Arisa Shollo , Konstantin Hopf , Tiemo Thiess , Oliver Müller
{"title":"Shifting ML value creation mechanisms: A process model of ML value creation","authors":"Arisa Shollo , Konstantin Hopf , Tiemo Thiess , Oliver Müller","doi":"10.1016/j.jsis.2022.101734","DOIUrl":"https://doi.org/10.1016/j.jsis.2022.101734","url":null,"abstract":"<div><p>Advancements in artificial intelligence (AI) technologies are rapidly changing the competitive landscape. In the search for an appropriate strategic response, firms are currently engaging in a large variety of AI projects. However, recent studies suggest that many companies are falling short in creating tangible business value through AI. As the current scientific body of knowledge lacks empirically-grounded research studies for explaining this phenomenon, we conducted an exploratory interview study focusing on 56 applications of machine learning (ML) in 29 different companies. Through an inductive qualitative analysis, we uncover three broad types and five subtypes of ML value creation mechanisms, identify necessary but not sufficient conditions for successfully leveraging them, and observe that organizations, in their efforts to create value, dynamically shift from one ML value creation mechanism to another by reconfiguring their ML applications (i.e., the shifting practice). We synthesize these findings into a process model of ML value creation, which illustrates how organizations engage in (resource) orchestration by shifting between ML value creation mechanisms as their capabilities evolve and business conditions change. Our model provides an alternative explanation for the current high failure rate of ML projects.</p></div>","PeriodicalId":50037,"journal":{"name":"Journal of Strategic Information Systems","volume":"31 3","pages":"Article 101734"},"PeriodicalIF":7.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0963868722000300/pdfft?md5=bd72cef6b3375ba176941dedf1e1628f&pid=1-s2.0-S0963868722000300-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91692828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Immersive virtual reality in the age of the Metaverse: A hybrid-narrative review based on the technology affordance perspective","authors":"Ersin Dincelli , Alper Yayla","doi":"10.1016/j.jsis.2022.101717","DOIUrl":"10.1016/j.jsis.2022.101717","url":null,"abstract":"<div><p><span>Immersive virtual reality (VR) that utilizes head-mounted displays (HMD) is one of the key emerging technologies of the 21st century and has drawn keen attention from consumers, practitioners, and scholars in various disciplines. Nevertheless, the information systems (IS) discipline has neglected immersive VR, given that only a handful of studies have been published in mainstream IS journals. However, the recent advancements in immersive VR technology provide new opportunities for organizations and IS researchers. In light of these points, we reviewed the immersive VR literature to provide a holistic view of opportunities and challenges for organizations and future research directions for the IS field. By examining the technical capabilities of immersive VR and the previous literature, we identified five affordances: </span><em>embodiment</em>, <em>interactivity</em>, <em>navigability</em>, <em>sense-ability</em>, and <em>create-ability</em>. Our review of the 151 studies from the IS and related fields synthesized how these affordances were utilized in various research domains. Guided by the affordance-actualization theory, we also identified the strategic opportunities and challenges that come with implementing VR. The actualization of immersive VR affordances in organizations is indeed a fruitful area for IS scholars as there are various venues to move the IS field as well as the VR research in the organizational context forward.</p></div>","PeriodicalId":50037,"journal":{"name":"Journal of Strategic Information Systems","volume":"31 2","pages":"Article 101717"},"PeriodicalIF":7.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127913497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Technology–Supported value Co-Creation and Co-Destruction via social interaction and resource integration in service systems","authors":"Mengcheng Li, Tuure Tuunanen","doi":"10.1016/j.jsis.2022.101719","DOIUrl":"10.1016/j.jsis.2022.101719","url":null,"abstract":"<div><p>The paper develops a conceptual framework to study the constructs of information technology (IT)-supported value co-creation and co-destruction through shared processes of social interaction and resource integration as mediated by IT and embedded in interactive value formation practices. In particular, the elements of social interaction and resource integration are identified, and the role of IT is discussed. We conduct a systematic literature review and analyze the data using the service system perspective. Our research contributes by identifying the constructs of value-creating phenomena enabled by IT from the service system perspective and presenting a research agenda for further studies.