scispace - formally typeset
Search or ask a question

Showing papers in "Communications of The Ais in 2000"


Journal ArticleDOI
TL;DR: The article presents a running example which analyzes the same dataset via three very different statistical techniques and compares two classes of SEM: covariance-based SEM and partial-least-squaresbased SEM, and discusses linear regression models and guidelines as to when SEM techniques and when regression techniques should be used.
Abstract: The growing interest in Structured Equation Modeling (SEM) techniques and recognition of their importance in IS research suggests the need to compare and contrast different types of SEM techniques so that research designs can be selected appropriately. After assessing the extent to which these techniques are currently being used in IS research, the article presents a running example which analyzes the same dataset via three very different statistical techniques. It then compares two classes of SEM: covariance-based SEM and partial-least-squaresbased SEM. Finally, the article discusses linear regression models and offers guidelines as to when SEM techniques and when regression techniques should be used. The article concludes with heuristics and rule of thumb thresholds to guide practice, and a discussion of the extent to which practice is in accord with these guidelines.

5,688 citations


Journal ArticleDOI
TL;DR: This article examines a variety of infrastructures that provide access to scientific knowledge and assesses their impact on the way that scientists will create, organize and integrate knowledge and illustrates how online content may become more adaptive and structured.
Abstract: Scientific knowledge is increasingly being stored online. A large number of infrastructures that provide access to scientific knowledge are now available on the Internet. They range from online journals to collaboratories and logic servers. This article examines a variety of such infrastructures and derives implications for their further evolution. It assesses their impact on the way that scientists will create, organize and integrate knowledge. In parallel, the article illustrates how online content may become more adaptive and structured. The text consists of individually marked sections that are assembled dynamically to the needs of each reader on different levels of detail.

1,182 citations


Book ChapterDOI
TL;DR: The strategic alignment maturity assessment is introduced, based on the authors’ research and consulting experience, that identified the major enablers and inhibitors in the achievement of business-IT alignment and the methodology that leverages the most important enabler and inhibitors.
Abstract: Business and IT practitioners, researchers, and consultants have been asking for an effective tool to assess IT-business alignment. Until now, none was available. This chapter introduces the strategic alignment maturity assessment. This assessment tool is based on the authors’ research and consulting experience that identified the major enablers and inhibitors in the achievement of business-IT alignment and the methodology that leverages the most important enablers and inhibitors. Alignment focuses on the activities that management performs to achieve cohesive goals across the IT (information technology) and other functional (e.g., finance, marketing, H/R, manufacturing) organizations. Therefore, alignment addresses both how IT is in harmony with the business, and how the business should/could be in harmony with IT. Alignment evolves to a relationship where IT and business adapt their strategies together. Achieving alignment is evolutionary and dynamic. IT requires strong support from senior management, good working relationships, strong leadership, appropriate prioritization, trust, and effective communication, as well as a thorough understanding of the business and technical environments. Achieving and sustaining alignment demands focusing on maximizing the enablers and minimizing the inhibitors. The purpose of this chapter is to discuss an approach for assessing the maturity of the business-IT alignment. Once the maturity is understood, an organization can identify opportunities for enhancing the harmonious relationship of business and IT. INTRODUCTION Decades have passed. Billions of dollars have been invested on information technology (IT). Today, every organization is in the information business. Alignment — applying IT in an appropriate and timely way, in harmony with business strategies, goals and needs — remains a key concern of business executives. This This chapter appears in the book, Strategic Information Technology: Opportunities for Competitive Advantage by Raymond Papp. Copyright © 2001, Idea Group Publishing. 701 E. Chocolate Avenue, Hershey PA 17033-1117, USA Tel: 717/533-8845; Fax 717/533-8661; URL-http://www.idea-group.com ITB7957 IDEA GROUP PUBLISHING

