Forthcoming papers have been accepted for publication at the Communications of the Association for Information Systems and are listed below in order of acceptance date. Copies of unedited manuscripts can be obtained by contacting the corresponding authors listed below.
Note that the decision to provide a copy rests with the authors, not with the Communications of the Association for Information Systems.
The manuscripts listed here will undergo copyediting, typesetting, and review of the resulting proofs before they are published in their final form. During the production process errors may be discovered, which could affect the content. All legal disclaimers that apply to the Communications of the Association for Information Systems pertain. For a definitive version of the works listed here, please check for their appearance online at http://aisel.aisnet.org/cais/.
The Appreciative System, Learning And Its Impact Upon IS Design
Stowell, Frank (email@example.com); Cooray, Shavindrie
Researchers and practitioners are aware of the failures of information system (IS) provision many pointing to the link between failure and flawed Information Requirements Definition (IRD). Misinformation arises from defective communication between clients and analysts and can lead to situations where the actual requirements of clients are not identified and properly represented in the subsequent IS. Recent research suggests that this might be because methods of inquiry are lacking in learning theory. Methods employed focus instead upon contextual factors affecting client learning. In this paper we explore the underpinning ideas of client driven requirements definition and attempt to find a way of “navigating” the gap between what the client wants and what the technical expert can provide. The approach described stimulates client learning, which we suggest is a fundamental component of a successful outcome. We propose a method of requirements analysis that has shown its value in helping to overcome the communication gap between client and developer and create a collaborative learning environment. The lessons learnt from this research may provide an interface for other IT driven development methods
Enterprise Architecture Management: Toward a Taxonomy of Applications
Rahimi, Fatemeh (firstname.lastname@example.org); Gøtze, Joh; Møller, Charles
Despite the growing interest in enterprise architecture management, researchers and practitioners lack a shared understanding of its applications in organizations. Building on findings from a literature review and eight case studies, we develop a taxonomy that categorizes applications of enterprise architecture management based on three classes of enterprise architecture scope. Organizations may adopt enterprise architecture management to support IT strategy formation, planning and implementation; facilitate business strategy planning and implementation; or further complement the business strategy formation process. The findings challenge the traditional IT-centric view of enterprise architecture management application and suggest enterprise architecture management as an approach that could support consistent design and evolution of an organization as a whole.
Connectivity and Continuity: New Fronts in the Platform War – A Panel Report
Perez, Jorge (email@example.com); Murray, Meg; Fluker, Joy; Fluker, Demetrius
Device interconnectivity in video conferencing, telephony, texting, file-sharing and application handoff has become a critical battleground for tech giants. This panel compared approaches to device connectivity and application continuity, reviewed current solutions and shared projections for the future of connectivity. Apple, Microsoft and Google are predictably focusing on connectivity across devices and applications rather than across platforms. Given the scope of impact of these innovations, tech giants will be under increasing pressure to architect a world wherein devices and platforms are secondary to what users want to achieve via technology. Participants examined competing approaches to connectivity and continuity, explored emergent issues for research and practice, and discussed the social and business impacts of these technologies.
The Use of Psycho-Physiological Interaction Analysis with fMRI-Data in IS Research – A Guideline
Hubert, Marco (firstname.lastname@example.org); Linzmajer, Marc; Riedl, René; Hubert, Mirja; Kenning, Peter; Weber, Bernd
The integration of neuroscientific methods in Information Systems (IS) research to better understand how the brain interacts with IS-relevant context has gained in importance. There already exist articles that highlight the potential of NeuroIS and that started to discuss methodological issues associated with the use of functional brain imaging. NeuroIS researchers, however, have to keep in mind that the implementation of mental processes in the brain is often based on activity in a network of different brain areas, and not on activity in one single area. Against this background, in the present article we introduce psycho-physiological interaction (PPI) analysis, a technique which can be used to analyze fMRI data. Specifically, we give an overview of how PPI analysis can be conducted, provide a concrete research example, and show how this analysis can inform IS trust research. Thus, the objective of this paper is to introduce NeuroIS researchers working in the domain of functional brain imaging to advanced fMRI analyses methods, and to show, based on the example of trust, how this could enhance the understanding of the nature of IS constructs.
