-415 Issue: 4 Volume: 22 Year: 2013 Month: 7 X-DOI: 10.1057/ejis.2012.36 File-URL: http://hdl.handle.net/10.1057/ejis.2012.36 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:4:p:403-415 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934279_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mark Lycett Author-X-Name-First: Mark Author-X-Name-Last: Lycett Title: ‘Datafication’: making sense of (big) data in a complex world Journal: European Journal of Information Systems Pages: 381-386 Issue: 4 Volume: 22 Year: 2013 Month: 7 X-DOI: 10.1057/ejis.2013.10 File-URL: http://hdl.handle.net/10.1057/ejis.2013.10 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:4:p:381-386 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934378_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mari-Klara Stein Author-X-Name-First: Mari-Klara Author-X-Name-Last: Stein Author-Name: Robert D Galliers Author-X-Name-First: Robert D Author-X-Name-Last: Galliers Author-Name: Edgar A Whitley Author-X-Name-First: Edgar A Author-X-Name-Last: Whitley Title: Twenty years of the European information systems academy at ECIS: emergent trends and research topics Abstract: While the information systems (IS) community is increasingly international, it is reasonable to expect that different regions might display different research approaches, interests and publication orientations. This paper contributes to the growing number of historical accounts in the IS field by further developing the profile of European IS research that was reported on in EJIS following the first 10 years of the European Conference on Information Systems (ECIS). On the basis of an analysis of all papers published in ECIS proceedings during the 10-year period 2003–2012, the paper highlights three key characteristics of the developing European IS research profile: (1) continuation of the traditional European IS research profile as developed in the first decade; (2) convergence with aspects of the North American tradition and (3) development of a distinct approach to design science. We place these observed characteristics within broader historical and contextual features such as the changing European academic landscape, with increasing pressures to ‘publish or perish’ in order to be internationally competitive. Our contribution lies in providing a contemporaneous account of the dominant contextual factors influencing the European IS academy in recent years as well as our interpretation of the developing research profile, thus informing future understanding of European IS research and the choices facing individual IS researchers. Journal: European Journal of Information Systems Pages: 1-15 Issue: 1 Volume: 25 Year: 2016 Month: 1 X-DOI: 10.1057/ejis.2014.25 File-URL: http://hdl.handle.net/10.1057/ejis.2014.25 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:1:p:1-15 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934379_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Maurizio Naldi Author-X-Name-First: Maurizio Author-X-Name-Last: Naldi Author-Name: Loretta Mastroeni Author-X-Name-First: Loretta Author-X-Name-Last: Mastroeni Title: Economic decision criteria for the migration to cloud storage Abstract: Cloud storage has fast become a widespread alternative to in-house costly storage infrastructures. However, the migration to cloud storage is not necessarily everybody’s best choice and should be evaluated in a rigorous quantitative way against the alternative over a long time horizon. We propose a methodological approach for the comparison of cloud vs in-house solutions, based on the use of the Net Present Value and employing stochastic models for storage prices and memory needs. We analyse two decision criteria, which employ the median and the mean value of the Differential Net Present Value (DNPV), respectively. Through three appropriate risk measures, we show that the mean DNPV is the less risky decision criterion. Since the DNPV is a stochastic quantity, we also consider a protection measure against the risk of taking the wrong decision, which relies on underwriting an insurance policy. Through the real options approach, we propose a pricing formula for such policy, showing that it is an affordable means to hedge against risk for smaller companies and over a limited time horizon. Both the decision criteria and the insurance pricing formula are applied in a typical scenario. Journal: European Journal of Information Systems Pages: 16-28 Issue: 1 Volume: 25 Year: 2016 Month: 1 X-DOI: 10.1057/ejis.2014.34 File-URL: http://hdl.handle.net/10.1057/ejis.2014.34 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:1:p:16-28 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934380_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: John Venable Author-X-Name-First: John Author-X-Name-Last: Venable Author-Name: Jan Pries-Heje Author-X-Name-First: Jan Author-X-Name-Last: Pries-Heje Author-Name: Richard Baskerville Author-X-Name-First: Richard Author-X-Name-Last: Baskerville Title: FEDS: a Framework for Evaluation in Design Science Research Abstract: Evaluation of design artefacts and design theories is a key activity in Design Science Research (DSR), as it provides feedback for further development and (if done correctly) assures the rigour of the research. However, the extant DSR literature provides insufficient guidance on evaluation to enable Design Science Researchers to effectively design and incorporate evaluation activities into a DSR project that can achieve DSR goals and objectives. To address this research gap, this research paper develops, explicates, and provides evidence for the utility of a Framework for Evaluation in Design Science (FEDS) together with a process to guide design science researchers in developing a strategy for evaluating the artefacts they develop within a DSR project. A FEDS strategy considers why, when, how, and what to evaluate. FEDS includes a two-dimensional characterisation of DSR evaluation episodes (particular evaluations), with one dimension being the functional purpose of the evaluation (formative or summative) and the other dimension being the paradigm of the evaluation (artificial or naturalistic). The FEDS evaluation design process is comprised of four steps: (1) explicate the goals of the evaluation, (2) choose the evaluation strategy or strategies, (3) determine the properties to evaluate, and (4) design the individual evaluation episode(s). The paper illustrates the framework with two examples and provides evidence of its utility via a naturalistic, summative evaluation through its use on an actual DSR project. Journal: European Journal of Information Systems Pages: 77-89 Issue: 1 Volume: 25 Year: 2016 Month: 1 X-DOI: 10.1057/ejis.2014.36 File-URL: http://hdl.handle.net/10.1057/ejis.2014.36 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:1:p:77-89 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934381_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ela Klecun Author-X-Name-First: Ela Author-X-Name-Last: Klecun Title: Transforming healthcare: policy discourses of IT and patient-centred care Abstract: Information Technology (IT) is increasingly seen in policy and academic literature as key to the modernization of healthcare provision and to making healthcare patient-centred. However, the concept of Patient-Centred Care (PCC) and the role of IT in the transformation of healthcare are not straightforward. Their meanings need unpacking in order to reveal assumptions behind different visions and their implications for IT-enabled healthcare transformation. To this end, this paper reviews literature on PCC and IT and analyses England’s health policy between 1989 and 2013. English policy has set out to transform healthcare from organization-centric to patient-centred and has placed IT as central to this process. This policy vision is based on contested conceptualizations of PCC. IT implementation is problematic and this is at least partly because of the underpinning goals and visions of healthcare policy. If this misalignment is not addressed then producing technologically superior systems, or better IT implementation strategies, is unlikely to result in widespread and substantial changes to the way healthcare is delivered and experienced. For IT to support a healthcare service that is truly patient-centred, patients’ needs and wants need to be identified and designed into IT-enabled services rather than simply added on afterwards. Journal: European Journal of Information Systems Pages: 64-76 Issue: 1 Volume: 25 Year: 2016 Month: 1 X-DOI: 10.1057/ejis.2014.40 File-URL: http://hdl.handle.net/10.1057/ejis.2014.40 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:1:p:64-76 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934382_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Alena Audzeyeva Author-X-Name-First: Alena Author-X-Name-Last: Audzeyeva Author-Name: Robert Hudson Author-X-Name-First: Robert Author-X-Name-Last: Hudson Title: How to get the most from a business intelligence application during the post implementation phase? Deep structure transformation at a U.K. retail bank Abstract: This paper focuses on the process of maximizing the benefits from a business intelligence (BI) application. A general theoretical framework of analysis is formulated based on previous research into organizational deep structure and inertia. Our framework is applied to a case study of a U.K. retail bank which used an existing customer profitability BI application to transform its marketing strategy. We find that an organization’s ability to extract strategic BI benefits is influenced by its deep structure (core beliefs, organizational structures, control systems and distribution of power) and also by its ability to overcome the effects of the multiple inertia sources that the deep structure generates. Organizations should therefore carefully consider the effects of multidimensional organizational inertia and aim to manage inertia sources in respect to information from BI applications when links that embed the BI into an organization as a whole are developed and maintained. We also present generally applicable insights into enhancing the delivery of informative long-term BI decision support for organizations. Journal: European Journal of Information Systems Pages: 29-46 Issue: 1 Volume: 25 Year: 2016 Month: 1 X-DOI: 10.1057/ejis.2014.44 File-URL: http://hdl.handle.net/10.1057/ejis.2014.44 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:1:p:29-46 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934383_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Joeri van Laere Author-X-Name-First: Joeri Author-X-Name-Last: van Laere Author-Name: Lena Aggestam Author-X-Name-First: Lena Author-X-Name-Last: Aggestam Title: Understanding champion behaviour in a health-care information system development project – how multiple champions and champion behaviours build a coherent whole Abstract: Champions are commonly suggested as a means of promoting the adoption of information systems. Since there are many different definitions of the concepts of champion and champion behaviour in the literature, practitioners and researchers may be confused about how to exactly use these concepts. A qualitative analysis of a single case study in a Swedish health-care organisation enabled us to explain how different champion behaviours relate to each other and how multiple champions interact. Combining our rich case observations with an analysis of champion literature reveals how champion behaviours form a coherent and meaningful whole in which networks of different types of champions at different levels in an organisation utilise their network of relations, their knowledge of the organisation and their insight into strategic decision-making politics to time and orchestrate the framing of innovations and the involvement of the right people. In conclusion, championing is a complex performance of contextually dependent collective social interaction, varying over time, rather than a heroic act of one individual promoting an idea. Future studies need to focus more on how the relations between different champions and their behaviours develop across innovations and over time, in order to develop a richer understanding of championing. Journal: European Journal of Information Systems Pages: 47-63 Issue: 1 Volume: 25 Year: 2016 Month: 1 X-DOI: 10.1057/ejis.2015.5 File-URL: http://hdl.handle.net/10.1057/ejis.2015.5 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:1:p:47-63 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934163_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Thompson S H Teo Author-X-Name-First: Thompson S H Author-X-Name-Last: Teo Author-Name: Shirish C Srivastava Author-X-Name-First: Shirish C Author-X-Name-Last: Srivastava Author-Name: Chandrasekaran Ranganathan Author-X-Name-First: Chandrasekaran Author-X-Name-Last: Ranganathan Author-Name: James W K Loo Author-X-Name-First: James W K Author-X-Name-Last: Loo Title: A framework for stakeholder oriented mindfulness: case of RFID implementation at YCH Group, Singapore Abstract: Implementation of innovative technology in organizations is often fraught with challenges. Past literature on mindfulness suggests that mindful implementation of innovative solutions facilitates success and enhances effectiveness for the organization. Integrating insights from the mindfulness and stakeholder perspectives, we present and analyze a longitudinal case study of Radio Frequency Identification (RFID) implementation at YCH Group, a leading logistics provider in the Asia-Pacific region. Our objectives are to examine key attributes of mindfulness as well as identify specific organizational routines that fostered mindfulness at YCH that ultimately paved the way for effective implementation of RFID technology. Important lessons can be learnt from how YCH instituted organizational routines that enabled them to mindfully implement RFID, by explicitly considering both internal and external stakeholders. Journal: European Journal of Information Systems Pages: 201-220 Issue: 2 Volume: 20 Year: 2011 Month: 3 X-DOI: 10.1057/ejis.2010.58 File-URL: http://hdl.handle.net/10.1057/ejis.2010.58 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:2:p:201-220 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934164_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Han Li Author-X-Name-First: Han Author-X-Name-Last: Li Author-Name: Ashish Gupta Author-X-Name-First: Ashish Author-X-Name-Last: Gupta Author-Name: Xin Luo Author-X-Name-First: Xin Author-X-Name-Last: Luo Author-Name: Merrill Warkentin Author-X-Name-First: Merrill Author-X-Name-Last: Warkentin Title: Exploring the impact of instant messaging on subjective task complexity and user satisfaction Abstract: Instant messaging (IM) technologies are being rapidly deployed in the workplace. Current studies largely focus on the adoption of IM and how IM is used. Little research has been conducted to understand the potential impact of using IM in the workplace. This paper theorizes and empirically tests how the frequency of IM interruptions and the position power of message sender could interact with an individual’s polychronic orientation, that is, multitasking preference, and jointly influence employee satisfaction and subjective task complexity. The present study illustrates that polychronic knowledge workers are more satisfied with the multitasking work process deploying IM technology than monochronic ones. In addition, the effect of interruptions is dependent upon an individual’s polychronic orientation. The increase in interruption frequency only reduces the process satisfaction of monochronic individuals but not polychronic individuals. Further, the polychronic orientation of message receivers also influences how they process information. When IM messages are sent from their supervisors, monochronic individuals tend to prioritize tasks and perceive a lower level of overall task complexity. The information processing of polychronic individuals seem to be less influenced by the position power of message sender. Journal: European Journal of Information Systems Pages: 139-155 Issue: 2 Volume: 20 Year: 2011 Month: 3 X-DOI: 10.1057/ejis.2010.59 File-URL: http://hdl.handle.net/10.1057/ejis.2010.59 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:2:p:139-155 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934165_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Robert D Macredie Author-X-Name-First: Robert Author-X-Name-Last: D Macredie Author-Name: Kabiru Mijinyawa Author-X-Name-First: Kabiru Author-X-Name-Last: Mijinyawa Title: A theory-grounded framework of Open Source Software adoption in SMEs Abstract: The increasing popularity and use of Open Source Software (OSS) has led to significant interest from research communities and enterprise practitioners, notably in the small business sector where this type of software offers particular benefits given the financial and human capital constraints faced. However, there has been little focus on developing valid frameworks that enable critical evaluation and common understanding of factors influencing OSS adoption. This paper seeks to address this shortcoming by presenting a theory-grounded framework for exploring these factors and explaining their influence on OSS adoption, with the context of study being small- to medium-sized Information Technology (IT) businesses in the U.K. The framework has implications for this type of business – and, we will suggest, more widely – as a frame of reference for understanding, and as tool for evaluating benefits and challenges in, OSS adoption. It also offers researchers a structured way of investigating adoption issues and a base from which to develop models of OSS adoption. The study reported in this paper used the Decomposed Theory of Planned Behaviour (DTPB) as a basis for the research propositions, with the aim of: (i) developing a framework of empirical factors that influence OSS adoption; and (ii) appraising it through case study evaluation with 10 U.K. Small- to medium-sized enterprises in the IT sector. The demonstration of the capabilities of the framework suggests that it is able to provide a reliable explanation of the complex and subjective factors that influence attitudes, subjective norms and control over the use of OSS. The paper further argues that the DTPB proved useful in this research area and that it can provide a variety of situation-specific insights related to factors that influence the adoption of OSS. Journal: European Journal of Information Systems Pages: 237-250 Issue: 2 Volume: 20 Year: 2011 Month: 3 X-DOI: 10.1057/ejis.2010.60 File-URL: http://hdl.handle.net/10.1057/ejis.2010.60 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:2:p:237-250 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934166_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Luning Liu Author-X-Name-First: Luning Author-X-Name-Last: Liu Author-Name: Yuqiang Feng Author-X-Name-First: Yuqiang Author-X-Name-Last: Feng Author-Name: Qing Hu Author-X-Name-First: Qing Author-X-Name-Last: Hu Author-Name: Xiaojian Huang Author-X-Name-First: Xiaojian Author-X-Name-Last: Huang Title: From transactional user to VIP: how organizational and cognitive factors affect ERP assimilation at individual level Abstract: This study extends the enterprise resource planning (ERP) assimilation research from organizational level to individual level with the argument that it is the individual users who transform ERP systems’ capabilities into organizational performance. We employed a multi-case study method in this exploratory research with the objectives of defining individual level ERP assimilation and identifying key influential factors. Interviews with ERP users at all levels in five organizations revealed four key drivers: influence of supervisors, performance evaluation schemes, intrinsic motivation, and perceived usefulness, as well as two significant moderators: job specifications and individual absorptive capacity. Moreover, evidence suggests a potential relationship between individual level and organizational level ERP assimilations. Our findings highlight the importance of individual level assimilation within a firm in the post-implementation phase and provide managerial insights on how firms could improve ERP assimilation at the individual level that could impact the organizational level assimilation. Journal: European Journal of Information Systems Pages: 186-200 Issue: 2 Volume: 20 Year: 2011 Month: 3 X-DOI: 10.1057/ejis.2010.66 File-URL: http://hdl.handle.net/10.1057/ejis.2010.66 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:2:p:186-200 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934167_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Christian Schmidt Author-X-Name-First: Christian Author-X-Name-Last: Schmidt Author-Name: Peter Buxmann Author-X-Name-First: Peter Author-X-Name-Last: Buxmann Title: Outcomes and success factors of enterprise IT architecture management: empirical insight from the international financial services industry Abstract: Within the last decades, corporate information technology (IT) environments have approached considerable degrees of complexity. As a consequence, IT has become increasingly difficult to manage resulting in high costs and poor flexibility. Today, it is generally acknowledged that the sustainability of corporate IT environments can only be ensured through a continuous and long-term management on the level of the Enterprise (IT) Architecture (EA). To address this, many firms have implemented a dedicated Enterprise (IT) Architecture Management (EAM) function. However, little is known yet on the effectiveness of such functions and the factors influencing EAM success. Within this research, we thus seek to answer two main questions: (1) do firms adopting EAM perform better with regard to high-level information management objectives like IT flexibility and IT efficiency, and if so, (2) what are the critical success factors in attaining these goals? To answer these questions, a field survey was conducted within the international financial services industry. The results provide evidence that the implementation of an EAM function is in fact supportive in the creation and sustainment of IT efficiency and IT flexibility. Several factors are shown to be of critical importance for achieving these goals with architectural governance being the most important one. Journal: European Journal of Information Systems Pages: 168-185 Issue: 2 Volume: 20 Year: 2011 Month: 3 X-DOI: 10.1057/ejis.2010.68 File-URL: http://hdl.handle.net/10.1057/ejis.2010.68 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:2:p:168-185 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934168_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Yang Yang Author-X-Name-First: Yang Author-X-Name-Last: Yang Author-Name: Thomas F Stafford Author-X-Name-First: Thomas F Author-X-Name-Last: Stafford Author-Name: Mark Gillenson Author-X-Name-First: Mark Author-X-Name-Last: Gillenson Title: Satisfaction with employee relationship management systems: the impact of usefulness on systems quality perceptions Abstract: The ability to effectively manage external customer satisfaction through IT-based Customer Relationship Management systems (CRM) is well documented in the literature. The concept of applying such technologies in Business to Employee relationships to manage the firm's relationships with its employees is not. By extending the CRM paradigm to consider the service of internal customers, we characterize the emergent concept of Employee Relationship Management systems (ERM) for investigation. We find that employee satisfaction with ERM systems designed to provide access to benefits and other important employee services is largely a function of systems quality perceptions, as moderated by employee perceptions of system usefulness. Specifically, we believe our results suggest that high-quality systems implementations will not produce high degrees of employee satisfaction with ERM systems unless such systems are also found by the employee to be highly useful for their intended purpose. This highlights the critical role of accurate assessments of user requirements matched to specific needs from human resources-based systems support in the analysis phase of system design. Journal: European Journal of Information Systems Pages: 221-236 Issue: 2 Volume: 20 Year: 2011 Month: 3 X-DOI: 10.1057/ejis.2010.69 File-URL: http://hdl.handle.net/10.1057/ejis.2010.69 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:2:p:221-236 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934169_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Russell Haines Author-X-Name-First: Russell Author-X-Name-Last: Haines Author-Name: Joan Ellen Cheney Mann Author-X-Name-First: Joan Ellen Author-X-Name-Last: Cheney Mann Title: A new perspective on de-individuation via computer-mediated communication Abstract: Research examining de-individuation via computer-mediated communication (CMC) suggests that group pressure is more pronounced in CMC-using groups than in groups meeting face to face, because CMC strips away non-verbal cues and makes individuals feel more similar to the others in their group. Similarly, electronic voting research suggests that group influence is more pronounced via group support systems when the opinions of others are communicated in real time. However, recent research involving complete anonymity suggests that group influence is mitigated via anonymous CMC because of a lack of awareness of others. Thus, we propose that increased group influence is facilitated when others’ opinions are communicated, and is heightened with the common identity created through the use of nominal labels. This paper reports the results of a laboratory experiment involving groups making an organization decision via a text-based chat room. The results show that a simple electronic voting interface element increased the amount of group influence on individual members, and led to decreased participation and higher dispensability. Journal: European Journal of Information Systems Pages: 156-167 Issue: 2 Volume: 20 Year: 2011 Month: 3 X-DOI: 10.1057/ejis.2010.70 File-URL: http://hdl.handle.net/10.1057/ejis.2010.70 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:2:p:156-167 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934170_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Elizabeth J Davidson Author-X-Name-First: Elizabeth J Author-X-Name-Last: Davidson Title: ‘Hey professor, why are you teaching this class?’ Reflections on the relevance of IS research for undergraduate students Journal: European Journal of Information Systems Pages: 133-138 Issue: 2 Volume: 20 Year: 2011 Month: 3 X-DOI: 10.1057/ejis.2011.1 File-URL: http://hdl.handle.net/10.1057/ejis.2011.1 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:2:p:133-138 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934345_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Hüseyin Tanriverdi Author-X-Name-First: Hüseyin Author-X-Name-Last: Tanriverdi Author-Name: Vahap Bülent Uysal Author-X-Name-First: Vahap Author-X-Name-Last: Bülent Uysal Title: When IT capabilities are not scale-free in merger and acquisition integrations: how do capital markets react to IT capability asymmetries between acquirer and target? Abstract: In mergers and acquisitions (M&A), a primary objective of acquirer is to integrate IT resources of the target with its own. IT M&A integration is assumed to create synergies, which in turn increase shareholder wealth by making the value of the merged firm greater than the sum of the standalone values of the two firms. In this study, we challenge this assumption and argue that IT M&A integration does not always lead to greater value creation. Prior research on IT M&A integrations indicates that IT resources are often not scale-free in M&A: that is, they do not transfer easily and costlessly from an acquirer to its target or vice versa. In fact, IT M&A integration can destroy value rather than create it when IT resources are not scale-free. We theorize about the contingencies under which IT M&A integration can create value for shareholders of acquirers. We test our hypotheses in a sample of 549 M&A transactions between 1998 and 2007. We find that, on average, capital markets react negatively with M&A announcements of acquirers whose IT capabilities are superior relative to those of the targets. The superiority of the acquirer’s IT capabilities signals that the acquirer is likely to rip and replace IT resources of the target. This IT M&A integration approach increases risks of disruption to target’s operations and revenue growth. Capital markets take such risks into account and reduce the stock price of the acquirer. One contingency that reduces the negative reactions of capital markets is industry relatedness of target. In a same-industry acquisition, an acquirer and its target have similar operating models, competitive dynamics, and regulatory context. Thus, ripping and replacing weaker IT resources of the target with superior IT resources of the acquirer creates expectations of more efficient operation, engenders positive stock price reactions, and increases shareholder wealth. Another contingency that reduces the negative reactions of capital markets is the acquirer’s track record in profitable growth. A profitably growing acquirer that has superior IT capabilities increases the confidence of capital markets that it can minimize potential disruption risks of IT integration, continue its profitable growth pattern with newly acquired target, engender positive stock price reactions, and create shareholder wealth. These findings indicate that IT M&A integration does not always lead to greater value creation in M&A. The study makes a contribution by identifying the contingencies under which IT M&A integration creates wealth for acquirer’s shareholders. Journal: European Journal of Information Systems Pages: 145-158 Issue: 2 Volume: 24 Year: 2015 Month: 3 X-DOI: 10.1057/ejis.2013.22 File-URL: http://hdl.handle.net/10.1057/ejis.2013.22 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:2:p:145-158 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934346_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Stefan Henningsson Author-X-Name-First: Stefan Author-X-Name-Last: Henningsson Title: Learning to acquire: how serial acquirers build organisational knowledge for information systems integration Abstract: This paper develops a knowledge-based model of information systems (IS) integration in acquisition-based growth programs. Previous research has found important differences in the acquirers’ abilities for acquisition IS integration, and that these differences play key roles in explaining the economic benefits of acquisition-based growth. A knowledge-based view of acquisition IS integration contributes explanation to how differences in abilities arise. Our knowledge-based model is developed by an analytic induction approach, comprising both deductive and inductive analysis of the industry group Trelleborg. The analyses yield five propositions that explain the building of knowledge for acquisition IS integration by the mechanisms of routine refinement, superstitious learning, expertise building, sub-activity refinement and related expertise building. Together, the five propositions form a knowledge-based model of acquisition IS integration. The model suggests that ‘serial acquirers’ form the knowledge necessary for attending to an IS integration challenge over a series of heterogeneous acquisitions. Differences in acquirers’ abilities for acquisition IS integration that depend on knowledge variations are therefore persistent and hard to overcome for the inexperienced acquirer. Journal: European Journal of Information Systems Pages: 121-144 Issue: 2 Volume: 24 Year: 2015 Month: 3 X-DOI: 10.1057/ejis.2014.18 File-URL: http://hdl.handle.net/10.1057/ejis.2014.18 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:2:p:121-144 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934347_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Pratim Datta Author-X-Name-First: Pratim Author-X-Name-Last: Datta Author-Name: Yaman Roumani Author-X-Name-First: Yaman Author-X-Name-Last: Roumani Title: Knowledge-acquisitions and post-acquisition innovation performance: a comparative hazards model Abstract: Do acquisitions lead to instrumental innovations related to the acquired knowledge? Past arguments on vertical integration espouse how a quest for knowledge drives acquisitions culminating in innovation performance. Using Google and Yahoo as cases-in-point, we examine how facets of acquired innovation knowledge impact post-innovation performance. In particular, the apparently opposing fortunes of Google and Yahoo allow us to investigate the pace of their innovation performance as a hazards model. Results from our investigation highlight Google’s ambidexterity over Yahoo with a swifter, systematic pace of innovation performance – from hastening time to patenting new ideas to the time to releasing new applications from acquisitions. Journal: European Journal of Information Systems Pages: 202-226 Issue: 2 Volume: 24 Year: 2015 Month: 3 X-DOI: 10.1057/ejis.2014.32 File-URL: http://hdl.handle.net/10.1057/ejis.2014.32 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:2:p:202-226 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934348_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Javier Busquets Author-X-Name-First: Javier Author-X-Name-Last: Busquets Title: Discovery paths: exploring emergence and IT evolutionary design in cross-border M&As. Analysing grupo Santander’s acquisition of abbey (2004–2009) Abstract: In this paper, we present the notion of discovery paths stemming from our study of the M&A between Grupo Santander (GS) and Abbey (2004–2009), in which the resulting synergies after the merger were 35% better than expected. In fact, GS achieved a unique level of efficiency in 2012 in the banking industry, which we consider a sign of radical novelty. During the M&A, the GS management decided to apply its customer-centric model through the transfer of the information and communication technology (ICT) platform Partenón. This unusual decision led to the endogenisation of critical ICT functions to scale up this model to Abbey. In the paper, we argue that while some steps that lead to synergies can be planned in advance, other essential variations are only learned and discovered during the M&A process itself, thus leading to emergent synergies. In the model presented, a discovery path explains the firm’s evolution by sets of variations in the strategic interaction between the organisation and technology. These variations led to new design principles resulting from problem solving and modularity, which in turn led to (1) economies of scale and scope, (2) hybrid structures combining ICT and organisational knowledge domains that generate efficiency through fast integrations, and (3) organisational morphogenesis – that is, the creation of new organs such as ICT factories – which generates efficiency by avoiding diseconomies of scale by encapsulating the inherent complexity of technology and provides increasing returns. Journal: European Journal of Information Systems Pages: 178-201 Issue: 2 Volume: 24 Year: 2015 Month: 3 X-DOI: 10.1057/ejis.2014.38 File-URL: http://hdl.handle.net/10.1057/ejis.2014.38 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:2:p:178-201 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934349_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Radhika P Jain Author-X-Name-First: Radhika P Author-X-Name-Last: Jain Author-Name: Balasubramaniam Ramesh Author-X-Name-First: Balasubramaniam Author-X-Name-Last: Ramesh Title: The roles of contextual elements in post-merger common platform development: an empirical investigation Abstract: With congeneric mergers, which involve firms with interrelated but not identical business lines that develop diverse products and services, a major challenge for organizations is the development of a common platform that fulfills similar business functions across multiple divisions. Through a field study of a post-merger common platform development initiative, we develop a framework that highlights how environmental and organizational contexts shape the process of common platform development (CPD). Our study provides an account of how the focal organization transitioned to a platform-based approach by achieving a balance between stable and flexible aspects of the common platform through negotiations among the divisions acquired through mergers and acquisitions. These negotiations were enabled through various boundary-spanning activities and the guided successive enrichment of boundary objects used in CPD process. Journal: European Journal of Information Systems Pages: 159-177 Issue: 2 Volume: 24 Year: 2015 Month: 3 X-DOI: 10.1057/ejis.2014.42 File-URL: http://hdl.handle.net/10.1057/ejis.2014.42 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:2:p:159-177 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934350_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jonas Hedman Author-X-Name-First: Jonas Author-X-Name-Last: Hedman Author-Name: Suprateek Sarker Author-X-Name-First: Suprateek Author-X-Name-Last: Sarker Title: Information system integration in mergers and acquisitions: research ahead Journal: European Journal of Information Systems Pages: 117-120 Issue: 2 Volume: 24 Year: 2015 Month: 3 X-DOI: 10.1057/ejis.2015.2 File-URL: http://hdl.handle.net/10.1057/ejis.2015.2 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:2:p:117-120 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934351_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Javier Busquets Author-X-Name-First: Javier Author-X-Name-Last: Busquets Title: Erratum: Discovery paths: exploring emergence and IT evolutionary design in cross-border M&As. Analysing Grupo Santander’s acquisition of Abbey (2004–2009) Journal: European Journal of Information Systems Pages: 227-227 Issue: 2 Volume: 24 Year: 2015 Month: 3 X-DOI: 10.1057/ejis.2015.3 File-URL: http://hdl.handle.net/10.1057/ejis.2015.3 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:2:p:227-227 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934206_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Nicholas Evangelopoulos Author-X-Name-First: Nicholas Author-X-Name-Last: Evangelopoulos Author-Name: Xiaoni Zhang Author-X-Name-First: Xiaoni Author-X-Name-Last: Zhang Author-Name: Victor R Prybutok Author-X-Name-First: Victor R Author-X-Name-Last: Prybutok Title: Latent Semantic Analysis: five methodological recommendations Abstract: The recent influx in generation, storage, and availability of textual data presents researchers with the challenge of developing suitable methods for their analysis. Latent Semantic Analysis (LSA), a member of a family of methodological approaches that offers an opportunity to address this gap by describing the semantic content in textual data as a set of vectors, was pioneered by researchers in psychology, information retrieval, and bibliometrics. LSA involves a matrix operation called singular value decomposition, an extension of principal component analysis. LSA generates latent semantic dimensions that are either interpreted, if the researcher's primary interest lies with the understanding of the thematic structure in the textual data, or used for purposes of clustering, categorization, and predictive modeling, if the interest lies with the conversion of raw text into numerical data, as a precursor to subsequent analysis. This paper reviews five methodological issues that need to be addressed by the researcher who will embark on LSA. We examine the dilemmas, present the choices, and discuss the considerations under which good methodological decisions are made. We illustrate these issues with the help of four small studies, involving the analysis of abstracts for papers published in the European Journal of Information Systems. Journal: European Journal of Information Systems Pages: 70-86 Issue: 1 Volume: 21 Year: 2012 Month: 1 X-DOI: 10.1057/ejis.2010.61 File-URL: http://hdl.handle.net/10.1057/ejis.2010.61 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:1:p:70-86 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934207_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Pierre J Richard Author-X-Name-First: Pierre J Author-X-Name-Last: Richard Author-Name: Tim R Coltman Author-X-Name-First: Tim R Author-X-Name-Last: Coltman Author-Name: Byron W Keating Author-X-Name-First: Byron W Author-X-Name-Last: Keating Title: Designing IS service strategy: an information acceleration approach Abstract: Information technology-based innovation involves considerable risk requiring foresight; yet our understanding of the way in which managers develop the insight to support new breakthrough applications is limited and remains obscured by high levels of technical and market uncertainty. This paper applies discrete choice analysis to support improved empirical explanation of how and why decisions are made in information systems (IS). A new experimental method based on information acceleration (IA) is also applied to improve prediction of future IS service strategies. Both explanation and prediction are important to IS research and these two behaviourally sound methods complement each other. Specifically, the combination of IA and discrete choice analysis removes misspecification artefacts from response variability and generates more accurate parameter estimates that better explain IS decision making. Journal: European Journal of Information Systems Pages: 87-98 Issue: 1 Volume: 21 Year: 2012 Month: 1 X-DOI: 10.1057/ejis.2010.62 File-URL: http://hdl.handle.net/10.1057/ejis.2010.62 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:1:p:87-98 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934208_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Greta L Polites Author-X-Name-First: Greta L Author-X-Name-Last: Polites Author-Name: Nicholas Roberts Author-X-Name-First: Nicholas Author-X-Name-Last: Roberts Author-Name: Jason Thatcher Author-X-Name-First: Jason Author-X-Name-Last: Thatcher Title: Conceptualizing models using multidimensional constructs: a review and guidelines for their use Abstract: While information on multidimensional constructs and empirical methods has become more accessible, there remain substantial challenges to theorizing about their form and implications. There are at least two ostensible reasons for such difficulties. First is the issue of terminology; many different terms are currently used to represent the same structural concept, and there is no evidence of standardization taking place around a single set of terms. Second, many studies do not clearly explain the theoretical reasons for choosing the specific multidimensional form of their constructs. To address these deficiencies, we use concepts from the research methods literature, and illustrations from the information systems (IS) literature, to review definitions and issues related to conceptualizing and operationalizing structural models that include multidimensional constructs. Such advice is necessary if we are going to develop and test increasingly sophisticated theoretical models in IS research. We also offer guidelines about how to conceptualize specific forms of multidimensional constructs. By lending greater conceptual clarity to the literature, we believe that this paper provides a foundation for future research incorporating multidimensional constructs in empirical analysis. Journal: European Journal of Information Systems Pages: 22-48 Issue: 1 Volume: 21 Year: 2012 Month: 1 X-DOI: 10.1057/ejis.2011.10 File-URL: http://hdl.handle.net/10.1057/ejis.2011.10 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:1:p:22-48 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934209_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jörg Henseler Author-X-Name-First: Jörg Author-X-Name-Last: Henseler Author-Name: Georg Fassott Author-X-Name-First: Georg Author-X-Name-Last: Fassott Author-Name: Theo K Dijkstra Author-X-Name-First: Theo K Author-X-Name-Last: Dijkstra Author-Name: Bradley Wilson Author-X-Name-First: Bradley Author-X-Name-Last: Wilson Title: Analysing quadratic effects of formative constructs by means of variance-based structural equation modelling Abstract: Together with the development of information systems research, there has also been increased interest in non-linear relationships between focal constructs. This article presents six Partial Least Squares-based approaches for estimating formative constructs’ quadratic effects. In addition, these approaches’ performance is tested by means of a complex Monte Carlo experiment. The experiment reveals significant and substantial differences between the approaches. In general, the performance of the hybrid approach as suggested by Wold (1982) is most convincing in terms of point estimate accuracy, statistical power, and prediction accuracy. The two-stage approach suggested by Chin et al (1996) showed almost the same performance; differences between it and the hybrid approach – although statistically significant – were unsubstantial. Based on these results, the article provides guidelines for the analysis of non-linear effects by means of variance-based structural equation modelling. Journal: European Journal of Information Systems Pages: 99-112 Issue: 1 Volume: 21 Year: 2012 Month: 1 X-DOI: 10.1057/ejis.2011.36 File-URL: http://hdl.handle.net/10.1057/ejis.2011.36 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:1:p:99-112 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934210_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Marta Indulska Author-X-Name-First: Marta Author-X-Name-Last: Indulska Author-Name: Dirk S Hovorka Author-X-Name-First: Dirk S Author-X-Name-Last: Hovorka Author-Name: Jan Recker Author-X-Name-First: Jan Author-X-Name-Last: Recker Title: Quantitative approaches to content analysis: identifying conceptual drift across publication outlets Abstract: Unstructured text data, such as emails, blogs, contracts, academic publications, organizational documents, transcribed interviews, and even tweets, are important sources of data in Information Systems research. Various forms of qualitative analysis of the content of these data exist and have revealed important insights. Yet, to date, these analyses have been hampered by limitations of human coding of large data sets, and by bias due to human interpretation. In this paper, we compare and combine two quantitative analysis techniques to demonstrate the capabilities of computational analysis for content analysis of unstructured text. Specifically, we seek to demonstrate how two quantitative analytic methods, viz., Latent Semantic Analysis and data mining, can aid researchers in revealing core content topic areas in large (or small) data sets, and in visualizing how these concepts evolve, migrate, converge or diverge over time. We exemplify the complementary application of these techniques through an examination of a 25-year sample of abstracts from selected journals in Information Systems, Management, and Accounting disciplines. Through this work, we explore the capabilities of two computational techniques, and show how these techniques can be used to gather insights from a large corpus of unstructured text. Journal: European Journal of Information Systems Pages: 49-69 Issue: 1 Volume: 21 Year: 2012 Month: 1 X-DOI: 10.1057/ejis.2011.37 File-URL: http://hdl.handle.net/10.1057/ejis.2011.37 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:1:p:49-69 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934211_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Wynne W Chin Author-X-Name-First: Wynne W Author-X-Name-Last: Chin Author-Name: Iris Junglas Author-X-Name-First: Iris Author-X-Name-Last: Junglas Author-Name: José L Roldán Author-X-Name-First: José L Author-X-Name-Last: Roldán Title: Some considerations for articles introducing new and/or novel quantitative methods to IS researchers Journal: European Journal of Information Systems Pages: 1-5 Issue: 1 Volume: 21 Year: 2012 Month: 1 X-DOI: 10.1057/ejis.2011.46 File-URL: http://hdl.handle.net/10.1057/ejis.2011.46 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:1:p:1-5 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934212_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Peter B Seddon Author-X-Name-First: Peter B Author-X-Name-Last: Seddon Author-Name: Rens Scheepers Author-X-Name-First: Rens Author-X-Name-Last: Scheepers Title: Towards the improved treatment of generalization of knowledge claims in IS research: drawing general conclusions from samples Abstract: This paper presents a framework for justifying generalization in information systems (IS) research. First, using evidence from an analysis of two leading IS journals, we show that the treatment of generalization in many empirical papers in leading IS research journals is unsatisfactory. Many quantitative studies need clearer definition of populations and more discussion of the extent to which ‘significant’ statistics and use of non-probability sampling affect support for their knowledge claims. Many qualitative studies need more discussion of boundary conditions for their sample-based general knowledge claims. Second, the proposed new framework is presented. It defines eight alternative logical pathways for justifying generalizations in IS research. Three key concepts underpinning the framework are the need for researcher judgment when making any claim about the likely truth of sample-based knowledge claims in other settings; the importance of sample representativeness and its assessment in terms of the knowledge claim of interest; and the desirability of integrating a study's general knowledge claims with those from prior research. Finally, we show how the framework may be applied by researchers and reviewers. Observing the pathways in the framework has potential to improve both research rigour and practical relevance for IS research. Journal: European Journal of Information Systems Pages: 6-21 Issue: 1 Volume: 21 Year: 2012 Month: 1 X-DOI: 10.1057/ejis.2011.9 File-URL: http://hdl.handle.net/10.1057/ejis.2011.9 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:1:p:6-21 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933941_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: J J Po-An Hsieh Author-X-Name-First: J J Author-X-Name-Last: Po-An Hsieh Author-Name: Wei Wang Author-X-Name-First: Wei Author-X-Name-Last: Wang Title: Explaining employees' Extended Use of complex information systems Abstract: Investments in complex information systems by organizations reached a record high of U.S.$26.7 billion in 2004. Yet, organizations seldom use these systems to the fullest extent and attain the expected return on investment. This paper addresses the issue of system underutilization by investigating Extended Use, which refers to using more system features to support one's tasks. Extended Use was examined in the nomological networks of the IS Continuance (ISC) Model and Technology Acceptance Model (TAM). A field survey was conducted in a large manufacturing firm that had successfully implemented a popular enterprise resource planning solution for more than 2 years. All paths in both ISC and TAM were statistically significant. A synthesized model was later proposed and examined in a post hoc analysis. The results indicate that the synthesized model, as compared to ISC and TAM, explained slightly higher variances in Extended Use, Perceived Usefulness (PU), and Satisfaction. Specifically, both Perceived Ease of Use (PEOU) and PU both affected Extended Use. Interestingly, Satisfaction has no direct impact on Extended Use in the presence of PU and PEOU. In contrast to most technology acceptance research, PEOU has a stronger behavioral impact than that of PU. This research provides a framework that explains Extended Use and is one of the few studies that investigates IS use behavior that exceeds simple, shallow, and routine use. Journal: European Journal of Information Systems Pages: 216-227 Issue: 3 Volume: 16 Year: 2007 Month: 7 X-DOI: 10.1057/palgrave.ejis.3000663 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000663 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:3:p:216-227 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933942_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Peter B Seddon Author-X-Name-First: Peter B Author-X-Name-Last: Seddon Author-Name: Sara Cullen Author-X-Name-First: Sara Author-X-Name-Last: Cullen Author-Name: Leslie P Willcocks Author-X-Name-First: Leslie P Author-X-Name-Last: Willcocks Title: Does Domberger's theory of ‘The Contracting Organization’ explain why organizations outsource IT and the levels of satisfaction achieved? Abstract: This paper contributes an interpretation of Domberger's theory of The Contracting Organization for use in an IT outsourcing context, then presents a preliminary test of the validity of that theory using data from an Australian survey of 235 senior IT managers. Our conclusion is that Domberger's theory appears to be a useful lens for understanding IT outsourcing, and that further research using purpose-collected data is therefore warranted. Phrased differently, Domberger's four types of benefit of contracting – namely Specialization, Market Discipline, Flexibility, and Cost Savings – appear to be a good way of summarizing senior IT managers’ explanations of why their organizations chose to outsource IT. The paper also conducts a preliminary test of the extent to which these four factors explain the purchasing organization's satisfaction with IT outsourcing. Journal: European Journal of Information Systems Pages: 237-253 Issue: 3 Volume: 16 Year: 2007 Month: 7 X-DOI: 10.1057/palgrave.ejis.3000664 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000664 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:3:p:237-253 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933943_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jungjoo Jahng Author-X-Name-First: Jungjoo Author-X-Name-Last: Jahng Author-Name: Hemant Jain Author-X-Name-First: Hemant Author-X-Name-Last: Jain Author-Name: Keshavamurthy Ramamurthy Author-X-Name-First: Keshavamurthy Author-X-Name-Last: Ramamurthy Title: Effects of interaction richness on consumer attitudes and behavioral intentions in e-commerce: some experimental results Abstract: A variety of information and communication media have been employed to support the interaction of consumers with products and sales representatives in electronic-commerce (EC). But, the question of what impact those media have on consumers in EC has not been sufficiently addressed in the literature. The objective of this study is to investigate the effect of the richness of consumers’ interaction with products and with sales representatives on changes in their attitude towards and their intention to use business-to-consumer (B2C) EC. Controlled lab experiments were conducted using two types of products and multiple levels of interaction richness. The results show that interaction richness has positive impact on consumers’ attitude towards B2C EC. Additionally, the study finds that the impact is stronger in the case of purchasing a high-complexity product than a low-complexity product, and that consumers’ attitude change is positively related with their intention to use B2C EC. Differential effects on two facets of attitude, ease of use in accomplishing the tasks and usefulness were observed leading to interesting implications and future research directions. Journal: European Journal of Information Systems Pages: 254-269 Issue: 3 Volume: 16 Year: 2007 Month: 7 X-DOI: 10.1057/palgrave.ejis.3000665 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000665 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:3:p:254-269 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933944_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Patrick Y K Chau Author-X-Name-First: Patrick Y K Author-X-Name-Last: Chau Author-Name: Kevin K Y Kuan Author-X-Name-First: Kevin K Y Author-X-Name-Last: Kuan Author-Name: Ting-Peng Liang Author-X-Name-First: Ting-Peng Author-X-Name-Last: Liang Title: Research on IT value: what we have done in Asia and Europe Journal: European Journal of Information Systems Pages: 196-201 Issue: 3 Volume: 16 Year: 2007 Month: 7 X-DOI: 10.1057/palgrave.ejis.3000666 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000666 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:3:p:196-201 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933945_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Claudia Loebbecke Author-X-Name-First: Claudia Author-X-Name-Last: Loebbecke Title: Use of innovative content integration information technology at the point of sale Abstract: Previous research on the use of information technology (IT) in retail environments has mainly focused on inter-organizational or even intra-organizational contexts, such as the implementation of EDI. There has been far less research on the use of IT by customers, including technology at the point of sale (POS). The provision of customer-oriented IT at the POS implies integrating content in different formats and from different supply chain members in various devices. Therefore, research on such phenomena holds the potential to extend the literature on IT use, blending in perspectives that derive from content integration. This paper uses a case research method to describe the first real-world application of content integration at the POS. Literature on IT use and content integration guide the subsequent analysis. The paper offers some conclusions concerning content integration, customer use, and satisfaction. Journal: European Journal of Information Systems Pages: 228-236 Issue: 3 Volume: 16 Year: 2007 Month: 7 X-DOI: 10.1057/palgrave.ejis.3000670 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000670 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:3:p:228-236 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933946_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mohammed Quaddus Author-X-Name-First: Mohammed Author-X-Name-Last: Quaddus Author-Name: Glenn Hofmeyer Author-X-Name-First: Glenn Author-X-Name-Last: Hofmeyer Title: An investigation into the factors influencing the adoption of B2B trading exchanges in small businesses Abstract: Small businesses, in general, play dominant roles in terms of employment generation and share in total business activities. However, studies have shown that small businesses are also slow in their uptake of modern technologies including electronic commerce. This paper presents the result of an empirical study that investigates the adoption behaviour of small businesses in relation to business-to-business (B2B) trading exchanges in the context of Western Australia. Following extensive literature review on innovation adoption–diffusion theories and qualitative field study, a research model was developed which treated six sets of antecedents of small business's attitude towards B2B trading exchanges. The findings revealed that external influences raise the small business's awareness of an innovation. This awareness leads to the evaluation of the perceived direct and indirect benefits and a positive evaluation leads to a positive attitude towards the innovation. The results confirmed that a positive attitude towards B2B trading exchanges leads to the intention to adopt B2B trading exchanges in small businesses. The findings also confirm that external, belief, contextual and control factors drive the attitude towards B2B trading exchanges. Implications of the results are highlighted. Journal: European Journal of Information Systems Pages: 202-215 Issue: 3 Volume: 16 Year: 2007 Month: 7 X-DOI: 10.1057/palgrave.ejis.3000671 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000671 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:3:p:202-215 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933947_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Cengiz Kahraman Author-X-Name-First: Cengiz Author-X-Name-Last: Kahraman Author-Name: Nihan Çetin Demirel Author-X-Name-First: Nihan Çetin Author-X-Name-Last: Demirel Author-Name: Tufan Demirel Author-X-Name-First: Tufan Author-X-Name-Last: Demirel Title: Prioritization of e-Government strategies using a SWOT-AHP analysis: the case of Turkey Abstract: The e-Government agenda is being pursued throughout the world to one degree or another, but it has added significance in Central Europe. The region is just beginning to emerge from a period of far-reaching political and economic transformation following the collapse of repressive communist systems. For these countries, e-Government is more than simply a new channel of delivering services; it offers an opportunity to achieve a quantum leap in transparency and efficiency of administration, which the region's leaders have promised their citizens since the early 1990s. Turkey is currently working hard to catch this opportunity. Turkish Government has initiated the Urgent Action Plan in December 2002 to remedy long-lasting economic problems and to improve social and well-being of the country. One of the basic components of this plan is ‘e-Transformation Turkey Project’ which aims to carry Turkey into Information society. One of the two purposes of this study is to define and to prioritize the strengths, weaknesses, opportunities, and threats (SWOT) groups and their subfactors for e-Government in Turkey. The other purpose is to determine and to evaluate the alternative strategies for e-Government applications at the national level in Turkey. We use the SWOT approach in combination with analytic hierarchy process (AHP) to achieve this task. The strategies have been prioritized and sensitivity analyses of the obtained results have been made using a software. Journal: European Journal of Information Systems Pages: 284-298 Issue: 3 Volume: 16 Year: 2007 Month: 7 X-DOI: 10.1057/palgrave.ejis.3000679 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000679 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:3:p:284-298 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933948_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Craig Van Slyke Author-X-Name-First: Craig Author-X-Name-Last: Van Slyke Author-Name: Virginia Ilie Author-X-Name-First: Virginia Author-X-Name-Last: Ilie Author-Name: Hao Lou Author-X-Name-First: Hao Author-X-Name-Last: Lou Author-Name: Thomas Stafford Author-X-Name-First: Thomas Author-X-Name-Last: Stafford Title: Perceived critical mass and the adoption of a communication technology Abstract: Computer-based communication technologies are increasingly important to personal and organizational communication. One important factor related to the adoption and diffusion of communication innovations is critical mass. Critical mass influences the adoption and diffusion of interactive communication innovations, both through network externalities and through sustainability of the innovation. Unfortunately, critical mass is difficult to measure and is typically only demonstrable after the critical mass point has been reached. Potential adopters’ perceptions of critical mass also may be important to adoption decisions. In this paper, we extend this thinking using a synthesis of the Theory of Reasoned Action and Diffusion of Innovation theory by developing a research model. The model is empirically tested using survey data that are analyzed using partial least squares. The focal innovation is instant messaging. Results indicate that perceived critical mass influences use intentions directly and through perceptions of the characteristics of the innovation. The perceived innovation characteristics impact attitude toward use, which in turn impacts use intentions. The model predicts a sizable and significant portion of both attitudes and use intentions. Further, perceived critical mass is able to explain a significant portion of the variance in each perceived innovation characteristic. Implications for research and practice are discussed. Journal: European Journal of Information Systems Pages: 270-283 Issue: 3 Volume: 16 Year: 2007 Month: 7 X-DOI: 10.1057/palgrave.ejis.3000680 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000680 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:3:p:270-283 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933949_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ray J Paul Author-X-Name-First: Ray J Author-X-Name-Last: Paul Title: Challenges to information systems: time to change Journal: European Journal of Information Systems Pages: 193-195 Issue: 3 Volume: 16 Year: 2007 Month: 7 X-DOI: 10.1057/palgrave.ejis.3000681 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000681 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:3:p:193-195 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934145_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Starling David Hunter III Author-X-Name-First: Starling David Author-X-Name-Last: Hunter III Title: Same technology, different outcome? Reinterpreting Barley's Technology as an Occasion for Structuring Abstract: In the last few decades, several studies have found the same technology implemented in highly similar organizational settings to be associated with very different consequences for structure and process. The seminal study in this stream of research is Barley's (1986) Technology as an Occasion for Structuring, which reported that two similarly composed radiology departments implemented the same technology (computerized tomography scanners), yet experienced very different structural outcomes. In this paper I re-analyze the original study's data under three different statistical assumptions. First, I performed an arcsine transformation on the dependent variable where the original study used the raw probabilities. Second, I specified a power regression model in which the original study employed a linear regression. Finally, I user fewer dummy variables in the ‘combined’ regression models to determine the distinct phases through which the two hospitals evolved. Taken together, these assumptions produce very different results from the original study. Specifically they indicate that the radiology departments did not decentralize at different rates and did not do so over a different number of distinct phases. From my analysis come three specific recommendations for research investigating the consequences of information technology in similarly constituted organizations: (1) exchange the default assumption of homogeneity of outcomes with one of heterogeneity; (2) explicitly account for both the observable properties of technology and the context of its use; and (3) state clearly and a priori the standard used to classify structural and organizational outcomes as ‘different’. Journal: European Journal of Information Systems Pages: 689-703 Issue: 6 Volume: 19 Year: 2010 Month: 12 X-DOI: 10.1057/ejis.2010.33 File-URL: http://hdl.handle.net/10.1057/ejis.2010.33 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:6:p:689-703 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934146_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Tim Klaus Author-X-Name-First: Tim Author-X-Name-Last: Klaus Author-Name: J Ellis Blanton Author-X-Name-First: J Ellis Author-X-Name-Last: Blanton Title: User resistance determinants and the psychological contract in enterprise system implementations Abstract: User resistance is an important issue in the implementation of enterprise systems (ES). However, despite a large body of user acceptance literature, there is far less literature addressing user resistance. This study seeks to better understand the development of user resistance. Information is obtained and triangulated in this study from a focus group and semi-structured user interviews from three organizations. Through the lens of the psychological contract employees have with their organization, user resistance is investigated. Twelve determinants were found that upset the psychological contract and affect the level of user resistance. These determinants have been classified into four key categories which expand on previous literature: individual, system, organizational, and process issues. The relationships among these concepts and both the theoretical and practical contributions of this study are discussed. Journal: European Journal of Information Systems Pages: 625-636 Issue: 6 Volume: 19 Year: 2010 Month: 12 X-DOI: 10.1057/ejis.2010.39 File-URL: http://hdl.handle.net/10.1057/ejis.2010.39 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:6:p:625-636 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934147_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Marios Koufaris Author-X-Name-First: Marios Author-X-Name-Last: Koufaris Title: Commentary on Hunter's ‘Same technology, different outcome?’ Journal: European Journal of Information Systems Pages: 704-706 Issue: 6 Volume: 19 Year: 2010 Month: 12 X-DOI: 10.1057/ejis.2010.41 File-URL: http://hdl.handle.net/10.1057/ejis.2010.41 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:6:p:704-706 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934148_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Carlos Flavián Blanco Author-X-Name-First: Carlos Flavián Author-X-Name-Last: Blanco Author-Name: Raquel Gurrea Sarasa Author-X-Name-First: Raquel Gurrea Author-X-Name-Last: Sarasa Author-Name: Carlos Orús Sanclemente Author-X-Name-First: Carlos Orús Author-X-Name-Last: Sanclemente Title: Effects of visual and textual information in online product presentations: looking for the best combination in website design Abstract: Online product presentation constitutes a key challenge for marketers and designers who want to satisfy consumers’ needs. Visual and textual product information affect recognition and knowledge about the product. This research examines whether the presence (vs absence) of a product image and textual information in a schematic mode (vs paragraph mode) affect users’ recall and perceptions of the quality of the electronic products’ information. The moderating role of user's familiarity with the website and product also may play a role; the evolution of these variables likely will determine trends in e-commerce research. The results show that a schematic display of textual information improves perceptions of information quality. When a picture of the product appears together with textual information, users remember more information and consider it easier to remember if that information appears schematically. However, without a product picture, users allocate more resources to process paragraph information and therefore recall more information and perceive it as easier to recall. The degrees of familiarity also have important directional effects on these relationships. Journal: European Journal of Information Systems Pages: 668-686 Issue: 6 Volume: 19 Year: 2010 Month: 12 X-DOI: 10.1057/ejis.2010.42 File-URL: http://hdl.handle.net/10.1057/ejis.2010.42 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:6:p:668-686 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934149_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Juan Rodón Author-X-Name-First: Juan Author-X-Name-Last: Rodón Author-Name: Feliciano Sesé Author-X-Name-First: Feliciano Author-X-Name-Last: Sesé Title: Analysing IOIS adoption through structural contradictions Abstract: Despite extensive research and practitioner literature on inter-organizational information systems (IOIS), our understanding of non-adoption still has some under-explored issues. This paper offers an explanation of non-adoption that focuses on the potential structural changes that IOIS adoption entails; in particular, we contend that the contradictions between the initial social structure and the structure enacted in the use of an IOIS can be a cause of non-adoption. This paper analyses adoption from a logic of opposition where non-adoption occurs because forces of transformation are offset by forces of persistence. Relying on the concepts of social structure, duality of structure, and structural contradiction from Structuration theory, we develop a framework that categorizes the underlying social structure where an IOIS is to be adopted, and formulate some theoretical propositions. From a practitioner perspective, this paper contends that the fact that IOIS management uncovers the contradictions in the social structure that result from IOIS adoption can help avoid dead ends. Accordingly, this framework, which can be used as a coarse-grained picture for anticipating adoption problems, can inform managers when devising an IOIS implementation strategy. Journal: European Journal of Information Systems Pages: 637-648 Issue: 6 Volume: 19 Year: 2010 Month: 12 X-DOI: 10.1057/ejis.2010.44 File-URL: http://hdl.handle.net/10.1057/ejis.2010.44 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:6:p:637-648 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934150_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Regina Connolly Author-X-Name-First: Regina Author-X-Name-Last: Connolly Author-Name: Frank Bannister Author-X-Name-First: Frank Author-X-Name-Last: Bannister Author-Name: Aideen Kearney Author-X-Name-First: Aideen Author-X-Name-Last: Kearney Title: Government website service quality: a study of the Irish revenue online service Abstract: Online taxation systems have been among the most successful of e-government applications both in terms of citizen take-up and savings to the taxpayer. Understanding the factors that lead to high take-up is of potential interest to other public sector online service providers. This paper examines the quality of the online service provided by the Irish Revenue Commissioners’ tax filing and collection system, Revenue Online Service (ROS). A modified version of the recently operationalized E-S-QUAL instrument is used to examine online service quality from the point of view of the citizens and tax practitioners who use this eGovernment system. The findings show that efficiency and ease of completion are the dimensions of website service quality that most influence ROS users’ perceptions of value and convenience as well as their intentions to use and recommend the website to their peers. The practical implications of these findings include the fact that providers of public sector e-services should concentrate on communicating the functionality of their e-services. In addition, they should focus on reducing citizen concerns regarding misuse or mismanagement of personal data. Journal: European Journal of Information Systems Pages: 649-667 Issue: 6 Volume: 19 Year: 2010 Month: 12 X-DOI: 10.1057/ejis.2010.45 File-URL: http://hdl.handle.net/10.1057/ejis.2010.45 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:6:p:649-667 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934151_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Joe Nandhakumar Author-X-Name-First: Joe Author-X-Name-Last: Nandhakumar Title: Contrarian information systems studies Journal: European Journal of Information Systems Pages: 687-688 Issue: 6 Volume: 19 Year: 2010 Month: 12 X-DOI: 10.1057/ejis.2010.49 File-URL: http://hdl.handle.net/10.1057/ejis.2010.49 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:6:p:687-688 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934152_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Gerald Grant Author-X-Name-First: Gerald Author-X-Name-Last: Grant Title: Reconceptualizing the concept of business and IT alignment: from engineering to agriculture Journal: European Journal of Information Systems Pages: 619-624 Issue: 6 Volume: 19 Year: 2010 Month: 12 X-DOI: 10.1057/ejis.2010.50 File-URL: http://hdl.handle.net/10.1057/ejis.2010.50 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:6:p:619-624 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934083_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Boriana Rukanova Author-X-Name-First: Boriana Author-X-Name-Last: Rukanova Author-Name: Eveline van Stijn Author-X-Name-First: Eveline Author-X-Name-Last: van Stijn Author-Name: Helle Z Henriksen Author-X-Name-First: Helle Z Author-X-Name-Last: Henriksen Author-Name: Ziv Baida Author-X-Name-First: Ziv Author-X-Name-Last: Baida Author-Name: Yao-Hua Tan Author-X-Name-First: Yao-Hua Author-X-Name-Last: Tan Title: Understanding the influence of multiple levels of governments on the development of inter-organizational systems Abstract: In the arena of international trade, multiple levels of governments (ranging from national to supranational) play an important role in regulating and controlling cross-border trade activities. Recently, they have also become powerful players in influencing decisions about inter-organizational systems (IOS). The influences of these multiple levels of governments on IOS are of an enormous scale and impact on businesses and national economies. Understanding them is a prerequisite for informed actions. From a theoretical point of view we contribute with the MLxMC framework, a conceptual framework, which combines a processual, multi-level approach with the motors of change. We use the MLxMC framework to explicitly highlight the influences of multiple levels of governments on IOS developments that take place in the highly regulated environment of international trade. We demonstrate how the framework can be applied to analyze such developments, extending the existing IOS research with models that explicitly acknowledge the role of government. The framework makes use of multi-level analysis by taking the political and institutional aspects into account. As an analytical tool, the framework can support business practitioners as well as policy-makers in their strategic choices of which level to engage at and with whom to collaborate in order to influence the debate. Journal: European Journal of Information Systems Pages: 387-408 Issue: 5 Volume: 18 Year: 2009 Month: 10 X-DOI: 10.1057/ejis.2009.28 File-URL: http://hdl.handle.net/10.1057/ejis.2009.28 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:5:p:387-408 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934084_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Rajendra Singh Author-X-Name-First: Rajendra Author-X-Name-Last: Singh Author-Name: Mark Keil Author-X-Name-First: Mark Author-X-Name-Last: Keil Author-Name: Vijay Kasi Author-X-Name-First: Vijay Author-X-Name-Last: Kasi Title: Identifying and overcoming the challenges of implementing a project management office Abstract: With the ongoing challenge of successfully managing information technology (IT) projects, organizations are recognizing the need for greater project management discipline. For many organizations, this has meant ratcheting up project management skills, processes, and governance structures by implementing a project management office (PMO). While anecdotal evidence suggests that implementing a PMO can be quite difficult, few studies discuss the specific challenges involved, and how organizations can overcome them. To address this gap in existing knowledge, we conducted a Delphi study to (1) identify the challenges of implementing a PMO for managing IT projects, (2) rank these challenges in order of importance, (3) discover ways in which some organizations have overcome the top-ranked challenges, and (4) understand the role of PMO structure, metrics, and tools in the implementation of a PMO.We identified 34 unique challenges to implementing a PMO and refined this list to 13 challenges that our Delphi panelists considered most important. The top-three challenges were (1) rigid corporate culture and failure to manage organizational resistance to change, (2) lack of experienced project managers (PMs) and PMO leadership, and (3) lack of appropriate change management strategy. Through follow-up interviews with selected panelists, we identified a series of actions that can be taken to overcome these challenges including having a strong PMO champion, starting small and demonstrating the value of the PMO, obtaining support from opinion leaders, hiring an experienced program manager who understands the organization, bringing the most talented PMs into the PMO implementation team, adopting a flexible change management strategy, and standardizing processes prior to PMO implementation. The interviews were also used to better understand the role of PMO structure, metrics, and tools. In terms of PMO structure, we found that ‘light’ PMOs were more likely to be implemented successfully. Most organizations eschew formal metrics, instead relying on subjective indicators of PMO success. Lastly, it appears that PMO tools are difficult to implement unless a project management culture has been established. Journal: European Journal of Information Systems Pages: 409-427 Issue: 5 Volume: 18 Year: 2009 Month: 10 X-DOI: 10.1057/ejis.2009.29 File-URL: http://hdl.handle.net/10.1057/ejis.2009.29 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:5:p:409-427 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934085_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Nathan Heinze Author-X-Name-First: Nathan Author-X-Name-Last: Heinze Author-Name: Qing Hu Author-X-Name-First: Qing Author-X-Name-Last: Hu Title: Why college undergraduates choose IT: a multi-theoretical perspective Abstract: In this paper, we study factors that may influence college undergraduates’ decisions to pursue a major in information technology (IT). We develop and test a theoretical model based on social cognitive career theory and the theory of planned behavior. Data were collected through a multi-section survey given to college undergraduates at four large universities in the southeastern United States. We found that college undergraduates with positive attitudes towards IT careers and high perceived behavioral control (PBC) regarding IT majors had a greater intention of pursuing IT majors. The study also found positive links between self-evaluating outcome expectations (SEOE) and attitudes towards an IT career. In addition, males were more likely to choose IT than females, as they scored higher on computer self-efficacy, SEOE, attitudes towards IT careers, and PBC. Future research may wish to explore this disparity and may also explore factors influencing outcome expectations and attitudes. Practical recommendations include educational and media outreach efforts aimed at emphasizing the vitality of the IT job market and the interpersonal aspects of IT. Journal: European Journal of Information Systems Pages: 462-475 Issue: 5 Volume: 18 Year: 2009 Month: 10 X-DOI: 10.1057/ejis.2009.30 File-URL: http://hdl.handle.net/10.1057/ejis.2009.30 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:5:p:462-475 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934086_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Eileen M Trauth Author-X-Name-First: Eileen M Author-X-Name-Last: Trauth Author-Name: Jeria L Quesenberry Author-X-Name-First: Jeria L Author-X-Name-Last: Quesenberry Author-Name: Haiyan Huang Author-X-Name-First: Haiyan Author-X-Name-Last: Huang Title: Retaining women in the U.S. IT workforce: theorizing the influence of organizational factors Abstract: The challenge of meeting the demand for information technology (IT) workers is addressed by examining three important organizational factors that affect women's retention in the IT field. Much of the research on gender and IT assumes a unilateral effect: all organizational factors affect all women in the same ways. An alternative view that is explored in this research is that within-gender differences offer rich insights into the gender imbalance in the IT profession. The individual differences theory of gender and IT enabled us to examine variation in organizational influences on women through analysis of transcripts from in-depth interviews conducted with 92 women in the IT workforce in the U.S.A. The results show that three organizational factors – work–life balance, organizational climate, and mentoring – affected the women's career development in a range of ways. Our findings shed new light on what has been interpreted by other researchers as contradictory findings because our theoretical starting point is the assumption that women are not all the same, that within-gender variation is expected and that it provides an opportunity to develop a deeper understanding of gender relations in the IT field. Using this theory we were able to identify opportunities for the development of interventions by linking the themes embedded in the three workplace factors to the constructs of the theory. The individual identity construct revealed the ways in which a woman's demographic and professional characteristics affect her career choices. The individual influences construct focused attention on the ways in which differences in personality, abilities, and influential people shape one's career. Finally, the environmental influences construct characterized contextual influences on women's participation in the IT profession. Our findings show that both research and interventions directed at increasing the retention of women must be flexible enough to respond to the variation that exists among women and within IT workplaces. Journal: European Journal of Information Systems Pages: 476-497 Issue: 5 Volume: 18 Year: 2009 Month: 10 X-DOI: 10.1057/ejis.2009.31 File-URL: http://hdl.handle.net/10.1057/ejis.2009.31 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:5:p:476-497 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934087_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Pernille Bjørn Author-X-Name-First: Pernille Author-X-Name-Last: Bjørn Author-Name: Sue Burgoyne Author-X-Name-First: Sue Author-X-Name-Last: Burgoyne Author-Name: Vicky Crompton Author-X-Name-First: Vicky Author-X-Name-Last: Crompton Author-Name: Teri MacDonald Author-X-Name-First: Teri Author-X-Name-Last: MacDonald Author-Name: Barbe Pickering Author-X-Name-First: Barbe Author-X-Name-Last: Pickering Author-Name: Sue Munro Author-X-Name-First: Sue Author-X-Name-Last: Munro Title: Boundary factors and contextual contingencies: configuring electronic templates for healthcare professionals Abstract: In this paper, we propose an approach to balance the legitimate and yet conflicting perspectives between standardization and reconfiguration embedded within hospital information systems (HIS) design activities. We report on an action research study of the customization process of an electronic triage and tracking system that was reconfigured to be used in eight Canadian emergency departments. We argue that during HIS design activities, it is essential for both practitioners and system designers to articulate and identify which aspects can be standardized without constraining important local flexibility and which aspects require local reconfiguration to function in a particular work context. To identify these differences, we suggest an analytical distinction between boundary factors and contextual contingencies, which can be used in a design and reconfiguration process. We argue that the process of designing shared electronic templates should be perceived as a common design process, where multiple stakeholders articulate, identify, and negotiate boundary factors and contextual contingencies. Boundary factors are then represented within the shared electronic system, whereas contextual contingencies form the basis for constructing localized versions of the shared application. All local versions include both boundary factors and the reconfigured contextual contingencies. Journal: European Journal of Information Systems Pages: 428-441 Issue: 5 Volume: 18 Year: 2009 Month: 10 X-DOI: 10.1057/ejis.2009.34 File-URL: http://hdl.handle.net/10.1057/ejis.2009.34 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:5:p:428-441 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934088_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Hans van der Heijden Author-X-Name-First: Hans Author-X-Name-Last: van der Heijden Title: Progress in information systems research Journal: European Journal of Information Systems Pages: 385-386 Issue: 5 Volume: 18 Year: 2009 Month: 10 X-DOI: 10.1057/ejis.2009.35 File-URL: http://hdl.handle.net/10.1057/ejis.2009.35 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:5:p:385-386 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934089_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Cynthia K Riemenschneider Author-X-Name-First: Cynthia K Author-X-Name-Last: Riemenschneider Author-Name: Deborah J Armstrong Author-X-Name-First: Deborah J Author-X-Name-Last: Armstrong Author-Name: Jo Ellen Moore Author-X-Name-First: Jo Ellen Author-X-Name-Last: Moore Title: Meeting the demand for IT workers: A call for research Journal: European Journal of Information Systems Pages: 458-461 Issue: 5 Volume: 18 Year: 2009 Month: 10 X-DOI: 10.1057/ejis.2009.36 File-URL: http://hdl.handle.net/10.1057/ejis.2009.36 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:5:p:458-461 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934090_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Gaëtan Mourmant Author-X-Name-First: Gaëtan Author-X-Name-Last: Mourmant Author-Name: Michael J Gallivan (Mike) Author-X-Name-First: Michael J Author-X-Name-Last: Gallivan (Mike) Author-Name: Michel Kalika Author-X-Name-First: Michel Author-X-Name-Last: Kalika Title: Another road to IT turnover: the entrepreneurial path Abstract: This paper addresses an untapped, though important, type of information technology (IT) personnel turnover: IT entrepreneurship. We develop a comprehensive model to understand the factors and processes that influence turnover behaviour for prospective (nascent) IT entrepreneurs. To do this, we review three streams of research: first, the unfolding model of voluntary turnover that specifies six stages in a process model of employee turnover; second, the entrepreneurship literature (focusing on differences between nascent entrepreneurs and non-entrepreneurs), and third, attributes of the IT personnel and IT industry. We use Image Theory as the ‘glue’ to merge these streams of research together. We do so by proposing two new constructs – readiness to quit (to start a business) (RTQ) and necessary configuration to quit (NCQ), which we incorporate into a conceptual framework describing how specific dimensions of RTQ change over time, either gradually or suddenly, in response to specific events. Based on Image Theory, we describe the process by which nascent entrepreneurs conduct a compatibility test to assess the fit between their current RTQ and the set of NCQs. If there is a fit, then the nascent entrepreneur is ready to quit his or her current job. We illustrate our model using a sample vignette involving a former IT employee who became an entrepreneur, and we provide suggestions for researchers and practitioners, based on our model and the constructs that we introduce. Although we develop our model in the context of IT turnover and entrepreneurship, RTQ and NCQ, as well as the conceptual framework, can also be applied to other types of voluntary IT turnover (e.g., accepting a position in another company). Journal: European Journal of Information Systems Pages: 498-521 Issue: 5 Volume: 18 Year: 2009 Month: 10 X-DOI: 10.1057/ejis.2009.37 File-URL: http://hdl.handle.net/10.1057/ejis.2009.37 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:5:p:498-521 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934091_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Chaojie Duan Author-X-Name-First: Chaojie Author-X-Name-Last: Duan Author-Name: Varun Grover Author-X-Name-First: Varun Author-X-Name-Last: Grover Author-Name: Nagraj (Raju) Balakrishnan Author-X-Name-First: Nagraj (Raju) Author-X-Name-Last: Balakrishnan Title: Business Process Outsourcing: an event study on the nature of processes and firm valuation Abstract: Business Process Outsourcing (BPO) is a phenomenon that is rapidly increasing in both incidence and importance. This study empirically examines the value proposition of BPO with respect to the nature of the processes being outsourced. Using the event study methodology, we employ the value chain (VC) position and existing ownership of a business process as our primary independent variables, and the stock abnormal return in response to the BPO announcement as the dependent performance variable in our research model. The study was conducted on 298 BPO announcements from 1998 to 2005. Results support the argument that outsourcing is valuable for both primary and supportive business processes. However, we found that BPO announcements on primary processes yield higher abnormal returns than supportive processes. Although existing process ownership was not found to be a powerful differentiator for BPO performance, its interaction with VC position provides important insights into the timing of outsourcing. The evidence suggests that internal cultivation of processes is important for BPO success, particularly when BPO is applied to primary processes. Journal: European Journal of Information Systems Pages: 442-457 Issue: 5 Volume: 18 Year: 2009 Month: 10 X-DOI: 10.1057/ejis.2009.38 File-URL: http://hdl.handle.net/10.1057/ejis.2009.38 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:5:p:442-457 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933733_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Sangjae Lee Author-X-Name-First: Sangjae Author-X-Name-Last: Lee Title: Business use of Internet-based information systems: the case of Korea Abstract: The potential of the Internet to reach a large and growing body of customers, coupled with low communication costs, makes it a very attractive business medium to many organizations. Although there is significant interest in the use of the Internet for business purposes, studies articulating issues that can guide business managers in its use are lacking. The purpose of this study is to examine the issue of business activity on the Internet and report the results of a survey on the ways in which businesses are making use of Internet-based information systems (IIS). In addition, the study investigates the relations between the implementation and performance of an IIS to examine its potential to provide benefits to IIS adopters. A total of 120 usable responses were obtained. This paper identifies pertinent issues and problems that are critical in developing an IIS. The results also show that volume sophistication and information contents in an IIS partially affect the extent of cost savings, financial performance, and service improvement. Journal: European Journal of Information Systems Pages: 168-181 Issue: 3 Volume: 12 Year: 2003 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000460 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000460 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:3:p:168-181 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933734_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Albert Boonstra Author-X-Name-First: Albert Author-X-Name-Last: Boonstra Title: Structure and analysis of IS decision-making processes Abstract: Decisions to invest in information systems (IS) are made by many organisations on a very regular basis. Such decisions can vary from quickly identifying the problem, screening options and choosing a solution in a very straightforward way, to very extensive and repeated search, screen, design and negotiation activities that can take many years. There has been little explicit research into the process by which managers and organisations decide to develop IS applications. This research addresses this by analysing 20 IS decision-making processes, using a phase-based as well as an attribute-based approach. Mintzberg's typology is used to characterise seven types of IS decisions from a phase-based or process-based perspective. For the attribute approach, the decisions have been analysed on the basis of subjective/objective and offensive/defensive contrasts and placed in one of the four following categories: innovative, rational, necessary or political. The paper concludes by identifying five factors that result in major differences in IS decision-making processes. These issues are: (1) whether there is scope to design a solution; (2) whether distinct alternatives have to be searched for; (3) the degree of urgency and necessity from the perspective of the decision-makers; (4) whether the decision can be subdivided