首页 > 最新文献

Journal of Strategic Information Systems最新文献

英文 中文
Congruent patterns of outsourcing capabilities: A bilateral perspective 外包能力的一致模式:双边视角
IF 7 2区 管理学 Q1 Computer Science Pub Date : 2019-12-01 DOI: 10.1016/j.jsis.2019.101580
Yunmo Koo , YoungKi Park , Juyeon Ham , Jae-Nam Lee

Despite the extensive proliferation of Information Technology Outsourcing (ITO), firms often obtain unsatisfactory outsourcing outcomes due to the lack of appropriate outsourcing capabilities of a client or their vendor. ITO clients strive to enhance outsourcing performance by establishing their own outsourcing capabilities as well as contracting with capable vendors to meet their strategic needs. Thus, for the success of an ITO project, it is imperative to find an effective combination of complementary outsourcing capabilities on both sides. However, knowledge of how to identify and develop a set of appropriate outsourcing capabilities of both client and vendor has yet to be developed. This study aims to fill this knowledge gap by elaborating on the configurational mechanisms of outsourcing capabilities from a bilateral perspective, which explicate how multiple types of client and vendor outsourcing capabilities combine into configurations simultaneously to produce high ITO performance. First, based on the ITO literature, we develop a conceptual framework that identifies three key types of outsourcing capabilities. Then, with the matched dataset collected from a client and their vendor, we conduct a fuzzy-set qualitative comparative analysis (fsQCA), which is a set-theoretic configurational method to investigate the systemic and holistic interdependencies among key outsourcing capabilities that produce high outsourcing performance. On the basis of the conceptual framework and empirical findings, we present four viable propositions to build configurations of client and vendor ITO capabilities that can achieve ITO success with theoretical and practical implications.

尽管信息技术外包(ITO)的广泛扩散,由于客户或其供应商缺乏适当的外包能力,公司经常获得不满意的外包结果。ITO客户通过建立自己的外包能力以及与有能力的供应商签订合同来满足其战略需求,从而努力提高外包绩效。因此,为了ITO项目的成功,必须找到双方互补的外包能力的有效组合。然而,如何识别和开发客户和供应商的一组适当的外包能力的知识还有待开发。本研究旨在通过从双边角度阐述外包能力的配置机制来填补这一知识空白,该机制解释了多种类型的客户和供应商外包能力如何同时组合成配置以产生高ITO绩效。首先,基于ITO文献,我们开发了一个概念性框架,该框架确定了三种关键类型的外包能力。然后,使用从客户及其供应商收集的匹配数据集,我们进行模糊集定性比较分析(fsQCA),这是一种集合论配置方法,用于调查产生高外包绩效的关键外包能力之间的系统和整体相互依赖关系。在概念框架和实证研究结果的基础上,我们提出了四个可行的建议,以构建客户和供应商ITO能力的配置,这些配置可以在理论和实践上实现ITO的成功。
{"title":"Congruent patterns of outsourcing capabilities: A bilateral perspective","authors":"Yunmo Koo ,&nbsp;YoungKi Park ,&nbsp;Juyeon Ham ,&nbsp;Jae-Nam Lee","doi":"10.1016/j.jsis.2019.101580","DOIUrl":"10.1016/j.jsis.2019.101580","url":null,"abstract":"<div><p>Despite the extensive proliferation of Information Technology Outsourcing (ITO), firms often obtain unsatisfactory outsourcing outcomes due to the lack of appropriate outsourcing capabilities of a client or their vendor. ITO clients strive to enhance outsourcing performance by establishing their own outsourcing capabilities as well as contracting with capable vendors to meet their strategic needs. Thus, for the success of an ITO project, it is imperative to find an effective combination of complementary outsourcing capabilities on both sides. However, knowledge of how to identify and develop a set of appropriate outsourcing capabilities of both client and vendor has yet to be developed. This study aims to fill this knowledge gap by elaborating on the configurational mechanisms of outsourcing capabilities from a bilateral perspective, which explicate how multiple types of client and vendor outsourcing capabilities combine into configurations simultaneously to produce high ITO performance. First, based on the ITO literature, we develop a conceptual framework that identifies three key types of outsourcing capabilities. Then, with the matched dataset collected from a client and their vendor, we conduct a fuzzy-set qualitative comparative analysis (fsQCA), which is a set-theoretic configurational method to investigate the systemic and holistic interdependencies among key outsourcing capabilities that produce high outsourcing performance. On the basis of the conceptual framework and empirical findings, we present four viable propositions to build configurations of client and vendor ITO capabilities that can achieve ITO success with theoretical and practical implications.</p></div>","PeriodicalId":50037,"journal":{"name":"Journal of Strategic Information Systems","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jsis.2019.101580","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128348869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Reappraising maturity models in e-Government research: The trajectory-turning point theory 电子政务研究中的成熟度模型再评价:轨迹拐点理论
IF 7 2区 管理学 Q1 Computer Science Pub Date : 2019-09-01 DOI: 10.1016/j.jsis.2019.02.001
Federico Iannacci , Aline Pietrix Seepma , Carolien de Blok , Andrea Resca