The Role of User Psychological Contracts in the Sustainability of Social Networks
Mamonov, Stanislav (email@example.com); Koufaris, Marios; Benbunan-Fich, Raquel
Many emergent ventures, such as social networks, leverage crowd-sourced information assets as essential pillars supporting their business models. The appropriation of rights to information assets through legal contracts often fails to prevent conflicts between the users and the companies claiming information rights. In this paper, we focus on social networks and we examine why those conflicts arise and what their consequences are by drawing on psychological contract theory. We propose that intellectual property and privacy expectancies comprise core domains of psychological contracts between social networks and their users. In turn, perceived breaches of those expectancies trigger a psychological contract violation. We use the exit, voice, loyalty and neglect typology to define the user behavioral outcomes. We evaluate our framework by surveying 598 Facebook users. The data support our framework and indicate that perceived breaches of privacy and intellectual property rights generate the affective experience of a psychological contract violation, which is strongly associated with exit intentions.
Explaining the Challenges in ERP Development Networks with Triggers, Root Causes, and Consequences
Kähkönen, Tommi (firstname.lastname@example.org); Alanne, Aki; Pekkola, Samuli; Smolander, Kari
The implementation of an enterprise resource planning (ERP) system is still painful for organizations. Although ERP projects are collaborative efforts conducted by many separate organizations, academic research has not investigated ERPs fully from this perspective. To identify the challenges in ERP development networks (EDNs), we carried out an interpretive empirical study by using grounded theory as the means of data analysis. After identifying 10 EDN challenges and analyzing the associations between the challenges further, we constructed a model that explains the challenges in ERP development networks. Relationship conflicts (root causes) create or reinforce one or more operational problems (consequences). Changing the EDN structure is a trigger that initiates or reinforces the other two types. Whereas the existing literature has discussed ERP challenges mainly separately, we offer a more profound explanation of how they emerge and interrelate. Our findings aid practitioners in recognizing and focusing on the root causes of challenges rather than firefighting consequences. The findings can provide useful insights into collaborative and dynamic environments where multiple organizations interact.
Noise or Quality? Cross-Nested Hierarchical Effects of Culture on Online Ratings
Mattson, Thomas (email@example.com)
Previous feedback system research in a variety of contexts focuses on the impact that ratings (as proxies for quality) have on a variety of social and economic outcomes with equivocal findings. These mixed findings may be partially due to noise (factors not related to quality) embedded in aggregated or average positive and negative ratings. One significant source of ratings noise may come from culturally diverse raters issuing ratings in virtual environments. Culture impacts how groups of individuals are socialized to behave and think, which may result in having different attitudes towards publicly downgrading (negative ratings) or praising (positive ratings) other members in the feedback system. This paper investigates how culture impacts rating practices specifically within public electronic knowledge sharing communities. Using a cross-nested hierarchical linear model, this paper empirically demonstrates that cultural differences at the community, occupation, and national levels interact in unique ways to increase or decrease the propensity to give and receive a positive or a negative rating. This study contributes to the literature on rating systems along with having practical ramifications for the designers of feedback systems.
Applying a Layered Framework to Disaster Recovery
Baham, Corey (firstname.lastname@example.org); Calderon, Andres; Hirschheim, Rudy
The imperative of building highly available information technology (IT) infrastructures has become critical to the survival f or many corporations. However, the disaster recovery (DR) industry lacks a common enterprise framework to capitalize on the value that DR provides corporations. This problem is due in part to inadequate conceptual frameworks for DR that can facilitate the alignment of corporate efforts toward corporate resiliency. To address this problem, our research proposes a new conceptualization for the DR of information systems. We then compare our DR Layers approach to traditional DR thinking. As a result, we demonstrate how our layered framework of enterprise architecture provides a unified understanding of the DR practice, which can then be used to support decision-making and corporate alignment of the DR practice and associated technology. First, we offer a conceptual framework composed of DR Layers that describe the nature of DR and its related components from a functional and technical point of view. Next, we discuss the benefits of these DR Layers to DR teams. Finally, we present a case study, its findings, and their implications for the DR practice.
