7 research outputs found

    Strategic capability through business intelligence applications

    Get PDF
    This thesis analyzes the potential strategic capability that can be improved from the deployment of business intelligence (BI) applications. AOK Niedersachsen (AOKN), a German health insurance company in the north of Germany (Lower-Saxony), is used as the case study for primary qualitative research and analysis. For many years, information and data have been considered even “factors of production” for companies; but data and information have become more complex, requiring processing and structural analysis to get the needed transparency in the company. Data from different operational sources must be extracted and structured to provide information for management accounting employees, top management, and end-users throughout an organization. In the healthcare industry, BI systems have played a crucial role for decades. For organizations such as AOKN, the application of BI tools and technologies can create and support sustainable capability. Several research questions are answered in this thesis through structured one-to-one interviews with different AOKN employees, and the resulting analysis of interview data. A qualitative approach to this case study is used, allowing the researcher to get in-depth information about a specific context. When case studies are conducted, the one-to-one interview is considered to be an optimal instrument and a significant source of evidence. BI technologies and tools are classified within an appropriate conceptual framework which integrates the complex BI demands and structures of AOKN, identifying different components as part of the framework - systems infrastructure, data provision, reporting, and information receiver. The framework is further enhanced by four factors of a competitive advantage model drawn from existing literature to develop capabilities. The use and integration of BI technologies and tools in the strategy development process are then analyzed. Different BI tools, that have an important function during the whole strategy process, are recommended for each strategy phase. The final area of research examines the possible addition of new functions and solutions to current BI technologies and tools to enhance the potential of these systems in gaining capabilities. Research findings encompass system access, report characteristics, and BI end users profiles and capabilities. To this end, a structured model gives examples of practical AOKN BI projects that have generated strategic capabilities for the organization. At the end, the conclusion chapter stresses the needs of contribution to knowledge (theory and practice)

    Resilience capabilities in the face of environmental turbulence: a case of Hong Kong small to medium enterprises

    Get PDF
    This thesis adopts an explanatory sequential mixed-approach, incorporating two inter-related studies investigates the resilience capabilities of Hong Kong-based SMEs. Specifically, the overall objective is to empirically examine the multidimensionality of resilience capability, and how each dimension is developed, utilized, and evolved over time and in various contexts. Study 1 involves a survey of 177 Hong Kong-based SMEs and explores the interrelationship between resilience capabilities and firm performance, and the moderating impact of environmental turbulence on these relationships. Extending the findings of Study 1, Study 2 involves an in-depth qualitative examination of the ways in which SMEs utilize resilience capabilities in strategy development for dealing with threats and opportunities. The objective of Study 2 is to address the issues that arose from Study 1 with the aim of providing an understanding of how relationships between dimensions are established pre-, during- and post-crisis phases. Through an in-depth review of literature across disciplines, survey and case study interviews, this thesis defines resilience as a multidimensional capability that is expressed through organizational strategies, comprising four dimensions (adaptability, agility, anticipatory ability and flexibility) that are conceptually and empirically distinct from one another.. These dimensions are articulated either proactively or reactively in the process of effective strategy development during pre-, at times of, or post crisis environments. Findings also reveal five ways of utilizing resilience capability during strategy development process (defining, founding, planning, redefining, conforming) with differential emphasis on dimensions at different phases of turbulent environments, be it pre-, during, or post-crisis conditions. These findings have important implications for strategy development, SME business practice, research and practice

    Enhancement of the Contract Negotiation Process In Agency Relationships in IT Outsourcing: A model for improving contract negotiations and the emergence of trust between principals and agents in IT outsourcing agency relationships

