AIS Logo
Living knowledge for digital leadership
All AI Governance & Ethics Digital Transformation & Innovation Supply Chain & Operations AI Adoption & Implementation Platform Ecosystems & Strategy SME & Entrepreneurship Cybersecurity & Risk AI Applications & Technologies Digital Health & Well-being Digital Work & Collaboration Education & Training
Learning from Enforcement Cases to Manage GDPR Risks
MIS Quarterly Executive (2021)

Learning from Enforcement Cases to Manage GDPR Risks

Saeed Akhlaghpour, Farkhondeh Hassandoust, Farhad Fatehi, Andrew Burton-Jones, Andrew Hynd
This study analyzes 93 enforcement cases of the European Union's General Data Protection Regulation (GDPR) to help organizations better manage compliance risks. The research identifies 12 distinct types of risks, their associated mitigation measures, and key risk indicators. It provides a practical, evidence-based framework for businesses to move beyond a simple checklist approach to data privacy.

Problem The GDPR is a complex and globally significant data privacy law, and noncompliance can lead to severe financial penalties. However, its requirement for a 'risk-based approach' can be ambiguous for organizations, leaving them unsure of where to focus their compliance efforts. This study addresses this gap by analyzing real-world fines to provide clear, actionable guidance on the most common and costly compliance pitfalls.

Outcome - The analysis of 93 GDPR enforcement cases identified 12 distinct risk types across three main areas: organizational practices, technology, and data management.
- Common organizational risks include failing to obtain valid user consent, inadequate data breach reporting, and a lack of due diligence in mergers and acquisitions.
- Key technology risks involve inadequate technical safeguards (e.g., weak encryption), improper video surveillance, and unlawful automated decision-making or profiling.
- Data management risks focus on failures in providing data access, minimizing data collection, limiting data storage periods, and ensuring data accuracy.
- The study proposes four strategic actions for executives: adopt a risk-based approach globally, monitor the evolving GDPR landscape, use enforcement evidence to justify compliance investments, and strategically select a lead supervisory authority.
GDPR, Data Privacy, Risk Management, Data Protection, Compliance, Enforcement Cases, Information Security
Unexpected Benefits from a Shadow Environmental Management Information System
MIS Quarterly Executive (2021)

Unexpected Benefits from a Shadow Environmental Management Information System

Johann Kranz, Marina Fiedler, Anna Seidler, Kim Strunk, Anne Ixmeier
This study analyzes a German chemical company where a single employee, outside of the formal IT department, developed an Environmental Management Information System (EMIS). The paper examines how this grassroots 'shadow IT' project was successfully adopted company-wide, producing both planned and unexpected benefits. The findings are used to provide recommendations for business leaders on how to effectively implement information systems that drive both eco-sustainability and business value.

Problem Many companies struggle to effectively improve their environmental sustainability because critical information is often inaccessible, fragmented across different departments, or simply doesn't exist. This information gap prevents decision-makers from getting a unified view of their products' environmental impact, making it difficult to turn sustainability goals into concrete actions and strategic advantages.

Outcome - Greater Product Transparency: The system made it easy for employees to assess the environmental impact of materials and products.
- Improved Environmental Footprint: The company improved its energy and water efficiency, reduced carbon emissions, and increased waste productivity.
- Strategic Differentiation: The system provided a competitive advantage by enabling the company to meet growing customer demand for verified sustainable products, leading to increased sales and market share.
- Increased Profitability: Sustainable products became surprisingly profitable, contributing to higher turnover and outperforming competitors.
- More Robust Sourcing: The system helped identify supply chain risks, such as the scarcity of key raw materials, prompting proactive strategies to ensure resource availability.
- Empowered Employees: The tool spurred an increase in bottom-up, employee-driven sustainability initiatives beyond core business operations.
Environmental Management Information System (EMIS), Shadow IT, Corporate Sustainability, Eco-sustainability, Case Study, Strategic Value, Supply Chain Transparency
Exploring the Agentic Metaverse's Potential for Transforming Cybersecurity Workforce Development
MIS Quarterly Executive (2025)

Exploring the Agentic Metaverse's Potential for Transforming Cybersecurity Workforce Development

Ersin Dincelli, Haadi Jafarian
This study explores how an 'agentic metaverse'—an immersive virtual world powered by intelligent AI agents—can be used for cybersecurity training. The researchers presented an AI-driven metaverse prototype to 53 cybersecurity professionals to gather qualitative feedback on its potential for transforming workforce development.

