AIS Logo
Living knowledge for digital leadership
All AI Governance & Ethics Digital Transformation & Innovation Supply Chain & Operations AI Adoption & Implementation Platform Ecosystems & Strategy SME & Entrepreneurship Cybersecurity & Risk AI Applications & Technologies Digital Health & Well-being Digital Work & Collaboration Education & Training
The Value of Blockchain-Verified Micro-Credentials in Hiring Decisions
International Conference on Wirtschaftsinformatik (2025)

The Value of Blockchain-Verified Micro-Credentials in Hiring Decisions

Lyuba Stafyeyeva
This study investigates how blockchain verification and the type of credential-issuing institution (university vs. learning academy) influence employer perceptions of a job applicant's trustworthiness, expertise, and salary expectations. Using an experimental design with 200 participants, the research evaluated how different credential formats affected hiring assessments.

Problem Verifying academic credentials is often slow, expensive, and prone to fraud, undermining trust in the system. While new micro-credentials (MCs) offer an alternative, their credibility is often unclear to employers, and it is unknown if technologies like blockchain can effectively solve this trust issue in real-world hiring scenarios.

Outcome - Blockchain verification did not significantly increase employers' perceptions of an applicant's trustworthiness or expertise.
- Employers showed no significant preference for credentials issued by traditional universities over those from alternative learning academies, suggesting a shift toward competency-based hiring.
- Applicants with blockchain-verified credentials were offered lower minimum starting salaries, indicating that while verification may reduce hiring risk for employers, it does not increase the candidate's perceived value.
- The results suggest that institutional prestige is becoming less important than verifiable skills in the hiring process.
micro-credentials, blockchain, trust, verification, employer decision-making
Taking a Sociotechnical Perspective on Self-Sovereign Identity – A Systematic Literature Review
International Conference on Wirtschaftsinformatik (2025)

Taking a Sociotechnical Perspective on Self-Sovereign Identity – A Systematic Literature Review

Lukas Florian Bossler, Teresa Huber, and Julia Kroenung
This study provides a comprehensive analysis of academic literature on Self-Sovereign Identity (SSI), a system that aims to give individuals control over their digital data. Through a systematic literature review, the paper identifies and categorizes the key sociotechnical challenges—both technical and social—that affect the implementation and widespread adoption of SSI. The goal is to map the current research landscape and highlight underexplored areas.

Problem As individuals use more internet services, they lose control over their personal data, which is often managed and monetized by large tech companies. While Self-Sovereign Identity (SSI) is a promising solution to restore user control, academic research has disproportionately focused on technical aspects like security. This has created a significant knowledge gap regarding the crucial social challenges, such as user acceptance, trust, and usability, which are vital for SSI's real-world success.

Outcome - Security and privacy are the most frequently discussed challenges in SSI literature, often linked to the use of blockchain technology.
- Social factors essential for adoption, including user acceptance, trust, usability, and control, are significantly overlooked in current academic research.
- Over half of the analyzed papers discuss SSI in a general sense, with a lack of focus on specific application domains like e-government, healthcare, or finance.
- A potential mismatch exists between SSI's privacy needs and the inherent properties of blockchain, suggesting that alternative technologies should be explored.
- The paper concludes there is a strong need for more domain-specific and design-oriented research to address the social hurdles of SSI adoption.
self-sovereign identity, decentralized identity, blockchain, sociotechnical challenges, digital identity, systematic literature review
Structural Estimation of Auction Data through Equilibrium Learning and Optimal Transport
International Conference on Wirtschaftsinformatik (2025)

Structural Estimation of Auction Data through Equilibrium Learning and Optimal Transport

Markus Ewert and Martin Bichler
This study proposes a new method for analyzing auction data to understand bidders' private valuations. It extends an existing framework by reformulating the estimation challenge as an optimal transport problem, which avoids the statistical limitations of traditional techniques. This novel approach uses a proxy equilibrium model to analytically evaluate bid distributions, leading to more accurate and robust estimations.

Problem Designing profitable auctions, such as setting an optimal reserve price, requires knowing how much bidders are truly willing to pay, but this information is hidden. Existing methods to estimate these valuations from observed bids often suffer from statistical biases and inaccuracies, especially with limited data, leading to poor auction design and lost revenue for sellers.

