TY - CONF AB - Since historical times, cartographic maps have revealed spatial relations and enabled decisions and processes. Geographic Information Systems (GIS) allow for acquisition, management, analysis, and presentation of geospatial objects. With free geospatial data becoming available through open data policies and an increasing amount of digitally connected objects in the Internet of Things (IoT), GIS are becoming indispensable to Information Systems (IS) research. However, the consideration and relevance of GIS has only been investigated rarely. We examine, how and in which fields of application GIS have been studied in the IS literature and elicit the importance of GIS regarding their design and usage. A systematic literature review leads us to develop four research propositions. Our results indicate that GIS are still an undeservedly underrepresented discipline in IS and should be more theorized, put center-stage in design-oriented research, and considered for creating superior value co-creation in service systems. AU - Priefer, Jennifer ED - Bui, T.X. ED - Sprague, R.H. ID - 37497 KW - GIS KW - Industry 4.0 KW - and Sustainability KW - geographic information systems KW - geospatial data KW - gis KW - information systems research KW - literature review T2 - Proceedings of the 56th Hawaii International Conference on System Sciences TI - Geographic Information Systems in Information Systems Research - Review and Research Prospects ER - TY - JOUR AU - Pfeiffer, Jella AU - Gutschow, Julia AU - Haas, Christian AU - Möslein, Florian AU - Maspfuhl, Oliver AU - Borgers, Frederik AU - Alpsancar, Suzana ID - 41874 JF - Business & Information Systems Engineering KW - Information Systems SN - 2363-7005 TI - Algorithmic Fairness in AI ER - TY - JOUR AB - The success of engineering complex technical systems is determined by meeting customer requirements and institutional regulations. One example relevant to the automobile industry is the United Nations Economic Commission of Europe (UN ECE), which specifies the homologation of automobile series and requires proof of traceability. The required traceability can be achieved by modeling system artifacts and their relations in a consistent, seamless model—an effect-chain model. Currently, no in-depth methodology exists to support engineers in developing certification-compliant effect-chain models. For this purpose, a new methodology for certification-compliant effect-chain modeling was developed, which includes extensions of an existing method, suitable models, and tools to support engineers in the modeling process. For evaluation purposes, applicability is proven based on the experience of more than 300 workshops at an automotive OEM and an automotive supplier. The following case example is chosen to demonstrate applicability: the development of a window lifter that has to meet the demands of UN ECE Regulations R156 and R21. Results indicate multiple benefits in supporting engineers with the certification-compliant modeling of effect chains. Three benefits are goal-oriented modeling to reduce the necessary modeling capacity, increasing model quality by applying information quality criteria, and the potential to reduce costs through automatable effect-chain analyses for technical changes. Further, companies in the automotive and other industries will benefit from increased modeling capabilities that can be used for architecture modeling and to comply with other regulations such as ASPICE or ISO 26262. AU - Gräßler, Iris AU - Wiechel, Dominik AU - Koch, Anna-Sophie AU - Sturm, Tim AU - Markfelder, Thomas ID - 44382 IS - 3 JF - Systems KW - Information Systems and Management KW - Computer Networks and Communications KW - Modeling and Simulation KW - Control and Systems Engineering KW - Software SN - 2079-8954 TI - Methodology for Certification-Compliant Effect-Chain Modeling VL - 11 ER - TY - JOUR AB - AbstractGraffiti is an urban phenomenon that is increasingly attracting the interest of the sciences. To the best of our knowledge, no suitable data corpora are available for systematic research until now. The Information System Graffiti in Germany project (Ingrid) closes this gap by dealing with graffiti image collections that have been made available to the project for public use. Within Ingrid, the graffiti images are collected, digitized and annotated. With this work, we aim to support the rapid access to a comprehensive data source on Ingrid targeted especially by researchers. In particular, we present IngridKG, an RDF knowledge graph of annotated graffiti, abides by the Linked Data and FAIR