Problem Traditional cybersecurity training methods, such as classroom instruction and static online courses, are struggling to keep up with the fast-evolving threat landscape and high demand for skilled professionals. These conventional approaches often lack the realism and adaptivity needed to prepare individuals for the complex, high-pressure situations they face in the real world, contributing to a persistent skills gap.

Outcome - The concept of an AI-driven agentic metaverse for training was met with strong enthusiasm, with 92% of professionals believing it would be effective for professional training.
- Key challenges to implementing this technology include significant infrastructure demands, the complexity of designing realistic AI-driven scenarios, ensuring security and privacy, and managing user adoption.
- The study identified five core challenges: infrastructure, multi-agent scenario design, security/privacy, governance of social dynamics, and change management.
- Six practical recommendations are provided for organizations to guide implementation, focusing on building a scalable infrastructure, developing realistic training scenarios, and embedding security, privacy, and safety by design.
Agentic Metaverse, Cybersecurity Training, Workforce Development, AI Agents, Immersive Learning, Virtual Reality, Training Simulation
Discovering the Impact of Regulation Changes on Processes: Findings from a Process Science Study in Finance
Proceedings of the 59th Hawaii International Conference on System Sciences (2026)

Discovering the Impact of Regulation Changes on Processes: Findings from a Process Science Study in Finance

Antonia Wurzer, Sophie Hartl, Sandro Franzoi, Jan vom Brocke
This study investigates how regulatory changes, once embedded in a company's information systems, affect the dynamics of business processes. Using digital trace data from a European financial institution's trade order process combined with qualitative interviews, the researchers identified patterns between the implementation of new regulations and changes in process performance indicators.

Problem In highly regulated industries like finance, organizations must constantly adapt their operations to evolving external regulations. However, there is little understanding of the dynamic, real-world effects that implementing these regulatory changes within IT systems has on the execution and performance of business processes over time.

Outcome - Implementing regulatory changes in IT systems dynamically affects business processes, causing performance indicators to shift immediately or with a time delay.
- Contextual factors, such as employee experience and the quality of training, significantly shape how processes adapt; insufficient training after a change can lead to more errors, process loops, and violations.
- Different types of regulations (e.g., content-based vs. function-based) produce distinct impacts, with some streamlining processes and others increasing rework and complexity for employees.
- The study highlights the need for businesses to move beyond a static view of compliance and proactively manage the dynamic interplay between regulation, system design, and user behavior.
Process Science, Regulation, Change, Business Processes, Digital Trace Data, Dynamics
Education and Migration of Entrepreneurial and Technical Skill Profiles of German University Graduates
International Conference on Wirtschaftsinformatik (2025)

Education and Migration of Entrepreneurial and Technical Skill Profiles of German University Graduates

David Blomeyer and Sebastian Köffer
This study examines the supply of entrepreneurial and technical talent from German universities and analyzes their migration patterns after graduation. Using LinkedIn alumni data for 43 universities, the research identifies key locations for talent production and evaluates how effectively different cities and federal states retain or attract these skilled workers.

Problem Amidst a growing demand for skilled workers, particularly for startups, companies and policymakers lack clear data on talent distribution and mobility in Germany. This information gap makes it difficult to devise effective recruitment strategies, choose business locations, and create policies that foster regional talent retention and economic growth.