Outcome - The proposed optimal transport-based estimator consistently outperforms established kernel-based techniques, showing significantly lower error in estimating true bidder valuations.
- The new method is more robust, providing accurate estimates even in scenarios with high variance in bidding behavior where traditional methods fail.
- In practical tests, reserve prices set using the new method's estimates led to significant revenue gains for the auctioneer, while prices derived from older methods resulted in zero revenue.
Structural Estimation, Auctions, Equilibrium Learning, Optimal Transport, Econometrics
“We don't need it” - Insights into Blockchain Adoption in the German Pig Value Chain
International Conference on Wirtschaftsinformatik (2025)

“We don't need it” - Insights into Blockchain Adoption in the German Pig Value Chain

Hauke Precht, Marlen Jirschitzka, and Jorge Marx Gómez
This study investigates why blockchain technology, despite its acclaimed benefits for transparency and traceability, has not been adopted in the German pig value chain. Researchers conducted eight semi-structured interviews with industry experts, analyzing the findings through the technology-organization-environment (TOE) framework to identify specific barriers to implementation.

Problem There is a significant disconnect between the theoretical advantages of blockchain for food supply chains and its actual implementation in the real world. This study addresses the specific research gap of why the German pig industry, a major agricultural sector, is not utilizing blockchain technology, aiming to understand the practical factors that prevent its adoption.

Outcome - Stakeholders perceive their existing technology solutions as sufficient, meeting current demands for data exchange and traceability without needing blockchain.
- Trust, a key benefit of blockchain, is already well-established within the industry through long-standing business relationships, interlocking company ownership, and neutral non-profit organizations.
- The vast majority of industry experts do not believe blockchain offers any significant additional benefit or value over their current systems and processes.
- There is a lack of market demand for the features blockchain provides; neither industry actors nor end consumers are asking for the level of transparency or immutability it offers.
- Significant practical barriers include the high investment costs required, a general lack of financial slack for new IT projects, and insufficient digital infrastructure across the value chain.
blockchain adoption, TOE, food supply chain, German pig value chain, qualitative research, supply chain management, technology adoption barriers
The PV Solution Guide: A Prototype for a Decision Support System for Photovoltaic Systems
International Conference on Wirtschaftsinformatik (2025)

The PV Solution Guide: A Prototype for a Decision Support System for Photovoltaic Systems

Chantale Lauer, Maximilian Lenner, Jan Piontek, and Christian Murlowski
This study presents the conceptual design of the 'PV Solution Guide,' a user-centric prototype for a decision support system for homeowners considering photovoltaic (PV) systems. The prototype uses a conversational agent and 3D modeling to adapt guidance to specific house types and the user's level of expertise. An initial evaluation compared the prototype's usability and trustworthiness against an established tool.

Problem Current online tools and guides for homeowners interested in PV systems are often too rigid, failing to accommodate unique home designs or varying levels of user knowledge. Information is frequently scattered, incomplete, or biased, leading to consumer frustration, distrust, and decision paralysis, which ultimately hinders the adoption of renewable energy.

Outcome - The study developed the 'PV Solution Guide,' a prototype decision support system designed to be more adaptive and user-friendly than existing tools.
- In a comparative evaluation, the prototype significantly outperformed the established 'Solarkataster Rheinland-Pfalz' tool in usability, with a System Usability Scale (SUS) score of 80.21 versus 56.04.
- The prototype also achieved a higher perceived trust score (82.59% vs. 76.48%), excelling in perceived benevolence and competence.
- Key features contributing to user trust and usability included transparent cost structures, personalization based on user knowledge and housing, and an interactive 3D model of the user's home.
Decision Support Systems, Photovoltaic Systems, Human-Centered Design, Qualitative Research
How Large Companies Can Help Small and Medium-Sized Enterprise (SME) Suppliers Strengthen Cybersecurity
MIS Quarterly Executive (2024)

How Large Companies Can Help Small and Medium-Sized Enterprise (SME) Suppliers Strengthen Cybersecurity

Jillian K. Kwong, Keri Pearlson
This study investigates the cybersecurity challenges faced by small and medium-sized enterprise (SME) suppliers and proposes actionable strategies for large companies to help them improve. Based on interviews with executives and cybersecurity experts, the paper identifies key barriers SMEs encounter and outlines five practical actions large firms can take to strengthen their supply chain's cyber resilience.