996 citations


Journal ArticleDOI
TL;DR: This tutorial puts put these business and technology innovations into historical context and relates them to one another through the unifying concepts of business integration and systems integration.
Abstract: The last decade or so spawned a host of business and technology innovations. On the business side, we saw business process reengineering, the management philosophies of customer relationship management and supply chain management, virtual organizations, electronic commerce, and business-tobusiness trading exchanges. On the technology side, we saw client-server computing, enterprise resource planning systems, the widespread adoption of Internet protocols, intranets and enterprise information portals, software package support for customer relationship management, supply chain management and other activities related to electronic business, and applications service providers. This tutorial puts put these business and technology innovations into historical context and relates them to one another through the unifying concepts of business integration and systems integration. One theme of the tutorial is the incomplete linkage between business integration and systems integration. Another is the imperfect relationship between the management philosophies of customer relationship management, supply chain management and electronic

224 citations


Journal ArticleDOI
TL;DR: This case describes Geneva Pharmaceuticals’ journey through the first two of three phases of R/3 implementation from mid-1997 to mid-2000, and the company’s plans for Phase III (scheduled for completion by late-2000).
Abstract: Faced with intense competition in the generics drugs industry, eroding margins, and continuous price pressures, Geneva Pharmaceuticals, the North American subsidiary of Novartis International AG, made a bold, multi-million dollar decision to reengineer all its demand and supply processes using the SAP R/3 system. This case describes Geneva’s journey through the first two of three phases of R/3 implementation from mid-1997 to mid-2000, and the company’s plans for Phase III (scheduled for completion by late-2000). It highlights initial mistakes during this journey, strategies that helped overcome those mistakes, and how R/3 delivered operational efficiencies and competitive advantage under difficult business circumstances. As the case illustrates, ERP implementation is much more than technology change, it also incorporates substantive process and people changes; and without appropriate change management strategies and experienced leadership, ERP projects are likely to fail.

205 citations


Journal ArticleDOI
TL;DR: The MSIS 2000 model curriculum as mentioned in this paper is the official text of the MSIS model curriculum as approved by both the Association for Computing Machinery (AAM) and the Association of Information Systems (AIS).
Abstract: Editor’s Note: This article contains the official text of the MSIS 2000 model curriculum as approved by both the Association for Computing Machinery and the Association for Information Systems. It is presented here in its original form. CURRICULUM

194 citations


Journal ArticleDOI
TL;DR: It is concluded that knowledge management is truly a new idea, not a recycled concept, and a framework of KM is outlined that articulates the basic terms of this perpetual process.
Abstract: Reading recent knowledge management (KM) articles, one cannot escape the impression of a recycled concept Definitions of the new field look remarkably like those of information systems, decision support systems, and even data management of the past Since we believe KM is essentially new, a refined articulation of KM is desirable Our point of departure is the observation that yesterday’s data are today’s information, which will become tomorrow’s knowledge, and knowledge, in turn, recycles down the value chain back into information and into data We outline a framework of KM that articulates the basic terms of this perpetual process The proposed model defines operations and transformations of data-to-information, information-to-knowledge, and their reverse order Such transformations correspond to a time dimension of pastpresent-future and resemble the process of abstraction Based on our analysis, we conclude that knowledge management is truly a new idea, not a recycled concept

184 citations


Journal ArticleDOI
TL;DR: Investigation of the number of publications that appear in a set of top-tier IT journals by both individual author and institution finds that achieving tenure is more important than the quality of the research.
Abstract: Scholarly research continues to be a significant component of a faculty member’s portfolio. The evaluation of the quality and quantity of that research is becoming increasingly important for tenure and promotion decisions and post-tenure reviews. Using surveys, several recent articles attempted to rank or group IT journals by quality perceptions. This study extends these previous studies by considering the quantity dimension of scholarly research by investigating the number of publications that appear in a set of top-tier IT journals by both individual author and institution. Data is presented on the most prolific publishers and the most productive IS departments in publishing in these "premier" journals. 1223 authors from 389 different universities were published with an average of 1.41 authors per IS article. Only three non-U.S. universities (National University of Singapore, Queen's University, and University of British Columbia) are in the top 24 publishing universities. 73% of researchers who published in these "premier" journals publish less than one adjusted count article in a top-tier journal in 5 years using the adjusted count. Only 49 authors had their names on 5 or more top-tier IS articles in 5 years leading to the conclusion that achieving tenure

