7 research outputs found
Strategic capability through business intelligence applications
This thesis analyzes the potential strategic capability that can be improved from the deployment of business intelligence (BI) applications. AOK Niedersachsen (AOKN), a German health insurance company in the north of Germany (Lower-Saxony), is used as the case study for primary qualitative research and analysis. For many years, information and data have been considered even “factors of production” for companies; but data and information have become more complex, requiring processing and structural analysis to get the needed transparency in the company. Data from different operational sources must be extracted and structured to provide information for management accounting employees, top management, and end-users throughout an organization. In the healthcare industry, BI systems have played a crucial role for decades. For organizations such as AOKN, the application of BI tools and technologies can create and support sustainable capability.
Several research questions are answered in this thesis through structured one-to-one interviews with different AOKN employees, and the resulting analysis of interview data. A qualitative approach to this case study is used, allowing the researcher to get in-depth information about a specific context. When case studies are conducted, the one-to-one interview is considered to be an optimal instrument and a significant source of evidence.
BI technologies and tools are classified within an appropriate conceptual framework which integrates the complex BI demands and structures of AOKN, identifying different components as part of the framework - systems infrastructure, data provision, reporting, and information receiver. The framework is further enhanced by four factors of a competitive advantage model drawn from existing literature to develop capabilities. The use and integration of BI technologies and tools in the strategy development process are then analyzed. Different BI tools, that have an important function during the whole strategy process, are recommended for each strategy phase. The final area of research examines the possible addition of new functions and solutions to current BI technologies and
tools to enhance the potential of these systems in gaining capabilities. Research findings encompass system access, report characteristics, and BI end users profiles and capabilities. To this end, a structured model gives examples of practical AOKN BI projects that have generated strategic capabilities for the organization. At the end, the conclusion chapter stresses the needs of contribution to knowledge (theory and practice)
Resilience capabilities in the face of environmental turbulence: a case of Hong Kong small to medium enterprises
This thesis adopts an explanatory sequential mixed-approach, incorporating two inter-related studies investigates the resilience capabilities of Hong Kong-based SMEs. Specifically, the overall objective is to empirically examine the multidimensionality of resilience capability, and how each dimension is developed, utilized, and evolved over time and in various contexts. Study 1 involves a survey of 177 Hong Kong-based SMEs and explores the interrelationship between resilience capabilities and firm performance, and the moderating impact of environmental turbulence on these relationships. Extending the findings of Study 1, Study 2 involves an in-depth qualitative examination of the ways in which SMEs utilize resilience capabilities in strategy development for dealing with threats and opportunities. The objective of Study 2 is to address the issues that arose from Study 1 with the aim of providing an understanding of how relationships between dimensions are established pre-, during- and post-crisis phases. Through an in-depth review of literature across disciplines, survey and case study interviews, this thesis defines resilience as a multidimensional capability that is expressed through organizational strategies, comprising four dimensions (adaptability, agility, anticipatory ability and flexibility) that are conceptually and empirically distinct from one another.. These dimensions are articulated either proactively or reactively in the process of effective strategy development during pre-, at times of, or post crisis environments. Findings also reveal five ways of utilizing resilience capability during strategy development process (defining, founding, planning, redefining, conforming) with differential emphasis on dimensions at different phases of turbulent environments, be it pre-, during, or post-crisis conditions. These findings have important implications for strategy development, SME business practice, research and practice
Enhancement of the Contract Negotiation Process In Agency Relationships in IT Outsourcing: A model for improving contract negotiations and the emergence of trust between principals and agents in IT outsourcing agency relationships
The research aims at establishing an understanding of the influencing factors and
their enhancement through a contract enhancement model (CEM) in order to ensure
an improved course of contract negotiations between principals and agents in
agency relationships in IT outsourcing. The research discusses the phenomenon of
hidden actions and their occurrences, challenges and solutions as explained in the
agency theory (JENSEN/MECKLING, 1976). The CEM helps to ensure that the
phenomenon of hidden actions as well as opportunistic behaviour are reduced and
maximation of benefit is given and shared between the parties. To guarantee a
better understanding, the research sets the theoretical facts of the agency theory in
conjunction with facts of other theories, such as economics and social cognitive
science, in order to manifest the content of the CEM and to ensure that the
theoretical framework of the research is based on solid grounds. The research
contributes to theory and practice. It provides an enhanced approach for solving
challenges arising from hidden actions. With the help of the CEM, the research
instructs and guides interacting parties in agency relationships in IT outsourcing how
to increase the speed, the efficiency and the effectiveness of their contract
negotiations to enable them to develop a solid foundation for a long-lasting business
relationship, from the very beginning. Previous research has been conducted in the
field of enhancing relationships between principals and agents, but such research
has focused on enhancing communication and knowledge transfer between the
parties (Henrich, 2011). The present research is understood as a continuation of
this previous research. As mentioned above, it aims at enhancing contract
negotiations by making them more efficient and speeding them up to help principals
and agents in agency relationships in IT outsourcing to run through the process of
contract negotiations more effectively. Besides focusing on agency theory, the
research also draws on literature in the field of outsourcing, trust and information
exchange. In the past, various studies have shown that many outsourcing projects
have failed to run for a prolonged period or have been interrupted, renegotiated or
even terminated (Leimeister, 2010, p. 2). The literature shows that generally research
has already contributed to this subject with a wide range of theories about the
constitution and characterisation of mutual exchange between organisations
(Kuhlmann, 2012, p. 3).
