AIS Logo
Living knowledge for digital leadership
All AI Governance & Ethics Digital Transformation & Innovation Supply Chain & Operations AI Adoption & Implementation Platform Ecosystems & Strategy SME & Entrepreneurship Cybersecurity & Risk AI Applications & Technologies Digital Health & Well-being Digital Work & Collaboration Education & Training
Evolution of the Metaverse
MIS Quarterly Executive (2023)

Evolution of the Metaverse

Mary Lacity, Jeffrey K. Mullins, Le Kuai
This paper explores the potential opportunities and risks of the emerging metaverse for business and society through an interview format with leading researchers. The study analyzes the current state of metaverse technologies, their potential business applications, and critical considerations for governance and ethical implementation for IT practitioners.

Problem Following renewed corporate interest and massive investment, the concept of the metaverse has generated significant hype, but businesses lack clarity on its definition, tangible value, and long-term impact. This creates uncertainty for leaders about how to approach the technology, differentiate it from past virtual worlds, and navigate the significant risks of surveillance, data privacy, and governance.

Outcome - The business value of the metaverse centers on providing richer, safer experiences for customers and employees, reducing costs, and meeting organizational goals through applications like immersive training, virtual collaboration, and digital twins.
- Companies face a critical choice between centralized 'Web 2' platforms, which monetize user data, and decentralized 'Web 3' models that offer users more control over their digital assets and identity.
- The metaverse can improve employee onboarding, training for dangerous tasks, and collaboration, offering a greater sense of presence than traditional videoconferencing.
- Key challenges include the lack of a single, interoperable metaverse (which is likely over a decade away), limited current capabilities of decentralized platforms, and the potential for negative consequences like addiction and surveillance.
- Businesses are encouraged to explore potential use cases, participate in creating open standards, and consider both the immense promise and potential perils before making significant investments.
Metaverse, Virtual Worlds, Augmented Reality, Web 3.0, Digital Twin, Business Strategy, Governance
Boundary Management Strategies for Leading Digital Transformation in Smart Cities
MIS Quarterly Executive (2023)

Boundary Management Strategies for Leading Digital Transformation in Smart Cities

Jocelyn Cranefield, Jan Pries-Heje
This study investigates the leadership challenges inherent in smart city digital transformations. Based on in-depth interviews with leaders from 12 cities, the research identifies common obstacles and describes three 'boundary management' strategies leaders use to overcome them and drive sustainable change.

Problem Cities struggle to scale up smart city initiatives beyond the pilot stage because of a fundamental conflict between traditional, siloed city bureaucracy and the integrated, data-driven logic of a smart city. This clash creates significant organizational, political, and cultural barriers that impede progress and prevent the realization of long-term benefits for citizens.

Outcome - Identifies eight key challenges for smart city leaders, including misalignment of municipal structures, restrictive data policies, resistance to innovation, and city politics.
- Finds that successful smart city leaders act as expert 'boundary spanners,' navigating the divide between the traditional institutional logic of city governance and the emerging logic of smart cities.
- Proposes a framework of three boundary management strategies leaders use: 1) Boundary Bridging to generate buy-in and knowledge, 2) Boundary Buffering to protect projects from resistance, and 3) Boundary Building to create new, sustainable governance structures.
smart cities, digital transformation, leadership, boundary management, institutional logic, urban governance, innovation
Adopt Agile Cybersecurity Policymaking to Counter Emerging Digital Risks
MIS Quarterly Executive (2024)

Adopt Agile Cybersecurity Policymaking to Counter Emerging Digital Risks

Masoud Afshari-Mofrad, Alireza Amrollahi, Babak Abedin
This study investigates the need for flexibility and speed in creating and updating cybersecurity rules within organizations. Through in-depth interviews with cybersecurity professionals, the research identifies key areas of digital risk and provides practical recommendations for businesses to develop more agile and adaptive security policies.

Problem In the face of rapidly evolving cyber threats, many organizations rely on static, outdated cybersecurity policies that are only updated after a security breach occurs. This reactive approach leaves them vulnerable to new attack methods, risks from new technologies, and threats from business partners, creating a significant security gap.

