Creation of new knowledge in teams requires collaboration among its team members. Although individual creativity is important, no single individual possesses all the skills and knowledge necessary to deal with complexity in knowledge work. Therefore, team cohesion is considered a prerequisite in innovation. However, in this study we argue that team cohesion could be a double edged sword. It could even be detrimental to innovation at high levels of team cohesion. The findings of this study with 56 software projects quantitatively support this premise. These findings have useful implications for practitioners engaged in knowledge work
{"title":"Is team cohesion a double edged sword for promoting innovation in software development projects?","authors":"Ashish Kakar, Adarsh Kumar Kakar","doi":"10.17705/1PAIS.10404","DOIUrl":"https://doi.org/10.17705/1PAIS.10404","url":null,"abstract":"Creation of new knowledge in teams requires collaboration among its team members. Although individual creativity is important, no single individual possesses all the skills and knowledge necessary to deal with complexity in knowledge work. Therefore, team cohesion is considered a prerequisite in innovation. However, in this study we argue that team cohesion could be a double edged sword. It could even be detrimental to innovation at high levels of team cohesion. The findings of this study with 56 software projects quantitatively support this premise. These findings have useful implications for practitioners engaged in knowledge work","PeriodicalId":43480,"journal":{"name":"Pacific Asia Journal of the Association for Information Systems","volume":"11 1","pages":"5"},"PeriodicalIF":1.8,"publicationDate":"2018-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77732566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Maynard, Terrence H. Tan, Atif Ahmad, T. Ruighaver
Information security governance influences the quality of strategic decision-making to ensure that investments in security are effective. Security governance involves a range of activities including adjusting organizational structures, designating roles and responsibilities, allocating resources, managing risks, measuring results, and gauging the adequacy of audits and reviews. We identified three security issues in an organization around strategic context in an in-depth and revelatory case study. These are (1) limited diversity in decision-making; (2) lack of guidance in corporate-level mission statements to security decision-makers; (3) a bottom-up approach to security strategic context development. We further argue that instead of an approach that is based on risk and controls, organizations should address objectives and strategies through developing depth in their security strategic context.
{"title":"Towards a Framework for Strategic Security Context in Information Security Governance","authors":"S. Maynard, Terrence H. Tan, Atif Ahmad, T. Ruighaver","doi":"10.17705/1PAIS.10403","DOIUrl":"https://doi.org/10.17705/1PAIS.10403","url":null,"abstract":"Information security governance influences the quality of strategic decision-making to ensure that investments in security are effective. Security governance involves a range of activities including adjusting organizational structures, designating roles and responsibilities, allocating resources, managing risks, measuring results, and gauging the adequacy of audits and reviews. We identified three security issues in an organization around strategic context in an in-depth and revelatory case study. These are (1) limited diversity in decision-making; (2) lack of guidance in corporate-level mission statements to security decision-makers; (3) a bottom-up approach to security strategic context development. We further argue that instead of an approach that is based on risk and controls, organizations should address objectives and strategies through developing depth in their security strategic context.","PeriodicalId":43480,"journal":{"name":"Pacific Asia Journal of the Association for Information Systems","volume":"1 1","pages":"4"},"PeriodicalIF":1.8,"publicationDate":"2018-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90088722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Luwen Huangfu, S. Hayne, James Ma, Nicholas Roberts
Cancer (re)admission time interval, or Out-of-Hospital Days (OHD) between two consecutive hospital (re)admissions, is commonly considered as an indicator of health service quality. Despite its importance, the risk factors of OHD are largely unknown because of limited access to cancer patients’ data and the lack of relevant characteristics (e.g., geographic factors) in the data. To explore the association between patients’ conditions and readmission events, we analyze a sample of 22,231 admissions (OHD>30), consisting of demographic, medical, and financial factors, extracted from Electronic Health Records (EHR) of 635,261 cancer patients from 190 hospitals in China. Geographic factors are also included by applying text mining to the free-form address fields of patients’ homes and hospitals. Using hierarchical linear regression, we find that various factors significantly influence OHD: age, marital status, number of admissions, and whether the treating hospital is in the same province as the patient’s home address.