principles. We weekly update IngridKG by augmenting the new annotated graffiti to our knowledge graph. Our generation pipeline applies RDF data conversion, link discovery and data fusion approaches to the original data. The current version of IngridKG contains 460,640,154 triples and is linked to 3 other knowledge graphs by over 200,000 links. In our use case studies, we demonstrate the usefulness of our knowledge graph for different applications. AU - Sherif, Mohamed Ahmed AU - da Silva, Ana Alexandra Morim AU - Pestryakova, Svetlana AU - Ahmed, Abdullah Fathi AU - Niemann, Sven AU - Ngomo, Axel-Cyrille Ngonga ID - 45484 IS - 1 JF - Scientific Data KW - Library and Information Sciences KW - Statistics KW - Probability and Uncertainty KW - Computer Science Applications KW - Education KW - Information Systems KW - Statistics and Probability SN - 2052-4463 TI - IngridKG: A FAIR Knowledge Graph of Graffiti VL - 10 ER - TY - JOUR AU - Trier, Matthias AU - Kundisch, Dennis AU - Beverungen, Daniel AU - Müller, Oliver AU - Schryen, Guido AU - Mirbabaie, Milad AU - Trang, Simon ID - 45872 JF - Business & Information Systems Engineering KW - Information Systems SN - 2363-7005 TI - Digital Responsibility ER - TY - JOUR AU - Bartelheimer, Christian AU - zur Heiden, Philipp AU - Berendes, Carsten Ingo AU - Beverungen, Daniel ID - 46478 JF - European Journal of Information Systems KW - Library and Information Sciences KW - Information Systems SN - 0960-085X TI - Designing digital actor engagement platforms for local high streets: an action design research study ER - TY - JOUR AB - AbstractWorking conditions of knowledge workers have been subject to rapid change recently. Digital nomadism is no longer a phenomenon that relates only to entrepreneurs, freelancers, and gig workers. Corporate employees, too, have begun to uncouple their work from stationary (home) offices and 9-to-5 schedules. However, pursuing a permanent job in a corporate environment is still subject to fundamentally different values than postulated by the original notion of digital nomadism. Therefore, this paper explores the work identity of what is referred to as ‘corporate nomads’. By drawing on identity theory and the results of semi-structured interviews, the paper proposes a conceptualization of the corporate nomad archetype and presents nine salient identity issues of corporate nomads (e.g., holding multiple contradictory identities, the flexibility paradox, or collaboration constraints). By introducing the ‘corporate nomad’ archetype to the Information Systems literature, this article helps to rethink established conceptions of “home office” and socio-spatial configurations of knowledge work. AU - Marx, Julian AU - Stieglitz, Stefan AU - Brünker, Felix AU - Mirbabaie, Milad ID - 44143 JF - Business & Information Systems Engineering KW - Information Systems SN - 2363-7005 TI - Home (Office) is where your Heart is ER - TY - JOUR AU - Stieglitz, Stefan AU - Mirbabaie, Milad AU - Deubel, Annika AU - Braun, Lea-Marie AU - Kissmer, Tobias ID - 45458 JF - International Journal of Information Management KW - Library and Information Sciences KW - Computer Networks and Communications KW - Information Systems SN - 0268-4012 TI - The potential of digital nudging to bridge the gap between environmental attitude and behavior in the usage of smart home applications VL - 72 ER - TY - JOUR AB - The introduction of Systems Engineering is an approach for dealing with the increasing complexity of products and their associated product development. Several introduction strategies are available in the literature; nevertheless, the introduction of Systems Engineering into practice still poses a great challenge to companies. Many companies have already gained experience in the introduction of Systems Engineering. Therefore, as part of the SE4OWL research project, the need to conduct a study including expert interviews and to collect the experiences of experts was identified. A total of 78 hypotheses were identified from 13 expert interviews concerning the lessons learned. Using exclusion criteria, 52 hypotheses were validated in a subsequent quantitative survey with 112 participants. Of these 52 hypotheses, 40 could be confirmed based on the survey results. Only four hypotheses were rejected, and eight could neither be confirmed nor rejected. Through this research, guidance is provided to companies to leverage best practices for the introduction of their own Systems Engineering and to avoid the poor practices of other companies. AU - Wilke, Daria AU - Grothe, Robin AU - Bretz, Lukas AU - Anacker, Harald AU - Dumitrescu, Roman ID - 47800 IS - 3 JF - Systems KW - Information Systems and Management KW - Computer Networks and Communications KW - Modeling and Simulation KW - Control and Systems Engineering KW - Software SN - 2079-8954 TI - Lessons Learned from the Introduction of Systems Engineering VL - 11 ER - TY - JOUR AB - Service frontline encounters between customers and service providers have been subject to fundamental changes in recent years. As two major change agents, technology infusion and data privacy regulations are inextricably linked and constitute a critical ethical and societal issue. Specifically, service frontlines—as represented by human or technological agents, or some hybrid form—rely on customer data for service provision, which subjects them to privacy regulations governing the collection, submission, access, and use of any customer data thus captured. However, scant research outlines the significant implications of evolving data privacy regulations for service frontline encounters. To advance knowledge in this domain, this research distills six key dimensions of global data privacy regulations (fairness, data limits, transparency, control, consent, and recourse). Employing an intelligences theoretical lens, the authors theorize how these dimensions might become differentially manifest across three service frontline interface types (human-based, technology-based, and hybrid). Carefully intersecting the need for varying intelligences across data privacy regulatory dimensions with the abilities of service frontline interfaces to harness each intelligence type, this study offers a novel conceptual framework that advances research and practice. Theoretical, managerial, and policy implications unfold from the proposed framework, which also can inform a future research agenda. AU - Steinhoff, Lena AU - Martin, Kelly D. ID - 49157 IS - 3 JF - Journal of Service Research KW - Organizational Behavior and Human Resource Management KW - Sociology and Political Science KW - Information Systems SN - 1094-6705 TI - Putting Data Privacy Regulation into Action: The Differential Capabilities of Service Frontline Interfaces VL - 26 ER - TY - JOUR AB - AbstractWorkarounds are goal‐driven deviations from the standard operating procedures performed to overcome obstacles constraining day‐to‐day work. Despite starting as temporary fixes, they can become established across an organisation and trigger the innovation of processes and IT artefacts that can resolve misfits permanently. Although prior research has elicited antecedents and types of workarounds, it is not known how workarounds diffuse in an organisation and, thereby, innovating co‐workers' activities, IT artefacts, and organisational structures. The results of our multiple two‐year case study provide unique empirical insights into the diffusion of workarounds and how they can act as generative mechanisms for bottom‐up process innovation. AU - Bartelheimer, Christian AU - Wolf, Verena AU - Beverungen, Daniel ID - 51770 IS - 5 JF - Information Systems Journal KW - Computer Networks and Communications KW - Information Systems KW - Software SN - 1350-1917 TI - Workarounds as generative mechanisms for bottom‐up process innovation—Insights from a multiple case study VL - 33 ER - TY - JOUR AU - Castenow, Jannik AU - Kling, Peter AU - Knollmann, Till AU - Meyer auf der Heide, Friedhelm ID - 29843 JF - Information and Computation KW - Computational Theory and Mathematics KW - Computer Science Applications KW - Information Systems KW - Theoretical Computer Science SN - 0890-5401 TI - A Discrete and Continuous Study of the Max-Chain-Formation Problem ER - TY - JOUR AU - Shollo, Arisa AU - Hopf, Konstantin AU - Thiess, Tiemo AU - Müller, Oliver ID - 32866 IS - 3 JF - The Journal of Strategic Information Systems KW - Information Systems and Management KW - Information Systems KW - Management Information Systems SN - 0963-8687 TI - Shifting ML value creation mechanisms: A process model of ML value creation VL - 31 ER - TY - JOUR AB - AbstractBusiness process management (BPM) drives corporate success through effective and efficient processes. In recent decades, knowledge has been accumulated regarding the identification, discovery, analysis, design, implementation, and monitoring of business processes. This includes methods and tools for tackling various kinds of process change such as continuous process improvement, process reengineering, process innovation, and process drift. However, exogenous shocks, which lead to unintentional and radical process change, have been neglected in BPM research although