Problem Large companies increasingly require their smaller suppliers to meet the same stringent cybersecurity standards they do, creating a significant burden for SMEs with limited resources. This gap creates a major security vulnerability, as attackers often target less-secure SMEs as a backdoor to access the networks of larger corporations, posing a substantial third-party risk to entire supply chains.

Outcome - SME suppliers are often unable to meet the security standards of their large partners due to four key barriers: unfriendly regulations, organizational culture clashes, variability in cybersecurity frameworks, and misalignment of business processes.
- Large companies can proactively strengthen their supply chain by providing SMEs with the resources and expertise needed to understand and comply with regulations.
- Creating incentives for meeting security benchmarks is more effective than penalizing suppliers for non-compliance.
- Large firms should develop programs to help SMEs elevate their cybersecurity culture and align security processes with their own.
- Coordinating with other large companies to standardize cybersecurity frameworks and assessment procedures can significantly reduce the compliance burden on SMEs.
Cybersecurity, Supply Chain Management, Third-Party Risk, Small and Medium-Sized Enterprises (SMEs), Cyber Resilience, Vendor Risk Management
Promoting Cybersecurity Information Sharing Across the Extended Value Chain
MIS Quarterly Executive (2025)

Promoting Cybersecurity Information Sharing Across the Extended Value Chain

Olga Biedova, Lakshmi Goel, Justin Zhang, Steven A. Williamson, Blake Ives
This study analyzes an alternative cybersecurity information-sharing forum centered on the extended value chain of a single company in the forest and paper products industry. The paper explores the forum's design, execution, and challenges to provide recommendations for similar company-specific collaborations. The goal is to enhance cybersecurity resilience across interconnected business partners by fostering a more trusting and relevant environment for sharing best practices.

Problem As cyberthreats become more complex, industries with interconnected information and operational technologies (IT/OT) face significant vulnerabilities. Despite government and industry calls for greater collaboration, inter-organizational cybersecurity information sharing remains sporadic due to concerns over confidentiality, competitiveness, and lack of trust. Standard sector-based sharing initiatives can also be too broad to address the specific needs of a company and its unique value chain partners.

Outcome - A company-led, value-chain-specific cybersecurity forum is an effective alternative to broader industry groups, fostering greater trust and more relevant discussions among business partners.
- Key success factors for such a forum include inviting the right participants (security strategy leaders), establishing clear ground rules to encourage open dialogue, and using external facilitators to ensure neutrality.
- The forum successfully shifted the culture from one of distrust to one of transparency and collaboration, leading participants to be more open about sharing experiences, including previous security breaches.
- Participants gained valuable insights into the security maturity of their partners, leading to tangible improvements in cybersecurity practices, such as updating security playbooks, adopting new risk metrics, and enhancing third-party risk management.
- The collaborative model strengthens the entire value chain, as companies learn from each other's strategies, tools, and policies to collectively improve their defense against common threats.
cybersecurity, information sharing, extended value chain, supply chain security, cyber resilience, forest products industry, inter-organizational collaboration
How Germany Successfully Implemented Its Intergovernmental FLORA System
MIS Quarterly Executive (2025)

How Germany Successfully Implemented Its Intergovernmental FLORA System

Julia Amend, Simon Feulner, Alexander Rieger, Tamara Roth, Gilbert Fridgen, and Tobias Guggenberger
This paper presents a case study on Germany's implementation of FLORA, a blockchain-based IT system designed to manage the intergovernmental processing of asylum seekers. It analyzes how the project navigated legal and technical challenges across different government levels. Based on the findings, the study offers three key recommendations for successfully deploying similar complex, multi-agency IT systems in the public sector.

Problem Governments face significant challenges in digitalizing services that require cooperation across different administrative layers, such as federal and state agencies. Legal mandates often require these layers to maintain separate IT systems, which complicates data exchange and modernization. Germany's asylum procedure previously relied on manually sharing Excel-based lists between agencies, a process that was slow, error-prone, and created data privacy risks.

