TY - CONF
AB - Since historical times, cartographic maps have revealed spatial relations and enabled decisions and processes. Geographic Information Systems (GIS) allow for acquisition, management, analysis, and presentation of geospatial objects. With free geospatial data becoming available through open data policies and an increasing amount of digitally connected objects in the Internet of Things (IoT), GIS are becoming indispensable to Information Systems (IS) research. However, the consideration and relevance of GIS has only been investigated rarely. We examine, how and in which fields of application GIS have been studied in the IS literature and elicit the importance of GIS regarding their design and usage. A systematic literature review leads us to develop four research propositions. Our results indicate that GIS are still an undeservedly underrepresented discipline in IS and should be more theorized, put center-stage in design-oriented research, and considered for creating superior value co-creation in service systems.
AU - Priefer, Jennifer
ED - Bui, T.X.
ED - Sprague, R.H.
ID - 37497
KW - GIS
KW - Industry 4.0
KW - and Sustainability
KW - geographic information systems
KW - geospatial data
KW - gis
KW - information systems research
KW - literature review
T2 - Proceedings of the 56th Hawaii International Conference on System Sciences
TI - Geographic Information Systems in Information Systems Research - Review and Research Prospects
ER -
TY - JOUR
AU - Pfeiffer, Jella
AU - Gutschow, Julia
AU - Haas, Christian
AU - Möslein, Florian
AU - Maspfuhl, Oliver
AU - Borgers, Frederik
AU - Alpsancar, Suzana
ID - 41874
JF - Business & Information Systems Engineering
KW - Information Systems
SN - 2363-7005
TI - Algorithmic Fairness in AI
ER -
TY - JOUR
AB - The success of engineering complex technical systems is determined by meeting customer requirements and institutional regulations. One example relevant to the automobile industry is the United Nations Economic Commission of Europe (UN ECE), which specifies the homologation of automobile series and requires proof of traceability. The required traceability can be achieved by modeling system artifacts and their relations in a consistent, seamless model—an effect-chain model. Currently, no in-depth methodology exists to support engineers in developing certification-compliant effect-chain models. For this purpose, a new methodology for certification-compliant effect-chain modeling was developed, which includes extensions of an existing method, suitable models, and tools to support engineers in the modeling process. For evaluation purposes, applicability is proven based on the experience of more than 300 workshops at an automotive OEM and an automotive supplier. The following case example is chosen to demonstrate applicability: the development of a window lifter that has to meet the demands of UN ECE Regulations R156 and R21. Results indicate multiple benefits in supporting engineers with the certification-compliant modeling of effect chains. Three benefits are goal-oriented modeling to reduce the necessary modeling capacity, increasing model quality by applying information quality criteria, and the potential to reduce costs through automatable effect-chain analyses for technical changes. Further, companies in the automotive and other industries will benefit from increased modeling capabilities that can be used for architecture modeling and to comply with other regulations such as ASPICE or ISO 26262.
AU - Gräßler, Iris
AU - Wiechel, Dominik
AU - Koch, Anna-Sophie
AU - Sturm, Tim
AU - Markfelder, Thomas
ID - 44382
IS - 3
JF - Systems
KW - Information Systems and Management
KW - Computer Networks and Communications
KW - Modeling and Simulation
KW - Control and Systems Engineering
KW - Software
SN - 2079-8954
TI - Methodology for Certification-Compliant Effect-Chain Modeling
VL - 11
ER -
TY - JOUR
AB - AbstractGraffiti is an urban phenomenon that is increasingly attracting the interest of the sciences. To the best of our knowledge, no suitable data corpora are available for systematic research until now. The Information System Graffiti in Germany project (Ingrid) closes this gap by dealing with graffiti image collections that have been made available to the project for public use. Within Ingrid, the graffiti images are collected, digitized and annotated. With this work, we aim to support the rapid access to a comprehensive data source on Ingrid targeted especially by researchers. In particular, we present IngridKG, an RDF knowledge graph of annotated graffiti, abides by the Linked Data and FAIR principles. We weekly update IngridKG by augmenting the new annotated graffiti to our knowledge graph. Our generation pipeline applies RDF data conversion, link discovery and data fusion approaches to the original data. The current version of IngridKG contains 460,640,154 triples and is linked to 3 other knowledge graphs by over 200,000 links. In our use case studies, we demonstrate the usefulness of our knowledge graph for different applications.