{"title":"Exploratory Analysis of Out-of-Hospital Days Based on Cancer Patients in China","authors":"Luwen Huangfu, S. Hayne, James Ma, Nicholas Roberts","doi":"10.17705/1PAIS.10405","DOIUrl":"https://doi.org/10.17705/1PAIS.10405","url":null,"abstract":"Cancer (re)admission time interval, or Out-of-Hospital Days (OHD) between two consecutive hospital (re)admissions, is commonly considered as an indicator of health service quality. Despite its importance, the risk factors of OHD are largely unknown because of limited access to cancer patients’ data and the lack of relevant characteristics (e.g., geographic factors) in the data. To explore the association between patients’ conditions and readmission events, we analyze a sample of 22,231 admissions (OHD>30), consisting of demographic, medical, and financial factors, extracted from Electronic Health Records (EHR) of 635,261 cancer patients from 190 hospitals in China. Geographic factors are also included by applying text mining to the free-form address fields of patients’ homes and hospitals. Using hierarchical linear regression, we find that various factors significantly influence OHD: age, marital status, number of admissions, and whether the treating hospital is in the same province as the patient’s home address.","PeriodicalId":43480,"journal":{"name":"Pacific Asia Journal of the Association for Information Systems","volume":"75 1","pages":"6"},"PeriodicalIF":1.8,"publicationDate":"2018-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79285715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The purpose of this paper is to investigate the previously unexplored theoretical relationship between technology enabled information services (TEIS) and the value created by the use of such services. This paper presents a mixed virtual and multi-sited ethnography to provide a thick description of Chinese backpackers (CBs) use of TEIS. Participant observations and interviews of CBs in three different journeys within Europe were undertaken. Our findings illustrate that additional usage values occur when TEIS are used in a tourism context. Social influences and technical infrastructure play a stronger role than previous research presented. The study contributes to the literature by 1) providing a theoretical understanding of tourists’ TEIS use; 2) documenting a study of a complete package of technologies used by CBs, and 3) proposing a research model which can be used for studying different TEIS use behaviour/patterns, and also in the design of TEIS for specific contexts.
{"title":"Technology Enabled Information Services Use in Tourism: An Ethnographic Study of Chinese Backpackers","authors":"Brad McKenna, Wenjie Cai, T. Tuunanen","doi":"10.17705/1PAIS.10402","DOIUrl":"https://doi.org/10.17705/1PAIS.10402","url":null,"abstract":"The purpose of this paper is to investigate the previously unexplored theoretical relationship between technology enabled information services (TEIS) and the value created by the use of such services. This paper presents a mixed virtual and multi-sited ethnography to provide a thick description of Chinese backpackers (CBs) use of TEIS. Participant observations and interviews of CBs in three different journeys within Europe were undertaken. Our findings illustrate that additional usage values occur when TEIS are used in a tourism context. Social influences and technical infrastructure play a stronger role than previous research presented. The study contributes to the literature by 1) providing a theoretical understanding of tourists’ TEIS use; 2) documenting a study of a complete package of technologies used by CBs, and 3) proposing a research model which can be used for studying different TEIS use behaviour/patterns, and also in the design of TEIS for specific contexts.","PeriodicalId":43480,"journal":{"name":"Pacific Asia Journal of the Association for Information Systems","volume":"39 1","pages":"3"},"PeriodicalIF":1.8,"publicationDate":"2018-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73543741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Enterprise architecture (EA) is a description of an organization from an integrated business and IT perspective. Current literature conceptualizes EA as a comprehensive blueprint of an enterprise organized according to a logical framework and describing its current state, desired future state and migration roadmap. However, the current concept of EA originates from non-empirical sources, lacks demonstrated examples of its successful practical implementation and deviates from the real practical use of EA in organizations in multiple important aspects. Due to these and other problems the notion of EA needs to be reconceptualized in order to more accurately reflect empirical realities. In this paper, based on an extensive EA literature review, I describe the problems with the current concept of EA, demonstrate the critical inconsistencies between this concept and the real practice use of EA in organizations and illustrate them based on a recent exemplary case study of a successful EA practice. Although this paper justifies the need for the reconceptualization of EA and points to the most essential aspects of this reconceptualization, it does not offer an alternative ready-to-use conceptualization and represents only the first step towards developing a new, evidence-based concept of EA.
