
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>AIS InPractice</title>
<link>https://aisnet.org/members/blog_view.asp?id=1706903&amp;rss=2r6h4pLt</link>
<description><![CDATA[InPractice is an online newsletter targeted at our practitioner members.  Published monthly, InPractice showcases articles published in the AIS journals (JAIS, CAIS, PAJAIS, AIS THCI,TRR, and MISQE). Authors of newly uploaded eLibrary papers will be invited to voluntarily prepare and submit a brief synopsis of their paper targeting practitioners.  Dennis Galletta serves as the AIS InPractice editor.

AIS invites all authors to submit summaries for considering in InPractice. The benefits of publishing in InPractice include:
- Free, organized publicity for your study
- Providing more opportunity for research to gain traction in the world of practice
- Providing visibility for a larger body of research

To submit summaries for consideration, please email Dennis Galletta at Galletta@pitt.edu with the following information:
1. A summary of the paper written in approximately 200 words, including key takeaways
2. Permission in email to use the summary through InPractice
3. Photos ]]></description>
<lastBuildDate>Mon, 13 Apr 2026 05:45:10 GMT</lastBuildDate>
<pubDate>Mon, 3 Feb 2020 15:59:12 GMT</pubDate>
<copyright>Copyright &#xA9; 2020 Association for Information Systems (AIS)</copyright>
<atom:link href="https://aisnet.org/members/blog_rss.asp?id=1706903&amp;rss=2r6h4pLt" rel="self" type="application/rss+xml"></atom:link>
<item>
<title>How a Low-Margin Business Cocreated Analytics Value through an Innovation Partnership</title>
<link>https://aisnet.org/members/blog_view.asp?id=1706903&amp;post=339820</link>
<guid>https://aisnet.org/members/blog_view.asp?id=1706903&amp;post=339820</guid>
<description><![CDATA[<p><img alt="" src="https://aisnet.org/resource/resmgr/inpractice/img_4113_favorite.jpg" style="width: 132.273px; top: 221.534px; height: 168.455px;" />&nbsp;<img alt="" src="https://aisnet.org/resource/resmgr/inpractice/peters_headshot.jpg" style="width: 125px; height: 169.182px; top: 135.27px;" />&nbsp;<img alt="" src="https://aisnet.org/resource/resmgr/inpractice/img_4091_favorite.jpg" style="width: 135.455px; left: 310.696px; top: 133.352px; height: 168.545px;" /></p>
<p>By Hope Koch, Uchenna&nbsp;Peters, Eric Villafranca, and Kevin Koch&nbsp;</p>
<p><strong>Problem&nbsp;</strong></p>
<p> Business unit managers often feel they need to start analytics initiatives to remain competitive. Given the budget constraints placed on business units, including the internal IT business unit, managers have to find innovative ways to pay for the analytics initiatives. Since IT departments are cost centers, this leads to business unit managers trying to launch analytics initiatives outside the purview of the internal IT department. This trend is called shadow IT.&nbsp;</p>
<p><strong>Summary&nbsp;</strong></p>
<p> This article examines how a low-margin company launched an analytics initiative with an analytics vendor that increased profit. The analytics initiative results in the service offering to sell advertising on the sides of the client’s diesel trucks. The solution tracked the number of people who viewed the advertisements and their demographics. The research offers recommendations for low-margin businesses looking to create value with analytics and for IT managers on how to handle shadow IT.&nbsp;</p>
<p><strong>Take-Aways</strong></p>
<ul>
    <li>Shadow IT can lead to innovation, so rather than focusing on restraining business units, IT departments can adopt policies to guide such ventures. </li>
    <li>Co-creation can help analytics vendors and clients explore ways to use analytics in the business. </li>
    <li>Co-destruction, rather than co-creation between analytics vendors and their clients, can emerge. This happens when analytics vendors make up-front investments to help clients explore ways to use analytics that the client does not reciprocate. The client might take the ideas and do it themselves, hire a different vendor, or not move forward.&nbsp;</li>
</ul>]]></description>
<pubDate>Mon, 3 Feb 2020 16:59:12 GMT</pubDate>
</item>
<item>
<title>The Worth of Words: How Technical White Papers Influence ICO Blockchain Funding </title>
<link>https://aisnet.org/members/blog_view.asp?id=1706903&amp;post=339815</link>
<guid>https://aisnet.org/members/blog_view.asp?id=1706903&amp;post=339815</guid>
<description><![CDATA[<p><span>By Benjamin Barraza</span><span></span><u5:p></u5:p></p>
<p><strong>Summary:<u5:p></u5:p></strong></p>
<p>Each ICO has an associated white paper that describes the firm's business model, market, cryptocurrency, the team behind the project, and the technology. Then investments are made in the startups. The white papers differ in scope and detail. Comprehensive white papers describing technologically-sophisticated details raised more money than superficial ones simply making claims. Examples of ICO successes and failures are described.</p>
<p><strong>General Take-aways:<u5:p></u5:p></strong></p>
<ul>
    <li>Initial coin offerings (ICOs) are important to understand because startups play an important role in the global blockchain landscape<u5:p></u5:p></li>
