Pub Date : 2024-08-05DOI: 10.1007/s10257-024-00684-0
Steven Groß, Thomas Grisold, Jan Mendling, Jennifer Haase
Business process redesign has received considerable attention in research and practice. An important task contributing to redesign is idea generation. It has been argued that the choice of technique influences redesign outcomes, but empirical evidence is largely missing. In this paper, we examine the role of idea generation in business process redesign by comparing two different kinds of techniques: exploitative and explorative redesign techniques. Often, exploitative techniques are expected to yield more appropriate solutions, while explorative techniques are associated with more creative outcomes. To investigate such propositions, we consider the Best Practices of Process Redesign as an example of an exploitative redesign technique and the Business Process Design Space as an explorative redesign technique. We conducted a free-simulation experiment to study the empirical impact of the choice of redesign techniques on outcomes. We find that the Business Process Design Space leads to a higher number of redesign ideas, which are also more diverse. These are more creative and novel than ideas produced by the Best Practices of Process Redesign. Against expectation, the best practices as an exploitative approach do not produce more appropriate nor impactful ideas in our task design. Since both approaches cover different areas of improvement, a key implication of our work is that they should not be seen as isolated approaches to redesign; rather, they should be purposefully combined to not only create novel but also operational business process redesigns.
{"title":"Idea generation in exploitative and explorative business process redesign techniques","authors":"Steven Groß, Thomas Grisold, Jan Mendling, Jennifer Haase","doi":"10.1007/s10257-024-00684-0","DOIUrl":"https://doi.org/10.1007/s10257-024-00684-0","url":null,"abstract":"<p>Business process redesign has received considerable attention in research and practice. An important task contributing to redesign is idea generation. It has been argued that the choice of technique influences redesign outcomes, but empirical evidence is largely missing. In this paper, we examine the role of idea generation in business process redesign by comparing two different kinds of techniques: exploitative and explorative redesign techniques. Often, exploitative techniques are expected to yield more appropriate solutions, while explorative techniques are associated with more creative outcomes. To investigate such propositions, we consider the Best Practices of Process Redesign as an example of an exploitative redesign technique and the Business Process Design Space as an explorative redesign technique. We conducted a free-simulation experiment to study the empirical impact of the choice of redesign techniques on outcomes. We find that the Business Process Design Space leads to a higher number of redesign ideas, which are also more diverse. These are more creative and novel than ideas produced by the Best Practices of Process Redesign. Against expectation, the best practices as an exploitative approach do not produce more appropriate nor impactful ideas in our task design. Since both approaches cover different areas of improvement, a key implication of our work is that they should not be seen as isolated approaches to redesign; rather, they should be purposefully combined to not only create novel but also operational business process redesigns.</p>","PeriodicalId":13660,"journal":{"name":"Information Systems and e-Business Management","volume":"42 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141895584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-28DOI: 10.1007/s10257-024-00675-1
Tobias Bender
Driven by technological progress, business analytics is gaining momentum while paving the path for next-generation business process management. Especially, embedded real-time analytics offers new opportunities for business process intelligence and value creation. However, there are several obstacles that organizations face in their adoption process. A key challenge is to identify business processes that are suitable for embedded analytics and hold relevant value potential. Our research addresses this need by introducing an exploratory BPM method, namely a process selection method. Applying action design research and situational method engineering, we iteratively built, used, evaluated, and refined the theory-ingrained method artifact. The method provides organizations with guidance in selecting operational business processes, for which a reengineering project should be initiated.