in order to follow a gradual process path (planned vs incremental) and (5) the number and power of stakeholders involved in the process and the extent that their interests vary and contrast. The paper suggests that managers deciding on IS applications should be aware of these factors in order to design a process that fits best with the specific circumstances: no single process should be considered universally applicable. This conclusion is in contrast with many decision-making models rooted in the MIS-field, which suggest to use prescriptive and rational approaches to organise IS decision-making processes. Journal: European Journal of Information Systems Pages: 195-209 Issue: 3 Volume: 12 Year: 2003 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000461 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000461 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:3:p:195-209 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933735_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Anja Mursu Author-X-Name-First: Anja Author-X-Name-Last: Mursu Author-Name: Kalle Lyytinen Author-X-Name-First: Kalle Author-X-Name-Last: Lyytinen Author-Name: H A Soriyan Author-X-Name-First: H A Author-X-Name-Last: Soriyan Author-Name: Mikko Korpela Author-X-Name-First: Mikko Author-X-Name-Last: Korpela Title: Identifying software project risks in Nigeria: an International Comparative Study Abstract: We report a study where software project risk factors were solicited in Nigeria. The study repeats a research design, which has been used in a Delphi study in the U.S., Finland, and Hong Kong to rank software development risks. The study produces a rank-order list of software risk factors and compares results with the earlier study, showing significant differences. Obtained rankings signal the importance of the infrastructure related and socio-economic software risks in developing countries like Nigeria. This demonstrates the importance of understanding the broader socio-economic context in identifying and managing software risks. The study also shows that some risks in Nigeria are located on a different scale. The choice of contingent mitigation strategies of project managers play a less important role, because the risks are so deeply engrained with the poor quality of basic infrastructure services. Journal: European Journal of Information Systems Pages: 182-194 Issue: 3 Volume: 12 Year: 2003 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000462 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000462 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:3:p:182-194 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933736_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mary Coombs Author-X-Name-First: Mary Author-X-Name-Last: Coombs Title: A computer called LEO Journal: European Journal of Information Systems Pages: 241-242 Issue: 3 Volume: 12 Year: 2003 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000463 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000463 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:3:p:241-242 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933737_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Laurence Brooks Author-X-Name-First: Laurence Author-X-Name-Last: Brooks Title: Information Systems: an Introduction to Informatics in Organisations Journal: European Journal of Information Systems Pages: 243-244 Issue: 3 Volume: 12 Year: 2003 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000464 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000464 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:3:p:243-244 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933738_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Lucas D Introna Author-X-Name-First: Lucas D Author-X-Name-Last: Introna Title: Disciplining Information Systems: Truth and its Regimes Abstract: This paper provides a critical discussion of the ongoing concern of Information Systems (IS) academics on the status of IS as an academic discipline. The focal claim of the argument is that the status of IS as an ‘academic discipline’ is not an ontological or an epistemological question but rather a political one. In defending this claim the paper will draw on the work of Foucault, in particular his discussion on the relation between power and knowledge. The paper will conclude that the advice given by Paul (2002) and others may be appropriate but for very different reasons. It will claim that it is equally important, if not more so, to know the reasons why claims to legitimacy may succeed or not, for such claims to be effective as a political programme. Journal: European Journal of Information Systems Pages: 235-240 Issue: 3 Volume: 12 Year: 2003 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000465 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000465 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:3:p:235-240 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933739_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bandula Jayatilaka Author-X-Name-First: Bandula Author-X-Name-Last: Jayatilaka Author-Name: Andrew Schwarz Author-X-Name-First: Andrew Author-X-Name-Last: Schwarz Author-Name: Rudy Hirschheim Author-X-Name-First: Rudy Author-X-Name-Last: Hirschheim Title: Determinants of ASP choice: an integrated perspective Abstract: With the rise in the availability of scalable network technologies and resources, Application Service Providers (ASPs) have become increasingly more feasible sources for obtaining IS services. ASP research represents an opportunity to integrate previous research on outsourcing, applied in the area of ASP choice. Historically, outsourcing research has adopted many theoretical perspectives, including transaction cost, resource-based, resource-dependence, and knowledge-based. We apply these perspectives in the ASP context. When obtaining IS services through an ASP, factors other than cost and those explained by the resource-based and resource-dependent perspectives can become paramount. The knowledge-based perspective enables us to examine knowledge risk and integration requirements. Drawing upon past research and an exploratory study conducted with 35 respondents in 11 firms, an integrated, theoretical model is proposed, which combines the transaction cost, resource-based, resource dependency and knowledge-based perspectives. The model is used to explain the antecedent conditions useful for making decisions on IT sourcing through ASPs. Journal: European Journal of Information Systems Pages: 210-224 Issue: 3 Volume: 12 Year: 2003 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000466 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000466 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:3:p:210-224 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933740_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Richard Varey Author-X-Name-First: Richard Author-X-Name-Last: Varey Title: Information Systems and the Economics of Innovation Journal: European Journal of Information Systems Pages: 245-246 Issue: 3 Volume: 12 Year: 2003 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000468 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000468 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:3:p:245-246 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933741_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ian Alexander Author-X-Name-First: Ian Author-X-Name-Last: Alexander Title: Designing Collaborative Systems. A Practical Guide to Ethnography Journal: European Journal of Information Systems Pages: 247-248 Issue: 3 Volume: 12 Year: 2003 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000469 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000469 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:3:p:247-248 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933742_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mark J Perry Author-X-Name-First: Mark J Author-X-Name-Last: Perry Title: (IS)4: is information systems interesting in itself? Abstract: The article comments on, and critiques, a view of IS as an independent discipline. It argues that, rather than being a subject that is distinct and distinguishable from existing research disciplines, it cannot be seen as uniquely different, and to attempt to do so would be theoretically and practically unsafe. A number of suggestions as to how IS research might be conducted and assessed in light of this claim are made. Journal: European Journal of Information Systems Pages: 231-234 Issue: 3 Volume: 12 Year: 2003 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000471 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000471 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:3:p:231-234 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933743_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ray J Paul, Author-X-Name-First: Ray J Author-X-Name-Last: Paul, Title: More changes and responses Journal: European Journal of Information Systems Pages: 167-167 Issue: 3 Volume: 12 Year: 2003 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000472 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000472 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:3:p:167-167 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933744_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Guy Fitzgerald Author-X-Name-First: Guy Author-X-Name-Last: Fitzgerald Title: Information systems: a subject with a particular perspective, no more, no less Journal: European Journal of Information Systems Pages: 225-228 Issue: 3 Volume: 12 Year: 2003 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000473 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000473 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:3:p:225-228 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933745_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: David E Avison Author-X-Name-First: David E Author-X-Name-Last: Avison Title: Is IS an intellectual subject? Journal: European Journal of Information Systems Pages: 229-230 Issue: 3 Volume: 12 Year: 2003 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000474 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000474 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:3:p:229-230 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933913_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Tibert Verhagen Author-X-Name-First: Tibert Author-X-Name-Last: Verhagen Author-Name: Selmar Meents Author-X-Name-First: Selmar Author-X-Name-Last: Meents Author-Name: Yao-Hua Tan Author-X-Name-First: Yao-Hua Author-X-Name-Last: Tan Title: Perceived risk and trust associated with purchasing at electronic marketplaces Abstract: Understanding consumer behaviour is of vital importance to consumer-oriented e-business models today. In this paper, we study the relationships between consumer perceptions of risk and trust and the attitude towards purchasing at a consumer-to-consumer electronic marketplace (EM). Typical for EM settings is that consumer behaviour is subject to perceptions of the selling party as well as of the institutional structures of the intermediary that is operating the EM. Building upon the well-established literature of trust, we consider the concepts of intermediary trust and seller trust. We extend this categorisation by introducing the concepts of intermediary risk and seller risk. We developed measurement instruments for intermediary risk and seller risk. All measurement scales have acceptable alphas and are unidimensional. An empirical study is conducted to explore the relationships between the risk and trust types and consumer purchase attitude. The results reveal significant, direct effects of seller trust and seller risk. Second-order effects of intermediary trust and intermediary risk are investigated and reported. The paper concludes with general observations and recommendations for research and practice. Journal: European Journal of Information Systems Pages: 542-555 Issue: 6 Volume: 15 Year: 2006 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000644 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000644 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:6:p:542-555 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933914_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Alexander Dreiling Author-X-Name-First: Alexander Author-X-Name-Last: Dreiling Author-Name: Michael Rosemann Author-X-Name-First: Michael Author-X-Name-Last: Rosemann Author-Name: Wil van der Aalst Author-X-Name-First: Wil Author-X-Name-Last: van der Aalst Author-Name: Lutz Heuser Author-X-Name-First: Lutz Author-X-Name-Last: Heuser Author-Name: Karsten Schulz Author-X-Name-First: Karsten Author-X-Name-Last: Schulz Title: Model-based software configuration: patterns and languages Abstract: The common presupposition of enterprise systems (ES) is that they lead to significant efficiency gains. However, this is only the case for well-implemented ES that are well-aligned with the organisation. The list of ES implementation failures is significant which is partly attributable to the insufficiently addressed fundamental problem of adapting an ES efficiently. As long as it is not intuitively possible to configure an ES, this problem will prevail because organisations have a non-generic character. A solution to this problem consists in re-thinking current practices of ES provision. This paper proposes a new approach based on configurable process models, which reflect ES functionalities. We provide in this paper a taxonomy of situations that can occur from a business perspective during process model configuration. This taxonomy is represented via so-called semantic configuration patterns. In the next step, we discuss so-called syntactic configuration patterns. This second type of configuration patterns implements the semantic configuration patterns for specific modelling techniques. We chose two popular process modelling languages in order to illustrate our approach. Journal: European Journal of Information Systems Pages: 583-600 Issue: 6 Volume: 15 Year: 2006 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000645 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000645 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:6:p:583-600 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933915_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Rens Scheepers Author-X-Name-First: Rens Author-X-Name-Last: Scheepers Title: A conceptual framework for the implementation of enterprise information portals in large organizations Abstract: Addressing the diversity in information requirements across the enterprise is a central challenge in enterprise content management. Enterprise information portals (EIPs) hold promise in this regard, offering each user a gateway to customized and personalized content. However, in large organizations EIP implementers face the complexity of tailoring portals for potentially thousands of users. A conceptual framework based on marketing fundamentals is developed to inform EIP implementation in this respect. It is argued that EIP implementers should view their user community as a number of distinct segments in order to address divergent needs more specifically (as opposed to a ‘one size fits all’ approach). For each identified segment, a ‘mix’ of content (product), distribution (place), promotion and price (cost) should be considered. The framework is applied to two cases of EIP implementation in large organizations. It is proposed that segmentation enables better planning of the overall EIP implementation effort. Considerations such as the number of user segments, customization, and personalization of content, and the funding of EIP development in large organizations are also discussed. The concepts elaborated here also hold theoretical relevance for other IS implementation contexts that involve very large user communities with diverse information requirements. Journal: European Journal of Information Systems Pages: 635-647 Issue: 6 Volume: 15 Year: 2006 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000646 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000646 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:6:p:635-647 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933916_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Stig Nordheim Author-X-Name-First: Stig Author-X-Name-Last: Nordheim Author-Name: Tero Päivärinta Author-X-Name-First: Tero Author-X-Name-Last: Päivärinta Title: Implementing enterprise content management: from evolution through strategy to contradictions out-of-the-box Abstract: This study examines a strategic development and implementation process of enterprise content management (ECM) in a large oil company. In view of the framework of four motors of development and change in organizations, this study represents a revelatory case of a hybrid development approach to ECM that involves the teleological, life-cycle, and dialectical motors of development. This is in contrast to the evolutionary development motor, which has prevailed in the hitherto reported content management research. The case study also complements process-based research on enterprise system implementations in general. We suggest that research and practice on large-scale ECM implementations should acknowledge all the four motors of change. Journal: European Journal of Information Systems Pages: 648-662 Issue: 6 Volume: 15 Year: 2006 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000647 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000647 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:6:p:648-662 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933917_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Pasi Tyrväinen Author-X-Name-First: Pasi Author-X-Name-Last: Tyrväinen Author-Name: Tero Päivärinta Author-X-Name-First: Tero Author-X-Name-Last: Päivärinta Author-Name: Airi Salminen Author-X-Name-First: Airi Author-X-Name-Last: Salminen Author-Name: Juhani Iivari Author-X-Name-First: Juhani Author-X-Name-Last: Iivari Title: Characterizing the evolving research on enterprise content management Abstract: Innovations in network technologies in the 1990's have provided new ways to store and organize information to be shared by people and various information systems. The term Enterprise Content Management (ECM) has been widely adopted by software product vendors and practitioners to refer to technologies used to manage the content of assets like documents, web sites, intranets, and extranets In organizational or inter-organizational contexts. Despite this practical interest ECM has received only little attention in the information systems research community. This editorial argues that ECM provides an important and complex subfield of Information Systems. It provides a framework to stimulate and guide future research, and outlines research issues specific to the field of ECM. Journal: European Journal of Information Systems Pages: 627-634 Issue: 6 Volume: 15 Year: 2006 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000648 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000648 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:6:p:627-634 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933918_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Briony J Oates Author-X-Name-First: Briony J Author-X-Name-Last: Oates Title: New frontiers for information systems research: computer art as an information system Abstract: This paper proposes extending the frontiers of information systems (IS) research by seeing computer art as a kind of information system. It explores some research questions that arise if we take such a view. A new agenda for IS research is developed, based upon six themes in computer art and related work in previous IS research. The link between IS and computer art is bi-directional: our theories of information systems could inform the study of computer art, and computer art could inform our information systems theories, possibly leading to modification or even abandonment of them. Twelve research questions are suggested, and potential barriers to IS researchers studying computer art are also discussed. The paper offers possibilities, not solutions, and makes an important contribution by suggesting new opportunities for innovative research in IS and by signposting some of the topics which could be addressed. Journal: European Journal of Information Systems Pages: 617-626 Issue: 6 Volume: 15 Year: 2006 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000649 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000649 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:6:p:617-626 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933919_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Kevin Zhu Author-X-Name-First: Kevin Author-X-Name-Last: Zhu Author-Name: Shutao Dong Author-X-Name-First: Shutao Author-X-Name-Last: Dong Author-Name: Sean Xin Xu Author-X-Name-First: Sean Xin Author-X-Name-Last: Xu Author-Name: Kenneth L Kraemer Author-X-Name-First: Kenneth L Author-X-Name-Last: Kraemer Title: Innovation diffusion in global contexts: determinants of post-adoption digital transformation of European companies Abstract: Grounded in the diffusion of innovation theory and the technology–organization–environment framework, we develop an integrative model to study the determinants of post-adoption stages of innovation diffusion, using enterprise digital transformation as an example of technology-enabled innovations. We specify four innovation characteristics (relative advantage, compatibility, costs and security concern) and four contextual factors (technology competence, organization size, competitive pressure and partner readiness) as determinants of post-adoption usage, and postulate usage as an intermediate link to impact on firm performance. We test the proposed model using a dataset of 1415 companies from six European countries. We find that the innovation needs to be used extensively in value-chain activities before its impact can be realized. Among the innovation characteristics, we find that compatibility is the strongest driver, and security concern outweighs cost as a usage inhibitor. Among the contextual variables, technology competence, partner readiness and competitive pressure significantly drive e-business usage, and the structural inertia of large firms tends to slow down its penetration. Collectively, these results indicate that innovation diffusion can be better understood by including both innovation characteristics and contextual factors, whereas earlier literature has traditionally treated the two separately. Finally, we evaluate an international dimension among European countries and tease out important boundary conditions that would not have been evident in a single-country dataset. Our results show that careful attention must be paid to the economic and regulatory factors that may result in uneven innovation diffusion even among developed European countries. Journal: European Journal of Information Systems Pages: 601-616 Issue: 6 Volume: 15 Year: 2006 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000650 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000650 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:6:p:601-616 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933920_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Brian W Hollocks Author-X-Name-First: Brian W Author-X-Name-Last: Hollocks Title: Electronic Brains: Stories from the Dawn of the Computer Age Journal: European Journal of Information Systems Pages: 663-664 Issue: 6 Volume: 15 Year: 2006 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000651 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000651 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:6:p:663-664 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933921_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Samuel Otim Author-X-Name-First: Samuel Author-X-Name-Last: Otim Author-Name: Varun Grover Author-X-Name-First: Varun Author-X-Name-Last: Grover Title: An empirical study on Web-based services and customer loyalty Abstract: E-business success is tied to the ability to foster customer loyalty. Businesses that deliver superior value derived from excellent services and quality products are likely to win customer loyalty. This paper examines Web-based services and the effects of three sets of factors: pre-purchase, transaction-related, and post-purchase services on customer loyalty (measured as repeat purchase intention from a given Web-based store) in a business-to-consumer environment. Based on the study's results, pre-purchase services that support search and evaluation of products replete in e-commerce systems have limited effect on customer loyalty. Among transaction-related services, transparency of the billing mechanism positively impacts customer loyalty. Customers shun any hidden costs associated with product acquisition. Post-purchase services consisting of support of order tracking, on-time delivery, and customer support positively influence customer loyalty. These findings imply that Web-based stores need to pay more attention to post-purchase services in their strategy to retain customers. This is what will keep customers satisfied and willing to continue the relationship with a company over the long term. Journal: European Journal of Information Systems Pages: 527-541 Issue: 6 Volume: 15 Year: 2006 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000652 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000652 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:6:p:527-541 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933922_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Neil F Doherty Author-X-Name-First: Neil F Author-X-Name-Last: Doherty Author-Name: Crispin R Coombs Author-X-Name-First: Crispin R Author-X-Name-Last: Coombs Author-Name: John Loan-Clarke Author-X-Name-First: John Author-X-Name-Last: Loan-Clarke Title: A re-conceptualization of the interpretive flexibility of information technologies: redressing the balance between the social and the technical Abstract: Interpretive flexibility – the capacity of a specific technology to sustain divergent opinions – has long been recognized as playing an important role in explaining how technical artefacts are socially constructed. What is less clear is how a system's technical characteristics might limit its ability to be interpreted flexibly. This gap in the literature has largely arisen because recent contributions to this debate have tended to be rather one-sided, focussing almost solely upon the role of the human agent in shaping the technical artefact, and in so doing either downplaying or ignoring the artefact's shaping potential. The broad aim of this study was to reappraise the nature and role of interpretive flexibility but giving as much consideration to how an information system's technical characteristics might limit its ability to be interpreted flexibly, as we do to its potential for social construction. In this paper, we use the results of two in-depth case studies, in order to propose a re-conceptualization of the role of interpretive flexibility. In short, this model helps explain how the initial interpretations of stakeholders are significantly influenced by the scope and adaptability of the system's functionality. Stakeholder interpretations will then, in turn, influence how the system's functionality is appropriated and exploited by users, to allow divergent interpretations to be realized and sustained. Journal: European Journal of Information Systems Pages: 569-582 Issue: 6 Volume: 15 Year: 2006 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000653 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000653 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:6:p:569-582 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933923_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Boontaree Kositanurit Author-X-Name-First: Boontaree Author-X-Name-Last: Kositanurit Author-Name: Ojelanki Ngwenyama Author-X-Name-First: Ojelanki Author-X-Name-Last: Ngwenyama Author-Name: Kweku-Muata Osei-Bryson Author-X-Name-First: Kweku-Muata Author-X-Name-Last: Osei-Bryson Title: An exploration of factors that impact individual performance in an ERP environment: an analysis using multiple analytical techniques Abstract: This study explores the factors that can impact individual performance when using enterprise resource planning (ERP) systems. Starting from the proposition that organizational performance depends on individuals' task accomplishments, we test a structural model of task–technology fit, ERP user satisfaction, and individual performance in ERP environments. This research utilizes a survey method to examine the perceptions of ERP users. We performed factor and reliability analyses to assess the validity of the survey instrument. Six factors were identified as having an impact on individual performance: System Quality, Documentation, Ease of use, Reliability, Authorization, and Utilization. To explore the relationships among these factors, we conducted regression and multivariate adaptive regression splines analysis, and compared the findings from these two analytical techniques. The study provides evidence that System Quality, Utilization, and Ease of Use are the most important factors bearing on individual performance in ERP environments. Our findings also provide IT managers and researchers with knowledge of how these factors can be manipulated to improve individual performance when using ERP systems. Journal: European Journal of Information Systems Pages: 556-568 Issue: 6 Volume: 15 Year: 2006 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000654 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000654 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:6:p:556-568 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933924_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ray J Paul Author-X-Name-First: Ray J Author-X-Name-Last: Paul Title: Making the changes Journal: European Journal of Information Systems Pages: 525-526 Issue: 6 Volume: 15 Year: 2006 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000655 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000655 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:6:p:525-526 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933819_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Marco De Marco Author-X-Name-First: Marco Author-X-Name-Last: De Marco Title: A portrait of a scientist Journal: European Journal of Information Systems Pages: 442-445 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000553 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000553 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:442-445 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933820_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Edgar A Whitley Author-X-Name-First: Edgar A Author-X-Name-Last: Whitley Title: Visiting the red-light zones with Claudio Journal: European Journal of Information Systems Pages: 477-479 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000554 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000554 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:477-479 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933821_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Rik Maes Author-X-Name-First: Rik Author-X-Name-Last: Maes Author-Name: Ard Huizing Author-X-Name-First: Ard Author-X-Name-Last: Huizing Title: What do Claudio Ciborra and Sandro Botticelli have in common? On the renaissance of la Primavera Journal: European Journal of Information Systems Pages: 480-483 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000555 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000555 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:480-483 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933822_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Kiran Jude Fernandes Author-X-Name-First: Kiran Jude Author-X-Name-Last: Fernandes Title: Eureka moments in the works of Claudio Ciborra Journal: European Journal of Information Systems Pages: 498-499 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000556 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000556 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:498-499 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933823_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Riccardo Mercurio Author-X-Name-First: Riccardo Author-X-Name-Last: Mercurio Author-Name: Marcello Martinez Author-X-Name-First: Marcello Author-X-Name-Last: Martinez Author-Name: Luigi Moschera Author-X-Name-First: Luigi Author-X-Name-Last: Moschera Author-Name: Ernesto De Nito Author-X-Name-First: Ernesto Author-X-Name-Last: De Nito Author-Name: Gianluigi Mangia Author-X-Name-First: Gianluigi Author-X-Name-Last: Mangia Author-Name: Paolo Canonico Author-X-Name-First: Paolo Author-X-Name-Last: Canonico Title: Remembering Claudio: a note from his friends at Universities of Naples and Catanzaro Journal: European Journal of Information Systems Pages: 459-460 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000557 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000557 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:459-460 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933824_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Dixi Louise Strand Author-X-Name-First: Dixi Louise Author-X-Name-Last: Strand Title: Let's be baroque! Journal: European Journal of Information Systems Pages: 500-503 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000558 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000558 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:500-503 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933825_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Steven Verjans Author-X-Name-First: Steven Author-X-Name-Last: Verjans Title: Bricolage as a way of life – improvisation and irony in information systems Journal: European Journal of Information Systems Pages: 504-506 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000559 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000559 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:504-506 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933826_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bernd Carsten Stahl Author-X-Name-First: Bernd Carsten Author-X-Name-Last: Stahl Title: The obituary as bricolage: the Mann Gulch disaster and the problem of heroic rationality Abstract: This paper discusses Claudio Ciborra's critique of traditional economic rationality. It recounts his account of the Mann Gulch Disaster. The important aspect of his reading of the disaster is that apparently irrational actions may provide appropriate solutions for complex problems. He bases this observation on a phenomenology-inspired understanding of the world which emphasises Dasein's characteristic as being-in-the-world. The paper interprets this as an important contribution to the critique of rationality as put forward by critical research in information systems. However, this phenomenological approach also raises new issues due to its difficulty of dealing with intersubjective understanding and problems of self-application. The paper concludes by suggesting that such difficulties can be overcome by appropriating Ciborra's idea of bricolage and that this special issue may be read as an expression of such collective bricolage. Journal: European Journal of Information Systems Pages: 487-491 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000560 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000560 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:487-491 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933827_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Diego D Navarra Author-X-Name-First: Diego D Author-X-Name-Last: Navarra Title: Governance, architecture and action: Claudio's Shih Journal: European Journal of Information Systems Pages: 492-494 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000561 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000561 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:492-494 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933828_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Luca Giustiniano Author-X-Name-First: Luca Author-X-Name-Last: Giustiniano Title: The heresy and the sport of information systems Journal: European Journal of Information Systems Pages: 450-451 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000562 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000562 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:450-451 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933829_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Maddalena Sorrentino Author-X-Name-First: Maddalena Author-X-Name-Last: Sorrentino Title: Taking care of invisible technology Journal: European Journal of Information Systems Pages: 507-509 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000563 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000563 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:507-509 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933830_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jeff Shantz Author-X-Name-First: Jeff Author-X-Name-Last: Shantz Title: Beyond risk and boredom: reflections on Claudio Ciborra and sociology Journal: European Journal of Information Systems Pages: 510-512 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000564 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000564 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:510-512 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933831_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Antonio Cordella Author-X-Name-First: Antonio Author-X-Name-Last: Cordella Title: From Italy to East London Journal: European Journal of Information Systems Pages: 465-466 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000565 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000565 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:465-466 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933832_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Andrea Resca Author-X-Name-First: Andrea Author-X-Name-Last: Resca Title: Imagining Claudio Ciborra's next research agenda Journal: European Journal of Information Systems Pages: 495-497 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000566 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000566 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:495-497 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933833_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Cameron Lawrence Author-X-Name-First: Cameron Author-X-Name-Last: Lawrence Title: From Milan to Mann Gulch: reflections on the intellectual contributions of Professor Claudio Ciborra Journal: European Journal of Information Systems Pages: 484-486 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000567 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000567 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:484-486 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933834_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Dimitris Boucas Author-X-Name-First: Dimitris Author-X-Name-Last: Boucas Title: A brief glimpse of Claudio Journal: European Journal of Information Systems Pages: 448-449 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000568 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000568 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:448-449 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933835_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Giovan Francesco Lanzara Author-X-Name-First: Giovan Francesco Author-X-Name-Last: Lanzara Title: Portraits of Claudio: the butterfly, the dragon and the marmot Journal: European Journal of Information Systems Pages: 439-441 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000569 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000569 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:439-441 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933836_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Eleanor Wynn Author-X-Name-First: Eleanor Author-X-Name-Last: Wynn Title: Claudio Ciborra: his life as a formative context Journal: European Journal of Information Systems Pages: 456-458 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000570 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000570 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:456-458 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933837_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Sarah Emery Author-X-Name-First: Sarah Author-X-Name-Last: Emery Title: Claudio Ciborra: convenor of information systems October 2000 to February 2005 Journal: European Journal of Information Systems Pages: 461-462 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000571 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000571 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:461-462 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933838_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ole Hanseth Author-X-Name-First: Ole Author-X-Name-Last: Hanseth Title: Drifting with Claudio Journal: European Journal of Information Systems Pages: 474-476 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000572 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000572 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:474-476 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933839_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: The Editors Title: Claudio Ciborra: 1951–2005 Journal: European Journal of Information Systems Pages: 435-436 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000573 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000573 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:435-436 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933840_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Lucas D Introna Author-X-Name-First: Lucas D Author-X-Name-Last: Introna Title: Claudio Ciborra's way of being: authenticity and the world of information systems Journal: European Journal of Information Systems Pages: 513-517 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000574 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000574 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:513-517 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933841_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Alessandro D'Atri Author-X-Name-First: Alessandro Author-X-Name-Last: D'Atri Author-Name: Author-X-Name-First: Author-X-Name-Last: Title: ItAIS (the Italian chapter of AIS) remembers Claudio Journal: European Journal of Information Systems Pages: 454-455 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000578 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000578 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:454-455 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933842_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Alessandro D'Atri Author-X-Name-First: Alessandro Author-X-Name-Last: D'Atri Title: Bricolage in system design and trust in cooperation Journal: European Journal of Information Systems Pages: 452-453 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000579 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000579 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:452-453 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933843_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Shoshana Zuboff Author-X-Name-First: Shoshana Author-X-Name-Last: Zuboff Title: Ciborra disclosed: aletheia in the life and scholarship of Claudio Ciborra Journal: European Journal of Information Systems Pages: 470-473 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000580 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000580 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:470-473 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933844_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Richard J Boland Author-X-Name-First: Richard J Author-X-Name-Last: Boland Title: Fake! Journal: European Journal of Information Systems Pages: 446-447 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000581 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000581 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:446-447 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933845_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jannis Kallinikos Author-X-Name-First: Jannis Author-X-Name-Last: Kallinikos Title: The spirit never dies Journal: European Journal of Information Systems Pages: 467-469 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000582 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000582 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:467-469 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933846_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Tony Cornford Author-X-Name-First: Tony Author-X-Name-Last: Cornford Author-Name: Claudio Ciborra Author-X-Name-First: Claudio Author-X-Name-Last: Ciborra Author-Name: Maha Shaikh Author-X-Name-First: Maha Author-X-Name-Last: Shaikh Title: Do penguins eat scallops? Journal: European Journal of Information Systems Pages: 518-521 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000583 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000583 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:518-521 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933847_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Antonio Cordella Author-X-Name-First: Antonio Author-X-Name-Last: Cordella Author-Name: Edgar A Whitley Author-X-Name-First: Edgar A Author-X-Name-Last: Whitley Author-Name: Jannis Kallinikos Author-X-Name-First: Jannis Author-X-Name-Last: Kallinikos Title: Editorial Journal: European Journal of Information Systems Pages: 437-438 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000584 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000584 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:437-438 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933848_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Maurizio Cavallari Author-X-Name-First: Maurizio Author-X-Name-Last: Cavallari Title: A grand master and an exceptional mind Journal: European Journal of Information Systems Pages: 463-464 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000585 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000585 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:463-464 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933849_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Anna Maria Morazzoni Author-X-Name-First: Anna Maria Author-X-Name-Last: Morazzoni Title: Challenging wisdom Journal: European Journal of Information Systems Pages: 522-523 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000586 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000586 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:522-523 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933850_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ray J Paul Author-X-Name-First: Ray J Author-X-Name-Last: Paul Title: The Labyrinths of Information: Challenging the Wisdom of Systems Journal: European Journal of Information Systems Pages: 524-525 Issue: 5 Volume: 14 Year: 2005 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000587 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000587 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:14:y:2005:i:5:p:524-525 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2026621_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Patrick Mikalef Author-X-Name-First: Patrick Author-X-Name-Last: Mikalef Author-Name: Kieran Conboy Author-X-Name-First: Kieran Author-X-Name-Last: Conboy Author-Name: Jenny Eriksson Lundström Author-X-Name-First: Jenny Eriksson Author-X-Name-Last: Lundström Author-Name: Aleš Popovič Author-X-Name-First: Aleš Author-X-Name-Last: Popovič Title: Thinking responsibly about responsible AI and ‘the dark side’ of AI Abstract: Artificial Intelligence (AI) has been argued to offer a myriad of improvements in how we work and live. The notion of AI comprises a wide-ranging set of technologies that allow individuals and organizations to integrate and analyze data and use that insight to improve or automate decision-making. While most attention has been placed on the positive aspects companies realize by the adoption by the adoption and use of AI, there is a growing concern around the negative and unintended consequences of such technologies. In this special issue we have made a call for research papers that help us explore the dark side of AI use. By adopting a dark side lens, we aimed to expand our understanding of how AI should be implemented in practice, and how to minimize or avoid negative outcomes. In this editorial, we build on the notion of responsible AI, to highlight the different ways in which AI can potentially produce unintended consequences, as well as to suggest alternative paths future IS research can follow to improve our knowledge about how to mitigate such occurrences. We further expand on dark side theorizing in order to uncover hidden assumptions of current literature as well as to propose other prominent themes that can guide future IS research on AI adoption and use. Journal: European Journal of Information Systems Pages: 257-268 Issue: 3 Volume: 31 Year: 2022 Month: 05 X-DOI: 10.1080/0960085X.2022.2026621 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2026621 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:3:p:257-268 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1955628_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Nripendra P. Rana Author-X-Name-First: Nripendra P. Author-X-Name-Last: Rana Author-Name: Sheshadri Chatterjee Author-X-Name-First: Sheshadri Author-X-Name-Last: Chatterjee Author-Name: Yogesh K. Dwivedi Author-X-Name-First: Yogesh K. Author-X-Name-Last: Dwivedi Author-Name: Shahriar Akter Author-X-Name-First: Shahriar Author-X-Name-Last: Akter Title: Understanding dark side of artificial intelligence (AI) integrated business analytics: assessing firm’s operational inefficiency and competitiveness Abstract: The data-centric revolution generally celebrates the proliferation of business analytics and AI in exploiting firm’s potential and success. However, there is a lack of research on how the unintended consequences of AI integrated business analytics (AI-BA) influence a firm’s overall competitive advantage. In this backdrop, this study aims to identify how factors, such as AI-BA opacity, suboptimal business decisions and perceived risk are responsible for a firm’s operational inefficiency and competitive disadvantage. Drawing on the resource-based view, dynamic capability view, and contingency theory, the proposed research model captures the components and effects of an AI-BA opacity on a firm’s risk environment and negative performance. The data were gathered from 355 operational, mid-level and senior managers from various service sectors across all different size organisations in India. The results indicated that lack of governance, poor data quality, and inefficient training of key employees led to an AI-BA opacity. It then triggers suboptimal business decisions and higher perceived risk resulting in operational inefficiency. The findings show that operational inefficiency significantly contributes to negative sales growth and employees’ dissatisfaction, which result in a competitive disadvantage for a firm. The findings also highlight the significant moderating effect of contingency plan in the nomological chain. Journal: European Journal of Information Systems Pages: 364-387 Issue: 3 Volume: 31 Year: 2022 Month: 05 X-DOI: 10.1080/0960085X.2021.1955628 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1955628 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:3:p:364-387 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1927212_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Nima Kordzadeh Author-X-Name-First: Nima Author-X-Name-Last: Kordzadeh Author-Name: Maryam Ghasemaghaei Author-X-Name-First: Maryam Author-X-Name-Last: Ghasemaghaei Title: Algorithmic bias: review, synthesis, and future research directions Abstract: As firms are moving towards data-driven decision making, they are facing an emerging problem, namely, algorithmic bias. Accordingly, algorithmic systems can yield socially-biased outcomes, thereby compounding inequalities in the workplace and in society. This paper reviews, summarises, and synthesises the current literature related to algorithmic bias and makes recommendations for future information systems research. Our literature analysis shows that most studies have conceptually discussed the ethical, legal, and design implications of algorithmic bias, whereas only a limited number have empirically examined them. Moreover, the mechanisms through which technology-driven biases translate into decisions and behaviours have been largely overlooked. Based on the reviewed papers and drawing on theories such as the stimulus-organism-response theory and organisational justice theory, we identify and explicate eight important theoretical concepts and develop a research model depicting the relations between those concepts. The model proposes that algorithmic bias can affect fairness perceptions and technology-related behaviours such as machine-generated recommendation acceptance, algorithm appreciation, and system adoption. The model also proposes that contextual dimensions (i.e., individual, task, technology, organisational, and environmental) can influence the perceptual and behavioural manifestations of algorithmic bias. These propositions highlight the significant gap in the literature and provide a roadmap for future studies. Journal: European Journal of Information Systems Pages: 388-409 Issue: 3 Volume: 31 Year: 2022 Month: 05 X-DOI: 10.1080/0960085X.2021.1927212 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1927212 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:3:p:388-409 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1934130_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Olivera Marjanovic Author-X-Name-First: Olivera Author-X-Name-Last: Marjanovic Author-Name: Dubravka Cecez-Kecmanovic Author-X-Name-First: Dubravka Author-X-Name-Last: Cecez-Kecmanovic Author-Name: Richard Vidgen Author-X-Name-First: Richard Author-X-Name-Last: Vidgen Title: Theorising Algorithmic Justice Abstract: The mounting evidence of unintended harmful social consequences of automated algorithmic decision-making (AADM), powered by AI and big data, in transformative services (e.g., welfare services), is startling. The algorithmic harm experienced by individuals, communities and society-at-large involves new injustice claims and disputes that go beyond issues of social justice. Drawing from the theory of “abnormal justice” in this paper we articulate a new theory of algorithmic justice that addresses the questions: WHAT is the matter of algorithmic justice? WHO counts as a subject of algorithmic justice? HOW are algorithmic justices performed? and How to address and resolve disputes about the WHAT, WHO and HOW of algorithmic justice? We illustrate the theory of algorithmic justice by drawing from a case of AADM in social welfare services, widely adopted by governments around the world. Our research points to datafication, technological inscribing and the systemic nature of injustices as important IS-specific aspects of algorithmic justice. Our main practical contribution comes from the articulation of algorithmic justice as a framework that (1) makes visible the injustices related to the “what”, “who”, and “how” of AADM in transformative services, and (2) provides further insights into how we might address and resolve these algorithmic injustices. Journal: European Journal of Information Systems Pages: 269-287 Issue: 3 Volume: 31 Year: 2022 Month: 05 X-DOI: 10.1080/0960085X.2021.1934130 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1934130 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:3:p:269-287 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1927213_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Lisa Marie Giermindl Author-X-Name-First: Lisa Marie Author-X-Name-Last: Giermindl Author-Name: Franz Strich Author-X-Name-First: Franz Author-X-Name-Last: Strich Author-Name: Oliver Christ Author-X-Name-First: Oliver Author-X-Name-Last: Christ Author-Name: Ulrich Leicht-Deobald Author-X-Name-First: Ulrich Author-X-Name-Last: Leicht-Deobald Author-Name: Abdullah Redzepi Author-X-Name-First: Abdullah Author-X-Name-Last: Redzepi Title: The dark sides of people analytics: reviewing the perils for organisations and employees Abstract: Technological advances in the field of artificial intelligence (AI) are heralding a new era of analytics and data-driven decision-making. Organisations increasingly rely on people analytics to optimise human resource management practices in areas such as recruitment, performance evaluation, personnel development, health and retention management. Recent progress in the field of AI and ever-increasing volumes of digital data have raised expectations and contributed to a very positive image of people analytics. However, transferring and applying the efficiency-driven logic of analytics to manage humans carries numerous risks, challenges, and ethical implications. Based on a theorising review our paper analyses perils that can emerge from the use of people analytics. By disclosing the underlying assumptions of people analytics and offering a perspective on current and future technological advancements, we identify six perils and discuss their implications for organisations and employees. Then, we illustrate how these perils may aggravate with increasing analytical power of people analytics, and we suggest directions for future research. Our theorising review contributes to information system research at the intersection of analytics, artificial intelligence, and human-algorithmic management. Journal: European Journal of Information Systems Pages: 410-435 Issue: 3 Volume: 31 Year: 2022 Month: 05 X-DOI: 10.1080/0960085X.2021.1927213 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1927213 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:3:p:410-435 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1869508_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Xusen Cheng Author-X-Name-First: Xusen Author-X-Name-Last: Cheng Author-Name: Linlin Su Author-X-Name-First: Linlin Author-X-Name-Last: Su Author-Name: Xin (Robert) Luo Author-X-Name-First: Xin (Robert) Author-X-Name-Last: Luo Author-Name: Jose Benitez Author-X-Name-First: Jose Author-X-Name-Last: Benitez Author-Name: Shun Cai Author-X-Name-First: Shun Author-X-Name-Last: Cai Title: The good, the bad, and the ugly: impact of analytics and artificial intelligence-enabled personal information collection on privacy and participation in ridesharing Abstract: Big data analytics (BDA) and artificial intelligence (AI) may provide both bright and dark sides that may affect user participation in ridesharing. We do not know whether the juxtaposed sides of these IT artefacts influence users’ cognitive appraisals, and if so, to what extent will their participative behaviour be affected. This paper contributes to the IS research by uncovering the interplay between the dark and bright sides of BDA and AI and the underlying mechanisms of cognitive appraisals for user behaviour in ridesharing. We performed two phases of the study using mixed-methods. In the first study, we conduct 21 semi-structured interviews to develop the research model. The second study empirically validated the research model using survey data of 332 passengers. We find that the usage of BDA and AI on ridesharing platforms have a bright side (usefulness, “the good”) but also a dark side (uncertainty and invasion of privacy, “the bad and the ugly”). The bright side generates perceived benefits, and the dark side shape perceived risks in users, which discount the risks from the benefits of using the ridesharing platform. Privacy control exerts a positive effect on the perceived benefits to encourage individuals to use the ridesharing platform. Journal: European Journal of Information Systems Pages: 339-363 Issue: 3 Volume: 31 Year: 2022 Month: 05 X-DOI: 10.1080/0960085X.2020.1869508 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1869508 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:3:p:339-363 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1947753_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jon Aaen Author-X-Name-First: Jon Author-X-Name-Last: Aaen Author-Name: Jeppe Agger Nielsen Author-X-Name-First: Jeppe Agger Author-X-Name-Last: Nielsen Author-Name: Andrea Carugati Author-X-Name-First: Andrea Author-X-Name-Last: Carugati Title: The dark side of data ecosystems: A longitudinal study of the DAMD project Abstract: Data are often vividly depicted as strategic assets that organisations can (re)use to create value for myriad purposes. However, the same qualities that make data so appreciated – that is, their volume, their value for a plurality of stakeholders and their indefinite reuse capacity – also have a dark side: data reuse can lead to deviant data use that undermines the legitimacy of data analytics initiatives. To investigate this dynamic, we build on the notion of data ecosystems and provide empirical evidence from a longitudinal, 15-year case study of the emergence, expansion and eventual collapse of a large-scale data analytics project – called DAMD – in the Danish health care sector. We demonstrate that data reuse in the evolving data ecosystem elicited a data reuse dark side that was so dominant that it eventually resulted in the project’s demise. We conceptualise the reuse dark side’s three major mechanisms as function creep, stakeholder creep and data creep. Based on these insights, we develop an empirically grounded Data Analytics Ecosystem Model that extends the current understanding of data ecosystems and provides a view of these ecosystems as having both a bright and a dark side. Journal: European Journal of Information Systems Pages: 288-312 Issue: 3 Volume: 31 Year: 2022 Month: 05 X-DOI: 10.1080/0960085X.2021.1947753 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1947753 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:3:p:288-312 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1960905_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Tapani Rinta-Kahila Author-X-Name-First: Tapani Author-X-Name-Last: Rinta-Kahila Author-Name: Ida Someh Author-X-Name-First: Ida Author-X-Name-Last: Someh Author-Name: Nicole Gillespie Author-X-Name-First: Nicole Author-X-Name-Last: Gillespie Author-Name: Marta Indulska Author-X-Name-First: Marta Author-X-Name-Last: Indulska Author-Name: Shirley Gregor Author-X-Name-First: Shirley Author-X-Name-Last: Gregor Title: Algorithmic decision-making and system destructiveness: A case of automatic debt recovery Abstract: Governments are increasingly relying on algorithmic decision-making (ADM) to deliver public services. Recent information systems literature has raised concerns regarding ADM’s negative unintended consequences, such as widespread discrimination, which in extreme cases can be destructive to society. The extant empirical literature, however, has not sufficiently examined the destructive effects of governmental ADM. In this paper, we report on a case study of the Australian government’s “Robodebt” programme that was designed to automatically calculate and collect welfare overpayment debts from citizens but ended up causing severe distress to citizens and welfare agency staff. Employing perspectives from systems thinking and organisational limits, we develop a research model that explains how a socially destructive government ADM programme was initiated, sustained, and delegitimized. The model offers a set of generalisable mechanisms that can benefit investigations of ADM’s consequences. Our findings contribute to the literature of unintended consequences of ADM and demonstrate to practitioners the importance of setting up robust governance infrastructures for ADM programmes. Journal: European Journal of Information Systems Pages: 313-338 Issue: 3 Volume: 31 Year: 2022 Month: 05 X-DOI: 10.1080/0960085X.2021.1960905 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1960905 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:3:p:313-338 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933500_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Geoff Walsham Author-X-Name-First: Geoff Author-X-Name-Last: Walsham Title: Organizational secrecy: some proposals for a way forward Journal: European Journal of Information Systems Pages: 195-197 Issue: 4 Volume: 4 Year: 1996 Month: 2 X-DOI: 10.1057/ejis.1996.1 File-URL: http://hdl.handle.net/10.1057/ejis.1996.1 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:4:y:1996:i:4:p:195-197 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933501_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: I.A. Rudy Author-X-Name-First: I.A. Author-X-Name-Last: Rudy Title: A critical review of research on electronic mail Abstract: This paper reviews the literature on email (including computer conferencing) and discusses the most important current issues in the field. Though it will be of interest to researchers working specifically in the email field, it is intended mainly as a summary for IS researchers in other areas. Email research is part of a wider field, computer-mediated communication (CMC), which includes some areas not covered here, such as the Internet, video conferencing and EDI. Most research on email has concerned itself with the issues of media choice and media effects. Despite a great deal of published work though, the field still has an unsatisfactory, piecemeal feel to it. Much of the work that has been published is unsatisfactory in being based upon unrealistic, laboratory-like simulations, and a positivist epistemology. Most of the work concerns the use of email and the effects of using email on individuals and groups; little has been done on the effects at an organizational level. The paper concludes with some suggestions for future avenues of research. Journal: European Journal of Information Systems Pages: 198-213 Issue: 4 Volume: 4 Year: 1996 Month: 2 X-DOI: 10.1057/ejis.1996.2 File-URL: http://hdl.handle.net/10.1057/ejis.1996.2 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:4:y:1996:i:4:p:198-213 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933502_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: J. Ward Author-X-Name-First: J. Author-X-Name-Last: Ward Author-Name: P. Taylor Author-X-Name-First: P. Author-X-Name-Last: Taylor Author-Name: P. Bond Author-X-Name-First: P. Author-X-Name-Last: Bond Title: Evaluation and realisation of IS/IT benefits: an empirical study of current practice Abstract: This paper presents the main findings of a 1994 survey of UK industry practices in the evaluation and realisation of IS/IT benefits (‘benefits management‘). The survey addresses the issues which affect the ability of organizations to realise the full benefits of IS/IT investments, i.e. not only the pre-investment appraisal and post-investment evaluation processes, but also how organizations do or do not ensure that benefits claimed are actively managed through to realisation. To do this a new benefits management process model was used to structure a questionnaire to elicit details of how effective organizations are in addressing benefits management throughout the investment lifecycle. Sixty organizations responded to the survey, thus providing a wealth of data for analysis. This paper presents some of the key results of that analysis. From the survey, it is clear that many organizations believe that current methods are far from satisfactory in ensuring that the benefits are properly identified and realised. Very few have a comprehensive process for managing the delivery of benefits from IS/IT. This paper offers new insight into the reasons for the current unsatisfactory situation and points the way to how the situation could be significantly improved. Journal: European Journal of Information Systems Pages: 214-225 Issue: 4 Volume: 4 Year: 1996 Month: 2 X-DOI: 10.1057/ejis.1996.3 File-URL: http://hdl.handle.net/10.1057/ejis.1996.3 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:4:y:1996:i:4:p:214-225 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933503_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: W.L. Currie Author-X-Name-First: W.L. Author-X-Name-Last: Currie Title: Outsourcing in the private and public sectors: an unpredictable IT strategy Abstract: IT outsourcing has grown considerably in the private sector, with IT software and service suppliers reporting increased revenues. Similarly in the public sector, the introduction of market testing and compulsory competitive tendering (CCT) will inevitably lead to the contracting-out of significant levels of IT work. This may lead to the demise of some public sector IT departments where external bids are favoured over those offered by the in-house team. This paper is divided into two sections. First, it considers some of the relevant literature on IT outsourcing in both private and public sector British and American organizations. It draws together important themes which explain the attraction of IT outsourcing to senior executives. Second, it introduces the results from a questionnaire survey of nearly 200 UK private and public sector organizations on IT outsourcing. In particular it looks at the proportion of organizations that claims to use outsourcing, how contracts are negotiated and the type of IT solutions preferred by IT managers. The central argument is that IT outsourcing poses significant challenges to both private and public sector organizations and is not simply a quick-fix panacea. Moreover, public sector IT managers would do well to analyse some of the less favourable reports from private sector outsourcing as they gear themselves up for CCT in the months ahead. Journal: European Journal of Information Systems Pages: 226-236 Issue: 4 Volume: 4 Year: 1996 Month: 2 X-DOI: 10.1057/ejis.1996.4 File-URL: http://hdl.handle.net/10.1057/ejis.1996.4 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:4:y:1996:i:4:p:226-236 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933504_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: N.N. Mitev Author-X-Name-First: N.N. Author-X-Name-Last: Mitev Title: Convergence and divergence in information systems and knowledge based systems development methodologies: a case for integrated strategic planning Abstract: There is a need to integrate knowledge based systems (KBS) with information systems (IS) technical solutions, which implies that KBS and IS development methodologies should be less isolated from each other. KBS and IS development methodologies are generally examined in terms of their similarities and differences. There is divergence at the feasibility and analysis stages, convergence at the design and coding stages, divergence during testing, convergence at the implementation stage, and divergence during maintenance. There are more similarities than there are differences between IS and KBS methodologies, particularly during the strategic planning stage. It is argued that linking KBS strategic planning to the planning element of an IS methodology will go further towards ensuring that the whole of the business is considered, leading to better integrated IS/KBS solutions. Application selection activities of two well-known KBS methodologies are briefly analysed. We show that these activities, which precede the feasibility study, do not consider the strategic aspects of the use of KBS (and IS in general) in business organizations. It is argued that a KBS strategy should be formulated in relation to the IS strategy and the business strategy, therefore increasing the convergence between IS and KBS methodologies. Journal: European Journal of Information Systems Pages: 237-247 Issue: 4 Volume: 4 Year: 1996 Month: 2 X-DOI: 10.1057/ejis.1996.5 File-URL: http://hdl.handle.net/10.1057/ejis.1996.5 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:4:y:1996:i:4:p:237-247 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933538_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: O Curet Author-X-Name-First: O Author-X-Name-Last: Curet Author-Name: J Elliott Author-X-Name-First: J Author-X-Name-Last: Elliott Title: Understanding transfer pricing: a case-based reasoning approach Abstract: This paper introduces the domain of transfer pricing, followed by an overview of case-based reasoning. Then, case-based reasoning is used to analyse the results of a questionnaire survey in transfer pricing. Finally, some conclusions are drawn and opportunities for future research identified. Journal: European Journal of Information Systems Pages: 97-106 Issue: 2 Volume: 6 Year: 1997 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000254 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000254 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:6:y:1997:i:2:p:97-106 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933539_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: E Christiaanse Author-X-Name-First: E Author-X-Name-Last: Christiaanse Author-Name: J Huigen Author-X-Name-First: J Author-X-Name-Last: Huigen Title: Institutional dimensions in information technology implementation in complex network settings Abstract: It is increasingly recognised that an institutional perspective can offer explanations for the success and failure of the implementation of information systems. In this paper an institutional perspective is applied to the analysis of two inter-organizational information systems in two very different institutional environments. The analysis of cultural biases, the structural order which supplies coordination mechanisms, and the driving forces of the innovation points to issues which must be taken into account during implementation of inter-organizational information systems. It is concluded that the institutional perspective offers new and promising directions for the analysis of these systems. Journal: European Journal of Information Systems Pages: 77-85 Issue: 2 Volume: 6 Year: 1997 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000258 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000258 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:6:y:1997:i:2:p:77-85 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933540_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: R C King Author-X-Name-First: R C Author-X-Name-Last: King Author-Name: V Sethi Author-X-Name-First: V Author-X-Name-Last: Sethi Title: The moderating effect of organizational commitment on burnout in information systems professionals Abstract: The study examines the moderating role of organizational commitment on the relationship between role stressors and burnout in information systems (IS) professionals. Two role stressors are examined in this study – role ambiguity and role conflict. In addition, two dimensions of organizational commitment – affective and continuance commitment – are examined for their moderating influence. The emotional exhaustion subscale of the Maslach Burnout Inventory is used to measure burnout in 312 IS professionals. Both role stressors were found to correlate positively with burnout. In addition, affective commitment was found to moderate the relationship between role stressors and burnout. Therefore, in employees with high affective commitment, role stressors had a lesser effect on burnout. This study, therefore, supports the argument that commitment acts as a buffer against stress and its antecedents. Journal: European Journal of Information Systems Pages: 86-96 Issue: 2 Volume: 6 Year: 1997 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000259 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000259 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:6:y:1997:i:2:p:86-96 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933541_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: G Premkumar Author-X-Name-First: G Author-X-Name-Last: Premkumar Author-Name: K Ramamurthy Author-X-Name-First: K Author-X-Name-Last: Ramamurthy Author-Name: M Crum Author-X-Name-First: M Author-X-Name-Last: Crum Title: Determinants of EDI adoption in the transportation industry Abstract: This study examines the impact of various environmental, organizational, and technological factors on the adoption of innovation in the context of electronic data interchange (EDI). Based on research in information technology (IT) adoption, organizational studies and marketing a comprehensive research model is developed. The model identifies eleven variables, under three broad categories (environmental, organizational, and innovation characteristics), that could potentially influence the adoption of EDI. The research variables are operationalised using multi-item indicators and data collected from a large scale field survey of 950 firms in the trucking industry. A total of 181 firms responded to the survey with near equal number of adopters and non-adopters. Multivariate discriminant analysis is used to determine the impact of each of these variables on EDI adoption. The results of data analysis indicate that four factors are important to discriminate adopters from non-adopters of EDI in the transportation industry. They are: size of the firm, competitive pressure, customer support, and top management support. Journal: European Journal of Information Systems Pages: 107-121 Issue: 2 Volume: 6 Year: 1997 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000260 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000260 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:6:y:1997:i:2:p:107-121 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933542_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: D J Grimshaw Author-X-Name-First: D J Author-X-Name-Last: Grimshaw Author-Name: P L Mott Author-X-Name-First: P L Author-X-Name-Last: Mott Author-Name: S A Roberts Author-X-Name-First: S A Author-X-Name-Last: Roberts Title: The role of context in decision making: some implications for database design Abstract: With increasing integration of computer systems through local and wide area communication networks, there exists the capability in many organizations to retrieve information from databases to support ad hoc decision making by many different users. The idea that information is a corporate resource is now something more than business school hype. But the implications of sharing data are only just dawning on the corporate mind. How do managers interpret data? Where decision making is carried out by several people, perhaps in several different locations for different purposes the same data is used in multiple decision contexts. This paper explores the role of context as a way of adding value to information from databases. Two types of context are defined and discussed in relation to some examples of decisions where the role of context is vital. These examples are taken from some empirical research conducted with users of spatial decision support systems. Here the use of background information on maps, for example roads, add context to maps which otherwise simply display statistical data. The paper concludes by suggesting a model of context based on the notion that context acts as a filter between user and database. Journal: European Journal of Information Systems Pages: 122-128 Issue: 2 Volume: 6 Year: 1997 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000261 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000261 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:6:y:1997:i:2:p:122-128 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933543_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: J Zhang Author-X-Name-First: J Author-X-Name-Last: Zhang Author-Name: R Smith Author-X-Name-First: R Author-X-Name-Last: Smith Author-Name: R B Watson Author-X-Name-First: R B Author-X-Name-Last: Watson Title: Towards computer support of the soft systems methodology: an evaluation of the functionality and usability of an SSM toolkit Abstract: In recent years a number of research projects have investigated computer support of the soft systems methodology (SSM). These typically involve the production of prototype computer-based tools supporting some aspects of SSM, although evaluation of these has been unsystematic and anecdotal. There has also been some debate in the literature about whether SSM is amenable to computer support. This paper reports a more systematic investigation of the potential for computer support of SSM and evaluation of the functionality and usability of an SSM support toolkit (SoftCase) developed by one of the authors. Following a brief review of previous research in this area, and the functionality of the SoftCase toolkit, the design of the evaluation and its outcome are described in detail. The paper concludes with a discussion of computer technology to support SSM and some possible directions for evaluating the impact of computer support on the SSM process. Journal: European Journal of Information Systems Pages: 129-139 Issue: 2 Volume: 6 Year: 1997 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000262 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000262 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:6:y:1997:i:2:p:129-139 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933611_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: B C Y Tan Author-X-Name-First: B C Y Author-X-Name-Last: Tan Author-Name: Kwok-Kee Wei Author-X-Name-First: Kwok-Kee Author-X-Name-Last: Wei Author-Name: J-E Lee-Partridge Author-X-Name-First: J-E Author-X-Name-Last: Lee-Partridge Title: Effects of facilitation and leadership on meeting outcomes in a group support system environment Abstract: This study investigates the effects of facilitation and leadership on outcomes of meetings involving group support systems (GSS). It extends existing GSS literature by examining the critical roles of facilitation and leadership simultaneously within a single study. A 2×2 factorial controlled laboratory experiment was conducted. A preference task, which had no objective correct answers, was employed. Ten five-person groups completed each treatment. Independent variables were facilitation (with vs without) and leadership (with vs without). During their meetings, facilitators and leaders carried out task and interactional interventions respectively. Dependent variables were measures of meeting success (post-meeting consensus, decision confidence, discussion quality, and process satisfaction). Results reveal that: (1) facilitation appears to raise decision confidence; (2) leadership appears to enhance discussion quality and process satisfaction; (3) in the absence of leadership, facilitation seems to lower post-meeting consensus; and (4) in the absence of facilitation, leadership seems to raise post-meeting consensus. These results are compared with findings from prior related studies. Implications of these results for practice are discussed. Journal: European Journal of Information Systems Pages: 233-246 Issue: 4 Volume: 8 Year: 1999 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000335 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000335 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:8:y:1999:i:4:p:233-246 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933612_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: J Swan Author-X-Name-First: J Author-X-Name-Last: Swan Author-Name: S Newell Author-X-Name-First: S Author-X-Name-Last: Newell Author-Name: M Robertson Author-X-Name-First: M Author-X-Name-Last: Robertson Title: The illusion of ‘best practice’ in information systems for operations management Abstract: This paper explores the adoption of information systems (IS) for operations management by manufacturing firms in four European countries. The notion of ‘best practice’ in information systems for operations management, as presented by technology suppliers (i.e. plain vanilla implementation of standard packages) is shown to be both illusory and potentially disruptive. In reality, firms usually reconfigure systems in order to use them effectively within their unique contexts. It is argued that the reason for this difference between technology supplier prescription of ‘best practice’ and user adoption of IS is because of the different interests of these two groups. Tensions exist at the interface between users who have unique manufacturing problems and demand flexible or customised information systems, and technology suppliers who have interests in promoting and supporting standardised solutions or methodologies. User firms need to recognise and address these tensions early when thinking about IS design. Journal: European Journal of Information Systems Pages: 284-293 Issue: 4 Volume: 8 Year: 1999 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000336 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000336 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:8:y:1999:i:4:p:284-293 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933613_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: R D Macredie Author-X-Name-First: R D Author-X-Name-Last: Macredie Author-Name: C Sandom Author-X-Name-First: C Author-X-Name-Last: Sandom Title: IT-enabled change: evaluating an improvisational perspective Abstract: This paper presents an empirical study into a hierarchical organization's experience with the adoption and use of an adaptive information technology, in this case a workflow application. The paper takes an improvisational perspective on the change process and assesses it through a case study which examines the organization's experiences in terms of anticipated, opportunity-based and emergent changes to their processes, structure and culture that were enabled by the introduction of the workflow application. The findings build upon Orlikowski and Hofman's improvisational change model by evaluating the model in a different organizational context to that of the original study. The findings reveal that ongoing improvisational changes can occur in hierarchical organizations and that improvisations and adaptations can occur in organizations which adopt adaptive IT provided that ongoing support for change management is forthcoming. The findings also suggest that there is a correlation between the level of customer dissatisfaction and the emergence of any local improvisations regardless of the organization type. This implies that an improvisational perspective may be useful for hierarchical organizations which introduce new technology as the local improvisations which can occur may be leveraged for advantage. The study also raises important questions about the categorisation of technologies as adaptive and critically reflects on this aspect of the improvisational change model. Journal: European Journal of Information Systems Pages: 247-259 Issue: 4 Volume: 8 Year: 1999 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000337 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000337 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:8:y:1999:i:4:p:247-259 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933614_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: J Fisher Author-X-Name-First: J Author-X-Name-Last: Fisher Title: Improving the usability of information systems: the role of the technical communicator Abstract: A successful information system implementation requires effective logical analysis, sound technical construction, effective design for users and successful change management during implementation. If these conditions are not present then in all probability the system will be a failure. Ensuring a system is successful from a user's perspective is primarily about usability. There are many aspects of information system design that impact on usability including: online help, the design of the user interface, system and error messages. These aspects need consideration early in the development cycle. This paper discusses the need for improved usability design in information systems and presents results of recent research which examined the role of technical communicators in systems development and explored the extent to which their work improved system usability. The study found that from a user's perspective an improved system results when technical communicators are involved particularly in the early stages of the development process. Journal: European Journal of Information Systems Pages: 294-303 Issue: 4 Volume: 8 Year: 1999 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000338 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000338 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:8:y:1999:i:4:p:294-303 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933615_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: B E Munkvold Author-X-Name-First: B E Author-X-Name-Last: Munkvold Title: Challenges of IT implementation for supporting collaboration in distributed organizations Abstract: The study focuses on the implementation of information technology (IT) for supporting collaboration in distributed organizations, i.e. organizations consisting of two or more semi-autonomous units in different geographical locations. Six case studies of IT implementation projects have been conducted, focusing on the challenges in the implementation process as seen from the perspective of the implementation team. Being of an exploratory nature, the study has identified a large number of issues that have influenced the different stages in the implementation process. The implementation context studied is found to imply several additional challenges for the implementation team, compared to ‘traditional’ intra-organizational IT implementation. This is a result of greater autonomy among the participating units, heterogeneous technological platforms and logistical barriers in the implementation activities. Resistance from the organizational units, technological incompatibility and lack of incentives for adopting new work practices, are identified as major barriers in the implementation. In general, the implementation is found to require a process of maturation, where implementers and adopters gradually develop an understanding of how the technology can support the organizational needs. Journal: European Journal of Information Systems Pages: 260-272 Issue: 4 Volume: 8 Year: 1999 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000340 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000340 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:8:y:1999:i:4:p:260-272 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933616_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: E Huerta Author-X-Name-First: E Author-X-Name-Last: Huerta Author-Name: P J Sánchez Author-X-Name-First: P J Author-X-Name-Last: Sánchez Title: Evaluation of information technology: strategies in Spanish firms Abstract: The aim of this article is to analyse the guidelines followed by Spanish companies when evaluating the investment in information technology, in order to establish different evaluation typologies. It will be a detailed description of four Spanish firms, chosen by their distinctive characteristics from a study of twenty, taking into account the various stages of development of information technology within each firm. The study will be done in the framework of the contextual interpretation of the evaluation where the context, process and content aspects deserve main considerations. Journal: European Journal of Information Systems Pages: 273-283 Issue: 4 Volume: 8 Year: 1999 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000341 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000341 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:8:y:1999:i:4:p:273-283 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933558_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ludwik Finkelstein Author-X-Name-First: Ludwik Author-X-Name-Last: Finkelstein Title: General Systems Theory: An introduction Journal: European Journal of Information Systems Pages: 75-75 Issue: 1 Volume: 7 Year: 1998 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000272 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000272 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:7:y:1998:i:1:p:75-75 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933559_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: F-A Allaert Author-X-Name-First: F-A Author-X-Name-Last: Allaert Author-Name: B Barber Author-X-Name-First: B Author-X-Name-Last: Barber Title: Some systems implications of EU Data Protection Directive Journal: European Journal of Information Systems Pages: 1-4 Issue: 1 Volume: 7 Year: 1998 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000278 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000278 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:7:y:1998:i:1:p:1-4 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933560_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Michael Braithwaite Author-X-Name-First: Michael Author-X-Name-Last: Braithwaite Title: User-Driven Innovation—The World's First Business Computer Journal: European Journal of Information Systems Pages: 74-74 Issue: 1 Volume: 7 Year: 1998 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000279 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000279 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:7:y:1998:i:1:p:74-74 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933561_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: L P Willcocks Author-X-Name-First: L P Author-X-Name-Last: Willcocks Author-Name: T Kern Author-X-Name-First: T Author-X-Name-Last: Kern Title: IT outsourcing as strategic partnering: the case of the UK Inland Revenue Abstract: The information systems (IS) literature, and the industry sectors confronted with information technology (IT) outsourcing, are beginning to perceive IT outsourcing as more than just a necessary organizational resource-acquisition venture. Instead organizations have begun to consider vendors as their partners, causing many companies to enter into more intricate deals that include both contractual and informal issues. In light of these developments, a growing concern with forming closer client–vendor relationships has evolved for both vendors and clients. This paper explores, in the context of a case study, three critical dimensions emerging from previous studies. These are: what is outsourced; the contract; and the relationship dimension. We also explore the process and management issues underlying these dimensions. The investigation is enabled through two analytical frameworks, one proven in previous research, one exploratory, but both specifically developed for IT outsourcing arrangements. Journal: European Journal of Information Systems Pages: 29-45 Issue: 1 Volume: 7 Year: 1998 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000284 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000284 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:7:y:1998:i:1:p:29-45 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933562_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: J A A Sillince Author-X-Name-First: J A A Author-X-Name-Last: Sillince Author-Name: S Mouakket Author-X-Name-First: S Author-X-Name-Last: Mouakket Title: Divisive and integrative political strategies in the IS adaptation process: the MAC Initiative Abstract: The MAC Initiative project is described as seen through the eyes of users at one university. These subjective interpretations are described in terms of five different assumptions about politics and power. We show that information system users and developers hold multiple perspectives of events and switch between them in order to empathise with others, and that it is this perspective switching which enables them to behave coherently. One advantage of this ability to switch perspectives is shown by the software developer's ability to switch from a ‘zero sum’ perspective (a divisive political strategy) to a ‘socially shaped’ perspective (an integrative political