AIS InPractice
Blog Home All Blogs
InPractice is an online newsletter targeted at our practitioner members. Published monthly, InPractice showcases articles published in the AIS journals (JAIS, CAIS, PAJAIS, AIS THCI,TRR, and MISQE). Authors of newly uploaded eLibrary papers will be invited to voluntarily prepare and submit a brief synopsis of their paper targeting practitioners. Dennis Galletta serves as the AIS InPractice editor. AIS invites all authors to submit summaries for considering in InPractice. The benefits of publishing in InPractice include: - Free, organized publicity for your study - Providing more opportunity for research to gain traction in the world of practice - Providing visibility for a larger body of research To submit summaries for consideration, please email Dennis Galletta at Galletta@pitt.edu with the following information: 1. A summary of the paper written in approximately 200 words, including key takeaways 2. Permission in email to use the summary through InPractice 3. Photos

 

Search all posts for:   

 

How a Low-Margin Business Cocreated Analytics Value through an Innovation Partnership

Posted By Adeline Border, Monday, February 3, 2020

  

By Hope Koch, Uchenna Peters, Eric Villafranca, and Kevin Koch 

Problem 

Business unit managers often feel they need to start analytics initiatives to remain competitive. Given the budget constraints placed on business units, including the internal IT business unit, managers have to find innovative ways to pay for the analytics initiatives. Since IT departments are cost centers, this leads to business unit managers trying to launch analytics initiatives outside the purview of the internal IT department. This trend is called shadow IT. 

Summary 

This article examines how a low-margin company launched an analytics initiative with an analytics vendor that increased profit. The analytics initiative results in the service offering to sell advertising on the sides of the client’s diesel trucks. The solution tracked the number of people who viewed the advertisements and their demographics. The research offers recommendations for low-margin businesses looking to create value with analytics and for IT managers on how to handle shadow IT. 

Take-Aways

  • Shadow IT can lead to innovation, so rather than focusing on restraining business units, IT departments can adopt policies to guide such ventures.
  • Co-creation can help analytics vendors and clients explore ways to use analytics in the business.
  • Co-destruction, rather than co-creation between analytics vendors and their clients, can emerge. This happens when analytics vendors make up-front investments to help clients explore ways to use analytics that the client does not reciprocate. The client might take the ideas and do it themselves, hire a different vendor, or not move forward. 

This post has not been tagged.

PermalinkComments (0)
 

The Worth of Words: How Technical White Papers Influence ICO Blockchain Funding

Posted By Adeline Border, Monday, February 3, 2020

By Benjamin Barraza

Summary:

Each ICO has an associated white paper that describes the firm's business model, market, cryptocurrency, the team behind the project, and the technology. Then investments are made in the startups. The white papers differ in scope and detail. Comprehensive white papers describing technologically-sophisticated details raised more money than superficial ones simply making claims. Examples of ICO successes and failures are described.

General Take-aways:

  • Initial coin offerings (ICOs) are important to understand because startups play an important role in the global blockchain landscape
  • ICOs resulted in $14 billion invested during their first five years
  • Insights about the processes involved in ICOs shed light on the relationship between technical white papers and the amount of money raised
  • Detailed and comprehensive white papers were most successful
  • This paper follows the "conversation" model, where Barraza's research is explored
  • Insights from history are augmented by insights about changes in the market since his analysis

This post has not been tagged.

PermalinkComments (0)
 

How an Enterprise Blockchain Application in the U.S. Pharmaceuticals Supply Chain is Saving Lives

Posted By Adeline Border, Monday, February 3, 2020

By Jens Mattke, Christian Maier, Axel Hund, and Tim Weitzel

Summary:

A case study examined the progress of a MediLedger, a blockchain-based pharmaceutical supply chain system. The team focused on how blockchain applications can be used in the enterprise context, how they can add value, and what drives their adoption. Through interviews the team discovered how the project developed over time and how the developers solved the challenges that arose. Four lessons provide guidance to other firms.