Outcome - Update cybersecurity policies to address risks from outdated legacy systems by implementing modern digital asset and vulnerability management.
- Adapt policies to address emerging technologies like AI by enhancing technology scouting and establishing a resilient cyber risk management framework.
- Strengthen policies for third-party vendors by conducting agile risk assessments and regularly reviewing security controls in contracts.
- Build flexible policies for disruptive external events (like pandemics or geopolitical tensions) through continuous employee training and robust business continuity plans.
agile cybersecurity, cybersecurity policymaking, digital risk, adaptive security, risk management, third-party risk, legacy systems
Promoting Cybersecurity Information Sharing Across the Extended Value Chain
MIS Quarterly Executive (2025)

Promoting Cybersecurity Information Sharing Across the Extended Value Chain

Olga Biedova, Lakshmi Goel, Justin Zhang, Steven A. Williamson, Blake Ives
This study analyzes an alternative cybersecurity information-sharing forum centered on the extended value chain of a single company in the forest and paper products industry. The paper explores the forum's design, execution, and challenges to provide recommendations for similar company-specific collaborations. The goal is to enhance cybersecurity resilience across interconnected business partners by fostering a more trusting and relevant environment for sharing best practices.

Problem As cyberthreats become more complex, industries with interconnected information and operational technologies (IT/OT) face significant vulnerabilities. Despite government and industry calls for greater collaboration, inter-organizational cybersecurity information sharing remains sporadic due to concerns over confidentiality, competitiveness, and lack of trust. Standard sector-based sharing initiatives can also be too broad to address the specific needs of a company and its unique value chain partners.

Outcome - A company-led, value-chain-specific cybersecurity forum is an effective alternative to broader industry groups, fostering greater trust and more relevant discussions among business partners.
- Key success factors for such a forum include inviting the right participants (security strategy leaders), establishing clear ground rules to encourage open dialogue, and using external facilitators to ensure neutrality.
- The forum successfully shifted the culture from one of distrust to one of transparency and collaboration, leading participants to be more open about sharing experiences, including previous security breaches.
- Participants gained valuable insights into the security maturity of their partners, leading to tangible improvements in cybersecurity practices, such as updating security playbooks, adopting new risk metrics, and enhancing third-party risk management.
- The collaborative model strengthens the entire value chain, as companies learn from each other's strategies, tools, and policies to collectively improve their defense against common threats.
cybersecurity, information sharing, extended value chain, supply chain security, cyber resilience, forest products industry, inter-organizational collaboration
Unraveling the Role of Cyber Insurance in Fortifying Organizational Cybersecurity
MIS Quarterly Executive (2025)

Unraveling the Role of Cyber Insurance in Fortifying Organizational Cybersecurity

Wojciech Strzelczyk, Karolina Puławska
This study explores how cyber insurance serves as more than just a financial tool for compensating victims of cyber incidents. Based on in-depth interviews with insurance industry experts and policy buyers, the research analyzes how insurance improves an organization's cybersecurity across three distinct stages: pre-purchase, post-purchase, and post-cyberattack.

Problem As businesses increasingly rely on digital technologies, they face a growing risk of cyberattacks that can lead to severe financial losses, reputational harm, and regulatory penalties. Many companies possess inadequate cybersecurity measures, and there is a need to understand how external mechanisms like insurance can proactively strengthen defenses rather than simply covering losses after an attack.

Outcome - Cyber insurance actively enhances an organization's security posture, not just providing financial compensation after an incident.
- The pre-purchase underwriting process forces companies to rigorously evaluate and improve their cybersecurity practices to even qualify for a policy.
- Post-purchase, insurers require continuous improvement through audits and training, often providing resources and expertise to help clients strengthen their defenses.
- Following an attack, cyber insurance provides access to critical incident management services, including expert support for damage containment, system restoration, and post-incident analysis to prevent future breaches.
cyber insurance, cybersecurity, risk management, organizational cybersecurity, incident response, underwriting
How HireVue Created
MIS Quarterly Executive (2025)

How HireVue Created "Glass Box" Transparency for its AI Application

Monideepa Tarafdar, Irina Rets, Lindsey Zuloaga, Nathan Mondragon
This paper presents a case study on HireVue, a company that provides an AI application for assessing job interviews. It describes the transparency-related challenges HireVue faced and explains how it addressed them by developing a "glass box" approach, which focuses on making the entire system of AI development and deployment understandable, rather than just the technical algorithm.

