To create transparency on the rising plethora of Shadow IT (SIT) and Business-managed IT (BMIT) research, this paper reviews how existing research in the field uses reference theories. A review of 107 SIT and BMIT literature items shows that 52 (49%) of the literature items drew on 37 reference theories for theory testing and theory building. The remaining 55 (51%) literature items did not base their research on reference theories. To guide theorizing in future SIT and BMIT research, this paper argues in favor of "category-spanning" reference theories, i.e., reference theories already used across the SIT and BMIT research categories "causing factors," "outcomes," and "governance of SIT and BMIT." The paper identifies four category-spanning theories: (1) transaction cost theory, (2) agency theory, (3) loose coupling theory, and (4) technological frames. Analyzing the prior use of these reference theories in SIT and BMIT, the paper at hand suggests and discusses extensions for their application in future SIT and BMIT research. In addition to the category-spanning reference theories, the theory of workarounds seems to be highly applicable. Due to the novelty of the research field and the explorative character of most existing studies, the paper calls for enhanced theorizing in the field of SIT and BMIT since currently most of the literature items do not build on reference theories.
{"title":"Shadow IT and Business-Managed IT: Where Is the Theory?","authors":"Stefan Klotz","doi":"10.1109/CBI.2019.00039","DOIUrl":"https://doi.org/10.1109/CBI.2019.00039","url":null,"abstract":"To create transparency on the rising plethora of Shadow IT (SIT) and Business-managed IT (BMIT) research, this paper reviews how existing research in the field uses reference theories. A review of 107 SIT and BMIT literature items shows that 52 (49%) of the literature items drew on 37 reference theories for theory testing and theory building. The remaining 55 (51%) literature items did not base their research on reference theories. To guide theorizing in future SIT and BMIT research, this paper argues in favor of \"category-spanning\" reference theories, i.e., reference theories already used across the SIT and BMIT research categories \"causing factors,\" \"outcomes,\" and \"governance of SIT and BMIT.\" The paper identifies four category-spanning theories: (1) transaction cost theory, (2) agency theory, (3) loose coupling theory, and (4) technological frames. Analyzing the prior use of these reference theories in SIT and BMIT, the paper at hand suggests and discusses extensions for their application in future SIT and BMIT research. In addition to the category-spanning reference theories, the theory of workarounds seems to be highly applicable. Due to the novelty of the research field and the explorative character of most existing studies, the paper calls for enhanced theorizing in the field of SIT and BMIT since currently most of the literature items do not build on reference theories.","PeriodicalId":193238,"journal":{"name":"2019 IEEE 21st Conference on Business Informatics (CBI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115693614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years much attention is paid to the visual and three dimensional picture of the behavior of the objects that is changed under the influence of control laws. The old technology based on the analysis of the processes according to the charts and diagrams, which reflects the control processes despite its effectiveness and usability is insufficient to-date. In the RDS software complex developed at the ICS RAS the virtual representation of the behavior of objects has been given great attention. In addition to solving the problems of managing complex technical objects, the RDS software complex was successfully applied to the tasks of business process modeling. It is widely used in modeling organizational mechanisms. RDS software complex provides the organizers of simulation experiments the ability to quickly receive and process the requested information. At the same time, participants in the experiment receive a visual representation of the course of the experiment in the form of graphs and histograms. It shows how a simulation experiment was implemented to analyze the incentive mechanism based on the RDS software package.