AU - Sherif, Mohamed Ahmed
AU - da Silva, Ana Alexandra Morim
AU - Pestryakova, Svetlana
AU - Ahmed, Abdullah Fathi
AU - Niemann, Sven
AU - Ngomo, Axel-Cyrille Ngonga
ID - 45484
IS - 1
JF - Scientific Data
KW - Library and Information Sciences
KW - Statistics
KW - Probability and Uncertainty
KW - Computer Science Applications
KW - Education
KW - Information Systems
KW - Statistics and Probability
SN - 2052-4463
TI - IngridKG: A FAIR Knowledge Graph of Graffiti
VL - 10
ER -
TY - JOUR
AU - Trier, Matthias
AU - Kundisch, Dennis
AU - Beverungen, Daniel
AU - Müller, Oliver
AU - Schryen, Guido
AU - Mirbabaie, Milad
AU - Trang, Simon
ID - 45872
JF - Business & Information Systems Engineering
KW - Information Systems
SN - 2363-7005
TI - Digital Responsibility
ER -
TY - JOUR
AU - Bartelheimer, Christian
AU - zur Heiden, Philipp
AU - Berendes, Carsten Ingo
AU - Beverungen, Daniel
ID - 46478
JF - European Journal of Information Systems
KW - Library and Information Sciences
KW - Information Systems
SN - 0960-085X
TI - Designing digital actor engagement platforms for local high streets: an action design research study
ER -
TY - JOUR
AB - AbstractWorking conditions of knowledge workers have been subject to rapid change recently. Digital nomadism is no longer a phenomenon that relates only to entrepreneurs, freelancers, and gig workers. Corporate employees, too, have begun to uncouple their work from stationary (home) offices and 9-to-5 schedules. However, pursuing a permanent job in a corporate environment is still subject to fundamentally different values than postulated by the original notion of digital nomadism. Therefore, this paper explores the work identity of what is referred to as ‘corporate nomads’. By drawing on identity theory and the results of semi-structured interviews, the paper proposes a conceptualization of the corporate nomad archetype and presents nine salient identity issues of corporate nomads (e.g., holding multiple contradictory identities, the flexibility paradox, or collaboration constraints). By introducing the ‘corporate nomad’ archetype to the Information Systems literature, this article helps to rethink established conceptions of “home office” and socio-spatial configurations of knowledge work.
AU - Marx, Julian
AU - Stieglitz, Stefan
AU - Brünker, Felix
AU - Mirbabaie, Milad
ID - 44143
JF - Business & Information Systems Engineering
KW - Information Systems
SN - 2363-7005
TI - Home (Office) is where your Heart is
ER -
TY - JOUR
AU - Stieglitz, Stefan
AU - Mirbabaie, Milad
AU - Deubel, Annika
AU - Braun, Lea-Marie
AU - Kissmer, Tobias
ID - 45458
JF - International Journal of Information Management
KW - Library and Information Sciences
KW - Computer Networks and Communications
KW - Information Systems
SN - 0268-4012
TI - The potential of digital nudging to bridge the gap between environmental attitude and behavior in the usage of smart home applications
VL - 72
ER -
TY - JOUR
AB - The introduction of Systems Engineering is an approach for dealing with the increasing complexity of products and their associated product development. Several introduction strategies are available in the literature; nevertheless, the introduction of Systems Engineering into practice still poses a great challenge to companies. Many companies have already gained experience in the introduction of Systems Engineering. Therefore, as part of the SE4OWL research project, the need to conduct a study including expert interviews and to collect the experiences of experts was identified. A total of 78 hypotheses were identified from 13 expert interviews concerning the lessons learned. Using exclusion criteria, 52 hypotheses were validated in a subsequent quantitative survey with 112 participants. Of these 52 hypotheses, 40 could be confirmed based on the survey results. Only four hypotheses were rejected, and eight could neither be confirmed nor rejected. Through this research, guidance is provided to companies to leverage best practices for the introduction of their own Systems Engineering and to avoid the poor practices of other companies.