Drawing on the notion of alignment, this paper endeavors to reappraise e-Government maturity models in the English system of criminal justice. It argues that e-Government maturity models are characterized by relatively-stable trajectories which are punctuated by radical shifts toward full-blown e-Government transformation. Far from being a prescriptive and linear process, e-Government maturity is an unpredictable process where turning points (or radical shifts) play a crucial role in the e-Government strategizing process. Theoretical and practical implications are discussed by developing a new theory of e-Government maturity that explains the twists and turns of e-Government strategizing.

本文借鉴对齐的概念,试图重新评价英国刑事司法系统中的电子政务成熟度模型。本文认为,电子政务成熟度模型的特点是相对稳定的轨迹,并被向全面电子政务转型的激进转变所打断。电子政务的成熟远非一个规定性的线性过程,而是一个不可预测的过程,其中转折点(或激进转变)在电子政务战略制定过程中起着至关重要的作用。通过发展一种新的电子政务成熟度理论来解释电子政务战略的曲折,讨论了理论和实践意义。
{"title":"Reappraising maturity models in e-Government research: The trajectory-turning point theory","authors":"Federico Iannacci ,&nbsp;Aline Pietrix Seepma ,&nbsp;Carolien de Blok ,&nbsp;Andrea Resca","doi":"10.1016/j.jsis.2019.02.001","DOIUrl":"10.1016/j.jsis.2019.02.001","url":null,"abstract":"<div><p>Drawing on the notion of alignment, this paper endeavors to reappraise e-Government maturity models in the English system of criminal justice. It argues that e-Government maturity models are characterized by relatively-stable trajectories which are punctuated by radical shifts toward full-blown e-Government transformation. Far from being a prescriptive and linear process, e-Government maturity is an unpredictable process where turning points (or radical shifts) play a crucial role in the e-Government strategizing process. Theoretical and practical implications are discussed by developing a new theory of e-Government maturity that explains the twists and turns of e-Government strategizing.</p></div>","PeriodicalId":50037,"journal":{"name":"Journal of Strategic Information Systems","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jsis.2019.02.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130784203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Enterprise reputation threats on social media: A case of data breach framing 社交媒体上的企业声誉威胁:数据泄露框架案例
IF 7 2区 管理学 Q1 Computer Science Pub Date : 2019-09-01 DOI: 10.1016/j.jsis.2018.12.001
Romilla Syed

Reputation threats on social media in the aftermath of a data breach is a critical concern to enterprises. We argue that any effort to minimize reputation threats will require an orderly assessment of how reputation threat manifests on social media. Drawing on crisis communication and social media literature, we analyze Twitter postings related to the 2014 Home Depot data breach. We identify a taxonomy of data breach frames and sub-frames and the related reputation threats as manifested by data breach responsibility-attributions and negative emotional responses. Results indicate that reputation threats vary for intentional, accidental, and victim data breach frames. Based on crisis stage theory, we also analyze the dynamics of evolving reputation threats as data breach situation unfolds on social media. Results suggest that the data breach frames and associated reputation threats vary across the crisis stages. Further, intentional and accidental frames increase subsequent responsibility-attributions and negative emotions. Tweets with responsibility-attributions further increase the subsequent generation of reputation-threatening tweets. Negative emotions, particularly anger and disgust, also increase subsequent reputation threats. Our study has implications for enterprise reputation management and word-of-mouth literature. The results yield valuable insights that can guide enterprise strategy for social media reputation management and post data breach intervention.