{"title":"Enterprise Architecture: A Reconceptualization Is Needed","authors":"S. Kotusev","doi":"10.17705/1PAIS.10401","DOIUrl":"https://doi.org/10.17705/1PAIS.10401","url":null,"abstract":"Enterprise architecture (EA) is a description of an organization from an integrated business and IT perspective. Current literature conceptualizes EA as a comprehensive blueprint of an enterprise organized according to a logical framework and describing its current state, desired future state and migration roadmap. However, the current concept of EA originates from non-empirical sources, lacks demonstrated examples of its successful practical implementation and deviates from the real practical use of EA in organizations in multiple important aspects. Due to these and other problems the notion of EA needs to be reconceptualized in order to more accurately reflect empirical realities. In this paper, based on an extensive EA literature review, I describe the problems with the current concept of EA, demonstrate the critical inconsistencies between this concept and the real practice use of EA in organizations and illustrate them based on a recent exemplary case study of a successful EA practice. Although this paper justifies the need for the reconceptualization of EA and points to the most essential aspects of this reconceptualization, it does not offer an alternative ready-to-use conceptualization and represents only the first step towards developing a new, evidence-based concept of EA.","PeriodicalId":43480,"journal":{"name":"Pacific Asia Journal of the Association for Information Systems","volume":"39 1","pages":"2"},"PeriodicalIF":1.8,"publicationDate":"2018-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77536814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The level of sophistication and dynamism of the security threat environment requires modern organizations to develop novel security strategies. The responsibility to strategize falls to the Chief Information Security Officer (CISO). A review of the security literature shows there has been little emphasis on understanding the role of the CISO as a strategist. In this research, we conduct a systematic literature review from the disciplines of information security and strategic management to identify specific attributes required by CISOs to become effective strategists. We discuss these attributes in the context of Information Security Management and argue that CISOs with these attributes or capabilities are better positioned to overcome the existing strategic security challenges facing organizations.
{"title":"Defining the Strategic Role of the Chief Information Security Officer","authors":"S. Maynard, Mazino Onibere, Atif Ahmad","doi":"10.17705/1PAIS.10303","DOIUrl":"https://doi.org/10.17705/1PAIS.10303","url":null,"abstract":"The level of sophistication and dynamism of the security threat environment requires modern organizations to develop novel security strategies. The responsibility to strategize falls to the Chief Information Security Officer (CISO). A review of the security literature shows there has been little emphasis on understanding the role of the CISO as a strategist. In this research, we conduct a systematic literature review from the disciplines of information security and strategic management to identify specific attributes required by CISOs to become effective strategists. We discuss these attributes in the context of Information Security Management and argue that CISOs with these attributes or capabilities are better positioned to overcome the existing strategic security challenges facing organizations.","PeriodicalId":43480,"journal":{"name":"Pacific Asia Journal of the Association for Information Systems","volume":"6 1","pages":"3"},"PeriodicalIF":1.8,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83718247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Evolving customer expectations and the rapid introduction of new information technologies are influencing business operations, and businesses need to transform themselves with new operating models to remain competitive. The traditional top-down administrative leadership approach is not sufficiently flexible to support the innovation needed to sustain customer engagement and retention. There is a need for both an enabling leadership that supports the exploration of innovative ideas quickly for viability and an adaptive leadership to transition the ideas that show promise into the current business model or a variation of this model to sustain growth. We define digital leadership as a strategic process that collectively uses these three leadership styles to create an ecosystem that advances a culture of innovation within organizations. This leadership process uses four foundational platforms to support business transformations: (1) An innovation platform to empower teams to explore ideas that create value using digital transformations; (2) An agile system and business platform to quickly design and deliver IT implementations; (3) A learning platform to support reflective discourse that leads to organizational capacity building; and (4) An adoption platform to decide when and what implementations get transitioned to the regular business for sustaining competitiveness. We will illustrate how digital leadership is used to transform the culture of a community hospital through several IS implementations recognized by external peers for their innovativeness