they severely affect an organization’s context, strategy, and business processes. This research note conceptualizes the interplay of exogenous shocks and BPM in terms of the effects that such shocks can have on organizations’ overall process performance over time. On this foundation, related challenges and opportunities for BPM via several rounds of idea generation and consolidation within a diverse team of BPM scholars are identified. The paper discusses findings in light of extant literature from BPM and related disciplines, as well as present avenues for future (BPM) research to invigorate the academic discourse on the topic. AU - Röglinger, Maximilian AU - Plattfaut, Ralf AU - Borghoff, Vincent AU - Kerpedzhiev, Georgi AU - Becker, Jörg AU - Beverungen, Daniel AU - vom Brocke, Jan AU - Van Looy, Amy AU - del-Río-Ortega, Adela AU - Rinderle-Ma, Stefanie AU - Rosemann, Michael AU - Santoro, Flavia Maria AU - Trkman, Peter ID - 35741 IS - 5 JF - Business & Information Systems Engineering KW - Information Systems SN - 2363-7005 TI - Exogenous Shocks and Business Process Management VL - 64 ER - TY - JOUR AU - Constantiou, Ioanna AU - Mukkamala, Alivelu AU - Sjöklint, Mimmi AU - Trier, Matthias ID - 36961 JF - European Journal of Information Systems KW - Library and Information Sciences KW - Information Systems SN - 0960-085X TI - Engaging with self-tracking applications: how do users respond to their performance data? ER - TY - CONF AB - Social media have become not only integral parts of our private and professional lives, but also an indispensable source of data for empirical research across a variety of academic disciplines. Applying a Social Media Analytics (SMA) methodology, however, imposes heavy ethical challenges on researchers. Scholars in the Information Systems (IS) discipline must deal with a patchwork of ethical frameworks, regulations, and (missing) institutional support. To initiate a debate on how to develop a common understanding of SMA research ethics, this paper compiles a scoping review of extant literature and suggests a research agenda for IS scholarship on this matter. The review yields a total of eight fundamental principles of ethical SMA research, which provide a starting point to guiding individual researchers towards more ethical conduct. At the same time, this work unearths a multitude of intricate dilemmas that are currently unresolved. The findings of this review will encourage IS scholarship to find its own voice in the debate about social media research ethics. AU - Marx, Julian AU - Mirbabaie, Milad ID - 37140 KW - Information Systems and Management KW - Human-Computer Interaction KW - Business KW - Management and Accounting (miscellaneous) KW - Information Systems SN - 1449-8618 T2 - Australasian Journal of Information Systems TI - The Investigator’s Dilemma - A Review of Social Media Analytics Research Ethics in Information Systems VL - 26 ER - TY - JOUR AU - Stieglitz, Stefan AU - Hofeditz, Lennart AU - Brünker, Felix AU - Ehnis, Christian AU - Mirbabaie, Milad AU - Ross, Björn ID - 37148 JF - International Journal of Information Management KW - Library and Information Sciences KW - Computer Networks and Communications KW - Information Systems SN - 0268-4012 TI - How crises are different - Design principles for conversational agents to support Emergency Management Agencies VL - 63 ER - TY - JOUR AU - Mirbabaie, Milad AU - Brendel, Alfred B. AU - Hofeditz, Lennart ID - 37147 IS - 1 JF - Communications of the Association for Information Systems KW - Information Systems SN - 1529-3181 TI - Ethics and AI in Information Systems Research VL - 50 ER - TY - JOUR AU - Mirbabaie, Milad AU - Stieglitz, Stefan AU - Marx, Julian ID - 37139 IS - 2 JF - Business & Information Systems Engineering KW - Information Systems SN - 2363-7005 TI - Catchword: Digital Detox VL - 64 ER - TY - JOUR AB - Service frontline encounters between customers and service providers have been subject to fundamental changes in recent years. As two major change agents, technology infusion and data privacy regulations are inextricably linked and constitute a critical ethical and societal issue. Specifically, service frontlines—as represented by human or technological agents, or some hybrid form—rely on customer data for service provision, which subjects them to privacy regulations governing the collection, submission, access, and use of any customer data thus captured. However, scant research outlines the significant implications of evolving data privacy regulations for service frontline encounters. To advance knowledge in this domain, this