在数据泄露之后,社交媒体上的声誉威胁是企业的一个关键问题。我们认为,任何将声誉威胁最小化的努力都需要有序地评估声誉威胁在社交媒体上的表现。根据危机沟通和社交媒体文献,我们分析了与2014年家得宝数据泄露相关的Twitter帖子。我们确定了数据泄露框架和子框架的分类,以及通过数据泄露责任归因和负面情绪反应表现出来的相关声誉威胁。结果表明,声誉威胁因故意、意外和受害者数据泄露框架而异。基于危机阶段理论,我们还分析了随着社交媒体数据泄露事件的发展,声誉威胁的演变动态。结果表明,在不同的危机阶段,数据泄露框架和相关的声誉威胁各不相同。此外,有意框架和意外框架增加了后续的责任归因和负面情绪。带有责任归因的推文进一步增加了后续产生的威胁声誉的推文。负面情绪,尤其是愤怒和厌恶,也会增加随后的声誉威胁。本研究对企业声誉管理和口碑文学具有启示意义。结果产生了有价值的见解,可以指导企业的社交媒体声誉管理和后数据泄露干预战略。
{"title":"Enterprise reputation threats on social media: A case of data breach framing","authors":"Romilla Syed","doi":"10.1016/j.jsis.2018.12.001","DOIUrl":"https://doi.org/10.1016/j.jsis.2018.12.001","url":null,"abstract":"<div><p>Reputation threats on social media in the aftermath of a data breach is a critical concern to enterprises. We argue that any effort to minimize reputation threats will require an orderly assessment of how reputation threat manifests on social media. Drawing on crisis communication and social media literature, we analyze Twitter postings related to the 2014 Home Depot data breach. We identify a taxonomy of data breach frames and sub-frames and the related reputation threats as manifested by data breach responsibility-attributions and negative emotional responses. Results indicate that reputation threats vary for intentional, accidental, and victim data breach frames. Based on crisis stage theory, we also analyze the dynamics of evolving reputation threats as data breach situation unfolds on social media. Results suggest that the data breach frames and associated reputation threats vary across the crisis stages. Further, intentional and accidental frames increase subsequent responsibility-attributions and negative emotions. Tweets with responsibility-attributions further increase the subsequent generation of reputation-threatening tweets. Negative emotions, particularly anger and disgust, also increase subsequent reputation threats. Our study has implications for enterprise reputation management and word-of-mouth literature. The results yield valuable insights that can guide enterprise strategy for social media reputation management and post data breach intervention.</p></div>","PeriodicalId":50037,"journal":{"name":"Journal of Strategic Information Systems","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jsis.2018.12.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90012173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Exploring complexity and contradiction in information technology outsourcing: A set-theoretical approach 信息技术外包的复杂性与矛盾性探析:一个集合理论的视角
IF 7 2区 管理学 Q1 Computer Science Pub Date : 2019-09-01 DOI: 10.1016/j.jsis.2019.07.001
Quang Neo Bui , Ezekiel Leo , Olayele Adelakun

Effectively managing Information Technology outsourcing (ITO) requires integration of conceptually distinct and sometimes contradicting factors. For instance, ITO “best practices” for cost reduction can inhibit a firm’s innovativeness. To address these challenges, we build on governance and capability perspectives and employ a set-theoretic approach to examine ITO practices in 27 firms. Our exploratory study reveals four distinct ITO configurations, of which three lead to positive outcomes and one leads to negated-outcomes. Detailed contracts appear to be a necessary condition for cost reduction but can also be an impediment to strategic innovation; and firms can consider a “best-of-breed” strategy to overcome this tension. Our findings call for more attention to both transaction-based and portfolio-based governance to enable flexibility for innovation while retaining rigor and risk mitigation for cost reduction.