Problem AI applications used for critical decisions, such as hiring, are often perceived as technical "black boxes." This lack of clarity creates significant challenges for businesses in trusting the technology, ensuring fairness, mitigating bias, and complying with regulations, which hinders the responsible adoption of AI in recruitment.

Outcome - The study introduces a "glass box" model for AI transparency, which shifts focus from the technical algorithm to the broader sociotechnical system, including design processes, client interactions, and organizational functions.
- HireVue implemented five types of transparency practices: pre-deployment client-focused, internal, post-deployment client-focused, knowledge-related, and audit-related.
- This multi-faceted approach helps build trust with clients, regulators, and applicants by providing clarity on the AI's application, limitations, and validation processes.
- The findings serve as a practical guide for other AI software companies on how to create effective and comprehensive transparency for their own applications, especially in high-stakes fields.
AI transparency, algorithmic hiring, glass box model, ethical AI, recruitment technology, HireVue, case study
How Germany Successfully Implemented Its Intergovernmental FLORA System
MIS Quarterly Executive (2025)

How Germany Successfully Implemented Its Intergovernmental FLORA System

Julia Amend, Simon Feulner, Alexander Rieger, Tamara Roth, Gilbert Fridgen, and Tobias Guggenberger
This paper presents a case study on Germany's implementation of FLORA, a blockchain-based IT system designed to manage the intergovernmental processing of asylum seekers. It analyzes how the project navigated legal and technical challenges across different government levels. Based on the findings, the study offers three key recommendations for successfully deploying similar complex, multi-agency IT systems in the public sector.

Problem Governments face significant challenges in digitalizing services that require cooperation across different administrative layers, such as federal and state agencies. Legal mandates often require these layers to maintain separate IT systems, which complicates data exchange and modernization. Germany's asylum procedure previously relied on manually sharing Excel-based lists between agencies, a process that was slow, error-prone, and created data privacy risks.

Outcome - FLORA replaced inefficient Excel-based lists with a decentralized system, enabling a more efficient and secure exchange of procedural information between federal and state agencies.
- The system created a 'single procedural source of truth,' which significantly improved the accuracy, completeness, and timeliness of information for case handlers.
- By streamlining information exchange, FLORA reduced the time required for initial stages of the asylum procedure by up to 50%.
- The blockchain-based architecture enhanced legal compliance by reducing procedural errors and providing a secure way to manage data that adheres to strict GDPR privacy requirements.
- The study recommends that governments consider decentralized IT solutions to avoid the high hidden costs of centralized systems, deploy modular solutions to break down legacy architectures, and use a Software-as-a-Service (SaaS) model to lower initial adoption barriers for agencies.
intergovernmental IT systems, digital government, blockchain, public sector innovation, case study, asylum procedure, Germany
The Danish Business Authority's Approach to the Ongoing Evaluation of Al Systems
MIS Quarterly Executive (2025)

The Danish Business Authority's Approach to the Ongoing Evaluation of Al Systems

Oliver Krancher, Per Rådberg Nagbøl, Oliver Müller
This study examines the strategies employed by the Danish Business Authority (DBA), a pioneering public-sector adopter of AI, for the continuous evaluation of its AI systems. Through a case study of the DBA's practices and their custom X-RAI framework, the paper provides actionable recommendations for other organizations on how to manage AI systems responsibly after deployment.

Problem AI systems can degrade in performance over time, a phenomenon known as model drift, leading to inaccurate or biased decisions. Many organizations lack established procedures for the ongoing monitoring and evaluation of AI systems post-deployment, creating risks of operational failures, financial losses, and non-compliance with regulations like the EU AI Act.

