scispace - formally typeset
Search or ask a question

Showing papers on "Information sharing published in 2004"


Journal ArticleDOI
TL;DR: A conceptual framework that relates information-integration initiatives to manufacturer profitability is developed that allows such initiatives to impact inventory management and revenue-enhancing measures that increase manufacturer profit margins, or affect profit margins directly.
Abstract: Information integration efforts between manufacturers and retailers, in the form of information sharing, synchronized replenishment, and collaborative product design and development, have been cited as major means to improve supply chain performance. This paper develops a conceptual framework that relates information-integration initiatives to manufacturer profitability. The framework allows such initiatives to impact inventory management and revenue-enhancing measures that, in turn, increase manufacturer profit margins, or affect profit margins directly. Through an extensive survey in the food and consumer packaged goods industry, we empirically examine this framework. The analysis reveals that the various integration techniques are differentially associated with manufacturer performance. Collaborative planning on replenishment, in the form of vendor-managed inventory (VMI), is directly and positively related to manufacturer margins, while collaboration on new products and services is positively related to intermediate performance measures. Specifically, this latter form of collaboration allows the manufacturer to charge higher wholesale prices and, interestingly, is associated with lower retailer, and consequently manufacturer, stockouts. In contrast, collaboration on the handling of excess and defective retailer inventory (i.e., reverse logistics) results in higher manufacturer stockout levels, on average. Solely sharing information on either inventory levels or customer needs is associated with higher manufacturer performance measures up to a certain point; sharing this information is prevalent among manufacturers that achieve industry-average profitability relative to those that achieve below industry-average profitability. The paper explains these results in the context of the conceptual framework developed and discusses the managerial implications for effective coordination between supply chain partners.

497 citations


Journal ArticleDOI
TL;DR: This paper examines the beneficial impact of information sharing in multi-echelon supply chains and introduces acontrolengineering based measure to quantify the variance amplification (bullwhip) or variance reduction of supply chain replenishment rules.

480 citations


Journal ArticleDOI
TL;DR: A seminal study conducted by Stasser and Titus (1985) found that groups often make suboptimal decisions on tasks structured as hidden profiles because they tend to discuss and incorporate into their decisions information that is shared (known to all members) at the expense of information known to a single member, in other words, groups are not able to take advantage of the unique knowledge and expertise of their members as discussed by the authors.
Abstract: A seminal study conducted by Stasser and Titus (1985) found that groups often make suboptimal decisions on tasks structured as hidden profiles because they tend to discuss and incorporate into their decisions information that is shared (known to all members) at the expense of information that is unshared (known to a single member). In other words, groups are not able to take advantage of the unique knowledge and expertise of their members. Over the past 19 years this unsettling finding has stimulated much research that seeks answers to the questions: why and under what conditions will groups favor shared information over unshared information in their collective decisions? This article presents a review and a critique of the literature on collective information sharing that was initiated by the Stasser and Titus study. The preponderance of research in the Stasser and Titus tradition carries with it strong theoretical assumptions that bear little mundane realism to natural decision‐making groups. For exampl...

421 citations


Journal ArticleDOI
TL;DR: In this article, the effects of information delay and accuracy, and the sharing of sales and forecast information in a VMI environment facing stationary and nonstationary demand are examined, and simulation experiments show the impact of information delays, information inaccuracy, and information sharing on a variety of performance measures, including inventory levels and fill rates.
Abstract: Vendor Managed Inventory (VMI) involves the vendor making the replenishment decision for products supplied to a customer based on various inventory and supply chain policies. Information sharing between supply chain members is required in VMI. Sometimes VMI decisions are delayed and/or the information shared is inaccurate. This research examines the effects of information delay and accuracy, and the sharing of sales and forecast information in a VMI environment facing stationary and nonstationary demand. The simulation experiments show the impact of information delay, information inaccuracy, and information sharing on a variety of performance measures, including inventory levels and fill rates.

