2020 Book DigitalBusinessTransformation
2020 Book DigitalBusinessTransformation
Rocco Agrifoglio
Rita Lamboglia
Daniela Mancini
Francesca Ricciardi Editors
Digital Business
Transformation
Organizing, Managing and Controlling
in the Information Age
Lecture Notes in Information Systems
and Organisation
Volume 38
Series Editors
Paolo Spagnoletti, Rome, Italy
Marco De Marco, Rome, Italy
Nancy Pouloudi, Athens, Greece
Dov Te’eni, Tel Aviv, Israel
Jan vom Brocke, Vaduz, Liechtenstein
Robert Winter, St. Gallen, Switzerland
Richard Baskerville, Atlanta, USA
Lecture Notes in Information Systems and Organization—LNISO—is a series of
scientific books that explore the current scenario of information systems, in
particular IS and organization. The focus on the relationship between IT, IS and
organization is the common thread of this collection, which aspires to provide
scholars across the world with a point of reference and comparison in the study and
research of information systems and organization. LNISO is the publication forum
for the community of scholars investigating behavioral and design aspects of IS and
organization. The series offers an integrated publication platform for high-quality
conferences, symposia and workshops in this field. Materials are published upon a
strictly controlled double blind peer review evaluation made by selected reviewers.
LNISO is abstracted/indexed in Scopus
Editors
Digital Business
Transformation
Organizing, Managing and Controlling
in the Information Age
123
Editors
Rocco Agrifoglio Rita Lamboglia
Department of Business and Economics Department of Business and Economics
Parthenope University of Naples Parthenope University of Naples
Naples, Italy Naples, Italy
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Introduction
This book explores a range of emerging topics and critical linkages between
information technology and digital business transformation and encourages debate
and opens new avenues of inquiry in the fields of information systems, organiza-
tion, accounting, and management studies.
The recent surge of interest in “digital transformation” is changing the business
landscape and posing several both organizational and sectoral challenges [1]. The
digital transformation of business is a change associated with the application of
digital technology in all aspects of business and enables organizations to create new
products, services and find more efficient ways of doing business. It concerns the
changes digital technologies can bring about on some or all segments within an
organization or on entire business models within a specific industry [1]. An inter-
esting example of digital transformation (at different levels of analysis) is the music
industry where the advent of the Internet, and related software developments,
caused a deep shift in the mechanics of music distribution. Within music industry,
first the CDs were replaced by downloads music, such as MP3 and MP4 files, and
v
vi Introduction
then streaming services of total recorded music were grown globally [2]. This
means that technology transformation has caused deep changes on ways of music
distribution, so influencing business strategies, organizational structures, and pro-
cesses—even before the services provided—of music companies and the growth of
a new sector, well known as “Artist and Label Services”.
The digital transformation is happening within and across organizations of all
types, in every industry, so resulting as a disruptive innovation enabling to break
down barriers between things, people, and organizations, as well as to create more
adaptive processes. In the information age, it is imperative for organizations to
develop IT-related capabilities that allow leveraging the potential from digital
technologies. Due to the pervasive effects of such transformation on processes,
firms, and industries, both scholars and practitioners are interested in better
understanding the key mechanisms behind digital business transformation emer-
gence and evolution. The relevance of the phenomenon was also proved by a MIT
Sloan Management Review Research Report [3] that points out how the 78% of
corporate leaders and managers across various industries consider digital trans-
formation achievement a critical asset for organizational performance. According to
Berman [4], the digital transformation enables organizations to achieve various
advantages in terms of (i) creating new business models; (ii) improving operational
processes; and (iii) enhancing customer experiences. More recent research on the
topic has revealed further advantages deriving from digital transformation in terms
of key impacts, such as value creation, competitive advantage, and improved
relationships, and transformed areas, such as employees, culture, and infrastructure
(see Morakanyane, Grace and O’Reilly [5] for a systematic literature review).
Scholars and managers are looking for possible organizational and management
solutions that allow easier management of the changes deriving from digital
transformation [6]. It is no coincidence that several initiatives were conducted for
exploring new digital technologies and for exploiting their benefits within all
industries [76]. As Hess and colleagues pointed out, “integrating and exploiting
new digital technologies is one of the biggest challenges that companies currently
face. No sector or organization is immune to the effects of digital transformation.
The market-changing potential of digital technologies is often wider than products,
business processes, sales channels or supply chains -entire business models are
being reshaped and frequently overturned” [1, p. 123].
The existing managerial literature agrees that organizations should establish
management practices to handle the complex transformations triggered by digital-
ization [e.g., 1, 3]. In this regard, it is critical to formulate a digital transformation
strategy that takes into account different options and elements enable to obtain
advantages of digital transformation endeavors and to avoid the risk that such
process does not meet the company needs. Consistent with previous research on the
alignment between business strategies and IT strategies [8], it is critical that busi-
ness leaders formulate and execute digital transformation strategies that focus on
“the transformation of products, processes, and organizational aspects owing to new
technologies” [3, p. 339]. Existing research on digital transformation issue has
Introduction vii
The first part of the book includes papers that analyze the impact that digital
technologies produce on business models transformation.
In the era of digital transformation, companies are seeking new opportunities to
reshaping their business model and to transform their operations, in the order of
greater customer interaction and collaboration and to gain competitive advantage
through differentiation strategies. Recent studies show how companies with a
cohesive plan for integrating the digital and physical components of operations can
successfully transform their business models and are able to optimize all elements
of the value chain satisfying the need of their stakeholders.
viii Introduction
The second part of the book collects papers that analyze the link between digital
technologies and business administration processes. Even if those kinds of tech-
nologies have been studied in several business areas, as commercial function,
marketing, organization, and human resources management, little investigations are
developed in accounting, control, and reporting fields. Researcher asks for more
enquiries to help companies to face several questions regarding business admin-
istration: Why they have to implement or to not implement digital technologies to
manage administrative and control processes considering opportunities and
x Introduction
The third part of the book analyzes the effects of digital transformation on users’
attitudes and behaviors, organizational processes, and structures, as well as on the
new ways to organize work inside and across organizations. The relationships
between digital transformation, people, and organizations are an emerging topic in
managerial literature and information systems (IS) research. While the effects of
digital transformation on business models and on industrial changes are well noted
in the managerial literature—and business management in particular—less attention
has been given to organization’s capability to manage such constant (or disruptive)
revolution. It is interesting to note how managers design organizational processes
and new of working inside and across organizations—respect than traditional
work—in order to manage digital transformation.
The third part of this book collects various contributions on topic that are
illustrated below.
Chapter “Organizational Impacts on Sustainability of Industry 4.0: A Systematic
Literature Review from Empirical Case Studies” of Emanuele Gabriel Margherita
and Alessio Maria Braccini focuses on the organizational impacts on sustainability
of Industry 4.0. Authors conducted a systematic literature review of empirical case
studies from Industry 4.0 context in order to understanding the organizational
impacts on sustainability that was measured through three dimensions, such as
economic, social, and environment. Findings have shown that the economic
dimension is prominent in the literature, while little attention has been paid on
organizational impacts on social and environmental dimensions.
The chapter of Giovanna Morelli, Cesare Pozzi, and Antonia R. Guerrieri
entitled “Industry 4.0 and the Global Digitalised Production. Structural Changes in
Manufacturing” investigates the impact of Industry 4.0 on the Italian SMEs oper-
ating in the manufacturing sector and the effects of technology on work and
organizations with respect to SMEs and networks. Authors remarked that Industry
4.0 could be an effective driving force for networking SMEs, despite the employees
in manufacturing sector were reduced.
The chapter of Claudia Dossena and Francesca Mochi entitled “Managing
Online Communities and E-WOM: Prosumers’ Characteristics and Behaviors in the
Food Service Sector” investigates the prosumers’ use of social media in choosing a
restaurant and reviewing it online. It aims to understand if prosumers’ character-
istics influence the social media’s perception and usage in terms of information,
writing feedbacks, and trust online reviews. Findings have shown that social media
usage—gathering information and experience reviewing—depending on how many
times they go to the restaurant. Moreover, findings have also shown that prosumers
that have an “explorative” behavior (i.e., trying new restaurants) use social media
respect than prosumers with a “loyal” behavior (i.e., staying by a familiar
restaurant).
xii Introduction
The chapter of Ronald Van den Heuvel, Rogier Van de Wetering, Rik Bos, and
Jos Trienekens entitled “Identification of IT-Needs to Cope with Dynamism in
Collaborative Networked Organizations—A Case Study” focuses on the need for IT
systems to overcome (or to react) to the network dynamics that a collaborative
networked organization encounters. Using via a systematic literature review,
authors developed a framework to gather results in the case study—15 interviews
over 12 organizations that participate in the CNOs. This chapter provides insight
into the IT needs used to cope with the dynamics a CNO encounters.
The chapter of Haruka Ikegami and Junichi Iijima entitled “Unwrapping Efforts
and Difficulties of Enterprises for Digital Transformation” aims to investigate the
efforts and difficulties of enterprises when digital transformation occurs. Such
research identified three key topics that enterprises should consider for digital trans-
formation, such as (1) customer experience, (2) strategic intent, and (3) ecosystem.
Finally, the chapter of Mina Haghshenas and Thomas Østerlie entitled
“Coordinating Innovation in Digital Infrastructure: The Case of Transforming
Offshore Project Delivery” investigates how digital innovation influences project
delivery in the offshore construction industry. Based on a case study, such research
emphasizes how digital innovation unfolds within the confines of existing indus-
trial, organizational, and technological structures. It is also shown that digital
innovation network dynamics emerge through the interplay between generativity
and installed base.
The fourth part of the book analyzes the research topic of digital ecosystems, with
peculiar reference to business innovation and digital transformation inside and
across organizations. Digital ecosystem is a critical and current topic in managerial
literature and IS research. It is a dynamic integration of people, processes, com-
panies, and data aimed at enabling organizations to drive transformation and
improve business outcomes. It should be noted that when digital transformation
occurs, organizations with limited resources and competencies look at outside their
industry boundaries to seek new ways of supporting their business through coop-
erative and interactive relationships with partners. In this regard, organizations and
business processes need to be integrated through a digital ecosystem strategy, as
well as new systems and tools should be embraced for delivering value to stake-
holders through increased flow of data and shared insights.
The fourth part of this book collects various contributions on topic that are
illustrated below.
The chapter of Claudia Dossena and Francesca Mochi entitled “Organizational
Capabilities for Social Media Management: How Restaurant Managers Approach to
the Digital Ecosystem” is an explorative research on how restaurant managers
Introduction xiii
Rocco Agrifoglio
rocco.agrifoglio@uniparthenope.it
Rita Lamboglia
rita.lamboglia@uniparthenope.it
Daniela Mancini
dmancini@unite.it
Francesca Ricciardi
francesca.ricciardi@unito.it
xiv Introduction
References
1. Hess, T., Matt, C., Benlian, A., & Wiesböck, F. (2016). Options for formulating a digital
transformation strategy. MIS Quarterly Executive, 15(2), 123–139.
2. Günther, P. (2016). Transformation of the recorded music industry to the digital age: A
review of technology-driven changes in the EU copyright framework focusing on their effect
on digital music markets. Hanken School of Economics.
3. Fitzgerald, M., Kruschwitz, N., Bonnet, D., & Welch, M. (2014). Embracing digital tech-
nology: A new strategic imperative. MIT Sloan Management Review, 55(2), 1.
4. Berman, S. J., (2012). Digital transformation: Opportunities to create new business models.
Strategy & Leadership, 40(2), 16–24.
5. Morakanyane, R., Grace, A. A., & O’Reilly, P. (2017, June). Conceptualizing digital trans-
formation in business organizations: A systematic review of literature. In Bled eConference
(p. 21).
6. Nambisan, S., Wright, M., Feldman, M., & Western, C. (2019). The digital transformation
of innovation and entrepreneurship: Progress, challenges and key themes. Research Policy,
48(8).
7. Matt, C., Hess, T., & Benlian, A. (2015). Digital transformation strategies. Business &
Information Systems Engineering, 57(5), 339–343.
8. Henderson, J. C., & Venkatraman, N. (1993). Strategic alignment: leveraging information
technology for transforming organizations. IBM Systems Journal, 32(1):4–16.
9. Bharadwaj, A., El Sawy, O. A., Pavlou, P. A., Venkatraman, N. (2013). Digital business
strategy: Toward a next generation of insights. MIS Quarterly, 37(2):471–482.
10. Parviainen, P., Tihinen, M., Kääriäinen, J., & Teppola, S. (2017). Tackling the digitalization
challenge: how to benefit from digitalization in practice. International Journal of Information
Systems and Project Management, 5(1), 63–77.
11. Schäffer, U., & Weber, J. (2019). Digitalization will radically change controlling as we know
it. In Behavioral controlling (pp. 159–168). Wiesbaden: Springer Gabler.
12. Kamphake, A. G. (2020). Digitalization in controlling. In Digitization in controlling (pp. 3–25).
Wiesbaden: Springer Gabler.
Contents
xv
xvi Contents
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer 3
Nature Switzerland AG 2020
R. Agrifoglio et al. (eds.), Digital Business Transformation, Lecture Notes in Information
Systems and Organisation 38, https://doi.org/10.1007/978-3-030-47355-6_1
4 S.-L. Wamba-Taguimdje et al.
1 Introduction
The year 1974 saw the advent of the first expert systems; the most famous being
MYCIN [1, 2] designed to assist in the diagnosis and treatment of bacterial blood
diseases. At the middle of the twentieth Century, McCulloch and Pitts worked on
artificial neurons simulating the laws of logic [3]. Turing carried out research on a
universal machine that is theoretically able to solve all problems by manipulating
symbols [4, 5], and this was the starting point of investigations on an artificial system
that might be as good as a human mind. In line with the fast-paced sophistication
of technologies, Garry Kasparov, a world chess champion, was beaten in 1996 by
the Deep Blue software of IBM [6, 7]. In 1967, the first program of chess with
satisfactory performances was created by Greenblatt to beat a player. This significant
event demonstrates that AI performs better than men in specific areas, and the proven
efficiency of expert systems leads to increased sales of hardware using this system
[8]. AI begins to democratize to appear in large companies such as Google, Amazon,
IBM.
The digital revolution has produced its effects and is translating the modern world
into data. Data is no longer confined to data centers. With sensors of any kind, any
object, or environment of objects, becomes capable of measuring and producing data.
The impact of the industrial and digital revolutions has undoubtedly had a financial
impact on virtually every aspect of our society, life, business and employment. In
fact, digital transformation is changing business models and organizational culture.
It has an impact on its functioning, its organization, its teams, but more generally
on its governance [6, 7]. Thus, those who are at the end of the digital transition
see a new turning point: the one of intelligent transition. In the same way as digital
technology transformation, which has had a transversal impact on organization, will
involve all the functions of organizations during its operationalization [9, 10]. The
major advances in AI are based on three main factors: technological, economic and
human [9, 10]. Despite its relatively low level of integration, AI helps to modify
organizational processes, improve process and organizational performance, improve
cost reduction and track activities through its informational, automational and trans-
formational effects [9, 11]. With an average fundraising of $22 million per company,
the total amount raised by AI start-ups reached a record $10 billion. With a contri-
bution of $15.7 trillion to the global economy in 2030, AI is positioning itself as
a catalyst for organizational growth [11]. According to analysts TRACTICA and
GARTNER, the potential market for AI is expected to reach $11.1 billion by 2024,
up from $200 million in 2015 [12, 13]. The AI is expected to generate nearly $90
billion in profits by 2025, compared to just over $11.3 billion this year [12, 13]. The
exponential growth in the power of processing processes, combined with an unprece-
dented increase in available data, has made AI extremely attractive to organizations.
Its deployment requires significant investments in infrastructure, training, integration
and maintenance, in addition to an increase in IT budgets, particularly for hardware
and data storage including the cloud [14].
Impact of Artificial Intelligence on Firm Performance … 5
2 Literature Review
This theory stems from a well-known statement by R. Solow: “The age of the
computer has arrived everywhere, except in productivity statistics”. For this author,
the technological evolution experienced during the last decades coincided with
a significant slowdown in the rate of productivity growth in organizations [16].
Analyzing the relationship between IT equipment rate and productivity through
the estimation of Cobb-Douglas traditional production functions, they were able to
demonstrate that organizations with higher IT equipment/infrastructure ratios have
an apparent productivity of higher work, and that organizations using more intensely
IT users are not penalized in relation to others in terms of productivity [15, 17]. Yet,
the measured productivity growth has halved over the last decade. Systems using
artificial intelligence match or surpass human performance in a growing number of
areas. As they take advantage of rapid advances in other technologies, they potentially
6 S.-L. Wamba-Taguimdje et al.
serve as catalysts that can significantly increase the productivity and performance of
organizations [15, 17].
The organizations have resources (human resources, business resources and techno-
logical resources) which are valuable, rare, difficult to imitate, imperfectly substi-
tutable and non-transferable, a subset of which enables them to establish a competitive
position, competitive and privileged advantage, a source of superior performance,
provided that they are protected against imitation and substitution [21, 22]. Bharadwaj
[22] highlights the concept of information technology capacity, defined as the ability
to mobilize IT-based resources in combination with other resources and capabili-
ties. “IT capacity” is built on tangible resources, human resources and intangible
resources [21, 22]. He demonstrated that IT capacity is positively associated with
organizational performance.
4 Research Methodology
47]. These case studies provide verifiable facts, such as the contact details of the
organizations, the personal contacts of the members involved in the AI integration
process in their organizations, and excerpts from their interviews. The successful
adoption of AI explained in these case studies and in the literature, allows us to
support and consolidate the research elements at first. Second, allows us to propose
and develop an in-depth analysis of each research proposal. So, we examined 150
archived cases that had adopted AI, all of which were drawn from the website of a
leading vendor of AI techniques and technologies (Appendix).
For each identified case, the first author ensured the elements to be used to
build the search pattern were available. Such elements included: AI management
capabilities, AI personnel expertise, AI infrastructure flexibility, Process-Oriented
Dynamic Capabilities, financial performance, marketing performance, and adminis-
trative performance (Fig. 1). Then, two investigators took on the data coding process
and used a scale with values ranging from 1 to 4. The value 1 is assigned when the
construct is not mentioned in the case. Value 2 corresponded to the lowest value, 4
the highest value and 3 the average value when a given construct is mentioned in the
case study. The two (02) readers codified the case studies in a progressive manner.
Before assigning a score to a construct, the reader performs an evaluation process.
Subjective character is therefore not so much in the difficulty of measuring the quan-
tities that describe an object, but rather in the overall perception of the case studies
[48–50]. We started from the premise that subjectivity could influence the process of
coding constructs [50, 51]. The overall process is done in three steps. First, the choice
of case studies on the websites of AI solution providers was unanimously made by
both readers. Second, each participant performed latent coding (transforming quali-
tative data into quantitative data). During this phase, it was to collect all the evidence
for each score assigned to a construct in each case study. Third, both researchers
provided the scores for each case study. All case studies that were incompatible in
terms of scores for both readers were simply eliminated to avoid any subjectivity.
Impact of Artificial Intelligence on Firm Performance … 11
This was to ensure, first, that our codification process is universal and neutral. And
secondly, what does not depend on a reader and is valid for both [52, 53].
Table 1 gives examples of the scores that we assigned to a few individuals in our
sample. And Table 2 presents some of the results obtained after case coding. The
link to each case study included in this study can be found in Appendix.
We consider that the AI capabilities of an organization correspond to the sum
of AI management capabilities, AI personal expertise and AI infrastructure flexi-
bility. The performance Improvement at organizational level is considered as the
sum of administrative, marketing and financial performance. The missing value of
construct is labelled as 1. The hypotheses are tested employing [54, 55]. Bootstrap-
ping Procedure and for testing meditated effects. The computations were performed
utilizing SMARTPLS software. This method allows us to generalize problems that
were previously almost impossible to solve, such as the ability to simultaneously
process several sets of explanatory and explained observed variables, the ability to
analyze the relationships between unobservable theoretical variables and to take into
account measurement errors, and the ability to confirm [56, 57]. The study of vari-
ability in factor analysis results (eigenvalues, eigenvectors) or variance estimation
in complex surveys are carefully treated. To avoid underestimating variability (i.e.,
confidence intervals that tend to be too small or have insufficient coverage), we
used a sample of 150 archived case studies such as Seddon and Calvert [58] and
Bhattacharya and Seddon [59].
5 Results
From Fig. 2, we can see that all our proposed hypotheses are supported. More
precisely, we can see that AICAP has a significant positive effect on PDCs (β =
0.292, p < 0.001) (H1 is supported). Also, AICAP has a direct significant positive
effect on PERF (β = 0.370, p < 0.001) (H2 is supported), and PDCs have a positive
significant effect on PERF (β = 0.221, p < 0.01) (H3 is supported). Moreover, the
R2 of PERF is about 23, 30% and the one of PDCs is about 8.5%. Finally, as we can
notice from Table 3, PDCs mediate the relationship between AICAP and PERF (β
= 0.065, p < 0.05) (H4 is supported).
Impact of Artificial Intelligence on Firm Performance … 13
The careful analysis of our results shows that 39.25% (Table 4) of our sample
uses what we have called generic AI, the term AI here referring to several types or
parts of AI that are used for example to perform analysis, for automation of tasks,
decision support or for redesigning a company’s processes by integrating digital
transformation. This trend may be justified by the fact that, in general, firms do not
Table 4 Classification of
Types of AI Total Percentage
case studies according to AI
technology used AI 73 39.25
Machine learning 49 26.34
Deep learning 8 4.30
Cognitive 25 13.44
Cognitive cyber security 6 3.23
Natural language processing 15 8.06
Robotic personal assistant 2 1.08
Pattern/visual recognition 3 1.61
Chatbots 2 1.08
Neural networks 1 0.54
Virtual companion 2 1.08
Total 186a 100
a There is repetition of AI type: some cases have multiple types of
AI
14 S.-L. Wamba-Taguimdje et al.
6 Discussion
Contrary to previous studies that examined the influence and the impact of IT on
specific business processes only, the conceptual framework proposed in this paper
examines the cumulative effects of AI capabilities on improving process-oriented
dynamic capabilities and the mediation effect of these between AICAP and orga-
nizational performance improvement. Furthermore, most of the previous research
on AI has been limited to either financial measures, marketing measures or admin-
istrative measures as a key indicator of organizational performance, our research
also applies to administrative and marketing performance to highlight the direct and
indirect influence of AI on organizational performance. Therefore, the results of
this research are new in terms of satisfying the need for leaders and managers to
capture, control and understand the direct and indirect benefits of AI capabilities
in their organizations. Our study also reveals that process-oriented dynamic capa-
bilities contribute significantly to improving organizational performance (marketing
performance, financial performance and administrative performance). This means
that organizations must use AI to modify their business processes so that they can
adapt to the ever-changing environment.
Our study has several theoretical implications for AICAP research to be consid-
ered in future research. First, it is one of the first studies to assess the direct impact of
AICAP on firm performance and dynamic process-driven capabilities, and to assess
the mediating effect of PDCs on the relationship between AICAP and PERF. Also,
our study contributes to the research stream on business value of IT by confirming
the importance of investing into complementary assets (e.g., dynamic process-driven
capabilities). The result is in line with those obtained by [29, 60] in their studies on
the influence of IT capabilities on business performance.
In addition to the theoretical implications, our study has several managerial impli-
cations. Firstly, the results suggest in particular that companies with improved PDCs
Impact of Artificial Intelligence on Firm Performance … 15
will generate better performance and achieve a competitive advantage [19]. Secondly,
our results show that the use reconfiguration of PDCs by companies in order to benefit
from the advantages of AI allows them to improve their performance, the profitability
of their investments in AI and thus have a competitive advantage. Our analyses are
consistent with proposals by [14] suggesting to managers who invest in AI to develop
capabilities to redefine their processes. Managers can therefore confidently discuss
the role played by AI in implementing business strategies and improving business
performance as suggested [61, 62].
7 Conclusion
Appendix
Available upon request. Contact one of the authors to access the list of case studies,
and the links.
16 S.-L. Wamba-Taguimdje et al.
References
1. Hopfield, J. J. (1984). Neurons with graded response have collective computational properties
like those of two-state neurons. Proceedings of the National Academy of Sciences, 81(10),
3088–3092.
2. Shortliffe, E. H. (1974). MYCIN: A rule-based computer program for advising physicians
regarding antimicrobial therapy selection. Stanford University California Department of
Computer Science.
3. McCulloch, W. S., & Pitts, W. (1943). A logical calculus of the ideas immanent in nervous
activity. The Bulletin of Mathematical Biophysics, 5(4), 115–133.
4. Turing, A. M. (1950). Can a machine think. The world of Mathematics, 59(236), 433–460.
5. Turing, A. M. (1937). On computable numbers, with an application to the Entscheidungs
problem. Proceedings of the London Mathematical Society, 2(1), 230–265.
6. Aghion, P., Jones, B. F., & Jones, C. I. (2017). Artificial intelligence and economic growth (No.
w23928). National Bureau of Economic Research.
7. Agrawal, A., Gans, J., & Goldfarb, A. (2018). The economics of artificial intelligence. McKinsey
Quarterly.
8. Greenblatt, R. D., Eastlake, D. E., & Crocker, S. D. (1988). The Greenblatt chess program. In
Computer chess compendium (pp 56–66). Springer.
9. von Krogh, G. (2018). artificial intelligence in organizations: New opportunities for
phenomenon-based theorizing. Academy of Management Discoveries.
10. Russell, S. J., & Norvig, P. (2016). Artificial intelligence: A modern approach. Malaysia:
Pearson Education Limited.
11. PWC. (2019). Sizing the prize: Exploiting the AI revolution, what’s the real value of AI for your
business and how can you capitalise? In PwC’s Global Artificial Intelligence Study. Cited 2019,
31 Mar 2019. Available from: https://www.pwc.com/gx/en/issues/data-and-analytics/publicati
ons/artificial-intelligence-study.html.
12. Scanner, V. (2019). Artificial intelligence market report and data. Cited 2019, 02 Aug 2019;
Venture Scanner is your analyst and technology powered research firm. Gain deep insights with
our carefully crafted executive summaries. Analyze our extensive data on startups, investors,
and exits to complete your research. Available from: https://www.venturescanner.com/artifi
cial-intelligence.
13. Microsoft. (2019). Les 5 chiffres à absolument connaître sur l’IA. Cited 2019, 02 Aug 2019.
Available from: https://experiences.microsoft.fr/business/intelligence-artificielle-ia-business/
ia-chiffres-cles/.
14. Françoise Mercadal-Delasalles, K. V. (2017). Les enjeux de mise en œuvre opérationnelle de
l’intelligence artificielle dans les grandes entreprises (Vol. 36). CIGREF, réussir le numérique
ed. CIGREF, ed. l.i.a.d.l.g. entreprises. CIGREF, réussir le numérique.
15. Brynjolfsson, E., Rock, D., & Syverson, C. (2018). Artificial intelligence and the modern
productivity paradox: A clash of expectations and statistics. In The economics of artificial
intelligence: An agenda. University of Chicago Press.
16. Triplett, J. E. (1999). The Solow productivity paradox: What do computers do to productivity?
The Canadian Journal of Economics/Revue Canadienne d’Economique, 32(2), 309–334.
17. Brynjolfsson, E. (1993). The productivity paradox of information technology: Review and
assessment. Communications of the ACM, 36(12), 66–77.
18. Soh, C., & Markus, M. L. (1995). How IT creates business value: A process theory synthesis.
In ICIS 1995 Proceedings (p 4).
19. Kim, G., et al. (2011). IT capabilities, process-oriented dynamic capabilities, and firm financial
performance. Journal of the Association for Information Systems, 12(7), 487.
20. Mooney, J. G., Gurbaxani, V., & Kraemer, K. L. (1996). A process oriented framework for
assessing the business value of information technology. CM SIGMIS Database: The DATABASE
for Advances in Information Systems, 27(2), 68–81.
21. Peteraf, M. A., & Barney, J. B. (2003). Unraveling the resource-based tangle. Managerial and
decision economics., 24(4), 309–323.
Impact of Artificial Intelligence on Firm Performance … 17
47. Center, A. H., et al. (2008). Public relations practices: Managerial case studies and problems.
Pearson Prentice Hall.
48. Madill, A., Jordan, A., & Shirley, C. (2000). Objectivity and reliability in qualitative analysis:
Realist, contextualist and radical constructionist epistemologies. British Journal of Psychology,
91(1), 1–20.
49. Kracauer, S. J. (1952). The challenge of qualitative content analysis. Public Opinion Quarterly,
631–642.
50. Grbich, C. (2012). Qualitative data analysis: An introduction (2nd edn). London: Sage
Publications.
51. Mauthner, N. S., & Doucet, A. J. S. (2003). Reflexive accounts and accounts of reflexivity in
qualitative data analysis. Sociology, 37(3), 413–431.
52. Ratner, C. (2002, September). Subjectivity and objectivity in qualitative methodology. In Forum
Qualitative Sozialforschung/Forum: Qualitative Social Research, 3(3).
53. Nonaka, I., & Toyama, R. (2005). The theory of the knowledge-creating firm: Subjectivity,
objectivity and synthesis. Industrial and Corporate Change., 14(3), 419–436.
54. Lockwood, C. M., & MacKinnon, D. P. (1998, March) Bootstrapping the standard error of the
mediated effect. In Proceedings of the 23rd Annual Meeting of SAS Users Group International
(pp 997–1002). Citeseer.
55. Bollen, K. A., & Stine, R. A. (1992). Bootstrapping goodness-of-fit measures in structural
equation models. Sociological Methods and Research., 21(2), 205–229.
56. Balambo, M. A., & Baz, J. (2014). De l’intérêt de l’analyse des modèles des équations struc-
turelles par la méthode PLS dans les recherches sur les relations inter organisationnelles: Le
cas des recherches en Logistique. In 7ème Edition du colloque international LOGISTIQUA.
57. Chin, W. W. (1998). The partial least squares approach to structural equation modeling. Modern
Methods for Business Research, 295(2), 295–336.
58. Seddon, P. B., Calvert, C., & Yang, S. J. M. Q. (2010). A multi-project model of key factors
affecting organizational benefits from enterprise systems. Management Information Systems
Quarterly, 34(2), 305–328.
59. Bhattacharya, P. J., Seddon, P. B., & Scheepers, R. (2010, December). Enabling strategic
transformations with enterprise systems: Beyond operational efficiency. In ICIS (p 55).
60. Kala Kamdjoug, J. R., Nguegang Tewamba, H. J., & Fosso Wamba, S. (2018). IT capabilities,
firm performance and the mediating role of ISRM: A case study from a developing country.
Business Process Management Journal.
61. Balint, B., Forman, C., & Slaughter, S. (2010). Process standardization, task variability, and
internal performance in IT business services outsourcing. Working paper. http://www.devsmith.
umd.edu/doit/events/pdfs….
62. Guest, D. (2014). Employee engagement: A sceptical analysis. Journal of Organizational
Effectiveness: People and Performance, 1(2), 141–156.
Artificial Intelligence and Ethics
in Portfolio Management
E. Beccalli
Universita’ Cattolica del Sacro Cuore, Milan, Italy
e-mail: elena.beccalli@unicatt.it
V. Elliot
University of Gothenburg, Gothenburg, Sweden
e-mail: viktor.elliot@gu.se
F. Virili (B)
University of Sassari, Sassari, Italy
e-mail: fvirili@uniss.it
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer 19
Nature Switzerland AG 2020
R. Agrifoglio et al. (eds.), Digital Business Transformation, Lecture Notes in Information
Systems and Organisation 38, https://doi.org/10.1007/978-3-030-47355-6_2
20 E. Beccalli et al.
1 Introduction
The two quotes are illustrative of the new dimension that automation and artificial
intelligence (AI) brings to financial investment. Compared to old school quantitative
financial investing, where the human had to invent and create the investment strategy
(see e.g. Ou and Penman [27]; Holthausen and Larcker [18]),1 with AI the machine
continuously adapts the investment strategy on the basis of market conditions and
evolving performances; humans only focus on developing the right machine (i.e. to
devise and eventually improve the machine learning process). Because of this change
in the role of developers in financial modelling—rather than building a strategy, the
coders develop a machine that will eventually come up with its own strategy—their
work is not primarily evaluated in terms of performance (yield), but in terms of the
robustness/persistence/consistency of the training process of the AI.
The ultimate goal in AI-based tech investing is to develop strategies that will adapt
over time. But, who is accountable if the machine learning process eventually leads
the investment strategy to bad performances? As reported below, the AI developer
might face a trade-off between short term and long term portfolio performance,
raising issues on how to understand, evaluate and control the ethical and technical
correctness of the programmer’s job and its contribution to value production.
For the purpose of this paper we build on agency theory to discuss and analyse
the incentive conflicts that may arise among managers and AI developers when
they work together to teach machines how to make investments. In particular, via the
agency theory framework, we focus on how the ethical issues traditionally associated
with investment practice can be adapted to take into account the peculiarities of
AI-programming, so that we discuss ethical machine investments.
The rest of the paper is organized as follows. Section 2 provides the theoret-
ical framework based on agency theory in the context of machine ethics. Section 3
describes the methodology used to collect and analyse the empirical evidence on
the case of a AI-investment company. Preliminary results are discussed in Sect. 4.
Section 5 concludes.
1 These studies develop quantitative trading strategies based on statistical models designed to predict
2 Theoretical Framework
In the 2015 article entitled “The Irrelevance of Ethics”, MacIntyre [22] argues that
acquiring the moral virtues would undermine someone’s capacity to be a good trader
in the financial system. Yet, ethics is far from being irrelevant in finance. Accordingly,
Rocchi et al. [30] explain the challenge at the heart of MacIntyre’s [22] claims can
be crystallized in the question, “under which conditions, if any, can a person be
an effective trader and simultaneously live a worthy human life?” They conclude
that there are realistic possibilities of integrity and growth in moral virtue for those
who work in the financial sector, at least for those operating in a work environment
minimally permissive toward virtue, provided they possess characters of integrity
and genuine aptitude for the skills and attitudes required in their professional tasks.
Following on, a recent stream of literature focuses on unethical managerial deci-
sions. At sociological level, de Bruin [9] argues that a key element of the global
financial crisis of 2007–2008 was a failure of epistemic (i.e. knowledge-based) virtue,
whilst Borg and Hooker [6] argue that this is fundamentally not an epistemic but a
moral issue and change in the financial sector is best promoted by reconceiving of
the relationship between financial institutions and the societies they serve. At orga-
nizational level, Rafeld et al. [29] investigate three major collusive rogue traders
in banking (at National Australia Bank, JPMorgan with its London Whale) and
the interest reference rate manipulation/LIBOR scandal. There have been instances
of unauthorized acting in concert between traders, their supervisors and/or firms’
decision makers and executives. They explore organizational misbehaviour theory
through a descriptive model of organizational/structural, individual and group forces.
Their model draws conclusions on how banks can set up behavioural risk manage-
ment and internal control frameworks to mitigate potential collusive rogue trading.
Azim and Kluvers [4], with a focus on corruption within organisations, explore
the successful management of corruption by the Grameen Bank, a leading microfi-
nance institute that operates in Bangladesh. Their study explores the impact of the
anti-corruption structures, policies and processes implemented by Grameen Bank.
In what follows, we introduce machine ethics after which we discuss how the
broader agency theory concepts can be linked to the field of machine ethics and used
as a template to analyse how firms are creating different forms of incentive structures
to promote ethics in AI-based investment algorithms.
such justification for decisions that could result in death, financial loss, or denial of
parole” [25].
The emerging field of machine ethics is concerned with giving machines ethical
principles, or finding procedures for solving the ethical dilemmas that machines
may encounter. This means enabling machines to function in an ethically respon-
sible manner. Machine ethics links to autonomy, because by providing an ethical
framework for machines we effectively allow them to operate autonomously without
human intervention. There is an abundance of tasks that we would like to distribute
to machines (because the jobs are dangerous, unpleasant, shortage of humans, or
simply because the machine can do a better job), but no one would feel comfortable
to give machines autonomy without ethical safeguards [3].
Machine ethics in investment is intrinsically linked to the algorithms that develop,
suggest, or perform new investment strategies. According to Hill [16, p. 47] an
algorithm is a mathematical construct with “a finite, abstract, effective, compound
control structure, imperatively given, accomplishing a given purpose under given
provisions.” Still as argued by Mittelstadt et al. [24], it makes little sense to consider
the ethics of algorithms independent of how they are implemented and executed
in computer programs, software and information systems. The authors introduce a
framework for diagnosing the ethical challenges related to the use of algorithms.
The diagnostic framework is based on algorithms that (i) are used to turn data into
evidence for a given outcome, (ii) have an outcome which trigger and motivate an
action that may not be ethically neutral, and (iii) are complex and (semi-)autonomous,
complicating the apportionment of accountability and/or responsibility for the effects
of the actions driven by algorithms. The first three (darker grey) are considered
epistemic concerns meaning that they question the quality of evidence provided by
the algorithm, whereas the following two (lighter gray) are normative concerns, i.e.
used to evaluate the actions taken by the algorithms. Because all five concerns are
associated with potential failures that may involve multiple actors, the question of
who should be held responsible and/or accountable for failures is pertinent and,
therefore, the final (white) overarching concern is traceability.
Algorithms are ethically challenging because of the scale of analysis and
complexity of decision-making. In addition, the uncertainty and opacity of the work
being done by algorithms and its impact is also increasingly problematic. Algo-
rithms have traditionally required decision-making rules and weights to be indi-
vidually defined and programmed ‘by hand’. While still true, AI-based algorithms
increasingly rely on learning capacities [35], meaning that such rules and weights
are no longer necessary. In the next sub-sections, we frame the machine ethics issue
into agency theory to analyze how firms are creating different forms of incentive
structures to promote ethics in AI-based investment algorithms.
Artificial Intelligence and Ethics in Portfolio Management 23
Berle and Means’ (1932) seminal study [5] on the problems associated with dispersed
shareholders that cannot perfectly observe the actions of opportunistic managers was
the starting point of extensive theoretical and empirical work on agency theory (see,
Jensen and Meckling [20], Ross [31], Holmstrom [17], Fama [11], Eisenhardt [10]
and Shapiro [32] for important contributions and reviews). Agency theory (widely
applied to a multitude of academic fields as explained in Panda and Leepsa [28])
appears particularly relevant in the investigation of financial investment.
One such stream of research are the studies that apply agency theory to the relation
between investors and investment advisors (e.g., Golec [14], Ottaviani [26], Das and
Sudaram [8], Cuoco and Kaniel [7], Mitchell and Smetters [23], Tan and Lee [34]).
The majority of these studies focus on identifying models for the optimal incentive
contract that minimize agency costs. In this setup, the investor is the principal and
the investment advisor is the agent.
Building on Eisenhardt’s [10], Tan and Lee [34] elaborate on three problems
arising when a principal delegates to an agent: goals, risks, and information.
Goal asymmetry (GA) arise when the principal believes that the agent has different
goals from the principal. GA may lead to opportunistic behaviour either if the agent
have de facto different goals from the principal (as was common during the global
financial crisis, when poorly designed incentive systems encouraged investment advi-
sors to disregard risk in favour of bonuses), or when the agent fails to understand the
principal’s goal/s.
Risk asymmetry (RA) stems from the principals’ beliefs that the agent has different
risk preferences and, alas, will take decisions that are more or less risky than what the
principal would have preferred. This is based on risk-sharing between the principal
and the agent, but they differ in risk attitudes. In standard economic setting the
investor is risk averse, whereas the investment advisor is risk neutral. In addition,
moral hazard may enter if the agent shares the upside, but not the downside, risk.
Because financial products are credence goods (i.e. have qualities that cannot be
observed by the consumer after purchase, which makes it difficult to assess their
utility), RA might arise even if the risk preferences between the principal and the
agent are aligned. Especially, if the customer cannot accurately predict the expected
return.
Information asymmetry (IA) arises when one party has information that the other
party desires but does not have. In line with Eisenhardt [10], the principal can rely
on “information systems” as monitoring tools to evaluate and verify the behaviour
of the agent (see also, Aggarwal and Mazumdar [1]).
In our case on an asset management company selling investment strategies based
on AI, we rely on the three asymmetries listed above to analyse how the principal
agency relationship plays out in a specific organizational setting in which the role
of the principal is played by the top management of the company and the agents are
the developers of the company.
24 E. Beccalli et al.
As crystalized by Grandori [15, p. 169], for very complex activities and subject to
strong uncertainty, the agency relationship is in crisis since neither a greater transfer of
risk(to address risk asymmetry) nor the intensification of control (to address goal and
information asymmetries) are efficient. Therefore, the theory of the agency predicts
that in such conditions agency contracts will tend to be replaced by contracts of an
associative nature and by a sharing of ownership rights by the actors, that is by a
re-unification of the figures of the principal and of the agent and by the formation of
groups of peers [12, 13].
These implications are valid in the hypothesis of particular utility functions and
objectives that need to be realigned because they tend to be opposed (the hypothesis
of the effort as a cost). However, situations may arise where the management of
agency relations is simpler because the motivation of the agents is intrinsic to the job
and less instrumental than that assumed in the prevalent models of agency theory.
In addition, there are also other mechanisms for aligning objectives in addition to
incentives, in particular cultural and value-related mechanisms.
In our case, both the risk sharing mechanisms and the cultural and value-related
mechanisms appears to be relevant and actually used to deal with the accountability
and ethical issues raised by the introduction of AI.
3 Methodology
The study presented here considers how a young and innovative company is evolving
and applying digital technology (machine learning and other mechanisms commonly
linked to AI) to the traditional field of financial investments. The case firm is
MDOTM, a start-up that develops AI-driven investment strategies for global financial
markets. We chose the firm because of our interest in machine ethics and especially
linked to finance. MDOTM are considered as one of the innovation leaders in terms
of applying AI to financial investing and has been selected twice by Google for
its entrepreneurship programmes in Silicon Valley (Blackbox, focusing on business
acceleration and scale-ups) and Zurich (focusing on the business applications of AI
and machine learning).
At present we have done four formal interviews as presented in Table 1. The fourth
interview was purposefully a site visit in order to experience some of the things that
were mentioned during the previous interviews. During all interviews diligent notes
were taken, and these notes were transcribed directly after the interview. While the
empirical material is still somewhat limited there is a persistency in some of the
arguments that implies an emergent saturation (at least in terms of the CEO and
COO).
This paper is still an early draft version and we are developing the methods
linked to data collection and data analysis with respect to our conceptual model.
Artificial Intelligence and Ethics in Portfolio Management 25
Because this is an area with limited previous research, an exploratory and qualitative
approach is chosen. The exploratory purpose of the study motivates a search for
emergent generalizations rather than the testing of established patterns [21]. In line
with Suddaby [33] we rely on an abductive approach where matching, rather than
testable hypothesis or propositions, guides us in moving back and forth between
framework, data sources and analysis. In the words of, Alvesson and Sandberg [2,
p. 266]) “sometimes empirical findings play a major role in the formulation of a
study, such as in cases when one (re)formulates the research task quite late in the
process”, a point that well describes this study. In particular, while the starting-point
of our study was machine ethics more broadly, the moving back and forth between
data and theory helped us identify agency theory as a promising theoretical lens to
further our understanding of the empirical scenery. To some extent that paper has
moved from exploring machine ethics in finance to testing the relevance of traditional
agency theoretical arguments in an entrepreneurial and complex setting.
Fintech is still not regulated in Europe (few exceptions, among which the “regulatory
sandbox” in the UK), whereas banks and insurance companies are heavily regulated.
Discussion on two possible regulatory approaches: rules-based (preferred by
Germany) or principles-based (preferred by the UK). However, there is no specific
regulation for AI in Europe.
the investments as the shift towards AI means development work does not add or
modify specific parameters to an algorithm but rather intervenes on how to set up the
learning process of the machine. It becomes extremely difficult to identify ex-post
specific tweaks that led to certain results.
AI algorithms are designed to evolve over time and adapt to new market conditions.
Hence, their efficacy might be stressed and/or put into question years after their
development and in a modified market context, dramatically widening the time frame
for evaluation of developers’ work. A remedy to the gaps that arise is the correct
use of incentives for developers (see next section) that need to be long-term, and
team-based.
biases). The distinctive feature of MDOTM, following from AI, is that it sells the
ability of a machine to learn from the past and to adapt.
MDOTM pays attention to the selection of clients in each country/distribution
channel, in order to preserve the goal of the clients to protect their position. This has
an effect on the pricing (fees composed by a flat fee plus a performance fee).
The collection and analysis of preliminary evidence briefly reported here, together
with the selection of the latest developments of agency theory as theoretical frame-
work, are encouraging, suggesting to proceed with further research development.
After completing a theory-driven, in-depth semi-structured interview guide, further
stages of data collection and analysis of the MDOTM case, and triangulation with
further similar cases, are expected to shed light on this innovative and challenging
area of investigation.
Handling ethical issues in AI-based investing is particularly crucial not only for
the role and accountability of machine learning in decision making, but also for the
fact that there is no specific regulation for AI in Europe. This contrasts with the
heavy regulation of the finance industry in general, making the AI-based investing
particularly interesting to investigate from an ethical perspective.
From the theoretical point of view, a closer understanding of alternative ways
of handling the principal-agent relationships in complex and uncertain settings is
expected to contribute to an important contemporary area of theoretical development
Artificial Intelligence and Ethics in Portfolio Management 29
Acknowledgements We wish to thank Nien-hê Hsieh for his contribution in the initial phase of
the interviews. We also acknowledge the helpful comments by reviewer and participants at ITAIS
and MCIS conference (Naples 2019), and at AEDBF Conference (Milan 2019). This research was
supported by the Italian Ministry of Education (MIUR): “Dipartimenti di Eccellenza” Program
(2018–2022)—Department of Economics and Business—University of Sassari.
References
1. Aggarwal, P., & Mazumdar, T. (2008). Decision delegation: A conceptualization and empirical
investigation. Psychology and Marketing, 25(1), 71–93.
2. Alvesson, M., & Sandberg, J. (2011). Generating research questions through problematization.
Academy of Management Review, 36(2), 247–271.
3. Anderson, M., & Anderson, S. L. (Eds.). (2011). Machine ethics. Cambridge University Press.
4. Azim, M. I., & Kluvers, R. (2019). Resisting Corruption in Grameen Bank. Journal of Business
Ethics, 156, 591–604. https://doi.org/10.1007/s10551-017-3613-4.
5. Berle, A., & Means, G. (1932). The modern corporation and private property. New York, NY:
Macmillan.
6. Borg, E., & Hooker, B. (2019). Epistemic virtues versus ethical values in the financial services
sector. Journal of Business Ethics, 155, 17–27. https://doi.org/10.1007/s10551-017-3547-x.
7. Cuoco, D., & Kaniel, R. (2011). Equilibrium prices in the presence of delegated portfolio
management. Journal of Financial Economics, 101(2), 264–296.
8. Das, S. R., & Sundaram, R. K. (2002). Fee speech: Signaling, risk-sharing, and the impact of
fee structures on investor welfare. Review of Fin. Studies, 15(5), 1465–1497.
9. Davis, M., Kumiega, A., & Van Vliet, B. (2013). Ethics, finance, and automation: A preliminary
survey of problems in high frequency trading. Science and Engineering Ethics, 19(3), 851–874.
10. Eisenhardt, K. M. (1989). Agency theory: An assessment and review. Academy of Management
Review, 14(1), 57–74.
11. Fama, E. (1980). Agency problems and the theory of the firm. Journal of Political Economy,
88(2), 288–307.
12. Fama, E. F., & Jensen, M. C. (1983). Agency problems and residual claims. The Journal of
Law and Economics, 26(2), 327–349.
13. Fama, E. F., & Jensen, M. C. (1983). Separation of ownership and control. The Journal of Law
and Economics, 26(2), 301–325.
14. Golec, J. H. (1992). Empirical tests of a principal-agent model of the investor-investment
advisor relationship. Journal of Financial and Quantit. Analysis, 27(1), 81–95.
15. Grandori, A. (1999). Organizzazione e comportamento economico. Il Mulino.
16. Hill, R. K. (2015). What an algorithm is. Philosophy and Technology, 29(1), 35–59.
17. Holmstrom, B. (1979). Moral hazard and observability. Bell Journal of Economics, 10(1),
74–91.
18. Holthausen, R. W., & Larcker, D. F. (1992). The prediction of stock returns using financial
statement. Journal of Accounting and Economics, 15(2–3), 373–411.
19. Hurlburt, G. F., Miller, K. W., & Voas, J. M. (2009). An ethical analysis of automation, risk,
and the financial crises of 2008. IT Professional, 11(1), 14–19.
30 E. Beccalli et al.
20. Jensen, M., & Meckling, W. (1976). Theory of the firm: Managerial behavior, agency costs,
and ownership structure. Journal of Financial Economics, 3(4), 305–360.
21. Kvale, S., & Brinkmann, S. (2014). Den kvalitativa forskningsintervjun (the qualitative
research interview). Lund: Studentlitteratur. (in Swedish).
22. MacIntyre, A. C. (2015). The irrelevance of ethics. In A. Bielskis & K. Knight (Eds.), Virtue
and economy (pp. 7–21). Farnham VT: Ashgate.
23. Mitchell, O. S., & Smetters, K. (Eds.). (2013). The market for retirement financial advice. OUP
Oxford.
24. Mittelstadt, B. D., Allo, P., Taddeo, M., Wachter, S., & Floridi, L. (2016). The ethics of
algorithms: Mapping the debate. Big Data and Society, 3(2), 1–21.
25. Monroe, D. (2018). AI explain yourself. Communications of the ACM, 61(11), 11–13.
26. Ottaviani, M. (2000). The economics of advice. University College London, Mimeo.
27. Ou, J. A., & Penman, S. H. (1989). Financial statement analysis and the prediction of stock
returns. Journal of Accounting and Economics, 4(1), 295–329.
28. Panda, B., & Leepsa, N. M. (2017). Agency theory: Review of theory and evidence on problems
and perspectives. Indian Journal of Corporate Governance, 10(1), 74–95.
29. Rafeld, H., Fritz, S. G., & Posch, P. N. (2019). Whale watching on the trading floor: Unravelling
collusive rogue trading in banks. Journal of Business Ethics, 1–25.
30. Rocchi, M., Pelletier, L., & Desmarais, P. (2017). The validity of the interpersonal behaviors
questionnaire (IBQ) in sport. Measurement in Physical Education and Exercise Science, 21(1),
15–25.
31. Ross, S. A. (1973). The economic theory of agency: The principal’s problem. The American
Economic Review, 63(2), 134–139.
32. Shapiro, S. P. (2005). Agency theory. Annual Review of Sociology, 31, 263–284.
33. Suddaby, R. (2006). What grounded theory is not. Academy of Management Journal, 49,
633–642.
34. Tan, J. C. K., & Lee, R. (2015). An agency theory scale for financial services. Journal of
Services Marketing, 29(5), 393–405.
35. Tutt, A. (2016). An FDA for algorithms. SSRN scholarly paper no. id 2747994.
36. Vardi, M. Y. (2016). The moral imperative of artificial intelligence. Communications of the
ACM, 59(5), 5.
Putting Decision Mining into Context:
A Literature Study
Abstract The value of a decision can be increased through analyzing the decision
logic, and the outcomes. The more often a decision is taken, the more data becomes
available about the results. More available data results into smarter decisions and
increases the value the decision has for an organization. The research field addressing
this problem is Decision mining. By conducting a literature study on the current state
of Decision mining, we aim to discover the research gaps and where Decision mining
can be improved upon. Our findings show that the concepts used in the Decision
mining field and related fields are ambiguous and show overlap. Future research
directions are discovered to increase the quality and maturity of Decision mining
research. This could be achieved by focusing more on Decision mining research, a
change is needed from a business process Decision mining approach to a decision
focused approach.
1 Introduction
Decisions in the modern world are often made in fast-changing, sometimes unex-
pected, situations [1]. Such situations require the selection of the right decision maker
and supplying them with the necessary data. Decision mining solves this problem by
estimating data quality and interpretation of their semantics and relevance, the actual
meaning, and unit of measurement [1]. The second major advantage is the classifi-
cation of decisions which allow the discovery of correspondence between decision
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer 31
Nature Switzerland AG 2020
R. Agrifoglio et al. (eds.), Digital Business Transformation, Lecture Notes in Information
Systems and Organisation 38, https://doi.org/10.1007/978-3-030-47355-6_3
32 S. Leewis et al.
makers and their roles through the development of decision models and (semi) auto-
matic decision analysis techniques [1]. Decision mining can be segmented into three
types: Discovery, Conformance checking, and Improvement (similar as in Process
mining research [2]. An often-used definition of Decision mining, and also referred
to as decision point analysis, is “aims at the detection of data dependencies that affect
the routing of a case” [3]. This focus leaves out other decision elements embedded in
decision trees, database tables etc., such as business rules, business decision tables,
or executable analytic models. Therefore, we define Decision mining as “the method
of extracting and analyzing decision logs with the aim to extract information from
such decision logs for the creation of business rules, to check compliance to busi-
ness rules and regulations, and to present performance information”. The system
supporting and improving decision making is known as a Decision Support System
(DSS). DSSs is “the area of the information systems (IS) discipline that is focused on
supporting and improving managerial decision making” [4]. The current DSSs give
insufficient insight into how decisions are executed, this is especially the case for
executing multiple decisions at once (a group of decisions), thereby lacking the trans-
parency [5, 6]. Methods of Data mining are used in Decision mining and DSSs for
the following purposes: finding associative rules between decisions and the factors
affecting them, user clustering using decision trees and neural networks, recognition
of common users’ features or interests [7–9].
To the knowledge of the authors, little research exists on the topic of Deci-
sion mining, especially that of a comprehensive literature study. Furthermore, to
the knowledge of the authors, no research exists where the concepts of Decision
mining, Data mining and Process mining are compared. The Decision mining field
and its related fields lack the use of unambiguous concepts. Conducting a literature
study on the Decision mining field and its related fields creates a clear overview of
which concepts and definitions are used and if any overlap between these concepts
exists. This research will focus on more than just the business process aspect when
considering mining decisions compared to previous research [3, 10]. To do so, we
aim to answer the following research question: “What is the current state of the
Decision mining research field?”
The remainder of the paper is structured as follows: First, the research method
that was utilized to collect and review the literature for the theoretical review. This
is followed by the results of the literature review depicting Decision mining and its
context, resulting in the conceptual framework. Finally, we discuss the conclusions
of our research and provide a discussion about this research and the results, which
is followed by possible future research directions.
2 Research Method
The goal of this study is to evaluate the current state of Decision mining and to
discover possible future research directions. To achieve this, a conceptual framework
is created to evaluate the current state and to identify possible future directions [11].
Putting Decision Mining into Context: A Literature Study 33
Webster and Watson [15] state that Information Science is an interdisciplinary field
and is based on research from other disciplines and therefore reviewing inside the IS
field is not enough. To identify all concepts, constructs, and their relations concerning
Decision mining, a wide range of search queries are used in order to achieve this.
A difference is made between primary search queries focused on the research ques-
tion (Decision Mining) and secondary search queries (Process Mining, Data Mining,
Business Intelligence, Decision Management, Business Process Management, Deci-
sion Support Systems, Business Process Model and Notation, Decision Model and
Notation) providing context for the primary search queries. The relations between
the search queries are elaborated further in the result section.
34 S. Leewis et al.
Commonly used exclusion criteria for literature reviews are Date, Number of Cita-
tions, and High impact journals. Because of the low maturity and low H-index of
the research field, no citation criterion is used during this study. The common use
of the high impact factor journal inclusion and exclusion criterion [21–23] is not
used for this specific study. The difference between maturity in research fields and
the low research quality (H-index 54) is that the high impact factor journals do
not publish relevant articles on Decision mining. The dissimilarity between search
queries related to maturity and research quality is of that large a difference that the
inclusion or exclusion based on a high impact factor source would exclude a large
number of sources from the immature and lower research quality search queries. This
review protocol includes only the Date criterion and is defined as everything between
January 2000 and December 2018. The focus of this study lies on the current state of
Decision mining and by implementing a date threshold the actual current state can
be quantified in a date. Furthermore, Levy and Ellis [24] point out that by using a
review protocol, the actual moment a literature review is completed becomes much
clearer. An example of an element of a review protocol is a date range this clarifies
which papers with the specific dates are included [25].
Two reviewers (R1 and R2) are involved during the abstract and paper review. R1 is
a PhD-candidate with six years of practical and research experience in the field of
Decision Management; R2 is a lecturer and researcher with seven years of practical
and research experience in the field of Decision Management. The reviewers include
or exclude the papers based on the title and based on abstract, see Fig. 3. When the
two reviewers include the same paper based on the title, the paper is reviewed based
on the abstract. If the situation occurs that a paper was marked with one included and
one excluded, the two reviewers discuss the reviewing of the title. The same process
of reviewing also applies to the abstract review. R1 decides during the review of the
full paper on the relevancy of the paper. When any doubt on the relevancy exists by
R1, R2 decides if the paper is excluded or included.
3 Search Results
The executed search query resulted in 810 potential useable articles, see Fig. 2. Dupli-
cates and non-English papers were excluded, resulting in 74 papers being left out.
After title reviews 656 papers were excluded, 80 papers were included. Reviewing
the abstracts resulted in the exclusion of 24 papers, resulting in 56 papers that were
Putting Decision Mining into Context: A Literature Study 35
included. After reviewing the full papers, 35 papers remained. Based on references
and feedback from the supervisors 5 articles were included.
4 Results
The review process resulted in a longlist of papers distributed over the primary and
secondary research queries. The identified concepts and their relationships are the
pillars of the conceptual framework and this paper. The concepts and the relationships
to each other are shown as a metamodel in Fig. 3. The following sections will create
context to capture the current state of Decision mining.
data for the support of the decision-making process or to define any relationships
between two facts [27]. Business process management (BPM) [30] and Decision
management (DM) are examples of approaches utilizing available data to generate
information and knowledge for the support of decision-making processes.
BPM is “a collaboration of concepts, methods, and techniques to support
the design, administration, configuration, enactment, and analysis of business
processes” [30]. The base of BPM is the explicit representation of business process
containing activities with the execution constraints between these activities. After
defining the business processes, they can be analyzed, improved, and enacted [30].
The industry standard for defining a business process is the Business Process Model
and Notation (BPMN) [31].
DM is “the practice of managing smart, agile decisions” [32]. Decisions are
amongst an organization most important assets [33] Therefore, adequately managing
these decisions is vital. A decision is “A conclusion that a business arrives at through
business logic and which the business is interested in managing” [34] and busi-
ness logic is “a collection of business rules, business decision tables, or executable
analytic models to make individual business decisions” [35]. Modelling the deci-
sions and business logic to make them explicit for further analysis is an aspect of
DM. Decision Model and Notation (DMN) [34] is used as an industry standard for
the modelling of decisions.
The first decision support systems (DSS) were developed for the support of decision
makers by analyzing data using predefined models [36]. Due to recent advancements
in technology and market demand, the DSSs are improved to serve future needs,
implementing, i.e., analytical tools [37]. The current DSSs lack the transparency into
how decisions are executed, especially for a group of decisions [5, 6]. DSSs play
a major role in IS. Looking at the importance of DSS research, 12% of the articles
published in IS journals are focused on DSSs [38] and citation-based analysis were
DSSs is one of the three core subfields of IS [39].
The literature review showed that research published in the fields of Data mining,
Process mining, and Decision mining have an overlap in used concepts The following
meta models [40] are used to ground the literature of the Data mining, Process mining,
and Decision mining fields.
Putting Decision Mining into Context: A Literature Study 37
The Data mining field is consentient in its direction, the literature showed, on the
other hand, no specifications towards Process mining and Decision mining, identi-
fying these fields as an aggregation of Data mining focused on sequence (Process
mining) and derivations (Decision mining), as shown in Fig. 4 [41–44].
The Process mining field is comparable to the Data mining field as it is consen-
tient in its direction. Process mining utilizes Data mining techniques for mining of
events from event logs for process discovery, conformance checking, and process
improvement, as shown in Fig. 5 [2]. The Process mining field identifies Decision
mining as a case perspective focus in Process mining, also known as decision point
analysis, as shown in Fig. 5 [2, 3].
The Decision mining field has two main influences 1) Decision mining focused on
mining Decision Points from business processes (decision-annotated) [3] and (2) a
Decision mining approach where more implicit data involved in the decision-making
process (decision-aware) is taken into account [10, 45]. Both directions have overlap
and are a type of Decision mining with a Process mining focus and the utilization of
Data mining techniques, as shown in Fig. 6.
Data Mining is defined as “the automated or convenient extraction of patterns
representing knowledge implicitly stored or captured in large databases, data ware-
houses, the Web, other massive information repositories, or data streams” [41].
Therefore, the term Data mining is a misnomer, as the goal of Data mining is the
extraction of patterns of aggregations from large volumes of data, not the extraction
of said data [41]. Data mining utilizes techniques for finding data patterns, these
patterns enables accurate and fast decision making or provide new insights [42].