Outcome - Universities in major cities, especially TU München and LMU München, produce the highest number of graduates with entrepreneurial and technical skills.
- Talent retention varies significantly by location; universities in major metropolitan areas like Berlin, Munich, and Hamburg are most successful at keeping their graduates locally, with FU Berlin retaining 68.8% of its entrepreneurial alumni.
- The tech hotspots of North Rhine-Westphalia (NRW), Bavaria, and Berlin retain an above-average number of their own graduates while also attracting a large share of talent from other regions.
- Bavaria is strong in both educating and attracting talent, whereas NRW, the largest producer of talent, also loses a significant number of graduates to other hotspots.
- The analysis reveals that hotspot regions are generally better at retaining entrepreneurial profiles than technical profiles, highlighting the influence of local startup ecosystems on talent mobility.
Entrepreneurship, Location factors, Skills, STEM, Universities
Corporate Governance for Digital Responsibility: A Company Study
International Conference on Wirtschaftsinformatik (2025)

Corporate Governance for Digital Responsibility: A Company Study

Anna-Sophia Christ
This study examines how ten German companies translate the principles of Corporate Digital Responsibility (CDR) into actionable practices. Using qualitative content analysis of public data, the paper analyzes these companies' approaches from a corporate governance perspective to understand their accountability structures, risk regulation measures, and overall implementation strategies.

Problem As companies rapidly adopt digital technologies for productivity gains, they also face new and complex ethical and societal responsibilities. A significant gap exists between the high-level principles of Corporate Digital Responsibility (CDR) and their concrete operationalization, leaving businesses without clear guidance on how to manage digital risks and impacts effectively.

Outcome - The study identified seventeen key learnings for implementing Corporate Digital Responsibility (CDR) through corporate governance.
- Companies are actively bridging the gap from principles to practice, often adapting existing governance structures rather than creating entirely new ones.
- Key implementation strategies include assigning central points of contact for CDR, ensuring C-level accountability, and developing specific guidelines and risk management processes.
- The findings provide a benchmark and actionable examples for practitioners seeking to integrate digital responsibility into their business operations.
Corporate Digital Responsibility, Corporate Governance, Digital Transformation, Principles-to-Practice, Company Study
Agile design options for IT organizations and resulting performance effects: A systematic literature review
International Conference on Wirtschaftsinformatik (2025)

Agile design options for IT organizations and resulting performance effects: A systematic literature review

Oliver Hohenreuther
This study provides a comprehensive framework for making IT organizations more adaptable by systematically reviewing 57 academic papers. It identifies and categorizes 20 specific 'design options' that companies can implement to increase agility. The research consolidates fragmented literature to offer a structured overview of these options and their resulting performance benefits.

Problem In the fast-paced digital age, traditional IT departments often struggle to keep up with market changes and drive business innovation. While the need for agility is widely recognized, business leaders lack a clear, consolidated guide on the practical options available to restructure their IT organizations and a clear understanding of the specific performance outcomes of each choice.

Outcome - Identified and structured 20 distinct agile design options (DOs) for IT organizations.
- Clustered these options into four key dimensions: Processes, Structure, People & Culture, and Governance.
- Mapped the specific performance effects for each design option, such as increased delivery speed, improved business-IT alignment, greater innovativeness, and higher team autonomy.
- Created a foundational framework to help managers make informed, cost-benefit decisions when transforming their IT organizations.
Agile IT organization design, agile design options, agility benefits
Towards the Acceptance of Virtual Reality Technology for Cyclists
International Conference on Wirtschaftsinformatik (2025)

Towards the Acceptance of Virtual Reality Technology for Cyclists

Sophia Elsholz, Paul Neumeyer, and Rüdiger Zarnekow
This study investigates the factors that influence cyclists' willingness to adopt virtual reality (VR) for indoor training. Using a survey of 314 recreational and competitive cyclists, the research applies an extended Technology Acceptance Model (TAM) to determine what makes VR appealing for platforms like Zwift.

Problem While digital indoor cycling platforms exist, they lack the full immersion that VR can offer. However, it is unclear whether cyclists would actually accept and use VR technology, as its potential in sports remains largely theoretical and the specific factors driving adoption in cycling are unknown.