355 citations


Journal ArticleDOI
TL;DR: In this article, the authors investigate cross-country determinants of private credit, using new data on legal creditor rights and private and public credit registries in 129 countries, and find that both creditor protection through the legal system and information sharing institutions are associated with higher ratios of personal credit to GDP, but that the former is relatively more important in richer countries.
Abstract: We investigate cross-country determinants of private credit, using new data on legal creditor rights and private and public credit registries in 129 countries. We find that both creditor protection through the legal system and information sharing institutions are associated with higher ratios of private credit to GDP, but that the former is relatively more important in the richer countries. An analysis of legal reforms also shows that improvements in creditor rights and in information sharing precede faster credit growth. We also find that creditor rights are extremely stable over time, contrary to the convergence hypothesis. Finally, we find that legal origins are an important determinant of both creditor rights and information sharing institutions.

282 citations


Journal ArticleDOI
TL;DR: This paper identifies classes of decentralized control problems whose complexity ranges between NEXP and P, and distinguishes between three ways in which agents can exchange information: indirect communication, direct communication and sharing state features that are not controlled by the agents.
Abstract: Decentralized control of cooperative systems captures the operation of a group of decision-makers that share a single global objective. The difficulty in solving optimally such problems arises when the agents lack full observability of the global state of the system when they operate. The general problem has been shown to be NEXP-complete. In this paper, we identify classes of decentralized control problems whose complexity ranges between NEXP and P. In particular, we study problems characterized by independent transitions, independent observations, and goal-oriented objective functions. Two algorithms are shown to solve optimally useful classes of goal-oriented decentralized processes in polynomial time. This paper also studies information sharing among the decision-makers, which can improve their performance. We distinguish between three ways in which agents can exchange information: indirect communication, direct communication and sharing state features that are not controlled by the agents. Our analysis shows that for every class of problems we consider, introducing direct or indirect communication does not change the worst-case complexity. The results provide a better understanding of the complexity of decentralized control problems that arise in practice and facilitate the development of planning algorithms for these problems.

278 citations


Journal ArticleDOI
TL;DR: In this paper, the authors explore internal innovation success factors, i.e., success factors associated with the innovating firm's competencies, by taking a decision-making perspective.

227 citations


Book
20 Oct 2004
TL;DR: Addressing problems like missing conceptual models, unclear system boundaries, and heterogeneous representations, the authors design a framework for ontology-based information sharing in weakly structured environments like the Semantic Web.
Abstract: The large-scale and almost ubiquitous availability of information has become as much of a curse as it is a blessing. The more information is available, the harder it is to locate any particular piece of it. And even when it has been successfully found, it is even harder still to usefully combine it with other information we may already possess. This problem occurs at many different levels, ranging from the overcrowded disks of our own PCs to the mass of unstructured information on the World Wide Web. It is commonly understood that this problem of information sharing can only be solved by giving computers better access to the semantics of the information. While it has been recognized that ontologies play a crucial role in solving the open problems, most approaches rely on the existence of well-established data structures. To overcome these shortcomings, Stuckenschmidt and van Harmelen describe ontology-based approaches for resolving semantic heterogeneity in weakly structured environments, in particular the World Wide Web. Addressing problems like missing conceptual models, unclear system boundaries, and heterogeneous representations, they design a framework for ontology-based information sharing in weakly structured environments like the Semantic Web. For researchers and students in areas related to the Semantic Web, the authors provide not only a comprehensive overview of the State of the art, but also present in detail recent research in areas like ontology design for information integration, metadata generation and management, and representation and management of distributed ontologies. For professionals in areas such as e-commerce (e.g., the exchange of product knowledge) and knowledge management (e.g., in large and distributed organizations), the book provides decision support on the use of novel technologies, information about potential problems, and guidelines for the successful application of existing technologies.

165 citations


Journal ArticleDOI
TL;DR: The state of the art in this area is reviewed with a case study to illustrate the emerging technologies for visualizing and sharing product information among designers, production engineers and managers, purchasing and marketing staff, suppliers, and customers.