75 citations


Journal ArticleDOI
TL;DR: A number of challenges to SISP are noted which relate to identified categories, through an ‘IS complexity framework’, of reviewing benefits, managing business change, and assessing organisational competencies for sustainable competitive advantage.
Abstract: A number of well-documented, fundamental assumptions are associated with strategic information systems planning (SISP). A core activity for this domain is the alignment of an organisations systems and technology strategy with its business objectives. The difficulty is the complex and diverse nature of the strategy process itself that renders such a match increasingly problematic. The evidence within the literature relating to SISP suggests that it does not fully mirror contemporary business strategy and contains some fundamentally incorrect assumptions. This paper identifies eight such assumptions that propose a number of challenges for future research directions. Case examples are also presented which reflect the issues posed for exploiting the value of Information Technology (IT) as a strategic opportunity given the approaches adopted for SISP. Finally, a number of challenges to SISP are noted which relate to identified categories, through an ‘IS complexity framework’, of reviewing benefits, managing business change, and assessing organisational competencies for sustainable competitive advantage.

72 citations


Journal ArticleDOI
TL;DR: The academic philosophies of ethical theory are introduced, followed by detailed treatment of four fundamental issues: codes of ethics, intellectual property rights, professional accountability and data protection.
Abstract: In the Information Systems discipline, increasing attention is being paid to the issue of professional ethics In this article, a personal perspective on the topic is offered The academic philosophies of ethical theory are introduced, followed by detailed treatment of four fundamental issues: codes of ethics, intellectual property rights, professional accountability and data protection The intention of the article is to arouse the interest of IS professionals and to stimulate debate Through a discussion, future developments in the professionalism of information systems are explored, and questions are raised concerning the way in which information systems is regulated, and the role it may play in the future

50 citations


Journal ArticleDOI
TL;DR: An underlying theme throughout is that the lack of conscious attention to the meaning of basic terms and points of reference may be a significant impediment to effective communication and to the authors' ability to make sense out of research findings and even journalistic anecdotes about what seemed to work or not work in particular situations.
Abstract: This article began as a response to an exchange of letters concerning the need for more vs. less user participation in IS projects. It grew into an exploration of whether and how ten 1999 CAIS articles use basic IS/IT terms with different meanings and connotations related to the different perspectives of their authors. The article characterizes differences between an IT perspective and a business perspective and categorizes the ten articles accordingly. It then presents numerous quotes from the articles to illustrate differences across the articles in terms of their use of eight basic concepts: system, user, stakeholder, IS project, implementation, reengineering, requirements, and solution. To help understand the differences and their significance, the article makes extensive use of distinctions between work systems, information systems, and projects. When applied to the articles these distinctions raise questions such as whether the term “system” refers to a work system, information system, or software, and whether the term “user” refers to hands-on users, people who receive information, or managers whose organizations use information systems. An underlying theme throughout is that the lack of conscious attention to the meaning of basic terms and points of reference may be a significant impediment to effective communication and to our ability to make sense out of research findings and even journalistic anecdotes about what seemed to work or not work in particular situations.

Journal ArticleDOI
TL;DR: This tutorial examines the issues surrounding online groceries and looks closely at fourteen examples from the Americas, Europe, and Australia, describing key online grocery firms including Peapod, NetGrocer, Streamline, WebVan, Ruok@Net, Albert Heijn, Disco, Ykkoshalli, Shoplink, Coles and Woolworths.
Abstract: The grocery industry evolved from mom-and-pop stores to mega-markets to online grocery buying, with many different forms along the way. The global market for groceries in 2000 is over $2 trillion. The online grocery segment of the market is expected to reach $34 billion by 2002, a thirty-three fold increase from 1998. This tutorial examines the issues surrounding online groceries and looks closely at fourteen examples from the Americas, Europe, and Australia. The online market is currently one of growth, not profits. Two key components of profitability for online vendors are the ability to generate sufficient volume, while keeping delivery costs low. The Internet also impacts business-tobusiness relations among grocers. This tutorial describes key online grocery firms including Peapod, NetGrocer, Streamline, WebVan, Ruok@Net, Albert Heijn, Disco, Ykkoshalli, Shoplink, Coles and Woolworths. Each of these companies represents different business models, with differing organizational structure and scope of operations. Each has its own set of strengths and