Data patterns could contain a specific sequence (processes), or a specific derivation
(decisions). An example where Data mining can be performed is whether a specified
class of customers will buy a combination of products, a business can utilize this
data by predicting whether to increase the price on one of the articles or include
an article in a sale, also known as a basket analysis [46]. Prediction, together with
description, make up for the two Data mining categories [43]: (1) Predictive Data
mining, which utilizes variables of existing data to predict any unknown or future
values of other variables of value and (2) Descriptive Data mining, focusses on the
discovery of patterns non trivially describing data which in turn can be interpreted
by interested parties. Predictive and descriptive Data mining can be achieved by
utilizing Data mining algorithms for the following Data mining classifications [43]:
(1) Classification, a classification which discovers a predictive learning function that
generalizes the known structure for the application of new data items. (2) Regres-
sion, a classification where a predictive learning function models the data, for the
estimation of relations between data items. (3) Clustering, a classification where a
descriptive task identifies a set of categories or clusters for the description of data. (4)
Summarization, a classification where a descriptive task provides a compact repre-
sentation of the data. (5) Dependency Modelling, a classification which searches for
relations between multiple variables. (6) Change and Deviation Detection, a classi-
fication where changes or unusual records are discovered. The algorithms that are
widely used for Data mining are C4.5 [47], k-means algorithm [48], Support vector
machines [49], the Apriori algorithm [50], and CART [51], for a more extensive list
see the work of Wu et al. [52]. The Data mining algorithms look for structural descrip-
tions, these descriptions can become rather complex and are typically expressed as a
set of rules or a decision tree. Rules and decision trees are easier understood by people
and explain what has been learned, thereby serving as a base for future predictions
[42]. Besides Data mining being in a mature state, major issues can be identified
[41].
Process Mining is defined as “the discovery, monitoring and improvement of
real processes by extracting knowledge from event logs readily available in today’s
information systems” [2], i.e., the mining of sequencing patterns. This technique
is frequently used in BPM [30, 53]. Process Mining can be considered a twofold,
on one side an analysis technique for Data mining and on the other side a tech-
nique for process modelling. The three types of Process mining are [2]; (1)
process discovery, (2) conformance checking, and (3) process improvement. Process
Discovery constructs a representation of an organization’s business process and any
major variations. Event logs are used as input to set up the process models [2] and
serve as the starting point of Process mining [54]. Information systems utilized by
organizations store detailed information about the specific sequence of activities
performed by these information systems during the execution of a process [53]. The
events in the event logs symbolize each one activity which in turn is part of a business
Putting Decision Mining into Context: A Literature Study 39
process. Detailed information on events is stored in these event logs concerning: e.g.
finishing time of an activity. The algorithms that are widely used for process discovery
include Alpha Miner, Heuristic Miner, Trace Clustering, and Fuzzy Miner [54, 55].
During conformance checking, the discovered and created process model is analyzed
and it is checked on any discrepancy between the event logs and the process model
[2, 56]. The main purpose of conformance checking is to identify any problem areas
which can be improved by utilizing this knowledge. The modification of the process
model to comply with the event logs is done during process improvement. Process
improvement aims to extend or improve the process model using information from
the event logs about the actual process [2]. Two improvement types exists (1) repair,
the modification of the process model to better reflect the actual process [57], and
(2) extension, adding a new perspective after cross-referencing this with the event
log [2]. In relation to the three types of Process mining, four perspectives are charac-
terized [2] control-flow, organizational, case, and time. The four perspectives are all
related to each other. The control-flow perspective focuses on the ordering of activ-
ities. The organizational perspective focuses on resource information hidden in the
event logs e.g. involved actors, and their relations. The case perspective focuses on
case properties e.g. characterization of a case by the process path. The time perspec-
tive focuses on the time and frequency on events e.g. prediction of processing time
utilizing timestamps.
An often-used definition of Decision mining, and also referred to as decision point
analysis, is “aims at the detection of data dependencies that affect the routing of a
case” [3], i.e., the mining of derivation patterns. One of the major tasks of Deci-
sion mining is the estimation of data quality and interpretation of their semantics,
interpretation of data whether it is relevant, the actual meaning, and unit of measure-
ment [1]. The second major task is the classification of decisions which allow the
discovery of correspondence between decision makers and their roles through the
development of decision models and (semi) automatic decision analysis techniques
[1]. The work of Rozinat and van der Aalst [3] assumes the mining of decisions as the
mining of decision points from a business process. This method is comparable to the
three types of Process mining [2]: discovery, conformance checking, and improve-
ment. This approach uses a version of the C4.5 algorithm [47] for the construction
of decision trees which allow the analysis of the choice in the decision points of a
process.
Rozinat and van der Aalst [3] proposes the use of Petri Nets [58] for this approach,
thereby being able to determine the specific points where a choice is made and which
branches are followed. After the identification of a decision point, the authors try
to determine if certain cases with certain properties follow each a specific route.
However, this approach has many limitations. For example, this approach cannot deal
with event logs containing deviating behavior and with more complex control-flow
constructs [59]. Many variations on the decision point analysis variant of Decision
mining have been published, mostly focusing on refining the way to retrieve the
decision information [60–62].
Another approach of Decision mining is the focus on implicit knowledge of
the decision maker. The actions of the decision maker and the identification of the
40 S. Leewis et al.
decision-making strategy, and determining what data and information is used, how
this is used, and what knowledge is employed by the decision maker for the choice
between two alternatives [63]. The implicit knowledge is captured using the Deci-
sion Model and Notation standard (DMN) [34], together with the clear intention to
use it in the context of business processes using Business Process Model and Nota-
tion (BPMN) [31]. Hybrids also surfaced such as Product Data Model (PDM) [64].
Showing the influence that context plays on decision making is an important task
because [1]: (1) finds and models typical scenarios of interactions between users,
(2) discover reoccurring situations within large volumes of raw data, and (3) cluster
decision makers, allowing the reduction of supported user models and increasing
data presentation. The current Decision mining technique has a limited applicability
and is only usable for workflows that uses representations in Petri Nets. This current
approach utilizes control flow-based discovery techniques which lack in-depth anal-
ysis of the specific action that is performed. Future Decision mining techniques
should be driven by the construction of a decision model than by a control flow
containing decision points [10, 65]. The Data mining techniques used for Decision
mining, which do focus on temporal aspects, often leave out the importance of deci-
sions being the driver of the analyzed result. More can be gained to know which
attributes are important to a decision. Furthermore, it is paramount to understand the
importance of the decision-making process. The use of Data mining techniques can
be improved by implementing decision models [10].
Organizations using algorithms in decision-making processes have to adhere to
European legislation which stipulates that automated decision making, without the
interaction of a person, is in principle not allowed. However, an exception is made for
automated decision making based on a legal basis, provided that it provides for appro-
priate measures to protect the rights and freedoms and legitimate interests of the data
subject [66]. Therefore, the importance of transparent algorithms is clear. Another
example of mandatory transparency is the safety critical systems in autonomous cars
[67] which need to adhere to the ISO 26262 standard [68].
Furthermore, by reviewing the literature on Data mining, Process mining, and
Decision mining, the segregation of these concepts seems incorrect. Reviewing the
focus of each concept Data mining is data pattern focused, Process mining is event log
focused, and Decision mining can be depicted into two directions, calling it a decision
point analysis focused on annotating decisions, or focused on being decision-aware.
Therefore, Data mining seems a more general concept where Process mining and
Decision mining are included as a type of Data mining, as shown in Fig. 4.
5 Conceptual Framework
The conceptual framework depicts Decision mining and its related concepts, as shown
with annotationsx in Fig. 7, and is the result of the theoretical review. Data mining1 ,
Process mining2 , and Decision mining3 are identified as elements of BI, were BI is
described as a set of models and analysis methodologies that utilizes the available
Putting Decision Mining into Context: A Literature Study 41
6 Conclusion
The goal of this research is to review the current state of Decision mining. To do
so, the following research question was addressed: “What is the current state of the
Decision mining research field?” In order to answer this question, we conducted a
theoretical review consisting of 810 papers which were cut down to a total of 40
42 S. Leewis et al.
papers which were deemed relevant in covering the topic of Decision mining. This
study depicted the term Decision mining and where Decision mining falls under (BI,
BPM, and DM) or is directly related to (Data mining/Object mining and Process
mining). The theoretical review resulted into a conceptual framework were all the
discovered concepts were depicted. The conceptual framework revealed several gaps
in the existing research. Therefore, several research directions could be considered for
researchers to target and extend this scarcely covered topic. Additionally, the concep-
tual framework revealed the inconsistency in the involved research fields covering
the same subjects and using the same concepts but not using a clear definition, or the
same name.
The theoretical review resulted into a conceptual framework were all the discovered
concepts are depicted. The conceptual framework revealed several gaps in the existing
research Therefore, several research directions could be considered for researchers
to target.
The main future research focus should be directed to improve the level of research
maturity of the Decision mining research field. Therefore, the level of maturity should
mature out of the “Nascent” phase using the classification of research domain matu-
rity of Edmondson and Mcmanus [12]. Other authors support the notion of a more
direct focus for improving the maturity of the Decision mining research field [10, 65].
In relation to the previous research focus, the current research on Decision mining3
is focused on the perspective from a business process point of view, and a more
standalone viewpoint is needed where Decision mining13 is focusing on the decision
viewpoint with derivation patterns14 as output, as shown in Fig. 7. The two main
Decision mining influences lack the capacity to deal with event logs containing
deviating behavior and dealing with more complex control-flow constructs [59] and
lacks a holistic overview of the decision model [10]. Recent research focusses on a
more holistic discovery of decisions [70], which still has a business process point of
view with event logs as its data input. Additionally, with the focus on the viewpoint
shift, the data input for Decision mining should shift from an event log to a decision
log [10], as shown in Fig. 8. Supporting the previous notion the following Decision
mining definition is created to cover the new research directions: “the method of
extracting and analysing decision logs with the aim to extract information from such
decision logs for the creation of business rules, to check compliance to business rules
and regulations, and to present performance information”.
The third focus for future research is conducting research on algorithms in the
Decision mining field. Current Decision mining algorithm research is focused on
the assumption that the algorithms in ProM [3] are the best fit for mining decisions.
Future research should focus on creating an overview of useable algorithms for
Decision mining, and if needed, create a new algorithm if existing algorithms lack
the capacity for mining decisions. Recent technologies as Reinforcement learning
Putting Decision Mining into Context: A Literature Study 43
[71, 72] and Deep learning [73, 74] algorithms could create added value for Decision
mining. Lastly, the previous mentioned future research should be focused on the
elements centered around the activities of Decision mining: Discovery, Conformance
checking, and Improvement, as shown in Fig. 8.
References
1. Smirnov, A., Pashkin, M., Levashova, T., Kashevnik, A., Shilov, N. (2009). Context-driven
decision mining. In Encyclopedia of data warehousing and mining (pp. 320–327). Information
Science Reference, Hershey, NY.
2. van der Aalst, W. M. P.: Process mining: Discovery, conformance and enhancement of business
processes. Springer Science & Business Media (2011).
3. Rozinat, A., van der Aalst, W. M. P.: Decision mining in ProM. In: Dustdar, S., Fiadeiro, J.
L., & Sheth, A. P. (Eds.), Business process management: 4th international conference, BPM
2006, Vienna, Austria, 5–7 September 2006. Proceedings (pp. 420–425). Heidelberg, Berlin:
Springer. https://doi.org/10.1007/11841760_33.
4. Arnott, D., & Pervan, G. (2005). A critical analysis of decision support systems research.
Journal of Information Technology, 20, 67–87.
5. Horita, F. E. A., de Albuquerque, J. P., Marchezini, V., & Mendiondo, E. M. (2017). Bridging the
gap between decision-making and emerging big data sources: An application of a model-based
framework to disaster management in Brazil. Decision Support Systems, 97, 12–22. https://
doi.org/10.1016/j.dss.2017.03.001.
6. Mohemad, R., Hamdan, A. R., Othman, Z. A., & Noor, N. M. M. (2010). Decision support
systems (DSS) in construction tendering processes. International Journal of Computer Science
Issues, 7, 35–45. https://doi.org/10.1109/ICSSSM.2008.4598482.
7. Chiang, W. Y. K., Zhang, D., & Zhou, L. (2006). Predicting and explaining patronage behavior
toward web and traditional stores using neural networks: A comparative analysis with logistic
regression. Decision Support Systems, 41, 514–531. https://doi.org/10.1016/j.dss.2004.08.016.
8. Li, X.-B. (2005). A scalable decision tree system and its application in pattern recognition
and intrusion detection. Decision Support Systems, 41, 112–130. https://doi.org/10.1016/j.dss.
2004.06.016.
44 S. Leewis et al.
9. Thomassey, S., & Fiordaliso, A. (2006). A hybrid sales forecasting system based on clustering
and decision trees. Decision Support Systems, 42, 408–421. https://doi.org/10.1016/j.dss.2005.
01.008.
10. De Smedt, J., Vanden Broucke, S. K. L. M., Obregon, J., Kim, A., Jung, J. Y., Vanthienen,
J. (2017). Decision mining in a broader context: An overview of the current landscape and
future directions. In Lecture notes in business information processing (pp. 197–207). Springer
International Publishing. https://doi.org/10.1007/978-3-319-58457-7_15.
11. Paré, G., Trudel, M. C., Jaana, M., & Kitsiou, S. (2015). Synthesizing information systems
knowledge: a typology of literature reviews. Information & Management, 52, 183–199. https://
doi.org/10.1016/j.im.2014.08.008.
12. Edmondson, A. C., & Mcmanus, S. E. (2007). Methodological fit in management field research.
Academy of Management Review, 32, 1155–1179.
13. Hirsch, J. E. (2010). An index to quantify an individual’s scientific research output that takes
into account the effect of multiple coauthorship. Scientometrics, 85, 741–754. https://doi.org/
10.1007/s11192-010-0193-9.
14. Baumeister, R. F., & Leary, M. R. (1997). Writing narrative literature reviews. Review of
General Psychology, 1, 311–320. https://doi.org/10.1037/1089-2680.1.3.311.
15. Webster, J., Watson, R. T. (2002). Analyzing the past to prepare for the future: Writing a
literature review. MIS Quarterly, 26, xiii–xxiii. https://doi.org/10.1.1.104.6570.
16. Harzing, A. -W., Alakangas, S. (2016). Google scholar, scopus and the web of science: A
longitudinal and cross-disciplinary comparison. Scientometrics 106, 787–804 (2016). https://
doi.org/10.1007/s11192-015-1798-9.
17. Wildgaard, L. (2015). A comparison of 17 author-level bibliometric indicators for researchers in
astronomy, environmental science, philosophy and public health in web of science and google
scholar. Scientometrics, 104, 873–906. https://doi.org/10.1007/s11192-015-1608-4.
18. Franceschet, M. (2010). A comparison of bibliometric indicators for computer science scholars
and journals on Web of Science and Google Scholar. Scientometrics, 83, 243–258. https://doi.
org/10.1007/s11192-009-0021-2.
19. Amara, N., & Landry, R. (2012). Counting citations in the field of business and management:
Why use Google scholar rather than the web of science. Scientometrics, 93, 553–581. https://
doi.org/10.1007/s11192-012-0729-2.
20. Gehanno, J.-F., Rollin, L., & Darmoni, S. (2013). Is the coverage of google scholar enough to
be used alone for systematic reviews. BMC medical informatics and decision making, 13, 7.
https://doi.org/10.1186/1472-6947-13-7.
21. Parmesan, C., & Yohe, G. (2003). A globally coherent fingerprint of climate change impacts
across natural systems. Nature, 421, 37–42. https://doi.org/10.1038/nature01286.
22. Lek, M., Karczewski, K. J., Minikel, E. V., Samocha, K. E., Banks, E., Fennell, T., et al. (2016).
Analysis of protein-coding genetic variation in 60,706 humans. Nature, 536, 285–291. https://
doi.org/10.1038/nature19057.
23. Cardinale, B. J., Duffy, J. E., Gonzalez, A., Hooper, D. U., Perrings, C., Venail, P., et al. (2012).
Biodiversity loss and its impact on humanity. Nature, 486, 59–67. https://doi.org/10.1038/nat
ure11148.
24. Levy, Y., Ellis, T.J. (2006). A systems approach to conduct an effective literature review in
support of information systems research. Informing Science 9, 181–211. https://doi.org/10.289
45/479.
25. Okoli, C. (2015). A guide to conducting a standalone systematic literature review. Communi-
cations of the Association for Information Systems, 37, 879–910. https://doi.org/10.2139/ssrn.
1954824.
26. Vercellis, C.: Business intelligence: Data mining and optimization for decision making. New
York: Wiley.
27. Zikmund, W., Babin, B., Carr, J., Griffin, M. (2009). Business research methods. South-Western.
28. Chen, H., Chiang, R. H. L., Storey, V. C.: Business intelligence and analytics: From big data
to big impact. MIS Quarterly, 1165–1188. https://doi.org/10.2307/41703503.
Putting Decision Mining into Context: A Literature Study 45
29. Loennqvist, A., & Pirttim, V. (2006). The measurement of business intelligence. Information
Systems Management, 23, 32–40. https://doi.org/10.1080/07366980903446611.
30. Weske, M. (2012). Business process management. Berlin: Springer. https://doi.org/10.1007/
978-3-642-28616-2.
31. Object Management Group (OMG) (2011) Business process model and notation (BPMN)
Version 2.0. Business, 50, 508. https://doi.org/10.1007/s11576-008-0096-z.
32. Von Halle, B., & Goldberg, L. (2009). The decision model: A business logic framework linking
business and technology. New York, NY: Taylor and Francis Group, LLC.
33. Blenko, M.W., Mankins, M.C., Rogers, P.: The Decision-Driven Organization. Harv. Bus. Rev.
10 (2010).
34. Object Management Group. (2016). Decision model and notation.
35. Object Management Group. (2016). ArchiMate® 3.0 specification.
36. Shim, J., Merrill, W., Courtney, J., Power, D., Sharda, R., & Carlsson, C. (2002). Past, present
and future of decision support system. Decision Support Systems, 33, 111–126.
37. Chugh, R., & Grandhi, S. (2013). Why Business Intelligence? Significance of business intel-
ligence tools and integrating BI governance with corporate governance. International Journal
of Entrepreneurship and Innovation, 4, 1–14. https://doi.org/10.4018/ijeei.2013040101.
38. Arnott, D., & Pervan, G. (2014). A critical analysis of decision support systems research
revisited: The rise of design science. Journal of Information Technology, 29, 269–293. https://
doi.org/10.1057/jit.2014.16.
39. Taylor, Dillon, & Wingen, Van. (2010). Focus and diversity in information systems research:
Meeting the dual demands of a healthy applied discipline. MIS Quarterly, 34, 647. https://doi.
org/10.2307/25750699.
40. van de Weerd, I., Brinkkemper, S. (2008). Meta-modeling for situational analysis and design
methods. In: Handbook of research on modern systems analysis and design technologies and
applications (vol. 35).
41. Han, J., Kamber, M., Pei, J. (2011). Data mining: Concepts and techniques. Morgan Kaufmann
Publishers, Burlington, MA. https://doi.org/10.1016/B978-0-12-381479-1.00001-0.
42. Witten, I. H., Frank, E., Hall, M. A., & Pal, C. (2016). Data mining: Practical machine learning
tools and techniques. Burlington, MA: Morgan Kaufmann Publishers.
43. Kantardzic, M. (2011). Data mining : Concepts, models, methods, and algorithms. Wiley
Online Library.
44. Rokach, L., Maimon, O. (2015). Data mining with decision trees: Theory and application.
45. Petrusel, R., Vanderfeesten, I., Dolean, C. C., Mican, D. (2011). Making decision process
knowledge explicit using the decision data model. In: Business Information Systems, 340.
46. Berry, M. J. A., Linoff, G. S. (2004). Data mining techniques: for marketing, sales, and customer
support. New York: Wiley.
47. Ross, Q. J. (1993).C4.5: Programs for machine learn. Morgan Kaufmann Publishers.
48. Lloyd, S. P. (1982). Least squares quantization in PCM. IEEE transactions on information
theory, 28, 129–137. https://doi.org/10.1109/TIT.1982.1056489.
49. Vapnik, V. N. (1995). The nature of statistical learning theory. New York: Springer.
50. Agrawal, R., Srikant, R. (1994). Fast algorithms for mining association rules in large databases.
In Proceedings of the 20th International Conference on Very Large Data Bases (pp. 487–499).
Morgan Kaufmann Publishers Inc., San Francisco, CA, USA.
51. Breiman, L., Friedman, J. H., Olshen, R. A., & Stone, C. J. (1984). Classification and regression
trees. Chapman & Hall/CRC. https://doi.org/10.1201/9781315139470.
52. Wu, X., Kumar, V., Ross, Q. J., Ghosh, J., Yang, Q., Motoda, H., et al. (2008). Top 10 algorithms
in data mining. In: Knowledge and information systems (pp. 1–37). https://doi.org/10.1007/s10
115-007-0114-2.
53. Dumas, M., La Rosa, M., Mendling, J., & Reijers, H. A. (2018). Fundamentals of business
process management. Berlin: Springer.
54. van der Aalst, W. M. P., Adriansyah, A., De Medeiros, A. K. A., Arcieri, F., Baier, T., Blickle,
T., et al. (2012). Process mining manifesto. Lecture notes in business information processing.
99 LNBIP (pp. 169–194). https://doi.org/10.1007/978-3-642-28108-2_19.
46 S. Leewis et al.
55. Rojas, E., Munoz-Gama, J., Sepúlveda, M., Capurro, D. (2016). Process mining in healthcare:
A literature review. Journal of Biomedical Informatics, 61, 224–236. https://doi.org/10.1016/
j.jbi.2016.04.007.
56. Rozinat, A., & van der Aalst, W. M. P. (2008). Conformance checking of processes based on
monitoring real behavior. Information Systems, 33, 64–95. https://doi.org/10.1016/j.is.2007.
07.001.
57. Rovani, M., Maggi, F. M., de Leoni, M., & van der Aalst, W. M. P. (2015). Declarative process
mining in healthcare. Expert Systems with Applications, 42, 9236–9251. https://doi.org/10.
1016/j.eswa.2015.07.040.
58. Petri, C. A. (1966). Communication with Automata. Application Data Research, 15, 357–62.
https://doi.org/AD0630125.
59. de Leoni, M., van der Aalst, W. M. P. (2013). Data-aware process mining: Discovering decisions
in processes using alignments. In: Proceedings of the 28th Annual ACM Symposium on Applied
Computing (pp. 1454–1461). dl.acm.org.
60. Kim, A., Obregon, J., Jung, J.-Y. (2014). Constructing decision trees from process logs for
performer recommendation. In International Conference on Business Process Management
(pp. 224–236) (2014). https://doi.org/10.1007/978-3-319-06257-0_18.
61. Mannhardt, F., de Leoni, M., Reijers, H. A., van der Aalst, W. M. P.: Decision mining revisited-
discovering overlapping rules. In International Conference on Advanced Information Systems
Engineering (pp. 377–392).
62. de Leoni, M., Dumas, M., Garcķa-Bańuelos, L.: Discovering branching conditions from busi-
ness process execution logs. In International Conference on Fundamental Approaches to
Software Engineering (pp. 114–129). Berlin: Springer. https://doi.org/10.1007/978-3-642-370
57-1.
63. Petrusel, R. (2010). Decision mining and modeling in a virtual collaborative decision
environment. Rijeka: In-Tech.
64. Vanderfeesten, I., Reijers, H. A., van der Aalst, W. M. P. (2008). Product based workflow
support: A recommendation service for dynamic workflow execution. In Proceedings of 20th
International Conference on Advance Information System Engineering (pp. 571–574). https://
doi.org/10.1007/978-3-540-69534-9_42.
65. Sarno, R., Sari, P. L. I., Ginardi, H., Sunaryono, D., Mukhlash, I. (2013). Decision mining for
multi choice workflow patterns. In Proceeding—2013 International Conference on Computer,
Control, Informatics and Its Applications. Recent Challenges Computer, Control Informatics,
IC3INA (pp. 337–342). https://doi.org/10.1109/IC3INA.2013.6819197.
66. European Union. (2016). General data protection regulation. Official Journal of European
Union, L119, 1–88 (2016).
67. Borg, M., Englund, C., Durán, B. (2017). Traceability and deep learning—safety-critical
systems with traces ending in deep neural networks. In: Grand challenges of traceability:
The next ten years (pp. 48–49). https://arxiv.org/abs/1710.03129.
68. ISO. (2018). ISO 26262-2:2018.
69. Petri, C. A. (1962). Kommunikation mit Automaten.
70. De Smedt, J., Hasić, F., vanden Broucke, S. K. L. M., Vanthienen, J. (2017). Towards a holistic
discovery of decisions in process-aware information systems. In International Conference on
Business Processing Management (pp. 183–199). https://doi.org/10.1007/978-3-319-65000-
5_11.
71. Silver, D., Schrittwieser, J., Simonyan, K., Antonoglou, I., Huang, A., Guez, A., et al. (2017).
Mastering the game of go without human knowledge. Nature, 550, 354.
72. Sutton, R. S., & Barto, A. G. (2018). Reinforcement learning: An introduction. Cambridge:
MIT Press.
73. De Fauw, J., Ledsam, J. R., Romera-Paredes, B., Nikolov, S., Tomasev, N., Blackwell, S., et al.
(2018). Clinically applicable deep learning for diagnosis and referral in retinal disease. Nature
Medicine. https://doi.org/10.1038/s41591-018-0107-6.
74. Lecun, Y., Bengio, Y., & Hinton, G. (2015). Deep learning. Nature, 521, 436–444. https://doi.
org/10.1038/nature14539.
Cloud Sourcing and Paradigm Shift in IT
Governance: Evidence
from the Financial Sector
Abstract In the digital age, organizations are increasingly shifting their applica-
tions, services and infrastructures to the cloud to enhance business agility and reduce
IT-related costs. However, in moving applications and data to cloud resources orga-
nizations face new risks of privacy violations. To manage this risk, organizations
need to be fully aware of threats and vulnerabilities affecting their digital re-sources
in cloud. Although some previous studies have focused on the emerging challenges
of cloud adoption to governance and control, we know little regarding the paradigm
shifts in IT governance processes and practices. To address this gap, we conducted
an exploratory case study in two large companies in the financial sector. Our find-
ings show that cloud adoption alters the locus and scope of IT governance which
consequently compels organizations to rethink their control mechanisms to mitigate
security risks. Our findings contribute to the literature on IT governance and IT
outsourcing, and support IT executives and decision makers in mitigating the risks
of cloud adoption.
1 Introduction
N. Kazemargi (B)
Department of Business and Management, Luiss Guido Carli, Rome, Italy
e-mail: Nkazemargi@luiss.it
P. Spagnoletti
Department of Information Systems, University of Agder, Kristiansand, Norway
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer 47
Nature Switzerland AG 2020
R. Agrifoglio et al. (eds.), Digital Business Transformation, Lecture Notes in Information
Systems and Organisation 38, https://doi.org/10.1007/978-3-030-47355-6_4
48 N. Kazemargi and P. Spagnoletti
2 Relevant Literature
2.1 IT Outsourcing
42]. Moreover, previous research has suggested a set of factors such as business
context, the level of sensitivity of data, and the nature of business processes, that
influence organizational decisions related to what resources can be moved to cloud
[25–27, 29]. For instance, banking, aerospace and healthcare sectors are more reluc-
tant to adopt cloud solutions due to their high level of data sensitivity. Moreover, it
is essential to consider internal IT skills, organizational capabilities and size of the
organization before moving to cloud [8–16, 39]. For example, small-sized organi-
zations have different intentions and lower security expectations in cloud sourcing
than large enterprises [42], thus, we observed a different trend of cloud sourcing by
small- and medium-sized enterprises (SMEs) with higher organizational flexibility
than large organizations.
Moreover, Fig. 1 illustrates three elements that reinforce the security outcomes of
cloud sourcing from the literature. The first element is the capabilities of the client
firm: the higher its internal IT skills, the more an organization is able to identify
and take proper security measures [36, 41]. Second, previous research highlights
that desirable security outcomes in cloud sourcing may be promoted by the ability
and power to negotiate terms and conditions of contracts with service providers
[1–3, 27]. Although establishing relationships with service providers may support
higher quality and availability of the services, not all organizations can develop and
leverage inter-organizational relationships effectively [6, 8]. This is mainly because
only a few firms, which have dominant power and control over infrastructures, offer
cloud resources. Third, the level of security of the client’s firm partially depends also
on the capabilities of cloud providers in identifying and reacting to cyber-threats
[26, 42].
From a theoretical perspective, the literature on IT outsourcing is vast and mainly
incorporates transactional views that are used as a framework to explain make or
buy decisions [22]. Transaction Cost Economics theory examines whether to make
or buy assets from an external vendor considering transaction costs [51, 52]. Cloud-
based solutions are based on multi-tenancy and standard solutions which allow cloud
providers to maximize economies of scale, and offer services lower than on-premises
investment, and further based on a pay-per-use model. However, new security issues
and risks in cloud-based solutions [1, 2] cause managerial concerns. To address
these security concerns and mitigate cloud computing risks, client firms need new
competences and skills to determine what the risks are and to identify a set of security
measures. One way is to negotiate and customize service level agreements (SLAs)
which, on the one hand, augment security through the increased liability of cloud
providers, on the other hand, increase transaction costs for the client firm [27].
However, as argued by [22], the concept of IT outsourcing is beyond make or buy
decisions. Firms need to retain control over strategic assets as a source of competitive
advantage. The IT strategic assets could be data, software, platforms or hardware.
Thus, firms typically opt to outsource non-core IT activities [40], and instead insource
strategic activities. Given the importance of data as an asset, firms prefer to retain
control and governance over their sensitive data and critical business processes.
Hence, organizations have a low propensity to shift sensitive data or core business
Cloud Sourcing and Paradigm Shift in IT Governance … 51
2.2 IT Governance
3 Research Method
We used an inductive case study to investigate how cloud sourcing has reshaped IT
governance by focusing on security and privacy risks. The case study methodology
provides a tool to examine a complex phenomenon [10] and allows a rich description
and an in-depth understanding of cases [12, 54].
In our empirical analysis, we refer to two cases which are large, for-profit compa-
nies operating in the financial sector. The two cases match our research settings and
fulfill the relevancy criteria for this study: (1) both companies have adopted cloud-
based solutions during the last years, (2) both have strategic commitment to cloud
adoption, (3) both show a propensity for more cloud adoption in the future, and (4)
in the industrial sector, confidentiality and privacy are critical for IT security. The
two selected cases are reported in Table 1 where real names have been anonymized
for confidentiality reasons.
The semi-structured interview was used as one of the sources of data collection to
obtain information from various informants experiencing the phenomenon [10, 13].
Interviews were conducted with informants from different areas such as security, IT
infrastructure and legal departments. Data were collected from September 2018 till
June 2019. The interviews ranged from 45 to 90 min. We have also been given access
to archival documentation provided by both companies.
In parallel, we have collected and analyzed an extensive amount of data from
different sources and in different formats. The data has been collected from partici-
pation in roundtables/forums with companies adopting cloud computing, reports by
organizational, national and international bodies, direct conversations with infor-
mants and decision makers—see Table 2. This empirical data along with other
Cloud Sourcing and Paradigm Shift in IT Governance … 53
secondary collected data enabled us to triangulate and increase the reliability from
various data sources [18]. We used NVivo to arrange and analyze the collected
data—see Table 3.
In this section we describe and analyze the cloud sourcing strategy and then focus
on the security practices of the two cases.
Through the development of cloud computing technology, by adopting cloud
services, the two cases sought to create and deliver business values through cost
reduction and agility. The potential for cost reduction is mainly in the procurement
54 N. Kazemargi and P. Spagnoletti
cloud service providers may subcontract some services to third parties. This makes
the control over data even more challenging. Another issue that emerged was related
to the state of data. Data is not static in data centers, but rather in transit or in process
from one layer to another, or from one application to another. In other words, data
moves from the organizational IT infrastructure to cloud or vice versa. Therefore,
those challenges induce a paradigm shift in IT security governance and new practices
in the management of data and applications. While cloud service providers manage
the security of outsourced applications or infrastructures, informants consistently
reported the importance of internal security measures and control points. As one
informant highlighted: “It is wrong to think that security is all done by the cloud
provider”. By analyzing cases, a number of security practices emerge. The security
teams play a key role in mitigating security risks by developing security measures
based on cloud services such as authentication, encryption algorithms, control of
network traffic, etc. As explained by one informant: “We see security is different at
different layers, for instance for SaaS we use passwords and we control access. For
PaaS, we mainly use encryption for communication and information exchange. And
for mitigating risks in networks, we have firewalls to protect from denial of service
attacks.”
As emerged from the interviews, a best practice suggested by cloud service
providers is encrypting data. Cloud service providers offer encryption services; they
store encrypted files in data centers and manage and store encryption keys. Yet, inter-
viewees consistently emphasized the need for controlling and managing encryption
keys internally, which mitigates the risk of data breach. This included, for example,
data breaches by third parties or any security incident by malicious attackers at the
cloud providers’ data centers.
Third, cloud service providers have control over infrastructure, applications and
data; consequently, they play an important role in client firms’ security level. There-
fore, the companies emphasized the need to carefully evaluate and select providers,
with the main purpose of aligning the security level of cloud providers with the
organization’s expected security level. For instance, the security management team
of company Beta has the responsibility for evaluating and certifying cloud providers
according to internal security measures. However, as stated by the interviewees, this
leads to the minimum accepted security level, and more effort is still needed.
Fourth, significant effort was dedicated to SLAs in order to define terms and condi-
tions, including disaster recovery plans of cloud providers; alignment with GDPR;
compliance of subcontractors with obligations; access to data; and auditing rights.
All of this allowed client firms to implicitly detail the liability of cloud providers and
to expect cloud providers to fully comply with their obligations in SLAs.
Although a more comprehensive SLA would increase the security liabilities of
cloud providers, the interviewed cases experienced challenges in defining terms and
conditions, as well as managing SLAs with multiple cloud providers. Therefore, there
is a need for common measures and cooperation among companies to determine the
requirements for cloud service providers, particularly in the case of an IT secu-
rity incident. Furthermore, interviewees emphasized the existing power imbalance
with cloud service providers. The dominant position of cloud providers makes any
56 N. Kazemargi and P. Spagnoletti
negotiation challenging for client firms and constrains room for the customization
of SLAs. This is because coordination and managing standard SLAs for multiple
clients demand less effort. As one informant from the Beta company explained:
“When it comes to contact, they [cloud providers] don’t want any audit from cloud
users […] now there is not any response from cloud providers in request of auditing
data centers”. While the Beta company experiences rigidity from cloud providers,
the Alfa company has had some progress in customizing and negotiating its SLA’s
terms and conditions with a cloud provider. This might be due to the position and
characteristics of the cloud provider and modification requests to terms and condi-
tions. Overall, with the evolution of cloud services, more data and applications are
expected to migrate to cloud. This significantly demands the need to counterbalance
the power dominance by collaboration and cooperation with cloud service providers.
In this study, we aimed at shedding light on the ways in which cloud adoption reshapes
IT governance [39]. The key contribution of our study is that we demonstrate how
security risks and vulnerabilities in digital resources in cloud reshape IT governance
processes and practices—see Table 4.
The two companies have a propensity for adopting diverse cloud-based resources
to enhance business agility and reduce costs. However, their primary concern was
to ensure security of data in a cloud environment. As both companies operate in a
context with relatively sensitive data, their security concerns were reflected in how
they both carefully revisited their IT governance processes and practices.
First, our findings highlight the need to expand our understanding of the locus
of IT governance in cloud sourcing beyond the existing focus on physical assets to
consider data flow in digital resources in cloud. As shown in the two cases, the locus
is shifted from on-premises IT artifacts, with well-defined physical boundaries, to
cloud-based solutions geographically dispersed. To reap benefits, organizations may
adopt different levels of services (such as low-level infrastructure service, middle-
level software service, to top-level application services) and deployment models.
Thus, the client firm needs to be careful to understand the level of control over
digital resources in cloud. Moreover, findings provide evidence that the focus has
been shifted to data-transported digital resources in cloud [43, 44]. Equally important
is that much effort is devoted to identifying and mitigating security risks of cloud-
resources as organizations neither have control over cloud resources nor over data
treatment in cloud.
Second, while previous literature has focused on project and firm [44], our find-
ings highlight the important roles of service providers and third parties [1, 28] in IT
security management, rather than only client firms. Cloud sourcing leaves security
responsibilities partially in the hand of the cloud providers. Therefore, the compe-
tences and maturity level of cloud providers play crucial roles in how an organization
effectively prevents or responds to cyber-attacks [4]. While cloud sourcing challenges
Cloud Sourcing and Paradigm Shift in IT Governance … 57
control over IT artifacts through leaving some decisions to cloud providers and third
parties, it is important to note that cloud providers’ decisions may not necessarily
be in favor of the client firm. Also, cloud providers may not disclose all informa-
tion related to the reliability of services and disaster recovery plans, although it is
reliability of the client firm to manage and control disaster recovery and back-up.
In addition, cloud service providers may subcontract some activities to third parties.
This introduces further security vulnerabilities and risks which need to be identified
and managed by the client firm.
Moreover, our findings emphasize the role of regulatory bodies in developing
standards and formal procedures that influence strategic decisions within organiza-
tions. By adding cloud vendors and other actors to the picture, this study highlights
the scope of IT governance changes with the rise in sourcing cloud-based services. In
addition, findings show the transformation of IT departments in terms of roles, skills
58 N. Kazemargi and P. Spagnoletti
and activities to ensure added value practices are in favor of the organization. Trans-
forming the role of IT departments includes cloud vendor assessment and selection,
managing information system policies, and ensuring security of data and privacy
[1–28, 47]. In sum, given the increasing value of data, the security of data in cloud
is important and demands actions from all involved actors.
Third, in cloud adoption, organizations face new security [11] such as data
breaches and lack of transparency in security measures by cloud service providers.
The security risks act as a barrier to cloud adoption and lack of proper IT governance
practices may lead to huge financial losses, especially for large organizations [42].
Our findings show the shift in locus and scope of IT governance due to security
risks results in development of new IT governance mechanisms. In the following
we present efforts by organizations to redefine governance mechanisms to mitigate
security risks.
Our findings illustrate that the cases have defined assessment criteria in order
to evaluate cloud service providers before adopting cloud services. We show that
organizational ability to develop control measures and policies to mitigate security
risks is important. By defining new standards and practices such as access permissions
and using authentication, organizations can prevent access to any sensitive data in
public servers. This is aligned with previous literature that has investigated security
practices. For example, Brender and Markov [8] and Sood [41] highlight some issues
in cloud adoption such as security, disaster recovery and governance, and list a series
of security practices that can be adopted by organizations to mitigate security risks.
Moreover, we notice that regulatory bodies are actively engaged in providing
directions, recommendations and policy to manage security risks. Even though each
organization develops internal IT security controls, the influence of external policies
by regulatory bodies on internal practices has to be considered. Moreover, organi-
zations learn to better govern digital resources in cloud through interactions and
knowledge exchange within regulatory bodies and other partners in networks. For
instance, the two cases interact with other organizations in order to share the best
governance practices to avoid the financial consequences of data breaches.
In addition, we find that both contractual and relational governance structures are
important to realize a favorable situation for client firms in terms of data security.
Making a legally binding agreement reduces the risks of a partner’s opportunism and
provides a guideline for various situations in the future and for managing conflicts.
Client organizations can enhance the security of data by including detailed rights and
obligations in SLAs. The contract and agreement should detail responsibilities of the
client organization and cloud providers in case of cyber-attacks and breaches of data at
the data layer, or malware at the service layer. Moreover, due to the complementarity
of contractual and relational governance structures [24, 35], we argue that the ability
to build and strengthen relationships with cloud service providers is important for
mitigating security risks by leveraging the power in negotiations.
In sum, in moving applications and data to cloud resources, organizations face new
risks of privacy violation. To manage these risks, organizations need to be fully aware
of threats and vulnerabilities affecting their digital resources in cloud. Our findings
highlight that cloud sourcing reshapes the traditional IT governance arrangements
Cloud Sourcing and Paradigm Shift in IT Governance … 59
[39]. We argue that cloud adoption alters the locus and scope of IT governance which
consequently compels organizations to rethink their control mechanisms to mitigate
security risks [47]. We especially focus on the impact of cloud on security and privacy
issues that must be addressed through proper IT governance practices [17, 49]. Given
the financial consequences of security breaches, it is important for IT executives and
decision makers to rethink their IT governance processes and practices to mitigate
the risks of cloud adoption.
References
1. Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities
and challenges. Information Sciences (Ny), 305, 357–383. https://doi.org/10.1016/j.ins.2015.
01.025.
2. August, T., Niculescu, M. F., & Shin, H. (2014). Cloud implications on software network
structure and security risks cloud implications on software network structure and security risks.
Information Systems and Research, 25, 489–510. https://doi.org/10.1287/isre.2014.0527.
3. Baset, S. A. (2012). Cloud SLAs: present and future. ACM SIGOPS Operating Systems Review,
46, 57–66.
4. Baskerville, R., Spagnoletti, P., & Kim, J. (2014). Incident-centered information security:
Managing a strategic balance between prevention and response. Information & Management,
51, 138–151. https://doi.org/10.1016/j.im.2013.11.004.
5. Barney, J. B. (1991). Firm resources and sustained competitive advantage. Journal of
Management, 17(1), 99–120.
6. Benlian, A., & Hess, T. (2011). Opportunities and risks of software-as-a-service: Findings from
a survey of IT executives. Decision Support Systems, 52, 232–246. https://doi.org/10.1016/j.
dss.2011.07.007.
7. Bowen, P. L., Cheung, M.-Y. D., & Rohde, F. H. (2007). Enhancing IT governance practices:
A model and case study of an organization’s efforts. International Journal of Accounting
Information Systems, 8, 191–221.
8. Brender, N., & Markov, I. (2013). Risk perception and risk management in cloud computing:
Results from a case study of Swiss companies. International Journal of Information
Management, 33, 726–733. https://doi.org/10.1016/j.ijinfomgt.2013.05.004.
9. David, A., Nguyen, Q., Johnson, V., Kappelman, L., Torres, R., Maurer, C. (2018). The 2017
SIM IT issues and trends study. MIS Q Executive 17. https://doi.org/10.1177/106648071351
4945.
10. Eisenhardt, K. M., & Graebner, M. E. (2007). Theory building from cases: opportunities and
challenges. Academy of Management Journal, 50, 25–32. https://doi.org/10.1002/job.
11. European Network and Information Security Agency. (2009). Cloud Computing Security Risk
Assessment. https://www.enisa.europa.eu/publications/cloud-computing-risk-assessment.
12. Flick, U., von Kardoff, E., & Steinke, I. (Eds.). (2004). A companion to qualitative research.
Sage.
13. Gioia, D. A., Corley, K. G., & Hamilton, A. L. (2013). Seeking qualitative rigor in inductive
research: Notes on the Gioia methodology. Organizational Research Methods, 16, 15–31.
14. Gonzalez, R., Gasco, J., & Llopis, J. (2006). Information systems outsourcing: A literature
analysis. Information & Management, 43, 821–834.
15. Gregory, R. W., Kaganer, E., Henfridsson, O., Ruch, T. J. (2018). IT consumerization and
the transformation of it governance. MIS Quarterly 42, 1225–1253. https://doi.org/10.25300/
MISQ/2018/13703.
16. Gupta, P., Seetharaman, A., & Raj, J. R. (2013). The usage and adoption of cloud computing by
small and medium businesses. International Journal of Information Management, 33, 861–874.
https://doi.org/10.1016/j.ijinfomgt.2013.07.001.
60 N. Kazemargi and P. Spagnoletti
17. Hoberg, P., Wollersheim, J., Krcmar, H. (2012). The business perspective on cloud computing—
a literature review of research on cloud computing. In: AMCIS 2012 Proceedings, Paper 5.
18. Jick, T. D. (1979). Mixing qualitative and quantitative methods: Triangulation in action.
Administrative Science Quarterly, 24, 602–611.
19. Kaspersky Lab. (2018). On the money: Growing IT security budgets to protect digital
transformation initiatives.
20. Kern, T., Kreijger, J., & Willcocks, L. (2002). Exploring ASP as sourcing strategy: Theoretical
perspectives, propositions for practice. Journal of Strategic Information Systems, 11, 153–177.
21. Lacity, M. C., & Hirschheim, R. (1993). The information systems outsourcing bandwagon.
Sloan Management Review, 35, 73.
22. Lacity, M. C., Willcocks, L. P., & Khan, S. (2011). Beyond transaction cost economics: Towards
an endogenous theory of information technology outsourcing. Journal of Strategic Information
Systems, 20, 139–157. https://doi.org/10.1016/j.jsis.2011.04.002.
23. Lacity, M. C., Khan, S., Yan, A., & Willcocks, L. P. (2010). A review of the IT outsourcing
empirical literature and future research directions. Journal of Information Technology, 25,
395–433. https://doi.org/10.1057/jit.2010.21.
24. Lee, Y., & Cavusgil, S. T. (2006). Enhancing alliance performance: The effects of contractual-
based versus relational-based governance. Journal of Business Research, 59, 896–905.
25. Lin, A., & Chen, N.-C. (2012). Cloud computing as an innovation: Perception, attitude, and
adoption. International Journal of Information Management, 32, 533–540. https://doi.org/10.
1016/j.ijinfomgt.2012.04.001.
26. Loske, A., Widjaja, T., Buxmann, P. (2013). Cloud computing providers’ unrealistic optimism
regarding IT security risks: A threat to users? ICIS 1–20 (2013). https://doi.org/10.5121/ijnsa.
2012.4206.
27. Maher, N., Kavanagh, P., Glowatz, M. (2013). A vendor perspective on issues with secu-
rity, governance and risk for Cloud Computing. In: 26th Bled eConference—eInnovations
Challenges Impacts Individ. Organ. Soc. Proc. (pp. 103–114).
28. Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud computing—
The business perspective. Decision Support Systems, 51, 176–189. https://doi.org/10.1016/j.
dss.2010.12.006.
29. McLeod, A., & Dolezel, D. (2018). Cyber-analytics: Modeling factors associated with health-
care data breaches. Decision Support Systems, 108, 57–68. https://doi.org/10.1016/j.dss.2018.
02.007.
30. Mell, P., & Grance, T. (2011). The NIST definition of cloud computing—recommendations of the
national institute of standards and technology. Gaithersburg: U.S. Department of Commerce.
31. Oliveira, T., Thomas, M., & Espadanal, M. (2014). Assessing the determinants of cloud
computing adoption: An analysis of the manufacturing and services sectors. Information &
Management, 51, 497–510.
32. Payton, S. (2010). Fluffy logic. Financial Management, 22–25 (14719185).
33. Peterson, R. R. (2004). Exploring IT governance in pharmaceutical and high-tech industries:
Trends, challenges and directions.
34. Pfeffer, J., Salancik, G. R. (2003). The external control of organizations: A resource dependence
perspective. Stanford University Press (2003).
35. Poppo, L., & Zenger, T. (2002). Do formal contracts and relational governance function as
substitutes or complements? Strategic Management Journal, 23, 707–725.
36. Ramachandran, M., & Chang, V. (2016). Towards performance evaluation of cloud service
providers for cloud data security. International Journal of Information Management, 36, 618–
625. https://doi.org/10.1016/j.ijinfomgt.2016.03.005.
37. Ramireddy, S., Chakraborty, R., Raghu, T. S., Rao, H. R. (2010). Privacy and security practices
in the arena of cloud computing—a research in progress. In: AMCIS, p. 574 (2010).
38. Rastogi, Gloria. (2015). Hendler: security and privacy of performing data analytics in the cloud:
A three-way handshake of technology, policy, and management. Journal of Information Policy,
5, 129. https://doi.org/10.5325/jinfopoli.5.2015.0129.
Cloud Sourcing and Paradigm Shift in IT Governance … 61
39. Schneider, S., Sunyaev, A.: Determinant factors of cloud-sourcing decisions: Reflecting on the
IT outsourcing literature in the era of cloud computing. Journal of Information Technology
31(1), 1–31. https://doi.org/10.1057/jit.2014.25.
40. Schwarz, A., Jayatilaka, B., Hirschheim, R., & Goles, T. (2009). A conjoint approach to under-
standing IT application services outsourcing. Journal of the Association of the Information
Systems, 10, 1.
41. Sood, S. K. (2012). A combined approach to ensure data security in cloud computing. Journal
of Network and Computer Applications, 35, 1831–1838. https://doi.org/10.1016/j.jnca.2012.
07.007.
42. Sultan, N. A. (2011). Reaching for the “cloud”: How SMEs can manage. International Journal
of Information Management, 31, 272–278. https://doi.org/10.1016/j.ijinfomgt.2010.08.001.
43. Tallon, P. P., Ramirez, R. V, Short, J. E., Tallon, P. P., Ramirez, R. V, Short, J. E. (2013).
The Information artifact in IT Governance : Toward a Theory of Information governance the
information artifact in IT governance : Toward a theory of information governance. Journal of
Management Information System 30. https://doi.org/10.2753/MIS0742-1222300306.
44. Tilson, D. (2010). Digital infrastructures : The missing IS research agenda. Information System
Research, 748–759. https://doi.org/10.1287/isre.1100.0318.
45. Tiwana, A., & Konsynski, B. (2010). Complementarities between organizational it architecture
and governance structure. Information System Research, 21, 288–304. https://doi.org/10.1287/
isre.
46. Tiwana, A., Konsynski, B., & Venkatraman, N. (2013). Information technology and organiza-
tional governance: The IT governance cube. Journal of Management Information System, 30,
7–12.
47. Vithayathil, J. (2017). Will cloud computing make the Information Technology (IT) department
obsolete? Information System Journal. https://doi.org/10.1111/isj.12151.
48. vom Brocke, J., Braccini, A. M., Sonnenberg, C., & Spagnoletti, P. (2014). Living IT infrastruc-
tures—an ontology-based approach to aligning IT infrastructure capacity and business needs.
International Journal of Accounting Information Systems, 15, 246–274.
49. Wang, N., Liang, H., Jia, Y., Ge, S., Xue, Y., & Wang, Z. (2016). Cloud computing research in
the IS discipline: A citation/co-citation analysis. Decision Support Systems, 86, 35–47. https://
doi.org/10.1016/j.dss.2016.03.006.
50. Weill, P., & Ross, J. W. (2004). IT governance. Boston: Harvard Business School Press.
51. Williamson, O. E. (1981). The modern corporation: Origins, evolution, attributes. Journal of
Economic Literature, 19, 1537–1568.
52. Williamson, O. E. (1985). The economic institutions of capitalism. New York: Free Press.
53. Wilkin, C. L., & Chenhall, R. H. (2010). A review of IT governance: A taxonomy to inform
accounting information systems. Journal of Information System, 24, 107–146.
54. Yin, R. K. (2013). Case study research: Design and methods. Sage publications.
Data-Imagined Decision Making
in Organizations: Do Visualization
Tools Run in the Family?
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer 63
Nature Switzerland AG 2020
R. Agrifoglio et al. (eds.), Digital Business Transformation, Lecture Notes in Information
Systems and Organisation 38, https://doi.org/10.1007/978-3-030-47355-6_5
64 A. Locoro and A. Ravarini
1 Introduction
The ability to manage data has ever been and is becoming even more essential, since
the impact and the role of IT in shaping the information flows of an enterprise has
become hegemonic. As a consequence, the role of decision-makers and in particular
the competences they should exhibit are changing in the direction of a higher sen-
sibility together with the ability to scrutinize and critically interpret data, either big
or small. The familiarity with electronic devices as well as with software like data
visualization tools is becoming strategic in configuring the latter as companions of
decision-makers in the analysis, management and partial control of the informational
flow of their organization, both at operational and strategic levels. For these reasons,
an investigation of the commonalities, influences and reciprocity between decision
making and data interpretation can be traced along the following research questions:
• What are, if any, the main aspects common to decision making models, guidelines
and methodologies that rely on data availability and management?
• What are, if any, the main features of data visualization that are able to support
the decision making process?
• Why and how an organization do or should adopt data visualization tools as part
of their cultural assets for supporting decision making effectiveness in all its key
aspects?
The paper tries to answer the first two research questions so that the third question
could be rooted properly for future assessments. An outline of the paper is the fol-
lowing: Sect. 2 is an overview of the principal decision making models considered
for the extraction of common aspects of decision making activities; Sect. 3 reports
the main features of data visualization related to the content, the presentation and
the processing aspects of data management; Sect. 4 accounts for a model of connec-
tions between decision making aspects and data visualization features that represent
a conceptual frame of our analysis able to drive the assessment of our hypothesis
about the synergies between decisions and data interpretation; Sect. 5 draws some
conclusions about the work done so far.
A first scrutiny of salient aspects of decision making has been inspired by the analysis
of well known models. Starting from the point that decision-making is a process
(sequence of steps) converting available information (inputs) into decisions (outputs),
many theorists and researchers, after Simon’s [24], doubts about the validity of
‘perfect rationality’ or ‘global rationality’ model, and tried to figure out the ‘best’
way in which this process may be applied in real life. The term ‘best’ is reported into
inverted commas because it’s not possible to certify in absolute terms the superiority
of a model rather than another, but it is the context or the presence of some elements
Data-Imagined Decision Making in Organizations . . . 65
(like the nature of the problem, time pressure, costs, availability of resources and
decision-maker characteristics) that defines the most suitable approach. Nevertheless,
we extrapolated a common set of properties from each model that recalls the need
to rely on the collection, availability, management and sharing of data.
The models analyzed are the Incremental Decision Model [18], the Carnegie
Model; the Garbage Can model [9]; the Observe, Orient, Decide, Act Loop (The
OODA Loop) [7, 12]; the Recognition-Primed Decision Model (RPD) [15]; the Ana-
lytic Hierarchy Process (AHP) [22]; and the Ladder of Inference [20]. A list of the
main characteristics of each model are reported in Table 1. In this table, each model is
summarized into a set of characteristics, which represent the main elements involved
in the decision making process: the initial conditions and constraints, the way to pro-
ceed and to simplify assumptions and conditions, the people involved (either singular
or teams) and the description of the final phase before the decision.
The decision-making models described in the previous section provide a general view
of the main theories developed around the paths that decision-makers should follow
in order to find out a solution at an existing problem through the consideration of some
aspects like the environment, timing and even the complexity of the initial situation
which has a significant impact on the final decision. From these considerations, we
may derive a series of factors that are common to all of the above models and help
contextualize data management tasks in support of the decision making loop that may
benefit from data visualization functionalities. We identified seven of such common
factors:
This factor is strictly linked with the high presence of Big Data in our everyday
life, a tremendously popular topic which will increase its importance in the next
years. Nevertheless, it’s not said that the availability of such amount of data always
represents a positive element, but only that it can be turned into an advantage if data
are managed properly.
66 A. Locoro and A. Ravarini
Table 1 The decision making models analyzed with their main characteristics
Decision making models Characterizing features
Bounded rationality Limited Rationality
Limited cognitive power
Selection of the ‘Satisfactory Option’
Single decision-maker
Incremental decision model Step by step process made of small choices
Long length in process application
step back in case of ‘decision interrupts’
Nonprogrammed decisions
One decision for each process (Single decision)
Carnegie model Initial ambiguity about the goals
Presence of limitations affecting the individual
Group of decision-makers (Organizational Coalitions)
Decision taken in a short-time period
One decision for each process (Single decision)
Selection of the ‘Satisfactory Option’
Garbage can theory High uncertainty
Rapid changes in the environment
Chaotic process
Streams of events
Group of decision-makers
More decisions in the same process (Multiple decisions)
OODA Step by step process
Continuous application of the process
Decision taken in a short-time period
High competition presence in the environment
RPD Experience of single person can make the difference
Decision taken in a short-time period
Unconscious comparison of alternatives
Selection of the ‘Satisfactory Option’
AHP Step by step process
Simplification of complex problems into sub-problems
Definition of goals, criteria and sub criteria
Judgment application
Comparison of alternatives
Ladder of inference Step by step process
Freedom for decision-makers in evaluating options
Selection of the ‘Best Option’ in that moment
Cognitive Biases avoided
Data-Imagined Decision Making in Organizations . . . 67
This factor refers to all of the forms, rules, procedures, conventions, strategies, and
technologies around which organizations are constructed and through which they
operate [13]. It’s quite common to find the application of this factor on a daily basis,
especially when the decision requires little research or time investment. Routine
concept can even be referred to decision-makers’ ability to apply the same procedure
in different situation, no matter what the problem is. At the end of the day, two
interpretations can be derived from the ‘routine presence’ property: the first one is
applied when a programmed decision is requested to be taken and as a consequence
decision-makers behave in the same way every time a specific problem needs to
be managed; the other interpretation requires the application of the same decision-
making procedure without considering the different nature of the problem.
This factor describes the process of transferring knowledge (mix of know-how, expe-
rience, skills and information) from a person to another within an organization. This
exchange can lead to the creation of new knowledge which can be in turn an impor-
tant source for an organization to get competitive advantage [21]. People should
wish to communicate and share their knowledge, otherwise the process wouldn’t
start. Under this point view, people have to put the sake of the company above any
personal interest.
This factor is characteristic of the Garbage Can model, where problems, solutions,
participants and choices flow through the organization. However, the presence of all
of these elements cause uncertainty in estimating the problem and potential solution
as well. Organizational decisions are not derived from a step by step process, instead
they are a mix of problems and solutions acting as independent events. In such a
situation the cause-and-effect relationships within the organization are difficult to
be identified [9]. Moreover, the presence of cognitive traps increases the complexity
of cause-and-effect relationships causing a distortion of the facts and influencing
decision-makers with prejudices not necessarily conform to the reality.1
biases.
68 A. Locoro and A. Ravarini
This decision-making factor describes the possibility that participants can keep iden-
tifying ideas without focusing just on a specific problem [9]. In other words, the
existence of a problem requiring a solution doesn’t impede to generate opportunities
that are not applicable in that case but may be useful in the future.
This factor has been derived from the OODA loop and it explains how a decision-
maker applies the model by considering the available information that he has to
extract from the observation of the environment. Then orienting towards it allows to
form a mental image of the circumstances. It’s the orientation turning information into
knowledge that makes this knowledge become a good decision. In fact, one decision
should even be able to predict the next move of the opponent. The OODA loop
can be applied to competitive business scenarios where knowledge of an opponent’s
behavioral patterns can be exploited through fast and agile anticipatory action [12].
Data visualization can be defined as ‘the representation and presentation of data that
exploit visual perception abilities in order to amplify cognition’ [14].
Data Visualization tools are software working as powerful instruments to manage,
represent and show data so to get insights and facilitate the identification of trends
or solve problems. They have features that correspond to the desired characteristics
or attributes that can support people in the decision-making process. A list of Data
Visualization features that we identify as meaningful factors for decision making
are reported in Table 2. They are inherent to the presentation, the processing and
the interaction with Data Visualization tools. The first three divisions have been
borrowed from a foundational work on the semiology of graphics [5]. Most of these
features have been defined in [2, 8, 16]. In what follows, some main features are
described in more details and definitions are given for each of them.
Table 2 A list of identified meaningful factors for Data Visualization affecting decision-making
Data organization Data processing Data communication Ease of use
Multidimensionality Expressiveness Shareability Familiarity
Order Readability Universality Intuitivity
Proportionality Extensibility Storytelling Usability
Selectivity Sinteticity Interactivity Flexibility
Associativity Minimalism Adaptability
Predictivity
Immediacy
Clarity
Informativity
group data into sets and not in terms of individual data points that are of no interest
in most cases. Within the data visualization tools, it’s possible to distinguish (resp.
aggregating) measures or dimensions. The type of aggregation applied may change
every time according to the context of the view. Order and proportionality are related,
respectively, to the ordinal or numerical nature of the data that are to be represented.
When processing data, a series of features are necessary to manipulate them in order
to better interpret them for decision purposes. For example, expressiveness identi-
fies how the graphical language that expresses the desired information is relevant,
minimal and without noise [17]. Readability pertains to the good comprehension of
a topic through the interpretation of charts. A readable graph is not only appealing
because of the quality of the image drawn, but it mostly consents to get knowledge
of the underlying meaning and structure [3]. Sinteticity allows to reproduce reality
with the minimal use of informative resources [16]. In other words, a context can
be represented by relying just on some resources which are anyway able to provide
enough information for describing the reality.
Clarity and informativity refers, respectively to the ‘ease of understanding and
fruition of information by users’ and to the ‘complete representation of the real-
ity’ [16]. Indeed, the reader of the graph is the one who needs to interpret the data
and be informed on the facts, but the creator of the figure is much more relevant
because he is directly involved in the process and in its choices, like the selection
of sources or the type of chart, the impact on the clarity of a representation and the
reporting into graphs all of the necessary information for the audience so that a detec-
tion of the reality is possible. An accurate knowledge of the context analysed is what
a representation aims to achieve, and the application of the so called visualization
process allows it.