{"title":"Towards a process selection method for embedded analytics","authors":"Tobias Bender","doi":"10.1007/s10257-024-00675-1","DOIUrl":"https://doi.org/10.1007/s10257-024-00675-1","url":null,"abstract":"<p>Driven by technological progress, business analytics is gaining momentum while paving the path for next-generation business process management. Especially, embedded real-time analytics offers new opportunities for business process intelligence and value creation. However, there are several obstacles that organizations face in their adoption process. A key challenge is to identify business processes that are suitable for embedded analytics and hold relevant value potential. Our research addresses this need by introducing an exploratory BPM method, namely a process selection method. Applying action design research and situational method engineering, we iteratively built, used, evaluated, and refined the theory-ingrained method artifact. The method provides organizations with guidance in selecting operational business processes, for which a reengineering project should be initiated.</p>","PeriodicalId":13660,"journal":{"name":"Information Systems and e-Business Management","volume":"53 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141769090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-24DOI: 10.1007/s10257-024-00682-2
Gaffar Hafiz Sagala, Dóra Őri
The core success of digital transformation among small and medium enterprises (SMEs) still needs to be clarified and comprehensively discussed. Meanwhile, SMEs cannot exploit digital advantages due to their limited strategic empirical and practical knowledge. This study aims to (1) describe the research pattern in the SME’s digitalization area; (2) identify the core success factors of SMEs' digital transformation to gain business success; (3) search for relevant business aspects that are necessary for SME digital transformation; and (4) develop further research agenda in the field of SMEs’ digital transformation. This study uses a systematic literature review and thematic analysis to determine core success factors suggested by primary studies. The literature review suggests that (1) SMEs should consider their baseline, limitation, and idiosyncratic to develop an aligned digitalization strategy; (2) SMEs should consider starting with incremental and gradually improving digitalization; and (3) SMEs should commit to investing in education and continuous learning.
{"title":"Toward SMEs digital transformation success: a systematic literature review","authors":"Gaffar Hafiz Sagala, Dóra Őri","doi":"10.1007/s10257-024-00682-2","DOIUrl":"https://doi.org/10.1007/s10257-024-00682-2","url":null,"abstract":"<p>The core success of digital transformation among small and medium enterprises (SMEs) still needs to be clarified and comprehensively discussed. Meanwhile, SMEs cannot exploit digital advantages due to their limited strategic empirical and practical knowledge. This study aims to (1) describe the research pattern in the SME’s digitalization area; (2) identify the core success factors of SMEs' digital transformation to gain business success; (3) search for relevant business aspects that are necessary for SME digital transformation; and (4) develop further research agenda in the field of SMEs’ digital transformation. This study uses a systematic literature review and thematic analysis to determine core success factors suggested by primary studies. The literature review suggests that (1) SMEs should consider their baseline, limitation, and idiosyncratic to develop an aligned digitalization strategy; (2) SMEs should consider starting with incremental and gradually improving digitalization; and (3) SMEs should commit to investing in education and continuous learning.</p>","PeriodicalId":13660,"journal":{"name":"Information Systems and e-Business Management","volume":"65 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141755198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-20DOI: 10.1007/s10257-024-00681-3
Myriam Schaschek, Fabian Gwinner, Nicolas Neis, Christoph Tomitza, Christian Zeiß, Axel Winkelmann
Past generations of BPM involved the efficient and effective management of business processes. Yet, we currently face a turning point. The technological facets of data-driven BPM add complexity to traditional BPM applications. As a result, organizations face intended and unintended technology-related changes across all business process initiatives. Using the term BP-x, we summarize the recent changes in BPM knowledge that has hitherto been fragmented across academic literature. To address the challenges of BP-x initiatives, we envision a holistic model that focuses on managing related cutting-edge technologies and BPM. Thus, we propose the operationalized BP-x management model as a valuable IT meta-artifact. We develop the model using a two-cycled Design Science Research methodology and conduct a threefold summative evaluation. The results of our study indicate that creating awareness of potentials and opportunities accelerates the process toward action and fosters new business outcomes in terms of performance and innovation. By strategically aligning BP-x endeavors, organizations promote visibility, shared understanding, and culture among stakeholders. Our model guides managers throughout the BP-x adoption journey in conjunction with organizational, managerial, and technological prerequisites.