strategy) as a means of managing the adaptation process. Journal: European Journal of Information Systems Pages: 46-60 Issue: 1 Volume: 7 Year: 1998 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000286 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000286 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:7:y:1998:i:1:p:46-60 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933563_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: C Fearon Author-X-Name-First: C Author-X-Name-Last: Fearon Author-Name: G Philip Author-X-Name-First: G Author-X-Name-Last: Philip Title: Self assessment as a means of measuring strategic and operational benefits from EDI: the development of a conceptual framework Abstract: This paper evaluates the benefit success associated with Electronic Data Interchange (EDI) from nine leading companies in Northern Ireland through a process of self assessment. The procedure involves a comparison of pre-implementation benefit expectations with post-implementation perceptions of realised benefits. Three ‘benefit states’ are used to denote the degree of the gap between expectations and perceptions of realised benefits. If a shortfall or negative gap is experienced throughout a company as a whole, then this benefit state is described as a ‘deficiency’. If there is no gap and a company receives what it expected then this benefit state is termed ‘neutrality’. If the perceived realised benefit, on the other hand, exceeded the original benefit expectations, then this benefit state is regarded as ‘efficiency’. Assessment results from a benefit rating instrument and personal interviews indicate that ‘deficiency’ is the benefit state which is prevalent for most companies. A ‘benefit success matrix’ is used to illustrate the relationship between: benefit states, implementation success and the implementation approach. The application of benefit states to the benefit success matrix can be used as a retrospective self evaluation tool for companies to consider the mix of factors required for achieving successful EDI development. Journal: European Journal of Information Systems Pages: 5-16 Issue: 1 Volume: 7 Year: 1998 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000287 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000287 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:7:y:1998:i:1:p:5-16 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933564_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: T Jones Author-X-Name-First: T Author-X-Name-Last: Jones Author-Name: S F King Author-X-Name-First: S F Author-X-Name-Last: King Title: Flexible systems for changing organizations: implementing RAD Abstract: Rapid application development (RAD) promises to deliver high quality applications quickly. But the approach relies on close partnerships between IT staff and business users which may not be easy to achieve in the current climate of rapidly fragmenting organizations and, like all major innovations, RAD implementation must be managed carefully over an extended time period in order to become fully instutionalised. In this paper RAD implementation at two large UK organizations is described. One has failed to institutionalise RAD, the other has succeeded. The key lessons from this work are that even basic RAD tools and techniques can deliver benefits; that RAD implementors need to be given time to learn through experience of use; that a permanent methods group can help to stimulate RAD learning and act as a linking mechanism between successive information system (IS) development projects; that a RAD framework should be prescriptive and that an education programme which explains both the role of the information technology (IT) specialist and the business user should be pursued vigorously. Journal: European Journal of Information Systems Pages: 61-73 Issue: 1 Volume: 7 Year: 1998 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000289 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000289 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:7:y:1998:i:1:p:61-73 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933565_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: R Baskerville Author-X-Name-First: R Author-X-Name-Last: Baskerville Author-Name: J Pries-Heje Author-X-Name-First: J Author-X-Name-Last: Pries-Heje Title: Information technology diffusion: building positive barriers Abstract: This paper demonstrates how to build positive barriers to the diffusion of an information technology innovation. Positive barriers are desirable elements that disable the diffusion of an innovation to an undesired set of potential adopters. System developers are motivated in many ways to construct such positive barriers, for example, by security and privacy of proprietary innovations. This paper draws on the broad research that has illuminated the enabling factors in the diffusion of information technology, and shows how selected examples of these factors can also be applied in usefully constructing barriers against diffusion. Journal: European Journal of Information Systems Pages: 17-28 Issue: 1 Volume: 7 Year: 1998 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000290 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000290 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:7:y:1998:i:1:p:17-28 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934213_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Laurie McLeod Author-X-Name-First: Laurie Author-X-Name-Last: McLeod Author-Name: Bill Doolin Author-X-Name-First: Bill Author-X-Name-Last: Doolin Title: Information systems development as situated socio-technical change: a process approach Abstract: We outline a process approach for conducting qualitative research on how contemporary information systems (IS) development is enacted in practice. The approach involves a longitudinal case study to obtain rich data from which a detailed process narrative is produced. The narrative is informed by a conceptual model of IS development as situated socio-technical change, generating a theoretical explanation that highlights the temporal, emergent and contingent nature of IS development. This approach extends prior process studies of IS development by focusing on micro-level project activities, examining change as a continuous process and theorising IS change as the outcome of a dynamic trajectory of situated and socio-technical interactions. The methodological approach developed here can be used by other researchers to inform process studies of this complex organisational phenomenon. Journal: European Journal of Information Systems Pages: 176-191 Issue: 2 Volume: 21 Year: 2012 Month: 3 X-DOI: 10.1057/ejis.2011.43 File-URL: http://hdl.handle.net/10.1057/ejis.2011.43 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:2:p:176-191 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934214_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Robert D Galliers Author-X-Name-First: Robert D Author-X-Name-Last: Galliers Author-Name: Jimmy C Huang Author-X-Name-First: Jimmy C Author-X-Name-Last: Huang Title: The teaching of qualitative research methods in information systems: an explorative study utilizing learning theory Abstract: Empirical evidence suggests that the Information Systems field continues to be dominated by the positivist paradigm and the use of quantitative methods. This is so despite the diversity of research methods available, the emergence of an interpretivist tradition, and some isolated examples of methodological pluralism. While there have been significant contributions in guiding qualitative research methods teaching, little research has been undertaken that considers the training actually provided, and the possible impacts this may have on the quality and quantity of qualitative research articles in our journals. This explorative study aims to provide some insight into what training is provided, the issues confronted, and possible impediments to publishing qualitative research. Data were collected from interviews with a panel of international colleagues who have a range of experience in teaching and applying qualitative methods. Grounded Theory is used to identify emergent and interconnected themes. Experiential and social learning lenses are used to reflect on the results, providing some initial understanding of the complexities of teaching and undertaking qualitative research. Theoretical as well as practical contributions are made regarding the means by which qualitative research may be introduced, developed and extended within the IS academy, and further theorisation of social and experiential learning. Journal: European Journal of Information Systems Pages: 119-134 Issue: 2 Volume: 21 Year: 2012 Month: 3 X-DOI: 10.1057/ejis.2011.44 File-URL: http://hdl.handle.net/10.1057/ejis.2011.44 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:2:p:119-134 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934215_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Nikolaos Papas Author-X-Name-First: Nikolaos Author-X-Name-Last: Papas Author-Name: Robert M O'Keefe Author-X-Name-First: Robert M Author-X-Name-Last: O'Keefe Author-Name: Philip Seltsikas Author-X-Name-First: Philip Author-X-Name-Last: Seltsikas Title: The action research vs design science debate: reflections from an intervention in eGovernment Abstract: As Design Science (DS) establishes itself as an acceptable approach to Information Systems research, many have commented on the similarity, or otherwise, between DS and Action Research (AR). Most of the writing on this topic has been conceptual, and not grounded in practice. In this paper, we present a piece of completed research that was perceived and executed as AR, but also reflected upon as DS. The research produced a new method for diagramming electronic workflows and creating the associated digital signatures, within the domain of eGovernment. Our conclusion is that AR that produces an artefact can be quite easily, and perhaps superficially, presented as DS. Epistemologically, there is little to separate the two methodologies. However, there are some subtle differences in practice, especially with regard to the role of the artefact, the structuring of the process, the focus of evaluation of the intervention and research, and the emphasis on learning and knowledge. We provide guidance to researchers contemplating either approach, and also consider the role of pluralist attempts to combine the approaches. Journal: European Journal of Information Systems Pages: 147-159 Issue: 2 Volume: 21 Year: 2012 Month: 3 X-DOI: 10.1057/ejis.2011.50 File-URL: http://hdl.handle.net/10.1057/ejis.2011.50 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:2:p:147-159 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934216_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Christopher T Street Author-X-Name-First: Christopher T Author-X-Name-Last: Street Author-Name: Kerry W Ward Author-X-Name-First: Kerry W Author-X-Name-Last: Ward Title: Improving validity and reliability in longitudinal case study timelines Abstract: Management Information Systems researchers rely on longitudinal case studies to investigate a variety of phenomena such as systems development, system implementation, and information systems-related organizational change. However, insufficient attention has been spent on understanding the unique validity and reliability issues related to the timeline that is either explicitly or implicitly required in a longitudinal case study. In this paper, we address three forms of longitudinal timeline validity: time unit validity (which deals with the question of how to segment the timeline – weeks, months, years, etc.), time boundaries validity (which deals with the question of how long the timeline should be), and time period validity (which deals with the issue of which periods should be in the timeline). We also examine timeline reliability, which deals with the question of whether another judge would have assigned the same events to the same sequence, categories, and periods. Techniques to address these forms of longitudinal timeline validity include: matching the unit of time to the pace of change to address time unit validity, use of member checks and formal case study protocol to address time boundaries validity, analysis of archival data to address both time unit and time boundary validity, and the use of triangulation to address timeline reliability. The techniques should be used to design, conduct, and report longitudinal case studies that contain valid and reliable conclusions. Journal: European Journal of Information Systems Pages: 160-175 Issue: 2 Volume: 21 Year: 2012 Month: 3 X-DOI: 10.1057/ejis.2011.53 File-URL: http://hdl.handle.net/10.1057/ejis.2011.53 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:2:p:160-175 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934217_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Göran Goldkuhl Author-X-Name-First: Göran Author-X-Name-Last: Goldkuhl Title: Pragmatism vs interpretivism in qualitative information systems research Abstract: Qualitative research is often associated with interpretivism, but alternatives do exist. Besides critical research and sometimes positivism, qualitative research in information systems can be performed following a paradigm of pragmatism. This paradigm is associated with action, intervention and constructive knowledge. This paper has picked out interpretivism and pragmatism as two possible and important research paradigms for qualitative research in information systems. It clarifies each paradigm in an ideal-typical fashion and then conducts a comparison revealing commonalities and differences. It is stated that a qualitative researcher must either adopt an interpretive stance aiming towards an understanding that is appreciated for being interesting; or a pragmatist stance aiming for constructive knowledge that is appreciated for being useful in action. The possibilities of combining pragmatism and interpretivism in qualitative research in information systems are analysed. A research case (conducted through action research (AR) and design research (DR)) that combines interpretivism and pragmatism is used as an illustration. It is stated in the paper that pragmatism has influenced IS research to a fairly large extent, albeit in a rather implicit way. The paradigmatic foundations are seldom known and explicated. This paper contributes to a further clarification of pragmatism as an explicit research paradigm for qualitative research in information systems. Pragmatism is considered an appropriate paradigm for AR and DR. Journal: European Journal of Information Systems Pages: 135-146 Issue: 2 Volume: 21 Year: 2012 Month: 3 X-DOI: 10.1057/ejis.2011.54 File-URL: http://hdl.handle.net/10.1057/ejis.2011.54 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:2:p:135-146 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934218_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mike Chiasson Author-X-Name-First: Mike Author-X-Name-Last: Chiasson Author-Name: Elizabeth Davidson Author-X-Name-First: Elizabeth Author-X-Name-Last: Davidson Title: Reconsidering deconstruction in information systems research Abstract: Deconstruction, a post-structuralist approach to examining language in texts, is most often associated with the philosophical works of Jacque Derrida. After a flurry of interest among management and information systems (IS) scholars, this qualitative approach to exploring organizational texts has received little attention in the IS literature. We suggest deconstruction could help our field explore how IS texts describe the social and technical past and also prescribe and circumscribe the future of IS practice. Thus, we suggest the IS field reconsider how deconstruction might contribute to language-based approaches in IS research and practice. In this paper, we discuss deconstruction in light of the linguistic turn in social science research and the support and criticism for its use in management research. We consider IS research publications that have employed deconstruction explicitly, examine a well-known IS publication as an example of the deconstruction of IS texts, and suggest ways in which deconstruction might be applied to various genres of IS texts to inspire insights and creativity. To conclude, we highlight considerations for researchers who might adopt this approach and for the editors and reviewers who would evaluate qualitative research papers that employ deconstruction. Journal: European Journal of Information Systems Pages: 192-206 Issue: 2 Volume: 21 Year: 2012 Month: 3 X-DOI: 10.1057/ejis.2011.55 File-URL: http://hdl.handle.net/10.1057/ejis.2011.55 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:2:p:192-206 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934219_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Kieran Conboy Author-X-Name-First: Kieran Author-X-Name-Last: Conboy Author-Name: Guy Fitzgerald Author-X-Name-First: Guy Author-X-Name-Last: Fitzgerald Author-Name: Lars Mathiassen Author-X-Name-First: Lars Author-X-Name-Last: Mathiassen Title: Qualitative methods research in information systems: motivations, themes, and contributions Journal: European Journal of Information Systems Pages: 113-118 Issue: 2 Volume: 21 Year: 2012 Month: 3 X-DOI: 10.1057/ejis.2011.57 File-URL: http://hdl.handle.net/10.1057/ejis.2011.57 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:2:p:113-118 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934337_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Aaron Baird Author-X-Name-First: Aaron Author-X-Name-Last: Baird Author-Name: T S Raghu Author-X-Name-First: T S Author-X-Name-Last: Raghu Title: Associating consumer perceived value with business models for digital services Abstract: As digital services increasingly deal with commodity offerings (i.e., digital content and features that are similar between service providers), service providers are seeking to differentiate themselves with variations in their digital service business models. Research, though, has yet to consider the association of consumer perceived value with digital service business models underlying technological innovations. We seek to demonstrate that consumer value for digital service business models may be quite different even when consumers have similar preferences for standard technology characteristics. In the context of this paper, we specifically consider consumer perceived value associated with Personal Health Records (PHRs) and PHR digital business models, through the use of an integrated latent variable and choice empirical model. We find that although consumer perceived value for PHRs is generally high, when offered a choice between three competing PHR business models, consumers state high value for only two of the business models in the choice set: PHRs offered directly by groups of medical providers and Integrated PHRs. These findings suggest that while perceived value may be high for generally considered digital services, variations in the underlying digital service business models are likely to have significant impacts on consumer valuations of digital services. Journal: European Journal of Information Systems Pages: 4-22 Issue: 1 Volume: 24 Year: 2015 Month: 1 X-DOI: 10.1057/ejis.2013.12 File-URL: http://hdl.handle.net/10.1057/ejis.2013.12 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:1:p:4-22 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934338_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Srinarayan Sharma Author-X-Name-First: Srinarayan Author-X-Name-Last: Sharma Author-Name: Arun Rai Author-X-Name-First: Arun Author-X-Name-Last: Rai Title: Adopting IS process innovations in organizations: the role of IS leaders’ individual factors and technology perceptions in decision making Abstract: While there is a rich body of literature on information system (IS) innovations, there is a limited understanding of the role IS leaders’ individual factors and their appraisals of technological factors play in organizations’ adoption of IS innovations. We address these gaps in the IS literature by focusing on an IS process innovation – namely, computer-aided software engineering (CASE) – which is targeted at the core activities of systems development/maintenance in IS departments. We specifically examine how organizations’ CASE adoption decision is impacted by (1) two individual factors of IS leaders (i.e., leaders’ hierarchical position and job tenure) and (2) their perceptions of technological factors (i.e., relative advantage and technological complexity of CASE). Data were gathered from IS leaders at 350 organizations in the United States using a national cross-sectional survey. The findings suggest that IS leaders’ hierarchical position and their job tenure significantly differentiate CASE adopters from non-adopters. IS leaders at lower levels of the organizational hierarchy and with shorter job tenure made the adoption decisions in adopter organizations, while IS leaders at higher levels of the organizational hierarchy and with longer job tenure made the adoption decisions in non-adopter organizations. The findings also reveal that relative advantage has two dimensions – namely, perceived efficacy advantage and perceived efficiency advantage – and IS leaders’ evaluation of the perceived efficacy advantage of CASE differentiates adopters from non-adopters. The study has important implications for our theoretical and practical understanding of the factors related to IS leaders that are influential in the organizational adoption of IS innovations. Journal: European Journal of Information Systems Pages: 23-37 Issue: 1 Volume: 24 Year: 2015 Month: 1 X-DOI: 10.1057/ejis.2013.24 File-URL: http://hdl.handle.net/10.1057/ejis.2013.24 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:1:p:23-37 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934339_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: William J Kettinger Author-X-Name-First: William J Author-X-Name-Last: Kettinger Author-Name: Yuan Li Author-X-Name-First: Yuan Author-X-Name-Last: Li Author-Name: Joshua M Davis Author-X-Name-First: Joshua M Author-X-Name-Last: Davis Author-Name: Lynda Kettinger Author-X-Name-First: Lynda Author-X-Name-Last: Kettinger Title: The roles of psychological climate, information management capabilities, and IT support on knowledge-sharing: an MOA perspective Abstract: Leveraging the motivation-opportunity-ability (MOA) theoretical framework and past research on psychological climate, this study analyzes three antecedent factors driving an individual’s knowledge-sharing (KS) within organizations: knowledge-sharing psychological climate as motivation, information management capability as ability, and organizational information technology support as opportunity. An empirical examination reveals that a motivating psychological climate has a primary impact on KS behavior, and the impact of perceived information management capability on sharing is mediated by the psychological climate. Perceived organizational use of information technology to support knowledge work bears strong influence on information management capabilities but not on sharing, suggesting that investment in IT does have indirect payoffs. The study is the first to position the opportunity→ability→motivation causal network in an individual’s KS behavior. The findings suggest that managers need to consider the pre-requisite roles of IT-enabled opportunities and workers’ information management abilities when building an all-important motivating climate to share. Journal: European Journal of Information Systems Pages: 59-75 Issue: 1 Volume: 24 Year: 2015 Month: 1 X-DOI: 10.1057/ejis.2013.25 File-URL: http://hdl.handle.net/10.1057/ejis.2013.25 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:1:p:59-75 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934340_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Aggeliki Tsohou Author-X-Name-First: Aggeliki Author-X-Name-Last: Tsohou Author-Name: Maria Karyda Author-X-Name-First: Maria Author-X-Name-Last: Karyda Author-Name: Spyros Kokolakis Author-X-Name-First: Spyros Author-X-Name-Last: Kokolakis Author-Name: Evangelos Kiountouzis Author-X-Name-First: Evangelos Author-X-Name-Last: Kiountouzis Title: Managing the introduction of information security awareness programmes in organisations Abstract: Several studies explore information security awareness focusing on individual and/or organisational aspects. This paper argues that security awareness processes are associated with interrelated changes that occur at the organisational, the technological and the individual level. We introduce an integrated analytical framework that has been developed through action research in a public sector organisation, comprising actor-network theory (ANT), structuration theory and contextualism. We develop and use this framework to analyse and manage changes introduced by the implementation of a security awareness programme in the research setting. The paper illustrates the limitations of each theory (ANT, structuration theory and contextualism) to study multi-level changes when used individually, demonstrates the synergies of the three theories, and proposes how they can be used to study and manage awareness-related changes at the individual, organisational and technological level. Journal: European Journal of Information Systems Pages: 38-58 Issue: 1 Volume: 24 Year: 2015 Month: 1 X-DOI: 10.1057/ejis.2013.27 File-URL: http://hdl.handle.net/10.1057/ejis.2013.27 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:1:p:38-58 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934341_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Sabine Matook Author-X-Name-First: Sabine Author-X-Name-Last: Matook Author-Name: Susan A Brown Author-X-Name-First: Susan A Author-X-Name-Last: Brown Author-Name: Johanna Rolf Author-X-Name-First: Johanna Author-X-Name-Last: Rolf Title: Forming an intention to act on recommendations given via online social networks Abstract: Online social networks (OSN) are technology-enabled relationship tools in which a user creates a profile, connects to other individuals, and shares user-generated content with them. One of the many features OSN offer is the ability to post messages in the form of product and service recommendations. Although word-of-mouth research has examined this type of personal communication to intentionally influence consumer decisions, limited understanding exists regarding when a user acts upon a recommendation received from one of their contacts. In this study, we draw on relationship theories and research on trust to analyze the impact relationship characteristics and behaviors of the OSN contacts have on trust in the recommendation that subsequently leads a user to act on this OSN contact’s recommendation. The results of a survey of 116 OSN users showed that closeness, excessive posting behavior, and past recommendation experience have a positive impact on trust and intention to act on the recommendation. One characteristic of the relationships, that is, similarity, however, does not affect recommendation trust in the context of OSN. The findings enhance our understanding of relationships and their defining characteristics in OSN. The results also provide insights into how companies might leverage OSN in their marketing efforts. Journal: European Journal of Information Systems Pages: 76-92 Issue: 1 Volume: 24 Year: 2015 Month: 1 X-DOI: 10.1057/ejis.2013.28 File-URL: http://hdl.handle.net/10.1057/ejis.2013.28 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:1:p:76-92 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934342_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Rui Chen Author-X-Name-First: Rui Author-X-Name-Last: Chen Author-Name: Sushil K Sharma Author-X-Name-First: Sushil K Author-X-Name-Last: Sharma Title: Learning and self-disclosure behavior on social networking sites: the case of Facebook users Abstract: This paper studies Facebook users’ learning-based attitude formation and the relationship between member attitude and self-disclosure. Through the theoretical lens of learning theories, we recognize the key antecedents to member attitude toward a social networking as stemming from classical conditioning, operant conditioning, and social learning-related factors. In addition, we explore the underlying process through which member attitude affects self-disclosure extent and theorize the mediating role of site usage rate on the relationship between attitude and self-disclosure extent. Analysis of 822 survey data results provides strong support for the role of learning theories in explaining Facebook members’ attitude development. The results also confirm a significant, partial mediating effect of site usage rate. A series of post-hoc analyses on gender difference further reveal that attitude formation mechanisms remain constant between male and female Facebook users; gender difference exists on the association between attitude and self-disclosure extent and the association between site usage rate and self-disclosure extent; and the mediating effect of site usage rate exists in male user group only. Our research, therefore, contributes to the literature on social networking sites, as well as providing behavioral analysis useful to the service providers of these sites. Journal: European Journal of Information Systems Pages: 93-106 Issue: 1 Volume: 24 Year: 2015 Month: 1 X-DOI: 10.1057/ejis.2013.31 File-URL: http://hdl.handle.net/10.1057/ejis.2013.31 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:1:p:93-106 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934343_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Juhani Iivari Author-X-Name-First: Juhani Author-X-Name-Last: Iivari Title: Distinguishing and contrasting two strategies for design science research Abstract: This paper distinguishes and contrasts two design science research strategies in information systems. In the first strategy, a researcher constructs or builds an IT meta-artefact as a general solution concept to address a class of problem. In the second strategy, a researcher attempts to solve a client’s specific problem by building a concrete IT artefact in that specific context and distils from that experience prescriptive knowledge to be packaged into a general solution concept to address a class of problem. The two strategies are contrasted along 16 dimensions representing the context, outcomes, process and resource requirements. Journal: European Journal of Information Systems Pages: 107-115 Issue: 1 Volume: 24 Year: 2015 Month: 1 X-DOI: 10.1057/ejis.2013.35 File-URL: http://hdl.handle.net/10.1057/ejis.2013.35 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:1:p:107-115 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934344_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Dov Te'eni Author-X-Name-First: Dov Author-X-Name-Last: Te'eni Title: Challenges in learning and improving continuously Journal: European Journal of Information Systems Pages: 1-3 Issue: 1 Volume: 24 Year: 2015 Month: 1 X-DOI: 10.1057/ejis.2014.37 File-URL: http://hdl.handle.net/10.1057/ejis.2014.37 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:24:y:2015:i:1:p:1-3 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934153_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Gholamreza Torkzadeh Author-X-Name-First: Gholamreza Author-X-Name-Last: Torkzadeh Author-Name: Jerry Cha-Jan Chang Author-X-Name-First: Jerry Cha-Jan Author-X-Name-Last: Chang Author-Name: Andrew M Hardin Author-X-Name-First: Andrew M Author-X-Name-Last: Hardin Title: Usage and impact of technology enabled job learning Abstract: Individuals use technology to experiment with new ways of carrying out their tasks and in doing so they learn more about their jobs. The current study examines the role of technology enabled job learning as a key component in the complex relationship between information systems use and technology outcomes. Data from 308 end-users were analyzed to evaluate the relationships between system use and technology enabled job learning, and technology enabled job learning and technology outcomes. Technology enabled job learning was conceptualized in terms of how computer applications helped individuals learn and better perform their jobs. System use was conceptualized in terms of decision support, work integration, and customer service. Technology outcomes were conceptualized in terms of management control, task innovation, task productivity, and customer satisfaction. Results suggest that systems use has a significant, positive effect on job learning, and that job learning has a significant, positive effect on technology outcomes. Post hoc analyses were then conducted to examine the potential mediating role of job learning between systems use and technology outcomes. The findings from this research lead to a greater understanding of how patterns of systems use influence organizationally relevant outcomes through technology-enabled job learning. Journal: European Journal of Information Systems Pages: 69-86 Issue: 1 Volume: 20 Year: 2011 Month: 1 X-DOI: 10.1057/ejis.2010.46 File-URL: http://hdl.handle.net/10.1057/ejis.2010.46 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:1:p:69-86 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934154_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Robin L Wakefield Author-X-Name-First: Robin L Author-X-Name-Last: Wakefield Author-Name: Kirk L Wakefield Author-X-Name-First: Kirk L Author-X-Name-Last: Wakefield Author-Name: Julie Baker Author-X-Name-First: Julie Author-X-Name-Last: Baker Author-Name: Liz C Wang Author-X-Name-First: Liz C Author-X-Name-Last: Wang Title: How website socialness leads to website use Abstract: Website designers are beginning to incorporate social cues, such as helpfulness and familiarity, into e-commerce sites to facilitate the exchange relationship. Website socialness elicits a social response from users of the site and this response produces enjoyment. Users patronize websites that are exciting, entertaining and stimulating. The purpose of our study is to explore the effects of website socialness perceptions on the formation of users’ beliefs, attitudes and subsequent behavioral intentions. We manipulate website socialness perceptions across two different online shopping contexts, one for functional products and the other for pleasure-oriented products, and draw from the responses of 300 Internet users. Our findings show that website socialness perceptions lead to enjoyment, have a strong influence on user intentions and these effects are invariant across shopping contexts. Journal: European Journal of Information Systems Pages: 118-132 Issue: 1 Volume: 20 Year: 2011 Month: 1 X-DOI: 10.1057/ejis.2010.47 File-URL: http://hdl.handle.net/10.1057/ejis.2010.47 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:1:p:118-132 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934155_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Nita G Brooks Author-X-Name-First: Nita G Author-X-Name-Last: Brooks Author-Name: Cindy K Riemenschneider Author-X-Name-First: Cindy K Author-X-Name-Last: Riemenschneider Author-Name: Bill C Hardgrave Author-X-Name-First: Bill C Author-X-Name-Last: Hardgrave Author-Name: Anne M O'Leary-Kelly Author-X-Name-First: Anne M Author-X-Name-Last: O'Leary-Kelly Title: IT professional identity: needs, perceptions, and belonging Abstract: A theoretical model of professional identification is developed and empirically examined as a means to understanding information technology (IT) workers’ attachment to the IT profession. Professional identification represents oneness with or belonging to a profession and provides a unique means of investigating and evaluating the IT profession. Results from a survey of 305 IT workers indicate that professional identification is directly impacted by three factors: (1) the individual's need for professional identification; (2) the individual's perceived similarity to others in the IT profession; and (3) the individual's perceptions of the IT profession, signifying the importance of internalization to identification. Professional identification is also indirectly impacted by the public's perception of the IT profession. Journal: European Journal of Information Systems Pages: 87-102 Issue: 1 Volume: 20 Year: 2011 Month: 1 X-DOI: 10.1057/ejis.2010.48 File-URL: http://hdl.handle.net/10.1057/ejis.2010.48 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:1:p:87-102 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934156_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jonny Holmström Author-X-Name-First: Jonny Author-X-Name-Last: Holmström Author-Name: Steven Sawyer Author-X-Name-First: Steven Author-X-Name-Last: Sawyer Title: Requirements engineering blinders: exploring information systems developers’ black-boxing of the emergent character of requirements Abstract: In this paper we focus empirical and conceptual attention on the social construction of information systems (IS) requirements, and illustrate that IS developers too often choose to ignore, and thus effectively black-box, the complexities of gathering requirements in order to simplify both the difficulties of their work and their relations with customers. The empirical contribution of this paper is evidence drawn from a study of how IS developers pursue requirements engineering and how they conceive its value. The factors we found to be important in this process include: the changing needs of the organization, the ways in which structured IS methods are enacted via experience and social competency, the formation of project groups, and finally engagement in interpersonal conflict and negotiations. Our conceptual contribution is theorization on the nature of developing requirements as a process of social learning. Journal: European Journal of Information Systems Pages: 34-47 Issue: 1 Volume: 20 Year: 2011 Month: 1 X-DOI: 10.1057/ejis.2010.51 File-URL: http://hdl.handle.net/10.1057/ejis.2010.51 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:1:p:34-47 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934157_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Colin Onita Author-X-Name-First: Colin Author-X-Name-Last: Onita Author-Name: Jasbir Dhaliwal Author-X-Name-First: Jasbir Author-X-Name-Last: Dhaliwal Title: Alignment within the corporate IT unit: an analysis of software testing and development Abstract: Strategic alignment between an organization's business strategy/capabilities and those of its information technology (IT) unit is an extensively researched subject that addresses the issue of fit between business and technology strategies. A key gap in the literature is lack of recognition that underlying this macro level of alignment are other, more granular levels of alignment involving the interdependent subunits within the corporate IT unit. Given the critical interdependencies between development and testing subunits in software engineering, this paper focuses on an alignment model for ensuring that these two functions work together effectively. A development-testing alignment (DTA) model is described, and a case study investigating its value and application is presented. This DTA is decomposed into distinct components for the purposes of theoretical clarity and pragmatic application. The case study analysis uses the model to understand and interpret development-testing alignment in a Fortune 500 company. We found that the development and testing functions were significantly misaligned, and our model identified close to twenty specific aspects that needed to be considered to enhance alignment. These included changes in specificity of scope, governance, resource availability, competencies, and processes. Our analysis shows that the DTA model can be usefully applied for the purpose of understanding tactical alignment between subunits within a corporate IT unit. It also demonstrates that there is value in considering alignment as a dynamic, context-driven, social phenomenon as well as a useful interpretative lens for exploring organizational interactions and interdependencies. Journal: European Journal of Information Systems Pages: 48-68 Issue: 1 Volume: 20 Year: 2011 Month: 1 X-DOI: 10.1057/ejis.2010.52 File-URL: http://hdl.handle.net/10.1057/ejis.2010.52 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:1:p:48-68 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934158_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Lior Fink Author-X-Name-First: Lior Author-X-Name-Last: Fink Title: How do IT capabilities create strategic value? Toward greater integration of insights from reductionistic and holistic approaches Abstract: After more than two decades of intensive research, researchers are still struggling to explain the strategic value of information technology (IT) capabilities. The current study suggests that sufficient advancement has not been made in this area of research because of the gap between the richness of theoretical formulations and the minimalism of the reductionistic approach taken to test them. While theoretical formulations describe complex relationships between IT capabilities and competitive advantage, reductionistic explanations rely on models that represent the integration of simple relationships. This area of research can, therefore, benefit from the wider adoption of a holistic approach that attributes competitive advantage to profiles of IT capabilities. This study draws on the resource-based view and configurational theory to develop two reductionistic (direct and mediation) and two holistic (gestalt and profile-deviation) models of IT strategic value. The four models are tested with data collected from IT managers. The empirical analysis illustrates the insights that can be gained by drawing on the relative strengths of reductionistic and holistic explanations of IT strategic value. Journal: European Journal of Information Systems Pages: 16-33 Issue: 1 Volume: 20 Year: 2011 Month: 1 X-DOI: 10.1057/ejis.2010.53 File-URL: http://hdl.handle.net/10.1057/ejis.2010.53 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:1:p:16-33 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934159_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Christina Ling-Hsing Chang Author-X-Name-First: Christina Ling-Hsing Author-X-Name-Last: Chang Author-Name: Victor Chen Author-X-Name-First: Victor Author-X-Name-Last: Chen Author-Name: Gary Klein Author-X-Name-First: Gary Author-X-Name-Last: Klein Author-Name: James J Jiang Author-X-Name-First: James J Author-X-Name-Last: Jiang Title: Information system personnel career anchor changes leading to career changes Abstract: Career anchors represent personal desires of employees that must be satisfied in order for organizations to attract and retain good workers. Career stages represent advancements along the paths of employment that an individual can take through an organization or chain of organizations that represent professional growth and increased value to an organization. Though research is prevalent on career anchors and career stage models, works that look at changes in one as the other changes are missing from the literature. Due to that lack, it is usually concluded that anchors reflect changes in careers as Information systems (IS) employees advance through their career stages. However, expectancy-value theory leads us to expect that the causality may be reversed, that career anchors change leading employees to value alternative positions more highly. Drawing on the career changes of 10 IS employees, we examine the changes in anchors through progressive career stages. While technical competence and security anchors are important at all stages of an IS career, managerial competence, geographic security, and autonomy become more important in the latter stages and are often adjusted prior to career movement. Management should account for these changes while designing jobs and incentives, while further research is required to confirm dominant patterns of change. Journal: European Journal of Information Systems Pages: 103-117 Issue: 1 Volume: 20 Year: 2011 Month: 1 X-DOI: 10.1057/ejis.2010.54 File-URL: http://hdl.handle.net/10.1057/ejis.2010.54 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:1:p:103-117 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934160_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Hubert Österle Author-X-Name-First: Hubert Author-X-Name-Last: Österle Author-Name: Jörg Becker Author-X-Name-First: Jörg Author-X-Name-Last: Becker Author-Name: Ulrich Frank Author-X-Name-First: Ulrich Author-X-Name-Last: Frank Author-Name: Thomas Hess Author-X-Name-First: Thomas Author-X-Name-Last: Hess Author-Name: Dimitris Karagiannis Author-X-Name-First: Dimitris Author-X-Name-Last: Karagiannis Author-Name: Helmut Krcmar Author-X-Name-First: Helmut Author-X-Name-Last: Krcmar Author-Name: Peter Loos Author-X-Name-First: Peter Author-X-Name-Last: Loos Author-Name: Peter Mertens Author-X-Name-First: Peter Author-X-Name-Last: Mertens Author-Name: Andreas Oberweis Author-X-Name-First: Andreas Author-X-Name-Last: Oberweis Author-Name: Elmar J Sinz Author-X-Name-First: Elmar J Author-X-Name-Last: Sinz Title: Memorandum on design-oriented information systems research Abstract: Information Systems Research (“Wirtschaftsinformatik”) basically follows two research approaches: the behavioristic approach and the design-oriented approach. In this memorandum, 10 authors propose principles of design-oriented information systems research. Moreover, the memorandum is supported by 111 full professors from the German-speaking scientific community, who with their signature advocate the principles specified therein. Journal: European Journal of Information Systems Pages: 7-10 Issue: 1 Volume: 20 Year: 2011 Month: 1 X-DOI: 10.1057/ejis.2010.55 File-URL: http://hdl.handle.net/10.1057/ejis.2010.55 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:1:p:7-10 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934161_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Richard Baskerville Author-X-Name-First: Richard Author-X-Name-Last: Baskerville Author-Name: Kalle Lyytinen Author-X-Name-First: Kalle Author-X-Name-Last: Lyytinen Author-Name: Vallabh Sambamurthy Author-X-Name-First: Vallabh Author-X-Name-Last: Sambamurthy Author-Name: Detmar Straub Author-X-Name-First: Detmar Author-X-Name-Last: Straub Title: A response to the design-oriented information systems research memorandum Abstract: In response to Österle et al.'s ‘Memorandum on Design Oriented Information Systems Research’, this commentary disputes, and expands the context of, several premises used to justify the main argument in the memorandum. These include: (1) claims about the evolution and role of design science research in the broader IS community and its position in the so-called ‘Anglo-Saxon community’, (2) the journal reviewing standards applied to design science research and what is perceived to be a sole focus on behavioral ‘descriptive’ research in certain IS journals. This commentary also discusses how such journals operate and set up their missions, review principles, and standards. Journal: European Journal of Information Systems Pages: 11-15 Issue: 1 Volume: 20 Year: 2011 Month: 1 X-DOI: 10.1057/ejis.2010.56 File-URL: http://hdl.handle.net/10.1057/ejis.2010.56 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:1:p:11-15 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934162_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Iris Junglas Author-X-Name-First: Iris Author-X-Name-Last: Junglas Author-Name: Björn Niehaves Author-X-Name-First: Björn Author-X-Name-Last: Niehaves Author-Name: Sarah Spiekermann Author-X-Name-First: Sarah Author-X-Name-Last: Spiekermann Author-Name: Bernd Carsten Stahl Author-X-Name-First: Bernd Carsten Author-X-Name-Last: Stahl Author-Name: Tim Weitzel Author-X-Name-First: Tim Author-X-Name-Last: Weitzel Author-Name: Robert Winter Author-X-Name-First: Robert Author-X-Name-Last: Winter Author-Name: Richard Baskerville Author-X-Name-First: Richard Author-X-Name-Last: Baskerville Title: The inflation of academic intellectual capital: the case for design science research in Europe Journal: European Journal of Information Systems Pages: 1-6 Issue: 1 Volume: 20 Year: 2011 Month: 1 X-DOI: 10.1057/ejis.2010.57 File-URL: http://hdl.handle.net/10.1057/ejis.2010.57 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:20:y:2011:i:1:p:1-6 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934384_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Susan A Brown Author-X-Name-First: Susan A Author-X-Name-Last: Brown Author-Name: Anne P Massey Author-X-Name-First: Anne P Author-X-Name-Last: Massey Author-Name: Kerry W Ward Author-X-Name-First: Kerry W Author-X-Name-Last: Ward Title: Handle mergers and acquisitions with care: the fragility of trust between the IT-service provider and end-users Abstract: Information technology (IT) implementation continues to be a challenging process for many organizations. The challenge is heightened when systems are changed due to mergers and acquisitions (M&A). The recent focus on IT-service management highlights the importance of having positive relationships between IT-service providers and end-users. In an M&A situation, there is often little history, and thus limited basis for trust in the IT organization, yet systems often need to be changed in these situations. The current study examines the IT-service provider’s relationship with the end-user to ascertain the factors that influence that relationship and ultimately influence end-user attitudes toward the new system. We study a mandated implementation following an acquisition in the banking industry. The results highlight the important and fragile nature of trust in the IT-service provider. In addition, the results demonstrate that there are significant differences in what matters at what time during the implementation process. Journal: European Journal of Information Systems Pages: 170-186 Issue: 2 Volume: 25 Year: 2016 Month: 3 X-DOI: 10.1057/ejis.2015.10 File-URL: http://hdl.handle.net/10.1057/ejis.2015.10 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:2:p:170-186 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934385_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: W Alec Cram Author-X-Name-First: W Alec Author-X-Name-Last: Cram Author-Name: Sue Newell Author-X-Name-First: Sue Author-X-Name-Last: Newell Title: Mindful revolution or mindless trend? Examining agile development as a management fashion Abstract: The growing adoption of agile methods of system development can be seen as broadly consistent with characteristics of a management fashion. However, the extent that fashions relate to how specific organizations actually adopt and use agile remains unclear. Based on five case studies, this research seeks to apply the concepts from management fashion theory to understand how organizations mindfully (or mindlessly) adopt agile methods. We find in some cases that agile appears to be characterized as a short-term, transitory trend, while in others it is embedded in an organization’s processes and culture. We identify three categories that distinguish between fashion patterns during agile adoptions: Crusaders, who exclusively adopt agile in a pure form; Tailors, who integrate agile and traditional approaches to fit their specific circumstances; and Dabblers who employ a few ceremonial agile activities alongside a traditional approach. The results from this study can encourage managerial awareness of the link between fashions and agile development, which can serve to highlight the unique opportunities to enhance mindfulness and avoid the pitfalls of mindlessness. By uncovering insights into the fashion-centric drivers of agile adoption, this research extends past theory related to both mindful innovation and management fashions. Journal: European Journal of Information Systems Pages: 154-169 Issue: 2 Volume: 25 Year: 2016 Month: 3 X-DOI: 10.1057/ejis.2015.13 File-URL: http://hdl.handle.net/10.1057/ejis.2015.13 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:2:p:154-169 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934386_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Stephen Burgess Author-X-Name-First: Stephen Author-X-Name-Last: Burgess Title: Representing small business web presence content: the web presence pyramid model Abstract: This article investigates ‘stage’ models that have been developed for researchers, practitioners and policymakers to explain how small businesses move from a basic to a sophisticated online presence and/or provide advice as to how they could do this. The main problem of these models is that small businesses do not necessarily develop their online presence in this manner. In addition, they do not consider that the online presence of most small businesses extends beyond their own website to the use of third party web portals, business directories and more recently social media websites. A new model, the web presence pyramid model, is thus proposed. The model represents the adoption levels of different categories of website features and does this in a non-linear manner, overcoming a limitation of stage models. A further contribution of the article is the classification of the web presence of small business industry sectors into new categories: Basic Web Presence; Added Value Websites; Online Database Websites and Payment Web Presence. A survey approach was used to conduct an online content analysis of the web presence of Australian small businesses, with the different types of web presences across industry sectors presented using the web presence pyramid model. Journal: European Journal of Information Systems Pages: 110-130 Issue: 2 Volume: 25 Year: 2016 Month: 3 X-DOI: 10.1057/ejis.2015.4 File-URL: http://hdl.handle.net/10.1057/ejis.2015.4 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:2:p:110-130 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934387_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Zhen Shao Author-X-Name-First: Zhen Author-X-Name-Last: Shao Author-Name: Yuqiang Feng Author-X-Name-First: Yuqiang Author-X-Name-Last: Feng Author-Name: Qing Hu Author-X-Name-First: Qing Author-X-Name-Last: Hu Title: Effectiveness of top management support in enterprise systems success: a contingency perspective of fit between leadership style and system life-cycle Abstract: Top management support has been identified as one of the most important factors in the success of enterprise systems (ES). However, few studies have addressed the issue of what type of leadership is most effective in which phase of the ES life-cycle. Given the different challenges to leadership in the different phases of an ES, a ‘one-style-fits-all’ approach is clearly inadequate. In this study, we analyze the contingent fit between the recognized leadership styles and the phases in the ES life-cycle. The evidence from a multi-case study provides support for our contingency propositions that transformational leadership fits best with the adoption phase, transactional leadership fits best with the implementation phase, and two variations of combined transformational and transactional leadership styles are most effective in the assimilation and extension phases. This study breaks new theoretical ground in information systems literature by highlighting the contingencies of leadership effectiveness in the success of ES at different phases. It also provides prescriptive insights for top executives in terms of who to put in charge and what type of leadership style to look for when considering adopting and implementing new ES, assimilating the implemented systems, or contemplating integrations with business partners. Journal: European Journal of Information Systems Pages: 131-153 Issue: 2 Volume: 25 Year: 2016 Month: 3 X-DOI: 10.1057/ejis.2015.6 File-URL: http://hdl.handle.net/10.1057/ejis.2015.6 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:2:p:131-153 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934388_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Michael Foth Author-X-Name-First: Michael Author-X-Name-Last: Foth Title: Factors influencing the intention to comply with data protection regulations in hospitals: based on gender differences in behaviour and deterrence Abstract: German hospitals are required to comply with, and give due consideration to, the data protection laws and regulations that apply to their daily work. However, the data protection scandals that have occurred in Germany in recent years imply that this compliance on the part of hospital employees cannot be taken for granted. According to the literature available, psychological factors may account for this fact – in particular the variables of the theory of planned behaviour and the general deterrence theory. In keeping with these theories, this research has analysed the influences of the attitudes, subjective norms and perceived behavioural control on employees’ intentions to comply with data protection regulations. A survey was conducted among hospital employees in Germany to further identify the most significant factors influencing their intention to comply with data protection and the variance in intention between men and women. The results suggest that psychological factors such as attitude, subjective norms and perceived behaviour control are significantly influential and find significant differences between the genders in the intention to comply with data protection regulations. The results of this study demonstrate that there are practical implications that, if implemented, can lead to a higher standard of data protection compliance in hospitals in the future by taking the technical and organisational measures of awareness for data protection compliance into account. Journal: European Journal of Information Systems Pages: 91-109 Issue: 2 Volume: 25 Year: 2016 Month: 3 X-DOI: 10.1057/ejis.2015.9 File-URL: http://hdl.handle.net/10.1057/ejis.2015.9 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:2:p:91-109 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1557853_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Pär J. Ågerfalk Author-X-Name-First: Pär J. Author-X-Name-Last: Ågerfalk Title: Stimulating academic discourse: a call for response Journal: European Journal of Information Systems Pages: 1-5 Issue: 1 Volume: 28 Year: 2019 Month: 1 X-DOI: 10.1080/0960085X.2019.1557853 File-URL: http://hdl.handle.net/10.1080/0960085X.2019.1557853 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:1:p:1-5 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1451811_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Matthew T. Mullarkey Author-X-Name-First: Matthew T. Author-X-Name-Last: Mullarkey Author-Name: Alan R. Hevner Author-X-Name-First: Alan R. Author-X-Name-Last: Hevner Author-Name: Pär Ågerfalk Author-X-Name-First: Pär Author-X-Name-Last: Ågerfalk Title: An elaborated action design research process model Abstract: This research essay proposes an elaborated process model for applying the action design research (ADR) approach to immersive industry-based projects. Building on the original ADR concepts, we identify four distinct types of ADR cycles for diagnosis, design, implementation, and evolution of the growing artefact-based solution. Each ADR cycle moves through activities of problem formulation, artefact creation, evaluation, reflection, and learning. Rapid iterations of ADR cycles provide a well-defined process map for managing and performing an emergent ADR project. The proposed model supports multiple entry points based on the current state of the problem environment and the goals of the ADR project. The elaborated ADR process model provides a more flexible yet disciplined inquiry into the initiation, conduct, reflection, and presentation of rigorous and relevant ADR projects. Journal: European Journal of Information Systems Pages: 6-20 Issue: 1 Volume: 28 Year: 2019 Month: 1 X-DOI: 10.1080/0960085X.2018.1451811 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1451811 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:1:p:6-20 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1527189_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Maung K. Sein Author-X-Name-First: Maung K. Author-X-Name-Last: Sein Author-Name: Matti Rossi Author-X-Name-First: Matti Author-X-Name-Last: Rossi Title: Elaborating ADR while drifting away from its essence: A commentary on Mullarkey and Hevner Abstract: In their insightful critique of Action Design Research, Hevner and Mullarkey (this issue) proposed an enhancement of ADR by juxtaposing concepts from a well cited framework of Design Science Research (DSR) developed by Peffers et al. (2007). In this commentary, we argue that while we agree with some of their elaborations, such as unpacking the specific stages of ADR to make them more transparent and accessible and incorporating formalization of learning in every stage, we also disagree with Hevner and Mullarkey on two key areas. The first is depicting multiple different entry points to an ADR project, which goes against the essential spirit of ADR’s single entry point, problem formulation. More importantly, in juxtaposing the Peffers et al. framework of DSR on to ADR, they are combining two approaches that are epistemologically incommensurate. Peffers et al. take a deductive design approach while ADR employs principally an inductive epistemology by giving primacy to the guided emergence of the artifact. In spite of our disagreements, we conclude that both approaches are premised upon pragmatism where researchers are guided more by utility and usefulness rather than an abstract notion of truth. Our disagreements are essential characteristics of a healthy academic discourse. Journal: European Journal of Information Systems Pages: 21-25 Issue: 1 Volume: 28 Year: 2019 Month: 1 X-DOI: 10.1080/0960085X.2018.1527189 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1527189 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:1:p:21-25 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1497929_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Leon Kappelman Author-X-Name-First: Leon Author-X-Name-Last: Kappelman Author-Name: Vess Johnson Author-X-Name-First: Vess Author-X-Name-Last: Johnson Author-Name: Russell Torres Author-X-Name-First: Russell Author-X-Name-Last: Torres Author-Name: Chris Maurer Author-X-Name-First: Chris Author-X-Name-Last: Maurer Author-Name: Ephraim McLean Author-X-Name-First: Ephraim Author-X-Name-Last: McLean Title: A study of information systems issues, practices, and leadership in Europe Abstract: In the summer of 2017, an online survey was administered to European IT executives, asking them about their concerns, spending, investments, cloud usage, security, workforce, reporting relationships, and other issues of importance. A total of 276 organisations responded. Their top-five most important IT management concerns were: Alignment, Digital Transformation, Cybersecurity, Cost, and Business Agility. Similarly, their top-five largest IT investments were: Analytics, Software Development, Cloud, Cybersecurity, and ERP.The average age of the CIOs was 49, 41% reported to their CEO, and nearly two-thirds interacted with their CEO at least weekly. Almost three-quarters came from previous IT positions, but only a 16% from IT within their current organisations. On average, CIOs spend about 20% of their time interacting with members of the C-suite, about 26% with their IT employees, and about 16% with other corporate employees. IT spending was up nearly 5% over the previous year and averaged almost 7% of corporate revenues. Over two-thirds of companies reported the number of IT employees and salaries were both up and spending on Cloud also increased.This paper explores these and other findings and their implications for IT management practice. Comparisons with US -based organisations are also included. Journal: European Journal of Information Systems Pages: 26-42 Issue: 1 Volume: 28 Year: 2019 Month: 1 X-DOI: 10.1080/0960085X.2018.1497929 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1497929 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:1:p:26-42 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1495893_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Elena Gorbacheva Author-X-Name-First: Elena Author-X-Name-Last: Gorbacheva Author-Name: Jenine Beekhuyzen Author-X-Name-First: Jenine Author-X-Name-Last: Beekhuyzen Author-Name: Jan vom Brocke Author-X-Name-First: Jan Author-X-Name-Last: vom Brocke Author-Name: Jörg Becker Author-X-Name-First: Jörg Author-X-Name-Last: Becker Title: Directions for research on gender imbalance in the IT profession Abstract: There is a significant shortage of expert Information Technology (IT) personnel in Europe and elsewhere and a marked under-representation of women in the field. This paper identifies important gaps in research on gender imbalance in the IT profession and motivates future Information Systems research to address each of them. First among these gaps is the lack of research on the far-reaching consequences of gender imbalance in the IT profession. Second, despite a considerable body of research, there is the lack of coherent explanation for this imbalance. Third, although many intervention programmes have been implemented in this area, gender diversity in practice has not improved significantly. This research field also requires theorisation based on the cumulative research efforts in the field, comparative studies in various contexts, and longitudinal studies. We point to opportunities to investigate each of these issues and recommend directions for future research and actionable research questions. Journal: European Journal of Information Systems Pages: 43-67 Issue: 1 Volume: 28 Year: 2019 Month: 1 X-DOI: 10.1080/0960085X.2018.1495893 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1495893 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:1:p:43-67 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1488567_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Roman Lukyanenko Author-X-Name-First: Roman Author-X-Name-Last: Lukyanenko Author-Name: Jeffrey Parsons Author-X-Name-First: Jeffrey Author-X-Name-Last: Parsons Author-Name: Binny M. Samuel Author-X-Name-First: Binny M. Author-X-Name-Last: Samuel Title: Representing instances: the case for reengineering conceptual modelling grammars Abstract: While many conceptual modelling grammars have been developed since the 1970s, they share the general assumption of representation by abstraction; that is, representing generalised knowledge about the similarities among phenomena in a domain (classes) rather than about domain objects (instances). This assumption largely ignores the fundamental role that instances play in the constitution of reality and in human psychology. In this paper, we argue there is a need for a grammar that explicitly recognises the primary role of instances. We examine the limitations of traditional class-based approaches to conceptual modelling, especially for modern information environments. We then explore theoretical and practical motivations for instance-based modelling, and show how such an approach can address the limitations of traditional modelling approaches. We conclude by calling for the engineering of instance-based grammars as an important direction for conceptual modelling research to address the limitations of traditional approaches, and articulate five challenges to overcome in such efforts. Journal: European Journal of Information Systems Pages: 68-90 Issue: 1 Volume: 28 Year: 2019 Month: 1 X-DOI: 10.1080/0960085X.2018.1488567 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1488567 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:1:p:68-90 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1496882_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Hartmut Hoehle Author-X-Name-First: Hartmut Author-X-Name-Last: Hoehle Author-Name: John A. Aloysius Author-X-Name-First: John A. Author-X-Name-Last: Aloysius Author-Name: Soheil Goodarzi Author-X-Name-First: Soheil Author-X-Name-Last: Goodarzi Author-Name: Viswanath Venkatesh Author-X-Name-First: Viswanath Author-X-Name-Last: Venkatesh Title: A nomological network of customers’ privacy perceptions: linking artifact design to shopping efficiency Abstract: The explosive growth of mobile devices and their widespread acceptance by customers along with the potential benefits of autoID technologies have prompted retailers to consider adoption of emerging technologies. Their motives are to enhance in-store customer shopping experience and to acquire an advantage in the competitive retail environment. Two interrelated issues nevertheless have been a hindrance: mobile shopping application usability and customers’ privacy concerns. Drawing on a recently developed conceptualisation of mobile application usability and the multidimensional developmental theory of privacy, we tackle these two issues. We theorise about the impact of artifact design on mobile application usability and the consequent impact of usability on customers’ privacy concerns and shopping efficiency. We tested our hypotheses in two retail store laboratory studies in which the participants were assigned to two different shopping tasks: general browsing (n = 194) and goal-directed shopping (n = 190). We found that adhering to mobile application usability principles could mitigate privacy concerns and consequently, improve shopping efficiency. Our findings suggest new avenues to alleviate customers’ privacy concerns using artifact design, thus complementing conventional approaches that focus on preventive measures to deal with the issue of privacy concerns. Journal: European Journal of Information Systems Pages: 91-113 Issue: 1 Volume: 28 Year: 2019 Month: 1 X-DOI: 10.1080/0960085X.2018.1496882 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1496882 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:1:p:91-113 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1565656_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: The Editors Title: Thanks to Reviewers Journal: European Journal of Information Systems Pages: 114-118 Issue: 1 Volume: 28 Year: 2019 Month: 1 X-DOI: 10.1080/0960085X.2019.1565656 File-URL: http://hdl.handle.net/10.1080/0960085X.2019.1565656 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:28:y:2019:i:1:p:114-118 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1404766_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Anol Bhattacherjee Author-X-Name-First: Anol Author-X-Name-Last: Bhattacherjee Author-Name: Christopher J. Davis Author-X-Name-First: Christopher J. Author-X-Name-Last: Davis Author-Name: Amy J. Connolly Author-X-Name-First: Amy J. Author-X-Name-Last: Connolly Author-Name: Neset Hikmet Author-X-Name-First: Neset Author-X-Name-Last: Hikmet Author-Name: Frantz Rowe Author-X-Name-First: Frantz Author-X-Name-Last: Rowe Author-Name: Régis Meissonier Author-X-Name-First: Régis Author-X-Name-Last: Meissonier Title: User response to mandatory IT use: a coping theory perspective Abstract: The introduction of a new information technology (IT) into a workplace often engenders a wide range of responses among users. These responses encompass a variety of emotions, such as excitement, indifference, skepticism, and fear, and behaviors, such as user engagement, avoidance, and workarounds, that are often manifested concurrently in the same work environment. We present a taxonomy of these responses in the context of mandated IT use by classifying user responses as engaged, compliant, reluctant, or deviant. Using a coping theoretic lens, we offer seven propositions to describe the causal factors and processes that drive specific IT user responses and how such responses might change over time. A qualitative analysis of 47 interviews of 42 physicians at a large community hospital over an 8-year period provides support for our taxonomy and propositions. The study’s key contributions are that it conceptualizes different types of user responses that may emerge in mandatory IT use settings, elaborates the key drivers of and processes underlying these diverse responses, and suggests how those behaviors may change over time with changes in the coping process. Journal: European Journal of Information Systems Pages: 395-414 Issue: 4 Volume: 27 Year: 2018 Month: 7 X-DOI: 10.1057/s41303-017-0047-0 File-URL: http://hdl.handle.net/10.1057/s41303-017-0047-0 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:4:p:395-414 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1404713_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Albert Boonstra Author-X-Name-First: Albert Author-X-Name-Last: Boonstra Author-Name: U. Yeliz Eseryel Author-X-Name-First: U. Author-X-Name-Last: Yeliz Eseryel Author-Name: Marjolein A. G. van Offenbeek Author-X-Name-First: Marjolein A. G. Author-X-Name-Last: van Offenbeek Author-Name: Frantz Rowe Author-X-Name-First: Frantz Author-X-Name-Last: Rowe Author-Name: Régis Meissonier Author-X-Name-First: Régis Author-X-Name-Last: Meissonier Title: Stakeholders’ enactment of competing logics in IT governance: polarization, compromise or synthesis? Abstract: Governing IT while incorporating stakeholders with diverse institutional backgrounds remains a challenge. Stakeholder groups are typically socialized differently and may have different perspectives on IT governance dilemmas. Yet, extant literature offers only limited insight on socialized views on IT governance. This study uses an institutional logics lens to examine how competing institutional logics get connected in IT governance practices through dominant stakeholders’ enactment patterns and how these enactment patterns may affect the organization’s IT performance. We find that logics were coupled to the three dominant stakeholder groups, but only loosely so. Congruence between the three logics they enacted depended on the IT governance dilemma at hand. Our findings demonstrate how within a triad of competing logics, switching rivalry among hybrid logics may develop. Here, the enactments led to two hybrid logics, none of which became dominant. Remarkably, the IT professionalism logic accommodated polarization between medical professionalism and the managerial logic, causing unstable IT governance. We propose that IT professionalism offers room for agency and is crucial in determining the resulting enactment patterns: polarizing, compromising or even synthesizing. This study may raise managers’ awareness of the competing logics underlying IT governance practices and clarify the pivotal role of IT professionalism in IT governance debates. Journal: European Journal of Information Systems Pages: 415-433 Issue: 4 Volume: 27 Year: 2018 Month: 7 X-DOI: 10.1057/s41303-017-0055-0 File-URL: http://hdl.handle.net/10.1057/s41303-017-0055-0 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:4:p:415-433 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1404755_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Haichao Zheng Author-X-Name-First: Haichao Author-X-Name-Last: Zheng Author-Name: Bo Xu Author-X-Name-First: Bo Author-X-Name-Last: Xu Author-Name: Linna Hao Author-X-Name-First: Linna Author-X-Name-Last: Hao Author-Name: Zhangxi Lin Author-X-Name-First: Zhangxi Author-X-Name-Last: Lin Author-Name: Dov Te'Eni Author-X-Name-First: Dov Author-X-Name-Last: Te'Eni Author-Name: Evangelos Katsamakas Author-X-Name-First: Evangelos Author-X-Name-Last: Katsamakas Title: Reversed loss aversion in crowdsourcing contest Abstract: Crowdsourcing contest is an effective means for firms to outsource tasks online to a large group of solvers in order to obtain creative solutions. This study investigates loss aversion of solvers in crowdsourcing contests. An experiment was conducted, and reversed loss aversion was identified for solvers, suggesting that solvers experience more happiness from the gains when they win the contest than the pain from the equivalent losses when they fail. The results also suggested that solvers experience higher reversed loss aversion for ideation contests than for expertise-based contests. We then investigated the effects of reversed loss aversion from a game theory perspective. The solutions showed that solvers’ effort level is greater with reversed loss aversion, while the optimal reward for the contest remains the same. In light of our findings, sponsors should conduct contests to solve ideation problems in which the solvers are loss averse reversed and will input more effort. Diversified business models could be developed by crowdsourcing platforms to match solvers and different crowdsourcing tasks. Journal: European Journal of Information Systems Pages: 434-448 Issue: 4 Volume: 27 Year: 2018 Month: 7 X-DOI: 10.1057/s41303-017-0061-2 File-URL: http://hdl.handle.net/10.1057/s41303-017-0061-2 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:4:p:434-448 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1404756_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Tae Hun Kim Author-X-Name-First: Tae Hun Author-X-Name-Last: Kim Author-Name: Matt Wimble Author-X-Name-First: Matt Author-X-Name-Last: Wimble Author-Name: Vallabh Sambamurthy Author-X-Name-First: Vallabh Author-X-Name-Last: Sambamurthy Author-Name: Frantz Rowe Author-X-Name-First: Frantz Author-X-Name-Last: Rowe Author-Name: Jason Thatcher Author-X-Name-First: Jason Author-X-Name-Last: Thatcher Title: Disaggregation of the IT capital effects on firm performance: Empirical evidence from an IT asset portfolio perspective Abstract: Although prior research has frequently focused on aggregate IT capital, most firms invest in specific types with different goals. Each type of capital represents a distinct factor of a firm’s production function. Drawing on a theory-of-production framework, we disaggregate overall IT capital into specific types to examine their unique effects on firm performance over time. We categorize these IT-specific production factors into a firm’s installed personal computers for individual information access, servers for collective information access, storage capacity for information stock, and nodes for information flow. We investigate when and how each IT capital type contributes to firm performance by analyzing the 5-year panel data of 1,548 US firms. Our findings show that individual information access capital and collective information access capital have immediate effects on profitability through cost efficiency or sales growth. By contrast, information stock capital has a lagged effect on profitability. In addition, information stock capital complements individual information access capital in improving profitability, as well as contributing to sales growth and cost efficiency equivalent to firm size. These results extend the existing research on firm-level effects of IT investments by demonstrating that different IT capital effects have unique ways of affecting firm performance. Journal: European Journal of Information Systems Pages: 449-469 Issue: 4 Volume: 27 Year: 2018 Month: 7 X-DOI: 10.1057/s41303-017-0062-1 File-URL: http://hdl.handle.net/10.1057/s41303-017-0062-1 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:4:p:449-469 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1387712_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Giuseppe Cascavilla Author-X-Name-First: Giuseppe Author-X-Name-Last: Cascavilla Author-Name: Mauro Conti Author-X-Name-First: Mauro Author-X-Name-Last: Conti Author-Name: David G. Schwartz Author-X-Name-First: David G. Author-X-Name-Last: Schwartz Author-Name: Inbal Yahav Author-X-Name-First: Inbal Author-X-Name-Last: Yahav Title: The insider on the outside: a novel system for the detection of information leakers in social networks Abstract: Confidential information is all too easily leaked by naive users posting comments. In this paper we introduce DUIL, a system for Detecting Unintentional Information Leakers. The value of DUIL is in its ability to detect those responsible for information leakage that occurs through comments posted on news articles in a public environment, when those articles have withheld material non-public information. DUIL is comprised of several artefacts, each designed to analyse a different aspect of this challenge: the information, the user(s) who posted the information, and the user(s) who may be involved in the dissemination of information. We present a design science analysis of DUIL as an information system artefact comprised of social, information, and technology artefacts. We demonstrate the performance of DUIL on real data crawled from several Facebook news pages spanning two years of news articles. Journal: European Journal of Information Systems Pages: 470-485 Issue: 4 Volume: 27 Year: 2018 Month: 7 X-DOI: 10.1080/0960085X.2017.1387712 File-URL: http://hdl.handle.net/10.1080/0960085X.2017.1387712 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:4:p:470-485 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1387714_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Anna Maria Oberländer Author-X-Name-First: Anna Maria Author-X-Name-Last: Oberländer Author-Name: Maximilian Röglinger Author-X-Name-First: Maximilian Author-X-Name-Last: Röglinger Author-Name: Michael Rosemann Author-X-Name-First: Michael Author-X-Name-Last: Rosemann Author-Name: Alexandra Kees Author-X-Name-First: Alexandra Author-X-Name-Last: Kees Author-Name: Pär Ågerfalk Author-X-Name-First: Pär Author-X-Name-Last: Ågerfalk Author-Name: Virpi Tuunainen Author-X-Name-First: Virpi Author-X-Name-Last: Tuunainen Title: Conceptualizing business-to-thing interactions – A sociomaterial perspective on the Internet of Things Abstract: The Internet of Things (IoT) is recognised as one of the most disruptive technologies in the market as it integrates physical objects into the networked society. As such, the IoT also transforms established business-to-customer interactions. Remote patient monitoring, predictive maintenance, and automatic car repair are examples of evolving business-to-thing (B2T) interactions. However, the IoT is hardly covered by theoretical investigations. To complement the predominant technical and engineering focus of IoT research, we developed and evaluated a taxonomy of B2T interaction patterns. Thereby, we built on sociomateriality as justificatory knowledge. We demonstrated the taxonomy’s applicability and usefulness based on simple and complex real-life objects (i.e., Nest, RelayRides, and Uber). Our taxonomy contributes to the descriptive knowledge on the IoT as it enables the classification of B2T interactions and facilitates sense-making as well as theory-led design. When combining weak and strong sociomateriality, we found that the IoT enables and requires a new perspective on material agency by considering smart things as independent actors. Journal: European Journal of Information Systems Pages: 486-502 Issue: 4 Volume: 27 Year: 2018 Month: 7 X-DOI: 10.1080/0960085X.2017.1387714 File-URL: http://hdl.handle.net/10.1080/0960085X.2017.1387714 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:4:p:486-502 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934316_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jane Elisabeth Frisk Author-X-Name-First: Jane Elisabeth Author-X-Name-Last: Frisk Author-Name: Rikard Lindgren Author-X-Name-First: Rikard Author-X-Name-Last: Lindgren Author-Name: Lars Mathiassen Author-X-Name-First: Lars Author-X-Name-Last: Mathiassen Title: Design matters for decision makers: Discovering IT investment alternatives Abstract: The literature has traditionally focused on how decision makers choose among alternatives based on rational behaviors, organizational politics, and organized anarchies. However, there is little research on decision making as a creative process where managers discover and evaluate alternatives. We address this gap by proposing a design approach to transform decisions in organizations. The approach views decision making as a creative and adaptive process in which managers recursively collect and interpret heterogeneous evidence, explore and test different ideas, and discover and evaluate alternatives. While the approach is rooted in the know-how of the involved stakeholders, its underpinning design attitude invites managers to better understand possible alternatives based on analyses of structured as well as unstructured data. To assess its utility, we applied the approach to IT investment evaluations through a Collaborative Practice Research project involving Swedish public organizations. Building on the project findings, we discuss the proposed approach and spell out its implications for transforming decision making in organizations. Journal: European Journal of Information Systems Pages: 442-461 Issue: 4 Volume: 23 Year: 2014 Month: 7 X-DOI: 10.1057/ejis.2013.13 File-URL: http://hdl.handle.net/10.1057/ejis.2013.13 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:4:p:442-461 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934317_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Kai Reimers Author-X-Name-First: Kai Author-X-Name-Last: Reimers Author-Name: Robert B Johnston Author-X-Name-First: Robert B Author-X-Name-Last: Johnston Author-Name: Stefan Klein Author-X-Name-First: Stefan Author-X-Name-Last: Klein Title: An empirical evaluation of existing IS change theories for the case of IOIS evolution Abstract: The phenomenon of inter-organizational information systems (IOIS) evolution has not yet been adequately researched and understood. We present and analyse empirical data from a case in which electronic ordering in the Australian pharmaceutical industry evolved over a 30-year period from closed to quasi-open systems. We analyse this revelatory case using a practice-theoretical framework to make visible the phenomenon of IOIS evolution. An essential characteristic of this framework is the distinction between and symmetrical treatment of material, normative and ideational structures within the practices that constitute the IOIS. Against the findings of this case study, we then evaluate two promising models of long-term IS change, namely Porra's (1999) Colonial Systems model and Lyytinen and Newman's (2008) Punctuated Socio-technical IS Change model. These models are selected as highly elaborated IS exemplars of two classes of theories of organizational change, namely evolutionary and dialectical theories. We find that these two models can only partially explain our findings. Finally, we make suggestions for developing more comprehensive theoretical models within these two classes of IS change theories. In practical terms, our paper shows that the transformation from closed to open IOIS may require adoption of longer time frames than are usually assumed and closer attention to norms and rationales usually neglected in IS projects. Journal: European Journal of Information Systems Pages: 373-399 Issue: 4 Volume: 23 Year: 2014 Month: 7 X-DOI: 10.1057/ejis.2013.7 File-URL: http://hdl.handle.net/10.1057/ejis.2013.7 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:4:p:373-399 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934318_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: David K Allen Author-X-Name-First: David K Author-X-Name-Last: Allen Author-Name: Stan Karanasios Author-X-Name-First: Stan Author-X-Name-Last: Karanasios Author-Name: Alistair Norman Author-X-Name-First: Alistair Author-X-Name-Last: Norman Title: Information sharing and interoperability: the case of major incident management Abstract: Public sector inter-organisational information sharing and interoperability is an area of increasing concern and intense investment for practice and an area of increasing scholarship. This paper focuses on one particular set of public sector organisations (emergency services) and illuminates the key technological and organisational issues they face concerning information sharing and interoperability. The particular contexts in which these are studied are ones where decisions are non-trivial and made in high-velocity environments. In these conditions the problems and significance of inter-organisational information sharing and interoperability are accentuated. We analyse data gathered from two studies: the first focused on ‘first responders’ (police, fire and ambulance services) in the United Kingdom. The second, a follow on study, with emergency service managers and interoperability project managers in the United Kingdom and the European Union. Using activity theory as a conceptual framework we describe the informational problems critical emergency responders face in their initial response to, and management of, an incident. We argue that rather than focusing on interoperability as a primarily technological issue it should be managed as an organisational and informational issue. Second, we argue that rather than designing for anomalous situations we should design systems, which will function during both anomalous and routine situations. Third, we argue for focus on harmonisation of policies, procedures and working practices. Journal: European Journal of Information Systems Pages: 418-432 Issue: 4 Volume: 23 Year: 2014 Month: 7 X-DOI: 10.1057/ejis.2013.8 File-URL: http://hdl.handle.net/10.1057/ejis.2013.8 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:4:p:418-432 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934319_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Weizi Li Author-X-Name-First: Weizi Author-X-Name-Last: Li Author-Name: Kecheng Liu Author-X-Name-First: Kecheng Author-X-Name-Last: Liu Author-Name: Hongqiao Yang Author-X-Name-First: Hongqiao Author-X-Name-Last: Yang Author-Name: Changrui Yu Author-X-Name-First: Changrui Author-X-Name-Last: Yu Title: Integrated clinical pathway management for medical quality improvement – based on a semiotically inspired systems architecture Abstract: Clinical pathway is an approach to standardise care processes to support the implementations of clinical guidelines and protocols. It is designed to support the management of treatment processes including clinical and non-clinical activities, resources and also financial aspects. It provides detailed guidance for each stage in the management of a patient with the aim of improving the continuity and coordination of care across different disciplines and sectors. However, in the practical treatment process, the lack of knowledge sharing and information accuracy of paper-based clinical pathways burden health-care staff with a large amount of paper work. This will often result in medical errors, inefficient treatment process and thus poor quality medical services. This paper first presents a theoretical underpinning and a co-design research methodology for integrated pathway management by drawing input from organisational semiotics. An approach to integrated clinical pathway management is then proposed, which aims to embed pathway knowledge into treatment processes and existing hospital information systems. The capability of this approach has been demonstrated through the case study in one of the largest hospitals in China. The outcome reveals that medical quality can be improved significantly by the classified clinical pathway knowledge and seamless integration with hospital information systems. Journal: European Journal of Information Systems Pages: 400-417 Issue: 4 Volume: 23 Year: 2014 Month: 7 X-DOI: 10.1057/ejis.2013.9 File-URL: http://hdl.handle.net/10.1057/ejis.2013.9 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:4:p:400-417 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934320_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Rajeev Sharma Author-X-Name-First: Rajeev Author-X-Name-Last: Sharma Author-Name: Sunil Mithas Author-X-Name-First: Sunil Author-X-Name-Last: Mithas Author-Name: Atreyi Kankanhalli Author-X-Name-First: Atreyi Author-X-Name-Last: Kankanhalli Title: Transforming decision-making processes: a research agenda for understanding the impact of business analytics on organisations Journal: European Journal of Information Systems Pages: 433-441 Issue: 4 Volume: 23 Year: 2014 Month: 7 X-DOI: 10.1057/ejis.2014.17 File-URL: http://hdl.handle.net/10.1057/ejis.2014.17 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:4:p:433-441 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934321_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Andreja Habjan Author-X-Name-First: Andreja Author-X-Name-Last: Habjan Author-Name: Constantine Andriopoulos Author-X-Name-First: Constantine Author-X-Name-Last: Andriopoulos Author-Name: Manto Gotsi Author-X-Name-First: Manto Author-X-Name-Last: Gotsi Title: The role of GPS-enabled information in transforming operational decision making: an exploratory study Abstract: Although the impact of ICT-enabled information on firm performance has been well documented in the business value of IT literature, our understanding of how Global Positioning System (GPS) adoption can transform operational decision making and foster differential firm performance is limited. In response, we conduct an exploratory comparative case study of three transport firms that have implemented the same GPS during the same year in their operations. Our results highlight that increased use of GPS-enabled information can enhance information quality and make operational decision making more fact-based and collaborative. We also find that such transformations in operational decision making, driven by increased use of GPS-enabled information, can foster differential performance impacts. However, we warn scholars and practitioners that a firm’s information management capability (in terms of availability of quality information in decision making, software tools for connectivity and access to information, IT systems integration post-GPS adoption and adaptability of the infrastructure to emerging business needs) and organizational factors (such as top management support, project management of GPS implementation, financial support, end-user involvement, rewarding, training and employee resistance) can facilitate (or inhibit) effective use of GPS-enabled information in operational decision making, and thus moderate differential performance benefits of GPS adoption. Journal: European Journal of Information Systems Pages: 481-502 Issue: 4 Volume: 23 Year: 2014 Month: 7 X-DOI: 10.1057/ejis.2014.2 File-URL: http://hdl.handle.net/10.1057/ejis.2014.2 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:4:p:481-502 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934322_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Pei-Ying Huang Author-X-Name-First: Pei-Ying Author-X-Name-Last: Huang Author-Name: Shan L Pan Author-X-Name-First: Shan L Author-X-Name-Last: Pan Author-Name: Tao Hua Ouyang Author-X-Name-First: Tao Hua Author-X-Name-Last: Ouyang Title: Developing information processing capability for operational agility: implications from a Chinese manufacturer Abstract: The operational agility literature suffers from a lack of clarity in terms of the process or underlying mechanisms through which operational agility is achieved. Drawing on the information processing view of the firm, this study attempts to address this gap by examining the process of operational agility development. A process model of developing information processing capability for operational agility is proposed. As the model suggests, operational agility is achieved through a two-step process – the construction of IT-enabled information processing network and the implementation of organizational control – to enhance the right information processing capability. We further identify three types of information processing capability – information sensitivity, information synergy and information fluidity – that enable operational agility. Furthermore, a five-step practical guide for developing information processing capability for operational agility is provided for practitioners. This is achieved by conducting a case study of Haier, one of the largest household appliance manufacturers in China. This paper concludes with a discussion of the potential contributions and directions for future research. Journal: European Journal of Information Systems Pages: 462-480 Issue: 4 Volume: 23 Year: 2014 Month: 7 X-DOI: 10.1057/ejis.2014.4 File-URL: http://hdl.handle.net/10.1057/ejis.2014.4 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:4:p:462-480 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1743051_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Pär J. Ågerfalk Author-X-Name-First: Pär J. Author-X-Name-Last: Ågerfalk Author-Name: Fredrik Karlsson Author-X-Name-First: Fredrik Author-X-Name-Last: Karlsson Title: Artefactual and empirical contributions in information systems research Journal: European Journal of Information Systems Pages: 109-113 Issue: 2 Volume: 29 Year: 2020 Month: 03 X-DOI: 10.1080/0960085X.2020.1743051 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1743051 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:2:p:109-113 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1701955_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Gabriele Piccoli Author-X-Name-First: Gabriele Author-X-Name-Last: Piccoli Author-Name: Joaquin Rodriguez Author-X-Name-First: Joaquin Author-X-Name-Last: Rodriguez Author-Name: Biagio Palese Author-X-Name-First: Biagio Author-X-Name-Last: Palese Author-Name: Marcin Lukasz Bartosiak Author-X-Name-First: Marcin Lukasz Author-X-Name-Last: Bartosiak Title: Feedback at scale: designing for accurate and timely practical digital skills evaluation Abstract: The global demand for digital proficiency has resulted in increasing pressure to “massify” education. As practical digital skills development becomes more important, there is a need to design accurate and timely performance feedback systems that can scale to a large number of learners. This paper contributes meta-requirements and design principles for designing a socio-technical artefact that offers a solution to the general problem of providing performance feedback at scale. The artefact evaluation provides interesting results for achieving the three objectives of a) scalability to a large number of learners, b) validity and reliability of the feedback, and c) positive impact on learners’ behaviour and engagement with the feedback system. These results are obtained through the synergistic contribution of pedagogical prioritisation (i.e., what skills to cover), assignment design (i.e., what tasks to use to evaluate mastery) and automated measurement (i.e., grading engine functionalities for error detection). Journal: European Journal of Information Systems Pages: 114-133 Issue: 2 Volume: 29 Year: 2020 Month: 03 X-DOI: 10.1080/0960085X.2019.1701955 File-URL: http://hdl.handle.net/10.1080/0960085X.2019.1701955 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:2:p:114-133 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1718008_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ulrich Remus Author-X-Name-First: Ulrich Author-X-Name-Last: Remus Author-Name: Martin Wiener Author-X-Name-First: Martin Author-X-Name-Last: Wiener Author-Name: Carol Saunders Author-X-Name-First: Carol Author-X-Name-Last: Saunders Author-Name: Magnus Mähring Author-X-Name-First: Magnus Author-X-Name-Last: Mähring Title: The impact of control styles and control modes on individual-level outcomes: a first test of the integrated IS project control theory Abstract: While IS development (ISD) projects are essential for deploying digital technologies in organisations, they are notoriously challenging to control and complete successfully. Prior ISD project control research mostly conceptualises control activities in terms of formal and informal control modes and frequently focuses on performance effects at the project level. We argue that new insight can be gained by moving beyond these conventions to include control enactment as well as individual-level control effects. In this study, we present new findings that could precipitate a change in how researchers think about, and practitioners exercise, control in ISD projects. Specifically, we provide a first test of the recently proposed Integrated IS Project Control Theory by analysing the impacts of control modes (what) and control styles (how) on project team members’ task performance and job satisfaction. Employing data from 171 ISD projects, we find significant support for this theory by confirming the positive impact of an enabling control style on both task performance and job satisfaction, and by demonstrating that control style is more important than control modes in explaining individual-level control effects. Further, the results of a post-hoc analysis suggest complex interaction effects between an enabling control style and formal controls. Journal: European Journal of Information Systems Pages: 134-152 Issue: 2 Volume: 29 Year: 2020 Month: 03 X-DOI: 10.1080/0960085X.2020.1718008 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1718008 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:2:p:134-152 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1718009_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Adrian Holzer Author-X-Name-First: Adrian Author-X-Name-Last: Holzer Author-Name: Bruno Kocher Author-X-Name-First: Bruno Author-X-Name-Last: Kocher Author-Name: Samuel Bendahan Author-X-Name-First: Samuel Author-X-Name-Last: Bendahan Author-Name: Isabelle Vonèche Cardia Author-X-Name-First: Isabelle Author-X-Name-Last: Vonèche Cardia Author-Name: Jorge Mazuze Author-X-Name-First: Jorge Author-X-Name-Last: Mazuze Author-Name: Denis Gillet Author-X-Name-First: Denis Author-X-Name-Last: Gillet Title: Gamifying knowledge sharing in humanitarian organisations: a design science journey Abstract: Humanitarian organisations provide invaluable work to improve the lives of individuals impacted by natural and anthropogenic hazards. While humanitarian organisations are highly knowledge intensive, they often fail to manage knowledge effectively. Providing adequate incentives to foster knowledge sharing on a knowledge management system is a challenge for many organisations. It is especially important in the humanitarian context where organisational efficiency leads to saving more lives. We argue that gamification (i.e., the integration of game-like features, such as points or badges in non-game systems) is a viable solution to address the lack of knowledge sharing often encountered. To do so, we embark on a design science journey with Doctors Without Borders to investigate how gamification within (e.g., using a personal profile) and outside (e.g., using a connected ambient object) a knowledge management system can improve knowledge sharing. Our findings demonstrate that well-designed gamification can increase engagement and knowledge sharing, in particular for altruistic individuals. Journal: European Journal of Information Systems Pages: 153-171 Issue: 2 Volume: 29 Year: 2020 Month: 03 X-DOI: 10.1080/0960085X.2020.1718009 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1718009 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:2:p:153-171 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1728200_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Amanda J. Porter Author-X-Name-First: Amanda J. Author-X-Name-Last: Porter Author-Name: Bart van den Hooff Author-X-Name-First: Bart Author-X-Name-Last: van den Hooff Title: The complementarity of autonomy and control in mobile work Abstract: In this paper, we investigate how the use of mobile technologies contributes to the emergence of a complementary control system, in which both employee autonomy and management control are enhanced. We apply an affordance lens to understand the affordances (and constraints) for complementary control that emerge in the use of mobile technologies by both employees and managers. Based on a qualitative case study of the implementation and use of a mobile Sales Force Automation tool at a multinational company, we identify three informational affordances for control and analyse how these were actualised to enhance both management control and employee autonomy. Our study contributes to extant literature on the relation between mobile technologies and autonomy and control by showing the central role of mobile technologies’ affordances in redistributing informational demands and benefits of control in the interaction between managers, employees, and mobile devices. Journal: European Journal of Information Systems Pages: 172-189 Issue: 2 Volume: 29 Year: 2020 Month: 03 X-DOI: 10.1080/0960085X.2020.1728200 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1728200 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:2:p:172-189 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1742587_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Nick Benschop Author-X-Name-First: Nick Author-X-Name-Last: Benschop Author-Name: Cokky A. R. Hilhorst Author-X-Name-First: Cokky A. R. Author-X-Name-Last: Hilhorst Author-Name: Arno L. P. Nuijten Author-X-Name-First: Arno L. P. Author-X-Name-Last: Nuijten Author-Name: Mark Keil Author-X-Name-First: Mark Author-X-Name-Last: Keil Title: Detection of early warning signals for overruns in IS projects: linguistic analysis of business case language Abstract: Many Information Systems (IS) projects fail to be completed within budget and on schedule. A contributing factor is the so-called planning fallacy in which people tend to underestimate the resources required to complete a project. In this paper, we propose that signals of the planning fallacy can be detected in a project’s business case. We investigated whether language usage in business cases can serve as an early warning signal for overruns in IS projects. Drawing on two theoretical perspectives – the Linguistic Category Model (LCM) and Construal Level Theory (CLT) – two sets of rival hypotheses were tested concerning the relationship between project overruns and whether the language usage in a business case is abstract or concrete. A linguistic analysis of the business cases of large IS projects in the Netherlands suggests that concrete language usage in the business case is associated with bigger budget and schedule overruns. For researchers, our study contributes to the existing literature on the importance of language usage. For practitioners, our study provides an early warning indicator for overruns. Journal: European Journal of Information Systems Pages: 190-202 Issue: 2 Volume: 29 Year: 2020 Month: 03 X-DOI: 10.1080/0960085X.2020.1742587 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1742587 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:2:p:190-202 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933902_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Sue Newell Author-X-Name-First: Sue Author-X-Name-Last: Newell Author-Name: Robert D Galliers Author-X-Name-First: Robert D Author-X-Name-Last: Galliers Title: Facilitating – or inhibiting – knowing in practice Journal: European Journal of Information Systems Pages: 441-445 Issue: 5 Volume: 15 Year: 2006 Month: 10 X-DOI: 10.1057/palgrave.ejis.3000633 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000633 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:5:p:441-445 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933903_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Karl E Weick Author-X-Name-First: Karl E Author-X-Name-Last: Weick Title: The role of imagination in the organizing of knowledge Journal: European Journal of Information Systems Pages: 446-452 Issue: 5 Volume: 15 Year: 2006 Month: 10 X-DOI: 10.1057/palgrave.ejis.3000634 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000634 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:5:p:446-452 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933904_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jennifer A Howard-Grenville Author-X-Name-First: Jennifer A Author-X-Name-Last: Howard-Grenville Author-Name: Paul R Carlile Author-X-Name-First: Paul R Author-X-Name-Last: Carlile Title: The incompatibility of knowledge regimes: consequences of the material world for cross-domain work Abstract: In this paper, we argue that successful integration of knowledge across work domains in the short-term can mask the generation of long-term consequences. We explore a setting, the introduction of environmental considerations into semiconductor manufacturing, where the eventual adoption of common measurement artifacts and associated practices enabled knowledge integration, but failed to address significant underlying consequences. Drawing from observational, interview, and archival data we develop an understanding of the work practices of the Tech and EnviroTech groups as structured by the material world and broader collective conventions. We introduce the concept of knowledge regime to outline the differences in knowledge across these work domains. More specifically, we find that differences in the causal specificity and developmental time horizon of knowledge and the measurement artifacts that result contribute to the relative power of one knowledge regime over another. Understanding these sources of incompatibility provides insight into the design requirements of information systems as boundary objects for knowledge integration, but also specifies the potential limits to any design effort. Journal: European Journal of Information Systems Pages: 473-485 Issue: 5 Volume: 15 Year: 2006 Month: 10 X-DOI: 10.1057/palgrave.ejis.3000635 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000635 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:5:p:473-485 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933905_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Janis L Gogan Author-X-Name-First: Janis L Author-X-Name-Last: Gogan Title: Commentary on Karl E. Weick's ‘The role of imagination in the organizing of knowledge’ Journal: European Journal of Information Systems Pages: 453-456 Issue: 5 Volume: 15 Year: 2006 Month: 10 X-DOI: 10.1057/palgrave.ejis.3000636 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000636 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:5:p:453-456 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933906_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Heikki Topi Author-X-Name-First: Heikki Author-X-Name-Last: Topi Author-Name: Wendy Lucas Author-X-Name-First: Wendy Author-X-Name-Last: Lucas Author-Name: Tamara Babaian Author-X-Name-First: Tamara Author-X-Name-Last: Babaian Title: Using informal notes for sharing corporate technology know-how Abstract: Corporate and academic communities have focused a great deal of attention on formalized approaches for creating, capturing, and propagating knowledge. Far less attention has been paid to the informal mechanisms that individuals share and employ to help them navigate complex processes in order to ‘get things done.’ In this paper, we examine the creation, use, and content of informal documents for supporting users of an enterprise resource planning system in a Fortune 500 company. We contend that such notes, which are commonly used for supporting information systems-related work, are an overlooked source of knowledgeability about organizational practices. This study is a first but necessary step in analyzing the types of information that can be derived from informal notes so that organizations can more fully utilize this largely untapped resource. Journal: European Journal of Information Systems Pages: 486-499 Issue: 5 Volume: 15 Year: 2006 Month: 10 X-DOI: 10.1057/palgrave.ejis.3000637 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000637 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:5:p:486-499 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933907_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Cliff Oswick Author-X-Name-First: Cliff Author-X-Name-Last: Oswick Title: Commentary on Karl E. Weick's ‘The role of imagination in the organizing of knowledge’ Journal: European Journal of Information Systems Pages: 457-459 Issue: 5 Volume: 15 Year: 2006 Month: 10 X-DOI: 10.1057/palgrave.ejis.3000638 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000638 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:5:p:457-459 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933908_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Wanda J Orlikowski Author-X-Name-First: Wanda J Author-X-Name-Last: Orlikowski Title: Material knowing: the scaffolding of human knowledgeability Journal: European Journal of Information Systems Pages: 460-466 Issue: 5 Volume: 15 Year: 2006 Month: 10 X-DOI: 10.1057/palgrave.ejis.3000639 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000639 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:5:p:460-466 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933909_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jacky Swan Author-X-Name-First: Jacky Author-X-Name-Last: Swan Title: Commentary on Wanda Orlikowski's ‘Material knowing: the scaffolding of human knowledgeability’ Journal: European Journal of Information Systems Pages: 467-469 Issue: 5 Volume: 15 Year: 2006 Month: 10 X-DOI: 10.1057/palgrave.ejis.3000640 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000640 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:5:p:467-469 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933910_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Robert D Galliers Author-X-Name-First: Robert D Author-X-Name-Last: Galliers Title: Commentary on Wanda Orlikowski's ‘Material knowing: the scaffolding of human knowledgeability’ Journal: European Journal of Information Systems Pages: 470-472 Issue: 5 Volume: 15 Year: 2006 Month: 10 X-DOI: 10.1057/palgrave.ejis.3000641 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000641 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:5:p:470-472 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933911_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Isabel M Prieto Author-X-Name-First: Isabel M Author-X-Name-Last: Prieto Author-Name: Mark Easterby-Smith Author-X-Name-First: Mark Author-X-Name-Last: Easterby-Smith Title: Dynamic capabilities and the role of organizational knowledge: an exploration Abstract: Two concepts, dynamic capabilities and knowledge management, are widely assumed to be linked to sustained competitive advantage, although researchers have found it hard to substantiate these assumptions. It has also been suggested that the interplay between the two is important, and that it needs to be better understood. In this paper, we therefore look at the nature of, and interaction between, organizational knowledge and dynamic capabilities in some detail. We do this first through a literature review, and second, through a case study of the evolution of a new international business. The study illustrates how forms of knowledge, particularly when transmitted via social interactions, can act as a source of dynamic capabilities, and we conclude with suggestions about further research on the social and political interactions between the two. Journal: European Journal of Information Systems Pages: 500-510 Issue: 5 Volume: 15 Year: 2006 Month: 10 X-DOI: 10.1057/palgrave.ejis.3000642 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000642 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:5:p:500-510 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933912_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Pablo Erat Author-X-Name-First: Pablo Author-X-Name-Last: Erat Author-Name: Kevin C Desouza Author-X-Name-First: Kevin C Author-X-Name-Last: Desouza Author-Name: Anja Schäfer-Jugel Author-X-Name-First: Anja Author-X-Name-Last: Schäfer-Jugel Author-Name: Monika Kurzawa Author-X-Name-First: Monika Author-X-Name-Last: Kurzawa Title: Business customer communities and knowledge sharing: exploratory study of critical issues Abstract: Businesses in knowledge intensive industries must appropriately engage with their customers in order to produce goods and services that are desired and valued in the marketplace. Engagement with customers calls for exchanging information and knowledge with customers and fostering exchanges between customers. Recent developments in the area of information and communication technologies (ICTs) have radically increased the variety of opportunities for improving customer engagement. In this paper, we will examine the use of ICTs to build Business Customer Communities (BCCs) to help an organization foster knowledge exchanges between its professional and institutional customers. We define BCCs as groups of business customers, which are deliberately enabled by a firm and share a long-term need to exchange work related knowledge through online and offline interaction. The objectives of this study are (1) to describe BCCs and outline their attributes and features, and (2) to contribute to the understanding of challenges associated with the enabling of BCC formation and how firms can overcome these challenges. As such, a contribution is made to the discussion of knowing in practice in customer communities, which rely in large part on ICT. Journal: European Journal of Information Systems Pages: 511-524 Issue: 5 Volume: 15 Year: 2006 Month: 10 X-DOI: 10.1057/palgrave.ejis.3000643 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000643 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:5:p:511-524 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934092_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Henning Baars Author-X-Name-First: Henning Author-X-Name-Last: Baars Author-Name: Daniel Gille Author-X-Name-First: Daniel Author-X-Name-Last: Gille Author-Name: Jens Strüker Author-X-Name-First: Jens Author-X-Name-Last: Strüker Title: Evaluation of RFID applications for logistics: a framework for identifying, forecasting and assessing benefits Abstract: As with all information technologies, there is a necessity to determine the profitability of investments in Radio Frequency Identification (RFID) ex ante. A particularly important aspect is the challenging task of evaluating the multi-faceted benefits of RFID deployments. While a large body of research on RFID benefits exists, our literature review indicates the absence of a comprehensive approach. We introduce a framework that combines the benefit evaluation steps of identification, forecasting and assessment. Based on insights gained in a 3-year research project with case studies in logistics, we refine a process-based IT-benefits classification and subsequently derive six types of RFID benefits that support the systematic identification of benefits, as well as the selection of forecast and assessment methods. We discuss how our framework can facilitate and enhance RFID investment decisions and guide future research activities. Journal: European Journal of Information Systems Pages: 578-591 Issue: 6 Volume: 18 Year: 2009 Month: 12 X-DOI: 10.1057/ejis.2009.32 File-URL: http://hdl.handle.net/10.1057/ejis.2009.32 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:6:p:578-591 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934093_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Frédéric Thiesse Author-X-Name-First: Frédéric Author-X-Name-Last: Thiesse Author-Name: Jasser Al-Kassab Author-X-Name-First: Jasser Author-X-Name-Last: Al-Kassab Author-Name: Elgar Fleisch Author-X-Name-First: Elgar Author-X-Name-Last: Fleisch Title: Understanding the value of integrated RFID systems: a case study from apparel retail Abstract: This contribution is concerned with the business value of Radio Frequency Identification (RFID) technology in retail. We present a case study of an RFID project at Galeria Kaufhof, a subsidiary of Metro Group and one of the largest department store chains in Europe. The project encompasses a variety of RFID applications at the intersection of store logistics and customer service. The contribution that our study makes to the literature is threefold. First, we describe an innovative large-scale trial that goes beyond what was done in earlier projects in several respects. The most fundamental difference from previous trials is the full integration of RFID event data with point-of-sale (POS) and master data, which for the first time offers the retailer the opportunity to directly observe and analyse physical in-store processes. Second, the heterogeneity of RFID applications implemented by Kaufhof allows us to theorise about the effects that RFID may have on business processes from an IT value perspective. We develop a conceptual model to explain the different cause-and-effect chains between RFID investments and their impact on firm performance, the role of complementary and contextual factors, and the difficulty of assessing these impacts using objective performance measures. Third, we compare the case to a prior trial conducted by Kaufhof about 5 years earlier. The differences between the lessons that the company learned in the two projects illustrate the impact of technological advances and standardisation efforts in recent years on managerial perceptions of RFID business value, which allows for the derivation of a number of useful implications for practice. Journal: European Journal of Information Systems Pages: 592-614 Issue: 6 Volume: 18 Year: 2009 Month: 12 X-DOI: 10.1057/ejis.2009.33 File-URL: http://hdl.handle.net/10.1057/ejis.2009.33 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:6:p:592-614 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934094_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Robert F Otondo Author-X-Name-First: Robert F Author-X-Name-Last: Otondo Author-Name: Allison W Pearson Author-X-Name-First: Allison W Author-X-Name-Last: Pearson Author-Name: Rodney A Pearson Author-X-Name-First: Rodney A Author-X-Name-Last: Pearson Author-Name: John C Shaw Author-X-Name-First: John C Author-X-Name-Last: Shaw Author-Name: Jung P Shim Author-X-Name-First: Jung P Author-X-Name-Last: Shim Title: Managerial problem-solving in the adoption of Radio Frequency Identification Technologies Abstract: This study explores the ways in which managers evaluate Radio Frequency Identification (RFID) and participate in its adoption. Using in-depth qualitative focus group and published trade journal interviews, our study contributes to research on managing RFID projects in organizations by identifying salient problems and relating them to sensemaking and influencing activities across problem types and manager experience with RFID. We also identify potential dangers in applying past knowledge, cognitive patterns, and experience about information and communication technologies (ICT) to problems that arise in RFID projects. Our study provides analytic generalizability for future RFID and ICT research. Journal: European Journal of Information Systems Pages: 553-569 Issue: 6 Volume: 18 Year: 2009 Month: 12 X-DOI: 10.1057/ejis.2009.39 File-URL: http://hdl.handle.net/10.1057/ejis.2009.39 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:6:p:553-569 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934095_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Katerina Pramatari Author-X-Name-First: Katerina Author-X-Name-Last: Pramatari Author-Name: Aristeidis Theotokis Author-X-Name-First: Aristeidis Author-X-Name-Last: Theotokis Title: Consumer acceptance of RFID-enabled services: a model of multiple attitudes, perceived system characteristics and individual traits Abstract: The introduction of emerging technologies in retailing and their infusion in the service encounter necessitates research to better understand consumer attitudes towards the usage of technology in service delivery systems. The capability of Radio Frequency Identification (RFID) technology to automatically and uniquely identify products makes this technology promising as an enabler of innovative consumer services. However there is limited research on how consumers perceive the RFID-enabled service systems. The authors develop and empirically test a model that focuses on consumer attitudes towards technology-based services. Based on the pre-prototype user acceptance framework and using RFID as a focal technology, the proposed model includes a hierarchy of three distinct consumer attitudes: towards the general service concept, towards the general technology-based service application and towards the RFID-enabled service. Perceived system characteristics as well as personality traits are included in the model. The partial least squares method of structural equation modelling is used to analyse 575 questionnaires collected in two consumer surveys in Greece (n=173) and Ireland (N=402). The results of the study show that consumer attitude towards RFID-enabled services in retailing can be modelled as a confluence of multiple attitudes. The results also indicate that perceived system-related factors – such as performance and effort expectancy – as well as individual traits – such as technology anxiety and information privacy concern – affect consumer attitude towards technology-based and RFID-enabled services, respectively. Journal: European Journal of Information Systems Pages: 541-552 Issue: 6 Volume: 18 Year: 2009 Month: 12 X-DOI: 10.1057/ejis.2009.40 File-URL: http://hdl.handle.net/10.1057/ejis.2009.40 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:6:p:541-552 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934096_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Gaurav Kapoor Author-X-Name-First: Gaurav Author-X-Name-Last: Kapoor Author-Name: Wei Zhou Author-X-Name-First: Wei Author-X-Name-Last: Zhou Author-Name: Selwyn Piramuthu Author-X-Name-First: Selwyn Author-X-Name-Last: Piramuthu Title: Challenges associated with RFID tag implementations in supply chains Abstract: Radio-Frequency Identification (RFID) tags are gaining widespread popularity throughout the supply chain from raw material acquisition, manufacturing, transportation, warehousing, retailing to the ultimate consumers. A majority of extant literature in this area explore the beneficial aspects of RFID tags such as their batch readability, resistance to harsh environmental conditions, information storage and processing capability, among others. Given the recent explosion of interest in RFID tag incorporation in supply chains, literature in the area has not yet comprehensively identified nor addressed associated challenges and impediments to successful implementations. We purport to fill this gap and to raise awareness by identifying and discussing critical issues such as ownership transfer, privacy/security, computing bottleneck, read error, and cost-benefit issues such as opportunity cost, risk of obsolescence, information sharing, and inter-operability standards. Journal: European Journal of Information Systems Pages: 526-533 Issue: 6 Volume: 18 Year: 2009 Month: 12 X-DOI: 10.1057/ejis.2009.41 File-URL: http://hdl.handle.net/10.1057/ejis.2009.41 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:6:p:526-533 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934097_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Richard Baskerville Author-X-Name-First: Richard Author-X-Name-Last: Baskerville Title: Preparing for evidence-based management Journal: European Journal of Information Systems Pages: 523-525 Issue: 6 Volume: 18 Year: 2009 Month: 12 X-DOI: 10.1057/ejis.2009.42 File-URL: http://hdl.handle.net/10.1057/ejis.2009.42 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:6:p:523-525 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934098_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Indranil Bose Author-X-Name-First: Indranil Author-X-Name-Last: Bose Author-Name: Eric W T Ngai Author-X-Name-First: Eric W T Author-X-Name-Last: Ngai Author-Name: Thompson S H Teo Author-X-Name-First: Thompson S H Author-X-Name-Last: Teo Author-Name: Sarah Spiekermann Author-X-Name-First: Sarah Author-X-Name-Last: Spiekermann Title: Managing RFID projects in organizations Journal: European Journal of Information Systems Pages: 534-540 Issue: 6 Volume: 18 Year: 2009 Month: 12 X-DOI: 10.1057/ejis.2009.43 File-URL: http://hdl.handle.net/10.1057/ejis.2009.43 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:6:p:534-540 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934099_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Samuel Fosso Wamba Author-X-Name-First: Samuel Fosso Author-X-Name-Last: Wamba Author-Name: Akemi Takeoka Chatfield Author-X-Name-First: Akemi Takeoka Author-X-Name-Last: Chatfield Title: A contingency model for creating value from RFID supply chain network projects in logistics and manufacturing environments Abstract: In the growing literature on RFID and other network technologies, the importance of organizational transformation at the supply chain level has been recognized. However, the literature lacks conceptual model development and salient mechanisms for achieving the level of organizational transformation required for stakeholders to realize the full business benefits from RFID projects. Furthermore, the RFID adoption, use, and impact studies to date largely focus on a single firm setting and on the retail sector. Therefore, this study intends to fill this knowledge gap in the literature, and develops a contingency model for creating value from RFID supply chain projects in logistics and manufacturing environments. For our model development, we draw upon extant diverse literatures, particularly the framework for IT-enabled business transformation, and leadership and organizational learning. The framework postulates a positive relationship between the level of organizational transformation effected by the use of information technology (IT) and the level of business benefits realized from IT. The contingency model draws on the framework, and explicates five contingency factors influencing value creation from RFID supply chain projects: environmental upheaval; leadership; second-order organizational learning; resources commitment; and organizational transformation. Using the contingency model as a conceptual guide, we also perform an analysis of longitudinal real-world case data from a Canadian third-party logistics service firm's seven-layer supply chain RFID projects. The case study analysis provides evidence for the imperative of the contingency factors identified in the model for creating value from the RFID projects. Furthermore, it also reveals the differential costs for the focal firm and the up-stream manufacturing as a key barrier to realizing the full RFID benefits at the supply chain level. Journal: European Journal of Information Systems Pages: 615-636 Issue: 6 Volume: 18 Year: 2009 Month: 12 X-DOI: 10.1057/ejis.2009.44 File-URL: http://hdl.handle.net/10.1057/ejis.2009.44 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:6:p:615-636 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934100_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Wei Zhou Author-X-Name-First: Wei Author-X-Name-Last: Zhou Author-Name: Gaurav Kapoor Author-X-Name-First: Gaurav Author-X-Name-Last: Kapoor Author-Name: Selwyn Piramuthu Author-X-Name-First: Selwyn Author-X-Name-Last: Piramuthu Title: RFID-enabled item-level product information revelation Abstract: We consider a homogeneous product market and the incentive for oligopolists to share item-level product information with their customers. Enabled by Radio Frequency Identification technology, each firm has the option to record and reveal item-level information of a proportion of its products. We consider a two-stage game where each firm first decides its production plan and then determines its level of information revelation. With a constant clearance discount rate, we derive pure strategy equilibria that are subgame perfect and demonstrate that complete information sharing is the unique Nash equilibrium for the game when the common demand is volatile and that no information revelation is the unique Nash equilibrium when demand is not volatile. Furthermore, we show that the Nash equilibrium is the same with a decreasing clearance discount rate and that neither complete information revelation nor zero information revelation is consistent with an equilibrium with an increasing discount rate. Results are similar in a duopoly non-homogeneous product market scenario. Journal: European Journal of Information Systems Pages: 570-577 Issue: 6 Volume: 18 Year: 2009 Month: 12 X-DOI: 10.1057/ejis.2009.45 File-URL: http://hdl.handle.net/10.1057/ejis.2009.45 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:18:y:2009:i:6:p:570-577 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934011_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Catherine L Wang Author-X-Name-First: Catherine L Author-X-Name-Last: Wang Author-Name: Pervaiz K Ahmed Author-X-Name-First: Pervaiz K Author-X-Name-Last: Ahmed Author-Name: Mohammed Rafiq Author-X-Name-First: Mohammed Author-X-Name-Last: Rafiq Title: Knowledge management orientation: construct development and empirical validation Abstract: We introduce the concept of knowledge management orientation (KMO) – the degree to which a firm demonstrates behaviors of organized and systematic knowledge management (KM) implementation. Based on an extensive review of the KM literature, the KMO concept is operationalized as a second-order latent construct consisting of four main component factors: organizational memory, knowledge sharing, knowledge absorption, and knowledge receptivity. We then validate the KMO construct using data from 213 United Kingdom firms. The findings provide strong support for the unidimensionality, reliability, discriminant validity, and convergent validity of the KMO construct. We also test the impact of KMO on firm performance and find a significant, positive relationship, providing support for the predictive validity of the KMO construct. Our findings suggest that KMO is an effective measure of the firm-level KM-oriented behaviors. The theoretical, methodological, and practical implications of the KMO construct are also discussed. Journal: European Journal of Information Systems Pages: 219-235 Issue: 3 Volume: 17 Year: 2008 Month: 6 X-DOI: 10.1057/ejis.2008.12 File-URL: http://hdl.handle.net/10.1057/ejis.2008.12 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:3:p:219-235 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934012_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Uri Gal Author-X-Name-First: Uri Author-X-Name-Last: Gal Author-Name: Kalle Lyytinen Author-X-Name-First: Kalle Author-X-Name-Last: Lyytinen Author-Name: Youngjin Yoo Author-X-Name-First: Youngjin Author-X-Name-Last: Yoo Title: The dynamics of IT boundary objects, information infrastructures, and organisational identities: the introduction of 3D modelling technologies into the architecture, engineering, and construction industry Abstract: In recent years, more companies engage in collaborative cross-organisational practices to achieve their business objectives. To cooperate effectively across boundaries requires organisations to overcome the tension between their distinct backgrounds and the need to create shared understandings with their partners for collaboration. This requires the creation of shared artefacts such as boundary objects. Whereas the past work on boundary objects has highlighted their role as translation devices, we examine them in relation to the information infrastructures within which they are embedded, and the identities of the organisations that use them. We propose a model that outlines the relationships among the three concepts and illustrate its dynamics by presenting two case studies that describe the introduction of three-dimensional modelling technologies into the architecture, engineering, and construction industry. Based on the case studies we suggest that boundary objects, in addition to facilitating cross-organisational communication, also help to form organisational identities. We further suggest the occurrence of a process whereby changes in boundary objects enable changes in information infrastructures and identities in one organisation. These changes, in turn, create the conditions for change in bordering organisations through shared boundary objects and boundary practices. Journal: European Journal of Information Systems Pages: 290-304 Issue: 3 Volume: 17 Year: 2008 Month: 6 X-DOI: 10.1057/ejis.2008.13 File-URL: http://hdl.handle.net/10.1057/ejis.2008.13 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:3:p:290-304 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934013_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bijan Azad Author-X-Name-First: Bijan Author-X-Name-Last: Azad Author-Name: Nelson King Author-X-Name-First: Nelson Author-X-Name-Last: King Title: Enacting computer workaround practices within a medication dispensing system Abstract: Computer workarounds in health information systems (HIS) threaten the potential for gains in efficiency through computerization aimed at reducing process variability. Eliminating such workarounds is desirable, but information system (IS) researchers tend to treat computer workarounds as black-boxes, whereas HIS researchers are primarily concerned with descriptive or prescriptive remedies. We propose to open the black-box of computer workarounds and study them as situated practices that consist of adjustments to existing computer-based procedures, which are enabled by the negotiated order of a hospital. This negotiative property of a hospital's organizational environment allows for interpretive flexibility, in which physicians stretch certain rules in practice, while inducing others to cooperate. We illustrate this conceptual framework with a non-participant observer case study of a medication dispensing system used in a teaching hospital to support a prior-approval policy for anti-microbial drugs. Within these enacted workaround practices, we found significant variety in roles, timing and interactions, which boil down to a pattern of four practices revolving around one function of an HIS. Our research extends the literature on computer workarounds in IS and HIS by proposing a theoretical understanding of workaround practices based on a contextual healthcare study. Journal: European Journal of Information Systems Pages: 264-278 Issue: 3 Volume: 17 Year: 2008 Month: 6 X-DOI: 10.1057/ejis.2008.14 File-URL: http://hdl.handle.net/10.1057/ejis.2008.14 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:3:p:264-278 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934014_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Stacie Petter Author-X-Name-First: Stacie Author-X-Name-Last: Petter Author-Name: William DeLone Author-X-Name-First: William Author-X-Name-Last: DeLone Author-Name: Ephraim McLean Author-X-Name-First: Ephraim Author-X-Name-Last: McLean Title: Measuring information systems success: models, dimensions, measures, and interrelationships Abstract: Since DeLone and McLean (D&M) developed their model of IS success, there has been much research on the topic of success as well as extensions and tests of their model. Using the technique of a qualitative literature review, this research reviews 180 papers found in the academic literature for the period 1992–2007 dealing with some aspect of IS success. Using the six dimensions of the D&M model – system quality, information quality, service quality, use, user satisfaction, and net benefits – 90 empirical studies were examined and the results summarized. Measures for the six success constructs are described and 15 pairwise associations between the success constructs are analyzed. This work builds on the prior research related to IS success by summarizing the measures applied to the evaluation of IS success and by examining the relationships that comprise the D&M IS success model in both individual and organizational contexts. Journal: European Journal of Information Systems Pages: 236-263 Issue: 3 Volume: 17 Year: 2008 Month: 6 X-DOI: 10.1057/ejis.2008.15 File-URL: http://hdl.handle.net/10.1057/ejis.2008.15 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:3:p:236-263 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934015_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Henry E Newkirk Author-X-Name-First: Henry E Author-X-Name-Last: Newkirk Author-Name: Albert L Lederer Author-X-Name-First: Albert L Author-X-Name-Last: Lederer Author-Name: Alice M Johnson Author-X-Name-First: Alice M Author-X-Name-Last: Johnson Title: Rapid business and IT change: drivers for strategic information systems planning? Abstract: Today's organizations increasingly plan new information systems (IS) to better compete. Through such planning, they attempt to align their IS strategy and their business strategy. This study tested the impact of business and information technology (IT) change on strategic information systems planning (SISP) horizon, of horizon on the planning itself, and of the planning on the alignment of IS strategy and business strategy. A questionnaire defined business change, IT change, and alignment as multi-item scaled questions, and planning horizon as a single, nonscaled one. It defined a multi-item scaled SISP measure as both a second-order construct and as single-order constructs for its individual phases. A postal survey collected data from 161 IS executives. Constructs were extensively validated. The analysis used structural equation modeling, and surprisingly found that business change predicted longer SISP horizons, but IT change predicted neither longer nor shorter ones. Planning horizon predicted SISP itself (as a second-order construct and as all of its phases), and such planning (as a second-order construct, and as strategic awareness and strategy conception phases) predicted alignment of IS strategy and business strategy. These findings suggest that practitioners more carefully assess their own degree of caution in setting planning horizons in response to business and IT change. In fact, the findings suggest it may not be necessary for practitioners to shorten planning horizons in a rapidly changing environment. Journal: European Journal of Information Systems Pages: 198-218 Issue: 3 Volume: 17 Year: 2008 Month: 6 X-DOI: 10.1057/ejis.2008.16 File-URL: http://hdl.handle.net/10.1057/ejis.2008.16 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:3:p:198-218 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934016_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Selamawit Molla Mekonnen Author-X-Name-First: Selamawit Molla Author-X-Name-Last: Mekonnen Author-Name: Sundeep Sahay Author-X-Name-First: Sundeep Author-X-Name-Last: Sahay Title: An institutional analysis on the dynamics of the interaction between standardizing and scaling processes: a case study from Ethiopia Abstract: This paper presents an institutional theory-inspired analysis of the dynamics of interaction between processes of standardizing and scaling, in the context of Health Information Systems implementation in the Ethiopian public health care system. Standardizing and scaling have, in existing research, been treated primarily as independent technical processes that are isolated from the institutional context in which they take place. This paper tries to redress this balance in this research in two ways. Firstly, it argues for these processes to be taken as inter-related which can both support and undermine each other. Secondly, this mutual interaction is argued to be mediated by the institutional context. Specifically, we draw upon concepts from institutional theory inspired by Douglas North, focusing on the degree of overlap between formal institutions (attempts to establish formal policy on activities such as the definition of indicators and uniform reporting formats) and informal constraints in practice reflected in inadequate capacity – both technological and human, and existing work practices. Journal: European Journal of Information Systems Pages: 279-289 Issue: 3 Volume: 17 Year: 2008 Month: 6 X-DOI: 10.1057/ejis.2008.17 File-URL: http://hdl.handle.net/10.1057/ejis.2008.17 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:3:p:279-289 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934017_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jan Kietzmann Author-X-Name-First: Jan Author-X-Name-Last: Kietzmann Title: Interactive innovation of technology for mobile work Abstract: Despite the increasing popularity of mobile information systems, the actual processes leading to the innovation of mobile technologies remain largely unexplored. This study uses Action Research to examine the innovation of a mobile RFID technology. Working from Activity Theory, it departs from the prevalent product-oriented view of innovation and treats technology-in-the-making as a complex activity, made possible through the interaction of manufacturers, their organisational clients and their respective mobile workers. The lens of a normative Interactive Innovation Framework reveals distinctive interaction problems that bear on the innovation activity. In addition to difficulties emerging from dissimilar motivations for the innovation project, the mobile setting presents unique contradictions based on the geographical distribution of its participants, the diverse role of mobile technology, the complexity of interacting through representations and the importance of the discretion with which mobile work activities are carried out today. Journal: European Journal of Information Systems Pages: 305-320 Issue: 3 Volume: 17 Year: 2008 Month: 6 X-DOI: 10.1057/ejis.2008.18 File-URL: http://hdl.handle.net/10.1057/ejis.2008.18 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:3:p:305-320 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934018_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Raymond R Panko Author-X-Name-First: Raymond R Author-X-Name-Last: Panko Title: IT employment prospects: beyond the dotcom bubble Abstract: In the 1990s, enrollments grew rapidly in information systems (IS) and computer science. Then, beginning in 2000 and 2001, enrollments declined precipitously. This paper looks at the enrollment bubble and the dotcom bubble that drove IT enrollments. Although the enrollment bubble occurred worldwide, this paper focuses primarily on U.S. data, which is widely available, and secondarily on Western Europe data. The paper notes that the dotcom bubble was an investment disaster but that U.S. IT employment fell surprisingly little and soon surpassed the bubble's peak IT employment. In addition, U.S. IT unemployment rose to almost the level of total unemployment in 2003, then fell to traditional low levels by 2005. Job prospects in the U.S. and most other countries are good for the short term, and the U.S. Bureau of Labor Statistics employment projections for 2006–2016 indicate that job prospects in the U.S. will continue to be good for most IT jobs. However, offshoring is a persistent concern for students in Western Europe and the United States. The data on offshoring are of poor quality, but several studies indicate that IT job losses from offshoring are small and may be counterbalanced by gains in IT inshoring jobs. At the same time, offshoring and productivity gains appear to be making low-level jobs such as programming and user support less attractive. This means that IS and computer science programs will have to focus on producing higher-level job skills among graduates. In addition, students may have to stop considering the undergraduate degree to be a terminal degree in IS and computer science. Journal: European Journal of Information Systems Pages: 182-197 Issue: 3 Volume: 17 Year: 2008 Month: 6 X-DOI: 10.1057/ejis.2008.19 File-URL: http://hdl.handle.net/10.1057/ejis.2008.19 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:3:p:182-197 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934019_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Richard Baskerville Author-X-Name-First: Richard Author-X-Name-Last: Baskerville Title: Strategies, systems, and technologies Journal: European Journal of Information Systems Pages: 179-181 Issue: 3 Volume: 17 Year: 2008 Month: 6 X-DOI: 10.1057/ejis.2008.20 File-URL: http://hdl.handle.net/10.1057/ejis.2008.20 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:3:p:179-181 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933768_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Steven Alter Author-X-Name-First: Steven Author-X-Name-Last: Alter Title: Possibilities for cross-fertilization between interpretive approaches and other methods for analyzing information systems Abstract: This paper explores possibilities for cross-fertilization between interpretive approaches and other approaches for performing the initial analysis of an information system as part of an effort to redesign and improve it. The paper presents a hypothetical situation concerning the analysis of a loan approval system in a large bank. It assumes that ethnographers observed three systems analysis projects that applied different approaches in three identical banks. It uses hypothetical accounts of the three analysis efforts to propose likely differences in the process and in the results. These differences illustrate possible opportunities for cross-fertilization that might make each approach more powerful and reliable. The paper concludes that the most likely direction for cross-fertilization is from interpretive approaches to the other approaches. An earlier version of this paper was presented at the First International Workshop on Interpretive Approaches to Information Systems and Computing Research, SIG-IAM, Brunel University, July 25–27, 2002, to motivate discussion about the applications, strengths, and limitations of interpretive approaches and to help in the further development of systems analysis methods. Journal: European Journal of Information Systems Pages: 173-185 Issue: 3 Volume: 13 Year: 2004 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000499 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000499 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:3:p:173-185 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933769_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Andy Crabtree Author-X-Name-First: Andy Author-X-Name-Last: Crabtree Title: Taking technomethodology seriously: hybrid change in the ethnomethodology–design relationship Abstract: The incorporation of ethnomethodology in professional systems development has prompted the call for the approach to move from design critique to design practice and the invention of the future. This has resulted in the development of a variety of mixing pot hybrids that have had marginal impact upon product-based development, whose needs the approach has been configured to meet. This paper suggests that a concern to fit ethnomethodology into product-based development life cycles is a primary source of the difficulties encountered in moving ethnomethodology from design critique to design practice. In practice, ethnomethodology is largely employed in research rather than product development settings. Recognition of the real-world uses of ethnomethodology in design practice opens up the possibility of devising a hybrid methodology that actively supports the invention of the future. Accordingly, this paper articulates a distinct socio-technical model that provides an iterative structure for the constructive involvement of ethnomethodology in processes of technological innovation, the results of which may subsequently be subject to the rationalities and constraints of product development. Journal: European Journal of Information Systems Pages: 195-209 Issue: 3 Volume: 13 Year: 2004 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000500 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000500 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:3:p:195-209 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933770_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Paul Wernick Author-X-Name-First: Paul Author-X-Name-Last: Wernick Author-Name: Tracy Hall Author-X-Name-First: Tracy Author-X-Name-Last: Hall Title: Can Thomas Kuhn's paradigms help us understand software engineering? Abstract: Recent articles in EJIS have discussed whether or not Information Systems is a ‘discipline’. In The Structure of Scientific Revolutions, Kuhn states that a scientific discipline can be identified by reference to its underlying belief system, the ‘paradigm’ or ‘disciplinary matrix’, to which all workers in that field must commit. An important element of Kuhn's model is the notion of ‘scientific communities’. We consider here the belief system underlying Software Engineering (SE). We examine the extent to which a belief system analogous to the disciplinary matrix of a Kuhnian science can be identified in SE. Our preliminary fieldwork has comprised an examination of books used by SE students and practitioners, and in-depth interviews with a number of practitioners. The results of this study suggest that the current status of the theory of SE parallels Kuhn's ‘pre-paradigm’ stage of scientific development. At this early stage, theorists and practitioners are divided into schools. These schools are based on differences in the beliefs and models forming their disciplinary matrices. We conclude that the application by analogy of Kuhn's view of scientific activity to SE is justifiable. Our findings can assist both SE theorists and practitioners in improving the understanding of how and why software development projects succeed or fail. Our findings also provide a framework within which to place the beliefs, models and values which underlie SE. Such a framework can contribute to the discussion as to whether the software development-related aspects of Information Systems can be considered to be a discipline, and if so how that discipline is structured. Journal: European Journal of Information Systems Pages: 235-243 Issue: 3 Volume: 13 Year: 2004 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000501 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000501 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:3:p:235-243 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933771_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Wes Sharrock Author-X-Name-First: Wes Author-X-Name-Last: Sharrock Author-Name: Dave Randall Author-X-Name-First: Dave Author-X-Name-Last: Randall Title: Ethnography, ethnomethodology and the problem of generalisation in design Abstract: This paper discusses the relationship between sociological theory and method, ethnomethodology and design. It argues that social science theoretical and methodological interests cannot form a basis for interdisciplinarity. Much of the argument about the relevance of ethnography for design, and more specifically about ethnomethodological enquiry, has been cast firstly as problems of method and secondly in terms of the problem of generalisation. We argue that in both instances the problem is miscast. Drawing on the arguments of Wittgenstein and Winch, we suggest that forms of generalisation are to be found in ethnomethodological enquiry and that they may be useful in design-related enquiry. We further suggest, however, that they are not the forms to be found in explanatory social science. Journal: European Journal of Information Systems Pages: 186-194 Issue: 3 Volume: 13 Year: 2004 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000502 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000502 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:3:p:186-194 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933772_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Lucas D Introna Author-X-Name-First: Lucas D Author-X-Name-Last: Introna Author-Name: Fernando M Ilharco Author-X-Name-First: Fernando M Author-X-Name-Last: Ilharco Title: The ontological screening of contemporary life: a phenomenological analysis of screens Abstract: In this paper, we attempt to show how phenomenology, in a traditional methodological form, can provide an interesting and novel basis for thinking about screens in a world where screens now pervade a great many aspects of human experience. In our analysis, we aim to give a phenomenological account of screen(ing), that is, of its fundamental and foundational meaning. In doing the phenomenological analysis, we ground our argument on the ontology of Heidegger's Being and Time. In doing this, we claim that the screen will only show itself, as that which it is, as a screen in-the-world, where screens already are or have their being ‘as screens’ for this and that purpose, activity or work. We claim, and aim to show, that our analysis provides many insights about the meaning of screens that would be difficult to gain through any other method of investigation. We also argue and show that, although our method is not empirical, its results have important implications for the empirical world. Journal: European Journal of Information Systems Pages: 221-234 Issue: 3 Volume: 13 Year: 2004 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000503 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000503 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:3:p:221-234 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933773_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Matthew Chalmers Author-X-Name-First: Matthew Author-X-Name-Last: Chalmers Title: Hermeneutics, information and representation Abstract: By drawing from semiology, epistemology and philosophical hermeneutics, we discuss the way that computer systems, particularly systems used in collaborative work, represent information, situation and activity. In other words, we focus on approaches to representation in design for computer-supported collaborative work (CSCW). We point out similarities between discourse in hermeneutics and in the anthropology and sociology that predominates in CSCW, and propose that a hermeneutic perspective offers a unifying view on the social science and computer science within CSCW. We discuss formalisation, adaptation and objectivity in our theories, methodologies and implementations, and offer collaborative filtering and its extension, the path model, as examples of practical approaches to representation, which show, support and adapt with activity in a hermeneutic style. Journal: European Journal of Information Systems Pages: 210-220 Issue: 3 Volume: 13 Year: 2004 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000504 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000504 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:3:p:210-220 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933774_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ray J Paul Author-X-Name-First: Ray J Author-X-Name-Last: Paul Title: Time, change and beliefs Journal: European Journal of Information Systems Pages: 165-165 Issue: 3 Volume: 13 Year: 2004 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000506 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000506 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:3:p:165-165 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933775_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Anjana Bhattacharjee Author-X-Name-First: Anjana Author-X-Name-Last: Bhattacharjee Author-Name: Ray J Paul Author-X-Name-First: Ray J Author-X-Name-Last: Paul Title: Special issue on “interpretive” approaches to information systems and computing Journal: European Journal of Information Systems Pages: 166-166 Issue: 3 Volume: 13 Year: 2004 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000507 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000507 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:3:p:166-166 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933776_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Anjana Bhattacharjee Author-X-Name-First: Anjana Author-X-Name-Last: Bhattacharjee Title: “Interpretive” mobility, IS and computing Abstract: The existing state of the art within “interpretive” sociology is introduced as an initial point of reference. The special issue papers are then discussed in an order that proposes to exemplify the interdisciplinary nature of the arguments at hand. Thus, we attempt an experiential introduction to the prospect of developing both an individual and a disciplinary capacity for “interpretive” mobility. The paper concludes with an invitation to continue this development in the light of an explicit caveat emptor. Journal: European Journal of Information Systems Pages: 167-172 Issue: 3 Volume: 13 Year: 2004 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000508 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000508 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:3:p:167-172 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934138_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ismail Sila Author-X-Name-First: Ismail Author-X-Name-Last: Sila Title: Do organisational and environmental factors moderate the effects of Internet-based interorganisational systems on firm performance? Abstract: We developed a model of the relationships among several organisational, interorganisational and technological factors, the adoption of Internet-based interorganisational systems (IBIS) and various measures of firm performance. We used structural equation modelling to empirically test these relationships. The findings showed that adopting IBIS indirectly improves the operational performance of firms through business process performance. The positive effect on financial performance of adopting IBIS is not direct, but through the mediating effects of operational performance and business process performance. We also utilised multiple group analysis to test some of the model relationships across firms using several organisational and environmental factors as moderators. The organisational factors tested are firm type, age and ownership type. The environmental factors consisted of dynamism, complexity and hostility. We found that the organisational factors are significant moderators and that complexity and hostility are not significant moderators. However, the effects of dynamism as a moderator are less clear. Journal: European Journal of Information Systems Pages: 581-600 Issue: 5 Volume: 19 Year: 2010 Month: 10 X-DOI: 10.1057/ejis.2010.28 File-URL: http://hdl.handle.net/10.1057/ejis.2010.28 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:5:p:581-600 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934139_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Margaret F Reid Author-X-Name-First: Margaret F Author-X-Name-Last: Reid Author-Name: Myria W Allen Author-X-Name-First: Myria W Author-X-Name-Last: Allen Author-Name: Deborah J Armstrong Author-X-Name-First: Deborah J Author-X-Name-Last: Armstrong Author-Name: Cynthia K Riemenschneider Author-X-Name-First: Cynthia K Author-X-Name-Last: Riemenschneider Title: Perspectives on challenges facing women in IS: the cognitive gender gap Abstract: The persistently low number of women in the information systems (IS) field has led to numerous inquiries about barriers women might face to entry and advancement in the profession. Because IS has traditionally been male dominated, masculine values tend to predominate in the profession. In the current study, same sex focus groups of male and female managers discussed challenges women in IS face that their male colleagues might not. By simultaneously analyzing the perceptions of male and female IS managers, we identified areas of overlap and divergence in the concepts as well as in the linkages between the concepts. Although the men and women's maps shared 10 concepts, none of the linkages between the concepts were the same in the two maps. We thus find that men and women have little cognitive overlap about the challenges that women face. Overall, male participants generally realize that women face a number of challenges associated with female gender role expectations, and more generally challenges they encounter in their workplaces and in the IS field. Their understanding of the challenges, however, appears to be superficial. We call on organizations and the IS profession to devise novel responses and training approaches to promote change in the IS culture. Journal: European Journal of Information Systems Pages: 526-539 Issue: 5 Volume: 19 Year: 2010 Month: 10 X-DOI: 10.1057/ejis.2010.30 File-URL: http://hdl.handle.net/10.1057/ejis.2010.30 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:5:p:526-539 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934140_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Régis Meissonier Author-X-Name-First: Régis Author-X-Name-Last: Meissonier Author-Name: Emmanuel Houzé Author-X-Name-First: Emmanuel Author-X-Name-Last: Houzé Title: Toward an ‘IT Conflict-Resistance Theory’: action research during IT pre-implementation Abstract: Most empirical research on users’ resistance toward Information Technology (IT) has been conducted after implementation of IT in organisations. Little research has been done on the way individual and group resistance emerges and evolves during prior stages of projects. This focus on pre-implementation phases is important since Information Systems (IS) managers need to anticipate potential conflicts and users’ resistance that can involve project failure. While IS literature has separately developed theories on resistance and conflicts, we conceptualise a whole theoretic-system we call ‘IT Conflict-Resistance Theory’ (IT-CRT). This theory is used as driver for a 2-year action research project conducted at Netia Corporation (a worldwide leader in video and audio broadcasting) during preliminary phases of its Enterprise Resource Planning (ERP) implementation project. According to our findings, while conflicts toward IT implementation are often considered to have negative effects and require being actively managed by top managers, the case study delivers an alternative observation: a passive-like attitude of managers during the IT pre-implantation phase does not prevent the resolution of a socio-political oriented conflict between two groups of employees. Our observations illustrate how the avoidance management style invites team members to cope with conflict situations and to express tacit causes of resistance. While most Management Information System methods tend naturally to maximise users’ satisfaction and to reduce potential resistance, the IT-CRT theory developed in this article supports an alternative approach: enhancing resistance in order to anticipate and resolve latent conflicts that are directly or indirectly related to the project. The underlying message of this article for researchers and practitioners is to consider users’ resistance toward IT as a key process embedded into IT choices and IS design. Journal: European Journal of Information Systems Pages: 540-561 Issue: 5 Volume: 19 Year: 2010 Month: 10 X-DOI: 10.1057/ejis.2010.35 File-URL: http://hdl.handle.net/10.1057/ejis.2010.35 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:5:p:540-561 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934141_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ying Lu Author-X-Name-First: Ying Author-X-Name-Last: Lu Author-Name: Keshavamurthy Ramamurthy Author-X-Name-First: Keshavamurthy Author-X-Name-Last: Ramamurthy Title: Proactive or reactive IT leaders? A test of two competing hypotheses of IT innovation and environment alignment Abstract: When does it benefit a firm to take a lead in innovation with information technology (IT)? How should a firm align its IT innovation with a dynamic industry? In addressing these questions we present a typology of IT Innovation and Environment Alignment (ITIEA) based on a firm's IT innovation strategic orientation and the industry environment. The traditional ‘fit’ perspective predicts that a firm that matches its IT innovation with a dynamic environment would obtain performance benefits. In contrast, the ‘options’ perspective suggests that a firm that takes advantage of a stable environment to proactively pursue IT innovation and develop IT capability as real options would obtain performance advantage. We employ a quasi-experiment design to test these two competing hypotheses using archival data of IT leaders over a time frame of 6 years. We perform a longitudinal analysis of the performance change trajectories of proactive and reactive IT leaders over time. The results indicate a general support for the ‘options’ perspective that proactive IT leaders that lead in innovation with IT in relatively stable environments are found to consistently outperform reactive IT leaders in overall performance, allocative efficiency, and cost efficiency in management process. However, interestingly, the results also show a partial support for the ‘fit’ perspective that reactive IT leaders that emphasize intensive deployment of IT innovation in dynamic environments are found to obtain a cost advantage in production and operation process over time. The findings offer practical implications for managers to better engage in IT innovations to create and sustain competitive advantage. Synthesizing options thinking and dynamic capability perspective, we provide a framework to better understand IT innovation, dynamic environment, and performance outcomes. The findings also shed useful light on whether, when, and how to innovate with IT for sustained competitive advantage. Journal: European Journal of Information Systems Pages: 601-618 Issue: 5 Volume: 19 Year: 2010 Month: 10 X-DOI: 10.1057/ejis.2010.36 File-URL: http://hdl.handle.net/10.1057/ejis.2010.36 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:5:p:601-618 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934142_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jessie Pallud Author-X-Name-First: Jessie Author-X-Name-Last: Pallud Author-Name: Emmanuel Monod Author-X-Name-First: Emmanuel Author-X-Name-Last: Monod Title: User experience of museum technologies: the phenomenological scales Abstract: Museums increasingly rely on technology as a guarantee of enhanced visitor experience. However, both in Information Systems and Museology research, little attention has been paid to the evaluation of user experience (UX) with technologies in cultural heritage environments. This paper reports research in this area that uses a framework of interpretive archaeology and phenomenology. Users of museum technologies are studied to determine whether the framework's criteria correspond to visitor expectations and can be met by Information Technologies (IT). Our epistemology is methodologically independent and by using a multi-methodological approach, mixing both qualitative and quantitative approaches, it is consistent with the original spirit of the theory of understanding. The findings confirm the importance of phenomenology and post-phenomenology as a reference to assess IT UX in museums. In addition, our field study indicates that technologies available in museums – namely audio guides, interactive kiosks and computers – contribute positively to an experience of the past. Journal: European Journal of Information Systems Pages: 562-580 Issue: 5 Volume: 19 Year: 2010 Month: 10 X-DOI: 10.1057/ejis.2010.37 File-URL: http://hdl.handle.net/10.1057/ejis.2010.37 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:5:p:562-580 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934143_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jan Recker Author-X-Name-First: Jan Author-X-Name-Last: Recker Author-Name: Marta Indulska Author-X-Name-First: Marta Author-X-Name-Last: Indulska Author-Name: Michael Rosemann Author-X-Name-First: Michael Author-X-Name-Last: Rosemann Author-Name: Peter Green Author-X-Name-First: Peter Author-X-Name-Last: Green Title: The ontological deficiencies of process modeling in practice Abstract: Business process modeling is widely regarded as one of the most popular forms of conceptual modeling. However, little is known about the capabilities and deficiencies of process modeling grammars and how existing deficiencies impact actual process modeling practice. This paper is a first contribution towards a theory-driven, exploratory empirical investigation of the ontological deficiencies of process modeling with the industry standard Business Process Modeling Notation (BPMN). We perform an analysis of BPMN using a theory of ontological expressiveness. Through a series of semi-structured interviews with BPMN adopters we explore empirically the actual use of this grammar. Nine ontological deficiencies related to the practice of modeling with BPMN are identified, for example, the capture of business rules and the specification of process decompositions. We also uncover five contextual factors that impact on the use of process modeling grammars, such as tool support and modeling conventions. We discuss implications for research and practice, highlighting the need for consideration of representational issues and contextual factors in decisions relating to BPMN adoption in organizations. Journal: European Journal of Information Systems Pages: 501-525 Issue: 5 Volume: 19 Year: 2010 Month: 10 X-DOI: 10.1057/ejis.2010.38 File-URL: http://hdl.handle.net/10.1057/ejis.2010.38 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:5:p:501-525 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934144_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Frantz Rowe Author-X-Name-First: Frantz Author-X-Name-Last: Rowe Title: Valuing worldwide diversity in a European spirit: being more critical and open Journal: European Journal of Information Systems Pages: 495-500 Issue: 5 Volume: 19 Year: 2010 Month: 10 X-DOI: 10.1057/ejis.2010.43 File-URL: http://hdl.handle.net/10.1057/ejis.2010.43 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:5:p:495-500 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933566_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: David J Skyrme Author-X-Name-First: David J Author-X-Name-Last: Skyrme Title: Information Systems and Technology in the International Office of the Future Journal: European Journal of Information Systems Pages: 150-151 Issue: 2 Volume: 7 Year: 1998 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000273 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000273 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:7:y:1998:i:2:p:150-151 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933567_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: David Targett Author-X-Name-First: David Author-X-Name-Last: Targett Title: Corporate Internet: Planning Guide Journal: European Journal of Information Systems Pages: 151-152 Issue: 2 Volume: 7 Year: 1998 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000280 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000280 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:7:y:1998:i:2:p:151-152 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933568_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Shirin Madon Author-X-Name-First: Shirin Author-X-Name-Last: Madon Title: Learning with Information Systems—Learning Cycles in Information Systems Development Journal: European Journal of Information Systems Pages: 152-153 Issue: 2 Volume: 7 Year: 1998 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000281 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000281 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:7:y:1998:i:2:p:152-153 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933569_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: T W Ferratt Author-X-Name-First: T W Author-X-Name-Last: Ferratt Author-Name: G E Vlahos Author-X-Name-First: G E Author-X-Name-Last: Vlahos Title: An investigation of task-technology fit for managers in Greece and the US Abstract: Based on a task-technology fit (TTF) model, this study adds to our understanding of how computer-based information systems (CBIS) support managerial decision making. Based on four views of decision making and various classifications of CBIS, the findings indicate that both the Greek and US managers value CBIS most highly for resource allocation, evaluating alternatives, identifying problems, ranking alternatives, and short-term decision making. Few TTF differences were found between Greek and US managers. One difference, concerning the value of office information systems, may have arisen from technological differences; however, additional research is needed to understand if these TTF differences arise from technological or cultural differences. Two surprising hypotheses emerge from the findings to provide guidance for future research: (1) standard, fixed-schedule, fixed-format information reporting systems (IRS) provide greater value for managers than more flexible decision support systems (DSS), at least for some managerial decision-making activities, and (2) the amount of use of a CBIS is not directly related to its perceived value. Overall, the results indicate that the fit between managerial decision-making activities, and CBIS has considerable room for improvement. Journal: European Journal of Information Systems Pages: 123-136 Issue: 2 Volume: 7 Year: 1998 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000288 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000288 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:7:y:1998:i:2:p:123-136 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933570_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Z Xiao Author-X-Name-First: Z Author-X-Name-Last: Xiao Author-Name: P L Powell Author-X-Name-First: P L Author-X-Name-Last: Powell Author-Name: J H Dodgson Author-X-Name-First: J H Author-X-Name-Last: Dodgson Title: The impact of information technology on information asymmetry Abstract: While much research has been undertaken on the impact and consequences of information systems on direct users of the systems and on their organizations, comparatively little recent work has addressed the impact on users of the information. For instance, accounting is the most widespread quantitative information system in use and one which has been profoundly affected by information technology (IT). Yet, existing studies of the impact of IT on accounting focus only on accountants themselves and internal financial reporting and they ignore external users of accounting information. As a first step toward a broader perspective, this paper empirically examines the effect of IT use on the information asymmetry (IA) between managers and external users by contrasting the role of IT in internal and external reporting. The paper suggests that IA has been aggravated, and IT use has played a role in this exacerbation. The implication is that the effect of IT use in accounting is not confined to accountants and individual organizations but extends to external stakeholders. Journal: European Journal of Information Systems Pages: 77-89 Issue: 2 Volume: 7 Year: 1998 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000291 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000291 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:7:y:1998:i:2:p:77-89 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933571_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: J A A Sillince Author-X-Name-First: J A A Author-X-Name-Last: Sillince Author-Name: G Harindranath Author-X-Name-First: G Author-X-Name-Last: Harindranath Title: Integration of requirements determination and business process re-engineering: a case study of an Ambulatory Care and Diagnostic (ACAD) centre Abstract: This paper explores the political character of business process re-engineering (BPR) and its associated information systems (IS) change. This political character means that the scope of business processes and their associated IS, the scale and type of change and the evaluation of BPR success are subject to different interpretations depending on the role and interests of those stakeholders involved with them. Therefore although BPR and IS change are functionally related, even coupled processes, they nevertheless react to different political factors and thus do not flow along in a synchronised, parallel way. Rather, they depend upon other stakeholders, and the choice of which stakeholders to give importance to is greatly influenced by their perceived usefulness in the change process. In the case studied, IS, BPR, the consortium and the builder were all vital to the project's success, whereas staff interests were excluded or manipulated because they were seen as resisting change. Managing change processes and stakeholders during a re-engineering project therefore involves the motivating and controlling of several parallel processes, some of which are advancing while others are blocked. The reason why some processes and stakeholders gain a voice in the project depends on their ability to reduce uncertainty and thus to move the project forward. Journal: European Journal of Information Systems Pages: 115-122 Issue: 2 Volume: 7 Year: 1998 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000294 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000294 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:7:y:1998:i:2:p:115-122 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933572_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: J Tolsby Author-X-Name-First: J Author-X-Name-Last: Tolsby Title: Effects of organizational culture on a large scale IT introduction effort: a case study of the Norwegian army's EDBLF project Abstract: This paper documents a process of introducing new information technology (IT) within the Norwegian army. The research suggests that in the intersection between an organization and IT what emerges as most interesting is the organizational culture. Some of the characteristics of the Norwegian army culture, such as using a particular transfer and application scheme and the use of refreshers training, contributed to a high job rotation, causing instability within the organization and jeopardising the day-to-day work routines within the army units. This part of the Norwegian army's culture combined with an IT system designed in a way that spliced jobs and deskilled workers, while at the same time creating dependencies between different jobs within the organization, contributed to upholding a particular functioning of the organization. Underlying this is the assumption made by the army that as long as the technology is uniform one person can easily be substituted for another. This paper argues that the organizational culture of the Norwegian army was in many ways a hindrance to a successful adoption of IT. Recognising the influence of organizational culture is important, but more empirical studies of organizational culture influence are needed to support the diverse findings presented here and would be a viable and important task in the years to come for anyone interested in a successful adoption of IT systems. Journal: European Journal of Information Systems Pages: 108-114 Issue: 2 Volume: 7 Year: 1998 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000295 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000295 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:7:y:1998:i:2:p:108-114 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933573_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: J-M Choe Author-X-Name-First: J-M Author-X-Name-Last: Choe Author-Name: Y-H Lee Author-X-Name-First: Y-H Author-X-Name-Last: Lee Author-Name: K-C Park Author-X-Name-First: K-C Author-X-Name-Last: Park Title: The relationship model between the influence factors and the strategic applications of information systems Abstract: In previous studies, some researchers empirically suggested the influence factors on the strategic applications of information systems (IS). However, they did not empirically prove the effects of the relationships among the influence factors on the strategic applications of IS. The objectives of this study are to examine these relationships and to identify the moderating effects of support factors on the relationship between the facilitators of alignment and the strategic applications level of IS. For this study, the research model explaining the relationships among influence factors and strategic applications level was developed. The results suggested that there is significant positive correlation between perceived environmental uncertainty and facilitators of alignment. The intervening effect of alignment facilitators and the moderating effects of support factors were also proved. Based on the empirical results, the roles or functions of influence factors and the managerial implications are proposed. Journal: European Journal of Information Systems Pages: 137-149 Issue: 2 Volume: 7 Year: 1998 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000297 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000297 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:7:y:1998:i:2:p:137-149 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933574_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: R Baskerville Author-X-Name-First: R Author-X-Name-Last: Baskerville Author-Name: A T Wood-Harper Author-X-Name-First: A T Author-X-Name-Last: Wood-Harper Title: Diversity in information systems action research methods Abstract: Discussions of action research in information systems (IS) often proceed as if there were one definitive action research method. This paper describes and analyses the different frameworks, assumptions and goals that characterise the diverse forms of action research. A more inclusive action research paradigm is delineated that offers a basis for validating a wider range of IS research. Acceptance of the full range of the diverse forms of action research may enable the IS field to be more explicit about its research methodology, thereby enabling criteria to be improved and applied to a broader range of IS research. Journal: European Journal of Information Systems Pages: 90-107 Issue: 2 Volume: 7 Year: 1998 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000298 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000298 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:7:y:1998:i:2:p:90-107 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933532_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: R T Coupe Author-X-Name-First: R T Author-X-Name-Last: Coupe Author-Name: N M Onodu Author-X-Name-First: N M Author-X-Name-Last: Onodu Title: Evaluating the impact of CASE: an empirical comparison of retrospective and cross-sectional survey approaches Abstract: The purpose of this paper is to evaluate two methods of assessing the productivity and quality impact of Computer Aided Software Engineering (CASE) and Fourth Generation Language (4GL) technologies: (1) by the retrospective method; and (2) the cross-sectional method. Both methods involve the use of questionnaire surveys. Developers' perceptions depend on the context in which they are expressed and this includes expectations about the effectiveness of a given software product. Consequently, it is generally not reliable to base inferences about the relative merits of CASE and 4GLs on a cross-sectional comparison of two separate samples of users. The retrospective method that requires each respondent to directly compare different products is shown to be more reliable. However, there may be scope to employ cross-sectional comparisons of the findings from different samples where both sets of respondents use the same reference point for their judgements, and where numerical rather than verbal rating scales are used to measure perceptions. Journal: European Journal of Information Systems Pages: 15-24 Issue: 1 Volume: 6 Year: 1997 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000250 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000250 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:6:y:1997:i:1:p:15-24 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933533_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: A Pouloudi Author-X-Name-First: A Author-X-Name-Last: Pouloudi Author-Name: E A Whitley Author-X-Name-First: E A Author-X-Name-Last: Whitley Title: Stakeholder identification in inter-organizational systems: gaining insights for drug use management systems Abstract: Inter-organizational systems operate in an area where there are many interested parties. If the views of these interested parties are not explored and taken into consideration before and during the development of an inter-organizational system, it is likely that the implementation of this system will be disappointing. This paper describes one approach to exploring these views through the use of stakeholder analysis. More specifically, it describes how to identify the stakeholders, a process that has been overlooked in the stakeholder analysis and inter-organizational systems literature, and examines the perceptions of a number of stakeholders in the drug use management field in the UK. Journal: European Journal of Information Systems Pages: 1-14 Issue: 1 Volume: 6 Year: 1997 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000252 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000252 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:6:y:1997:i:1:p:1-14 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933534_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: J Ropponen Author-X-Name-First: J Author-X-Name-Last: Ropponen Author-Name: K Lyytinen Author-X-Name-First: K Author-X-Name-Last: Lyytinen Title: Can software risk management improve system development: an exploratory study Abstract: Software risk management can be defined as an attempt to formalise risk oriented correlates of development success into a readily applicable set of principles and practices. Earlier research suggests that it can reduce the likelihood of a system failure. Using a survey instrument we investigate this claim further. The investigation addresses the following questions: (1) which characteristics of risk management practices; and (2) which other environmental and process factors (such as development methods, manager's experience) relate to improved performance in managing software risks? Our findings support in general the claim that the use of risk management methods improves system development performance. Yet, little support was found for the claim that specific risk management methods are instrumental in attacking specific software risks. Overall, risks are better managed with combined measures of having experienced project managers, selecting a correct project size, and investing in and obtaining experience in risk management deliberations. Journal: European Journal of Information Systems Pages: 41-50 Issue: 1 Volume: 6 Year: 1997 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000253 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000253 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:6:y:1997:i:1:p:41-50 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933535_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: K Darby-Dowman Author-X-Name-First: K Author-X-Name-Last: Darby-Dowman Author-Name: J Little Author-X-Name-First: J Author-X-Name-Last: Little Title: Critical factors in the evolution of logic programming and Prolog Abstract: Logic programming has received much critical attention over the past two decades from both a language perspective and as a methodology for practical problem solving. This paper presents a historical foundation of the approach and examines the development of Prolog since its first implementation. An analysis of the use of Prolog in commercial, research and teaching environments shows that there is an established base of users and that, after a period of rapid growth, the language currently enjoys continuing activity. The key to its success so far is due to its continuing evolution by including features that were not seen as being within the original concept as a pure logic language. Significant features which have contributed to the success of Prolog include integration with other languages, object oriented extensions, constraint representation, parallel execution as well as improved speed and robustness. Applications databases are analysed with respect to type of application, system status, type of developer, hardware platform, country of origin and the Prolog implementation used. Factors contributing to the success of Prolog are identified and likely future developments are explored. Journal: European Journal of Information Systems Pages: 67-75 Issue: 1 Volume: 6 Year: 1997 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000255 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000255 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:6:y:1997:i:1:p:67-75 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933536_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: A G Rodrigues Author-X-Name-First: A G Author-X-Name-Last: Rodrigues Author-Name: T M Williams Author-X-Name-First: T M Author-X-Name-Last: Williams Title: System dynamics in software project management: towards the development of a formal integrated framework Abstract: Successful software development is becoming increasingly important to many companies. However, most