research distills six key dimensions of global data privacy regulations (fairness, data limits, transparency, control, consent, and recourse). Employing an intelligences theoretical lens, the authors theorize how these dimensions might become differentially manifest across three service frontline interface types (human-based, technology-based, and hybrid). Carefully intersecting the need for varying intelligences across data privacy regulatory dimensions with the abilities of service frontline interfaces to harness each intelligence type, this study offers a novel conceptual framework that advances research and practice. Theoretical, managerial, and policy implications unfold from the proposed framework, which also can inform a future research agenda. AU - Steinhoff, Lena AU - Martin, Kelly D. ID - 41317 JF - Journal of Service Research KW - Organizational Behavior and Human Resource Management KW - Sociology and Political Science KW - Information Systems SN - 1094-6705 TI - Putting Data Privacy Regulation into Action: The Differential Capabilities of Service Frontline Interfaces ER - TY - JOUR AU - Constantiou, Ioanna AU - Mukkamala, Alivelu AU - Sjöklint, Mimmi AU - Trier, Matthias ID - 36083 JF - European Journal of Information Systems KW - Library and Information Sciences KW - Information Systems KW - Self-Tracking KW - User Behaviour KW - Discontinuance SN - 0960-085X TI - Engaging with self-tracking applications: how do users respond to their performance data? ER - TY - JOUR AU - Constantiou, Ioanna AU - Mukkamala, Alivelu AU - Sjöklint, Mimmi AU - Trier, Matthias ID - 36960 JF - European Journal of Information Systems KW - Library and Information Sciences KW - Information Systems SN - 0960-085X TI - Engaging with self-tracking applications: how do users respond to their performance data? ER - TY - JOUR AB - AbstractOrganizations increasingly introduce collaborative technologies in form of virtual assistants (VAs) to save valuable resources, especially when employees are assisted with work-related tasks. However, the effect of VAs on virtual teams and collaboration remains uncertain, particularly whether employees show social loafing (SL) tendencies, i.e., applying less effort for collective tasks compared to working alone. While extant research indicates that VAs collaboratively working in teams exert greater results, less is known about SL in virtual collaboration and how responsibility attribution alters. An online experiment with N = 102 was conducted in which participants were assisted by a VA in solving a task. The results indicate SL tendencies in virtual collaboration with VAs and that participants tend to cede responsibility to the VA. This study makes a first foray and extends the information systems (IS) literature by analyzing SL and responsibility attribution thus updates our knowledge on virtual collaboration with VAs. AU - Stieglitz, Stefan AU - Mirbabaie, Milad AU - Möllmann, Nicholas R. J. AU - Rzyski, Jannik ID - 37146 IS - 3 JF - Information Systems Frontiers KW - Computer Networks and Communications KW - Information Systems KW - Theoretical Computer Science KW - Software SN - 1387-3326 TI - Collaborating with Virtual Assistants in Organizations: Analyzing Social Loafing Tendencies and Responsibility Attribution VL - 24 ER - TY - JOUR AB - Literature reviews (LRs) play an important role in the development of domain knowledge in all fields. Yet, we observe a lack of insights into the activities with which LRs actually develop knowledge. To address this important gap, we (1) derive knowledge building activities from the extant literature on LRs, (2) suggest a knowledge-based typology of LRs that complements existing typologies, and (3) apply the suggested typology in an empirical study that explores how LRs with different goals and methodologies have contributed to knowledge development. The analysis of 240 LRs published in 40 renowned IS journals between 2000 and 2014 allows us to draw a detailed picture of knowledge development achieved by one of the most important genres in the IS field. An overarching contribution of our work is to unify extant conceptualizations of LRs by clarifying and illustrating how LRs apply different methodologies in a range of knowledge building activities to achieve their goals with respect to theory. AU - Schryen, Guido AU - Wagner, Gerit AU - Benlian, Alexander AU - Paré, Guy ID - 11946 JF - Communications of the AIS KW - Literature review KW - knowledge development KW - knowledge building activities KW - knowledge-based typology KW - information systems research SN - 1529-3181 TI - A