The Effect of Socialization via Computer-Mediated Communication on the Relationship between Organizational Culture and Organizational Creativity
Scheibe, Kevin P. (email@example.com); Gupta, Manjul
The culture of an organization plays a very strong role in the creation of new knowledge, but as organizations become more dispersed and technologies more advanced, many firms rely on computer-mediated communication (CMC) for employees to engage in all levels of knowledge management. Little has been done to understand the effectiveness of CMC socialization in organizational creativity, particularly in light of organizational culture. Some organizations tend toward a group culture while others lean toward a rational culture. We investigate how each cultural extreme is influenced by both face-to-face (FTF) and CMC socialization on organizational creativity. One hundred and eighty-six knowledge workers were surveyed to investigate these relationships. Organizational culture interacted with socialization such that creativity in rational cultures benefited from the use of CMC for socialization, while group cultures appeared to be agnostic to different types of socialization.
The role of organizational strategy in the user-centered design of mobile applications
Eshet, Eyal (firstname.lastname@example.org); de Reuver, Mark; Bouwman, Harry
Gathering insights on users and their usage context is at the core of the User-Centered Design (UCD) approach. The efficient and effective usage of these insights is strategically important to organizations. With the proliferation of mobile applications, gaining timely and relevant insights is increasingly challenging due to the heterogeneous and dynamic context of use, the abundant availability of information on usage behaviour as well as the intense time constraints imposed by the highly competitive mobile market. This paper develops a research model that considers strategy foci as motivators affecting the efficient and effective usage of insights on users and context. Mediating effects of UCD resources, like time and financial constraints, organizational practices, as well as UCD competences are examined. To test the model a survey was conducted with 100 mobile practitioners and PLS was used to estimate the model. The model shows that focus on an innovation strategy greatly affects data usage on user and their context, directly and indirectly, i.e. mediated by organizational practices and UCD competences. Strategies with a focus on cost have no direct effect on the usage of user insights, but lead to negative impacts on UCD competences and organizational practices.
Cognitive Feedforward and Feedback as Substitutes for Conscientiousness
McCreless, Tamuchin (email@example.com); Goul, Michael; Louis, Robert St.; Warner, Megan
This study explores the impact of feedback, feedforward, and personality on computer-mediated behavior change. The impacts of the effects were studied using subjects who entered information relevant to their diet and exercise into a database through an online tool. Subjects were divided into four experimental groups: those receiving only feedback, those receiving only feedforward, those receiving both feedback and feedforward, and those receiving neither feedback nor feedforward. Results indicate that both feedforward and feedback impact behavior change, but the effect is much greater for individuals ranking low in conscientiousness than for individuals with high conscientiousness. In fact, the magnitude of the effect of feedforward and feedback is very nearly the same as the magnitude of the effect of conscientiousness.
The Light and Dark Side of the Black Box: Sensor-Based Technology in the Automotive Industry
Marco Marabelli (firstname.lastname@example.org) , Marco; Hansen, Sean; Newell, Sue; Frigerio, Chiara
Sensor-based technologies are increasingly integrated into diverse aspects of our everyday lives. Despite the importance of understanding how these technologies are adopted and exploited by businesses and consumers, the information systems (IS) community has thus far devoted relatively little attention to the topic. Accordingly, our objective in this paper is to foster an exploration of the issue amongst IS scholars by focusing on the emergent use of sensor-based technologies in the automotive insurance industry. Insurance providers are increasingly turning to such technologies to gain competitive advantage around risk assessment and behavior-based pricing. To investigate this phenomenon, we consider the experiences of two organizations operating distinct national contexts – Progressive Insurance (US) and Generali (Italy). These two insurance providers have been first movers in the adoption of sensor-based technologies for risk assessment and policy pricing. First, we highlight the key similarities and differences between the cases with regard to the technologies adopted, business models pursued, and anticipated benefits and pitfalls for the companies and their consumers. Second, in a more holistic way we discuss the implications and unintended consequences of sensor-based technologies in the automotive insurance industry. We formulate several research questions that will provide opportunities and encourage more research in this emerging area of study.