164 citations


Patent
01 Sep 2004
TL;DR: In this paper, a knowledge base is divided into domains and subdomains that define a hierarchy that includes dependencies and references, which are used for domain management such that any conflicts and inconsistencies can be identified and arbitrated.
Abstract: In connection with a machine-based system for transforming data from a source form to a target form, a tool is provided for sharing information established in developing a transformation model. The shared information may relate to rules for mapping source collection terms to standardized terms, rules for ordering or syntax, rules for classifying terms or other transformation rules. Such information defines a knowledge base for the project. The knowledge base is divided into domains and subdomains that define a hierarchy that includes dependencies and references. These dependencies and references are used for domain management such that any conflicts and inconsistencies can be identified and arbitrated. In this manner, information sharing is accommodated, for example, for efficient knowledge base creation and multi-user functionality.

155 citations


Patent
Seiya Shimizu1, Asako Kitaura1
30 Sep 2004
TL;DR: In this article, a technique is presented which enables users to add, with ease, annotation information to an electronic document on a network and to share the annotation information within a disclosure range set to the annotations.
Abstract: A technique is provided which enables users to add, with ease, annotation information to an electronic document on a network and to share the annotation information within a disclosure range set to the annotation information. An electronic information is provided in a state that allows the electronic information to have annotation in formation attached, annotation information to be attached to the electronic information is stored, attribute information indicating the disclosure range of the annotation information is stored and, when a user requests to provide annotation information, annotation information available to the user is provided to a terminal of the user by consulting the attribute information.

Journal ArticleDOI
TL;DR: In this paper, the authors investigate the relationship between culture and joint gains by examining the role of information sharing and power strategies in intracultural negotiations and find that power strategies may help or hurt joint gains, depending on a culture's values and norms for power and whether or not power-based influence is used in conjunction with sufficient information exchange, and suggest that understanding the other party's cultural characteristics and strategies can help negotiators plan how to focus on information exchange and deal with unusual power strategies that they may encounter.
Abstract: In this article the authors investigate the relationship between culture and joint gains by examining the role of information sharing and power strategies in intracultural negotiations. Previously, the authors found that the relationship between cultural values or norms and joint gains was uncertain in six cultures: France, Russia, Japan, Hong Kong, Brazil, and the United States. Of the five values and norms measured, only norms for information sharing in negotiation were directly related to joint gains. This article explores and extends prior findings by investigating the strategies used by negotiators in the same six cultures. Cultures that maximized joint gains used direct information-sharing strategies or a combination of indirect and direct strategies. Power strategies may help or hurt joint gains, depending on a culture's values and norms for power and whether or not power-based influence is used in conjunction with sufficient information exchange. The findings suggest that understanding the other party's cultural characteristics and strategies can help negotiators plan how to focus on information exchange and deal with unusual power strategies that they may encounter.

Journal ArticleDOI
TL;DR: The goal is to design a decision support system that uses information technology to enhance the capacity of multiple organisations to adapt their actions reciprocally to changing conditions of risk, enabling the set of organisations to manage risk more effectively and efficiently for the community as a whole.
Abstract: Coordination in multi-organisational settings is extraordinarily difficult to achieve. This article examines the problem of inter-organisational coordination in the context of public administration theory and practice. The authors present the concept of complex adaptive systems as a theoretical framework that explains the dynamic processes involved in achieving coordinated action among multiple organisations to manage complex technical operations in environments vulnerable to risk. They argue that coordination may be achieved more easily with the appropriate design of a socio-technical system, that is, a system that supports the exchange of critical information among technical and organisational entities to improve performance in both. The goal is to design a decision support system that uses information technology to enhance the capacity of multiple organisations to adapt their actions reciprocally to changing conditions of risk, enabling the set of organisations to manage risk more effectively and efficiently for the community as a whole. The authors present the design and initial findings from a trial demonstration to implement a prototype interactive, intelligent, spatial information system in the Pittsburgh Metropolitan Region.