    <li>ICOs resulted in $14 billion invested during their first five years<u5:p></u5:p></li>
    <li>Insights about the processes involved in ICOs shed light on the relationship between technical white papers and the amount of money raised<u5:p></u5:p></li>
    <li>Detailed and comprehensive white papers were most successful<u5:p></u5:p></li>
    <li>This paper follows the "conversation" model, where Barraza's research is explored<u5:p></u5:p></li>
    <li>Insights from history are augmented by insights about changes in the market since his analysis</li>
</ul>
<u5:p></u5:p>]]></description>
<pubDate>Mon, 3 Feb 2020 16:42:10 GMT</pubDate>
</item>
<item>
<title>How an Enterprise Blockchain Application in the U.S. Pharmaceuticals Supply Chain is Saving Lives</title>
<link>https://aisnet.org/members/blog_view.asp?id=1706903&amp;post=339814</link>
<guid>https://aisnet.org/members/blog_view.asp?id=1706903&amp;post=339814</guid>
<description><![CDATA[<p>By Jens Mattke, Christian Maier, Axel Hund, and Tim Weitzel<u5:p></u5:p></p>
<p><strong>Summary:</strong><u5:p></u5:p></p>
<p>A case study examined the progress of a MediLedger, a blockchain-based pharmaceutical supply chain system. The team focused on how blockchain applications can be used in the enterprise context, how they can add value, and what drives their adoption. Through interviews the team discovered how the project developed over time and how the developers solved the challenges that arose. Four lessons provide guidance to other firms.</p>
<p><strong>General Take-aways:<u5:p></u5:p></strong></p>
<ul>
    <li>The US pharmaceuticals market accounts for nearly half of the global market<u5:p></u5:p></li>
    <li>The MediLedger Project filled the void of a lack of a single integrated system to track and verify pharmaceutical products moving through the supply chain<u5:p></u5:p></li>
    <li>The objectives were to design a blockchain-based ecosystem application to meet newly emerging legal regulations and eliminate counterfeit pharmaceuticals in the supply chain<u5:p></u5:p></li>
</ul>
<p><strong>Four key lessons were learned:<u5:p></u5:p></strong></p>
<ol>
    <li>Use a "benevolent dictator" and base governance on "consensus through collaboration"<u5:p></u5:p></li>
    <li>In the blockchain ledger, store proofs that transactions were verified, not the transactions themselves </li>
    <li>Use zero-knowledge proofs to verify product and transaction authenticity while preserving full privacy.<u5:p></u5:p></li>
    <li>Use blockchain application technologies to fix ineffective traditional IS landscapes</li>
</ol>
<u5:p></u5:p>]]></description>
<pubDate>Mon, 3 Feb 2020 16:33:53 GMT</pubDate>
</item>
<item>
<title>How TradeLens Delivers Business Value with Blockchain Technology </title>
<link>https://aisnet.org/members/blog_view.asp?id=1706903&amp;post=339812</link>
<guid>https://aisnet.org/members/blog_view.asp?id=1706903&amp;post=339812</guid>
<description><![CDATA[<p>By&nbsp;<span>Thomas Jensen, Jonas Hedman, and Stefan Henningsson</span></p>
<p><strong>Summary:</strong><u5:p></u5:p></p>
<p>A longitudinal case study provides a rare glimpse into the development and evolution of TradeLens from 2013 to 2019. Data were collected from several sources, including interviews, conferences, focus groups, direct observation, project meetings, and field visits. The business value of this global supply chain system is still evolving, but seven valuable lessons provide guidance for future blockchain projects with interorganizational boundaries.</p>
<p><strong>General take-aways:</strong><u5:p></u5:p></p>
<ul>
    <li>TradeLens is a blockchain-based system used in the international container shipping industry.<u5:p></u5:p></li>
    <li>The system enables a trusted exchange of information between players.<u5:p></u5:p></li>
    <li>The system also enables them to comply with regulations while raising efficiency, reducing administrative costs, lead times, and risk<u5:p></u5:p></li>
    <li>Development of the system required cooperation between two firms, but the process was complex<u5:p></u5:p></li>
    <li>Slow adoption was due to initial concerns about the technology infrastructure being fully in place, and about whether shared documents can be trusted<u5:p></u5:p></li>
</ul>
<p><strong>Seven recommended actions include:</strong><br />
</p>
<ol>
    <li>Refocus strategies towards the entire ecosystem of customers, partners, authorities, and competitors <br />
    </li>
    <li>Early on, focus on the vision, not the return on investment (ROI), because ROI builds as the network effect grows <br />
    </li>
    <li>Solutions to interorganizational problems should be approached from the perspective of distributed control, not firm control <br />
    </li>
    <li>Build partner trust before and after blockchain trust <br />
    </li>
    <li>Some solutions require governmental authority backing early in the process.<br />
    </li>
    <li>Evolve the governance model as adoption expands <br />
    </li>
    <li>Consider blockchain interoperability in strategic plans</li>
</ol>
<u5:p></u5:p>]]></description>
<pubDate>Mon, 3 Feb 2020 16:32:03 GMT</pubDate>
</item>
<item>