Knowledge Development Perspective on Literature Reviews: Validation of a New Typology in the IS Field VL - 46 ER - TY - JOUR AB - Openness in science and education is increasing in importance within the digital knowledge society. So far, less attention has been paid to teaching Open Science in bachelor’s degrees or in qualitative methods. Therefore, the aim of this article is to use a seminar example to explore what Open Science practices can be taught in qualitative research and how digital tools can be involved. The seminar focused on the following practices: Open data practices, the practice of using the free and open source tool “Collaborative online Interpretation, the practice of participating, cooperating, collaborating and contributing through participatory technologies and in social (based) networks. To learn Open Science practices, the students were involved in a qualitative research project about “Use of digital technologies for the study and habitus of students”. The study shows the practices of Open Data are easy to teach, whereas the use of free and open source tools and participatory technologies for collaboration, participation, cooperation and contribution is more difficult. In addition, a cultural shift would have to take place within German universities to promote Open Science practices in general. AU - Steinhardt, Isabel ID - 29246 IS - 3 JF - Education for Information KW - Open Science KW - Open Education Practices KW - Library and Information Sciences KW - Education KW - Information Systems SN - 0167-8329 TI - Learning Open Science by doing Open Science. A reflection of a qualitative research project-based seminar VL - 36 ER - TY - JOUR AU - Müller, Oliver AU - Junglas, Iris AU - vom Brocke, Jan AU - Debortoli, Stefan ID - 4689 IS - 4 JF - European Journal of Information Systems KW - analytics KW - big data KW - data source KW - information systems research KW - methodology SN - 14769344 TI - Utilizing big data analytics for information systems research: Challenges, promises and guidelines ER - TY - JOUR AU - Borgwardt, Stefan AU - Mailis, Theofilos AU - Peñaloza, Rafael AU - Turhan, Anni-Yasmin ID - 52747 IS - 2 JF - Journal on Data Semantics KW - Artificial Intelligence KW - Computer Networks and Communications KW - Information Systems SN - 1861-2032 TI - Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies VL - 5 ER - TY - JOUR AU - Borgwardt, Stefan AU - Mailis, Theofilos AU - Peñaloza, Rafael AU - Turhan, Anni-Yasmin ID - 52803 IS - 2 JF - Journal on Data Semantics KW - Artificial Intelligence KW - Computer Networks and Communications KW - Information Systems SN - 1861-2032 TI - Answering Fuzzy Conjunctive Queries Over Finitely Valued Fuzzy Ontologies VL - 5 ER - TY - CONF AB - Nowadays, providing employees with failure-free access to various systems, applications and services is a crucial factor for organizations? success as disturbances potentially inhibit smooth workflows and thereby harm productivity. However, it is a challenging task to assign access rights to employees? accounts within a satisfying time frame. In addition, the management of multiple accounts and identities can be very onerous and time consuming for the responsible administrator and therefore expensive for the organization. In order to meet these challenges, firms decide to invest in introducing an Identity and Access Management System (IAMS) that supports the organization by using policies to assign permissions to accounts, groups, and roles. In practice, since various versions of IAMSs exist, it is a challenging task to decide upon introduction of an IAMS. The following study proposes a first attempt of a decision support model for practitioners which considers four alternatives: Introduction of an IAMS with Role-based Access Control RBAC) or without and no introduction of IAMS again with or without RBAC. To underpin the practical applicability of the proposed model, we parametrize and operationalize it based on a real world use case using input from an expert interview. AU - Weishäupl, Eva AU - Kunz, Michael AU - Yasasin, Emrah AU - Wagner, Gerit AU - Prester, Julian AU - Schryen, Guido AU - Pernul, Günther ID - 5590 KW - Identity and Access Management KW - Economic Decision Making KW - Information Systems KW - Information Security Investment KW - Decision Theory T2 - 2nd International Workshop on Security in highly connected IT Systems (SHCIS?15) TI - Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory ER - TY - JOUR AB - In service industries, hierarchical loyalty programs are common relationship marketing instruments that award elevated