Journal ArticleDOI
TL;DR: In this paper, the impact of different levels of sharing information on inventory replenishment of enterprises in three-stage distribution supply chains of the divergent type is investigated in terms of several performance indicators through a multi-agent-based simulation model.
Abstract: This research investigates the impact of different levels of sharing information on inventory replenishment of enterprises in three-stage distribution supply chains of the divergent type. This paper has two objectives: (1) to investigate the effects of different levels of information sharing on operating cost, inventory level and backlog level of retailers, distributors, manufacturer and the entire supply chain; and (2) to study which level of information sharing is most beneficial or optimal to each type of enterprise. The entire supply chain under various supply chain scenarios characterized by several parameters including demand variance, lead times, capacity and order batch size is investigated. The impact of sharing information is evaluated in terms of several performance indicators through a multi-agent-based simulation model. The results of the experimental simulation show that no single level of information sharing dominates the others from the perspective of individual enterprises. Some insights ...

Journal ArticleDOI
TL;DR: In this paper, a three-stage supply chain under stochastic demand and varying coordination and information asymmetry is modeled, where the observed price-quantity contracts under limited commitment are shown to be inadequate under realistic asymmetric information assumptions.

Patent
30 Sep 2004
TL;DR: In this paper, a system provides an information sharing architecture that allows physically separate healthcare information systems, called "deployments," to share and exchange information, referred to as the "Community".
Abstract: A system provides an information sharing architecture that allows physically separate healthcare information systems, called “deployments,” to share and exchange information. The collection of these participating deployments is referred to as the “Community,” and systems within the Community sometimes store records for patients in common. The system allows participants in the Community to share information on data changes to these patients, and to reconcile concurrent and conflicting updates to the patient's record.

Journal ArticleDOI
TL;DR: In this paper, the authors proposed a demand sharing methodology based on a set of predefined collaboration rules for vertical and horizontal supply chain collaboration, and proposed a framework of a central coordination system, which is equipped with a multi-criteria genetic optimization feature.
Abstract: This paper studies vertical and horizontal supply chain collaboration, and proposes a demand sharing methodology based on a set of predefined collaboration rules. Supply chain collaboration is prevalent, and has been recognized to be one of the important issues in improving competition strength. However, implementation of supply chain collaboration encounters many barriers, such as type, scope and security of information sharing, equity in benefits sharing, joint decision making, coordination tasks etc. For these reasons this paper proposes a framework of a central coordination system, which is equipped with a multi-criteria genetic optimization feature. The optimization methodology combines an analytic hierarchy process with genetic algorithms. It deploys an analytic hierarchy process to model the collaboration rules, govern the demand allocations, and evaluate the fitness values of chromosomes. The implementation of the proposed central coordination system is demonstrated by a hypothetical three-echelon...

Proceedings ArticleDOI
01 Jun 2004
TL;DR: This work proposes a protocol in which all competing nodes interact with the information providing node to reach Nash equilibrium in a dynamic and efficient manner and shows that this game has a Nash equilibrium and is collusion-proof.
Abstract: Traditional peer-to-peer (P2P) networks do not provide service differentiation and incentive for users. Consequently, users can obtain services without themselves contributing any information or service to a P2P community. This leads to the "free-riding" and "tragedy of the commons" problems, in which the majority of information requests are directed towards a small number of P2P nodes willing to share their resources. The objective of this work is to enable service differentiation in a P2P network based on the amount of services each node has provided to its community, thereby encouraging all network nodes to share resources. We first introduce a resource distribution mechanism between all information sharing nodes. The mechanism is driven by a distributed algorithm which has linear time complexity and guarantees Pareto-optimal resource allocation. Besides giving incentive, the mechanism distributes resources in a way that increases the aggregate utility of the whole network. Second, we model the whole resource request and distribution process as a competition game between the competing nodes. We show that this game has a Nash equilibrium and is collusion-proof. To realize the game, we propose a protocol in which all competing nodes interact with the information providing node to reach Nash equilibrium in a dynamic and efficient manner. Experimental results are reported to illustrate that the protocol achieves its service differentiation objective and can induce productive information sharing by rational network nodes. Finally, we show that our protocol can properly adapt to different node arrival and departure events, and to different forms of network congestion.