<title>Building a Blockchain Application that Complies with the EU General Data Protection Regulation </title>
<link>https://aisnet.org/members/blog_view.asp?id=1706903&amp;post=339811</link>
<guid>https://aisnet.org/members/blog_view.asp?id=1706903&amp;post=339811</guid>
<description><![CDATA[<p>By Alexander Rieger, Jannik Lockl, Florian Guggenmos, Gilbert Fridgen, and Nils Urbach<br />
</p>
<p><strong>Summary:</strong></p>
<p><u5:p></u5:p></p>
<p>The researchers attempted to find out if the regulations of GDPR conflicted with the features and benefits of blockchain technology. They gathered evidence from workshops, meetings, documents, and interviews. The outcome is that third-party services that provide permissioned pseudonyms are indeed able to avoid storing personal information yet provide the shared ledgers needed for blockchains.</p>
<p><strong>General take-aways:</strong><u5:p></u5:p></p>
<ul>
    <li>Blockchain technology offers a promising alternative to centralized systems<u5:p></u5:p></li>
    <li>Legal barriers can arise, such as those from the General Data Protection Regulation (GDPR) in the European Union<u5:p></u5:p></li>
    <li>Those barriers can appear to conflict with the basic properties of blockchain technology<u5:p></u5:p></li>
    <li> However, the challenges can be resoluved by creating GDPR-compliant solutions<u5:p></u5:p></li>
</ul>
<p><strong>Three recommendations are offered for managing and designing GDPR-compliant blockchain solutions: </strong><br />
</p>
<ol>
    <li>Avoid storing personal data on a blockchain<br />
    </li>
    <li>A blockchain solution that needs to process personal data should use a private and permissioned pseudonymization approach <br />
    </li>
    <li>A blockchain solution that needs to coordinate across organizations should use a private and permissioned pseudonymization approach</li>
</ol>
<u5:p></u5:p>]]></description>
<pubDate>Mon, 3 Feb 2020 16:29:31 GMT</pubDate>
</item>
<item>
<title>The Role of Knowledge Management in the Relationship between IT Capability and Interorganizational Performance – An Empirical Investigation</title>
<link>https://aisnet.org/members/blog_view.asp?id=1706903&amp;post=337287</link>
<guid>https://aisnet.org/members/blog_view.asp?id=1706903&amp;post=337287</guid>
<description><![CDATA[<p style="margin: 0px 0px 10px;"><img alt="" src="https://aisnet.org/resource/resmgr/inpractice/Stylianou.jpg" style="height: 121.727px; width: 119.364px;" />&nbsp;<img alt="" src="https://aisnet.org/resource/resmgr/inpractice/chandra.jpg" />&nbsp;&nbsp;<img alt="" src="https://aisnet.org/resource/resmgr/inpractice/Niu.jpg" /><br />
</p>
<p style="margin: 0px 0px 10px;">By Antonis Stylianou, Chandrasekar Subramaniam, Yuan Niu<br />
</p>
<p class="Default" style="margin: 0px 0px 10px;"><span><strong>Problem</strong></span>&nbsp;</p>
<p class="Default" style="margin: 0px 0px 10px;">Research has long posited that the relationship between IT and performance can be explained by investigating overlooked key capabilities that are enabled by IT. These connections are especially not well understood in an inter-organizational (IO) context.</p>
<p class="Default" style="margin: 0px 0px 10px;">Firms that develop competency in managing knowledge resources across their supply chains are rewarded with higher economic benefits. A major challenge in managing IO knowledge are the competing, and often conflicting, goals of firms in the partnership. The key to dealing with this challenge may lie in the use of IT to enable better inter-firm relationships.</p>
<p class="Default" style="margin: 0px 0px 10px;"><span><span><strong>Summary</strong></span></span></p>
<ul style="margin-top: 0px; margin-bottom: 10px;">
    <li class="Default">We investigate the role of relational and KM capabilities in the link between IT and performance in organizational partnerships.</li>
    <li class="Default">We develop and test a comprehensive empirical conceptualization of KM capabilities that refers to the management of “business knowledge,” including the collection, organization, synthesis, and use of business data, information, and insights by the partnering firms.</li>
    <li class="Default">We investigate the role of partner interdependence on IO IT, KM, and performance.</li>
</ul>
<p class="Default" style="margin: 0px 0px 10px;"><span><span><strong>Take-Aways</strong></span></span></p>
<ul style="margin-top: 0px; margin-bottom: 10px;">
    <li class="Default">We demonstrate empirically that IO IT creates value for the partnership. Improved IO relationships in turn strengthen IO KM.</li>
    <li class="Default">The ability of partner firms to collectively manage knowledge resources positively impacts the operational and the strategic performance of the partnership.</li>
    <li class="Default">When the interdependence between IO partners is stronger, partner firms can achieve greater KM benefits by investing more in their relational capabilities, such as building trust and long-term orientation and fostering collaborative partnerships.</li>
    <li class="Default">Our study shows that IO relational capability and IO KM are important missing links that can explain the impact of IT on performance.&nbsp;</li>
