- ZeitschriftenartikelModel-based Analysis of Data Inaccuracy Awareness in Business Processes(Business & Information Systems Engineering: Vol. 64, No. 2, 2022) Evron, Yotam; Soffer, Pnina; Zamansky, AnnaProblem definition: Data errors in business processes can be a source for exceptions and hamper business outcomes. Relevance: The paper proposes a method for analyzing data inaccuracy issues already at process design time, in order to support process designers by identifying process parts where data errors might remain unrecognized, so decisions could be taken based on inaccurate data. Methodology: The paper follows design science, developing a method as an artifact. The conceptual basis is the notion of data inaccuracy awareness – the ability to tell whether potential discrepancies between real and IS values may exist. Results: The method was implemented on top of a Petri net modeling tool and validated in a case study performed in a large manufacturing company of safety–critical systems. Managerial implications: Anticipating consequences of data inaccuracy already during process design can help avoiding them at runtime.
- ZeitschriftenartikelThe Five Diamond Method for Explorative Business Process Management(Business & Information Systems Engineering: Vol. 64, No. 2, 2022) Grisold, Thomas; Groß, Steven; Stelzl, Katharina; Brocke, Jan; Mendling, Jan; Röglinger, Maximilian; Rosemann, MichaelExplorative business process management (BPM) is attracting increasing interest in the literature and professional practice. Organizations have recognized that a focus on operational efficiency is no longer sufficient when disruptive forces can make the value proposition of entire processes obsolete. So far, however, research on how to create entirely new processes has remained largely conceptual, leaving it open how explorative BPM can be put into practice. Following the design science research paradigm and situational method engineering, we address this research gap by proposing a method called the Five Diamond Method. This method guides explorative BPM activities by supporting organizations in identifying opportunities from business and technology trends and integrating them into business processes with novel value propositions. The method is evaluated against literature-backed design objectives and competing artifacts, qualitative data gathered from BPM practitioners, as well as a pilot study and two real-world applications. This research provides two contributions. First, the Five Diamond Method broadens the scope of BPM by integrating prescriptive knowledge from innovation management. Second, the method supports capturing emerging opportunities arising from changing customer needs and digital technologies.
- ZeitschriftenartikelCorporate Digital Responsibility(Business & Information Systems Engineering: Vol. 64, No. 2, 2022) Mihale-Wilson, Cristina; Hinz, Oliver; Aalst, Wil; Weinhardt, Christof
- ZeitschriftenartikelBusiness Process Management Culture in Public Administration and Its Determinants(Business & Information Systems Engineering: Vol. 64, No. 2, 2022) Kregel, Ingo; Distel, Bettina; Coners, AndréPublic administration institutions increasingly use business process management (BPM) to innovate internal operations, increase process performance and improve their services. Research on private sector companies has shown that organizational culture may impact an organization's BPM and this culture is often referred to as BPM culture. However, similar research on public administration is yet missing. Thus, this article assesses BPM culture in Germany’s municipal administration. 733 online survey responses were gathered and analyzed using MANOVA and follow-up discriminant analyses to identify possible determinants of public administration’s BPM culture. The results indicate that the employees’ professional experience and their responsibility influence the assessment of BPM culture, as does the size of a municipality. Based on these findings, the article proposes testable relationships and an agenda for further research on BPM culture in public administration.
- ZeitschriftenartikelThe Impact of Strategic Core-Component Reuse on Product Life Cycles(Business & Information Systems Engineering: Vol. 64, No. 2, 2022) Mihale-Wilson, Cristina; Felka, Patrick; Hinz, Oliver; Spann, MartinThe mobile games business is an ever-increasing sub-sector of the entertainment industry. Due to its high profitability but also high risk and competitive atmosphere, game publishers need to develop strategies that allow them to release new products at a high rate, but without compromising the already short lifespan of the firms' existing games. Successful game publishers must enlarge their user base by continually releasing new and entertaining games, while simultaneously motivating the current user base of existing games to remain active for more extended periods. Since the core-component reuse strategy has proven successful in other software products, this study investigates the advantages and drawbacks of this strategy in mobile games. Drawing on the widely accepted Product Life Cycle concept, the study investigates whether the introduction of a new mobile game built with core-components of an existing mobile game curtails the incumbent's product life cycle. Based on real and granular data on the gaming activity of a popular mobile game, the authors find that by promoting multi-homing (i.e., by smartly interlinking the incumbent and new product with each other so that users start consuming both games in parallel), the core-component reuse strategy can prolong the lifespan of the incumbent game.
- ZeitschriftenartikelValues and Ethics in Information Systems(Business & Information Systems Engineering: Vol. 64, No. 2, 2022) Spiekermann, Sarah; Krasnova, Hanna; Hinz, Oliver; Baumann, Annika; Benlian, Alexander; Gimpel, Henner; Heimbach, Irina; Köster, Antonia; Maedche, Alexander; Niehaves, Björn; Risius, Marten; Trenz, Manuel
- ZeitschriftenartikelDigital Detox(Business & Information Systems Engineering: Vol. 64, No. 2, 2022) Mirbabaie, Milad; Stieglitz, Stefan; Marx, Julian
- ZeitschriftenartikelA Configuration Taxonomy of Business Process Orientation(Business & Information Systems Engineering: Vol. 64, No. 2, 2022) Van Looy, Amy; Trkman, Peter; Clarysse, ElsOrganizations strive to develop a variety of capabilities to improve and measure business processes. Researchers have used various maturity models to investigate the development of a business process orientation (BPO), and most have argued that such a development comes in stages. Current literature underestimates the interrelationships between BPO capabilities and fails to consider multidimensional or non-linear paths to maturity. To refine the features of maturity models, this study relies on configuration theory to uncover different archetypes for BPO development and quantitatively evaluate them by examining performance differences among archetypes based on a large-scale international dataset. The resulting empirical taxonomy with seven BPO archetypes establishes important performance differences between organizations at a similar maturity level. Besides strengthening the theoretical foundations of BPO and making maturity assessments more multifaceted, the results help organizations give their managerial efforts a focus by enabling comparison with peers in the same archetype and showing various paths for BPO improvement.
- ZeitschriftenartikelA Protection-Motivation Perspective to Explain Intention to Use and Continue to Use Mobile Warning Systems(Business & Information Systems Engineering: Vol. 64, No. 2, 2022) Fischer-Preßler, Diana; Bonaretti, Dario; Fischbach, KaiMobile emergency warning apps are essential for effective emergency communication – of course, provided the population intends to use them. Drawing on protection motivation theory, the study validated a psychometric model to explain what motivates individuals to install a warning app for the first time and to keep using it over time. Multi-group covariance-based structural equation modeling was used to model the answers to a survey that measured the drivers of intention to begin using or intention to continue using a warning app. The model shows that, for both non-users and users, trust, social influence, and response efficacy positively and maladaptive rewards negatively affect intention to use and intention to continue use warning apps. However, perceived vulnerability influences only intention to use, whereas response cost and self-efficacy affect continued use intention. Hence, this study enhances the theoretical understanding of technology-enabled protection behaviors and provides practitioners with a list of factors to consider for pushing the adoption and continued use of emergency warning applications.