3,599 research outputs found

    Do Procedure Models Actually Guide Maturity Model Design? A Citation Analysis

    Get PDF
    More than a decade ago, guidelines for the development of maturity models were proposed in the form of procedure models. In theory, such procedure models provide scholars with guidance, but does the scientific community actually use them according to their intended purpose. This paper conducts a citation analysis and identifies an impressive number of citations. However, it is noteworthy that the publications are mainly cited for other reasons, such as the components or the general purposes of maturity models. The analysis also provides indications that many maturity models are developed without using a procedure model. Despite the fact that methodological rigor is considered a crucial criterion for publishing articles, maturity model designers might have concerns about using domain-specific procedure models. Future studies should address the reasons for this reluctance

    Information and communications technologies as an enabler of supply chain integration

    Get PDF
    This study is a meta-research analysis that examined the role of information and communication technologies (ICTs) as an enabler of supply chain integration. Our analysis covered 55 papers in 34 journals published between 2007 and 2017. RFID systems were the most investigated ICTs in the supply chain integration literature. Besides its impact as an independent variable, ICT’s mediating and moderating roles are also noteworthy. Our study has demonstrated the underutilization of theories in general, dominance of surveys and single case studies, and future research opportunities for the underutilized IS types in SCI. Based on the findings, we proposed a research framework. Our framework illustrated two types of moderating factors between the use of ICT and level of SCI: (1) ICT-related factors as an enabler of SCI, and (2) other factors as an enabler of SCI. ICT-related factors are suitability, criticality, and maturity of ICT; ICT capabilities of, and integration within, an organization; ICT integration with SC partners; and technological differences among available ICT applications. Other factors are availability of industry standards; open information-sharing environment; institutional pressures and organizational culture; and involvement of top management

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse

    Mobile Technology Deployment Strategies for Improving the Quality of Healthcare

    Get PDF
    Ineffective deployment of mobile technology jeopardizes healthcare quality, cost control, and access, resulting in healthcare organizations losing customers and revenue. A multiple case study was conducted to explore the strategies that chief information officers (CIOs) used for the effective deployment of mobile technology in healthcare organizations. The study population consisted of 3 healthcare CIOs and 2 healthcare information technology consultants who have experience in deploying mobile technology in a healthcare organization in the United States. The conceptual framework that grounded the study was Wallace and Iyer\u27s health information technology value hierarchy. Data were collected using semistructured interviews and document reviews, followed by within-case and cross-case analyses for triangulation and data saturation. Key themes that emerged from data analysis included the application of disruptive technology in healthcare, ownership and management of mobile health equipment, and cybersecurity. The healthcare CIOs and consultants emphasized their concern about the lack of cybersecurity in mobile technology. CIOs were reluctant to deploy the bring-your-own-device strategy in their organizations. The implications of this study for positive social change include the potential for healthcare CIOs to emphasize the business practice of supporting healthcare providers in using secure mobile equipment deployment strategies to provide enhanced care, safety, peace of mind, convenience, and ease of access to patients while controlling costs

    Analytical Study on Building a Comprehensive Big Data Management Maturity Framework

    Get PDF
    Harnessing big data in organizations today realizes benefits for competitive advantage. Generated profound insights are reflected in informed decision making, creating better business plans, and improved service delivery. Yet, organizations are still not recognizing how mature their big data management capabilities are. However, there is no structured approach to assess and build necessary capabilities for valuable big data utilizing, which draws a clear improvement pathway. Existing solutions lack a consistent perception of big data management capabilities, a reliable assessment, and a rigid improvement scheme. This paper contributes in building an analytical study on existing key works in assessing and building big data management capabilities. Drawing upon the results and gaps revealed from this analytical study, the main requirements for building a comprehensive big data management maturity framework are defined. This framework will enable organizations to assess and improve their current capabilities towards effective big data management.https://dorl.net/dor/ 20.1001.1.20088302.2022.20.1.13.