{"title":"Using Research Benches for Designing Control Systems and Modeling Organizational Mechanisms","authors":"M. Dorri, A. Shchepkin","doi":"10.1109/CBI.2019.10101","DOIUrl":"https://doi.org/10.1109/CBI.2019.10101","url":null,"abstract":"In recent years much attention is paid to the visual and three dimensional picture of the behavior of the objects that is changed under the influence of control laws. The old technology based on the analysis of the processes according to the charts and diagrams, which reflects the control processes despite its effectiveness and usability is insufficient to-date. In the RDS software complex developed at the ICS RAS the virtual representation of the behavior of objects has been given great attention. In addition to solving the problems of managing complex technical objects, the RDS software complex was successfully applied to the tasks of business process modeling. It is widely used in modeling organizational mechanisms. RDS software complex provides the organizers of simulation experiments the ability to quickly receive and process the requested information. At the same time, participants in the experiment receive a visual representation of the course of the experiment in the form of graphs and histograms. It shows how a simulation experiment was implemented to analyze the incentive mechanism based on the RDS software package.","PeriodicalId":193238,"journal":{"name":"2019 IEEE 21st Conference on Business Informatics (CBI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130302092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the area of production, individual domains are growing more and more closely together. Producing value-added chains and complex supply chains is becoming increasingly intertwined in the process of production planning. The exchange of data between the involved partners plays a critical role. The needs of the customer, the current order situation of the supplier as well as the manufacturing process dependencies of the manufacturer must be coordinated in a symbiotic manner to achieve efficient production. Therefore, this paper presents a variant of cloud manufacturing, collective cloud manufacturing, which focuses on the formation of cross-company symbioses to exchange production information in an environment isolated for data protection via an evolutionary needs model. For this purpose, a previously presented concept and the challenges of industry strategies are described to show how the concept of collective cloud manufacturing can meet the requirements of digitalization.
{"title":"Collective Cloud Manufacturing for Maintaining Diversity in Production through Digital Transformation","authors":"Matthias Milan Strljic, O. Riedel, A. Lechler","doi":"10.1109/CBI.2019.00075","DOIUrl":"https://doi.org/10.1109/CBI.2019.00075","url":null,"abstract":"In the area of production, individual domains are growing more and more closely together. Producing value-added chains and complex supply chains is becoming increasingly intertwined in the process of production planning. The exchange of data between the involved partners plays a critical role. The needs of the customer, the current order situation of the supplier as well as the manufacturing process dependencies of the manufacturer must be coordinated in a symbiotic manner to achieve efficient production. Therefore, this paper presents a variant of cloud manufacturing, collective cloud manufacturing, which focuses on the formation of cross-company symbioses to exchange production information in an environment isolated for data protection via an evolutionary needs model. For this purpose, a previously presented concept and the challenges of industry strategies are described to show how the concept of collective cloud manufacturing can meet the requirements of digitalization.","PeriodicalId":193238,"journal":{"name":"2019 IEEE 21st Conference on Business Informatics (CBI)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127928126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Zhidanov, S. Bezzateev, A. Afanasyeva, M. Sayfullin, Sergey Vanurin, Yulia Bardinova, A. Ometov
The blockchain technology is currently penetrating different sides of modern ICT community. Most of the devices involved in blockchain-related processes are specially designed targeting only the mining aspect. At the same time, the use of wearable and mobile devices may also become a part of blockchain operation, especially during the charging time. The paper considers the possibility of using a large number of constrained devices supporting the operation of the blockchain. The utilization of such devices is expected to improve the efficiency of the system and also to attract a more substantial number of users. Authors propose a novel consensus algorithm based on a combination of Proof-of-Work (PoW), Proof-of-Activity (PoA), and Proof-of-Stake (PoS). The paper first overviews the existing strategies and further describes the developed cryptographic primitives used to build a blockchain involving mobile devices. A brief numerical evaluation of the designed system is also provided in the paper.