70 A. Locoro and A. Ravarini
This process begins with raw data, so the selection of a dataset capable of helping
users to detect reality is a good starting point. For instance, a design is judged effective
when it can be interpreted accurately or quickly, when it has visual impact or when
it can be rendered in a cost-effective manner (Mackinlay, 1986). In other words, a
visualization is more effective than another one if the information expressed by one
visualization are more readily perceived than the information in the other visualiza-
tion. As already said human brain has not been made for translating binary code or
quickly elaborating written information, so the visual representation of data seems
to be the most adapt way to deal with this problem. Under this point of view, data
visualizations play an important role since they allow a more efficient flow of infor-
mation within the organization which is directly converted in more efficiency for the
business. Thus, the better is the effectiveness of a visualization, the higher is going
to be the comprehension of the context and as consequence more knowledge can be
derived by users.
Data and charts can be easily transferred from a user to another so that anyone could
make its own analysis by having them at his disposal. In this way, the communication
would be facilitated by the fact that even people not being physically in the same
location can exchange impressions about a graph resulting from the data visualization
process. This is shareability of data.
The charts should be understood by the majority of people even if the audience
speaks another language or has a different cultural education than the ‘creator’. Data
Visualization in this sense has the feature of universality, and it may be considered
as the business’s new Lingua Franca [4]. The visualization of a dataset into a chart is
without any doubt a useful form of communication, comprehensible by the majority
of people even if may be required a minimum level of knowledge of the context from
which the chart is derived because otherwise wouldn’t be possible to analyse it and
the chart would be for its own sake. In fact, visualization is not the goal of the process
but it is the mean through which data can be analysed. Understanding is the final
objective. However, becoming fluent in communicating through data visualization is
a necessary skill that should be trained so to have more opportunities in the business
field.
Storytelling is the data visualization feature which permits to apply the available
techniques so to improve the comprehension of reality. Making it simpler users have
the possibility to use previously collected data, convert them into charts or graphs
and tell a story, from the beginning until the end. An example is the representation
of a fact though a storyline (e.g. the genealogical tree of a family) or a timeline
reporting a sequence of temporal events (e.g. all the wars that took place in the last
three centuries). The claim is ‘data tell what’s happening, but stories explain the
reason’ [6]. A tale made of charts simplifies the understanding of raw data because
human mind is able to create connections based on emotions and memorize images.
Data-Imagined Decision Making in Organizations . . . 71
Elements like color, length, width, size and shape can positively work in favour of
people who would better remember a chart. Thus, users aim to tell a story from which
knowledge can be extrapolated but this story brings advantages for different figures
that may have interests into the company. These people are mainly stakeholders
and customers. Its use may help in having an overview of the context, identifying
potential trends and making decisions but the last one is referred to managers.
Interactivity permits users to navigate within the data visualization tool, manipu-
late data that may be useful for the visualization process and display them at various
levels of detail and in various formats. A ‘dialogue’ between humans and machine
is required so to exploit the potentiality of interactive visualizations [10]. A good
design facilitates users’ examination since the presentation of data is clearer and a
better detection of solutions or new trends is possible.
Ease of Use refers to the user friendly experience with an information tool that helps
users achieve their goals (like accomplishing a task and making a decision). The
ease of use has been associated with the familiarity dimension, and both have been
observed influencing the attractiveness as well [19]. Familiarity is the feature describ-
ing the high standardization and diffusion of classical charts which are provided by
every data visualization tool. In fact, users can choose among the most known pre-
sentation styles like bar, line, scatter, pie graphs and flow charts that are all easily
understood by visual creators as well as consumers. They are usually adopted to
solve common visualization problems even if their use is limited to specific data
types and the degree of novelty is quite low [8]. Usability is also part of the easiness
of use and is defined as ‘the extent to which a product can be used by users to achieve
specified goals with effectiveness, efficiency and satisfaction in a specified context
of use’ (ISO 9241-11 definition). In other words, this feature explains how the data
visualization tools would allow to achieve well defined objectives by providing a
high perception of the context and by yielding users’ satisfaction.
Intuitivity refers to the organization of information in terms of context, so that it
can convey all the properties of the reality of interest ‘at a glance’ [16]. The idea is
that important concepts need to be translated into visualization and the objective in
this case is to reduce the time thinking about how to use or how to read and interpret
the chart. The speed with which users are able to read or interpret a visualization
should be determined by the complexity of the subject and the purpose of the project,
not by the ineffectiveness of design. Indeed, a clear representation of data and the
familiarity with the chart selected are both important aspects allowing to get an
immediate comprehension of the situation.
Flexibility and adaptability are the interactivity counterpart related to the effec-
tiveness and satisfaction of users while manipulating data through visual means.
The objective of evaluating visualization flexibility is to improve computer users’
understanding of a dataset, otherwise the visualization would be totally useless [25],
72 A. Locoro and A. Ravarini
while adaptability is more related to represent charts and graphs on every kind of
device, no matter if the version of the tool is specifically developed for computers
or mobile devices. However, the visualization on different devices has been recently
analysed and according to some studies a reduction of the clutter on the screen is
the key for a better perception and comprehension of data reproduced. The problem
is that on-screen clutter becomes significant in the context of mobile devices which
have much smaller screens than traditional desktops [11].
After having analyzed each decision-making factor and each data visualization fea-
ture in its group, we finally identified a first set of possible intersections between the
two. In the following paragraphs we describe and motivate them.
The factor ‘sharing of a common language’ describes how much is important the
comprehension between people since they cooperate into organizational coalitions
and share their know-how. In particular, the common language refers to charts and
graphs which are drawn through the data visualization tools. The type of communica-
tion that should be developed in order to improve the decision-making process is the
data communication. The question is: Do data communication support and improve
the sharing of a common language? And how? All the features associated to data
communication come into play to determine this dimension of synergy. A prominent
topic in this respect is also related to the need of specific roles in organizations that
are in charge of proactively mediating between data management visualizations and
decision makers (e.g., storytellers, and the like).
Due to the increased availability of data from internal and external environment, their
collection and analysis would allow decision-makers to better understand the market,
find out potential trends, estimate customers’ preferences and evaluate the growth of
the company. If exploited, these possibilities will advantage the organization against
competitors. The management of such a big amount of data requires the application
of data communication as well as data organization and data processing features. All
the features of data visualization are crucial in the ambit of this connection.
Data-Imagined Decision Making in Organizations . . . 73
The decision-making process is applied so to get a final decision which can solve
an existing problem. However, it’s the decision-making model that provides the
guidelines for the path to follow in order to achieve the final decision. In some cases,
the decision is the result of a step by step process leading to that solution, in other
cases decision-makers have to pick up an option from a set of alternatives. The
identified features helping this enhancement are those of data organization and data
processing.
The ‘Routine presence’ property allows to increase the efficiency of the decision-
making process. The result is translated in a better use of time and energy so that
any waste of them will be avoided. Moreover, even the quality of the final decision is
going to take advantage from the routine application since the higher is the familiarity
of decision-makers with a context, the better will be the decision. In fact, practice
makes perfect and once understood how to handle a situation, the successful approach
can be fast applied with a consequent low probability of committing mistakes. The
time saved can be used to focus on other tasks. The data visualization features that
can help this process are data organization and ease of use.
The creation of knowledge is what data visualization tools aim to obtain. In fact, these
software transform raw data into graphical representations which are consequently
interpreted by decision-makers through their competences. The outcome of such
interpretations is the acquired knowledge which allows to clarify eventual doubts the
decision-makers may have and take a decision. Thus, it’s like this new knowledge
needs human competences, skills and experience to be extrapolated from graphical
representations. However, competences, skills and experience can be considered as
components of knowledge itself. The creation of a knowledge flow may be optimized
by the data processing and data communication features of data visualization.
74 A. Locoro and A. Ravarini
5 Conclusions
In this paper, we put together well known decision-making models and data visual-
ization features. The goal of our study was to intersect them into a model framing
data visualization for decision-making practices. This model has been introduced and
described so that the first two research questions were answered and there is room to
validate it with qualitative future work in order to answer to the third research ques-
tion. Further assessment should be made with observational studies in enterprises
that wish to share with us their decision-making models and their use of data visu-
alization tools to support decisions at all levels and frequency. These further studies
aim for example at selecting among data visualization features the most relevant
ones for each connection or whether some of them may be for example considered
general enough to be supportive of all of the decision-making properties.
Our last point regards the present-day trends for which our research project fits
well. One of them is in line with the topics of EU calls next to come, regarding
for example the impacts on the future advancements of intelligent systems, machine
learning and pervasive technologies in the direction of proposing solutions for ‘algo-
rithms opaqueness, implicit biases in decision making and lack of explicability for
trusting, accepting and adopting the next generation of intelligent machines on a
wider scale’.2 Our study goes in the direction of supporting decision making for the
next generation of data management. Citing a bit more from the above call we dis-
cover that ‘explanation could be more tightly intertwined with the decision making
process itself so that decisions can be challenged, interpreted, refined and adjusted
through mutual exchange, introspection [...] and active learning of both system and
user, for example through dialogue or other forms of multi-modal interaction aimed
at establishing mutual trust’.
References
1. Barros, G. (2010). Herbert A. Simon and the concept of rationality: Boundaries and procedures.
Brazilian Journal of Political Economy, 30(3), 455–472.
2. Batini, C., Scannapieco, M., et al. (2016). Data and information quality. Cham, Switzerland:
Springer, Google Scholar.
3. Bennett, C., Ryall, J., Spalteholz, L., & Gooch, A. (2007). The aesthetics of graph visualization.
Computational Aesthetics, 2007, 57–64.
4. Berinato, S. (2016). Good charts: The HBR guide to making smarter, more persuasive data
visualizations. Harvard Business Review Press.
5. Bertin, J. (1983). Semiology of graphics. University of Wisconsin Press.
6. Boje, D. M. (1991). The storytelling organization: A study of story performance in an office-
supply firm. Administrative Science Quarterly, 106–126.
7. Brehmer, B. (2005). The dynamic OODA loop: Amalgamating Boyd’s OODA loop and the
cybernetic approach to command and control. In Proceedings of the 10th International Com-
mand and Control Research Technology Symposium (pp. 365–368).
8. Cairo, A. (2012). The functional art: An introduction to information graphics and visualization.
New Riders.
9. Cohen, M. D., March, J. G., Olsen, J. P., et al. (1972). A garbage can model of organizational
choice. Administrative Science Quarterly, 17(1), 1–25.
10. Dilla, W., Janvrin, D. J., & Raschke, R. (2010). Interactive data visualization: New directions
for accounting information systems research. Journal of Information Systems, 24(2), 1–37.
11. Gaber, M. M., Krishnaswamy, S., Gillick, B., AlTaiar, H., Nicoloudis, N., Liono, J., et al.
(2013). Interactive self-adaptive clutter-aware visualisation for mobile data mining. Journal of
Computer and System Sciences, 79(3), 369–382.
12. Galinec, D., & Macanga, D. (2012). Observe, orient, decide and act cycle and pattern-based
strategy: Characteristics and complementation. In: Central European Conference on Informa-
tion and Intelligent Systems (p. 371). Varazdin: Faculty of Organization and Informatics.
13. Grant, R. M. (1996). Toward a knowledge-based theory of the firm. Strategic Management
Journal, 17(S2), 109–122.
14. Kirk, A. (2012). Data visualization: A Successful Design Process. Packt Publishing Ltd.
15. Klein, G. A. (1993). A recognition-primed decision (RPD) model of rapid decision making.
New York: Ablex Publishing Corporation.
16. Locoro, A., Cabitza, F., Actis-Grosso, R., & Batini, C. (2017). Static and interactive infograph-
ics in daily tasks: A value-in-use and quality of interaction user study. Computers in Human
Behavior, 71, 240–257.
17. Mackinlay, J. (1986). Automating the design of graphical presentations of relational informa-
tion. Acm Transactions on Graphics (ToG), 5(2), 110–141.
18. Mintzberg, H. (1975). The managers job: Folklore and fact.
19. Quispel, A., Maes, A., & Schilperoord, J. (2016). Graph and chart aesthetics for experts and
laymen in design: The role of familiarity and perceived ease of use. Information Visualization,
15(3), 238–252.
20. Ross, R. (1994). The ladder of inference. The fifth discipline fieldbook: Strategies and tools for
building a learning organization (pp. 242–246).
21. Rusuli, M. S. C., Tasmin, R., & Hashim, N. (2011). Knowledge Sharing Practice in Organi-
zation.
22. Saaty, T. L. (2014). Analytic heirarchy process. Wiley.
23. Shneiderman, B. (2003). The eyes have it: A task by data type taxonomy for information
visualizations. In The craft of information visualization (pp. 364–371). Elsevier.
24. Simon, H. A. (1990). Bounded rationality. In Utility and probability (pp. 15–18). Springer.
25. Wong, D. H. T., & Chee, C. M. (2015). Adaptive network data visualization design for mani-
fold computer users. ICIC Express Letters. Part B, Applications: An International Journal of
Research and Surveys, 6(1), 41–46.
IT Investment Decisions in Industry 4.0:
Evidences from SMEs
1 Introduction
Organizational processes, production, strategy, value creation and value delivery are
undergoing significant change as result of emerging technologies. The deep impact
of these technologies on business processes [12, 41] highlight the integration of
IT strategy with business strategy [9, 16]. Considering the fast-changing and diverse
emerging technologies, recent research emphasizes that IT alignment is a continuous
process [49]. Organizations need to consecutively align their IT strategy with business
strategy through investment and development their organizational IT resources and
N. Kazemargi (B)
Department of Business and Management, Luiss Guido Carli, Rome, Italy
e-mail: Nkazemargi@luiss.it
P. Spagnoletti
Department of Information Systems, University of Agder, Grimstad, Norway
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer 77
Nature Switzerland AG 2020
R. Agrifoglio et al. (eds.), Digital Business Transformation, Lecture Notes in Information
Systems and Organisation 38, https://doi.org/10.1007/978-3-030-47355-6_6
78 N. Kazemargi and P. Spagnoletti
1 Lookingat data reported on digital economy society index in 2017, although Denmark, Ireland,
Sweden and Belgium are leading in digital economies in the EU, the rank of Italy is 25th among
28th EU member states. To fill this gap and support digital transformation by SMEs, thus, Italian
government has launched a strategic plan for digitalization in 2016.
IT Investment Decisions in Industry 4.0 … 79
2 Relevant Literature
The German government initiative known as Industry 4.0 refers to integration of cyber
and physical systems through interconnection of sensors, machines and systems
to create connected and smart value chain beyond a single firm’s boundaries. The
businesses have undergone significant change due to embedded systems that create
hybrid physical-cyber systems [38]. Following Rüßmann et al. [42], we consider
industry 4.0 as combination of different technologies See Fig. 1.
Advances in technologies enhance capability of firms to generate, collect and
analyze big amount of data. Capturing and processing real-time data enhance orga-
nizational capabilities in decision making and create new value creation opportunities
for firms [37].
The evolving robots allow firms to reduce cost and flexibility due to automation
and decentralization of decision making, for example, automated guided vehicles
(AGVs).
Cloud computing technologies enable organizations to remotely access scalable
digital resources: applications, platforms and infrastructures [31]. The potential bene-
fits of cloud-based services for organizations are cost convenience, business agility
Fig. 1 Industry 4.0 as combination of different technologies. Adapted from Rüßmann et al. [42]
80 N. Kazemargi and P. Spagnoletti
and scalability of resources [30], that have led to a growing trend in adopting cloud-
based solutions in recent years [35], specifically for small and medium enterprises
[23].
Simulating production process leverage by availability of massive real-time data
can allow firms to optimize process settings in terms of time and quality.
Internet of Things (IoT) refers to a network of interconnected machines, devices
and sensors with capability to communicate via standard protocols. Devices with
embedded computing systems connect via the internet, and enable to collect and
exchange data, and interact together. Real-time information can be captured and
exchanged through embedded systems which enhances productivity and facilitates
interoperability [50].
Prototyping and producing products in small batches with high level of customiza-
tion is feasible by using additive manufacturing like 3-D printing. The cutting-edge
technology enhances flexibility to produce customized products.
Augmented reality provides information via devices such as augmented-reality
glasses for better decision making.
Integration of systems refers to platforms and data-integration networks that allow
firms to access and exchange data across different processes, departments and also
across supply chain.
With increased connectivity among systems and devices, firms are more depen-
dent on management and protection systems to imitate cyberthreats. Cyber-connected
systems collect huge amount of data from devices, sensors and actuators which facil-
itate real-time monitoring flow of materials and data along the supply chain. In adop-
tion of cutting-edge technologies, firms need to pay particular attention on emerged
vulnerabilities and security threats. As to adopting cloud, multi-tenant characteris-
tics of cloud that contains data of multiple organizations increase the risk of direct
attacks on cloud infrastructures [4]. Poorly-secured systems make firms prone to
cyber security threats, especially when new IT technologies are integrated with the
legacy systems [20]. Thus, firms need to ensure security in terms of: (1) accessi-
bility of data only by authorized actors and protection of sensitive data i.e. confiden-
tiality; (2) controlling any modification i.e. integrity (3) continuity of operations i.e.
availability [2].
The combination of these technologies is extensively expanding the span of the
services and products and business networks [9]. The embedded and connected
sensors, microprocessors, software and systems with in physical artifacts allow orga-
nizations to expand the value of products and services [38] and more room for product
differentiation. At the same time, the on-demand resources e.g. cloud computing
enhance organizational scaling ability [9]. When it intertwines with availability of
real time data it allows rapid mass customized production and highly customized
services [41]. The expanded span of data collection (e.g. data created by embedded
sensors or digital actions by individuals knowing as Big data), analysis and moni-
toring capabilities across value chain enable organizations to manage the whole busi-
ness processes more efficiently and effectively. Moreover, the hybrid physical-cyber
systems facilitate integration of organizations (vertically and/or horizontally) across
IT Investment Decisions in Industry 4.0 … 81
the value chain. The plug-and-play concept in products and services, automation and
standardized processes facilitate integration of value chain.
Furthermore, industry 4.0 enhances the flexibility through decentralized control,
autonomous robots, and data-driven decision making across value chain networks
[12]. Simultaneously, automation and integration of value chain across organizations
enable organizations to reduce the time to market –named Smart supply chain [22].
Organizations aim to meet the needs of customers and adopt available technologies
to create new value propositions. Industry 4.0 introduces a paradigm shift in the
way organizations create value: offered services and products, customer interface,
required resources, core competences, partner network, and capture value [12, 36].
In sum, industry 4.0 enables firms to enhance flexibility, quality and productivity
and can facilitate monitoring and controlling of energy consumptions, thus, improve
sustainability [13]. However, research stresses on considering the overall sustain-
ability view since for instance some technologies such as automation and robots are
expected to challenge social aspects of sustainability such as employment [7].
One of the dominant topics in the IS research relates to alignment of IT strategy with
business strategy. The traditional view of IT alignment is limited to alignment of
IT strategy at IT functional level strategy with business strategy [21]. The recent IS
research highlights the peculiar characteristics of new emerging technologies and the
embeddedness of digital technologies in organizational operations which influence
and transform the business operations and business models of many organizations
[12, 41]. Consequently, the IT strategy is not apart from business strategy anymore.
Instead, it is intertwined and integrated with business strategies [9, 16]. Moreover, the
changes in IT landscape and emerging new technologies require that organizations
consecutively align the IT strategy with business strategy [49]. This means that orga-
nizations need to develop and change organizational IT resources and infrastructures
in consistent with business strategy. In particular, organizations need to align the
business resources and IT investment [33]. IT investment decisions influence organi-
zational and innovation performance [26]. For example, Kleis et al. [25] emphasize
on the link between investment on IT infrastructure and innovation. At the same
time, making IT investment decisions and opting typology of IT and infrastructure
create a path dependency that may constrain and influence the future capability of
organizations to develop new resources, processes, and even business models [40].
Therefore, considering the complex and fast changing IT landscape, managers need
to make sense [48] of IT trends and diverse emerging technologies in order to make
the proper IT investment decisions [1].
As reported by Gartner, organizational IT spending is expected to increase also
in 2019 [17], yet it is challenging for organizations to align IT investment decision
with business strategy and adopt proper IT resources and infrastructure to create and
add value. In particular, the SMEs may face difficulties in aligning and integrating IT
82 N. Kazemargi and P. Spagnoletti
strategies with business strategies due to several reasons. First, SMEs mainly focus
on short-term strategy [32]. Second, the characteristics of SMEs lead to different
IT adoption rates in comparison with large organizations [19], since SMEs usually
target a niche market in order to sustain their competitive position in the market
[15]. Consequently, even high-tech SMEs have adopted very specific technologies
to meet the niche demands. Third, the decision of what technology to adopt in SMEs
is influenced by external environmental factors such as competitive supply side [43].
Moreover, SMEs are usually characterized by limited knowledge and capabilities of
managers who making strategic decisions [28], limited IS skills of workforce, lack
of financial resources, and IT infrastructures [11, 45]. The lack of financial resources
also acts as barriers for SMEs to use external knowledge sources or to develop
internal IT skills. The uncertainty regarding the technologies and level of capability
of managers in seeing long-term benefit of IT investments influence IT adoption
by organizations [43]. However, Levy et al. [28] present evidence that managers of
SMEs align their IS investment with business strategies: either to focus on efficiency
and cost reduction or on added value strategies.
To develop new emerging technologies, SMEs require to invest on IT infras-
tructures, IT services, and train or hire new workforce in an industry 4.0 context.
However, the lack of sufficient resources may limit SMEs capabilities to adopt new
technologies. For instance, SMEs face difficulty in successful implementation of
Enterprise Resource Planning software which relies on high level of IS skills [14].
Another example is decisions related to cloud service level (Software-as-a-Service,
Platform-as-a-Service or Infrastructure-as-a-service) which is based on organiza-
tional IT skills and expertise level: Platform-as-a-Service or Infrastructure-as-a-
Service solutions demand higher IT capabilities to maintain and upgrade the systems,
while Software-as-a-Service requires less efforts and expertise from firms [44].
As evidence shows 58% of firms who are victims of cyber-attacks are small
organizations [47]. Thus, in aligning IT with business strategies, IT governance [10]
and investments is prerequisite in order to not only support business strategy in short
and long term, but also mitigate associated risks.
In total 5130 SMEs applied for financial aids through banks or intermediaries which
1889 of them granted for the financial incentive to purchase assets. For SMEs received
loans, Table 1 illustrates the demographic characteristics.
The majority of firms are located in the north part of Italy that around 44.5% of
them are small-sized: 21.9% North West and 22.49% North East (Fig. 2). The number
of SMEs located in South (2.4%) is much lower than in Center of Italy (16.3%).
2 Annex 6a, Annex 6b, INTERMINISTERIAL DECREE—List of Capital Goods eligible for the
incentive, January 25th 2016.
3 AIDA is the Italian provider of the Bureau Van Dijk European Database. The database contains
structured information on over 1,000,000 Limited Companies operating in Italy, providing updated
information such as shareholding, personal data, financial and economic information, investments
and M&A etc.
84 N. Kazemargi and P. Spagnoletti
Table 1 Demographic
Foundation year (%)
characteristics of SMEs
Before 1970 4.37
1970s 12.33
1980s 21.94
1990s 23.94
2000s 24.16
2010 and After 13.26
Total 100
% Of craft companies 36.13
% Of startups 0.36
No. of employees
Less than 10 employees 20.79
10-49 employees 62.01
50-249 employees 17.19
Total 100
Bold indicates main headings
Our findings show that around 89% of firms gained financial benefits belong to
manufacturing sector. In particular, SMEs from manufacturing sector are concen-
trated in the following industrial subsectors:
• 33.5% manufacture of metal products (excluding machinery and equipment);
• 8.7% manufacture of machinery;
IT Investment Decisions in Industry 4.0 … 85
specially by SMEs,4 the findings of this study reveals that SMEs have seldom used
this financial aid to invest in cloud.
Surprisingly, evidence from this analysis shows the low propensity of SMEs in
investing on cybersecurity. Only few SMEs requested financial aid to invest on cyber
security. This is particularly an important issue, since insufficient attention to IT
security may lead to significant financial consequences and reputation damage for
firms. Specially, the increased connectivity resulted from adoption of cloud resources
and IoT increases the risk exposure of production and service systems [5].
For collaborative robots, SMEs purchased machines, tools and devices for
un/loading, handling, weighing, sorting materials and automated lifting and collab-
orative robots. As for simulation technologies, major purchase orders belong to 3D
modeling, simulation, experimentation and prototyping that allows organizations
to test production processes and optimize process settings in terms of time and
quality.
In total, SMEs invested mainly on physical assets (90%), while only few invested
on digital assets such as platforms, systems and software (10%). Figure 4 shows the
investments of firms in each technology based on tangible and intangible assets.
Additionally, based on detailed description on each purchase, four industrial
performance objectives were identified. As shown in Fig. 5, about 74% of SMEs
have invested on new assets to improve productivity of which 72% are dedicated
to acquisition of tangible assets. Around 15% of the firms invested to enhance flex-
ibility: 12.6% for physical assets. Even if results show significant investment to
enhance productivity and flexibility, it is interesting to see that SMEs concern with
sustainability and energy consumptions (4%). For instance, to improve sustainability,
the three main asset acquisitions are related to waste tracking, recovery and treat-
ment, and intelligent human-machine interfaces (HMI) that assist the operator in
safety and efficiency of processing, maintenance and logistics operations.
The evidence revealed concern by SMEs on sustainability and energy consump-
tions. Although the number of purchases is not as significant as for productivity and
flexibility, it sheds light on increased concerns of SMEs respect to regulations and
laws related to energy consumptions and waste management.
The ways organizations create, and capture value have undergone a significant change
due to emerging new technology and the embeddedness of such technologies in
business operations. Hence, as pointed out in literature, aligning organizational IT
strategy with business strategy is pivotal for business [8]. Moreover, the pace and
breadth of emerging new technologies induce challenges for firms in making deci-
sions about what technology to invest and how to align IT strategy with business
strategy [1].
In particular, for SMEs the challenges mainly refer to limited financial resources,
IS skills and knowledge. As for the financial challenge, given that the significant
contribution of Italian SMEs in economic growth, the Italian Government has intro-
duced the National Plan for Industry 4.0 aiming at removing financial barriers and
facilitating SMEs in adopting new technologies. However, SMEs face difficulty in
88 N. Kazemargi and P. Spagnoletti
making strategic decisions about technologies due to limited skills and knowledge,
especially considering the wide range of cutting-edge technologies, the substantial
influence on the organizational performance and future development capability due
to path dependency [40]. For instance, having complex legacy systems makes inte-
gration of the new system challenging and influences organizational performance.
Thus, SMEs need to make sense of fast pace of new technologies [48] and understand
what technology to invest in order to better align IT strategy with business strategy.
The findings of this study present a detailed insight on SMEs’ investments on
industry 4.0 supported by the Government following the National Plan. While digital
technologies are transforming business processes and business models, the findings
show that SMEs mainly invest on tangible assets e.g. plant, machinery, industrial
equipment. One plausible explanation for the current trend is that Italy is lagged
behind in digitalization of enterprises5 respect to the European average. Thus, we
can see that SMEs that mainly operating in manufacturing industry invest to develop
advanced production systems aiming at improving productivity. Our findings are
aligned with previous studies that highlight SMEs have a high tendency to keep the
existing business model [24], and by investing on technologies they pursue efficiency
goals [27] in current business which requires less efforts to realize.
Moreover, a negligible number of firms invest on IoT, virtualization, big data and
analytics. Since digital technologies have significant influence on business processes,
firms need to carefully assess and adopt these technologies aligned with the overall
business strategy. Thus, SMEs may need to better understand how they can reap
benefits from new technologies before any investment. It is worth noting that limited
resources are main barriers for SMEs to explore different technologies and access to
external knowledge. While large companies have sufficient resources to allocate for
exploring different technologies and innovative projects even in different markets,
SMEs mainly focus on specific technologies to meet demands in specific markets.
The limited IT skills and knowledge in SMEs act as a barrier in exploring new
technologies and strategic IT investment by managers [11–28, 45].
In particular, we found few SMEs invest on cybersecurity which might be due to
lack of awareness of managers making IT strategic decisions. Another reason for that
can be the security expectation of SMEs is lower than large enterprises, since the lack
of proper protection on IT infrastructure has higher financial consequences for large
enterprises [46]. Large organizations may be willing to pay more for customized
service level agreements to increase security measures. For SMEs, however, there
is a trade-off between security and cost [18, 29]. Lack of sufficient investment on
cybersecurity technologies can lead to significant financial consequences and repu-
tation damage for firms. Considering the fact that significant number of SMEs are
victims of cyber-attacks [47], proper information security strategies necessarily entail
employing practices for predictable and unpredictable security threats [6]. In partic-
ular, investment on cybersecurity technologies is crucial for organizations adopting
system integration since integrating information systems such-as supply chain-blurs
organizational boundaries which consequently increases exposure to cyber risks [5].
While main stream of literature has focused on benefits of industry 4.0 [12–22, 41],
in this study we argue that the lack of investment on cybersecurity and adequate
knowledge of impact on technologies limit associated benefits of new technologies
and may lead to negative consequences.
To align IT investments with business strategy, possess IT skills and access to
external knowledge play an important role for SMEs. Thus, in the following year,
significant effort was dedicated by the Italian Government to operationalize digital
innovation hubs and competence centers to further support SMEs in innovation
investments through raising awareness and facilitating access to external knowl-
edge such as universities and other actors. This will allow SMEs to not only explore
and exploit new technologies, but at the same time be aware of security challenges,
and consequently wisely invest on IT technologies in industry 4.0 context.
The paths in technology adoption by SMEs are different from large organiza-
tions [19]. While the concept of Industry 4.0 has been widely investigated in large
enterprises [3], this study on Italian SMEs provides a useful insight into the actual
investments on digital technologies. The findings illustrate the propensity of SMEs in
embedding advanced technologies for Industry 4.0 across different industrial sectors
and regions.
While the incentive by Italian government to some extent remove the financial
barriers for SMEs in investing and acquiring new technologies, this study aims to
contribute to alignment literature by highlighting the importance of IT investments
as strategic decisions in Industry 4.0. Moreover, the implications of this paper for
practice are twofold. First, the results can help policy makers understand how SMEs
are likely to embed new technologies in an industry 4.0 context. Second for practi-
tioners, the results highlight the importance of integration of IT investment in new
emerging technologies with business strategy.
References
1. Adomavicius, G., Bockstedt, J. C., Gupta, A., & Kauffman, R. J. (2008). Making sense of
technology trends in the information technology landscape. MIS Quarterly, 32, 779.
2. Anderson, J. M. (2003). Why we need a new definition of information security. Computers &
Security, 22, 308–313.
3. Arnold, C., Kiel, D., & Voigt, K.-I. (2016). How the industrial internet of things changes
business models in different manufacturing industries. International Journal of Innovation
Management, 20, 1640015.
4. August, T., Niculescu, M. F., & Shin, H. (2014). Cloud implications on software network
structure and security risks cloud implications on software network structure and security
risks. Information Systems Research, 25, 489–510. https://doi.org/10.1287/isre.2014.0527.
5. Baskerville, R., Rowe, F., & Wolff, F.-C. (2018). Integration of information systems and
cybersecurity countermeasures. ACM SIGMIS Database Advances in Information Systems.
49, 33–52. https://doi.org/10.1145/3184444.3184448.
6. Baskerville, R., Spagnoletti, P., & Kim, J. (2014). Incident-centered information security:
Managing a strategic balance between prevention and response. Information & Management,
51, 138–151. https://doi.org/10.1016/j.im.2013.11.004.
90 N. Kazemargi and P. Spagnoletti
7. Beier, G., Niehoff, S., Ziems, T., & Xue, B. (2017). Sustainability aspects of a digitalized
industry—A comparative study from China and Germany. International Journal of Precision
Engineering and Manufacturing Green Technology, 4, 227–234.
8. Bergeron, F., Raymond, L., & Rivard, S. (2004). Ideal patterns of strategic alignment and
business performance. Information & Management, 41, 1003–1020.
9. Bharadwaj, A., El Sawy, O.A., Pavlou, P. A., & Venkatraman, N. (2013). Digital business
strategy: toward a next generation of insights. MIS Quarterly, 471–482.
10. Bowen, P. L., Cheung, M.-Y. D., & Rohde, F. H. (2007). Enhancing IT governance practices:
A model and case study of an organization’s efforts. International Journal of Accounting
Information Systems, 8, 191–221.
11. Bridge, S., O’Neill, K., & Cromie, S. (1998). Understanding Enterprise. Macmillan, London:
Entrepreneurship and Small Business.
12. Burmeister, C., Lüttgens, D., & Piller, F. T. (2016). Business model innovation for Industrie 4.0:
why the “Industrial Internet” mandates a new perspective on innovation. Die Unternehmung,
70, 124–152.
13. Dalenogare, L. S., Benitez, G. B., Ayala, N. F., & Frank, A. G. (2018). The expected contribution
of Industry 4.0 technologies for industrial performance. International Journal of Production
Economics, 204, 383–394.
14. Deep, A., Guttridge, P., Dani, S., & Burns, N. (2008). Investigating factors affecting ERP
selection in made-to-order SME sector. Journal of Manufacturing Technology Management,
19, 430–446.
15. Fligstein, N. (1996). Markets as politics: A political-cultural approach to market institutions.
American Sociological Review, 656–673.
16. Galliers, R. D. (2011). Further developments in information systems strategizing: unpacking
the concept. In Oxford handbook of management Information systems: Critical perspectives
and new directions (pp. 329–345). Oxford Oxford: University Press (2011).
17. Gartner Group. (2018). Gartner Says “Global IT Spending to Grow 3.2 Percent in 2019”
Press Release https://www.gartner.com/en/newsroom/press-releases/2018-10-17-gartner-says-
global-it-spending-to-grow-3-2-percent-in-2019.
18. Gupta, P., Seetharaman, A., & Raj, J. R. (2013). The usage and adoption of cloud computing by
small and medium businesses. International Journal of Information Management, 33, 861–874.
https://doi.org/10.1016/j.ijinfomgt.2013.07.001.
19. Harland, C. M., Caldwell, N. D., Powell, P., & Zheng, J. (2007). Barriers to supply chain
information integration: SMEs adrift of eLands. Journal of Operations Management, 25, 1234–
1254.
20. He, H., Maple, C., Watson, T., Tiwari, A., Mehnen, J., Jin, Y., & Gabrys, B. (2016). The
security challenges in the IoT enabled cyber-physical systems and opportunities for evolu-
tionary computing & other computational intelligence. In 2016 IEEE Congress on Evolutionary
Computation (CEC) (pp. 1015–1021). IEEE.
21. Henderson, J. C., & Venkatraman, H. (1999). Strategic alignment: Leveraging information
technology for transforming organizations. IBM Systems Journal, 38, 472–484.
22. Ivanov, D., Dolgui, A., Sokolov, B., Werner, F., & Ivanova, M.: A dynamic model and an
algorithm for short-term supply chain scheduling in the smart factory industry 4.0. International
Journal of Production Research, 54, 386–402.
23. Kaufman, L. M. (2009). Data security in the world of cloud computing. IEEE Security and
Privacy, 7, 61–64.
24. Kleindl, B. (2000). Competitive dynamics and new business models for SMEs in the virtual
marketplace. Journal of Developmental Entrepreneurship, 5, 73.
25. Kleis, L., Chwelos, P., Ramirez, R. V., & Cockburn, I. (2012). Information technology and
intangible output: The impact of IT investment on innovation productivity. Information Systems
Research, 23, 42–59.
26. Kohli, R., Devaraj, S., & Ow, T. T. (2012). Does information technology investment influences
firm’s market value? The case of non-publicly traded healthcare firms. MIS Quarterly.
IT Investment Decisions in Industry 4.0 … 91
27. Levy, M., Powell, P., & Yetton, P. (2001). SMEs: aligning IS and the strategic context. Journal
of Information Technology, 16, 133–144.
28. Levy, M., & Powell, P. (1998). SME flexibility and the role of information systems. Small
Business Economics, 11, 183–196.
29. Maher, N., Kavanagh, P., & Glowatz, M. (2013). A vendor perspective on issues with security,
governance and risk for Cloud Computing. In 26th Bled eConference—eInnovations Challenges
Impacts Individuals Organizations and Social Processing (pp. 103–114).
30. Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud computing—
The business perspective. Decision Support Systems, 51, 176–189. https://doi.org/10.1016/j.
dss.2010.12.006.
31. Mell, P., & Grance, T. (2011). The NIST definition of cloud computing—Recommendations of
the national institute of standards and technology. Gaithersburg: United States Department of
Commerce.
32. Mintzberg, H. (1982). Structure et Dynamique des organisations, edited by Editions
d’Organisation. Vingt-troi. ed. Eyrolles, 434, 978–2708119710.
33. Mithas, S., & Tafti, A., Mitchell, W. (2013). How a firm’s competitive environment and digital
strategic posture influence digital business strategy. MIS Quarterly, 511–536.
34. Moeuf, A., Pellerin, R., Lamouri, S., Tamayo-Giraldo, S., & Barbaray, R. (2018). The industrial
management of SMEs in the era of Industry 4.0. International Journal of Production Research,
56, 1118–1136.
35. Oliveira, T., Thomas, M., & Espadanal, M. (2014). Assessing the determinants of cloud
computing adoption: An analysis of the manufacturing and services sectors. Information &
Management, 51, 497–510.
36. Osterwalder, A., Pigneur, Y., & Tucci, C. L. (2005). Clarifying business models: Origins,
present, and future of the concept. Communications of the Association for Information Systems,
16, 1.
37. Pigni, F., Piccoli, G., & Watson, R. (2016). Digital data streams: Creating value from the
real-time flow of big data. California Management Review, 58, 5–25.
38. Porter, M. E., & Heppelmann, J. E. (2014). How smart, connected products are transforming
competition. Harvard Business Review, 92, 64–88.
39. Radziwon, A., Bilberg, A., Bogers, M., & Madsen, E. S. (2014). The smart factory: exploring
adaptive and flexible manufacturing solutions. Procedia Engineering, 69, 1184–1190.
40. Reynolds, P., & Yetton, P. (2015). Aligning business and IT strategies in multi-business
organizations. Journal of Information Technology, 30, 101–118.
41. Rudtsch, V., Gausemeier, J., Gesing, J., Mittag, T., & Peter, S. (2014). Pattern-based business
model development for cyber-physical production systems. Procedia CIRP, 25, 313–319.
42. Rüßmann, M., Lorenz, M., Gerbert, P., Waldner, M., Justus, J., Engel, P., & Harnisch, M.
(2015). Industry 4.0: The future of productivity and growth in manufacturing industries (Vol.
9, pp. 54–89). Boston Consulting Group.
43. Salmeron, J. L., & Bueno, S. (2006). An information technologies and information systems
industry-based classification in small and medium-sized enterprises: An institutional view.
European Journal of Operational Research, 173, 1012–1025.
44. Schneider, S., & Sunyaev, A. (2016). Determinant factors of cloud-sourcing decisions:
Reflecting on the IT outsourcing literature in the era of cloud computing. l(31), 1–31. https://
doi.org/10.1057/jit.2014.25.
45. Stokes, D. (2000). Marketing and the small firm. I: S. Carter & D. Jones Eves (Eds.), Enterprise
and small business: Principles, practice and policy. London: Pearson Education Ltd.
46. Sultan, N. A. (2011). Reaching for the “cloud”: How SMEs can manage. International Journal
of Information Management, 31, 272–278. https://doi.org/10.1016/j.ijinfomgt.2010.08.001.
47. Verizon 2019 data breach investigations report. https://enterprise.verizon.com/resources/rep
orts/2019-data-breach-investigations-report.pdf (2019).
48. Weick, K. (1979). The social psychology of organizing. Reading, MA: Addison-Wesley.
92 N. Kazemargi and P. Spagnoletti
49. Yeow, A., Soh, C., & Hansen, R. (2018). Aligning with new digital strategy: A dynamic
capabilities approach. Journal of Strategic Information Systems, 27, 43–58.
50. Zhang, Y., Zhang, G., Wang, J., Sun, S., Si, S., & Yang, T. (2015). Real-time information
capturing and integration framework of the internet of manufacturing things. International
Journal of Computer Integrated Manufacturing, 28, 811–822.
Creating a New Innovation Orientation
Through Idea Competitions
1 Introduction
Being innovative is highly important for most companies in order to stay competitive,
also for service companies. Having a supportive innovation culture or strong innova-
tion orientation is essential regarding how innovative a company is [1]. An innovation
culture is in general described as a culture where risk- taking, empowerment and open
communication among other factors are appreciated [1, 2]. Chesbrough talks about
a closed and an open approach to innovation [3]. The open approach values external
partnerships and inspiration whereas the closed one values control and secrecy.
In the last two decades or more the open innovation approach has received high
emphasis as a way to strengthen the innovation potential. This is among other things
fueled by access to the Internet and software developments such as online collabora-
tive functionalities and lately social media that have made interaction and community
building infrastructures even easier to build and access [4, 5]. Many service compa-
nies have taken advantage of these interactive tools to involve their customers in
different phases of the innovation process [6–8].
H. W. Nicolajsen (B)
IT University Copenhagen, Rued Langgaardsvej 7, 2300 Kbh S, Denmark
e-mail: hwni@itu.dk
A. Scupola
Roskilde University (Roskilde Universitet), Universitetsvej 1, 25.3, 4000 Roskilde, Denmark
e-mail: ada@ruc.dk
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer 93
Nature Switzerland AG 2020
R. Agrifoglio et al. (eds.), Digital Business Transformation, Lecture Notes in Information
Systems and Organisation 38, https://doi.org/10.1007/978-3-030-47355-6_7
94 H. W. Nicolajsen and A. Scupola
The studies investigating interactive tools for internal use such as the innovation
jams in IBM [9] or organizational Wikis [10] are flourishing. Idea competitions are
one category of these tools. The success of using these tools to involve external part-
ners such as customers to come up with ideas has been widely researched (e.g. [7,
11, 12]). However we argue that there is a new and not highly researched trend of
companies using such tools for internal use. It may be argued that these tools carry
with them an inherent approach to innovation much in line with the open innova-
tion paradigm due to functionalities supporting open communication, participation,
empowerment etc. [13]. Therefore we investigate the following research question:
How does a consulting company use an internal idea competition to influence the
innovation orientation in the organization?
We analyze a case study of a consulting company’s implementation of an idea
competition by investigating its conceptualization and the initial attempts to change
the innovation orientation in the company.
The paper is structured as follows. First we describe the theoretical grounding
defining service innovation, innovation orientation and idea competitions. Then
we present the research method. This is followed by the analysis, discussion and
conclusions.
2 Theoretical Grounding
3 Research Method
To investigate the research question a case study methodology was considered appro-
priate as we investigate a real-life phenomenon—implementing an idea competition
tool - where control over the context is impossible [25]. The main data collection
method was semi-structured interviews with open-ended questions. We conducted 27
interviews (Table 2). The respondents were selected on the base of their involvement
in the planning, implementation and participation to the idea competition. At the
beginning of the research, the informants were selected by the competence manager
and the innovation director that we also interviewed. Later snowball sampling [26]
was used to find respondents with different profiles. 17 of the interviews lasted about
1–1½ hours each, the other 10 were short interviews of approx. ½ hour. All inter-
views were tape recorded and transcribed. We asked about the purpose of the idea
competition, how the tool and the organizational set-up were designed and supported
as well as about the organizational and individual outcome and challenges.
Documentation review and field notes were complementary data collection
methods including material about the idea competition process; schemes to submit
ideas, samples of submitted ideas, the winning ideas and criteria for idea selection.
The researchers also gained access to the idea competition platform for a short period
Creating a New Innovation Orientation Through Idea Competitions 97
of time to get an idea of its functionalities. The interviews are combined with the
secondary material to create so-called rich descriptions [27] (Table 2).
The data analysis follows Miles and Huberman [28] instructions for analysing
qualitative data and interviews. In the process of data collection, data coding [28]
it became clear that the biggest issue was establishing an innovation orientation
rather different from the established innovation practice in The Company. In order to
analyze these attempted changes and challenges we use Dobni’s [1] understanding
of innovation orientation. Before we move into the analysis, we shortly present the
case company.
98 H. W. Nicolajsen and A. Scupola
In The Company, the main source of innovation occurs, develops and is financed
through consulting projects. However, it is believed that the company’s employees
possess a great deal of knowledge about the internal processes that could be a source of
organizational efficiency. The decision to use the idea competition platform was taken
at a directors meeting about the company strategy. A group of eight “smart employees
with drive” from different department in Denmark was invited to form a project
group—“The innovation team”. Their task was to develop a sustainable concept
around the idea management platform from Nosco (the software provider) called
“Idea Exchange” to crowdsource ideas from the employees. The Idea Exchange
platform includes a number of community functionalities that enhance interaction
and collaboration. For example, it is possible to submit one’s own ideas or comment
on ideas posted by others to suggest improvements or to further develop the idea. Each
employee is given an amount of virtual money at the beginning of the competition,
which can be invested into ideas contributed by others. At any point in time, the
Creating a New Innovation Orientation Through Idea Competitions 99
spot value of an idea—together with the comments that support it—is proxied by
the aggregate investment positions held on it relative to all other ideas. The ideas get
ranked automatically in the system according to their spot value.
The implementation of Idea Exchange is much more than implementation of
the Idea Exchange platform. It is a concept including components such as: the roll
out plan including invitations, follow up communication, deadlines, log ins, arti-
cles in the internal newsletter, information provided on the intranet, information
screens running commercials about the Idea Exchange event and the Innovation
Day, a formula for presentation of the ideas, nomination of the winning ideas and
the strategic implementation of the winning ideas.
By applying the design variables from Ebner et al. [22] and Bullinger et al. [23],
The Company is the organizer and the employees are the participants which partic-
ipate as individuals with user name without needing to state their position in the
company. The context is a call for ideas for upcoming strategy. Five strategic themes
were formulated by top management along with an online format to guide the form
of input desired. The activities on the online Idea Exchange lasted sixes weeks,
whereas the whole idea competition event including the off line activities followed
the strategic year and a little longer, as the winning ideas were turned into strategic
action areas for the upcoming year. Three rounds of review process took place. After
the online idea posting and trading period expired, prizes were given to the ideas
with the highest spot value in each theme, a prize to the best trader and a prize
to the best commentator. These prizes were symbolic such as an Ipad. The highest
ranked idea within each of the five themes entered into a pool of 10 ideas to be
further developed for a final evaluation along with five ideas selected through an off
line evaluation process. In fact, the Innovation Team screened the rest of the ideas
(approx. 100) and selected 20 promising ideas according to a number of criteria
developed by the Innovation Team and communicated at the very beginning of the
Idea Exchange event. These 20 selected ideas were presented to the management
group who in turn selected 5 of these ideas (Wildcards) for further development
together with the 5 highest ranked ideas. A number of work hours were then allo-
cated to these 10 finalist idea “owners” and each idea owner was assigned a couple of
experts to help them further develop the ideas and define the implementation needs.
The Idea Exchange event culminated with the Innovation Day, where the 10 finalist
ideas were presented to an audience of company employees and external people and
three “winner” ideas were selected by an innovation panel for final implementation.
The panel was composed by company directors and an external expert. The prizes
included participation to innovation courses and implementation of the idea. The
incentives to participate are both external such gifts, and internal as recognition and
influence if the idea get implemented.
100 H. W. Nicolajsen and A. Scupola
Innovation intention
According to Dobni there is a need of “a formally established architecture to develop
and sustain innovation”. The whole event of the Idea Competition with its anchoring
in the company strategy both regarding the themes’ formulation as well as the even-
tual implementation of the winning ideas is a way to ensure formality and business
alignment in The Company.
The primary intention of the Idea Competition was getting access to many different
ideas for innovation. The assumption is that all employees possess insight into The
Company’s internal processes and therefore might have ideas on how The Company
may do better. This is in contrast to the existing innovation culture as some respon-
dents state that having employee’s ideas heard, developed and implemented is not
easy. The leaders often act as “gatekeepers”. The idea competition is recognized as a
way to overcome this also by the employees as showed by the following statement:
You get innovation on the agenda and it becomes more approachable, more fun and more
interesting making people want to use their spare time on it. The main advantage is that
it shortcuts the distance between high and low in the system, meaning ideas that normally
don´t get to the management group, gets there. Project member #14
I think many have thought about ideas before, but they would not come and tell, but now it
is easy, you just go and write it. Project member #15
Others are however reluctant to participate, as they are afraid of the quality level
of their ideas. No resources are given to the employees to participate in the idea
competition and therefore it becomes “con amore” and the more “enthusiastic rather
than the crowd” as emphasized by an Innovation Team member. This is a way to limit
the participation. It may constrain the number of ideas for good and bad. However,
some of the employees also argue that not everybody is tuned towards innovation.
Innovation infrastructure
There are no particular qualifications needed to participate in the Idea Exchange event
as promising ideas can be further developed with help of organizational experts. On
the other hand, the constituency of the different roles is a way to create a learning
opportunity and to create a broader innovation awareness in The Company. The
employees are lured into the Idea Exchange as dealers, thus taking part in this “funny”,
non-risky part of the Idea Exchange event. Getting them into the Idea Exchange
platform is a way to get them exposed to the innovation process, which may make
them learn from the ideas of others and create awareness and confidence about what
innovation can be.
if you don’t think of your self as super innovative, then you can take part by playing the
game and be a good dealer. Innovation team member #15
The majority had contributed as s dealers rather than as idea contributors. Many
had entered the online Idea Exchange but did not even participate as dealers. One
respondent questions the ease to use the system. Many informants state that they
used almost an hour the first time to understand the Idea Exchange concept. One
argues it is due to too much text.
There is too much explanation on the different categories, you need to invest too many
resources to get into it, it’s a pity, everybody is busy. Project member #17
Another argues that some employees refrain to participate even as dealers due to
lack of overview
I could see that it would take a long time if I wanted to get a good overview. I probably feel a
little bad about putting my shares in one idea and then there are many other ideas, I haven’t
noticed which I would rather have supported. Project member #16
Negative learning also occurred. An employee explains that during the first idea
competition he thought it was really funny and contributed with three ideas. Some
of his ideas got selected for further development, but afterwards nothing happened.
In the second round he prioritized only to play the game for the fun of it arguing that
time constraints was crucial.
You could say I feel I already contributed. I would have liked to post an idea, but I did not
get to it, well you know time. It was not my highest priority. Project member #14
as it gives each employee a voice to bring up ideas, comment and ranking ideas thus
influencing the process. It provides for open communication across the organization
raising new values and ideas.
Concerns with the results of such a democratic ranking made the Innovation Team
and Top Management to combine the online democratic ranking with a management
based selection of another five ideas. Likewise management was given the final word
when nominating the three finalist ideas. There is thus some opening up and letting
go of some control by enhancing the transparency of the idea generation process and
support a more open communication. However, management is still in control. Pure
empowerment might have compromised the need of strategic anchoring of innovation
with the business goal, as argued in the following quote:
When resources are allocated then severity sets in. It would be crazy, well, it is not sure the
democracy finds the best idea in relation to The Company business and strategy. It has to be
the leaders who decides. Project leader #18
This is supported by the observation that some of the top ranking ideas in Idea
Exchange were not really ideas, but more issues irrelevant for the company strategy.
This points to a weakness of the online ranking functionality and how employees
decide to buy shares into ideas. It turned out that employees buy shares to support a
mix of good, funny and different ideas especially when they are related to their area
of expertise as well as ideas from “friends” in the organization.
Innovation influence
The whole idea and outcome of the Idea Exchange event is to make the employees
contribute with ideas that may help to improve the organizational processes based
on their working experiences and knowledge Idea Exchange system is a way to
disseminate ideas and knowledge about challenges and related solutions. Having the
Idea Exchange event is a way to encourage employees to share their ideas about new
ways to create value for the company and the customers. The Idea Exchange system
seems to be strong in supporting communication about innovations as interesting or
funny ideas are often discussed at lunch by employees
Well regarding this one [a useful idea] a colleague told me about it. Try to look here, it is
really good, just something for you. Project manager #18
Innovation implementation
The Idea Exchange concept ensures that at least the winning ideas are implemented.
However, the lack of follow up on the majority of the ideas submitted has discouraged
some participants (se earlier quote). To address this issue, the Innovation Team had
considered of considering Idea Exchange platform as an incubator. An informal way
of dissemination and possible implementation is when employees learn about others’
ideas and experiences and get in contact with them to implement the ideas in their
own project/department (see quote above).
Creating a New Innovation Orientation Through Idea Competitions 103
Our study reveals that idea competition tools may be used to rethink, encourage and
eventually create a new/different innovation orientation in companies. As argued by
Doherty and Doigh [20] the idea competition becomes a catalyst not only to imple-
ment espoused values but also to develop and rethink the approach to innovation
and innovation practice in the organization. In addition it becomes a catalyst as it
encourages and inspires innovative behaviors through the different design elements.
Idea Exchange architecture and especially the three different roles made it poten-
tially possible for all employees to participate whether or not they see themselves as
innovation drivers. This creates a vehicle for exposing and changing the employees
awareness of innovation. The idea competition event has created a new innovation
orientation due both to the strategic approach behind the call for ideas as well as the
allocation of resources for implementation.
Dobni [1] talks about a weaker or stronger innovation orientation as one common
underlying approach within the company. Our study questions this understanding of
one unified approach. We observe an innovation orientation with focus on collecting
employees ideas for internal process innovations; an innovation orientation which
is seen as complementary rather than in opposition to other innovation orientations
in the company such as ad hoc innovation (e.g. [14]) through customer projects or
innovation developed by top management. Also this type of innovation orientation
is created occasionally as it is argued that it is difficult to create the needed critical
mass and focus on an ongoing basis.
References
10. Standing, C., & Kiniti, S. (2011). How can organizations use wikis for innovation? Technova-
tion, 31(7), 287–295.
11. Piller, F., Schubert, P., Koch, M., & Möslein, K. (2005). Overcoming mass confusion:
Collaborative customer co-design in online communities. Journal of Computer-Mediated
Communication, 10(4), article 8.
12. Piller, F. T., & Walcher, D. (2006). Toolkits for idea competitions: A novel method to integrate
users in new product development. R&D Management, 36(3), 307–318.
13. Ibrahim, Y. (2010). The discourses of empowerment and Web 2.0: The dilemmas of user-
generated content. In S. Murugesan (Ed.), Handbook of research on Web 2.0, 3.0, and X.0:
Technologies, business, and social applications (pp. 828–845).
14. Gallouj, F., & Weinstein, O. (1997). Innovation in services. Research Policy, 26, 537–556.
15. Pliskin, N., Romm, T., Lee, A. S., & Weber, Y. (1993). Presumed versus actual organizational
culture: Managerial implications for implementation of information systems. The Computer
Journal, 36(2), 143–152.
16. Schein, E. H. (1985). Organizational culture and leadership. San Francisco: Jossey-Bass.
17. Hatch, M. J. (1993). The dynamics of organizational culture. Academy of Management Review,
18(4), 657–693.
18. Wenger, E. (1998). Communities of practice. Prentice Hall.
19. Doherty, N. F., & Doig, G. (2003). An analysis of the anticipated cultural impacts of the
implementation of data warehouses. IEEE Transactions on Engineering Management, 50(1),
78–88.
20. Doherty, N. F., & Perry, I. (2001). The cultural impact of workflow management systems in
the financial services sector. The Services Industry Journal, 21(4), 147–166.
21. Markus, M. L. (2004). Technochange management: Using IT to drive organizational change.
Journal of Information Technology, 19(1), 4–20.
22. Ebner, W., Leimesister, J. M., & Kromar, H. (2009). Community engineering for innova-
tions: The ideas competition as method to nurture a virtual community for innovations. R&D
Management, 39(4), 342–356.
23. Bullinger, A. C., Neyer, A.-K., Rass, M., & Moeslein, K. (2010). Community-based innovation
contests: Where competition meets cooperation. Creativity and Innovation management, 19(3),
290–303.
24. Hutter, K., Hautz, J., Füller, J., Mueller, J., & Matzler, K. (2011). Communitition: The tension
between competition and collaboration in community-based design contests. Creativity and
Management, 20(1), 3–21.
25. Yin, R. K. (1997). Case study research design and methods. Thousand Oaks: Sage Publications.
26. Goodman, L. A. (1961). Snowball sampling. Annuals of Mathematical Statistics, 32(1), 148–
170.
27. Walsham, G. (1995). Interpretive case studies in IS research: Nature and method. European
journal of Information Systems, 4, 74–81.
28. Miles, M. B., & Huberman, A. M. (1994). Qualitative data analysis. Thousand Oaks, California:
Sage Publications. Second Edition.
Digitization, Accounting, Controlling,
and Reporting
Accounting Information Systems: The
Scope of Blockchain Accounting
1 Introduction
I. E. Inghirami (B)
University of Milano-Bicocca, Milan, Italy
e-mail: iacopo.inghirami@unimib.it
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer 107
Nature Switzerland AG 2020
R. Agrifoglio et al. (eds.), Digital Business Transformation, Lecture Notes in Information
Systems and Organisation 38, https://doi.org/10.1007/978-3-030-47355-6_8
108 I. E. Inghirami
RQ1: What impact will the adoption of Blockchain technology have on business
intermediaries?
RQ2: Will the Blockchain be universally adopted in the AIS of all companies?
RQ3: What could be the development paths of the AISs taking into account the
Blockchain Technology?
2 Blockchain Definition
The Blockchain can be seen as the distributed, decentralized, transparent and chrono-
logical database of transactions, sometimes also called the Ledger. The data in the
blockchain (e.g. transactions) is divided into blocks. Each block is dependent on the
previous one. The system in which a blockchain serves as the database comprises of
nodes or “workers”. These workers are responsible for appending new blocks to the
blockchain.
A new block can only be appended after all nodes in the system reach a consensus,
i.e. all agree that block is legitimate and contains only valid transactions. How the
validity of transactions is determined and how the nodes compute new blocks, is
regulated by the protocol. Blockchain is shared among all nodes in the system; it is
monitored by every node and at the same time controlled by none. The protocol itself
is responsible to keep the blockchain valid. According to the literature [2] there are
three main categories of Blockchain applications:
Blockchain 1.0: Currency The currency and services associated with money trans-
fers such as payment mechanisms and remittance services. Currently, there are
hundreds of different types of cryptocurrencies with bitcoin remaining the biggest
by market cup. The currencies may have different features such as being tied to a fiat
currency or commodity, but their nature stays the same—they are used for payments
and transfers of digital property.
organizations. A Distributed Ledger overcomes the need for a third party, which can
be a significant benefit when there is no clear trusted central organization, or if the
costs of intermediation are high [1].
Main applications of Distributed Ledger Technology so far have been in financial
services, namely Bitcoin and all other cryptocurrencies. With Blockchain, we can
imagine a world in which contracts are embedded in digital code and stored in
transparent, shared databases, where they are protected from deletion, tampering and
revision- In this world every agreement, every process, every task and every payment
would have a digital record and signature that could be identified, validated, stored
and shared. Intermediaries like lawyers, brokers and bankers might no longer be
necessary [5].
To date, however, it has not made a significant impact on the core operations
of the banking and payments systems, although many banks, including the Federal
Reserve, the Bank of England and the Bank of Canada with its Jasper Project, are
carefully assessing the possible implications of this technology [6, 7]. Moreover,
many financial institutions are experimenting with broader uses like supply chain
tracking and digital identity management [1].
Although the Internet is a great tool to aid every sphere of the modern digital life,
it is still highly flawed in terms of the lack of security and privacy, especially when
it comes to FinTech and E-commerce [8]. Blockchain, the technology behind cryp-
tocurrency, brought forth a new revolution by providing a mechanism for Peer-to-Peer
transactions without the need for any intermediary body such as the existing commer-
cial banks. Blockchain validates all the transactions and preserves a permanent record
of them while making sure that any identification related information of the user is
kept incognito. Thus, all the personal information of the users are sequestered while
substantiating all the transactions. This is achieved by reconciling mass collabora-
tion by cumulating all the transactions in a computer code based digital ledger. By
applying Blockchain or similar cryptocurrency techniques, the users neither need
to trust each other nor do they need an intermediator; rather the trust is manifested
within the decentralized network system itself.
Bitcoin is just an exemplary use of the Blockchain. Blockchain is consid-
ered to be a novel revolution in the domain of computing enabling limitless
applications such as storing and verifying legal documents including deeds and
various certificates, healthcare data, IoT, Cloud and so forth. Tapscott indicated
Blockchain to be the “World Wide Ledger”, enabling many new applications beyond
verifying transactions such as in: smart deeds, decentralized and/or autonomous
organizations/government services etc [9].
Researchers propose these fields of application [10]:
Accounting Information Systems: The Scope … 111
• Capital markets. When trading on the capital market, there exists a set of proce-
dural steps that enable the trading of assets in a legally conforming fashion, as
well as several custodian services revolving around facilitating the trade. A broad
definition of these steps can be termed as such: (1) Create a representation of an
asset, such as a currency, bonds, stocks, gold, etc.; (2) Enable a trade to take place
between two or more stakeholders; (3) Balances must be recorded and kept; (4)
The eventual liquidation of an investor’s position.