有效地管理信息技术外包(ITO)需要集成概念上不同的、有时相互矛盾的因素。例如,ITO降低成本的“最佳实践”可能会抑制公司的创新。为了应对这些挑战,我们从治理和能力的角度出发,采用集合论的方法来研究27家公司的ITO实践。我们的探索性研究揭示了四种不同的ITO配置,其中三种导致积极结果,一种导致消极结果。详细的合同似乎是降低成本的必要条件,但也可能成为战略创新的障碍;公司可以考虑采用“同类最佳”策略来克服这种紧张关系。我们的研究结果呼吁更多地关注基于交易和基于投资组合的治理,以实现创新的灵活性,同时保持严谨性和降低风险以降低成本。
{"title":"Exploring complexity and contradiction in information technology outsourcing: A set-theoretical approach","authors":"Quang Neo Bui ,&nbsp;Ezekiel Leo ,&nbsp;Olayele Adelakun","doi":"10.1016/j.jsis.2019.07.001","DOIUrl":"https://doi.org/10.1016/j.jsis.2019.07.001","url":null,"abstract":"<div><p><span><span>Effectively managing Information Technology outsourcing (ITO) requires integration of conceptually distinct and sometimes contradicting factors. For instance, ITO “best practices” for cost reduction can inhibit a firm’s innovativeness. To address these challenges, we build on governance and capability perspectives and employ a set-theoretic approach to examine ITO practices in 27 firms. Our </span>exploratory study reveals four distinct ITO configurations, of which three lead to positive outcomes and one leads to negated-outcomes. Detailed contracts appear to be a </span><em>necessary</em><span> condition for cost reduction but can also be an impediment to strategic innovation; and firms can consider a “best-of-breed” strategy to overcome this tension. Our findings call for more attention to both transaction-based and portfolio-based governance to enable flexibility for innovation while retaining rigor and risk mitigation for cost reduction.</span></p></div>","PeriodicalId":50037,"journal":{"name":"Journal of Strategic Information Systems","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jsis.2019.07.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91669874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A comprehensive framework to research digital innovation: The joint use of the systems of innovation and critical realism 研究数字创新的综合框架:创新系统与批判现实主义的联合使用
IF 7 2区 管理学 Q1 Computer Science Pub Date : 2019-09-01 DOI: 10.1016/j.jsis.2019.06.001
Arturo Vega , Mike Chiasson

This study addresses calls to expand the boundaries of digital innovation research at multiple levels of society to comprehensively study the structure and evolution of innovation processes and outcomes. We contribute by proposing a framework composed of systems of innovation (SIs)1 as an alternative and holistic conceptual base and unit of analysis, which accounts for the interconnected components located beyond the organizational microenvironments that ultimately affect innovation in organizations. Given the compatibility of SIs and the ontology of critical realism (CR)2 as well as some flaws in SI research practice, we also use critical realist research approaches to guide the study of the state and transformation of SIs. We further explain the joint use of SIs and CR by applying them to the area of information systems innovation diffusion.

