Kroenung J.,University of Mannheim |
Eckhardt A.,German Graduate School of Management & Law |
Kuhlenkasper T.,Pforzheim University
Computers in Human Behavior | Year: 2017
Although information technology use is often conscious and deliberate and can therefore often be evaluated based on intentions, contemporary research has begun to consider automatic use occurring beyond conscious awareness based mainly on habit or automaticity. In addition to driving continued use or inhibiting switching to a new system, habit also moderates the effects of planned behavior depending on its strength and direction. Little attention has been paid to the implications of these conflicting behavioral paradigms and how they complicate valid behavioral predictions. Based on the concept of inclined actors and disinclined abstainers developed by Sheeran (European Review of Social Psychology 12 (2002) 1–36), we navigate these difficulties by undertaking a group-based analysis based on a threshold model to analyze data collected in a real case in the German public sector. Our study reveals that the impact of cognition on intention follows opposing patterns among adopters and non-adopters depending on the strength of their habit. We extend these findings through post-hoc analysis to identify and propose group-specific persuasion strategies for eight groups of individuals. © 2016 Elsevier Ltd
Jaeger L.,German Graduate School of Management & Law |
Eckhardt A.,German Graduate School of Management & Law
Pacific Asia Conference on Information Systems, PACIS 2016 - Proceedings | Year: 2016
In today's digital age, in which all kinds of information can be accessed electronically at all times, organizations are under continuous pressure of keeping their information systems (IS) secure. To protect IS and information assets from insider threats, information security awareness (ISA) has been established as a crucial factor in influencing employees' behaviour that is supportive or disruptive of IS security. But yet to date, there is still a lack of in-depth and structured understanding of the factors influencing ISA. In this research-in-progress paper, we conduct a literature review to categorize determinants of ISA into four levels of origin (individual, organizational, social-environmental, and application-specific) and identify topics that are promising for future research. We then present our planned study as an example to pursue our recommendations. In the IS security context of phishing, we aim to uncover the extent to which non-IS professionals are able to develop an eye for technical aspects of IS security and pay higher visual attention to security and fraud indicators of web browsers and emails after being subject to different organizational awareness-raising activities. Among a survey and literature analysis, the multi-method approach uses the objective data collection instrument of eye tracking. We expect to contribute into the nascent area of neurosecurity research by offering new insights on the effectiveness of organizational means to increase employees' ISA.
Wenzel M.,European University Viadrina |
Wagner H.-T.,German Graduate School of Management & Law |
Koch J.,European University Viadrina
European Journal of Information Systems | Year: 2017
Although IS research acknowledges the importance of path dependence with the generalized response that “history matters,” this broad understanding does not substitute for a more systematic historical analysis of how paths emerge and how technological change breaks them. In this context, we draw on the theory of strategic path dependence from organization and management research to develop a more nuanced understanding of path dependence and then explore how technological change breaks these strategic paths. Based on a narrative analysis of the strategic development of incumbents in the funeral industry, we reconstruct the core components of strategic paths – strategic patterns and self-reinforcing mechanisms – and scrutinize the Internet’s role in breaking these paths. We suggest that technological change helps break strategic paths by destabilizing the very self-reinforcing mechanisms that led to their emergence and reproduction in the first place. Furthermore, by showing that breaking strategic paths involves a subsequent critical event that destabilizes the strategic pattern, we advance a process understanding of how strategic paths are broken. This paper thus provides much-needed historical analyses of IS-related phenomena, offers a more precise and systematic understanding of path dependence in IS research, and yields insights into the process of how strategic paths are broken. © 2017 The OR Society
Blome C.,University of Sussex |
Foerstl K.,German Graduate School of Management & Law |
Schleper M.C.,University of Nottingham
Journal of Cleaner Production | Year: 2017
Buying firms are increasingly confronted with compliance scandals in their upstream supply chain, for which they are held accountable by their stakeholders. Purely symbolic practices, typically referred to as greenwashing, as well as substantive practices, such as green supplier championing, are thus receiving widespread attention in business practices and academia alike. In this study, we reveal the impact of two opposing leadership dimensions following the concepts of ethical and transactional leadership as antecedents for green supplier championing and greenwashing. We particularly address whether these antecedents have a complementary or a counterproductive effect on green supplier championing and greenwashing. Furthermore, we investigate the complementary impact of incentives and the two leadership styles on achieving sustainability behavior. The resulting model is tested using a path analysis based on a data set of 118 firms located in Germany. We find support for the positive impact of ethical leadership on green supplier championing but also a non-significant negative impact on greenwashing. Greenwashing is significantly impacted by leadership styles reflecting obedience to authority, and further moderated by ethical incentives. Interestingly, ethical incentives do not moderate the impact of ethical leadership on green supplier championing. Finally, we discuss implications for theory and business practice. © 2017 Elsevier Ltd
Wagner H.-T.,German Graduate School of Management & Law |
Weitzel T.,University of Bamberg
Journal of Management Information Systems | Year: 2014
It is widely acknowledged that information technology (IT) and business resources need to be well aligned to achieve organizational goals. Yet, year after year, chief information officers still name business-IT alignment a key challenge for IT executives. While alignment research has matured, we still lack a sound theoretical foundation for alignment. Transcending the predominantly strategic executive-level focus, we develop a model of "operational alignment" and IT business value that combines a social perspective of IT and business linkage with a view of interaction between business and IT at nonstrategic levels, such as in daily business operations involving regular staff. Drawing on social capital theory to explain how alignment affects organizational performance, we examine why common suggestions such as "communicate more" are insufficient to strengthen alignment and disclose how social capital between IT and business units drives alignment and ultimately IT business value. Empirical data from 136 firms confirms the profound impact of operational business-IT alignment, composed of social capital and business understanding of IT, on IT flexibility, IT utilization, and organizational performance. The results show that social capital theory is a useful theoretical foundation for understanding how business IT alignment works. The findings suggest that operational alignment is at least as important as strategic alignment for IT service quality; that managers need to focus on operational aspects of alignment beyond communication by fostering knowledge, trust, and respect; and that IT utilization and flexibility are appropriate intermediate goals for business-IT alignment governance. © 2014 M.E. Sharpe, Inc.