As we have seen, the applications of Blockchain have evolved since its first implemen-
tation in 2008. It is possible to find a vast literature on Blockchain, on its applications,
on its strengths and weaknesses. In recent times some scholars have proposed the
adoption of Blockchain in Accounting Systems.
However, to gain the trust of outsiders, independent public auditors also verify
the company’s financial information. Each audit is a costly exercise, binding the
company’s accountants for long times [15].
Blockchain technology may represent the next step for accounting: instead of keeping
separate records based on transaction receipts, companies can write their transactions
directly into a joint register, creating an interlocking system of enduring accounting
records [16]. Since all entries are distributed and cryptographically sealed, falsifying
or destroying them to conceal activity is practically impossible.
To explain the notion of Blockchain-based accounting some researchers use the
term Triple-Entry Accounting which is described as an enhancement to conventional
double entry accounting where the accounting entries of the involved parties are
cryptographically sealed by a third entity (the Blockchain) [16–18].
Since the Blockchain is immutable to any data amendment it is impossible
to falsify or delete the written accounting entries. Notably, the notion of triple-
entry accounting was first time described in 2005 by Ian Grigg three years before
Blockchain was invented [17]. Ian Grigg described the possibility of using crypto-
graphically protected digital receipt to verify transactions occurred between different
counterparts and stored by a third party and showing if any details in the records were
changed or deleted. With the advent of Blockchain that processes can become auto-
mated, cheap and even more reliable as the need for a third party holding the receipts
in a centralized manner is superseded by a decentralized ledger.
Lazanis was first to coherently describe the possibility of Blockchain Accounting
by conventional companies. He emphasizes that blockchain eliminates the need for
trust in any intermediary such as bank or insurance company if a company voluntarily
publishes its transactions on Blockchain [19].
The companies would benefit in many ways: standardization would allow auditors
to verify a large portion of the most important data behind the financial statements
automatically. The cost and time necessary to conduct an audit would decline consid-
erably. Auditors could spend freed up time on areas they can add more value, e.g. on
very complex transactions or on internal control mechanisms.
It is not necessary to start with a joint register for all accounting-entries. The
Blockchain as a source of trust can also be extremely helpful in today’s accounting
structures. It can be gradually integrated with typical accounting procedures: starting
from securing the integrity of records, to completely traceable audit trails. At the
end of the road, fully automated audits may be reality [15]. Since companies are
implementing Blockchain into their Enterprise Resource Planning (ERP) systems,
particularly for tasks such as procurement and supplier management, the accountant’s
and the auditor’s role has just evolved [4].
Blockchain’s transparency gives visibility to all transactions for approved users,
and this may decrease auditors’ work with sampling and validating transactions.
114 I. E. Inghirami
However, this allows auditors more time to focus on controls and investigating
anomalies. Meanwhile, opportunities are emerging for CPAs to use Blockchain
technology as they expand their assurance services to areas such as cybersecurity
and sustainability. Blockchain could enable a real-time, verifiable, and transparent
accounting ecosystem. It has the potential to transform current auditing practices,
resulting in a more precise and timely automatic assurance system [20, 21].
the adoption of a Blockchain Accounting, she believes that it alone is not enough to
eliminate accounting fraud [23].
Looking at the current literature regarding the Blockchain, we can observe that there
is considerable confusion, at least from an accounting point of view. Our opinion is
that the approach currently followed is strictly technical and does not take account
of accounting rules.
An Accounting Information System (AIS) is a system that collects, stores and
processes accounting data in order to manage a company. The core of an AIS
is an Enterprise Resource Planning (ERP) system, that is the integrated manage-
ment of main business processes, usually in real-time and mediated by software and
technology.
ERPs implement Financial Accounting which is the field of accounting concerned
with the summary, analysis and reporting of financial transactions related to a
business. Financial Accounting strictly follows local and international rules, such
as Generally Accepted Accounting Principles (GAAP) and International Financial
Reporting Standards (IFRS) and uses the Double Entry paradigm. In other words,
and as said before, Financial Accounting is based on a Double Entry system. We
can therefore state that the transactions managed by ERP systems must implement
the Double Entry rules. Furthermore, they must adhere to local and international
standards that guarantee the correctness of data management.
We will call these transactions Internal Transactions, distinguishing them from
other transactions that involve information exchanges between different companies,
which we will call External Transactions.
Internal Transactions are stored in the Relational Databases of ERP systems
following the logic of the Double Entry. Changing a transaction is impossible or
extremely difficult. On the one hand, the internal consistency checks of the databases
116 I. E. Inghirami
exclude the possibility of removing and modifying a record, on the other it would be
necessary to modify all the related entries of the Double Entry ledgers. The controls
on Internal Transactions are carried out by external and independent Auditors. This
not only guarantees the correctness of the information, but it is also required by
current regulations. Automatic checks, even if they meet the needs, would not be
enough from a legal point of view.
As regards External Transactions, we must distinguish between the current situ-
ation and a future situation in which DLT technologies are adopted. Currently,
External Transactions are carried out using non-formalized channels, such as email
messages, and there are no secure, shared and non-modifiable archives that contain
the transactions themselves.
With the adoption of Blockchain these transactions could be included in a
Distributed Ledger, thus achieving the security and sharing objectives we have seen.
In addition to the physical storage in a formalized ledger, a logical control of the
transactions would also be possible, for example by checking that they comply with
the terms provided in a Smart Contract.
Finally, using Blockchain technology, it would be possible to obtain an automatic
control of the transactions, which is currently not performed. Furthermore, the checks
could not only be automatic, but also be carried out by interested parties that have
access to the ledgers. We have summarized all these observations in Table 1.
Claimed benefits of Blockchain include offering business value and efficiency gains
by, for example, assisting compliance, asset tracking, supply chain management,
and generally displacing intermediaries. The focus is particularly on multi-party
scenarios (across organizations, departments, individuals, etc.), where the ledger
provides a transparent and reliable source of facts across administrative domains
[25].
As such, “Blockchain-as-a-Service” (BaaS) offerings are emerging to make
Blockchain more accessible to businesses, by reducing the overheads of adoption.
BaaS entails a service provider offering and managing various components of a
Accounting Information Systems: The Scope … 117
of view of companies. As an example, what are the actual costs of implementing DLT
systems? What are the real—not theoretical—advantages for the company deriving
from the adoption of such systems?
As often happens in the field of IT, after an initial emphasis on the theoretical
advantages of an innovation that feed great expectations, we are heading towards a
phase of disappointment of these expectations [27].
In the current literature, some fundamental aspects are excluded or are not
adequately investigated. As an example, we may argue that adoption of DLT-based
systems only makes sense if:
(1) all or most of the members of the Value Chain adopt these systems;
(2) the costs of new disintermediation services are lower than the costs of current
service providers;
(3) it is possible to adopt cryptocurrencies in order to take full advantage of the
benefits offered by the Internet of Values.
Future research should investigate these aspects.
Point 1: it is very likely that to create an effective and efficient network it is
necessary that most part of companies should be connected to a Blockchain.
What happens if only some companies of a Value Chain adhere to a Blockchain?
Point 2: Blockchain technology is convenient if the cost of intermediaries is
high. However, some intermediaries may not be necessary: this is the case, as
an example, of Small and Medium Enterprises (SME). SMEs are not obliged to
have auditing procedures, so the benefits of such complex accounting are lost.
Point 3: at present it is not clear if widespread use of cryptocurrencies is really
possible, or if in the future it will be possible for everyone to use them. In response
to this challenge, current financial systems could lower their costs, thus making
the use of cryptocurrencies unattractive.
Finally, we would like to propose a crucial consideration: how will national and
international legislation evolve? Most of the aspects exposed up to now have no
specific reference legislation. Users of cryptocurrencies and smart contracts are abso-
lutely not legally protected. This is currently the major obstacle to the spread of
Blockchain technology.
5 Conclusions
Internet has changed: from the Internet of Information it has become Internet of
Values. Blockchain is certainly one of the technologies that led to this transformation.
In conclusion, we can answer the Research Questions that we had placed in the
introduction:
RQ1: What impact will the adoption of Blockchain technology have on business
intermediaries?
Accounting Information Systems: The Scope … 119
Disintermediation is the core feature that drives the benefits associated with
Distributed Ledgers. Traditionally, systems that have centralized ledgers have
required the participation of a trusted third party to maintain a record of transac-
tions between organizations. A Distributed Ledger overcomes the need for a third
party, which can be a significant benefit when there is no clear trusted central
organization, or if the costs of intermediation are high. Intermediaries such as
banks, insurance companies and auditors will have to redefine their relationships
with companies.
RQ2: Will the Blockchain be universally adopted in the AIS of all companies?
The adoption of DLT-based systems only makes sense if: (1) all or most of the
members of the Value Chain adopt these systems; (2) the costs of new disinter-
mediation services are lower than the costs of current service providers; (3) it is
possible to adopt cryptocurrencies in order to take full advantage of the benefits
offered by the Internet of Values. This is not the case, as an example, for Small
and Medium Enterprises (SME).
RQ3: What could be the development paths of the AISs taking into account the
Blockchain Technology?
Adopting DLT in an ERP system makes no sense because the current accounting
logic is more reliable and efficient. For this reason, we consider it unlikely that
new versions of ERP systems Blockchain-based will be created. Conversely, a
company that wishes to implement truly effective and efficient intercompany solu-
tions will use Blockchain technologies using “Blockchain as a System” (BaaS)
platforms.
In conclusion, we can state that the Blockchain technology is extremely interesting
and its adoption has great theoretical advantages. However, we will have to evaluate
the implications and the costs of its use. Moreover, it remains to be seen what the
steps will be for its introduction, especially considering that at present there are no
studies that analyse these processes.
References
9. Tapscott, D., & Tapscott, A. (2016). Blockchain revolution (1st ed.). New York: Portfolio-
Penguin.
10. Frøystad, P. & Holm, J. (2015). Blockchain: Powering the internet of value. http://www.evry.
com.
11. Crosby, M., Pattanayak, P., Verma, S., & Kalyanaraman, V. (2016). Blockchain technology:
Beyond bitcoin. Applied Innovation Review, 2, 6–10.
12. CoinMarketCap 07 (2017). CryptoCurrency market capitalizations. https://coinmarketcap.
com/. Online Accessed June 17, 2018.
13. Pacioli, L. (1494). Particularis de Computis et Scripturis. In Summa de Arithmetica Geometria
Proportioni et Proportionalita, Ff. 197v–210v. Venice, Italy: Paganino de Paganini.
14. Sangster A. (2016). The genesis of double entry bookkeeping. The Accounting Review, 91(1),
299–315.
15. Andersen, N. (2017). Blockchain technology. A game-changer in accounting? http://www.del
oitte.com.
16. Coyne, J. G. & McMickle, P. L. (2017). Can blockchains serve an accounting purpose? Journal
of Emerging Technologies in Accounting, 14(2), 101–111.
17. Grigg, I. (2005). Triple entry accounting. https://doi.org/10.13140/rg.2.2.12032.43524.
18. Mills, D. C., Wang, K., Malone, B., Ravi, A., Marquardt, J. C., Badev, A. I., Brezinski, T.,
Fahy, L., Liao, K., Kargenian, V. & Ellithorpe, M. (2016). Distributed ledger technology in
payments, clearing, and settlement.
19. Lazanis, R. (2015). How technology behind Bitcoin could transform accounting as we know
it. [online] Techvibes. Available at: https://techvibes.com/2015/01/22/how-technology-behind-
bitcoin-could-transform-accounting-as-we-know-it-2015-01-22. Accessed 16 June, 2018.
20. Dai, J., & Vasarhelyi, M. A. (2017). Toward blockchain-based accounting and assurance.
Journal of Information Systems, 31(3), 5–21.
21. Zhang, L., Pei, D. & Vasarhelyi, M. A. (2017) Toward a new business reporting model. Journal
of Emerging Technologies in Accounting September 2017, 14(2), 1–15.
22. Byström, H. (2016). Blockchains, real-time accounting and the future of credit risk modeling.
Department of Economics: Lund University.
23. Rückeshäuser, N. (2017). Do we really want blockchain-based accounting? Decentralized
Consensus as enabler of management override of internal controls, in Leimeister, J. M.; Brenner,
W. (Hrsg.): Proceedings der 13. Internationalen Tagung Wirtschaftsinformatik (WI 2017), St.
Gallen, S. 16–30.
24. Tysiac, K. (2017). Blockchain: An opportunity for accountants? Or a threat?.
25. Singh, J. & Michels, J. D. (2017). Blockchain as a service: Providers and trust. Queen Mary
School of Law Legal Studies Research Paper No. 269/2017.
26. Patrizio, A. (2018). Top 10 blockchain as a service providers. Datamation, March 27.
27. www.gartner.com/SmarterWithGartner.
Understanding Blockchain Adoption
in Italian Firms
1 Introduction
The last years have been characterized by a raise in disruptive information and
communication technologies (ICTs), that are challenging organizations to fully re-
think their operational models [1]. Such emerging dynamics are putting on the table a
number of questions, dealing with aspects of trust between the actors, accountability,
transparency, collaboration, and knowledge sharing [2–5].
One particular technology, which is gaining momentum for its potential but at the
same time poses extreme challenges is the blockchain [6–9]. Blockchain is already
employed in a wide array of contexts [10–13], because virtually all transactions with
blockchain are safer, more transparent, traceable and efficient [6, 7], with favorable
impacts in terms of clients’ trust [14]. The benefits ascribable to the blockchain,
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer 121
Nature Switzerland AG 2020
R. Agrifoglio et al. (eds.), Digital Business Transformation, Lecture Notes in Information
Systems and Organisation 38, https://doi.org/10.1007/978-3-030-47355-6_9
122 A. Caldarelli et al.
Over the last years scholars have increasingly devoted attention to the development
of models able to predict and understand information systems adoption behaviors
[17–19, 43]. The majority of contributions revolves around individuals’ attitudes,
and attempted to adapt the theory of reasoned action (TRA) concepts [44] to this
domain, by fostering the development of the TAM [17].
Before describing the adoption models’ characteristics, it is important to remark
that technology adoption represents the willingness within a group of users to employ
technology for their benefit [45]. Adoption is not only related to the technology itself,
Understanding Blockchain Adoption in Italian Firms 125
but involves multiple levels and factors such as users’ attitude and personality [18],
social influence [46], trust [47] and enabling conditions [48].
From this perspective, the TAM proposed by Davis [17] examines the technology
adoption devoting attention to the users’ perception of its utility and ease of use. This
model has been empirically verified and is largely accepted in literature [19, 49–52].
In addition to the TAM, the Theory of Planned Behavior (TPB) proposed by
Ajzen [53, 54], which extends the TRA, is widely used to model the acceptance. The
constructs included in TRA are behavioral attitudes, subjective norms, intention to
use and actual use, as well as perceived behavioral control. TPB has been increasingly
relied upon to comprehend the adoption dynamics of a variety of new information
technology products and also to predict their levels of usage [55, 56].
However, some limitations of the above-cited models led to further explorations
to encompass additional perspectives in the analysis. Further advancements have led
to the unified theory of acceptance and use of technology (UTAUT) [18, 19], which
ties together eight models from prior literature, that is TAM [17]; theory of reasoned
action (TRA) [43]; motivational model (MM) [57]; theory of planned behavior (TPB)
[54]; combined TAM and TPB (C-TAM-TPB) [58], model of PC utilization (MPCU)
[48]; innovation diffusion theory (IDT) [59]; and social cognitive theory (SCT) [60].
The value of the UTAUT lies in the fact that it allows us to comprehend the
role of performance expectancy, effort expectancy, social influence, and facilitating
conditions as exogenous constructs for predicting the intention and use.
The fully encompassing approach of the UTAUT is particularly suitable to explore
the issues forming the core of this paper on blockchain implementation. More specif-
ically, for the purposes of the current study we refer to the UTAUT proposed by
Venkatesh et al. [18], in order to include additional relevant dimensions such as the
hedonic motivation, price value, and habit. This predictive model has proved its rele-
vance in a number of contexts [61, 62] and is crucial in this paper to understand
the main actors’ motivations for blockchain adoption. In the UTAUT at the basis of
the intention to use a technology there are four constructs: performance expectancy
(expectation about performance or PE); effort expectancy (expectation on the effort
to support or EE); social influence (social influence or SOI); facilitating conditions
(conditions that make it possible to make the adoption of a technology less traumatic
or FC).
Performance expectancy measures the level of expectation of IS actors with
respect to improving the working condition due to the adoption of technology. The
effect of performance expectancy on intention could be mitigated by personal factors
such as age and gender. In our study performance expectancy refers to the degree to
which an employee perceives that using the blockchain will improve their produc-
tivity and performance. On this regard it is worth noting that this new technology
generates high expectations [8] and minimizes process complexity and uncertainty
[63]. Previous contributions signal that the intention of individuals to adopt and to
use a technology depends significantly on performance expectancy [18, 19, 64–66].
Therefore, we hypothesize that:
H1. Performance expectancy positively affects the intention to adopt blockchain.
126 A. Caldarelli et al.
Social influence stands for the level of influence that the opinion of the subjects of
a user’s social circle may have on a particular action. According to the authors, this
construct is mitigated both by personal factors such as gender, age or experience, and
by voluntariness in the use of technology. Social influence for the purposes of the
current paper refers to the extent to which the employee comprehends the relevance
of why others believe they should use the blockchain. The leading idea is that the
opinions of colleagues, friends, family members impact one’s choices [66, 67]. On
this regard, literature has contended that social influence impacts the adoption of
Internet-based banking [67, 68] and mobile government services [66, 69]. Several
contributions have also emphasized that collaboration and the relational dimension
are crucial and influence whether people are prone to adopt blockchain [66–69].
Therefore, we hypothesize that:
H2. Social influence positively affects the intention to adopt blockchain.
4 Research Method
After the validation step, a survey was carried out between participants contacted
by using blockchain thematic groups on social media (i.e. LinkedIn, Facebook).
We considered as “thematic groups” all groups that have in the title the words
“Blockchain” and “Italy”. A total of 19 thematic group with more than 10 thou-
sand people were found. For each group an invitation letter, explaining the aim of
the study, has been sent. We collected a total of 322 observations. We excluded the
responses of people with less than 3 years of experience in accounting or information
systems fields and of those people that were not working for Italian firms. Our final
sample consisted in 267 observations.
128 A. Caldarelli et al.
Table 2 provides few descriptive statistics of the sample. Table 2 provides the
respondents’ profile showing a similar distribution between male (52.06%) and
female (47.94%) respondents. Also, in terms of age most respondents were between
18 and 30 years old (48.31%) and between 30 and 40 (30.34%) while just a little part
of our sample has an age between 40 and 50 or 50+ (respectively 15.73% and 5.62%).
With reference to the education level the 40.44% of respondents held a postgraduate
degree or a master (35.21%), while just a little part of the sample has a Ph.D. (7.12%)
or is not graduated (8.24%). Finally, with reference to the role in firms the great part
of the sample work as accountant or accounting specialist (73.78%), the 24.72%
is employed in information system field while a small part of the sample work in
another field (1.5%).
The data gathered through the survey were analyzed using a Partial Least Square
Structural Equation Modeling (PLS-SEM) approach in line with previous studies
[75, 76]. This method is widely used in ICT literature and, more generally, in social
sciences, because it is suitable for both large and small sample sizes, as well as for
non-normal data.
We assessed the overall goodness-of-fit measure using the Chi-square test. This
test is widely used to assesses the adequacy of a model in terms of its ability to reflect
the variance and covariance of data [77]. Our test shows an overall Chi-square ratio
of 661 with p < 0.001.
Because Chi-square is a test particularly sensitive to the size of the sample, we
decided to test our model with other fit indices following the approach of other
authors [76]. The results or our test are summarized in Table 3.
lack of experience plays a positive role in which people with higher experience have
more difficulties in learning something completely new than less experienced people.
Therefore, H4 and H5 are supported.
Finally, with reference to the personal variables, we found that gender and age do
not have any statistically significant effect (both p- values are higher than 0.05) on
the theoretical construct.
Our results show that social influence (H2) is the most important predictor in
people intention to use blockchain technology. This is consistent with statement of
other authors according whom the process of technology adoption depends strongly
by social factors [67, 68]. Furthermore, consistent with prior literature, our results
show that performance expectancy (H1) is another important predictor of intention
to use [18, 19, 66]. Surprisingly, the experience of subject involved in the survey
plays a negative role on the process of technology acceptance, a possible explanation
of this phenomenon could be that blockchain technology is something completely
new and different from other kind of technologies so people will need new skills in
order to manage it.
6 Concluding Remarks
The current study is rooted in the increasing attention for the disruptive power of the
most recent information and communication technologies (ICTs), that are completely
changing the landscape of organizations and their daily routines, at both a strategic
and an operational level, not to say from the perspective of internal and external
relationships and dynamics of power [1].
Among others, the most prominent questions as to what concerns information
systems implementation refer to the more nuanced face of concepts of trust, account-
ability, transparency, collaboration, and knowledge sharing within companies [3–5],
that have nowadays a breadth and a content that has largely overcome their previ-
ously acknowledged semantic boundaries, and thus are changing in the perception
of organizational actors as well influencing their propensity to change.
It is worth noting that the current paper addresses the on-going debate by devoting
attention to the blockchain, considering its huge potential, its disruptive novelty, and
the numerous interesting and risky challenges that it poses to organizations. We
looked at the blockchain in the awareness that it is already in use in a number
of contexts, due to its undeniable benefits [6, 8–13]. Likewise, in looking at the
current dynamics the necessary premise is that any information systems need to be
implemented in a manner acceptable to those involved to express in full its potential,
otherwise it is played in parallel to the previous routines and represents only a waste
of resources for the company.
An essential element is to understand how individuals behave when it comes to
accepting to use this technology, which is the exact debate that we addressed in
the paper [17–19] since there are still unanswered questions in this domain for the
blockchain [20, 25].
Understanding Blockchain Adoption in Italian Firms 131
Consequently, our aim was to understand what are the factors that push organi-
zational actors to adopt the blockchain, by relying upon the second version unified
theory of acceptance and use of technology developed by Venkatesh et al. (UTAUT)
[18]. To this aim, thanks to a Likert-based questionnaire we gathered data among
information systems practitioners and entrepreneurs on their personal information
and on the UTAUT theoretical constructs. Then, a partial least square structural equa-
tion modeling (PLS-SEM) has been carried out in order to measure the effect of the
theoretical construct on people intention to adopt the blockchain.
Our results show that performance expectancy and social influence are factors that
have a strong positive effect on people intention to adopt blockchain. Surprisingly,
experience has a negative effect on blockchain use intention, unfolding that the
technology under scrutiny has such a disruptive nature that individuals with previous
experience look at it with skepticisms as its use involves a full re-think of all routines
and practices.
These results allow us to contribute to the literature in a twofold manner.
Firstly, they offer new bases for reflection given that on the one hand they confirm
previously detected trends, while on the other they unveil new tendencies that help to
gather a more complete picture of the phenomenon of the blockchain adoption and
its multiple nuances and implications.
Secondly, they are the first empirical insights from Italy, a country with such strong
cultural and contextual conditions influencing the change management dynamics,
that they enlighten the need to tap even more closely into the role played by the
surrounding environment in IS change choices.
Aside, it is also worth noting that trends as to what concerns experience and
its negative impacts represent a very interesting issue that deserves far more atten-
tion. Indeed, they unveil fundamental areas of resistance that need to be seriously
considered, as they need a rather different approach to the introduction of the tool
in the company. Far more, it is important to notice that the real comprehension of
such dynamics need to overcome the current quantitative approaches, towards the
recourse to case studies and participant observation to better comprehend the whole
processes.
Finally, before concluding, it is advisable to signal that these findings can be
of some aid also to practitioners and policy makers, as they unveil areas that are
fundamental to take care of over the changing phase, as well as possible triggers of
conflict and rejection that need to be prevented. Not to say that the findings also allow
us to start to reflect on possible institutional interventions and regulatory efforts by
policy-makers to sustain and ease blockchain adoption phenomena.
References
1. Büyüközkan, G., & Göçer, F. (2018). Digital supply chain: literature review and a proposed
framework for future research. Computers in Industry, 97, 157–177.
132 A. Caldarelli et al.
2. Morgan, T. R., Richey, R. G., Jr., & Ellinger, A. E. (2018). Supplier transparency: Scale
development and validation. The International Journal of Logistics Management, 29(3),
959–984.
3. Tsanos, C. S., & Zografos, K. G. (2016). The effects of behavioural supply chain relationship
antecedents on integration and performance. Supply Chain Management: An International
Journal, 21(6), 678–693.
4. Wagner, S. M., & Buko, C. (2005). An empirical investigation of knowledge-sharing in
networks. Journal of Supply Chain Management, 41(4), 17–31.
5. Stolze, H. J., Murfield, M. L., & Esper, T. L. (2015). The role of social mechanisms in demand
and supply integration: An individual network perspective. Journal of Business Logistics, 36(1),
49–68.
6. Aste, T., Tasca, P., & Di Matteo, T. (2017). Blockchain technologies: The foreseeable impact
on society and Industry. Computer, 50(9), 18–28.
7. Kshetri, N. (2017). Can blockchain strengthen the internet of things? IT Professional, 19(4),
68–72.
8. Kshetri, N. (2018). Blockchain’s roles in meeting key supply chain management objectives.
International Journal of Information Management, 39, 80–89.
9. Viriyasitavat, W., Da Xu, L., Bi, Z., & Sapsomboon, A. (2018). Blockchain-based business
process management (BPM) framework for service composition in industry 4.0. Journal of
Intelligent Manufacturing, 1–12.
10. Li, Z., Kang, J., Yu, R., Ye, D., Deng, Q., & Zhang, Y. (2018). Consortium blockchain for secure
energy trading in industrial internet of things. IEEE Transactions on Industrial Informatics,
14(8), 3690–3700.
11. Veuger, J. (2018). Trust in a viable real estate economy with disruption and blockchain.
Facilities, 36(1/2), 103–120.
12. Benchoufi, M., Porcher, R., & Ravaud, P. (2017). Blockchain protocols in clinical trials:
Transparency and traceability of consent. F1000Research, 6.
13. Chen, Y. (2018). Blockchain tokens and the potential democratization of entrepreneurship and
innovation. Business Horizons, 61(4), 567–575.
14. Biswas, K., Muthukkumarasamy, V., & Tan, W. L. (2017, December). Blockchain based wine
supply chain traceability system. In Future Technologies Conference.
15. Zou, J., Ye, B., Qu, L., Wang, Y., Orgun, M. A., & Li, L. (2018). A proof-of-trust consensus
protocol for enhancing accountability in crowdsourcing services. IEEE Transactions on
Services Computing.
16. Lu, Q., & Xu, X. (2017). Adaptable blockchain-based systems: A case study for product
traceability. IEEE Software, 34(6), 21–27.
17. Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of
information technology. MIS Quarterly, 319–340.
18. Venkatesh, V., Thong, J. Y., & Xu, X. (2012). Consumer acceptance and use of information
technology: extending the unified theory of acceptance and use of technology. MIS Quarterly,
36(1), 157–178.
19. Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of
information technology: Toward a unified view. MIS Quarterly, 425–478.
20. Fosso Wamba, S., Kamdjoug, K., Robert, J., Bawack, R., & G Keogh, J. (2018). Bitcoin,
Blockchain, and FinTech: A systematic review and case studies in the supply chain. Production
Planning and Control, Forthcoming.
21. Liébana-Cabanillas, F., Marinković, V., & Kalinić, Z. (2017). A SEM-neural network approach
for predicting antecedents of m-commerce acceptance. International Journal of Information
Management, 37(2), 14–24.
22. Lin, F., Fofanah, S. S., & Liang, D. (2011). Assessing citizen adoption of e-Government initia-
tives in Gambia: A validation of the technology acceptance model in information systems
success. Government Information Quarterly, 28(2), 271–279.
23. Mamonov, S., & Benbunan-Fich, R. (2017). Exploring factors affecting social e-commerce
service adoption: The case of Facebook Gifts. International Journal of Information Manage-
ment, 37(6), 590–600.
Understanding Blockchain Adoption in Italian Firms 133
24. Wu, K., Zhao, Y., Zhu, Q., Tan, X., & Zheng, H. (2011). A meta-analysis of the impact of trust
on technology acceptance model: Investigation of moderating influence of subject and context
type. International Journal of Information Management, 31(6), 572–581.
25. Kamble, S., Gunasekaran, A., & Arha, H. (2019). Understanding the Blockchain technology
adoption in supply chains-Indian context. International Journal of Production Research, 57(7),
2009–2033.
26. Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system.
27. Mattila, J. (2016). The blockchain phenomenon–the disruptive potential of distributed
consensus architectures (No. 38). The Research Institute of the Finnish Economy.
28. Pilkington, M. (2016). 11 Blockchain technology: Principles and applications. In Research
handbook on digital transformations (p. 225).
29. Deloitte (2019), Deloitte’s Global blockchain survey, available online at: https://www2.del
oitte.com/content/dam/insights/us/articles/2019-global-blockchain-survey/DI_2019-global-
blockchain-survey.pdf.
30. Swan, M. (2015). Blockchain: Blueprint for a new economy. O’Reilly Media, Inc.
31. Crosby, M., Pattanayak, P., Verma, S., & Kalyanaraman, V. (2016). Blockchain technology:
Beyond bitcoin. Applied Innovation, 2(6–10), 71.
32. Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open
challenges. Future Generation Computer Systems, 82, 395–411.
33. Herbert, J., & Litchfield, A. (2015, January). A novel method for decentralised peer-to-peer
software license validation using cryptocurrency blockchain technology. In Proceedings of the
38th Australasian Computer Science Conference (ACSC 2015) (Vol. 27, p. 30).
34. Huckle, S., & White, M. (2016). Socialism and the Blockchain. Future Internet, 8(4), 49.
35. Mougayar, W. (2016). The business blockchain: Promise, practice, and application of the next
internet technology. London: John Wiley & Sons.
36. Fanning, K., & Centers, D. P. (2016). Blockchain and its coming impact on financial services.
Journal of Corporate Accounting and Finance, 27(5), 53–57.
37. Lamberti, F., Gatteschi, V., Demartini, C., Pranteda, C., & Santamaria, V. (2017). Blockchain
or not blockchain, that is the question of the insurance and other sectors. IT Professional.
38. Cai, Y., & Zhu, D. (2016). Fraud detections for online businesses: A perspective from blockchain
technology. Financial Innovation, 2(1), 20.
39. Clauson, K. A., Breeden, E. A., Davidson, C., & Mackey, T. K. (2018). Leveraging blockchain
technology to enhance supply chain management in healthcare. Blockchain in Healthcare
Today.
40. Catalini, C., & Gans, J. S. (2016). Some simple economics of the blockchain (No. w22952).
National Bureau of Economic Research.
41. Davidson, S., De Filippi, P., & Potts, J. (2016). Economics of blockchain. Available at SSRN
2744751.
42. Peters, G. W., & Panayi, E. (2016). Understanding modern banking ledgers through blockchain
technologies: Future of transaction processing and smart contracts on the internet of money.
In Banking beyond banks and money (pp. 239–278). Cham: Springer.
43. Al-Sayyed, F., & Abdalhaq, B. (2016). Interventional factors affecting instructors adoption of
E-learning system: A case study of palestine. Journal of Theoretical and Applied Information
Technology, 83(1).
44. Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and predicting social behaviour.
45. Samaradiwakara, G. D. M. N., & Gunawardena, C. G. (2014). Comparison of existing tech-
nology acceptance theories and models to suggest a well improved theory/model. International
technical sciences journal, 1(1), 21–36.
46. Fishbein, M., & Ajzen, I. (1975). Belief, attitude, and behavior: An introduction to theory and
research. Reading, Mass: Addison Wessley.
47. Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: an
integrated model. MIS Quarterly, 27(1), 51–90.
48. Thompson, R. L., Higgins, C. A., & Howell, J. M. (1991). Personal computing: toward a
conceptual model of utilization. MIS Quarterly, 125–143.
134 A. Caldarelli et al.
49. Szajna, B. (1996). Empirical evaluation of the revised technology acceptance model. Manage-
ment Science, 42(1), 85–92.
50. Larasati, N., & Santosa, P. I. (2017). Technology readiness and technology acceptance model
in new technology implementation process in low technology SMEs. International journal of
innovation, Management and Technology, 8(2), 113.
51. Verma, P., & Sinha, N. (2018). Integrating perceived economic wellbeing to technology
acceptance model: The case of mobile based agricultural extension service. Technological
Forecasting and Social Change, 126, 207–216.
52. Davis, F. D. (1993). User acceptance of information technology: system characteristics, user
perceptions and behavioral impacts. International Journal of Man-Machine Studies, 38(3),
475–487.
53. Ajzen, I. (1985). From intentions to actions: A theory of planned behavior. In Action control
(pp. 11–39). Berlin, Heidelberg: Springer.
54. Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human
Decision Processes, 50(2), 179–211.
55. Pattansheti, M., Kamble, S. S., Dhume, S. M., & Raut, R. D. (2016). Development, measurement
and validation of an integrated technology readiness acceptance and planned behaviour model
for Indian mobile banking industry. International Journal of Business Information Systems,
22(3), 316–342.
56. Issa, I., & Hamm, U. (2017). Adoption of organic farming as an opportunity for Syrian farmers
of fresh fruit and vegetables: An application of the theory of planned behaviour and structural
equation modelling. Sustainability, 9(11), 2024.
57. Bagozzi, R. P., Davis, F. D., & Warshaw, P. R. (1992). Development and test of a theory of
technological learning and usage. Human Relations, 45(7), 659–686.
58. Taylor, S., & Todd, P. A. (1995). Understanding information technology usage: A test of
competing models. Information Systems Research, 6(2), 144–176.
59. Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions
of adopting an information technology innovation. Information Systems Research, 2(3), 192–
222.
60. Compeau, D. R., & Higgins, C. A. (1995). Computer self-efficacy: Development of a measure
and initial test. MIS Quarterly, 189–211.
61. Hew, J. J., Lee, V. H., Ooi, K. B., & Wei, J. (2015). What catalyses mobile apps usage intention:
an empirical analysis. Industrial Management & Data Systems, 115(7), 1269–1291.
62. Makanyeza, C., & Mutambayashata, S. (2018). Consumers’ acceptance and use of plastic
money in Harare, Zimbabwe: Application of the unified theory of acceptance and use of
technology 2. International Journal of Bank Marketing, 36(2), 379–392.
63. Kim, H. M., & Laskowski, M. (2018). Toward an ontology-driven blockchain design for supply-
chain provenance. Intelligent Systems in Accounting, Finance and Management, 25(1), 18–27.
64. Alalwan, A. A., Dwivedi, Y. K., & Rana, N. P. (2017). Factors influencing adoption of mobile
banking by Jordanian bank customers: Extending UTAUT with trust. International Journal of
Information Management, 37(3), 99–110.
65. Riffai, M. M. M. A., Grant, K., & Edgar, D. (2012). Big TAM in Oman: Exploring the promise of
on-line banking, its adoption by customers and the challenges of banking in Oman. International
Journal of Information Management, 32(3), 239–250.
66. Weerakkody, V., El-Haddadeh, R., Al-Sobhi, F., Shareef, M. A., & Dwivedi, Y. K. (2013).
Examining the influence of intermediaries in facilitating e-government adoption: An empirical
investigation. International Journal of Information Management, 33(5), 716–725.
67. Wang, X., White, L., Chen, X., Gao, Y., Li, H., & Luo, Y. (2015). An empirical study of
wearable technology acceptance in healthcare. Industrial Management and Data Systems.
68. Zhang, Y., Deng, R. H., Liu, X., & Zheng, D. (2018). Blockchain based efficient and robust fair
payment for outsourcing services in cloud computing. Information Sciences, 462, 262–277.
69. Ahmad, F., Ahmad, Z., Kerrache, C. A., Kurugollu, F., Adnane, A., & Barka, E. (2019).
Blockchain in Internet-of-Things: Architecture, applications and research directions. In 2019
International Conference on Computer and Information Sciences (ICCIS) (pp. 1–6). IEEE.
Understanding Blockchain Adoption in Italian Firms 135
70. Huang, M., Wang, Q., Zhang, M., & Zhu, Q. (2014). Prediction of color and moisture content
for vegetable soybean during drying using hyperspectral imaging technology. Journal of Food
Engineering, 128, 24–30.
71. Oliveira, T., Thomas, M., Baptista, G., & Campos, F. (2016). Mobile payment: Understanding
the determinants of customer adoption and intention to recommend the technology. Computers
in Human Behavior, 61, 404–414.
72. Sabi, H. M., Uzoka, F. M. E., Langmia, K., & Njeh, F. N. (2016). Conceptualizing a model for
adoption of cloud computing in education. International Journal of Information Management,
36(2), 183–191.
73. Lai, P. C. (2017). The literature review of technology adoption models and theories for the
novelty technology. JISTEM-Journal of Information Systems and Technology Management,
14(1), 21–38.
74. Caldarelli, A., Ferri, L., Maffei, M., & Spanò, R. (2019). Accountants are from Mars, ICT prac-
titioners are from venus. Predicting technology acceptance between two groups. In Organizing
for digital innovation (pp. 27–38). Cham: Springer.
75. Caldarelli, A., Ferri, L., & Maffei, M. (2017). Expected benefits and perceived risks of
cloud computing: an investigation within an Italian setting. Technology Analysis and Strategic
Management, 29(2), 167–180.
76. Queiroz, M. M., & Wamba, S. F. (2019). Blockchain adoption challenges in supply chain:
An empirical investigation of the main drivers in India and the USA. International Journal of
Information Management, 46, 70–82.
77. Gangwar, H., Date, H., & Ramaswamy, R. (2015). Understanding determinants of cloud
computing adoption using an integrated TAM-TOE model. Journal of Enterprise Information
Management, 28(1), 107–130.
Improving Invoice Allocation
in Accounting—An Account
Recommender Case Study Applying
Machine Learning
Abstract Covering transactions between buyers and sellers, invoices are essential.
However, not all invoices can be directly matched to a purchase order due to missing
order numbers, differences in terms of the invoice amount, quantity and/or quality.
Following design science research (DSR) in information systems (IS), the objective of
this article is to propose a new kind of an account recommender by applying machine
learning. We take a chemical company as our case study and build a prototype
that today handles more than 500,000 invoices without purchase order per year
more accurately and efficiently than manual work did before. Finally, we propose
five design guidelines to drive future research as follows: (1) Truly understand the
business need; (2) More data can only get you so far; (3) Give the machine a good
starting position; (4) Computing power is crucial; (5) Do not burn your bridges yet
(manual intervention).
1 Introduction
For business transactions between buyers and sellers (even for intercompany sales),
invoices are essential [1]. Especially when companies are integrated in larger value
chains, the yearly number of invoices reaches millions.
However, not all invoices can be directly matched to a purchase order due to
missing order numbers or differences in terms of the invoice amount, quantity and/or
quality. For invoices without a purchase order, finding the account in the enterprise
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer 137
Nature Switzerland AG 2020
R. Agrifoglio et al. (eds.), Digital Business Transformation, Lecture Notes in Information
Systems and Organisation 38, https://doi.org/10.1007/978-3-030-47355-6_10
138 M. Esswein et al.
1 In terms of job enrichment, accountants may be thankful when they are relived from this task
to gain more time for creative work such as commenting on the reasons for identified differences
between purchase orders and corresponding invoices.
2 In addition to the four types of DSR artifacts identified by March and Smith [10] and Hevner
et al. [11]—constructs, models, methods, and instantiations—design guidelines are statements that
prescribe what and how to build an artifact in order to achieve a predefined design goal. Thus,
design guidelines contribute to theories that specify how IS artifacts should be designed based on
kernel theories [12].
Improving Invoice Allocation in Accounting … 139
(method). We present functional requirements, the redesign of the P2P process, and
the account recommender machine itself (artefact description). Emphasizing iter-
ative “build” and “evaluate” activities [17], we then evaluate the prototype within
our reference company and two other companies from different industries. Lessons
learned are captured in design guidelines. Comparing these guidelines with prior
work and examining how they relate back to this article’s objective, we end with
a summary, limitations of our work, and avenues for future research (discussion and
conclusion).
2 Literature Review
Following Webster and Watson [18], we started our four-step literature review with
a (1) journal search. And, in doing so, we focused on leading IS3 journals comple-
mented by both proceedings from major IS conferences4 and leading accounting
journals.5 For our (2) database search assessing the outlets we used ScienceDirect,
EBSCOhost, JSTOR, and Google Scholar. Applying an iterative search process by
updating our (3) search string whenever we identified new relevant6 aspects in the
reviewed outlets, we started with the keywords “finance” and “automation” (Fig. 1)
and, in doing so, we focused on titles, abstracts, and keywords.
Due to the large number of hits in the thousands, we specified our search string
with “financial accounting” and “finance transformation” as well “cognitive-based
automation” and “recommender system.” Furthermore, we included MIS Quarterly
Executive, Harvard Business Review, and other “grey” literature to trace a first finding
that the topic on hand is reflected in practitioners´ journals. We came up with 31
relevant hits.
Referring to more details such as different methods of ML, in a fourth and final
step, we conducted a (4) backward and forward search [20]. In our backward search
we reviewed (older) references cited in the articles we already identified, whereas
3 Based on the senior scholars’ basket of leading IS journals (2019): European Journal of Information
Systems (EJIS); Information Systems Research (ISR); Information Systems Journal (ISJ); Journal of
the Association for Information Systems (JAIS); Journal of Information Technology (JIT); Journal
of Management Information Systems (JMIS); Journal of Strategic Information Systems (JSIS); MIS
Quarterly.
4 We followed the Association for Information Systems: Americas Conference on IS (AMCIS);
Cognitive-based Machine
Purchase-to-pay Finance Automation
Automation learning
Order-to-cash, record-to-report,
NLP, OCR Classification
enterprise performance management
Fig. 1 Iteration of our initial search term “finance” and “automation” following the citation pearl
growing approach [21]
our forward search covered additional sources citing the articles already identified
to locate follow-up studies or newer developments on our topic of research. This led
to another 17 hits. Hence, we ended up with a total of 48 relevant articles (Fig. 2).
For our gap analysis, we structured these 43 outlets along four categories (Fig. 2):
(1) Within the examined business domains we focused on financial accounting, infor-
mation technology (IT), and complementing articles without a domain specification
(“generic”) [22]. (2) Regarding automation, we differentiate between rule-based and
cognitive-based references. Within the latter, we focused on supervised, unsuper-
vised, and reinforcement learning algorithms. (3) Focusing on the research approach,
we distinguish empirical research, namely case studies, experiments, surveys, and
interviews from conceptual research extending existing artifacts by logical reasoning.
Regarding (4) the type of contribution, we differentiate constructs, models, methods,
instantiations as well as design guidelines [10].
To analyze the number of co-occurrences of each pair, we computed dyads between
the components of our framework [19]. For example, the number of articles covering
financial accounting and cognitive-based automation is four (Fig. 2).
(1) Business domain: Our literature review shows a large number of 33 generic
publications. However, some generic articles address problems related to finan-
cial and management accounting. For example, in their guide for ML applica-
tions, Witten et al. [2] present use cases like deciding whether to give a loan
to a customer or not. Among the seven articles covering financial accounting,
Wilson and Sangster [23] highlight the importance of rule-based automation
for the finance function due to their large volumes of numerical data to be
processed. Van den Bogaerd and Aerts [24] look at the applicability of different
computer-aided content analysis techniques. Codreanu et al. [25] provide a first
Improving Invoice Allocation in Accounting … 141
industries and application areas [28]. De Prado [29] covers ML for financial
analysis, but only from an external perspective. There is only one case study for
financial accounting. In line with our research objective, Veit et al. [30] demon-
strate the application of ML to finance processes with their process mining
tool. Overall, empirical research is clearly underrepresented in comparison to
conceptual work (14 vs. 34).
Summarizing the findings from our first two clusters of research, we constitute
a lack of research addressing concrete ML use cases in the (financial) accounting
domain.
(3) Type of automation: There are a five rule-based automation case studies. For
instance, Schmitz et al. [31] researched RPA at a large telecommunications oper-
ator, where more than a million transactions per month were automated in the
course of one year. Aguirre and Rodriguez [32] cover RPA in the order-to-cash
(O2C) process. With respect to cognitive-based automation, the foundations for
ML and pattern recognition were laid out in Theodoridis and Koutroumbas [33]
or Bishop [34]. In the late 1980s ML was established as an experimental science
[35]. Caruana and Niculescu-Mizil [36] present a comparison of supervised
learning algorithms like decision trees, support vector machines, neural nets,
and k-nearest neighbors. They follow up their analysis with a comprehensive
testing on different data sets, but none of them is accounting-related.
Among ML algorithms, nearest neighbor classification [37] is one of the most
widely applied methods [38]. Knowledge discovery in databases was a well-regarded
step ahead setting a framework for future work with the steps selection, prepro-
cessing, transformation, data mining, and interpretation [39]. Efficiently splitting the
available data into different sets for training algorithms and testing their performance
against known data has also been subject to research in the 1980s [40]. In their study
of ML in DSS, Merkert et al. [28] show that 30% use artificial neural networks while
less than 5% use pattern recognition. More in line with our objective, Califf and
Mooney [3] proposed a system for information extraction from documents to fill
templates. However, their system was not integrated into a corporate environment
and does not address information transformation, data mining, and interpretation.
(4) Type of contribution: Finally, we examined that constructs and methods exist
for all types of automation. However, there is a lack of models, instantiations, and
design guidelines. With respect to the latter, we did not find articles deriving
design guidelines for financial accounting. Design guidelines for cognitive-
based automation were given by five articles, among them Garcia et al. [38]
with a taxonomy for nearest neighbor classification.
Summarizing our findings, we revealed a lack in addressing the potential of
cognitive-based automation in (financial) accounting. To address this lack, we
propose a new kind of an account recommender by applying ML. We take a leading
chemical company as our case study and focus on two things: (1) examining predic-
tion accuracy and process efficiency when handling invoices without a purchase order
and (2) deriving first design guidelines to implement ML in the accounting domain.
Improving Invoice Allocation in Accounting … 143
3 Method
Following Dul and Hak [41] case studies allow researchers to study artifacts in
natural settings [42] and observe the situation in which activities take place. Case
studies enable researchers to learn from practice (build on people’s experiences and
practices), understand the complexity of the process, and leverage the possibility of
iteratively testing results in a real world environment. The results are analyzed in a
qualitative manner [41]. In comparison to broader surveys, case studies provide in-
depth information (esp., internal company data), and recognize the complexity and
embeddedness of activities [43]. In the IS and accounting disciplines, case studies are
a generally accepted research approach and have been employed for decades They
are a proven way to research and contribute to theory building especially where only
few studies exist [42].
We opted for a single case study and took a leading chemical company with
revenues of more than 50bn USD and over 50,000 employees as our reference. Its
financial processes are standardized worldwide and continuously optimized. Global
Finance Transformation (GFT) has the central governance and harmonizes all finan-
cial processes running on a single SAP system. With the help of a network of process
experts around the world, GFT is constantly seeking new (digital) technologies whilst
promoting new solutions for process improvements. This way, we had the opportu-
nity to assess multiple sources from different entities and experts. In doing so, the
findings from the literature review gave us direction to ask the “right” question for
both setting up a prototype and answering our research questions.
Following the tenets of requirements engineering [44], we differentiate between
functional and non-functional requirements [45]. Focusing on the functional require-
ments, we examined internal documentations and archival records about invoice
processing in the P2P process, conducted four semi-structured expert interviews7 in
the reference company, and analyzed key statements from these interviews along the
guidelines of qualitative content analysis [46, 47]. Finally, we derived requirements
for a prototype (Sect. 4) and set it up by applying an ML algorithm (Sect. 3.2).
The P2P process within our reference company starts with managing a requisition
and comprises five steps from submitting a purchase order to invoice settling –
predominantly administrative tasks as illustrated in Fig. 3 [48, 49]. While many
rule-based tasks are already automated, the invoice processing still requires a lot of
human input. The company receives around 4.8 million supplier invoices per year,
out of which over 600,000 (13%) are related to a purchase order. This means a
bundle of materials and services (even expense sheets from team lunches and client
dinners) were requested without a purchase requisition and, thus, no purchase order
is available (“FI postings w/o a purchase order”). After approving the order number,
7 Interviewees were the head of the P2P process, a senior expert of R2R process, the head of the
order-to-cash (O2C) process and a senior expert for accounts payable.
144 M. Esswein et al.
AdministraƟon
RequisiƟon
invoice amount and/or quantity, finally, goods received, and the supplier of the invoice
without purchase order, the invoice is posted to a manually determined general ledger
(GL) account.
GFT set up a project team to develop a ML prototype that suggests a general
ledger-account within the SAP ERP matching the content of the invoice (account
recommender) according to a predefined rule. This should lead to both increasing
prediction accuracy and a more efficient P2P process by reducing the manual
workload.
80%
70%
60%
50%
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Number of neighbors
Improving Invoice Allocation in Accounting … 145
4 Artefact Description
Based on these requirements (Sect. 4.1), a data set was put together using historical
invoice data of more than two million records in the period from 2010 to 2018. Each
invoice includes over 200 fields. One of the most important steps in the preparation
of data is the selection of relevant features. The reduction in the number of variables
(the rejection of attributes that are weakly correlated with the target variable) not
only increases the accuracy of the prediction, but also lowers the requirements for
the computing resources. The most relevant variables for our use case were chosen
after getting acquainted with the process of invoice processing. Criteria for selection
included accounts payable employee experience, data availability in enough records,
the information gain ranking for all attributes, and insights from the first iterations.
146 M. Esswein et al.
4.3 Results
The processing of invoices (step 4, Fig. 4) always starts with data extraction and
validation (Fig. 5). If all data are available, the standard approval process is trig-
gered. Otherwise, the type of data that is missing needs to be identified. In case of
a missing GL account, the account recommender performs the necessary actions of
(1) preparing the data, (2) computing a k-NN estimate, and (3) returning the GL
account. Note that if the confidence level for a single GL account is too low, the
account recommender returns three candidates from which the user has to select
one account. For missing data other than the GL account, manual handling is still
necessary. However, missing approvers have already been identified as an extension
(Sect. 5).
Improving Invoice Allocation in Accounting … 147
Start
ACCOUNT RECOMMENDER
Extract
invoice data Compute Return
Prepare data
k-NN es mate GL account
GL account Transform for Apply trained Or propose 3 op ons
Validate data efficient processing feature weights if confidence levels
on ML pla orm are too low
One key tuning parameter of our prototype is coverage, which means the ratio
of invoices that are handled automatically by the prototype versus those for which
three candidates are proposed. We tested the performance for three scenarios, 50,
75, and 100% coverage. Figure 6 clearly shows that it is impossible to have high
prediction accuracy and high coverage at the same time. While the accuracy for 50%
coverage is around 87%, it is only 59% for 100% coverage. In our trade-off scenario,
the prediction accuracy is 72%.
Currently, the manual process requires at least five full time employees and can
take up to one day of time. In contrast, for the three steps indicated in Fig. 6, the
account recommender only needs a few seconds. However, training the model and
retraining it with delta loads every week consumes more time than single predictions
and is resource intensive. On a standard laptop, the process of initial model fitting
and estimating the test set takes around 24 h, which is a strong argument for cloud
computing.
Based on these results, we propose five design guidelines that sum up the lessons
learned during the design and development of prototype as follows:
The first guideline addresses the fact that with a sensitive topic like thinking about
replacing human labor with machines, the solution has to be all the better. More in
detail, turning affected and most often reluctant accountants into engaged innovators
60%
40%
20%
0%
HIGH ACCURACY TRADE-OFF HIGH COVERAGE
148 M. Esswein et al.
is a good facilitator for a successful digital transformation.8 However, this can only
be achieved if the prototype developer has a good business understanding and even
a good relationship to the accountants and owners of the process to-be automated.
Design Guideline 1 Truly understand the business need. Get yourself acquainted
with the process and automate with the best possible user experience in mind.
When training machines based on historical data, the quality of the training data is
a crucial factor.9 Although some algorithms are relatively robust against missing or
erroneous data, the risk of replicating past mistakes hundreds of times exists. Hence,
cleansing the initial training set from flawed data is an essential condition.
Design Guideline 2 More data can only get you so far. While a broader training set
generally leads to more accurate predictions, do not forget to provide good-quality
data.
Nowadays, most ML algorithms come paired with powerful feature selection and
iteratively adjust parameters with methods like gradient descent. Still, most of the
approaches to feature and weight selection are heuristics that start with a random
or an all-equal-to-one initial configuration and often only reach a local optimum.
In the presence of experts who have performed the task hundreds of times, initial
configurations can be deduced that improve speed towards and accuracy of the final
configuration.
Design Guideline 3 Give the machine a good starting position. Using a combination
of expert judgement and ML for feature selection and assigning weights speeds up
the training process.
Among the reasons why ML was not as prominently applied as it is today are
the hardware requirements with increasing data volumes and complexity of tasks.
Although business users were used to data loads over the night from traditional data
warehouses, they are no longer as patient. While there has been significant progress
in terms of single processing units, parallelization has had an even bigger impact
on performance increases. Thus, distributing the workload of a ML use case over
several machines is the most reasonable choice. A cloud architecture provides that,
which is why the reference company chose to implement the prototype on one of the
leading cloud platforms.
Design Guideline 4 Computing power is crucial. Processing large amounts of data
with ML requires resources that a cloud-based architecture is better suited for than
local hardware.
8 The shared-service center employees of the reference company were the ones to identify use cases
and develop an agenda for the broad introduction of rule-based and cognitive automation in their
daily business.
9 Training ML algorithms with biased and incomplete data has been subject to research for more
than twenty years [50]. In the context of big data analytics, patching, and cleansing data in real time
has become an important tool [51].
Improving Invoice Allocation in Accounting … 149
Despite the intelligence attributed to the machine and its far superior speed, there
are always situations that require human assessment, sensing, and monitoring in a
process as complex as invoice processing. As a result, in many cases the machine can
only provide likely alternatives or make a choice based on probabilities of past data.
Therefore, accountants should still have the option of overriding entries. Additionally,
this may help build confidence since the accountant can experience first-hand what
the machine does well and where it lacks behind. In turn, this knowledge can then be
used to adjust parameters and improve the accuracy and coverage of the algorithm.
Design Guideline 5 Do not burn your bridges yet. Keep a fallback solution for human
workers to override entries and help the machine learn from experts´ decisions.
5 Evaluation
Evaluating the relevance of new artifacts is a major activity in DSR [52]. Gregor
and Hevner [16] propose a number of dimensions such as validity, utility, quality,
and efficacy.10 Following our RQ 1, we evaluate our prototype focusing on predic-
tion accuracy and process efficiency asking if the prototype outperforms the current
standard of manual work in our reference company.
Following up on prediction accuracy, we had two unstructured interviews of
roughly 30 min each. Evaluating different combinations of invoice fields as well
as different levels of confidence and coverage, our first interviewee, the head of
accounting of the reference company, told us that the automation should mitigate
one of the bottlenecks in the finance back office. According to him, the process
of determining approver and GL account (with cost center or project reference)
sometimes take up to three weeks and it has not so good prediction accuracy rate than
the prototype exposes (Sect. 4.3). The lead audit partner as our second interviewee
pointed out that his company began to train a neural network that is fed all information
on an invoice, including visuals, text positions, and the text information used in
our prototype. He did not have comparable figures yet, however, acknowledged the
eagerness of two of his clients to try it out.
In order to assess process efficiency, we conducted another four interviews during
a workshop of a manager focus group, which is part of the Schmalenbach working
group “Digital Finance”11 and regularly meets to discuss trends in the digitalization
of the Finance function. Interview partners were the head of GFT of our reference
company, the head of accounting of a utility company, and a partner of an audit
firm who has recently started implementing several ML prototypes for finance as
well. The head of the GFT department laid out that the business case for the account
10 Besides these goal- and activity-related dimensions, Prat et al. [53] add environment, structure,
ex.php.
150 M. Esswein et al.
Taking a single case study in a leading chemical company as our reference, the
objective of this paper was firstly, to gauge the potential of ML in improving predic-
tion accuracy and process efficiency compared to manual work and secondly, to lay
out first design guidelines to successfully implement ML in the accounting domain.
In doing so, we proposed a new kind of an account recommender which applies
distance-weighted k-nearest neighbors to determine most probable general ledger
accounts. We demonstrated three scenarios with different levels of coverage, predic-
tion accuracy, and process efficiency. To drive future research, we proposed five
design guidelines.
From 2020 on, our former prototype will be implemented to handle more than
500,000 invoices without purchase order per year more accurately and efficiently
than manual work did before. For practice, our set of requirements and proposed
areas of applying ML in the accounting domain should help companies to drive their
implementation of cognitive-based automation whilst helping managers to improve
the prediction accuracy and process efficiency of their finance back office. In addi-
tion, our design guidelines should help companies get started with ML for accounts
payable. For research purposes, our approach is more comprehensive than mostly
literature-based references like Fung [54]. As opposed to articles like Lacity and Will-
cocks [6], we followed DSR’s iterative “build and evaluate” activities and deployed
a prototype for more in-depth research. In comparison to Bräuning et al. [27] or
Caruana and Niculescu-Mizil [36], we ensured the relevance of our design guidelines
by evaluating them with experts from different companies.
However, our research reveals avenues for future research. Single case studies
offer a broad range of advantages (Sect. 3), they have limitations in terms of validity
and generalizability [55]. Thus, future research should approach the potential of
ML in the accounting domain with the help of a quantitative approach or a multiple
case study. Furthermore, we only presented our results using the k-nearest-neighbors
algorithm. However, as Merkert et al. [28] pointed out, 30% of ML applications
use artificial neural networks, which should be an interesting option for a future
prototype.
Improving Invoice Allocation in Accounting … 151
Furthermore, the artifact itself faces limitations. Combining both findings from
literature and expert interviews, we derived at six functional requirements. Despite
our deep business understanding, further input factors could complement our find-
ings. Thus, future research should extend our set of input factors. Overall, the research
results should be interpreted carefully. Generalizability across companies is not
possible due to differences companies may work – even in standardized domain
such as accounting. Furthermore, digitalization and its transformational effects may
lead to unforeseeable (technical) developments in the future. Nevertheless, ML is a
rising topic and its application will become a game changer for the finance department
and even beyond.
References
16. Gregor, S., & Hevner, A. R. (2013). Positioning and presenting design science research for
maximum impact. MIS Quarterly, 37, 337–355.
17. Peffers, K., Tuunanen, T., Rothenberger, M. A., & Chatterjee, S. (2007). A design science
research methodology for information systems research. Journal of Management Information
Systems, 24, 45–77.
18. Webster, J., & Watson, R. T. (2002). Analyzing the past to prepare for the future: Writing a
literature review. MIS Quarterly, 26, xiii–xxiii.
19. Bandara, W., Furtmueller, E., Gorbacheva, E., Miskon, S., & Beekhuyzen, J. (2015).
Achieving rigor in literature reviews: Insights from qualitative data analysis and tool-support.
Communications of the Association for Information Systems, 37, 154–204.
20. Vom Brocke, J., Simons, A., Niehaves, B., Riemer, K., Plattfaut, R., & Cleven, A. (2009).
Reconstructing the giant: On the importance of rigour in documenting the literature search
process. In S. Newell, E. A. Whitley, N. Pouloudi, J. Wareham, & L. Mathiassen (Eds.),
European conference on information systems (Vol. 9, pp. 2206–2217). IT: Verona.
21. Rowley, J., & Slack, F. (2004). Conducting a literature review. Management Research News,
27, 31–39.
22. Stittle, J., & Wearing, R. (2008). Financial accounting. London, UK: Sage Publications.
23. Wilson, R., & Sangster, A. (1992). The automation of accounting practice. Journal of
Information Technology, 7, 65–75.
24. Van den Bogaerd, M., & Aerts, W. (2011). Applying machine learning in accounting research.
Expert Systems with Applications, 38, 13414–13424.
25. Codreanu, D. E., Popa, I., & Parpandel, D. (2011). Accounting and financial data analysis data
mining tools. Galati, Romania: European Integration Realities and Perspectives.
26. Nolle, T., Seeliger, A., Mühlhäuser, M. (2016). Unsupervised anomaly detection in noisy
business process event logs using denoising autoencoders (pp. 442–456). Springer.
27. Bräuning, M., Hüllermeier, E., Keller, T., & Glaum, M. (2017). Lexicographic preferences
for predictive modeling of human decision making—A new machine learning method with an
application in accounting. European Journal of Operational Research, 258, 295–306.
28. Merkert, J., Mueller, M., & Hubl, M. (2015). A survey of the application of machine learning in
decision support systems. In European Conference on Information Systems, Münster, Germany.
29. De Prado, M. L. (2018). Advances in financial machine learning. Hoboken, NJ, USA: Wiley.
30. Veit, F., Geyer-Klingeberg, J., Madrzak, J., Haug, M., & Thomson, J. (2017). The proactive
insights engine: Process mining meets machine learning and artificial intelligence. In BPM
(Demos).