Outcome - Organizations need a multi-faceted approach to AI evaluation, as single strategies like human oversight or periodic audits are insufficient on their own.
- The study presents the DBA's three-stage evaluation process: pre-production planning, in-production monitoring, and formal post-implementation evaluations.
- A key strategy is 'enveloping' AI systems and their evaluations, which means setting clear, pre-defined boundaries for the system's use and how it will be monitored to prevent misuse and ensure accountability.
- The DBA uses an MLOps platform and an 'X-RAI' (Transparent, Explainable, Responsible, Accurate AI) framework to ensure traceability, automate deployments, and guide risk assessments.
- Formal evaluations should use deliberate sampling, including random and negative cases, and 'blind' reviews (where caseworkers assess a case without seeing the AI's prediction) to mitigate human and machine bias.
AI evaluation, AI governance, model drift, responsible AI, MLOps, public sector AI, case study
How Stakeholders Operationalize Responsible AI in Data-Sensitive Contexts
MIS Quarterly Executive (2025)

How Stakeholders Operationalize Responsible AI in Data-Sensitive Contexts

Shivaang Sharma, Angela Aristidou
This study investigates the challenges of implementing responsible AI in complex, multi-stakeholder environments such as humanitarian crises. Researchers analyzed the deployment of six AI tools, identifying significant gaps in expectations and values among developers, aid agencies, and affected populations. Based on these findings, the paper introduces the concept of "AI Responsibility Rifts" (AIRRs) and proposes the SHARE framework to help organizations navigate these disagreements.

Problem Traditional approaches to AI safety focus on objective, technical risks like hallucinations or data bias. This perspective is insufficient for data-sensitive contexts because it overlooks the subjective disagreements among diverse stakeholders about an AI tool's purpose, impact, and ethical boundaries. These unresolved conflicts, or "rifts," can hinder the adoption of valuable AI tools and lead to unintended negative consequences for vulnerable populations.

Outcome - The study introduces the concept of "AI Responsibility Rifts" (AIRRs), defined as misalignments in stakeholders' subjective expectations, values, and perceptions of an AI system's impact.
- It identifies five key areas where these rifts occur: Safety, Humanity, Accountability, Reliability, and Equity.
- The paper proposes the SHARE framework, a self-diagnostic questionnaire designed to help organizations identify and address these rifts among their stakeholders.
- It provides core recommendations and caveats for executives to close the gaps in each of the five rift areas, promoting a more inclusive and effective approach to responsible AI.
Responsible AI, AI ethics, stakeholder management, humanitarian AI, AI governance, data-sensitive contexts, SHARE framework
Promises and Perils of Generative AI in Cybersecurity
MIS Quarterly Executive (2025)

Promises and Perils of Generative AI in Cybersecurity

Pratim Datta, Tom Acton
This paper presents a case study of a fictional insurance company, based on real-life events, to illustrate how generative artificial intelligence (GenAI) can be used for both offensive and defensive cybersecurity purposes. It explores the dual nature of GenAI as a tool for both attackers and defenders, presenting a significant dilemma for IT executives. The study provides actionable recommendations for developing a comprehensive cybersecurity strategy in the age of GenAI.

Problem With the rapid adoption of Generative AI by both cybersecurity defenders and malicious actors, IT leaders face a critical challenge. GenAI significantly enhances the capabilities of attackers to create sophisticated, large-scale, and automated cyberattacks, while also offering powerful new tools for defense. This creates a high-stakes 'AI arms race,' forcing organizations to decide how to strategically embrace GenAI for defense without being left vulnerable to adversaries armed with the same technology.

Outcome - GenAI is a double-edged sword, capable of both triggering and defending against sophisticated cyberattacks, requiring a proactive, not reactive, security posture.
- Organizations must integrate a 'Defense in Depth' (DiD) strategy that extends beyond technology to include processes, a security-first culture, and continuous employee education.
- Robust data governance is crucial to manage and protect data, the primary target of attacks, by classifying its value and implementing security controls accordingly.
- A culture of continuous improvement is essential, involving regular simulations of real-world attacks (red-team/blue-team exercises) and maintaining a zero-trust mindset.
- Companies must fortify defenses against AI-powered social engineering by combining advanced technical filtering with employee training focused on skepticism and verification.
- Businesses should embrace proactive, AI-driven defense mechanisms like AI-powered threat hunting and adaptive honeypots to anticipate and neutralize threats before they escalate.
Generative AI, Cybersecurity, Black-hat AI, White-hat AI, Threat Hunting, Social Engineering, Defense in Depth
How to Operationalize Responsible Use of Artificial Intelligence
MIS Quarterly Executive (2025)

How to Operationalize Responsible Use of Artificial Intelligence

Lorenn P. Ruster, Katherine A. Daniell
This study outlines a practical five-phase process for organizations to translate responsible AI principles into concrete business practices. Based on participatory action research with two startups, the paper provides a roadmap for crafting specific responsibility pledges and embedding them into organizational processes, moving beyond abstract ethical statements.