{"title":"Blockchain Technology for Smartphones and Constrained IoT Devices: A Future Perspective and Implementation","authors":"K. Zhidanov, S. Bezzateev, A. Afanasyeva, M. Sayfullin, Sergey Vanurin, Yulia Bardinova, A. Ometov","doi":"10.1109/CBI.2019.10092","DOIUrl":"https://doi.org/10.1109/CBI.2019.10092","url":null,"abstract":"The blockchain technology is currently penetrating different sides of modern ICT community. Most of the devices involved in blockchain-related processes are specially designed targeting only the mining aspect. At the same time, the use of wearable and mobile devices may also become a part of blockchain operation, especially during the charging time. The paper considers the possibility of using a large number of constrained devices supporting the operation of the blockchain. The utilization of such devices is expected to improve the efficiency of the system and also to attract a more substantial number of users. Authors propose a novel consensus algorithm based on a combination of Proof-of-Work (PoW), Proof-of-Activity (PoA), and Proof-of-Stake (PoS). The paper first overviews the existing strategies and further describes the developed cryptographic primitives used to build a blockchain involving mobile devices. A brief numerical evaluation of the designed system is also provided in the paper.","PeriodicalId":193238,"journal":{"name":"2019 IEEE 21st Conference on Business Informatics (CBI)","volume":"45 25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124628305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Online behavioral advertising, on websites and in online applications, requires companies to make intricate trade-offs between promises of increased revenue and potential risks for alienation of consumers. To guide companies in making such trade-offs, we answer the research question: How do consumers perceive online behavioral advertising? We consolidate our findings in a process model linking consumer awareness of and knowledge about online behavioral advertising with their attitude towards online behavioral advertising, which shows that consumer perceptions of online behavioral advertising are not stable; instead, they constantly evolve, triggered by confrontations with online behavioral advertising. For consumers, online behavioral advertising is a feature until they get annoyed and it becomes a nuisance. This is a tight rope walk for providers of websites and online applications. Consumers want personalized content, but they do not want content that is too personal. Companies should aim to arouse positive consumer attitudes by creating added value and should revise their online behavioral advertising practices before consumer attitudes shift.
{"title":"Consumer Perceptions of Online Behavioral Advertising","authors":"T. Dehling, Yuchen Zhang, A. Sunyaev","doi":"10.1109/CBI.2019.00046","DOIUrl":"https://doi.org/10.1109/CBI.2019.00046","url":null,"abstract":"Online behavioral advertising, on websites and in online applications, requires companies to make intricate trade-offs between promises of increased revenue and potential risks for alienation of consumers. To guide companies in making such trade-offs, we answer the research question: How do consumers perceive online behavioral advertising? We consolidate our findings in a process model linking consumer awareness of and knowledge about online behavioral advertising with their attitude towards online behavioral advertising, which shows that consumer perceptions of online behavioral advertising are not stable; instead, they constantly evolve, triggered by confrontations with online behavioral advertising. For consumers, online behavioral advertising is a feature until they get annoyed and it becomes a nuisance. This is a tight rope walk for providers of websites and online applications. Consumers want personalized content, but they do not want content that is too personal. Companies should aim to arouse positive consumer attitudes by creating added value and should revise their online behavioral advertising practices before consumer attitudes shift.","PeriodicalId":193238,"journal":{"name":"2019 IEEE 21st Conference on Business Informatics (CBI)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123801698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An Enterprise Architecture (EA) represents the fundamental organization of the business process and Information Technology (IT) infrastructure, serving to capture the essentials of business, IT and its evolution, being relevant to protecting the business and maintaining the flexibility and adaptability of the organization. In the context of the enterprise architecture modeling, some problems were identified: (i) the lack of traceability of the elements present in the computational models or the visualization, in an understandable way, of the chain of elements that are related; and (ii) the absence of synchronization between the computational models of the strategic (strategic model), tactical (business process model) and operational IT levels, focusing on information systems (system requirements model). Among the negative impacts related to these problems are, for example, the obsolescence of models, the difficulty of carrying out impact analysis and decision making, in scenarios of organizational changes. Thus, in order to provide a reduction or elimination of the negative impacts caused by these problems, an approach is proposed to promote the traceability and synchronization of the computational models of an AE. The approach proposed in this work is composed of three layers that together provide: (i) a set of meta-models, representing the strategic, tactical and operational levels of the EA; (ii) a model traceability structure that supports change and configuration management through the use of COBIT, ITIL and ISO 20.000 recommendations and good practices; and (iii) a model synchronization structure that uses the techniques of model driven development (DDM) and allows automated (or semi) automated support to synchronize between the models produced. The purpose of this approach is to keep the computer models traceable and up-to-date, allowing: (i) the support for visualization and understanding of how a set of models (strategic, tactical and operational IT) and their elements relate; (ii) the support for impact analysis and decision-making in change scenarios; (iii) the necessary support to avoid the obsolescence of the models; and (iv) the creation and maintenance of the strategic alignment of the business with IT.
