2023 | HICSS | Citations: 0
Authors: Ghumrawi, Kareem; Ha, Kim; Beerman, Jack; Rudie, John-David; Giabbanelli, Philippe
Abstract: Agent-Based Models (ABMs) have long served to study self-adaptive systems and th ... Expand
Semantic filters: vendor lock-in
Topics: social network computer hardware Python vendor lock-in parallel computing
Methods: computational algorithm simulation case study cross sectional research
2022 | Information Systems Frontiers | Citations: 1
Authors: Hsu, Pei-Fang
Abstract: Different from previous cloud adoption studies that focus on the benefits and co ... Expand
Semantic filters: vendor lock-in
Topics: cloud computing outsourcing IT job platform as a service software as a service
Methods: survey partial least squares regression PLS tool factor analysis case study
Theories: institutional theory
2021 | International Conference on Information Systems | Citations: 4
Authors: Marheine, Christian; Petrik, Dimitri
Abstract: The internet of things (IoT) and digital platforms have offered industrial comp ... Expand
Semantic filters: vendor lock-in
Topics: internet of things mobile system digital ecosystem participatory design business model
Methods: qualitative interview design methodology multiple case study qualitative coding case study
Theories: dynamic capabilities theory socio technical theory
2019 | International Conference on Information Systems | Citations: 0
Authors: Fuerstenau, Daniel; Woo, Carson
Abstract: We suggest an emergent change framework for enterprise architecture. Drawing on ... Expand
Semantic filters: vendor lock-in
Topics: enterprise architecture task complexity organizational change organization structure business process management
Methods: longitudinal research case study personal interview triangulation survey
2019 | Americas Conference on Information Systems | Citations: 0
Authors: Shawosh, Mazen; Berente, Nicholas
Abstract: In software development vendor contexts, asset specificity is commonly thought ... Expand
Semantic filters: vendor lock-in
Topics: asset specificity systems development outsourcing vendor lock-in
Methods: field study survey statistical hypothesis test theory development
Theories: transaction cost economics
2018 | Information Systems Management | Citations: 0
Authors: Chauhan, Sumedha; Jaiswal, Mahadeo; Rai, Sumita; Motiwalla, Luvai; Pipino, Leo
Abstract: This article focuses on the determinants influencing organizational adoption of ... Expand
Semantic filters: vendor lock-in
Topics: IT investment electronic mail service quality source code open source
Methods: qualitative interview literature study survey structural equation modeling survey design
Theories: theory of everything unified theory of acceptance and use of technology technology acceptance model theory of planned behavior
2018 | International Journal of Information Management | Citations: 9
Authors: Shim, Seonyoung; Lee, Byungtae; Kim, Sojung Lucia
Abstract: Herding in open platform adoption decisions appears to prevail even when the sys ... Expand
Semantic filters: vendor lock-in
Topics: technology diffusion network effect technology adoption digital platform organization learning
Methods: statistical hypothesis test partial least squares regression conceptual modelling survey Student's t-test
Theories: technology organization environment framework technology acceptance model diffusion of innovations theory organizational behavior theory
2015 | European Conference On Information Systems | Citations: 0
Authors: Huntgeburth, Jan; Blaschke, Michael; Hauff, Sabrina
Abstract: The incentive for IT service and infrastructure providers to participate in clou ... Expand
Semantic filters: vendor lock-in
Topics: cloud computing participatory design infrastructure as a service information technology infrastructure innovation management
Methods: design methodology qualitative interview case study design artifact personal interview
Theories: transaction cost economics resource based view of the firm
2015 | Communications of the Association for Information Systems | Citations: 19
Authors: Müller, Sune Dueholm; Holm, Stefan Rubæk; Søndergaard, Jens
Abstract: Cloud computing is drawing attention from both practitioners and researchers, an ... Expand
Semantic filters: vendor lock-in
Topics: cloud computing enterprise information system organizational transformation organizational impact information technology infrastructure
Methods: literature study literature sample maturity model design science case study
Theories: core competency theory
2014 | International Journal of Information Management | Citations: 44
Authors: Hsu, Pei-Fang; Ray, Soumya; Li-Hsieh, Yu-Yu
Abstract: a b s t r a c tCloud computing is a new information technology (IT) paradigm th ... Expand
Semantic filters: vendor lock-in
Topics: cloud computing information technology capability price management software as a service technology adoption
Methods: survey discriminant analysis statistical power analysis case study survey design
Theories: theory of everything diffusion of innovations theory