    Get PDF
    The research aims at establishing an understanding of the influencing factors and their enhancement through a contract enhancement model (CEM) in order to ensure an improved course of contract negotiations between principals and agents in agency relationships in IT outsourcing. The research discusses the phenomenon of hidden actions and their occurrences, challenges and solutions as explained in the agency theory (JENSEN/MECKLING, 1976). The CEM helps to ensure that the phenomenon of hidden actions as well as opportunistic behaviour are reduced and maximation of benefit is given and shared between the parties. To guarantee a better understanding, the research sets the theoretical facts of the agency theory in conjunction with facts of other theories, such as economics and social cognitive science, in order to manifest the content of the CEM and to ensure that the theoretical framework of the research is based on solid grounds. The research contributes to theory and practice. It provides an enhanced approach for solving challenges arising from hidden actions. With the help of the CEM, the research instructs and guides interacting parties in agency relationships in IT outsourcing how to increase the speed, the efficiency and the effectiveness of their contract negotiations to enable them to develop a solid foundation for a long-lasting business relationship, from the very beginning. Previous research has been conducted in the field of enhancing relationships between principals and agents, but such research has focused on enhancing communication and knowledge transfer between the parties (Henrich, 2011). The present research is understood as a continuation of this previous research. As mentioned above, it aims at enhancing contract negotiations by making them more efficient and speeding them up to help principals and agents in agency relationships in IT outsourcing to run through the process of contract negotiations more effectively. Besides focusing on agency theory, the research also draws on literature in the field of outsourcing, trust and information exchange. In the past, various studies have shown that many outsourcing projects have failed to run for a prolonged period or have been interrupted, renegotiated or even terminated (Leimeister, 2010, p. 2). The literature shows that generally research has already contributed to this subject with a wide range of theories about the constitution and characterisation of mutual exchange between organisations (Kuhlmann, 2012, p. 3). Solving the conflict of information asymmetry as described in the agency theory will lead to an increase of total well-being and should be the aspired solution from a utilitarian point of view (Zaggl, 2012, p. 7). Information exchange and trust as further research subjects within this research are interlinked with the behaviour of individuals who are themselves causing an impact on the level of quality of the relationship. A well-functioning exchange of information can reduce costs for information sharing and the involved parties are willing to to share and exchange information more voluntarily if they recognise that information exchange generates a benefit for both parties (Porterfield, 2007, p. 32). Trust on the other hand has the potential to enhance the relationship between principals and agents. Trust is an informal mechanism which often leads to coordinated joint efforts that improve outcomes and help to exceed expectations of what the interacting parties might achieve, acting solely in their own interest (Hoejmose, Brammer & Milington, 2012, p. 616). By enhancing the influencing factors which are understood to be responsible for poor development of trust and a low level of information exchange between the parties in IT outsourcing, the research provides an opportunity to improve the current situation between the interacting individuals in a situation in which both parties are willing to cooperate which each other. The methodological ground for the research is a constructivist approach. The author understands constructivism as an underlying aspect for developing and discussing ideas, norms and identities. This fits in well with the aim of the research. The analysis of the data collection is reflected in the theoretical standards of the grounded theory (GT). Steps such as identifying the substantive research area, collecting data pertaining to the substantive area and using open coding while collecting the data until the core strategy is recognised or selected, have been conducted to allow proper exposure of information and knowledge. Coding has been seen as a first step of data analysis to move away from particular statements to more abstract interpretations of the interview data. In addition to this, a qualitative content analysis according to Mayring alongside with conducting semi-structured expert interviews as a facilitator for collecting the respective data has been conducted. The central idea of the qualitative content analysis approach is to conceptualise the process of assigning categories to text passages as a qualitative interpretive act, but following content-analytical rules to align research interest with general defined behavioural rules for research work. To guarantee a stringent course of the research, text passages of the interviews have been coded and categorised to describe patterns which emerge from the data analysis. To ensure authenticity, data interpretation has been reviewed constantly against the original interview transcripts. Expert interviews ensure that the knowledge of the experts in agency relationships in IT outsourcing can be retrieved and thus this approach represents a systematic basis for data analysis. The classification is based on the possibility of reconstructing identifiable and interpretable statements made by the experts (Neuser & Nagel, 2002, p. 32). They include the goal of ensuring a generation of area-specific and object-related statements. The experts have been selected according to their function and position within the participating firms (Scholl, 2003, p. 4). The interviews are based on a guide with formulated open questions that are based on the respective interview. The use of an interview guide increases the comparability of data and also ensures that the collected data will sustain a structure (Gläder & Laudel, 2006, p. 42). The interviewer’s influence on the content is regulated and controlled by the interview guide. The interview guide has been tested iteratively prior to conducting the interviews to minimise unclear content and to eliminate obstructions. The interviews have been audio recorded and transcribed afterwards. The interviews have been used only for research purposes. All content has been treated anonymously and is kept confidential. All information has been stored securely and deleted when no longer required for research purposes. Participation was voluntary and interviewees have been informed that interviews are conducted as part of a DBA research. Interviewees had the right to withdraw from an interview at any time. Interviews have been conducted until data saturation had been reached. The implemented content analysis is seen as a descriptive method. Disadvantages of the form of analysis may be that data can be insensitive and might not differentiate between meanings. On the one hand, results could be skewed or slanted if the words and their meanings are misinterpreted. On the other hand, the content analysis provides the benefit that it is unobtrusive. Once data is collected and analysed appropriately, data can be corroborated by other researchers making the data reproducible. Therefore, content analysis is understood to be the best choice as a research technique for making inferences by systematically and objectively identifying specified characteristics within the text of the present thesis. Hypotheses have been verified or falsified by the help of pre-defined, measurable values. Data analysis was conducted according to these values to guarantee objectiveness and robustness. To strengthen the CEM and its related content it is considered to prove the validity and the robustness of the CEM by introducing the CEM to a set amount of external persons. They test, review, use and adapt the CEM in practice to obtain more congruency with the theoretical foundation to be able to close the loop between theory and practice. A result of this is that subsequently documents can be analysed and therefore a documentary analysis can manifest the CEM and its theoretical foundation. This will guarantee that the CEM and its theoretical framework can be determined as feasible, practicable and robust in its content. Furthermore, this might ensure that bias and ethics are balanced out to a maximum and personal influence is kept to a minimum. The examination of interdependencies in hidden action behaviour in conjunction with a discussion of the aspects of theoretical evidence on contract negotiation, information exchange and trust shows that an enhancement of these influencing factors contributes to a significantly improved contract negotiation process and information exchange. The independent variables which will be discussed in the present thesis affect the development of interpersonal connections, the information exchange and the development of trust as a trigger for willingness for transparency and openness as well as for trust as the foundation of improving the contract negotiation process in a highly positive way. In particular, trust contributes to reducing hidden actions as well as it increases the feeling of being and acting securely and according to processes and pre-defined agreements. This shows that trust influences hidden actions positively which itself has its source in insecure situations or in one-sided maximisation of each party's own tendency to increase its own well-being. Moreover, the feeling of having security can be understood as a requirement for achieving stability in the respective agency relationship. Nonetheless, trust can be held accountable for providing a feeling of stability and security, and thus leads to a better information exchange between the parties. Based on this assumption it can be stated that due to a better mutual acceptance between the parties caused by jointly pre-defined content and rules, information is shared more easily. This influences the information exchange and as a consequence the development of trust. The improvement of information exchange assesses existing information asymmetries and overcomes these with the effect of minimising the appeal of hidden actions. From the results of the data generation and analysis, guidance as well as a profound perspective for interacting individuals in agency relationships in IT outsourcing can be derived. This provides the grounds for suggestions on improving existing relationships and bringing in emergent relationships efficiently from the beginning. Furthermore, this situation as such creates a foundation for long-term cooperations. This guidance, as a result of the contract negotiation model and its related content, represents the analysis and the improvement of previously unconsidered subject fields and theoretical areas. The results of the examination deliver an approach as well as a good basis for further research, as the theoretical framework together with the empirical examination in principle outlines the dimensions, in which the contract enhancement model can work. However, it needs to be considered that the discussed and developed contract enhancement model needs to be adapted towards the requirements of other business areas when regarded to be used in such business areas. This thesis delivers substantiated data for the research field in which the research was undertaken. With regard to the course of the survey, the evaluation of it makes profound data available, from which further research projects could have a robust starting point