Proceedings ArticleDOI
01 Aug 2004
TL;DR: An ongoing installation of Plasma Posters is described within an organization, and qualitative and quantitative data from 20 months of use showing the Posters have become an integral part of information sharing, complementing email and Web-based sharing.
Abstract: Plasma Posters are large screen, digital, interactive poster-boards situated in public spaces, designed to facilitate informal content sharing within teams, groups, organizations and communities. While interest i interactive community poster boards has grown recently, few successful examples have been reported. In this paper we describe an ongoing installation of Plasma Posters within our organization, and report qualitative and quantitative data from 20 months of use showing the Posters have become an integral part of information sharing, complementing email and Web-based sharing. Success factors include our design process, the reliability and flexibility of the technology and the social setting of our organization. We briefly describe three external installations of the Plasma Poster Network in public places. We then reflect on content posting as "information staging" and the ways in which the public space itself becomes part of the "interface" to content.

Proceedings ArticleDOI
05 Jan 2004
TL;DR: It is found that P2P networks can operate effectively in the presence of significant free-riding, however, it is shown that without external incentives, the level of free- riding in P1P networks is higher than socially optimal.
Abstract: Peer-to-peer networking is gaining popularity as a architecture for sharing information goods and other computing resources. However, these networks suffer from a high level of free-riding, whereby some users consume network resources without providing any network resources. The high levels of free-riding observed by several recent studies have led some to suggest the imminent collapse of these communities as a viable information sharing mechanism. Our research develops analytic models to analyze the behavior of P2P networks in the presence of free-riding. In contrast to previous predictions, we find that P2P networks can operate effectively in the presence of significant free-riding. However, we also show that without external incentives, the level of free-riding in P2P networks is higher than socially optimal. Our research also explores the implications of these findings for entrepreneurs, network designers, and copyright holders.

Journal ArticleDOI
TL;DR: In this article, the authors address the concept of poaching, the risk that in any transactional relationship, information that is transferred between parties for purposes specified in the contract will deliberately be used by the receiving party for purposes outside the contract, to its own economic benefit, and to the detriment of the party that provided the information.
Abstract: We address the concept of poaching, the risk that in any transactional relationship, information that is transferred between parties for purposes specified in the contract will deliberately be used by the receiving party for purposes outside the contract, to its own economic benefit, and to the detriment of the party that provided the information. We argue that this form of transactional risk, a component of transaction costs, is increasingly important in our service-centered, information-driven, postindustrial economy. Using case examples and a discussion of the related literature, we demonstrate and discuss the conditions under which shared information creates the potential for poaching, examine the impact and efficacy of traditional remedies for contractual problems in managing poaching, and identify additional mechanisms for managing poaching risk. Our analysis suggests that these risks and their remedies are fundamentally different in nature from those considered in previous theories of supplier relations and contractual governance.

Journal ArticleDOI
TL;DR: This article investigated the role of task and relationship conflict as mediators of the relationship between information sharing and group performance and found that information sharing will reduce both task and conflict with beneficial effects on team performance in established groups.
Abstract: We investigated the role of task and relationship conflict as mediators of the relationship between information sharing and group performance. We suggest that, in addition to the commonly studied effect of conflict on information sharing, the reverse causal direction is theoretically likely and relevant in today's business climate. Specifically, we hypothesize that information sharing will reduce both task and relationship conflict with beneficial effects on team performance in established groups. We also explore boundary conditions to these conflict‐reducing effects of information sharing, suggesting that the lower a group's task interdependence, the more information sharing reduces task conflict, and the lower a group's average general mental ability, the more information sharing reduces relationship conflict. Analysis of data from 38 groups supported our expectations, revealing the expected negative relationships between information sharing and both task and relationship conflict, as well as the expected moderating effects of task interdependence and general mental ability.