Outcome - Perceived enjoyment is the single most important factor determining if a cyclist will adopt VR for training.
- Perceived usefulness, or the belief that VR will improve training performance, is also a strong predictor of acceptance.
- Surprisingly, the perceived ease of use of the VR technology did not significantly influence a cyclist's intention to use it.
- Social factors, such as the opinions of other athletes and trainers, along with a cyclist's general openness to new technology, positively contribute to their acceptance of VR.
- Both recreational and competitive cyclists showed similar levels of acceptance, indicating a broad potential market, but both groups are currently skeptical about VR's ability to improve performance.
Technology Acceptance, TAM, Cycling, Extended Reality, XR
Designing Change Project Monitoring Systems: Insights from the German Manufacturing Industry
International Conference on Wirtschaftsinformatik (2025)

Designing Change Project Monitoring Systems: Insights from the German Manufacturing Industry

Bastian Brechtelsbauer
This study details the design of a system to monitor organizational change projects, using insights from an action design research project with two large German manufacturing companies. The methodology involved developing and evaluating a prototype system, which includes a questionnaire-based survey and an interactive dashboard for data visualization and analysis.

Problem Effectively managing organizational change is crucial for company survival, yet it is notoriously difficult to track and oversee. There is a significant research gap and lack of practical guidance on how to design information technology systems that can successfully monitor change projects to improve transparency and support decision-making for managers.

Outcome - Developed a prototype change project monitoring system consisting of surveys and an interactive dashboard to track key indicators like change readiness, acceptance, and implementation.
- Identified four key design challenges: balancing user effort vs. insight depth, managing standardization vs. adaptability, creating a realistic understanding of data quantification, and establishing a shared vision for the tool.
- Proposed three generalized requirements for change monitoring systems: they must provide information tailored to different user groups, be usable for various types of change projects, and conserve scarce resources during organizational change.
- Outlined eight design principles to guide development, focusing on both the system's features (e.g., modularity, intuitive visualizations) and the design process (e.g., involving stakeholders, communicating a clear vision).
Change Management, Monitoring, Action Design Research, Design Science, Industry
To Leave or Not to Leave: A Configurational Approach to Understanding Digital Service Users' Responses to Privacy Violations Through Secondary Use
International Conference on Wirtschaftsinformatik (2025)

To Leave or Not to Leave: A Configurational Approach to Understanding Digital Service Users' Responses to Privacy Violations Through Secondary Use

Christina Wagner, Manuel Trenz, Chee-Wee Tan, and Daniel Veit
This study investigates how users respond when their personal information, collected by a digital service, is used for a secondary purpose by an external party—a practice known as External Secondary Use (ESU). Using a qualitative comparative analysis (QCA), the research identifies specific combinations of user perceptions and emotions that lead to different protective behaviors, such as restricting data collection or ceasing to use the service.

Problem Digital services frequently reuse user data in ways that consumers don't expect, leading to perceptions of privacy violations. It is unclear what specific factors and emotional responses drive a user to either limit their engagement with a service or abandon it completely. This study addresses this gap by examining the complex interplay of factors that determine a user's reaction to such privacy breaches.

Outcome - Users are likely to restrict their information sharing but continue using a service when they feel anxiety, believe the data sharing is an ongoing issue, and the violation is related to web ads.
- Users are more likely to stop using a service entirely when they feel angry about the privacy violation.
- The decision to leave a service is often triggered by more severe incidents, such as receiving unsolicited contact, combined with a strong sense of personal ability to act (self-efficacy) or having their privacy expectations disconfirmed.
- The study provides distinct 'recipes' of conditions that lead to specific user actions, helping businesses understand the nuanced triggers behind user responses to their data practices.
Privacy Violation, Secondary Use, Qualitative Comparative Analysis, QCA, User Behavior, Digital Services, Data Privacy
To VR or not to VR? A Taxonomy for Assessing the Suitability of VR in Higher Education
International Conference on Wirtschaftsinformatik (2025)

To VR or not to VR? A Taxonomy for Assessing the Suitability of VR in Higher Education

Nadine Bisswang, Georg Herzwurm, Sebastian Richter
This study proposes a taxonomy to help educators in higher education systematically assess whether virtual reality (VR) is suitable for specific learning content. The taxonomy is grounded in established theoretical frameworks and was developed through a multi-stage process involving literature reviews and expert interviews. Its utility is demonstrated through an illustrative scenario where an educator uses the framework to evaluate a specific course module.