</p></div>","PeriodicalId":50037,"journal":{"name":"Journal of Strategic Information Systems","volume":"31 2","pages":"Article 101719"},"PeriodicalIF":7.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0963868722000154/pdfft?md5=3d1bf2e6055565db63c476792b0c1c69&pid=1-s2.0-S0963868722000154-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125555460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The JSIS annual review issue: A case of swift institutionalization","authors":"Suzanne Rivard","doi":"10.1016/j.jsis.2022.101722","DOIUrl":"10.1016/j.jsis.2022.101722","url":null,"abstract":"","PeriodicalId":50037,"journal":{"name":"Journal of Strategic Information Systems","volume":"31 2","pages":"Article 101722"},"PeriodicalIF":7.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130647691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Welcome to this 2nd issue of Volume 31 of The Journal of Strategic Information Systems","authors":"Guy G. Gable, Yolande E. Chan","doi":"10.1016/j.jsis.2022.101723","DOIUrl":"https://doi.org/10.1016/j.jsis.2022.101723","url":null,"abstract":"","PeriodicalId":50037,"journal":{"name":"Journal of Strategic Information Systems","volume":"31 2","pages":"Article 101723"},"PeriodicalIF":7.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138276435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Josh Morton , Alireza Amrollahi , Alexander D. Wilson
{"title":"Digital strategizing: An assessing review, definition, and research agenda","authors":"Josh Morton , Alireza Amrollahi , Alexander D. Wilson","doi":"10.1016/j.jsis.2022.101720","DOIUrl":"10.1016/j.jsis.2022.101720","url":null,"abstract":"<div><p>This paper provides an assessing review and agenda for research at the ‘nexus’ between information systems and strategy practice. The review aims to understand the nature of this connection between the two areas, where information systems scholars strive to understand the everyday work of practitioners in organisations and the impact of digital technologies in strategizing, whilst strategy practice scholars seek a greater understanding of such technologies and their use by strategists. Despite a developing body of work relevant to both information systems and strategy practice, and several editorials calling for ‘synergy’, we still collectively know little about the state of knowledge at the nexus. To address this, our review identifies several constructs that provide linkages between information systems and strategy practice to reveal more about the current state of knowledge and to develop a formal definition for a domain which we call <em>digital strategizing</em>. We conclude by outlining an agenda to encourage and accelerate future research on digital strategizing.</p></div>","PeriodicalId":50037,"journal":{"name":"Journal of Strategic Information Systems","volume":"31 2","pages":"Article 101720"},"PeriodicalIF":7.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0963868722000166/pdfft?md5=a7ea18d4a4258af59e41af49453a0753&pid=1-s2.0-S0963868722000166-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116148905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marfri-Jay Gambal , Aleksandre Asatiani , Julia Kotlarsky
{"title":"Strategic innovation through outsourcing – A theoretical review","authors":"Marfri-Jay Gambal , Aleksandre Asatiani , Julia Kotlarsky","doi":"10.1016/j.jsis.2022.101718","DOIUrl":"10.1016/j.jsis.2022.101718","url":null,"abstract":"<div><p>Competition in the Information Technology Outsourcing (ITO) and Business Process Outsourcing (BPO) industry is increasingly moving from being motivated by cost savings towards strategic benefits that service providers can offer to their clients. Innovation is one such benefit that is expected nowadays in outsourcing engagements. The rising importance of innovation has been noticed and acknowledged not only in the Information Systems (IS) literature, but also in other management streams such as innovation and strategy. However, to date, these individual strands of research remain largely isolated from each other. Our theoretical review addresses this gap by consolidating and analyzing research on strategic innovation in the ITO and BPO context. The article set includes 95 papers published between 1998 and 2020 in outlets from the IS and related management fields. We craft a four-phase framework that integrates prior insights about (1) the antecedents of the decision to pursue strategic innovation in outsourcing settings; (2) arrangement options that facilitate strategic innovation in outsourcing relationships; (3) the generation of strategic innovations; and (4) realized strategic innovation outcomes, as assessed in the literature. We find that the research landscape to date is skewed, with many studies focusing on the first two phases. The last two phases remain relatively uncharted. We also discuss how innovation-oriented outsourcing insights compare with established research on cost-oriented outsourcing engagements. Finally, we offer directions for future research.</p></div>","PeriodicalId":50037,"journal":{"name":"Journal of Strategic Information Systems","volume":"31 2","pages":"Article 101718"},"PeriodicalIF":7.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116613706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guy G. Gable (Co-Editor-in-Chief JSIS), Yolande E. Chan (Co-Editor-in-Chief JSIS)