{"title":"Hospital Leadership in Support of Digital Transformation","authors":"M. Tanniru, J. Khuntia, Jack Weiner","doi":"10.17705/1PAIS.10301","DOIUrl":"https://doi.org/10.17705/1PAIS.10301","url":null,"abstract":"Evolving customer expectations and the rapid introduction of new information technologies are influencing business operations, and businesses need to transform themselves with new operating models to remain competitive. The traditional top-down administrative leadership approach is not sufficiently flexible to support the innovation needed to sustain customer engagement and retention. There is a need for both an enabling leadership that supports the exploration of innovative ideas quickly for viability and an adaptive leadership to transition the ideas that show promise into the current business model or a variation of this model to sustain growth. We define digital leadership as a strategic process that collectively uses these three leadership styles to create an ecosystem that advances a culture of innovation within organizations. This leadership process uses four foundational platforms to support business transformations: (1) An innovation platform to empower teams to explore ideas that create value using digital transformations; (2) An agile system and business platform to quickly design and deliver IT implementations; (3) A learning platform to support reflective discourse that leads to organizational capacity building; and (4) An adoption platform to decide when and what implementations get transitioned to the regular business for sustaining competitiveness. We will illustrate how digital leadership is used to transform the culture of a community hospital through several IS implementations recognized by external peers for their innovativeness","PeriodicalId":43480,"journal":{"name":"Pacific Asia Journal of the Association for Information Systems","volume":"7 1","pages":"1"},"PeriodicalIF":1.8,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82185606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The present era is witness to numerous instances of new technologies constantly replacing those that are being used, a phenomenon coined as technology transition. In this research, based on existing evidences, we propose a theoretical model to explain technology transition from an individual user’s perspective. Results based on validation of the proposed model based on survey data identifies key factors that may influence an individual’s intention to transition from a conventional computing device to a tablet computer. The findings have implications to both theory and practice which have been also delineated.
{"title":"Understanding Technology Transition at the Individual Level","authors":"Rahul Thakurta, Nils Urbach, Anamitra Basu","doi":"10.17705/1PAIS.10302","DOIUrl":"https://doi.org/10.17705/1PAIS.10302","url":null,"abstract":"The present era is witness to numerous instances of new technologies constantly replacing those that are being used, a phenomenon coined as technology transition. In this research, based on existing evidences, we propose a theoretical model to explain technology transition from an individual user’s perspective. Results based on validation of the proposed model based on survey data identifies key factors that may influence an individual’s intention to transition from a conventional computing device to a tablet computer. The findings have implications to both theory and practice which have been also delineated.","PeriodicalId":43480,"journal":{"name":"Pacific Asia Journal of the Association for Information Systems","volume":"17 1","pages":"2"},"PeriodicalIF":1.8,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81494818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As a new trend in business intelligence (BI), mobile BI has been gaining increasing adoption by managers. However, there is little academic research about the managerial use of mobile BI. Adopting the key constructs of Task-Technology Fit theory and the Unified Theory of Acceptance and Use of Technology as the theoretical lens, this exploratory study aims to deliver a preliminary understanding on why and how managers use mobile BI, from both the managers’ and the vendor’s perspectives. A case study was conducted with a large government authority whose mobile BI vendor is an industry leader worldwide. Semi-structured interviews were carried out with seven senior managers from this organization and the vendor. Through discussing the reasons why managers use mobile BI and their use patterns, a series of emergent propositions are drawn. The empirical results from this study not only contribute to this currently underexplored area of mobile BI , but also help enable the industry to make mobile BI products that better suit managers’ needs.
