22 research outputs found

    Exploratory and Exploitative Knowledge Sharing in Interorganizational Relationships

    Get PDF
    A growing body of research investigates the role that organizational learning plays in generating superior firm performance. Researchers, however, have given limited attention to this learning effect in the context of long-term interorganizational relationships. This paper focuses on a specific aspect of learning, that is, explorative and exploitative knowledge sharing, and examines its impacts on sustained performance. We examine interorganizational design mechanisms and digitally-enabled knowledge representation as antecedents of knowledge sharing. The empirical context is dyadic relationship between a supply chain solutions vendor and its customers for two major classes of supply chain services. Our theoretical predictions are tested by using data collected from both sides of this customer-vendor dyad. The findings suggest that dual emphasis on exploration and exploitation is important for sustained relationship performance for customers. The customer evaluates balancing exploration and exploitation important whereas the vendor emphasizes only on exploitation

    Exploratory and Exploitative Knowledge Sharing in Interorganizational Relationships

    Get PDF
    A growing body of research investigates the role that organizational learning plays in generating superior firm performance. Researchers, however, have given limited attention to this learning effect in the context of long-term interorganizational relationships. This paper focuses on a specific aspect of learning, that is, explorative and exploitative knowledge sharing, and examines its impacts on sustained performance. We examine interorganizational design mechanisms and digitally-enabled knowledge representation as antecedents of knowledge sharing. The empirical context is dyadic relationship between a supply chain solutions vendor and its customers for two major classes of supply chain services. Our theoretical predictions are tested by using data collected from both sides of this customer-vendor dyad. The findings suggest that dual emphasis on exploration and exploitation is important for sustained relationship performance for customers. The customer evaluates balancing exploration and exploitation important whereas the vendor emphasizes only on exploitation

    Cybersecurity risk of interfirm cooperation: Alliance or joint venture?

    Get PDF
    Interfirm cooperation between two or more firms is undertaken to create value jointly. However, interfirm cooperation also entails risks. We focus on cybersecurity risks of interfirm cooperation. Two prominent governance modes for interfirm cooperation are: (i) non-equity alliances and (ii) equity alliances such as joint ventures (JVs). We explain why non-equity alliances are likely to increase cybersecurity risks of collaborators whereas JVs are likely to reduce them. We test these ideas in the context of hospital–physician group collaborations in the U.S. Hospital Industry during 2009-2017. The results indicate that hospitals using non-equity alliances for physician group collaborations are more likely to experience cybersecurity breaches. Hospitals that use JVs to govern physician group collaborations are less likely to experience cybersecurity breaches. We discuss the implications of these findings for IS research and practice

    A TETRAD-based Approach for Theory Development in Information Systems Research

    Get PDF
    Theory development and theory testing are two primary processes in social science research. Statistical methods and tools are used in various stages of these processes. Information systems researchers have employed many statistical methods and tools for theory testing. However, very few statistical approaches are known to help researchers with theory development. In this paper, we introduce TETRAD as a powerful approach to aid researchers in developing and discovering new theoretical relationships. We illustrate the TETRAD approach by re-analyzing data from two articles published in premier information systems journals. The results from the previous examples demonstrate that TETRAD is a useful tool for uncovering potential theoretical relationships, especially when prior knowledge of underlying theory bases is lacking. We demonstrate that TETRAD is an effective and powerful statistical tool that can assist researchers in the iterative process of theory development

    Fit and Social Construction in Knowledge Management Systems

    Get PDF
    This paper proposes a study of the effects of knowledge management systems (KMS) on individual and organizational performance. The study seeks to answer the following question: Which factors determine the impact of KMS on performance by individuals and groups? A model for KMS and performance is developed. This model takes the special characteristics of KMS into account, and extends the theory of task technology fit with concepts from adaptive structuration theory. The paper presents four key propositions that are to be tested through a survey: 1. Task-KMS fit will impact faithfulness of appropriation; 2. Consensus on appropriation will impact faithfulness of appropriation; 3. Faithfulness of appropriation will moderate the impact of task-KMS fit to performance; 4. Consensus on appropriation will impact KMS use. The study will compare existing models with a composite model, and will contribute to our general knowledge of KMS through an empirical study of their effect on performance

    The Critical Role of External Validity in Advancing Organizational Theorizing

    Get PDF
    The information systems field needs strong cumulative traditions to advance IS theory building and better explain real-world phenomena. Despite the hegemony of theory in our major journals and major improvements in methodology over the years, the field has yet to achieve strong cumulative traditions beyond a few limited areas. In this paper, we propose a methodology for building such traditions by relying on the framework of external validity that Shadish, Cook, and Campbell (2002) suggest. Our methodology classifies accumulated knowledge into four types, highlights several evolutionary pathways for theory building, and explains how researchers can apply it to extend their own theory. To examine the appropriateness of our typology of accumulated knowledge across the IS and management fields, we conducted a literature review of the empirical research in major IS and management journals over a recent two-year period and coded it according to relevant characteristics of Cronbach’s UTOS (i.e., units, treatments, outcomes, and settings). The technology acceptance model, IS success model, and resource-based view literatures illustrate how to apply the methodology. This evidence leads us to believe that establishing a cumulative tradition is well within the IS community’s grasp

    How CIOs Can Align IT Capabilities for Supply Chain Relationships

    Get PDF
    Despite continued rapid growth in the outsourcing of supply chain services, longterm relationships between vendors and customers are challenged by the need to create sustainable value from the relationship. Our research suggests that the ability of client firms to align their collaboration modes and IT capabilities with their objectives for the vendor relationship is critical for creating value from supply chain relationships. In this article, we describe four collaboration modes being used for supply chain relationships, how they are aligned with value creation objectives, and the IT capabilities needed to achieve them. Our findings are based on a survey of a major supply chain vendor and 238 of its long-term customers, as well as interviews with IT and business executives responsible for over 100 long-term relationships

    Overcoming the Mum Effect in IT Project Reporting: Impacts of Fault Responsibility and Time Urgency

    Get PDF
    The mum effect ?a project member\u27s reluctance to report bad news about a troubled project ?has been recognized as an important contributor to project failure. While there are many potential factors that can influence the mum effect, in this study we focus on two factors that are particularly important in today\u27s software development environment: (1) the issue of fault responsibility that arises in the context of outsourced IT projects that involve an external vendor, and (2) the issue of time urgency, which has become more important as firms seek to compete on Internet time, developing and delivering applications with greater speed than ever before. We draw upon the basic whistle-blowing model adapted from Dozier and Miceli (1985) to examine how fault responsibility and time urgency ultimately affect a project member\u27s IT project reporting decision. Based on the results of a controlled laboratory experiment, we confirmed that the basic whistle-blowing model holds in an IT project context and found that both fault responsibility and time urgency can have significant effects on an individual\u27s willingness to report bad news. Fault responsibility exerts both direct and indirect influence on willingness to report bad news, while time urgency was found only to exert an indirect influence on willingness to report bad news. One implication of our study is that when fault responsibility rests with an outside vendor, this can actually increase the probability that a client employee will report the bad news to his or her management, provided that the vendor is not able to hide the problem entirely from the client organization. With respect to time urgency, our results suggest that managers may be able to increase individuals\u27 willingness to report by emphasizing that there is a narrow window of time to correct defects before a project is delivered and the impacts of defects start to be felt. Contributions and directions for future research are discussed
    corecore