{"title":"Welcome to this 1st issue of volume 31 of The Journal of Strategic Information Systems","authors":"Guy G. Gable (Co-Editor-in-Chief JSIS), Yolande E. Chan (Co-Editor-in-Chief JSIS)","doi":"10.1016/j.jsis.2022.101709","DOIUrl":"https://doi.org/10.1016/j.jsis.2022.101709","url":null,"abstract":"","PeriodicalId":50037,"journal":{"name":"Journal of Strategic Information Systems","volume":"31 1","pages":"Article 101709"},"PeriodicalIF":7.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137337156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strategic roles of IT modernization and cloud migration in reducing cybersecurity risks of organizations: The case of U.S. federal government","authors":"Min-Seok Pang , Hüseyin Tanriverdi","doi":"10.1016/j.jsis.2022.101707","DOIUrl":"10.1016/j.jsis.2022.101707","url":null,"abstract":"<div><p>Many organizations run their core business operations on decades-old legacy IT systems. Some security professionals argue that legacy IT systems significantly increase security risks because they are not designed to address contemporary cybersecurity risks. Others counter that the legacy systems might be “secure by antiquity” and argue that due to lack of adequate documentation on the systems, it is very difficult for potential attackers to discover and exploit security vulnerabilities. There is a shortage of empirical evidence on either argument. Routine activity theory (RAT) argues that an organization’s guardianship is critical for reducing security incidents. However, RAT does not well explain how organizations might guard against security risks of legacy IT systems. We theorize that organizations can enhance their guardianship by either modernizing their legacy IT systems in-house or by outsourcing them to cloud vendors. With datasets from the U.S. federal agencies, we find that agencies that have more legacy IT systems experience more frequent security incidents than others with more modern IT systems. A 1%-point increase in the proportion of IT budgets spent on IT modernization is associated with a 5.6% decrease in the number of security incidents. Furthermore, migration of the legacy systems to the cloud is negatively associated with the number of security incidents. The findings advance the literature on strategic information systems by extending RAT to explain why the “security by antiquity” argument is not valid and how organizations can reduce the security risks of legacy IT systems through modernization and migration to the cloud.</p></div>","PeriodicalId":50037,"journal":{"name":"Journal of Strategic Information Systems","volume":"31 1","pages":"Article 101707"},"PeriodicalIF":7.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128211349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Disciplined autonomy: How business analytics complements customer involvement for digital innovation","authors":"Yunfei Shi , Tingru Cui , Fang Liu","doi":"10.1016/j.jsis.2022.101706","DOIUrl":"https://doi.org/10.1016/j.jsis.2022.101706","url":null,"abstract":"<div><p>The rise of big data and the fluid boundaries of digital products are driving companies to use business analytics (BA) to power their customer involvement. The complementarity view offers unique competence to generate value from BA because capability complementarity is less likely to be replicated or imitated. Unlike prior studies on BA-enabled value realization, our research investigates the interactions of BA and customer involvement capabilities using the complementarity view. We tested our model using data collected from 317 IT companies in China. Our results suggest that BA value realization requires both a top-down mechanism in which BA skills provide global guidance for alignment with a company’s goals and a bottom-up mechanism in which BA culture empowers local autonomy for adaptation to ever-changing needs. Our BA-complemented mechanisms provide research and practice with a way to concurrently use BA and customer involvement capabilities to address the duality of digital innovation. We further suggest that BA skills are necessary but insufficient for digital innovation because BA culture demonstrates a stronger effect in complementing organizations’ existing capabilities than BA skills do.</p></div>","PeriodicalId":50037,"journal":{"name":"Journal of Strategic Information Systems","volume":"31 1","pages":"Article 101706"},"PeriodicalIF":7.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92004455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}