AU - Wilke, Daria
AU - Grothe, Robin
AU - Bretz, Lukas
AU - Anacker, Harald
AU - Dumitrescu, Roman
ID - 47800
IS - 3
JF - Systems
KW - Information Systems and Management
KW - Computer Networks and Communications
KW - Modeling and Simulation
KW - Control and Systems Engineering
KW - Software
SN - 2079-8954
TI - Lessons Learned from the Introduction of Systems Engineering
VL - 11
ER -
TY - JOUR
AB - Service frontline encounters between customers and service providers have been subject to fundamental changes in recent years. As two major change agents, technology infusion and data privacy regulations are inextricably linked and constitute a critical ethical and societal issue. Specifically, service frontlines—as represented by human or technological agents, or some hybrid form—rely on customer data for service provision, which subjects them to privacy regulations governing the collection, submission, access, and use of any customer data thus captured. However, scant research outlines the significant implications of evolving data privacy regulations for service frontline encounters. To advance knowledge in this domain, this research distills six key dimensions of global data privacy regulations (fairness, data limits, transparency, control, consent, and recourse). Employing an intelligences theoretical lens, the authors theorize how these dimensions might become differentially manifest across three service frontline interface types (human-based, technology-based, and hybrid). Carefully intersecting the need for varying intelligences across data privacy regulatory dimensions with the abilities of service frontline interfaces to harness each intelligence type, this study offers a novel conceptual framework that advances research and practice. Theoretical, managerial, and policy implications unfold from the proposed framework, which also can inform a future research agenda.
AU - Steinhoff, Lena
AU - Martin, Kelly D.
ID - 49157
IS - 3
JF - Journal of Service Research
KW - Organizational Behavior and Human Resource Management
KW - Sociology and Political Science
KW - Information Systems
SN - 1094-6705
TI - Putting Data Privacy Regulation into Action: The Differential Capabilities of Service Frontline Interfaces
VL - 26
ER -
TY - JOUR
AB - AbstractWorkarounds are goal‐driven deviations from the standard operating procedures performed to overcome obstacles constraining day‐to‐day work. Despite starting as temporary fixes, they can become established across an organisation and trigger the innovation of processes and IT artefacts that can resolve misfits permanently. Although prior research has elicited antecedents and types of workarounds, it is not known how workarounds diffuse in an organisation and, thereby, innovating co‐workers' activities, IT artefacts, and organisational structures. The results of our multiple two‐year case study provide unique empirical insights into the diffusion of workarounds and how they can act as generative mechanisms for bottom‐up process innovation.
AU - Bartelheimer, Christian
AU - Wolf, Verena
AU - Beverungen, Daniel
ID - 51770
IS - 5
JF - Information Systems Journal
KW - Computer Networks and Communications
KW - Information Systems
KW - Software
SN - 1350-1917
TI - Workarounds as generative mechanisms for bottom‐up process innovation—Insights from a multiple case study
VL - 33
ER -
TY - JOUR
AU - Castenow, Jannik
AU - Kling, Peter
AU - Knollmann, Till
AU - Meyer auf der Heide, Friedhelm
ID - 29843
JF - Information and Computation
KW - Computational Theory and Mathematics
KW - Computer Science Applications
KW - Information Systems
KW - Theoretical Computer Science
SN - 0890-5401
TI - A Discrete and Continuous Study of the Max-Chain-Formation Problem
ER -
TY - JOUR
AU - Shollo, Arisa
AU - Hopf, Konstantin
AU - Thiess, Tiemo
AU - Müller, Oliver
ID - 32866
IS - 3
JF - The Journal of Strategic Information Systems
KW - Information Systems and Management
KW - Information Systems
KW - Management Information Systems
SN - 0963-8687
TI - Shifting ML value creation mechanisms: A process model of ML value creation
VL - 31
ER -
TY - JOUR
AB - AbstractBusiness process management (BPM) drives corporate success through effective and efficient processes. In recent decades, knowledge has been accumulated regarding the identification, discovery, analysis, design, implementation, and monitoring of business processes. This includes methods and tools for tackling various kinds of process change such as continuous process improvement, process reengineering, process innovation, and process drift. However, exogenous shocks, which lead to unintentional and radical process change, have been neglected in BPM research although they severely affect an organization’s context, strategy, and business processes. This research note conceptualizes the interplay of exogenous shocks and BPM in terms of the effects that such shocks can have on organizations’ overall process performance over time. On this foundation, related challenges and opportunities for BPM via several rounds of idea generation and consolidation within a diverse team of BPM scholars are identified. The paper discusses findings in light of extant literature from BPM and related disciplines, as well as present avenues for future (BPM) research to invigorate the academic discourse on the topic.