Journal ArticleDOI
TL;DR: Various homeland-security-related applications that have direct relevance to transportation researchers are noted and security informatics studies that tightly integrate transportation research and information technologies are advocated.
Abstract: Intelligence and security informatics (ISI) is an emerging field of study aimed at developing advanced information technologies, systems, algorithms, and databases for national- and homeland-security-related applications, through an integrated technological, organizational, and policy-based approach. This paper summarizes the broad application and policy context for this emerging field. Three detailed case studies are presented to illustrate several key ISI research areas, including cross-jurisdiction information sharing; terrorism information collection, analysis, and visualization; and "smart-border" and bioterrorism applications. A specific emphasis of this paper is to note various homeland-security-related applications that have direct relevance to transportation researchers and to advocate security informatics studies that tightly integrate transportation research and information technologies.

Posted Content
TL;DR: In this article, the authors introduce a taxonomy of alternative systems of international capital-income taxation and characterize the choice of tax rates and information exchange and show that there exists a second equilibrium with an efficient level of public-good provision as well as complete and voluntary information exchange between national tax authorities.
Abstract: Information sharing between governments is examined in an optimal-taxation framework. We introduce a taxonomy of alternative systems of international capital-income taxation and characterize the choice of tax rates and information exchange. The model reproduces the conclusion found in earlier literature that integration of international caopital markets may lead to the under-provision of publicly provided goods. However, in contrast to previous results in the literature, under-provision occurs due to inefficiently coordinated expectations. We show that there exists a second equilibrium with an efficient level of public-good provision as well as complete and voluntary information exchange between national tax authorities.

Proceedings ArticleDOI
06 Nov 2004
TL;DR: Preliminary findings from two studies of how socially-defined places influence people's information sharing and communication needs suggest that location-aware community systems must integrate information about places with data about users' personal routines and social relationships.
Abstract: We present a conceptual framework for location-aware community systems and results from two studies of how socially-defined places influence people's information sharing and communication needs.The first study identified a relationship between people's familiarity with a place and their desire for either stable or dynamic place-related information. The second study explored the utility of various system features highlighted by our conceptual framework. It clarified the role of place information in informal social interaction; it also showed that people valued, and were willing to provide information such as ratings, comments, and event records relevant to a place.These preliminary findings have important implications for the design of location-aware community systems. In particular, they suggest that such systems must integrate information about places with data about users' personal routines and social relationships.

Journal ArticleDOI
TL;DR: In this article, the authors developed an analytical framework to investigate the competitive implications of sharing security information and investments in security technologies and found that security technology investments and security information sharing act as strategic complements in equilibrium.
Abstract: Given that Information Technology (IT) security has emerged as an important issue in the last few years, the subject of security information sharing among firms, as a tool to minimize security breaches, has gained the interest of practitioners and academics. To promote the disclosure and sharing of cyber-security information among firms, the US federal government has encouraged the establishment of many industry based Information Sharing and Analysis Centers (ISACs). Sharing security vulnerabilities and technological solutions related to methods for preventing,detecting and correcting security breaches, is the fundamental goal of the ISACs. However, there are a number of interesting economic issues that will affect the achievement of this goal. Using game theory and IO, we develop an analytical framework to investigate the competitive implications of sharing security information and investments in security technologies. We find that security technology investments and security information sharing act as strategic complements in equilibrium. Our results suggest that information sharing is more valuable when product substitutability is higher, implying that such sharing alliances yield greater benefits in more competitive industries. We also highlight that the benefits from such information sharing alliances increase with the size of the firm. Importantly, we point out that the nature of the technology cost function plays a pivotal role in determining whether spillovers are beneficial or detrimental to firms' incentives to join an ISAC. Firms will benefit from joining an ISAC sequentially rather than simultaneously, since such sequentiality positively influences the levels of information sharing and technology investment. We compare the levels of information sharing and technology investments obtained when firms behave independently (Bertrand-Nash) to those selected by an ISAC which maximizes social welfare or joint industry profits. Our results help us predict the consequences of establishing centrally monitored organizations such as ISACs by the federal government.