本研究呼吁扩大社会多层次数字创新研究的边界,全面研究创新过程和成果的结构和演变。我们提出了一个由创新系统(si)1组成的框架,作为替代的整体概念基础和分析单元,它解释了位于组织微环境之外的相互关联的组件,这些组件最终影响组织的创新。鉴于社会科学与批判现实主义(cr2)本体的兼容性,以及社会科学研究实践中存在的一些缺陷,我们也采用批判现实主义的研究方法来指导社会科学的状态和转化研究。我们通过将SIs和CR应用于信息系统创新扩散领域,进一步解释了它们的联合使用。
{"title":"A comprehensive framework to research digital innovation: The joint use of the systems of innovation and critical realism","authors":"Arturo Vega ,&nbsp;Mike Chiasson","doi":"10.1016/j.jsis.2019.06.001","DOIUrl":"https://doi.org/10.1016/j.jsis.2019.06.001","url":null,"abstract":"<div><p>This study addresses calls to expand the boundaries of digital innovation research at multiple levels of society to comprehensively study the structure and evolution of innovation processes and outcomes. We contribute by proposing a framework composed of systems of innovation (SIs)<span><sup>1</sup></span> as an alternative and holistic conceptual base and unit of analysis, which accounts for the interconnected components located beyond the organizational microenvironments that ultimately affect innovation in organizations. Given the compatibility of SIs and the ontology of critical realism (CR)<span><sup>2</sup></span><span> as well as some flaws in SI research practice, we also use critical realist research approaches to guide the study of the state and transformation of SIs. We further explain the joint use of SIs and CR by applying them to the area of information systems innovation diffusion.</span></p></div>","PeriodicalId":50037,"journal":{"name":"Journal of Strategic Information Systems","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jsis.2019.06.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91669875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
How employees gain meta-knowledge using enterprise social networks: A validation and extension of communication visibility theory 员工如何利用企业社交网络获得元知识:沟通可见性理论的验证与延伸
IF 7 2区 管理学 Q1 Computer Science Pub Date : 2019-09-01 DOI: 10.1016/j.jsis.2019.04.001
Adrian Engelbrecht, Jin P. Gerlach, Alexander Benlian, Peter Buxmann

Employees’ knowledge about their coworkers’ knowledge (i.e., meta-knowledge) is central for organizations to create competitive advantages. According to Communication Visibility Theory, enterprise social networks (ESNs) have the potential to foster long-term formation of meta-knowledge. However, research about this potential is still limited. Using a quantitative study, we improve the understanding of how ESNs facilitate the development of meta-knowledge in three ways: we (1) show that the creation of meta-knowledge through ESNs works across contexts, (2) find that ESNs can lead to rather immediate increases in meta-knowledge, and (3) reveal that managers can gain more meta-knowledge using ESNs than can non-managers.

员工对同事知识的了解(即元知识)是组织创造竞争优势的核心。根据沟通可见性理论,企业社交网络(ESNs)具有促进元知识长期形成的潜力。然而,关于这种潜力的研究仍然有限。通过定量研究,我们从三个方面提高了对esn如何促进元知识发展的理解:我们(1)表明,通过esn创建元知识可以跨环境工作;(2)发现esn可以导致元知识的相当直接的增加;(3)揭示管理者可以通过esn获得比非管理者更多的元知识。
{"title":"How employees gain meta-knowledge using enterprise social networks: A validation and extension of communication visibility theory","authors":"Adrian Engelbrecht,&nbsp;Jin P. Gerlach,&nbsp;Alexander Benlian,&nbsp;Peter Buxmann","doi":"10.1016/j.jsis.2019.04.001","DOIUrl":"10.1016/j.jsis.2019.04.001","url":null,"abstract":"<div><p>Employees’ knowledge about their coworkers’ knowledge (i.e., meta-knowledge) is central for organizations to create competitive advantages. According to Communication Visibility Theory, enterprise social networks (ESNs) have the potential to foster long-term formation of meta-knowledge. However, research about this potential is still limited. Using a quantitative study, we improve the understanding of how ESNs facilitate the development of meta-knowledge in three ways: we (1) show that the creation of meta-knowledge through ESNs works across contexts, (2) find that ESNs can lead to rather immediate increases in meta-knowledge, and (3) reveal that managers can gain more meta-knowledge using ESNs than can non-managers.</p></div>","PeriodicalId":50037,"journal":{"name":"Journal of Strategic Information Systems","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jsis.2019.04.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125939478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Crowdwork platform governance toward organizational value creation 面向组织价值创造的众筹平台治理
IF 7 2区 管理学 Q1 Computer Science Pub Date : 2019-06-01 DOI: 10.1016/j.jsis.2019.01.001
Elham Shafiei Gol, Mari-Klara Stein, Michel Avital