AU - Röglinger, Maximilian
AU - Plattfaut, Ralf
AU - Borghoff, Vincent
AU - Kerpedzhiev, Georgi
AU - Becker, Jörg
AU - Beverungen, Daniel
AU - vom Brocke, Jan
AU - Van Looy, Amy
AU - del-Río-Ortega, Adela
AU - Rinderle-Ma, Stefanie
AU - Rosemann, Michael
AU - Santoro, Flavia Maria
AU - Trkman, Peter
ID - 35741
IS - 5
JF - Business & Information Systems Engineering
KW - Information Systems
SN - 2363-7005
TI - Exogenous Shocks and Business Process Management
VL - 64
ER -
TY - JOUR
AU - Constantiou, Ioanna
AU - Mukkamala, Alivelu
AU - Sjöklint, Mimmi
AU - Trier, Matthias
ID - 36961
JF - European Journal of Information Systems
KW - Library and Information Sciences
KW - Information Systems
SN - 0960-085X
TI - Engaging with self-tracking applications: how do users respond to their performance data?
ER -
TY - CONF
AB - Social media have become not only integral parts of our private and professional lives, but also an indispensable source of data for empirical research across a variety of academic disciplines. Applying a Social Media Analytics (SMA) methodology, however, imposes heavy ethical challenges on researchers. Scholars in the Information Systems (IS) discipline must deal with a patchwork of ethical frameworks, regulations, and (missing) institutional support. To initiate a debate on how to develop a common understanding of SMA research ethics, this paper compiles a scoping review of extant literature and suggests a research agenda for IS scholarship on this matter. The review yields a total of eight fundamental principles of ethical SMA research, which provide a starting point to guiding individual researchers towards more ethical conduct. At the same time, this work unearths a multitude of intricate dilemmas that are currently unresolved. The findings of this review will encourage IS scholarship to find its own voice in the debate about social media research ethics.
AU - Marx, Julian
AU - Mirbabaie, Milad
ID - 37140
KW - Information Systems and Management
KW - Human-Computer Interaction
KW - Business
KW - Management and Accounting (miscellaneous)
KW - Information Systems
SN - 1449-8618
T2 - Australasian Journal of Information Systems
TI - The Investigator’s Dilemma - A Review of Social Media Analytics Research Ethics in Information Systems
VL - 26
ER -
TY - JOUR
AU - Stieglitz, Stefan
AU - Hofeditz, Lennart
AU - Brünker, Felix
AU - Ehnis, Christian
AU - Mirbabaie, Milad
AU - Ross, Björn
ID - 37148
JF - International Journal of Information Management
KW - Library and Information Sciences
KW - Computer Networks and Communications
KW - Information Systems
SN - 0268-4012
TI - How crises are different - Design principles for conversational agents to support Emergency Management Agencies
VL - 63
ER -
TY - JOUR
AU - Mirbabaie, Milad
AU - Brendel, Alfred B.