projects fail to meet their targets, highlighting the inadequacies of traditional project management techniques in this unique setting. Despite breakthroughs in software engineering, management methodologies have not improved, and the major opportunities for better results are now in this area. Poor strategic management and related human factors have been cited as a major cause for failures, which traditional techniques cannot incorporate explicitly. System dynamics (SD) aims to model the behaviour of complex socio-economic systems; there has been a number of applications to software project management. SD provides an alternative view in which the major project influences are considered and quantified explicitly. Grounded on a holistic perspective it avoids consideration of the detail required by traditional tools, looking at the key aspects of the general project behaviour. However, if SD is to play a key role in software project management it needs to be embedded within the traditional decision-making framework. The authors developed a conceptual integrated model, the SYDPIM, which has been tested and improved within a large on-going software project. Such a framework specifies the roles of SD models, how they are to be used within the traditional management process, how they exchange information with the traditional models, and a general method to support model development. Journal: European Journal of Information Systems Pages: 51-66 Issue: 1 Volume: 6 Year: 1997 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000256 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000256 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:6:y:1997:i:1:p:51-66 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933537_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: R Agarwal Author-X-Name-First: R Author-X-Name-Last: Agarwal Author-Name: G Krudys Author-X-Name-First: G Author-X-Name-Last: Krudys Author-Name: M Tanniru Author-X-Name-First: M Author-X-Name-Last: Tanniru Title: Infusing learning into the information systems organization Abstract: Contemporary information systems (IS) organizations need mechanisms to cope with both the complexity that is created by rapid technological change and escalating business demands, and the resulting uncertainty engendered in organizational operations and policies. The IS function will not be in a position to manage such changes effectively unless it undergoes a fundamental restructuring towards becoming a ‘learning’ organization. This paper presents a framework that identifies the core drivers than an IS organization can proactively influence as it attempts to become learning-oriented. The framework identifies three essential components: (1) the learning context that defines various dimensions for measuring organizational and individual performance; (2) procedures and management initiatives that will facilitate individual learning to improve such performance; and (3) norms and culture that are established by the leadership to encourage learning. Using a case study methodology, the actions taken by one specific IS organization in its attempts to infuse learning capabilities among its members are examined. The conceptual framework for examining what it takes to be a learning IS organization and the detailed documented experiences of one specific organization may provide valuable insights to other IS organizations in their efforts to become more adaptive and responsive to change. Journal: European Journal of Information Systems Pages: 25-40 Issue: 1 Volume: 6 Year: 1997 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000257 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000257 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:6:y:1997:i:1:p:25-40 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933647_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: J Ljungberg Author-X-Name-First: J Author-X-Name-Last: Ljungberg Title: Open source movements as a model for organising Abstract: Open source software such as the operating system Linux has in a few years created much attention as an alternative way to develop and distribute software. Open source is to let anyone have access to the source code, so that they can modify it. Open source can be seen as a movement, where communities of highly skilled programmers collectively develop software, often of a quality that outperforms commercial proprietary software. These movements are based on virtual networking on the Internet and the web. They are loosely coupled communities kept together by strong common values related to hacker culture. Work seems to be totally distributed, delegated and loosely coupled. The highly skilled members contribute to the collective effort of free software development. In this paper the open source phenomenon is investigated from different perspectives. It is claimed that the open source movement is one key to the understanding of future forms of organizations, information work and business. Journal: European Journal of Information Systems Pages: 208-216 Issue: 4 Volume: 9 Year: 2000 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000373 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000373 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:4:p:208-216 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933648_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: J M Carroll Author-X-Name-First: J M Author-X-Name-Last: Carroll Author-Name: P A Swatman Author-X-Name-First: P A Author-X-Name-Last: Swatman Title: Structured-case: a methodological framework for building theory in information systems research Abstract: This paper presents a methodological framework, structured-case, that assists IS researchers to undertake and assess theory building research within the interpretive paradigm, and explains its value in achieving convincing explanations that are strongly linked to both the research themes and data collected in the field. Journal: European Journal of Information Systems Pages: 235-242 Issue: 4 Volume: 9 Year: 2000 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000374 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000374 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:4:p:235-242 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933649_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: R B Johnston Author-X-Name-First: R B Author-X-Name-Last: Johnston Author-Name: S Gregor Author-X-Name-First: S Author-X-Name-Last: Gregor Title: A theory of industry-level activity for understanding the adoption of interorganizational systems Abstract: Increasingly we wish to ask and research questions about the adoption of interorganizational systems and electronic commerce at the industry level but are hampered by the lack of a theory of concerted purposeful action at this large level of analysis. In this paper we give the outlines of such a theory and indicate the uses to which it can be put. Particular attention is paid to how the routine day-to-day activities of the firms and support organizations that make up an industry group can be coordinated in such a way that we can speak of an industry as engaged in purposeful activity. We contend that only through a deep understanding of the possibilities and nature of routine coordinated activity at this level can issues concerning promotion, implementation and adoption of interorganizational systems by whole industries be properly framed. Journal: European Journal of Information Systems Pages: 243-251 Issue: 4 Volume: 9 Year: 2000 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000375 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000375 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:4:p:243-251 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933650_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: D Kunda Author-X-Name-First: D Author-X-Name-Last: Kunda Author-Name: L Brooks Author-X-Name-First: L Author-X-Name-Last: Brooks Title: Identifying and classifying processes (traditional and soft factors) that support COTS component selection: a case study Abstract: COTS-Based Systems (CBS) development focuses on building large software systems by integrating previously existing software components. CBS success depends on successful evaluation and selection of Commercial-Off-The-Shelf (COTS) software components to fit customer requirements. Literature shows that successful selecction of off-the-shelf systems to fit customer requirements remains problematic. This paper presents the outcome of a study aimed at using a social-technical approach to identify and classify processes (including traditional and soft factors) that support COTS software selection. The identified factors and lessons learnt from the case study assisted in elaborating and further development of Social-Technical Approach to COTS Evaluation framework (STACE). Journal: European Journal of Information Systems Pages: 226-234 Issue: 4 Volume: 9 Year: 2000 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000376 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000376 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:4:p:226-234 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933651_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Sang-Yong Tom Lee Author-X-Name-First: Sang-Yong Tom Author-X-Name-Last: Lee Title: Bundling strategy in base-supplemental goods markets: the case of Microsoft Abstract: We show that bundling is the optimal pricing strategy for a base good monopolist who also supplies a supplemental good under zero marginal cost of product. Without the exit of the rival firm, bundling is a profitable strategy because it increases the profits in the base good market. We show that bundling lowers social welfare as well as rival firms' profit if the supplemental goods are close substitutes. Otherwise, bundling may actually generate welfare enhancements. Our analysis applies directly to the computer software markets and the case of Microsoft. Journal: European Journal of Information Systems Pages: 217-225 Issue: 4 Volume: 9 Year: 2000 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000377 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000377 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:4:p:217-225 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933652_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: V Peristeras Author-X-Name-First: V Author-X-Name-Last: Peristeras Author-Name: K Tarabanis Author-X-Name-First: K Author-X-Name-Last: Tarabanis Title: Towards an enterprise architecture for public administration using a top-down approach Abstract: The use of Enterprise Architectures is becoming increasingly widespread in the private sector. Borrowing insights from enterprise reference architectures developed during the last decade, IT vendors and companies belonging to specific industries are establishing reference data and process models advancing the standardisation of their businesses and creating a more integrated environment for their activities. Although public administrations share the same problem of non-standardisation, which is being magnified rapidly in a changing and demanding environment, little has been done so far in the direction of integration. This article builds a basis, shows initial directions and attempts to stimulate interest in a PA enterprise framework. Following a top-down approach and employing concepts from the fields of public administration, enterprise integration and generic process and data modeling, the outline of the ArchPad enterprise architecture for Public Administration is presented. Journal: European Journal of Information Systems Pages: 252-260 Issue: 4 Volume: 9 Year: 2000 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000378 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000378 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:4:p:252-260 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933653_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Steve Smithson Author-X-Name-First: Steve Author-X-Name-Last: Smithson Title: Editorial Journal: European Journal of Information Systems Pages: 207-207 Issue: 4 Volume: 9 Year: 2000 Month: 12 X-DOI: 10.1057/palgrave.ejis.3000380 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000380 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:9:y:2000:i:4:p:207-207 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1890530_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Sujin Bae Author-X-Name-First: Sujin Author-X-Name-Last: Bae Author-Name: Eunyoung (Christine) Sung Author-X-Name-First: Eunyoung Author-X-Name-Last: (Christine) Sung Author-Name: Ohbyung Kwon Author-X-Name-First: Ohbyung Author-X-Name-Last: Kwon Title: Accounting for social media effects to improve the accuracy of infection models: combatting the COVID-19 pandemic and infodemic Abstract: During the COVID-19 pandemic, social media platforms such as Twitter, Facebook, etc. have played an important role in conveying information, both accurate and inaccurate, thereby creating mass confusion. As the response to COVID-19 has reduced face-to-face contact, communication via social media has increased. Evidence shows that social media affects disease (non-)prevention through the (im)proper distribution of information, and distorts the predictive accuracy of infection models, including legacy Susceptible–Exposed–Infectious–Recovered (SEIR) models. Our adjusted SEIR model reflects the effectiveness of information disseminated through social media by accounting for dimensions of social/informational motivation based on social learning/use and gratification theories, and uses Monte Carlo methodology and computational algorithms to predict effects of social media on the spread of COVID-19 (N = 2,095 cases). The results suggest that social media utilisation measures should be incorporated into SEIR models to improve forecasts of COVID-19 infections. Utilising IS to analyse the spread of digital information via social media platforms can inform efforts to combat the pandemic and infodemic. Agencies responsible for infection and disease control, policy makers, businesses, institutions and educators must accurately monitor infection rates to appropriately allocate funding and human resources and develop effective disease prevention marketing campaigns. Journal: European Journal of Information Systems Pages: 342-355 Issue: 3 Volume: 30 Year: 2021 Month: 05 X-DOI: 10.1080/0960085X.2021.1890530 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1890530 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:3:p:342-355 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1886614_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Anuragini Shirish Author-X-Name-First: Anuragini Author-X-Name-Last: Shirish Author-Name: Shirish C. Srivastava Author-X-Name-First: Shirish C. Author-X-Name-Last: Srivastava Author-Name: Shalini Chandra Author-X-Name-First: Shalini Author-X-Name-Last: Chandra Title: Impact of mobile connectivity and freedom on fake news propensity during the COVID-19 pandemic: a cross-country empirical examination Abstract: COVID-19 pandemic has triggered a surge in the amount of fake news circulating on the Internet. However, despite the global bearing of the coronavirus pandemic, there is a significant variance in the propensity of COVID-19 related fake news instances across nations. To better understand the national-level factors contributing to the spread of fake news during the current pandemic, we theorise and examine the relationships of “mobile connectivity” and “freedom” (economic, political, and media) in a nation, with fake news propensity. We test the proposed model through a unique dataset comprising 72 countries generated by combining 6 independent cross-country data sources. We find that “mobile connectivity” and “political freedom” in a nation contribute to COVID-19 related fake news propensity, whereas “economic” and “media freedom” inhibit it. Our study provides preliminary insights into the mechanisms through which national-level systemic resources can be leveraged for battling the spread of fake news during the COVID-19 pandemic and beyond. In addition, our study offers several important implications for governments and policymakers that we believe will be instrumental in stimulating future research on the subject. Journal: European Journal of Information Systems Pages: 322-341 Issue: 3 Volume: 30 Year: 2021 Month: 05 X-DOI: 10.1080/0960085X.2021.1886614 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1886614 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:3:p:322-341 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1793697_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Juhani Iivari Author-X-Name-First: Juhani Author-X-Name-Last: Iivari Author-Name: Magnus Rotvit Perlt Hansen Author-X-Name-First: Magnus Author-X-Name-Last: Rotvit Perlt Hansen Author-Name: Amir Haj-Bolouri Author-X-Name-First: Amir Author-X-Name-Last: Haj-Bolouri Title: A proposal for minimum reusability evaluation of design principles Abstract: Many Design Science Research (DSR) papers in Information Systems (IS) suggest sets of design principles (DPs) that provide knowledge for creating instances, in different contexts, of IT artefacts that belong to the same class. However, despite frameworks for evaluating DSR contributions, the evaluation of DP reusability to, with and for practitioners has been largely neglected. We suggest that in order to maintain the practical relevance of DSR, papers with DPs as their key outcomes should contain a reusability evaluation of the proposed principles. We propose a framework of minimum reusability evaluation of DPs by members of the target community of practitioners. The framework comprises five criteria: (1) accessibility, (2) importance, (3) novelty and insightfulness, (4) actability and guidance, and (5) effectiveness. Journal: European Journal of Information Systems Pages: 286-303 Issue: 3 Volume: 30 Year: 2021 Month: 05 X-DOI: 10.1080/0960085X.2020.1793697 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1793697 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:3:p:286-303 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1884009_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Rob Jago Floetgen Author-X-Name-First: Rob Jago Author-X-Name-Last: Floetgen Author-Name: Jana Strauss Author-X-Name-First: Jana Author-X-Name-Last: Strauss Author-Name: Jörg Weking Author-X-Name-First: Jörg Author-X-Name-Last: Weking Author-Name: Andreas Hein Author-X-Name-First: Andreas Author-X-Name-Last: Hein Author-Name: Florian Urmetzer Author-X-Name-First: Florian Author-X-Name-Last: Urmetzer Author-Name: Markus Böhm Author-X-Name-First: Markus Author-X-Name-Last: Böhm Author-Name: Helmut Krcmar Author-X-Name-First: Helmut Author-X-Name-Last: Krcmar Title: Introducing platform ecosystem resilience: leveraging mobility platforms and their ecosystems for the new normal during COVID-19 Abstract: COVID-19 has created many constraint-related challenges for humans in general and organisations in particular. Specifically, businesses that require physical contact, such as mobility providers, have been severely impacted by the crisis. This paper reveals how mobility platforms and their ecosystem of actors have adapted faster than their non-platform competitors to become resilient. Whereas current research on resilience explicitly deals with the concept of organisational resilience, community resilience, or IT resilience, socio-technical characteristics of digital platforms have not been investigated. We build on a case survey approach, including heterogeneous qualitative evidence of 266 actions of 171 analysed mobility platforms. The results show five archetypes of how mobility platforms leverage their platform-based nature and the ecosystem to build resilience. Based on this, we develop the concept of platform ecosystem resilience as leveraging socio-technical factors of digital platforms and ecosystems frugally to design, deploy and use situation-specific responses to prepare for, endure and adapt by capturing new opportunities and engaging in transformative activities to cope with exogenous shocks and become resilient for future disruptions. Our results emphasise the importance of platform ecosystems for practitioners and policy planners to develop the “new normal” rather than resuming existing practices. Journal: European Journal of Information Systems Pages: 304-321 Issue: 3 Volume: 30 Year: 2021 Month: 05 X-DOI: 10.1080/0960085X.2021.1884009 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1884009 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:3:p:304-321 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1787109_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jens Mattke Author-X-Name-First: Jens Author-X-Name-Last: Mattke Author-Name: Christian Maier Author-X-Name-First: Christian Author-X-Name-Last: Maier Author-Name: Lea Reis Author-X-Name-First: Lea Author-X-Name-Last: Reis Author-Name: Tim Weitzel Author-X-Name-First: Tim Author-X-Name-Last: Weitzel Title: Bitcoin investment: a mixed methods study of investment motivations Abstract: Bitcoin is a well-established blockchain-based cryptocurrency that has attracted a great deal of attention from media and regulators alike. While millions of individuals invest in bitcoin, their motivations for doing so are less clear than with traditional investment decisions. We argue that the technical nature of bitcoin investments gives it unique characteristics and, consequently, that we lack a thorough understanding of how this affects the motivations behind bitcoin investment. We use a mixed method approach consisting of qualitative (n = 73) and quantitative (n = 150) studies and fuzzy-set qualitative comparative analysis (fsQCA) to identify seven bitcoin-specific motivations (profit expectancy, ease of bitcoin acquisition, support of bitcoin ideology, investment skills, risk affinity, anticipated and experienced inaction regret) and how configurations of them explain bitcoin investment. The findings reveal, among others, that some individuals invest in bitcoin because they support the bitcoin ideology. Contrary to the traditional investment literature, profit expectancy is not a necessary condition to the extent that there is one empirical configuration of motivations that explains that individuals also invest in bitcoin even if they do not expect profits. The results disclose non-trivial investment motivation configurations and lay the groundwork for future studies of the role of cryptocurrencies in society. Journal: European Journal of Information Systems Pages: 261-285 Issue: 3 Volume: 30 Year: 2021 Month: 05 X-DOI: 10.1080/0960085X.2020.1787109 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1787109 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:3:p:261-285 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1779621_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Thomas Hurni Author-X-Name-First: Thomas Author-X-Name-Last: Hurni Author-Name: Thomas L. Huber Author-X-Name-First: Thomas L. Author-X-Name-Last: Huber Author-Name: Jens Dibbern Author-X-Name-First: Jens Author-X-Name-Last: Dibbern Author-Name: Oliver Krancher Author-X-Name-First: Oliver Author-X-Name-Last: Krancher Title: Complementor dedication in platform ecosystems: rule adequacy and the moderating role of flexible and benevolent practices Abstract: Dedicated complementors are devoted, faithful, and willing to invest in their partnership with a platform owner. Since such complementors promise continuous value co-creation, complementor dedication is an essential objective of platform governance. However, as dedicated complementors also increase their vulnerability vis-à-vis the platform owner, platform governance needs to strike a balance between satisfying global ecosystem needs and the local partnership needs. To understand this challenge better, our study develops six hypotheses on how two fundamental governance mechanisms – i.e., rules and the way in which these rules are practised – independently and symbiotically drive complementor dedication. We test these hypotheses using survey data from 181 complementors. Our findings show that complementors become more dedicated to a platform owner, the more adequate they perceive the rules to be. Furthermore, our findings suggest two sensible strategies to actualise the potential of adequate rules. Platform owners should either refrain entirely from practising rules with situational flexibility and benevolence, thereby achieving moderate complementor dedication. Alternatively, they should practice rules with both flexibility and benevolence at the same time, thereby maximising complementor dedication. Our findings contribute to the literature on platform governance and broader governance literature. Journal: European Journal of Information Systems Pages: 237-260 Issue: 3 Volume: 30 Year: 2021 Month: 05 X-DOI: 10.1080/0960085X.2020.1779621 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1779621 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:3:p:237-260 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933526_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: The Editors Title: The Internet, information systems and changing practice Journal: European Journal of Information Systems Pages: 221-221 Issue: 4 Volume: 5 Year: 1996 Month: 12 X-DOI: 10.1057/ejis.1996.27 File-URL: http://hdl.handle.net/10.1057/ejis.1996.27 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:5:y:1996:i:4:p:221-221 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933527_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: ALM Cavaye Author-X-Name-First: ALM Author-X-Name-Last: Cavaye Author-Name: JK Christiansen Author-X-Name-First: JK Author-X-Name-Last: Christiansen Title: Understanding IS implementation by estimating power of subunits Abstract: Understanding distribution of intra-organization power can provide useful information about implementation processes and also explanations (or predictions) of events and outcomes. When the implementation of IS/IT is used for both automatisation and business process changes, implementation involves organizational politics. Politics involves the interplay of various groups pursuing different interests while exercising power. Previous research of IS in power is discussed and extended by presenting a framework to measure subunit power. This framework is derived from organizational literature. The value of the framework for IS settings is illustrated by a case study. This framework is found to be useful for mapping relative power distribution at different moments in time. Changes in power distribution help explain a dramatic change in an implementation process. The understanding of relative subunit power is found to provide valuable ex ante information on the likely outcome of an IS implementation project or the possible obstacles an organizational change project might face. Journal: European Journal of Information Systems Pages: 222-232 Issue: 4 Volume: 5 Year: 1996 Month: 12 X-DOI: 10.1057/ejis.1996.28 File-URL: http://hdl.handle.net/10.1057/ejis.1996.28 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:5:y:1996:i:4:p:222-232 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933528_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: S Lee Author-X-Name-First: S Author-X-Name-Last: Lee Author-Name: RM O'Keefe Author-X-Name-First: RM Author-X-Name-Last: O'Keefe Title: An experimental investigation into the process of knowledge-based systems development Abstract: This paper presents an experimental study into the processes that may contribute to building a better knowledge-based system. A model that defines quality to be composed of two related aspects, internal and external quality, is introduced. To test the model, 24 subjects developed a knowledge-based system for MBA course planning in an experimental setting over a 7 week period. Subjects were factored by development methodology (structured vs rapid prototyping), knowledge representation scheme used (rule-based vs hybrid) and programmer quality (naive vs experienced). The major finding is that an appropriate mix of development methodology, knowledge representation and personnel is necessary. No single development methodology or knowledge representation scheme is best, and a considerable number of interactions was observed in the experiment. Rapid prototyping combined with rule-based representation produced the best external quality in terms of functionality, but when combined with hybrid representation produced the worst. Similarly, rapid prototyping combined with hybrid representation produced the worst usability. Programmer quality had a positive effect on coding productivity, which in turn resulted in an increase in system usability. As with conventional software, increasing programmer quality can be very beneficial to both process and content. The study presented provides some evidence of the anomalies that are generated in the course of system development, and how they relate to internal quality. As might be expected, experienced programmers produced significantly fewer anomalies. A relationship was found between internal quality and usability, but not functionality. Journal: European Journal of Information Systems Pages: 233-249 Issue: 4 Volume: 5 Year: 1996 Month: 12 X-DOI: 10.1057/ejis.1996.29 File-URL: http://hdl.handle.net/10.1057/ejis.1996.29 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:5:y:1996:i:4:p:233-249 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933529_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: JJ Williams Author-X-Name-First: JJ Author-X-Name-Last: Williams Author-Name: A Ramaprasad Author-X-Name-First: A Author-X-Name-Last: Ramaprasad Title: A taxonomy of critical success factors Abstract: Critical success factors (CSFs) have received considerable attention from information systems academicians and practitioners over the past 15 years. However, the concept of criticality as widely used in common parlance tends to be metaphorical – the meaning of the term is loosely defined and the interpretation of the meaning is dependent upon the individual. To advance our knowledge of criticality and CSFs, the metaphorical use of the concept of criticality has to be formalised in a model by defining criticality and discriminating between different types of the same. The tacit knowledge of practitioners and researchers about criticality has to be explicated. This paper proposes a taxonomy of critical success factors in an attempt to formalise the concept. The proposed taxonomy is based on four levels of criticality and three sets of dichotomous attributes. The four levels of criticality in descending order of strength are: factors linked to success by a known causal mechanism; factors necessary and sufficient for success; factors necessary for success; and factors associated with success. The three sets of dichotomous attributes are: standing/instigating; direct/indirect; and enhancing/inhibiting. The taxonomy provides a framework for systematically classifying CSFs extant in literature and practice. Such classification will reveal the nature, extent, and sources of biases in the CSFs literature, if any, and help in correcting the biases if necessary and possible. The taxonomy can also be used to structure methodologies for eliciting CSFs, and thus ensure that the factors elicited are unbiased and complete. Journal: European Journal of Information Systems Pages: 250-260 Issue: 4 Volume: 5 Year: 1996 Month: 12 X-DOI: 10.1057/ejis.1996.30 File-URL: http://hdl.handle.net/10.1057/ejis.1996.30 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:5:y:1996:i:4:p:250-260 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933530_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: I Hipkin Author-X-Name-First: I Author-X-Name-Last: Hipkin Title: Evaluating maintenance management information systems Abstract: The evaluation of maintenance management information systems (MMIS) in five case organizations is investigated by considering a taxonomy taken from the literature. The objectives in implementing a MMIS are assessed against factors in the taxonomy which classifies the systems in eight possible ways. These factors provide an indication of the appropriate evaluation for the IS. The study finds broad congruence between the perspectives of managers in the case organizations and the taxonomy, but emphasises that other key factors should be considered to ensure successful implementation and evaluation. Journal: European Journal of Information Systems Pages: 261-272 Issue: 4 Volume: 5 Year: 1996 Month: 12 X-DOI: 10.1057/ejis.1996.31 File-URL: http://hdl.handle.net/10.1057/ejis.1996.31 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:5:y:1996:i:4:p:261-272 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933531_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Y Yoon Author-X-Name-First: Y Author-X-Name-Last: Yoon Author-Name: T Guimaraes Author-X-Name-First: T Author-X-Name-Last: Guimaraes Author-Name: AB Clevenson Author-X-Name-First: AB Author-X-Name-Last: Clevenson Title: Assessing determinants of desirable ES impact on end-user jobs Abstract: To increase the likelihood of experts systems' success it is useful to identify the more important determinants to focus managerial attention and resources. Seven major determinants of expert system success, here defined as desirable impact of the system on users' jobs, have been identified from the literature. DuPont's collection of expert systems (ES) provided the sample of 114 applications used in this study. The results corroborate much of what has been proposed in the literature, except for user characteristics which have been found to have no significant relationship to the measure of success. Based on the results, some recommendations are made to expert system development managers, including: (1) besides the recommendations already proposed in the literature, managers should deliberately seek to deal with important, large, labour intensive and complex problems which are important to the organization; (2) the selection of a development shell with the characteristics described in this study, and which matches the problem at hand is an important determinant of success; and (3) even though the primary source of knowledge is one or more domain experts, user involvement in the development process remains an important factor for ES to have a desirable impact on the latter's jobs. Journal: European Journal of Information Systems Pages: 273-285 Issue: 4 Volume: 5 Year: 1996 Month: 12 X-DOI: 10.1057/ejis.1996.32 File-URL: http://hdl.handle.net/10.1057/ejis.1996.32 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:5:y:1996:i:4:p:273-285 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934389_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Murray Scott Author-X-Name-First: Murray Author-X-Name-Last: Scott Author-Name: William DeLone Author-X-Name-First: William Author-X-Name-Last: DeLone Author-Name: William Golden Author-X-Name-First: William Author-X-Name-Last: Golden Title: Measuring eGovernment success: a public value approach Abstract: Measuring the success of eGovernment systems depends on how citizens perceive their value. Our understanding of success has been hampered however by (i) the rapid development and complexity of Internet technologies and (ii) the lack of conceptual bases necessary to represent the ever expanding range of success dimensions. This study proposes Public Value theory to reposition the DeLone and McLean IS Success Model in order to encompass three essential success or value clusters: efficiency, effectiveness and social value. The efficacy of this approach is demonstrated by creating a Public Value-based (Net Benefits) construct to measure IS success from the citizens' perspective within the context of eGovernment 2.0 systems. Survey responses from 347 experienced users of U.S. government Web 2.0 websites confirm that the proposed success measure is reliable and valid and that the nine-factor structure (Cost, Time, Convenience, Personalisation, Communication, Ease of Information Retrieval, Trust, Well-Informedness and Participate in Decision-Making) can explain a major portion of citizens' perceptions of eGovernment success. Additionally, the nine-factor Public Value construct was applied to three identified eGovernment user groups: Passive, Active and Participatory, in order to better understand success in specific usage contexts, including Web 2.0. Journal: European Journal of Information Systems Pages: 187-208 Issue: 3 Volume: 25 Year: 2016 Month: 5 X-DOI: 10.1057/ejis.2015.11 File-URL: http://hdl.handle.net/10.1057/ejis.2015.11 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:3:p:187-208 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934390_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Douglas A Battleson Author-X-Name-First: Douglas A Author-X-Name-Last: Battleson Author-Name: Barry C West Author-X-Name-First: Barry C Author-X-Name-Last: West Author-Name: Jongwoo Kim Author-X-Name-First: Jongwoo Author-X-Name-Last: Kim Author-Name: Balasubramaniam Ramesh Author-X-Name-First: Balasubramaniam Author-X-Name-Last: Ramesh Author-Name: Pamela S Robinson Author-X-Name-First: Pamela S Author-X-Name-Last: Robinson Title: Achieving dynamic capabilities with cloud computing: an empirical investigation Abstract: Cloud computing enables convenient and on-demand access to a shared pool of configurable computing resources. While cloud computing‘s ability to improve operational efficiency has gained much attention in the literature, there has been limited research on how it can help organizations achieve dynamic capabilities. Drawing from dynamic capabilities theory, we conducted a field study using a multiple case study design to examine the following research question: How do organizations achieve dynamic capabilities by using Cloud Computing? We develop a framework that explains how organizations respond to market dynamism by developing sense-and-response strategies that enable them to achieve dynamic capabilities using business process redesign, business network redesign, and business scope redefinition. We discuss how these transformations, in turn, improve organizational outcomes such as service effectiveness and efficiency. Our study also identifies factors that support and hinder the development of dynamic capabilities. Our study contributes to the literature on dynamic capabilities by examining how IT capabilities like cloud computing may accelerate the ability of an organization to achieve dynamic capabilities. We also identify transformational changes of business processes and inter-organizational networks that are enabled by cloud computing. Further, we identify how the essential characteristics of cloud computing support sense and respond strategies. Journal: European Journal of Information Systems Pages: 209-230 Issue: 3 Volume: 25 Year: 2016 Month: 5 X-DOI: 10.1057/ejis.2015.12 File-URL: http://hdl.handle.net/10.1057/ejis.2015.12 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:3:p:209-230 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934391_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Allen C Johnston Author-X-Name-First: Allen C Author-X-Name-Last: Johnston Author-Name: Merrill Warkentin Author-X-Name-First: Merrill Author-X-Name-Last: Warkentin Author-Name: Maranda McBride Author-X-Name-First: Maranda Author-X-Name-Last: McBride Author-Name: Lemuria Carter Author-X-Name-First: Lemuria Author-X-Name-Last: Carter Title: Dispositional and situational factors: influences on information security policy violations Abstract: Insiders represent a major threat to the security of an organization’s information resources. Previous research has explored the role of dispositional and situational factors in promoting compliant behavior, but these factors have not been studied together. In this study, we use a scenario-based factorial survey approach to identify key dispositional and situational factors that lead to information security policy violation intentions. We obtained 317 observations from a diverse sample of insiders. The results of a general linear mixed model indicate that dispositional factors (particularly two personality meta-traits, Stability and Plasticity) serve as moderators of the relationships between perceptions derived from situational factors and intentions to violate information security policy. This study represents the first information security study to identify the existence of these two meta-traits and their influence on information security policy violation intentions. More importantly, this study provides new knowledge of how insiders translate perceptions into intentions based on their unique personality trait mix. Journal: European Journal of Information Systems Pages: 231-251 Issue: 3 Volume: 25 Year: 2016 Month: 5 X-DOI: 10.1057/ejis.2015.15 File-URL: http://hdl.handle.net/10.1057/ejis.2015.15 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:3:p:231-251 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934392_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Dan J Kim Author-X-Name-First: Dan J Author-X-Name-Last: Kim Author-Name: Myung-Seong Yim Author-X-Name-First: Myung-Seong Author-X-Name-Last: Yim Author-Name: Vijayan Sugumaran Author-X-Name-First: Vijayan Author-X-Name-Last: Sugumaran Author-Name: H Raghav Rao Author-X-Name-First: H Raghav Author-X-Name-Last: Rao Title: Web assurance seal services, trust and consumers’ concerns: an investigation of e-commerce transaction intentions across two nations Abstract: Trust is considered as a critical enabler in reducing consumer concerns regarding e-commerce transactions. Another enabler that helps reduce consumers’ concerns is Web Assurance Seal Services (WASS). We suggest that both factors help in the reduction of a critical hindrance to e-commerce, namely consumer concerns, and foster e-commerce transactions. Prior research has focused on trust in e-commerce, and separately, on the effectiveness of WASS within certain nations or cultures. However, given that e-commerce is now a global phenomenon we contend that the national or cultural characteristics of consumers are important to understand. This comparative national research attempts to fill this gap. This study makes the following contributions: It identifies a hindrance (i.e., consumers’ concerns), and two enablers (i.e., effectiveness of WASS and trust) in e-commerce technologies as a shopping channel (i.e., trust in e-Channel). It proposes consumers’ concerns for e-commerce as a second-order three-dimensional construct (i.e., security, privacy, and business integrity concern) and compares the effects of trust in e-Channel and WASS on consumers’ e-commerce transaction intention in two different national/cultural contexts (i.e., the U.S.A. and South Korea). The results of the study indicate that the perceived effectiveness of WASS of the U.S. consumers has a strong positive impact on their transaction intention and has a strong negative influence on their concerns for e-commerce. In contrast, Korean consumers’ perceived effectiveness of WASS does not significantly influence their transaction intention and their concerns for e-commerce. The results of group comparison analysis confirm that the strength of perceived effectiveness of WASS of the U.S. consumers is significantly stronger than that of Korean consumers. Interpretations from a cross-national perspective, theoretical and practical implications as well as limitations are discussed. Journal: European Journal of Information Systems Pages: 252-273 Issue: 3 Volume: 25 Year: 2016 Month: 5 X-DOI: 10.1057/ejis.2015.16 File-URL: http://hdl.handle.net/10.1057/ejis.2015.16 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:3:p:252-273 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934393_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Matthias Söllner Author-X-Name-First: Matthias Author-X-Name-Last: Söllner Author-Name: Axel Hoffmann Author-X-Name-First: Axel Author-X-Name-Last: Hoffmann Author-Name: Jan Marco Leimeister Author-X-Name-First: Jan Marco Author-X-Name-Last: Leimeister Title: Why different trust relationships matter for information systems users Abstract: Technology acceptance research has shown that trust is an important factor fostering use of information systems (IS). As a result, numerous IS researchers have studied factors that build trust in IS. However, IS research on trust has mainly focused on the trust relationship between the user and the IS itself, largely neglecting that other targets of trust might also drive IS use from a user’s point of view. Accordingly, we investigate the importance of different targets of trust in IS use. Therefore, we use the concept of a network of trust and identify four different targets of trust that are prevalent from a user’s point of view. Afterwards, we develop our research model and evaluate it using a free simulation experiment. The results show that multiple targets of trust are important in the context of IS use. In particular, we highlight the importance of a second target – trust in the provider – which is equally important as trust in the IS itself. Consequently, IS providers should focus not only on fostering users’ trust in their IS but also on positioning themselves as trustworthy providers. In addition, we show that a third target – trust in the Internet – has significant indirect effects on multiple constructs that impact IS use. Journal: European Journal of Information Systems Pages: 274-287 Issue: 3 Volume: 25 Year: 2016 Month: 5 X-DOI: 10.1057/ejis.2015.17 File-URL: http://hdl.handle.net/10.1057/ejis.2015.17 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:25:y:2016:i:3:p:274-287 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934220_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Donal Flynn Author-X-Name-First: Donal Author-X-Name-Last: Flynn Author-Name: Yongqin Du Author-X-Name-First: Yongqin Author-X-Name-Last: Du Title: A case study of the legitimation process undertaken to gain support for an information system in a Chinese university Abstract: This research examines the legitimation process that was undertaken to gain stakeholder support for the development of a smartcard system for student services at a local university in China. We employed a theoretical framework consisting of Suchman's typology of legitimacy and the Legitimation Activity Model (LAM) for sense-making of the process. We obtained insights into how legitimation of the system was gained, maintained and repaired through the project team's strategic actions. We conceptualized the rotation of legitimation gaining, maintaining and repairing activities in the project and make suggestions for improving the LAM. We emphasize that monitoring and evaluating legitimation is a dynamic, continuous process, involving the concept of legitimation status, and linking the planned actions of legitimation- gaining and responsive actions for legitimation maintaining and repairing. We suggest that to achieve legitimation for information systems, managers should plan strategies to construct and present an appropriate image of the system, in which stakeholders perceive that it meets their needs, and, in addition, closely monitor the status of legitimation granted over a continuous period. This is because legitimation is a ‘fragile flower’ that may wilt if not attended to adequately. Journal: European Journal of Information Systems Pages: 212-228 Issue: 3 Volume: 21 Year: 2012 Month: 5 X-DOI: 10.1057/ejis.2011.27 File-URL: http://hdl.handle.net/10.1057/ejis.2011.27 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:3:p:212-228 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934221_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Gunnar Dietz Author-X-Name-First: Gunnar Author-X-Name-Last: Dietz Author-Name: Martin Juhrisch Author-X-Name-First: Martin Author-X-Name-Last: Juhrisch Title: Negotiating language barriers – a methodology for cross-organisational conceptual modelling Abstract: In common scenarios conceptual modelling is a methodology that – using semi-formal languages – has a high degree of freedom and is used to visualise certain aspects of a problem domain. However, especially in cross-organisational or international scenarios this freedom leads to many inconsistencies and conflicts. Therefore the restriction of the freedom of modelling is often discussed in the literature to counter the missing standardisation and to enhance the comparability of models. However, to be able to express certain concepts embedded within some distinguished environment (purpose, culture, infrastructure, language, terminology) models have to be domain-specific on the one hand, but comparable to models in other domains on the other hand. In this article a new approach is presented that offers a framework for restricted modelling without destroying the adaptability to certain different domains. The methodology includes an algorithm for comparing models in different domains and is therefore capable to not only dissolve certain standard comparability conflicts but also the domain conflict. Journal: European Journal of Information Systems Pages: 229-254 Issue: 3 Volume: 21 Year: 2012 Month: 5 X-DOI: 10.1057/ejis.2011.30 File-URL: http://hdl.handle.net/10.1057/ejis.2011.30 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:3:p:229-254 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934222_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Narges Kasiri Author-X-Name-First: Narges Author-X-Name-Last: Kasiri Author-Name: Ramesh Sharda Author-X-Name-First: Ramesh Author-X-Name-Last: Sharda Author-Name: Bill Hardgrave Author-X-Name-First: Bill Author-X-Name-Last: Hardgrave Title: A balanced scorecard for item-level RFID in the retail sector: a Delphi study Abstract: Item-level Radio Frequency Identification (RFID) adoption is on the agenda for many retailers. However, before adopting this technology, managers need to be able to identify its direct and indirect benefits. These benefits are expected to be significant and have begun to be studied empirically and analytically in narrow, isolated segments (e.g., supply chain management). In this paper, we focus on applications of RFID in the retail sector, specifically in store operations. We have adapted the balanced scorecard (BSC) model as a decision-making framework to build a holistic model of RFID-enabled changes throughout retail store operations including marketing, merchandising, and supply chain management. After reviewing the existing literature, we conducted a Delphi study in which 10 consultants and senior managers from leading U.S. retailers were interviewed. The results indicate that benefits in the areas of merchandising and marketing may not be realized as directly as those in the supply chain, but their effects should not be underestimated. The proposed BSC model can also indicate potential opportunities for item-level RFID use in retailing and serve as a guideline for further studies. Journal: European Journal of Information Systems Pages: 255-267 Issue: 3 Volume: 21 Year: 2012 Month: 5 X-DOI: 10.1057/ejis.2011.33 File-URL: http://hdl.handle.net/10.1057/ejis.2011.33 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:3:p:255-267 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934223_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Knut R Grahlmann Author-X-Name-First: Knut R Author-X-Name-Last: Grahlmann Author-Name: Remko W Helms Author-X-Name-First: Remko W Author-X-Name-Last: Helms Author-Name: Cokky Hilhorst Author-X-Name-First: Cokky Author-X-Name-Last: Hilhorst Author-Name: Sjaak Brinkkemper Author-X-Name-First: Sjaak Author-X-Name-Last: Brinkkemper Author-Name: Sander van Amerongen Author-X-Name-First: Sander Author-X-Name-Last: van Amerongen Title: Reviewing Enterprise Content Management: a functional framework Abstract: Enterprise Content Management (ECM) focuses on managing all types of content being used in organizations. It is a convergence of previous approaches that focus on managing only particular types of content, as for example documents or web pages. In this paper, we present an overview of previous research by categorizing the existing literature. We show that scientific literature on ECM is limited and there is no consensus on the definition of ECM. Therefore, the literature review surfaced several ECM definitions that we merge into a more consistent and comprehensive definition of ECM. The Functional ECM Framework (FEF) provides an overview of the potential functionalities of ECM systems (ECMSs). We apply the FEF in three case studies. The FEF can serve to communicate about ECMSs, to understand them and to direct future research. It can also be the basis for a more formal reference architecture and it can be used as an assessment tool by practitioners for comparing the functionalities provided by existing ECMSs. Journal: European Journal of Information Systems Pages: 268-286 Issue: 3 Volume: 21 Year: 2012 Month: 5 X-DOI: 10.1057/ejis.2011.41 File-URL: http://hdl.handle.net/10.1057/ejis.2011.41 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:3:p:268-286 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934224_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Andrew Schwarz Author-X-Name-First: Andrew Author-X-Name-Last: Schwarz Author-Name: Colleen Schwarz Author-X-Name-First: Colleen Author-X-Name-Last: Schwarz Author-Name: Yoonhyuk Jung Author-X-Name-First: Yoonhyuk Author-X-Name-Last: Jung Author-Name: Begoña Pérez Author-X-Name-First: Begoña Author-X-Name-Last: Pérez Author-Name: Sonja Wiley-Patton Author-X-Name-First: Sonja Author-X-Name-Last: Wiley-Patton Title: Towards an understanding of assimilation in virtual worlds: the 3C approach Abstract: Virtual worlds are increasing in importance as more multi-national firms are investing heavily in these emerging communities. Although much excitement has surrounded the idea of virtual worlds, a gap exists between those who register and those who engage in virtual worlds. Our analysis of the gap between those who merely register to join a virtual world and those who ultimately engage the community on a regular basis derives from a lack of assimilation. We present the 3C approach, a high-level theoretical framework delineating the relationship between three classes of factors (namely the technology class of factors; the community class of factors; and the user class of factors) that we posit explain virtual world assimilation and employ theories to represent these classes of factors and the interaction between them. After discussing and integrating these three classes of factors, we test our model through a study of 223 new users of Second Life. The results provide empirical support for the 3C framework; specifically, our analysis indicates that the technology and community classes of factors in exert a direct influence upon a user's attitude towards the virtual world, and this relationship is moderated by the user class of factors. Journal: European Journal of Information Systems Pages: 303-320 Issue: 3 Volume: 21 Year: 2012 Month: 5 X-DOI: 10.1057/ejis.2011.49 File-URL: http://hdl.handle.net/10.1057/ejis.2011.49 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:3:p:303-320 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934225_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Zhengchuan Xu Author-X-Name-First: Zhengchuan Author-X-Name-Last: Xu Author-Name: Ofir Turel Author-X-Name-First: Ofir Author-X-Name-Last: Turel Author-Name: Yufei Yuan Author-X-Name-First: Yufei Author-X-Name-Last: Yuan Title: Online game addiction among adolescents: motivation and prevention factors Abstract: Online game addiction has become a common phenomenon that affects many individuals and societies. In this study we rely on the functionalist perspective of human behavior and propose and test a balanced model of the antecedents of online game addiction among adolescents, which simultaneously focuses on motivating, and prevention and harm reduction forces. First, a sample of 163 adolescents was used for validating and refining a survey instrument. Second, survey data collected from 623 adolescents were analyzed with Partial Least Squares techniques. The findings point to several functional needs (e.g., need for relationship and need for escapism) that drive online game playing and addiction, as well as to several prevention and harm reduction factors (e.g., education, attention switching activities) that reduce game playing time and alleviate online game addiction. The effects of motivation and prevention factors on online game addiction are often partially mediated by online game playing. Implications for research and practice are discussed. Journal: European Journal of Information Systems Pages: 321-340 Issue: 3 Volume: 21 Year: 2012 Month: 5 X-DOI: 10.1057/ejis.2011.56 File-URL: http://hdl.handle.net/10.1057/ejis.2011.56 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:3:p:321-340 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934226_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Marc Bidan Author-X-Name-First: Marc Author-X-Name-Last: Bidan Author-Name: Frantz Rowe Author-X-Name-First: Frantz Author-X-Name-Last: Rowe Author-Name: Duane Truex Author-X-Name-First: Duane Author-X-Name-Last: Truex Title: An empirical study of IS architectures in French SMEs: integration approaches Abstract: This paper, based on a cross-sectional empirical study of information system (IS) architectures within 143 small to medium enterprises (SMEs) in France, reports findings on how SMEs architect to achieve IS integration and interoperability. This research provides an empirically derived taxonomy of enterprise architectural variants of the types often described in the literature for large firms. This study finds indications that for SMEs the immediate goal of interoperability prevailed over fuller and more formal system integration. The most common means for approaching enterprise architecture and any form of integration is via the construction of software bridges and interfaces. Partially standardized architectures based on Enterprise Systems (ERP) are the next most common type. Hybrid architectures – mixed Enterprise Applications Integration and ERP – are the third most common. The contribution of this paper lies not in the identification of the three types but resides (1) in the description of their distribution in SMEs; (2) in the absence of other integration/interoperability types in this population; and (3) most importantly in the interpretation of the organizational and historical rationale explaining the emergence of these types in this organizational context. Journal: European Journal of Information Systems Pages: 287-302 Issue: 3 Volume: 21 Year: 2012 Month: 5 X-DOI: 10.1057/ejis.2012.12 File-URL: http://hdl.handle.net/10.1057/ejis.2012.12 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:3:p:287-302 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934227_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bernd Carsten Stahl Author-X-Name-First: Bernd Carsten Author-X-Name-Last: Stahl Title: Responsible research and innovation in information systems Journal: European Journal of Information Systems Pages: 207-211 Issue: 3 Volume: 21 Year: 2012 Month: 5 X-DOI: 10.1057/ejis.2012.19 File-URL: http://hdl.handle.net/10.1057/ejis.2012.19 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:21:y:2012:i:3:p:207-211 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1771968_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Pär J Ågerfalk Author-X-Name-First: Pär J Author-X-Name-Last: Ågerfalk Author-Name: Kieran Conboy Author-X-Name-First: Kieran Author-X-Name-Last: Conboy Author-Name: Michael D Myers Author-X-Name-First: Michael D Author-X-Name-Last: Myers Title: Information systems in the age of pandemics: COVID-19 and beyond Journal: European Journal of Information Systems Pages: 203-207 Issue: 3 Volume: 29 Year: 2020 Month: 05 X-DOI: 10.1080/0960085X.2020.1771968 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1771968 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:3:p:203-207 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1755207_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jan Mendling Author-X-Name-First: Jan Author-X-Name-Last: Mendling Author-Name: Brian T. Pentland Author-X-Name-First: Brian T. Author-X-Name-Last: Pentland Author-Name: Jan Recker Author-X-Name-First: Jan Author-X-Name-Last: Recker Title: Building a complementary agenda for business process management and digital innovation Abstract: The world is blazing with change and digital innovation is fuelling the fire. Process management can help channel the heat into useful work. Unfortunately, research on digital innovation and process management has been conducted by separate communities operating under orthogonal assumptions. We argue that a synthesis of assumptions is required to bring these streams of research together. We offer suggestions for how these assumptions can be updated to facilitate a convergent conversation between the two research streams. We also suggest ways that methodologies from each stream could benefit the other. Together with the three exemplar empirical studies included in the special issue on business process management and digital innovation, we develop a broader foundation for reinventing research on business process management in a world ablaze with digital innovation. Journal: European Journal of Information Systems Pages: 208-219 Issue: 3 Volume: 29 Year: 2020 Month: 05 X-DOI: 10.1080/0960085X.2020.1755207 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1755207 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:3:p:208-219 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1728201_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bendik Bygstad Author-X-Name-First: Bendik Author-X-Name-Last: Bygstad Author-Name: Egil Øvrelid Author-X-Name-First: Egil Author-X-Name-Last: Øvrelid Title: Architectural alignment of process innovation and digital infrastructure in a high-tech hospital Abstract: Two central approaches to IT-enabled organisational change are process innovation and digital infrastructure research. In this study, we investigate the alignment between them, both from a theoretical and a practical perspective. They have quite different basic assumptions on evolution; process innovation is a top-down approach, while digital infrastructures evolve bottom-up and are partly outside direct managerial control. Our research question is, how can a process innovation initiative successfully align with an underlying digital infrastructure? Our empirical evidence is an in-depth case study at a new high-tech hospital in Norway. Building on a proposed framework of alignment between process innovation and digital infrastructure, we identify, analyse three architectural alignment mechanisms. We found that (i) the careful deployment of lightweight IT in onsite configuration, loosely coupled from the infrastructure activities, allows for fast process innovation while leveraging the slow and nonlinear evolution of infrastructure (ii) the interaction between lightweight IT and large clinical systems by a set of boundary resources resolves the tension between innovation and infrastructure. For practitioners, we show that lightweight IT can serve as a mediating technology in the configuration. Journal: European Journal of Information Systems Pages: 220-237 Issue: 3 Volume: 29 Year: 2020 Month: 05 X-DOI: 10.1080/0960085X.2020.1728201 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1728201 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:3:p:220-237 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1718007_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Abayomi Baiyere Author-X-Name-First: Abayomi Author-X-Name-Last: Baiyere Author-Name: Hannu Salmela Author-X-Name-First: Hannu Author-X-Name-Last: Salmela Author-Name: Tommi Tapanainen Author-X-Name-First: Tommi Author-X-Name-Last: Tapanainen Title: Digital transformation and the new logics of business process management Abstract: Business process management (BPM) research emphasises three important logics – modelling (process), infrastructural alignment (infrastructure) and procedural actor (agency) logics. These logics capture the dominant ways of thinking in BPM, reflected in its assumptions, practices and values. While the three logics have proven useful in prior contexts, we argue that the applicability of these underlying assumptions in theorising BPM needs to be re-examined in the context of digital transformation. Based on an ethnographic study of BPM in a company undergoing digital transformation, we uncover tensions related to applying these prior logics that point to the need to update the underlying assumptions. Consequently, we propose new logics that we conceptualise as light touch processes (process), infrastructural flexibility (infrastructure) and mindful actors (agency). Our observations contribute to a rethinking of the dominant BPM logics by unpacking their dynamics in the context of digital transformation. Our study further highlight salient differences between digital transformation and IT-enabled organisational transformation contexts. We conclude by proposing new managerial approaches for BPM in digital transformation contexts. Journal: European Journal of Information Systems Pages: 238-259 Issue: 3 Volume: 29 Year: 2020 Month: 05 X-DOI: 10.1080/0960085X.2020.1718007 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1718007 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:3:p:238-259 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1740618_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Patrick Mikalef Author-X-Name-First: Patrick Author-X-Name-Last: Mikalef Author-Name: John Krogstie Author-X-Name-First: John Author-X-Name-Last: Krogstie Title: Examining the interplay between big data analytics and contextual factors in driving process innovation capabilities Abstract: The potential of big data analytics in enabling improvements in business processes has urged researchers and practitioners to understand if, and under what combination of conditions, such novel technologies can support the enactment and management of business processes. While there is much discussion around how big data analytics can impact a firm’s incremental and radical process innovation capabilities, we still know very little about what big data analytics resources firms must invest in to drive such outcomes. To explore this topic, we ground this study on a theory-driven conceptualisation of big data analytics based on the resource-based view (RBV) of the firm. Based on this conceptualisation, we examine the fit between the big data analytics resources that underpin the notion, and their interplay with organisational contextual factors in driving a firm’s incremental and radical process innovation capabilities. Survey data from 202 chief information officers and IT managers working in Norwegian firms are analysed by means of fuzzy set qualitative comparative analysis (fsQCA). Results show that under different combinations of contextual factors the significance of big data analytics resources varies, with specific configurations leading to high levels of incremental and radical process innovation capabilities. Journal: European Journal of Information Systems Pages: 260-287 Issue: 3 Volume: 29 Year: 2020 Month: 05 X-DOI: 10.1080/0960085X.2020.1740618 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1740618 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:3:p:260-287 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1770632_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Samuli Laato Author-X-Name-First: Samuli Author-X-Name-Last: Laato Author-Name: A. K. M. Najmul Islam Author-X-Name-First: A. K. M. Najmul Author-X-Name-Last: Islam Author-Name: Muhammad Nazrul Islam Author-X-Name-First: Muhammad Nazrul Author-X-Name-Last: Islam Author-Name: Eoin Whelan Author-X-Name-First: Eoin Author-X-Name-Last: Whelan Title: What drives unverified information sharing and cyberchondria during the COVID-19 pandemic? Abstract: The World Health Organisation has emphasised that misinformation – spreading rapidly through social media – poses a serious threat to the COVID-19 response. Drawing from theories of health perception and cognitive load, we develop and test a research model hypothesising why people share unverified COVID-19 information through social media. Our findings suggest a person’s trust in online information and perceived information overload are strong predictors of unverified information sharing. Furthermore, these factors, along with a person’s perceived COVID-19 severity and vulnerability influence cyberchondria. Females were significantly more likely to suffer from cyberchondria, with males more likely to share news without verifying its reliability. Our findings suggest that to mitigate the spread of COVID-19 misinformation and cyberchondria, measures should be taken to enhance a healthy scepticism of health news while simultaneously guarding against information overload. Journal: European Journal of Information Systems Pages: 288-305 Issue: 3 Volume: 29 Year: 2020 Month: 05 X-DOI: 10.1080/0960085X.2020.1770632 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1770632 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:3:p:288-305 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1771222_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Rennie Naidoo Author-X-Name-First: Rennie Author-X-Name-Last: Naidoo Title: A multi-level influence model of COVID-19 themed cybercrime Abstract: The recent severity and frequency of cybercrime has been dominated by a single theme – the COVID-19 pandemic. This research develops a multi-level influence model to explore how cybercriminals are exploiting the COVID-19 pandemic by assessing situational factors, identifying victims, impersonating trusted sources, selecting attack methods, and employing social engineering techniques. The model extends upon prior work on influence techniques and emotional appeals that cybercriminals employ, by bringing into sharper focus the role of situational factors in COVID-19 related cybercrime attacks. Content and thematic analysis was conducted on 185 distinct COVID-19 cybercrime scam incident documents, including text, images, and photos, provided by a global online fraud and cybersecurity company tracking COVID-19 related cybercrime. The analysis reveals interesting patterns about the sheer breadth and diversity of COVID-19 related cybercrime and how these crimes are continually evolving in response to changing situational factors. It is hoped that these insights and recommendations for end-users and organisations can contribute to a safer digital world as we cope with many other pressing challenges during the COVID-19 pandemic. Journal: European Journal of Information Systems Pages: 306-321 Issue: 3 Volume: 29 Year: 2020 Month: 05 X-DOI: 10.1080/0960085X.2020.1771222 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1771222 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:29:y:2020:i:3:p:306-321 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934323_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Aurélie Leclercq-Vandelannoitte Author-X-Name-First: Aurélie Author-X-Name-Last: Leclercq-Vandelannoitte Author-Name: Henri Isaac Author-X-Name-First: Henri Author-X-Name-Last: Isaac Author-Name: Michel Kalika Author-X-Name-First: Michel Author-X-Name-Last: Kalika Title: Mobile information systems and organisational control: beyond the panopticon metaphor? Abstract: With their ubiquity, mobile information systems (IS) may be used in ways that challenge the dynamics of organisational control, forcing IS scholars to revisit the panopticon metaphor and possibly offer new conceptual tools for theorising about information technology (IT)-based organisational control. Yet little IS research has offered critical reflections on the use of the panopticon to represent the control potential of mobile IS. This study investigates whether the way mobile IS are engaged in the workplace reinforce panoptic control systems or generate other types of control logics, requiring another conceptual lens. A qualitative exploratory case study investigated a consulting company whose professionals equipped themselves with mobile IS. The study reveals the emergence of a subtle, invisible form of ‘free control’ through mobile IS. Although consultants are mobile, flexible, and autonomous, a powerful communication and information network keeps them in a position of ‘allowed subjection’. Free control is characterised by a shift in the location of authority, a time-related discipline, a deep sense of trust, and adherence to organisational norms that the professionals themselves co-construct. These characteristics, which render such control even more pernicious than panoptic arrangements, deserve more attention in further IS research. Journal: European Journal of Information Systems Pages: 543-557 Issue: 5 Volume: 23 Year: 2014 Month: 9 X-DOI: 10.1057/ejis.2014.11 File-URL: http://hdl.handle.net/10.1057/ejis.2014.11 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:5:p:543-557 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934324_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ioanna D Constantiou Author-X-Name-First: Ioanna D Author-X-Name-Last: Constantiou Author-Name: Christiane Lehrer Author-X-Name-First: Christiane Author-X-Name-Last: Lehrer Author-Name: Thomas Hess Author-X-Name-First: Thomas Author-X-Name-Last: Hess Title: Changing information retrieval behaviours: an empirical investigation of users’ cognitive processes in the choice of location-based services Abstract: The introduction of smartphones and the accompanying profusion of mobile data services have had a profound effect on individuals’ lives. One of the most influential service categories is location-based services (LBS). Based on insights from behavioural decision-making, a conceptual framework is developed to analyse individuals’ decisions to use LBS, focusing on the cognitive processes involved in the decision-making. Our research is based on two studies. First, we investigate the use of LBS through semi-structured interviews of smartphone users. Second, we explore daily LBS use through a study based on diaries. The findings highlight that the decision to use LBS can be described by either a comparative mode based on the value of LBS in relation to other available options, or an intuitive mode in which past experiences trigger the use of heuristics. These modes in turn have positive influences on the continuance of LBS use and indicate changes in individuals’ information retrieval behaviours in everyday life. In particular, the distinct value dimension of LBS in specific contexts of use changes individuals’ behaviours towards accessing location-related information. Journal: European Journal of Information Systems Pages: 513-528 Issue: 5 Volume: 23 Year: 2014 Month: 9 X-DOI: 10.1057/ejis.2014.12 File-URL: http://hdl.handle.net/10.1057/ejis.2014.12 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:5:p:513-528 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934325_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Kristine Dery Author-X-Name-First: Kristine Author-X-Name-Last: Dery Author-Name: Darl Kolb Author-X-Name-First: Darl Author-X-Name-Last: Kolb Author-Name: Judith MacCormick Author-X-Name-First: Judith Author-X-Name-Last: MacCormick Title: Working with connective flow: how smartphone use is evolving in practice Abstract: Smartphones, those handheld devices that connect us via telephone and the Internet to virtually everyone and everything in the world, are becoming an integral part of everyday life. While there are significant individual and collective benefits from being more connected, there are also concerns associated with ‘always on’ work practices. This paper reports on a two-phase case study of smartphone users in a global financial services firm comparing the use of smartphones and their impact on work over time. We found that mobile communication technology practices have evolved within a relatively short (5-year) period of time as users seek to manage connectivity across work and non-work spaces. Disconnecting from work is no longer possible, nor desirable, for many users, who exercise choice (agency), switching between work and non-work interactions to regulate the connective flow across multiple connective media. Journal: European Journal of Information Systems Pages: 558-570 Issue: 5 Volume: 23 Year: 2014 Month: 9 X-DOI: 10.1057/ejis.2014.13 File-URL: http://hdl.handle.net/10.1057/ejis.2014.13 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:5:p:558-570 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934326_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Winnie Ng Picoto Author-X-Name-First: Winnie Ng Author-X-Name-Last: Picoto Author-Name: France Bélanger Author-X-Name-First: France Author-X-Name-Last: Bélanger Author-Name: António Palma-dos-Reis Author-X-Name-First: António Author-X-Name-Last: Palma-dos-Reis Title: An organizational perspective on m-business: usage factors and value determination Abstract: Mobile technologies have increasingly become an integral part of individuals’ work and personal lives. Although research exists in this domain, most of it focuses on the customer’s adoption factors rather than assessing the value or the impact of mobile business (m-business) usage on firms. The present study fills this gap in the literature through the analysis of the value m-business can provide for firms. The Technology-Organization-Environment framework, Diffusion of Innovation theory and Resource-Based theory ground this research’s conceptual model for assessing the post-adoption stages of usage and value of mobile business from an organizational perspective. The value of m-business includes the impact on marketing and sales, internal operations, and procurement. This research uses a mixed method research design; interviews are first conducted to develop a model to assess m-business usage, and survey data collected from 180 Portuguese organizations is then used to test the proposed model. The results indicate that seven of the nine proposed antecedents of m-business usage are significant, and that m-business usage has a positive and significant relationship with m-business value. Furthermore, the three dimensions of value (marketing and sales, internal operations, and procurement) are significant, but only two of them have direct positive impacts on firm performance. Implications of these findings for practice and research are discussed. Journal: European Journal of Information Systems Pages: 571-592 Issue: 5 Volume: 23 Year: 2014 Month: 9 X-DOI: 10.1057/ejis.2014.15 File-URL: http://hdl.handle.net/10.1057/ejis.2014.15 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:5:p:571-592 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934327_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Stan Karanasios Author-X-Name-First: Stan Author-X-Name-Last: Karanasios Author-Name: David Allen Author-X-Name-First: David Author-X-Name-Last: Allen Title: Mobile technology in mobile work: contradictions and congruencies in activity systems Abstract: Mobile technology and the information and communication services supported by it have become increasingly embedded in, and in some cases transformed, work and social activity and created new challenges for studying information systems. This paper focuses on the experience with mobile technology in an inherently mobile and information-intensive work activity – policing. Drawing upon data from this context this paper makes two key sets of contributions. Empirically, we illuminate the congruencies and contradictions between mobile technology and mobile working, and the relationship between the two, revealing a state of change based upon dialectic interaction. We highlight several ways in which mobile technology has changed the nature of mobile work activity. Theoretically we advance the use of activity theory to better understand the changes of mobile technology-mediated work. We extend traditional use of activity theory by adopting congruencies as an analytical lens, in addition to the approach of examining contradictions. The findings are applicable to other areas of mobile work and contribute to the body of knowledge concerning mobile technology-mediated work. Journal: European Journal of Information Systems Pages: 529-542 Issue: 5 Volume: 23 Year: 2014 Month: 9 X-DOI: 10.1057/ejis.2014.20 File-URL: http://hdl.handle.net/10.1057/ejis.2014.20 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:5:p:529-542 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934328_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Catherine Middleton Author-X-Name-First: Catherine Author-X-Name-Last: Middleton Author-Name: Rens Scheepers Author-X-Name-First: Rens Author-X-Name-Last: Scheepers Author-Name: Virpi Kristiina Tuunainen Author-X-Name-First: Virpi Kristiina Author-X-Name-Last: Tuunainen Title: When mobile is the norm: researching mobile information systems and mobility as post-adoption phenomena Journal: European Journal of Information Systems Pages: 503-512 Issue: 5 Volume: 23 Year: 2014 Month: 9 X-DOI: 10.1057/ejis.2014.21 File-URL: http://hdl.handle.net/10.1057/ejis.2014.21 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:23:y:2014:i:5:p:503-512 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11978412_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Zafer D. Ozdemir Author-X-Name-First: Zafer D. Author-X-Name-Last: Ozdemir Author-Name: H. Jeff Smith Author-X-Name-First: H. Author-X-Name-Last: Jeff Smith Author-Name: John H. Benamati Author-X-Name-First: John H. Author-X-Name-Last: Benamati Title: Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study Abstract: Academic studies typically view privacy threats as originating solely from organizations. With the rise of social media, such a view is incomplete because consumers increasingly face risks from peers’ misuse of data. In this paper, we study information privacy in the context of peer relationships on commercial social media sites. We develop a model that considers relationships between the constructs of privacy experiences, privacy awareness, trust, risk, and benefits and how those relationships impact individuals’ disclosure behaviors. We test the model by creating a survey that includes a number of measures that were taken directly from or were closely based on measures from prior studies. We conduct seven pilot tests of undergraduate students in order to validate the survey items. Working with the online survey firm Qualtrics, we gather a dataset of 314 Facebook users’ responses to our validated survey, and we test our model using partial least squares techniques. We find that both privacy experiences and privacy awareness are quite significant predictors of privacy concerns. We also find that trust, risk, benefits, and privacy concerns work together to explain a large amount (37%) of the variance in disclosure behaviors. We discuss implications for practice and for future research. Journal: European Journal of Information Systems Pages: 642-660 Issue: 6 Volume: 26 Year: 2017 Month: 11 X-DOI: 10.1057/s41303-017-0056-z File-URL: http://hdl.handle.net/10.1057/s41303-017-0056-z File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:6:p:642-660 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11978413_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Abdullah Algarni Author-X-Name-First: Abdullah Author-X-Name-Last: Algarni Author-Name: Yue Xu Author-X-Name-First: Yue Author-X-Name-Last: Xu Author-Name: Taizan Chan Author-X-Name-First: Taizan Author-X-Name-Last: Chan Title: An empirical study on the susceptibility to social engineering in social networking sites: the case of Facebook Abstract: Research suggests that social engineering attacks pose a significant security risk, with social networking sites (SNSs) being the most common source of these attacks. Recent studies showed that social engineers could succeed even among those organizations that identify themselves as being aware of social engineering techniques. Although organizations recognize the serious risks of social engineering, there is little understanding and control of such threats. This may be partly due to the complexity of human behaviors in failing to recognize attackers in SNSs. Due to the vital role that impersonation plays in influencing users to fall victim to social engineering deception, this paper aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization on Facebook. In doing so, we identify source credibility dimensions in terms of social engineering on Facebook, Facebook-based source characteristics that influence users to judge an attacker as per these dimensions, and mediation effects that these dimensions play between Facebook-based source characteristics and susceptibility to social engineering victimization. Journal: European Journal of Information Systems Pages: 661-687 Issue: 6 Volume: 26 Year: 2017 Month: 11 X-DOI: 10.1057/s41303-017-0057-y File-URL: http://hdl.handle.net/10.1057/s41303-017-0057-y File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:6:p:661-687 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11978414_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Gregory D. Moody Author-X-Name-First: Gregory D. Author-X-Name-Last: Moody Author-Name: Dennis F. Galletta Author-X-Name-First: Dennis F. Author-X-Name-Last: Galletta Author-Name: Brian Kimball Dunn Author-X-Name-First: Brian Kimball Author-X-Name-Last: Dunn Title: Which phish get caught? An exploratory study of individuals′ susceptibility to phishing Abstract: Phishing, or the practice of sending deceptive electronic communications to acquire private information from victims, results in significant financial losses to individuals and businesses. The first goal of this study is to identify situational and personality factors that explain why certain individuals are susceptible to such attacks. The second goal is to test those empirically, along with previously identified factors, to explain the likelihood that an individual will fall victim to a phishing attack. We employed the Delphi method to identify seven personality factors that may influence this susceptibility (trust, distrust, curiosity, entertainment drive, boredom proneness, lack of focus, and risk propensity). Our regression model included these as well as variables examined in previous studies. We find that emails sent from a known source significantly increase user susceptibility to phishing, as does a user’s curiosity, risk propensity, general Internet usage, and Internet anxiety. In post hoc tests, we also find that trust and distrust can be significant predictors of susceptibility and that this significance is dependent on the characteristics of the message. Journal: European Journal of Information Systems Pages: 564-584 Issue: 6 Volume: 26 Year: 2017 Month: 11 X-DOI: 10.1057/s41303-017-0058-x File-URL: http://hdl.handle.net/10.1057/s41303-017-0058-x File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:6:p:564-584 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11978415_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: W. Alec Cram Author-X-Name-First: W. Alec Author-X-Name-Last: Cram Author-Name: Jeffrey G. Proudfoot Author-X-Name-First: Jeffrey G. Author-X-Name-Last: Proudfoot Author-Name: John D’Arcy Author-X-Name-First: John Author-X-Name-Last: D’Arcy Title: Organizational information security policies: a review and research framework Abstract: A major stream of research within the field of information systems security examines the use of organizational policies that specify how users of information and technology resources should behave in order to prevent, detect, and respond to security incidents. However, this growing (and at times, conflicting) body of research has made it challenging for researchers and practitioners to comprehend the current state of knowledge on the formation, implementation, and effectiveness of security policies in organizations. Accordingly, the purpose of this paper is to synthesize what we know and what remains to be learned about organizational information security policies, with an eye toward a holistic understanding of this research stream and the identification of promising paths for future study. We review 114 influential security policy-related journal articles and identify five core relationships examined in the literature. Based on these relationships, we outline a research framework that synthesizes the construct linkages within the current literature. Building on our analysis of these results, we identify a series of gaps and draw on additional theoretical perspectives to propose a revised framework that can be used as a basis for future research. Journal: European Journal of Information Systems Pages: 605-641 Issue: 6 Volume: 26 Year: 2017 Month: 11 X-DOI: 10.1057/s41303-017-0059-9 File-URL: http://hdl.handle.net/10.1057/s41303-017-0059-9 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:6:p:605-641 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11978416_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Sabrina Karwatzki Author-X-Name-First: Sabrina Author-X-Name-Last: Karwatzki Author-Name: Manuel Trenz Author-X-Name-First: Manuel Author-X-Name-Last: Trenz Author-Name: Virpi Kristiina Tuunainen Author-X-Name-First: Virpi Kristiina Author-X-Name-Last: Tuunainen Author-Name: Daniel Veit Author-X-Name-First: Daniel Author-X-Name-Last: Veit Title: Adverse consequences of access to individuals’ information: an analysis of perceptions and the scope of organisational influence Abstract: Organisations are highly interested in collecting and analysing customer data to enhance their service offerings and customer interaction. However, individuals increasingly fear how such practices may negatively affect them. Although previous studies have investigated individuals’ concerns about information privacy practices, the adverse consequences people associate with external actors accessing their personal information remain unclear. To mitigate customers’ fears, organisations need to know which adverse consequences individuals are afraid of and how to address those negative perceptions. To investigate this topic, we conducted 22 focus groups with 119 participants. We developed a comprehensive conceptualisation and categorisation of individuals’ perceived adverse consequences of access to their information that includes seven types of consequences: psychological, social, career-related, physical, resource-related, prosecution-related, and freedom-related. Although individuals may limit their interactions with an organisation owing to consequences they associate with both the organisation and other actors, organisations can apply preventive and corrective mechanisms to mitigate some of these negative perceptions. However, organisations’ scope of influence is limited and some fears may be mitigated only by individuals themselves or government regulation, if at all. Journal: European Journal of Information Systems Pages: 688-715 Issue: 6 Volume: 26 Year: 2017 Month: 11 X-DOI: 10.1057/s41303-017-0064-z File-URL: http://hdl.handle.net/10.1057/s41303-017-0064-z File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:6:p:688-715 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11978417_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Clay Posey Author-X-Name-First: Clay Author-X-Name-Last: Posey Author-Name: Uzma Raja Author-X-Name-First: Uzma Author-X-Name-Last: Raja Author-Name: Robert E. Crossler Author-X-Name-First: Robert E. Author-X-Name-Last: Crossler Author-Name: A. J. Burns Author-X-Name-First: A. J. Author-X-Name-Last: Burns Title: Taking stock of organisations’ protection of privacy: categorising and assessing threats to personally identifiable information in the USA Abstract: Many organisations create, store, or purchase information that links individuals’ identities to other data. Termed personally identifiable information (PII), this information has become the lifeblood of many firms across the globe. As organisations accumulate their constituencies’ PII (e.g. customers’, students’, patients’, and employees’ data), individuals’ privacy will depend on the adequacy of organisations’ information privacy safeguards. Despite existing protections, many breaches still occur. For example, US organisations reported around 4,500 PII-breach events between 2005 and 2015. With such a high number of breaches, determining all threats to PII within organisations proves a burdensome task. In light of this difficulty, we utilise text-mining and cluster analysis techniques to create a taxonomy of various organisational PII breaches, which will help drive targeted research towards organisational PII protection. From an organisational systematics perspective, our classification system provides a foundation to explain the diversity among the myriad of threats. We identify eight major PII-breach types and provide initial literature reviews for each type of breach. We detail how US organisations differ regarding their exposure to these breaches, as well as how the level of severity (i.e. number of records affected) differs among these PII breaches. Finally, we offer several paths for future research. Journal: European Journal of Information Systems Pages: 585-604 Issue: 6 Volume: 26 Year: 2017 Month: 11 X-DOI: 10.1057/s41303-017-0065-y File-URL: http://hdl.handle.net/10.1057/s41303-017-0065-y File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:6:p:585-604 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11978418_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Paul Benjamin Lowry Author-X-Name-First: Paul Benjamin Author-X-Name-Last: Lowry Author-Name: Tamara Dinev Author-X-Name-First: Tamara Author-X-Name-Last: Dinev Author-Name: Robert Willison Author-X-Name-First: Robert Author-X-Name-Last: Willison Title: Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda Abstract: In this essay, we outline some important concerns in the hope of improving the effectiveness of security and privacy research. We discuss the need to re-examine our understanding of information technology and information system (IS) artefacts and to expand the range of the latter to include those artificial phenomena that are crucial to information security and privacy research. We then briefly discuss some prevalent limitations in theory, methodology, and contributions that generally weaken security/privacy studies and jeopardise their chances of publication in a top IS journal. More importantly, we suggest remedies for these weaknesses, identifying specific improvements that can be made and offering a couple of illustrations of such improvements. In particular, we address the notion of loose re-contextualisation, using deterrence theory research as an example. We also provide an illustration of how the focus on intentions may have resulted in an underuse of powerful theories in security and privacy research, because such theories explain more than just intentions. We then outline three promising opportunities for IS research that should be particularly compelling to security and privacy researchers: online platforms, the Internet of things, and big data. All of these carry innate information security and privacy risks and vulnerabilities that can be addressed only by researching each link of the systems chain, that is, technologies–policies–processes–people–society–economy–legislature. We conclude by suggesting several specific opportunities for new research in these areas. Journal: European Journal of Information Systems Pages: 546-563 Issue: 6 Volume: 26 Year: 2017 Month: 11 X-DOI: 10.1057/s41303-017-0066-x File-URL: http://hdl.handle.net/10.1057/s41303-017-0066-x File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:6:p:546-563 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11978419_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Dov Te’eni Author-X-Name-First: Dov Author-X-Name-Last: Te’eni Author-Name: Stefan Seidel Author-X-Name-First: Stefan Author-X-Name-Last: Seidel Author-Name: Jan vom Brocke Author-X-Name-First: Jan vom Author-X-Name-Last: Brocke Title: Stimulating dialog between information systems research and practice Journal: European Journal of Information Systems Pages: 541-545 Issue: 6 Volume: 26 