Crowdwork, a new form of digitally mediated employment and part of the so-called gig economy, has the capacity to change the nature of work organization and to provide strategic value to workers, job providers, and intermediary platform owners. However, because crowdwork is temporary, large-scale, distributed, and mediated, its governance remains a challenge that often casts a shadow over its strategic value. The objective of this paper is to shed light on the making of value-adding crowdwork arrangements. Specifically, the paper explores crowdwork platform governance mechanisms and the relationships between these mechanisms and organizational value creation. Building on a comprehensive review of the extant literature on governance and crowdwork, we construct an overarching conceptual model that integrates control system and coordination system as two complementary mechanisms that drive crowdwork platform governance effectiveness and the consequent job provider benefits. Furthermore, the model accentuates the role of the degree of centralization and the degree of routinization as critical moderators in crowdwork platform governance. Overall, the paper highlights the potential of crowdwork to contribute not only to inclusion, fair wages and flexible work arrangements for workers but also to organizations’ value and competitive edge.

众工是数字中介就业的一种新形式,也是所谓的零工经济的一部分,它有能力改变工作组织的性质,并为工人、工作提供者和中介平台所有者提供战略价值。然而,由于众筹是临时性的、大规模的、分布式的和中介的,它的治理仍然是一个挑战,经常给它的战略价值蒙上阴影。本文的目的是为增值的众包安排的制定提供启示。具体而言,本文探讨了众筹平台的治理机制以及这些机制与组织价值创造的关系。在对现有治理和众工文献进行全面回顾的基础上,我们构建了一个总体概念模型,该模型将控制系统和协调系统整合为驱动众工平台治理有效性和由此产生的就业提供者利益的两种互补机制。此外,该模型强调了集中化程度和常规化程度在众包平台治理中的关键调节作用。总体而言,本文强调了众包的潜力,它不仅有助于工人的包容性、公平的工资和灵活的工作安排,还有助于组织的价值和竞争优势。
{"title":"Crowdwork platform governance toward organizational value creation","authors":"Elham Shafiei Gol,&nbsp;Mari-Klara Stein,&nbsp;Michel Avital","doi":"10.1016/j.jsis.2019.01.001","DOIUrl":"10.1016/j.jsis.2019.01.001","url":null,"abstract":"<div><p>Crowdwork, a new form of digitally mediated employment and part of the so-called gig economy, has the capacity to change the nature of work organization and to provide strategic value to workers, job providers, and intermediary platform owners. However, because crowdwork is temporary, large-scale, distributed, and mediated, its governance remains a challenge that often casts a shadow over its strategic value. The objective of this paper is to shed light on the making of value-adding crowdwork arrangements. Specifically, the paper explores crowdwork platform governance mechanisms and the relationships between these mechanisms and organizational value creation. Building on a comprehensive review of the extant literature on governance and crowdwork, we construct an overarching conceptual model that integrates control system and coordination system as two complementary mechanisms that drive crowdwork platform governance effectiveness and the consequent job provider benefits. Furthermore, the model accentuates the role of the degree of centralization and the degree of routinization as critical moderators in crowdwork platform governance. Overall, the paper highlights the potential of crowdwork to contribute not only to inclusion, fair wages and flexible work arrangements for workers but also to organizations’ value and competitive edge.</p></div>","PeriodicalId":50037,"journal":{"name":"Journal of Strategic Information Systems","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jsis.2019.01.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114590300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
A review of the practical relevance of IS strategy scholarly research 回顾IS战略学术研究的实际意义
IF 7 2区 管理学 Q1 Computer Science Pub Date : 2019-06-01 DOI: 10.1016/j.jsis.2018.12.003
Mohammad Moeini , Yasser Rahrovani , Yolande E. Chan

While studies suggest that IS strategy is an important topic for practitioners, in-depth explorations of the potential practical relevance of this research area are lacking. In this paper, we develop a multidimensional framework of potential practical relevance and use it to conduct a multimethod descriptive review of 109 IS strategy papers published over the past 10 years in top IS journals. The framework contributes to the IS literature by synthesizing various characteristics that make a research project conducive to being practically relevant. The review highlights how IS strategy research has offered the potential for practical relevance in the past and recommends opportunities to increase this, especially in the digitalization era.