    The Impact of Entrepreneurial Orientation and Market on SMEs Performance Orientation that Influenced by External Environment and Networking Capabilities.

    Get PDF
    Entrepreneurial and market orientation can positively affect the performance of SMEs (Small and Medium Enterprises), yet these two orientations are not enough to enable SMEs to perform well in a dynamic and uncertain business environment. SMEs in Indonesia are both facing challenges and opportunities from changes in the existing external environment. SMEs must have networking capacities to access external resources. The networks are expected to impact entrepreneurial orientation and market orientation to enable SMEs to perform better. This study aims to empirically examine the effect of entrepreneurial and market orientations on the performance of SMEs, influenced by external environment and networking capabilities. This study proposes a conceptual framework that integrates external environment, the network capabilities, entrepreneurial orientation, marketing orientation, and the performance of SMEs in an uncertain external environment

    Technology strategy in a changing world economy

    Get PDF
    Meeting: Research and Policy Workshop on Technology Problems for the Caribbean, 13 Nov.-10 Dec. l983, Runaway Bay, JMIncludes documents listed in Module 13 of Bibliography / Research and Policy Workshop on Technology Problems for the Caribbean, Runaway Bay, Jamaica, Nov. 13-Dec. 10, 1983Also available in IDRC Digital Library: 1-4,6-11,13-20,22-2
    corecore