30TH Bled eConference: Digital Transformation – From Connecting Things to Transforming Our Lives (June 18 – 21, 2017, Bled, Slovenia) (Conference Proceedings) Editors: dr. Andreja Pucihar dr. Mirjana Kljajić Borštnar dr. Christian Kittl dr. Pascal Ravesteijn dr. Roger Clarke dr. Roger Bons June 2017 Title: 30TH Bled eConference: Digital Transformation – From Connecting Things to Transforming Our Lives (June 18 – 21, 2017, Bled, Slovenia) (Conference Proceedings) Editors: Andreja Pucihar, Ph.D., (Unversity of Maribor, Faculty of Organizational Sciences), Mirjana Kljajić Borštnar, Ph.D., (Unversity of Maribor, Faculty of Organizational Sciences), Christian Kittl, Ph.D., (evolaris next level, Austria), Pascal Ravesteijn, Ph.D., (University of Applied Sciences Utrecht, Netherlands), Roger Clarke, Ph.D., (Xamax Consultancy Pty Ltd & The Australian National University, Australia), Roger Bons, Ph.D., (FOM Hochschule, Germany) Review: Alenka Baggia, (University of Maribor, Slovenia), Alenka Brezavšček, (University of Maribor, Slovenia), Aleš Levtek, (University of Maribor, Slovenia), Amira Mujanović, (University of Maribor, Slovenia), Andreas Hamper, (The University of Erlangen-Nuremberg, Germany), Andrej Škraba, (University of Maribor, Slovenia), Andreja Pucihar, (University of Maribor, Slovenia), Anja Žnidaršič, (University of Maribor, Slovenia, Anna Sell, (Institute for Advanced Management Systems Research, Åbo Akademi University, Finland), Antonin Pavlicek, (University of Economics, Faculty of Informatics and Statistics, Department of System Analysis, Czech Republic), Barbara Josef, (University of St.Gallen, Switzerland), Barbara Pavlakovič, (University of Maribor), Birgit Großer, (FernUniversitat in Hagen, Germany), Borut Werber, (University of Maribor, Slovenia), Brad McKenna, (Norwich Business School, University of East Anglia, United Kingdom), Carolina Lopez- Nicolas, (University of Murcia, Spain), Christer Carlsson, (Åbo Akademi University, Turku, Finland), Christian Hrach, (University Leipzig, Germany), Christian Janze, (Goethe University Frankfurt, Germany), Christian Kittl, (evolaris next level, Austria), Christine Bauer, (Johannes Kepler University Linz, Austria), Christine Strauss, (University of Vienna, Austria), Colin Callinan, (National University of Ireland, Galway), Helen Cripps, (Edith Cowan University, Australia), Damjan Maletič, (University of Maribor, Slovenia), Davorin Kofjač, (University of Maribor, Slovenia), Debby Goedknegt, (Utrecht University of Applied Sciences, The Netherlands), Dimosthenis Kotsopoulos, (ELTRUN e-Business Research Center, Department of Management Science and Technology, Athens University of Economics and Business, Athens, Greece), Dina Elikan, (HEC School of Business, University of Lausanne, Switzerland), Doug Vogel, (Harbin Institute of Technology, China), Elina Annanperä, (University of Oulu, Finland, Esther van der Stappen, (HU University of Applied Sciences Utrecht, The Netherlands ), Eva Londo, (Department of Journalism and Communication/ Tirana University, Albania ), Francisco-Jose Molina-Castillo, (University of Murcia, Spain), Frantisek Sudzina, (Aalborg University, Faculty of Social Sciences, Department of Business and Management, Denmark), Fred Kitchens, (Ball State University, USA), Gregor Lenart, (University of Maribor, Slovenia), Helmut Krcmar, (Technical University of Munich (TUM), Germany), Ildikó Szabó, (Corvinus University of Budapest, Hungary), Imran Muhammad, (Epworth HealthCare & Deakin University, Australia), Isabella Eigner, (University Erlangen-Nuremberg, Institute of Information Systems, Germany), Jaka Toman, (University of Maribor, Slovenia), Janko Hriberšek, (University of Maribor, Slovenia ), Jasna Peternel, (University of Maribor, Slovenia ), Johan Versendaal, (HU University of Applied Sciences Utrecht and Open University of the Netherlands, Netherlands), Jože Zupančič, (University of Maribor, Slovenia), Juergen Seitz, (Baden-Wuerttemberg Cooperative State University, Germany), Justian Knobbout, (HU University of Applied Sciences Utrecht, The Netherlands), Kai Jakobs, (RWTH Aachen University, Germany), Katalin Ternai, (Corvinus University of Budapest, Hungary), Koen Smit, (HU University of Applied Sciences Utrecht, the Netherlands), Krisztian Varga, (Corvinus University