status to customers who exceed a certain spending level (e.g., gold membership). In practice, service companies offer elevated status to some customers who do not meet the required spending level, in an attempt to profit from the profound allure of status. Relying on social psychology research and a mixed-method approach, this study analyzes the loyalty impact of status endowments, defined as awards of elevated status to customers who are not entitled to it. An exploratory qualitative study identifies customer gratitude and customer skepticism as positive and negative mediators, respectively, of customers’ attitudinal responses to endowed status. Quantitative studies—two experimental and one survey—substantiate these bright and dark sides of endowed status. The efficacy of status endowment is contingent on the context. To alleviate the dark-side effect, managers can allow target customers to actively choose whether to be endowed, especially those who are close to achieving the status already, and provide valuable preferential treatment to customers elevated by either endowment or achievement. These insights offer guidelines for whether and how to use status endowment in hierarchical loyalty programs. AU - Eggert, Andreas AU - Steinhoff, Lena AU - Garnefeld, Ina ID - 41297 IS - 2 JF - Journal of Service Research KW - Organizational Behavior and Human Resource Management KW - Sociology and Political Science KW - Information Systems SN - 1094-6705 TI - Managing the Bright and Dark Sides of Status Endowment in Hierarchical Loyalty Programs VL - 18 ER - TY - JOUR AB - In many business markets, manufacturers seek service-led growth to secure their existing positions and continue to grow in increasingly competitive environments. Using longitudinal data from 513 German mechanical engineering companies and latent growth curve modeling, this study offers a fine-grained view of the financial performance implications of industrial service strategies. By disentangling the revenue and profit implications of industrial service strategies, findings reveal that such strategies increase both the level and the growth of manufacturing firms’ revenue streams. In contrast, they reduce the level but improve the growth of manufacturers’ profits. Results further suggest that services supporting the clients’ actions (SSC) and services supporting the supplier’s product (SSP) affect performance outcomes in different ways. SSCs directly affect revenue and profit streams. In turn, SSPs display only indirect effects on financial performance mediated through SSCs. A moderator analysis identifies two organizational contingencies that facilitate service business success: Only companies with decentralized decision-making processes and a high share of loyal customers can expect favorable financial results from industrial service strategies. In summary, this research provides significant insights and managerial guidance for turning service strategies into financial successes. AU - Eggert, Andreas AU - Hogreve, Jens AU - Ulaga, Wolfgang AU - Münkhoff, Eva ID - 41341 IS - 1 JF - Journal of Service Research KW - Organizational Behavior and Human Resource Management KW - Sociology and Political Science KW - Information Systems SN - 1094-6705 TI - Revenue and Profit Implications of Industrial Service Strategies VL - 17 ER - TY - CONF AU - Gregor, Shirley AU - Müller, Oliver AU - Seidel, Stefan ID - 4698 KW - Abstraction KW - Affordances KW - Design Science Research KW - Design Theory KW - Information Systems Development KW - Reflection KW - Theorizing T2 - European Conference on Information Systems TI - Reflection, abstraction and theorizing in design and development research ER - TY - CONF AB - Enduring doubts about the value of IS investments reveal that IS researchers have not fully managed to identify and to explain the economic benefits of IS. This paper assumes that literature reviews, which represent a powerful instrument for the identification and synthesis of knowledge, have not tapped their full potential to address this issue due to deficiencies in methodology. The analysis of 18 literature reviews published in pertinent academic outlets during the past 20 years shows such deficiencies. Two of the most critical weaknesses identified are (1) the lack of theory use in most reviews and (2) a weak linkage of reviews, resulting in little progress in theory and framework development. The systematic identification of these weaknesses and the extraction of promising methodological examples from past literature are the main contributions of this work, which supports the