General Take-aways:

  • The US pharmaceuticals market accounts for nearly half of the global market
  • The MediLedger Project filled the void of a lack of a single integrated system to track and verify pharmaceutical products moving through the supply chain
  • The objectives were to design a blockchain-based ecosystem application to meet newly emerging legal regulations and eliminate counterfeit pharmaceuticals in the supply chain

Four key lessons were learned:

  1. Use a "benevolent dictator" and base governance on "consensus through collaboration"
  2. In the blockchain ledger, store proofs that transactions were verified, not the transactions themselves
  3. Use zero-knowledge proofs to verify product and transaction authenticity while preserving full privacy.
  4. Use blockchain application technologies to fix ineffective traditional IS landscapes

This post has not been tagged.

PermalinkComments (0)
 

How TradeLens Delivers Business Value with Blockchain Technology

Posted By Adeline Border, Monday, February 3, 2020

By Thomas Jensen, Jonas Hedman, and Stefan Henningsson

Summary:

A longitudinal case study provides a rare glimpse into the development and evolution of TradeLens from 2013 to 2019. Data were collected from several sources, including interviews, conferences, focus groups, direct observation, project meetings, and field visits. The business value of this global supply chain system is still evolving, but seven valuable lessons provide guidance for future blockchain projects with interorganizational boundaries.

General take-aways:

  • TradeLens is a blockchain-based system used in the international container shipping industry.
  • The system enables a trusted exchange of information between players.
  • The system also enables them to comply with regulations while raising efficiency, reducing administrative costs, lead times, and risk
  • Development of the system required cooperation between two firms, but the process was complex
  • Slow adoption was due to initial concerns about the technology infrastructure being fully in place, and about whether shared documents can be trusted

Seven recommended actions include:

  1. Refocus strategies towards the entire ecosystem of customers, partners, authorities, and competitors
  2. Early on, focus on the vision, not the return on investment (ROI), because ROI builds as the network effect grows
  3. Solutions to interorganizational problems should be approached from the perspective of distributed control, not firm control
  4. Build partner trust before and after blockchain trust
  5. Some solutions require governmental authority backing early in the process.
  6. Evolve the governance model as adoption expands
  7. Consider blockchain interoperability in strategic plans

This post has not been tagged.

PermalinkComments (0)
 

Building a Blockchain Application that Complies with the EU General Data Protection Regulation

Posted By Adeline Border, Monday, February 3, 2020

By Alexander Rieger, Jannik Lockl, Florian Guggenmos, Gilbert Fridgen, and Nils Urbach

Summary:

The researchers attempted to find out if the regulations of GDPR conflicted with the features and benefits of blockchain technology. They gathered evidence from workshops, meetings, documents, and interviews. The outcome is that third-party services that provide permissioned pseudonyms are indeed able to avoid storing personal information yet provide the shared ledgers needed for blockchains.

General take-aways:

  • Blockchain technology offers a promising alternative to centralized systems
  • Legal barriers can arise, such as those from the General Data Protection Regulation (GDPR) in the European Union
  • Those barriers can appear to conflict with the basic properties of blockchain technology
  • However, the challenges can be resoluved by creating GDPR-compliant solutions

Three recommendations are offered for managing and designing GDPR-compliant blockchain solutions:

  1. Avoid storing personal data on a blockchain
  2. A blockchain solution that needs to process personal data should use a private and permissioned pseudonymization approach
  3. A blockchain solution that needs to coordinate across organizations should use a private and permissioned pseudonymization approach

This post has not been tagged.

PermalinkComments (0)
 

The Role of Knowledge Management in the Relationship between IT Capability and Interorganizational Performance – An Empirical Investigation

Posted By Administration, Friday, December 6, 2019

   

By Antonis Stylianou, Chandrasekar Subramaniam, Yuan Niu

Problem 

Research has long posited that the relationship between IT and performance can be explained by investigating overlooked key capabilities that are enabled by IT. These connections are especially not well understood in an inter-organizational (IO) context.