Technostress Research: A Nurturing Ground for Measurement Pluralism?
Fischer, Thomas (email@example.com); Riedl, René
Because technostress research is multidisciplinary in nature and therefore benefits from insights gained from various research disciplines, we expected a high degree of measurement pluralism in technostress studies published in the Information Systems (IS) literature. However, because IS research, in general, mostly relies on self-report measures, there is also reason to assume that multi-method research designs have been largely neglected in technostress research. To assess the status quo of technostress research with respect to the application of multi-method approaches, we analyzed 103 empirical studies. Specifically, we analyzed the types of data collection methods used and the investigated components of the technostress process (person, environment, stressors, strains, and coping). The results indicate that multi-method research is more prevalent in the IS technostress literature (approximately 37% of reviewed studies) than in the general IS literature (approximately 20% as reported in previous reviews). However, our findings also show that IS technostress studies significantly rely on self-report measures. We argue that technostress research constitutes a nurturing ground for the application of multi-method approaches and multidisciplinary collaboration.
Towards a Decomposed Expectation-Confirmation Model of IT Continuance: The Role of Usability
Islam, Najmul (firstname.lastname@example.org); Mantymaki, Matti; Bhattacherjee, Anol
We propose a decomposed expectation-confirmation model of IT continuance by (1) decomposing user expectation and confirmation into two dimensions of usefulness and usability, (2) conceptualizing the role of usability in IT continuance research, and (3) exploring changes in user perceptions of usability and usefulness over time and their impacts on user satisfaction and continuance intention. The proposed research model was tested using longitudinal data, collected in two points in time six-months apart, from 125 users of the LinkedIn professional social networking site (pSNS). The results show that (1) user satisfaction with pSNS is determined by perceived usability, usability confirmation, perceived usefulness, and usefulness confirmation, and (2) perceived usability along with satisfaction predict continuance intention whereas perceived usefulness has no effect. This study contributes IT Continuance research by (1) proposing and empirically validating a decomposed model of IT continuance, and (2) by bringing in usability as a core construct of interest for IT continuance research.
Course design based on Enhanced Intercultural Transformation Theory (EITT): Transforming INFORMATION SYSTEMS (IS) students into inventors during academic exchange
Sivakumar, Chitra (email@example.com); Kwok, Ron C.W.
In this paper, we propose the Enhanced Intercultural Transformation Theory (EITT) with additional factors (i.e. support and motivation) as an extension to the existing Intercultural Transformation Theory (ITT). Based on the EITT, we propose a three-phased (i.e. learner, explorer and inventor) framework of an Exchange Experience Assessment (EEA) course with all five EITT factors (i.e. stress, adaptation, growth, support and motivation) interfaced with three stakeholders (i.e. student, patent advisor and instructor). Also, we report the design of the EEA course and its implementation in a University. The collected data confirmed our proposed EITT and EEA course framework that helped transforming Information Systems (IS) students into inventors. We found that students were able to develop patentable inventions through the stress-adaptation-growth process during their academic exchanges, but appropriate support and motivation by the patent advisor and instructor are required. Our findings can enable any interested faculty in any university to attempt offering a similar course for the benefit of budding undergraduate inventors during academic exchange.