31. Schmitz, M., Dietze, C., & Czarnecki, C. (2019). Enabling Digital Transformation Through
Robotic Process Automation at Deutsche Telekom. In N. Urbach & M. Röglinger (Eds.),
Digitalization cases: How organizations rethink their business for the digital age (pp. 15–33).
Cham: Springer.
32. Aguirre, S., & Rodriguez, A. (2017). Automation of a business process using robotic process
automation (RPA): A case study. In Applied computer sciences in engineering (pp. 65–71).
Springer.
33. Theodoridis, S., & Koutroumbas, K. (2009). Pattern Recognition. Burlington, MA, USA:
Academic Press.
34. Bishop, C. M. (2006). Pattern Recognition and Machine Learning. New York, NY, USA:
Springer.
35. Langley, P. (1988). Machine learning as an experimental science. Machine Learning, 3, 5–8.
36. Caruana, R., & Niculescu-Mizil, A. (2006). An empirical comparison of supervised learning
algorithms. In Proceedings of the 23rd international conference on machine learning (pp. 161–
168). ACM.
37. Cover, T. M., & Hart, P. E. (1967). Nearest neighbor pattern classification. IEEE Transactions
on Information Theory, 13, 21–27.
38. Garcia, S., Derrac, J., Cano, J., & Herrera, F. (2012). Prototype selection for nearest neighbor
classification: Taxonomy and empirical study. IEEE Transactions on Pattern Analysis and
Machine Intelligence, 34, 417–435.
Improving Invoice Allocation in Accounting … 153
39. Fayyad, U., Piatetsky-Shapiro, G., & Smyth, P. (1996). From data mining to knowledge
discovery in databases. AI Magazine, 17, 37–54.
40. Jain, A., & Chandrasekaran, B. (1982). Dimensionality and sample size considerations in
pattern recognition practice. In P. R. Krishnaiah & L. N. Kanal (Eds.), Handbook of statistics
(Vol. 2). Amsterdam: North-Holland.
41. Dul, J., & Hak, T. (2008). Case study methodology in business research. Oxford, UK:
Butterworth-Heinemann.
42. Benbasat, I., Goldstein, D. K., & Mead, M. (1987). The case research strategy in studies of
information systems. MIS Quarterly, 11, 369–386.
43. Yin, R. K. (2017). Case study research and applications: Design and methods. Thousand Oaks,
CA, USA: Sage Publications.
44. Kotonya, G., & Sommerville, I. (1998). Requirements engineering: processes and techniques.
Hoboken, NJ, USA: Wiley.
45. Sommerville, I. (2007). Software engineering. Boston, MA, USA: Addison-Wesley.
46. Kohlbacher, F. (2006). The use of qualitative content analysis in case study research. Forum:
Qualitative Social Research, 7, 1–30.
47. Mayring, P. (2014). Qualitative content analysis: theoretical foundation, basic procedures and
software solution. Klagenfurt.
48. Monczka, R. M., Handfield, R. B., Giunipero, L. C., & Patterson, J. L. (2015). Purchasing and
supply chain management. Mason, OH, USA: Cengage Learning.
49. The Hackett Group. (2019). Best practices and metrics for next-generation P2P. The Hackett
Group. Accessed March 08, 2019 from https://www.slideshare.net/carrfraser/hackett-trades
hift-webinar-final.
50. Cortes, C., Jackel, L. D., & Chiang, W.-P. (1995). Limits on learning machine accuracy imposed
by data quality. In U. Fayyad, R. Uthurusamy (Eds.), International Conference on Knowledge
Discovery and Data-Mining (pp. 239-246), Montréal, Québec, Canada.
51. Saha, B., & Srivastava, D. (2014). Data quality: The other face of Big Data. In IEEE
International Conference on Data Engineering (pp. 1294–1297). IEEE, Chicago, IL, USA.
52. Venable, J., Pries-Heje, J., & Baskerville, R. (2016). FEDS: A framework for evaluation in
design science research. European Journal of Information Systems, 25, 77–89.
53. Prat, N., Comyn-Wattiau, I., & Akoka, J. (2014). Artifact evaluation in information systems
design-science research—A holistic view. In Pacific Asia Conference on Information Systems.
54. Fung, H. P. (2014). Criteria, use cases and effects of information technology process automation
(ITPA). Advances in Robotics & Automation, 3, 1–10.
55. Willis, B. (2019). The advantages and limitations of single case study analysis. E-International
Relations Students. Accessed April 28, 2019 from https://www.e-ir.info/2014/07/05/the-adv
antages-and-limitations-of-single-case-study-analysis/.
Performance-Based Funding
in the Italian Higher Education:
A Critical Analysis
1 Introduction
Over the last few decades, the higher education (HE) system has significantly changed
in line with New Public Management theories and marketization policies [2, 11].
In recent times, performance measurement and evaluation have become increas-
ingly important with the aim of increasing competition within the system [29] as a
means of enhancing efficiency [1]. Thus, governments have started to adopt different
managerial tools, such as performance-based principles or reward-based resource
allocation mechanisms, to achieve fairer and more efficient fund allocation practices.
However, the attempt to measure all the activities carried out by public institutions
can weigh down information systems due to the focus on complex indicators that
cannot consistently measure results in an equitable manner.
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer 155
Nature Switzerland AG 2020
R. Agrifoglio et al. (eds.), Digital Business Transformation, Lecture Notes in Information
Systems and Organisation 38, https://doi.org/10.1007/978-3-030-47355-6_11
156 A. Ezza et al.
adapt their strategy and managerial behaviour to meet the needs and target of funders.
Consequently, public universities should be highly responsive to those targets defined
by their main funders [19, 23, 32].
PBF logic strongly relies on the existence of a direct and deterministic relationship
between policies (which result in goals and targets), incentives (higher shares of
funds), the actions of universities (which change to achieve targets), and intended
results [36]. Even if the rationale that underpin PBF is clear, there may be unintended
consequences following its adoption. In fact, the implementation of PBF in HE can
lead to some unpredictable impacts [34] and unintended results [14, 20].
The effectiveness of PBF programmes in HE (i.e., the capability of PBF to promote
the achievement of the goals set at a governmental level) can be hampered by some
factors. Regulators set indicators, which sit at the core of the PBF mechanism, to
assess the performance of universities and drive the allocation of funds. However, as
a PBF can only assess a limited extent of the activities in which universities engage
[22, 40], the quality of the measures used and, concurrently, the reliability of the raw
data collected and reported by the informative systems (both on an organisational
and institutional level) have a direct impact on the effectiveness of a PBF [21]. In
this sense, PBF has a limited ability to objectively identify the highest performing
universities and, subsequently, allocate a higher share of funds to such institutions.
As such, PBF can lead to inequitable funds distribution. Another potential weakness
linked to this system lies in the inability of the indicators that are employed to
comply with the institutional differences between the universities that result from
diverse dimensions, be they size, institutional, vocational or due to localisation.
So, what are the potential unintended consequences of PBF adoption? First, imple-
menting the PBF approach forces a government (and its agencies) and universities
to bear high costs to meet information requirements. The cost of compliance is also
high in terms of the higher workload that is created for university staff and the
greater investments in informative systems and personnel. Furthermore, the cost of
compliance can impact different universities in different ways due to heterogeneous
institutional capacity [14]. Second, the higher competition for public subsidies can
result in the adoption of policies that can reduce the diversity and specialisation
of the institutional missions or programmes, since universities are incentivised to
abandon those programmes that are not positively evaluated and, consequently, focus
on specific activities [25]. Moreover, PBF can profoundly change student enrolment
policies. Indeed, if indicators of students’ success are included in the PBF formula,
universities can refuse to enrol less-skilled students as a means of achieving higher
performance [14]. If universities are publicly funded and education is considered a
merit good [39, 41], these practices can seriously reduce the university’s capability
to achieve its institutional mission. Furthermore, PBF can reduce the overall quality
of the education programmes that are available since the system motivates universi-
ties to remove the obstacles that can impede students’ graduation. Even if, to some
extent, this can be considered to represent a positive feature (universities are forced to
increase their effectiveness), it can result in a reduction in the standard of education
on offer.
158 A. Ezza et al.
IHES is the outcome of the season of reforms inspired by the New Public Management
rhetoric and the European Union policies (Bologna process, Lisbon Strategy). The
reforms aimed to increase the overall IHES performance in order to overcome the
limited competitiveness, backwardness, and unfairness that characterised the IHES
[10]. In particular, the funding system was remodelled in line with quasi-market [4,
31] and performance-based funding literature [24, 28].
Two main paths of reform should be considered: the global reform of 2010, and
the reform of the funding mechanism in line with the PBF literature. IHES was
profoundly changed with the introduction of L. 240/2010, which aimed to increase
the autonomy, accountability and performance of universities [12, 13]. The so-called
Gelmini Reform changed the overall landscape of the IHES by reorganising the
governance mechanisms, strengthening the role and use of performance evaluation
within the system, and promoting higher competition among universities.
The funding of IHES has also profoundly changed over the last few years. The
latest evolution of allocative mechanisms was carried out during a phase in which
the government significantly reduced the availability of resources [17]. The overall
public funding dropped by 7.2% between 2006 and 2016 (−19.43% if the effect
of inflation is eliminated), thereby increasing the degree of competitiveness among
public universities.
The reform of IHES funding commenced in 1993 (L. 537/1993) and was amended
in 1995 (L. 549/995) when the government created a unique source of public funding
for universities (the so-called “Fondo di Finanziamento Ordinario”) and promoted a
shift to a lump-sum budget allocation process. After several trials of the PBF approach
in IHES, the 2010 reform generated a strong impetus in the use of performance to
determine public subsidy allocation.
In addition to the allocation of public subsidies, in 2012 (legislative decree
49/2012), a performance-based mechanism of allocating budgets for staff recruit-
ment (both academic and administrative) was introduced. The allocation process is
based on a metric named the Punto Organico (PO), which is the equivalent to the
average cost of a full professor. This is used to measure and parametrize the costs
of academic figures and the resources allocated to universities [16, 37]. In other
Performance-Based Funding in the Italian Higher Education … 159
words, using a set of weight defined ex ante (i.e., one associate professor equals 0.7
PO; one fixed-term research fellow varies from 0.4 to 0.5 PO; one executive equal
0.65 PO, etc.) this parameter expresses the resources that are available to univer-
sities. The budget that is allocated to universities on an annual basis (linked to the
number and type of academics and administrative staff who left the universities the
previous year) is shared among universities via a formula-based method that is based
on two economic and financial parameters. Through the application of this formulaic
approach, both the “best” and “worst” universities are identified, and the former are
awarded a higher share of POs.
The underlying risk associated with the formula used to allocate funds to Italian
universities is that is can serve to widen the gap between institutions by consistently
rewarding performance that is only partially determined by universities’ strategic and
operative behaviours. In fact, the differences in socio-economic environments (e.g.,
regional wealth, occupational rates, etc.) could significantly impact performance and
can explain perceptions that some areas of the country are more attractive than others
(i.e., northern versus southern areas).
The changes that have been introduced in terms of how resources are allocated in
the IHES has created a landscape in which the primary use of performance can
be found in the following three mechanisms: The state funding mechanism (FFO
- Fondo di Finanziamento Ordinario), the budgets that are allocated for academic
and administrative staff recruitment (PO), and the extraordinary recruitment budget
that is apportioned for fixed-term research fellow type B1 (Piano straordinario di
reclutamento).
The critical analysis of these three funding mechanisms described along the
lines of the latest regulation, determine which of the types of universities’ activi-
ties are taken into consideration during the process of allocating resources as well
as the performance areas of interest. Moreover, based on the classification of the
funding mechanisms in higher education proposed by Jongbloed [27], each criterion
of formula adopted to calculate the shares that are allocated have been categorized into
input and output measurements. Input measurements are student enrolment figures
and staff positions, while output measurements assess the results of the main activities
conducted by the university in terms of education and research.
As Table 1 highlights, FFO is composed of a basic share (70%), a reward share
(27%) and other specific interventions (3%).
1 Type B research fellow (from now RTD-B), as regulated by the L. 240/2010 is a three-year contract
that can lead to a tenure-track to became associate professor for those who achieved the national
qualification.
160 A. Ezza et al.
The basic share is the sum of two elements: Historical funding and student stan-
dard cost share. Historical funding, which is not directly connected with current
performance, is calculated as a percentage of the basic share of the previous year,
while the standard cost share is determined through a demand-driven mechanism
that weights the amount of resources allocated to each university against the number
of regular students plus the number of students who are one year behind schedule
(full-time equivalent—FTE). Within this model, students represent both the input
and the users of educational services [3, 8, 38].
It is important to note that the demand-driven mechanism adopted in the IHES is
mainly “virtual” since universities do not receive exactly the amount of funds defined
by (standard cost of university * number of regular students). Indeed, “standard cost”
is not a “fare” that is paid by the Ministry; rather, it is used as a parameter to allot
the “basic share” to universities.
In terms of the second component of FFO, the reward share was introduced
with the aim of allocating funds in association with teaching and research perfor-
mance. However, the criteria adopted seems to steer competition more towards
research quality than teaching quality. In fact, art. 3 of DM 587/2018 established
that (approximately) 27% of the total amount of FFO will be based on:
• National research assessment–VQR (Valutazione della Qualità della Ricerca)
2011–14 (60% of the reward share, about 16% of the FFO). A periodic evaluation
that aims to retrospectively assess the quality of research performed at a given
institution.
• An evaluation of recruitment policies (20% of the reward share, about 5.5% of
the FFO) that takes into account the effectiveness of research activity. However, it
focuses purely on new recruits and also assesses the attractiveness of universities
in terms of recruitment of fellow researcher or professor from other Italian univer-
sities, abroad or those awarded with a research project financed by the European
Union.
• Responsible autonomy (20% of the reward share, about 5.5% of the FFO), aims
to improve the autonomy of institutions. Universities can choose indicators from
a list provided by the ministry that relate to three main dimensions: (1) Teaching,
as assessed by students’ performance; (2) Research, which is evaluated in terms
of attractiveness in recruitment policies; and (3) Internationalization with regard
to regular students, regular graduates and Ph.D. students from other countries.
Performance-Based Funding in the Italian Higher Education … 161
Universities are required to choose between two of the three dimensions and select
one indicator for each dimension.
The FFO is a mixture of historical, input and output-oriented allocation mecha-
nisms. It should be noted that the basic share (see Table 2), which is still a significant
amount (70%), is mainly linked to dimensional parameters (the input number of
students) in both the cost standard allocation (with the number of FTE students) and
historical funding. The latter is obviously related to the dimension of universities. The
higher the number of students, the higher the basic share distributed to the providers.
Looking at the reward share (see Table 3) an initial observation reveals that research
activity is repeated in two of the three criteria adopted, which represents 80% of the
reward share (about 21% of the FFO). Education assessment is relevant only with
reference to the responsible autonomy, which accounts only for 5.5% of the FFO
(20% of the reward share). Indeed, the focus of the results assessment, to which
the resource allocation is related, is on the effectiveness of the research activities as
evaluated through the quality of publications (output of research) produced by the
academic staff and new recruits adopting the VQR. In this regard, it is noteworthy
that the VQR results used to currently allocate funds spanned a previous temporal
period, 2011–2014. This evaluation process is still disarrayed due to its not recur-
rent implementation. Indeed, the third-round exercise is going to start for the years
2015-2019, and further assessment criteria have yet to be published. The adoption
of VQR results to distribute FFO over a period of several years led to the reiteration
of resources allocated without differences from year to year. Doubtless, this is due
to VQR mechanism assessment in relation to the period of the evaluation (research
results achieved in four-five years).
PO is a metric that was first introduced in 2003 and later (2012) used in the PBF
mechanism to allot annual recruitment budget. PO allocation is a complex mecha-
nism that considers the number and type of employees (academic and administrative
staff) who left each university in the previous year (turnover POs) and the financial
efficiency of institutions, which is understood as the efficient use of resources with
special reference to human resources expenses and indebtedness.
It is worth noting that there is no direct relationship between a university’s turnover
POs and the POs actually allocated since they are partially reallocated, and the
following indicators are used to identify if a university is a good performer:
A. Staff cost indicator, which is calculated as the ratio between personnel expenses
and total revenues (i.e., the sum of public funds and tuition fees net of loan
repayments);
B. Economic and financial sustainability indicator, which is the result of the ratio
between total revenues after reducing rents payable and personnel expenses plus
amortization charges.
On the basis of the latest ministerial decree (DM n. 873/2018), a university
is considered “virtuous” if indicator A <80% and indicator B >1. In this case,
the best-performing universities are awarded with a higher share of POs than the
worst-performing institutions. Following this classification, art. 2 of DM 873/2018
establishes three different groups:
1. Worst-performing institutions (indicator A > 80% or indicator B < 1), which
receive a maximum of 50% of their turnover POs;
2. Virtuous institutions: (indicator A <80% or indicator B >1), which receive 50% of
their turnover POs plus an additional budget that is identified through a complex
formula that uses the 20% of the differences between two economic margins
(20% of the difference between total revenues after reducing rents payable and
personnel expenses plus amortization charges) to share the additional POs;
3. Universities showing a severe financial crisis (see DM 353/2018) and indicator
A >80% will not receive any funds for recruitment purposes (Table 4).
The PO allocation deals with the most arguable mechanism among the three anal-
ysed. First, the requirements that have to be respected to receive PO (see group 3) and
the formula-based criteria adopted during the allocation process are purely financial
indicators. Therefore, this mechanism rewards those universities that perform better
in terms of financial efficiency; i.e., the weight of personnel expenses versus total
revenues. This may not reflect dimensional variables and, as such, can prevent an
Performance-Based Funding in the Italian Higher Education … 163
evaluation of the real personnel needs. However, although this criterion seems to
encourage universities to reduce costs in proportion to total revenues, there is a need
to clarify some underlying factors. In the total revenues an important role is played
by the tuition level of students’ fees whom total amount is proportional to the number
of students and the unitary value of taxes. These factors are heavily influenced by
contextual influences that are not completely within the universities’ control. In fact,
having the ability to attract students depends on the quality of the teaching offer-
ings, the alignment between offerings and the labour market, a university’s ability
to facilitate an easy entry into the labour market due to the relationships between
universities, and the economic and social fabric, etc. [8, 9]. These factors, in turn,
depend on the socio-cultural and economic environment of the territory in which
the university is located [16, 18]. Likewise, the tuition fees are correlated with the
attraction and reputation of the university; that is, the higher the university’s repu-
tation, the higher the level of taxes the students pay. Finally, there is also a need to
highlight that tuition fees can represent, at maximum, 20% of the total FFO (see
Dpr. 306/1997) that is allocated to a university. However, the tuition fee-FFO ratio
varies consistently throughout the country, and only northern universities can levy
higher fees. In the period 2007–2016, for instance, the average fees paid by a student
enrolled in a southern or insular university was about one half of that paid by a student
who attended a northern university (from about 630 e to more than 1100 e).
With the objective of promoting new research recruitments, the Ministry period-
ically allocates specific resources for RTD-B as part of the recruitment budget. For
the current year, the extraordinary budget—for a total of 1511 RTD-B—is allocated
on the basis of the following indicators (DM 204/2019):
• 29% based on the mean number of academic staff in service in 2010 and 2018;
164 A. Ezza et al.
• 36% determined as follows: 90% according to the number of students, as set out
in DM n. 587/2018 for FFO allocation, and 10% according to the number of
financed grants for Ph.D. students;
• 18% according to VQR 11–14 assessment;
• 16% number of RTD-B in service in 2018 with national scientific qualification
(abilitazione scientifica nazionale) multiplied by the ratio between the number of
students, as set out in DM n. 587 for FFO allocation and number of academics in
service in 2018.
The extraordinary recruitment budget for RTD-B is a combination of an input-
and output-oriented allocation mechanism. However, looking at each of the criteria
that is applied to assess the respective portion of the positions distributed, it is clear
that input variables have a higher weight in the general formula. Input drivers repre-
sent about 65% divided by the mean of academics (29%) and number of students
(36%). Therefore, as shown in Table 5, the output-based allocation pertains to the
residual share that adopt the research results. Again, one criterion is the VQR (about
18%) while the latest part of position allotment is driven by another research output:
the numbers of research fellows who obtained the national scientific qualification
weighted on a structural parameter (n. students/n. academics). Also, this mechanism
is mainly input oriented and, again, teaching results are not taken into consideration.
5 Conclusions
The purpose of this theoretical paper was to critically analyse the fundamental
funding mechanisms of IHES with the aim of highlighting criticalities and the derived
effects that influence the strategic choices and consequent actions taken by univer-
sities. Indeed, the motivation for introducing performance measurements within
resource allocation practices was to substitute the traditional input-based approach
with output/outcome-oriented models and to stimulate universities to increase perfor-
mance through linking part of the funds that are distributed to reward shares or, rather,
the output achieved. However, as a large amount of funding is input-oriented, it is
anchored to dimensional parameters such as the number of students or academics.
These are the basic share FFO (about the 70%), the 50% turnover PO and the two
main portion of positions (about the 65%) in the recruitment budget for RTD-B.
The predominance of input-driver related criterion in the IHES funding mechanisms
triggers competition between universities in attracting students. In addition to the
extensive use of input-based logic to allot funds, the choice of linking a relevant part
of the FFO (about 48%) to previous allocation should be noted. The use of historical
funding share serves to maintain the ‘status quo’ since it prevents extensive variation
in the amount of funds allocated to universities. However, at the same time, using
historical-based allocation can perpetuate gaps among universities and reduce the
role of incentives linked to the PBF model.
The analysis highlights how the current system is extremely complex across all
three of the mechanisms examined. Table 6 summarizes the targets that are encom-
passed in the three PBF mechanisms and shows the predominant outcomes of the
actions that are motivated by the PBF mechanisms adopted in Italy.
It is worth noting that the repetition of some indicators/criterion, such as the
dimensional indicator “number of students” and VQR results, which are used to
determine the basic share of FFO and approximately 36% of the positions covered
by the extraordinary recruitment budget for RTD-B, and the reward shares of the
above mechanisms. In this regard, a questionable issue concerns the replication of
the resource allocation due to the adoption of VQR results in the allotment of the
reward shares over several years. The VQR exercise shows some issues in relation
of evaluation process in relation to the disclosure of the assessment criteria provided
at the end of the evaluation period. In terms of the reward shares, the deficiency of
output related to the educational activity of universities stands out. These are only
considered in the residual share “responsible autonomy” (20%) of FFO while they
are not an allocation criterion in the distribution of PO, within which only financial
indicators drive the PO assignment. The lack of adoption of educational outputs in
the PBF mechanisms analysed emerges as one of the more questionable weakness
considering the relevance of the education activity, which represents one of the key
institutional missions of Italian universities.
Of the universities’ behaviours that should be triggered by the resource allocation
mechanisms, increasing student enrolment is the more relevant expected action as
dimension indicators are the main resource allocation drivers. In fact, as previously
166 A. Ezza et al.
argued, the number of students represents a key parameter in all three of the main
funding mechanisms analysed, not only in terms of basic shares. This is reason-
able in order to guarantee the financial sustainability of the overall system such that
it is “giving more to the biggest”. However, it is also a competitive incentive that
should push universities to attract more students. Furthermore, the predominance
of this dimension in funding allocation can limit the capability of PBF to promote
higher performance in the IHES. Indeed, universities can be incentivized to mainly
orient their strategies toward increasing the number of students enrolled, thereby
limiting the effort that is invested in the dimension of performance, which is not
adequately considered by the PBF. Is the number of students a factor that universi-
ties can manage? Can universities make decisions and take consequent actions that
increase the number of students over the medium and long term? The attractive-
ness of a university is only partially conditioned by the quality and typology of the
Performance-Based Funding in the Italian Higher Education … 167
rather than education. Such a scheme can lead to the reduction of the quality of the
educational programmes.
Secondly, the marketization policies imply that students and institutions can make
their choices autonomously and on a rational basis. In reference to rationality, if
universities do not know how their performance will be measured, are they able to
rationally choose their strategy to improve performance? In this sense, the disclosure
of the assessment criteria (e.g. VQR evaluation) must be provided at the beginning
of the evaluation period. In this way, policymakers can properly link VQR (and, to a
broader extent, PBF) to their political agenda and create incentives for institutions to
adapt their strategy. At the same time, universities will have the correct information
to plan accordingly.
Finally, using the number of students as one of the main funding allocation drivers
can lead to an increase in the gaps between institutions. Indeed, the underlying
assumption in using the number of students as a quasi-market metric is that students
‘vote with their feet’, implying that students are able to choose a university based
on a rational evaluation of its quality and performance, yet they may also have
insufficient information and be driven by external factors. In this sense, universities
operating in a wealthier or more developed area of the country will appear more
attractive than those located in other underprivileged areas, thus obtaining higher
shares of funds. Considering the traditional shift that exists between the North and
the South of Italy, policymakers should properly manage this potential shortcoming of
PBF by introducing parameters into the formulas to address the differences between
the areas of the country. Alternatively, the Italian government could modify the
funding mechanism by juxtaposing PBF with some ‘additional funds’ to help those
universities that underperform as a result of their location.
References
1. Agasisti, T. (2009). Market forces and competition in university systems: Theoretical reflections
and empirical evidence from Italy. International Review of Applied Economics., 23(4), 463–
483. https://doi.org/10.1080/02692170902954783.
2. Agasisti, T., & Catalano, G. (2006). Governance models of university systems—towards quasi-
markets? Tendencies and perspectives: A European comparison. Journal of Higher Education
Policy and Management., 28(3), 245–262. https://doi.org/10.1080/13600800600980056.
3. Agasisti, T., & Pérez-Esparrells, C. (2010). Comparing efficiency in a cross-country perspec-
tive: The case of Italian and Spanish state universities. Higher Education, 59(1), 85–103. https://
doi.org/10.1007/s10734-009-9235-8.
4. Bartlett, W., Le Grand, J.: The theory of quasi-markets. In Quasi-markets and social policy
(pp. 13–34). Berlin: Springer.
5. Behn, R. D. (2003). Why measure performance? Different purposes require different measures.
Public Administration Review, 63(5), 586–606. https://doi.org/10.1111/1540-6210.00322.
Performance-Based Funding in the Italian Higher Education … 169
29. Jongbloed, B. (2003). Marketisation in higher education, Clark’s triangle and the essential
ingredients of markets. Higher Education Quarterly, 57(2), 110–135. https://doi.org/10.1111/
1468-2273.00238.
30. Jongbloed, B., & Vossensteyn, H. (2001). Keeping up performances: An international survey
of performance-based funding in higher education. Journal of Higher Education Policy and
Management, 23(2), 127–145.
31. Le Grand, J.: Quasi-Markets and Social Policy. The Economic Journal. 101, 408, 1256 (1991).
https://doi.org/10.2307/2234441.
32. Liefner, I. (2003). Funding, resource allocation, and performance in higher education systems.
Higher Education, 46(4), 469–489.
33. McKeown, M.P.: State Funding Formulas for Public Four-Year Institutions. (1996).
34. Nisar, M. A. (2015). Higher education governance and performance based funding as an ecology
of games. Higher Education, 69(2), 289–302. https://doi.org/10.1007/s10734-014-9775-4.
35. Pfeffer, J., Salancik, G. R. (2003). The external control of organizations: a resource dependence
perspective. Stanford University Press.
36. Rabovsky, T. M. (2012). Accountability in higher education: Exploring impacts on state budgets
and institutional spending patterns. Journal of Public Administration Research and Theory,
22(4), 675–700.
37. Rossi, P. (2015). Il Punto Organico: una storia italiana. RT. A Journal on Research Policy and
Evaluation, 3, 1.
38. Rothschild, M., & White, L. J. (1995). The analytics of the pricing of higher education and other
services in which the customers are inputs. Journal of Political Economy, 103(3), 573–586.
39. Smethurst, R. (1995). Education: a public or private good? RSA Journal, 143(5465), 33–45.
40. Thornton, Z. M., & Friedel, J. N. (2016). Performance-based funding: State policy influences
on small rural community colleges. Community College Journal of Research and Practice,
40(3), 188–203. https://doi.org/10.1080/10668926.2015.1112321.
41. Tilak, J. B. G. (2008). Higher education: a public good or a commodity for trade?: Commitment
to higher education or commitment of higher education to trade. Prospects, 38(4), 449–466.
https://doi.org/10.1007/s11125-009-9093-2.
42. Volkwein, J., & Tandberg, D. (2008). Measuring up: Examining the connections among state
structural characteristics, regulatory practices, and performance. Research in Higher Education,
49, 180–197. https://doi.org/10.1007/s11162-007-9066-3.
43. van Vught, F. (2007). Diversity and differentiation in higher education systems, 22.
44. Widiputera, F., et al. (2017). Measuring diversity in higher education institutions: A review of
literature and empirical approaches. IAFOR Journal of Education, 5(1), 47–63.
People, Organizations, and New Ways
of Working in the Information Age
Organizational Impacts on Sustainability
of Industry 4.0: A Systematic Literature
Review from Empirical Case Studies
Abstract There is an increasing interest in Industry 4.0 (I40) applications for orga-
nizations to act sustainable. Indeed literature agrees the adoption of I40 technolo-
gies promises various organizational benefits which lead to the achievement of an
enduring sustainability and competitive advantage for organizations. However, there
is a lack of a study which provides transparency confirming and summarizing those
spawned organizational benefits. This paper aims at addressing this gap performing
a systematic literature review analyzing I40 empirical case studies for detecting the
spawned I40 organizational impacts on sustainability. We employed the triple bottom
line (TBL) concept as sensitive device to confront different studies distinguishing
among the sustainability dimensions, namely the economic, social and environmental
dimensions. We then categorize and group I40 organizational impacts according
to TBL dimensions. The review portrays an initial empirical knowledge regarding
the I40 organizational impacts on sustainability since 18 I40 empirical case study
have found. Furthermore, the literature review reveals that I40 applications mainly
impact the economic dimension whereas few applications generated benefits for the
remaining dimensions.
1 Introduction
Nowadays due to the climate change and a constant increasing of pollution, acting
sustainable has become the requirement and priority for organizations [22].
Within this landscape, Industry 4.0 (henceforth I40) is a trendy industrial initiative
which aims at innovating production processes towards sustainable practices through
the use of advanced digital technologies into the assembly line [13, 19]. However,
even though there is a consensus in literature that I40 leads to positive organizational
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer 173
Nature Switzerland AG 2020
R. Agrifoglio et al. (eds.), Digital Business Transformation, Lecture Notes in Information
Systems and Organisation 38, https://doi.org/10.1007/978-3-030-47355-6_12
174 E. G. Margherita and A. M. Braccini
impacts on sustainability [13, 19], there is a lack of studies that provide transparency
summarizing and confirming these premises [28]. To address this gap, we perform
a systematic literature review of I40 empirical case study detecting the I40 organi-
zational impacts on sustainability. We use the Triple Bottom Line (henceforth TBL)
concept as sensitive device since it allows to study the sustainability in a holistic way
embracing the economic, environmental and social dimensions [12]. Therefore, we
detected I40 organizational impacts which affected positively the three dimensions.
Our investigation answers the following questions: “What are the organizational
impacts on sustainability of Industry 4.0?”
The reminder of this article is organized as follows. Section 2 describes the founda-
tional concepts of I40 and TBL. Section 3 illustrates the research method. Section 4
is devoted to the results of the literature review. Section 5 discusses the findings
proposing future directions for the research. The paper concludes in Sect. 6 proposing
implications for researchers and practitioners.
2 Related Literature
In this section, we portray the Triple Bottom Line, Industry 4.0 initiative, the related
technologies and their organizational impacts on sustainability.
the TBL is related to with economic and financial performance dimensions of the
organization. In addition, organization supports both long-term economic growth and
the community growth encouraging the increasing of the personal income, paying
taxes and promoting actions in order to support the other two dimensions [14, 34].
Finally, Fig. 1 punctuated the organizational impacts that TBL embraces for each
dimension which we employed as a sensitive device for detecting organizational
impacts on sustainability.
3 Research Method
4 Results
The literature review search revealed 18 I40 empirical case studies in which the
I40 applications led to organizational impacts on sustainability. We summarized
organizational impacts in Table 2.
With regards to the organization impacts on economic dimension, all the I40
applications fully supported this dimension. Indeed, the literature review showed
I40 application which improved various back-end processes realizing cost reduction
and higher efficiency. As a matter of fact, there is a general consensus stating that IoT
applications into inventory management and warehouse management improved the
efficiency and effectiveness of the supply chain management reducing the inventory
inaccuracy and the time of receiving the goods by consumers [9, 18, 36]. Still, Reif
et al. [38] added that providing workers decision support via head-mounted displays
significantly reduces the required time for the picking process.
Moreover, according to Mourtzis et al. [31] and Sayar et al. [40] I40 applica-
tions, particularly IoT, provided new avenues to deliver enhanced services. While
3D printing applications affected positively small medium production of prod-
ucts allowing organization to produce different goods [1]. Likewise, I40 affords
an improved managerial decision-making capability in organizations, thanks to the
improved analytics capabilities of the data produced by the digital infrastructures.
Indeed, Shahbaz et al. [42] proposed a data mining techniques in manufacturing
industry in order to deliver information to improve the product manufacturing life
cycles and eventually the economic performance of the industry. Furthermore, Lee
et al. [26] argued that I40 allows predictive analysis on the organizational processes
and providing a promptly maintenance on production mistakes.
Organizational Impacts on Sustainability of Industry 4.0 … 179
Table 2 (continued)
Authors I40 organizational impacts
Economic dimension Social dimension Environmental
dimension
Kembro et al. [21] IoT and sensors Safer workplace
technology improved
warehouse management
Braccini et al. [5] Robotics improved Safer work Reduction of CO2
productivity and environment, less emission and natural
product quality intense work-load and resources
job enrichment
Mourtiz et al. [31] Robotics generated new
and advanced services
Pero et al. [36] RFID improved the
efficiency of the supply
chain
Ardanza et al. [1] 3D printing improved
the efficiency of small
and medium production
Table 2 allows us to answer our research question summarizing the results of our
systematic literature review of I40 organizational impacts on sustainability. Table 2
depicts an initial stage of the I40 initiative. Indeed, most of the I40 applications
concerns individual technologies (e.g. 3d printings, big data or IoT) rather than a
mix of technologies which enable the full potential of I40. Figure 3 shows the tech-
nologies adopted in the empirical I40 case studies. Within the case studies, the most
studied technology is the IoT in the warehouse and inventory management leading to
several benefits along the supply chain which impacted mainly the economic dimen-
sion. Conversely, 3d printing and virtual reality appeared only in one case study
respectively. Therefore, we argue that there is a need for further studies in order to
understand the advantages of these technologies. Researchers should focus on 3d
printings when they are in a key role within the organizational strategy producing a
small amount of high customized goods for fulfilling individual customer [49].
The systematic literature review also revealed that several I40 applications did not
reach both the two features of I40 initiative since the CPS has not implemented in all
empirical case studies. Further research should focus on this issue investigating the
adoption barriers which impede the CPS implementation as well as how to address
them. As a matter of fact, the cybersecurity will become increasingly important in a
I40 context requiring more studies for addressing this issue.
Furthermore, we noticed that most of the studies underpinned a deterministic
technological approach. Indeed, I40 organizational benefits have connected to the
delivery of the technical systems without considering the social systems and the
Fig. 3 Industry 4.0 technologies adopted into empirical I40 case studies
182 E. G. Margherita and A. M. Braccini
Manufacturing combining with I40 initiative [16]. Indeed, Green Manufacturing aims
at developing green innovation and new green products. Green Innovation refers to
innovation which is characterized by energy conservation, pollution prevention and
environmental management as well as produce products easy to recycle and less
polluting.
Finally, the social dimension is not prominent in the literature. Few studies covered
this dimension where organizational benefits often are generated by a positive exter-
nality. Information systems (IS) researchers should concentrate on this dimension
as implications of I40 technologies on social systems have not investigated yet. IS
researchers, employing an individual and group perspective, should pay attention on
how I40 technologies should change the way of working and how these I40 tech-
nologies improved work conditions answering questions regarding new competences
needed to handle these technologies and how I40 improve the quality of working life.
modern technologies such as internet of things, cloud, big data, robotic systems, 3D
printing.
Regarding the implication for researchers, the literature review summarized our
knowledge regarding I40 initiatives, these advanced technologies and their positive
organizational impacts on sustainability proposing new avenues. Still, the investi-
gation also opens for socio-technical approach in order to maximize organizational
impacts for I40. This triggers further consideration regarding the “fit” between the
two systems in terms of job satisfaction, knowledge, task structure and social value
[32].
Furthermore, Table 2 can be used to improve IS theories like the adaptive structura-
tion theory which is a meta-theory for accounting the change by a technology within
the sociotechnical systems [3]. Indeed, from these I40 case studies we can detect
and extend the construct of technology dimensions for I40 [10]. Indeed, Bostrom
et al. 2009 claimed for “further research exploring and identifying a complete set of
features and dimensions [of technologies] would be useful” (pg. 27) [3]. Finally, the
study limitation is that we employed SCOPUS database. This does not cover all the
accessible sources of I40 and similar initiatives. Accordingly, an interesting avenue
to extend our literature review, is to embrace further database such as Web of Science
(WOS), EBESCO and JSTOR.
References
1. Ardanza, A., et al. (2019). Sustainable and flexible industrial human machine interfaces
to support adaptable applications in the Industry 4.0 paradigm. International Journal of
Production Research.
2. Bassi, L. ()2017. Industry 4.0: Hope, hype or revolution? In RTSI 2017—IEEE 3rd International
Forum Research and Technologies for Society and Industry. Conference Proceedings (2017).
3. Bostrom, R. P., et al. (2009). A meta-theory for understanding information systems within
sociotechnical systems. Journal of Management Information System, 26(1), 17–48.
4. Braccini, A. M. (2011). Value generation in organisations.
5. Braccini, A. M., Margherita, E. G. (2019). Exploring organizational sustainability of Industry
4.0 under the triple bottom line: the case of a manufacturing company. Sustainability, 11(1),
36.
6. Vom Brocke, J., et al. (2009). Reconstructing the giant: On the importance of rigour in
documenting the literature search process. Syst: European Conference on Information.
7. Chen, D. Q., et al. (2010). Information systems strategy: Reconceptualization, measurement
and implications. MIS Quarterly, 34(2), 233–259.
8. Corbin, J. M., & Strauss, A. L. (1990). Grounded theory research: Procedures, canons, and
evaluative criteria. Qualitative Sociology, 13(1), 3–21.
9. Cui, L., et al. (2017). Investigation of RFID investment in a single retailer two-supplier supply
chain with random demand to decrease inventory inaccuracy. Journal of Cleaner Production,
142, 2028–2044.
10. DeSanctis, G., & Poole, M. S. (1994). Capturing the complexity in advanced technology use:
Adaptive structuration theory. Organization Science, 5(2), 121–147.
11. Eason, K. (2014). Afterword: The past, present and future of sociotechnical systems theory.
Applied Ergonomics, 45(2), 213–220.
12. Elkington, J. (1997). Cannibals with forks—Triple bottom line of 21st century business. Stoney
Creek, CT: New Society Publishers.
Organizational Impacts on Sustainability of Industry 4.0 … 185
13. Evans, P. C., Annunziata, M. 2012(). Industrial Internet: pushing the boundaries of minds and
machines.
14. Evans, S., et al. (2017). Business model innovation for sustainability: towards a unified
perspective for creation of sustainable business models. Business Strategy and the Environment.
15. Fatorachian, H., Kazemi, H.: A critical investigation of Industry 4.0 in manufacturing:
theoretical operationalisation framework. Production Planning and Control, 7287, 1–12.
16. Feng, Z., & Chen, W. (2018). Environmental regulation, green innovation, and industrial green
development: An empirical analysis based on the spatial Durbin model. Sustainability, 10, 1.
17. Glavič, P., & Lukman, R. (2007). Review of sustainability terms and their definitions. Journal
of Cleaner Production, 15(18), 1875–1885.
18. Goyal, S., et al. (2016). The effectiveness of RFID in backroom and sales floor inventory
management. International Journal of Logistics Management, 27(3), 795–815.
19. Kagermann, H., et al. (2013). Recommendations for implementing the strategic initiative
INDUSTRIE 4.0. Working Group. Acatech, Frankfurt am Main, Ger.
20. Kang, H. S. et al. (2016). Smart manufacturing: Past research, present findings, and future direc-
tions. International Journal of Precision Engineering and Manufacturing-Green Technology,
3(1), 111–128.
21. Kembro, J. H., et al. (2017). Network video technology: Exploring an innovative approach to
improving warehouse operations. International Journal of Physical Distribution & Logistics
Management, 47(7), 623–645.
22. Kiel, D., et al.: Sustainable industrial value creation: Benefits and Challenges of Industry 4.0.
23. Koukoulaki, T. (2014). The impact of lean production on musculoskeletal and psychosocial
risks: An examination of sociotechnical trends over 20 years. Applied Ergonomics, 45(2),
198–212.
24. Lee, C. K. M., et al. (2017). Design and application of Internet of things-based ware-
house management system for smart logistics. International Journal of Production Research,
7543(October), 1–16.
25. Lee, C. K. M., et al. (2015). Research on IoT based cyber physical system for industrial big
data analytics. IEEE International Conference on Industrial Engineering and Engineering
Management (IEEM) (pp. 1855–1859).
26. Lee, J., et al. (2013). Recent advances and trend in predictive manufacturing systems in big
data environment. Manufacturing Letters, 1, 1.
27. Liang, Y. C., et al. (2018). Cyber physical system and Big Data enabled energy efficient
machining optimisation. Journal of Cleaner Production, 187, 46–62.
28. Liao, Y., et al.: Past, present and future of Industry 4.0 - a systematic literature review and
research agenda proposal. International Journal of Production Research, 55(12), 3609–3629.
29. Littig, B., Griessler, E. (2005). Social sustainability: A catchword between political pragmatism
and social theory. International Journal of Sustainable Development, 8(1/2), 65.
30. Margherita, E. G., Braccini, A. M. (2020). IS in the cloud and organizational benefits: An
exploratory study. In: Lazazzara, A., Ricciardi, F., Za, S. (Eds.) Exploring digital ecosystems.
Lecture notes in information systems and organisation, vol. 33. Cham: Springer.
31. Mourtzis, D., et al.: Modelling and quantification of industry 4.0 manufacturing complexity
based on information theory: A robotics case study. International Journal of Production
Research.
32. Mumford, E. (2003). Redesigning human systems. Idea Publishing.
33. Nee, A. Y. C., et al. (2012). Augmented reality applications in design and manufacturing. CIRP
Annual Manufaturing Technology, 61(2), 657–679.
34. Norman, W., & Macdonald, C. (2004). Getting to the bottom of the triple bottom line. Business
Ethics Quarterly, 14(2), 243–262.
35. Okoli, C., & Schabram, K. (2010). A Guide to conducting a systematic literature review of
information systems research. Sprouts Working Paper on Information Systems, 10(26), 1–50.
36. Pero, M., & Rossi, T. (2014). RFID technology for increasing visibility in ETO supply chains:
A case study. Production Planning and Control, 25(11), 892–901.
186 E. G. Margherita and A. M. Braccini
37. Piccarozzi, M., et al. (2018). Industry 4.0 in management studies: a systematic literature review.
Sustainability, 10(10), 3821.
38. Reif, R. Günthner, W.A. (2009). An augmented reality supported picking system. In: WSCG
2009 Full Paper Proceedings, Plzen, Czech Republic, February 2–5, 2009.
39. Sanders, A., et al.: Industry 4.0 implies lean manufacturing: Research activities in Industry 4.0
function as enablers for lean manufacturing. Journal of Industrial Engineering Management,
9(3), 811–833.
40. Sayar, D., & Er, Ö. (2018). The Antecedents of successful IoT service and system design:
Cases from the manufacturing industry. International Journal of Design, 12(1), 67–78.
41. Schulze, C., et al. (2018). Cooling tower management in manufacturing companies: A cyber-
physical system approach. Journal of Cleaner Production.
42. Shahbaz, M., et al. (2012). Data mining methodology in perspective of manufacturing
databases. Life Science Journal, 9, 3.
43. Shin, S., et al. (2014). Predictive analytics model for power consumption in manufacturing
predictive analytics model for power consumption in manufacturing. Procedia CIRP, 15, 153–
158.
44. Strange, R., Zucchella, A.: Industry 4.0, global value chains and international business.
Multinational Business Review, 25(3), 174–184.
45. Thiede, S. (2018). Environmental sustainability of cyber physical production systems. Procedia
CIRP, 69(May), 644–649.
46. Webster, J., & Watson, R. T. (2002). Analyzing the past to prepare for the future: Writing a
literature review. MIS Quarterly, 26, 2.
47. Xu, X. (2012). From cloud computing to cloud manufacturing. Robotics and Computer-
Integrated Manufacturing, 28(1), 75–86.
48. Yuan, Z., et al. (2017). Smart manufacturing for the oil refining and petrochemical industry.
Engineering, 3, 1–4.
49. Zawadzki, P., Zywicki, K. (2016). Smart product design and production control for effective
mass customization in the industry 4.0 concept. Management and Production Engineering
Review, 7(3), 105–112.
50. Zhang, Y., et al. (2018). The ‘Internet of Things’ enabled real-time scheduling for remanufac-
turing of automobile engines. Journal of Cleaner Production, 185, 562–575.
Industry 4.0 and the Global Digitalised
Production. Structural Changes
in Manufacturing
Abstract The globalization process and the new digitalized production have rapidly
changed the structural organizational models of major economies. To avoid the
commoditization trap, globalization and price-advantage erosion, manufacturing
industries are moving fast from mass to customized productions. They have servi-
tized business operations, taking advantages of the new emerging and digitized
technologies within the scenario of Industry 4.0 (I4.0). This paper recalls the most
significant debate on the new industrial paradigm, and investigates its impact on the
manufacturing sector, focusing on Italian SMEs. It evaluates the effects on labour
division, organizational models of production (agents-machines-organization), the
“new” power structure, and the economy as a whole. It investigates the effects of
technology on the labour market and organizational models with respect to SMEs
and networks, concluding that I4.0 could be an effective driving force for networking
SMEs, despite the reduction of employees in manufacturing is likely to continue.
1 Introduction
In the last decades, the process of globalization and the digital transformation of the
industrial production have changed economic systems all over the world, leading to
a significant impact on life, the way people work and the functioning of markets.
The socio-political context has deeply changed. The large increase on the extent of
the market followed the pervasive process of globalization, the new technological
G. Morelli (B)
University of Teramo, via R. Balzarini 1, 64100 Teramo, Italy
e-mail: gmorelli@unite.it
C. Pozzi · A. R. Gurrieri
University of Foggia, Largo Papa Giovanni Paolo II, 71100 Foggia, Italy
e-mail: cesare.pozzi@unifg.it
A. R. Gurrieri
e-mail: antoniarosa.gurrieri@unifg.it
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer 187
Nature Switzerland AG 2020
R. Agrifoglio et al. (eds.), Digital Business Transformation, Lecture Notes in Information
Systems and Organisation 38, https://doi.org/10.1007/978-3-030-47355-6_13
188 G. Morelli et al.
The term I4.0 was introduced at the 2011 Hannover Messe, in Germany [5], and
denotes the transformation of “traditional” industries by the IoT, data and services.1
It relates to the FIR, which offers, in terms of industrial policy, very different char-
acteristics related to the three previous revolutions. It is based on the production of
cybernetic systems using heterogeneous data and knowledge integration, where its
core is the ever-closer integration of digital technologies in manufacturing processes
[6].
On the other hand, also the three industrial revolutions of the past were all triggered
by fundamental technical changes: the introduction of water- and steam-powered
mechanical manufacturing at the end of the eighteenth century, the division of labour
at the beginning of the twentieth century, and the introduction of programmable logic
controllers for automation purposes in manufacturing in the 1970s. They revealed to
be a sequence between different forms of manufacturing “regimes” in the produc-
tion organization they followed. The forth revolution is encouraged by the Internet,
which allows communication between humans, as well as machines, controlled or
monitored by computer-based algorithms throughout large networks.
The definition of I4.0 proposed by Kagermann et al. [7] is very promising: “a new
level of value chain organization and management across the lifecycle of products”.
Applying the new paradigm, firms are willing to achieve a higher level of operational
efficiency and productivity, as well as of automation, not only using Internet tech-
nologies and advanced algorithms, but also adding value and managing knowledge
inside the production process. A major objective of this industrial strategy is the
simultaneous integration, within a single network, of large and small firms, helping
the latter to overcome the traditional lock-in access to new technologies.
Among the main pillars of I4.0 are digitization, optimization and customization
of production, automation and adaptation, human-machine interaction (HMI), added
value services and activities, automatic data exchange and communication. The theo-
retical foundations of I4.0 have the great advantage of scalability (Cloud Computing),
which it makes possible to increase or decrease the use of resources, according to
the production schemes. Other added value are interoperability, i.e. the ability of two
systems to understand each other to use functionality of one another, virtualization,
decentralization, real-time capacity, service orientation and modularity [8].
Although I4.0 produces value creation results, by gains in productivity and effi-
ciency, developing “new” business models, it could have both, positive and negative
effects, on employment and wages due to the disruptive outcome of the technological
change on the labour market. Technological progress biased toward hi-specialization
(or skill biased) can lead, at the same time, to a higher wealth effect on behalf of a
low number of people, where substantially reducing the employment opportunities
of others. Today, automation systems can easily replace repetitive jobs at a much
lower cost per hour than a worker salary.
1 The form of numbering (4.0) it uses, the same as for software release, emphasizes more both the
high computer content, and the digital character of this revolution.
Industry 4.0 and the Global Digitalised … 191
1. Supply chain and logistics: technology and IoT, in particular, improve supply
chain efficiency by providing more detailed and up-to-date information, miti-
gating the “bullwhip effect”, reducing supply chain inefficiencies with adequate
forecasts, and lessening copying due to product traceability [9];
2. Security and privacy: since all devices are wireless, they are highly exposed
to information intrusion. The growing global networking increases the need to
protect industrial systems, production lines, and plants from cyber-attacks. The
data transfer and their storage in the cloud must not be subject to unauthorized
access;
3. Intelligent infrastructure: “smart” devices improve flexibility, reliability and
efficiency in infrastructure operations. Here, the added value is in terms of
reduced operating costs and improved safety, and refers mainly to smart, cost-
efficient, high capacity, user-friendly transportation infrastructures, smart cities,
and intelligent mobility management;
4. Healthcare: sensors, integrated in domotics environment or smartphone applica-
tions, screen patients and send information to specialists. They are integrated in
many different “things”, and are able to generate and transmit “granular” infor-
mation in real time through software and hardware technologies using Big Data
and automatic systems, thus improving the quality and variety of the offer. The
result is a positive network effects with increasing returns from data production,
as in all markets where knowledge comes from them [10]. Big Data Analytics,
for example, transform data into soft information in real time, which, applying
automation and artificial intelligence techniques, favours decision-making [11].
The integration and real-time analysis of a huge amount of data will optimize
resources in the production process, and enable better performances. The develop-
ment of algorithms to manage data is one of the main challenges of I4.0, as the perva-
sive integration of ICT into production components always generates also larger,
different data sets. By facilitating information and knowledge, the IoT improves
the efficiency and effectiveness of knowledge development and management in
I4.0. Therefore, manufacturers and retailers will not dominate production decisions.
Instead, customers will be more involved in quality decisions and product customiza-
tion. The disadvantages of heterogeneous data will compromise industrial develop-
ment, but Big Data management (data mining, data classification and data storage)
can help to mitigate the problem [12]. The use of artificial intelligence in produc-
tion processes involves an innovation in terms of organizational culture. It increases
creativity and result orientation. Moreover, Háša and Brunet-Thornton [13] argue that
managerial innovation involves fast time-to-market approaches through the creation
of intelligent, flexible and qualified production structures, suitable for overcoming
risky and heterogeneous step-by-step markets. It is therefore essential to implement
qualified strategies for human capital formation, so that not only the manager, but
also the entire workforce will be competitive.2
2 Schneider and Spieth [14] sustain that the innovation of business models is a relevant source of
unique sales proposals and strategic differentiation in highly competitive market contexts.
Industry 4.0 and the Global Digitalised … 193
According to the traditional paradigm of the value creation process based on a strict
good-dominant logic, large firms are more competitive in R&D capabilities and
complementarities, therefore are able to outperform small firms. The in-house activ-
ities are the most important source of innovation that validates the existence of a lock
in closed innovation model. The consumer-agent remains outside the enterprise and
does not contribute to co-create new value for the manufactured output, tangible or
intangible. However, over the past several decades, new perspectives have emerged
that have a revised logic focused on intangible resources, the co-creation of value,
and relationships. The globalization process with the opening to the outside world
has its advantages. In a global market with a rapid circulation of knowledge flows,
rich in venture capital and in massive labour mobility, firms could not indeed afford
to innovate themselves. The service-dominant (S-D) logic becomes prominent due
to the increasingly use of data-intensive technologies. As a result, open innovation
systems arise [15].
A closed innovation model is based on innovations developed exclusively by firms
themselves; it is costly and requires control. The innovation process is only settled
within clearly defined company boundaries, as it is (and remains) an internal action
where R&D investments are a strong entry barrier to outsider competition. When
the innovation process opens up beyond company boundaries, from the generation
of ideas to development and marketing, innovation arises through the interaction
of internal and external ideas, taking advantages of the potential strategic use of
the environment, technologies, processes and sales channels [16]. In both cases, the
aim of the firm is the same: to develop promising innovative products, services or
business models, in order to increase one’s own innovation. It is an example of nice
collaborative networking made by the integration of science and technology.3
In a global market with a rapid circulation of knowledge flows, abundant presence
of venture capital and labour mobility, firms could not afford to innovate themselves.
Gassmann [17], and subsequent theoretical papers, considers open innovations as
fundamental, especially for management innovation; Lichtenthaler [18] recalls that
the existence of a new paradigm for open innovation implies either technology
exploitation, or technology acquisition. This is true for small firms too [19]. Networks
are able to use outside knowledge for a specific need of internal network enterprises,
without passing for the internal vertical integration. In this context, I4.0 could be
crucial in SMEs development. I4.0 could be of help by improving the flow of infor-
mation across the entire system, allowing better control and real time adaptability to
the demand. However, despite the tools of I4.0 requiring large investments and a high
level of competence [20], the decentralization of information and decision-making
3 Among the determinants that leads to the open innovation logic, Chesbrough [16] clearly specifies
the increasing mobility of workers and the division of labour. In the last decades, the technological
success of several open source software, such as web applications and operating systems apps
(Android and iOS), has played an important role in spreading open innovation culture.
194 G. Morelli et al.
would allow SMEs with a greater flexibility and competitive capacity, and a better
managerial capabilities.
Finally, the conceptual paradigm of I4.0 can also be used to transform the nature of
products and services provided by organizations. Porter and Heppelmann [21] explain
how artificial intelligence change the current process control system, overcoming the
traditional approach to production planning and control, and reaching different levels
of performance. Setting simple monitoring tools help to reach the most complex
goals. Since each level requires investments and specific skills, it is essential to
classify I4.0 initiatives in terms of the desired goal to which a given management
capacity corresponds. To this end, I4.0 initiatives for SMEs can be implemented
through technological groups (Internet of objects, Big Data or Cloud Computing
(CC)), in which each of them represents different means to implement the desired
capacity [4].
In order to improve the instrumental skills of SMEs, a three-step process could
be undertaken: monitoring (analysis of the decision-making process); control (use
of algorithms for historical data analysis); optimization and autonomy (analysis of
monitoring data and consequent autonomy of behaviour). Furthermore, since perfor-
mance indicators are expression of corporate strategies, SMEs could improve their
indicators (lower costs, better quality, greater flexibility and productivity, reduction
in delivery times) resorting to technological investments [22].
One of the main goals of I4.0 is the synchronization of flows along the entire
supply chain (flexibility). CC platforms should be used as collaboration structures
between firms [23]. Bonfanti et al. [24] show that Italian artisan enterprises and small
businesses who introduced and implemented new digital tools (e.g. 3D digital model)
recorded a reduction in operational costs, and an increase in production demand. On
the one hand, CC is widely used between SMEs (e.g. document sharing, servicing,
collaboration, distributed production, and resource optimization). In practice, CC
platforms introduce a new business culture, from corporate individuality to network
sharing between partners, moving first from partner search, to risk sharing, to the
CC platform at the end. There is evidence that Italian artisan firms use CC to offer
products and services online, thus strengthening customer loyalty and providing
access to new markets.
With respect to productivity, an increase could take place at the plant level, or
at the level of calculation (algorithms) of the production plans forecasting internal
flow disturbances and changes in customer requests, or calculating algorithms based
on IoT data on a CC platform. Its use shortens design time, promotes collabora-
tion between all network partners, and facilitates the synchronization of the entire
production processes. Concerning the use of Big Data in I4.0, Ren et al. [23] suggest
a CC platform dedicated to SMEs that exploits IoT data using MapReduce algo-
rithms. However, due to the their traditional low investment in R&D, there are no
successful cases for the planning or control of production processes through the use
of these technologies which help to organize data. Simulation models for SMEs have
also been proposed. Barenji et al. [25] present a method (Prometheus) to develop a
software application for planning simulation, based on both dynamic demand, and
production variations. Denkena et al. [26], on the contrary, start from the idea that
Industry 4.0 and the Global Digitalised … 195
most SMEs do not have reliable data to introduce the IoT and RFID technology to
manage the flows and facilitate the implementation of Lean Manufacturing. Constan-
tinescu et al. [27] develop the Just In Time Information Retrieval (JITIR) to eliminate
the problem of excess data that flow into the IoT. In relation to CPS (Cyber physical
systems), or complex systems that incorporate processing algorithms, the cases of
applicability to SMEs are known. Givehchi et al. [28] refer that SMEs apply CPS for
production planning and control, although the low level of their internal skills, and
consequently the lack of ability to process complex algorithms, remains a constraint.
The network of legally independent organizations that share common skills in order
to exploit a business opportunity are identified as virtual companies. Collaborative
Manufacturing [29] and Collaborative Development Environments [30] are important
for SMEs strategies since they increase flexibility. In a collaborative network, risks
can be balanced and combined resources expand the range of perceivable market
opportunities. The organization in networks amplifies the available capacities without
the need for further investments. Therefore, firms in collaborative networks can adapt
to volatile markets and reduce product life cycles with ease.
A strong coordination capacity is needed to aggregate spatially separate produc-
tion processes and to integrate information (data) that comes from the different
production sites. Clusters of SMEs, and networks in particular, manage to imple-
ment product and process innovation, resulting in “open winners”, as the case of the
industrial districts. The availability of product data throughout the network is essen-
tial for the global optimization of the production processes. The maintenance of the
global competitive advantage occurs for the enterprises in collaborative networks,
for the single unit through the maintenance of the basic competences, for the group
through the externalization of other activities.
The key features of networks are generative knowledge and cognitive clusters
(accessible from anywhere). However, in the era of I4.0, the operating chains that
manage the multilocalized and interconnected transformation of intangible products
and services could represent the key feature. If the more technological sectors seem
to be able to cope well with the FRI, also the Italian manufacturing industry seems
to organise itself to the transformation and innovations imposed by the markets.
The creativity and flexibility of man will be an added value: therefore the study
and analysis of systems for the valorisation of people in factories remains of great
relevance. The new evolution will not only touch all industrial sectors, as it embraces
transversal technologies, but it will have a strong impact on processes and products.
The main problem related to virtual networks is information sharing, as
leaders/owners of SMEs do not share information they preserve [31]. Therefore,
while, on one hand, information sharing can lead to innovation, on the other it could
generate asymmetric action due to opportunistic behaviour (learning tenders), and
higher coordination costs resulting from antagonisms and competition between firms.
196 G. Morelli et al.
Along with FIR characteristics, one of great relevance is the convergence between
industrial production technology and science, which allows entrepreneurs the oppor-
tunity to choose tools that are more suitable, i.e. those offered by their integration, to
gain a better competitive position in the “new” value chains. Innovation, as the result
of science and technology integration, is a crucial element for the development of
the global industry.
Recently, the Italian Ministry of Economic Development, in order to spread I4.0
culture, identifies three different areas for policy actions. These are the scientific
Industry 4.0 and the Global Digitalised … 197
Table 1 Italy. Firms’ actions for facing the lack of I4.0 skills, 2017 (in %)
Size classes in number of persons employed (%)
1–9 10–49 50–249 +250 Totala
New employees 11.1 33.7 50.7 55.7 17.7
Qualification of workers 37.2 60.1 69.0 78.8 43.6
External collaborations 35.9 42.1 47.7 43.3 37.7
No actions 32.0 10.8 5.7 3.2 26.2
Source Elaboration on Italian Ministry of Economic Development (2018, Table 4.10)
a In Table 1, the total exceeds 100% because the interviewed firms involved in the survey had the
projects, at regional level). In the period 2017–2020, thanks to I4.0, incentives for
13 billion Euros have been allocated to firms to be invested in technologies in order
to qualify them with the high skills required. According to a survey of the Italian
Ministry of Economic Development (IMED), a large number of firms used human
capital training (43.6% of the answers), and preferred outsourcing solutions (37.7%)
to overcome the obstacles in the application of I4.0 (Table 1).