Outcome - FLORA replaced inefficient Excel-based lists with a decentralized system, enabling a more efficient and secure exchange of procedural information between federal and state agencies.
- The system created a 'single procedural source of truth,' which significantly improved the accuracy, completeness, and timeliness of information for case handlers.
- By streamlining information exchange, FLORA reduced the time required for initial stages of the asylum procedure by up to 50%.
- The blockchain-based architecture enhanced legal compliance by reducing procedural errors and providing a secure way to manage data that adheres to strict GDPR privacy requirements.
- The study recommends that governments consider decentralized IT solutions to avoid the high hidden costs of centralized systems, deploy modular solutions to break down legacy architectures, and use a Software-as-a-Service (SaaS) model to lower initial adoption barriers for agencies.
intergovernmental IT systems, digital government, blockchain, public sector innovation, case study, asylum procedure, Germany
Transforming Energy Management with an AI-Enabled Digital Twin
MIS Quarterly Executive (2025)

Transforming Energy Management with an AI-Enabled Digital Twin

Hadi Ghanbari, Petter Nissinen
This paper reports on a case study of how one of Europe's largest district heating providers, called EnergyCo, implemented an AI-assisted digital twin to improve energy efficiency and sustainability. The study details the implementation process and its outcomes, providing six key recommendations for executives in other industries who are considering adopting digital twin technology.

Problem Large-scale energy providers face significant challenges in managing complex district heating networks due to fluctuating energy prices, the shift to decentralized renewable energy sources, and operational inefficiencies from siloed departments. Traditional control systems lack the comprehensive, real-time view needed to optimize the entire network, leading to energy loss, higher costs, and difficulties in achieving sustainability goals.

Outcome - The AI-enabled digital twin provided a comprehensive, real-time representation of the entire district heating network, replacing fragmented views from legacy systems.
- It enabled advanced simulation and optimization, allowing the company to improve operational efficiency, manage fluctuating energy prices, and move toward its carbon neutrality goals.
- The system facilitated scenario-based decision-making, helping operators forecast demand, optimize temperatures and pressures, and reduce heat loss.
- The digital twin enhanced cross-departmental collaboration by providing a shared, holistic view of the network's operations.
- It enabled a shift from reactive to proactive maintenance by using predictive insights to identify potential equipment failures before they occur, reducing costs and downtime.
Digital Twin, Energy Management, District Heating, AI, Cyber-Physical Systems, Sustainability, Case Study
How a Utility Company Established a Corporate Data Culture for Data-Driven Decision Making
MIS Quarterly Executive (2024)

How a Utility Company Established a Corporate Data Culture for Data-Driven Decision Making

Philipp Staudt, Rainer Hoffmann
This paper presents a case study of a large German utility company's successful transition to a data-driven organization. It outlines the strategy, which involved three core transformations: enabling the workforce, improving the data lifecycle, and implementing employee-centered data management. The study provides actionable recommendations for industrial organizations facing similar challenges.

Problem Many industrial companies, particularly in the utility sector, struggle to extract value from their data. The ongoing energy transition, with the rise of renewable energy sources and electric vehicles, has made traditional, heuristic-based decision-making obsolete, creating an urgent need for a robust corporate data culture to manage increasing complexity and ensure grid stability.

Outcome - A data culture was successfully established through three intertwined transformations: enabling the workforce, improving the data lifecycle, and transitioning to employee-centered data management.
- Enabling the workforce involved upskilling programs ('Data and AI Multipliers'), creating platforms for knowledge sharing, and clear communication to ensure widespread buy-in and engagement.
- The data lifecycle was improved by establishing new data infrastructure for real-time data, creating a central data lake, and implementing a strong data governance framework with new roles like 'data officers' and 'data stewards'.
- An employee-centric approach, featuring cross-functional teams, showcasing quick wins to demonstrate value, and transparent communication, was crucial for overcoming resistance and building trust.
- The transformation resulted in the deployment of over 50 data-driven solutions that replaced outdated processes and improved decision-making in real-time operations, maintenance, and long-term planning.
data culture, data-driven decision making, utility company, energy transition, change management, data governance, case study
How the Odyssey Project Is Using Old and Cutting-Edge Technologies for Financial Inclusion
MIS Quarterly Executive (2024)

How the Odyssey Project Is Using Old and Cutting-Edge Technologies for Financial Inclusion

Samia Cornelius Bhatti, Dorothy E. Leidner
This paper presents a case study of The Odyssey Project, a fintech startup aiming to increase financial inclusion for the unbanked. It details how the company combines established SMS technology with modern innovations like blockchain and AI to create an accessible and affordable digital financial solution, particularly for users in underdeveloped countries without smartphones or consistent internet access.