Year: 2017 Month: 11 X-DOI: 10.1057/s41303-017-0067-9 File-URL: http://hdl.handle.net/10.1057/s41303-017-0067-9 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:26:y:2017:i:6:p:541-545 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934286_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Fredrik Karlsson Author-X-Name-First: Fredrik Author-X-Name-Last: Karlsson Title: Longitudinal use of method rationale in method configuration: an exploratory study Abstract: Organizations that implement a company-wide method to standardize the way that systems development is carried out still have a need to adapt this method to specific projects. When adapting this method the end results should align with the basic philosophy of the original method. To this end, goal-driven situational method engineering has been proposed. However, there are no longitudinal studies on systems developers’ use of such approaches and their intentions to balance their need of adaptation with the basic philosophy of the original method. This paper explores how goal-driven method configuration has been used by two project teams in six successive systems development projects, with the intention to balance the goals and values of a specific method with the systems developers’ need for method adaptation. We do that through the use of method rationality resonance theory. Through content examples of method configurations, we report on (a) lessons learned from the project teams’ work on balancing the goals of the company-wide method with their needs and (b) theoretical development of the method rationality resonance theory. Journal: European Journal of Information Systems Pages: 690-710 Issue: 6 Volume: 22 Year: 2013 Month: 11 X-DOI: 10.1057/ejis.2012.30 File-URL: http://hdl.handle.net/10.1057/ejis.2012.30 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:6:p:690-710 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934287_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Nilesh Saraf Author-X-Name-First: Nilesh Author-X-Name-Last: Saraf Author-Name: Chris Schlueter Langdon Author-X-Name-First: Chris Schlueter Author-X-Name-Last: Langdon Author-Name: Omar El Sawy Author-X-Name-First: Omar El Author-X-Name-Last: Sawy Title: IS integration and knowledge sharing in multi-unit firms: the winner's curse Abstract: Knowledge sharing across business units (BUs) is paramount for enterprises that aim to exploit latent cross-BU synergies. This paper examines how information systems (ISs) integration and two forms of cross-BU knowledge complementarities (workflow interdependence and BU relatedness) affect an important dimension of a firm's absorptive capacity – cross-BU knowledge sharing. The analysis, performed on survey data from 75 enterprises, supports all of our hypotheses. First, we hypothesized that cross-BU workflow serves as a conduit for knowledge transfer as participants continually engage in spontaneous adaptations. Second, IS application integration and cross-BU relatedness should both directly contribute to knowledge sharing. Third, IS application integration should positively moderate the impacts of cross-BU relatedness. Finally, and most interestingly, we hypothesized a redistribution of the effects of IS integration by which it becomes a key contributor to knowledge sharing, but also causes a reduction in the impact of workflow interdependence. Thus, while the seamlessness of high IS application integration has obvious benefits, it paradoxically also reduces the occasions for cross-BU workflow adaptations, which is a key mechanism for knowledge transfer. That is the phenomenon we call the ‘winner's curse’. Journal: European Journal of Information Systems Pages: 592-603 Issue: 6 Volume: 22 Year: 2013 Month: 11 X-DOI: 10.1057/ejis.2012.37 File-URL: http://hdl.handle.net/10.1057/ejis.2012.37 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:6:p:592-603 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934288_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Shoshana Altschuller Author-X-Name-First: Shoshana Author-X-Name-Last: Altschuller Author-Name: Raquel Benbunan-Fich Author-X-Name-First: Raquel Author-X-Name-Last: Benbunan-Fich Title: The pursuit of trust in ad hoc virtual teams: how much electronic portrayal is too much? Abstract: This study develops and tests the concept of electronic portrayal in synchronous computer-mediated communication of ad hoc virtual teams. Electronic portrayal is the extent to which a communication system portrays the true identity of its users. A theoretical model is developed based upon which it is hypothesized that increased information available due to electronic portrayal will impact trust in ad hoc virtual teams. An experiment is conducted to test the model by manipulating the graphical identification of users of a system as well as the rehearsability of the system. Rehearsability is the extent to which users can reread and edit their messages before submitting them to the synchronous communication system. The results show that the combination of both factors – identification and rehearsability – impacts trust among team members. Specifically, partial electronic portrayal (only one form of true-to-life representation) has the most positive impact on trust. This effect is moderated by communication-related variables such as self-disclosure, impressions and virtual co-presence. The implication of these results is that too much true identity information negatively impacts trust. This research provides theoretical and practical contributions for understanding the importance of identification and rehearsability in synchronous group communication. Journal: European Journal of Information Systems Pages: 619-636 Issue: 6 Volume: 22 Year: 2013 Month: 11 X-DOI: 10.1057/ejis.2012.39 File-URL: http://hdl.handle.net/10.1057/ejis.2012.39 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:6:p:619-636 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934289_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mark Keil Author-X-Name-First: Mark Author-X-Name-Last: Keil Author-Name: Arun Rai Author-X-Name-First: Arun Author-X-Name-Last: Rai Author-Name: Shan Liu Author-X-Name-First: Shan Author-X-Name-Last: Liu Title: How user risk and requirements risk moderate the effects of formal and informal control on the process performance of IT projects Abstract: Improving the management of information technology (IT) projects is of prime concern to both IS researchers and practitioners, as IT projects are notorious for poor process performance, frequently running over budget and behind schedule. Over the years, at least two separate streams of research have emerged with the aim of contributing to our understanding of IT project management. One of these focuses on the exercise of formal and informal controls, while another focuses on identifying and managing key risks such as those associated with requirements and users. Proponents of the control stream would argue that the exercise of formal and informal controls can improve process performance and there is some evidence that this is so. An obvious question that emerges, however, is how effective these controls are in the presence of particular risks. In this study, we seek to answer this question by developing and testing a research model that integrates these two streams of research. On the basis of data collected from 63 completed IT projects in China, we examine the moderating effects of requirements risk and user risk on the relationship between control (both formal and informal) and the process performance of IT projects. We contribute to the current state of knowledge by clearly demonstrating that both types of risk moderate the effects of formal and informal controls on performance. Specifically, both requirements risk and user risk were found to reduce the positive influence of controls on process performance, implying that implementing solid controls is a necessary, but not sufficient, condition to ensure good process performance. Journal: European Journal of Information Systems Pages: 650-672 Issue: 6 Volume: 22 Year: 2013 Month: 11 X-DOI: 10.1057/ejis.2012.42 File-URL: http://hdl.handle.net/10.1057/ejis.2012.42 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:6:p:650-672 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934290_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: David Gefen Author-X-Name-First: David Author-X-Name-Last: Gefen Author-Name: Erran Carmel Author-X-Name-First: Erran Author-X-Name-Last: Carmel Title: Why the first provider takes it all: the consequences of a low trust culture on pricing and ratings in online sourcing markets Abstract: Electronic markets are ruled by price and reputation, and, at least in the case of Online Sourcing Markets (OSM), also by preference for providers the buyer already contracted with. OSM are online markets for software development. Adding Fukuyama's notion of a low trust culture, an argument is advanced why buyers in OSM may give absolute preference to providers with whom they had previous contracts, presenting a special case of neoclassical contracting. Examining all the transactions in one calendar year at a leading OSM supports this proposition. All it took to be given the tender was to be the only bidding provider with at least one successful previous contract with the buyer, rendering pricing and ratings immaterial to bid choice. Only when none of the bidding providers had previous successful projects with the buyer did pricing and rating affect bid choice. The proposition is also consistent with the buyers’ comments about their providers. Implications are discussed about how a low trust culture affects OSM behavior. Journal: European Journal of Information Systems Pages: 604-618 Issue: 6 Volume: 22 Year: 2013 Month: 11 X-DOI: 10.1057/ejis.2012.49 File-URL: http://hdl.handle.net/10.1057/ejis.2012.49 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:6:p:604-618 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934291_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jan Recker Author-X-Name-First: Jan Author-X-Name-Last: Recker Title: Empirical investigation of the usefulness of Gateway constructs in process models Abstract: Process modeling grammars are used to create scripts of a business domain that a process-aware information system is intended to support. A key grammatical construct of such grammars is known as a Gateway. A Gateway construct is used to describe scenarios in which the workflow of a process diverges or converges according to relevant conditions. Gateway constructs have been subjected to much academic discussion about their meaning, role and usefulness, and have been linked to both process-modeling errors and process-model understandability. This paper examines perceptual discriminability effects of Gateway constructs on an individual's abilities to interpret process models. We compare two ways of expressing two convergence and divergence patterns – Parallel Split and Simple Merge – implemented in a process modeling grammar. On the basis of an experiment with 98 students, we provide empirical evidence that Gateway constructs aid the interpretation of process models due to a perceptual discriminability effect, especially when models are complex. We discuss the emerging implications for research and practice, in terms of revisions to grammar specifications, guideline development and design choices in process modeling. Journal: European Journal of Information Systems Pages: 673-689 Issue: 6 Volume: 22 Year: 2013 Month: 11 X-DOI: 10.1057/ejis.2012.50 File-URL: http://hdl.handle.net/10.1057/ejis.2012.50 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:6:p:673-689 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934292_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Elmar Kutsch Author-X-Name-First: Elmar Author-X-Name-Last: Kutsch Author-Name: David Denyer Author-X-Name-First: David Author-X-Name-Last: Denyer Author-Name: Mark Hall Author-X-Name-First: Mark Author-X-Name-Last: Hall Author-Name: Elizabeth (Liz) Lee-Kelley Author-X-Name-First: Elizabeth (Liz) Author-X-Name-Last: Lee-Kelley Title: Does risk matter? Disengagement from risk management practices in information systems projects Abstract: Risk management and ‘routine-based reliability’ is considered fundamental to project performance. Existing theories of project risk management do not fully explain why project managers stop practicing risk management information systems (IS); however, constructs drawn from organisation theory offer insights into how and why such disengagement occurs. The study examines risk management practices in 21 IS projects within 10 organisations. By focusing on risks that resulted in significant events and mapping backwards over time the practices associated with those risks, we identify that in all but five projects the manager had disengaged from prescribed risk management before executing risk responses. In most projects, the majority of formally identified and assessed risks remained unallocated and untreated. A laddering technique was used to help explain why this transpired. We found five key underlying beliefs that governed project managers’ risk management attitudes and actions. Journal: European Journal of Information Systems Pages: 637-649 Issue: 6 Volume: 22 Year: 2013 Month: 11 X-DOI: 10.1057/ejis.2012.6 File-URL: http://hdl.handle.net/10.1057/ejis.2012.6 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:6:p:637-649 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934293_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Dov Te'eni Author-X-Name-First: Dov Author-X-Name-Last: Te'eni Title: Journals and conferences in discourse Journal: European Journal of Information Systems Pages: 589-591 Issue: 6 Volume: 22 Year: 2013 Month: 11 X-DOI: 10.1057/ejis.2013.30 File-URL: http://hdl.handle.net/10.1057/ejis.2013.30 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:22:y:2013:i:6:p:589-591 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1398880_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mathieu Templier Author-X-Name-First: Mathieu Author-X-Name-Last: Templier Author-Name: Guy Paré Author-X-Name-First: Guy Author-X-Name-Last: Paré Title: Transparency in literature reviews: an assessment of reporting practices across review types and genres in top IS journals Abstract: The central role of information systems review articles has been recognised in a recent explosion of interest in editorials, research articles, and opinion papers investigating methods and approaches for conducting standalone reviews. In continuity with recent developments in this area, this descriptive review seeks to determine the extent to which various types of review articles published in our field are transparent, i.e., they report important methodological elements about their design. To fulfil this objective, we identified, classified, and coded 142 review articles from the Association for Information Systems (AIS) senior scholars’ basket of journals published between 2000 and 2014. Overall, our findings indicate inadequate reporting of the methods, procedures, and techniques used in a majority of reviews. Our assessment also reveals that theory development and narrative reviews, which are the most frequently published types of reviews in our field, generally were the least explicit with regard to the methods they used. Based on our observations, we recommend that authors of all forms of reviews better document design decisions so to increase trustworthiness, get meaningful results, and develop a cumulative body of knowledge in our discipline. The list of reporting items developed in this study can serve as a framework to assist prospective authors of reviews both within and outside our field. Journal: European Journal of Information Systems Pages: 503-550 Issue: 5 Volume: 27 Year: 2018 Month: 9 X-DOI: 10.1080/0960085X.2017.1398880 File-URL: http://hdl.handle.net/10.1080/0960085X.2017.1398880 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:5:p:503-550 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1408752_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jong Seok Lee Author-X-Name-First: Jong Seok Author-X-Name-Last: Lee Author-Name: Mark Keil Author-X-Name-First: Mark Author-X-Name-Last: Keil Title: The effects of relative and criticism-based performance appraisals on task-level escalation in an IT project: a laboratory experiment Abstract: While performance appraisals provide an opportunity for managers to review employee performance, prior research points to potential negative consequences associated with performance appraisals. Specifically, prior IS research suggests that relative and criticism-based appraisals can have an undesirable impact on employee behaviour. Motivated by this, in this study we theorised and empirically investigated how relative and criticism-based appraisals can influence an IT project member’s tendency to continue working on a task despite encountering serious setbacks (i.e., task-level escalation). To shed light on the underlying mechanisms through which appraisals influence task-level escalation, we proposed and tested two mediating pathways based on goal orientation theory and prospect theory. In a laboratory experiment, we found that a relative appraisal led to greater task-level escalation as compared to an absolute appraisal. Proving goal orientation and avoiding goal orientation mediated this relationship. In addition, we found that a criticism-based appraisal led to greater task-level escalation as compared to a praise-based appraisal. Risk propensity and self-esteem mediated this relationship. Lastly, we found that the effects of both a relative appraisal and a criticism-based appraisal on task-level escalation were significantly different from a control group that did not involve any form of performance appraisal. Journal: European Journal of Information Systems Pages: 551-569 Issue: 5 Volume: 27 Year: 2018 Month: 9 X-DOI: 10.1080/0960085X.2017.1408752 File-URL: http://hdl.handle.net/10.1080/0960085X.2017.1408752 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:5:p:551-569 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1435230_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: David Agogo Author-X-Name-First: David Author-X-Name-Last: Agogo Author-Name: Traci J. Hess Author-X-Name-First: Traci J. Author-X-Name-Last: Hess Title: “How does tech make you feel?” a review and examination of negative affective responses to technology use Abstract: The study of individual, affect-related consequences from technology adoption and use is gaining traction in the information systems discipline. Efforts to explore affective reactions to technology have considered positive, affective constructs (e.g., enjoyment, playfulness, and flow), with a more recent focus on the dark side of technology use and constructs such as technostress, technophobia, and computer anxiety. While some research has examined these negative affective responses to technology, construct definitions and relationships are not well-defined or theoretically grounded. In this research, an integrative literature review is conducted on computer anxiety, technophobia and technostress, and the known antecedents, dimensions, and outcomes of each concept are organised into nomological networks. These nomological networks are then combined to identify inconsistencies and omissions in the literature. The Affective Response Model, a recently advanced, theoretically grounded taxonomy of affective responses to technology, is applied to differentiate the three constructs and to introduce technology-induced state anxiety (TISA), a new temporal (state-like) negative response to a specific instance of technology. Two empirical studies are conducted using existing and newly developed scales, and demonstrate that computer anxiety, technophobia, technostress and TISA are conceptually and empirically distinct and provide insight into how these constructs are related. Future research opportunities on affective responses to technology are described based on the integrated nomological network and empirical findings. Journal: European Journal of Information Systems Pages: 570-599 Issue: 5 Volume: 27 Year: 2018 Month: 9 X-DOI: 10.1080/0960085X.2018.1435230 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1435230 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:5:p:570-599 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1457194_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Greta L. Polites Author-X-Name-First: Greta L. Author-X-Name-Last: Polites Author-Name: Christina Serrano Author-X-Name-First: Christina Author-X-Name-Last: Serrano Author-Name: Jason Bennett Thatcher Author-X-Name-First: Jason Bennett Author-X-Name-Last: Thatcher Author-Name: Kevin Matthews Author-X-Name-First: Kevin Author-X-Name-Last: Matthews Title: Understanding social networking site (SNS) identity from a dual systems perspective: an investigation of the dark side of SNS use Abstract: Using a pathological perspective (e.g., addiction), some research suggests that technology engagement leads to poor self-regulation of behaviours. Rather than pathologise predictors of negative outcomes of IT use, we offer an alternative, identity-based explanation to investigate the role of identity in relation to an individual’s perceptions of his/her media use and the potential negative consequences of such use. We build on recent advances in conceptualising IT identity, defined as the extent to which one perceives an IT as central to who he/she is, to explore one’s self-identification with social networking sites (SNS) within a broader nomological net of deficient self-regulation, IS habit, use, and normative pressures. Results of a survey of 214 college students indicate that if an individual has strong self-identification with a particular SNS, it will increase perceptions of poor self-control over his/her time. Our study contributes to the literature by highlighting the utility of an identity-based (vs. pathology-based) explanation for such outcomes, which has distinct implications for interventions aimed at improving these outcomes. We suggest future research to advance understanding of IT identity’s antecedents and consequences, and discuss practical implications for managing SNS use in workplace and academic settings. Journal: European Journal of Information Systems Pages: 600-621 Issue: 5 Volume: 27 Year: 2018 Month: 9 X-DOI: 10.1080/0960085X.2018.1457194 File-URL: http://hdl.handle.net/10.1080/0960085X.2018.1457194 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:27:y:2018:i:5:p:600-621 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933892_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Tamara Dinev Author-X-Name-First: Tamara Author-X-Name-Last: Dinev Author-Name: Massimo Bellotto Author-X-Name-First: Massimo Author-X-Name-Last: Bellotto Author-Name: Paul Hart Author-X-Name-First: Paul Author-X-Name-Last: Hart Author-Name: Vincenzo Russo Author-X-Name-First: Vincenzo Author-X-Name-Last: Russo Author-Name: Ilaria Serra Author-X-Name-First: Ilaria Author-X-Name-Last: Serra Author-Name: Christian Colautti Author-X-Name-First: Christian Author-X-Name-Last: Colautti Title: Privacy calculus model in e-commerce – a study of Italy and the United States Abstract: This study examines cross-cultural differences beliefs related to e-commerce use for Italy and the United States. We argue that for both cultures, the user's decision to make an online purchase is simultaneously influenced by a set of contrary factors. These include decision facilitators such as propensity to trust and institutional trust, and decision inhibitors such as perceived risk and privacy concerns. We argue that substantial cultural differences exist that affect the above factors and the relationships among them. We use Hofstede's cultural theory and Fukuyama's theory of trust and social capital, along with emic factors important for the Italian society, to develop the study's propositions. The hypotheses were empirically tested using LISREL structural equation modeling and multigroup analysis. The results revealed that the Italian society exhibited lower propensity to trust, institutional trust, privacy concerns, and higher perceived risk. The relationships between institutional trust and e-commerce use, privacy concerns and e-commerce use, and perceived risk and institutional trust are all weaker for Italy. The relationship between perceived risk and privacy concerns is stronger for Italy. The paper's major contribution is in validating an important model of e-commerce use across two cultures and showing the moderating effects of culture. Journal: European Journal of Information Systems Pages: 389-402 Issue: 4 Volume: 15 Year: 2006 Month: 8 X-DOI: 10.1057/palgrave.ejis.3000590 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000590 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:4:p:389-402 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933893_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Robert Willison Author-X-Name-First: Robert Author-X-Name-Last: Willison Author-Name: James Backhouse Author-X-Name-First: James Author-X-Name-Last: Backhouse Title: Opportunities for computer crime: considering systems risk from a criminological perspective Abstract: Systems risk refers to the likelihood that an Information System (IS) is inadequately protected against certain types of damage or loss. While risks are posed by acts of God, hackers and viruses, consideration should also be given to the ‘insider’ threat of dishonest employees, intent on undertaking some form of computer crime. Against this backdrop, a number of researchers have addressed the extent to which security managers are cognizant of the very nature of systems risk. In particular, they note how security practitioners' knowledge of local threats, which form part of such risk, is often fragmented. This shortcoming contributes to situations where risk reducing efforts are often less than effective. Security efforts are further complicated given that the task of managing systems risk requires input from a number of departments including, for example, HR, compliance, IS/IT and physical security. To complement existing research, and also to offer a fresh perspective, this paper addresses systems risk from the offender's perspective. If systems risk entails the likelihood that an IS is inadequately protected, this text considers those conditions, within the organisational context, which offer a criminal opportunity for the offender. To achieve this goal a model known as the ‘Crime-Specific Opportunity Structure’ is advanced. Focusing on the opportunities for computer crime, the model addresses the nature of such opportunities with regards to the organisational context and the threats posed by rogue employees. Drawing on a number of criminological theories, it is believed the model may help inform managers about local threats and, by so doing, enhance safeguard implementation. Journal: European Journal of Information Systems Pages: 403-414 Issue: 4 Volume: 15 Year: 2006 Month: 8 X-DOI: 10.1057/palgrave.ejis.3000592 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000592 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:4:p:403-414 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933894_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Claudia Loebbecke Author-X-Name-First: Claudia Author-X-Name-Last: Loebbecke Author-Name: Claudio Huyskens Author-X-Name-First: Claudio Author-X-Name-Last: Huyskens Title: What drives netsourcing decisions? An empirical analysis Abstract: Netsourcing, a rather innovative form of web-enabled value creation, describes outsourcing of selected software applications to external service providers via the Internet. It promises flexibility and cost advantages over operating software applications in-house. However, it also raises the question which software applications corporate users should netsource and which they should keep in-house. To answer these questions, we develop a research framework with seven independent variables derived from the literature on full information technology outsourcing. On data collected in a 2004 survey among the 500 largest German companies, we apply a logistic regression analysis. As a result, we find significant statistical support for strategic management variables and no support for transaction cost economics variables as being relevant to the netsourcing decision. We conclude the paper with some lessons learned and suggestions for further research. Journal: European Journal of Information Systems Pages: 415-423 Issue: 4 Volume: 15 Year: 2006 Month: 8 X-DOI: 10.1057/palgrave.ejis.3000621 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000621 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:4:p:415-423 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933895_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Alemayehu Molla Author-X-Name-First: Alemayehu Author-X-Name-Last: Molla Author-Name: Richard Heeks Author-X-Name-First: Richard Author-X-Name-Last: Heeks Author-Name: Isaac Balcells Author-X-Name-First: Isaac Author-X-Name-Last: Balcells Title: Adding clicks to bricks: a case study of e-commerce adoption by a Catalan small retailer Abstract: This paper explores why and how one small business adopted e-commerce. Understanding the importance of a chronological perspective, the paper first develops a conceptual model that explicitly incorporates both different stages of e-commerce functionality and the different phases of the e-commerce adoption process. It relates these to a set of adoption factors classified into contextual, organisational, managerial, and e-commerce-specific categories. The paper explores and illustrates the model with the case history of a wine retailing microenterprise based in Catalonia, Spain that ultimately failed. The presented model is found to provide a workable basis for analysis, and the findings demonstrate the way in which different factors affect different phases of the adoption process. More generally, it finds expected contextual factors such as competitors or customers to have little impact on adoption, which is affected more by informal processes and social relations. The paper ends by questioning the simplicity of progressive e-commerce models that fail to incorporate abandonment of the technology, and fail to account for the lack of business value that some e-commerce projects deliver. The case's chronological approach also identifies the path-dependent manner in which earlier decisions impact later e-commerce trajectories, with short-term, subjective decisions potentially constraining e-commerce in the longer term. Journal: European Journal of Information Systems Pages: 424-438 Issue: 4 Volume: 15 Year: 2006 Month: 8 X-DOI: 10.1057/palgrave.ejis.3000623 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000623 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:4:p:424-438 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933896_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Steve Smith Author-X-Name-First: Steve Author-X-Name-Last: Smith Title: Offshoring Information Technology Journal: European Journal of Information Systems Pages: 439-439 Issue: 4 Volume: 15 Year: 2006 Month: 8 X-DOI: 10.1057/palgrave.ejis.3000624 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000624 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:4:p:439-439 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933897_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Nancy Pouloudi Author-X-Name-First: Nancy Author-X-Name-Last: Pouloudi Author-Name: Bob O'Keefe Author-X-Name-First: Bob Author-X-Name-Last: O'Keefe Title: Organizational and ethical issues in the information society Journal: European Journal of Information Systems Pages: 343-344 Issue: 4 Volume: 15 Year: 2006 Month: 8 X-DOI: 10.1057/palgrave.ejis.3000628 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000628 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:4:p:343-344 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933898_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Elaine H Ferneley Author-X-Name-First: Elaine H Author-X-Name-Last: Ferneley Author-Name: Polly Sobreperez Author-X-Name-First: Polly Author-X-Name-Last: Sobreperez Title: Resist, comply or workaround? An examination of different facets of user engagement with information systems Abstract: This paper provides a summary of studies of user resistance to information technology and identifies workaround activity as an understudied and distinct, but related, phenomenon. Previous categorisations of resistance have largely failed to address the relationships between the motivations for divergences from procedure and the associated workaround activity. This paper develops a composite model of resistance/workaround derived from two case study sites. We find four key antecedent conditions derived from both positive and negative resistance rationales and identify associations and links to various resultant workaround behaviours, providing supporting chains of evidence from the two case studies. Journal: European Journal of Information Systems Pages: 345-356 Issue: 4 Volume: 15 Year: 2006 Month: 8 X-DOI: 10.1057/palgrave.ejis.3000629 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000629 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:4:p:345-356 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933899_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Gee-Woo Bock Author-X-Name-First: Gee-Woo Author-X-Name-Last: Bock Author-Name: Atreyi Kankanhalli Author-X-Name-First: Atreyi Author-X-Name-Last: Kankanhalli Author-Name: Sanjeev Sharma Author-X-Name-First: Sanjeev Author-X-Name-Last: Sharma Title: Are norms enough? The role of collaborative norms in promoting organizational knowledge seeking Abstract: Knowledge sharing, which is critical for the strategic utilization of knowledge resources for the benefit of an organization, can only take place when both knowledge contribution and knowledge seeking exist. However, most previous research has focused on only one side of this process – knowledge contribution motivations. This is despite the fact that various barriers to knowledge seeking and reuse exist, such as the effort required to seek relevant knowledge and the cost of future obligation. In overcoming such barriers, norms related to collaboration are considered to be important. However, little is known of how these norms operate in conjunction with other antecedents to influence individuals' knowledge seeking behavior. Addressing the knowledge gap, this study explores how collaborative norms in an organization impact knowledge seeking with regard to a common knowledge management system type – the electronic knowledge repository (EKR). For this purpose, we have developed a model and tested it through a survey of EKR users in knowledge-intensive organizations. Our results indicate that collaborative norms positively impact individuals' knowledge seeking behavior through EKRs, both directly and through reducing the negative effect of future obligation on seeking. However, collaborative norms could also undermine the positive impact of perceived usefulness on knowledge seeking behavior. We identify other antecedents of knowledge seeking such as knowledge growth, resource-facilitating conditions, and self-efficacy. Implications for research and knowledge sharing practice are discussed. Journal: European Journal of Information Systems Pages: 357-367 Issue: 4 Volume: 15 Year: 2006 Month: 8 X-DOI: 10.1057/palgrave.ejis.3000630 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000630 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:4:p:357-367 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933900_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Alison Adam Author-X-Name-First: Alison Author-X-Name-Last: Adam Author-Name: Marie Griffiths Author-X-Name-First: Marie Author-X-Name-Last: Griffiths Author-Name: Claire Keogh Author-X-Name-First: Claire Author-X-Name-Last: Keogh Author-Name: Karenza Moore Author-X-Name-First: Karenza Author-X-Name-Last: Moore Author-Name: Helen Richardson Author-X-Name-First: Helen Author-X-Name-Last: Richardson Author-Name: Angela Tattersall Author-X-Name-First: Angela Author-X-Name-Last: Tattersall Title: Being an ‘it’ in IT: gendered identities in IT work Abstract: This paper reflects on aspects of gender and IT work. The core hypothesis is that, if technical skill and masculinity are fundamentally related, then women working in IT jobs who are, in effect, challenging masculine skills by gaining them themselves, must develop a number of strategies to cope with the challenge that they feel is being made to their own gender identities and those of the men with whom they work. One strategy is for women to distance themselves from IT work; a second strategy is for women to distance themselves from their identities as women. Our results are drawn from a set of semi-structured interviews. We adopt the approach of critical research that seeks to expose asymmetric power relations in the organization and to let silenced voices be heard. This is related to the literature on silence in organizations. Within the critical approach, we chose a feminist methodology that looks towards identifying practices that are problematic for women and that acknowledges our biases and interests as researchers. Additionally, we draw upon the theoretical constructs of the gender and technology literature to theorize the relationship between gender and technical skill and how this impacts conceptions of gender identity. Journal: European Journal of Information Systems Pages: 368-378 Issue: 4 Volume: 15 Year: 2006 Month: 8 X-DOI: 10.1057/palgrave.ejis.3000631 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000631 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:4:p:368-378 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933901_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Anita Greenhill Author-X-Name-First: Anita Author-X-Name-Last: Greenhill Author-Name: Melanie Wilson Author-X-Name-First: Melanie Author-X-Name-Last: Wilson Title: Haven or hell? Telework, flexibility and family in the e-society: a Marxist analysis Abstract: The reconfiguration of the home-work boundary that at-home telework entails has significant implications for gender issues and the use of ubiquitous information and communications technologies (ICTs). By presenting a Marx-inspired dialectical analysis of the family and home as both ‘haven and hell’, we develop a critique of proposed advantages for women home workers. Not only do we question the ability of ICTs to deliver the promises made on their behalf – we show how this socio-technical innovation may in fact contribute to compounding the double-burden of work associated with gender roles within the home. Contemporary critical understanding of the e-society should incorporate the influence of at-home teleworking because of its implications for the use of ubiquitous ICTs in the home environment, the shaping of work relations and its impact on gender issues. This increasing use of ICTs outside of the workplace is matched by the growing consensus within the European Union on the desirability of flexible working coupled with family friendly policies. This paper explores some of the rhetoric and research surrounding the proposed benefits of at home ‘telework’ and the likely cost–benefits, from an employee's perspective, in terms of increased freedom, reduced burden and ‘flexibility’. Journal: European Journal of Information Systems Pages: 379-388 Issue: 4 Volume: 15 Year: 2006 Month: 8 X-DOI: 10.1057/palgrave.ejis.3000632 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000632 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:15:y:2006:i:4:p:379-388 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933706_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: R Pagano Author-X-Name-First: R Author-X-Name-Last: Pagano Title: Knowledge Management and Business Model Innovation Journal: European Journal of Information Systems Pages: 296-297 Issue: 4 Volume: 11 Year: 2002 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000414 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000414 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:11:y:2002:i:4:p:296-297 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933707_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Hugh Preston Author-X-Name-First: Hugh Author-X-Name-Last: Preston Title: Information Systems and Global Diversity Journal: European Journal of Information Systems Pages: 298-298 Issue: 4 Volume: 11 Year: 2002 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000426 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000426 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:11:y:2002:i:4:p:298-298 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933708_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: P B Cragg Author-X-Name-First: P B Author-X-Name-Last: Cragg Title: Benchmarking information technology practices in small firms Abstract: Much attention has focused recently on benchmarking, a practice by which firms learn from other firms to help improve their own business processes. Numerous benchmarking tools exist for small firms and they typically cover a range of activities, including strategic leadership, quality, and performance. However, most pay no or little attention to IT. Thus, this study aimed to identify IT practices in small firms that could be included in benchmarking tools. The study commenced with a review of existing literature to identify major areas of IT management relevant to small firms. This literature guided multiple-case study research of four engineering firms to identify IT practices. A second phase of the study evaluated evidence from 30 small engineering firms with between 20 and 100 employees. Six practices differentiated IT leaders from IT laggards. Three practices reflected senior management involvement and the other three reflected technological capability. Journal: European Journal of Information Systems Pages: 267-282 Issue: 4 Volume: 11 Year: 2002 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000430 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000430 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:11:y:2002:i:4:p:267-282 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933709_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: K Mcgrath Author-X-Name-First: K Author-X-Name-Last: Mcgrath Title: The Golden Circle: a way of arguing and acting about technology in the London Ambulance Service Abstract: This paper analyses the way in which the London Ambulance Service recovered from the events of October 1992, when it implemented a computer-aided despatch system (LASCAD) that remained in service for less than 2 weeks. It examines the enactment of a programme of long-term organizational change, focusing on the implementation of an alternative computer system in 1996. The analysis in this paper is informed by actor-network theory, both by an early statement of this approach developed by Callon in the sociology of translation, and also by concepts and ideas from Latour's more recent restatement of his own position. The paper examines how alternative interests emerged and were stabilized over time, in a way of arguing and acting among key players in the change programme, christened the Golden Circle. The story traces 4 years in the history of the London Ambulance Service, from the aftermath of October 1992 through the birth of the Golden Circle to the achievement of National Health Service (NHS) trust status. LASCAD was the beginning of the story, this is the middle, an end lies in the future, when the remaining elements of the change programme are enacted beyond the Golden Circle. Journal: European Journal of Information Systems Pages: 251-266 Issue: 4 Volume: 11 Year: 2002 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000436 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000436 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:11:y:2002:i:4:p:251-266 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933710_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: M Wilson Author-X-Name-First: M Author-X-Name-Last: Wilson Author-Name: D Howcroft Author-X-Name-First: D Author-X-Name-Last: Howcroft Title: Re-conceptualising failure: social shaping meets IS research Abstract: The aim of this paper is to illustrate the interplay of the social studies of technology (SST) approach with IS research to further our conceptualisation of failure. It is intended that this cross-fertilisation of disciplinary backgrounds will produce a critique of traditional conceptions of information technology and help to further our understanding of the IS development, implementation and use process. We begin by providing a commentary on the IS failure literature, highlighting the variety of descriptions and noting the lack of consensus regarding how success/failure is constituted. We then go on to delineate the contribution of the SST approach to enlightening our study of failure, since it has as its core concern an understanding of the dynamics of the society–technology relationship. This approach is applied to a case study where the intention is to demonstrate the moving line between success and failure among different groups as well as over different periods of time. The study shows how the success/failure factors can be equally applied to construct an account as and when required, depending upon how legitimacy is ascribed to different ‘voices’. The SST themes are then revisited to enable a deconstruction of the stages that were undertaken before failure was finally declared. Finally, conclusions are drawn on the contribution of SST for aiding our understanding of how failures occur within their social and organisational context. Journal: European Journal of Information Systems Pages: 236-250 Issue: 4 Volume: 11 Year: 2002 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000437 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000437 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:11:y:2002:i:4:p:236-250 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933711_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: S A Brown Author-X-Name-First: S A Author-X-Name-Last: Brown Author-Name: A P Massey Author-X-Name-First: A P Author-X-Name-Last: Massey Author-Name: M M Montoya-weiss Author-X-Name-First: M M Author-X-Name-Last: Montoya-weiss Author-Name: J R Burkman Author-X-Name-First: J R Author-X-Name-Last: Burkman Title: Do I really have to? User acceptance of mandated technology Abstract: Extensive research supports the notion that usefulness and ease of use are primary drivers of user intentions to adopt new technology. However, this research has been conducted primarily in environments in which adoption was voluntary. When technology use is mandated, as it is in many organizations, we expect that the underlying relationships of traditional technology acceptance models will be different. In this paper, we discuss our current understanding of technology acceptance, as well as the notion of mandated use. We then discuss a field study conducted in the banking industry to examine technology acceptance models in a mandated use environment. The results indicate that there are, in fact, differences in the underlying relationships of technology acceptance models in this mandatory use situation. The paper concludes with a discussion of the implications for research and practice. Journal: European Journal of Information Systems Pages: 283-295 Issue: 4 Volume: 11 Year: 2002 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000438 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000438 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:11:y:2002:i:4:p:283-295 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933712_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bob O'keefe Author-X-Name-First: Bob Author-X-Name-Last: O'keefe Author-Name: Ray Paul Author-X-Name-First: Ray Author-X-Name-Last: Paul Title: Editorial Journal: European Journal of Information Systems Pages: 235-235 Issue: 4 Volume: 11 Year: 2002 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000441 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000441 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:11:y:2002:i:4:p:235-235 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934128_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Aura Reggiani Author-X-Name-First: Aura Author-X-Name-Last: Reggiani Author-Name: Peter Nijkamp Author-X-Name-First: Peter Author-X-Name-Last: Nijkamp Author-Name: Alessandro Cento Author-X-Name-First: Alessandro Author-X-Name-Last: Cento Title: Connectivity and concentration in airline networks: a complexity analysis of Lufthansa's network Abstract: Information, communication and transport networks have always been in a state of flux, while they also influence each other. Extensive research efforts have been made to investigate the dynamics in the structure and use of networks, for example, by means of network geometries, Small-World effects and Scale-Free phenomena. We will illustrate these new developments on the basis of airline network evolution. Using Lufthansa's networks as an example, this paper aims to show the empirical relevance of various network indicators – such as connectivity and concentration – for understanding changing patterns in airline network configurations. After an extensive discussion of various statistical results, a decision-aid method, viz. multi-criteria analysis, is used to investigate the robustness of our findings. The results highlight the actual strategic choices made by Lufthansa for its own network, as well in combination with its partners in Star Alliance. Journal: European Journal of Information Systems Pages: 449-461 Issue: 4 Volume: 19 Year: 2010 Month: 8 X-DOI: 10.1057/ejis.2010.11 File-URL: http://hdl.handle.net/10.1057/ejis.2010.11 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:4:p:449-461 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934129_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Philip O'Reilly Author-X-Name-First: Philip Author-X-Name-Last: O'Reilly Author-Name: Patrick Finnegan Author-X-Name-First: Patrick Author-X-Name-Last: Finnegan Title: Intermediaries in inter-organisational networks: building a theory of electronic marketplace performance Abstract: Intermediaries such as e-Bay and Amazon arise when market system knowledge is dispersed amongst participants (e.g. buyers and suppliers), and generate revenue by providing value-added services to participants in addition to creating and managing the digital infrastructure. Consequently, such intermediaries (which we call electronic marketplaces) play a vital role in facilitating exchanges in networks characterised by disparate knowledge and are essential network orchestrators in peer-to-peer markets and intellectual property exchanges. However, there is a high failure rate associated with electronic marketplaces leading to questions as to the long-term sustainability of emerging inter-organisational networks characterised by dispersed knowledge. This paper draws on research in a number of disciplines as well as a study of eight electronic marketplaces to build a theory of electronic marketplace performance. In doing so, we identify key performance measures for electronic marketplaces as well as the strategic, structural and contextual factors that impact performance. We identify how these factors can be observed, and illustrate how the fit between strategic and contextual factors affects performance. We present our theory as hypotheses and provide the empirical indicators for the constituent constructs. Journal: European Journal of Information Systems Pages: 462-480 Issue: 4 Volume: 19 Year: 2010 Month: 8 X-DOI: 10.1057/ejis.2010.12 File-URL: http://hdl.handle.net/10.1057/ejis.2010.12 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:4:p:462-480 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934130_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Javier Busquets Author-X-Name-First: Javier Author-X-Name-Last: Busquets Title: Orchestrating Smart Business Network dynamics for innovation Abstract: This paper proposes the concept of Orchestrating Smart Business Networks (SBN) as a managerial function that shapes structural dynamics for innovation. On the basis of commitment, as one way to exert power, and dynamic capacities, the suggested managerial function can develop a path of efficiency towards innovation by managing the SBN's structural dynamics, the network boundaries and digital platforms. The network's centripetal and centrifugal forces are used as the units of analysis, and this managerial function is then tested with empirical results obtained from a case study. Journal: European Journal of Information Systems Pages: 481-493 Issue: 4 Volume: 19 Year: 2010 Month: 8 X-DOI: 10.1057/ejis.2010.19 File-URL: http://hdl.handle.net/10.1057/ejis.2010.19 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:4:p:481-493 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934131_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: John Collins Author-X-Name-First: John Author-X-Name-Last: Collins Author-Name: Wolfgang Ketter Author-X-Name-First: Wolfgang Author-X-Name-Last: Ketter Author-Name: Maria Gini Author-X-Name-First: Maria Author-X-Name-Last: Gini Title: Flexible decision support in dynamic inter-organisational networks Abstract: An effective Decision Support System (DSS) should help its users improve decision making in complex, information-rich environments. We present a feature gap analysis that shows that current decision support technologies lack important qualities for a new generation of agile business models that require easy, temporary integration across organisational boundaries. We enumerate these qualities as DSS Desiderata, properties that can contribute both effectiveness and flexibility to users in such environments. To address this gap, we describe a new design approach that enables users to compose decision behaviours from separate, configurable components, and allows dynamic construction of analysis and modelling tools from small, single-purpose evaluator services. The result is what we call an ‘evaluator service network’ that can easily be configured to test hypotheses and analyse the impact of various choices for elements of decision processes. We have implemented and tested this design in an interactive version of the MinneTAC trading agent, an agent designed for the Trading Agent Competition for Supply Chain Management. Journal: European Journal of Information Systems Pages: 436-448 Issue: 4 Volume: 19 Year: 2010 Month: 8 X-DOI: 10.1057/ejis.2010.24 File-URL: http://hdl.handle.net/10.1057/ejis.2010.24 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:4:p:436-448 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934132_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: William J Kettinger Author-X-Name-First: William J Author-X-Name-Last: Kettinger Author-Name: Yuan Li Author-X-Name-First: Yuan Author-X-Name-Last: Li Title: The infological equation extended: towards conceptual clarity in the relationship between data, information and knowledge Abstract: Clearly defined relationships between core concepts in our field are the bedrock for building a cumulative tradition. No concepts or relationships could be more core to the Information System (IS) field than: data, information, and knowledge. Even though several models have been developed to depict the relationship between these core concepts, none provides a completely satisfying solution to resolve problems in understanding information processing and in guiding IS research and practice. In response to the limitations in existing models, a knowledge-based theory of information is extended from Langefors’ (1973) infological equation, suggesting that information is the joint function of data and knowledge. Specifically, the proposed theory describes data as the measurement or description of states, whereas knowledge outlines the relationship between concepts underlying those states. Information, representing a status of conditional readiness for an action, is generated from the interaction between the states measured in data and their relationship with future states predicted in knowledge. Following this logic, different forms of IS are conceptualized as the embodiments of knowledge domains capable of transforming specific categories of data into information for business operations and decision-making. The proposed model helps address controversies in previous studies and provides guidance for further research. Journal: European Journal of Information Systems Pages: 409-421 Issue: 4 Volume: 19 Year: 2010 Month: 8 X-DOI: 10.1057/ejis.2010.25 File-URL: http://hdl.handle.net/10.1057/ejis.2010.25 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:4:p:409-421 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934133_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mark John Somers Author-X-Name-First: Mark John Author-X-Name-Last: Somers Title: Using the theory of the professions to understand the IS identity crisis Abstract: Academic information systems (IS) is struggling with an identity crisis that is grounded in limited consensus about the discipline's core concepts, its important research questions and its boundaries. The result is a pluralistic discipline that has triggered an ongoing debate about whether the ‘liquidity’ characteristic of IS is a natural consequence of rapidly changing technologies or if it is indicative of a chaotic state that is unsustainable. This paper looks at IS through a new and different lens by using the theory of the professions to gain insight into current and heretofore unidentified problems facing the discipline. Casting IS as a profession presents an integrated view of academic IS, IS practice and IS education grounded in a framework that explores connections among these three elements. The paper concludes with a discussion of the processes by which professions evolve and likely consequences for IS research, practice and education. Journal: European Journal of Information Systems Pages: 382-388 Issue: 4 Volume: 19 Year: 2010 Month: 8 X-DOI: 10.1057/ejis.2010.26 File-URL: http://hdl.handle.net/10.1057/ejis.2010.26 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:4:p:382-388 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934134_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Diederik W van Liere Author-X-Name-First: Diederik W Author-X-Name-Last: van Liere Author-Name: Peter H M Vervest Author-X-Name-First: Peter H M Author-X-Name-Last: Vervest Author-Name: Benn Konsynski Author-X-Name-First: Benn Author-X-Name-Last: Konsynski Author-Name: Chris Holland Author-X-Name-First: Chris Author-X-Name-Last: Holland Title: Theme of the Special Issue – IS in interorganizational networks Journal: European Journal of Information Systems Pages: 432-435 Issue: 4 Volume: 19 Year: 2010 Month: 8 X-DOI: 10.1057/ejis.2010.29 File-URL: http://hdl.handle.net/10.1057/ejis.2010.29 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:4:p:432-435 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934135_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: David Wastell Author-X-Name-First: David Author-X-Name-Last: Wastell Title: Managing as designing: ‘opportunity knocks’ for the IS field? Abstract: In response to anxieties about our discipline's decline, this opinion piece ‘looks to the future’, arguing a strong prospectus for the IS field, based on its direct relevance to general management practice. The thesis set out is inspired by the recent upsurge in interest in ‘managing as designing’. Reformulating management as design, I argue that we have a formidable knowledge-base of tools, theories and critique relevant to any manager, not just the MIS-inclined specialist. A case study of yet another failed information system (in U.K. children's services) is presented to show just how uniquely relevant our discipline is, in the workplace of today. Other pertinent issues are explored, such as synergies with the growing vogue for evidence-based management. The paper concludes by considering implications for research, including the need for a less exclusive approach to publishing and dissemination emphasising the need to make our work more accessible to lay practitioners. Journal: European Journal of Information Systems Pages: 422-431 Issue: 4 Volume: 19 Year: 2010 Month: 8 X-DOI: 10.1057/ejis.2010.31 File-URL: http://hdl.handle.net/10.1057/ejis.2010.31 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:4:p:422-431 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934136_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Paul Beynon-Davies Author-X-Name-First: Paul Author-X-Name-Last: Beynon-Davies Title: The enactment of significance: a unified conception of information, systems and technology Abstract: This paper introduces a new perspective that helps unpack the relationship between information, systems and technology within the nature of human organisation. We argue for an area of interest located at the intersection of signs and systems, which involves the enactment of forma, informa and performa. To demonstrate the utility of this perspective, we deliberately consider a ‘strange’ case from a different time, space and culture. We discuss the nature of human organisation among the Inka Empire and how this organisation was reliant upon the enactment of significance, particularly in relation to an artefact known as the khipu. We conclude with a discussion of the value of our framework in helping us understand the complex entanglement of information, systems and technology within human organisation. Journal: European Journal of Information Systems Pages: 389-408 Issue: 4 Volume: 19 Year: 2010 Month: 8 X-DOI: 10.1057/ejis.2010.34 File-URL: http://hdl.handle.net/10.1057/ejis.2010.34 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:4:p:389-408 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934137_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ray J Paul Author-X-Name-First: Ray J Author-X-Name-Last: Paul Title: Loose Change Journal: European Journal of Information Systems Pages: 379-381 Issue: 4 Volume: 19 Year: 2010 Month: 8 X-DOI: 10.1057/ejis.2010.40 File-URL: http://hdl.handle.net/10.1057/ejis.2010.40 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:19:y:2010:i:4:p:379-381 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933925_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Angel L Meroño-Cerdan Author-X-Name-First: Angel L Author-X-Name-Last: Meroño-Cerdan Author-Name: Pedro Soto-Acosta Author-X-Name-First: Pedro Author-X-Name-Last: Soto-Acosta Title: External Web content and its influence on organizational performance Abstract: Research into the Internet has experienced a tremendous growth within the field of information systems. In this sense, the recent literature focuses on more complex research topics. However, there is a need to further investigate into the more basic and primary use of Internet, the external Web site to interact with stakeholders. By external, we mean publicly accessible contents. This paper develops a framework that allows evaluation of external Web content of business Web sites and examines the influence on firm performance. Here, external Web content is studied according to three Web orientations: e-information, e-communication, and e-transaction. In addition, differences in external Web content are analysed according to two contingency factors: business size and business industry. To achieve these goals, a sample comprising 288 Spanish SMEs firms was employed. The results show a positive relationship between external Web content and firm performance. Furthermore, this research indicates the existence of complementarities among the Web orientations. Thus, existing e-information was found as critical for enabling e-transaction to impact upon firm performance. Additionally, e-information and e-communication (jointly considered) were found to mutually reinforce the impact of e-transaction on firm performance. The results also confirm that external Web content is not related to business size and differs slightly by business industry. Journal: European Journal of Information Systems Pages: 66-80 Issue: 1 Volume: 16 Year: 2007 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000656 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000656 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:1:p:66-80 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933926_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Troy J Strader Author-X-Name-First: Troy J Author-X-Name-Last: Strader Author-Name: Sridhar N Ramaswami Author-X-Name-First: Sridhar N Author-X-Name-Last: Ramaswami Author-Name: Philip A Houle Author-X-Name-First: Philip A Author-X-Name-Last: Houle Title: Perceived network externalities and communication technology acceptance Abstract: Electronic mail (e-mail) and instant messaging (IM) systems represent two communication technologies that are potentially substitutable. A unique feature of e-mail and IM is that their value to an individual user increases as the number of other people adopting the system grows. This is referred to as a positive network externality. This externality makes it difficult for consumers to switch to other systems because of the potential loss of connectivity with network members. Further, as this externality grows, it has unintended negative consequences in the form of spim and spam. Including these three network externality effects – positive, cross-impact, and negative – the present study investigates the determinants of electronic communication system use based on an extended Technology Acceptance Model. The study findings suggest that user perceptions regarding network externalities have a positive impact on use of electronic communication systems while perceptions of problems associated with unsolicited messages and perceived usefulness of alternative systems do not significantly affect system use. This study contributes to our understanding of the factors that affect use of existing and newer alternative communication technologies. Journal: European Journal of Information Systems Pages: 54-65 Issue: 1 Volume: 16 Year: 2007 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000657 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000657 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:1:p:54-65 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933927_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Scott McCoy Author-X-Name-First: Scott Author-X-Name-Last: McCoy Author-Name: Dennis F Galletta Author-X-Name-First: Dennis F Author-X-Name-Last: Galletta Author-Name: William R King Author-X-Name-First: William R Author-X-Name-Last: King Title: Applying TAM across cultures: the need for caution Abstract: The technology acceptance model (TAM) is one of the most widely used behavioural models in the information systems (IS) field. Researchers have used the model to study many different IS adoption situations and contexts, and it usually demonstrates validity and reliability. Although TAM was developed in the U.S., the TAM model has also been used in other countries. Transferring a model to another cultural context should be subjected to rigorous testing, and a few studies have begun to examine the applicability of TAM in a small variety of cultures. This study contributes to the growing multi-cultural examination of TAM, and demonstrates that although the model has been successful in predicting adoption behaviours in some international settings, it might not hold in all cultures. Almost 4000 students from several universities around the world provided the data for the study. Data analysis revealed that the TAM model does not hold for certain cultural orientations. Most significantly, low Uncertainty Avoidance, high Masculinity, high-Power Distance, and high Collectivism seem to nullify the effects of Perceived Ease of Use and/or Perceived Usefulness. Since TAM has been shown to be widely applicable to various technological innovations, it is likely to continue to be applied broadly and globally. However, the results of this study suggest the need for caution in applying TAM in at least 20 countries. Journal: European Journal of Information Systems Pages: 81-90 Issue: 1 Volume: 16 Year: 2007 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000659 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000659 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:1:p:81-90 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933928_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Vasiliki Mantzana Author-X-Name-First: Vasiliki Author-X-Name-Last: Mantzana Author-Name: Marinos Themistocleous Author-X-Name-First: Marinos Author-X-Name-Last: Themistocleous Author-Name: Zahir Irani Author-X-Name-First: Zahir Author-X-Name-Last: Irani Author-Name: Vincenzo Morabito Author-X-Name-First: Vincenzo Author-X-Name-Last: Morabito Title: Identifying healthcare actors involved in the adoption of information systems Abstract: The adoption of information systems in healthcare is no less significant than in any other commercial or caring organisation. The literature on IS adoption in healthcare, makes it clear that the actors involved in the adoption process are almost universally seen as crucial, which matches our research results too. However, how such actors should be identified remains a topic for investigatory work since these are early days in achieving this. We derive and propose a structured method to model how actors might be identified: structured because such a rationale is explicable and such a method is more readily usable when transferred to others. Our structured method, named IGOHcaps, uses a static and then a dynamic step to pull out the individual, group, organisational and human determinants of the critical actors. In this process, the individual actors' differing views emerge which could enable decision-making bodies to produce more robust proposals if they incorporated some of the appropriate views. We discuss the application of IGOHcaps through a hospital case study. While a single case study cannot be a proof, the engagement of the actors was encouraging. Journal: European Journal of Information Systems Pages: 91-102 Issue: 1 Volume: 16 Year: 2007 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000660 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000660 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:1:p:91-102 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933929_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Richard Vidgen Author-X-Name-First: Richard Author-X-Name-Last: Vidgen Author-Name: Stephan Henneberg Author-X-Name-First: Stephan Author-X-Name-Last: Henneberg Author-Name: Peter Naudé Author-X-Name-First: Peter Author-X-Name-Last: Naudé Title: What sort of community is the European Conference on Information Systems? A social network analysis 1993–2005 Abstract: This paper presents a social network analysis (SNA) of the European Conference on Information Systems (ECIS) community based on patterns of co-authorship. ECIS contributions are separated into research papers and panels to create social networks that are then analyzed using a range of global network level and individual ego (co-author, panellist) measures. The research community is found to have few properties of the ‘small world’ and to represent an agglomeration of co-authorships. The panels network has the properties of a ‘small world’ and displays a stronger sense of social cohesion. An analysis of individual actors (egos) provides insight into who is central to the ECIS community. Based on the SNA, a range of possible interventions are proposed that could aid the future development of the ECIS community. The paper concludes by considering the usefulness of SNA as a method to support IS research. Journal: European Journal of Information Systems Pages: 5-19 Issue: 1 Volume: 16 Year: 2007 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000661 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000661 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:1:p:5-19 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933930_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Robert D Galliers Author-X-Name-First: Robert D Author-X-Name-Last: Galliers Author-Name: Edgar A Whitley Author-X-Name-First: Edgar A Author-X-Name-Last: Whitley Title: Vive les differences? Developing a profile of European information systems research as a basis for international comparisons Abstract: The information systems (IS) community is truly international, yet there is often a sense that different elements of the community have different profiles in terms of their research and publication expectations. This paper contributes to this discussion by developing a profile of European IS research that can be used as a basis for international comparisons. It reflects on European research on IS as presented during the first 10 years of the European Conference on Information Systems (ECIS). Based on an analysis of all papers published in the ECIS proceedings during the period 1993–2002, the paper presents the key characteristics of the ECIS conferences, together with a profile of European IS research activity as presented at ECIS. In particular, it highlights the key references and sources used by researchers presenting papers at ECIS. It articulates the research areas presented at ECIS and explores the claim that European IS draws more on social theories than elsewhere. Its contribution in presenting a profile of European research in the IS field lies in identifying particular characteristics of the European style of research that can be compared to that undertaken in other parts of the world. Journal: European Journal of Information Systems Pages: 20-35 Issue: 1 Volume: 16 Year: 2007 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000662 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000662 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:1:p:20-35 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933931_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Michael J Gallivan Author-X-Name-First: Michael J Author-X-Name-Last: Gallivan Author-Name: Raquel Benbunan-Fich Author-X-Name-First: Raquel Author-X-Name-Last: Benbunan-Fich Title: Analyzing IS research productivity: an inclusive approach to global IS scholarship Abstract: An increasing number of studies have appeared that evaluate and rank journal quality and the productivity of IS scholars and their institutions. In this paper, we describe the results of one recent study identifying the ‘Top 30’ IS Researchers, revealing many unexamined assumptions about which IS publication outlets should be included in any definition of high-quality, scholarly IS journals. Drawing from the argument that all categories and classification schemes are grounded in politics, we critique the process by which the recent study in question (and several earlier studies) have derived the set of journals from which they count researcher publications. Based on a critical examination of the widespread inclusion of practitioner outlets, and the consistent exclusion of European scholarly IS journals, we develop our own arguments for which journals should be included in such evaluations of researcher productivity. We conduct our own analysis of IS researcher productivity for the period 1999–2003, based on articles published in a geographically balanced set of 12 IS journals, and then we compare our results with those from the recent study in question and their predecessors. Our results feature a more diverse set of scholars – both in terms of location (specifically, the country and continent in which the researchers are employed) and gender. We urge future studies of IS research productivity to follow our practice of including high-quality European journals, while eschewing practitioner-oriented publications (such as Harvard Business Review and Communications of the ACM). We also advocate that such studies count only research contributions (e.g., research articles), and that other genres of non-research articles – such as book reviews, ‘issues and opinions’ pieces and editorial introductions – not be conflated with counts of research contributions. Journal: European Journal of Information Systems Pages: 36-53 Issue: 1 Volume: 16 Year: 2007 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000667 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000667 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:1:p:36-53 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933932_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ray J Paul Author-X-Name-First: Ray J Author-X-Name-Last: Paul Title: Change strikes back Journal: European Journal of Information Systems Pages: 1-2 Issue: 1 Volume: 16 Year: 2007 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000668 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000668 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:1:p:1-2 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933933_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Robert D Galliers Author-X-Name-First: Robert D Author-X-Name-Last: Galliers Author-Name: Edgar A Whitley Author-X-Name-First: Edgar A Author-X-Name-Last: Whitley Author-Name: Ray J Paul Author-X-Name-First: Ray J Author-X-Name-Last: Paul Title: The European Information Systems Academy Journal: European Journal of Information Systems Pages: 3-4 Issue: 1 Volume: 16 Year: 2007 Month: 2 X-DOI: 10.1057/palgrave.ejis.3000669 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000669 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:16:y:2007:i:1:p:3-4 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933760_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Robert P Marble Author-X-Name-First: Robert P Author-X-Name-Last: Marble Title: Technological switchbacks: the transition to Western information systems in privatised firms of the former East Germany Abstract: The work of this paper centres on a study of business organisations of the former German Democratic Republic (GDR), whose continued existence after the reunification of Germany was accomplished by management buyout (MBO), rather than through acquisition by Western firms. The goal was to investigate the circumstances surrounding the sudden and total upgrade of information technology and systems enabled (and necessitated) by the end of Eastern Block isolation from the West. The paper reports on 1992 contacts and site visits with four MBO privatised firms and 1999 follow-up contacts and site visits with the two surviving firms of that group. Analyses are presented, which draw on literature devoted to IT transitions and IS implementation. The notion of technological switchback is introduced to characterise the unique circumstances embodied by the situation under study. It involves a necessary and sudden advance in information technological capabilities, which comes at the expense of a significant and undesirable regression in information system effectiveness. Parallels are drawn to the plights of firms in other transitional economies and firms facing emerging ‘technological imperatives.’ Conclusions are elucidated, regarding effective short- and long-term adjustment to such situations. Journal: European Journal of Information Systems Pages: 115-132 Issue: 2 Volume: 13 Year: 2004 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000489 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000489 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:2:p:115-132 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933761_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Sebastián Bruque-Cámara Author-X-Name-First: Sebastián Author-X-Name-Last: Bruque-Cámara Author-Name: Alfonso Vargas-Sánchez Author-X-Name-First: Alfonso Author-X-Name-Last: Vargas-Sánchez Author-Name: M. Jesús Hernández-Ortiz Author-X-Name-First: M. Jesús Author-X-Name-Last: Hernández-Ortiz Title: Organizational determinants of IT adoption in the pharmaceutical distribution sector Abstract: The aim of this paper is to propose new organizational factors that might explain the differences in the extent and the speed of IT adoption. With this in mind, we carried out an analysis of 16 cases in the pharmaceutical distribution sector in Spain. The results indicate that there are certain intangible assets that favour the introduction and development of IT. Among these are a frank and fluid communication between departments and members of the organization, low levels of conflict, the explicit support of top management towards IT adoption and learning and creative skills of IT-staff. In addition to these factors, we found others that we propose as catalysts of IT adoption. Among these we might mention the special relationship between the member-clients and the company in the case of cooperative firms. Journal: European Journal of Information Systems Pages: 133-146 Issue: 2 Volume: 13 Year: 2004 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000490 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000490 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:2:p:133-146 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933762_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Nancy MacKay Author-X-Name-First: Nancy Author-X-Name-Last: MacKay Author-Name: Michael Parent Author-X-Name-First: Michael Author-X-Name-Last: Parent Author-Name: Andrew Gemino Author-X-Name-First: Andrew Author-X-Name-Last: Gemino Title: A model of electronic commerce adoption by small voluntary organizations Abstract: The study discussed in this paper uses case studies of six small voluntary organizations to determine the primary factors that influence electronic commerce (EC) adoption. The findings indicate that perceived benefits, including efficiency, information sharing, marketing and increased donations have a strong influence on EC adoption. The results also indicate that organizational readiness, including ability to attract volunteers and/or in-kind donations, ability to raise funds, and strategic readiness had a positive influence on EC adoption. Consistent with prior research on EC adoption in the commercial sector, strong support was found for the influence of perceived pressure, including pressure from both internal and external stakeholders. The study also concluded that perceived social risks associated with the loss of human contact and the perception of dollars being diverted from client programs to finance the EC investment had a strong influence on EC adoption. Implications for EC adoption and future research on EC adoption in the voluntary sector are discussed. Journal: European Journal of Information Systems Pages: 147-159 Issue: 2 Volume: 13 Year: 2004 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000491 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000491 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:2:p:147-159 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933763_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ian Alexander Author-X-Name-First: Ian Author-X-Name-Last: Alexander Title: The Business of Systems Integration Journal: European Journal of Information Systems Pages: 160-161 Issue: 2 Volume: 13 Year: 2004 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000492 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000492 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:2:p:160-161 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933764_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Adela Mlcakova Author-X-Name-First: Adela Author-X-Name-Last: Mlcakova Author-Name: Edgar A Whitley Author-X-Name-First: Edgar A Author-X-Name-Last: Whitley Title: Configuring peer-to-peer software: an empirical study of how users react to the regulatory features of software Abstract: The emergence of new digital media has led to new sources and locations of power, and as a result, a heated debate on the regulability of cyberspace. The myth that cyberspace is by its nature free and uncontrollable has been challenged by Lessig's New Chicago School of Regulation that argues that code, or the architecture of information technologies, will be an important regulatory modality. This paper examines the relationship between regulation, information technologies and human behaviour, by examining what happens whenever individual human beings configure technology for use, in this case, file-sharing peer-to-peer applications. The evidence from the research suggests that Lessig's view does not capture all the nuances of practice involved in the use of peer-to-peer applications. The paper ends with proposals for future study of the actual practices of the users of this technology that will improve our understanding of the relationship between technology and regulation. Journal: European Journal of Information Systems Pages: 95-102 Issue: 2 Volume: 13 Year: 2004 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000493 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000493 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:2:p:95-102 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933765_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jyoti Choudrie Author-X-Name-First: Jyoti Author-X-Name-Last: Choudrie Author-Name: Heejin Lee Author-X-Name-First: Heejin Author-X-Name-Last: Lee Title: Broadband development in South Korea: institutional and cultural factors Abstract: This paper is about the broadband development in South Korea (henceforth Korea). Korea is considered to be a world leader in this field. Based on various sources including a study trip to Seoul that took place in July 2002, the reasons for this success are offered in this paper. The purpose of the study trip was to investigate how Korea achieved such a relatively fast penetration rate in a time span of approximately 4 years. Using documentary secondary data such as, written documents published materials, and primary data, such as interviews, the paper explores and presents the factors contributing to this development. The factors covered include government leadership, fierce competition, low prices due to the competition, cultural aspects, and geographic and demographic aspects. Although some strategies and success factors are Korea specific, there are general lessons that can be drawn. Anyone considering the deployment of broadband and other future innovations will benefit from this investigation into the successful strategies undertaken in Korea. Journal: European Journal of Information Systems Pages: 103-114 Issue: 2 Volume: 13 Year: 2004 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000494 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000494 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:2:p:103-114 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933766_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ray J Paul, Author-X-Name-First: Ray J Author-X-Name-Last: Paul, Title: Time, experience and change Journal: European Journal of Information Systems Pages: 93-94 Issue: 2 Volume: 13 Year: 2004 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000495 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000495 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:2:p:93-94 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933767_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: David Avison Author-X-Name-First: David Author-X-Name-Last: Avison Title: Redesigning Human Systems Journal: European Journal of Information Systems Pages: 162-163 Issue: 2 Volume: 13 Year: 2004 Month: 6 X-DOI: 10.1057/palgrave.ejis.3000496 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000496 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:13:y:2004:i:2:p:162-163 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934001_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Juhani Iivari Author-X-Name-First: Juhani Author-X-Name-Last: Iivari Title: Expert evaluation vs bibliometric evaluation: experiences from Finland Abstract: Research assessment can be based either on expert evaluation or bibliometric evaluation. This opinion paper evaluates pros and cons of these two approaches, concluding that they are complementary approaches. Therefore, they should be properly combined and synchronized to form an informative and cost-effective research assessment framework. Journal: European Journal of Information Systems Pages: 169-173 Issue: 2 Volume: 17 Year: 2008 Month: 4 X-DOI: 10.1057/ejis.2008.10 File-URL: http://hdl.handle.net/10.1057/ejis.2008.10 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:2:p:169-173 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934002_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Philip Powell Author-X-Name-First: Philip Author-X-Name-Last: Powell Author-Name: Maria Woerndl Author-X-Name-First: Maria Author-X-Name-Last: Woerndl Title: Time to stop researching the important things? Abstract: From 2010 government funding for UK research will be based partly on metrics. One of the key metrics will be citations, with research income and postgraduate student numbers also assessed. While citation metrics seem sensible, there is a serious issue of what topics one researches, the methods used and the way in which a move to the use of citations will induce a change in research behaviour – especially a move to the dull middle ground. This paper investigates the potential impact of such a move on niche areas of IS research – here research on small- and medium-sized enterprises. However, the arguments hold for any new, emerging, or non-mainstream research area. The impacts of citation metrics on publication outlets and research method choice are assessed. Journal: European Journal of Information Systems Pages: 174-178 Issue: 2 Volume: 17 Year: 2008 Month: 4 X-DOI: 10.1057/ejis.2008.11 File-URL: http://hdl.handle.net/10.1057/ejis.2008.11 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:2:p:174-178 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934003_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Albert Boonstra Author-X-Name-First: Albert Author-X-Name-Last: Boonstra Author-Name: David Boddy Author-X-Name-First: David Author-X-Name-Last: Boddy Author-Name: Sheena Bell Author-X-Name-First: Sheena Author-X-Name-Last: Bell Title: Stakeholder management in IOS projects: analysis of an attempt to implement an electronic patient file Abstract: Implementing an inter-organizational system (IOS) requires significant organizational as well as technical changes. These will affect stakeholders (upon whom promoters depend) with varying degrees of power and with varying degrees of interest in the system. Identifying stakeholders and understanding the sources of their attitudes will enable promoters to meet their expectations more fully, and hence encourage acceptance. We examine these issues through a theoretically based study of an attempt to introduce an Electronic Patient File system in The Netherlands. All saw that the system would benefit patients, yet powerful players resisted its implementation, fearing it would affect their interests. This paper develops and tests a model of stakeholder management, showing that those with high interest in the system lacked the power to implement it, while those with low interest had the power to block it. These negative attitudes were shaped by concerns not about the system itself, but about the likely effects on working routines, power, culture and finance. This paper implies that those promoting an IOS (in any sector) should, from the outset of a project, identify their power sources and seek to reconcile stakeholder interests. Journal: European Journal of Information Systems Pages: 100-111 Issue: 2 Volume: 17 Year: 2008 Month: 4 X-DOI: 10.1057/ejis.2008.2 File-URL: http://hdl.handle.net/10.1057/ejis.2008.2 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:2:p:100-111 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934004_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Eszter Bartis Author-X-Name-First: Eszter Author-X-Name-Last: Bartis Author-Name: Nathalie Mitev Author-X-Name-First: Nathalie Author-X-Name-Last: Mitev Title: A multiple narrative approach to information systems failure: a successful system that failed Abstract: We discuss the introduction of an information system where the dominant coalition claimed project success. While the key users did not use the system as intended and the project goals were not achieved, the project committee reported success to the top management board. Using a multi-methodological approach, we can follow how different stakeholders attributed different meanings to the system introduced over time. The rhetorical tools used are analysed using a narrative methodology. We draw on the social construction of technology and use the concept of relevant social groups to understand the different interests influencing the organisational dynamics. We complement this approach by employing the concepts of organisational power and cultural fit between the new system and the different subcultures. We found that this multiple approach explains well how the acceptance of the new software processes was interpreted differently within the organisation, and also by the software supplier. Although limited, our case study reveals the process of socially constructing the success or failure of an information system using this multiple research approach. We compare our results with the literature on IS failures and we consider the value of combining constructionist and critical approaches through a narrative methodology. Journal: European Journal of Information Systems Pages: 112-124 Issue: 2 Volume: 17 Year: 2008 Month: 4 X-DOI: 10.1057/ejis.2008.3 File-URL: http://hdl.handle.net/10.1057/ejis.2008.3 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:2:p:112-124 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934005_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: José-Rodrigo Córdoba Author-X-Name-First: José-Rodrigo Author-X-Name-Last: Córdoba Author-Name: Gerald Midgley Author-X-Name-First: Gerald Author-X-Name-Last: Midgley Title: Beyond organisational agendas: using boundary critique to facilitate the inclusion of societal concerns in information systems planning Abstract: As the development of the information society takes place worldwide, individuals, groups and organisations face the challenge of taking advantage of information and communication technologies (ICTs). ‘Digital divides’ are emerging: some sections of society are gaining access to information, knowledge and technologies while others are being excluded. There also seems to be an over-concentration on the use of ICTs for organisational purposes, with traditional information systems (IS) planning approaches largely ignoring the needs and concerns that people express outside formal organisations. One answer to this problem might be to adopt a systems approach to IS planning. At first sight this appears to be a good idea because of the aspiration of systems approaches to comprehensiveness, presumably looking beyond organisational concerns. However, a review of two popular systems methodologies employed in IS planning suggests that there is potential for their scope to be equally limited by organisational boundaries. There is a need to enhance the critical review of the boundaries of IS planning processes, enabling people to consider family, community and other concerns. In this paper, we use the systems theory of boundary critique to derive a set of questions to help practitioners reflect on different possible boundaries for IS planning exercises. These should be seen as complementary to existing systems approaches rather than as a replacement for them, enabling the latter to be practised more critically. We end by presenting our reflections on using these questions in the context of an IS planning project in a Colombian University. Journal: European Journal of Information Systems Pages: 125-142 Issue: 2 Volume: 17 Year: 2008 Month: 4 X-DOI: 10.1057/ejis.2008.4 File-URL: http://hdl.handle.net/10.1057/ejis.2008.4 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:2:p:125-142 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934006_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Andrea Carugati