虽然研究表明IS战略是从业者的一个重要话题,但缺乏对该研究领域潜在实际相关性的深入探索。在本文中,我们开发了一个具有潜在实际意义的多维框架,并使用它对过去10年 在顶级IS期刊上发表的109篇IS战略论文进行了多方法描述性综述。该框架通过综合使研究项目有利于实际相关的各种特征,为信息系统文献做出贡献。该评估强调了过去IS战略研究如何提供实际相关性的潜力,并建议了增加这种潜力的机会,特别是在数字化时代。
{"title":"A review of the practical relevance of IS strategy scholarly research","authors":"Mohammad Moeini ,&nbsp;Yasser Rahrovani ,&nbsp;Yolande E. Chan","doi":"10.1016/j.jsis.2018.12.003","DOIUrl":"10.1016/j.jsis.2018.12.003","url":null,"abstract":"<div><p>While studies suggest that IS strategy is an important topic for practitioners, in-depth explorations of the potential practical relevance of this research area are lacking. In this paper, we develop a multidimensional framework of potential practical relevance and use it to conduct a multimethod descriptive review of 109 IS strategy papers published over the past 10 years in top IS journals. The framework contributes to the IS literature by synthesizing various characteristics that make a research project conducive to being practically relevant. The review highlights how IS strategy research has offered the potential for practical relevance in the past and recommends opportunities to increase this, especially in the digitalization era.</p></div>","PeriodicalId":50037,"journal":{"name":"Journal of Strategic Information Systems","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jsis.2018.12.003","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133832101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
A review of the ICT-enabled development literature: Towards a power parity theory of ICT4D 信息通信技术发展文献综述:关于信息通信技术发展的功率宇称理论
IF 7 2区 管理学 Q1 Computer Science Pub Date : 2019-06-01 DOI: 10.1016/j.jsis.2019.01.002
Wallace Chipidza , Dorothy Leidner

ICT projects are considered an important means of achieving development goals in developing countries. Although voluminous, the research to date is inconsistent in theorizing how, or why, development outcomes do or do not occur following the introduction of ICT4D. To better understand how and why ICT projects succeed, and even what success means in the ICT4D context, we conducted a literature review of ICT4D studies published during the period 2000–2016. We find that the very meaning of development varies, with four meanings of development emerging from the literature: (1) development as increased freedom, (2) development as expanded inclusion, (3) development as increased economic productivity, and (4) development as improved well-being. An ICT might succeed according to one meaning of development while simultaneously hindering achievement according to another meaning. As revealed by our analysis of the literature, these four perspectives suffer from some limitations, not least among them being the imposition of colonialist views of development on the recipients of the ICT4D. To address the limitations, we employ postcolonial theory to derive a new theory of ICT4D in which development is defined as an increase in power parity between dominant stakeholders and intended beneficiaries.

信通技术项目被认为是实现发展中国家发展目标的重要手段。虽然数量庞大,但迄今为止的研究在理论上是不一致的,在引入ICT4D后,开发结果是如何发生的,或者为什么会发生。为了更好地理解ICT项目如何以及为什么成功,甚至在ICT4D背景下成功意味着什么,我们对2000-2016年期间发表的ICT4D研究进行了文献综述。我们发现发展的含义各不相同,文献中出现了四种发展含义:(1)发展是指增加的自由,(2)发展是指扩大的包容性,(3)发展是指提高的经济生产力,(4)发展是指改善的福祉。信息和通信技术可能根据发展的一种意义取得成功,同时阻碍根据另一种意义取得成就。正如我们对文献的分析所揭示的那样,这四种观点受到一些限制,其中最重要的是将殖民主义的发展观点强加给ict的接受者。为了解决这些局限性,我们采用后殖民理论推导出一种新的ICT4D理论,其中发展被定义为占主导地位的利益相关者和预期受益者之间权力平等的增加。
{"title":"A review of the ICT-enabled development literature: Towards a power parity theory of ICT4D","authors":"Wallace Chipidza ,&nbsp;Dorothy Leidner","doi":"10.1016/j.jsis.2019.01.002","DOIUrl":"10.1016/j.jsis.2019.01.002","url":null,"abstract":"<div><p>ICT projects are considered an important means of achieving development goals in developing countries. Although voluminous, the research to date is inconsistent in theorizing how, or why, development outcomes do or do not occur following the introduction of ICT4D. To better understand how and why ICT projects succeed, and even what success means in the ICT4D context, we conducted a literature review of ICT4D studies published during the period 2000–2016. We find that the very meaning of development varies, with four meanings of development emerging from the literature: (1) development as increased freedom, (2) development as expanded inclusion, (3) development as increased economic productivity, and (4) development as improved well-being. An ICT might succeed according to one meaning of development while simultaneously hindering achievement according to another meaning. As revealed by our analysis of the literature, these four perspectives suffer from some limitations, not least among them being the imposition of colonialist views of development on the recipients of the ICT4D. To address the limitations, we employ postcolonial theory to derive a new theory of ICT4D in which development is defined as an increase in power parity between dominant stakeholders and intended beneficiaries.</p></div>","PeriodicalId":50037,"journal":{"name":"Journal of Strategic Information Systems","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jsis.2019.01.002","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125219567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
Information technology and the search for organizational agility: A systematic review with future research possibilities 信息技术和对组织敏捷性的探索:对未来研究可能性的系统回顾
IF 7 2区 管理学 Q1 Computer Science Pub Date : 2019-06-01 DOI: 10.1016/j.jsis.2018.12.002
Paul P. Tallon , Magno Queiroz , Tim Coltman , Rajeev Sharma