{"title":"Managing next generation BP-x initiatives","authors":"Myriam Schaschek, Fabian Gwinner, Nicolas Neis, Christoph Tomitza, Christian Zeiß, Axel Winkelmann","doi":"10.1007/s10257-024-00681-3","DOIUrl":"https://doi.org/10.1007/s10257-024-00681-3","url":null,"abstract":"<p>Past generations of BPM involved the efficient and effective management of business processes. Yet, we currently face a turning point. The technological facets of data-driven BPM add complexity to traditional BPM applications. As a result, organizations face intended and unintended technology-related changes across all business process initiatives. Using the term BP-x, we summarize the recent changes in BPM knowledge that has hitherto been fragmented across academic literature. To address the challenges of BP-x initiatives, we envision a holistic model that focuses on managing related cutting-edge technologies and BPM. Thus, we propose the operationalized BP-x management model as a valuable IT meta-artifact. We develop the model using a two-cycled Design Science Research methodology and conduct a threefold summative evaluation. The results of our study indicate that creating awareness of potentials and opportunities accelerates the process toward action and fosters new business outcomes in terms of performance and innovation. By strategically aligning BP-x endeavors, organizations promote visibility, shared understanding, and culture among stakeholders. Our model guides managers throughout the BP-x adoption journey in conjunction with organizational, managerial, and technological prerequisites.</p>","PeriodicalId":13660,"journal":{"name":"Information Systems and e-Business Management","volume":"64 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141730699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-17DOI: 10.1007/s10257-024-00673-3
Alexander Grünewald, Tan Gürpinar, Carina Culotta, Alicia Guderian
Many enterprises are currently engaged in developing blockchain-based business models. Enterprise networks offer a variety of potential applications for blockchain solutions as they benefit from transparency and security as well as automation of handling data, material, and financial flows along their supply chains. Despite profound potentials, the indicated business models are still in their early stages and need further investigation. To provide an overview of existing blockchain-based business models in the context of enterprise networks, the underlying paper designs a multidimensional taxonomy and identifies several archetypes of blockchain-based businesses. For the taxonomy development, data from 101 blockchain start-ups serves as a basis for empirical validation. Using hierarchical clustering and the k-means method, seven archetypes that sharpen the understanding of how blockchain solutions affect business models in enterprise networks and enable new business models are derived. The proposed work results are intended to be applied in future research and practice to classify and assess the integration of blockchain solutions into existing business models and to support developing new ones that leverage emerging technological capabilities.
{"title":"Archetypes of blockchain-based business models in enterprise networks","authors":"Alexander Grünewald, Tan Gürpinar, Carina Culotta, Alicia Guderian","doi":"10.1007/s10257-024-00673-3","DOIUrl":"https://doi.org/10.1007/s10257-024-00673-3","url":null,"abstract":"<p>Many enterprises are currently engaged in developing blockchain-based business models. Enterprise networks offer a variety of potential applications for blockchain solutions as they benefit from transparency and security as well as automation of handling data, material, and financial flows along their supply chains. Despite profound potentials, the indicated business models are still in their early stages and need further investigation. To provide an overview of existing blockchain-based business models in the context of enterprise networks, the underlying paper designs a multidimensional taxonomy and identifies several archetypes of blockchain-based businesses. For the taxonomy development, data from 101 blockchain start-ups serves as a basis for empirical validation. Using hierarchical clustering and the k-means method, seven archetypes that sharpen the understanding of how blockchain solutions affect business models in enterprise networks and enable new business models are derived. The proposed work results are intended to be applied in future research and practice to classify and assess the integration of blockchain solutions into existing business models and to support developing new ones that leverage emerging technological capabilities.</p>","PeriodicalId":13660,"journal":{"name":"Information Systems and e-Business Management","volume":"75 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141725758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-09DOI: 10.1007/s10257-024-00679-x
Muriel Frank, Vanessa Kohn, Roland Holten
When studying information systems (IS) phenomena, scholars increasingly aim to take a socio-technical approach. This means that instead of focusing exclusively on the technical side, they also study them from a human perspective. An underrecognized yet powerful tool for examining the opinions and attitudes of individuals is the Q methodology because it makes subjective viewpoints on IS phenomena objectively measurable. Despite its benefits and wide application in other disciplines, the use of Q methodology in top IS journals is still rare. Based on a systematic literature review, this article explores the potential and fit of Q methodology within the sociotechnical systems framework. This analysis leads to two main insights. First, Q methodology enables the integration of the social and the technical component as well as instrumental and humanistic outcomes. Second, this qualiquantilogical technique enriches the understanding of IS phenomena by objectifying the approach to exploring subjective viewpoints. Thus, our work highlights the potential of the method for conducting IS research. And it also provides clear guidelines on how to use the method to uncover new patterns inherent in the data being studied.