Strategic Alignment in SMEs: Strengthening Theoretical Foundations
Street, Chris (firstname.lastname@example.org); Gallupe, R. Brent; Baker, Jeff
Small and Medium-Sized Enterprises (SMEs) are a vital part of the global economy, composing the vast majority of all businesses worldwide. In spite of the importance of these firms, they remain understudied in strategic alignment research. In this paper, we endeavor to consolidate and then extend the IS literature on strategic alignment in SMEs. We develop a set of theoretical propositions that outline the ways in which the unique characteristics of SMEs affect the ability of these firms to achieve and sustain alignment between their IS/IT strategy and their overall business strategy. In some respects, SMEs are able to achieve and sustain alignment as do larger firms, while in other respects they differ noticeably. Each of our propositions is grounded in the dynamic capabilities framework and is intended to strengthen the theoretical foundations of strategic alignment research, particularly in SMEs. We discuss the implications of our propositions and note theoretical issues emerging from the study of strategic alignment in the SME context.
The Linkage between Conferences and Journals in the Information Systems Field: Observations and Recommendations
Zhang, Ping (email@example.com) and Niederman, Fred
The advice younger scholars often receive is to submit work to conferences for feedback and polishing in anticipation of later submission for journal publication. But is this a normal practice? What do the IS scholars really think or do about the linkage between conferences and journals? What are the IS journals’ policies and their editors-in-chief’s views on that linkage? This paper explores aspects of the relationship between conference presentation and journal publication. These include motivations for participating in conferences, potential for subsequent publication, preferred journal targets, and progress of paper development following conference presentation. Data forming the basis for findings and recommendations were drawn from two main sources: (a) a panel study with two sequential surveys of IS scholars who presented papers at three consecutive ICIS (International Conference on Information Systems) meetings (in St. Louis 2010, Shanghai 2011, and Orlando 2012), and (b) an email interview with twenty-one major IS journals’ editors-in-chief in regard to their respective journals’ policies and their personal views. The paper provides recommendations for various stakeholders including scholars, journal editors, conference organizers, and leaders in the field, as well as anyone outside the IS field who wants to understand its norms and culture.
An Exploratory Study on Sustainable ICT Capability in the Travel and Tourism Industry: The Case of a Global Distribution System Provider
Gholami,Roya (firstname.lastname@example.org); Ravishankar, M.N.; Shirazi, Farid; Machetb, Clémentine
Climate change is one of the biggest challenges facing humanity today. Environmental values have spread globally and consumer beliefs are pressurizing firms in almost all industries to comply with green regulations. Sustainability has become such an important part of business strategy that almost every major company now has an executive with “sustainability” in his or her title. The travel and tourism industry produced 14% of global greenhouse gas emissions in 2010. Policy makers have responded with ambitious targets. The European Union aims to achieve a 60% reduction in transport sector emissions by 2050. This exploratory study draws on the Sustainable ICT Capability Maturity Framework (SICT-CMF) and the case of the Amadeus IT Group, a large travel and tourism industry corporate enterprise specializing in IT solutions. The study investigates the current capability maturity level of sustainable ICT within the company. The findings suggest that the company is a market leader in terms of sustainability initiatives, demonstrating an “Advanced” level of sustainability capability. The lessons learned from Amadeus’ experience are discussed.
Commentary: Reflections On Being A Professor-In-Residence
Street, Chris (Chris.Street@uregina.ca)
Deciding what to do during a sabbatical is one of the most exciting times for professors. An opportunity to recharge, renew, and develop professional skills is an important contributor to staying current and relevant in research and in the classroom. This paper describes a Professor-in-Residence (PiR) sabbatical experience that was somewhat non-traditional. Instead of visiting an academic institution a PiR sabbatical involves becoming embedded in a company, in this case in a small software company, and is the flip-side to the Executive-in-Residence concept popular in many business schools. This paper describes the experience and provides suggestions and insight for professors, hosts, and institutions when considering sabbatical options and how to plan for them.