Journal ArticleDOI
TL;DR: It is observed that while electronic commerce grows rapidly it is, at the same time, based on unsettled foundations, and this article describes how 22 constraints for global electronic commerce were identified, and analyzes them in depth.
Abstract: This article introduces an electronic commerce paradox by observing that while electronic commerce grows rapidly it is, at the same time, based on unsettled foundations. It describes how 22 constraints for global electronic commerce were identified, and analyzes them in depth. The constraints fall into four themes: • Building trust for users and consumers • Establishing ground rules for the digital marketplace • Enhancing information infrastructure • Maximizing benefits. Each of these themes contains a number of critical issues. The first theme--building trust for users and consumers--involves privacy protection, security, consumer protection, authentication and confidentiality, and access blocking. The second theme includes legal framework, acceptance of electronic transactions, taxation, tariffs, intellectual property protection, commercial policy, and payment systems. Enhancing information infrastructure covers the needed infrastructure enhancements and includes Internet infrastructure and governance, interconnectivity and technical convergence, technical standards, bandwidth and accessibility, and the question of how to further the competition. The last theme is about maximizing the benefits of electronic commerce and includes the understanding of digital economy, its measurement, seamless globalization, and involvement of small businesses. At the time that this paper

Journal ArticleDOI
TL;DR: This study establishes, for the first time, a taxonomy of web site traversal patterns and structures, which will allow the organized study of the navigational aspects ofweb site design.
Abstract: As electronic commerce grows rapidly and web sites proliferate, the issue of web site design becomes increasingly important. An important aspect of web site design is the set of choices for traversing from one web site page to another and the ramifications that these choices have for establishing the overall flow patterns throughout the web site. This study establishes, for the first time, a taxonomy of web site traversal patterns and structures, which will allow the organized study of the navigational aspects of web site design. It also points out the ramifications of key structures. Finally, it describes how the use of traversal patterns and structures can achieve web sites that range from loose to tight control of the end-users’ experience in visiting the web site.

Journal ArticleDOI
TL;DR: Some common assumptions underlying much IS research are critically examined, including the scope and risks of IT projects, the rationales for and uses of IT, and the role of history and time in systems-related outcomes.
Abstract: This paper, originally prepared as a keynote address for the 1999 Australasian Conference on Information Systems, critically examines some common assumptions underlying much IS research. The assumptions concern the scope and risks of IT projects, the rationales for and uses of IT, and the role of history and time in systems-related outcomes. Making different assumptions about these issues suggests the need for new approaches to IS research.

Journal ArticleDOI
TL;DR: A model, called the Digital Rosetta Stone, is created that provides a methodology for maintaining long-term access to digital documents and provides a method for overcoming access difficulties due to technological obsolescence.
Abstract: In the past several decades, and at an increasing pace, many records that used to be stored on paper have been stored digitally on computer information systems, instead. As older technologies are replaced by newer generations of hardware and software, new schemes for storing and coding the data are introduced. Because of the rapid evolution of technology, future digital systems may not be able to read and/or interpret the digital records made and stored on these older systems, even if those records are still in good condition. We are losing the knowledge of how the old systems stored and coded information. Increasingly, therefore, when we attempt to access and recover those aging documents, we will find that we no longer have the necessary information to do that. This paper addresses the problem of maintaining long-term access to digital documents and provides a methodology for overcoming access difficulties due to technological obsolescence. We created a model, called the Digital Rosetta Stone, that provides a methodology for maintaining long-term access to digital documents. The underlying principle of the model is that knowledge preserved about different storage devices and file formats can be used to recover

Journal ArticleDOI
TL;DR: In this paper, a framework for classifying practices for managing knowledge based on their roles in problem solving is proposed, which improves the ability of organizations to learn and adapt to changing environments.
Abstract: Organizations increasingly focus their efforts on knowledge management practices to foster the creation, sharing and integration of knowledge. This paper proposes a framework for classifying practices for managing knowledge based on their roles in problem solving. By integrating these practices through three value-added processes (identification, preservation and distribution), organizations improve their ability to learn and adapt to changing environments. Innovative business models that include these knowledge management processes should help organizations prosper in the face of rapid, complex change.