Solving the conflict of information asymmetry as described in the agency theory will
lead to an increase of total well-being and should be the aspired solution from a
utilitarian point of view (Zaggl, 2012, p. 7). Information exchange and trust as further
research subjects within this research are interlinked with the behaviour of
individuals who are themselves causing an impact on the level of quality of the
relationship. A well-functioning exchange of information can reduce costs for
information sharing and the involved parties are willing to to share and exchange
information more voluntarily if they recognise that information exchange generates
a benefit for both parties (Porterfield, 2007, p. 32). Trust on the other hand has the
potential to enhance the relationship between principals and agents. Trust is an
informal mechanism which often leads to coordinated joint efforts that improve
outcomes and help to exceed expectations of what the interacting parties might
achieve, acting solely in their own interest (Hoejmose, Brammer & Milington, 2012,
p. 616). By enhancing the influencing factors which are understood to be
responsible for poor development of trust and a low level of information exchange
between the parties in IT outsourcing, the research provides an opportunity to
improve the current situation between the interacting individuals in a situation in
which both parties are willing to cooperate which each other. The methodological
ground for the research is a constructivist approach. The author understands
constructivism as an underlying aspect for developing and discussing ideas, norms
and identities. This fits in well with the aim of the research. The analysis of the data
collection is reflected in the theoretical standards of the grounded theory (GT). Steps
such as identifying the substantive research area, collecting data pertaining to the
substantive area and using open coding while collecting the data until the core
strategy is recognised or selected, have been conducted to allow proper exposure
of information and knowledge. Coding has been seen as a first step of data analysis
to move away from particular statements to more abstract interpretations of the
interview data.
In addition to this, a qualitative content analysis according to Mayring alongside with
conducting semi-structured expert interviews as a facilitator for collecting the
respective data has been conducted. The central idea of the qualitative content
analysis approach is to conceptualise the process of assigning categories to text
passages as a qualitative interpretive act, but following content-analytical rules to
align research interest with general defined behavioural rules for research work. To
guarantee a stringent course of the research, text passages of the interviews have
been coded and categorised to describe patterns which emerge from the data
analysis. To ensure authenticity, data interpretation has been reviewed constantly
against the original interview transcripts. Expert interviews ensure that the
knowledge of the experts in agency relationships in IT outsourcing can be retrieved
and thus this approach represents a systematic basis for data analysis. The
classification is based on the possibility of reconstructing identifiable and
interpretable statements made by the experts (Neuser & Nagel, 2002, p. 32). They
include the goal of ensuring a generation of area-specific and object-related
statements. The experts have been selected according to their function and position
within the participating firms (Scholl, 2003, p. 4). The interviews are based on a
guide with formulated open questions that are based on the respective interview.
The use of an interview guide increases the comparability of data and also ensures
that the collected data will sustain a structure (Gläder & Laudel, 2006, p. 42). The
interviewer’s influence on the content is regulated and controlled by the interview
guide. The interview guide has been tested iteratively prior to conducting the
interviews to minimise unclear content and to eliminate obstructions. The interviews
have been audio recorded and transcribed afterwards. The interviews have been
used only for research purposes. All content has been treated anonymously and is
kept confidential. All information has been stored securely and deleted when no
longer required for research purposes. Participation was voluntary and interviewees
have been informed that interviews are conducted as part of a DBA research.
Interviewees had the right to withdraw from an interview at any time. Interviews have
been conducted until data saturation had been reached. The implemented content
analysis is seen as a descriptive method. Disadvantages of the form of analysis may
be that data can be insensitive and might not differentiate between meanings.