在研究信息系统(IS)现象时,学者们越来越多地采用社会技术方法。这意味着,他们不再只关注技术层面,还从人的角度对其进行研究。Q 方法是研究个人观点和态度的一个未得到充分认识的有力工具,因为它使有关信息系统现象的主观观点变得客观可测。尽管 Q 方法有很多优点,在其他学科中也有广泛应用,但在顶级信息系统期刊中使用 Q 方法的情况仍然很少。本文基于系统的文献综述,探讨了 Q 方法在社会技术系统框架中的潜力和适用性。这一分析得出了两个主要见解。首先,素质方法论能够整合社会和技术要素以及工具和人文成果。其次,这种定性逻辑技术通过将探索主观观点的方法客观化,丰富了对 IS 现象的理解。因此,我们的工作凸显了这种方法在开展信息系统研究方面的潜力。它还为如何使用该方法揭示所研究数据的内在新模式提供了明确的指导。
{"title":"Q methodology and the sociotechnical perspective","authors":"Muriel Frank, Vanessa Kohn, Roland Holten","doi":"10.1007/s10257-024-00679-x","DOIUrl":"https://doi.org/10.1007/s10257-024-00679-x","url":null,"abstract":"<p>When studying information systems (IS) phenomena, scholars increasingly aim to take a socio-technical approach. This means that instead of focusing exclusively on the technical side, they also study them from a human perspective. An underrecognized yet powerful tool for examining the opinions and attitudes of individuals is the Q methodology because it makes subjective viewpoints on IS phenomena objectively measurable. Despite its benefits and wide application in other disciplines, the use of Q methodology in top IS journals is still rare. Based on a systematic literature review, this article explores the potential and fit of Q methodology within the sociotechnical systems framework. This analysis leads to two main insights. First, Q methodology enables the integration of the social and the technical component as well as instrumental and humanistic outcomes. Second, this qualiquantilogical technique enriches the understanding of IS phenomena by objectifying the approach to exploring subjective viewpoints. Thus, our work highlights the potential of the method for conducting IS research. And it also provides clear guidelines on how to use the method to uncover new patterns inherent in the data being studied.</p>","PeriodicalId":13660,"journal":{"name":"Information Systems and e-Business Management","volume":"40 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141299017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-23DOI: 10.1007/s10257-024-00680-4
Joklan Imelda Camelia Goni, Amy Van Looy
In dynamic business environments, many organizations need to acquire a process innovation capability (PIC) that caters to less-structured business processes (LSBP) in order to remain relevant in the market. However, such organizations are still in need of appropriate frameworks that enable them to identify and evaluate their PIC in LSBP. To fill this gap, we have followed the Delphi method with three rounds of semi-structured interviews, including twelve practitioners and fifteen scholars across five continents. The findings reveal five major differences and barriers for PIC in LSBP, as compared to innovating structured business processes. In addition, we refine and empirically validate an innovation capability framework covering six main capabilities and 18 sub-areas, configured into three major pillars: (1) a people-process-technology pillar, (2) an organizational pillar, and (3) an ecosystem pillar. Besides being one of the first studies to offer a conceptual framework for PIC in LSBP, we provide practical brainstorming with reflective questions per capability, for practitioners to reflect on their organization’s current PIC in LSBP.