Problem Many organizations are committed to the responsible use of AI but struggle with how to implement it practically, creating a significant "principle-to-practice gap". This confusion can lead to inaction or superficial efforts known as "ethics-washing," where companies appear ethical without making substantive changes. The study addresses the lack of clear, actionable guidance for businesses, especially smaller ones, on where to begin.

Outcome - Presents a five-phase process for operationalizing responsible AI: 1) Buy-in, 2) Intuition-building, 3) Pledge-crafting, 4) Pledge-communicating, and 5) Pledge-embedding.
- Argues that responsible AI should be approached as a systems problem, considering organizational mindsets, culture, and processes, not just technical fixes.
- Recommends that organizations create contextualized, action-oriented "pledges" rather than simply adopting generic AI principles.
- Finds that investing in responsible AI practices early, even in small projects, helps build organizational capability and transfers to future endeavors.
- Provides a framework for businesses to navigate communication challenges, balancing transparency with commercial interests to build user trust.
Responsible AI, AI Ethics, Operationalization, Systems Thinking, AI Governance, Pledge-making, Startups
Successfully Mitigating AI Management Risks to Scale AI Globally
MIS Quarterly Executive (2025)

Successfully Mitigating AI Management Risks to Scale AI Globally

Thomas Hutzschenreuter, Tim Lämmermann, Alexander Sake, Helmuth Ludwig
This study presents an in-depth case study of the industrial AI pioneer Siemens AG to understand how companies can effectively scale artificial intelligence systems. It identifies five critical technology management risks associated with both generative and predictive AI and provides practical recommendations for mitigating them to create company-wide business impact.

Problem Many companies struggle to effectively scale modern AI systems, with over 70% of implementation projects failing to create a measurable business impact. These failures stem from machine learning's unique characteristics, which amplify existing technology management challenges and introduce entirely new ones that firms are often unprepared to handle.

Outcome - Missing or falsely evaluated potential AI use case opportunities.
- Algorithmic training and data quality issues.
- Task-specific system complexities.
- Mismanagement of system stakeholders.
- Threats from provider and system dependencies.
AI management, risk mitigation, scaling AI, generative AI, predictive AI, technology management, case study
How Siemens Empowered Workforce Re- and Upskilling Through Digital Learning
MIS Quarterly Executive (2025)

How Siemens Empowered Workforce Re- and Upskilling Through Digital Learning

Leonie Rebecca Freise, Eva Ritz, Ulrich Bretschneider, Roman Rietsche, Gunter Beitinger, and Jan Marco Leimeister
This case study examines how Siemens successfully implemented a human-centric, bottom-up approach to employee reskilling and upskilling through digital learning. The paper presents a four-phase model for leveraging information systems to address skill gaps and provides five key recommendations for organizations to foster lifelong learning in dynamic manufacturing environments.

Problem The rapid digital transformation in manufacturing is creating a significant skills gap, with a high percentage of companies reporting shortages. Traditional training methods are often not scalable or adaptable enough to meet these evolving demands, presenting a major challenge for organizations trying to build a future-ready workforce.

Outcome - The study introduces a four-phase model for developing human-centric digital learning: 1) Recognizing employee needs, 2) Identifying key employee traits (like self-regulation and attitude), 3) Developing tailored strategies, and 4) Aligning strategies with organizational goals.
- Key employee needs for successful digital learning include task-oriented courses, peer exchange, on-the-job training, regular feedback, personalized learning paths, and micro-learning formats ('learning nuggets').
- The paper proposes four distinct learning strategies based on employees' attitude and self-regulated learning skills, ranging from community mentoring for those low in both, to personalized courses for those high in both.
- Five practical recommendations for companies are provided: 1) Foster a lifelong learning culture, 2) Tailor digital learning programs, 3) Create dedicated spaces for collaboration, 4) Incorporate flexible training formats, and 5) Use analytics to provide feedback.
digital learning, upskilling, reskilling, workforce development, human-centric, manufacturing, case study
A Three-Layer Model for Successful Organizational Digital Transformation
MIS Quarterly Executive (2025)