Hahn G.J.,German Graduate School of Management & Law |
Leucht A.,TU Braunschweig
International Journal of Production Economics | Year: 2015
Slow-moving demand patterns frequently occur with spare parts as well as items in decentralized retail supply chains with large assortments. These patterns are commonly called lumpy since they exhibit comparably high demand variation and a high fraction of zero-demand events. In this paper, we examine two distribution-based approaches to model lumpy demand processes for inventory control: (i) a generalized hurdle negative binomial model, and (ii) a worst-case non-parametric model that is derived using a test-based approach. Considering a base stock inventory policy, we examine a set of lumpy time series from the industry to exemplify the suitability and benefit of the proposed approaches for managing inventory systems of slow-moving items. © 2015 Elsevier B.V. All rights reserved.
Wagner D.,European University Viadrina |
Vollmar G.,VOLLMAR WissenKommunikation Consulting |
Wagner H.-T.,German Graduate School of Management & Law
Journal of Enterprise Information Management | Year: 2014
Purpose: The purpose of this paper is to outline the potential of information technology, particularly social media and their affordances, in supporting knowledge creation within organizations. Design/methodology/approach: This is a conceptual paper which integrates the literature on both knowledge creation and social media. Findings: Social media may support knowledge creation by affording new types behaviors that were not possible with previous forms of computer-mediated communication. Research limitations/implications: The paper contributes to theory development by integrating knowledge creation theory and addressing the role of technology, more specifically social media and their affordances, in the knowledge creation process. Practical implications: The results of the paper will help managers to understand which social media affordances support the distinct knowledge creation processes and target their use of technologies within the organization accordingly. Originality/value: The paper is of high theoretical and practical relevance. It bridges two previously unconnected literatures and, in doing so, provides an innovative perspective on how social media and their affordances may support knowledge creation. © Emerald Group Publishing Limited.
Wagner D.,German Graduate School of Management & Law
20th Americas Conference on Information Systems, AMCIS 2014 | Year: 2014
The present paper extends social capital theory by exploring the creation of social capital in a highly innovative, yet under-researched organizational form: online communities. It is shown that social capital development has thus far not been sufficiently theorized and research on how social capital may be created in online communities is missing altogether. Attempting to fill this gap, I draw on earlier contributions to the sociological literature by Coleman and Bourdieu. More specifically, four mechanisms that lead to the creation of social capital are identified, namely closure, stability, interdependence, and interaction. The concept of fluidity is then introduced as an important characteristic of online communities. The impact of fluidity on the mechanisms for social capital development is consequently scrutinized and some propositions are developed. The paper concludes with a discussion of opportunities for overcoming the challenges identified earlier. Implications for research and practice are advanced.
Schafferling A.,German Graduate School of Management & Law
19th Americas Conference on Information Systems, AMCIS 2013 - Hyperconnected World: Anything, Anywhere, Anytime | Year: 2013
As IT spending continuously increased over the past years, it nowadays accounts for a significant amount of total corporate spending. However, firms require the ability to transform these investments into daily operations. Research shows that the organizational IT capability is the key to leverage IT investments and achieve desired outcomes. Research on IT capability thereby evolved as a major stream in the IT business value debate and the number of research articles on IT capability increased constantly over the years. The purpose of this literature review is to provide an overview of current findings on antecedents and consequences of IT capability and to identify directions for further research. This review synthesizes a collection of 30 research articles and thereby contributes to the literature on IT capability by identifying current gaps in the literature and offering new perspectives for future research. © (2013) by the AIS/ICIS Administrative Office All rights reserved.
Wagner H.-T.,German Graduate School of Management & Law
Proceedings of the Annual Hawaii International Conference on System Sciences | Year: 2014
How does business-IT alignment change over time? Using a case study in the aerospace industry, we show how governance mechanisms are interrelated with the development of business-IT alignment over time. The case adds insight into a concrete business situation where activities are unfolded to change organizational practices and to increase performance. We demonstrate specific mechanisms influencing alignment patterns, and show that the development of business-IT alignment precedes finding solutions that enhance business value. In addition, we depict the co-evolvement of shared knowledge and mutual understanding over time. © 2014 IEEE.