Author-X-Name-First: Andrea Author-X-Name-Last: Carugati Title: Information system development activities and inquiring systems: an integrating framework Abstract: This article presents a framework that maps information system development (ISD) activities on systems for the creation of knowledge. This work addresses the relevant and persisting problem of improving the chances of ISD success. The article builds upon previous research on knowledge aspects of ISD, abandoning the idea of a monolithic approach to knowledge and presenting a pluralistic approach based on the idea that different inquiring systems can support micro-level ISD activities. The article is divided into two parts. The first part presents the theoretical development of the framework based on ISD literature and on Churchman's (1971) inquiring systems. The second part presents the use of the framework in an ISD project. The case is used to show the applicability of the framework and to highlight the advantages of this approach. The main theoretical implication is that the framework provides a new way to see the development of a system in terms of the knowledge created in the process. The main practical implication of the framework is that it improves the managers' ability to guide ISD activities as knowledge activities embedded in a knowledge process, a crucial element in development projects. Journal: European Journal of Information Systems Pages: 143-155 Issue: 2 Volume: 17 Year: 2008 Month: 4 X-DOI: 10.1057/ejis.2008.5 File-URL: http://hdl.handle.net/10.1057/ejis.2008.5 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:2:p:143-155 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934007_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Hans van der Heijden Author-X-Name-First: Hans Author-X-Name-Last: van der Heijden Title: Editorial Journal: European Journal of Information Systems Pages: 99-99 Issue: 2 Volume: 17 Year: 2008 Month: 4 X-DOI: 10.1057/ejis.2008.6 File-URL: http://hdl.handle.net/10.1057/ejis.2008.6 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:2:p:99-99 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934008_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Richard Baskerville Author-X-Name-First: Richard Author-X-Name-Last: Baskerville Title: For better or worse: how we apply journal ranking lists Journal: European Journal of Information Systems Pages: 156-157 Issue: 2 Volume: 17 Year: 2008 Month: 4 X-DOI: 10.1057/ejis.2008.7 File-URL: http://hdl.handle.net/10.1057/ejis.2008.7 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:2:p:156-157 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934009_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Dennis Adams Author-X-Name-First: Dennis Author-X-Name-Last: Adams Author-Name: Norman Johnson Author-X-Name-First: Norman Author-X-Name-Last: Johnson Title: The journal list and its use: motivation, perceptions, and reality Abstract: The Bauer College of Business at the University of Houston uses lists of journals as part of its process to evaluate and reward the research productivity of its faculty. The creation of the journal lists was proposed for three reasons: to target faculty research as to which journal outlets the College deemed acceptable, to encourage cross-disciplinary research, and to decrease the internal politicizing of the journals themselves. This article discusses the history and use of the lists as well as surveying faculty perceptions. The use of the journal list is imperfect. Faculty seem unclear as to the use of the lists and there does not seem to have been a substantial increase in cross-discipline research. While the tenor of the discussions about the merits of a journal has changed, interdepartmental politicizing of journals continues. Consistency of annual reviews, however, has increased substantially. Journal: European Journal of Information Systems Pages: 158-162 Issue: 2 Volume: 17 Year: 2008 Month: 4 X-DOI: 10.1057/ejis.2008.8 File-URL: http://hdl.handle.net/10.1057/ejis.2008.8 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:2:p:158-162 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11934010_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Leslie Willcocks Author-X-Name-First: Leslie Author-X-Name-Last: Willcocks Author-Name: Edgar A Whitley Author-X-Name-First: Edgar A Author-X-Name-Last: Whitley Author-Name: Chrisanthi Avgerou Author-X-Name-First: Chrisanthi Author-X-Name-Last: Avgerou Title: The ranking of top IS journals: a perspective from the London School of Economics Abstract: The Information Systems and Innovation Group at the London School of Economics has developed a distinct profile of social theory driven research across a wide range of mainstream and specialist IS topics. In this paper, we explain why we do not find existing IS journal rankings appropriate for the assessment of quality of the publications of our Group. We present a set of lists of internationally recognised outlets that we provide to the committee responsible for promotions decisions in our university and we use to advise junior staff and students on where they should publish their work. In addition to these lists, decisions on research quality in our university require the opinion of specialist experts on both the particular outlet of a publication and the publication itself. We argue for the merits of our research quality assessment approach and reflect on its risks. Journal: European Journal of Information Systems Pages: 163-168 Issue: 2 Volume: 17 Year: 2008 Month: 4 X-DOI: 10.1057/ejis.2008.9 File-URL: http://hdl.handle.net/10.1057/ejis.2008.9 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:17:y:2008:i:2:p:163-168 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933713_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: S Eliott Author-X-Name-First: S Author-X-Name-Last: Eliott Title: Electronic Commerce: B2C Strategies and Models Journal: European Journal of Information Systems Pages: 72-72 Issue: 1 Volume: 12 Year: 2003 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000435 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000435 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:1:p:72-72 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933714_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: M Levy Author-X-Name-First: M Author-X-Name-Last: Levy Author-Name: C Loebbecke Author-X-Name-First: C Author-X-Name-Last: Loebbecke Author-Name: P Powell Author-X-Name-First: P Author-X-Name-Last: Powell Title: SMEs, co-opetition and knowledge sharing: the role of information systems Abstract: Co-opetition, simultaneous cooperation and competition, is a recent phenomenon. Co-opetition entails sharing knowledge that may be a key source of competitive advantage. Yet, the knowledge gained by cooperation may also be used for competition. However, there is little investigation of how this problem may be modelled and, hence, managed. A game–theoretic framework for analysing interorganisational knowledge sharing under co-opetition and guidelines for the management of explicit knowledge predicated on coordination and control theory has been proposed, but remains untested. This research empirically investigates these issues in the context of small and medium-sized enterprises (SMEs). SMEs provide an interesting setting as they are knowledge generators, but are poor at knowledge exploitation. The paper uses data from U.K. SMEs to investigate co-opetition, management of knowledge sharing and the role of IS. Journal: European Journal of Information Systems Pages: 3-17 Issue: 1 Volume: 12 Year: 2003 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000439 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000439 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:1:p:3-17 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933715_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ian Alexander Author-X-Name-First: Ian Author-X-Name-Last: Alexander Title: Knowledge Management Systems Journal: European Journal of Information Systems Pages: 73-74 Issue: 1 Volume: 12 Year: 2003 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000440 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000440 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:1:p:73-74 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933716_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Rikard Lindgren Author-X-Name-First: Rikard Author-X-Name-Last: Lindgren Author-Name: Dick Stenmark Author-X-Name-First: Dick Author-X-Name-Last: Stenmark Author-Name: Jan Ljungberg Author-X-Name-First: Jan Author-X-Name-Last: Ljungberg Title: Rethinking competence systems for knowledge-based organizations Abstract: Existing competence systems are based on a rationalistic view of competence. While these competence systems might work in job-based organizations, we argue that in more dynamic settings, such as in knowledge-based organizations, the interest-informed actions that capture the emergent competencies of tomorrow require different types of information technology support. The main objective of this paper is to elaborate on the possibilities and implications of using interest-activated technology as a design rationale for competence systems. This paper is based on an action case study of an implemented interest-activated Intranet recommender system prototype at Volvo Information Technology AB in Gothenburg, Sweden. On the basis of how organizational members used this prototype to find information they were interested in, our research team was able to inquire into how personal interest, embodied in information-seeking activities, could be a means for identifying competence. Building on the relation between personal interest and competence, we discuss competence systems design and spell out explicit implications for managerial practice in knowledge-based organizations. Journal: European Journal of Information Systems Pages: 18-29 Issue: 1 Volume: 12 Year: 2003 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000442 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000442 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:1:p:18-29 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933717_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Gury Fitzerald Author-X-Name-First: Gury Author-X-Name-Last: Fitzerald Title: Information Systems Outsourcing: Enduring Themes, Emergent Patterns and Future Directions Journal: European Journal of Information Systems Pages: 75-76 Issue: 1 Volume: 12 Year: 2003 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000444 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000444 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:1:p:75-76 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933718_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Hans van der Heijden Author-X-Name-First: Hans Author-X-Name-Last: van der Heijden Author-Name: Tibert Verhagen Author-X-Name-First: Tibert Author-X-Name-Last: Verhagen Author-Name: Marcel Creemers Author-X-Name-First: Marcel Author-X-Name-Last: Creemers Title: Understanding online purchase intentions: contributions from technology and trust perspectives Abstract: This paper explores factors that influence consumer's intentions to purchase online at an electronic commerce website. Specifically, we investigate online purchase intention using two different perspectives: a technology-oriented perspective and a trust-oriented perspective. We summarise and review the antecedents of online purchase intention that have been developed within these two perspectives. An empirical study in which the contributions of both perspectives are investigated is reported. We study the perceptions of 228 potential online shoppers regarding trust and technology and their attitudes and intentions to shop online at particular websites. In terms of relative contributions, we found that the trust-antecedent ‘perceived risk’ and the technology-antecedent ‘perceived ease-of-use’ directly influenced the attitude towards purchasing online. Journal: European Journal of Information Systems Pages: 41-48 Issue: 1 Volume: 12 Year: 2003 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000445 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000445 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:1:p:41-48 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933719_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jonas Hedman Author-X-Name-First: Jonas Author-X-Name-Last: Hedman Author-Name: Thomas Kalling Author-X-Name-First: Thomas Author-X-Name-Last: Kalling Title: The business model concept: theoretical underpinnings and empirical illustrations Abstract: The business model concept is becoming increasingly popular within IS, management and strategy literature. It is used within many fields of research, including both traditional strategy theory and in the emergent body of literature on e-business. However, the concept is often used independently from theory, meaning model components and their interrelations are relatively obscure. Nonetheless, we believe that the business model concept is useful in explaining the relation between IS and strategy. This paper offers an outline for a conceptual business model, and proposes that it should include customers and competitors, the offering, activities and organisation, resources and factor market interactions. The causal inter-relations and the longitudinal processes by which business models evolve should also be included. The model criticises yet draws on traditional strategy theory and on the literature that addresses business models directly. The business model is illustrated by an ERP implementation in a European multi-national company. Journal: European Journal of Information Systems Pages: 49-59 Issue: 1 Volume: 12 Year: 2003 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000446 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000446 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:1:p:49-59 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933720_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Pairin Katerattanakul Author-X-Name-First: Pairin Author-X-Name-Last: Katerattanakul Author-Name: Bernard Han Author-X-Name-First: Bernard Author-X-Name-Last: Han Title: Are European IS Journals under-rated? An answer based on citation analysis Abstract: A concern that the quality of European IS journals has been under-rated by existing studies was recently addressed in the IS community. In this study, an objective method based on a Citation Analysis was employed to re-examine the quality of four established European IS journals as compared to 11 other well-recognized IS journals. Extensive citation data were collected to derive eight indices as the measures of journal quality. Our research results indicate that the quality of the four leading European IS journals is quite comparable to that of other well-known IS journals reported in prior studies. Journal: European Journal of Information Systems Pages: 60-71 Issue: 1 Volume: 12 Year: 2003 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000447 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000447 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:1:p:60-71 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933721_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Anssi Öörni Author-X-Name-First: Anssi Author-X-Name-Last: Öörni Title: Consumer search in electronic markets: an experimental analysis of travel services Abstract: Electronic markets are frequently touted to be highly efficient. The prevailing hypothesis is that very low information search costs will enable buyers to expand their product information search and comparison beyond what is feasible in conventional markets. The aim of this paper is to evaluate the relative efficiency of product search in current travel service markets. We report the results of our analysis based on an experimental setting with 92 subjects. Our conclusions tend to disagree with previous predictions about the efficiency of electronic markets. The electronic markets observed were found to be at best as efficient as their conventional counterparts. Our results suggest that poor availability of product information and a lack of systems integration severely limit the efficiency of consumer search in present electronic markets. Journal: European Journal of Information Systems Pages: 30-40 Issue: 1 Volume: 12 Year: 2003 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000450 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000450 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:1:p:30-40 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933722_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bob O'keefe Author-X-Name-First: Bob Author-X-Name-Last: O'keefe Title: Theory with everything? Journal: European Journal of Information Systems Pages: 1-2 Issue: 1 Volume: 12 Year: 2003 Month: 3 X-DOI: 10.1057/palgrave.ejis.3000451 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000451 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:12:y:2003:i:1:p:1-2 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933575_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: M C Jones Author-X-Name-First: M C Author-X-Name-Last: Jones Author-Name: R C Beatty Author-X-Name-First: R C Author-X-Name-Last: Beatty Title: Towards the development of measures of perceived benefits and compatibility of EDI: a comparative assessment of competing first order factor models Abstract: This study describes the development and testing of sets of items to capture constructs that are widely used in the study of electronic data interchange (EDI) adoption and integration. They are the perceived benefits of EDI and the extent to which EDI is compatible with existing organizational practices. Sets of items to measure both perceived direct and perceived indirect benefits are assessed, as are sets of items to measure two types of compatibility: organizational and technological. Findings indicate that the model adequately captures each of the proposed constructs except technological compatibility. Conclusions and directions for future research are presented. Journal: European Journal of Information Systems Pages: 210-220 Issue: 3 Volume: 7 Year: 1998 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000299 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000299 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:7:y:1998:i:3:p:210-220 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933576_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: H Oinas-Kukkonen Author-X-Name-First: H Author-X-Name-Last: Oinas-Kukkonen Title: Evaluating the usefulness of design rationale in CASE Abstract: Advanced systems development is composed of constant alternation between designing artifacts and debating the designs. This article evaluates the usefulness of the Debate Browser design rationale system in the MetaEdit+ CASE environment in one field setting. This usefulness is evaluated in terms of both the system's utility and usability. The research is composed of coaching, observation, and interviews, and it is supplemented through studying the design output. The evaluation suggests that the usefulness of the system is high. It points to advantages in reading design documents, via improved author-reader communication and the understanding of design solutions. This reduces the possibility of errors in design. Journal: European Journal of Information Systems Pages: 185-191 Issue: 3 Volume: 7 Year: 1998 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000300 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000300 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:7:y:1998:i:3:p:185-191 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933577_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: C Francalanci Author-X-Name-First: C Author-X-Name-Last: Francalanci Author-Name: H Galal Author-X-Name-First: H Author-X-Name-Last: Galal Title: Aligning IT investments and workforce composition: the impact of diversification in life insurance companies Abstract: This paper investigates the impact on productivity of combined changes in information technology (IT) investments and workforce composition of life insurance companies. Workforce composition is defined in terms of three broad classes: clerical, managerial and professional. Hypotheses on the combined impact of changes in IT investments and workforce composition on productivity are proposed and empirically tested on a sample of companies from the US life insurance industry. Companies are clustered based on two main strategy alternatives, focus on a market niche vs diversification. In niche companies, higher IT investments accompanied by a decrease in the clerical and managerial components of the workforce are found to have a positive contribution to productivity. On the contrary, higher IT investments in conjunction with a decrease of the professional component show a negative effect. In diversified companies, increasing IT investments show a positive contribution to productivity when accompanied by a decrease of the professional component and a growth in the clerical and managerial component of the workforce. Findings are discussed in the light of fundamental competitive goals in the industry. Journal: European Journal of Information Systems Pages: 175-184 Issue: 3 Volume: 7 Year: 1998 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000301 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000301 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:7:y:1998:i:3:p:175-184 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933578_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: B Escobar-Pérez Author-X-Name-First: B Author-X-Name-Last: Escobar-Pérez Title: Information systems investment decisions in business practice: the Spanish case Abstract: Previous research has reviewed the foundations of the most significant methods for the evaluation of investments in information systems (IS). However, in our view, it is also necessary to provide an updated view on the evaluation methods actually used in practice by organizations. This paper offers a view on the investment in IS in business practice in Spain, analysing: (i) the evaluation methods currently used by Spanish firms; (ii) how companies make decisions concerning investments in IS; (iii) the nature and quality of the decisions; and (iv) the consequences derived from them. Journal: European Journal of Information Systems Pages: 202-209 Issue: 3 Volume: 7 Year: 1998 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000303 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000303 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:7:y:1998:i:3:p:202-209 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933579_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: S Smithson Author-X-Name-First: S Author-X-Name-Last: Smithson Author-Name: R Hirschheim Author-X-Name-First: R Author-X-Name-Last: Hirschheim Title: Analysing information systems evaluation: another look at an old problem Abstract: Information systems (IS) evaluation is a thorny problem. In this paper we re-examine the area in light of recent developments in the field. Our examination begins with an example of a common contemporary IS assessment problem, viz. evaluating outsourcing. The example highlights the organizational and political issues that make evaluation fraught with difficulties. The paper argues that IS evaluation is a ‘necessary evil’ but the context in which IS are developed and used has become much more demanding and complex. A conceptual framework, first proposed in an earlier paper as a way to classify the literature, is presented and brought up to date. The framework is then used to re-examine the outsourcing example, demonstrating the usefulness of the framework. Journal: European Journal of Information Systems Pages: 158-174 Issue: 3 Volume: 7 Year: 1998 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000304 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000304 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:7:y:1998:i:3:p:158-174 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933580_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: T Auer Author-X-Name-First: T Author-X-Name-Last: Auer Title: Quality of IS use Abstract: The importance of skills to use information systems (IS) seems to be well understood, but surprisingly only moderately studied. Research on IS adoption has concentrated mainly on the implementation and phases prior to implementation. Post-implementation behaviour has played a minor role. Further, post-implementation studies have concentrated more on usage and user satisfaction rather than the abilities required to use IS in an organizational context. Here we address the emergent issue of the skills to use IS. The research objective is to assess levels of skill in using microcomputer software packages and to understand the role of skills in an organizational context. To fulfill the research objective a case study has been conducted. The results suggest that IS abilities which support work might be at an alarmingly low level although IS usage seems to be active. Journal: European Journal of Information Systems Pages: 192-201 Issue: 3 Volume: 7 Year: 1998 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000305 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000305 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:7:y:1998:i:3:p:192-201 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_11933581_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Barbara Farbey Author-X-Name-First: Barbara Author-X-Name-Last: Farbey Author-Name: Frank Land Author-X-Name-First: Frank Author-X-Name-Last: Land Author-Name: David Targett Author-X-Name-First: David Author-X-Name-Last: Targett Title: Editorial Journal: European Journal of Information Systems Pages: 155-157 Issue: 3 Volume: 7 Year: 1998 Month: 9 X-DOI: 10.1057/palgrave.ejis.3000306 File-URL: http://hdl.handle.net/10.1057/palgrave.ejis.3000306 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:7:y:1998:i:3:p:155-157 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1981779_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Amany Elbanna Author-X-Name-First: Amany Author-X-Name-Last: Elbanna Author-Name: Ayomikun Idowu Author-X-Name-First: Ayomikun Author-X-Name-Last: Idowu Title: Crowdwork, digital liminality and the enactment of culturally recognised alternatives to Western precarity: beyond epistemological terra nullius Abstract: Research on crowdwork in developing countries considers it precarious. This reproduces its Western conceptualisation assuming that crowdworkers in developing countries imitate their Western counterparts, without close examination of their experiences and responses to work conditions. This study breaks this epistemological terra nullius to pursue an in-depth examination of workers’ lived experience in a developing country and provide a non-Western perspective. It questions how crowdworkers experience and respond to crowdwork and adopts an inductive approach in examining crowdworkers in Nigeria. Unlike the work precarity thesis, we find that crowdworkers in Nigeria transition and transform crowdwork into long-term employment, drawing on their own cultural heritage, social norms and traditions. Through the lens of the indigenous theory of liminality, we conceptualise crowdwork as liminal digital work and uncover three phases in this transformation process. The study concludes that the agency of workers, their culture and their own context play important roles in their experience of crowdwork. This demonstrates that the in-depth examination of the phenomenon in developing countries could destabilise the dominant knowledge, decoupling it from its origin of production and exposing and examining its implicit and explicit assumptions, and hence advance theorisation. Journal: European Journal of Information Systems Pages: 128-144 Issue: 1 Volume: 31 Year: 2022 Month: 01 X-DOI: 10.1080/0960085X.2021.1981779 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1981779 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:1:p:128-144 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1978338_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Vishal Mishra Author-X-Name-First: Vishal Author-X-Name-Last: Mishra Author-Name: Isabelle Walsh Author-X-Name-First: Isabelle Author-X-Name-Last: Walsh Author-Name: Ankur Srivastava Author-X-Name-First: Ankur Author-X-Name-Last: Srivastava Title: Merchants’ adoption of mobile payment in emerging economies: the case of unorganised retailers in India Abstract: A substantial body of literature shows that in addition to increased convenience, mobile payments may result in greater efficiency and contribute to digital and financial inclusion. Although researchers have paid a lot of attention to individual adoption of mobile payment, few studies investigate mobile adoption by businesses, especially unorganised businesses in developing countries. To address this research gap, we use an exploratory grounded theory approach to examine unorganised retailers in urban India. Using 56 semi-structured interviews with merchants, we highlight an emerging mobile payment ecosystem that includes technology value, regulatory bodies, non-regulatory bodies, and merchant dispositions. The data highlight power asymmetry in this ecosystem and show that time-varying interactions among its components determine merchants’ behaviour and resulting (non-) adoption. We find that not only are Indian regulatory bodies the most powerful influencers in the diffusion of this technology; they are also important market actors. This study provides insights into the process of technology adoption by unorganised businesses in India. Moreover, this study sheds light on the important link unorganised retailers create between businesses and bottom-of-the-pyramid consumers, as well as between the state and its marginalised citizens, thereby confirming that such retailers are indispensable partners in economic growth and technology-driven inclusion. Journal: European Journal of Information Systems Pages: 74-90 Issue: 1 Volume: 31 Year: 2022 Month: 01 X-DOI: 10.1080/0960085X.2021.1978338 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1978338 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:1:p:74-90 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1978343_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mumin Abubakre Author-X-Name-First: Mumin Author-X-Name-Last: Abubakre Author-Name: Marcia Mkansi Author-X-Name-First: Marcia Author-X-Name-Last: Mkansi Title: How do technologists do “ICT for development”? A contextualised perspective on ICT4D in South Africa Abstract: We take a layered approach to contextualise Information Communication Technology for Development (ICT4D) to understand digital technologists’ motivations to implement technologies to address socio-economic issues based on their capabilities and kinship affiliations. We adopt an interpretive approach to conducting an inductive qualitative study of digital technologists based in South Africa. We propose three mechanisms (emotional connectedness, user-centred technologies, and symbiotic relations) through which digital technologists undertake ICT4D to exercise their agency and enhance the socio-economic well-being of disadvantaged members of society. Taking the kinship perspective and capability approach as underlying motivations for undertaking ICT4D projects allows us to contribute to the ICT4D literature. Journal: European Journal of Information Systems Pages: 7-24 Issue: 1 Volume: 31 Year: 2022 Month: 01 X-DOI: 10.1080/0960085X.2021.1978343 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1978343 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:1:p:7-24 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1978341_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Anna Zaitsev Author-X-Name-First: Anna Author-X-Name-Last: Zaitsev Author-Name: Salla Mankinen Author-X-Name-First: Salla Author-X-Name-Last: Mankinen Title: Designing financial education applications for development: applying action design research in Cambodian countryside Abstract: Combining financial literacy education with technology literacy is a logical step for organisations focusing on finance-education programsin developing countries. Our study sought to foster and improve this process by exploring how design science, specifically the Action Design Research (ADR) method, could be effectively used in developing such technology. The study describes an IT development project where a small NGO-based team designed and developed a tablet application that assisted rural Cambodians in understanding and managing simple financial matters. We describe how the project applied ADR from the problem formulation to the formalisation of learning in the form of design principles that can be applied to IT projects in rural and remote locations in any developing country. We conclude our study by recommending the further use of information systems in conjunction with more traditional teaching methods, and encourage the further application of ADR and Agile methods when considering software development in the context of developing countries. This study fills a gap in the literature by combining a theoretical model with practical application for more effective learning. Journal: European Journal of Information Systems Pages: 91-111 Issue: 1 Volume: 31 Year: 2022 Month: 01 X-DOI: 10.1080/0960085X.2021.1978341 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1978341 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:1:p:91-111 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1978344_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Charlette Donalds Author-X-Name-First: Charlette Author-X-Name-Last: Donalds Author-Name: Corlane Barclay Author-X-Name-First: Corlane Author-X-Name-Last: Barclay Title: Beyond technical measures: a value-focused thinking appraisal of strategic drivers in improving information security policy compliance Abstract: The evolving sophistication of threats and the impact of security breaches have caused managers to continually grapple with strategies to reduce these risks. One common security control is the adoption of information security policies (ISPs) geared at improving employees’ compliance behaviour. However, there is mounting empirical evidence that shows that ISP compliance is a challenging undertaking with less than satisfactory outcomes. Further, little attention is placed on developing economies in the study of this phenomenon. This research adopts a values-based methodology to determine fundamental and means objectives in maximising employees’ compliance with ISPs in a developing economy context. The research identifies 30 objectives and demonstrates that risk mitigation, people, technical and organisational factors are essential to improving compliance. The results contribute objectives, contextualised to the people for whom the results are relevant, thus promoting deeper understanding. The research offers utility to managers in the design and implementation of InfoSec strategies and policies. The findings can also inform investment decisions regarding compliance tools, methods and technologies. Recognising that security (information and cyber) threats are a global dilemma, we contend that investigating forms of security risks and potential solutions can mitigate the social and economic costs of security incidents. Journal: European Journal of Information Systems Pages: 58-73 Issue: 1 Volume: 31 Year: 2022 Month: 01 X-DOI: 10.1080/0960085X.2021.1978344 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1978344 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:1:p:58-73 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1978339_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Joseph K. Nwankpa Author-X-Name-First: Joseph K. Author-X-Name-Last: Nwankpa Author-Name: Pratim Datta Author-X-Name-First: Pratim Author-X-Name-Last: Datta Title: Leapfrogging Healthcare Service Quality in Sub-Saharan Africa: The Utility-Trust Rationale of Mobile Payment Platforms Abstract: Can mobile payment platforms (MPPs) elevate Sub-Saharan Africa’s (SSA) healthcare service quality (HSQ)? In a region home to more than one billion people yet beset by a paucity of services and infrastructure, mobile devices and platforms are rapidly gaining ground. Rising healthcare needs and costs along with the fact that more than 60% of SSA lives in areas nearly 1.5 miles away from paved roads that lead to hospitals and banks, accessibility to traditional financial services remains a serious concern. As Sub-Saharan hospitals increase billing access via mobile payment platforms, there is little understanding of whether and how mobile payment platforms influence healthcare service quality (HSQ).Drawing upon economic utility and trust perspectives, this study develops an integrative model to examine mobile payment platform utility’s impact on patient trust, commitment, and HSQ perceptions. The model is empirically tested using a survey of 527 patients from the West African country of Nigeria. Results reveal a distinct amalgam of MPP utility, trust, and commitment as antecedents to HSQ perceptions, thus generating important insights and contributing to the ongoing inquiry of how digital platforms in developing countries can influence socio-economic development. Overall, the results support the study’s hypotheses and underscore the important role of MPPs. Journal: European Journal of Information Systems Pages: 40-57 Issue: 1 Volume: 31 Year: 2022 Month: 01 X-DOI: 10.1080/0960085X.2021.1978339 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1978339 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:1:p:40-57 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1994119_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Kweku-Muata Osei-Bryson Author-X-Name-First: Kweku-Muata Author-X-Name-Last: Osei-Bryson Author-Name: Irwin Brown Author-X-Name-First: Irwin Author-X-Name-Last: Brown Author-Name: Peter Meso Author-X-Name-First: Peter Author-X-Name-Last: Meso Title: Advancing the Development of Contextually Relevant ICT4D Theories - From Explanation to Design Journal: European Journal of Information Systems Pages: 1-6 Issue: 1 Volume: 31 Year: 2022 Month: 01 X-DOI: 10.1080/0960085X.2022.1994119 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.1994119 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:1:p:1-6 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1978340_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Andrea Jimenez Author-X-Name-First: Andrea Author-X-Name-Last: Jimenez Author-Name: Pamela Abbott Author-X-Name-First: Pamela Author-X-Name-Last: Abbott Author-Name: Salihu Dasuki Author-X-Name-First: Salihu Author-X-Name-Last: Dasuki Title: In-betweenness in ICT4D research: critically examining the role of the researcher Abstract: The ICT4D discipline has faced criticisms of an uneven production of knowledge that reinforces a dichotomy between Global North-Western knowledge systems on the one side, and Global South-indigenous-Southern knowledge systems on the other. As a result, some ICT4D literature has examined the role of the researcher in reinforcing these biases and further exacerbating inequalities, thus highlighting the complex relationship between ICT4D researchers and the research process. Yet, most of this literature has focused on an insider/outsider researcher positionality. This paper explores the role of the researcher from the alternative position of in-betweenness, where researchers adopt more fluid and dynamic positions as reflexive spaces. To do this, we engage in a dialogical process of retrospective reflections based on ICT4D projects in Nigeria, Peru and West Africa. Through these cases, we identify how we experience in-betweenness in distinct ways: as liminal spaces, as performative spaces, and as spaces of disjuncture. We also examine how these forms of in-betweenness informed our research. We demonstrate that a researcher positionality of in-betweenness in ICT4D research can increase awareness of nuanced researcher roles and potentially avoid ethical dilemmas and reproducing biases. Journal: European Journal of Information Systems Pages: 25-39 Issue: 1 Volume: 31 Year: 2022 Month: 01 X-DOI: 10.1080/0960085X.2021.1978340 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1978340 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:1:p:25-39 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1978342_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: P. K. Senyo Author-X-Name-First: P. K. Author-X-Name-Last: Senyo Author-Name: Stan Karanasios Author-X-Name-First: Stan Author-X-Name-Last: Karanasios Author-Name: Daniel Gozman Author-X-Name-First: Daniel Author-X-Name-Last: Gozman Author-Name: Melissa Baba Author-X-Name-First: Melissa Author-X-Name-Last: Baba Title: FinTech ecosystem practices shaping financial inclusion: the case of mobile money in Ghana Abstract: Financial technology (FinTech) is widely recognised as important in addressing financial inclusion. However, limited research theorises how new entrants and incumbents work together in FinTech ecosystems to shape financial inclusion. We undertake a theory-generating case study with multilevel interacting organisations in Ghana, where, like many other African countries, the growth in FinTech has led to new opportunities for financial inclusion. We conceptualise three practices, as building blocks at the ecosystem level, through which incumbents and new entrants shape financial inclusion: (1) innovative and collaborative practices, (2) protectionist and equitable practices, and (3) legitimising and sustaining practices. We articulate a theoretical model that explains how the practices shape financial inclusion and propose three theoretical propositions of how financial inclusion in developing countries is being scaled and shaped in terms of actors, relationships, and practices. Journal: European Journal of Information Systems Pages: 112-127 Issue: 1 Volume: 31 Year: 2022 Month: 01 X-DOI: 10.1080/0960085X.2021.1978342 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1978342 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:31:y:2022:i:1:p:112-127 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1863751_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: L.G. Pee Author-X-Name-First: L.G. Author-X-Name-Last: Pee Author-Name: Shan L. Pan Author-X-Name-First: Shan L. Author-X-Name-Last: Pan Author-Name: Jingyuan Wang Author-X-Name-First: Jingyuan Author-X-Name-Last: Wang Author-Name: Junjie Wu Author-X-Name-First: Junjie Author-X-Name-Last: Wu Title: Designing for the future in the age of pandemics: a future-ready design research (FRDR) process Abstract: The recent pandemic has painfully reminded us of the need for IS design to be informed by possible futures and conscious of undesirable futures – Within months, many of the nice-to-have IS functionalities have become must-haves; Technology solutions in response to the pandemic have raised privacy and equality concerns. Although design science research fundamentally focuses on shaping artefacts and events to create a more desirable future, there has been limited guidance on how futures should be accounted for. This article addresses the gap by integrating insights from future-oriented IS research and futures research to develop guidelines for engaging with futures throughout the design science research process. The future-ready design research (FRDR) process prompts researchers to be more aware of futures, to foster the innovative foresight for actively pursuing the preferred future, and to espouse the responsible foresight for consciously avoiding undesirable futures. The guidelines are illustrated with a design science research project on outbreak analytics and the instantiated system’s subsequent adaptation and utilisation in COVID-19. Journal: European Journal of Information Systems Pages: 157-175 Issue: 2 Volume: 30 Year: 2021 Month: 03 X-DOI: 10.1080/0960085X.2020.1863751 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1863751 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:2:p:157-175 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1750309_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: N Melike Findikoglu Author-X-Name-First: N Melike Author-X-Name-Last: Findikoglu Author-Name: Chandrasekaran Ranganathan Author-X-Name-First: Chandrasekaran Author-X-Name-Last: Ranganathan Author-Name: Mary Beth Watson-Manheim Author-X-Name-First: Mary Beth Author-X-Name-Last: Watson-Manheim Title: Partnering for prosperity: small IT vendor partnership formation and the establishment of partner pools Abstract: Small IT vendors increasingly establish intra-industry collaborative arrangements with other technology providers. Despite the criticality of this strategy, there is little research that provides insights into partnership formation. Our study attempts to close this gap.Building on resource dependency theory (RDT) and resource-based view (RBV), we posit that, depending on external market and internal resource considerations, small IT vendors either supplement or complement their IT resources and capabilities via partnerships. When seeking to expand the scope of their resource portfolio by accessing dissimilar resources, vendors are engage in complementary partnerships (goal: improving the scope of IT resources). However, if they seek to expand the scale of their portfolio, they engage in supplementary partnerships (goal: extending the scale of IT resources). Using a qualitative approach, we examine the partnership formation practices of seven small IT firms. We propose a conceptual framework with five constructs that illustrate dynamics underlying these IT service partnerships, i.e., External market considerations, Internal resource configurations, Partner considerations, Partnership exploration, and Partnership development. We find variations in partnership practices depending on the supplementary or complementary nature of resources being sought. We also find small IT vendors form and manage partner pools to mitigate risks associated with partnerships. Journal: European Journal of Information Systems Pages: 193-218 Issue: 2 Volume: 30 Year: 2021 Month: 03 X-DOI: 10.1080/0960085X.2020.1750309 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1750309 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:2:p:193-218 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1756701_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Przemysław G. Hensel Author-X-Name-First: Przemysław G. Author-X-Name-Last: Hensel Author-Name: Agnieszka Kacprzak Author-X-Name-First: Agnieszka Author-X-Name-Last: Kacprzak Title: Curbing cyberloafing: studying general and specific deterrence effects with field evidence Abstract: Although the General Deterrence Theory has frequently been employed to study the prevention of misconduct associated with computer use, the common reliance on survey data makes it difficult to measure the general and specific deterrence effects. We use one-group pre-test-post-test quasi-experiment based on data from a monitoring system covering 230 employees for nine months to study general and specific effects of two interventions: the reminder about possible punishment and the actual punishment. The interrupted time series analysis (ITSA) with ARIMA modelling employed to study the longitudinal effects of the interventions allowed to deliver novel findings. Punishing the violators of organisational policy affected both the punished and unpunished employees (decrease in cyberloafing by 41% and 24%, respectively). The effect was maintained for three months, that is until the end of our dataset. The punishment had a stronger effect on unpunished employees located closer in the organisational structure to the punished ones than on the remaining unpunished employees. Moreover, we show that reminder about the possibility of punishment brought no statistically significant effect, likely due to the earlier experience of punishment avoidance. We discuss implications for theory and designing organisational policies intended to curb cyberloafing. Journal: European Journal of Information Systems Pages: 219-235 Issue: 2 Volume: 30 Year: 2021 Month: 03 X-DOI: 10.1080/0960085X.2020.1756701 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1756701 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:2:p:219-235 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1850186_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Daniel Westmattelmann Author-X-Name-First: Daniel Author-X-Name-Last: Westmattelmann Author-Name: Jan-Gerrit Grotenhermen Author-X-Name-First: Jan-Gerrit Author-X-Name-Last: Grotenhermen Author-Name: Marius Sprenger Author-X-Name-First: Marius Author-X-Name-Last: Sprenger Author-Name: Gerhard Schewe Author-X-Name-First: Gerhard Author-X-Name-Last: Schewe Title: The show must go on - virtualisation of sport events during the COVID-19 pandemic Abstract: Due to the high risk of COVID-19 transmission, many sport events, including organised cycling competitions, have been cancelled. Nevertheless, staying active is important for individual well-being and professional athletes need to compete to earn their living. We propose that mixed-reality applications like ZWIFT allow people to conduct virtually mediated sports competitions, which resemble traditional sport realistically and could serve as a remedy for this contradiction. To test this proposition, we compare professional cyclists’ performance data from virtual competitions with data obtained from traditional cycling races and find that the physical activities are comparable. Thus, we contribute to the discussion on the distinctiveness of sports and eSport. Moreover, we interview 11 professional cyclists, who participated in virtual race series regarding their evaluation of the virtualisation of cycling events. Accordingly, we contribute to the literature on mixed-reality applications by focusing on user perceptions of a novel and physical dimension of virtually mediated interaction. Thereby, we apply the sports digitalisation framework proposed by Xiao et al. (2017). Professional athletes mainly perceive the virtualisation of sport as positive, but also mention some specific risks. Consequently, we derive implications for practice that include the supportive role of virtual sport to help master pandemics such as COVID-19. Journal: European Journal of Information Systems Pages: 119-136 Issue: 2 Volume: 30 Year: 2021 Month: 03 X-DOI: 10.1080/0960085X.2020.1850186 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1850186 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:2:p:119-136 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1860656_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Stefan Henningsson Author-X-Name-First: Stefan Author-X-Name-Last: Henningsson Author-Name: William J. Kettinger Author-X-Name-First: William J. Author-X-Name-Last: Kettinger Author-Name: Chen Zhang Author-X-Name-First: Chen Author-X-Name-Last: Zhang Author-Name: Nageswaran Vaidyanathan Author-X-Name-First: Nageswaran Author-X-Name-Last: Vaidyanathan Title: Transformative rare events: Leveraging digital affordance actualisation Abstract: This paper conceptualises the COVID-19 pandemic as a “rare event.” Rare events channel managerial attention to magnified issues and foster resource mobilisation and learning. We draw on a case study of a US consumer lender to develop a model explaining how organisations actualise digital affordances as part of their rare event response and, in doing so, leverage the transformative experience towards establishing a “new normal.” The model and its instantiation contribute conceptual understanding and advice for how IS managers may effectively address rare events and, in particular, the COVID-19 pandemic, including the aftermath of its lockdown and the transition to the new business status quo. The model emphasises the importance of understanding the evolution of digital affordances as possessing teleological paths where affordances are developed in steps corresponding to where an organisation focuses its managerial attention, with indirect consequences of possibilities to attend to other objectives enabled by digital technologies. Overall, the model contributes to theory by explaining the role of rare events in the evolution of affordances, including some that can be transformative and introducing the rare events literature into the IS discipline. Journal: European Journal of Information Systems Pages: 137-156 Issue: 2 Volume: 30 Year: 2021 Month: 03 X-DOI: 10.1080/0960085X.2020.1860656 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1860656 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:2:p:137-156 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1863752_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Marco Marabelli Author-X-Name-First: Marco Author-X-Name-Last: Marabelli Author-Name: Emmanuelle Vaast Author-X-Name-First: Emmanuelle Author-X-Name-Last: Vaast Author-Name: Jingyao Lydia Li Author-X-Name-First: Jingyao Lydia Author-X-Name-Last: Li Title: Preventing the digital scars of COVID-19 Abstract: In this commentary, we consider the ambivalent role of ubiquitous computing during the COVID pandemic and we point to the risk that some negative, IT-related practices associated with the pandemic will endure after it. We call these lasting effects the digital scars of COVID-19. The same IT that has positive impacts for some people might have negative impacts for others – often vulnerable populations, minorities and socio-economically disadvantaged groups. Some issues stem from the longstanding digital divide that characterises modern societies. Yet, the pandemic is exacerbating these inequalities. We are worried that some debatable uses of technology will persist after the pandemic is over. We therefore point to the prominent role of the IS community in enabling positive aspects of IT use during and after the pandemic, while mitigating negative aspects, especially in the long run. Our sociotechnical background enables us to see these dynamics in a processual and holistic way. To shed light on these issues, we analyse three key technologies widely used to deal with COVID (social software, AI/ML and robotics) and identify critical topics and associated research questions where IS scholarship should focus its attention to generate novel theorising and impactful practical insights. Journal: European Journal of Information Systems Pages: 176-192 Issue: 2 Volume: 30 Year: 2021 Month: 03 X-DOI: 10.1080/0960085X.2020.1863752 File-URL: http://hdl.handle.net/10.1080/0960085X.2020.1863752 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:30:y:2021:i:2:p:176-192 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1944823_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Nirmalee Raddatz Author-X-Name-First: Nirmalee Author-X-Name-Last: Raddatz Author-Name: Joshua Coyne Author-X-Name-First: Joshua Author-X-Name-Last: Coyne Author-Name: Philip Menard Author-X-Name-First: Philip Author-X-Name-Last: Menard Author-Name: Robert E Crossler Author-X-Name-First: Robert E Author-X-Name-Last: Crossler Title: Becoming a blockchain user: understanding consumers’ benefits realisation to use blockchain-based applications Abstract: Data breaches and cyber incidents are on the rise, and companies continually research new technologies to defend against attacks and protect customer data. The blockchain is a data store designed to promote data privacy, as well as transaction integrity. Enterprises in several industries, especially banking, have investigated the implementation of blockchain-based databases to replace centralised databases as one mechanism for protecting customers’ data by separating transactional data from personally identifiable information. Despite the blockchain’s privacy protections, consumers remain largely unaware of these benefits. Building on the Health Belief Model (HBM), we include privacy concerns and inertia as critical factors that influence consumers’ perceptions of blockchain-based databases’ benefits. Using a sample of 304 respondents, we test a theoretical model incorporating these factors. Our study results indicate threat severity, threat susceptibility, awareness, and inertia significantly influence the perceived benefits of blockchain, which has a significant positive influence on consumers’ intention to switch to blockchain-based applications. Although consumers’ comfort with the status quo of traditional banking mechanisms is a significant barrier to the realisation of blockchain banking applications benefits, additional awareness of consumer privacy protections can persuade customers to use the blockchain-based applications, especially if they exhibit heightened privacy concerns. Journal: European Journal of Information Systems Pages: 287-314 Issue: 2 Volume: 32 Year: 2023 Month: 03 X-DOI: 10.1080/0960085X.2021.1944823 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1944823 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:2:p:287-314 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1927866_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Joshua Davis Author-X-Name-First: Joshua Author-X-Name-Last: Davis Author-Name: Deepti Agrawal Author-X-Name-First: Deepti Author-X-Name-Last: Agrawal Author-Name: Xiang Guo Author-X-Name-First: Xiang Author-X-Name-Last: Guo Title: Enhancing users’ security engagement through cultivating commitment: the role of psychological needs fulfilment Abstract: Employee behaviour is fundamental to corporate information security (InfoSec) capabilities across the phases of prevention, detection, and response. Unfortunately, despite over a decade of research on the topic, the human aspect of security remains the most vulnerable in many companies today, often rooted in employee disinterest. Two traditions within the InfoSec research that may contribute to this disconnect are 1) emphasis on extrinsic manipulation of behaviour versus cultivation of internalised commitment to organisational InfoSec and 2) emphasis on isolated activities over more integrated perspectives of security behaviour. Addressing these gaps, the current study examines end user InfoSec behaviour through a distinct internal motivational lens. Rooted in Self-Determination Theory, a research model is introduced that highlights workplace factors which drive end users’ internalised commitment to organisational InfoSec by fulfiling fundamental psychological needs (autonomy, competence, and relatedness) within this context. Commitment, which captures internally regulated motivation to contribute to organisational InfoSec performance, is then positioned as a driver of intention to engage in various security behaviours. Overall, the results support the study’s hypotheses and underscore the important roles perceived behavioural control, IT competence, and user-IS department relations have on commitment to organisational InfoSec and resultant behavioural outcomes. Journal: European Journal of Information Systems Pages: 195-206 Issue: 2 Volume: 32 Year: 2023 Month: 03 X-DOI: 10.1080/0960085X.2021.1927866 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1927866 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:2:p:195-206 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1924088_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Neil McBride Author-X-Name-First: Neil Author-X-Name-Last: McBride Author-Name: Samuel Liyala Author-X-Name-First: Samuel Author-X-Name-Last: Liyala Title: Memoirs from Bukhalalire: a poetic inquiry into the lived experience of M-PESA mobile money usage in rural Kenya Abstract: M-PESA is the world’s leading mobile money system which supports the person-to-person transfer of money. While the institutional meaning of M-PESA concerning financial inclusion and market access is well documented, the meaning attached to M-PESA by users, particularly in rural communities, has received less attention. This study examines the meaning of M-PESA to the rural poor in villages in Busia County, Western Kenya using the approach of poetic inquiry in which the expressions of local people are rendered as poetry in order to draw out affective and lived experience. A reading of the poems of seven participants reveals the perception of M-PESA as a means of empowerment for women, alignment with their social identity and access to education. This contrasts sharply with the meaning of M-PESA as seen by commercial and non-commercial institutions which focuses on connecting the unbanked to formal banking systems and the exploitation of M-PESA as a primary revenue stream. The paper concludes by highlighting the need for regulation which is delicately balanced between independence from institutional control and the exposure of the rural poor to exploitation. Journal: European Journal of Information Systems Pages: 173-194 Issue: 2 Volume: 32 Year: 2023 Month: 03 X-DOI: 10.1080/0960085X.2021.1924088 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1924088 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:2:p:173-194 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1931494_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Christopher Nguyen Author-X-Name-First: Christopher Author-X-Name-Last: Nguyen Author-Name: Matthew Jensen Author-X-Name-First: Matthew Author-X-Name-Last: Jensen Author-Name: Eric Day Author-X-Name-First: Eric Author-X-Name-Last: Day Title: Learning not to take the bait: a longitudinal examination of digital training methods and overlearning on phishing susceptibility Abstract: As phishing becomes increasingly sophisticated and costly, interventions that improve and prolong resistance to attacks are needed. Previous research supported digital training as a method to reduce phishing susceptibility. However, the effects of training degrade with time. Therefore, we investigate overlearning as an approach that may increase skill retention through repetition and developing automaticity. We performed a longitudinal experiment crossing overlearning with anti-phishing digital training (rule-based, mindfulness, and control). Participants were tested using email identification tests (immediately following and 10 weeks after training) and mock phishing messages delivered to their inboxes (1 week and 8 weeks following training). Results showed that compared to rule-based training, mindfulness training resulted in significantly greater retention in terms of better email discrimination and less susceptibility to phishing attacks but similar levels of caution towards phishing after 2 months. Overlearning resulted in significantly less susceptibility to phishing attacks and more caution towards phishing compared to no overlearning but did not impact the digital training approaches. Even so, mindfulness was more beneficial compared to overlearning. Altogether, the results demonstrate the stability of the benefits of mindfulness training over time in terms of mitigating phishing susceptibility without influencing the chances of missing legitimate emails. Journal: European Journal of Information Systems Pages: 238-262 Issue: 2 Volume: 32 Year: 2023 Month: 03 X-DOI: 10.1080/0960085X.2021.1931494 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1931494 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:2:p:238-262 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1966326_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Koteswara Ivaturi Author-X-Name-First: Koteswara Author-X-Name-Last: Ivaturi Author-Name: Cecil Chua Author-X-Name-First: Cecil Author-X-Name-Last: Chua Title: Rethinking time: ubichronic time and its impact on work Abstract: Modern technology is ubiquitous i.e., “always there” – available to us when we want it and engaging us even when we don’t actively seek it. This constantly available ubiquitous technology influences people’s perception of time. This conceptual paper explores how ubiquitous technology creates a new time vision we call ubichronic time. We argue ubichronic time is qualitatively different from existing time visions and highlight the new values and behaviours associated with it. Specifically, people who have an ubichronic time vision perform disparate activities that span short durations across the day, find specific tiny units of time valuable and cram many repeated activities into a day. We also argue ubichronic time will have profound implications on the way we work and as such propose new concepts and research directions on how the way we work needs to adapt at the individual, team, and organisational levels. Journal: European Journal of Information Systems Pages: 315-330 Issue: 2 Volume: 32 Year: 2023 Month: 03 X-DOI: 10.1080/0960085X.2021.1966326 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1966326 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:2:p:315-330 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1944822_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Alfred Benedikt Brendel Author-X-Name-First: Alfred Benedikt Author-X-Name-Last: Brendel Author-Name: Stephan Diederich Author-X-Name-First: Stephan Author-X-Name-Last: Diederich Author-Name: Fred Niederman Author-X-Name-First: Fred Author-X-Name-Last: Niederman Title: An immodest proposal – going “All in” on replication research in information systems Abstract: Genuine theory testing, also under the term “replication research”, is rarely found in Information Systems (IS) research. Based on a replication’s results, our understanding or representation of the original theory is updated. This function of replication is integral to a scientific discipline to accumulate confidence in the explanatory power of a theory and to weed out theories that did not withstand scrutiny. However, many new theories are only tested once in the original study, while subsequent studies reference it without explicitly questioning the original theory. Against this background, we examine three aspects of the current state of replication studies in IS: (1) how many explicit replication studies in key IS research outlets have been published; (2) the attitudes of senior scholars, mostly prestigious IS journals’ editors, towards publishing replication research in their journals; and (3) a new policy proposal towards replication research broadly across all journals. We propose that all journals should take responsibility for publishing replications of theory or empirical results that have formerly been presented in that journal. Journal: European Journal of Information Systems Pages: 277-286 Issue: 2 Volume: 32 Year: 2023 Month: 03 X-DOI: 10.1080/0960085X.2021.1944822 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1944822 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:2:p:277-286 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1946442_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mike Monson Author-X-Name-First: Mike Author-X-Name-Last: Monson Title: Socially responsible design science in information systems for sustainable development: a critical research methodology Abstract: This study presents an Information Systems (IS) research methodology for the conduct of critical research into sustainable development that encompasses the objectives of socially inclusive and environmentally sustainable economic growth. The specific context is the application of critical research in the problem definition phase of IS Design Science Research for sustainable development. The paper guides IS research through problem scenarios of unsustainable development where power can distort truth and corrupt the public discourse in the furtherance of their ambitions. The methodology provides a structured approach to engage in inquiry of topics which are by their nature, deceptive and opaque. The methodology enables research inquiry encompassing societal topics, macro-social issues related to sustainable development and the application of nomothetic inquiry to address systemic problems. The paper concludes with illustrative examples of outcomes from the application of the prescribed methodology. The study provides an IS response to systemic social and environmental challenges by identifying the routes to transformation which in turn inform the design of IS solutions. Consequently, the study lays a foundation for IS engagement in socially responsible design science research. Journal: European Journal of Information Systems Pages: 207-237 Issue: 2 Volume: 32 Year: 2023 Month: 03 X-DOI: 10.1080/0960085X.2021.1946442 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1946442 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:2:p:207-237 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1908184_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Anat Hovav Author-X-Name-First: Anat Author-X-Name-Last: Hovav Author-Name: Itzhak Gnizy Author-X-Name-First: Itzhak Author-X-Name-Last: Gnizy Author-Name: Jinyoung Han Author-X-Name-First: Jinyoung Author-X-Name-Last: Han Title: The effects of cyber regulations and security policies on organizational outcomes: a knowledge management perspective Abstract: Knowledge management (KM) has emerged as an operational and strategic organisational tool. However, the influence of recent cyber regulations (CR) and security policies (SP) on the usefulness of KM, are absent from the literature. This study focuses on the intersection of knowledge management and knowledge fortification. The study employs survey data from a sample of firms and utilises partial least squares (PLS) with extensive post hoc analyses, to examine the influence of CR and SP on KM core processes (acquisition, sharing, and utilisation) and subsequently on the operational effectiveness and strategic performance of firms. Contrary to prior research, we found that external knowledge sharing negatively affected performance. These findings support our assertion that KM processes are tied to contingencies that change the relationship between KM outcomes. Journal: European Journal of Information Systems Pages: 154-172 Issue: 2 Volume: 32 Year: 2023 Month: 03 X-DOI: 10.1080/0960085X.2021.1908184 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1908184 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:2:p:154-172 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1963193_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Hemin Jiang Author-X-Name-First: Hemin Author-X-Name-Last: Jiang Author-Name: Mikko Siponen Author-X-Name-First: Mikko Author-X-Name-Last: Siponen Author-Name: Aggeliki Tsohou Author-X-Name-First: Aggeliki Author-X-Name-Last: Tsohou Title: Personal use of technology at work: a literature review and a theoretical model for understanding how it affects employee job performance Abstract: Employee personal use of technology at work (PUTW) – defined as employees’ activities using organisational or personal IT resources for non-work-related purposes while at work – is increasingly common. Our review of existing PUTW studies (n = 137) suggests that previous studies widely discussed PUTW outcomes, antecedents, and policies. The literature review also indicates that previous studies proposed opposing viewpoints regarding the effect of PUTW on employee job performance, but few studies offered empirical evidence. Consequently, the conditions under which PUTW can increase or decrease employee job performance have not been discussed. We develop a theoretical model for increasing the understanding of this issue. Our model suggests that executive attention is an important underlying mechanism through which PUTW affects employee job performance. We further suggest the effect of PUTW on executive attention (and job performance) depends on PUTW behavioural characteristics in terms of four dimensions: PUTW cognitive load, PUTW arousal level, PUTW timing, and PUTW frequency/duration. The model can advance researchers’ understanding of the possible conditions under which PUTW may increase or decrease employee job performance. The model also offers new insights into existing studies on PUTW antecedents and policies. As a result, our proposed model provides new theoretical guidance for future studies on PUTW. Journal: European Journal of Information Systems Pages: 331-345 Issue: 2 Volume: 32 Year: 2023 Month: 03 X-DOI: 10.1080/0960085X.2021.1963193 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1963193 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:2:p:331-345 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1907236_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Michel Avital Author-X-Name-First: Michel Author-X-Name-Last: Avital Author-Name: Tina Blegind Jensen Author-X-Name-First: Tina Blegind Author-X-Name-Last: Jensen Author-Name: Signe Dyrby Author-X-Name-First: Signe Author-X-Name-Last: Dyrby Title: The social fabric framework: steps to eliciting the social making of organisations in the digital age Abstract: The proliferation of enterprise social media generates an ever-growing record of digital traces that provides ample opportunities to study the social making of organisations. Subsequently, we present the social fabric framework, which comprises a structured five-step approach for eliciting, interpreting, and representing the situated social idiosyncrasies and underlying patterns of the social making of organisations. The paper focuses on the application of the social fabric framework as a research method. However, the framework also lends itself to practice as a diagnostic tool that can detect emergent changes in the social fabric of an organisation as well as support organisational development and change. Moreover, by providing a vocabulary for articulating the social making of organisations, the framework can help organisation members reify their dispositions, make sense of the social dynamics, and enable a constructive discussion at the grassroots level about any controversy or aspiration. Journal: European Journal of Information Systems Pages: 127-153 Issue: 2 Volume: 32 Year: 2023 Month: 03 X-DOI: 10.1080/0960085X.2021.1907236 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1907236 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:2:p:127-153 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1940324_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Tobias Mettler Author-X-Name-First: Tobias Author-X-Name-Last: Mettler Author-Name: Ali Sunyaev Author-X-Name-First: Ali Author-X-Name-Last: Sunyaev Title: Are we on the right track? an update to Lyytinen et al.’s commentary on why the old world cannot publish Abstract: In a thought-provoking paper published in EJIS more than a decade ago, Lyytinen and colleagues asked the question, why does the “old world” perform poorly in high academic impact publishing? This triggered a lively debate on the epistemological and methodological traditions, preferences, and research practices of Europeans versus North Americans that has lasted until today. Is it still true, we asked ourselves, that European scholars generate less academic impact than their North American colleagues? Is the European research context indeed disadvantageous for developing high academic impact research? In this paper, we set out to explore these questions by analysing the Google Scholar profiles of 1713 IS researchers from all over the world. Our findings show that Northern and Western European scholars no longer seem to differ significantly from their North American peers, even though the different research contexts still exercise a certain level of influence. However, is this a development the “old world” desires? We provide an assessment and some suggestions for the future of European IS research. Journal: European Journal of Information Systems Pages: 263-276 Issue: 2 Volume: 32 Year: 2023 Month: 03 X-DOI: 10.1080/0960085X.2021.1940324 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1940324 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:2:p:263-276 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2192562_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Michael D. Myers Author-X-Name-First: Michael D. Author-X-Name-Last: Myers Title: Introducing a new genre for EJIS Journal: European Journal of Information Systems Pages: 107-107 Issue: 2 Volume: 32 Year: 2023 Month: 03 X-DOI: 10.1080/0960085X.2023.2192562 File-URL: http://hdl.handle.net/10.1080/0960085X.2023.2192562 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:2:p:107-107 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1907234_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ojelanki Ngwenyama Author-X-Name-First: Ojelanki Author-X-Name-Last: Ngwenyama Author-Name: Helle Zinner Henriksen Author-X-Name-First: Helle Zinner Author-X-Name-Last: Henriksen Author-Name: Daniel Hardt Author-X-Name-First: Daniel Author-X-Name-Last: Hardt Title: PUBLIC MANAGEMENT CHALLENGES IN THE DIGITAL RISK SOCIETY: A Critical Analysis of the Public Debate on Implementation of the Danish NemID Abstract: The rise of the digital society is accompanied by incalculable social risks, but very little IS research has examined the implications of the new digital society. Drawing on concepts from Beck’s critical theory of the risk society and critical discourse analysis, this study examines the public discourse on risk events during the launch of NemID, a personal digital identifier for Danish citizens. This research illustrates our difficulties and challenges in managing some of the fundamental social risks from societal digitalisation. Limited institutional capabilities for digital technologies force public officials to depend on private companies motived by profit instead of the public interest. Beliefs in digital technology as the primary determinant of social and economic progress also present many public management dilemmas. When digital risk events occur and citizens’ fears are stoked by news media and public discourse, public officials seem to have no other strategy for managing the escalating fears than systematically distorted communication. The continued rise of the digital risk society demands that IS research respond to the challenge of generating knowledge for its public management. Journal: European Journal of Information Systems Pages: 108-126 Issue: 2 Volume: 32 Year: 2023 Month: 03 X-DOI: 10.1080/0960085X.2021.1907234 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1907234 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:2:p:108-126 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2165978_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Roxana Ologeanu-Taddei Author-X-Name-First: Roxana Author-X-Name-Last: Ologeanu-Taddei Author-Name: Cameron Guthrie Author-X-Name-First: Cameron Author-X-Name-Last: Guthrie Author-Name: Tina Blegind Jensen Author-X-Name-First: Tina Blegind Author-X-Name-Last: Jensen Title: Digital transformation of professional healthcare practices: fitness seeking across a rugged value landscape Abstract: Digital transformation (DT) is typically described as a strategic, top-down initiative where new digital technologies fundamentally disrupt an organisation’s structure, procedures, and processes to enhance its value proposition. We propose a middle-range theory which highlights that DT of professional practices in healthcare follows a different path. To build this theory, we transpose the metaphor of a “fitness landscape” from evolutionary biology to a professional healthcare context to build an intermediate conceptualisation, which is then refined through an empirical study. Our theory highlights that external events, such as the COVID-19 pandemic, changing patient behaviours or the availability of new digital resources, transform the “value landscape” upon which healthcare professionals create and deliver healthcare services to patients. Empowered by their professional autonomy and driven by their service orientation, healthcare professionals search for new paths and peaks for value creation and delivery across a rugged landscape. As digital resources are leveraged, new value propositions in practice emerge, and professional healthcare practices are digitally transformed. Journal: European Journal of Information Systems Pages: 354-371 Issue: 3 Volume: 32 Year: 2023 Month: 05 X-DOI: 10.1080/0960085X.2023.2165978 File-URL: http://hdl.handle.net/10.1080/0960085X.2023.2165978 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:3:p:354-371 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2018364_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Dan J. Kim Author-X-Name-First: Dan J. Author-X-Name-Last: Kim Author-Name: Mark Salvacion Author-X-Name-First: Mark Author-X-Name-Last: Salvacion Author-Name: Mohammad Salehan Author-X-Name-First: Mohammad Author-X-Name-Last: Salehan Author-Name: Dae Wan Kim Author-X-Name-First: Dae Wan Author-X-Name-Last: Kim Title: An empirical study of community cohesiveness, community attachment, and their roles in virtual community participation Abstract: Although active participation of members is a critical success factor for virtual communities, few members actively participate in activities in virtual communities (e.g., posting, commenting, sharing, etc.). This study explores the differences between passive and active community participation from community cohesiveness and community attachment perspectives. Drawing upon a context-specific cohesiveness-attachment-participation framework based on cognition-affection-conation traits of human psychology, we propose a research model and empirically test the roles of community cohesiveness and attachment in virtual community participation. The results suggest that community members’ active participation is positively influenced by both community cohesiveness and community attachment. Visitation, as the passive mode of participation, is influenced by community attachment only. The findings not only inspire future IS research to consider community cohesiveness, attachment, and participation as vital research constructs in other social contexts, but it also helps managers build managerial actions, such as prioritising their limited business resources to increase community members’ active participation, for the success of virtual communities. Journal: European Journal of Information Systems Pages: 573-600 Issue: 3 Volume: 32 Year: 2023 Month: 05 X-DOI: 10.1080/0960085X.2021.2018364 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.2018364 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:3:p:573-600 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2166431_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Anuragini Shirish Author-X-Name-First: Anuragini Author-X-Name-Last: Shirish Author-Name: Shirish C. Srivastava Author-X-Name-First: Shirish C. Author-X-Name-Last: Srivastava Author-Name: Niki Panteli Author-X-Name-First: Niki Author-X-Name-Last: Panteli Title: Management and sustenance of digital transformations in the Irish microbusiness sector: examining the key role of microbusiness owner-manager Abstract: Despite the economic and societal significance of microbusinesses (MBs), digital transformation (DT) efforts in the MB sector have been rather sporadic. Further, prior DT studies have primarily examined large- and mid-sized organisations, leaving a perceptible void in the literature. In this paper, we leverage the unique context of MBs and recognise the key role of microbusiness owner-managers (MBOMs) for the management and sustenance of DT initiatives. Specifically, we theorise the influence of MBOMs’ DT readiness in terms of their growth and technology mindsets contributing to their DT learning resources and processes. Drawing on qualitative data from a series of structured interviews and focus groups with MBOMs and other key stakeholders in the Irish MB digital ecosystem, we identity three MBOM digital transformer archetypes comprising unique configurations of MBOMs’ growth and technology mindsets, namely: champion digital transformers, emerging digital transformers, and aspiring digital transformers. For each of these archetypes, we explore the different learning capabilities and mechanisms through which MBOMs manage and sustain their digital transformation efforts. Our findings offer theoretical contributions to the fields of digital transformation in microbusinesses, digital leadership, and digital capabilities. Our study also has significant implications for policy and practice. Journal: European Journal of Information Systems Pages: 409-433 Issue: 3 Volume: 32 Year: 2023 Month: 05 X-DOI: 10.1080/0960085X.2023.2166431 File-URL: http://hdl.handle.net/10.1080/0960085X.2023.2166431 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:3:p:409-433 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2004939_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Hong Zhang Author-X-Name-First: Hong Author-X-Name-Last: Zhang Author-Name: Patrick Y.K. Chau Author-X-Name-First: Patrick Y.K. Author-X-Name-Last: Chau Author-Name: Bin Wang Author-X-Name-First: Bin Author-X-Name-Last: Wang Author-Name: Xin (Robert) Luo Author-X-Name-First: Xin (Robert) Author-X-Name-Last: Luo Title: Social Media-Enabled Customer Co-Creation Experience Value: Conceptualisation and Measurement Abstract: Despite the dominance of customer co-creation experience value (CCEV) in the value co-creation research, its theoretical domain has not been systematically analysed and developed. Specifically, little is known about the nature of social media-enabled CCEV. To address the knowledge gaps, this study employs a five-step procedure to develop a conceptualisation and instrument of CCEV construct in a social media context. First, drawing on the relevant literature, we determine the conceptual framework, definition, and assumptions of CCEV. Second, we employ grounded theory methodology to analyse customer review data from three representative social media sites and identify the dimensions of CCEV (four themes consisting of 10 dimensions). Third, we create an item pool of CCEV based on the prior work and in-depth interviews of 10 customers. In the fourth and fifth steps, we collect three waves of quantitative data to develop and validate the instrument including item refinement (n1 = 234), instrument validation (n2 = 521), and nomological validity examination (n3 = 615). The results indicate that the instrument exhibits satisfactory reliability and validity. Our work contributes to theory and practice by presenting a context-specific and fine-grained conceptualisation of CCEV and a reliable and valid survey instrument. Journal: European Journal of Information Systems Pages: 550-572 Issue: 3 Volume: 32 Year: 2023 Month: 05 X-DOI: 10.1080/0960085X.2021.2004939 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.2004939 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:3:p:550-572 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1967210_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Frantz Rowe Author-X-Name-First: Frantz Author-X-Name-Last: Rowe Author-Name: Dov Te’eni Author-X-Name-First: Dov Author-X-Name-Last: Te’eni Author-Name: Valéry Merminod Author-X-Name-First: Valéry Author-X-Name-Last: Merminod Title: The maturation of digital objects in innovation projects: the role of interpersonal networks and team sharing atmosphere Abstract: Innovation projects rely increasingly on digital objects as a means of developing and sharing knowledge within an organisation. The maturation of a digital object is important because only those objects that mature lead to actual products. There is, however, a catch 22. For objects to mature, they have to be shared; conversely, only mature objects tend to be shared. This interplay between the functional and social dimensions of object maturation and its role in product development has not been researched.Building on the relational view of objects, we theorise product development as an ensemble of myopic maturation processes of objects that recursively move between formal and informal networks in the organisation using sharing systems such as Product Lifecycle Management (PLM). Investigating patterns, i.e., sequences of events, in these maturation processes is a way to understand how firms overcome this catch 22 situation.We study four product innovation projects in a home appliances company, tracing the maturation and sharing processes of three types of digital objects, namely marketing specifications, technical specifications and virtual prototypes. We find that sharing – maturation patterns are affected by interpersonal networks and by team sharing atmosphere. We also find that sharing and object maturation interactions are coordinated informally through interpersonal networks and formally through PLM systems and stage-gate mechanisms. Journal: European Journal of Information Systems Pages: 434-461 Issue: 3 Volume: 32 Year: 2023 Month: 05 X-DOI: 10.1080/0960085X.2021.1967210 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1967210 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:3:p:434-461 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2175474_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Sirkka L. Jarvenpaa Author-X-Name-First: Sirkka L. Author-X-Name-Last: Jarvenpaa Author-Name: Lisen Selander Author-X-Name-First: Lisen Author-X-Name-Last: Selander Title: Between scale and impact: member prototype ambiguity in digital transformation Abstract: Digital transformation can produce scaling in numbers – growing organisational boundaries by adding new users, customers, or members. For membership-based organisations, such as social movement organisations (SMOs), digital scaling brings an inflow of new resources and members at a pace that previously was unimaginable, as well as mounting power and influence. But sustained rapid growth in new membership also can introduce a tension related to digital scaling and political or social impact. In this research, we trace this tension to member prototype ambiguity – that is, to a perceived variation in the attributes, assumptions, and actions of the new members entering the organisation. Such ambiguity can have a destabilising effect on collective identity that might significantly weaken the political or social impact of the SMO. In this longitudinal study of Amnesty International, we examine how digital transformation and scaling unveiled this tension and how the professional core at two of Amnesty’s national sections, Australia and Sweden, addressed the prototype ambiguity that ensued. This research contributes to the existing literature on digital transformation, prototype ambiguity, and social movements, by providing insight into the challenges and opportunities presented by digital scaling in membership-based organisations such as SMOs. Journal: European Journal of Information Systems Pages: 390-408 Issue: 3 Volume: 32 Year: 2023 Month: 05 X-DOI: 10.1080/0960085X.2023.2175474 File-URL: http://hdl.handle.net/10.1080/0960085X.2023.2175474 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:3:p:390-408 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1992306_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Sergey Samoilenko Author-X-Name-First: Sergey Author-X-Name-Last: Samoilenko Author-Name: Kweku-Muata Osei-Bryson Author-X-Name-First: Kweku-Muata Author-X-Name-Last: Osei-Bryson Title: An approach to modelling complex ICT4D investment problems: towards a solution-oriented framework and data analytics methodology Abstract: Economies of the world invest in ICT with the uniform purpose of obtaining socio-economic benefits. Determination of the most appropriate path of success linking ICT to socio-economic benefits is a complex multidimensional problem that is not amenable to methodological approaches based on a single perspective. Policy analysts and researchers are, therefore, in need of adequate tools for modelling and analysing the complex ICT4D investment problem. In this paper, we present a consistent solution-oriented theoretical and methodological approach that focuses on discovering pitfalls and best practices that the experience of travelling “ICT → outcomes” path may offer. Specifically, we ask: “What are some lessons that ‘newer entrants’ (represented by the economies of Sub-Saharan Africa (SSA)) may learn from ‘earlier travelers’ (represented by Transition Economies (TE))?” Among many findings is the difference in the sources of growth in productivity between the SSA- and TE-dominated groups of economies. Besides practical insights, this study offers several contributions to policy-makers and researchers including: a theoretical framework that allows for conceptually complex inquiries into the matters of ICT4D and a multi-method methodology that can be used to identify (a) important areas suitable for benchmarking and (b) differences requiring a customised context-specific approach. Journal: European Journal of Information Systems Pages: 529-549 Issue: 3 Volume: 32 Year: 2023 Month: 05 X-DOI: 10.1080/0960085X.2021.1992306 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1992306 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:3:p:529-549 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1977728_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Tahir Abbas Syed Author-X-Name-First: Tahir Abbas Author-X-Name-Last: Syed Author-Name: Martin Wiener Author-X-Name-First: Martin Author-X-Name-Last: Wiener Author-Name: Fahad Mehmood Author-X-Name-First: Fahad Author-X-Name-Last: Mehmood Author-Name: Mahmoud Abdelrahman Author-X-Name-First: Mahmoud Author-X-Name-Last: Abdelrahman Title: Control-style ambidexterity and information systems project performance: an expanded view of control activities Abstract: Information systems (IS) projects represent key building blocks of large-scale digital transformation and innovation initiatives. As a result, IS projects have become increasingly ambitious in terms of both goals and scale, making it even more challenging for managers to exercise control over such projects. While prior research focused primarily on the direct and interactive effects of formal and informal control modes on IS project performance, recent research directs attention to the importance of considering project managers’ control styles (i.e., how managers interact with controlees to enact controls). Corresponding studies also indicate that “either/or” control approaches – as opposed to “both/and” approaches – are no longer viable in today’s complex environment. As such, our study draws on an ambidexterity perspective to theoretically develop and empirically test the direct and interactive effects of control-style ambidexterity on IS project performance. Using matched-pair data from 146 IS projects (from 146 high-tech firms), we find that control-style ambidexterity improves project performance – directly and in combination with both formal and informal control. The study results contribute novel insights regarding the effective control of IS projects in the digital era and help explain mixed findings in prior literature, thereby facilitating continued theory development in the research area. Journal: European Journal of Information Systems Pages: 462-484 Issue: 3 Volume: 32 Year: 2023 Month: 05 X-DOI: 10.1080/0960085X.2021.1977728 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1977728 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:3:p:462-484 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2178742_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Felix Lorenz Author-X-Name-First: Felix Author-X-Name-Last: Lorenz Author-Name: Arne Buchwald Author-X-Name-First: Arne Author-X-Name-Last: Buchwald Title: A perfect match or an arranged marriage? How chief digital officers and chief information officers perceive their relationship: a dyadic research design Abstract: Several organisations have introduced a new leadership role, the Chief Digital Officer (CDO), as a centralised role in their top management team (TMT), tasked with accelerating and coordinating their digital transformation. While previous research proposes a complementary, tight alignment between the CDO and the Chief Information Officer (CIO), role redundancies and the fight for recognition and resources also suggest an inherent tension. We provide insights into the CIO-CDO collaboration quality based on role, TMT cooperation, conflict theory, and a dyadic design approach of 11 CIO-CDO relationships with 33 expert interviews in two waves. Our findings indicate that the CIO-CDO relationship may not always be as complementary as proposed in the literature; instead, in