</ul>]]></description>
<pubDate>Fri, 6 Dec 2019 21:27:16 GMT</pubDate>
</item>
<item>
<title>Blockchain for the IoT: Privacy-Preserving Protection of Sensor Data</title>
<link>https://aisnet.org/members/blog_view.asp?id=1706903&amp;post=337286</link>
<guid>https://aisnet.org/members/blog_view.asp?id=1706903&amp;post=337286</guid>
<description><![CDATA[<p style="margin: 0px 0px 0.0001pt;"><img alt="" src="https://aisnet.org/resource/resmgr/inpractice/1_mathieu_chanson.jpg" style="width: 108.091px; height: 154px; top: 223.807px;" />&nbsp;<img alt="" src="https://aisnet.org/resource/resmgr/inpractice/2_andreas-bogner__002_.png" style="top: 132.088px; width: 105px; height: 148.364px;" />&nbsp;<img alt="" src="https://aisnet.org/resource/resmgr/inpractice/3_dominik-bilgeri__002_.png" style="top: 129.901px; width: 108px; height: 149.545px;" />&nbsp;<img alt="" src="https://aisnet.org/resource/resmgr/inpractice/4_elgar_fleisch_.jpg" style="width: 119.273px; height: 146.818px; top: 133.807px;" />&nbsp;<img alt="" src="https://aisnet.org/resource/resmgr/inpractice/5_felix-wortmann.png" style="top: 343.253px; width: 106.182px; height: 146.818px;" /></p>
<p style="margin: 0px 0px 0.0001pt;">By&nbsp;Mathieu Chanson, Andreas Bogner, Dominik Bilgeri, Elgar Fleisch, Felix Wortmann</p>
<p style="margin: 0px 0px 0.0001pt;"><span>&nbsp;</span></p>
<p style="margin: 0px 0px 0.0001pt;"><span><strong>Problem</strong></span></p>
<p style="margin: 0px 0px 10px;">The constantly growing pool of smart, connected Internet of Things (IoT) devices poses completely new challenges for business regarding security and privacy. In fact, the widespread adoption of smart products might depend on the ability of organizations to offer systems that ensure adequate sensor data integrity while guaranteeing sufficient user privacy.</p>
<p style="margin: 0px 0px 0.0001pt;"><span><strong>Summary</strong></span></p>
<ul style="margin-top: 0px; margin-bottom: 10px;">
    <li style="margin-bottom: 0.0001pt;">To address this problem, we build upon previous research which indicates that blockchain technology may be a promising means to mitigate issues of data security arising in the IoT.</li>
    <li>We propose a design theory, including requirements, design principles, and features, for a blockchain-based sensor data protection system (SDPS) that leverages data certification.</li>
    <li>We design and develop an instantiation of an SDPS (CertifiCar) that prevents the fraudulent manipulation of car mileage data.</li>
    <li>We provide an ex-post evaluation of our design theory considering CertifiCar and two additional use cases.</li>
</ul>
<p style="margin: 0px 0px 0.0001pt;"><span><strong>Take Aways</strong></span></p>
<ul style="margin-top: 0px; margin-bottom: 10px;">
    <li style="margin-bottom: 0.0001pt;">The evaluation results suggest that the proposed design ensures the tamper-resistant gathering, processing, and exchange of IoT sensor data in a privacy-preserving, scalable, and efficient manner.</li>
    <li style="margin-bottom: 0.0001pt;">Blockchain-based SDPSs inherit core characteristics of blockchain technology (e.g., tamper-resistance) only if fundamental design principles are considered.</li>
    <li style="margin-bottom: 0.0001pt;">In particular, sensor data needs to be protected from source to sink and verified by cross-validation, as universally “tamper-proof” processes cannot be ensured.</li>
    <li style="margin-bottom: 0.0001pt;">Hybrid blockchain architectures are necessary to enable scaling, given the current state of technology.</li>
    <li style="margin-bottom: 0.0001pt;">SDPSs are particularly useful in the case of multi-stage data pipelines that cross organizational boundaries and involve a potentially large ecosystem of players.</li>
    <li style="margin-bottom: 0.0001pt;">A blockchain-based SDPS is often perceived as “neutral” and might be accepted as an industry standard much faster than a centralized system.</li>
    <li style="margin-bottom: 0.0001pt;">Blockchain technology offers firms the opportunity to leverage its built-in state-of-the art cryptography technology for free, which can reduce the need for security specialists.</li>
</ul>]]></description>
<pubDate>Fri, 6 Dec 2019 21:26:23 GMT</pubDate>
</item>
<item>
<title>The Magical &quot;We&quot;: Enhancing Collaboration Transparency in Grounded Theory Method in Information Systems Research</title>
<link>https://aisnet.org/members/blog_view.asp?id=1706903&amp;post=337276</link>
<guid>https://aisnet.org/members/blog_view.asp?id=1706903&amp;post=337276</guid>
<description><![CDATA[<p><img alt="" src="https://aisnet.org/resource/resmgr/inpractice/pek.JPG" style="height: 148.091px; width: 125px;" />&nbsp;<img alt="" src="https://aisnet.org/resource/resmgr/inpractice/rossi.jpg" style="width: 131.727px; height: 147.364px; top: 164.261px;" />&nbsp;<img alt="" src="https://aisnet.org/resource/resmgr/inpractice/smolander.jpg" style="width: 123px; height: 147.818px; top: 163.352px;" />&nbsp;</p>
<p>By Samuli Pekkola, Matti Rossi and Kari Smolander</p>
<p><strong>Problem</strong></p>