Firms that develop competency in managing knowledge resources across their supply chains are rewarded with higher economic benefits. A major challenge in managing IO knowledge are the competing, and often conflicting, goals of firms in the partnership. The key to dealing with this challenge may lie in the use of IT to enable better inter-firm relationships.

Summary

  • We investigate the role of relational and KM capabilities in the link between IT and performance in organizational partnerships.
  • We develop and test a comprehensive empirical conceptualization of KM capabilities that refers to the management of “business knowledge,” including the collection, organization, synthesis, and use of business data, information, and insights by the partnering firms.
  • We investigate the role of partner interdependence on IO IT, KM, and performance.

Take-Aways

  • We demonstrate empirically that IO IT creates value for the partnership. Improved IO relationships in turn strengthen IO KM.
  • The ability of partner firms to collectively manage knowledge resources positively impacts the operational and the strategic performance of the partnership.
  • When the interdependence between IO partners is stronger, partner firms can achieve greater KM benefits by investing more in their relational capabilities, such as building trust and long-term orientation and fostering collaborative partnerships.
  • Our study shows that IO relational capability and IO KM are important missing links that can explain the impact of IT on performance. 

This post has not been tagged.

PermalinkComments (0)
 

Blockchain for the IoT: Privacy-Preserving Protection of Sensor Data

Posted By Administration, Friday, December 6, 2019

    

By Mathieu Chanson, Andreas Bogner, Dominik Bilgeri, Elgar Fleisch, Felix Wortmann

 

Problem

The constantly growing pool of smart, connected Internet of Things (IoT) devices poses completely new challenges for business regarding security and privacy. In fact, the widespread adoption of smart products might depend on the ability of organizations to offer systems that ensure adequate sensor data integrity while guaranteeing sufficient user privacy.

Summary

  • To address this problem, we build upon previous research which indicates that blockchain technology may be a promising means to mitigate issues of data security arising in the IoT.
  • We propose a design theory, including requirements, design principles, and features, for a blockchain-based sensor data protection system (SDPS) that leverages data certification.
  • We design and develop an instantiation of an SDPS (CertifiCar) that prevents the fraudulent manipulation of car mileage data.
  • We provide an ex-post evaluation of our design theory considering CertifiCar and two additional use cases.

Take Aways

  • The evaluation results suggest that the proposed design ensures the tamper-resistant gathering, processing, and exchange of IoT sensor data in a privacy-preserving, scalable, and efficient manner.
  • Blockchain-based SDPSs inherit core characteristics of blockchain technology (e.g., tamper-resistance) only if fundamental design principles are considered.
  • In particular, sensor data needs to be protected from source to sink and verified by cross-validation, as universally “tamper-proof” processes cannot be ensured.
  • Hybrid blockchain architectures are necessary to enable scaling, given the current state of technology.
  • SDPSs are particularly useful in the case of multi-stage data pipelines that cross organizational boundaries and involve a potentially large ecosystem of players.
  • A blockchain-based SDPS is often perceived as “neutral” and might be accepted as an industry standard much faster than a centralized system.
  • Blockchain technology offers firms the opportunity to leverage its built-in state-of-the art cryptography technology for free, which can reduce the need for security specialists.

This post has not been tagged.

PermalinkComments (0)
 

The Magical "We": Enhancing Collaboration Transparency in Grounded Theory Method in Information Systems Research

Posted By Administration, Friday, December 6, 2019

   

By Samuli Pekkola, Matti Rossi and Kari Smolander

Problem

Grounded theory (GTM) research aims at understanding practice issues from observing it. When researchers collaborate and use GTM, they often report their research method by stating "we did the research." This, however, does not clarify how they reconciled differences in the researchers' viewpoints and their omitted descriptions may lessen the quality of the study, possibly resulting even incorrect conclusions. Omitting details can make it difficult to observe and assess collaborative work.

Summary

This paper analyzes a sample of papers from top Information Systems journals to describe how IS researchers have collaborated during the GTM process and reported their research process. We also describe and compare alternatives for collaboration using GTM. We highlight potential issues that arise from different world views, and provide guidance and examples of how these issues can be avoided, and how the research process can be made transparent.