A Three-Layer Model for Successful Organizational Digital Transformation

Ferry Nolte, Alexander Richter, Nadine Guhr
This study analyzes the digital transformation journey on the shop floor of automotive supplier Continental AG. Based on this case study, the paper proposes a practical three-layer model—IT evolution, work practices evolution, and mindset evolution—to guide organizations through successful digital transformation. The model provides recommended actions for aligning these layers to reduce implementation risks and improve outcomes.

Problem Many industrial companies struggle with digital transformation, particularly on the shop floor, where environments are often poorly integrated with digital technology. These transformation efforts are frequently implemented as a 'big bang,' overwhelming workers with new technologies and revised work practices, which can lead to resistance, failure to adopt new systems, and the loss of experienced employees.

Outcome - Successful digital transformation requires a coordinated and synchronized evolution across three interdependent layers: IT, work practices, and employee mindset.
- The paper introduces a practical three-layer model (IT Evolution, Work Practices Evolution, and Mindset Evolution) as a roadmap for managing the complexities of organizational change.
- A one-size-fits-all approach fails; organizations must provide tailored support, tools, and training that cater to the diverse skill levels and starting points of all employees, especially lower-skilled workers.
- To ensure adoption, work processes and performance metrics must be strategically adapted to integrate new digital tools, rather than simply layering technology on top of old workflows.
- A cultural shift is fundamental; success depends on moving away from rigid hierarchies to a culture that empowers employees, encourages experimentation, and fosters a collective readiness for continuous change.
Digital Transformation, Organizational Change, Change Management, Shop Floor Digitalization, Three-Layer Model, Case Study, Dynamic Capabilities
Transforming Energy Management with an AI-Enabled Digital Twin
MIS Quarterly Executive (2025)

Transforming Energy Management with an AI-Enabled Digital Twin

Hadi Ghanbari, Petter Nissinen
This paper reports on a case study of how one of Europe's largest district heating providers, called EnergyCo, implemented an AI-assisted digital twin to improve energy efficiency and sustainability. The study details the implementation process and its outcomes, providing six key recommendations for executives in other industries who are considering adopting digital twin technology.

Problem Large-scale energy providers face significant challenges in managing complex district heating networks due to fluctuating energy prices, the shift to decentralized renewable energy sources, and operational inefficiencies from siloed departments. Traditional control systems lack the comprehensive, real-time view needed to optimize the entire network, leading to energy loss, higher costs, and difficulties in achieving sustainability goals.

Outcome - The AI-enabled digital twin provided a comprehensive, real-time representation of the entire district heating network, replacing fragmented views from legacy systems.
- It enabled advanced simulation and optimization, allowing the company to improve operational efficiency, manage fluctuating energy prices, and move toward its carbon neutrality goals.
- The system facilitated scenario-based decision-making, helping operators forecast demand, optimize temperatures and pressures, and reduce heat loss.
- The digital twin enhanced cross-departmental collaboration by providing a shared, holistic view of the network's operations.
- It enabled a shift from reactive to proactive maintenance by using predictive insights to identify potential equipment failures before they occur, reducing costs and downtime.
Digital Twin, Energy Management, District Heating, AI, Cyber-Physical Systems, Sustainability, Case Study
Transforming to Digital Product Management
MIS Quarterly Executive (2024)

Transforming to Digital Product Management

R. Ryan Nelson
This study analyzes the successful digital transformations of CarMax and The Washington Post to advocate for a strategic shift from traditional IT project management to digital product management. It demonstrates how adopting practices like Agile and DevOps, combined with empowered, cross-functional teams, enables companies to become nimbler and more adaptive in a fast-changing digital landscape. The research is based on extensive field research, including interviews with senior executives from the case study companies.

Problem Many businesses struggle to adapt and innovate because their traditional IT project management methods are too slow and rigid for the modern digital economy. This project-based approach often results in high failure rates, misaligned business and IT goals, and an inability to respond quickly to market changes or new competitors. This gap prevents organizations from realizing the full value of their technology investments and puts them at risk of becoming obsolete.