Only less than one third of all responses (26.2%) provided by the firms confirmed
that they have not yet implemented any corrective action, while a 17.7% of the
respondent decided to hire new employees. Indeed, from a dimensional point of
view, some substantial differences emerge. Larger firms are more reactive; they rely
mainly on staff training and new employees, while micro and small ones, in addition
to training, use relatively more services and external collaborations. The smaller firms
(10–49 employees), accounting for less than 11% of the total, fail to take actions to
solve positively the “digitalization problems”; instead, only 11.1% of the micros
(1–9 employees) make new hires, while 32% choose not to take action.
Following the IMED survey, in 2017, the so-called “I4.0 firms”, because of the
adoption at least of one of the new technologies considered in FIR, cover only 8.4%
of the entire population of active enterprises in industry, excluding construction,
substantially differing from 86.9% representing the traditional firms that do not use
new technologies and confirmed not to be intended to use it in the next three years.
Data concern a well-structured, small but representative sample of 23,700 industry
and service firms of different sizes distributed throughout the country. At regional
level, I4.0 technology is more widespread in the Northern and Central Italy (in italics
related data for these macroareas); Piedmont (11.8%), Veneto (11.7%), Trentino
(10.9%) and Emilia Romagna (10.6%) stand out, both in 4.0 “smart manufacturing”,
and in firms that have planned to introduce 4.0 technological actions (Table 2).
On the other hand, the innovation of intelligent production systems faces limits
due to the rapid migration of data, the integration of new systems in existing produc-
tion facilities and databases (which already have very high entry costs). Concerning
organization, the main problem is that intelligent systems based on decentralized
and automated self-organization collide with the traditional organizational scheme of
production, causing paradox of (organizational) inertia. SMEs with limited resources
Industry 4.0 and the Global Digitalised … 199
Table 2 Italy. I4.0 technology disseminations by selected regions and macroareas (in italics) (%),
2017
Regions Traditional firms Traditional firms with planned I4.0 measures I4.0 firms
Piedmont 81.8 6.4 11.8
Lombardy 86.1 4.2 9.7
Trentino A.A. 83.9 5.2 10.9
Veneto 80.5 7.8 11.7
Friuli V.G. 86.4 4.1 9.5
Northern Italy 85.8 4.7 9.5
Tuscany 92.1 3.3 4.3
Marche 89.5 3.5 7.0
Lazio 86.7 5.3 8.0
Central Italy 89.5 3.8 6.5
Abruzzi 89.4 3.7 6.9
Molise 88.3 3.0 8.7
Apulia 90.2 5.1 4.6
Calabria 88.3 4.8 6.8
Sicily 91.0 2.0 7.0
Southern Italy 89.8 3.7 6.3
Italy 86.9 4.7 8.4
Source Elaboration on Italian Ministry of Economic Development (2018, Table 4.2)
could fail in a “smart” factory perspective, but networking would allow sharing and/or
training of the necessary skills. With respect to the geographical macro-areas, the
South shows a higher proportion (89.8%) of traditional firms compared to a below
country average of 85.8% in the North, with more than three points higher percentage
(9.4%) due to the presence of I4.0 firms than in the South. Southern and Central Italy
differ slightly from the North due to firms that have introduced I4.0 measures.
Technology, machines and algorithms complete human work in data and infor-
mation processing, technically supporting humans for some complex assignments
integrating numerous physical and manual tasks. Nowadays, the limit of machines
and algorithms concerns some work activities with high communication and inter-
action. Therefore, where for some fields it is possible (Fig. 2: Information and data
mining, job related information, technical activities performing, and so on) to foresee
that in the near future machines and algorithms can increasingly replace human work,
for others (Fig. 2: Administering, Managing and Advising), this substitution is not
so easy. Some work tasks have thus far remained overwhelmingly human.
According to the World Economic Forum (WEF 2018) estimates, the information,
processing and transmission of an organization’s data and research activities will be
performed by automation technology with a potential average increase (30%) of
labour productivity in all sectors.
200 G. Morelli et al.
Since I4.0 represents an opportunity for firms to compete at increasing speed, the
challenge will consist in the ability to apply the 4.0 paradigm also to the intentional
and decision-making processes of men. Although I4.0 may lead to a decrease in the
employment levels of less qualified workers, higher skills can stimulate competition.
Big Data and algorithms could allow testing new products and services on
customers anywhere in the world, customizing the company offer, reducing devel-
opment costs, product launch and adaptation. The growth of digital platforms for
product distribution (e.g., Amazon) can facilitate the entry of small businesses into
global markets. On an institutional level, new internal and external structures must
emerge that are suitable for the regulation of a more complex reality where, within
the smart manufacturing, products, people and machines can be related via internet
and interact simultaneously. The result, at the industrial policy level, is a reduction
in organizational costs as integrated firms, since hierarchies are able to better control
the production process at all levels thanks to the increasingly complete integration
between science and technology.
Industry 4.0 and the Global Digitalised … 201
Some interesting features arise from the analysis of WEF 2018 survey data. I4.0
disrupts as well as creates jobs for improving both, productivity and quality, of
existing work of human employees. Figure 2 shows the projections of hours worked
by man and machine in the period 2018–2020 explaining the potential of new tech-
nologies towards jobs innovation. At a first reading, data on human labour indicate a
decrease in almost all the economic sectors. The most involved are Information and
data processing, Job related information, Identification of job relevant information
and Technical activities performing, and in general those which require a highly
automation processes, where the presence of man can be easily partially replaced
by the machine. On the contrary, the predominance of man over the machine would
persist in the planning and strategic sectors (e.g. managing and advising; reasoning
and decision making) where, despite an expected absolute decrease in human pres-
ence over the period, it is possible to believe that the complete machine-man substi-
tution cannot take place as they are areas in which human abilities still act as a
fly-wheel.
6 Conclusions
In the new competitive environment, I4.0 has been changed competition scheme, as
the competitive phenomenon also extends to supply chains. Innovation and time, i.e.
the frequency by which new or significantly updated product versions are introduced,
denote the real competitive advantage, as they have an insightful effect on the life
cycle of outputs, changing the firm production and organizational structure.
What are the major changes? When a firm uses I4.0 tools, it assumes that it is
open to cultural changes, to operate new management strategies. Men and machines
have an essential role in doing this. The acquired knowledge that represents the
“social capital” of the firm, using Big Data and the IoT, is able to compete in a global
perspective, in which the value chain of production changes radically. Consequently,
smart firms will face a persistent increase in the knowledge content of outputs,
strengthening the prominence of intangible assets in production. The main reasons lay
in the increase in the extent of the market induced by globalization that pushes firms to
boost the knowledge content of products, including more innovation, so to remodel
them frequently and exploit new competitive advantages [34]. A consequence is
the changes in the international economic scenario, which have gradually shifted the
foundations of industrial competitiveness from a static to a dynamic cost competition
that companies attempt to implement, improving their learning skills and creating
knowledge faster than the competitors do.
Such an increasingly complex competitive setting has its origins in different
phenomena such as market globalization, continuous socio-cultural changes,
political-financial instability and the increasingly abrupt development of new tech-
nologies. These events are inevitably leading to a significant improvement in the
ability of firms to innovate their production processes, goods and services, and to
approach new markets in a new and unconventional way.
202 G. Morelli et al.
The division of labour will be still affected: the decrease of employees in manufac-
turing is likely to continue as machines will replace workers, and the remaining ones
must be qualified to a higher level of education and capabilities in order to handle the
new technologies. Unfortunately, many Italian firms, especially of medium-small
size, are still vulnerable to face the new challenge and show a severe handicap
compared to their foreign competitors. It seems they are far from understanding
the ongoing culture according to which “smart” factory opens outward using new
model and dimensions, superior to those previously known. The firm becomes an
“open place” that looks to the future, closely connected to the territory, the research
system, the entire community.
Skills gaps in human capital formation remain one of main problem of Italy, both
with respect to workers and managers. This lack would accelerate in some cases the
trends towards automation, but it also block the adoption of new technologies and,
therefore, hinder business growth. A solution might be both investments in the forma-
tion of specific skills, suitable for worker recycling, and in favouring collaborative
practices between small firms. The changes due to the introduction of new technolo-
gies aim to increase labour productivity in all sectors, in order to move competition
among firms from the reduction of the labour cost to the ability of exploiting new
technologies to integrate and improve human work. The traditional business models
are under stress, and the technological progress open the opportunity for the firms to
reduce working time and to grow and expand rapidly.
In order to spur innovation within emerging sectors fostering development, new
industrial policies are needed: they will involve activities where knowledge networks
are still weak and concern to the open question that technological and digital diffusion
entails. Moreover, the FIR has bounded new paths in the mobility of workers and in
the international division of labour. A further research direction that has not yet fully
tested and explained might be the total effect on the labour market, since it is still
persistent a deep heterogeneity and asymmetry in human capital formation among
countries. The introduction of suitable strategies to favour new relationships between
manufacturing and services following the theoretical scheme of S-D logic will play
an important role, as well as strategies for a more complete international opening.
References
1. Arntz, M., Gregory, T., & Zierahn, U. (2016). The risk of automation for jobs in OECD coun-
tries: A comparative analysis (OECD Social, Employment and Migration Working Papers No
189). Paris: OECD Publishing.
2. Baldwin, R. (2016). The great convergence: Information technology and the new globalization.
Cambridge: Harvard University Press.
3. Acemoglu, D., & Restrepo, P. (2018). The race between machine and man: Implications of
technology for growth, factor shares, and employment. American Economic Review, 108(6),
1488–1542.
4. Danjou, C., Rivest, L., & Pellerin, R. (2016). Industrie 4.0: des pistes pour aborder l’ère du
numérique et de la connectivité [Industry 4.0: Paths to the Era of Digital and Connectivity].
CEFRIO.
Industry 4.0 and the Global Digitalised … 203
5. Roblek, V., Mesko, M., & Krapez, A. (2016). A complex view of industry 4.0. SAGE Open,
6(2), 1–11.
6. Bianchi, P., & Labory, S. (2018). The political economy of industry. In I. Cardinale & R.
Scazzieri (Eds.), The Palgrave handbook of political economy (pp. 1–36). London: Palgrave
Macmillan.
7. Kagermann, H., Helbig, J., Hellinger, A., & Wahlster, W. (2013). Recommendations for imple-
menting the strategic initiative INDUSTRIE 4.0: Securing the future of german manufacturing
industry (Final Report of the Industrie 4.0 Working Group). Frankfurt: National Academy of
Science and Engineering, Federal Ministry of Education and Research.
8. Schumacher, A., Erol, S., & Sihn, W. (2016). A maturity model for assessing industry 4.0
readiness and maturity of manufacturing enterprises. Procedia CIRP, 52, 161–166.
9. Flügel, C., & Gehrmann, V. (2009). Intelligent objects for the internet of things: Internet of
things—Application of sensor networking logistic. In H. Gerhäuser, J. Hupp, C. Efstratiou,
& J. Heppner (Eds.), Constructing ambient intelligence, communications in computer and
information science. Berlin: Springer.
10. Pang, Z., Zhengb, L., Tianb, J., Walterc-Kao, S., Dubrovab, E., & Chen, Q. (2015). Design
of a terminal solution for integration of in home health care devices and services towards the
internet-of-things. Enterprise Information Systems, 9, 86–116.
11. Quaglione, D., & Pozzi, C. (2018). Big data economics: The features of the ongoing debate
and some policy remarks. L’industria, Rivista di Economia e Politica Industriale, 34(1), 3–16.
12. Morelli, G., & Spagnoli, F. (2017). Creative industries and big data: A business model for
service innovation. In S. Za, M. Dragoicea, & M. Cavallari (Eds.), Exploring services science.
Berlin: Springer.
13. Háša, S., & Brunet-Thornton, R. (Eds.). (2017). Impact of organizational trauma on workplace
behaviour and performance. Hershey: IGI Global.
14. Schneider, S., & Spieth, P. (2013). Business model innovation: Towards an integrated future
research agenda. International Journal of Innovation Management, 17(01), 15–27.
15. Bellini, F., & D’Ascenzo, F. (2018). L’evoluzione dei modelli di produzione nella logica
della co-creazione di valore. In F. D’Ascenzo & F. Bellini (Eds.), Produzione, Logistica e
Trasformazione Digitale. Padova: CEDAM.
16. Chesbrough, H. (2003). The era of open innovation. MIT Sloan Management Review, 4(33),
35–41.
17. Gassmann, O. (2006). Opening up the innovation process: Towards an agenda. R&D
Management, 36(3), 223–228.
18. Lichtenthaler, U. (2008). Open innovation in practice: An analysis of strategic approaches to
technology transactions. IEEE Transactions on Engineering Management, 55(1), 148–157.
19. Lecocq, X., & Demil, B. (2006). Strategizing industry structure: The case of open systems in
low-tech industry. Strategic Management Journal, 27, 891–898.
20. Ruessmann, M., Lorenz, M., Gerbert, P., Waldner, M., Justus, J., Engel, P., & Harnisch, M.
(2015). Industry 4.0: The future of productivity and growth in manufacturing industries (Vol.
9). Boston: Boston Consulting Group.
21. Porter, M., & Heppelmann, J. E. (2014). How smart, connected products are transforming
competition. Harvard Business Review, 92, 64–88.
22. Raymond, L. (2005). Operations management and advanced manufacturing technologies in
SMEs. Journal of Manufacturing Technology Management, 16, 936–955.
23. Ren, L., Zhang, L., Tao, F., Zhao, C., Chai, X., & Zhao, X. (2015). Cloud manufacturing: From
concept to practice. Enterprise Information Systems, 9, 186–209.
24. Bonfanti, A., Del Giudice, M., & Papa, A. (2018). Italian craft firms between digital manu-
facturing, open innovation, and servitization. Journal of the Knowledge Economy, 9(1),
136–149.
25. Barenji, A. V., Barenji, R. V., Roudi, D., & Hashemipour, M. (2017). A dynamic multi-agent-
based scheduling approach for SMEs. The International Journal of Advanced Manufacturing
Technology, 89(9–12), 3123–3137.
204 G. Morelli et al.
26. Denkena, B., Schmidt, J., & Krüger, M. (2014). Data mining approach for knowledge-based
process planning. Procedia Technology, 15, 406–415.
27. Constantinescu, C., Mattoo, A., & Ruta, M. (2015). The global trade slowdown. Critical or
structural? (Policy Research Working Paper 7158). World Bank Group.
28. Givehchi, M., Haghighi, A., & Wang, L. (2015). Generic machining process sequencing through
a revised enriched machining feature concept. Journal of Manufacturing Systems, 37, 564–575.
29. Lin, H. W., Nagalingam, S. V., Kuik, S. S., & Murata, T. (2012). Design of a global
decision support system for a manufacturing SME: Towards participating in collaborative
manufacturing. International Journal of Production Economics, 136(1), 1–12.
30. Mendikoa, I., Sorli, M., Barbero, J. I., Carrillo, A., & Gorostiza, A. (2008). Collabora-
tive product design and manufacturing with inventive approaches. International Journal of
Production Research, 46(9), 2333–2344.
31. Msanjila, S. S., & Afsarmanesh, H. (2008). Trust analysis and assessment in virtual organization
breeding environments. International Journal Production Research, 46(5), 1253–1295.
32. Dujin, A., Geissler, C., & Horstkötter, D. (2014). INDUSTRY 4.0: The new industrial revolution.
Munich: Roland Berger Strategy Consultants.
33. Frey, C. B., & Osborne, M. (2017). The future of employment: How susceptible are jobs to
computerisation? Technological Forecasting and Social Change, 114, 254–280.
34. Bianchi, P., & Labory, S. (2018). Industrial policy for the manufacturing revolution.
Cheltenham: Edward Elgar Publishers.
Managing Online Communities
and E-WOM: Prosumers’
Characteristics and Behaviors
in the Food Service Sector
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer 205
Nature Switzerland AG 2020
R. Agrifoglio et al. (eds.), Digital Business Transformation, Lecture Notes in Information
Systems and Organisation 38, https://doi.org/10.1007/978-3-030-47355-6_14
206 C. Dossena and F. Mochi
1 Introduction
Social media platforms provide extensive opportunities for consumers to share online
their evaluations about organizations, their products and/or services. In recent years,
an increasing number of opinion platforms, that offer consumers’ online reviews and
ratings, have been introduced. Opinion websites and social media platforms allowed
the arise of online communities in which users can spread their opinions and have
access to other people reviews (e.g. [1]), thus having a profound effect on consumers’
purchase decisions and behaviors.
Social media’s bi-directional communication characteristic develops large-scale
word-of-mouth (WOM) networks in online environments (e-WOM). Online reputa-
tion mechanisms allow the members of a community to submit their opinions, thus
influencing online corporate reputation. Online communities related to social media
are now available for many categories of products, including hotels, restaurants,
books, electronic goods, and games. In particular, for restaurants online communi-
ties are channels that connect potential diners with many other diners. Numerous
web sources enable users to easily spread their reviews and share their experiences
online, such as opinion platforms (e.g. TripAdvisor), social networks (e.g. Facebook)
and Google Reviews. In this way, everybody can access user-generated reviews even
more easily than in the past.
Online communities evolve during time and co-evolve with the daily contribu-
tions of users, thus constantly changing. In this sense consumers are now defined as
prosumers (i.e. people that are both consumers and users and that are co-creator of
contents [2]). This aspect and the widespread of e-WOM, highlight the relevance of
an effective online community management and the awareness that social media are
now essentials tools for business [3, 4].
Currently, some authors have investigated the e-WOM phenomenon, the content
of reviews, their credibility and trustworthiness in the hospitality industry (e.g. [2,
5]). However, to our knowledge only few works focused on the food service sector
(e.g. [3]). Moreover, in literature there is a lack of studies that focus on users’ profiles,
their characteristics and online behaviors.
This research aims to better understand the prosumers’ use of social media such
as choosing a restaurant and/or reviewing it online. In particular, we want to inves-
tigate if prosumers’ features or habits, such as frequency of going to a restaurant, or
willingness to try new restaurants can influence their use and perception of social
media, such as looking for information, writing feedbacks, and trust online reviews.
The study is explorative, thus the methodology that we used is an explorative
survey to assess the main topics of interest concerning prosumers’ behaviors in
searching for restaurants and rating their experience, especially considering the use
of social media and digital devices.
Managing Online Communities and E-WOM: Prosumers’ … 207
2 Theoretical Framework
social media that seemed more used by customers when choosing the hotel [16,
17], however we still do not know the prosumers’ preferences concerning the food
service sector. In the food service literature there are some studies that investigate how
different social media are able to make big data analytics useful both for the customers
and the restaurant managers [18], however only few contributions investigate which
are the main social media platforms used by prosumers and how they impact their
consumption behaviors.
Researchers also start to investigate the content of reviews, their credibility and
trustworthiness. To quantify the credibility of reviewers, [19] we consider two key
dimensions: expertise and trustworthiness of the reviewers, which can be extracted
from reviewers’ contribution histories and number of helpful votes [20]. Previous
research shows that positive and negative reviews are perceived differently in the
level of trustworthiness: negative reviews are usually perceived as more reliable than
positive ones [21]. However, at the stage of evaluating the gathered information,
people perceive as more important the negative information they have gained about
the products and services and consider them more meticulously than positive infor-
mation [22, 23]. Customers may attach more importance to negative information in
order to be prepared in advance for certain negative characteristics of the purchased
products and services.
Previous managerial literature informed us about certain prosumers’ behaviors
such as searching information on particular social media platforms (e.g. Facebook
and TripAdvisor) [18] or rely more on negative comments and reviews than on
positive ones [21, 23]. However, at the best of our knowledge, literature does not
consider the influence of prosumers’ characteristics and the impact on their choices
and behaviors. In particular, we are interested in exploring if people that frequently
goes to the restaurant have a different approach to social media being more inclined to
use them both for gathering information and for reviewing their experience. Similarly,
we want to analyze if prosumers that have an “explorative” behavior (i.e. enjoy to
frequently try new restaurants), use social media differently from prosumers that have
a “loyal” behavior, i.e. that choose the same and familiar restaurants. Indeed, previous
research shows that restaurants can strategically engage “loyal users” and convert
them to advocates and serve as “hubs” for users who trust friends’ recommendations
[12].
Our paper is thus exploratory and aims at understanding if there are some charac-
teristics or habits that can influence prosumers’ behavior and choices and how this
can impact the restaurants owners and other prosumers.
3 Methodology
The aim of the study is explorative, thus the methodology that we used is an explo-
rative survey to assess the main topics of interest concerning prosumers’ character-
istics and behaviors in searching information about new restaurants and rating their
experiences.
Managing Online Communities and E-WOM: Prosumers’ … 209
or not be seen to give what they perceive to be a socially unacceptable answer (for
discussion about the Likert scale points see [33, 34]).
In the second analysis, we divided the sample in 4 groups depending on their
willingness to try new restaurants, the first group is composed by Millennials that
do not want to try new restaurants, but trust the few that they already know (we will
call them the “loyal” prosumers), while the fourth group is composed by Millennials
that always want to change the restaurant and try new ones (we will call them the
“explorer” prosumers) (Fig. 2).
The single items dependent variables used a 4-points Likert scale and concern the
mean of research of information about restaurants, the willingness to read positive
and negative comments to understand the restaurant strength and weaknesses, the
willingness to move with cars (30 km) to try a restaurant with good online reviews,
the tendency to compare the experience with those made by others, the willingness
to write a review and to use social media for making a reservation and ordering food
delivery.
First of all, from our descriptive statistics, we found that 92.4% of our sample use
Internet to search information at least once a day, so they are all proficient in using the
web. Furthermore, 96.2% of our sample use the mobile device to search information
about restaurants, thus confirming the literature about the relentlessly trend of use
mobile devices for searching information that overcome the use of laptop and PC
[6].
In the first analysis the sample was divided in 4 groups depending on the frequency
of going to the restaurant (form never to always/every day), however, as stated before,
no one responded “never”, thus the results that we present show only 3 groups.
We ran multiple one-ways ANOVAs in order to explore our data (Table 1).
ANOVAs results show us that prosumers in our sample mainly use Facebook
(p-value = 0.021) and specialistic blogs (p-value = 0.009) to search for informa-
tion about a restaurant, however we have found non-significant the use of restaurant
website and comparison platforms such as TripAdvisor and the Fork. Probably for
those social media platforms the differences in mean among the groups are non-
significant, i.e. they all use those social in a similar way and frequency. Those results
partially contrasted with the literature that assessed that both Facebook and TripAd-
visor were the most used platforms in the hospitality industry [16, 17, 35]. Results
also show that the more you are inclined to go to the restaurant the more you rely on
social media as information tool as the significant means differences among groups
can show. Results on Table 1 show that people that have a higher score in going
to restaurants for lunch or dinner (group 2 and 3), have a higher mean score in
checking the reliability of online reviews (p-value = 0.05). Therefore, prosumers
that frequently go to a restaurant significantly exploit online opinions but also have a
more careful approach in trusting online reviews. Furthermore they are more willing
to compare their experience with the reviews of others after having lunch or dinner
(p-value = 0.042), i.e. their ‘online experience’ is not limited to the phase before the
dinner (to search information) but it keeps on also after having dinner, in order to
confirm their opinions. Similarly, those people are also the ones that more frequently
write a review after their experience at the restaurant (p-value = 0.026). Lastly,
the results show that the more the prosumers go to restaurants the more they use
social media not only for acquiring information and write reviews, but also to make
reservation (p-value = 0042) and to exploit the food delivery options (p-value =
0.000).
From these results we can infer that prosumers that frequently go to the restaurant,
strongly rely on information found on social media platforms and e-WOM as their
decision will influence not only an occasional night, but probably every day since
they often or always go to restaurant. They are also prone to exploit social media in
an active way for various purposes such as sharing their experience or use them to
reserve a table.
Starting from these results, we deepened our investigation by dividing the sample
in a different way. As the previous results show us that the people who frequently go
at restaurants are also those that are more proactive on social media, we decided to
compare the behaviors of people that frequently change restaurant (the explorer ones)
with people that are not so willing to change (the loyal ones). We run a series of one-
way ANOVAs where the independent variable is multi-categorical and composed by
4 groups depending on the participants’ frequency of trying new restaurants (Table 2).
Therefore, the sample were divided in 4 groups, from 1 = almost never change the
restaurant, to 4 = almost always change the restaurant. This distribution of the sample
allows us to understand and compare the behaviors of the people that are very loyal
to a single or few restaurants with those that always want to change the choice of the
restaurant and are prone to try new ones.
First of all, as shown in Table 2, we again found the significance of searching
information about a restaurant on specialistic blogs (p-value = 0.043) as well as
on general blogs (p-value = 0.033), the search on other social media was found
Managing Online Communities and E-WOM: Prosumers’ … 213
Table 2 Prosumers’ behavior comparison depending on their frequency of trying new restaurants
Dependent variables Groups Mean Standard deviation Significance
Search for information on 1 2.00 1.732 0.043
specialistic blogs 2 1.68 0.830
3 1.75 0.856
4 2.23 0.922
Search for information on 1 2.33 1.528 0.033
non-specialistic blogs 2 1.44 0.695
3 1.52 0.730
4 2.27 1.120
Search for information on 1 2.33 1.528 0.204
comparison platforms (e.g. 2 3.07 0.856
TripAdvisor, the Fork) 3 3.21 0.828
4 3.18 0.853
Search for information on 1 2.00 1.732 0.108
social media (e.g. Facebook) 2 1.64 0.781
3 1.82 0.789
4 2.05 1.046
Read positive comments to 1 2.00 1.00 0.045
understand the restaurant 2 3.31 1.014
strengths 3 3.32 1.065
4 3.73 1.985
Read negative comments to 1 2.00 1.00 0.043
understand the restaurant 2 3.50 1.930
weaknesses 3 3.60 1.117
4 3.86 1.082
Willing to move 30 km to eat 1 1.67 1.155 0.013
in a restaurant with good 2 2.39 1.211
reviews 3 2.58 1.305
4 3.52 1.555
Comparing experience online 1 2.00 1.732 0.000
after being in a restaurant 2 1.33 0.566
3 1.65 0.784
4 1.95 0.844
Write a review after being in a 1 2.00 1.732 0.000
restaurant 2 1.38 0.587
3 1.70 0.719
4 2.00 0.926
Use social media to make a 1 1.33 0.577 0.000
reservation 2 1.90 0.859
3 2.28 0.857
4 2.77 0.813
(continued)
214 C. Dossena and F. Mochi
Table 2 (continued)
Dependent variables Groups Mean Standard deviation Significance
Use social media for food 1 1.67 0.577 0.009
delivery 2 2.01 0.865
3 2.34 0.920
4 2.45 1.011
N = 315; Groups: 1 = Mainly go to familiar restaurants (n = 3), 2 = Occasionally go to new
restaurants (n = 112), 3 = often go to new restaurants (n = 178), 4 = Always go to new restaurants
(n = 22)
not significant probably because every group use other social media (Facebook,
TripAdvisor, Google Review) at a similar intensity.
However, we found significant differences in means among groups concerning the
attention to positive and negative comments and reviews. It seems that the more you
are willing to change restaurants and try new ones, the more is the attention towards
both positive comments (p-value = 0.045) and negative ones (p-value = 0.043).
Positive comments are read in order to understand the strengths of a restaurant,
while negative ones are taken into count in order to understand the weaknesses of
the restaurant. This is partially in contradiction with previous literature that stated
that negative reviews are the most taken into count and perceived as reliable [21].
Furthermore, the more the people assume an “explorative” behavior, always trying
new restaurants, the more they are prone to go far away (at least 30 km) in order
to reach restaurants that have very good reviews (p-value = 0.013). In this case the
differences in means among groups are very strong showing an exponential increasing
of the willingness to go far for those that always want to try new restaurants (mean
= 3.52) particularly if compared with those that prefer the familiar ones (mean =
1.67).
Results show that participants that love to change restaurants and those that
trust only few well known one share a similar behavior as they both compare, post
consumption, their experience with those shared online by other users by looking at
reviews or comments (p-value = 0.000, mean group 1 = 2.00; mean group 4 = 1.95)
even more than the groups with preferences in between (mean group 2 = 1.33; mean
group 3 = 1.65).
The results show similar conclusions about writing online reviews. The ones that
write the most are those that are loyal to few restaurants (mean group 1 = 2.00),
probably they post positive reviews to promote the restaurant they love, and those
that always change their restaurant choice (mean group 4 = 2.00; p-value = 0.000).
Lastly, again, it seems that the more you are an “explorer” of restaurants the more
you use social media to make a reservation (p-value = 0.000) or to use the food
delivery option (p-value = 0.009).
Managing Online Communities and E-WOM: Prosumers’ … 215
5 Conclusions
Our research tries to develop two different literature, the social media literature
by considering social media platforms and online communities, and hospitality
industry literature, especially the food and beverage service sector, by considering the
prosumers’ behavior in choosing a restaurant and reviewing it. Furthermore, the paper
aims at investigating how prosumers’ characteristics or habits, i.e. the frequency of
going to a restaurant and of being prone to change restaurants, can impact the use
of social media platforms. Thus, also e-marketing literature can benefit from our
explorative study since it opens up a new debate on the prosumers’ profile.
The study, even if exploratory, can give some interesting suggestions also to prac-
titioners. Firstly, restaurant managers have to be aware that there are some prosumers’
characteristics or habits that influence their use of social media. For instance, restau-
rant managers should be aware that Facebook and specialistic blogs are social media
mainly used by prosumers that frequently go to the restaurant. Moreover, those people
that frequently go to the restaurant are prone to check the reliability of reviews
and also after the experience at the restaurant they tend to compare their experi-
ence with those of the others by re-screening the reviews. This means that people
that frequently go to the restaurants, and that probably are those more valuable for
restaurant managers, are also those that are more careful in checking comments and
reviews and that re-think and re-evaluate the restaurant experience even after the
lunch or dinner is over. Similarly, those people are the ones that actively use social
media platforms and also use them as a tool for simplifying their lives by using
online reservation apps or food delivery options thus evaluating those services tools
and expecting them from a restaurant. Lastly, restaurant managers should consider
that loyal customers and the “explorer” ones can perceive and use social media in
different ways. The explorer ones are more prone to consider both positive and nega-
tive comments and are willing to choose a restaurant that is far away if it has very
good online reviews. They are also those that are more active in using online reser-
vation tools and food delivery. However, the two groups (loyal and explorer) can
also show behaviors similarities, as they both are really inclined to write reviews
and to re-examine online comments after being at the restaurants. Restaurants can
strategically engage “loyal users” and convert them to advocates and serve them as
“hubs” for users who trust friends’ recommendations [12].
Our study presents some limitations, first of all the sample is composed only by
students, it could be interesting to develop the same study but with a less homo-
geneous sample in order to understand if differences in age, digital literacy, past
216 C. Dossena and F. Mochi
experience can influence the use of social media in terms of information research,
trust in reviews, writing of comments.
Furthermore, our research only considers few prosumers’ habits or characteris-
tics (i.e. frequency of going to a restaurant and willingness to change the restaurant),
but future research can consider other prosumers’ characteristics, also by involving
personal traits (e.g. openness to experience, extraversion) or competencies (e.g.
digital skills, communication skills).
Lastly, future research can also investigate not only the prosumers’ perspective
but also the influence of prosumers’ behaviors on restaurant managers.
References
15. Siuda, P., & Troszynski, M. (2017). Natives and tourists of prosumer capitalism: On the
varied pro-prosumer activities of producers exemplified in the Polish pop culture industry.
International Journal of Cultural Studies, 20(5), 545–563.
16. Jeacle, I., & Carter, C. (2011). In TripAdvisor we trust: Rankings, calculative regimes and
abstract systems. Accounting, Organizations and Society, 36(4), 293–309.
17. Scott, S. V., & Orlikowski, W. J. (2012). Reconfiguring relations of accountability: Materi-
alization of social media in the travel sector. Accounting, Organizations and Society, 37(1),
26–40.
18. Li, J., Xu, L., Tang, L., Wang, S., & Li, L. (2018). Big data in tourism research: A literature
review. Tourism Management, 68, 301–323.
19. Wang, Y., Chan, S. C. F., Leong, H. V., Ngai, G., & Au, N. (2016). Multi-dimension reviewer
credibility quantification across diverse travel communities. Knowledge and Information
Systems, 49(3), 1071–1096.
20. Lee, H. A., Law, R., & Murphy, J. (2011). Helpful reviewers in TripAdvisor, an online travel
community. Journal of Travel and Tourism Marketing, 28(7), 675–688.
21. Kusumasondjaja, S., Shanka, T., & Marchegiani, C. (2012). Credibility of online reviews and
initial trust: The roles of reviewer’s identity and review valence. Journal of Vacation Marketing,
18(3), 185–195.
22. Ahluwalia, R. (2002). How prevalent is the negativity effect in customer environments? Journal
of Consumer Research, 29, 270–279.
23. Sahin, I., Gulmez, M., & Kitapci, O. (2017). E-complaint tracking and online problem-
solving strategies in hospitality management: Plumbing the depths of reviews and responses
on TripAdvisor. Journal of Hospitality and Tourism Technology, 8(3), 372–394.
24. Steadman, M. (2008). What small CPA firms are doing to recruit and retain staff. CPA Journal,
78(7), 61–63.
25. Blain, A. (2008). The millennial tidal wave: Five elements that will change the workplace of
tomorrow. Journal of the Quality Assurance Institute, 22(2), 11–13.
26. Wesner, M. S., & Miller, T. (2008). Boomers and millennials have much in common.
Organization Development Journal, 26(3), 89–96.
27. Williams, D. L., Crittenden, V. L., Keo, T., & McCarty, P. (2012). The use of social media: An
exploratory study of usage among digital natives. Journal of Public Affairs, 12(2), 127–136.
28. Bowen, J. T., & Chen McCain, S. L. (2015). Transitioning loyalty programs: A commentary
on the relationship between customer loyalty and customer satisfaction. International Journal
of Contemporary Hospitality Managemen, 27(3), 415–430.
29. Bleedorn, G. (2013). Say hello to the millennial generation. ABA Bank Marketing, 45(1), 24–28.
30. Bowen, J. (2015). Trends affecting social media: Implications for practitioners and researchers.
Worldwide Hospitality and Tourism Themes, 7(3), 221–228.
31. Jang, Y. J., Kim, W. G., & Bonn, M. A. (2011). Generation Y consumers’ selection attributes
and behavioral intentions concerning green restaurants. International Journal of Hospitality
Management, 30(4), 803–811.
32. Nyheim, P., Xu, S., Zhang, L., & Mattila, A. S. (2015). Predictors of avoidance towards personal-
ization of restaurant smartphone advertising: A study from the Millennials’ perspective. Journal
of Hospitality and Tourism Technology, 6(2), 145–159.
33. Chang, L. (1994). A psychometric evaluation of 4-point and 6-point Likert-type scales in
relation to reliability and validity. Applied Psychological Measurement, 18(3), 205–215.
34. Garland, R. (1991). The mid-point on a rating scale: Is it desirable. Marketing Bulletin, 2(1),
66–70.
35. Pantano, E., & Di Pietro, L. (2013). From e-tourism to f-tourism: Emerging issues from negative
tourists’ online reviews. Journal of Hospitality and Tourism Technology, 4(3), 211–227.
Identification of IT-Needs to Cope
with Dynamism in Collaborative
Networked Organizations—A Case Study
1 Introduction
Organizations that operate in highly turbulent markets demand more agility from their
strategic partners and suppliers. In response to rapidly changing customer demands
and wishes, organizations are forced to collaborate and jointly create products and
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer 219
Nature Switzerland AG 2020
R. Agrifoglio et al. (eds.), Digital Business Transformation, Lecture Notes in Information
Systems and Organisation 38, https://doi.org/10.1007/978-3-030-47355-6_15
220 R. van den Heuvel et al.
2 Theoretical Background
CNs are complex networks of organizations that cannot achieve their goals by
themselves. These CNs are not hierarchically structured, are evolutionary, and are
continuously interacting with the environment [9]. When we talk about organized
collaboration, the term Collaborative Networked Organization (CNO) is used [10].
Walters and Buchanan [9] describe that these organizations have benefits
compared to hierarchical networks. A few of the benefits are: leverage via best capa-
bilities, higher speed due to reduced management and increased IT usage, agility,
independence, and interdependence [9]. The rationale behind “increased IT usage”
within a CNO is that CNOs need to communicate and IT is needed to facilitate this
communication [10, 11].
BITA has been popularized by Henderson and Venkatraman [12] in the Strategic
Alignment Model (SAM). Henderson and Venkatraman [12] state that “the inability
to realize value from IT investments is, in part, due to the lack of alignment between
the business and I/T strategies of organizations.” Organizations should embrace a
process of continuous adaptation and change in order to achieve alignment. BITA
“refers to applying Information Technology (IT) in an appropriate and timely way, in
harmony with business strategies, goals and needs” [13] and leads to an increase in
agility and performance [4]. Within this paper, we define alignment as strategic and
operational alignment as described by Bagheri et al. [14], where strategic alignment
is the fit between business strategy and IT strategy and operational alignment is the
alignment between business processes and supportive information systems.
The extant literature shows that a higher degree of alignment within an organiza-
tion provides benefits to the firm [4]. Current models for BITA do not address the
‘networked lens’ that we see within a collaborative environment [8].
CNOs are networks of participating entities, where entities can be a variety of types
like organizations, humans, or systems. An important aspect is the bi-directional,
reciprocal way of exchanging resources [15] which show bi-directional interaction
existing between participants in a CNO. If we consider the dynamics of a CNO and
the vast number of participants collaborating within the CNO, many relations can
222 R. van den Heuvel et al.
exist. Each participant and organization can take part in multiple other organizations,
resulting in many-to-many relations which could have an epistatic nature.
Ahuja [16] argues that the number of relations, specifically direct ones, can posi-
tively affect the innovative output of the organization. The relationships influence
the output via knowledge sharing, complementarity, and scale. The power of rela-
tions and their impact on the innovative output is essential for the dynamism that
CNOs experience. While the benefits of indirect relations are low compared to direct
relations, they still contribute to innovative power.
The created interaction patterns are the connections between the entities during
collaboration. Jaakkola et al. [17] describe collaboration in Information Systems
(IS) research as information processing by humans and computers, the informa-
tion transfer between them and the transformations needed in the transfer itself.
Camarinha-Matos [18] describes collaboration as “a more demanding process in
which entities share information, resources, and responsibilities to jointly plan,
implement, and evaluate a program of activities to achieve a common goal and
therefore jointly generating value.” Entities can manifest in various forms, such as
organizations, humans, and systems.
Dynamism in CNOs, whether it is facilitated by internal or external change, forces
collaboration to evolve and thus results in ever-changing interaction patterns. These
internal or external interaction patterns need to be taken into account when looking
at CNO-dynamism as a whole [19].
3 Research Methodology
Our research comprises a literature review (3.1) that forms the basis for our frame-
work (3.2) used in the case study (3.3), which is executed via interviews. The
interviews were transcribed and coded (3.4) to gather insights into IT-needs (see
Fig. 1).
Two SLRs were conducted for each of the sub-characteristics. The execution was
based on Saunders et al. [20]. We selected articles based on the following charac-
teristics: peer-reviewed, age (10 years, or seminal paper), language (English). The
search query was based on the components CNO, BITA, dynamic and self-regulating
network (DSN) extended with the sub-characteristic interaction patterns (IP) or
Identification of IT-Needs to Cope with Dynamism … 223
The material from the SLRs was reviewed and analyzed to create the framework
that was used during the case study interviews. The framework components were
grouped into themes. Section 4 contains the framework, based on the theme CNO,
relation (many-to-many relations), and interaction (interaction patterns).
224 R. van den Heuvel et al.
Quantitative coding was used to analyze the transcripts of the interviews inspired
by the methods of Muhr [21]. Closed-coding was used to set a base codebook,
based on the interview guide, that was used by all three researchers. Each researcher
independently coded and used open-coding to extend the codebook. Codes that were
created during the coding process were shared within the research team to align coded
phenomena. After closed and open-coding we used axial coding to find relations
between the codes.
The first author reevaluated the codes in the transcripts. An independent researcher
evaluated the process and, via selective bi-directional inter-coding, validated the
coded interviews based on the transcribed text and codes. We retrieved an inter-coder
agreement beyond 90% of these transcripts, providing us with sufficient confidence
in our analysis [22].
Identification of IT-Needs to Cope with Dynamism … 225
The framework created from the literature review contains three main themes. The
first theme is CNO, which provides insight into CNO-related characteristics to clas-
sify the CNOs and topology. The second theme is the relation, which provides insight
into the connection between participants within the network. The third theme is inter-
action, which provides insight into the relation itself. The first theme is descriptive
for the CNO the second and third are possible influencers of CNO-dynamism.
Based on the SLR, we found the following components related to the theme
“relation”: trust, entity role, relation type, tie form, tie strength, and embeddedness.
Cheikhrouhou et al. [24] mention five types of trust in their paper: competence,
contractual, relational, indirect, and negative trust. Cheikhrouhou et al. [24] define
these types of trust as: Competence trust is founded by the belief a partner has the
competence to achieve the goals. Contractual trust is based on economic or “formal”
aspects of a relationship. Relational trust includes human aspects of the economic
relations that could allow developing or improving relations while indirect trust
226 R. van den Heuvel et al.
focuses on the external factors and components that can indirectly influence trust
between partners in a CNO. Last, we have negative trust, defined as the difference
of power between two partners in a considered relation. “If the relation is not on the
same level from the point of view of both companies, this can lead to a source of
conflict between the partners” [24].
Grefen et al. [1] describe two non-hierarchical types of entity roles within a
network: hub, a focal firm distributing communications through the network, and
contact point, a focal firm acting as a contact point to a client party for accepting
orders and distributing them through the network [1].
A connection between two or more actors in the network results in interdepen-
dency [16, 26]. Ahuja [16] describes three relation types: direct ties—the arrange-
ment of direct inter-firm linkages between a firm and its network partners, which
primarily serves as sources for resources, and information. Indirect ties—inter-firm
linkages between a firm and its indirect partners, via partners of its partners, which
primarily serves as a source for information. Structural holes—a structural hole is a
gap between parties that have a relationship with a central organization but not with
each other, resulting in the possibility of receiving different information within the
network [16].
Wulf and Butel [27] found that the position of a participant in the network influ-
ences their ability to achieve sustainable competitive advantage (tie form). They
describe a difference between business eco-systems and business networks. In these
two constellations, the structure is viewed from a governance and a relationship
point of view. The governance point of view relates to the CNO. The structural part
describes the difference between formal and informal ties. Formal ties are related
to hierarchical structures governed by contracts (prescribed) or ownership, whereas
informal ties are related to social organizational structures where there are informal
relationships between individuals and are the basis for collaboration and knowledge
transfer (emergent) [28].
When communication takes place mutually and frequently, strong ties exist [27].
They can reduce cost, reduce monitoring and integration costs, and improve informa-
tion flow. Thus strong cohesion can be instigated [29]. “Weak ties provide access to
non-redundant information” [30]. Strong ties and weak ties are part of the framework
where the “strongness” relates to frequent mutual interaction and infrequent distant
interaction (tie strength).
Osman [26] studied the influence of formal versus informal ties to the embedded-
ness of the participant within the CNO. Embeddedness is the degree of centrality of
any company within the social network. Strong embeddedness refers to an organiza-
tion which has many close ties with which it is in frequent contact, it may be the hub
with many spokes; weak embeddedness is where the organization does not actively
take part in ties within the (social) network.
These components provide the ability to gather data about the relations within the
CNO, related to dynamics and how IT-needs change based on these relations.
Identification of IT-Needs to Cope with Dynamism … 227
In the theme “interaction” we identified interaction mode, locale, time, the goal
of the interaction, structures, and level of formality as relevant components. These
components describe how a relation is used. We will describe the components in the
following text.
The modes as described by Oukes and von Raesfeld [31] are as follows: Inter-
action create mode: “The creation of innovative solutions by an organization and
its counterpart beyond the scope of their initial agreement to align their interests
and preserve the relationship”; Interaction acquiesce mode: “The compliance of an
organization to the action of its counterpart or situation even at the expense of its
own short-term interests”; Interaction compromise mode: “The partial compliance
of an organization to the action of its counterpart or situation. They renegotiate the
relationship’s agreements in a relationship preserving manner”; Interaction manipu-
late mode: “The persistent efforts of an organization to act regardless of the ideas and
preferences of its counterpart. It tries to shape, change or redefine the counterpart’s
actions or the situation by overpowering its counterpart”; Interaction avoid mode:
“An organization’s lack of intention to react to the action of a counterpart or situa-
tion”; Interaction defy mode: “An organization’s dismissal of a counterpart’s action
or situation. It may either try to benefit from the relationship at the expense of its
counterpart’s interests, or it ends the relationship”.
Another aspect is the locale the interaction takes place in. We identified two dimen-
sions relevant for our research based on Camarinha-Matos and Afsarmanesh [19],
namely Endogenous—Interactions that lie within the CNO-network, and Exoge-
nous—Interactions between actors outside the CNO-network. Additionally, we see
a difference between synchronous and asynchronous communication [32], classified
in our study as “time.”
Clark et al. [32] indicate that there are three types of goals an actor tries to
accomplish with an interaction. These are Consensual: Both Actors are in agreement;
Responsive: An actor expects an answer from another actor; Elaborative: Interaction
between two actors until the goal is reached. While the study focuses on student
interaction, we think these types of goals can help understand the dynamics within
CNOs and their interaction patterns.
Wagner et al. [33] describe the common human (H)/computer (C) communication
model. This model describes the transfer of knowledge between two parties where
the combination can be H-H, H-C/C-H, and C-C. These combinations need to be
facilitated in knowledge transfer. We define H-H interaction as a biological interac-
tion, H-C/C-H as a formal interaction, and C-C as a technical interaction. Within our
study, this component is called “Structures.”
The level of formality is also a component we see that influences the interaction
pattern. We combined these communication models with formal and informal levels
where formal communication follows specific guidelines and has lower sequential
variety, and informal communication is more ad hoc and has a higher sequential
variety [34].
228 R. van den Heuvel et al.
These components provide the ability to the framework to gather data about the
way a relation is used, how they react to dynamism, and how this influences IT-needs.
4.4 Framework
The described themes provided a framework to structure and analyze the cases for
our study. The framework is meant to provide a basis to discuss IT-needs in relation
to dynamism in CNOs. The framework components can be viewed in Table 3.
5.1 Organizations
This case study comprises four CNOs with a network size ranging from 4 to 50+
participants. The CNOs have an ITSM focus and, at a minimum, one party has
extensive IT knowledge in the ITSM project space.
CNO 1 and 2 show a vertical topology; CNO 4 shows a horizontal topology. CNO
3 shows both types. CNO goals were related to providing a service, ranging from IT
consolidation to project management. In total, 12 organizations participating in one
of the four CNOs took part, resulting in 15 interviews spread over the organizations.
During the analyses, the components most related to IT-needs and dynamics were
CNO life cycle, interaction mode, and interaction structure, followed by trust, relation
type, time, and level of formality. The least found components were entity role, CNO
goal, CNO type, and locale. We did not see any influence by CNO goal and CNO
type and therefore these components are omitted from the results. Only CNO life
cycle was used for theme CNO. The identified IT-needs are listed in Table 4.
The IT-needs are mapped to the components of the framework (vertical axis)
and the CNOs (horizontal axis) (Table 5). Each component describes the high-level
findings.
From the case study, we confirmed that IT is crucial to facilitate collaboration for
a CNO. Collaboration tooling (T1) and conference facilities (T4) are mentioned
frequently as an IT-need related to the majority of the framework components.
The components trust, relation type, embeddedness, and time were also discussed
frequently. IT-needs T1 and T4 were mentioned to increase trust, facilitate direct
relations, strong embeddedness, and (a)synchronous communication. T1 is not only
focused on office tooling but also a shared environment for specific tools used within
the CNO. An example is 3D drawing tools. The intensity for the IT-need T4 increases
when there are direct and strong ties as opposed to only providing and using T1 as a
shared environment (relation type and tie strength). When participants in the network
230 R. van den Heuvel et al.
Table 5 (continued)
CNO 1 CNO 2 CNO 3 CNO 4 Needs
Structures Biological and Technical at the Biological and Biological T1, T3,
later formal and beginning and formal and formal T4, T5
technical then biological
Levels of Informal. Later Formal with Informal, Formal and T1, T2,
formality formality goal to increase which provided informal T3, T4,
increased due to trust. After a basis to cope T8
tooling increase, with dynamics
informal to
increase
dynamics
IT-needs T1, T2, T3, T4 T1, T3, T5 T1, T3, T5, T6 T1, T3, T7,
T8
In this section, we will discuss IT-needs within CNOs to cope with CNO-dynamism.
The interviewees recognized all components in the model, which validates the
model we created. The framework was not extended based on the result. We
got valuable information about IT-needs of CNOs and the IT-needs to cope with
dynamics.
When the relationship and interaction were exogenous and formal, and the tie
strength was weak, the communication regularly was asynchronous via email or a
forum (T8). In some cases, supported via supportive systems (T5). When the relation-
ship and interaction moved to tie strength strong, tie form informal and embedded-
ness was high. Moreover, T1 and T4 were mentioned as an IT-need. When dynamics
are introduced in a CNO, the interviewees indicated a preference for synchronous,
informal communication in a biological and formal structure, resulting in the need
for T1 and T4. We cannot state that dynamism forces T1 and T4 or if dynamism
forces active interaction and therefore the need for T1 and T4. Still, the need to
cope with dynamism triggers the IT-need for the collaborative environment (T1) and
conference facilities (T4).
The IT-need for task management tooling (T3) was mentioned in relation to
dynamics related to trust, relation type, interaction mode, time, and structure within
all CNOs. When dynamics occur, the number of tasks to execute increased and
tooling that supports that was needed. The IT-needs document templates (T2), knowl-
edge sharing (T6), and documentation tooling (T7) were not mentioned related to
dynamics, and thus we think that these are not used to cope with dynamics within
the CNO.
IT-needs did not drastically change related to the CNO life cycle. Dynamics
cannot be planned and therefore facilitating a collaborative environment (T1), task
management tooling (T3), and conference facilities (T4) from the beginning of the
CNO could be part of general requirements.
The topic of technical structures was not frequently addressed and did not result
in an IT-need. We expected this to be a more prominent topic especially with the
ITSM focus within the CNOs. Technical structures were mentioned as a possible
improvement for the CNO. The lack of technical structures could be related to the
goal-oriented focus of the CNOs within our study.
Our model could be extended by different research fields. For instance, media
synchronicity [37] could provide more insight into biologic communication from a
process perspective differentiated in a conveyance and convergence stage, to in the
end, tailor it to the CNOs specific need. Also, electronic negotiation [38] could be
used to facilitate technical communication, still this was not specifically mentioned
as a method to cope with dynamism within our study.
Overall, we noticed that trust was a central and important topic within our inter-
views. Trust (specifically competence and relational) was mentioned combined with
other characteristics like a direct relation type, strong ties, and a high amount
of communication (biological). Leading to strong relations. The component-time
Identification of IT-Needs to Cope with Dynamism … 233
and locale were often mentioned together. Mainly in the combination of asyn-
chronous/exogenous and synchronous/endogenous. All IT-needs are, as expected,
related to collaboration and interaction. When discussing dynamics mainly IT-needs
T1, T3, and T4 were mentioned. Mostly in the context of increased informal and
synchronous communication.
In this study, we focused on the relationship between participants and not all
“dynamic and self-regulating” characteristics. Our characteristics are on an oper-
ational level, where others are related to strategy (landscape of organizations) or
governance topic (dynamic partnering, maturity). We expect that analyzing the other
characteristics will be useful. Also, the lack of technical structures was not expected.
We do not know why these technical structures were not present, but we would
have expected that these structures would be an IT-need to cope with dynamism in a
prosperous CNO. These points show room for future research.
These results can help practitioners in determining the needed IT systems when
participating in a collaborative organization so that they are prepared to cope with
the dynamism they could encounter as a CNO. From a research perspective, these
results provide more insight into IT-needs that help cope with the dynamism CNOs
can encounter. Within our broader research program, we will try to create guidelines
and hopefully a new BITA model that could facilitate CNOs and specifically their
operational BITA between the participants that take part in the CNO. To in the end
provide a model that is more suitable for these networked organizations with their
vast number of configurations, and fill a gap within the body-of-knowledge on this
topic.
Our study does have some limitations that future research should seek to address.
First, our SLR and thus our framework finds it basis in the paper of Camarinha-Matos
and Afsarmanesh [2] where they introduce the scientific discipline around CNOs.
We tried to keep our search queries as broad as we can, but the concept of CNO is part
of our search queries. By using backward searching we broadened our scope, still
could have limited our SLR, our framework, and thus our results. Second, dynamism
is a phenomenon that changes over time. Our research was cross-sectional and thus
replicating the study over time could gather more valuable insights. Third, CNOs
consist of and are formed by multiple participants. The vast number of configurations
a CNO can have based on capabilities, the configuration of the participant, and other
characteristics create complex objects to analyze [39]. We gather results within our
study and agree that generalization based on these configurations is hard. By using
common aspects of the CNOs, like goals and type of participants within a CNO, we
tried to limit this effect. Still, we think that multiple studies will result in valuable
additional data to research this topic. Last, by using transcribed interviews, intensive
coding frameworks, and cross-referencing the codes between the interviewers, we
tried to limit observer bias; however, we cannot guarantee that no bias entered the
research. We do think we mitigated this risk adequately by applying a rigorous
method of coding and analyses based on theory from Yin [40] and adding validation
from external researchers.
234 R. van den Heuvel et al.
7 Conclusion
Acknowledgements This paper was created with the help of Manon van Rooijen—van der Bas,
Merel Visser, and Danny van Maanen.
References
1. Grefen, P., Mehandjiev, N., Kouvas, G., Weichhart, G., & Eshuis, R. (2009). Dynamic business
network process management in instant virtual enterprises. Computers in Industry, 60(2), 86–
103.
2. Camarinha-Matos, L. M., & Afsarmanesh, H. (2005). Collaborative networks: A new scientific
discipline. Journal of Intelligent Manufacturing, 16(4–5), 439–452.
3. Grefen, P. (2013). Networked business process management. International Journal of
IT/Business Alignment and Governance (IJITBAG), 4(2), 54–82.
4. Coltman, T., Tallon, P., Sharma, R., & Queiroz, M. (2015). Strategic IT alignment: Twenty-five
years on. Journal of Information Technology, 30(2), 91–100.
5. Bernus, P., Noran, O., & Molina, A. (2015). Enterprise architecture: Twenty years of the
GERAM framework. Annual Reviews in Control, 39, 83–93.
6. Van den Heuvel, R., Trienekens, J., Van de Wetering, R., & Bos, R. (2016). Business/IT-
alignment adaptation in dynamic networked environments. In PRO-VE2016, Porto, Portugal.
7. Cuenca, L., Boza, A., Ortiz, A., & Trienekens, J. J. M. (2014). Business-IT alignment and
service oriented architecture—A proposal of a service-oriented strategic alignment model.
In S. Hammoudi, J. Cordeiro, & L. Maciaszek (Eds.), Proceedings of the 16th Interna-
tional Conference on Enterprise Information Systems (ICEIS 2014) (Vol. 3, pp. 490–496).
SCITEPRESS-Science and Technology Publications, Lda.
Identification of IT-Needs to Cope with Dynamism … 235
8. Van den Heuvel, R., Trienekens, J., Van de Wetering, R., & Bos, R. (2017). Toward CNO
characteristics to support business/IT-alignment. In L. M. Camarinha-Matos, H. Afsarmanesh,
& R. Fornasiero (Eds.), Collaboration in a data-rich world. PRO-VE 2017. IFIP Advances in
Information and Communication Technology (Vol. 506, pp. 455–465). Cham: Springer.
9. Walters, D., & Buchanan, J. (2001). The new economy, new opportunities and new structures.
Management Decision, 39(10), 818–834.
10. Camarinha-Matos, L. M., Afsarmanesh, H., Galeano, N., & Molina, A. (2009). Collaborative
networked organizations—Concepts and practice in manufacturing enterprises. Computers &
Industrial Engineering, 57(1), 46–60.
11. Concha, D., Espadas, J., Romero, D., & Molina, A. (2010). The e-HUB evolution: From a
custom software architecture to a software-as-a-service implementation. Computers in Industry,
61(2), 145–151.
12. Henderson, J. C., & Venkatraman, N. (1993). Strategic alignment: Leveraging information
technology for transforming organizations. IBM Systems Journal, 32(1), 472–484.
13. Luftman, J. (2004). Assessing business-IT alignment maturity. In Strategies for information
technology governance. Hershey, PA: IGI Global.
14. Bagheri, S., Kusters, R. J., & Trienekens, J. J. M. (2015). Business-IT alignment in PSS value
networks-linking customer knowledge management to social customer relationship manage-
ment. In S. Hammoudi, J. Cordeiro, & L. Maciaszek (Eds.), Proceedings of the 17th Inter-
national Conference on Enterprise Information Systems (ICEIS 2015) (Vol. 3, pp. 249–257).
SCITEPRESS-Science and Technology Publications, Lda.
15. Parmigiani, A., & Rivera-Santos, M. (2011). Clearing a path through the forest: A meta-review
of interorganizational relationships. Journal of Management, 37(4), 1108–1136.
16. Ahuja, G. (2000). Collaboration networks, structural holes, and innovation: A longitudinal
study. Administrative Science Quarterly, 45(3), 425–455.
17. Jaakkola, H., Henno, J., Thalheim, B., & Mäkelä, J. (2015). Collaboration, distribution
and culture-challenges for communication. In 38th International Convention on Information
and Communication Technology, Electronics and Microelectronics (MIPRO) (pp. 657–664).
Opatija, Croatia: IEEE.
18. Camarinha-Matos, L. M. (2009). Collaborative networked organizations: Status and trends in
manufacturing. Annual Reviews in Control, 33(2), 199–208.
19. Camarinha-Matos, L. M., & Afsarmanesh, H. (2007). A comprehensive modeling framework
for collaborative networked organizations. Journal of Intelligent Manufacturing, 18(5), 529–
542.
20. Saunders, M., Lewis, P., & Thornhill, A. (2016). Research methods for business students (7th
ed.). Harlow: Pearson Education Limited.
21. Muhr, T. (2018). Scientific Software Development GmbH. Berlin, Germany: ATLAS.ti (8.2).
http://www.atlasti.com/.
22. Boudreau, M.-C., Gefen, D., & Straub, D. W. (2001). Validation in information systems
research: A state-of-the-art assessment. MIS Quarterly, 1–16.
23. Camarinha-Matos, L. M., & Afsarmanesh, H. (2012). Taxonomy of collaborative networks
forms: FInES task force on collaborative networks and SOCOLNET—Society of collaborative
networks. In Roots and wings. European Commission.
24. Cheikhrouhou, N., Pouly, M., & Madinabeitia, G. (2013). Trust categories and their impacts
on information exchange processes in vertical collaborative networked organisations. Interna-
tional Journal of Computer Integrated Manufacturing, 26(1–2), 87–100.
25. Camarinha-Matos, L. M., & Afsarmanesh, H. (2008). Collaborative networks: Reference
modeling. New York: Springer Science + Business Media, LLC.
26. Osman, L. H. (2017). The pattern of inter-organizational level of connectivity, formal versus
informal ties. Jurnal Komunikasi, Malaysian Journal of Communication, 33(1), 59–79.
27. Wulf, A., & Butel, L. (2017). Knowledge sharing and collaborative relationships in business
ecosystems and networks. Industrial Management & Data Systems, 117(7), 1407–1425.
28. Caimo, A., & Lomi, A. (2015). Knowledge sharing in organizations: A Bayesian analysis of
the role of reciprocity and formal structure. Journal of Management, 41(2), 665–691.
236 R. van den Heuvel et al.
29. Franco, M., & Haase, H. (2015). Inter-organizational cooperation in community health orga-
nizations: A competence-based perspective. International Journal of Health Care Quality
Assurance, 28(2), 193–210.
30. Levin, D. Z., & Cross, R. (2004). The strength of weak ties you can trust: The mediating role
of trust in effective knowledge transfer. Management Science, 50(11), 1477–1490.
31. Oukes, T., & von Raesfeld, A. (2016). A start-up in interaction with its partners. IMP Journal,
10(1), 50–80.
32. Clark, D. B., Sampson, V., Weinberger, A., & Erkens, G. (2007). Analytic frameworks for
assessing dialogic argumentation in online learning environments. Educational Psychology
Review, 19(3), 343–374.
33. Wagner, H.-T., Beimborn, D., & Weitzel, T. (2014). How social capital among information
technology and business units drives operational alignment and IT business value. Journal of
Management Information Systems, 31(1), 241–272.