<p>Grounded theory (GTM) research aims at understanding practice issues from observing it. When researchers collaborate and use GTM, they often report their research method by stating "we did the research." This, however, does not clarify how they reconciled differences in the researchers' viewpoints and their omitted descriptions may lessen the quality of the study, possibly resulting even incorrect conclusions. Omitting details can make it difficult to observe and assess collaborative work.</p>
<p><strong>Summary</strong></p>
<p>This paper analyzes a sample of papers from top Information Systems journals to describe how IS researchers have collaborated during the GTM process and reported their research process. We also describe and compare alternatives for collaboration using GTM. We highlight potential issues that arise from different world views, and provide guidance and examples of how these issues can be avoided, and how the research process can be made transparent.</p>
<p><strong>Take-aways</strong></p>
<p>We advise researchers to use one of our four modes of collaboration as a basis for:</p>
<ul>
    <li>Deciding which mode best fits with the research endeavor, questions, and strategy</li>
    <li>Considering what activities are needed to establish and maintain a common ground, how much coordination overhead and coordination activities are necessary throughout the research process </li>
    <li>Reporting the research process honestly and transparently in their scientific publication.</li>
</ul>
<p>These pieces of advice improve researchers' and practitioners' awareness on the GTM research process and increase its transparency. Practitioners would then be more aware of how researchers are studying their organizations, and what problems can hinder their work. Being aware of possible problems in turn helps the reader assess the interpretations of the research data, judge the quality of the study, and assess its results.<br />
</p>]]></description>
<pubDate>Fri, 6 Dec 2019 20:08:41 GMT</pubDate>
</item>
<item>
<title>User Satisfaction with Information Systems: A Comprehensive Model of Attribute-level Satisfaction</title>
<link>https://aisnet.org/members/blog_view.asp?id=1706903&amp;post=337269</link>
<guid>https://aisnet.org/members/blog_view.asp?id=1706903&amp;post=337269</guid>
<description><![CDATA[<p><img alt="" src="https://aisnet.org/resource/resmgr/inpractice/reza_vaezi.jpg" style="width: 127.909px; height: 154px;" />&nbsp;<img alt="" src="https://aisnet.org/resource/resmgr/inpractice/annettemills_cropped.jpg" style="left: 249.716px; top: 144.261px; width: 116.909px; height: 154px;" />&nbsp;<img alt="" src="https://aisnet.org/resource/resmgr/inpractice/chin_ais_2013.jpeg" style="height: 153.091px; width: 125px;" /></p>
<p>By Reza Vaezi, Annette Mills, and Wynne Chin</p>
<p>This article proposes and validates a comprehensive model to understand user satisfaction with IT and software applications. The model, which used previous concepts from a heavily-used information systems success model, can provide measures at various levels of granularity. The strongest predictors of satisfaction with the system were ease of use and response time. The strongest predictor of satisfaction with the service, in the context of a PeopleSoft implementation, was accessibility and availability of support services.</p>
<p><font size="3"><strong>Key Takeaways:</strong></font></p>
<ul>
    <li>It provides a three-level attribute drill-down approach where practitioners can go into further detail on what are the key drivers of satisfaction.</li>
    <li>The first level is overall satisfaction.</li>
    <li>The second level shows overall satisfaction as impacted by the information content provided, the technology itself, and support services.</li>
    <li>The third level provides even more detail focusing on key attributes associated with second level attributes.&nbsp; Examples of third level attributes impacting satisfaction include information accuracy and relevance, system reliability and ease of use, and service responsiveness and reliability.</li>
    <li>The model is designed to be easily understood, and used by industry practitioners to measure user satisfaction with different aspects and qualities of their IT systems and services.</li>
    <li>The results can be used to identify areas in need of improvement and measure impacts of various actions on overall user satisfaction, and at the detailed level in relation to the information provided, the technology itself, and support services and their attributes.</li>
</ul>
<p><a href="https://doi.org/10.17705/1CAIS.04513" target="_blank">Read the full paper here.</a></p>]]></description>
<pubDate>Fri, 6 Dec 2019 19:29:23 GMT</pubDate>
</item>
<item>
<title>An Analysis of the Evolving Intellectual Structure of Health Information Systems Research in the Information Systems Discipline</title>
<link>https://aisnet.org/members/blog_view.asp?id=1706903&amp;post=334067</link>
<guid>https://aisnet.org/members/blog_view.asp?id=1706903&amp;post=334067</guid>
<description><![CDATA[<p style="margin-bottom: 6pt;"><b><span><img alt="" src="https://aisnet.org/resource/resmgr/inpractice/Langtao_Chen.jpg" />&nbsp;<img alt="" src="https://aisnet.org/resource/resmgr/inpractice/aaron-baird.jpg" />&nbsp;<img alt="" src="https://aisnet.org/resource/resmgr/inpractice/Detmar_Straub.jpg" /></span></b></p>