Journal ArticleDOI
TL;DR: Assessment of the current state of the IS field in terms of the strengths, weaknesses, opportunities, and threats facing the discipline leads to doable recommendations for the field: work on branding IS and strive for more consistency in IS courses across universities.
Abstract: Fourteen deans of business schools were interviewed to obtain their assessment of the current state of the IS field in terms of the strengths, weaknesses, opportunities, and threats facing the discipline Their observations are organized into nine categories: (1) interaction with the business community, (2) demand for IS courses, (3) identity of the IS field, (4) cross disciplinary nature of the field, (5) research rigor versus relevance, (6) competitors to IS, (7) cost of information technology, (8) shortage of IS faculty, and (9) shortage of IS leaders These findings are compared with those from an earlier study with leaders in the IS academic field The differences in perspectives have implications and lead to doable recommendations for the field: (1) work on branding IS, (2) strive for more consistency in IS courses across universities, (3) help provide hardware and software resources, and (4) create an electronic journal that publishes technical research

Journal ArticleDOI
TL;DR: A question was posted on ISWorld, asking: “Do you or your IS program have any unique, interesting ways that you are interacting with the business community?” over 50 people responded with interesting and successful activities.
Abstract: A question was posted on ISWorld, asking: “Do you or your IS program have any unique, interesting ways that you are interacting with the business community?” Over 50 people responded with interesting and successful activities The activities can be grouped into six categories: (1) student-centered initiatives, (2) instruction-centered initiatives, (3) externally funded, high tech laboratories, (4) research-centered initiatives, (5) faculty/student/practitioner interactions, and (6) new business ventures The activities in each of these categories are described

Journal ArticleDOI
TL;DR: The purpose of this tutorial is to present the fundamental concepts of cycle time reduction and to show how IS can be used to reduce cycle time, increase customer service, and reduce costs significantly.
Abstract: Increasingly organizations compete based on time. As a result, cycle-time reduction is a key agenda for organizations interested in achieving increased customer service and reduced cost. With improved cycle time, organizations can often eliminate or reduce inventory while expanding customer service offerings. The purpose of this tutorial is to present the fundamental concepts of cycle time reduction and to show how IS can be used to reduce cycle time, increase customer service, and reduce costs significantly. The tutorial examines several organizations that used IS as a way to leverage cycle time for competitive advantage.

Journal ArticleDOI
TL;DR: This tutorial presents an overview of the major categories of Web site attacks, their effects, and possible countermeasures, and provides a basic understanding of the issues, the techniques, and the nomenclature used.
Abstract: This tutorial presents an overview of the major categories of Web site attacks, their effects, and possible countermeasures. The focus is the Web security necessary for a reasonable guarantee of secure e-commerce. The tutorial is intended for those who have little or no knowledge of Web security and its importance to e-commerce. It provides a basic understanding of the issues, the techniques, and the nomenclature used. An annotated bibliography points the reader to additional sources on specific topics.

Journal Article
TL;DR: The MSIS 2000 model curriculum as approved by both the Association for Computing Machinery and the association for Information Systems is presented here in its original form.
Abstract: Editor’s Note: This article contains the official text of the MSIS 2000 model curriculum as approved by both the Association for Computing Machinery and the Association for Information Systems. It is presented here in its original form. CURRICULUM

Journal ArticleDOI
TL;DR: Five metaphors for the field of IS itself are described and from these metaphors a set of challenges for IS researchers and practitioners is proposed.
Abstract: As we enter the 21 Century, we are confronted by waves of new technology and pressured by competitive forces to find the most effective and efficient uses of information systems (IS) in organizations. Periodically, it is useful to stand back and take a look at the IS field from a variety of perspectives. These perspectives create “images” of IS that offer the potential of generating new insights into the field as it moves forward. These “images” are created through the lens of metaphors. Metaphors have been used in IS to help explain many of its central concepts from systems development methodologies to human-computer interaction. This paper describes five metaphors for the field of IS itself. From these metaphors a set of challenges for IS researchers and practitioners is proposed.