{"title":"An Investigation of the Managerial Use of Mobile Business Intelligence","authors":"Wei-yi Hou, Shijia Gao","doi":"10.17705/1PAIS.10304","DOIUrl":"https://doi.org/10.17705/1PAIS.10304","url":null,"abstract":"As a new trend in business intelligence (BI), mobile BI has been gaining increasing adoption by managers. However, there is little academic research about the managerial use of mobile BI. Adopting the key constructs of Task-Technology Fit theory and the Unified Theory of Acceptance and Use of Technology as the theoretical lens, this exploratory study aims to deliver a preliminary understanding on why and how managers use mobile BI, from both the managers’ and the vendor’s perspectives. A case study was conducted with a large government authority whose mobile BI vendor is an industry leader worldwide. Semi-structured interviews were carried out with seven senior managers from this organization and the vendor. Through discussing the reasons why managers use mobile BI and their use patterns, a series of emergent propositions are drawn. The empirical results from this study not only contribute to this currently underexplored area of mobile BI , but also help enable the industry to make mobile BI products that better suit managers’ needs.","PeriodicalId":43480,"journal":{"name":"Pacific Asia Journal of the Association for Information Systems","volume":"33 1","pages":"4"},"PeriodicalIF":1.8,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80857462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The social media search system aims at providing an organized and integrated access and search support to a massive amount of unstructured, multilingual, user-generated content in an effective and efficient manner. Previous research on social media analytics mainly focuses on developing and applying advanced analysis methods and/or tools to make sense of the large amount of user-generated data over the Internet. Relatively little effort has been put to specifically examine the social media search system. In this study, we utilize and apply the DeLone and McLean IS Success Model to examine this type of systems. To do it, a lab experiment was conducted, and the results showed that all causal relationships, except for satisfaction to social benefit, specified in the DeLone and McLean IS Success Model hold in the context of the large-scale, social media search system. Specifically, we found that information quality and system quality associated with the system could significantly influence both users’ intention to use and satisfaction toward it, both of which, in turn, had significant impacts on users’ perceived individual benefit and social benefit. In addition, satisfaction could significantly influence intention to use the system.
{"title":"Adoption of Social Media Search Systems: An IS Success Model Perspective","authors":"Mandy Yan Dang, G. Zhang, Hsinchun Chen","doi":"10.17705/1PAIS.10203","DOIUrl":"https://doi.org/10.17705/1PAIS.10203","url":null,"abstract":"The social media search system aims at providing an organized and integrated access and search support to a massive amount of unstructured, multilingual, user-generated content in an effective and efficient manner. Previous research on social media analytics mainly focuses on developing and applying advanced analysis methods and/or tools to make sense of the large amount of user-generated data over the Internet. Relatively little effort has been put to specifically examine the social media search system. In this study, we utilize and apply the DeLone and McLean IS Success Model to examine this type of systems. To do it, a lab experiment was conducted, and the results showed that all causal relationships, except for satisfaction to social benefit, specified in the DeLone and McLean IS Success Model hold in the context of the large-scale, social media search system. Specifically, we found that information quality and system quality associated with the system could significantly influence both users’ intention to use and satisfaction toward it, both of which, in turn, had significant impacts on users’ perceived individual benefit and social benefit. In addition, satisfaction could significantly influence intention to use the system.","PeriodicalId":43480,"journal":{"name":"Pacific Asia Journal of the Association for Information Systems","volume":"43 1","pages":"4"},"PeriodicalIF":1.8,"publicationDate":"2018-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82147373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}