Organizations are increasingly turning to information technology (IT) to help them respond to unanticipated environmental threats and opportunities. In this paper, we introduce a systematic review of the literature on IT-enabled agility, helping to establish the boundary between what we know and what we don’t know. We base our review on a wide body of literature drawn from the AIS Basket of Eight IT journals, a cross-section of non-Basket journals, IT practitioner outlets, and premier international IS conferences. We review the use of different theoretical lenses used to investigate the relationship between IT and organizational agility and how the literature has conceptualized agility, its antecedents, and consequences. We also map the evolution of the literature through a series of stages that highlight how researchers have built on previous work. Lastly, we discuss opportunities for future research in an effort to close important gaps in our understanding.

组织越来越多地转向信息技术(IT)来帮助他们应对未预料到的环境威胁和机遇。在本文中,我们介绍了关于it支持的敏捷性的文献的系统回顾,帮助建立我们知道的和我们不知道的之间的边界。我们的评论基于广泛的文献,这些文献来自AIS八种IT期刊,非篮子期刊的横截面,IT从业者网点和主要的国际信息系统会议。我们回顾了用于研究IT和组织敏捷性之间关系的不同理论镜头的使用,以及文献如何概念化敏捷性、其前因和后果。我们还通过一系列阶段描绘了文献的演变,这些阶段突出了研究人员如何建立在以前的工作基础上。最后,我们讨论了未来研究的机会,以努力弥合我们理解中的重要差距。
{"title":"Information technology and the search for organizational agility: A systematic review with future research possibilities","authors":"Paul P. Tallon ,&nbsp;Magno Queiroz ,&nbsp;Tim Coltman ,&nbsp;Rajeev Sharma","doi":"10.1016/j.jsis.2018.12.002","DOIUrl":"10.1016/j.jsis.2018.12.002","url":null,"abstract":"<div><p>Organizations are increasingly turning to information technology (IT) to help them respond to unanticipated environmental threats and opportunities. In this paper, we introduce a systematic review of the literature on IT-enabled agility, helping to establish the boundary between what we know and what we don’t know. We base our review on a wide body of literature drawn from the AIS Basket of Eight IT journals, a cross-section of non-Basket journals, IT practitioner outlets, and premier international IS conferences. We review the use of different theoretical lenses used to investigate the relationship between IT and organizational agility and how the literature has conceptualized agility, its antecedents, and consequences. We also map the evolution of the literature through a series of stages that highlight how researchers have built on previous work. Lastly, we discuss opportunities for future research in an effort to close important gaps in our understanding.</p></div>","PeriodicalId":50037,"journal":{"name":"Journal of Strategic Information Systems","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jsis.2018.12.002","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114812862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 206
期刊
Journal of Strategic Information Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1