Proceedings ArticleDOI
24 Mar 2004
TL;DR: This work addresses how one can incorporate incentive into the P2P information sharing paradigm so as to encourage users to share information and resources and demonstrates the efficiency and fairness of the algorithms.
Abstract: The current peer-to-peer (P2P) information sharing paradigm does not provide incentive and service differentiation for users. Since there is no motivation to share information or resources, this leads to the "free-riding" and the "tragedy of the commons" problems. We address how one can incorporate incentive into the P2P information sharing paradigm so as to encourage users to share information and resources. Our mechanism (or protocol) provides service differentiation to users with different contribution values and connection types. The mechanism also has some desirable properties: (1) conservation of cumulative contribution and social utility in the P2P community, (2) maximization of social utility if all requesting clients have the same contribution value, and (3) incentive-based resource distribution. The resource distribution algorithm and the contribution update algorithm are computationally efficient and can be easily implemented. Experimental results illustrate the efficiency and fairness of our algorithms.

ReportDOI
TL;DR: In this article, the authors examined the use and consequences of shared compensation plans (profit sharing, profit related pay, SAYE schemes and company stock option plans) in a sample of UK workplaces and firms in the 1990s.
Abstract: This paper examines the use and consequences of shared compensation plans (profit sharing, profit related pay, SAYE schemes and company stock option plans) in a sample of UK workplaces and firms in the 1990s. The use of these plans has increased over time, in part in response to government programs. The evidence shows that companies and workplaces adopting shared compensation practices have had higher productivity than other firms, but the effects vary among programs, suggesting that the particulars matter a lot in aligning shared compensation and work place activities. Consistent with incentive theory, the evidence also shows that firms and workplaces with shared compensation practices have a higher incidence of shared decision-making/information sharing practices.

Journal ArticleDOI
TL;DR: A model based on the theory of incomplete contracts for how ownership structure of interorganizational systems (IOS) can affect information exploitation and information technology adoption is developed and suggests the appropriate strategic actions that a firm may take when there is potential for IOS adopters to question whether adopting the IOS will be value-maximizing.
Abstract: We develop a model based on the theory of incomplete contracts for how ownership structure of interorganizational systems (IOS) can affect information exploitation and information technology adoption. Our model yields several propositions that suggest the appropriate strategic actions that a firm may take when there is potential for IOS adopters to question whether adopting the IOS will be value-maximizing. We analyze and illustrate the related strategic thinking in a real-world context involving a financial risk management IOS. We present a case study of the ownership and spin-off of RiskMetrics, developed by New York City-based investment bank, J.P. Morgan, in the late 1980s. The firm first gave RiskMetrics to its correspondent banking, treasury, and investment clients for free, in the context of its clearing account relationship services. Later, the bank spun off the product to an independent company that offered fee-based services. We model the bank's clients in terms of their heterogeneous portfolio risks, and their effects on the value a client can gain from adopting the technology. We also examine the value they may lose if their private portfolio risk information is exploited. A key roadblock to the adoption of the free service may have been the potential for strategic information exploitation by the service provider. When Morgan spun off RiskMetrics with multiparty ownership, wider adoption occurred. Our theory interprets this strategic move as an appropriate means to maximize long-term profits when information exploitation may occur.

Journal ArticleDOI
TL;DR: In this paper, three subcultures within the public sector (scientist, politician, and bureaucrat) were identified as a framework to examine these issues and three categories of benefits and barriers associated with inter-agency information sharing (technical, organizational, and political) were also used in developing the framework.
Abstract: This article is based on an exploratory, interdisciplinary study of issues related to information sharing within and across three public agencies. Based on Schein's work, three subcultures within the public sector (scientist, politician, and bureaucrat) were identified as a framework to examine these issues. Dawes's three categories of benefits and barriers, associated with interagency information sharing (technical, organizational, and political), were also used in developing the framework. Their work has been extended by identifying three types of differences (view, use, and purpose) among these subcultural relationships to data and information. Four types of systems (social, constituency, technical, and organizational) that influence information-sharing processes within and across agencies also were identified. Two cases are offered to illustrate key points about information sharing across subcultures and some implications for research and practice to enhance abilities within the public sector to appropriately and effectively share information.