<p style="margin-bottom: 6pt;"><span><em>By Langtao Chen, Aaron Baird and Detmar Straub</em></span></p>
<p style="margin-bottom: 6pt;"><b><span>Problem:</span></b></p>
<p style="margin-bottom: 6pt;"><span>More than 500 articles related to health IT were published in IS journals between 1990 and 2017. While remarkable that such a significant quantity of quality health IT research is being published in IS journals, it is nearly impossible, even for researchers who read in this area regularly, to comprehensively understand what this research has contributed. </span></p>
<p style="margin-bottom: 6pt;"><b><span>Article Summary:</span></b></p>
<p style="margin-bottom: 6pt;"><span>To address this problem, we applied analytics methods to systematically analyze the 571 health IT articles published in IS journals between 1990 and 2017. Our article describes how and why we conducted this research as well as the key health IT trends, research theme dynamics, article relationships, and thought leaders systematically identified via our analyses.</span></p>
<p style="margin-bottom: 6pt;"><b><span>Key Takeaways:</span></b></p>
<ul>
    <li style="margin-bottom: 12pt;"><span>We find four, central health IT research themes: (<i>1) Health IS Acceptance, (2) Health IS Implementation, (3) Health IS Outsourcing, Performance, and Investment, </i>and<i> (4) EMR and EHR</i>. These findings suggest that much of the core of health IT research centers on how health care organizations invest in and then assimilate enterprise health IT, such as EHRs.</span></li>
    <li style="margin-bottom: 12pt;"><span>Our findings suggest that five health IT research themes offer significant opportunities for future research: (<i>1) Health Analytics and Data Mining, (2) Mobile Health, (3) Health Information Interchange, (4) Clinical Pathway and Treatment Management, </i>and <i>(5) Online Health Communities and Digital Services</i>.</span></li>
    <li style="margin-bottom: 12pt;"><span>We also identify specific leaders in health IT as a whole and within their thematic sub-communities. These findings offer academic institutions insights into who could lead their efforts to capitalize on health care and IS initiatives.</span></li>
</ul>
<p style="margin-bottom: 12pt;"><span>To learn more, visit&nbsp;<a href="https://aisel.aisnet.org/jais/vol20/iss8/5/">https://aisel.aisnet.org/jais/vol20/iss8/5/</a>.</span></p>]]></description>
<pubDate>Thu, 31 Oct 2019 18:15:45 GMT</pubDate>
</item>
<item>
<title>How do Individuals Interpret Multiple Conceptual Models? A Theory of Combined Ontological Completeness and Overlap</title>
<link>https://aisnet.org/members/blog_view.asp?id=1706903&amp;post=334065</link>
<guid>https://aisnet.org/members/blog_view.asp?id=1706903&amp;post=334065</guid>
<description><![CDATA[<p><img alt="" src="https://aisnet.org/resource/resmgr/inpractice/janrecker1.jpg" style="border: 4px solid #ffffff; width: 150px; height: 212px; float: left;" /></p>
<p><img alt="" src="https://aisnet.org/resource/resmgr/inpractice/green_20141.jpg" style="border:4px solid #ffffff;width: 150px; height: 213px; float: left;" />&nbsp;</p>
<p><span>&nbsp;</span></p>
<p><span>&nbsp;</span></p>
<p><span>&nbsp;</span></p>
<p><span>&nbsp;</span></p>
<p><span>&nbsp;</span></p>
<p><span>&nbsp;</span></p>
<p><span><em>By Jan Recker and Peter Green</em></span></p>
<p><b><span>Problem</span></b></p>
<ul style="list-style-type: disc;">
    <li><span>Many modern information systems are large and complex. Analyzing or designing them means that IS professionals need to consider multiple perspectives.</span></li>
    <li><span>IS professionals use conceptual models – semi-formal graphical visualizations of real-world domains – to help build their understanding. The number and variety of different models can be large.</span></li>
    <li><span>We do not know how IS professionals can effectively and efficiently choose between different models, use them to develop an understanding of an IS domain, or how useful different combinations of conceptual models are for their work.</span></li>
    <li><span>We do not know whether analysis or design practices building on multiple conceptual models is effective or how it can be better supported through better model design.</span></li>
</ul>
<p><b><span>Summary</span></b></p>
<ul style="list-style-type: disc;">
    <li><span>We propose new hypotheses about:</span></li>
    <ul style="list-style-type: circle;">
        <li><span>How IS professionals select between different conceptual models for systems analysis and design, </span></li>
        <li><span>How they read multiple models to develop a complete and clear understanding of a real-world IS domain, and </span></li>
        <li><span>How useful different combinations of conceptual models are to IS professionals.</span></li>
    </ul>
    <li><span>We suggest that IS professionals will prefer combinations of conceptual models that maximize the coverage of real-world domain elements, while at the same time, minimizing overlap of distinct information elements between different models.</span></li>
</ul>