{"title":"A Traceability and Synchronization Approach of the Computational Models of an Enterprise Architecture","authors":"J. Moreira, R. Maciel","doi":"10.1109/CBI.2019.00028","DOIUrl":"https://doi.org/10.1109/CBI.2019.00028","url":null,"abstract":"An Enterprise Architecture (EA) represents the fundamental organization of the business process and Information Technology (IT) infrastructure, serving to capture the essentials of business, IT and its evolution, being relevant to protecting the business and maintaining the flexibility and adaptability of the organization. In the context of the enterprise architecture modeling, some problems were identified: (i) the lack of traceability of the elements present in the computational models or the visualization, in an understandable way, of the chain of elements that are related; and (ii) the absence of synchronization between the computational models of the strategic (strategic model), tactical (business process model) and operational IT levels, focusing on information systems (system requirements model). Among the negative impacts related to these problems are, for example, the obsolescence of models, the difficulty of carrying out impact analysis and decision making, in scenarios of organizational changes. Thus, in order to provide a reduction or elimination of the negative impacts caused by these problems, an approach is proposed to promote the traceability and synchronization of the computational models of an AE. The approach proposed in this work is composed of three layers that together provide: (i) a set of meta-models, representing the strategic, tactical and operational levels of the EA; (ii) a model traceability structure that supports change and configuration management through the use of COBIT, ITIL and ISO 20.000 recommendations and good practices; and (iii) a model synchronization structure that uses the techniques of model driven development (DDM) and allows automated (or semi) automated support to synchronize between the models produced. The purpose of this approach is to keep the computer models traceable and up-to-date, allowing: (i) the support for visualization and understanding of how a set of models (strategic, tactical and operational IT) and their elements relate; (ii) the support for impact analysis and decision-making in change scenarios; (iii) the necessary support to avoid the obsolescence of the models; and (iv) the creation and maintenance of the strategic alignment of the business with IT.","PeriodicalId":193238,"journal":{"name":"2019 IEEE 21st Conference on Business Informatics (CBI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124114586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, sharing information and knowledge has been emphasized as a prerequisite, driver and essential activity of industrial symbiosis. Uncovering, implementing and sustaining business models in industrial symbiosis requires the exchange of information and knowledge between industrial actors, third parties and technologies. Yet, despite information and knowledge sharing being considered pivotal, few researchers investigate this matter in depth. Therefore, this paper examines the current state of industrial symbiosis research, focusing on knowledge sharing and the role of information and communication technology (ICT) by reviewing and synthesizing the scientific literature. Thereby critical points and research gaps are highlighted. Findings are, that the majority of researchers studies the exchange of information/knowledge related to ICT, with a trend towards semantic web technologies. However, these tools are not integrated into the overall business process to join industrial symbiosis activities. Furthermore, the complexity of knowledge sharing as a whole is hardly investigated nor implemented.