Global Ranking of Management- and Clinical-Centered eHealth Journals
Serenko, Alexander (email@example.com); Dohan, Michael S.; Tan, Joseph
This study presents a ranking list of 35 management- and 28 clinical-centered eHealth academic journals developed based on a survey of 398 active researchers from 46 countries. Journal of the American Medical Informatics Association and Journal of Medical Internet Research were ranked A+ management-centered journals, and BMC Medical Informatics and Decision Making and IEEE Journal of Biomedical and Health Informatics were given A+ standing among clinical-focused journals. Journal longevity (years in-print) was found to have an effect on ranking scores so that longer standing journals have an advantage over their more recent counterparts, but this effect is only moderately significant and does not guarantee a favorable ranking position. This ranking list may be used by various stakeholders to advance the state of the eHealth discipline. There are both similarities and differences between the present ranking and the one developed earlier in 2010.
A Bring-Your-Own-Device Case for Use in the Classroom
Bierstaker, James (firstname.lastname@example.org); Chung, Q B; Lee, Johnny JiungYee; Sipior, Janice
Bring Your Own Device (BYOD) refers to the use of privately owned mobile devices for employment related activities. This paper presents a real-world case study resource for teaching, based on an actual consulting engagement of a global accounting firm, to bring practical experience with managing BYOD into the classroom. Students, working in teams, assumed the role of consultants and defended their recommendations involving the recognition of benefits and challenges in managing BYOD within an organization. Evaluation of the use of the case study in an undergraduate case competition, judged by professionals from five global accounting firms, shows that in general the students agreed that they had a positive learning experience.
Theorizing Information Systems as Evolving Technology
Swanson, E. Burton (email@example.com)
Information systems scholars have struggled with the field’s fundamental relationship to technology. In particular, they have debated whether the IT artifact is unwisely taken for granted and whether or not it lies at the field’s core. Here, applying Brian Arthur’s general theory of technology, it is suggested that IS may itself be theorized as an evolving family of technologies. From this perspective, new avenues for IS research may be opened up, in particular, for historical and other related studies where the unit of analysis is the technology itself and the focus is its evolution.
MSIS 2016: Global Competency Model for Graduate Degree Programs in Information Systems
Topi, Heikki (firstname.lastname@example.org); Karsten, Helena; Brown, Sue A.; Carvalho, João Alvaro; Donnellan, Brian; Shen, Jun; Tan, Bernard C.Y.; Thouin, Mark F.
MSIS 2016 provides a competency model and curriculum guidance for master’s level degree programs in Information Systems (IS). This joint effort by AIS and ACM builds on the foundation of four earlier graduate IS curriculum recommendations, following MSIS 2006 directly. MSIS 2016 is, however, an entirely new document that breaks new ground in several important ways. Instead of a sole focus on courses and the curriculum as a whole, it focuses on graduate competencies and higher level competency structures as its foundational building blocks. It has also been specifically designed for the global IS community by a task force with significant geographic and cultural diversity. In addition, MSIS 2016 explicitly recognizes that business is not the only domain of practice for IS programs and offers additional options such as health care, government, education, and law. Moreover, MSIS 2016 includes guidance regarding the processes that individual programs can use to derive a curriculum based on the specified graduate competencies. The task force hopes that graduate programs in Information Systems will find MSIS 2016 a valuable resource and that the report will serve as an important catalyst for ongoing discussion and continuous improvement processes in the context of graduate education in IS.
Using Embedded Mixed Methods in Studying IS Phenomenon: Risks and Practical Remedies with an Illustration
Yu, Xiaodan (email@example.com); Khazanchi, Deepak
Drawing on lessons learned from a mixed method research project, we illustrate how mixed research approaches are fruitful in studying the complexities and interactions inherent in IS phenomenon. This is particularly relevant in instances where the phenomena under investigation is relatively new and “messy” in that many opportunities for errors and omissions are possible. Mixed method research designs can also prove to be valuable in exploratory or new areas of research and provide empirical evidence from multiple sources and types of data that can be truly triangulated. The key contribution of this paper is a detailed discussion of the risks associated with using a specific mixed method research strategy, embedded mixed method design, and the practical remedies we used to address them. This discussion provides operational guidance to researchers interested in adopting mixed research designs to study emergent IS phenomenon.