{"title":"Developing a framework for innovating less-structured business processes: a Delphi study","authors":"Joklan Imelda Camelia Goni, Amy Van Looy","doi":"10.1007/s10257-024-00680-4","DOIUrl":"https://doi.org/10.1007/s10257-024-00680-4","url":null,"abstract":"<p>In dynamic business environments, many organizations need to acquire a process innovation capability (PIC) that caters to less-structured business processes (LSBP) in order to remain relevant in the market. However, such organizations are still in need of appropriate frameworks that enable them to identify and evaluate their PIC in LSBP. To fill this gap, we have followed the Delphi method with three rounds of semi-structured interviews, including twelve practitioners and fifteen scholars across five continents. The findings reveal five major differences and barriers for PIC in LSBP, as compared to innovating structured business processes. In addition, we refine and empirically validate an innovation capability framework covering six main capabilities and 18 sub-areas, configured into three major pillars: (1) a people-process-technology pillar, (2) an organizational pillar, and (3) an ecosystem pillar. Besides being one of the first studies to offer a conceptual framework for PIC in LSBP, we provide practical brainstorming with reflective questions per capability, for practitioners to reflect on their organization’s current PIC in LSBP.</p>","PeriodicalId":13660,"journal":{"name":"Information Systems and e-Business Management","volume":"28 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141085611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-15DOI: 10.1007/s10257-024-00674-2
Sebastian Käss, Christoph Brosig, Markus Westner, Susanne Strahringer
Case study research is one of the most widely used research methods in Information Systems (IS). In recent years, an increasing number of publications have used case studies with few sources of evidence, such as single interviews per case. While there is much methodological guidance on rigorously conducting multiple case studies, it remains unclear how researchers can achieve an acceptable level of rigour for this emerging type of multiple case study with few sources of evidence, i.e., multiple mini case studies. In this context, we synthesise methodological guidance for multiple case study research from a cross-disciplinary perspective to develop an analytical framework. Furthermore, we calibrate this analytical framework to multiple mini case studies by reviewing previous IS publications that use multiple mini case studies to provide guidelines to conduct multiple mini case studies rigorously. We also offer a conceptual definition of multiple mini case studies, distinguish them from other research approaches, and position multiple mini case studies as a pragmatic and rigorous approach to research emerging and innovative phenomena in IS.
{"title":"Short and sweet: multiple mini case studies as a form of rigorous case study research","authors":"Sebastian Käss, Christoph Brosig, Markus Westner, Susanne Strahringer","doi":"10.1007/s10257-024-00674-2","DOIUrl":"https://doi.org/10.1007/s10257-024-00674-2","url":null,"abstract":"<p>Case study research is one of the most widely used research methods in Information Systems (IS). In recent years, an increasing number of publications have used case studies with few sources of evidence, such as single interviews per case. While there is much methodological guidance on rigorously conducting multiple case studies, it remains unclear how researchers can achieve an acceptable level of rigour for this emerging type of multiple case study with few sources of evidence, i.e., multiple mini case studies. In this context, we synthesise methodological guidance for multiple case study research from a cross-disciplinary perspective to develop an analytical framework. Furthermore, we calibrate this analytical framework to multiple mini case studies by reviewing previous IS publications that use multiple mini case studies to provide guidelines to conduct multiple mini case studies rigorously. We also offer a conceptual definition of multiple mini case studies, distinguish them from other research approaches, and position multiple mini case studies as a pragmatic and rigorous approach to research emerging and innovative phenomena in IS.</p>","PeriodicalId":13660,"journal":{"name":"Information Systems and e-Business Management","volume":"27 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140942989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-09DOI: 10.1007/s10257-023-00665-9
Yuanjun Zhao, Hongxin Yu, Chunjia Han, Brij B. Gupta
The risk of peer to peer lending (P2P) platform is predicted based on text data on the Internet to avoid the risk of social network financing and improve the security of social network financing. First, the transaction and review text information of a third-party P2P platform are classified for the time series of emotional changes. Second, the Granger causal relation test is used to verify the correlation between the time series of emotional changes and trading volume. Finally, a long short-term memory (LSTM) forecasting model is proposed based on investors’ emotional changes to predict the trading volume of P2P platforms using emotional changes as a reference for social network financing to avoid risks. The results show that the value of Pearson correlation coefficient between the trading volume of P2P platforms and negative emotions is -0.2088, with a P value less than 1%, indicating a correlation between emotional changes and trading volume. The Pearson correlation coefficient between the predicted and actual values is 0.7995, whereas the mean square error is 0.2190 with a fitting degree of 0.6532. This shows that the LSTM forecasting model can accurately predict the trading volume of P2P platforms with good performance in comparison with other forecasting models.
