Enterprise Ecosystems: The Integrated Enterprise, Levels of Information Systems Research (Process, Enterprise-, Ecosystem- and Industry-Level)

Permanent URI for this collection

Browse

Recent Submissions

Now showing 1 - 5 of 5
  • Item
    Matthew Effects, Criticality Traps, and Redundancy Slips in Digital Infrastructures: Evidence from Two Cases
    (2025-01-07) Akbari, Karl; Baiyere, Abayomi; Winkler, Till J.; Fürstenau, Daniel
    The goal of this study is to explore evidence for a Matthew effect in system embeddedness. The secondary objective is to understand the relationship between the Matthew effect and (1) a “criticality trap,” a situation where excess inertia leaves an organization trapped in a system or (2) a “redundancy slip,” where low embeddedness leads to system discontinuance. Through two case studies, we provide robust evidence for all three effects. In a media firm, we use nine years of panel data to demonstrate cubic growth in system embeddedness. In a manufacturing firm, we validate that the Matthew effect can lead to a criticality trap, but we also show that some systems experience a redundancy slip. Our practical insights are crucial for identifying and managing embedded systems in digital infrastructures. The Matthew effect is a powerful mechanism driving the evolution of systems and, consequently, digital infrastructures.
  • Item
    Realizing the Full Potential of Digital Innovation: Exploring Maturity Levels for Integrating Interorganizational Value Chains
    (2025-01-07) Nottbrock, Claus; Van Looy, Amy; De Haes, Steven
    Maturity models, with their defined levels, help organizations recognize the need for change and implement measures to integrate digital Industry 4.0 (I4.0) innovations, thereby enhancing their value chains’ performance. However, fully realizing the potential of I4.0 necessitates effective interorganizational collaboration, an area in which empirical research remains limited. In this study, we expand on existing research on business-process maturity models by investigating their application in an interorganizational context. Through an examination of 21 existing models and a survey of 188 manufacturing firms, we identified four distinct maturity levels for digital interorganizational value chain capabilities. Statistical analysis has validated these levels, consistent with our initial pilot study’s results. These results contribute to the development of a comprehensive interorganizational maturity model, offering valuable insights for scholars and practitioners to realize the full potential of digital I4.0 innovations. This approach necessitates robust collaboration among interorganizational entities to attain the best value chain performance.
  • Item
    Multi-Cloud Environments and Governance: Repatriation or Expansion?
    (2025-01-07) Grabski, Severin; Schmidt, Pamela
    This research develops a process model, based upon the TOE framework and cloud governance research, for aiding organizations in their cloud repatriation decision. As more organizations rationalize their IT environments, many are moving away from some cloud environments due to cost, performance, regulatory issues and other factors. The presented process model provides guidance on factors that should be considered and on possible shared governance models for retained cloud environments.
  • Item
    The Role of Enterprise Systems Sourcing on Cybersecurity Breaches
    (2025-01-07) Chu, Scott; Cavusoglu, Hasan
    This study examines the relationship between enterprise systems (ES) sourcing and cyber breaches. We argue that the greater degree of compatibility resulting from sourcing ES modules from fewer vendors (i.e., higher ES standardization) enables easier management of the implemented modules and reduces cybersecurity risks. We find that ES standardization is negatively related to cyber breach occurrence. When analyzing different breach types, we find that ES standardization is negatively related to both cyber breaches caused by external perpetrators and those caused by organizational insiders. While there is no conclusive evidence to suggest whether sourcing ES modules from fewer vendors is generally advantageous or disadvantageous, our findings indicate that it is advantageous from a cybersecurity standpoint.