114 research outputs found

    Me, You and AI – Managing Human AI Collaboration in Computer Aided Intelligent Diagnosis

    Get PDF
    This research-in-progress paper focuses on examining configurations of collaboration between physicians and AI in decision making. From prior literature, we know that complex decisions in hospitals are the result of a collaborative decision-making process among physicians in a team. However, research from an information systems (IS) perspective in this area has so far focused on individual’s interactions with AI, while collaboration in decision-making for complex clinical cases reflects common practice also in technologically supported environments. Therefore, we aim to shed light on the question “which configuration of human AI collaboration in decision making is most recommendable for AI-enabled systems?” We plan to conduct a scenario-based experiment to investigate accuracy, speed, and satisfaction with various configurations of physician AI collaboration in the context of computer-aided intelligent diagnosis (CAID) systems. Our primary contribution will be a multidimensional evaluation of selected collaboration configurations aimed at improving healthcare with technology

    Value Appropriation Strategies for Interorganizational Data Sharing – a Case Study

    Get PDF
    Interorganizational data sharing (IODS) grows increasingly complex in the context of business ecosystems. As the literature on IODS finds that organizations only share data if they perceive benefits from it, this study explores value appropriation strategies (VAS) through an ongoing inductive case study of the German orthopedic ecosystem, exploiting interview and secondary data from executives of various treatment facilities and a leading manufacturer of health products. Our preliminary grounded theorizing indicates that VAS for IODS involve four elements (partner selection, data tailoring, reciprocal design, and control enforcement) that each are realized by specific VAS activities. Further, we find that, different from other contexts, ensuring VAS for IODS is not about controlling the value creation process but is grounded in upstream strategic decisions. This understanding of VAS for IODS indicates that having strategies for value appropriation in place before diving into IODS is crucial for succeeding in data ecosystems

    Risk compensation behaviors on cascaded security choices

    Get PDF
    Organizations are interested in improving information security and make use of a range of technical, organizational, or behavioral measures. The different approaches to improving information security must not be viewed as being isolated, instead, different measures might influence each other. Security efforts fail when technical measures influence human behavior in a way that their security perceptions and behaviors are altered to the disadvantage of the security outcome. Those unintended consequences of information security practices can be classified as risk compensation behaviors, describing how users become more careless when they perceive some level of protection. This research in progress is interested in understanding risk compensation behaviors for cascaded security choices by different actors (e.g., security decisions made by organizations vs. decisions made by individuals) and presents a lab experiment to test this issue

    Multichannel integration services: Consumer decision making in integrated sales channels

    Get PDF
    As digitalization and technological innovations have blurred the line between physical and electronic channels, enormous growth rates in internet use have motivated most established retailers to expand their business to include online sales. These multichannel retailers are now under severe pressure from pure online retailers, since their physical infrastructure decreases their ability to compete via prices. While this infrastructure could also present opportunities to differentiate themselves by offering integrated multichannel services, their appeal is not fully understood by either researchers or practitioners. Building upon previous studies in online and offline commerce, this study investigates and explains the impact of different multichannel integration services on consumers’ channel selection preferences. The results indicate that the appeal of integrated multichannel offerings differs widely from the previously investigated channel options. Accordingly, channel convergence requires research to adapt to technological advancements and apply a more complex view to the study of multichannel commerce

    Interorganizational Data Sharing in Health Ecosystems - A Case Sudy

    Get PDF
    The integration of external data offers enormous potential for new and expanded value propositions for companies. However, organizations often refrain from sharing data as they expect detrimental consequences from it. This study provides insights into how organizations decide to share data within the ecosystem and what organizations can do to motivate other organizations within the ecosystem to share data with them. Using privacy calculus and ecosystems theory to sensitize a qualitative case study of the German orthopedic market, we derive three risks (weakening one’s position in the ecosystem, IT alignment investments, and penalties for data protection violations) as well as three benefits (increased value creation of the ecosystem, competitive advantage over other ecosystems, and gaining additional transactions) perceived by organizations considering to share data. Further, three strategies for obtaining data from other organizations are derived: mitigating the risks, emphasizing the benefits, and bypassing the calculus

    THE ROLE OF TECHNOLOGY FOR SERVICE INNOVATION IN SHARING ECONOMY ORGANIZATIONS – A SERVICE-DOMINANT LOGIC PERSPECTIVE

    Get PDF
    The role and influence of information technology related to business and value creation of a firm are discussed controversially. The question how technology can drive service innovations is especially crucial in highly competitive and quickly developing areas such as digital platforms – and at the same time not well understood. This study investigates the role of information technology for service innovation in sharing economy organizations. These organizations are digital platforms that conflate physical and digital service elements. Using a service-dominant logic perspective, we conduct an interpretive multiple-case study to gain a deeper understanding for types of service innovation in this area and the different roles that IT can play in these initiatives. Our findings reveal different areas for service innovation and thereby help identifying previously unexplored interdependencies between the service ecosystem and value co-creation. We furthermore find that organizations’ choices on the role of IT are dependent on the level of heterogeneity and standardization of the mediated transactions. We derive four archetypes for the role of IT in service innovation that serve to explain how and why IT is exploited sharing economy organizations. The findings are translated into practical guidelines for managers of digital platforms

    YES, FIRMS HAVE MY DATA BUT WHAT DOES IT MATTER? MEASURING PRIVACY RISKS

    Get PDF
    In their daily lives, individuals continuously encounter situations where they disclose personal infor-mation online. While individuals can largely benefit from personalized, convenient service offerings, many people are at the same time concerned about an invasion of their information privacy based on how organisations access and handle their data. Although we know that specific feared consequences shape our behaviour, little attention has been paid to which noticeable privacy risks can arise for in-dividuals when their privacy is invaded. We differentiate between seven types of negative consequences that individuals perceive if their privacy is invaded, namely physical, social, resource-related, psy-chological, prosecution-related, career-related, and freedom-related risks. In a comprehensive and rigorous scale development process, we validate scales for our multidimensional privacy risk construct following the approach of MacKenzie et al. (2011). Based on several steps of qualitative and quantitative assessment, we demonstrate the reliability, validity, and usefulness of our measurement instrument
    • …
    corecore