composition of more effective literature reviews in future research. AU - Schryen, Guido ID - 5643 KW - Literature review KW - Business value KW - Information systems KW - Methodology KW - Theory T2 - Proceedings of the First Scandinavian Conference on Information Systems (SCIS) TI - An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness ER - TY - JOUR AB - The economic relevance of information systems has been studied for many years and has attracted an abundance of research papers. However, the ?productivity paradoxon? of the 90s, Carr?s widely recognized paper ?IT doesn?t matter?, and several studies that do not find a positive correlation between IS investments and economic performance reveal long-lasting difficulties for IS researchers to explain ?IS business value?. Business executives and researchers also continue to question the value of IS investments. This raises the question of whether literature reviews have tapped their potential to address the concerns by covering key research areas of IS business value and preserving their key findings. In order to address this question, this paper identifies and describes 12 key research areas, and synthesizes what literature reviews published in pertinent academic outlets have done to preserve knowledge. The analysis of 22 literature reviews shows that some crucial areas have not been (sufficiently) covered. They provide fertile areas for future literature reviews. As this work is based on the results of more than 200 research papers, it is capable of drawing a comprehensive picture of the current state-of-the-art in IS business value research. AU - Schryen, Guido ID - 5644 IS - 4 JF - Business \& Information Systems Engineering (BISE) KW - Business value KW - Information systems KW - Literature review KW - Meta review TI - Preserving knowledge on IS business value: what literature reviews have done VL - 52 ER - TY - CONF AU - Pottebaum, Jens AU - Japs, Anna Maria AU - Prödel, Stephan AU - Koch, Rainer ED - French, Simon ED - Tomaszewski, Brian ED - Zobel, Chris ID - 24065 KW - Command and control process KW - Command and control systems KW - Design and modeling KW - Domain ontologies KW - Emergency response KW - Fire extinguishers KW - Fire protection KW - Heterogeneous domains KW - Information analysis KW - Information sharing KW - Information systems KW - Interoperability KW - Ontology language KW - Semantic technologies KW - Semantic Web KW - Semantics T2 - ISCRAM 2010 -- 7th International Conference on Information Systems for Crisis Response and Management TI - Design and modeling of a domain ontology for fire protection ER - TY - CONF AB - With the wide availability of network supporting hard-and software cooperative computer-based environments became extremely popular. A wide range of CSCW (Computer Supported Cooperative Work) tools with video conferencing, electronic mail, shared whiteboards, discussion forums, and shared information systems are already part of daily business. In contrast to the unstructured linear stream of information in electronic mails shared workspaces provide structured administration of electronic information like documents, voice, pictures, and movies. Popular examples of shared workspaces are BSCW (Basic Support for Cooperative Work), Hypernews, Lotus Notes, Alta Vista Forum, Lifelink, Microsoft Exchange and Webshare. Currently, all these systems are not flexible enough to get easily customized to the requirements of the individual application and user only supporting a limited set of predefined different views and functionality. This article introduces VIPspace (Visually Programmable Workspace). VIPspace can be easily customized to the individual needs of an user through VIPrule, a combination of a form- and icon-based visual programming language. VIPrule is based on an easy-to-use drag and drop paradigm. Direct manipulation via drag and drop allows easy access to local file systems as well as manipulation, exchange, and publication of shared multimedia documents. As VIPspace is implemented in Java it nicely integrates with other web-applications and provides a platform independent environment with a uniform graphical user interface. AU - Dücker, M. AU - Müller, Wolfgang AU - Rubart, Jessica ID - 39496 KW - Collaborative work KW - Electronic mail KW - Computer networks KW - Video sharing KW - Videoconference KW - Discussion forums KW - Information systems KW - Streaming media KW - Motion pictures KW - Computer languages SN - 0-8186-8712-6 T2 - Proceedings. 1998 IEEE Symposium on Visual Languages TI - VIPspace - A Visually Programmable Shared Workspace ER -