34. Becker, M. C. (2005). A framework for applying organizational routines in empirical research:
Linking antecedents, characteristics and performance outcomes of recurrent interaction
patterns. Industrial and Corporate Change, 14(5), 817–846.
35. Camarinha-Matos, L. M., & Afsarmanesh, H. (2008). On reference models for collaborative
networked organizations. International Journal of Production Research, 46(9), 2453–2469.
36. Grant, R. M., & Baden-Fuller, C. (2004). A knowledge accessing theory of strategic alliances.
Journal of Management Studies, 41(1), 61–84.
37. Dennis, A. R., & Valacich, J. S. (1999). Rethinking media richness: Towards a theory of media
synchronicity. In Proceedings of the 32nd Annual Hawaii International Conference on Systems
Sciences (pp. 1–10). Maui, HI: IEEE.
38. Bichler, M., Kersten, G., & Strecker, S. (2003). Towards a structured design of electronic
negotiations. Group Decision and Negotiation, 12(4), 311–335.
39. Van de Wetering, R., Mikalef, P., & Helms, R. (2017). Driving organizational sustainability-
oriented innovation capabilities: A complex adaptive systems perspective. Current Opinion in
Environmental Sustainability, 28, 71–79.
40. Yin, R. K. (2014). Case study research: Design and methods (5th ed.). Los Angeles: Sage.
Unwrapping Efforts and Difficulties
of Enterprises for Digital Transformation
Abstract Since the late twentieth century, Information Technology (IT) has made
a fundamental transformation in our society through automation, a process known
as the third Industrial Revolution. More recently, in the twenty-first century, there
has been a farther stage of transformation through IT called “Digital Transforma-
tion.” However, enterprises are struggling with aligning suitable digital strategies
and actions for Digital Transformation, since there is a fundamental complexity in
IT management, and a scarcity of research relating to how enterprises could system-
atically approach Digital Transformation. Therefore, we conducted eight interviews
as a case study to explore key strategic themes for those enterprises regarding Digital
Transformation. We applied directed content analysis for the interviews and obtained
detailed descriptions that fully explain Digital Transformation in Japanese enter-
prises. From our results, three key topics have been discovered for the enterprises to
consider for Digital Transformation: (1) Customer Experience, (2) Strategic Intent,
and (3) Ecosystem. The results of our research contribute to a better understanding of
what struggle enterprises have experienced with Digital Transformation by showing
a practical approach for real businesses, as well as by demonstrating the possibilities
for future research.
1 Introduction
The tech wave has been building for a long time but it has accelerated in recent
years [34]. Since the third Industrial Revolution in the late twentieth, we have bene-
fited from increased automation by electronics and information technology. In the
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer 237
Nature Switzerland AG 2020
R. Agrifoglio et al. (eds.), Digital Business Transformation, Lecture Notes in Information
Systems and Organisation 38, https://doi.org/10.1007/978-3-030-47355-6_16
238 H. Ikegami and J. Iijima
To answer the research questions above, we conducted a case study with eight
enterprises. For the study of the case, we introduced a directed content analysis [16]
as analysis method and a capability maturity framework, IT-Capability Maturity
Framework [18] as conceptual background, particularly its part that is specialized in
managing organizations’ IT function [11].
This paper is organized as follows: following introduction, the next section
describes the conceptual background of this study, a maturity framework used to
measure and grasp the maturity of Digital Transformation in enterprises. Next, we
describe our research methodology and results in the third section, and insights based
on the analysis result in the fourth section. Finally, the paper concludes by addressing
our theoretical contributions and avenues for future research.
Our study is based on cross-industry case studies in their initial phase of transfor-
mation, which is often perceived as ill-defined, random and mysterious [26]. The
IT-Capability Maturity Framework (IT-CMF) allows us to study such situation more
comprehensively due to its focus on IT management capabilities [17].
There are three reasons why we chose to apply the IT-CMF in this study. First,
the framework is an innovative and systematic framework, representing an emerging
blueprint of key IT capability processes, and acting as an assessment tool [6]. Second,
over 150 assessments have been performed across 80 leading Fortune 500 firms [7],
which enables the survey result to be compared with their benchmark data. Third,
the framework is easy for practitioners to understand and leverage [9]. While other
IT management frameworks such as CoBIT and ITIL have contributed to describing
a set of good practices in IT-related processes [14], IT-CMF has competitiveness in
its practice-oriented structure and it can be used to avoid spending too much time on
complicated process diagrams [30].
IT-CMF is a high-level process capability maturity framework for managing the
IT function within an organization [11]. It was created by Innovation Value Institute
(IVI), co-founded in 2006 by Maynooth University in Ireland and Intel. From the
point of a maturity model, the created analysis technique has been proved to be
valuable in measuring the different aspects of a process or an organization, and it has
been well-established academically for its model structure, assessment method and
support availability [25]. This result indicates that IT-CMF is one of the state of the
art maturity models.
IT-CMF consists of 37 management disciplines which are defined as Critical Capa-
bilities (CCs) [18]. For each capability, IT-CMF incorporates a comprehensive suite
of maturity profiles, assessment methods, and improvement roadmaps, expressed in
such a way that businesses can use them to guide discussions on setting goals and
evaluating performance [18]. Based on the framework and its defined capabilities,
240 H. Ikegami and J. Iijima
IVI offers seven processes for Digital Transformation from the management point
of view. These are called the “Seven Digital Business Behaviour Themes” (Table 1),
which serve as guidelines for our analysis.
In this research, we followed a directed content analysis approach [16] for our case
studies. This approach is defined as a research method for the subjective interpretation
of the content of text data through the systematic classification process through
the coding and identifying themes or patterns [16]. The reason why we selected to
utilize this methodology is that it can provide knowledge and understanding of the
phenomenon under study [12].
Selection of the cases began with a broader survey to understand the overall state of
digital transformation in enterprises. This was then followed up with more detailed
qualitative, open-ended interviews to collect detailed views from participants [8].
With this goal in mind, we conducted an online survey ahead of the case studies. The
Unwrapping Efforts and Difficulties of Enterprises for Digital … 241
survey was conducted on 45 people from 45 different Japanese enterprises via Google
Forms during October and November 2018. The reason why we chose to target
Japanese enterprises for this research is based on the fact that academic research
on enterprises’ Digital Transformation in the Japanese context is still lacking in
comparison to studies carried out in European countries [29], the United States
[10], and even other Asian countries such as China [35], India [23], South Korea
[19] and ASEAN countries [5]. If the environments or conditions where enterprises
are undergoing changes differ, then the enterprises themselves would be different.
Therefore, further research regarding Digital Transformation in Japanese enterprises
is needed.
Among the 45 enterprises, 73.3% are IT User enterprises in Finance (8.9%),
Manufacturing (20.0%) and other industries (44.4%), with 66.7% of respondents
being large enterprises with over 1000 employees. In addition, the survey consists of
four sections, A through D. Section A is for profile information followed by Sections
B to D that focus on the digital readiness assessment based on IT-CMF. Section B
consists of five questions on the intensity of digitization (e.g. “Is central to the organi-
zation’s success leveraging a diversified portfolio of digital technologies?”). Section
C consists of five questions on breadth or reach of digitization (e.g. “Are business
processes digitally transformed across the organization?”). Section D consists of
seven sub-sections based on Seven Digital Business Behaviour Themes (e.g. “Does
the organization have an agreed upon and shared a business-aligned digital strategy
that can rapidly adapt to turbulent business conditions?”). Interviewees answered
each question on a scale of 1–4.
We analyzed the answered results, and the result of how interviewee companies
are ready for Digital Transformation are shown in Fig. 1. Figure 1 indicates the
attainment level of digital readiness, which is calculated by the percentage of the
sum in Sections B, C and D. According to the total percentage, we categorize the
result into four stages of digital readiness: reactive (0–25%), emerging (25–50%),
ambitious (50–75%) and leading (75–100%).
From this result, it can be seen that 77.8% of the enterprises belong to the reactive
stage and 20.0% belongs to the emerging stage. This result shows that Japanese enter-
prises have just started taking actions for Digital Transformation. In the following
section, we focus on Section D, which refers to Seven Digital Business Behavior
Themes as the first step for our research.
For the first research question, “Where do enterprises stumble on Digital Transforma-
tion?”, we conducted follow-up interviews on eight Japanese enterprises (Table 2).
As theoretical sampling, we selected one enterprise for an interview to avoid bias
in the attainment level of digital readiness, industries and company size, every time
we finished analysing one enterprise. We finished selecting with eighth enterprise,
reaching data saturation. Titles of the interviewees included Manager and Head of
Digital Transformation.
From the total analysis across all the 8 companies, we acquired 19 descriptions
(between 2 and 3 descriptions for each theme) as shown in Table 3.
The detailed results of the directed content analysis are described according to the
seven themes in this section. We would like to note that the following describes the
summary of the aggregated empirical findings from all the companies, and as such,
not all of the descriptions apply to each company.
244 H. Ikegami and J. Iijima
The enterprises, especially large ones, have often middle-down management within
each department, and there is no common agreement in the enterprise regarding
Digital Transformation. They also have worked on digitalization by for example
creating a special department for Digital Transformation. However, due to a lack of
the leaders’ skills, which can draw the fundamental strategy design, the degree of
influence on digitization remains at an improvement level instead of at a transforma-
tion level. Such vertical and siloed organizational structures lead to the low mobility
of information.
In the enterprises, there is little incentive to create a joint platform due to a want
to maintain the current balance between each other’s competitive advantage within
Unwrapping Efforts and Difficulties of Enterprises for Digital … 245
the industry. The enterprises try making up for resources that are necessary for
Digital Transformation through in-house recruitment or by strengthening the educa-
tion system. Moreover, they often have an account with specific fixed third parties
owing to traditional business practice in Japan, and subcontracting enterprises tend
to be treated with scepticism.
While the top management in the enterprises are engaged in activities to improve the
organization’s digital capabilities, they lack the latest knowledge related to IT and
digital. However, since the pace of Digital Transformation is rapidly accelerating,
the top managers are not able to catch up even if educated from this current situation.
In addition, the overall structure of the organization has not been visualized due to its
complicated organization structure, which leads to a suboptimal allocation of human
resources due to a focus on the local optimum. Employees use digital technologies
without understanding the underlying mechanisms used by the process. Instead they
just carry out the work given to them by their bosses, which can be considered as a
push assignment that ignores individual skills.
Among these enterprises, the proportion of the new digital budget is low due to
existing IT investment and overestimated risk. They promote Digital Transforma-
tion through activities such as setting up a fixed budget amount, but at such a low
budget ratio that it is not always tied to the business results. They evaluate the cost-
effectiveness of digital investment based on performance indicators such as Return
On Investment (ROI). However, using such indicators can have a bad influence on a
digital investment since it does not immediately lead to an immediate improvement
in performance but instead should be continued over a longer time period.
246 H. Ikegami and J. Iijima
These enterprises require an enormous time and resources to collect data since the
data collection process is not well established due to a huge number of legacy systems
and manual processes. Data integration has not progressed and does not meet the
criteria required for analytics from both points of quantity and quality. Regarding
information sharing, information on the site is not shared real-time to the top manage-
ment, hence they invest a significant amount of money in traditional activities such
as TV commercials and leaflets particularly in marketing.
The enterprises recognize that dealing with cyber security matters is indispensable,
and establish and maintain risk management policies within the enterprises even
when external cloud services are used. However, as the range of digital services used
widens, there can be concerns on the security risk of business partners’ part which
cannot be fully grasped by the enterprise. Moreover, the enterprises sometimes have
not considered the security risks concerning employees’ use of personal data.
Based on the presented case studies, which showed what enterprises struggle with and
lack for their Digital Transformation, we would like to identify what the enterprises
must do and seek in order to answer the second research question, “How can those
enterprises approach Digital Transformation?”. We reorganized the seven themes
by considering how the themes are related to each other based on our recursive
discussion (Fig. 2).
In an ambitious digitally transformed world, an enterprise firstly considers
customers since all the business activities start with its customers (DBB_01). In order
to offer a better customer experience, the enterprise seeks to utilize digital technolo-
gies (DBB_06) and build an investment portfolio flexibly (DBB_05). To realize the
portfolio, the decision makers design the whole organization and tries optimize the
assignment of human resources (DBB_04). Furthermore, for the designed ambitious
organization and digital technology utilization, the enterprise reforms its IT infras-
tructure (DBB_03), and finally, utilizes external resources effectively to realize all of
the activities mentioned before (DBB_02). In addition, it handles its risk management
policy of the whole ecosystem (DBB_07).
As shown in Fig. 2, the seven themes can be captured from three points of
view, customers, enterprises and suppliers. For each point of view, we offer three
key topics, Customer Experience, Strategic Intent and Ecosystem, which showed a
lack in the interviewee companies but are indispensable for them to achieve Digital
Transformation.
Unwrapping Efforts and Difficulties of Enterprises for Digital … 247
Fig. 2 Restructured seven digital business behaviour themes and three keywords
First, Customer Experience. All business activities begin with customers. Digital
transformation makes it possible to realize customer experience that is close to the
needs of each customer. In order to respond to the diverse customer needs, it is neces-
sary for the enterprises to adapt flexibly and agile through Digital Transformation.
While top management must not only decide the direction of the whole enterprise
but also have its own vision of business with digital technologies. The enterprise
must also be able to break down the vision into concrete action plans. Additionally,
the employees, as well as the top management, must engage in designing customer
experience increasingly from customer points of view.
Second, Strategic Intent. Since enterprises that are lagging behind in Digital Trans-
formation have too many things to deal with. As a result, trying in a blank way
would not be effective. From the point of Information Exploitation Management,
for instance, it is important to tackle the development of the data collection process
as the first action since it can be valuable in terms of both quality and quantity.
However, due to the wide range of data collection, priority must be given on the
basis of strategic initiatives in activities such as the development of data collection.
For anything other than that, the top management needs to have strategic intent to
realize their vision.
Third, Ecosystem. What Japanese enterprises currently have worked on is opti-
mization of digitalization at a department level which is not as transformation but
on an improvement scale. In addition, in order to further increase in the impact of
Digital Transformation, it is indispensable to cooperate with other enterprises both
in the same and different industries. In order to achieve Digital Transformation, it
is necessary to involve stakeholders, inside and outside of the enterprise, and aim
towards the optimization of the entire ecosystem, which would increase the impact
of Digital Transformation on not only their own enterprise but also on the suppliers
and the whole ecosystem.
248 H. Ikegami and J. Iijima
5 Conclusion
This study aimed to clarify the current situation of how enterprises make efforts
and struggle with Digital Transformation by researching case studies on Japanese
enterprises. Through the directed content analysis, we could clarify the characteristics
of specific efforts and difficulties the studied companies have in regards to Digital
Transformation. From the analysis result, this study could illustrate the three key
topics that enterprises having difficulties in Digital Transformation must consider in
order to accomplish Digital Transformation.
This study has several limitations as it is still an in-progress work. First, the number
of samples should be increased. Since the difficulties of enterprises, which have just
started tackling Digital Transformation, are changeable and difficult to summarize,
we need to collect a large sample of enterprises with different backgrounds. Second,
the scope of this study could be limited. We only focused on Japanese enterprises
and it would be difficult to apply the results for enterprises in other countries. In
order to have a more comprehensive grasp of the situations in enterprises’ Digital
Transformation, we plan to further analyse enterprises in other countries as well.
References
1. Agarwal, R., Gao, G., DesRoches, C., & Jha, A. K. (2010). Research commentary—The digital
transformation of healthcare: Current status and the road ahead. Information Systems Research.
2. Berghaus, S. (2016). The fuzzy front-end of digital transformation: Three perspectives on the
formulation of organizational change strategies. In BLED 2016 Proceedings.
3. Bharadwaj, A., EI Sawy, O. A., Pavlou, P. A., & Venkatraman, N. (2013). Digital business
strategy: Toward a next generation of insights. MIS Quarterly, 37(2), 471–482.
4. Bourreau, M., Gensollen, M., & Moreau, F. (2012). The impact of a radical innovation on
business models: Incremental adjustments or big bang? Industry and Innovation, 19(5), 415–
435.
5. Box, S., & Lopez-Gonzalez, J. (2017). The future of technology: Opportunities for ASEAN
in the digital economy. In The ASEAN Secretariat, S. S. C. Tay, & J. P. Tijaja (Eds.), Global
megatrends: Implications for ASEAN economic community (pp. 37–60).
6. Carcary, M. (2011). Design science research: The case of the IT capability maturity framework
(IT CMF). The Electronic Journal of Business Research Methods, 9(2), 109–118.
7. Costello, T. (2010). A new management framework for IT. IT Professional, 12(6), 61–64.
8. Creswell, J. W. (2002). Research design: Qualitative, quantitative, and mixed methods
approaches (p. 21). Sage.
9. Curley, M. (2008). Introducing an IT capability maturity framework. In J. Filipe, J. Cordeiro,
& J. Cardoso (Eds.), Enterprise information systems. ICEIS 2007. Lecture Notes in Business
Information Processing (Vol. 12). Berlin, Heidelberg: Springer.
10. Cziesla, T. (2014). A literature review on digital transformation in the financial service industry.
In BLED 2014 Proceedings.
11. Donnellan, B., & Helfert, M. (2010). The IT-CMF: A practical application of design science.
In R. Winter, J. L. Zhao, & S. Aier (Eds.), Global perspectives on design science research.
DESRIST 2010. Lecture Notes in Computer Science (Vol. 6105). Berlin, Heidelberg: Springer.
12. Downe-Wamboldt, B. (1992). Content analysis: Method, applications, and issues. Health Care
for Women International, 13(3), 313–321.
Unwrapping Efforts and Difficulties of Enterprises for Digital … 249
13. Escobar, A. (2016). The impact of the digital revolution in the development of market and
communication strategies for the luxury sector (fashion luxury). Central European Business
Review, 5(2), 17–36.
14. Haes, D. S., & Grembergen, V. W. (2015). Chapter 5: COBIT as a framework for enterprise
governance of IT. In Enterprise governance of information technology: Achieving alignment
and value, featuring COBIT 5 (Vol. 2, pp. 103–128). Springer.
15. Hanelt, A., Piccinini, E., Gregory, R. W., Hildebrandt, B., & Kolbe, L. M. (2015). Digital
transformation of primarily physical industries—Exploring the impact of digital trends on
business models of automobile manufacturers. Wirtschaftsinformatik Proceedings.
16. Hsieh, H., & Shannon, S. (2005). Three approaches to qualitative content analysis. Qualitative
Health Research, 15(9), 1277–1288.
17. Innovation Value Institute. (2019). How to approach digital transformation in your organiza-
tion. Accessed February 14, 2019. https://ivi.ie/enabling-your-business-for-digital-transform
ation/.
18. Innovation Value Institute. (2019). Accessed February 14, 2019. https://ivi.ie/about/.
19. Lee, J. (2009). Contesting the digital economy and culture: Digital technologies and the
transformation of popular music in Korea. Inter-Asia Cultural Studies, 10(4), 489–506.
20. Loebbecke, C., & Picot, A. (2015). Reflections on societal and business model transforma-
tion arising from digitization and big data analytics: A research agenda. Journal of Strategic
Information Systems, 24(3), 149–157.
21. Marr, B. (2019). The amazing ways Burberry is using artificial intelligence and big data to
drive success. https://www.forbes.com/sites/bernardmarr/2017/09/25/the-amazing-ways-bur
berry-is-using-artificial-intelligence-and-big-data-to-drive-success/#7b382d7f4f63. Accessed
May 19, 2019.
22. Matt, C., Hess, T., & Benlian, A. (2015). Digital transformation strategies. Business &
Information Systems Engineering, 57(5), 339–343.
23. Pasti, S., & Ramaprasad, J. (2015). The BRICS journalist within the changing dynamics of the
early 21st century. African Journalism Studies, 36(3), 1–7.
24. Piccinini, E., Hanelt, A., Gregory, R. W., & Kolbe, L. M. (2015). Transforming industrial
business: The impact of digital transformation on automotive organizations. In International
Conference on Information Systems.
25. Proença, D., & Borbinha, J. (2016). Maturity models for information systems—A state of the
art. Procedia Computer Science, 100, 1042–1049.
26. Rhea, D. (2003). Bringing clarity to the “fuzzy front end”. In B. Laurel (Ed.), Design research:
Methods and perspectives (pp. 145–154). MIT Press.
27. Riasanow, T., Galic, G., & Böhm, M. (2017). Digital transformation in the automotive industry:
Towards a generic value network. In European Conference on Information Systems.
28. Schwab, K. (2016). The fourth industrial revolution: What it means, how to respond.
World Economic Forum. https://www.weforum.org/agenda/2016/01/the-fourth-industrial-rev
olution-what-it-means-and-how-to-respond/. Accessed May 17, 2019.
29. Schweer, D., & Sahl, J. C. (2017). The digital transformation of industry—The benefit for
Germany. In F. Abolhassan (Ed.), The drivers of digital transformation. Management for
Professionals. Cham: Springer.
30. Sharifi, M., Ayat, M., Rahman, A. A., & Sahibudin, S. (2008). Lessons learned in ITIL
implementation failure. In Information Technology 2008. ITSim 2008 (pp. 1–4).
31. Stolterman, E., & Fors, A. C. (2004). Information technology and the good life. In B. Kaplan, D.
P. Truex, D. Wastell, A. T. Wood-Harper, & J. I. DeGross (Eds.), Information systems research.
IFIP International Federation for Information Processing (Vol. 143). Boston, MA: Springer.
32. Utesheva, A., Cecez-Kecmanovic, D., & Schlagwein, D. (2012). Understanding the digital
newspaper genre: Medium vs. message. In European Conference on Information Systems.
33. Westerman, G., & Bonnet, D. (2015). Revamping your business through digital transformation.
MIT Sloan Management Review.
250 H. Ikegami and J. Iijima
34. Westerman, G., Bonnet, D., & McAfee, A. (2014). Leading digital. Harvard Business Review
Press.
35. Yu, H. (2017). Networking China: The digital transformation of the chinese economy.
Champaign: University of Illinois Press.
Coordinating Innovation in Digital
Infrastructure: The Case
of Transforming Offshore Project
Delivery
1 Introduction
1 Drawing upon Tilson et al. [1] we understand digitalization as the socio-technical processes through
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer 251
Nature Switzerland AG 2020
R. Agrifoglio et al. (eds.), Digital Business Transformation, Lecture Notes in Information
Systems and Organisation 38, https://doi.org/10.1007/978-3-030-47355-6_17
252 M. Haghshenas and T. Østerlie
widely acknowledge the relationship between digital innovation and the transforma-
tive impacts of digitalization, just how and by what mechanisms the two are linked
remains an issue of much debate among IS researchers [3–7].
In this paper, we contribute towards these discussions through a case study of
digital innovation for transforming project delivery in the offshore construction
industry. Through this case study, we empirically elaborate how the open-ended and
generative potential of digital innovation in practice has to be negotiated against the
installed base of technical and organizational arrangements in digital industrial trans-
formation. This argument supplements ongoing discussions about the open-ended
possibilities of digital technologies in IS research [e.g. 3] by emphasizing how digital
innovation unfolds within the confines of existing industrial, organizational, and tech-
nological structures. To this end, we empirically demonstrate that digital innovation
network dynamics emerge through the interplay between generativity and installed
base.
We pursue our argument through an analysis of digital innovation in the Open
Industry Platform (OIP, pseudonym for maintaining anonymity), an industry-level
collaboration project in the offshore construction industry. Specifically, we follow
the challenges OIP faces in transitioning from a stage of mobilizing industry support
for the project towards a full-scale digital innovation project. Emphasizing how
digital innovation is negotiated towards an installed base of existing socio-technical
arrangements, this paper can be regarded as a response to Nambisan [6] call for
more research on institutionalized aspects (i.e. installed base) of digital innovation.
More specifically, this paper contributes to theory on digital innovation networks in
three ways. First, we empirically demonstrate and draw implications of a temporal,
evolutionary dimension to digital innovation networks. Second, we elaborate upon
and substantiate the need for coordinating mechanisms to evolve as digital innova-
tion networks change. Third, by arguing for the embeddedness of digital innovation
networks in other network structures and its implications for digital innovation. We
also draw practical implications for coordinating large-scale and complex digital
innovation projects.
can be procrastinated until the point of use [3]. This differentiates digital innovation
from earlier forms of IS innovation [10] by two distinguishing features: the changing
role of digital technology in innovation from operand to operant resources, and a
shift in innovation locus from firm-centric to innovation networks.
Pervasive digitization changes the role of digital technologies from an enabler for
innovation (operand resource) to a trigger for innovation and medium through which
innovation unfolds (operant resource) [11]. Digital technologies as operant resource
conflates innovation product with process [11], with attention shifting towards recon-
figuration [9] of innovation processes and the generativity unleashed by digital
resources. Pervasive digitalization also shifts innovation locus from firm-centric to
innovation networks. Innovation no longer unfolds within a single company, but
through a network of actors [1].
Digital innovation affords, as such, new modes of coordination. Based on the
two distinguishing characteristics of digital innovation, Lyytinen, et al. [4] forward
a framework for innovation network coordination that characterizes innovation
networks along the two axes of (1) heterogeneity of operant resources, and (2) distri-
bution of coordination and control within the innovation network structure. Through
this framework, they forward that there is limited need for social and cognitive trans-
lation when innovation networks consist of “a homogenous pool of actors and related
tools that are readily identified” (ibid., p. 58). Lyytinen et al. define cognitive translate
as “a generative process whey innovation knowledge is identified, produced, refined,
integrated and evaluated partially through digital means in its movement towards
(…) being stabilized in a new product” (p. 55), and social translation as the processes
through which “an innovation process, by necessity transforms the social space of
the actors in the innovation network” (p. 56). As such, in networks of actors consists
of heterogenous operant resources, coordination mechanisms’ need to support social
and cognitive translation. Specifically relevant to this paper is what Lyytinen et al. [4]
characterizes as ‘anarchic’ digital innovation networks; i.e. networks with operant
resource heterogeneity and distributed control and coordination as ‘anarchic’. These
networks are characterized by collaboration of self-adjusting actor-to-actor networks
driven by opportunistic behavior with “actors spontaneously sensing and responding
to their continued market relevance and viability/sustainability” [12].
Digital infrastructures offer a pertinent example of anarchic innovation networks.
Digital infrastructures underlie pervasive digitalization of organizational life [1].
Drawing upon a network perspective on infrastructure [cf. 13], Tilson et al. [1]
characterized digital infrastructure as “shared, unbounded, heterogeneous, open, and
evolving socio-technical systems comprising an installed base of infrastructure capa-
bilities and their user, operations, and design communities”. Digital infrastructure
innovation is, as such, subjected to heterogeneous and distributed actors’ indepen-
dent choices beyond the control of any central actor [14]. A key challenge is, as
such, handling the different interests. However, as Sørensen [14] notes, specific
control mechanisms are needed to coordinate and balance distributed action for
digital infrastructure innovation to be successful.
While there is some research on coordination in networks of heterogeneous
operant resources and distributed control and coordination, Lyytinen et al. [4] argued
254 M. Haghshenas and T. Østerlie
that the main challenge in digital infrastructure innovation is to actualize digital inno-
vation in such networks. The degree of alignment between network actors is a partic-
ular challenge pertinent to this paper. Swanson and Ramiller [15] forwards the notion
of ‘organizing vision’ to explain the productive capacity industry buzzwords have in
mobilizing and shaping actors’ expectations and opportunities in innovative applica-
tion of digital technologies. Similarly, Pollock and Williams [16] shows how industry
analysts’ classifications of different digital technologies influence the trajectories
of emerging classes of digital technologies. While both studies show coordination
across heterogeneous networks, they do so among loosely aligned actors. While some
mechanisms function in loosely aligned networks (such as organizing visions), other
mechanisms are needed as networks become more closely integrated and aligned;
as in digital infrastructure innovation. Furthermore, while IS scholars acknowledge
the importance of digital innovation coordination, Nambisan [6] argues there is still
lack of knowledge about institutionalized aspects of innovation. In the case of digital
infrastructure innovation, such institutional aspects include the installed base of orga-
nizational, technical, and financial investments [17]. As such, digital innovation coor-
dination needs to encompass the tension between the generativity and open-ended
potential of digital innovation [3] with the digital infrastructure’s installed base.
This paper draws upon the authors’ engagement with digitalization of offshore
construction projects over the past three years. The empirical data are mainly from
the first author’s embedded case study [18] of OIP (project title along with company
names have been anonymized). OIP is a collaborative project among companies
throughout the offshore infrastructure industry. The project aims at developing
an industry-wide system for digital exchange of technical information in offshore
construction projects.
Participant observation [19] has been the first author’s main data collection method
for the case study. The author has been embedded with an OIP project team located at
HostCo, the company responsible for project management of the joint project, from
November 2018 through April 2019. During this period, the author spent 3–4 full
days a week at HostCo, for a total of 54 days of participant observation. The author
was provided with office space together with the project team and OIP management,
with full access to observing meetings, spending time talking with the project team
and management, as well as contributing by maintaining the project’s document
repository. Data from observations have been written in a field notes journal [20].
The first authors’ participant observation has been supplemented with both
authors’ interviews and analysis of documents related to the project and the overall
transition towards digital delivery of offshore construction projects. We have individ-
ually and together done 24 semi-structured interviews [21] with OIP’s project partic-
ipants including software engineers, domain experts, management-level participants
and the project initiators.
Coordinating Innovation in Digital Infrastructure … 255
We have conducted data analysis and collection in parallel. Initial data analysis
was informal, aimed at narratively analyzing observations and interviews to form an
overall understanding of the project. Over time, data analysis turned more system-
atic through coding of interview transcripts and fieldnotes for concepts and topics.
During this process, we supplement the emerging analysis by sampling from the
second authors’ fieldnotes from participating in meetings and workshops related to
digitalization of offshore construction projects at the industry level. Throughout this
process, we sought to relate aspects of the emerging analysis back to different poten-
tial theoretical venues. In this paper, we draw upon literature on digital innovation
networks and mechanisms for coordinating these.
The Open Industry Platform project sought to establish a system for digital exchange
of technical information shared by all companies throughout the Engineering,
Procurement, and Construction (EPC) industry. The EPC industry delivers offshore
infrastructures such as pipelines, new production facilities, and more recently
offshore windmill parks through large and complex infrastructure projects. The main
contractor (usually referred to as ‘the EPC company’) subcontracts and outsources
much of the project activities through a heterogeneous ecology of subcontractors,
vendors, and service companies with different specialties. OIP was, to this end,
organized as a collaborative project between key companies representing different
stakeholders in this ecology.
Digital delivery is considered the next step of digitalization in the EPC industry.
While practically every individual company have digitalized their activities, digital
delivery is “the use of integrated software and processes across the project ecology”
[22]. Technical information is the basis towards which companies in EPC projects
verifies that individual pieces of equipment fulfil technical and regulatory require-
ments. Furthermore, forwarding the project as the transition ‘from document-centric
to data-centric’ exchange of technical information, the initiators projected how OIP
would not merely replace existing work processes. Seeking to mobilize industry
support for the project during the first six months of 2018, OIP’s initiators forwarded
the project as the missing piece in transitioning towards digital delivery of EPC
projects:
What we are doing is a game changer, and can make tremendous changes to how we are
working in large [offshore] construction projects (…) (OIP project participant, fieldnote
excerpt)
“So, I now see that the project has been somewhat oversold in that the foundations of the
project is more based on, let’s say, hopes and aspirations rather than being expressions of a
clear plan [of project goals and how to achieve them].” (Interview excerpt)
Conflicting views on the nature of digital innovation in OIP lie at the core of the
controversy threatening OIP’s continuation after the preparatory phase. Echoing
Schumpeter, Henfridsson et al. [3] forward that “[r]ecombination is at the heart of
innovation” (p.89). Rather than conceiving of digital technologies as pre-packaged
applications or services, Henfridsson et al. (ibid., p.90) forward the notion of digital
resources, “entities that serve as building blocks in the creation and capture of value
from information”. The technical approach chosen for OIP, which all participants
agreed upon, followed a similar logic. Rather than developing a self-contained appli-
cation, OIP was to provide a digital resource—the OIP Core—that its participants
could freely integrate with their own technical and organizational arrangements.
While agreeing on this, whether OIP Core would form the basis of a new infrastruc-
ture for digital EPC project delivery or simply provide functionality to be inserted in
existing technical and organizational arrangements remained contested throughout
the project period.
We conceptualize this as an unresolved tension between divergent views on the
nature of digital innovation in OIP; between an emphasis on digital infrastructure
innovation versus an emphasis on innovation in digital infrastructure. We draw the
line of demarcation between the software engineers developing OIP Core, on the
one hand, and the domain experts tasked with updating national guidelines on infor-
mational requirements for different classes of equipment on the other. Emphasizing
the open-ended, transformative, and generative potential for a large-scale transition
from document-based to data-oriented requirements handling, the software engineers
regarded OIP as digital infrastructure innovation. The domain experts emphasized
the need for OIP Core to take into account operators’ and EPC companies’ installed
base of financial, technical, and organizational investments in digital EPC project
delivery in general, and digital exchange of technical information in particular. As
such, they viewed OIP as a form of innovation in digital infrastructure (Table 1).
Organized around two related activities, OIP faced two possible points of departure at
project initiation: (1) focus on updating national guidelines for technical information,
or (2) focus developing a technology for expressing the requirements laid down in the
258 M. Haghshenas and T. Østerlie
updated national guidelines. There were discussions from onset of the project about
which of these two activities to consider as driver of project activities. The software
engineers working on OIP Core advocated that developing the technological basis
of the project should be central to proceeding with updating the national guidelines.
Although the domain experts agreed that the updated national guidelines should be
digitized from the onset, their view on OIP Core’s role in the project diverged from
that of the software engineers:
The goal is to update the standards [national guidelines for technical information]. The
technology [OIP Core] is to support this process, rather than setting the premises for the
standardization. (Fieldnote excerpt, OIP initiator)
At the onset of the preparatory phase, HostCo donated the results from a company-
internal project for digitally expressing requirements on a machine-readable form.
Their argument was that building on this as the technological basis for OIP would
give the project a ‘flying start’. The donated technology, which became OIP Core,
was a technology for digital requirements handling in general. This aligned well with
HostCo’s other business areas in requirements validation and verification:
“We [HostCo] are working with requirement in very broad scale and large volume. Much of
what we are doing is about creating rules and publishing guidelines where most of them are
based on industry standards. The complexity in understanding set of rules is work intensive.
(….) It [OIP Core] will provide computer assistant requirement management by which we
can move the burden of knowing and applying complex rules to the computer and then
improve quality.” (Interview excerpt, software engineer)
Deciding to use HostCo’s general digital requirement technology for OIP Core
emphasized requirements handling and its transformative potential on digital EPC
project delivery. While the technology provided the domain experts with a format for
unambiguously expressing requirements, they remained uninterested as their focus
was on how digital technologies could simplify time-consuming and error-prone
aspects of their work. As such, within the first months of OIP, the disagreement on
project driver came to be drawn between the software engineers seeking to estab-
lish development of OIP Core, on the one hand, and the domain experts wanting
Coordinating Innovation in Digital Infrastructure … 259
technological development to be driven by the user needs for updating the national
standards, on the other hand.
The software engineers attributed the domain experts’ skepticism of digital
requirements handling in general as a failure to grasp OIP Core’s generative poten-
tial. As such, they translated the domain experts’ objections to OIP Core’s emphasis
on digital requirements handling as a form of user resistance. As a software engineer
noted:
I have been in the oil and gas industry for many years myself, and I know that this is an
extraordinary conservative business. Engineering and engineers by themselves are particu-
larly conservative and procedurally oriented, right? And used to doing things the way they
have always done. (Interview excerpt)
From the domain experts’ point of view, however, software engineers failed to
grasp OIP’s role in the wider context of transitioning towards digital EPC project
delivery:
We were introduced to an application which [the software engineers] believe is the best
solution. But as we moved on, we understood this was only a small piece of the bigger
picture. This is the drawback of [HostCo] having the potential solution in-house. (Interview
excerpt, domain expert)
The domain experts attributed the focus on digital requirements handling to a lack
of domain knowledge among the software engineers. The operators’ domain experts
argued the software engineer’s insistence on digital requirements handling’s gener-
ative potential failed to appreciate that the recipient and end-user for the technical
information generated during an EPC project are the operators’ life-cycle information
departments.2
The emphasis kind of changed towards the HostCo technology rather than focusing on the
technical [information] requirements. I think they gave too much focus on that (…). In a
way the work was done on the technology [OIP Core], it is kind of difficult to understand
how that would work before agreeing upon what we want to digitalize and used that engine
for. (Interview excerpt, management-level stakeholder operator)
Similarly, the EPC companies’ domain experts argued that focusing on digital
requirements handling failed to acknowledge key competitive dynamics in EPC
projects. While technical information is the basis for validating that delivered equip-
ment fulfils technical requirements, requirements validation efficiency is a key
competitive factor among companies in the EPC ecosystem. All companies therefore
have internal systems for requirements validation already. Moving such function-
ality to the digital infrastructure would undermine these companies’ organizational
and technological investments in requirements validation efficiency. As such, the
disagreement over OIP Core’s functional scope was not solely about functionality
per se, but also on whether OIP’s focus should be on digital infrastructure innovation
or innovation in digital infrastructure.
2 Life-cycle information departments are responsible for providing technical information to internal
OIP is infrastructural in ambition and scope. The offshore industry’s interest organi-
zation clearly signals OIP’s infrastructural ambitions by concluding their report on
future competitiveness with
Digitalization: collaboration, sharing, openness, standardization. OIP is the foundation.
This statement reflects what Star and Ruhleder [23] refers to as the ‘common-sense
view’ of infrastructure as “substrate (…) something upon which something else ‘runs’
or ‘operates’”. The conclusion forwards the ambition of OIP as the substrate for “col-
laboration, sharing” to underpin digital EPC project delivery. OIP is infrastructural
in scope in its focus on cross-domain standardization. Henfridsson and Bygstad [13]
describes a relational perspective on infrastructures. This perspective emphasizes
infrastructures as socially embedded and coordinated across social worlds and stan-
dards. Companies throughout the EPC industry tend to spend an inordinate amount
of time sifting through technical equipment information. Different suppliers provide
the information on differing formats and with differing information depending upon
the customer. In worst case, the same supplier can provide the same customer with
differing information for the same piece of equipment as operators have limited
standardization of technical information across their development projects. OIP is,
as such, infrastructural in scope as standardizing the information elements to be
provided for specific classes of equipment is key to coordinating across the different
social worlds involved in EPC projects.
Both of these perspectives of OIP’s infrastructural aspects are well acknowl-
edged among the participating companies, and link closely with the view of OIP
as digital infrastructure innovation; the innovation of the infrastructure for digital
EPC project delivery. Less acknowledged, however, is how OIP is also innovation in
digital infrastructure.
OIP had been preceded by a series of smaller, independent, yet related collabora-
tive projects focusing on different aspects of digital exchange of technical informa-
tion. Companies have, in the past, pursued digital EPC project delivery internally.
The effect has been that vendors, subcontractors, and EPC companies spend much
effort on transferring data and information to and from different companies’ digital
delivery systems. Key stakeholders throughout the EPC industry (including OIP’s
initiators) have therefore sought to consolidate and move internal systems onto what
they referred to as ‘the common arena’ over the past years. All participating compa-
nies, apart from HostCo, have previous investments in at least some of these projects.
In mobilizing participants for OIP, the project initiators therefore highlighted the
importance of OIP as a continuation and consolidation of these past projects. The
domain experts’ objections to OIP Core’s emphasis on digital requirements handling,
can be understood as a failure by the software engineers to acknowledge that OIP
is not developed in isolation, but within an installed base of financial, technolog-
ical, and organizational investments [17] made by companies throughout the EPC
ecosystem.
Coordinating Innovation in Digital Infrastructure … 261
The EPC industry draws upon a wide array disparate, frequently overlapping, and to
a certain degree even redundant digital systems for creating, exchanging, and storing
information in a single infrastructure project or for an installation. The degree to
which companies in the EPC industry implement digital delivery varies greatly. Most
energy companies have their own internal systems for digital project delivery that all
subcontracted companies are required to use. Similarly, all EPC companies have their
own systems for digital delivery that their subcontractors and vendors are required
to use. Even the large equipment vendors have their own internal systems for digital
delivery. Some of the systems used are commercial software offering with a higher or
262 M. Haghshenas and T. Østerlie
Focusing on developing the OIP Core based on the first scenario, failed to encom-
pass the existing systems’ functionality. While, domain experts translated HosCo’s
tendency for development of open platform as their effort for gaining generative
potential over OIP’s outcome, software engineers referred to their lack of acknowl-
edgment of the existing system’ functionality in order to dispense with the over-
lapping and redundant systems. Indeed, divergent focus on the digital infrastructure
innovation and innovation in digital infrastructure lead to the conflicting views over
architectural aspects of OIP’s outcome.
Coordinating Innovation in Digital Infrastructure … 263
the case of OIP, however, there was no such alignment of the installed base. Rather,
OIP’s outcome needed to fit with the participating companies previous technolog-
ical and organizational investments in different approaches to digital delivery. While
it is not correct to say that OIP management did not acknowledge this, our anal-
ysis illustrates how digital innovation coordination needs to encompass the tension
between generativity and open-ended potential of digital innovation [3] with the
digital infrastructure’s installed base.
The practical implication of our study relates to networks of projects’ participants.
Due to the fact that digitalization changes the way innovation unfolds, from a single
firm to the networks of actors, considering the heterogeneity and distributed features
of innovation networks are at the core. Based on the networks’ configuration (whether
it is heterogenous or homogenous, centralized or decentralized), coordination needs
to be considered as an evolving and achieved accomplishment. Respectively, the first
feature characterizes that although networks of actors may not be changed through
the project, new modes of coordination are required as projects progress to the next
stage. In our case, the reason why challenges arise was lack of proper coordination and
ability to align the coordination mechanisms to the changes when projects progress
to the next phase (i.e. from preparatory phase to the project proper).
More importantly, the embeddedness of innovation networks may exist in large-
scale projects. For instance, as we showed in our case, the project network was
embedded in an industry network which made some challenges in coordination
mechanisms. Therefore, differentiating the industry level and organizational level
strategies is vital in coordinating such complex and large-scale projects.
In concluding, by focusing on the innovation networks we have provided insights
about how and why challenges arise during large-scale and complex projects, yet
future researches are needed to discuss the possible solutions in coping with such
challenges. For instance, future studies can investigate different coordination mech-
anisms (especially the ones used in more heterogeneous and distributed networks of
actors) and how they affect the project progress.
References
1. Tilson, D., Lyytinen, K., & Sørensen, C. (2010). Research commentary—Digital infrastruc-
tures: The missing IS research agenda. Information Systems Research, 21(4), 748–759.
2. Nambisan, S., Lyytinen, K., Majchrzak, A., & Song, M. (2017). Digital innovation manage-
ment: Reinventing innovation management research in a digital world. Mis Quarterly,
41(1).
3. Henfridsson, O., Nandhakumar, J., Scarbrough, H., & Panourgias, N. (2018). Recombination
in the open-ended value landscape of digital innovation. Information and Organization, 28(2),
89–100.
4. Lyytinen, K., Yoo, Y., & Boland, R. J. (2016). Digital product innovation within four classes
of innovation networks. Information Systems Journal, 26(1), 47–75.
5. Monteiro, E. (2018). Reflections on digital innovation. Information and Organization, 28(2),
101–103.
266 M. Haghshenas and T. Østerlie
Abstract Digital platforms and social media are now widespread and their diffusion
enables the development of digital ecosystems where organizations, users and firms’
stakeholders virtually meet, share knowledge, influence each other and co-evolve.
In order to effectively manage and exploit digital ecosystems, organizations require
to evolve their processes and capabilities. The paper aims are threefold: (1) under-
standing how restaurant managers perceive and approach the digital ecosystem, (2)
investigate how they concretely manage the digital ecosystem, and (3) comprehend
what organizational competences are perceived as useful to effectively manage the
digital ecosystem. We adopt an explorative approach through a qualitative analysis
of 54 companies in the food and beverage service sectors.
1 Introduction
The Web and, in particular, social media have radically changed the business land-
scape, with relevant consequences on organizations’ knowledge management activ-
ities. Basically, social media stand for open participation and user-interaction, e.g.
through user groups and online communities, forums, blogs, wikis and social network
sites [1]. Through social media, stakeholders have a powerful medium to share knowl-
edge and information. From this perspective, the Web is a fundamental information
source for organizations, especially for what concerns stakeholders’ opinions. Due
to the increasing easiness and user-friendliness of online publishing processes, espe-
cially if compared to traditional media, every Web user is now able to communicate
unmediated and unchecked contents via simple and widely used publishing tools,
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer 269
Nature Switzerland AG 2020
R. Agrifoglio et al. (eds.), Digital Business Transformation, Lecture Notes in Information
Systems and Organisation 38, https://doi.org/10.1007/978-3-030-47355-6_18
270 C. Dossena and F. Mochi
thus affecting firm’s legitimation and reputation [2]. E-word of mouth communica-
tion (e-WOM) is a major part of online consumer interactions, particularly within the
environment of online communities [3]. Modern social media make easier and viru-
lent the diffusion of comments, anecdotes, opinions, and this can be both profitable
and problematic for online reputation. Park and Lee [4] demonstrate that just one
negative comment can contribute to worsen the reputation within an online forum,
while the perception of a positive reputation is merely proportional to the number
of positive comments. Therefore, online reputation is a resource cumulated in time,
it is also quite ‘fragile’ and quickly damageable [5–7]. This makes more important
the proactive interventions in managing the environment of online communities. In
academic world many authors have studied online reputation both at an individual
and a firm level, focusing mainly on the opportunities and threats of e-WOM [8, 9].
From an empirical point of view, a growing number of organizations are developing
a digital strategy [10, 11] or are developing processes of digital transformation [12,
13]. However, despite the increasing attention paid from both academics and prac-
titioners on how to approach to the digital world, there isn’t a dominant reference
model or best practices yet [14]. In particular, there is a need for a deeper under-
standing of the digital competences required to effectively explore and exploit the
opportunities coming from the digital platforms. The diffusion of digital platforms
enables the development of digital ecosystems where organizations, users and firms’
stakeholders virtually meet, influence each other and co-evolve. Consequently, orga-
nizations require to evolve their processes and capabilities in order to manage this
digital ecosystem.
Drawing on from those premises our research questions are the following:
• how restaurant managers perceive and approach to the digital ecosystem,
• how they concretely manage the digital ecosystem
• what organizational competences are useful to effectively manage the digital
ecosystem.
In order to answer our research questions, we follow an explorative approach
through a qualitative analysis of 54 businesses in the food and beverage service
sectors. With this research we thus expect to find some answers about how restaurant
managers approach and manage the digital ecosystem and the competences and
behaviors that managers may adopt.
The research aims at contributing to the digital ecosystems’ literature, the e-HRM
literature and the IS literature. Furthermore, it will offer managerial implications of
digital ecosystems’ effectiveness and on the behaviors and capabilities that the HR,
managers and firms owners have to monitor, search and promote among employees
and themselves. Lastly, it will give managerial suggestions on how to deal with
e-WOM and reputation issues.
Organizational Capabilities for Social Media Management … 271
2 Theoretical Framework
Previous literature in hospitality and tourism management noted that consumers are
becoming “hyper-digital”, an “always-on consumer, using connected devices every
day or multiple times a day” [15]. Before the advent of the Internet, word of mouth
(WOM) was the most useful tool for marketing research and the most influential
source for information exchange [9]. e-WOM is defined as “any positive or negative
statement made by potential, actual, or former customers about a product or company,
which is made available to a multitude of people and institutions via the Internet” [16:
p. 39]. Fox and Longart [8] investigated restaurant marketers’ use of social media as
part of an integrated marketing communication strategy. They highlighted some rele-
vant recommendation to restaurant marketers in order to create a positive e-WOM for
the restaurant (e.g. maintain fluid and flexible communication, adapt tactics by the
channel, i.e. by the social media platform used, give stickiness to the content in order
to avoid boredom and predictability, adapt the social media strategy to include mobile
devices in order to follow the increasing trends towards mobile consumption of social
media). Similarly, Ghiselli and Ma [17] examine the use of social media by restau-
rants in China. Their results suggest that even if restaurants are not very active on the
four main Chinese platforms (WeChat, Dianping, Baidu and Meituan), actually they
are making efforts to improve their social media presence, especially upscale restau-
rants. Surprisingly, international chains are doing worse than domestic restaurants,
but the authors stated that this probably is due to the fact that social media landscape
in China is drastically different from that in the West. Although consumers seem to
appreciate online ordering and online payment, they are not provided widely. Ghis-
elli and Ma [17] also adopt the consumers’ perspective and investigate the extent to
which consumers are using social media to obtain information about dining options.
They found that 85% of participants (a total of 254 responses were considered) use
social media to search for restaurants; 15% of participants indicated they use social
media to search for restaurants almost every time. Older participants were less likely
to use social media to search for restaurants, as they trust friends’ recommendations
more. The authors also investigated the usage of different social media for the restau-
rant selection (e.g. Dianping, WeChat, Baidu, Meituan, Tripdvisor), they found that
those social media were almost equally used when looking for restaurants. Moreover,
they investigated the willingness to receive update information from the social media
pages of the restaurants (69% of the participants were willing to receive social media
updates at least once a week). Lastly, they investigate some consumers preferences
and highlight that consumers “prefer (in order): real-time updates (e.g. special offers),
GPS/location and direction services, online menu information, online ordering (for
delivery and carryout), average spending/expectation, a social function (likes, share
with friends, check in where you have been, rating, etc.), online payment, new menu
items, reservation/waiting time and an interaction function (leave message, provide
272 C. Dossena and F. Mochi
feedback)” [17: p. 257]. Similarly to Ghiselli and Ma [17], in 2011 Jeon and Jang
[18] investigate which restaurant experiences trigger customers to engage in posi-
tive e-WOM. The results show that restaurants’ food quality positively influences
customers to spread positive e-WOM, because diners want to help the restaurant;
also satisfactory service and a superior atmosphere triggered positive e-WOM. On
the contrary, price fairness did not drive diners toward e-WOM. As previous research
shows us, web sites and social media allow users to be influenced in the restaurant
choice by the e-WOM [17, 19]. Those tools have completely reshaped the hospitality
industry scenario and changed the sources customers use/trust to search for hotels,
locate restaurants, place orders, make reservations, plan trips and share experiences
[20].
Social media have significantly impacted the tourism system [21] since they are
widely adopted by travelers to search, organize, share, and annotate their travel stories
and experiences through blogs and microblogs (e.g., Blogger and Twitter), online
communities (e.g., Facebook, Qzone RenRen, TripAdvisor and TheFork), media
sharing sites (e.g., Instagram, Flickr, Pinterest, and YouTube), social bookmarking
sites (e.g., Digg), social knowledge sharing sites (e.g., Wikitravel), and other tools
in a collaborative way. Social media are useful for managing customer relationships
with their unique ability of attracting customers through in-depth, focused, and user-
generated content, engaging customers through social interactions, and retaining
customers through relation building with other members [22]. Dellarocas [23] also
suggested that social media provide tourism companies with unprecedented opportu-
nities to understand and respond to consumer preferences. Analyzing the comments
on online communities such as TripAdvisor, organizations are able to better under-
stand what their guests like and dislike about them and their competitors. Conse-
quently, tourism businesses have been integrating social media platforms into their
websites to enhance customers’ travel information searching experience [24, 25].
Leung et al. [26] reviewed and analyzed social media-related research articles in
tourism and hospitality sectors. Adopting both the consumers’ and the suppliers’
perspectives, the authors found that consumer-centric studies generally focus on the
use and impact of social media in the research phase of the travel planning process.
Supplier-related studies in tourism and hospitality sectors [27] have concentrated
closely on the role of social media in supporting marketing activities—especially on
promotion [26, 28]—communication mechanisms, both internal and external to the
organizational boundaries, [27, 29], management function [30], and research area,
training and learning processes [31]. However, what are the main organizational
competences required for effectively managing social media remains still unclear
both for academic scholars and practitioners. Roy e Dionne [32] investigated how
4 SME (inns and restaurants) perceive social media and how they use it to sustain
their day-to-day work. In their multiple case study they found that all the businesses
Organizational Capabilities for Social Media Management … 273
developed the social media platform internally even though some organizations had
difficulties in doing so. The choice of content to publish on social media platforms
is usually not related to a formal and specific marketing strategy, but it is mostly
based on the personal choices of the person in charge of the platforms monitoring.
The 4 SMEs are aware that they are not exploiting social media to the extent they
could or should. Lack of time, lack of technological knowledge and lack of knowl-
edge on how to evaluate their performance on social media are only some of the
reasons that explain the underuse of social media platforms. In tourism literature,
Schmallegger and Carson [27] used case studies to discuss the challenges tourism
organizations face when using blogs to five key functions—promotion, product distri-
bution, communication, management and research. Ayeh et al.[33] explored Hong
Kong practitioners’ perceptions of social media and concludes that organizations
apply a variety of strategies in day-to-day management: organizations employ a
variety of social media platforms in order to maintain high exposure to potential
and existing customers, they continuously update the company’s account in order
to ideally raise the users interest, they assign a staff member to be responsible for
answering enquiries and comments through social media platforms, and they post
positive reviews on the social media to maintain a positive image and online reputa-
tion. However, the capabilities, competences and personal attributes needed to apply
a strategy in managing social media remain still unclear. Munar [30], focusing on
social media strategies for destination management organizations, argued that social
media require a new communication culture and training, but this is not enough to
succeed.
3 Methodology
In our sample there are two polarized positions regarding the evolution of the
ecosystem in the food and beverage service sector. Some interviewees seem enthu-
siastic about how their ecosystems are changed, especially thanks to the diffusion
of social media. Those people see digital ecosystem as a new world, a harbinger of
opportunities for the development of their business. Other interviewees have a more
circumspect attitude to social media, since they recognize in this new ecosystem
also potential threats for their business. In Table 1 we compared different posi-
tions of restaurant managers and owners as emerged by in-depth interviews. The
semi-structured interview data were grouped and coded into four first-order themes
[34].
Competitiveness and market shares
The majority of the interviewees perceive digital ecosystem as fundamental for the
success of their business (66.7% of respondents) and the remaining one third of the
sample declares that even if digital world is important, there are also other important
things for their business. Social media can be an effective means to reach more users
(through a greater visibility) and to increase customers if this visibility is combined
to a positive online reputation. According to 50 (out to 54) respondents, the Web
Organizational Capabilities for Social Media Management … 275
Restaurant managers speculate that their customers are very active online. In restau-
rant managers opinion, often (28% of respondents) their customers leave online
reviews, or at least occasionally (72%).
Social media can increase communication between restaurants and their stake-
holder, enabling a more direct communication. Of course, social media, enhance
a better listening of customers opinions, expectations and desires. As argued in
managerial literature, thanks to their interactivity, social media significantly empower
users, increasing the voice of the customers. However, social media are also a
useful tool for giving voice to restaurant managers. 81% of respondents declare
that the direct communication with the customer enables restaurant managers to
transform a negative comment in a business opportunity. However, there are also
restaurant managers in an opposite position, that perceive social media as something
that mediates relationships and hinders communication. The written form and the
asynchronous communication can lead to conflicts and misunderstandings. More-
over, surprisingly some restaurant managers highlight high communication costs.
Indeed, even if social media have apparently very low costs, somebody argue that
the management of the digital ecosystems has high costs, especially in terms of time
and competences required.
Transparency
Some restaurant managers and owners believe in the democratization of the Web,
especially for the high transparency, the lack of filters and control in sharing user-
generated contents within social media. However, most of them adopt a skeptical
position about transparency in the digital ecosystem, especially in negative reviews.
83% of respondent declares to have read at least an online comment and thought
that it was a fake review. About two third of the sample believes that highly nega-
tive comments may be fake reviews left by competitors in order to intentionally
damage their online reputation. In general, e-WOM is perceived as less truthful and
corresponding with reality than traditional WOM. Moreover, some respondents with
technological competences are aware that for having a good online reputation you
can “simply” pay social media agencies and develop Search Engine Optimization
(SEO) and Search Engine Marketing (SEM) activities. One interviewee implicitly
Organizational Capabilities for Social Media Management … 277
cites Asch conformity effect, i.e. the influence of the group majority on an individual’s
judgment. A restaurant owner declares “if users read very positive comments about
a restaurant, when they have to judge (or rank) their personal experience they tend
to conform with the group majority”. However, some digital platforms (e.g. Google)
are recognized as more credible than others (e.g. Tripadvisor).
Customer education
declare to have inadequate communication skills for the digital ecosystem, this latter
perceived with high degrees of complexity, dynamism and heterogeneity. Moreover,
8 restaurant owners (out of 54) declare to use ad hoc web tools for monitoring the
web.
Regarding Web monitoring activities, 63% of respondents declare that they don’t
perceive difficulties or critical issues in monitoring social media. However, web
monitoring is described as an activity particularly time-consuming. Nevertheless, the
majority of respondents continuously (daily or at least one time a week) monitors
online activities only on selected digital platforms: Google, TripAdvisor, Facebook
and Instagram. Another issue related to social media monitoring relies in under-
standing the truthfulness of online reviews. Interviewees identify fake reviews by
looking at some review or reviewer characteristics such as very generic review and
with a lack of details, reviews that are too similar to other reviews, that describe
situations that don’t confirm to reality and that are left by users with ambiguous
profiles. In order to improve online reputation, restaurant managers pay great atten-
tion in writing and in replying to online reviews. From this perspective, restaurants
in our sample adopt very different strategies. About a quarter of respondents reply
to all comments, both positive and negative ones. 31% of respondents reply only to
comments in specific digital platforms, perceived as strategic ones. 20% of restau-
rant managers choose to reply only to negative reviews (a respondent says “reply is
extremely important and, in case, also apologize”). The remaining respondents (14
out of 54) reply only occasionally (a respondent argues “the better strategy is never
reply, either to positive or negative reviews, since ‘the customer is always right”).
For writing on digital platforms, communication capabilities are essential for
message efficacy. Interviewees declare that communication has to be clear, brief and
linear and different communication style is needed accordingly to the social media
used.
Organizational Capabilities for Social Media Management … 279
styles allow a different use of jokes, slogans and photos. The language style depends
also on the type of restaurant, an elegant restaurant usually adopts a more formal
communication, while a fast food relies on informal one. Respondents also high-
light the importance of effective message by giving examples of the qualities that a
message must have such as clarity, linearity, sincerity and transparency as well as
charisma and surprise. Moreover, the message must contain valuable information for
the customers.
The message posted on social media has to be simple and clear, brief and strict to the point
in order to be easily comprehensible from everyone
It is better to write sincere messages, to show transparency and thus avoid possible critics
Customers management
The second set of competencies that the interviewees identified are related to
customers management. They highlight the relevance to have negotiation compe-
tencies in order to resolve conflicts smoothly, to understand the customers’ needs
and preferences and to engage in customers management processes also using CRM
software. In particular, in negotiation and conflict management interviewees mainly
focus on the ability to detect fake comments and reviews posted on their social media
pages and the ability to answer in a polite way but at the same time discrediting the
fake reviews, thus sometimes obtaining visibility and competitive advantage.
People’s engagement
Some respondents have focused on the competence of being able to engage people.
In order to engage potential customers, it is essential to know the restaurant strengths
and promote them. Managers need to build a strong brand identity to be recognizable
and different from others. Furthermore, building a strong identity helps to engage and
retain employees and promote a strong organizational culture. Lastly, there is nothing
such as a good story to engage people and to obtain their attention, and our results
show that promoting a good story about the restaurant and practicing storytelling is
a competence that is valued by some of the respondents.
Restaurant management
Lastly, there is one interviewee that declares to not be obsessed with digital and
social media competencies, because the relevant and first competence to own is to
understand who are the best players on the market and their social media strategies
in order to imitate them.
I only need to recognize which are the best practices in dealing with social media platforms
from other restaurants that seem effective in using them. Once I have understood those best
practices I simply try to replicate them on my social media
5 Conclusions
Our study leads to some relevant theoretical and managerial implications. Firstly, our
study gives an original interpretation of the web, recognized as a digital ecosystem
where organizations, users and firms’ stakeholders virtually meet, influence each
other and co-evolve. Secondly, the present work focuses on the food and beverage
service sector, that is still insufficiently investigated [8, 17]. In particular, we inves-
tigate how restaurant managers perceive and approach to the digital ecosystem, how
they manage social media, and what organizational competences are useful to effec-
tively manage the digital ecosystem. It is an attempt to investigate the competen-
cies that seem more relevant for effectively dealing with social media in the food
and beverage sector thus enriching both social media literature and hospitality one.