Problem Despite the increasing enthusiasm for using virtual reality (VR) in education, its suitability for specific topics remains unclear. University lecturers, particularly those without prior VR experience, lack a structured approach to decide when and why VR would be an effective teaching tool. This gap leads to uncertainty about its educational benefits and hinders its effective adoption.

Outcome - Developed a taxonomy that structures the reasons for and against using VR in higher education across five dimensions: learning objective, learning activities, learning assessment, social influence, and hedonic motivation.
- The taxonomy provides a balanced overview by organizing 24 distinct characteristics into factors that favor VR use ('+') and factors that argue against it ('-').
- This framework serves as a practical decision-support tool for lecturers to make an informed initial assessment of VR's suitability for their specific learning content without needing prior technical experience.
- The study demonstrates the taxonomy's utility through an application to a 'warehouse logistics management' learning scenario, showing how it can guide educators' decisions.
Virtual Reality Suitability, Learning Content, Taxonomy, Higher Education, Educational Technology, Decision Support Framework
Algorithmic Management: An MCDA-Based Comparison of Key Approaches
International Conference on Wirtschaftsinformatik (2025)

Algorithmic Management: An MCDA-Based Comparison of Key Approaches

Arne Jeppe, Tim Brée, and Erik Karger
This study employs Multi-Criteria Decision Analysis (MCDA) to evaluate and compare four distinct approaches for governing algorithmic management systems: principle-based, rule-based, risk-based, and auditing-based. The research gathered preferences from 27 experts regarding each approach's effectiveness, feasibility, adaptability, and stakeholder acceptability to determine the most preferred strategy.

Problem As organizations increasingly use algorithms to manage workers, they face the challenge of governing these systems to ensure fairness, transparency, and accountability. While several governance models have been proposed conceptually, there is a significant research gap regarding which approach is empirically preferred by experts and most practical for balancing innovation with responsible implementation.

Outcome - Experts consistently and strongly preferred a hybrid, risk-based approach for governing algorithmic management systems.
- This approach was perceived as the most effective in mitigating risks (like bias and privacy violations) while also demonstrating good adaptability to new technologies and high stakeholder acceptability.
- The findings suggest that a 'one-size-fits-all' strategy is ineffective; instead, a pragmatic approach that tailors the intensity of governance to the level of potential harm is most suitable.
- Purely rule-based approaches were seen as too rigid and slow to adapt, while purely principle-based approaches were considered difficult to enforce.
Algorithmic Management, Multi-Criteria Decision Analysis (MCDA), Risk Management, Organizational Control, Governance, AI Ethics
Generative AI Value Creation in Business-IT Collaboration: A Social IS Alignment Perspective
International Conference on Wirtschaftsinformatik (2025)

Generative AI Value Creation in Business-IT Collaboration: A Social IS Alignment Perspective

Lukas Grützner, Moritz Goldmann, Michael H. Breitner
This study empirically assesses the impact of Generative AI (GenAI) on the social aspects of business-IT collaboration. Using a literature review, an expert survey, and statistical modeling, the research explores how GenAI influences communication, mutual understanding, and knowledge sharing between business and technology departments.

Problem While aligning IT with business strategy is crucial for organizational success, the social dimension of this alignment—how people communicate and collaborate—is often underexplored. With the rapid integration of GenAI into workplaces, there is a significant research gap concerning how these new tools reshape the critical human interactions between business and IT teams.