{"title":"Sharing is Caring - Information and Knowledge in Industrial Symbiosis: A Systematic Review","authors":"Linda Kosmol","doi":"10.1109/CBI.2019.00010","DOIUrl":"https://doi.org/10.1109/CBI.2019.00010","url":null,"abstract":"In recent years, sharing information and knowledge has been emphasized as a prerequisite, driver and essential activity of industrial symbiosis. Uncovering, implementing and sustaining business models in industrial symbiosis requires the exchange of information and knowledge between industrial actors, third parties and technologies. Yet, despite information and knowledge sharing being considered pivotal, few researchers investigate this matter in depth. Therefore, this paper examines the current state of industrial symbiosis research, focusing on knowledge sharing and the role of information and communication technology (ICT) by reviewing and synthesizing the scientific literature. Thereby critical points and research gaps are highlighted. Findings are, that the majority of researchers studies the exchange of information/knowledge related to ICT, with a trend towards semantic web technologies. However, these tools are not integrated into the overall business process to join industrial symbiosis activities. Furthermore, the complexity of knowledge sharing as a whole is hardly investigated nor implemented.","PeriodicalId":193238,"journal":{"name":"2019 IEEE 21st Conference on Business Informatics (CBI)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126717768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The idea of utilizing computers for question answering tasks has been around from the early beginning of these systems. First algorithms with the aim to accomplish this were already implemented in the early 1960s. In recent years, chatbots have been gaining enormous popularity in various fields. In the context of business applications, they are considered as useful tools for improving customer relationships. In this paper, chat conversations between customers and the chatbot of a telecommunication company are analysed to find out if these interactions can be used to determine a) users' topics of interests and b) user satisfaction. To reach this goal, chat conversations are interpreted as sequences of events and user inputs are analysed with the help of text mining techniques. The study shows that based on users' written conversational contributions, valuable insights on users' interests and satisfaction can be gained. The majority of users leave the chat conversation after a short period of time if the chatbot was not able to give the desired answer right away. Moreover, a huge number of conversations deal with similar topics. Our results imply that companies offering chatbots must thoroughly analyse the collected data to gain more insights into their customers' needs. Based on our findings, they can improve customers' satisfaction by offering personalized service and implementing real-time feedback.
{"title":"The Potential of Chatbots: Analysis of Chatbot Conversations","authors":"Mubashara Akhtar, J. Neidhardt, H. Werthner","doi":"10.1109/CBI.2019.00052","DOIUrl":"https://doi.org/10.1109/CBI.2019.00052","url":null,"abstract":"The idea of utilizing computers for question answering tasks has been around from the early beginning of these systems. First algorithms with the aim to accomplish this were already implemented in the early 1960s. In recent years, chatbots have been gaining enormous popularity in various fields. In the context of business applications, they are considered as useful tools for improving customer relationships. In this paper, chat conversations between customers and the chatbot of a telecommunication company are analysed to find out if these interactions can be used to determine a) users' topics of interests and b) user satisfaction. To reach this goal, chat conversations are interpreted as sequences of events and user inputs are analysed with the help of text mining techniques. The study shows that based on users' written conversational contributions, valuable insights on users' interests and satisfaction can be gained. The majority of users leave the chat conversation after a short period of time if the chatbot was not able to give the desired answer right away. Moreover, a huge number of conversations deal with similar topics. Our results imply that companies offering chatbots must thoroughly analyse the collected data to gain more insights into their customers' needs. Based on our findings, they can improve customers' satisfaction by offering personalized service and implementing real-time feedback.","PeriodicalId":193238,"journal":{"name":"2019 IEEE 21st Conference on Business Informatics (CBI)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130685391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Having been negatively influenced by the financial crisis Small-Medium Enterprises (SMEs) try to be innovative and increase their growth by aligning their business and IT strategy so as to compete in the current uncertain environment. However, there is a lack of strategic planning and formal processes as well as ineffective use of IS. As a result, executives fail to develop effective IS plans and achieve long-term sustainability. Thus, the aim of this paper is to examine the phases which contribute to a greater extent of success in order to provide professionals guidelines regarding the implementation of Strategic Information Systems Planning (SISP) process in SMEs. Data were collected from IS executives in Greek SMEs. Factor Analysis is applied on the detailed items of the SISP process and success constructs. The results indicate that if executives wish to be able to implement Strategy Conception and Strategy Implementation with greater agility than now they should implement them with greater meticulousness. Furthermore, planners should focus on the analysis of current business systems IS and business environment. If these elements are comprehensible, the outcome of the planning process can be improved and the horizon as well as the cost of the project can be reduced.