AU - Hofeditz, Lennart
ID - 37147
IS - 1
JF - Communications of the Association for Information Systems
KW - Information Systems
SN - 1529-3181
TI - Ethics and AI in Information Systems Research
VL - 50
ER -
TY - JOUR
AU - Mirbabaie, Milad
AU - Stieglitz, Stefan
AU - Marx, Julian
ID - 37139
IS - 2
JF - Business & Information Systems Engineering
KW - Information Systems
SN - 2363-7005
TI - Catchword: Digital Detox
VL - 64
ER -
TY - JOUR
AB - Service frontline encounters between customers and service providers have been subject to fundamental changes in recent years. As two major change agents, technology infusion and data privacy regulations are inextricably linked and constitute a critical ethical and societal issue. Specifically, service frontlines—as represented by human or technological agents, or some hybrid form—rely on customer data for service provision, which subjects them to privacy regulations governing the collection, submission, access, and use of any customer data thus captured. However, scant research outlines the significant implications of evolving data privacy regulations for service frontline encounters. To advance knowledge in this domain, this research distills six key dimensions of global data privacy regulations (fairness, data limits, transparency, control, consent, and recourse). Employing an intelligences theoretical lens, the authors theorize how these dimensions might become differentially manifest across three service frontline interface types (human-based, technology-based, and hybrid). Carefully intersecting the need for varying intelligences across data privacy regulatory dimensions with the abilities of service frontline interfaces to harness each intelligence type, this study offers a novel conceptual framework that advances research and practice. Theoretical, managerial, and policy implications unfold from the proposed framework, which also can inform a future research agenda.
AU - Steinhoff, Lena
AU - Martin, Kelly D.
ID - 41317
JF - Journal of Service Research
KW - Organizational Behavior and Human Resource Management
KW - Sociology and Political Science
KW - Information Systems
SN - 1094-6705
TI - Putting Data Privacy Regulation into Action: The Differential Capabilities of Service Frontline Interfaces
ER -
TY - JOUR
AU - Constantiou, Ioanna
AU - Mukkamala, Alivelu
AU - Sjöklint, Mimmi
AU - Trier, Matthias
ID - 36083
JF - European Journal of Information Systems
KW - Library and Information Sciences
KW - Information Systems
KW - Self-Tracking
KW - User Behaviour
KW - Discontinuance
SN - 0960-085X
TI - Engaging with self-tracking applications: how do users respond to their performance data?
ER -
TY - JOUR
AU - Constantiou, Ioanna
AU - Mukkamala, Alivelu
AU - Sjöklint, Mimmi
AU - Trier, Matthias
ID - 36960
JF - European Journal of Information Systems
KW - Library and Information Sciences
KW - Information Systems
SN - 0960-085X
TI - Engaging with self-tracking applications: how do users respond to their performance data?
ER -
TY - JOUR
AB - AbstractOrganizations increasingly introduce collaborative technologies in form of virtual assistants (VAs) to save valuable resources, especially when employees are assisted with work-related tasks. However, the effect of VAs on virtual teams and collaboration remains uncertain, particularly whether employees show social loafing (SL) tendencies, i.e., applying less effort for collective tasks compared to working alone. While extant research indicates that VAs collaboratively working in teams exert greater results, less is known about SL in virtual collaboration and how responsibility attribution alters. An online experiment with N = 102 was conducted in which participants were assisted by a VA in solving a task. The results indicate SL tendencies in virtual collaboration with VAs and that participants tend to cede responsibility to the VA. This study makes a first foray and extends the information systems (IS) literature by analyzing SL and responsibility attribution thus updates our knowledge on virtual collaboration with VAs.
AU - Stieglitz, Stefan
AU - Mirbabaie, Milad
AU - Möllmann, Nicholas R. J.
AU - Rzyski, Jannik
ID - 37146
IS - 3
JF - Information Systems Frontiers
KW - Computer Networks and Communications
KW - Information Systems
KW - Theoretical Computer Science
KW - Software
SN - 1387-3326
TI - Collaborating with Virtual Assistants in Organizations: Analyzing Social Loafing Tendencies and Responsibility Attribution
VL - 24
ER -
TY - JOUR
AB - Literature reviews (LRs) play an important role in the development of domain knowledge in all fields. Yet, we observe a
lack of insights into the activities with which LRs actually develop knowledge. To address this important gap, we (1)
derive knowledge building activities from the extant literature on LRs, (2) suggest a knowledge-based typology of LRs
that complements existing typologies, and (3) apply the suggested typology in an empirical study that explores how LRs
with different goals and methodologies have contributed to knowledge development. The analysis of 240 LRs published
in 40 renowned IS journals between 2000 and 2014 allows us to draw a detailed picture of knowledge development
achieved by one of the most important genres in the IS field. An overarching contribution of our work is to unify extant
conceptualizations of LRs by clarifying and illustrating how LRs apply different methodologies in a range of knowledge
building activities to achieve their goals with respect to theory.