<p><b><span>Take-Aways</span></b></p>
<ul style="list-style-type: disc;">
    <li><span>IS professionals should be mindful of whether they require a simplified versus a more complete representation of the real world to complete their tasks effectively.</span></li>
    <li><span>When conceptual models are developed to aid IS professionals, tradeoffs between completeness and clarity should be taken into account already to make the models fit for use.</span></li>
</ul>
<p>Learn more at&nbsp;<a href="https://aisel.aisnet.org/jais/vol20/iss8/1/">https://aisel.aisnet.org/jais/vol20/iss8/1/</a></p>]]></description>
<pubDate>Thu, 31 Oct 2019 17:51:30 GMT</pubDate>
</item>
<item>
<title>Constraining Opportunism in Information Systems Consulting: A Three Nation Examination </title>
<link>https://aisnet.org/members/blog_view.asp?id=1706903&amp;post=332950</link>
<guid>https://aisnet.org/members/blog_view.asp?id=1706903&amp;post=332950</guid>
<description><![CDATA[<p class="Body"><img alt="" src="https://aisnet.org/resource/resmgr/inpractice/opportunism.jpg" style="border:3px solid #ffffff;width: 400px; height: 222px; float: left;" /></p>
<p class="Body">By Richard T. Watson, Gregory S. Dawson, Marie-Claude Boudreau, Yan Li, Hongyun Zhang, Wei (Wayne) Huang, and Ibrahim Al-Jabri </p>
<p class="Body"><strong>Problem</strong></p>
<ul>
    <li class="Body">Opportunism, devious self-interest behavior, is a persistent social problem. Attempts to restrict opportunism, such as legal and ethical codes, have shaped societies for millennia.</li>
    <li class="Body">Opportunism differs from mere profit maximizing because it takes advantage of a trusting relationship to advance self-interest.</li>
    <li class="Body">According to a previous study by three of the authors, a majority of IS consultants and their clients have observed opportunism.</li>
    <li class="Body">Such practices might include breaking promises, being untruthful, or not acting in the other party’s best interests.</li>
    <li class="Body">Information asymmetry, when one party knows more about a situation than another, is the root cause of opportunism.</li>
</ul>
<p class="Heading"><strong>Summary</strong></p>
<ul>
    <li class="Heading">This article examines the relative effectiveness of eight different constraint mechanisms on IS consultants in China, Saudi Arabia, and the United States, for seven types of projects with different levels of information asymmetry, tacit knowledge, and explicit knowledge.</li>
    <li class="Heading">Generally, consulting clients in the United States believe that social constraints are more effective, while those in China and Saudi Arabia favor legal constraints.</li>
    <li class="Heading">The research suggests that these findings are a result of differences in legal systems and the foundations of social norm formation.</li>
</ul>
<p class="Heading"><strong>Take-Aways</strong></p>
<ul>
    <li class="Heading">When information asymmetry is high, clients should use one or more social constraints</li>
    <li class="Heading">When information asymmetry is low, clients should use a legal constraint</li>
    <li class="Heading">For complex engagements, clients should use an advisor firm to constrain opportunism</li>
    <li class="Heading">Clients should develop project relevant tacit knowledge prior to a consulting engagement to lower information asymmetry</li>
    <li class="Heading">Consultants should recognize that national differences can impact how clients select and deploy constraint options</li>
</ul>
<p class="Body">Learn more at: <a href="https://aisel.aisnet.org/jais/vol20/iss7/12/">https://aisel.aisnet.org/jais/vol20/iss7/12/</a></p>]]></description>
<pubDate>Fri, 11 Oct 2019 13:11:07 GMT</pubDate>
</item>
<item>
<title>Addressing Key Challenges to Making Enterprise Blockchain Applications a Reality</title>
<link>https://aisnet.org/members/blog_view.asp?id=1706903&amp;post=331652</link>
<guid>https://aisnet.org/members/blog_view.asp?id=1706903&amp;post=331652</guid>
<description><![CDATA[<p><img alt="" src="https://aisnet.org/resource/resmgr/inpractice/small_blockchain_2.jpg" style="width: 500px; height: 370px; vertical-align: top;" /></p>
<p><span>by Mary Lacity in MIS Quarterly Executive September 2018, Volume 17, Number 3, pp. 201-222.<br />
<br />
- Blockchain adoption frequently promises more value than what is delivered.<br />
- Challenges include identifying standards, government regulation, governance models, and ecosystem viability.<br />
- A study of three organizations reveals their strategies for successful adoption.<br />
- Five key questions should be asked when considering a blockchain application:<br />
&nbsp;&nbsp;&nbsp;&nbsp; 1. Is a blockchain the right solution?<br />
&nbsp;&nbsp;&nbsp;&nbsp; 2. How are blockchain standards being established?<br />
&nbsp;&nbsp;&nbsp;&nbsp; 3. How can a blockchain solution comply with legislation given the regulatory uncertainty?<br />
&nbsp;&nbsp;&nbsp;&nbsp; 4. How should a blockchain solution be governed?<br />
&nbsp;&nbsp;&nbsp;&nbsp; 5. How can a viable ecosystem be established?<br />
<br />
Summary:<br />