Journal ArticleDOI
TL;DR: It is forecast that variances in geography, culture and psychology will limit the extent to which IT can be used to manipulate the balance of power in the industry in the shortto medium-term, and it is expected that a uniform industry structure will prevail in the long-run.
Abstract: Rapid advances in technology profoundly affect the way businesses are conducted and the way industry structures evolved. The air travel distribution industry experienced two major technology waves in its evolution, the Computer Reservations System (CRS) and electronic commerce. This paper considers various frameworks used to explain structural features of the US air travel distribution industry and the competitive forces within it. We then describe the historical context within which the structural changes occurred as a result of IT innovations. The current and relative strengths of the industry forces are examined to explain an IT-induced power shift in the industry. We then consider the impact of IT on the air travel distribution industry in the Asia-Pacific region. Based on a comparison with the US experience, we forecast that variances in geography, culture and psychology will limit the extent to which IT can be used to manipulate the balance of power in the industry in the shortto medium-term. We expect, however, that a uniform industry structure will prevail in the long-run.

Journal ArticleDOI
TL;DR: This study sets out to examine where the HBCU’s are in comparison with other institutions, and attempt to explain why the institutions are placed in this category.
Abstract: As educational institutions seek to maintain high quality of their course offerings while maintaining steadily growing number of graduates in the new American economy, a natural trend is a readiness to embrace information technology as a method of curriculum delivery. Many U.S institutions find Distance Learning as a means of striking this balance between quality and demand. For them, evidence exists that Distance Learning might well be what is needed to assure that extraneous factors such as location, work schedule, current work load and family pressures would not prevent an otherwise able and willing student from completing a college degree program. With the growing digital divide between the nation’s mainstream population and the African American population, an issue rightly becoming a focal point for today’s policy makers, it becomes necessary to explore the extent to which the Historically Black Colleges and Universities (HBCU’s) have embraced Distance Learning (D/L), given that D/L is fast becoming a norm as a supplemental education delivery method in other American universities. This study sets out to examine where the HBCU’s are in comparison with other institutions, and attempt to explain why the institutions are placed in this

Journal ArticleDOI
TL;DR: The article examines the process history and assesses the decisions taken and activities carried out in the early formative stages of a field research project in the area of knowledge management and describes the ins and outs of the various phases of the research process in a narrative experiential way.
Abstract: To understand how to improve the research process for future projects, it is useful to take a retrospective view of a research project This is especially true for emerging topics in IS where many opportunities are available to shape directions and priorities This article presents a reflective analysis of a field research project in the area of knowledge management The article examines the process history and assesses the decisions taken and activities carried out in the early formative stages of a field research project With a detailed anthropological flavor, the paper describes the ins and outs of the various phases of the research process in a narrative experiential way, and analyzes what was learned The results should be useful for future researchers The major lessons learned were: 1 Retrospectively examining the research of others can be useful in learning how to improve one's ability to do research in a particular area, such as field research in information systems 2 Researchers wishing to develop a long term relationship with a host organization may have to be flexible in their research approaches and Communications of AIS Volume 3, Article 6 3 Designing Field Research for Emerging IS Topics: The Case of Knowledge Management by IV Eriksson, GW Dickson, and O A El Sawy methods, even to the extent of sacrificing rigor for providing outcomes of use to the host organization 3 Pilot studies should be carefully designed and executed to maximize learning for later, more extensive studies

Journal ArticleDOI
TL;DR: A contemporary history of microcomputer spreadsheets based on primary and secondary sources is presented.
Abstract: In 1978, the first microcomputer spreadsheet program was developed. Since then spreadsheets have become widely used as productivity software for business and home computer users. Many of today’s MIS faculty members use a variety of spreadsheet programs, but the origins and evolution of this product category is of on-going interest to students, managers and MIS faculty. This article is a contemporary history of microcomputer spreadsheets based on primary and secondary sources.


Journal ArticleDOI
TL;DR: The article discusses the Management of Information Technology course and presents a set of pedagogical principles, including a discussion of the appropriate role of technology in executive MBA courses and a detailed generic course syllabus.
Abstract: By combining knowledge management concepts with standard MBA course elements (technology, applications, systems development, and IT management), explicit and tacit knowledge can be created and diffused within the Management of Information Technology course designed for executive MBA students. The article, based on lessons learned over a ten-year period, discusses the course and presents a set of pedagogical principles. The paper includes a discussion of the appropriate role of technology in executive MBA courses and a detailed generic course syllabus.