Outcome - GenAI significantly improves formal business-IT collaboration by enhancing structured knowledge sharing, promoting the use of a common language, and increasing formal interactions.
- The technology helps bridge knowledge gaps by making technical information more accessible to business leaders and business context clearer to IT leaders.
- GenAI has no significant impact on informal social interactions, such as networking and trust-building, which remain dependent on human-driven leadership and engagement.
- Management must strategically integrate GenAI to leverage its benefits for formal communication while actively fostering an environment that supports crucial interpersonal collaboration.
Information systems alignment, social, GenAI, PLS-SEM
Exploring the Design of Augmented Reality for Fostering Flow in Running: A Design Science Study
International Conference on Wirtschaftsinformatik (2025)

Exploring the Design of Augmented Reality for Fostering Flow in Running: A Design Science Study

Julia Pham, Sandra Birnstiel, Benedikt Morschheuser
This study explores how to design Augmented Reality (AR) interfaces for sport glasses to help runners achieve a state of 'flow,' or peak performance. Using a Design Science Research approach, the researchers developed and evaluated an AR prototype over two iterative design cycles, gathering feedback from nine runners through field tests and interviews to derive design recommendations.

Problem Runners often struggle to achieve and maintain a state of flow due to the difficulty of monitoring performance without disrupting their rhythm, especially in dynamic outdoor environments. While AR glasses offer a potential solution by providing hands-free feedback, there is a significant research gap on how to design effective, non-intrusive interfaces that support, rather than hinder, this immersive state.

Outcome - AR interfaces can help runners achieve flow by providing continuous, non-intrusive feedback directly in their field of view, fulfilling the need for clear goals and unambiguous feedback.
- Non-numeric visual cues, such as expanding circles or color-coded warnings, are more effective than raw numbers for conveying performance data without causing cognitive overload.
- Effective AR design for running must be adaptive and customizable, allowing users to choose the metrics they see and control when the display is active to match personal goals and minimize distractions.
- The study produced four key design recommendations: provide easily interpretable feedback beyond numbers, ensure a seamless and embodied interaction, allow user customization, and use a curiosity-inducing design to maintain engagement.
Flow, AR, Sports, Endurance Running, Design Recommendations
Acceptance Analysis of the Metaverse: An Investigation in the Paper- and Packaging Industry
International Conference on Wirtschaftsinformatik (2025)

Acceptance Analysis of the Metaverse: An Investigation in the Paper- and Packaging Industry

First Author¹, Second Author¹, Third Author¹,², and Fourth Author²
This study investigates employee acceptance of metaverse technologies within the traditionally conservative paper and packaging industry. Using the Technology Acceptance Model 3, the research was conducted as a living lab experiment in a leading packaging company. The methodology combined qualitative content analysis with quantitative multiple regression modelling to assess the key factors influencing adoption.

Problem While major technology companies are heavily investing in the metaverse for workplace applications, there is a significant research gap concerning employee acceptance of these immersive technologies. This is particularly relevant for traditionally non-digital industries, like paper and packaging, which are seeking to digitalize but face unique adoption barriers. This study addresses the lack of empirical data on how employees in such sectors perceive and accept metaverse tools for work and collaboration.

Outcome - Employees in the paper and packaging industry show a moderate but ambiguous acceptance of the metaverse, with an average score of 3.61 out of 5.
- The most significant factors driving acceptance are the perceived usefulness (PU) of the technology for their job and its perceived ease of use (PEU).
- Job relevance was found to be a key influencer of perceived usefulness, while an employee's confidence in their own computer skills (computer self-efficacy) was a key predictor for perceived ease of use.
- While employees recognized benefits like improved virtual collaboration, they also raised concerns about hardware limitations (e.g., headset weight, image clarity) and the technology's overall maturity compared to existing tools.
Metaverse, Technology Acceptance Model 3, Living lab, Paper and Packaging industry, Workplace
Evaluating Consumer Decision-Making Trade-Offs in Smart Service Systems in the Smart Home Domain
International Conference on Wirtschaftsinformatik (2025)

Evaluating Consumer Decision-Making Trade-Offs in Smart Service Systems in the Smart Home Domain

Björn Konopka and Manuel Wiesche
This study investigates the trade-offs consumers make when purchasing smart home devices. Using a choice-based conjoint analysis, the research evaluates the relative importance of eight attributes related to performance (e.g., reliability), privacy (e.g., data storage), and market factors (e.g., price and provider).