On the one hand, results could be skewed or slanted if the words and their meanings
are misinterpreted. On the other hand, the content analysis provides the benefit that
it is unobtrusive. Once data is collected and analysed appropriately, data can be
corroborated by other researchers making the data reproducible. Therefore, content
analysis is understood to be the best choice as a research technique for making
inferences by systematically and objectively identifying specified characteristics
within the text of the present thesis. Hypotheses have been verified or falsified by
the help of pre-defined, measurable values. Data analysis was conducted according
to these values to guarantee objectiveness and robustness. To strengthen the CEM
and its related content it is considered to prove the validity and the robustness of
the CEM by introducing the CEM to a set amount of external persons. They test,
review, use and adapt the CEM in practice to obtain more congruency with the
theoretical foundation to be able to close the loop between theory and practice. A
result of this is that subsequently documents can be analysed and therefore a
documentary analysis can manifest the CEM and its theoretical foundation. This will
guarantee that the CEM and its theoretical framework can be determined as
feasible, practicable and robust in its content. Furthermore, this might ensure that
bias and ethics are balanced out to a maximum and personal influence is kept to a
minimum. The examination of interdependencies in hidden action behaviour in
conjunction with a discussion of the aspects of theoretical evidence on contract
negotiation, information exchange and trust shows that an enhancement of these
influencing factors contributes to a significantly improved contract negotiation
process and information exchange. The independent variables which will be
discussed in the present thesis affect the development of interpersonal connections,
the information exchange and the development of trust as a trigger for willingness
for transparency and openness as well as for trust as the foundation of improving
the contract negotiation process in a highly positive way. In particular, trust
contributes to reducing hidden actions as well as it increases the feeling of being
and acting securely and according to processes and pre-defined agreements. This
shows that trust influences hidden actions positively which itself has its source in
insecure situations or in one-sided maximisation of each party's own tendency to
increase its own well-being. Moreover, the feeling of having security can be
understood as a requirement for achieving stability in the respective agency
relationship.
Nonetheless, trust can be held accountable for providing a feeling of stability and
security, and thus leads to a better information exchange between the parties.
Based on this assumption it can be stated that due to a better mutual acceptance
between the parties caused by jointly pre-defined content and rules, information is
shared more easily. This influences the information exchange and as a
consequence the development of trust. The improvement of information exchange
assesses existing information asymmetries and overcomes these with the effect of
minimising the appeal of hidden actions. From the results of the data generation and
analysis, guidance as well as a profound perspective for interacting individuals in
agency relationships in IT outsourcing can be derived. This provides the grounds
for suggestions on improving existing relationships and bringing in emergent
relationships efficiently from the beginning. Furthermore, this situation as such
creates a foundation for long-term cooperations. This guidance, as a result of the
contract negotiation model and its related content, represents the analysis and the
improvement of previously unconsidered subject fields and theoretical areas. The
results of the examination deliver an approach as well as a good basis for further
research, as the theoretical framework together with the empirical examination in
principle outlines the dimensions, in which the contract enhancement model can
work. However, it needs to be considered that the discussed and developed contract
enhancement model needs to be adapted towards the requirements of other
business areas when regarded to be used in such business areas. This thesis
delivers substantiated data for the research field in which the research was
undertaken. With regard to the course of the survey, the evaluation of it makes
profound data available, from which further research projects could have a robust
starting point
The Impact of Entrepreneurial Orientation and Market on SMEs Performance Orientation that Influenced by External Environment and Networking Capabilities.
Entrepreneurial and market orientation can positively affect the performance of SMEs (Small
and Medium Enterprises), yet these two orientations are not enough to enable SMEs to perform
well in a dynamic and uncertain business environment. SMEs in Indonesia are both facing
challenges and opportunities from changes in the existing external environment. SMEs
must have networking capacities to access external resources. The networks are expected to
impact entrepreneurial orientation and market orientation to enable SMEs to perform better.
This study aims to empirically examine the effect of entrepreneurial and market orientations
on the performance of SMEs, influenced by external environment and networking capabilities.
This study proposes a conceptual framework that integrates external environment, the
network capabilities, entrepreneurial orientation, marketing orientation, and the performance
of SMEs in an uncertain external environment
Technology strategy in a changing world economy
Meeting: Research and Policy Workshop on Technology Problems for the Caribbean, 13 Nov.-10 Dec. l983, Runaway Bay, JMIncludes documents listed in Module 13 of Bibliography / Research and Policy Workshop on Technology Problems for the Caribbean, Runaway Bay, Jamaica, Nov. 13-Dec. 10, 1983Also available in IDRC Digital Library: 1-4,6-11,13-20,22-2