Take-aways

We advise researchers to use one of our four modes of collaboration as a basis for:

  • Deciding which mode best fits with the research endeavor, questions, and strategy
  • Considering what activities are needed to establish and maintain a common ground, how much coordination overhead and coordination activities are necessary throughout the research process
  • Reporting the research process honestly and transparently in their scientific publication.

These pieces of advice improve researchers' and practitioners' awareness on the GTM research process and increase its transparency. Practitioners would then be more aware of how researchers are studying their organizations, and what problems can hinder their work. Being aware of possible problems in turn helps the reader assess the interpretations of the research data, judge the quality of the study, and assess its results.

This post has not been tagged.

PermalinkComments (0)
 

User Satisfaction with Information Systems: A Comprehensive Model of Attribute-level Satisfaction

Posted By Administration, Friday, December 6, 2019

  

By Reza Vaezi, Annette Mills, and Wynne Chin

This article proposes and validates a comprehensive model to understand user satisfaction with IT and software applications. The model, which used previous concepts from a heavily-used information systems success model, can provide measures at various levels of granularity. The strongest predictors of satisfaction with the system were ease of use and response time. The strongest predictor of satisfaction with the service, in the context of a PeopleSoft implementation, was accessibility and availability of support services.

Key Takeaways:

  • It provides a three-level attribute drill-down approach where practitioners can go into further detail on what are the key drivers of satisfaction.
  • The first level is overall satisfaction.
  • The second level shows overall satisfaction as impacted by the information content provided, the technology itself, and support services.
  • The third level provides even more detail focusing on key attributes associated with second level attributes.  Examples of third level attributes impacting satisfaction include information accuracy and relevance, system reliability and ease of use, and service responsiveness and reliability.
  • The model is designed to be easily understood, and used by industry practitioners to measure user satisfaction with different aspects and qualities of their IT systems and services.
  • The results can be used to identify areas in need of improvement and measure impacts of various actions on overall user satisfaction, and at the detailed level in relation to the information provided, the technology itself, and support services and their attributes.

Read the full paper here.

This post has not been tagged.

PermalinkComments (0)
 

An Analysis of the Evolving Intellectual Structure of Health Information Systems Research in the Information Systems Discipline

Posted By Administration, Thursday, October 31, 2019

  

By Langtao Chen, Aaron Baird and Detmar Straub

Problem:

More than 500 articles related to health IT were published in IS journals between 1990 and 2017. While remarkable that such a significant quantity of quality health IT research is being published in IS journals, it is nearly impossible, even for researchers who read in this area regularly, to comprehensively understand what this research has contributed.

Article Summary:

To address this problem, we applied analytics methods to systematically analyze the 571 health IT articles published in IS journals between 1990 and 2017. Our article describes how and why we conducted this research as well as the key health IT trends, research theme dynamics, article relationships, and thought leaders systematically identified via our analyses.

Key Takeaways:

  • We find four, central health IT research themes: (1) Health IS Acceptance, (2) Health IS Implementation, (3) Health IS Outsourcing, Performance, and Investment, and (4) EMR and EHR. These findings suggest that much of the core of health IT research centers on how health care organizations invest in and then assimilate enterprise health IT, such as EHRs.
  • Our findings suggest that five health IT research themes offer significant opportunities for future research: (1) Health Analytics and Data Mining, (2) Mobile Health, (3) Health Information Interchange, (4) Clinical Pathway and Treatment Management, and (5) Online Health Communities and Digital Services.
  • We also identify specific leaders in health IT as a whole and within their thematic sub-communities. These findings offer academic institutions insights into who could lead their efforts to capitalize on health care and IS initiatives.

To learn more, visit https://aisel.aisnet.org/jais/vol20/iss8/5/.

This post has not been tagged.

PermalinkComments (0)
 
Page 1 of 2
1  |  2
 

Connect With Us :