Shadow Systems, Risk, and Shifting Power Relations in Organizations
Furstenau, Daniel (firstname.lastname@example.org); Rothe, Hannes; Sandner, Matthias
Drawing on notions of power and the social construction of risk, we build new theory to understand the persistence of shadow systems within organizations. From a single case study in a mid-sized savings bank we derive two feedback cycles that concern shifting power relations between business units and central IT associated with shadow systems. A distant business-IT relationship and changing business needs can create repeated cost and time pressures that make business units draw on shadow systems. The perception of risk can trigger an opposing power shift back through the decommissioning and recentralization of shadow systems. However, empirical findings suggest that the weakening tendency of formal risk management programs may not be sufficient to stop the shadow systems cycle spinning if they fail to address the underlying causes for the emergence of shadow systems. These findings highlight long-term dynamics associated with shadow systems and pose "risk" as a power-shifting construct.
Familiarity with Big Data, Privacy Concerns, and Self-Disclosure Accuracy in Social Networking Websites: An APCO Model
Alashoor, Tawfiq (email@example.com); Han, Sehee; Joseph, Rhoda C.
Social networking websites have not only become the most prevalent communication tools in today’s digital age but also one of the top big data sources. Big data advocates promote the promising, future benefits of big data applications to both individuals and practitioners. However, public polls show evidence of heightened concerns about privacy among users of social networking websites. We review the privacy literature based on protection motivation theory and theory of planned behavior to develop an APCO model while incorporating novel factors reflecting the users’ familiarity with big data. Using a cross-sectional survey design and Structural Equation Modeling (SEM) techniques, our findings provide support for most of the proposed hypotheses. Specifically, we find support for a negative impact of awareness of big data and a positive impact of awareness of big data implications on privacy concerns. Privacy concerns in turn impact self-disclosure concerns positively and self-disclosure accuracy negatively. We also consider other antecedents of privacy concerns and test other alternative models to examine the mediating role of privacy concerns, to control for demographic variables, and to investigate different roles of the trust construct. Finally, we discuss the results of our findings and the theoretical and practical implications.
Explaining Software-as-a-Service Outsourcing: Economic and Social Considerations
Yao, Yurong (firstname.lastname@example.org); Kamis, Arnold A.; Watson, Edward
Software-as-a-service offers an innovative way to deliver software over the Internet to distributed organizations. While more and more SaaS providers are joining the market and competition among providers becomes more intense, it is important to understand the considerations of potential clients. Built on transaction cost theory and social exchange theory, this study empirically investigates, with a national survey of IT/IS executives, the role of economic factors and the impact of social relationships on the economic factors in the SaaS outsourcing decision. It is found that cost savings are a critical consideration in SaaS outsourcing, while social relationships exert a strong, positive direct impact on cost savings and positively moderate the impact of cost savings on SaaS outsourcing. This paper expands our theoretical understanding of the SaaS phenomenon and provides some managerial insights.
Persevere or Exit: What is the Right Strategy?
Bose, Indranil (email@example.com)
The teaching case describes the telecommunications market of India as it goes through a major transformation due to adoption of mobile telephony. The country with its huge market size and low teledensity provides an attractive opportunity for foreign multinationals. Telenor enters into the Indian market through a joint venture with Unitech Wireless under the brand name of Uninor, and targets the value-conscious segment of mobile customers with its attractive pricing schemes. After a few years of rapid growth, Uninor faces a huge business risk when the Supreme Court of India rules that its purchased spectrum is illegal. The case describes the aftermath of the 2G spectrum scam and how it adversely affects the future of Uninor. At this critical juncture, Telenor faces a strategic decision dilemma. Should it continue its operations in the ever growing Indian mobile market or should it cut its losses and exit before any further damage is done to its global brand? This teaching case imparts important lessons about doing telecommunications related business in an emerging economy where returns are high and business risks immense.