39 research outputs found
The adoption of data spaces: Drivers toward federated data sharing
Data spaces have gained increasing attention, as they allow federated data sharing among and within participants of interoperable data spaces, for the benefit of all. However, data space initiatives are few in number; moreover, data space adoption among organizations is low. Research thus far has mainly focused on technical factors but lacks a more holistic approach that clarifies what drives data space adoption and federated data sharing as main functions. This exploratory study aims to fill this research gap; it identifies 12 drivers developed by 28 interviewed experts, discussing the coding techniques that are most frequently used in grounded theory. The identified drivers contribute to the current knowledge, while also potentially informing data space projects and organizationsâ decisions regarding data space adoption
The Role of Social Media for Stakeholder Involvement: A Literature Review
Social media has found its place in the digital economy. Social media tools offer easy, interactive and cost-efficient possibilities to interact with various stakeholders. Not only the mere availability of social media tools but also their implementation renders benefits to an organization. Consequently, evidence from practice indicates that social media is an appropriate way to establish stakeholder involvement; however, current research is ambiguous, lacking a comprehensive approach to social media stakeholder involvement. Thus, the question addressed targets the underlying concepts in research on social media for stakeholder involvement. Conducting a literature review based on a final sample size of 70 peer-reviewed papers, our findings deliver insight into three main research directions and nine different concepts addressed by the literature. The results may function as a starting point for further research into the field of structured stakeholder involvement
Are Customer Service Offerings Influencing E-Loyalty? A Graphical Chain Model Approach in the Austrian Mobile Phone Service Provider Industry
Customer loyalty is seen as one of the key factors of a companyâs success. According to current research results, a necessary premise among others to gain customer loyalty is how the customers perceive the customer service. In the field of B2C e-commerce online customer support areas are used to fulfill parts of this support duty. It is an open question how big the impact of the online customer support on the customer loyalty is. The goal of this paper is to determine, which factors are influencing e-loyalty significantly. Two factors are used to measure loyalty: positive word-of-mouth and switching probability. In the first part a brief overview of the actual scientific work and recent research results are given. After this, the methods and data acquiring steps are described. The results of the so gained data are presented and interpreted. Based on these results, the conclusion and further research recommendations complete this work
Differentiating Privacy and Security: A Content Analysis of B2C Websites
Privacy and security are important topics in research and business. This work on one hand offers a way to differentiate thesetwo topics and provides information about different privacy regulations already existing in Europe and the US. We clarifydefinitions of information privacy and state that privacy and security are not the same, although most companies do notdifferentiate. A content analysis conducted in 2008 and 2011 of B2C-companiesâ websites is used to demonstrate howinterweaved these two terms and the representation of terms and conditions (T&C) are presented. The data is analyzed interms of numbers, how often links to the topics exist; positioning, where these links are located on the web pages; andidentifiers, which represent the topics privacy, security, and T&C. Based on this information, the relation between privacy,security, and T&C is analyzed and interpreted
Adoption of data spaces as multi-sided platforms: Towards a preliminary adoption framework
Organizations recognize the strategic value of data and explore diverse means of harnessing its potential. Opportunities for data sharing and collaboration via platforms have been discussed. Among these platforms, data spaces, as multi-sided platforms, have gained prominence. Yet, the motivations behind their adoption by organizations remain unclear. Existing literature primarily delves into technical aspects, neglecting socio-organizational considerations. Recognizing the influence of socio-organizational factors in information system adoption, our study addresses this gap. Through a structured literature review, we identify 15 adoption approaches and corresponding factors, spanning individual and organizational levels. Thus, allowing us to derive a preliminary data space adoption framework
Data as the New Currency - An Empirical Study Using Conjoint Analysis
Since data and information are becoming important factors in competitiveness in the digital age, organisations tend to have an enormous appetite for data. However, users are becoming increasingly reluctant to provide their data without receiving some benefits. Therefore, it is necessary to identify the extent to which consumers are willing to protect their data by paying for the use of a service with money or with data. This study investigates willingness to pay for an online service by examining both money and data as currency (i.e. the usersâ privacy costs). Furthermore, this study is an empirical investigation that uses conjoint analysis to determine whether different service types show different preferences and which characteristics are decisive. The findings show that the online service used has an impact on whether people pay with money or their data
INFORMATION SYSTEMS AND STAKEHOLDER ENGAGEMENT â FIRST RESULTS FROM CONTENT ANALYSIS
True and long-lasting stakeholder relationships have been identified as precondition for long-term success of companies. Thus, companies put a lot of effort into communication with stakeholders and stakeholder engagement. Consequently, the possibilities to communicate with stakeholders to involve them in environmental, social and economic projects of companies has been widely discussed. However, the various stakeholders (internal and external, primary and secondary) influence companies in different ways. Information systems support the stakeholder engagement and allow specific communication in accordance with various stakeholders needsâ, but to date a clear picture on their application is missing. Our work investigates this gap and serves as a starting point for better understanding on how information systems support stakeholder engagement. We select CSR reports from a reporting database and analyse them in terms of information systems involved in the stakeholder engagement process. Based on this we will develop a âlandscapeâ of information systems support for stakeholder engagement. First results presented in this work-in-progress paper are based on a limited number of reports suggest that information systems mainly support communication with external stakeholders, whereas direct face-to-face communication predominates internal stakeholder engagement. Overall, information technology (such as the Internet) prevails compared to application of specific information systems
GRES-IT Workshop Proceedings
Series: Working Papers on Information Systems, Information Business and Operation
The Role of SOCs for Critical Infrastructure Providers
Cyber security is a challenge for all organizations and companies, especially for those classified as critical infrastructure providers, such as hospitals and energy providers. Attempts to prevent or fight against cyberattacks are various., Therefore, critical infrastructure providers remain searching for an institutionalized solution. Security operation centers (SOCs) seem to offer an opportunity to tackle this issue, but to date, it remains unclear, what influenced the implementation of a SOC. Directly bound to cyber security and business continuity management, the strategic role of SOCs has been addressed, previously. The role that SOCs play for critical infrastructure providers still needs to be clarified. Our case study shows, that decisions for implementing a SOC are influenced by different perspectives, i.e., strategic, socio-technical, and solution-implementation perspectives. All three perspectives share factors with existing cyber security research but also give new insights, particularly regarding the social aspects of SOC staff and the fact that businesses are in favor of an outsourced SOC to benefit from shared resources, reduced costs and skilled staff