Problem Approximately 1.7 billion adults globally remain unbanked, lacking access to formal financial services. This financial exclusion is often due to the high cost of services, geographical distance to banks, and the requirement for expensive smartphones and internet data, creating a significant barrier to economic participation and stability.

Outcome - The Odyssey Project developed a fintech solution that integrates old technology (SMS) with cutting-edge technologies (blockchain, AI, cloud computing) to serve the unbanked.
- The platform, named RoyPay, uses an SMS-based chatbot (RoyChat) as the user interface, making it accessible on basic mobile phones without an internet connection.
- Blockchain technology is used for the core payment mechanism to ensure secure, transparent, and low-cost transactions, eliminating many traditional intermediary fees.
- The system is built on a scalable and cost-effective infrastructure using cloud services, open-source software, and containerization to minimize operational costs.
- The study demonstrates a successful model for creating context-specific technological solutions that address the unique needs and constraints of underserved populations.
financial inclusion, fintech, blockchain, unbanked, SMS technology, mobile payments, developing economies
Combining Low-Code/No-Code with Noncompliant Workarounds to Overcome a Corporate System's Limitations
MIS Quarterly Executive (2024)

Combining Low-Code/No-Code with Noncompliant Workarounds to Overcome a Corporate System's Limitations

Robert M. Davison, Louie H. M. Wong, Steven Alter
This study explores how employees at a warehouse in Hong Kong utilize low-code/no-code principles with everyday tools like Microsoft Excel to create unofficial solutions. It examines these noncompliant but essential workarounds that compensate for the shortcomings of their mandated corporate software system. The research is based on a qualitative case study involving interviews with warehouse staff.

Problem A global company implemented a standardized, non-customizable corporate system (Microsoft Dynamics) that was ill-suited for the unique logistical needs of its Hong Kong operations. This created significant operational gaps, particularly in delivery scheduling, leaving employees unable to perform critical tasks using the official software.

Outcome - Employees effectively use Microsoft Excel as a low-code tool to create essential, noncompliant workarounds that are vital for daily operations, such as delivery management.
- These employee-driven solutions, developed without formal low-code platforms or IT approval, become institutionalized and crucial for business success, highlighting the value of 'shadow IT'.
- The study argues that low-code/no-code development is not limited to formal platforms and that managers should recognize, support, and govern these informal solutions.
- Businesses are advised to adopt a portfolio approach to low-code development, leveraging tools like Excel alongside formal platforms, to empower employees and solve real-world operational problems.
Low-Code/No-Code, Workarounds, Shadow IT, Citizen Development, Enterprise Systems, Case Study, Microsoft Excel
SUPPORTING COMMUNITY FIRST RESPONDERS IN AGING IN PLACE: AN ACTION DESIGN FOR A COMMUNITY-BASED SMART ACTIVITY MONITORING SYSTEM
MIS Quarterly (2025)

SUPPORTING COMMUNITY FIRST RESPONDERS IN AGING IN PLACE: AN ACTION DESIGN FOR A COMMUNITY-BASED SMART ACTIVITY MONITORING SYSTEM

Carmen Leong, Carol Hsu, Nadee Goonawardene, Hwee-Pink Tan
This study details the development of a smart activity monitoring system designed to help elderly individuals live independently at home. Using a three-year action design research approach, it deployed a sensor-based system in a community setting to understand how to best support community first responders—such as neighbors and volunteers—who lack professional healthcare training.

Problem As the global population ages, more elderly individuals wish to remain in their own homes, but this raises safety concerns like falls or medical emergencies going unnoticed. This study addresses the specific challenge of designing monitoring systems that provide remote, non-professional first responders with the right information (situational awareness) to accurately assess an emergency alert and respond effectively.