{"title":"Strategic Planning and Information Systems Success: Evaluation in Greek SMEs","authors":"Maria Kamariotou, F. Kitsios","doi":"10.1109/CBI.2019.00030","DOIUrl":"https://doi.org/10.1109/CBI.2019.00030","url":null,"abstract":"Having been negatively influenced by the financial crisis Small-Medium Enterprises (SMEs) try to be innovative and increase their growth by aligning their business and IT strategy so as to compete in the current uncertain environment. However, there is a lack of strategic planning and formal processes as well as ineffective use of IS. As a result, executives fail to develop effective IS plans and achieve long-term sustainability. Thus, the aim of this paper is to examine the phases which contribute to a greater extent of success in order to provide professionals guidelines regarding the implementation of Strategic Information Systems Planning (SISP) process in SMEs. Data were collected from IS executives in Greek SMEs. Factor Analysis is applied on the detailed items of the SISP process and success constructs. The results indicate that if executives wish to be able to implement Strategy Conception and Strategy Implementation with greater agility than now they should implement them with greater meticulousness. Furthermore, planners should focus on the analysis of current business systems IS and business environment. If these elements are comprehensible, the outcome of the planning process can be improved and the horizon as well as the cost of the project can be reduced.","PeriodicalId":193238,"journal":{"name":"2019 IEEE 21st Conference on Business Informatics (CBI)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130549949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Digital two-sided markets exist in many economic sectors. Well-known successful two-sided markets such as Facebook, Uber, or AirBnB illustrate their huge potential for growth. However, this potential can only be unlocked if the market manages to reach a critical mass of users on both market sides, the provider and the consumer side. Having reached a critical mass, the market attracts further consumers and providers, which in turn strengthens the direct and indirect effect. The problem new markets face is called chicken or egg causality dilemma and there is evidence that it can be approached by using the strategic approaches of network economics. Although there exist evaluations of successful companies regarding their initial strategic approach and problems, there are only few generic recommendations for overcoming the chicken or egg causality dilemma from practice-oriented research. None of those shed light on the combinability of strategic approaches. We attend to this lack of guidance and compile approaches from various sources, which have been used by successful platform operators. Our evaluation is based on published case studies as well as on an expert survey. Our results indicate beneficial combination of strategies as opposed to one-dimensional approaches for different types of two-sided markets.
{"title":"Two-Sided Digital Markets: Disruptive Chance Meets Chicken or Egg Causality Dilemma","authors":"Jonas Wanner, Carsten Bauer, Christian Janiesch","doi":"10.1109/CBI.2019.00045","DOIUrl":"https://doi.org/10.1109/CBI.2019.00045","url":null,"abstract":"Digital two-sided markets exist in many economic sectors. Well-known successful two-sided markets such as Facebook, Uber, or AirBnB illustrate their huge potential for growth. However, this potential can only be unlocked if the market manages to reach a critical mass of users on both market sides, the provider and the consumer side. Having reached a critical mass, the market attracts further consumers and providers, which in turn strengthens the direct and indirect effect. The problem new markets face is called chicken or egg causality dilemma and there is evidence that it can be approached by using the strategic approaches of network economics. Although there exist evaluations of successful companies regarding their initial strategic approach and problems, there are only few generic recommendations for overcoming the chicken or egg causality dilemma from practice-oriented research. None of those shed light on the combinability of strategic approaches. We attend to this lack of guidance and compile approaches from various sources, which have been used by successful platform operators. Our evaluation is based on published case studies as well as on an expert survey. Our results indicate beneficial combination of strategies as opposed to one-dimensional approaches for different types of two-sided markets.","PeriodicalId":193238,"journal":{"name":"2019 IEEE 21st Conference on Business Informatics (CBI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131108919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}