Daunting challenges in blockchain standards, regulations, shared governance models, and viable ecosystems impede progress. There is currently a gap between the business value that is promised and how much is delivered. Lacity describes the strategies that three organizations are pursuing to address those challenges. The organizations are LO3 Energy, a startup; Moog, Inc., a traditional enterprise, and the Center for Supply Chain Studies, a nonprofit organization serving as industry consortium coordinator. Answering the five questions above can help managers know whether their organizations should lead, be fast followers, or take a slower pace in exploring enterprise blockchains.</span></p>
<p><span>Learn more at&nbsp;<a href="https://aisel.aisnet.org/misqe/vol17/iss3/3/">https://aisel.aisnet.org/misqe/vol17/iss3/3/</a>.<br />
<br />
</span></p>]]></description>
<pubDate>Fri, 20 Sep 2019 19:16:50 GMT</pubDate>
</item>
<item>
<title>A Ten-Step Decision Path to Determine when to use Blockchain Technologies</title>
<link>https://aisnet.org/members/blog_view.asp?id=1706903&amp;post=331651</link>
<guid>https://aisnet.org/members/blog_view.asp?id=1706903&amp;post=331651</guid>
<description><![CDATA[<p><img alt="" src="https://aisnet.org/resource/resmgr/inpractice/small_blockchain.jpg" style="width: 500px; height: 334px; vertical-align: top;" /></p>
<p><span>By Asger B. Pedersen, Marten Risius, and Roman Beck In MIS Quarterly Executive June 2019<br />
<br />
General take-aways:<br />
- Blockchain technology provides a bewildering set of options without much guidance.<br />
- Firms must decide not only the feasibility of using blockchain technology but also which type of system to use: permissionless public blockchain, permissioned public blockchain, or a permissioned private blockchain.<br />
- Ten decision steps can be followed to narrow the options dramatically. The ten questions are described in detail and address issues such as whether there is a need for sharing data publicly or with multiple parties, if it is desirable to use third parties, whether there are conflicts of interest or differing or changing rules, if logs are needed, and how consensus is determined.<br />
<br />
Summary:<br />
Recent research on blockchain technology shows faster growth of its adoption in tracking supply chain activities than in banking and financial services. This study focused on how maritime shipping can realize benefits of blockchains, especially by consulting a new managerial framework to assess feasibility and also determine what type of system to implement. A ten-step yes/no decision process provides guidance on whether a block chain is required, and if so, recommends a permissionless public blockchain, permissioned public blockchain, or a permissioned private blockchain. Knowing the type of needed blockchain system will prevent the loss of valuable time and will reduce expenses in their application.<br />
</span></p>
<p><span>Learn more at&nbsp;<a href="https://aisel.aisnet.org/misqe/vol18/iss2/3/">https://aisel.aisnet.org/misqe/vol18/iss2/3/</a>.<br />
<br />
</span></p>]]></description>
<pubDate>Fri, 20 Sep 2019 19:13:41 GMT</pubDate>
</item>
<item>
<title>BBVA&apos;s Data Monetization Journey</title>
<link>https://aisnet.org/members/blog_view.asp?id=1706903&amp;post=331650</link>
<guid>https://aisnet.org/members/blog_view.asp?id=1706903&amp;post=331650</guid>
<description><![CDATA[<p><span><img alt="" src="https://aisnet.org/resource/resmgr/inpractice/monetization.jpg" style="width: 600px; height: 320px; vertical-align: top;" /></span></p>
<p><span>by Elena Alfaro, Marco Bressan, Fabien Girardin, Juan Murillo, Ida Someh, and Barbara H. Wixom In MIS Quarterly Executive June 2019, Vol. 18, No. 2, pp. 117-128.<br />
<br />
General take-aways:<br />
- Data monetization efforts can have tremendous revenue enhancing and cost reduction impacts on firms.<br />
- A firm with 16 monetization efforts were studied in this paper.<br />
- Actions that led to their successful efforts were:<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1. Balance short term goals and long-term capability creation<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2. Invest in social good projects<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 3. Assess the value and impact of data science projects<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 4. Educate all employees about data science<br />
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 5. Compensate data scientists with high nonmonetary benefits<br />
<br />
Summary:<br />
BBVA, a global financial group, established a data science center of excellence to lead its data monetization activities. In 16 monetization projects over three years, they sold information solutions, improved business operations, and wrapped products with analytics features. Their impacts were to raise revenues, lower costs, and increase their capabilities and credibility. This summary of their activities and experiences can be helpful for many other firms.</span></p>
<p>Learn more at&nbsp;<a href="https://aisel.aisnet.org/misqe/vol18/iss2/4/">https://aisel.aisnet.org/misqe/vol18/iss2/4/</a>.</p>]]></description>
<pubDate>Fri, 20 Sep 2019 19:10:43 GMT</pubDate>
</item>
</channel>
</rss>