AU - Schryen, Guido
AU - Wagner, Gerit
AU - Benlian, Alexander
AU - Paré, Guy
ID - 11946
JF - Communications of the AIS
KW - Literature review
KW - knowledge development
KW - knowledge building activities
KW - knowledge-based typology
KW - information systems research
SN - 1529-3181
TI - A Knowledge Development Perspective on Literature Reviews: Validation of a New Typology in the IS Field
VL - 46
ER -
TY - JOUR
AB - Openness in science and education is increasing in importance within the digital knowledge society. So far, less attention has been paid to teaching Open Science in bachelor’s degrees or in qualitative methods. Therefore, the aim of this article is to use a seminar example to explore what Open Science practices can be taught in qualitative research and how digital tools can be involved. The seminar focused on the following practices: Open data practices, the practice of using the free and open source tool “Collaborative online Interpretation, the practice of participating, cooperating, collaborating and contributing through participatory technologies and in social (based) networks. To learn Open Science practices, the students were involved in a qualitative research project about “Use of digital technologies for the study and habitus of students”. The study shows the practices of Open Data are easy to teach, whereas the use of free and open source tools and participatory technologies for collaboration, participation, cooperation and contribution is more difficult. In addition, a cultural shift would have to take place within German universities to promote Open Science practices in general.
AU - Steinhardt, Isabel
ID - 29246
IS - 3
JF - Education for Information
KW - Open Science
KW - Open Education Practices
KW - Library and Information Sciences
KW - Education
KW - Information Systems
SN - 0167-8329
TI - Learning Open Science by doing Open Science. A reflection of a qualitative research project-based seminar
VL - 36
ER -
TY - JOUR
AU - Müller, Oliver
AU - Junglas, Iris
AU - vom Brocke, Jan
AU - Debortoli, Stefan
ID - 4689
IS - 4
JF - European Journal of Information Systems
KW - analytics
KW - big data
KW - data source
KW - information systems research
KW - methodology
SN - 14769344
TI - Utilizing big data analytics for information systems research: Challenges, promises and guidelines
ER -
TY - JOUR
AU - Borgwardt, Stefan
AU - Mailis, Theofilos
AU - Peñaloza, Rafael
AU - Turhan, Anni-Yasmin
ID - 52747
IS - 2
JF - Journal on Data Semantics
KW - Artificial Intelligence
KW - Computer Networks and Communications
KW - Information Systems
SN - 1861-2032
TI - Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies
VL - 5
ER -
TY - JOUR
AU - Borgwardt, Stefan
AU - Mailis, Theofilos
AU - Peñaloza, Rafael
AU - Turhan, Anni-Yasmin
ID - 52803
IS - 2
JF - Journal on Data Semantics
KW - Artificial Intelligence
KW - Computer Networks and Communications
KW - Information Systems
SN - 1861-2032
TI - Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies
VL - 5
ER -
TY - CONF
AB - Nowadays, providing employees with failure-free access to various systems, applications and services is a crucial factor for organizations? success as disturbances potentially inhibit smooth workflows and thereby harm productivity. However, it is a challenging task to assign access rights to employees? accounts within a satisfying time frame. In addition, the management of multiple accounts and identities can be very onerous and time consuming for the responsible administrator and therefore expensive for the organization. In order to meet these challenges, firms decide to invest in introducing an Identity and Access Management System (IAMS) that supports the organization by using policies to assign permissions to accounts, groups, and roles. In practice, since various versions of IAMSs exist, it is a challenging task to decide upon introduction of an IAMS. The following study proposes a first attempt of a decision support model for practitioners which considers four alternatives: Introduction of an IAMS with Role-based Access Control RBAC) or without and no introduction of IAMS again with or without RBAC. To underpin the practical applicability of the proposed model, we parametrize and operationalize it based on a real world use case using input from an expert interview.