Problem While smart home technology is increasingly popular, there is limited understanding of how consumers weigh different factors, particularly how they balance privacy concerns against product performance and cost. This study addresses this gap by quantifying which features consumers prioritize when making purchasing decisions for smart home systems.

Outcome - Reliability and the device provider are the most influential factors in consumer decision-making, significantly outweighing other attributes.
- Price and privacy-related attributes (such as data collection scope, purpose, and user controls) play a comparatively lesser role.
- Consumers strongly prefer products that are reliable and made by a trusted (in this case, domestic) provider.
- The findings indicate that consumers are willing to trade off privacy concerns for tangible benefits in performance and trust in the manufacturer.
Smart Service Systems, Smart Home, Conjoint, Consumer Preferences, Privacy
Structural Estimation of Auction Data through Equilibrium Learning and Optimal Transport
International Conference on Wirtschaftsinformatik (2025)

Structural Estimation of Auction Data through Equilibrium Learning and Optimal Transport

Markus Ewert and Martin Bichler
This study proposes a new method for analyzing auction data to understand bidders' private valuations. It extends an existing framework by reformulating the estimation challenge as an optimal transport problem, which avoids the statistical limitations of traditional techniques. This novel approach uses a proxy equilibrium model to analytically evaluate bid distributions, leading to more accurate and robust estimations.

Problem Designing profitable auctions, such as setting an optimal reserve price, requires knowing how much bidders are truly willing to pay, but this information is hidden. Existing methods to estimate these valuations from observed bids often suffer from statistical biases and inaccuracies, especially with limited data, leading to poor auction design and lost revenue for sellers.

Outcome - The proposed optimal transport-based estimator consistently outperforms established kernel-based techniques, showing significantly lower error in estimating true bidder valuations.
- The new method is more robust, providing accurate estimates even in scenarios with high variance in bidding behavior where traditional methods fail.
- In practical tests, reserve prices set using the new method's estimates led to significant revenue gains for the auctioneer, while prices derived from older methods resulted in zero revenue.
Structural Estimation, Auctions, Equilibrium Learning, Optimal Transport, Econometrics
Dealing Effectively with Shadow IT by Managing Both Cybersecurity and User Needs
MIS Quarterly Executive (2024)

Dealing Effectively with Shadow IT by Managing Both Cybersecurity and User Needs

Steffi Haag, Andreas Eckhardt
This study analyzes how companies can manage the use of unauthorized technology, known as Shadow IT. Through interviews with 44 employees across 34 companies, the research identifies four common approaches organizations take and provides 10 recommendations for IT leaders to effectively balance security risks with the needs of their employees.

Problem Employees often use unapproved apps and services (Shadow IT) to be more productive, but this creates significant cybersecurity risks like data leaks and malware infections. Companies struggle to eliminate this practice without hindering employee efficiency. The challenge lies in finding a balance between enforcing security policies and meeting the legitimate technology needs of users.

Outcome - Four distinct organizational archetypes for managing Shadow IT were identified, each resulting in different levels of unauthorized technology use (from very little to very frequent).
- Shadow IT users are categorized into two types: tech-savvy 'Goal-Oriented Actors' (GOAs) who carefully manage risks, and less aware 'Followers' who pose a greater threat.
- Effective management of Shadow IT is possible by aligning cybersecurity policies with user needs through transparent communication and responsive IT support.
- The study offers 10 practical recommendations, including accepting the existence of Shadow IT, creating dedicated user experience teams, and managing different user types differently to harness benefits while minimizing risks.
Shadow IT, Cybersecurity, IT Governance, User Needs, Risk Management, Organizational Culture, IT Policy
Load More Showing 36 of 57