Moreover, the research aims at contributing to the digital ecosystems’ literature, the
e-HRM literature and the IS literature. The study also offers some relevant managerial
implications for practitioners regarding how restaurant managers concretely manage
digital ecosystem in day-by-day activities and what organizational competences a
282 C. Dossena and F. Mochi
restaurant manager should have according to how social media can be used and what
organizational purposes can be achieved. An interesting result is that some restaurant
managers use social media as a knowledge source for improving their offer and their
processes. From this perspective, restaurants could reinterpret digital capabilities as
a tool for continuously explore and exploit external knowledge shared within online
community. The social media are thus a tool that allow knowledge sharing and that
promote the transformation of organizational processes. Lastly, in this contribution
we try to give some managerial suggestions on how to deal with e-WOM and repu-
tation issues, e.g. how to write an effective message and how to manage and reply to
negative reviews. Social media can show competitors best practices in dealing with
negative reviews that can be imitated by other restaurants thus sharing knowledge
about problem solving competencies and negotiation abilities.
Limitations and future research
The research has some limitations, first of all the sample is still small, and a future
research can continue the data gathering for enriching the explorative study. The
sample is also composed by restaurant in the same Italian city. This criterium was
chosen in order to be able to compare the restaurants, however, future research can
replicate the study in other cities or Countries. Furthermore, there is the chance
of auto-selection bias of the sample of the second semi structured interviews. The
sample is indeed composed by a subgroup of the first sample that agree to further
investigate the use and perceptions of social media in the food and service sector.
Furthermore, the comparison with other Countries could reveal different approaches
in managing the digital ecosystems.
Lastly, a longitudinal investigation could be useful in order to understand if with
time and practices the restaurant managers and owners acquire new competences and
change their perception about the use of social media for their businesses.
References
1. Gorry, G. A., & Westbrook, R. A. (2009). Winning the internet confidence game. Corporate
Reputation Review, 12(3), 195–203.
2. Francesconi, A., Dossena, C., & Francesconi, A. (2015) A strategic and organizational perspec-
tive for understanding the evolution of online reputation management systems. In: L. Mola,
F. Pennarola & Za, S. (Eds.), From information to smart society—Environment, politics and
economics (pp. 49–61). New York: Springer.
3. Brown, J., Broderick, A. J., & Lee, N. (2007). Word of mouth communication within online
communities: Conceptualizing the online social network. Journal of Interactive Marketing,
21(3), 2–20.
4. Park, N., & Lee, K. M. (2007). Effects of online news forum on corporate reputation. Public
Relations Review, 33(3), 346–348.
5. Alsop, R. J. (2004). Corporate reputation—Anything but superficial: The deep but fragile nature
of corporate reputation. Journal of Business Strategy, 25(6), 21–29.
6. Grant, M. (2005). Contemporary strategic analysis (5th ed.). Oxford, UK: Blackwell.
Organizational Capabilities for Social Media Management … 283
29. Pantelidis, I. S. (2010). Electronic meal experience: A content analysis of online restaurant
comments. Cornell Hospitality Quarterly, 51(4), 483–491.
30. MunarMunar, A. M. (2010). Digital exhibitionism: The age of exposure. Culture Unbound.
Journal of Current Cultural Research, 2(3), 401–422.
31. Isacsson, A., & Gretzel, U. (2011). Facebook as an edutainment medium to engage students in
sustainability and tourism. Journal of Hospitality and Tourism Technology, 2(1), 81–90.
32. Roy, A. & Dionne, C. (2015) How SMEs evaluate their performance in reaching and attracting
customers with social media? In P. Peres & A. Mesquita (Eds.), ECSM2015-Proceedings of
the 2nd European Conference on Social Media (pp. 390–397), Portugal: Porto.
33. Ayeh, J. K., Leung, D., Au, N., & Law, R. (2012). Perceptions and strategies of hospitality
and tourism practitioners on social media: An exploratory study. In M. Fuchs, F. Ricci &
L. Cantoni (Eds.), Information and communication technologies in tourism 2012 (pp. 1–12),
Wien: Springer.
34. Gioia, D. A., Corley, K. G., & Hamilton, A. L. (2013). Seeking qualitative rigor in inductive
research: Notes on the Gioia methodology. Organizational Research Methods, 16(1), 15–31.
35. De Carlo, M., Canali, S., Pritchard, A., & Morgan, N. (2009). Moving Milan towards Expo
2015: designing culture into a city brand. Journal of Place Management and Development,
2(1), 8–22.
Achieving Trust, Relational Governance
and Innovation in Information
Technology Outsourcing Through Digital
Collaboration
Abstract Through an explorative case study, this paper provides insights on how the
adoption of a digital collaboration tool (i) can create a more trust-based relationship
between ITO client and suppliers, and (ii) can foster collaborative relationships that
result in both operational and strategic innovation outcomes. Our case study is based
on an ITO project developed by Infocert, the first Certification Authority in Italy,
having issued and managed more than 4,500,000 qualified certificates of digital
signature. Our findings show how digital collaboration can affect trust before and
during the engagement phase of the IT outsourcing process. The digital media tool
increased communication flexibility and supported temporary relationships based
on explicit rather than implicit agreements. This case, therefore, highlights how the
use of a digital collaboration tool can change relational governance in a short time
frame as trust among client and suppliers switched swiftly from affective attitudes
to a more objective relations based on competencies.
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer 285
Nature Switzerland AG 2020
R. Agrifoglio et al. (eds.), Digital Business Transformation, Lecture Notes in Information
Systems and Organisation 38, https://doi.org/10.1007/978-3-030-47355-6_19
286 G. Vaia et al.
1 Introduction
touch” [13, p. 46]. Also that literature shows how trust is still a critical element that
characterizes successful projects. Jarvenpaa and Leidner [14] consider trust as “piv-
otal” in a global virtual team to reduce the high levels of uncertainty endemic to the
global and technologically based environment. This problem is amplified in ITO rela-
tions often developed on the basis of opportunism. If trust is identified as fundamental
for successful virtual interactions, no studies—to our knowledge—have investigated
if a virtual environment may help in sustaining trust development between parties
during the complex context of the partners’ selection phase.
In this research, we conduct an exploratory case study on the adoption of a digital
media tool to govern ITO processes, in order to contribute to the theory in this domain.
In particular, through our empirical investigation, we propose an inductive study on
the impact of a digital media tool on ITO relational governance, focusing on trust as
the most relevant dimension for virtual environments.
3 Methodology
Our case study is based on an ITO project developed by Infocert, the first Certifi-
cation Authority in Italy, having issued and managed more than 4,500,000 qualified
certificates of digital signature. Infocert, started its business in 2007, and with 30 M
euros in revenues and roughly 150 employees, is a market leader for services like
electronic archiving and long-term storage, registered e-mail. Infocert designs and
implements IT solutions for document dematerialization. The company has clients in
several industrial sectors such as: banking, insurance, pharmaceutics, manufacturing,
energy, utilities, retail trade, environment, quality, security, healthcare, government,
trade associations and professional associations. The core business of the company is
represented by delivering projects and complex solutions on paper dematerialization,
where they have at competitive advantage.
Infocert’s business is largely based on technology exploitation in the collaboration
with its technology suppliers. Since 2007 Infocert’s technology suppliers have been
quite stable.1
In the first semester of 2012, Infocert decided to strengthen its strategic approach to
ITO, and in July set up a 6-month project with the aim of restructuring the outsourcing
lifecycle. The main goals of the project were to: standardize contracting and cate-
gories of outsourced services; improve the selection and monitoring of suppliers;
design a workflow for authorizations and document management; define clear criteria
1 During interviews, people reported that the number of suppliers ranged from 30 to 50, and over time
the rotation rate is roughly 10%. 10 suppliers are tagged as partners because are more proactive and
they share business goals and priorities with Infocert: “A partner is an external company with whom
I can share business intents, continuously, where everything is synchronized and fluid” (Infocert’s
Chief Information Officer).
Achieving Trust, Relational Governance and Innovation … 289
for negotiation and organizational levels to be involved. Results expected from the
project were a reduction of time spent in the whole process of about 30% and a cost
saving of about 15%.
In fact, Infocert’s ITO practices, at that time, could be characterized as follows:
• lacking a sourcing strategy;
• low use of advanced negotiation techniques;
• lacking Key Performance Indicators (KPIs) and supplier evaluation methods;
• lacking Service Level Agreements (SLAs);
• high transaction costs, due to the high effort required both to find the best supplier
for specific services, and to start and manage long negotiation processes; and
• lacking a structured outsourcing workflow with clear responsibilities, roles, and
goals.
Moreover, one of the main challenges faced by Infocert that motivated the decision
to restructure the outsourcing process was the loss of information and transparency
during the outsourcing lifecycle because 70% of the outsourcing activities occurred
outside the procurement office. Infocert noticed that ITO relationships were managed
mostly outside formal protocol and developed instead through informal interactions,
as is prevalent in the Italian business environment, causing communication and trust
problems).
The company started the outsourcing improvement project on November 2012
with the introduction of a digital collaboration tool for the management of supplier
engagement, evaluation and monitoring. By means of the tool they wanted to achieve
three distinct objectives:
• a more transparent process of information gathering about supplier rankings
from internal and external sources (for example, decision makers and influencer
communities);
• a better selection of suppliers through a self-application procedure, in order to
have the best match between competences needed by Infocert and offered by the
supplier;
• a strong collaborative relationship with suppliers during the early stage of service
design (through a flexible definition of the Request for Proposals, namely the
purpose of the bid in terms of products and services), in order to achieve superior
outsourcing outcomes.
The digital collaboration tool was designed to manage the internal workflow, the
process of scouting and ranking of suppliers, the supply specification and the eval-
uation of suppliers. The final digital collaboration solution was selected and imple-
mented by the end of 2012: it included all functionalities of social collaboration like
members’ profiles (to find and discover expertise), forums, activities (to view, manage
and organize tasks and tap into the professional network), files (to share documents,
presentations and other files with colleagues), etc. The tool enabled the involvement
of suppliers on the basis of a self-application and, for each tender, it created a new
collaboration environment where suppliers and Infocert could exchange information.
290 G. Vaia et al.
Our research observation began with the first ITO project that used the new digital
collaboration tool described above. The ITO project was started by Infocert to select
the supplier for a data storage.
The consideration of process-related and contextual features and the need to explore
an under-investigated area of research, and in particular the relationships between
different areas of investigation, called for exploratory and inductive research by
means of a case study [15, 16].
We followed Lincoln and Guba’s [17] guidelines for “purposeful sampling” in
choosing our informants. We initially selected interviewees from both Infocert and
the competing suppliers who actively participated in the bid process, and who would
be qualified to answer our main research questions concerning how the adoption of a
digital media tool influenced ITO relationships and performance outcomes. We next
used a snowball technique, asking each informant for his or her recommendations
as to who could best explain our topics of interest.
We made 19 interviews to key participants from both the client and the supplier
side (four suppliers, none of them was among Infocert’s “partners”, namely suppliers
with a long-term relationship with the client—see footnote 1) of the relationships, in
three different rounds of interviews developed across three years—2013, 2014, and
2015.
More than 20 h of interviews were carried out by the authors individually and in
various combinations, involving the IT Manager, Purchasing Manager and individ-
uals directly involved in ITO decisions on the buyer side, and the managers respon-
sible for the tender on the supplier side. Additionally, we collected archival data
regarding all ITO-project documents (initial request by the client, first offers by
suppliers, modifications and updates, up until the final winning offer), and chat logs
from the digital media platform (recording all the interactions between client and
suppliers, and between the client-firm’s members who took part in the ITO decision).
We recorded and took notes during interviews, and in those instances where data was
inconsistent we developed a new round of interviews.
Inconsistencies have been specifically confronted and resolved through triangu-
lation with archival data, and in some cases, they have been considered indicative
of different perspectives and used to better explain the very nature of supplier-buyer
relationships.
Given our main research questions, we focused our interview structure on the
governance of the relationship between Infocert and suppliers and on related ITO
outcomes. We asked our informants how the relationship was managed and devel-
oped, exploring in particular the use of relational governance. We investigated how
the digital tool affected trust, explicitly highlighting the differences between virtual
and traditional settings, and we tried to understand if our informants perceived that
the use of the digital tool also affected the ITO outcomes.
Achieving Trust, Relational Governance and Innovation … 291
In the analysis of our data we adhered closely to the guidelines of Gioia’s method-
ology [18], recognized and accepted as a coding procedure, following a three-step
process: (i) recording emergent first-order concepts; (ii) identifying second-order
themes; (iii) defining aggregate dimensions. This methodology for qualitative anal-
ysis has been developed with the explicit aim of making the process of analysis more
transparent and rigorous. The methodology, in fact, makes researchers present explic-
itly the connection between evidence (raw data) and derived theoretical constructs
used for theorization processes. Thus, following the procedure:
1. We started our analysis by identifying initial concepts in the data (open coding).
With the progress of data coding, we started searching for similarities in order
to reduce the number of emerging categories. In this first phase we used in vivo
codes in order to adhere faithfully to informant terms whenever possible, or a
short descriptive phrase when an in vivo code was not available.
2. Then we started the second-order analysis, confronting our first-order codes
with researcher-centric concepts, themes, and dimensions. In this second phase
we assembled similar codes into several overarching dimensions, which we
then compared with those from our theoretical background in order to discover
whether they had adequate theoretical referents in the existing literature.
3. From this comparison, we extracted our final aggregate dimensions, which
constitute the core of our results.
The final data structure [18] is illustrated in Fig. 1, which summarizes the process
and highlights how we derived the final aggregate dimensions from the first-order
concepts.
As presented in our data structure (Fig. 1), the results of our analysis highlight
four aggregate dimensions: (1) Relational Governance, (2) Trust, (3) Collaboration,
and (4) Innovation in ITO.
The challenge of objectives alignment was solved mainly through relational mech-
anisms: all suppliers, in fact, describe their interactions with the client as character-
ized by a relevant process of sharing goals, since client and suppliers started working
together to reach the best solution, thus strongly based on cooperation and reciprocity.
We shared common business objectives. (Client—IT Manager)
Interactions were developed through dialogue. (Supplier 3—Bid Manager)
292 G. Vaia et al.
Even though the engagement process was developed virtually (through the digital
tool), it also allowed for the building of personal ties among the employees of both
the client and the suppliers. Human relationships were fostered by the initial virtual
interaction, and the cooperative attitude was the trigger for developing or reinforcing
valuable personal relationships.
The technical level of interactions developed through the digital tool generated
also a lot of curiosity by the client, that maybe thought “these guys know the subject
very well, they made a very interesting question, a good proposal, …” and thus
pushed the parties to a constructive dialogue. It gave birth to a professional, but also
personal relationship. (Supplier 1—CEO)
The value was in the relationship. (Supplier 2—Bid Manager)
The relationship with the client, also from the personal point of view, has been
reinforced. (Supplier 3—Bid Manager)
As pointed out above, trust emerged as the main mechanism of relational gover-
nance that was at work during the ITO process. Our results show how, during the
ITO process, all persons involved developed a personal trust in client-supplier rela-
tionships. Our informants talked about involvement, reciprocity, and continuity in
describing the relationship created with the client. Additionally, our data demon-
strates the development of competence-based trust, describing trustful relationships
based on the mutual recognition of others’ competences. Suppliers felt that the client
was willing to evaluate different solutions, basing its evaluation only on meritocratic
aspects. Cooperation in designing the IT service was sustained and in turn sustained
the development of trust between client and suppliers.
As a result the client demonstrated a predisposition to grow and to avoid a
monolithic approach to only one supplier. (Supplier 1—CEO)
There was a constant process of sharing information and motivations of certain
choices. (Supplier 2—Bid Manager)
From the competence side, we could show that we were reliable and competent.
Our image has improved, since the platform allowed to break the prejudice clients
have always against new suppliers. (Supplier 3—Bid Manager)
The demand specialist and supplier managers reported that before the introduction
of the digital collaboration, the relationship with suppliers was managed on the
basis of personal relationships and outside formal lines of communication, a typical
impediment in Italian business relationships. Affective trust was the main element
through which the company based outsourcing relations with suppliers. This led to
a low transparency within the company, due to the negotiation carried out “behind
the scenes”, and it had a detrimental effect on the level of trust among colleagues.
This level of internal mistrust had one main detrimental consequence: the company
preferred to look for standard IT solutions to allow no personal interest into bids,
thus limiting innovation opportunities.
From the internal point of view, during the digital tender the procurement office
and the top management adopted a more active role and were more committed to the
demand specialists and other employees who were involved in the tender. Infocert’s
employees had the chance to demonstrate their competences and ideas about tech-
nology innovation and IT service innovation to their managers, thus increasing their
reputation. They also experienced an improvement in relational trust lowering the
detrimental effect of low transparency, through the direct management of suppliers.
We need to remain unbiased but we need flexibility i.e. sometimes we need to move
beyond the requirements that we have … and this tool gave us the chance to achieve
a balance between transparency and innovation (Client—Demand Manager)
294 G. Vaia et al.
After the tender, all the bid offers received by Infocert were nearly the initial
price set by the client. Nevertheless, the client judged the higher price to be “reason-
able.” The process of interaction created competence-based trust between client and
suppliers. As a result, through the interactions with suppliers, the procurement officer
realized the complexity of the design process, and that the technical offers and their
corresponding prices were aligned with other solutions available on the market. In
July 2013 they signed a standard (template) contract, with a negligible involvement
of the legal office, because of the relationship they built through the virtual platform:
Now the relational impact with the supplier during negotiation is less difficult. We
shared the entire process from the beginning and now I know the effort involved
in reaching a solution. The supplier does not allow a saving just to recognize my
role, as was done in the past, but we agree on the project and a future target.
(Client—Purchasing manager)
The transparency fostered by the use of the digital tool played a fundamental role
during the whole ITO process, both within the client company and between client
and suppliers. In fact, thanks to more traceable and open communication developed
through the digital collaboration tool, all the participants involved in the ITO process
were able to consolidate their social relationships. The internal transparency at Info-
cert was based on the clarity of the process through which a “winning” supplier
was selected. In particular, no doubts about the role and the legitimacy of selection
decision were raised, since all information and actions were traceable, documented
and justifiable. The external transparency characterized the exchange between client
and suppliers in the specification of clients’ requirements and expectations. In partic-
ular, all communications were traced and all requirements documents were posted.
Achieving Trust, Relational Governance and Innovation … 295
All stakeholders had the opportunity to ask for clarifications and to receive prompt
answers, thereby easing interactions and consolidating personal relationships.
The two dimensions of efficiency and sociality were highlighted during several
phases of the project. The “Request for Proposals” was continuously shaped and
improved by client and suppliers through interactions. Different cycles of improve-
ment took place, during which all actors involved could observe, participate and learn.
The tool facilitated a continuous evaluation process developed through the collection
of feedback from the internal communities-of-practice and the external communi-
ties of decisions makers. This continuous evaluation process also continued during
the delivery phase. This digitally supported process made it possible to discuss any
problems or doubts in real time, thus reducing the necessity to formalize every detail
in contractual agreements.
Analyzing and conceptualizing these data we used the three categories developed
by Weeks and Feeny [3] who positioned ITO innovation “as the introduction of
strategies, business processes, or technologies that are new to the relationship and
are intended and expected to lead to new business outcomes”. Authors define IT
Operational innovations as advances that involve technology changes like new oper-
ating systems or hardware, while Business Process innovations change the working
processes of the organization and, finally, Strategic innovations are those that change
product/service offerings or enable the company to enter new markets.
Here Business Process Innovation refers to the outsourcing process itself devel-
oped through the new digital collaboration tool. Indeed, our results show how docu-
ments and informants recognized a significant process innovation in the management
of outsourcing relationships through the tool. For example, the tender was conducted
in a completely new way, especially in the definition of requirements. The possibility
of posing questions to the client (and to see all the questions posed by the other
suppliers) and receiving quick feedback on the first drafts of proposals was deemed
by informants to be a significant business process innovation.
Strongly linked to the process improvement outcome was IT Operational Inno-
vation. Infocert discussed with suppliers the physical segregation of two IT infras-
tructures—Datacenter and Certification Authority—and the types of backup and the
sizing of the repository. Through continuous interactions, suppliers proposed to the
client a new multi-tenant architecture, improved the security system, and the use of
the service through a new “single technology platform” This innovation in architec-
ture is able to handle heavier workloads than the previous solution and the database
uses only a fraction of the server hardware capacity.
Through continuous interactions the client understood what the available
solutions were. (Supplier 1—CEO)
296 G. Vaia et al.
The analysis of the initial Request for Proposals and the final service purchased by
the client, as well as the informants’ declarations, show how the IT service as initially
designed was significantly improved. In particular, the service was re-designed in a
collaborative way between the client and suppliers, and the resulting requirements
were considerably different. The result, in our informants’ opinion, was a more
efficient and cost effective IT architecture.
The information exchange that took place during the evaluation phase of technical
proposals had produced a final proposal of architectural modification relevant in
terms of operational innovation. (Client—IT manager)
The constructive dialogue with the supplier allowed us to introduce an incre-
mental innovation that, without this contribution, probably would have never
been implemented. (Client—Demand manager)
As reported by our informants, this improvement resulted in several benefits for
the client, including: (1) cost reduction in the long run (due the consolidation of
hardware and shared database memory and files, which reduced costs for hardware,
storage, availability, and labor); (2) easier and faster transfer of data and code; (3)
easier management and monitoring of the physical database; (4) simpler backup
strategies and disaster recovery; (5) secure separation of administrative duties; (6)
easier performance tuning process; and (7) fewer database patches and upgrades.
Additionally, two years after the conclusion of the tender, another important
outcome; namely, Strategic Innovation emerged. As a result, of the collaborative
procurement process and resulting competence-based trust, the client and one of the
suppliers (different from the firm winning the tender at that time) together developed
an innovative new commercial product. As reported by our informants, a strategic
innovation was jointly developed based on a new innovative business model. Focusing
on their respective core competences, which were discovered through interaction in
the virtual environment created for the tender process, the two firms discovered
a potential area for collaboration, and introduced a new information product to the
market. The client had the opportunity to study in depth the supplier’s sets of resources
and competences, thus launching a positive discussion and the emergence of new
and innovative ideas.
Since it was necessary to be very concise and incisive with our questions, we
tried to be very precise from the technical point of view. This, in turn, made the
client answer in a very precise way, to give answers that were at the level of the
questions posed. This generated a relationship that some time later allowed us to
develop together an innovative business model, going to the market in a completely
different way. We developed a common intermediation platform for managing
information for our business clients: and all of this was possible because we
both had the technology, and thus we were able to make our ideas real. (Supplier
3—CEO)
Based on these findings we discuss the primary contribution of our research in
the following section.
Achieving Trust, Relational Governance and Innovation … 297
5 Discussion
The analysis and findings of Infocert case study emphasizes the positive influence of
the digital collaborative media on trust as a component of relational governance and
more importantly on ITO firm performance, particularly operational and strategic
innovation outcomes.
In the Infocert case study the digital collaboration tool enabled relational gover-
nance during the ITO process and created a virtual environment that enhanced trust
between client and suppliers. In particular, collaborative relationships have been
developed on the basis of a competence-based trust, instead of an affective kind of
trust as found in the literature. In this case, governance of the relationship was not
focused on the level of trust between the parties. Jarvenpaa and Leidner [19], for
instance, highlight how trust in virtual teams can increase or decrease over time, and
then become a potential governance mechanism. In our study, the focus is on the type
of trust that makes the temporal dimension less important. As our analysis shows,
in fact, relational governance has been developed through a kind of trust that does
not require the development of interpersonal relationships, and thus significantly
reducing the necessary timeframe.
In line with Rai et al. [19] we noticed that the exchange of high quality information
and the use of effective communication tools are essential facilitators for process
integration and for building trustful relationships in collaboration agreements. The
process of trust development, in our case, followed a quite different path with respect
to ITO than found in non-digital settings. The bidding process lasted over 3 weeks
and led the team of client personnel and suppliers to cooperate and have an open
communication relying more on “cognitive” elements [20]. Meyerson et al. [20]
noticed that people working in a temporary system deal with each other in terms of
professional roles, instead of social relationships. In this context trust is conferred
ex ante. This is called swift trust [19, 21].
Early in the process, suppliers started to share information and ideas within the
tool to interpret the Request for Proposal and reshape its scope, i.e. the characteris-
tics of the outsourced IT service. Client and supplier personnel perceived reciprocal
professionalism and competencies and a willingness to share information in order
to complete the task in the best fashion. Nevertheless, the collaborative relation-
ship between suppliers and between client and supplier, was not based on interper-
sonal social relationships (personal/affective trust), as predicted by the ITO relational
governance literature and by common in Italian business relationships. In this case,
five (5) informants on the client side and four (4) persons from suppliers reported
changes in the type of trust before, during and after the virtual RFP. Trust shifted
from a pure relational base to a combination of competence and identification dimen-
sions. In the relationship between client and suppliers during the RFP process, parties
understood the problem to be solved and they supported each other. The environ-
ment in which internal employees and suppliers discussed the design of the service
(leaving out the discussion of contract terms) led to a mutual understanding of the
company’s objectives and processes. This is defined as identification based trust [22].
298 G. Vaia et al.
There are limitations to this study that should be acknowledged. Our case study
focused primarily on the trust component of relational governance in an IT
outsourcing project, but not on other important components such as commitment,
relational norms, harmonious conflict resolution, mutual dependence [23]. Thus our
research does not provide insight as far as a comprehensive model of relational
governance in the ITO virtual relations in the different stages of the ITO lifecycle. A
second limitation regards the lack of analysis between the use of formal governance,
based on contracts, and relational governance, and the dynamic evolution between
them.
Future research should further study the relationship between digital collabo-
ration tools, trust and other relational governance dimensions and the impact on
firm performance outcomes, such as operational and strategic innovations, in IT
outsourcing context. Another interesting and important stream of research that could
be developed by future research regards the analysis of competitive and opportunistic
dynamics that can arise between suppliers, since the research here presented did not
explicitly tackled this point. This study has been influenced by the Italian context
where personal ties are critical to the development of business relationships, so ITO
governance is influenced by these cultural frames. Other studies should analyze the
Achieving Trust, Relational Governance and Innovation … 299
7 Conclusions
Our findings show how digital collaboration can affect trust before and during the
engagement phase of the IT outsourcing process. The digital media tool increased
communication flexibility and supported temporary relationships based on explicit
rather than implicit agreements. This case, therefore, highlights how the use of a
digital collaboration tool can change relational governance in a short time frame
as trust among client and suppliers switched swiftly from affective attitudes to a
more objective relations based on competencies. Most importantly the trust and rela-
tional governance changes facilitated by digital collaboration resulted in significant
operational, business process and strategic innovations. These findings contribute to
our knowledge of the powerful impact that digital collaboration tools can have on
building competency-based trust relationships between clients and suppliers in ITO
that can produce operational and strategic innovations.
References
1. Davila, A., Gupta, M., & Palmer, R. (2003). Moving procurement systems to the internet: The
adoption and use of E-procurement technology models. European Management Journal, 21(1),
11–23. https://doi.org/10.1016/S0263-2373(02)00155-X.
2. Ahuja, M. K., & Galvin, J. E. (2003). Socialization in virtual groups. Journal of Management,
29(2), 161–185. https://doi.org/10.1177/014920630302900203.
3. Weeks, M. R., & Feeny, D. (2008). Outsourcing: From cost management to innovation and
business value. California Management Review, 50(4), 127–146.
4. Lacity, M. C., Khan, S. A., & Willcocks, L. P. (2009). A review of the IT outsourcing literature:
Insights for practice. The Journal of Strategic Information Systems, 18(3), 130–146. https://
doi.org/10.1016/j.jsis.2009.06.002.
5. Lacity, M. C., & Hirschheim, R. (1993). The information systems outsourcing Bandwagon.
Sloan Management Review, 35(1), 73–86.
6. Lin, T., & Vaia, G. (2015). The concept of governance in IT outsourcing: A literature review.
In Proceedings of the Twenty-Third European Conference on Information Systems (ECIS),
Münster, Germany.
7. Goo, J., Kishore, R., Rao, H. R., & Nam, K. (2009). The role of service level agreements
in relational management of information technology outsourcing: An empirical study. MIS
Quarterly, 33(1), 1–28.
8. Poppo, L., & Zenger, T. (2002). Do formal contracts and relational governance function as
substitutes or complements? Strategic Management Journal, 23(8), 707–725. https://doi.org/
10.1002/smj.249.
9. Sabherwal, R. (1999). The role of trust in outsourced IS development projects. Communications
of the ACM, 42(2), 80–86. https://doi.org/10.1145/293411.293485.
10. Kim, Y. J., Lee, J. M., Koo, C., & Nam, K. (2013). The role of governance effectiveness in
explaining IT outsourcing performance. International Journal of Information Management,
33(5), 850–860. https://doi.org/10.1016/j.ijinfomgt.2013.07.003.
300 G. Vaia et al.
11. Mowshowitz, A. (1997). On the theory of virtual organization. Systems Research and Behav-
ioral Science, 14(6), 373–384. https://doi.org/10.1002/(SICI)1099-1743(199711/12)14:6%
3c373:AID-SRES131%3e3.0.CO;2-R.
12. Jarvenpaa, S. L., Knoll, K., & Leidner, D. E. (1998). Is anybody out there? Antecedents of trust
in global virtual teams. Journal of Management Information Systems, 14(4), 29–64. https://
doi.org/10.2307/40398291.
13. Handy, C. (1995). Trust and the virtual organization. Harvard Business Review, 73(3), 40–50.
14. Jarvenpaa, S. L., & Leidner, D. E. (1999). Communication and trust in global virtual teams.
Journal of Computer-Mediated Communication, 3(4), 0. https://doi.org/10.1111/j.1083-6101.
1998.tb00080.x.
15. Yin, R. K. (2009). Case study research: Design and methods (4th ed.). Sage Publications.
16. Eisenhardt, K. M. (1989). Building theories from case study research. The Academy of
Management Review, 14(4), 532–550.
17. Lincoln, Y., & Guba, E. (1985). Naturalistic inquiry. Beverly Hills, CA: Sage.
18. Gioia, D. A., Corley, K. G., & Hamilton, A. L. (2013). Seeking qualitative rigor in inductive
research: Notes on the Gioia methodology. Organizational Research Methods, 16(1), 15–31.
https://doi.org/10.1177/1094428112452151.
19. Rai, A., Patnayakuni, R., & Seth, N. (2006). Firm performance impacts of digitally enabled
supply chain integration capabilities. MIS Quarterly, 30(2), 225–246. https://doi.org/10.2307/
25148729.
20. Meyerson, D., Weick, K. E., & Kramer, R. M. (1996). Swift trust and temporary groups. In
R. M. Kramer & T. R. Tyler (Eds.), Trust in organizations: Frontiers of theory and research
(pp. 166–195). Thousand Oaks, CA: Sage Publications.
21. Gallivan, J. (2001). Striking a balance between trust and control in a virtual organization:
A content analysis of open source software case studies. Information Systems Journal, 11,
277–304.
22. Choudhury, V., & Sabherwal, R. (2003). Portfolios of control in outsourced software develop-
ment projects. Information Systems Research, 14(3), 291–314. https://doi.org/10.1287/isre.14.
3.291.16563.
23. Goo, J., & Huang, C. D. (2008). Facilitating relational governance through service level agree-
ments in IT outsourcing: An application of the commitment–trust theory. Decision Support
Systems, 46(1), 216–232. https://doi.org/10.1016/j.dss.2008.06.005.
In Vino Veritas? Blockchain Preliminary
Effects on Italian Wine SMEs
Abstract Transparency and traceability in the food industry have become two
central themes for both consumers and companies. On the one hand, consumer
awareness increases with more available in depth information, whilst food manu-
facturers try to mitigate food safety risks, reduce coordination costs and fraud by
improving their presence on the market. In this scenario, innovative technologies
and blockchain may have a major impact. The authors investigate the adoption of
blockchain in the Italian wine industry and, in particular, the effects of blockchain
on the complex inter-organizational supply chain systems SMEs are engaged in. A
qualitative approach was chosen to preliminary analyse the motivations driving small
Italian wineries to adopt blockchain technologies, and the advantages or drawbacks
managers identified during pilot experiments.
1 Introduction
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer 301
Nature Switzerland AG 2020
R. Agrifoglio et al. (eds.), Digital Business Transformation, Lecture Notes in Information
Systems and Organisation 38, https://doi.org/10.1007/978-3-030-47355-6_20
302 R. Cuel and G. M. Cangelosi
According to some experts,1 SMEs can innovate and build an edge with blockchain
transformation by using blockchain-based services as well as creating their own apps
on top of blockchain such as decentralized apps, or DApps. SMEs can already use
different blockchain solutions. For instance, there are marketplaces for renting or
selling properties on blockchain-based P2P marketplaces (real estate); managing
claims (insurance); dealing with security (IoT), monitoring and tracking freight
movement (logistics), and ensuring food safety via IBM’s Food Trust Network to
link distributors, retailers, producers, and regulators in the food industry [1].
In this paper, the authors focus on SMEs in the Italian wine industry. These
companies represent 75–80% of the Italian production, which has a total turnover
of 13 billion Euros, with 310,000 companies involved and 46,000 wine-making
companies.2 In this scenario, innovative technologies and blockchain may have a
major impact that cannot be ignored: at present the impact is most evident on the
complex inter-organizational supply chain that SMEs manage and deal with.
A qualitative approach has been chosen in order to preliminary analyse the moti-
vations that drive small Italian wineries to improve their supply chain management
by applying blockchain technology [2]. The authors will also focus on the advantages
and drawbacks that managers identified during their pilot experiments.
2 Literature Review
fotografa-l-italia-del-vino-aumentano-produzione,-valore-ed-export-stabile-la-struttura.
In Vino Veritas? Blockchain Preliminary Effects … 303
unauthorized chain (one in which anyone can participate) [15]; examples are Bitcoin
and Ethereum [14]. In this case, transparency is only towards authorized participants,
which makes it difficult to process data that require some privacy [16]. Two types of
subjects can be distinguished:
• Participants who can only use the system and
• Validators who can use the system and hold a copy of the updated ledger. Validators
are responsible for the process of distributed consensus [17].
The unpermissioned blockchain does not require owners and allows all partic-
ipants to own a copy of the updated ledger. In this case, participants may also be
validators and are responsible for both the distributed consensus process and the
system integrity [18].
Three types of blockchain are classified, namely Public, Consortium and Private,
and affect [7]:
• Consensus: the consensus determination is gradual, passing from public, to
consortium and finally private. Everyone, in fact, can take part in the public
blockchain; in the consortium only a small group of nodes is responsible for the
validation of the block; in the private, the chain is entirely controlled by a single
organization that can define the final consensus. Moreover, a public blockchain is
an example of an unauthorized chain; the other two cases, however, are models
of permissioned blockchain [7].
• Transparency: blockchain transactions are entirely visible in the public, but this
visibility tends to fade when changing to the consortium and then to the private.
• Immutability: from the point of view of immutability, in the public blockchain
transactions are much more complex to manipulate since the number of partici-
pants who store the records is greater: the same information in a private or in a
consortium system might be easily tampered with.
The main difference between the three blockchain types is that the public is totally
decentralized, the consortium is partially decentralized and the private is completely
centralized and controlled by a single node.
Ideally, since the wine supply chain commences with the vineyards, the winegrowers
should generate the first block in the chain (Fig. 1). This block is checked by the
majority number of miners in the system before the next block is created. All the
participants in the chain receive an identification code and a batch number indicating
the quantity supplied by the wine producer. In the same way, the producer puts all his
recorded information in a further block and shares it with all the other participants.
Subsequently, the block is checked again and added to the chain. The procedure is
repeated until the final participant. In some cases information shared could be critical
and kept private, taking advantage of the cryptography keys that the technology
provides [21].
One of the main features of the proposed traceability system is the possibility
of tracing the origin of each individual bottle of wine. The consumer can trace the
complete flow of data and related information by scanning a tag, e.g. a QR code,
placed on the bottle label.
Table 1 “Sample
Respondent Position Project Project owner
respondents” features
(personal elaboration) Respondent 1 Co-owner MyStory DNV GL
Respondent 2 Biologist Wine EY
blockchain EY
Respondent 3 Export Wine EY
manager blockchain EY
Respondent 4 Owner eNology MIPAAFT
Respondent 5 Quality MyStory DNV GL
manager
Respondent 6 Quality MyStory DNV GL
manager
Respondent 7 Owner eNology MIPAAFT
Respondent 8 Owner eNology MIPAAFT
and adopting a supply chain system based on blockchain, but only seven answered
and were available for further contact and interviews. To obtain complete explo-
rative information, individuals with different organizational roles were interviewed
(Table 1). The companies joined three different pilot projects aimed at experimenting
with blockchain technology to track, trace and certify products. Three out of the
seven companies are part of DNV GL, one of the most important certification
authorities in Europe in the agro-food industry. One of the companies has joined
the Ernst and Young project in collaboration with the start-up technology devel-
oper, EZ lab. Three companies have been involved in the testing program supported
by the Italian Ministry of Agriculture and Forestry (MIPAAFT), in collaboration
with Almaviva (a developer), SIAN (National Agricultural Information System) and
AGEA (Agricultural Supplies Agency).
5 Result of Analysis
From an in-depth reading of the interviews, the authors identified 11 categories and
15 sub-categories. The coded nodes emerged from the most recurrent, sometimes
implicit, issues discussed during the interviews. Although a detail-oriented analysis
was carried out, the degree of abstraction of the conceptualization is quite high.
Using NVivo coding, macro-themes were distinguished from sub-themes (Table 2).
The purpose of the aforementioned subdivision between nodes and sub-nodes is to
clarify the multiple facets of each of the 12 themes that emerged. In the following
sub-paragraphs, the authors comment on each of them, once grouped by identifying
the boundary objects between each of them.
308 R. Cuel and G. M. Cangelosi
All the respondents consider essential the registration in the blockchain of only the
information validated a priori by a certification body. In their opinion, being certified
by a third body protects the company from its own responsibility but also protects
the consumers.
[…] there is an impartial entity that testifies, guaranteeing that this data is true. I pay the
certification body to attest that my work meets the requirements of the standard for which I
certify my work. […] The certification body acts as my guarantor by promoting its brand.
[Respondent 5].
With regard to the issue of transparency, two very interesting aspects emerge from
the analysis: the desire to be completely frank and transparent with the consumers
and win him over or allow the consumer himself to easily understand the product
he/she is buying. In the first case, the blockchain is seen as a tool that can be used to
enhance the reputable image of the company. In the second, the reflection shifts to the
opportunity to offer consumers more information and a more interactive, engaging
In Vino Veritas? Blockchain Preliminary Effects … 309
and aware approach in evaluating the products he/she is purchasing. One of the
respondents defined this as “consumer empowerment”.
The topic is, as always, consumer empowerment. Do consumers freely choose the product?
Are their choices dominated by brands, distribution channels or industries? The blockchain
gives power to the consumer and we like it because consumers are able to acquire more
information than other certification mechanisms. These latter are usually find on the product
labels, but it is not clear what value they give the consumers. [Respondent 3].
As regard tracing, certifying the supply chain also means offering the consumer
the instruments to go back over the supply chain, even to the raw material. Equal
importance is given to both the traceability and the product certification profiles. This
is because if there were a problem with the quality/composition/state of the product,
it would be crucial to trace it back to its origin. For example, with blockchain, it
would be easier to identify a damaged batch number, thus avoiding an enormous
waste of resources on the part of the company.
[…] the person knows where that bottle comes from, otherwise he would only know that it
has been certified, namely that it satisfies the certification requirements. [Respondent 7].
The internal motivations that drove managers to join the pilot experiments were codi-
fied into the following categories: “Communication”, “Strategy”, and “Processes”.
As for the first node, the authors returned to discuss the relationship between
company and consumer, recalling the previous “Transparency” category. The trans-
parency principle represents the first boundary object between the first two groups of
nodes. However, due to the short term of involvement in the pilot project, the compa-
nies did not fully discern the effects of the blockchain on consumer engagements.
In fact, while the information about values, history and certifications transmitted is
considered a guarantee for the consumer, not all have a real usefulness.
The interviewees declared that they would like to use blockchain to improve their
company’s reputation or visibility on the market, or to access new markets. Visibility
in the wine company arena is guaranteed by a good reputation on the market, but
also by knowing how to be ahead of competitors. In particular, a higher visibility is
required in new and foreign markets, where consumers, unlike the Italians, conceive
wine as a luxury products and are willing to pay more. In this more demanding
market, a more attentive approach to innovative technology might provide some
advantages.
[…]in my opinion it is first of all something that guarantees the consumer something extra
and it can also be used from the marketing point of view … so the origin of the vineyard,
the production and all these things are data that for the consumer become a sort of warranty.
[Respondent 7].
From the point of view of supply chain management, respondents stressed the
fact that the control procedures have remained unchanged, without any need for
reorganization.
310 R. Cuel and G. M. Cangelosi
We already have the issue of supply chain control with or without blockchain. The agriculture
sector is one of the most advanced and experimental. We check all our batches of grapes,
wine, and what ends up in every single bottle. These data are on paper. […] 30 years ago we
already had and published this information. [Respondent 4].
One of the results that pilot companies verified was that involved actors understood
the importance of the documentation provided. The authors did not discover any
internal resistance or hostility: what was reported was good team spirit and enthu-
siasm for the experimentation. The link between the second and third group of nodes
is therefore the “collaboration” between the players operating in the supply chain:
better supply chain management depends on the maximum cooperation between the
parties involved in every stage of the production chain. However, the extra work
required to retrieve precise information about a very long term process was found to
be the factor of greatest hostility.
[…]Perhaps it becomes more complicated for those who have lots of actors in the supply
chain and therefore when farmers, producers, transformers, bottlers and the distribution
crews have to coordinate/cooperate […]. [Respondent 8].
As regards safety, especially on the non-modifiability of the data, the debate opens
about the truthfulness of the recorded data and returns, once again, to the discussion
on the central role played by the certification body. When there is no certification
body mediation (the self-certification case) the problem exists.
The blockchain guarantees the immutability of information, but not its truthfulness. Truth-
fulness lies in the common sense of the people who upload and provide real data because in
this way they open themselves up. [Respondent 1].
Furthermore, the trust question relies not only on the good faith of those who are
uploading data to blockchain, but also on the guarantee of the reliability of a system
that, according to most experts, should protect against fraud and counterfeit products.
Not all respondents saw the absence of regulation and laws as a limit possibly because
they believe that the aspects of traceability and the information that the consumer
can actually read from the QR Code scan have a greater weight.
[…] This thing goes beyond any type of regulatory system. […] with the blockchain the end
user is able to realize things that fail with any other certification. [Respondent 3].
A last significant child node concerns the disclosure of more confidential data
and hence the management of privacy. In this case, attention is no longer paid to
information that intrigues the consumer but rather to what data the company can
load without incurring theft (plagiarism) from other competitors.
As regard the territorial identity, this issue is the subject of heated debate between
those who support the enhancement of Made in Italy and those who do not entirely
agree. In favour of the territoriality exaltation, the product geolocation is made visible
In Vino Veritas? Blockchain Preliminary Effects … 311
through the inclusion of maps, satellite photographs and films showing the origin of
the bottle of wine in the code on the label.
[…]Certainly it is a very direct system that shows the consumer the related cultivation and this
is very important because from there we can even get the satellite photo. […]. Compared
to what already exists about the territorial identity and the Made in Italy, the blockchain
solution provides great results. [Respondent 8].
The issues discussed with the pilot companies were undertaken with the two
developer companies (Table 3).
This in-depth analysis aims to allow the technology experts to clarify some aspects
neglected in the interviews with the pilot companies. It was decided to compare the
two perspectives only on the issues that were defined as boundary objects, or the
link between the four groups of categories already identified and analysed, namely
“Transparency”, “Management of the supply chain” and “Training”.
Companies see the principal utility of blockchain in transparency: it is perceived
as a guarantee for the consumer, the company itself and the territory. Developers,
however, consider it to be secondary compared to the management benefits. Contrary
to what developers expected, companies did not significantly change any process
within their wine supply chain management. For both companies and developers,
blockchain is seen as a constant traceability guarantee, thanks to the use of a
management platform with a friendly-user interface.
[…] There is a conflict of interest between what the blockchain entails and what the activity
is because the blockchain […] provides more visibility than daily activities. For example,
information about the logistics process or company policy can be provided, even if not
everyone is obviously willing to give this kind of data to their customers. So if an operator
(let’s say one in logistic) who tends to have a 1-2% error by not respecting the declared
SLAs cannot deal with the blockchain because with the blockchain it becomes very difficult
to manipulate this information. [Respondent A].
Training is the only contact point between the two perspectives. Both wineries
and developers do not consider it necessary to employ any new IT-oriented staff
because the technology is developed by third parties and company workers will have
time to learn. Instead, more information on data security and privacy issues should
be disclosed.
6 Discussion
The authors have identified which positive factors and limitations experts perceive
during the experimentation of blockchain in the wine industry. According to the
results of the analysis the two hypotheses formulated above were not proven. A gap
was found between what was presented in the scientific literature and the actual state
of the art in the context examined. This was further supported by the discordant points
of view that emerged during the comparison between companies and developers. The
pilot companies seem to have taken into account only the communication aspects
linked to marketing and transparency. Empowering the final consumer or providing
more in-depth information to gain entrance to new markets is their main goal.
Developers, while confirming the importance of the previous point of view, are
more conscious that the real change is in the simplification and efficiency of the
business processes that are the basis of the correct development of the supply chain
and the improved awareness of the actors involved.
The only contact point seems to be training, which is perceived as the need for
greater dissemination and consciousness of what the blockchain is and how it should
be implemented. However, some considerations need to be made in favour of the
analysis of the pilot companies. Since the projects were carried out on only a small
group of wine producers and under a limited period of time, it is too early to observe
concrete changes in all the related business processes and, consequently, a tangible
In Vino Veritas? Blockchain Preliminary Effects … 313
evolution in the supply chain function. We do expect that the long-term adoption and
spread of the blockchain technology will have a stronger impact in the whole sector.
From the point of view of the consumer no result was found but this may be as a
consequence of the time factor required to launch blockchain certified products on the
market and understand what the real impact on consumers is. The answers given by
the pilot companies to the questions on the topic were based on expectations, hopes
and forecasts to be verified, once again, only in the long term. The most evident
benefit was the commitment at the organisational and supply chain level to a careful
search for the information to be recorded in blockchain. The possibility of tracing
the supply chain in detail has also given space to those players such as winemakers
whose work seems to stop once the harvest is over.
The perception of greater transparency for consumer protection has also increased.
The recording of information validated by a certification body in the first instance
has imparted more protection to companies encouraged by the fact that they do not
input data directly into the blockchain. A third body does it and usually is accredited
and recognized at national and international level (DNV GL in the case of MyStory
and Ernst and Young for Wine Blockchain EY). This reduces the autonomous nature
of blockchain technology because it is private, and the companies do not have full
control of the published data, resulting in the disappearance of two of the main
features of the technology, namely decentralization and disintermediation.
The exploratory analysis carried out has some research limitations. Despite a
group of sixteen companies participating in the three projects, only seven of them
made themselves available for interviews. The small sample on which the qualitative
analysis was carried out precludes the possibility of extending the results of the
research beyond the boundaries of the sample itself. Finally, the main limitation
was the lack of opportunity to also listen to the point of view of the companies that
provided the technology in the wine sector, of the EY consulting firm and DNV
GL certification body. Being aware of the perspectives of the three organizations,
for example, would have provided a deeper understanding of the reasons behind the
implementation of a private blockchain solution and a better analysis of the issues of
data recording through appropriate platforms created ad hoc. Listening and including
the point of view of all the actors involved would have opened up new research paths
and other aspects of the subject matter.
References
4. Wright, A., & De Filippi, P. (2015). Decentralized blockchain technology and the rise of lex
cryptographia.
5. Benos, E., Garratt, R., & Gurrola-Perez, P. (2017). The economics of distributed ledger
technology for securities settlement. https://www.bankofengland.co.uk/-/media/boe/files/
working-paper/2017/the129economics-of-distributed-ledger-technology-for-securities-settle
ment.pdf. 23/2/2019 viewed.
6. Bellini, M. (2017). Blockchain per la smart agrifood: EY presenta Wine Blockchain con EZ
LAB a difesa del Vino Made in Italy. Blockchain4innovation. https://www.blockchain4inno
vation.it/mercati/agrifood/blockchain-la-smartagrifood-ey-presenta-wine-blockchain-difesa-
del-vino-made-italy/. 18/11/ 2018 viewed.
7. Zheng, Z., Shaoan, X., Hongning, D., Xiangping, C., & Huaimin, W. (2017). An overview of
blockchain technology: Architecture, consensus, and future trends. In IEEE 6th International
Congress on Big Data, (pp. 557–564). IEEE, Honolulu, HI, USA.
8. Abeyratne, S. A., & Monfared, R. (2016). Blockchain ready manufacturing supply chain using
distributed ledger. International Journal of Research in Engineering and Technology, 5(9),
1–10.
9. Francisco, K., & Swanson, D. (2018). The supply chain has no clothes: Technology adoption
of blockchain for supply chain transparency. Logistics, 2(1), 1–13.
10. Christidis, K., & Devetsikiotis, M. (2016). Blockchains and smart contracts for the internet of
things. IEEE Access, 4, 2292–2303.
11. Zyskind, G., & Nathan, O. (2015). Decentralizing privacy: Using blockchain to protect personal
data. In 2015 IEEE Security and Privacy Workshops, (pp. 180–184). IEEE, The Fairmont, San
Jose, CA.
12. Lin, I.-C., & Liao, T.-C. (2017). A survey of blockchain security issues and challenges. IJ
Network Security, 19(5), 653–659.
13. Reyna, A., Martín, C., Chen, J., Soler, E., & Díaz, M. (2018). On blockchain and its integration
with IoT. Challenges and opportunities. Future Generation Computer Systems, 88, 173–190.
14. Rodrigo, M. N. N., Perera, S., Senaratne, S., & Jin, X. (2018). Blockchain for construction
supply chains: A literature synthesis. In Proceedings of the 11th International Cost Engineering
Council (ICEC) World Congress & the 22nd Annual Pacific Association of Quantity Surveyors
Conference, (pp. 18–20). Sydney, Australia.
15. Vukolić, M. (2017, April). Rethinking permissioned blockchains. In Proceedings of the ACM
Workshop on Blockchain, Cryptocurrencies and Contracts, (pp. 3–7). ACM.
16. Beck, R., & Müller-Bloch, C. (2017). Blockchain as radical innovation: a framework for
engaging with distributed ledgers as incumbent organization. In Proceedings of the 50th Hawaii
International Conference on System Sciences (pp. 5390–5399). Hilton Waikoloa Village,
Hawaii.
17. Faioli, M., Petrilli, E., & Faioli, D. (2016). Blockchain, contratti e lavoro. La ri-rivoluzione del
digitale nel mondo produttivo e nella PA. Economia & lavoro, 50(2), 139–158.
18. Atzori, M. (2015). Tecnologia Blockchain E Governance Decentralizzata: Lo Stato È
Ancora Necessario? (Blockchain technology and decentralized governance: Is the state still
necessary?). Blockchain technology and decentralized governance: Is the state still necessary.
19. EUIPO. (2016). Il costo economico della violazione dei diritti di proprietà intellettuale nel
settore degli alcolici e dei vini. Alicante, Spagna. https://euipo.europa.eu/tunnel-web/secure/
webdav/guest/document_library/observatory/resources/research-and-studies/ip_infringem
ent/study8/wines_and_spirits_it.pdf. 12/5/2019 viewed.
20. Cisco. (2017). Ricerca Cisco—Digital transformation Institute: il settore agroalimentare Ital-
iano deve prendere il treno della digitalizzazione adesso. Cisco. Disponibile da https://www.
cisco.com/c/it_it/about/news/2017-archive/20170504.html. 20/2/2019 viewed.
21. Biswas, K., Muthukkumarasamy, V., & Lum, W. (2017). Blockchain based wine supply chain
traceability system. In Future Technologies Conference, (pp. 1–7). Vancouver, BC, Canada.
Digital Competences for Civil Servants
and Digital Ecosystems for More
Effective Working Processes in Public
Organizations
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer 315
Nature Switzerland AG 2020
R. Agrifoglio et al. (eds.), Digital Business Transformation, Lecture Notes in Information
Systems and Organisation 38, https://doi.org/10.1007/978-3-030-47355-6_21
316 N. Casalino et al.
competitive. This article aims to describe the main goals and the preliminary results
of a research that aims at analysing the digital technologies adoption rate in the
European public sector, in order to assess also the motivations about the adoption
as well as the no-adoption decision, the kind of technologies principally actually
adopted inside public organizations and the activities of value chains where the new
investments in these new technologies are focused.
1 Introduction
in European market following the OECD recommendations, the EU’s strategy for
e-Skills in the twenty-first century and several European Commission Directives,
which imply a real digital revolution in processes and competences.
Digital competencies cannot be easily defined because of the changing nature of
the phenomenon [2].
Innovative digital ecosystems will impact on public ecosystems, designating a link
between physical assets and online business. It will be required the integration of
the ICT technologies, digitalization of workflows and innovative production systems
within a network with suppliers and the application of new technologies and methods
in various technical levels and systemic effects. Industry 4.0 knowledge will imply
low cost, space saving, low heat producing and high safety devices, operating tools
and software systems. It will also involve a network among different facilities for
information and data exchange. This new concept of facilities is requiring highly
qualified profiles, especially on advanced digital skills, problem solving, complex
decision-making, etc. So more qualified workforce is required in public organizations
at national and local level [3]. It is needed in EU a specific curriculum and, most of
all, a free course to improve specific and transversal skills for civil servants. So, we
are identifying a data analysis technique for our quantitative and qualitative research,
discussing the interpretation of findings using multiple data sources. The research is
involving several public administrations, but also other stakeholders as professionals,
industrial organisations, citizens and no-profit associations. All of them will carry out
surveys to assess the situation and contribute to the reporting of the research results.
We are considering also the AgID—Presidenza del Consiglio dei Ministri knowledge
base and specific experience analysing its recent strategic digitalization governmental
guidelines (2017, 2018 and 2019 years) as the “Plan for the Digital Transformation
of Italy”, the “Cloud computing guidelines”, “The e-payment system PagoPA”, the
“Italian Digital Agenda” connected to the “European Digital Agenda”, etc., giving
a solid contribution to support the research and define the right methodology of
analysis.
Digital technologies are transforming society and the economy faster and in new
ways, generating outcomes that are irreversible and unstoppable; social media, wear-
able devices, cloud computing, blockchain, sensors, big data, artificial intelligence
will change the work processes and the interaction between citizens, enterprises and
institutions. Professionals, enterprises and citizens require sophisticated, personal-
ized, on-demand services, easy to use and accessible. As pointed out by OECD
(Organization for Economic Cooperation and Development), the EU eGovernment
Action Plan 2016–2020, several EU Directives and Regulations, the on-demand
digital economy represents a challenge for private and public organizations. Digital
318 N. Casalino et al.
Fig. 1 The European framework for digitally competent organizations, DigCompOrg, JRC Science
Hub, European Commission, 2015
sharing good practices, making sectoral analysis and defining the most innovative
educational digital needs, working in close cooperation with the main institutions
and associations. Digital economy will be central for the growth, the development
and the competitiveness of Europe and its economy. It generates turnover of more
than 7 billion, accounts for 15.5% of the total Added Value, purchases more than
e5400 billion in goods and services each year, and still employs 14.2% of the total
workforce. Likewise, public sector has a significant weight in EU economy with
a 49.4% share and a total of more than 340 billion of euro. For this reason, Digi-
Work research could create an international synergy to integrate the actual European
limited open knowledge and experiences, sharing them and creating effective models
that will give benefits for the employability of thousands and thousands of people
in Europe. It could have a concrete impact at European level to contribute to the
development of the economy and the job market, by sharing the most innovative
training contents and preparing the European public workforce to the opportunities
of the digital change.
320 N. Casalino et al.
Fig. 2 Skills for high performing civil services, OECD—organisation for economic cooperation
and development public governance review, 2016
impact and taking un account the national regulations in each country. After that the
research is determining and will propose the key and transversal competences, the
requirements for adaptation in training programs, the required sources and the new
training needs. The research is identifying the new digital work-based training for
operational workflows, administrative processes and integrated ecosystems, together
the determination of key competences (including vocational competences). Will be
also considered transversal competences for various vocational qualifications and
levels, and that will have an impact on the training programmes, arrangement and
procurement of the required equipment infrastructure or human resources.
322 N. Casalino et al.
5 Conclusions
Digital transformation and Industry 4.0 pillars are a new phenomenon aimed at
changing operational rules especially for the public. The peculiar feature of this
revolution is its higher degree of complexity compared to the previous ones. Essen-
tially, digital transformation considers the usage of new technologies with the aim
to integrate workers and machines across organizational boundaries to form a new
type of networked value chain. Organizations implement three-types of integrations:
horizontal, vertical and end-to-end integration, which allow them to improve the
Digital Competences for Civil Servants … 325
prepare the future changes [16]. The European public sector is requiring the raising
of awareness and transfer of know-how in order the extend its effectiveness. Digi-
talization influences mission-critical applications in B2G and B2B processes and
citizens are waiting and need of a public organizations real transformation to receive
effective public services.
References
1. Hague, C., & Williamson, B. (2009). Digital participation, digital literacy, and school subjects:
A review of the policies, literature and evidence. Futurelab.
2. Dawes, S. (2009). Governance in the digital age: A research and action framework for an
uncertain future. Government Information Quarterly, 26(2), 257–264.
3. Parks, W. (1957). The open government principle: Applying the right to know under the
constitution. The George Washington Law Review, 26(1), 1–22.
4. Rose-Ackerman, S. (2008). Corruption and government. International Peacekeeping, 15(3),
328–343.
5. Ciborra, C. (2005). Interpreting e-government and development: Efficiency, transparency or
governance at a distance? Information Technology & People, 8(3), 260–279.
6. Lee, G., & Kwak, Y. H. (2011). An open government implementation model, using technology
series. Washington.
7. Chun, S. A., Shulman, S., Sandoval, R., & Hovy, E. (2010). Government 2.0: Making
connections between citizens, data and government, Information Polity, 15, 1–9.
8. Dawes, S. S. (2010). Stewardship and usefulness: Policy principles for information-based
transparency. Government Information Quarterly, 27(4), 377–383.
9. Casalino, N., Armenia, S., Medaglia, C., & Rori, S. (2010). A new system dynamics
model to improve internal and external efficiency in the paper digitization of Italian Public
Administrations. Roma: European Academy of Management, EURAM 2010.
10. Yin, R. K. (2003). Case study research: Design and methods. California: Sage Publications.
11. Casalino, N., Capriglione, A., & Mauro, D. (2012). A knowledge management system to
promote and support open government. WOA 2012, Verona University.
12. Darbishire, H.: Proactive transparency: The future of the right to information? A review of
standards, challenges, and opportunities (pp. 1–60). Washington, MA: WBI.
13. Winner, M. A. (2002). Integrated service modelling for online one-stop government, 12(3),
149–156.
14. Casalino, N. (2008). Gestione del cambiamento e produttività nelle aziende pubbliche. Cacucci,
Bari: Metodi e strumenti innovativi.
15. Fukuyama, F. (2005). Global corruption report: Corruption in construction and post-conflict
reconstruction, transparency international. Auflage.
16. Sorrentino, M., & De Marco, M. (2010). Evaluating E-government implementation. Opening
the interdisciplinary door. In H. J. Scholl (Ed.), E-Government: Information, technology, and
transformation (Vol. 17, pp. 72–88). Armonk, NY: M.E. Sharpe.
Author Index
D L
DeLone, William, 285 Lancioni, Flavia, 315
Dossena, Claudia, 205, 269 Leewis, Sam, 31
Locoro, Angela, 63
E
Elliot, Viktor, 19 M
Esswein, Markus, 137 Margherita, Emanuele Gabriel, 173
Ezza, Alberto, 155 Marinò, Ludovico, 155
Massella, Enrica, 315
Mayer, Joerg H., 137
F Mochi, Francesca, 205, 269
Fadda, Nicoletta, 155 Morelli, Giovanna, 187
Ferri, Luca, 121 Moretti, Anna, 285
G N
Ginesti, Gianluca, 121 Nicolajsen, Hanne Westh, 93
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer 327
Nature Switzerland AG 2020
R. Agrifoglio et al. (eds.), Digital Business Transformation, Lecture Notes in Information
Systems and Organisation 38, https://doi.org/10.1007/978-3-030-47355-6
328 Author Index
O T
Østerlie, Thomas, 251 Trienekens, Jos, 219
P
Pagels, Daniel, 137 V
Pischedda, Gianfranco, 155 Vaia, Giovanni, 285
Pozzi, Cesare, 187 Virili, Francesco, 19
R
Ravarini, Aurelio, 63 W
Wamba, Samuel Fosso, 3
Wamba-Taguimdje, Serge-Lopez, 3
S Wanko, Chris Emmanuel Tchatchouang, 3
Saso, Tommaso, 315 Wetering van de, Rogier, 219
Scupola, Ada, 93
Sedneva, Diana, 137
Smit, Koen, 31
Spagnoletti, Paolo, 47, 77 Z
Spanò, Rosanna, 121 Zoet, Martijn, 31