the vast majority of our dyads, there is too much role conflict to achieve tight alignment, leading to separation behaviour between the roles. We identify the involvement in the introduction of the other role, the CIO demand-side orientation, and the CDO supply-side orientation as important contingency factors determining the quality of the CIO-CDO relationship. Finally, unless the CIO-CDO relationship resembles a perfect match, a unified Chief Digital and Information Officer (CDIO) role may better resolve the challenges we identify in our sample’s dyads. Our insights extend the understanding of the CIO-CDO relationship. Journal: European Journal of Information Systems Pages: 372-389 Issue: 3 Volume: 32 Year: 2023 Month: 05 X-DOI: 10.1080/0960085X.2023.2178742 File-URL: http://hdl.handle.net/10.1080/0960085X.2023.2178742 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:3:p:372-389 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2187033_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Noel Carroll Author-X-Name-First: Noel Author-X-Name-Last: Carroll Author-Name: Nik Rushdi Hassan Author-X-Name-First: Nik Rushdi Author-X-Name-Last: Hassan Author-Name: Iris Junglas Author-X-Name-First: Iris Author-X-Name-Last: Junglas Author-Name: Thomas Hess Author-X-Name-First: Thomas Author-X-Name-Last: Hess Author-Name: Lorraine Morgan Author-X-Name-First: Lorraine Author-X-Name-Last: Morgan Title: Transform or be transformed: the importance of research on managing and sustaining digital transformations Abstract: Digital transformation is here to stay. With the emergence of new digital innovations and diverse and rich data sources, only those organisations that can adapt faster and make better, quicker decisions will become more competitive. Yet, being a first mover is only the start of the transformation process. Organisations need to address and implement digital strategies to manage and sustain a digital transformation in order to stay with, or ahead of, their competition. In this article, we outline some of the key challenges associated with researching digital transformations within the information systems (IS) field and stress the importance of shifting the focus on how digital transformations are managed and sustained. To explore this further, we launched a Special Issue on “Managing and Sustaining Digital Transformations” and received a large volume of submissions. After a series of reviews and revisions, we were delighted to unearth four excellent articles on this important topic. Our hope with this Special Issue is to improve researchers’ abilities to identify the importance of managing and sustaining digital transformations and to encourage them to build on these contributions to better unpack the digital transformation process for the future. Journal: European Journal of Information Systems Pages: 347-353 Issue: 3 Volume: 32 Year: 2023 Month: 05 X-DOI: 10.1080/0960085X.2023.2187033 File-URL: http://hdl.handle.net/10.1080/0960085X.2023.2187033 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:3:p:347-353 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1980444_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Adel Yazdanmehr Author-X-Name-First: Adel Author-X-Name-Last: Yazdanmehr Author-Name: Jingguo Wang Author-X-Name-First: Jingguo Author-X-Name-Last: Wang Title: Can peers help reduce violations of information security policies? The role of peer monitoring Abstract: Peers may help others avoid violating organisational information security policies (ISPs). This study explores how peer monitoring reduces employee ISP violation intention. We propose that peer monitoring discourages employees from violating ISP. Moreover, trust plays an important role. Trust not only facilitates peer monitoring, but also moderates the effect of peer monitoring on employee ISP violation intention. In addition, collective responsibility leads to peer monitoring. We test our research model with data from two waves of surveys of 254 employees in the United States conducted two weeks apart. We utilise four scenarios in the second wave of surveys capturing the dependent variable and measure all other constructs in the first wave of surveys. Our results suggest that peer monitoring decreases one’s intention to violate ISPs. Furthermore, both collective responsibility and trust contribute to peer monitoring. Finally, trust amplifies the effect of peer monitoring on employees’ intention to violate ISPs. We discuss the theoretical contributions and practical implications. Journal: European Journal of Information Systems Pages: 508-528 Issue: 3 Volume: 32 Year: 2023 Month: 05 X-DOI: 10.1080/0960085X.2021.1980444 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1980444 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:3:p:508-528 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_1977729_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Martin Wiener Author-X-Name-First: Martin Author-X-Name-Last: Wiener Author-Name: W. Alec Cram Author-X-Name-First: W. Alec Author-X-Name-Last: Cram Author-Name: Alexander Benlian Author-X-Name-First: Alexander Author-X-Name-Last: Benlian Title: Algorithmic control and gig workers: a legitimacy perspective of Uber drivers Abstract: Organisations increasingly rely on algorithms to exert automated managerial control over workers, referred to as algorithmic control (AC). The use of AC is already commonplace with platform-based work in the gig economy, where independent workers are paid for completing a given task (or “gig”). The combination of independent work alongside intensive managerial monitoring and guidance via AC raises questions about how gig workers perceive AC practices and judge their legitimacy, which could help explain critical worker behaviours such as turnover and non-compliance. Based on a three-dimensional conceptualisation of micro-level legitimacy tailored to the gig work context (autonomy, fairness, and privacy), we develop a research model that links workers’ perceptions of two predominant forms of AC (gatekeeping and guiding) to their legitimacy judgements and behavioural reactions. Using survey data from 621 Uber drivers, we find empirical support for the central role of micro-level legitimacy judgements in mediating the relationships between gig workers’ perceptions of different AC forms and their continuance intention and workaround use. Contrasting prior work, our study results show that workers do not perceive AC as a universally “bad thing” and that guiding AC is in fact positively related to micro-level legitimacy judgements. Theoretical and practical implications are discussed. Journal: European Journal of Information Systems Pages: 485-507 Issue: 3 Volume: 32 Year: 2023 Month: 05 X-DOI: 10.1080/0960085X.2021.1977729 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.1977729 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:3:p:485-507 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2018365_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Sara Moussawi Author-X-Name-First: Sara Author-X-Name-Last: Moussawi Author-Name: Marios Koufaris Author-X-Name-First: Marios Author-X-Name-Last: Koufaris Author-Name: Raquel Benbunan-Fich Author-X-Name-First: Raquel Author-X-Name-Last: Benbunan-Fich Title: The role of user perceptions of intelligence, anthropomorphism, and self-extension on continuance of use of personal intelligent agents Abstract: Personal Intelligent Agents (PIAs), such as Apple’s Siri and Amazon’s Alexa, are different from traditional information systems. They possess unique design features and are increasingly available through various technological devices. Due to PIAs’ relative novelty, little is known about the determinants of their continued use. An investigation into PIAs’ characteristics and their impact on users’ post-adoption evaluations is expected to have theoretical and practical implications for PIA design and sustained usage. Our research model integrates perceptions of intelligence, anthropomorphism, and self-extension into the unified model of information technology continuance. Our findings show the key role of perceived intelligence of the PIA on continuance intention and indicate that hedonic perceptions of the agent become less important during post-adoption. Our results also highlight the role of perceived ownership and personalisation as antecedents of perceived self-extension. Journal: European Journal of Information Systems Pages: 601-622 Issue: 3 Volume: 32 Year: 2023 Month: 05 X-DOI: 10.1080/0960085X.2021.2018365 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.2018365 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:3:p:601-622 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2041371_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Maximilian Schreieck Author-X-Name-First: Maximilian Author-X-Name-Last: Schreieck Author-Name: Manuel Wiesche Author-X-Name-First: Manuel Author-X-Name-Last: Wiesche Author-Name: Helmut Krcmar Author-X-Name-First: Helmut Author-X-Name-Last: Krcmar Title: Governing innovation platforms in multi-business organisations Abstract: Innovation platforms enable companies to create broad and dynamic portfolios of applications, which can be developed internally and externally. An increasing number of established companies from traditional industries have begun to explore the potential of innovation platforms. These companies are often organised as multi-business organisations (MBOs). When introducing innovation platforms, they face tensions between the corporate centre that runs such platforms and business units that develop applications on the platform. Established approaches to information technology (IT) governance in MBOs are ineffective in addressing these tensions because they focus on cross-business-unit synergies, rather than on innovation from business units. To explore this issue further, we conducted a longitudinal case study of an automotive manufacturer that introduced an innovation platform in its infotainment system. The company faced four tensions: rigidity, alteration, mistrust, and competition. To address these tensions, the company evolved its IT governance, allowing for more flexibility for business units, supporting their development efforts, and prioritising them over external complementors. The role of the corporate centre evolved from a gatekeeper to an enabler of innovation. Our findings link the literature on IT governance in MBOs with that of platform governance, providing insights into how MBOs benefit from innovation platforms. Journal: European Journal of Information Systems Pages: 695-716 Issue: 4 Volume: 32 Year: 2023 Month: 07 X-DOI: 10.1080/0960085X.2022.2041371 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2041371 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:4:p:695-716 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2023669_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Louise Harder Fischer Author-X-Name-First: Louise Harder Author-X-Name-Last: Fischer Author-Name: Richard Baskerville Author-X-Name-First: Richard Author-X-Name-Last: Baskerville Title: Explaining sociotechnical change: an unstable equilibrium perspective Abstract: Within the domain of Information Systems, assumptions around sociotechnical change cohesively build on establishing a stable and balanced relationship between the social and technical structures. When these structures become too rigid, revolutionary moments that punctuate the status quo are required for the structures to accommodate to a new situation. Approaching sociotechnical change with “punctuation of equilibrium” is becoming increasingly ineffective. In line with rising instability and rapid digital development, we argue that new sociotechnical change approaches are needed. In this paper we investigate how individual knowledge workers respond to the increasingly complex challenges they face when orchestrating social and technical structures to support efficient and creative knowledge work. We suggest a new perspective that covers an unstable equilibrium emerging from the interplay between individuals and their usage of “the collection of rigid and flexible workplace technologies”. Our study is based on data from interviews made with 40 knowledge professionals over a period of three years, inquiring into individual experiences with sociotechnical change. Our study reveals contradictory patterns of both technological-individualisation and -socialisation. A universal generative mechanism emerges when these patterns complement each other and generates continuous change that seems to diminish inertia from rigid structures while also intensifying agile responses. Journal: European Journal of Information Systems Pages: 634-652 Issue: 4 Volume: 32 Year: 2023 Month: 07 X-DOI: 10.1080/0960085X.2021.2023669 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.2023669 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:4:p:634-652 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2041372_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Hamed Qahri-Saremi Author-X-Name-First: Hamed Author-X-Name-Last: Qahri-Saremi Author-Name: Ali Reza Montazemi Author-X-Name-First: Ali Reza Author-X-Name-Last: Montazemi Title: Negativity bias in the diagnosticity of online review content: the effects of consumers’ prior experience and need for cognition Abstract: The importance of online review valence is a subject of debate among scholars. Prior studies mostly assumed valence as a “peripheral” cue derived from online review surface features (e.g., star ratings). This assumption has important implications as it restricts the negativity bias effects to a certain group of consumers who lack pertinent prior experience with the product/service domain and the motivation to assess the product/service. Focusing on online service context and drawing on an adaptational view to negative information, we investigate the negativity bias in the effects of the valence of the “content” of online reviews on consumers’ attitudes and show that it can be attributed to the higher perceived diagnosticity of negative reviews. This is determined by consumers’ in-depth elaborations of reviews’ contents, which are contingent on their prior experience with the domain of online service and need for cognition. Our findings provide a new perspective to negativity bias by showing that more experienced and thoughtful consumers are also influenced by negativity bias when the content of online reviews is considered. This is a novel account of negativity bias in the effects of online reviews that underscores the importance of response strategies for reducing their adverse effects. Journal: European Journal of Information Systems Pages: 717-734 Issue: 4 Volume: 32 Year: 2023 Month: 07 X-DOI: 10.1080/0960085X.2022.2041372 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2041372 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:4:p:717-734 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2039563_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Isabelle Walsh Author-X-Name-First: Isabelle Author-X-Name-Last: Walsh Author-Name: Frantz Rowe Author-X-Name-First: Frantz Author-X-Name-Last: Rowe Title: BIBGT: combining bibliometrics and grounded theory to conduct a literature review Abstract: In the current context of scientific information overload, we propose a method combining bibliometrics and grounded theory to conduct literature reviews that have a descriptive, understanding or explanatory purpose. This overall inductive combined method, which we name BIBGT (BIB = Bibliometrics; GT = Grounded Theory) provides a powerful instrument for researchers. This instrument has been made more readily accessible by recent technological developments, and scientific advances in the field of bibliometrics. Notably, BIBGT helps grounded theorists identify colleges of thought of the field being reviewed, and representative texts to be reviewed in depth, in each college; it improves the trustworthiness and efficiency of reviews. BIBGT helps bibliometricians achieve in-depth analysis and interpretation of their findings. For all researchers, BIBGT can nurture the emergence of novel insights towards in-depth description, understanding or explanation of a core concept, theme, or research domain.We detail the four steps of this flexible method, providing essential elements and some guidelines as well as an illustration, to help other researchers who wish to apply it. Journal: European Journal of Information Systems Pages: 653-674 Issue: 4 Volume: 32 Year: 2023 Month: 07 X-DOI: 10.1080/0960085X.2022.2039563 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2039563 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:4:p:653-674 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2018366_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Nan Liang Author-X-Name-First: Nan Author-X-Name-Last: Liang Author-Name: Rudy Hirschheim Author-X-Name-First: Rudy Author-X-Name-Last: Hirschheim Author-Name: Danli Chen Author-X-Name-First: Danli Author-X-Name-Last: Chen Title: Using argument analysis to understand the efficacy of written communication for disseminating academic findings to practitioners Abstract: While the IS field has devoted significant effort to improving written communication to disseminate academic research findings, little attention has been given to the issue of soliciting feedback from practitioners about these communications. This paper explores the question of how to engage practitioners with written communication that aims to disseminate academic findings. Three empirical studies are undertaken, each analysing various types of written communication using the lens of argument. Our results suggest two archetypes for supporting arguments: a warrant-using approach and a warrant-establishing approach, each of which offers different ways to conceive of engaging with practitioner readers. Several proposals are offered as potential avenues for better engaging practitioners via written communication. Journal: European Journal of Information Systems Pages: 623-633 Issue: 4 Volume: 32 Year: 2023 Month: 07 X-DOI: 10.1080/0960085X.2021.2018366 File-URL: http://hdl.handle.net/10.1080/0960085X.2021.2018366 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:4:p:623-633 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2046515_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Kuan-Lin Chen Author-X-Name-First: Kuan-Lin Author-X-Name-Last: Chen Author-Name: Astrid Lassen Author-X-Name-First: Astrid Author-X-Name-Last: Lassen Author-Name: Chen Li Author-X-Name-First: Chen Author-X-Name-Last: Li Author-Name: Charles Møller Author-X-Name-First: Charles Author-X-Name-Last: Møller Title: Exploring the value of IoT data as an enabler of the transformation towards servitization: an action design research approach Abstract: Servitization is a well-recognised phenomenon in the manufacturing industry. Business potentials are demonstrated mainly from the marketing perspective on servitization. However, increased digitalisation makes servitization interesting to other research areas. This paper applies the resource-based view (RBV) to argue how to value the data and explore its potential and impact on servitization. We examine the evolving role of information technology (IT), particularly of the Internet of Things (IoT), and the role of data in the servitization journey. This research is based on a longitudinal study of a product-oriented manufacturing company’s transformation towards servitization. The engagement with the company also includes the development of an IT platform that consolidates IoT and enterprise data, which enables managers to explore new data-based insights. Our goal is to investigate the organisation and in particular cross-functional effects of data-based insights and their impact on supporting strategic decision-making. The action design research (ADR) approach is applied to unfold the servitizing activities inside the organisation and extract the lesson learned into the joint domains of servitization and information systems research. First, we argued that exploring the value of data is becoming a more complex process. Rather than having one design perspective, technical concerns, business considerations, and operational purpose must be aligned to frame the value of data to support decision-making. Second, we discuss the emerging managerial implications, especially the role of IT in the transformation. A cross-functional team is a prerequisite to exploring complex transformation projects. Thus, managers must recognise the problematic situation and bootstrap the available organisational resources. Finally, we provide empirical evidence on how scholars and practitioners can address mutual interests by applying the ADR approach to a transformation project. In summary, servitizing a product-centric manufacturing firm to have a digital services business model is a transformation involving complex social and organisational relations. This study advocates resource-based analysis as a lens and demonstrates how IT and data as heterogeneous and imperfectly mobile resources create value for a product-oriented manufacturing company. However, a critical question remains on how to manage the expanding operational condition of a servitizing organisation and its business system to sustain its competitive advantage and win the digital market. Journal: European Journal of Information Systems Pages: 735-761 Issue: 4 Volume: 32 Year: 2023 Month: 07 X-DOI: 10.1080/0960085X.2022.2046515 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2046515 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:4:p:735-761 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2039564_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Magno Queiroz Author-X-Name-First: Magno Author-X-Name-Last: Queiroz Author-Name: Paul P. Tallon Author-X-Name-First: Paul P. Author-X-Name-Last: Tallon Author-Name: Tim Coltman Author-X-Name-First: Tim Author-X-Name-Last: Coltman Author-Name: Rajeev Sharma Author-X-Name-First: Rajeev Author-X-Name-Last: Sharma Title: Conditional paths to business unit agility: corporate IT platforms and the moderating role of business unit IT autonomy Abstract: Agility has long been recognised as a key determinant of organisational performance. The pursuit of agility within business units (BUs) is challenging as IT executives in multi-business organisations (MBOs) are tasked with balancing a need for organisation-wide IT synergies against a desire among BUs for local IT solutions that enable agility in their end markets. MBOs are increasingly turning to corporate IT platforms to respond to their BUs’ IT needs but doing so presents a challenge to BU IT autonomy and, in turn, to BU agility. In this paper, we posit that BU agility is determined by resource synergies based on the interplay between corporate IT platforms and local, BU-controlled, IT applications. These applications lead to greater BU process digitisation and, in turn, to expanded BU agility. We evaluate our model using data from an international survey of IT executives in MBOs. Our findings provide support for our model and, in so doing, identify different paths that MBOs can take to enhance BU agility. Our contribution affirms the value of corporate IT platforms for BU agility but suggests that MBOs should tread carefully when developing corporate IT platforms that coincide with mandatory use of shared IT applications. Journal: European Journal of Information Systems Pages: 675-694 Issue: 4 Volume: 32 Year: 2023 Month: 07 X-DOI: 10.1080/0960085X.2022.2039564 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2039564 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:4:p:675-694 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2073278_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mariia Golovianko Author-X-Name-First: Mariia Author-X-Name-Last: Golovianko Author-Name: Svitlana Gryshko Author-X-Name-First: Svitlana Author-X-Name-Last: Gryshko Author-Name: Vagan Terziyan Author-X-Name-First: Vagan Author-X-Name-Last: Terziyan Author-Name: Tuure Tuunanen Author-X-Name-First: Tuure Author-X-Name-Last: Tuunanen Title: Responsible cognitive digital clones as decision-makers: a design science research study Abstract: This study uses a design science research methodology to develop and evaluate the Pi-Mind agent, an information technology artefact that acts as a responsible, resilient, ubiquitous cognitive clone – or a digital copy – and an autonomous representative of a human decision-maker. Pi-Mind agents can learn the decision-making capabilities of their “donors” in a specific training environment based on generative adversarial networks. A trained clone can be used by a decision-maker as an additional resource for one’s own cognitive enhancement, as an autonomous representative, or even as a replacement when appropriate. The assumption regarding this approach is as follows: when someone was forced to leave a critical process because of, for example, sickness, or wanted to take care of several simultaneously running processes, then they would be more confident knowing that their autonomous digital representatives were as capable and predictable as their exact personal “copy”. The Pi-Mind agent was evaluated in a Ukrainian higher education environment and a military logistics laboratory. In this paper, in addition to describing the artefact, its expected utility, and its design process within different contexts, we include the corresponding proof of concept, proof of value, and proof of use. Journal: European Journal of Information Systems Pages: 879-901 Issue: 5 Volume: 32 Year: 2023 Month: 09 X-DOI: 10.1080/0960085X.2022.2073278 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2073278 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:5:p:879-901 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2070557_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Corey Baham Author-X-Name-First: Corey Author-X-Name-Last: Baham Author-Name: Pankush Kalgotra Author-X-Name-First: Pankush Author-X-Name-Last: Kalgotra Author-Name: Forough Nasirpouri Shadbad Author-X-Name-First: Forough Author-X-Name-Last: Nasirpouri Shadbad Author-Name: Ramesh Sharda Author-X-Name-First: Ramesh Author-X-Name-Last: Sharda Title: Generational differences in handling technology interruptions: a qualitative study Abstract: Digital native and digital immigrant user types characterise the differences between those who grew up in a world of ubiquitous information systems and those who pre-date it. The rise in computer-mediated communication (CMC) technologies such as emails, text messages, and social media creates more opportunities for interruptions. Researchers have explored the impact of growing up in a world of technology. However, little research has explored the potential differences between digital natives and digital immigrants handling technology interruptions. This paper uses a qualitative approach to examine the extent to which individuals handle CMC interruptions differently based on the role of technology and its level of pervasiveness in the environment in which they grew up. Thirty-three interviews were conducted with individuals from different population groups based on age and gender to understand how technology interruptions are handled in work and social life. The findings support existing pre- and post-technology interruption frameworks and explain how and why generational differences exist in the process of CMC interruption handling. The theoretical and practical implications are discussed. Journal: European Journal of Information Systems Pages: 858-878 Issue: 5 Volume: 32 Year: 2023 Month: 09 X-DOI: 10.1080/0960085X.2022.2070557 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2070557 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:5:p:858-878 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2062468_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Simon Bründl Author-X-Name-First: Simon Author-X-Name-Last: Bründl Author-Name: Christian Matt Author-X-Name-First: Christian Author-X-Name-Last: Matt Author-Name: Thomas Hess Author-X-Name-First: Thomas Author-X-Name-Last: Hess Author-Name: Simon Engert Author-X-Name-First: Simon Author-X-Name-Last: Engert Title: How synchronous participation affects the willingness to subscribe to social live streaming services: the role of co-Interactive behavior on Twitch Abstract: Social computing has transformed the content industry. Content providers have changed from providing merely content to offering social content experiences that allow users not only to passively consume content but also to actively participate. As the latest development, social live streaming services (SLSS) have emerged that enable so-called co-interactive behaviour, i.e., the live interplay between users while co-experiencing content. Yet, it remains unclear how co-interactive behaviour affects the monetisation of social live content. Based on a data set of 868,940 users from 59 gaming channels of the freemium-based SLSS Twitch, we empirically show that co-interactive behaviour has a stronger effect on users’ willingness to subscribe (WTS) than passive and active behaviour. Since we find that a user’s reciprocated interactions also directly increase other users’ WTS, our results call for dismantling the current dichotomy of user participation and social influences in IS research. We suggest a social-experiential perspective that integrates social influences as an inherent part of users’ participation experiences. This novel interactive second-person perspective contributes to research on user engagement and value capture on social content platforms, and it allows SLSS providers to obtain a more precise picture of user value to better develop or adapt their monetisation strategies. Journal: European Journal of Information Systems Pages: 800-817 Issue: 5 Volume: 32 Year: 2023 Month: 09 X-DOI: 10.1080/0960085X.2022.2062468 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2062468 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:5:p:800-817 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2057363_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Xiaolin Lin Author-X-Name-First: Xiaolin Author-X-Name-Last: Lin Author-Name: Xuequn Wang Author-X-Name-First: Xuequn Author-X-Name-Last: Wang Title: Towards a model of social commerce: improving the effectiveness of e-commerce through leveraging social media tools based on consumers’ dual roles Abstract: Social media has been integrated into traditional e-commerce, creating an innovative technology-based approach to changing business practice and service, yet few researchers have attempted to provide an understanding of how this approach is changing consumer decision-making and purchase behaviours. Combining the expectation-confirmation theory and the expectation-confirmation model and information systems continuance, we propose a model for social commerce, illustrating how social media is utilised in online shopping as a three-fold process (pre-purchase, purchase, and post-purchase stages) from a consumer perspective. The model consists of three phases: social commerce motivation, social commerce adoption, and e-commerce effectiveness. Using two rounds of surveys, we find that (1) autonomous motivation and controlled motivation have positive effects on social commerce information seeking and sharing, and (2) social commerce information seeking formulates consumers’ pre-purchase decisions, thus affecting their actual purchase outcomes, repurchase intentions, and social commerce information-sharing intentions in the post-purchase stage. In addition, our study indicates that consumers may play dual roles in social commerce: as information seekers in the pre-purchase stage and as information providers in the post-purchase stage. Our findings have important implications for literature and practice. Journal: European Journal of Information Systems Pages: 782-799 Issue: 5 Volume: 32 Year: 2023 Month: 09 X-DOI: 10.1080/0960085X.2022.2057363 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2057363 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:5:p:782-799 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2062469_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: John Tripp Author-X-Name-First: John Author-X-Name-Last: Tripp Author-Name: D. Harrison McKnight Author-X-Name-First: D. Harrison Author-X-Name-Last: McKnight Author-Name: Nancy Lankton Author-X-Name-First: Nancy Author-X-Name-Last: Lankton Title: What most influences consumers’ intention to use? Different motivation and trust stories for uber, airbnb, and taskrabbit Abstract: While many factors drive the sharing economy’s growth, trust and motivations play critical roles. However, which factors are more important to young consumers? This research compares a trust model with a motivation model for predicting intention to use Airbnb, Uber, and TaskRabbit, comparing within each platform, not between them. The study uses a survey sample of Midwest United States business undergraduates (nearly all Generation Z). Each sample varies in experience levels: relatively high experience Uber respondents, very low experience TaskRabbit respondents, and medium experience for Airbnb. Results show that within Uber, the trust model predicts significantly better than the motivation model. Within Airbnb and TaskRabbit, the motivation model predicts only slightly better. By combining the trust and motivation variables into one model by platform, we find differing degrees of complementarity between the trust and motivation variables, with those for Airbnb being the most complementary in terms of predictive power and those for Uber being the least complementary. Within Airbnb and TaskRabbit, combining the trust and motivation models shows the two most significant variables were enjoyment and trusting intention. Within Uber, trusting intention and trusting beliefs in the provider were the most significant. We provide implications and directions for future research. Journal: European Journal of Information Systems Pages: 818-840 Issue: 5 Volume: 32 Year: 2023 Month: 09 X-DOI: 10.1080/0960085X.2022.2062469 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2062469 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:5:p:818-840 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2075801_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Sonja Sperber Author-X-Name-First: Sonja Author-X-Name-Last: Sperber Author-Name: Christian Linder Author-X-Name-First: Christian Author-X-Name-Last: Linder Title: Gender bias in IT entrepreneurship: the self-referential role of male overrepresentation in digital businesses Abstract: Drawing on optimal distinctiveness theory and Jellinek’s concept of the Normative Force of the Factual, we provide an alternative explanation for how the normality of gender imbalance in IT-driven start-ups (i.e., the fact that there are far more men than women) becomes normativity (what everyone expects to see), and eventually an imperative for those desiring to enter the field. We uncover the process used to pressure female founders of IT start-ups into being like the prototypical actor, usually male, and how failing to do so reduces audience support. This process is self-referential and self-enforcing and thus detached from efforts to reduce hurdles and obstacles for female founders. Our article provides recommendations on how to break this self-referential cycle. Journal: European Journal of Information Systems Pages: 902-919 Issue: 5 Volume: 32 Year: 2023 Month: 09 X-DOI: 10.1080/0960085X.2022.2075801 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2075801 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:5:p:902-919 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2067490_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Qian Chen Author-X-Name-First: Qian Author-X-Name-Last: Chen Author-Name: Yeming Gong Author-X-Name-First: Yeming Author-X-Name-Last: Gong Author-Name: Yaobin Lu Author-X-Name-First: Yaobin Author-X-Name-Last: Lu Author-Name: Patrick Y.K. Chau Author-X-Name-First: Patrick Y.K. Author-X-Name-Last: Chau Title: How mindfulness decreases cyberloafing at work: a dual-system theory perspective Abstract: Cyberloafing is a prevalent phenomenon in organisations that may cause serious problems. In previous studies, cyberloafing has been studied as planned and intentional behaviour. Interestingly, we have observed that cyberloafing frequently happens when employees use smartphones to assist with work tasks, but they may not necessarily intend to engage in this activity. We distinguish between active and passive cyberloafing and focus on studying the latter. Based on dual-systems theory, we introduce the construct of mindfulness in the exploration of the antecedences and internal mechanism of passive cyberloafing. We conducted a research survey with employees who use smartphones to assist with work tasks and collected 474 valid questionnaires to examine our research model. The results showed that dual systems are associated with cyberloafing by influencing mind-wandering, and mindfulness significantly decreased mind-wandering when using a smartphone. This study analyses cyberloafing from an innovative neuroscience perspective and contributes to the literature by proposing a new classification of cyberloafing behaviour, reveals the internal mechanism of how dual systems impact an individual’s behaviour, and introduces mindfulness as an antecedent factor of dual systems. Journal: European Journal of Information Systems Pages: 841-857 Issue: 5 Volume: 32 Year: 2023 Month: 09 X-DOI: 10.1080/0960085X.2022.2067490 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2067490 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:5:p:841-857 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2046516_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Daniel Curto-Millet Author-X-Name-First: Daniel Author-X-Name-Last: Curto-Millet Author-Name: Alberto Corsín Jiménez Author-X-Name-First: Alberto Author-X-Name-Last: Corsín Jiménez Title: The sustainability of open source commons Abstract: The sustainability of commons has benefited from Elinor Ostrom´s analysis of shared resources. In her work, sustainability was described in a univocal manner–successful or not–depending on the common’s long-term capacity to survive within an uncertain environment. In recent years, this view of sustainability has been applied to the study of digital commons, including open source. Building on more recent work on sustainability, this paper challenges this univocal conception of sustainability in open source. Through a critical review of the literature, it unveils the coexistence of multiple notions of sustainability in open source and proposes a typology of sustainabilities (resource-based, infrastructural, and interactional). We propose that the degree and quality of the interrelationship between these different types of sustainability need to be explored, leading to the theorisation of three possible scenarios (trade-offs, synergy, and independence). We discuss and put forward a research agenda. Journal: European Journal of Information Systems Pages: 763-781 Issue: 5 Volume: 32 Year: 2023 Month: 09 X-DOI: 10.1080/0960085X.2022.2046516 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2046516 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:5:p:763-781 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2103045_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Jannis Beese Author-X-Name-First: Jannis Author-X-Name-Last: Beese Author-Name: Stephan Aier Author-X-Name-First: Stephan Author-X-Name-Last: Aier Author-Name: Kazem Haki Author-X-Name-First: Kazem Author-X-Name-Last: Haki Author-Name: Robert Winter Author-X-Name-First: Robert Author-X-Name-Last: Winter Title: The impact of enterprise architecture management on information systems architecture complexity Abstract: Significant investments in information systems (IS) over the past decades have led to increasingly complex IS architectures in organisations, which are difficult to understand, operate, and maintain. We investigate this development and associated challenges through a conceptual model that distinguishes four constituent elements of IS architecture complexity by differentiating technological from organisational aspects and structural from dynamic aspects. Building on this conceptualisation, we hypothesise relations between these four IS architecture complexity constructs and investigate their impact on architectural outcomes (i.e., efficiency, flexibility, transparency, and predictability). Using survey data from 249 IS managers, we test our model through a partial least squares (PLS) approach to structural equation modelling (SEM). We find that organisational complexity drives technological complexity and that structural complexity drives dynamic complexity. We also demonstrate that increasing IS architecture complexity has a significant negative impact on efficiency, flexibility, transparency, and predictability. Finally, we show that enterprise architecture management (EAM) helps to offset these negative effects by acting as a moderator in the relation between organisational and technological IS architecture complexity. Thus, organisations without adequate EAM are likely to face large increases in technological complexity due to increasing organisational complexity, whereas organisations with adequate EAM exhibit no such relation. Journal: European Journal of Information Systems Pages: 1070-1090 Issue: 6 Volume: 32 Year: 2023 Month: 11 X-DOI: 10.1080/0960085X.2022.2103045 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2103045 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:6:p:1070-1090 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2103044_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Rachida F Parks Author-X-Name-First: Rachida F Author-X-Name-Last: Parks Author-Name: Rolf T Wigand Author-X-Name-First: Rolf T Author-X-Name-Last: Wigand Author-Name: Paul Benjamin Lowry Author-X-Name-First: Paul Author-X-Name-Last: Benjamin Lowry Title: Balancing information privacy and operational utility in healthcare: proposing a privacy impact assessment (PIA) framework Abstract: One needs to look only at recent data breaches to be reminded of the severe and far-reaching damage caused by privacy threats. In light of these threats, global healthcare leaders are striving to understand how to protect patient information without the loss of benefits (utility) that results from privacy-preserving mechanisms. Consequently, our study examines the relatively unexplored issue of simultaneously responding to information privacy threats and maintaining utility in a healthcare privacy compliance context. Counterintuitively, we also identify a symbiotic relationship between these two focal and interdependent efforts. We adopt an interpretive qualitative research method leveraging the value-focused thinking (VFT) approach which results in two major contributions: (1) the development of a value-driven framework presented as a means-end objective network providing a list of 16 means objectives and seven key fundamental objectives enabling higher-quality privacy decision making vis-à-vis privacy and utility. Our second and central contribution (2) is a theoretical framework of privacy impact assessment (PIA) emphasising the interplay and balance between making appropriate decisions in responding to information privacy while not hindering healthcare operations. This work provides the foundation for proposing four compelling propositions for future healthcare privacy research. Journal: European Journal of Information Systems Pages: 1052-1069 Issue: 6 Volume: 32 Year: 2023 Month: 11 X-DOI: 10.1080/0960085X.2022.2103044 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2103044 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:6:p:1052-1069 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2096491_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Fereshteh Ghahramani Author-X-Name-First: Fereshteh Author-X-Name-Last: Ghahramani Author-Name: Adel Yazdanmehr Author-X-Name-First: Adel Author-X-Name-Last: Yazdanmehr Author-Name: Daniel Chen Author-X-Name-First: Daniel Author-X-Name-Last: Chen Author-Name: Jingguo Wang Author-X-Name-First: Jingguo Author-X-Name-Last: Wang Title: Continuous improvement of information security management: an organisational learning perspective Abstract: This study explores ways to empower organisations to continuously improve their information security management (ISM). Drawing upon the dynamic capabilities approach, we investigated the mechanism wherein absorptive capacity has an effect. We found that absorptive capacity affects an organisation’s continuous improvement of ISM, with its effect mediated through an organisation’s adaptability to information security threats. In addition, the effect of absorptive capacity on adaptability is contingent upon the organisation’s competitive pressure, which enhances the mediating effect of adaptability. We tested our research model using survey data collected from 130 US-based managers familiar with information security management in their organisations. Theoretical and practical implications of the study are discussed. Journal: European Journal of Information Systems Pages: 1011-1032 Issue: 6 Volume: 32 Year: 2023 Month: 11 X-DOI: 10.1080/0960085X.2022.2096491 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2096491 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:6:p:1011-1032 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2078235_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Zhen Shao Author-X-Name-First: Zhen Author-X-Name-Last: Shao Author-Name: Jose Benitez Author-X-Name-First: Jose Author-X-Name-Last: Benitez Author-Name: Jing Zhang Author-X-Name-First: Jing Author-X-Name-Last: Zhang Author-Name: Hanqing Zheng Author-X-Name-First: Hanqing Author-X-Name-Last: Zheng Author-Name: Aseel Ajamieh Author-X-Name-First: Aseel Author-X-Name-Last: Ajamieh Title: Antecedents and performance outcomes of employees’ data analytics skills: an adaptation structuration theory-based empirical investigation Abstract: How do organizations develop and manage employees’ data analytics skills to create business value and enhance organizational competitive advantage? In order to address this prominent and critical research question for IS research, we conceptualize and operationalize data analytics skills at the individual level and develop a nomological network model to examine its critical antecedents and outcomes from the lens of adaptation structuration theory. We test our core proposition and research model using survey data collected from 258 frontline employees of three data-intensive research institutes in China. We discover that data-driven culture, data analytics affordance, and individual absorptive capacity are positively associated with employees’ data analytics skills, which in turn, have positive influences on their task and innovative performance. We classify the employees into digital immigrants and digital natives based on age and examine the different influences of three salient antecedents on data analytics skills between the two groups. The research findings suggest that data-driven culture plays a more significant role in driving data analytics skills for digital immigrants, while data analytics affordance exhibits a stronger influence on data analytics skills for digital natives. Journal: European Journal of Information Systems Pages: 921-940 Issue: 6 Volume: 32 Year: 2023 Month: 11 X-DOI: 10.1080/0960085X.2022.2078235 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2078235 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:6:p:921-940 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2085201_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Philip W Yetton Author-X-Name-First: Philip W Author-X-Name-Last: Yetton Author-Name: Stefan Henningsson Author-X-Name-First: Stefan Author-X-Name-Last: Henningsson Author-Name: Markus Böhm Author-X-Name-First: Markus Author-X-Name-Last: Böhm Author-Name: Jan Marco Leimeister Author-X-Name-First: Jan Marco Author-X-Name-Last: Leimeister Author-Name: Helmut Krcmar Author-X-Name-First: Helmut Author-X-Name-Last: Krcmar Title: How IT carve-out project complexity influences divestor performance in M&As Abstract: IT carve-out projects are complex and cost-intensive components of M&A transactions. Existing research sheds little light on the determinants of IT carve-out project complexity and/or its effects on divestor performance. Instead, research has focused on the post-acquisition IT integration project and acquirer performance. This paper presents the first divestor-centric model of IT transactions from the divestor to the acquirer when a Business Unit in a Multi-Business Organization (MBO) is carved out and integrated into another MBO. The model explains how divestor business and IT alignment pre-conditions contribute to increased IT carve-out project complexity. Such complexity increases IT carve-out project time to physical IT separation and creates IT stranded assets, which decrease post-divestment business, IT alignment and divestor performance. The current recommended strategy of adopting transitional service agreements (TSAs) to handle IT carve-out complexity is compared with two new proactive strategies derived from the model. TSA-based strategies restrict the divestor from both decommissioning IT stranded assets and reconfiguring its IT assets to support its new post-divestment business strategy. The two new strategies address IT carve-out complexity without incurring the negative effects from adopting TSAs. Journal: European Journal of Information Systems Pages: 962-988 Issue: 6 Volume: 32 Year: 2023 Month: 11 X-DOI: 10.1080/0960085X.2022.2085201 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2085201 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:6:p:962-988 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2099767_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Adel Yazdanmehr Author-X-Name-First: Adel Author-X-Name-Last: Yazdanmehr Author-Name: Yuan Li Author-X-Name-First: Yuan Author-X-Name-Last: Li Author-Name: Jingguo Wang Author-X-Name-First: Jingguo Author-X-Name-Last: Wang Title: Does stress reduce violation intention? Insights from eustress and distress processes on employee reaction to information security policies Abstract: Past research suggests that the demands of information security policies (ISPs) cause stress upon employees, leading them to violate the policies. It emphasises the distress process but overlooks a possible positive process that may arise from the ISP demands (i.e., the eustress process) and motivate employees to reduce ISP violations. This study explores both the distress and eustress processes. It proposes that the challenge and hindrance aspects of ISP demands induce these processes and subsequently affect ISP violations. Besides, employees’ ISP-related self-efficacy may facilitate or impede these processes. To test the research model, a survey was conducted on 375 employees in the U.S. The results show that the challenge aspect of ISP demands elicits a positive psychological response of employees, which in turn triggers their planful problem-solving to deal with these demands. In contrast, the hindrance aspect of ISP demands provokes a negative psychological response that triggers employees’ wishful thinking about ISP demands. Meanwhile, employees’ self-efficacy strengthens the effect of positive psychological response on planful problem-solving. Subsequently, planful problem-solving reduces employees’ intention to violate the ISP, while wishful thinking increases their intention. This dual-process view sheds new light on the connection between ISP demands and ISP violation intention. Journal: European Journal of Information Systems Pages: 1033-1051 Issue: 6 Volume: 32 Year: 2023 Month: 11 X-DOI: 10.1080/0960085X.2022.2099767 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2099767 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:6:p:1033-1051 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2081096_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ioanna Constantiou Author-X-Name-First: Ioanna Author-X-Name-Last: Constantiou Author-Name: Alivelu Mukkamala Author-X-Name-First: Alivelu Author-X-Name-Last: Mukkamala Author-Name: Mimmi Sjöklint Author-X-Name-First: Mimmi Author-X-Name-Last: Sjöklint Author-Name: Matthias Trier Author-X-Name-First: Matthias Author-X-Name-Last: Trier Title: Engaging with self-tracking applications: how do users respond to their performance data? Abstract: Self-tracking devices and applications have become popular in recent years and changed user behaviour. Previous research has primarily focused on the adoption of self-tracking devices and their effects on self-assessment. As adoption increases, user engagement becomes prominent for the continuous use of the devices and the applications. In this study, we focus on user engagement with activity tracking applications, e.g., Fitbit Flex and Jawbone Up that offer data on user performance. We collected data from semi-structured interviews with 54 participants. We propose a process model comprising four stages which involve distinct user interactions with data: review, react, reflect, and respond. We advance research in this domain by the proposed process model that explicates user engagement in two cases: when the user encounters satisfactory or unsatisfactory results. In the latter case, we depict four response tactics when users are confronted with unsatisfactory results. Journal: European Journal of Information Systems Pages: 941-961 Issue: 6 Volume: 32 Year: 2023 Month: 11 X-DOI: 10.1080/0960085X.2022.2081096 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2081096 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:6:p:941-961 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2096489_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Manfred Schoch Author-X-Name-First: Manfred Author-X-Name-Last: Schoch Author-Name: Henner Gimpel Author-X-Name-First: Henner Author-X-Name-Last: Gimpel Author-Name: Andreas Maier Author-X-Name-First: Andreas Author-X-Name-Last: Maier Author-Name: Kathrin Neumeier Author-X-Name-First: Kathrin Author-X-Name-Last: Neumeier Title: From broken habits to new intentions: how COVID-19 expands our knowledge on post-adoptive use behaviour of digital communication and collaboration Abstract: The COVID-19 pandemic has caused an unprecedented surge in digital communication and collaboration. While a rich body of knowledge exists on IS use, our understanding of changes in post-adoptive use behaviour regarding communication and collaboration is comparatively limited. Existing models assume decreasing growth rates over time and are not designed to capture spikes in use behaviour such as the one observed during the pandemic. In this mixed methods study, we propose a hybrid model of sensemaking and post-adoptive communication and collaboration use that explains changes in use behaviour and outlines the influence of external trigger events. Based on real-world data from MS Teams, we show that individual feature use varies over time, with an increasing growth rate triggered by COVID-19. To understand drivers for the heterogeneous changes, we further conduct qualitative interviews. We find habits were deliberately altered during COVID-19 and replaced with new intentions through sensemaking. We derive propositions that may encourage further research into the subject. Extended knowledge of post-adoptive behaviour and its triggers assists practitioners in adjusting to the new normal or reacting to new situations beyond COVID-19. Journal: European Journal of Information Systems Pages: 989-1010 Issue: 6 Volume: 32 Year: 2023 Month: 11 X-DOI: 10.1080/0960085X.2022.2096489 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2096489 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:32:y:2023:i:6:p:989-1010 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2110000_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20231214T103247 git hash: d7a2cb0857 Author-Name: Sven Beisecker Author-X-Name-First: Sven Author-X-Name-Last: Beisecker Author-Name: Christian Schlereth Author-X-Name-First: Christian Author-X-Name-Last: Schlereth Author-Name: Sebastian Hein Author-X-Name-First: Sebastian Author-X-Name-Last: Hein Title: Shades of fake news: how fallacies influence consumers’ perception Abstract: So far, fake news has been mostly associated with fabricated content that intends to manipulate or shape opinions. In this manuscript, we aim to establish that the perception of information as fake news is influenced by not only fabricated content but also by the rhetorical device used (i.e., how news authors phrase the message). Based on argumentation theory, we advance that fallacies – a subset of well-known deceptive rhetorical devices – share a conceptual overlap with fake news and are therefore suitable for shedding light on the issue’s grey areas. In a first two-by-two, between-subject, best-worst scaling experiment (case 1), we empirically test whether fallacies are related to the perception of information as fake news and to what extent a reader can identify them. In a second two-by-two experiment, we presume that a reader believes that some of a sender’s messages contain fake news and investigate recipients’ subsequent reactions. We find that users distinguish nuances based on the applied fallacies; however, they will not immediately recognise some fallacies as fake news while overemphasising others. Regarding users’ reactions, we observe a more severe reaction when the message identified as fake news comes from a company instead of an acquaintance. Journal: European Journal of Information Systems Pages: 41-60 Issue: 1 Volume: 33 Year: 2024 Month: 01 X-DOI: 10.1080/0960085X.2022.2110000 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2110000 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:33:y:2024:i:1:p:41-60 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2115410_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20231214T103247 git hash: d7a2cb0857 Author-Name: Jiban Khuntia Author-X-Name-First: Jiban Author-X-Name-Last: Khuntia Author-Name: Terence Saldanha Author-X-Name-First: Terence Author-X-Name-Last: Saldanha Author-Name: Abhishek Kathuria Author-X-Name-First: Abhishek Author-X-Name-Last: Kathuria Author-Name: Mohan Rao Tanniru Author-X-Name-First: Mohan Rao Author-X-Name-Last: Tanniru Title: Digital service flexibility: a conceptual framework and roadmap for digital business transformation Abstract: Due to the growing need to continually generate customer value, firms must be flexible to address changing business environments and customer expectations. Although research has examined Information Technology (IT) flexibility, the nuances of IT flexibility in services have received limited attention. This study uses a three-stage roadmap to build digital service flexibility. First, using prior research on services and IT flexibility, we articulate three dimensions for digital services flexibility (DSF): core DSF, transaction DSF, and customer DSF. Second, we propose a theoretical customer-service value framework as a blueprint for service firms to align their strategies along these three DSF dimensions using four propositions. Third, for DSF to be applied in practice, we discuss contextual and situational embeddedness to support digital transformation for services. We use a practical application of DSF using a multi-year case study that aligns service innovations inside and outside a patient room in a hospital setting. The main contributions of this study lie in a) conceptualizing digital service flexibility and identifying its three dimensions, b) proposing a conceptual framework highlighting how firms can use DSF in alignment with their business strategy, and c) illustrating how the concept of DSF applies in a hospital setting. Journal: European Journal of Information Systems Pages: 61-79 Issue: 1 Volume: 33 Year: 2024 Month: 01 X-DOI: 10.1080/0960085X.2022.2115410 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2115410 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:33:y:2024:i:1:p:61-79 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2104665_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20231214T103247 git hash: d7a2cb0857 Author-Name: Hoon S. Choi Author-X-Name-First: Hoon S. Author-X-Name-Last: Choi Title: Do extraordinary claims require extraordinary evidence? Differential effect of trust cues on helpfulness by review extremity: an empirical study using big data Abstract: This study examines whether the effect of trust cues, such as verified purchase badges and user-provided photos, on review helpfulness differs by review extremity, on which Sagan’s standard and the theory of confirmation bias suggest contradictory predictions. Adopting large empirical data with approximately 31 million online reviews from Amazon.com, this study finds that the effect of trust cues on review helpfulness is significantly larger for moderate reviews, although the difference is negated for highly helpful reviews, and the effect is more considerable for extremely positive reviews than extremely negative reviews. The findings also disclose that the effect is more substantial for extreme reviews on search products and those on tangible products, suggesting that the differential effect depends on product attributes. Journal: European Journal of Information Systems Pages: 19-40 Issue: 1 Volume: 33 Year: 2024 Month: 01 X-DOI: 10.1080/0960085X.2022.2104665 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2104665 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:33:y:2024:i:1:p:19-40 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2103046_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20231214T103247 git hash: d7a2cb0857 Author-Name: Jie Ren Author-X-Name-First: Jie Author-X-Name-Last: Ren Author-Name: Hang Dong Author-X-Name-First: Hang Author-X-Name-Last: Dong Author-Name: Ales Popovic Author-X-Name-First: Ales Author-X-Name-Last: Popovic Author-Name: Gaurav Sabnis Author-X-Name-First: Gaurav Author-X-Name-Last: Sabnis Author-Name: Jeffrey Nickerson Author-X-Name-First: Jeffrey Author-X-Name-Last: Nickerson Title: Digital platforms in the news industry: how social media platforms impact traditional media news viewership Abstract: We examine how social media plays the role of an attention driver for traditional media. Social media attracts and channels attention to a topic. This attention triggers people to seek further information that is reported professionally in traditional media. Specifically, the volume of social media posts about a stock influences the attention to this stock the next day, proxied by the viewership of news articles on the same stock published the next day. We test this hypothesis in the stock market context because social media is less likely than traditional media to diffuse fundamental information in the stock market. Analysing stock-related news articles and stock-related social media posts from Sina Finance and Sina Weibo, we find that the social media post volume of a stock at time t-1 is associated with the traditional media viewership of the same stock at time t. This effect is amplified when social media sentiment about the stock is more intense or positive, and with an increase in the volume of verified social media posts about the stock. Our results provide evidence that social media platforms act as attention drivers, which differ from the information channel functions discussed in prior literature. Journal: European Journal of Information Systems Pages: 1-18 Issue: 1 Volume: 33 Year: 2024 Month: 01 X-DOI: 10.1080/0960085X.2022.2103046 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2103046 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:33:y:2024:i:1:p:1-18 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2115949_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20231214T103247 git hash: d7a2cb0857 Author-Name: Matthias Söllner Author-X-Name-First: Matthias Author-X-Name-Last: Söllner Author-Name: Abhay Nath Mishra Author-X-Name-First: Abhay Nath Author-X-Name-Last: Mishra Author-Name: Jan-Michael Becker Author-X-Name-First: Jan-Michael Author-X-Name-Last: Becker Author-Name: Jan Marco Leimeister Author-X-Name-First: Jan Marco Author-X-Name-Last: Leimeister Title: Use IT again? Dynamic roles of habit, intention and their interaction on continued system use by individuals in utilitarian, volitional contexts Abstract: This paper employs a longitudinal perspective to examine continued system use (CSU) by individuals in utilitarian, volitional contexts when alternative systems are present . We focus on two key behavioural antecedents of CSU – habit and continuance intention – and theorise how the relationships between CSU and these antecedents evolve over time. In addition, we hypothesise how the interaction effect of habit and intention on CSU evolves temporally. Our theorising differs from extant literature in two important respects: 1) In contrast to the widespread acceptance of the diminishing effect of continuance intention on CSU in the information systems (IS) literature, we hypothesise that in our context, its impact increases with time; and 2) In contrast to the negative moderation effect of habit on the relationship between intention and CSU proposed in the literature, we posit a positive interaction effect. We collect longitudinal survey data on the use of a higher education IS from students in a European university. Our results suggest that the impact of continuance intention on CSU as well as the interaction effect between habit and intention are increasing over time. We further introduce a methodological innovation – the permutation approach to conduct the multi-group analysis with repeated measures – to the literature. Journal: European Journal of Information Systems Pages: 80-96 Issue: 1 Volume: 33 Year: 2024 Month: 01 X-DOI: 10.1080/0960085X.2022.2115949 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2115949 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:33:y:2024:i:1:p:80-96 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2290270_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Tahir Abbas Syed Author-X-Name-First: Tahir Abbas Author-X-Name-Last: Syed Author-Name: Constantin Blome Author-X-Name-First: Constantin Author-X-Name-Last: Blome Author-Name: Jose Benitez Author-X-Name-First: Jose Author-X-Name-Last: Benitez Author-Name: Thanos Papadopoulos Author-X-Name-First: Thanos Author-X-Name-Last: Papadopoulos Title: The role of managerial activities in achieving Information technology ambidexterity and new product development performance in small and medium-sized enterprises Abstract: Given their limited portfolio of resources, small and medium-sized enterprises (SMEs) have to manage information technology (IT) exploitation and exploration at the same time to support a major shift in their product focus while maintaining their current array of products. We theorise that SMEs rely on managerial activities to enable IT ambidexterity to enhance the performance of their new product development (NPD). To this end, we hypothesise and test the relationships between managerial activities, IT ambidexterity, and NPD performance. Using multiple respondent data from 292 high-tech SMEs, we find that managerial activities enable IT ambidexterity, and this relationship is moderated by structural configurations. Considering the NPD management challenges ushered in by the digital era, our findings identify IT ambidexterity as a key mechanism to enhance NPD performance in SMEs. Our results contribute novel insights into the effective role of managerial activities in SMEs and help to explain the role of IT ambidexterity in the NPD literature, thereby facilitating continued theory development in this field of research. Journal: European Journal of Information Systems Pages: 97-122 Issue: 2 Volume: 33 Year: 2024 Month: 03 X-DOI: 10.1080/0960085X.2023.2290270 File-URL: http://hdl.handle.net/10.1080/0960085X.2023.2290270 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:33:y:2024:i:2:p:97-122 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2118627_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Valerie L Bartelt Author-X-Name-First: Valerie L Author-X-Name-Last: Bartelt Author-Name: Alan R. Dennis Author-X-Name-First: Alan R. Author-X-Name-Last: Dennis Title: Managing attention: more mindful team decision-making Abstract: Prior research has found that teams using computer-mediated communication (CMC) often make poor decisions because team members fail to pay attention to the information they receive from others. We developed a process designed to focus team members’ attention on one aspect of decision-making at a time. We divided the group decision-making process into three phases: 1) an initial period to contribute information, 2) a middle period of silence (i.e., no typing) to read others’ contributions, and 3) a final period to discuss the information. We designed a lab experiment to compare the information processing and decision-making of teams using this text-based CMC process to teams using text-based CMC with no intervention. Teams that used this CMC process contributed more information, recalled more information, committed fewer errors, and made better decisions. The effect sizes were large, about two times greater than the average effect sizes for the use of CMC. An examination of this new process suggests that it improved decision quality mostly by helping teams avoid errors. Journal: European Journal of Information Systems Pages: 161-180 Issue: 2 Volume: 33 Year: 2024 Month: 03 X-DOI: 10.1080/0960085X.2022.2118627 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2118627 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:33:y:2024:i:2:p:161-180 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2313537_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Manuel Wiesche Author-X-Name-First: Manuel Author-X-Name-Last: Wiesche Author-Name: Nina Böhm Author-X-Name-First: Nina Author-X-Name-Last: Böhm Author-Name: Michael Schermann Author-X-Name-First: Michael Author-X-Name-Last: Schermann Title: Digital Desire Paths: Exploring the Role of Computer Workarounds in Emergent Information Systems Design Abstract: The information systems literature generally conceptualises information system (IS) workarounds as negative disturbances that need to be avoided. IS design literature has emphasised the need to incorporate user behaviour in emergent IS design. Surprisingly, information systems research has kept the literatures on workarounds and IS design separate and remains silent on how workaround behaviour can inform information system design. In this research, we explore six workarounds in two case organisations and analyse the connections between them. We develop the concept of digital desire paths to describe the process how information system designers improve the system design by observing how users use and work around the system. Digital desire paths offer a novel interpretation of workarounds as input for information systems design and thereby serve as instance of the principle of guided emergence in action design research. Journal: European Journal of Information Systems Pages: 145-160 Issue: 2 Volume: 33 Year: 2024 Month: 03 X-DOI: 10.1080/0960085X.2024.2313537 File-URL: http://hdl.handle.net/10.1080/0960085X.2024.2313537 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:33:y:2024:i:2:p:145-160 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2152743_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Simeon P Vidolov Author-X-Name-First: Simeon P Author-X-Name-Last: Vidolov Title: Virtual collaboration as co-enacting intercorporeality Abstract: This paper draws on Merleau-Ponty’s perspective on intercorporeality to inquire into the role of the body in virtual collaboration. Merleau-Ponty redefines the human body beyond pure physicality, as material-semiotic processes between self and other. From this perspective, meaningful engagements are based on the intertwinement of bodily activities including gestures and displays. Drawing on a rich case of an exclusively virtual collaboration, this paper illuminates how bodily expressivity is rematerialised through digital technology. The findings show how distributed bodies pattern an intercorporeal armature constituted of processes of co-presencing, co-orienting, and co-investing. The paper problematises claims of virtual disembodiment and advances current understanding of how body and technology merge to make virtual collaboration possible. The rich empirical insights are synthesised into four main theoretical propositions that constitute a novel perspective on virtual intercorporeality. This perspective advances our understanding of virtual embodiment and elaborates the role of technology and language in the process of mutual attunement between bodies. Journal: European Journal of Information Systems Pages: 244-266 Issue: 2 Volume: 33 Year: 2024 Month: 03 X-DOI: 10.1080/0960085X.2022.2152743 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2152743 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:33:y:2024:i:2:p:244-266 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2257168_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Humza Naseer Author-X-Name-First: Humza Author-X-Name-Last: Naseer Author-Name: Kevin Desouza Author-X-Name-First: Kevin Author-X-Name-Last: Desouza Author-Name: Sean B. Maynard Author-X-Name-First: Sean B. Author-X-Name-Last: Maynard Author-Name: Atif Ahmad Author-X-Name-First: Atif Author-X-Name-Last: Ahmad Title: Enabling cybersecurity incident response agility through dynamic capabilities: the role of real-time analytics Abstract: We explore how organisations enable agility in their cybersecurity incident response (IR) process by developing dynamic capabilities using real-time analytics (RTA). Drawing on RTA practices in the IR process at three large financial organisations, we develop a framework to explain how IR teams respond to the rapidly evolving cyber threat environment by developing RTA-based microfoundations that underpin the building of sensing, seizing, and transforming dynamic IR capabilities. These dynamic IR capabilities in turn help organisations to enable agility in their IR processes by leveraging swift, flexible, and innovative IR strategies, including active threat reconnaissance, active threat defence, and pervasive learning. Our findings have implications for the discourse on cybersecurity because we demystify the black box of IR agility, for our understanding of the use of RTA to enable agility in IR, and for the discourse on dynamic capabilities. Journal: European Journal of Information Systems Pages: 200-220 Issue: 2 Volume: 33 Year: 2024 Month: 03 X-DOI: 10.1080/0960085X.2023.2257168 File-URL: http://hdl.handle.net/10.1080/0960085X.2023.2257168 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:33:y:2024:i:2:p:200-220 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2136542_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Kazem Haki Author-X-Name-First: Kazem Author-X-Name-Last: Haki Author-Name: Michael Blaschke Author-X-Name-First: Michael Author-X-Name-Last: Blaschke Author-Name: Stephan Aier Author-X-Name-First: Stephan Author-X-Name-Last: Aier Author-Name: Robert Winter Author-X-Name-First: Robert Author-X-Name-Last: Winter Author-Name: David Tilson Author-X-Name-First: David Author-X-Name-Last: Tilson Title: Dynamic capabilities for transitioning from product platform ecosystem to innovation platform ecosystem Abstract: Over recent decades, many platform-native start-ups and firms were founded and some are now among the world’s most valuable. This study, however, focuses on an incumbent firm transitioning from a long established product platform ecosystem to an innovation platform ecosystem in response to the platform-natives’ threats of disruption. We specifically investigate the dynamic capabilities needed by the incumbent firm in an enterprise software ecosystem in the transition phase. Our analysis builds on multi-perspective empirical data covering the viewpoints of all the actor types in the ecosystem, i.e., platform owner, platform partners, and end-user firms. The results imply the necessity of four dynamic capabilities: resource curation, ecosystem preservation, resource reconfiguration, and ecosystem diversification. With this study, we contribute to the emerging literature on the incumbent firms’ transition to a new ecosystem organising logic, and extend the study of dynamic capabilities specifically for the case of transitioning to innovation platform ecosystems. Journal: European Journal of Information Systems Pages: 181-199 Issue: 2 Volume: 33 Year: 2024 Month: 03 X-DOI: 10.1080/0960085X.2022.2136542 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2136542 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:33:y:2024:i:2:p:181-199 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2119172_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Mohamed Abouzahra Author-X-Name-First: Mohamed Author-X-Name-Last: Abouzahra Author-Name: Dale Guenter Author-X-Name-First: Dale Author-X-Name-Last: Guenter Author-Name: Joseph Tan Author-X-Name-First: Joseph Author-X-Name-Last: Tan Title: Exploring physicians’ continuous use of clinical decision support systems Abstract: Today, studying continuous clinical decision support system (CDSS) use is critical as continuity is a prerequisite to sustaining successful CDSS implementations. Previous health information technology (HIT) research has focused on HIT acceptance via information system-related constructs. Theoretical models explaining HIT use are limited and obfuscated other phases of HIT, such as continuous use in a clinical context. This study seeks to fill this gap by integrating context-related factors with IS factors in a theoretical framework that explains the antecedents of continuous use. To validate this model, data were collected from physicians after six months of using CDSS as well as system usage data from system logs. Threats to physician professional identity surpassed the intention to continue using CDSS, influencing its use by physicians in the first six months, and patients affected by the system influenced physician satisfaction with the system and, hence, their use of the system. This study reveals physicians’ continuous use of CDSS and explains the effects of healthcare contexts on physicians’ behaviour. Journal: European Journal of Information Systems Pages: 123-144 Issue: 2 Volume: 33 Year: 2024 Month: 03 X-DOI: 10.1080/0960085X.2022.2119172 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2119172 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:33:y:2024:i:2:p:123-144 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2225786_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Marjolein A.G. van Offenbeek Author-X-Name-First: Marjolein A.G. Author-X-Name-Last: van Offenbeek Author-Name: Janita F.J. Vos Author-X-Name-First: Janita F.J. Author-X-Name-Last: Vos Author-Name: Albert Boonstra Author-X-Name-First: Albert Author-X-Name-Last: Boonstra Title: Understanding variation in subunit adoption of electronic health records: facilitating and constraining configurations of critical dependencies Abstract: This interpretative case study demonstrates how the work system properties and roles of clinical departments are perceived to shape their adoption of an organisation-wide electronic health record. In hospitals, with their heterogeneous and powerful clinical departments, partial or non-adoption by some departments may jeopardise effective overall use. Viewing a hospital’s EHR adoption from a sociotechnical fit perspective, we unravel how clinical departments’ adoption of this organisation-wide system was primarily shaped by their critical work system dependencies rather than their role during its implementation. From the interviewees’ accounts, three orientations emerge: (1) organisation-oriented resulting in unconditional adoption; (2) department-oriented resulting in problematic or delayed adoption with high compromise costs; (3) environment-oriented resulting in at least partial non-adoption or extra design costs. Our subsequent analysis leads to the identification of four types of subunit-level characteristics influencing adoption. Their interplay informs departments in balancing between accepting compromise costs and negotiating design costs. We develop a diagnostic system model of subunit-level adoption that takes the embeddedness of the subunit into account and thereby complements individual- and organisation-level adoption theories. An accompanying heuristic may enable hospital managers to better anticipate the heterogeneity in departments’ adoption. Journal: European Journal of Information Systems Pages: 221-243 Issue: 2 Volume: 33 Year: 2024 Month: 03 X-DOI: 10.1080/0960085X.2023.2225786 File-URL: http://hdl.handle.net/10.1080/0960085X.2023.2225786 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:33:y:2024:i:2:p:221-243 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2139770_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Yu Zhang Author-X-Name-First: Yu Author-X-Name-Last: Zhang Author-Name: Xin (Robert) Luo Author-X-Name-First: Xin (Robert) Author-X-Name-Last: Luo Author-Name: Bingjia Shao Author-X-Name-First: Bingjia Author-X-Name-Last: Shao Author-Name: Jose Benitez Author-X-Name-First: Jose Author-X-Name-Last: Benitez Title: Technology-driven mandatory customer participation: a new recovery strategy to promote customers’ online post-recovery satisfaction Abstract: E-commerce businesses have been developing new ways of engaging customers in the online service recovery process to realise value co-creation. Such practices have been facilitated by the rapid development of information and communication technology. However, scant research has been conducted on these changes. To bridge this research gap, we explain how the application of technology guides and shapes customers’ responsibilities in online service recovery by constructing the concept of technology-driven mandatory customer participation (MCP), which is a new recovery strategy from the perspective of technology affordance. Moreover, we propose a comprehensive model to explain the influence mechanism of technology-driven MCP on value co-creation. Two sequential studies were then conducted. The first was an initial qualitative study based on interviews with e-commerce practitioners in China, in which three factors of technology-driven MCP (physical, mental, and emotional) and two categories of loss (utilitarian and symbolic) were identified. The second quantitative study explored and validated the relationships between technology-driven MCP, perceived co-creation, experienced burnout, and online post-recovery satisfaction from a loss-aversion perspective. The theory-driven empirical findings provide recommendations for e-commerce businesses to enhance online service management. Journal: European Journal of Information Systems Pages: 315-333 Issue: 3 Volume: 33 Year: 2024 Month: 05 X-DOI: 10.1080/0960085X.2022.2139770 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2139770 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:33:y:2024:i:3:p:315-333 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2147456_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Zhen Shao Author-X-Name-First: Zhen Author-X-Name-Last: Shao Author-Name: Xixi Li Author-X-Name-First: Xixi Author-X-Name-Last: Li Author-Name: Yumei Luo Author-X-Name-First: Yumei Author-X-Name-Last: Luo Author-Name: Jose Benitez Author-X-Name-First: Jose Author-X-Name-Last: Benitez Title: The differential impacts of top management support and transformational supervisory leadership on employees’ digital performance Abstract: How do leaders across different hierarchies motivate employees’ job performance in the new digital age? In order to answer this under-investigated question, we first conceptualise digital performance as employees’ job performance that is attained through using the new generation of digital technologies and then propose a research model that integrates and differentiates the influential mechanisms of the dual leadership factors – top management support and transformational supervisory leadership – regarding employees’ digital-enabled task performance and innovative performance. Specifically, we tested the research model with two different samples, including 230 sales personnel from a large automobile manufacturing company and 206 employees from multiple joint ventures across different industries. We find that top management support exhibits a stronger influence on digital-enabled task performance than on innovative performance through the mediation of data-driven culture, while transformational supervisory leadership nurtures a stronger effect on digital-enabled innovative performance than on task performance through the mediation of digital self-efficacy. Our study consolidates and extends the technology use literature on management support and advances IS leadership theory to the digital context. Our findings also offer practical insights into the effective use of the new generation of digital technologies in organisations. Journal: European Journal of Information Systems Pages: 334-360 Issue: 3 Volume: 33 Year: 2024 Month: 05 X-DOI: 10.1080/0960085X.2022.2147456 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2147456 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:33:y:2024:i:3:p:334-360 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2169202_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Jiabao Lin Author-X-Name-First: Jiabao Author-X-Name-Last: Lin Author-Name: Xin (Robert) Luo Author-X-Name-First: Xin Author-X-Name-Last: (Robert) Luo Author-Name: Lei Li Author-X-Name-First: Lei Author-X-Name-Last: Li Author-Name: Carol Hsu Author-X-Name-First: Carol Author-X-Name-Last: Hsu Title: Unraveling the effect of organisational resources and top management support on e-commerce capabilities: evidence from ADANCO-SEM and fsQCA Abstract: Building on resource-based theory, we seek to explore the underlying impact of social and technical resources on e-commerce capabilities under top management support. To fully capture and understand the relationship between these important constructs, we apply a combination of complementary techniques, namely, advanced analysis of composites structural equation modelling (ADANCO-SEM) in Study 1 and fuzzy-set qualitative comparative analysis in Study 2. Study 1 findings show that e-commerce infrastructure and skills, in addition to guanxi, positively affect e-commerce capabilities. Furthermore, top management support positively moderates the relationship between e-commerce infrastructure and e-commerce capabilities, but it has no effect on the relationship between guanxi and e-commerce capabilities and on the relationship between e-commerce skills and e-commerce capabilities. Based on the findings of Study 1, Study 2 further unveils two configurations – guanxi and e-commerce infrastructure, and guanxi and e-commerce skills – that can lead to e-commerce capabilities. The moderating effect of guanxi is confirmed empirically in post hoc analysis. These results refine the findings in the ADANCO-SEM analysis concerning the conditions for the formation of e-commerce capabilities. The empirical findings can help firms use organisational resources more efficiently and thus develop e-commerce capabilities and gain competitive advantages. Journal: European Journal of Information Systems Pages: 403-421 Issue: 3 Volume: 33 Year: 2024 Month: 05 X-DOI: 10.1080/0960085X.2023.2169202 File-URL: http://hdl.handle.net/10.1080/0960085X.2023.2169202 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:33:y:2024:i:3:p:403-421 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2125840_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Christoph Mueller-Bloch Author-X-Name-First: Christoph Author-X-Name-Last: Mueller-Bloch Author-Name: Jonas Valbjørn Andersen Author-X-Name-First: Jonas Valbjørn Author-X-Name-Last: Andersen Author-Name: Jason Spasovski Author-X-Name-First: Jason Author-X-Name-Last: Spasovski Author-Name: Jungpil Hahn Author-X-Name-First: Jungpil Author-X-Name-Last: Hahn Title: Understanding decentralization of decision-making power in proof-of-stake blockchains: an agent-based simulation approach Abstract: Blockchain systems allow for securely keeping shared records of transactions in a decentralised way. This is enabled by algorithms called consensus mechanisms. Proof-of-work is the most prominent consensus mechanism, but environmentally unsustainable. Here, we focus on proof-of-stake, its best-known alternative. Importantly, decentralised decision-making power is not an inherent feature of blockchain systems, but a technological possibility. Numerous security incidents illustrate that decentralised control cannot be taken for granted. We therefore study how key parameters affect the degree of decentralisation in proof-of-stake blockchain systems. Based on a real-world implementation of a proof-of-stake blockchain system, we conduct agent-based simulations to study how a range of parameters impact decentralisation. The results suggest that high numbers of initial potential validator nodes, large transactions, a high number of transactions, and a very high or very low positive validator network growth rate increase decentralisation. We find weak support for an impact of changes in transaction fees and initial stake distributions. Our study highlights how blockchain challenges our understanding of decentralisation in information systems research, and contributes to understanding the governance mechanisms that lead to decentralisation in proof-of-stake blockchain systems as well as to designing proof-of-stake blockchain systems that are prone to decentralisation and therefore more secure. Journal: European Journal of Information Systems Pages: 267-286 Issue: 3 Volume: 33 Year: 2024 Month: 05 X-DOI: 10.1080/0960085X.2022.2125840 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2125840 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:33:y:2024:i:3:p:267-286 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2154712_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Ilja Nastjuk Author-X-Name-First: Ilja Author-X-Name-Last: Nastjuk Author-Name: Simon Trang Author-X-Name-First: Simon Author-X-Name-Last: Trang Author-Name: Julius-Viktor Grummeck-Braamt Author-X-Name-First: Julius-Viktor Author-X-Name-Last: Grummeck-Braamt Author-Name: Marc T. P. Adam Author-X-Name-First: Marc T. P. Author-X-Name-Last: Adam Author-Name: Monideepa Tarafdar Author-X-Name-First: Monideepa Author-X-Name-Last: Tarafdar Title: Integrating and synthesising technostress research: a meta-analysis on technostress creators, outcomes, and IS usage contexts Abstract: The expansion of technostress research in the organisational and private IS usage contexts has generated substantial theoretical and empirical insights into the relationship between technostress creators and psychological and behavioural outcomes. However, we observe empirical inconsistencies in terms of effect sizes and conceptual inconsistencies regarding the aggregated and disaggregated treatment of technostress creators. Against this background, we argue that a fine-grained estimation and comparison of effect size strengths of technostress creators on outcomes can provide clarity on these essential matters. Using the Hunter and Schmidt method, we integrated and synthesised empirical data from 102 articles, encompassing 113 independent studies with a total of 49,955 observations. Our analysis offers four important contributions to the technostress literature. First, it confirms that technostress is meaningful in terms of its detrimental impact on both psychological and behavioural outcomes. Second, the results provide accurate effect size estimates for technostress creators on different outcomes in organisational and private usage contexts. Third, the results reveal that psychological outcomes are more immediate than behavioural outcomes. Fourth, the findings suggest that in certain contexts, a disaggregated account of technostress creators can reveal meaningful empirical information. Journal: European Journal of Information Systems Pages: 361-382 Issue: 3 Volume: 33 Year: 2024 Month: 05 X-DOI: 10.1080/0960085X.2022.2154712 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2154712 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:33:y:2024:i:3:p:361-382 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2167671_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Nicolai Etienne Fabian Author-X-Name-First: Nicolai Author-X-Name-Last: Etienne Fabian Author-Name: John Qi Dong Author-X-Name-First: John Qi Author-X-Name-Last: Dong Author-Name: Thijs Broekhuizen Author-X-Name-First: Thijs Author-X-Name-Last: Broekhuizen Author-Name: Peter C. Verhoef Author-X-Name-First: Peter C. Author-X-Name-Last: Verhoef Title: Business value of SME digitalisation: when does it pay off more? Abstract: Small and medium enterprise (SME) digitalisation involves the reinforcement, modification, and renewal of business models with the help of digital technologies. It is widely considered imperative for SMEs to stay relevant in the digital age. Yet, little is known about the conditions under which SME digitalisation improves the performance of SMEs in the IS literature. Guided by the SME literature, we postulate that the business value of SME digitalisation – based on its impact on improving financial firm performance – is dependent on two factors that are particularly relevant to SMEs due to their smallness and flexibility: radical orientation and organisational rigidity. Using data from multiple waves of surveys in 2019–2020 and archival financial data from Dutch SMEs, we demonstrate that the positive impact of SME digitalisation on performance improvement strongly depends on SME characteristics. SMEs who are oriented towards radical change and are more rigid are disadvantaged and attain lower returns on SME digitalisation. Journal: European Journal of Information Systems Pages: 383-402 Issue: 3 Volume: 33 Year: 2024 Month: 05 X-DOI: 10.1080/0960085X.2023.2167671 File-URL: http://hdl.handle.net/10.1080/0960085X.2023.2167671 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:33:y:2024:i:3:p:383-402 Template-Type: ReDIF-Article 1.0 # input file: TJIS_A_2137064_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Stefan Tams Author-X-Name-First: Stefan Author-X-Name-Last: Tams Author-Name: Alina Dulipovici Author-X-Name-First: Alina Author-X-Name-Last: Dulipovici Title: The creativity model of age and innovation with IT: why older users are less innovative and what to do about it Abstract: To realise the full potential of their information technology (IT) infrastructure, successful firms encourage users to innovate with IT. However, older users are much less innovative with IT than younger ones. This situation is alarming because the workforce is ageing rapidly at the very same time as organisational technologies are proliferating. Using the concepts of mediation and moderation, the present investigation proposes the creativity model of age and innovation with IT. This model postulates that the age differences in user innovation are due to age-related changes in the perceived ability to be creative with IT. It also postulates that the negative effect of age on user innovation can be mitigated by three factors: job control, IT support, and user enjoyment. Two studies were conducted to test the model. The first one was a large-scale survey of IT users who work with various technologies, and the second one was a more specific survey of knowledge workers who use electronic knowledge repositories. The results largely support the model. Thus the model provides a well-founded theoretical framework, not only for explaining why older users are less innovative with IT, but also for determining what managers and systems designers should do about it. Journal: European Journal of Information Systems Pages: 287-314 Issue: 3 Volume: 33 Year: 2024 Month: 05 X-DOI: 10.1080/0960085X.2022.2137064 File-URL: http://hdl.handle.net/10.1080/0960085X.2022.2137064 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tjisxx:v:33:y:2024:i:3:p:287-314