Outcome - A shift from a project-oriented to a product-oriented mindset is essential for business agility and continuous innovation.
- Successful transformations rely on creating durable, empowered, cross-functional teams that manage a digital product's entire lifecycle, focusing on business outcomes rather than project outputs.
- Adopting practices like dual-track Agile and DevOps enables teams to discover the right solutions for customers while delivering value incrementally and consistently.
- The transition to digital product management is a long-term cultural and organizational journey requiring strong executive buy-in, not a one-time project.
- Organizations should differentiate which initiatives are best suited for a project approach (e.g., migrations, compliance) versus a product approach (e.g., customer-facing applications, e-commerce platforms).
digital product management, IT project management, digital transformation, agile development, DevOps, organizational change, case study
How a Utility Company Established a Corporate Data Culture for Data-Driven Decision Making
MIS Quarterly Executive (2024)

How a Utility Company Established a Corporate Data Culture for Data-Driven Decision Making

Philipp Staudt, Rainer Hoffmann
This paper presents a case study of a large German utility company's successful transition to a data-driven organization. It outlines the strategy, which involved three core transformations: enabling the workforce, improving the data lifecycle, and implementing employee-centered data management. The study provides actionable recommendations for industrial organizations facing similar challenges.

Problem Many industrial companies, particularly in the utility sector, struggle to extract value from their data. The ongoing energy transition, with the rise of renewable energy sources and electric vehicles, has made traditional, heuristic-based decision-making obsolete, creating an urgent need for a robust corporate data culture to manage increasing complexity and ensure grid stability.

Outcome - A data culture was successfully established through three intertwined transformations: enabling the workforce, improving the data lifecycle, and transitioning to employee-centered data management.
- Enabling the workforce involved upskilling programs ('Data and AI Multipliers'), creating platforms for knowledge sharing, and clear communication to ensure widespread buy-in and engagement.
- The data lifecycle was improved by establishing new data infrastructure for real-time data, creating a central data lake, and implementing a strong data governance framework with new roles like 'data officers' and 'data stewards'.
- An employee-centric approach, featuring cross-functional teams, showcasing quick wins to demonstrate value, and transparent communication, was crucial for overcoming resistance and building trust.
- The transformation resulted in the deployment of over 50 data-driven solutions that replaced outdated processes and improved decision-making in real-time operations, maintenance, and long-term planning.
data culture, data-driven decision making, utility company, energy transition, change management, data governance, case study
How the Odyssey Project Is Using Old and Cutting-Edge Technologies for Financial Inclusion
MIS Quarterly Executive (2024)

How the Odyssey Project Is Using Old and Cutting-Edge Technologies for Financial Inclusion

Samia Cornelius Bhatti, Dorothy E. Leidner
This paper presents a case study of The Odyssey Project, a fintech startup aiming to increase financial inclusion for the unbanked. It details how the company combines established SMS technology with modern innovations like blockchain and AI to create an accessible and affordable digital financial solution, particularly for users in underdeveloped countries without smartphones or consistent internet access.

Problem Approximately 1.7 billion adults globally remain unbanked, lacking access to formal financial services. This financial exclusion is often due to the high cost of services, geographical distance to banks, and the requirement for expensive smartphones and internet data, creating a significant barrier to economic participation and stability.

Outcome - The Odyssey Project developed a fintech solution that integrates old technology (SMS) with cutting-edge technologies (blockchain, AI, cloud computing) to serve the unbanked.
- The platform, named RoyPay, uses an SMS-based chatbot (RoyChat) as the user interface, making it accessible on basic mobile phones without an internet connection.
- Blockchain technology is used for the core payment mechanism to ensure secure, transparent, and low-cost transactions, eliminating many traditional intermediary fees.
- The system is built on a scalable and cost-effective infrastructure using cloud services, open-source software, and containerization to minimize operational costs.
- The study demonstrates a successful model for creating context-specific technological solutions that address the unique needs and constraints of underserved populations.
financial inclusion, fintech, blockchain, unbanked, SMS technology, mobile payments, developing economies
Load More Showing 216 of 233