Abstract:Drawing on notions of power and the social construction of risk, we build new theory to understand the persistence of shadow systems in organizations. From a single case study in a mid-sized savings bank, we derive two feedback cycles that concern shifting power relations between business units and central IT associated with shadow systems. A distant business-IT relationship and changing business needs can create repeated cost and time pressures that make business units draw on shadow systems. The perception of risk can trigger an opposing power shift back through the decommissioning and recentralization of shadow systems. However, empirical findings suggest that the weakening tendency of formal risk-management programs may not be sufficient to stop the shadow systems cycle spinning if they fail to address the underlying causes for the emergence of shadow systems. These findings highlight long-term dynamics associated with shadow systems and pose "risk" as a power-shifting construct.
Research summary Optimal distinctiveness theory highlights that firms need to balance opposing pressures for differentiation (to gain competitive benefits) and conformity (to gain legitimacy). Yet, extant optimal distinctiveness research rarely considers that the pressure for conformity can substantially vary between competing firms. Studying the positioning and growth performance of competing platforms in the market for Massive Open Online Courses (MOOCs), we find that platforms' access to high‐status complementors—a common source of legitimacy in platform markets—substantially shapes the relationship between platforms' distinctiveness and user growth. Our longitudinal models show that platforms only benefit from a (moderately) distinctive positioning once they have buffered a certain amount of legitimacy. Our findings strongly suggest that firms can alleviate conformity pressures by accessing alternative sources of legitimacy. Managerial summary When does differentiation pay off? We study this question in the increasingly important context of platform markets to explain differences in platforms' user growth. Our longitudinal study of competition in the market for Massive Open Online Courses (MOOCs)—in which platforms like Coursera and Udacity compete for online learners as users—shows that the performance implications of a distinctive positioning substantially depend on the legitimacy that a platform has gained from attracting high‐status organizations as complementors. Platforms only benefit from differentiation once they surpass a certain legitimacy threshold, and the legitimacy they gain beyond this threshold accelerates the benefits of a (moderately) distinctive positioning.
Research on Shadow IT is facing a conceptual dilemma in cases where previously “covert” systems developed by business entities are integrated in the organizational IT management. These systems become visible, are thus not “in the shadows” anymore, and subsequently do not fit to existing definitions of Shadow IT. Practice shows that some information systems share characteristics of Shadow IT but are created openly in alignment with the IT organization. This paper proposes the term “Business-managed IT” to describe “overt” information systems developed or managed by business entities and distinguishes it from Shadow IT by illustrating case vignettes. Accordingly, our contribution is to suggest a concept and its delineation against other concepts. In this way, IS researchers interested in IT originated from or maintained by business entities can construct theories with a wider scope of application that are at the same time more specific to practical problems. In addition, the terminology allows to value potentially innovative developments by business entities more adequately.
This is a PDF file of an unedited manuscript that has been accepted for publication in the Communications of the Association for Information Systems. We are providing this early version of the manuscript to allow for expedited dissemination to interested readers. The manuscript will undergo copyediting, typesetting, and review of the resulting proof before it is published in its final form. Please note that during the production process errors may be discovered, which could affect the content. All legal disclaimers that apply to the Communications of the Association for Information Systems pertain.
Purpose The literature includes several studies that define different critical success factors (CSF) which have to be considered to support the implementation of technology-enhanced learning (TEL) approaches. An analysis of such studies revealed that (1) regional differences seem to determine the CSF for TEL approaches, (2) certain CSF are relevant for TEL approaches in general, and (3) professionals in higher education determine which influential factors they consider when implementing TEL approaches. Thus, the question arises: in general, which influential factors do professionals in Austrian and German institutions of higher education actually consider when implementing TEL approaches? Design/methodology/approach The study is a quantitative research approach based on survey data. Findings The results show that certain influential factors seem to be generally important, such as the factors of respecting learning success or motivation. However, the outcome of the study also indicated that different moderating variables like experiences and personal relevance affect the professionals’ choices. Originality/value The originality and value are in the approach to identify generally important influential factors for the implementation of TEL approaches in Austrian and German institutions of higher education.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.