AU - Weishäupl, Eva
AU - Kunz, Michael
AU - Yasasin, Emrah
AU - Wagner, Gerit
AU - Prester, Julian
AU - Schryen, Guido
AU - Pernul, Günther
ID - 5590
KW - Identity and Access Management
KW - Economic Decision Making
KW - Information Systems
KW - Information Security Investment
KW - Decision Theory
T2 - 2nd International Workshop on Security in highly connected IT Systems (SHCIS?15)
TI - Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory
ER -
TY - JOUR
AB - In service industries, hierarchical loyalty programs are common relationship marketing instruments that award elevated status to customers who exceed a certain spending level (e.g., gold membership). In practice, service companies offer elevated status to some customers who do not meet the required spending level, in an attempt to profit from the profound allure of status. Relying on social psychology research and a mixed-method approach, this study analyzes the loyalty impact of status endowments, defined as awards of elevated status to customers who are not entitled to it. An exploratory qualitative study identifies customer gratitude and customer skepticism as positive and negative mediators, respectively, of customers’ attitudinal responses to endowed status. Quantitative studies—two experimental and one survey—substantiate these bright and dark sides of endowed status. The efficacy of status endowment is contingent on the context. To alleviate the dark-side effect, managers can allow target customers to actively choose whether to be endowed, especially those who are close to achieving the status already, and provide valuable preferential treatment to customers elevated by either endowment or achievement. These insights offer guidelines for whether and how to use status endowment in hierarchical loyalty programs.
AU - Eggert, Andreas
AU - Steinhoff, Lena
AU - Garnefeld, Ina
ID - 41297
IS - 2
JF - Journal of Service Research
KW - Organizational Behavior and Human Resource Management
KW - Sociology and Political Science
KW - Information Systems
SN - 1094-6705
TI - Managing the Bright and Dark Sides of Status Endowment in Hierarchical Loyalty Programs
VL - 18
ER -
TY - JOUR
AB - In many business markets, manufacturers seek service-led growth to secure their existing positions and continue to grow in increasingly competitive environments. Using longitudinal data from 513 German mechanical engineering companies and latent growth curve modeling, this study offers a fine-grained view of the financial performance implications of industrial service strategies. By disentangling the revenue and profit implications of industrial service strategies, findings reveal that such strategies increase both the level and the growth of manufacturing firms’ revenue streams. In contrast, they reduce the level but improve the growth of manufacturers’ profits. Results further suggest that services supporting the clients’ actions (SSC) and services supporting the supplier’s product (SSP) affect performance outcomes in different ways. SSCs directly affect revenue and profit streams. In turn, SSPs display only indirect effects on financial performance mediated through SSCs. A moderator analysis identifies two organizational contingencies that facilitate service business success: Only companies with decentralized decision-making processes and a high share of loyal customers can expect favorable financial results from industrial service strategies. In summary, this research provides significant insights and managerial guidance for turning service strategies into financial successes.
AU - Eggert, Andreas
AU - Hogreve, Jens
AU - Ulaga, Wolfgang
AU - Münkhoff, Eva
ID - 41341
IS - 1
JF - Journal of Service Research
KW - Organizational Behavior and Human Resource Management
KW - Sociology and Political Science
KW - Information Systems
SN - 1094-6705
TI - Revenue and Profit Implications of Industrial Service Strategies
VL - 17
ER -
TY - CONF
AU - Gregor, Shirley
AU - Müller, Oliver
AU - Seidel, Stefan
ID - 4698
KW - Abstraction
KW - Affordances
KW - Design Science Research
KW - Design Theory
KW - Information Systems Development
KW - Reflection
KW - Theorizing
T2 - European Conference on Information Systems
TI - Reflection, abstraction and theorizing in design and development research
ER -
TY - CONF
AB - Enduring doubts about the value of IS investments reveal that IS researchers have not fully managed to identify and to explain the economic benefits of IS. This paper assumes that literature reviews, which represent a powerful instrument for the identification and synthesis of knowledge, have not tapped their full potential to address this issue due to deficiencies in methodology. The analysis of 18 literature reviews published in pertinent academic outlets during the past 20 years shows such deficiencies. Two of the most critical weaknesses identified are (1) the lack of theory use in most reviews and (2) a weak linkage of reviews, resulting in little progress in theory and framework development. The systematic identification of these weaknesses and the extraction of promising methodological examples from past literature are the main contributions of this work, which supports the composition of more effective literature reviews in future research.