{"title":"Analysis of the impact of social network financing based on deep learning and long short-term memory","authors":"Yuanjun Zhao, Hongxin Yu, Chunjia Han, Brij B. Gupta","doi":"10.1007/s10257-023-00665-9","DOIUrl":"https://doi.org/10.1007/s10257-023-00665-9","url":null,"abstract":"<p>The risk of peer to peer lending (P2P) platform is predicted based on text data on the Internet to avoid the risk of social network financing and improve the security of social network financing. First, the transaction and review text information of a third-party P2P platform are classified for the time series of emotional changes. Second, the Granger causal relation test is used to verify the correlation between the time series of emotional changes and trading volume. Finally, a long short-term memory (LSTM) forecasting model is proposed based on investors’ emotional changes to predict the trading volume of P2P platforms using emotional changes as a reference for social network financing to avoid risks. The results show that the value of Pearson correlation coefficient between the trading volume of P2P platforms and negative emotions is -0.2088, with a P value less than 1%, indicating a correlation between emotional changes and trading volume. The Pearson correlation coefficient between the predicted and actual values is 0.7995, whereas the mean square error is 0.2190 with a fitting degree of 0.6532. This shows that the LSTM forecasting model can accurately predict the trading volume of P2P platforms with good performance in comparison with other forecasting models.</p>","PeriodicalId":13660,"journal":{"name":"Information Systems and e-Business Management","volume":"32 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140895729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-07DOI: 10.1007/s10257-024-00677-z
Stephanie Winkelmann, Rajae Guennoun, Frederik Möller, Thorsten Schoormann, Hendrik van der Valk
Economic, political, and societal pressure forces companies to act more sustainably. New legislation and regulation such as the Supply Chain Act, mandates companies to take responsibility for their actions as well as those of their supply chain collaborators. Meeting these requirements demands transparency. Digital technologies along the supply chain have the potential to collect diverse types of data and raise awareness for sustainability purposes. For example, data obtained from multiple supply chain participants can be used to estimate CO2 emissions or optimize resource utilization. Following guidelines for systematically reviewing a body of literature, this paper therefore investigates the distribution of digital technologies in supply chains for sustainability. Based on a collected corpus of 70 articles, we identify seven key digital technologies and indicate how they can be employed to contribute to economic, environmental, and social sustainability. The results show that (1) blockchain is the most used technology for sustainability within the supply chain and (2) the majority of articles on digital technologies in our corpus address the social dimension of sustainability. Our findings advance the understanding of how digitalization can transform supply chains into more sustainable entities and help practitioners decide which technology fits a certain sustainability dimension.
{"title":"Back to a resilient future: Digital technologies for a sustainable supply chain","authors":"Stephanie Winkelmann, Rajae Guennoun, Frederik Möller, Thorsten Schoormann, Hendrik van der Valk","doi":"10.1007/s10257-024-00677-z","DOIUrl":"https://doi.org/10.1007/s10257-024-00677-z","url":null,"abstract":"<p>Economic, political, and societal pressure forces companies to act more sustainably. New legislation and regulation such as the Supply Chain Act, mandates companies to take responsibility for their actions as well as those of their supply chain collaborators. Meeting these requirements demands transparency. Digital technologies along the supply chain have the potential to collect diverse types of data and raise awareness for sustainability purposes. For example, data obtained from multiple supply chain participants can be used to estimate CO<sub>2</sub> emissions or optimize resource utilization. Following guidelines for systematically reviewing a body of literature, this paper therefore investigates the distribution of digital technologies in supply chains for sustainability. Based on a collected corpus of 70 articles, we identify seven key digital technologies and indicate how they can be employed to contribute to economic, environmental, and social sustainability. The results show that (1) blockchain is the most used technology for sustainability within the supply chain and (2) the majority of articles on digital technologies in our corpus address the social dimension of sustainability. Our findings advance the understanding of how digitalization can transform supply chains into more sustainable entities and help practitioners decide which technology fits a certain sustainability dimension.</p>","PeriodicalId":13660,"journal":{"name":"Information Systems and e-Business Management","volume":"45 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140875139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}