    A Conceptualization and Operationalization of Process Visibility Capabilities

    Get PDF
    Lately, a trend towards real-time, process-centric Business Intelligence & Analytics on the operational level has emerged. Although there are various systems such as BAM, BPI or CEP that claim to deliver visibility for operational processes, the underlying capabilities remain vague. To close this research gap we present a conceptualization and operationalization for process visibility capabilities. We use the results of a literature analysis and expert interviews for the conceptualization of the respective capabilities. The operationalization is based on existing literature and refined in two academic feedback sessions as well as one card sorting procedure with experts from practice. Our results contribute to a better understanding which capabilities create process visibility and provide a basis for future research

    Strategy for Implementation of the Security Maturity Model in e-Government Systems in Indonesia

    Get PDF
    The security maturity level of Indonesia's e-Government system needs to be evaluated to determine the current status of security implementations and to plan for overall system security improvements. In general, the maturity model describes how a system consisting of humans and devices performs their duties. These capabilities include effective leadership and governance, level of awareness of implementers, and capabilities of existing tools. This study aims to create a strategy in implementing the security maturity model in the e-Government system in Indonesia. The research method uses a mix method, namely qualitative and quantitative methods. The qualitative method aims to obtain the Critical Success Factors Implementation of the security maturity model, and the quantitative method is used to analyze the results of the Critical success factor validation using SPSS. The strategy for the Security maturity model is based on the PDCA (Plan-Do-Check-Act) Model

    Key activities for successful ventures scaling up

    Get PDF
    The generation of new business models and the renewal of competencies are crucial for mature companies’ survival in the long term. Corporate venturing is a recognized mechanism to ensure balancing exploration and exploitation activities in established corporations. Due to fundamental differences in business organizations and culture, and in risk taking behaviors, the integration of these new ventures in existing business units is difficult. A key factor, as well as one of the less studied, is to determine the venture readiness for the scaling up and the right moment to be incorporated in the existing business. Premature venture scaling up could provoke growth failure and reduced post-transition performance because of a number of unresolved market and technology uncertainties. On the contrary, when the corporate organization integrates the venture too late, the established business might miss its window of advantage position. Based on the results of an empirical study carried out in fifteen corporate venture innovation processes, we identified certain specific activities that will help determine the venture readiness and proper timing to scale up, and integrated the results of the empirical study with knowledge from extant literature, to develop a set of propositions for improving the success of the scaling up. These principles provide practical guidelines to improve corporate venture growth processes.Peer ReviewedPostprint (author's final draft

    Inter-organizational information systems adoption for service innovation in building sector

    Get PDF
    The building sector has experienced a significant decline in recent years in Spain and Europe as a result of the financial crisis that began in 2007. This drop accompanies a low penetration of information and communication technologies in inter-organizational oriented business processes. The market decrease is causing a slowdown in the building sector, where only flexible small and medium enterprises (SMEs) survive thanks to specialization and innovation in services, which allow them to face new market demands. Inter-organizational information systems (IOISs) support innovation in services, and are thus a strategic tool for SMEs to obtain competitive advantage. Because of the inherent complexity of IOIS adoption, this research extends Kurnia and Johnston's (2000) theoretical model of IOIS adoption with an empirical model of IOIS characterization. The resultant model identifies the factors influencing IOIS adoption in SMEs in the building sector, to promote further service innovation for competitive and collaborative advantages. An empirical longitudinal study over six consecutive years using data from Spanish SMEs in the building sector validates the model, using the partial least squares technique and analyzing temporal stability. The main findings of this research are the four ways an IOIS might contribute to service innovation in the building sector. Namely: a) improving client interfaces and the link between service providers and end users; b) defining a specific market where SMEs can develop new service concepts; c) enhancing the service delivery system in traditional customer?supplier relationships; and d) introducing information and communication technologies and tools to improve information management

    Leveraging Open-standard Interorganizational Information Systems for Process Adaptability and Alignment: An Empirical Analysis

    Get PDF
    PurposeThe purpose of this paper is to understand the value creation mechanisms of open-standard inter-organizational information system (OSIOS), which is a key technology to achieve Industry 4.0. Specifically, this study investigates how the internal assimilation and external diffusion of OSIOS help manufactures facilitate process adaptability and alignment in supply chain network.Design/methodology/approachA survey instrument was designed and administrated to collect data for this research. Using three-stage least squares estimation, the authors empirically tested a number of hypothesized relationships based on a sample of 308 manufacturing firms in China.FindingsThe results of the study show that OSIOS can perform as value creation mechanisms to enable process adaptability and alignment. In addition, the impact of OSIOS internal assimilation is inversely U-shaped where the positive effect on process adaptability will become negative after an extremum point is reached.Originality/valueThis study contributes to the existing literature by providing insights on how OSIOS can improve supply chain integration and thus promote the achievement of industry 4.0. By revealing a U-shaped relationship between OSIOS assimilation and process adaptability, this study fills previous research gap by advancing the understanding on the value creation mechanisms of information systems deployment
    corecore