AU - Schryen, Guido
ID - 5643
KW - Literature review
KW - Business value
KW - Information systems
KW - Methodology
KW - Theory
T2 - Proceedings of the First Scandinavian Conference on Information Systems (SCIS)
TI - An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness
ER -
TY - JOUR
AB - The economic relevance of information systems has been studied for many years and has attracted an abundance of research papers. However, the ?productivity paradoxon? of the 90s, Carr?s widely recognized paper ?IT doesn?t matter?, and several studies that do not find a positive correlation between IS investments and economic performance reveal long-lasting difficulties for IS researchers to explain ?IS business value?. Business executives and researchers also continue to question the value of IS investments. This raises the question of whether literature reviews have tapped their potential to address the concerns by covering key research areas of IS business value and preserving their key findings. In order to address this question, this paper identifies and describes 12 key research areas, and synthesizes what literature reviews published in pertinent academic outlets have done to preserve knowledge. The analysis of 22 literature reviews shows that some crucial areas have not been (sufficiently) covered. They provide fertile areas for future literature reviews. As this work is based on the results of more than 200 research papers, it is capable of drawing a comprehensive picture of the current state-of-the-art in IS business value research.
AU - Schryen, Guido
ID - 5644
IS - 4
JF - Business \& Information Systems Engineering (BISE)
KW - Business value
KW - Information systems
KW - Literature review
KW - Meta review
TI - Preserving knowledge on IS business value: what literature reviews have done
VL - 52
ER -
TY - CONF
AU - Pottebaum, Jens
AU - Japs, Anna Maria
AU - Prödel, Stephan
AU - Koch, Rainer
ED - French, Simon
ED - Tomaszewski, Brian
ED - Zobel, Chris
ID - 24065
KW - Command and control process
KW - Command and control systems
KW - Design and modeling
KW - Domain ontologies
KW - Emergency response
KW - Fire extinguishers
KW - Fire protection
KW - Heterogeneous domains
KW - Information analysis
KW - Information sharing
KW - Information systems
KW - Interoperability
KW - Ontology language
KW - Semantic technologies
KW - Semantic Web
KW - Semantics
T2 - ISCRAM 2010 -- 7th International Conference on Information Systems for Crisis Response and Management
TI - Design and modeling of a domain ontology for fire protection
ER -
TY - CONF
AB - With the wide availability of network supporting hard-and software cooperative computer-based environments became extremely popular. A wide range of CSCW (Computer Supported Cooperative Work) tools with video conferencing, electronic mail, shared whiteboards, discussion forums, and shared information systems are already part of daily business. In contrast to the unstructured linear stream of information in electronic mails shared workspaces provide structured administration of electronic information like documents, voice, pictures, and movies. Popular examples of shared workspaces are BSCW (Basic Support for Cooperative Work), Hypernews, Lotus Notes, Alta Vista Forum, Lifelink, Microsoft Exchange and Webshare. Currently, all these systems are not flexible enough to get easily customized to the requirements of the individual application and user only supporting a limited set of predefined different views and functionality. This article introduces VIPspace (Visually Programmable Workspace). VIPspace can be easily customized to the individual needs of an user through VIPrule, a combination of a form- and icon-based visual programming language. VIPrule is based on an easy-to-use drag and drop paradigm. Direct manipulation via drag and drop allows easy access to local file systems as well as manipulation, exchange, and publication of shared multimedia documents. As VIPspace is implemented in Java it nicely integrates with other web-applications and provides a platform independent environment with a uniform graphical user interface.
AU - Dücker, M.
AU - Müller, Wolfgang
AU - Rubart, Jessica
ID - 39496
KW - Collaborative work
KW - Electronic mail
KW - Computer networks
KW - Video sharing
KW - Videoconference
KW - Discussion forums
KW - Information systems
KW - Streaming media
KW - Motion pictures
KW - Computer languages
SN - 0-8186-8712-6
T2 - Proceedings. 1998 IEEE Symposium on Visual Languages
TI - VIPspace - A Visually Programmable Shared Workspace
ER -