Outcome - Technology adaptation alone is insufficient; the system design must also encourage the elderly person to adapt their behavior, such as carrying a beacon when leaving home, to ensure data accuracy.
- Instead of relying on simple automated alerts, the system should provide responders with contextual information, like usual sleep times or last known activity, to support human-based assessment and reduce false alarms.
- To support teams of responders, the system must integrate communication channels, allowing all actions and updates related to an alert to be logged in a single, closed-loop thread for better coordination.
- Long-term activity data can be used for proactive care, helping identify subtle changes in behavior (e.g., deteriorating mobility) that may signal future health risks before an acute emergency occurs.
Activity monitoring systems, community-based model, elderly care, situational awareness, IoT, sensor-based monitoring systems, action design research
Design Knowledge for Virtual Learning Companions from a Value-centered Perspective
Communications of the Association for Information Systems (2024)

Design Knowledge for Virtual Learning Companions from a Value-centered Perspective

Ricarda Schlimbach, Bijan Khosrawi-Rad, Tim C. Lange, Timo Strohmann, Susanne Robra-Bissantz
This study develops design principles for Virtual Learning Companions (VLCs), which are AI-powered chatbots designed to help students with motivation and time management. Using a design science research approach, the authors conducted interviews, workshops, and built and tested several prototypes with students. The research aims to create a framework for designing VLCs that not only provide functional support but also build a supportive, companion-like relationship with the learner.

Problem Working students in higher education often struggle to balance their studies with their jobs, leading to challenges with motivation and time management. While conversational AI like ChatGPT is becoming common, these tools often lack the element of companionship and a holistic approach to learning support. This research addresses the gap in how to design AI learning tools that effectively integrate motivation, time management, and relationship-building from a user-value-centered perspective.

Outcome - The study produced a comprehensive framework for designing Virtual Learning Companions (VLCs), resulting in 9 design principles, 28 meta-requirements, and 33 design features.
- The findings are structured around a “value-in-interaction” model, which proposes that a VLC's value is created across three interconnected layers: the Relationship Layer, the Matching Layer, and the Service Layer.
- Key design principles include creating a human-like and adaptive companion, enabling proactive and reactive behavior, building a trustworthy relationship, providing supportive content, and fostering a motivational and ethical learning environment.
- Evaluation of a coded prototype revealed that different student groups have different preferences, emphasizing that VLCs must be adaptable to their specific educational context and user needs to be effective.
Conversational Agent, Education, Virtual Learning Companion, Design Knowledge, Value
REGULATING EMERGING TECHNOLOGIES: PROSPECTIVE SENSEMAKING THROUGH ABSTRACTION AND ELABORATION
MIS Quarterly (2025)

REGULATING EMERGING TECHNOLOGIES: PROSPECTIVE SENSEMAKING THROUGH ABSTRACTION AND ELABORATION

Stefan Seidel, Christoph J. Frick, Jan vom Brocke
This study examines how various actors, including legal experts, government officials, and industry leaders, collaborated to create laws for new technologies like blockchain. Through a case study in Liechtenstein, it analyzes the process of developing a law on "trustworthy technology," focusing on how the participants collectively made sense of a complex and evolving subject to construct a new regulatory framework.

Problem Governments face a significant challenge in regulating emerging digital technologies. They must create rules that prevent harmful effects and protect users without stifling innovation. This is particularly difficult when the full potential and risks of a new technology are not yet clear, creating regulatory gaps and uncertainty for businesses.

Outcome - Creating effective regulation for new technologies is a process of 'collective prospective sensemaking,' where diverse stakeholders build a shared understanding over time.
- This process relies on two interrelated activities: 'abstraction' and 'elaboration'. Abstraction involves generalizing the essential properties of a technology to create flexible, technology-neutral rules that encourage innovation.
- Elaboration involves specifying details and requirements to provide legal certainty and protect users.
- Through this process, the regulatory target can evolve significantly, as seen in the case study's shift from regulating 'blockchain/cryptocurrency' to a broader, more durable law for the 'token economy' and 'trustworthy technology'.
Technology regulation, prospective sensemaking, sensemaking, institutional construction, emerging technology, blockchain, token economy
Showing all 33 podcasts