of Budapest, Hungary), Lea Hannola, (Lappeenranta University of Technology, Finland), Liubov Roslyakova, (University College Cork, Ireland), Loina Prifti, (Technical University of Munich (TUM), Germany ), Marikka Heikkilä, (University of Turku, Finland), Marja Exalto, (University of Applied Sciences Utrecht, The Netherlands), Marjeta Marolt, (University of Maribor, Slovenia), Marko Budler, (Faculty of Economics, University of Ljubljana, Slovenia), Marko Hölbl, (University of Maribor, Slovenia), Markus Makkonen, (University of Jyvaskyla, Finland), Marta Takahashi, (Edward Bernays College of Communication Management, Croatia), Matias Lievonen, (University of Jyväskylä, Finland), Matthias Wittwer, (Leipzig University, Germany), Mirjana Kljajic Borstnar, (University of Maribor, Slovenia), Navin Sewberath Misser, (HU University of Applied Sciences, The Netherlands), Nilmini Wickramasinghe, (Epworth HealthCare and Deakin University, Australia), Olli Korhonen, (University of Oulu, Finland), Panu Moilanen, (University of Jyvaskyla, Finland), Pascal Ravesteyn, (HU University of Applied Sciences Utrecht, The Netherlands), Péter Fehér, (Corvinus University of Budapest, Hungary), Peter Haddad, (Epworth HealthCare and Deakin University, Australia ), Petra Robnik, (University of Maribor, Slovenia ), Pirkko Walden, (Institute for Advanced Managements Systems Research, Åbo Akademi University, Finland), Resego Morakanyane, (University College Cork, Ireland), Robert Heininger, (Technical University of Munich (TUM), Germany), Robert Leskovar, (University of Maribor, Slovenia), Roger Bons, (FOM Hochschule, Germany), Ronald Spanjers, (Roessingh, The Netherlands), Sabine Berghaus, (University of St.Gallen, Switzerland), Sanaul Haque, (University of Oulu, Finland), Sasan Adibi, (School of Information Technology, Deakin University, Australia ), Taina Rantanen, (University of Jyväskylä, Finland), Tamilla Mavlanova, (University of Connecticut, USA), Thomas Mejtoft, (Umeå University, Sweden), Timo Weinrich, (University of Goettingen, Germany), Trevor Clohessy, (J.E. Cairnes School of Business & Economics, National University of Ireland Galway), Tuomas Kari, (University of Jyvaskyla, Finland), Ukamaka Onyenucheya, (University of Plymouth, United Kindgdom), Ulrike Baumoel, (FernUniversität in Hagen, Germany), Urban Pinter, (University of Maribor, Slovenia), Johan Versendaal, (HU University of Applied Sciences Utrecht and Open University of the Netherlands, Netherlands), Vladislav Rajkovič, (University of Maribor, Slovenia), Yue Guo, (Hohai Unversity Nanjing, China)Zaid Zekiria Sako, (Deakin University, Australia), Hans-Dieter Zimmermann, (FHS St. Gallen, Switzerland) Committee: Andreja Pucihar, (University of Maribor, Slovenia), Mirjana Kljajić Borštnar, (University of Maribor, Slovenia), Iztok Podbregar, (University of Maribor, Slovenia), Christian Kittl, (evolaris next level Research Centre, Austria), Pascal Ravesteijn, (University of Applied Sciences Utrecht, Netherlands), Hans-Dieter Zimmermann, (FHS St. Gallen, Switzerland), Helen Cripps, (Edith Cowan University, Australia), Nilmini Wickramasinghe, (Epworth HealthCare and Deakin University, Australia), Juergen Seitz, (Baden-Wuerttemberg Cooperative State University, Germany), Christer Carlsson, (Åbo Akademi University, Finland), Pirkko Walden, (Åbo Akademi University, Finland), Christian Kittl, (evolaris next level Research Centre, Austria), Matt Glowatz, (University College Dublin, Ireland), Roger Clarke, (Xamax Consultancy Pty Ltd & The Australian National University, Australia), Roger Bons, (Professor, FOM Hochschule, Germany), Doug Vogel, (Harbin Institute of Technology, China), Johan Versendaal, (HU University of Applied Sciences Utrecht and Open University of the Netherlands, Netherlands), Marijn Plomp, (Vrije Universiteit Amsterdam, The Netherlands) Technical editors: Jan Perša (University of Maribor Press), Armin Turanović (University of Maribor Press), Borut Slave (Unversity of Maribor, Faculty of Organizational Sciences) First published in 2017 by: University of Maribor Press Slomškov trg 15, 2000 Maribor, Slovenia tel. +386 2 250 42 42, faks +386 2 252 32 45 http://press.um.si, zalozba@um.si Co-published by University of Maribor, Faculty of Organizational Sciences Kidričeva cesta 55a, 4000 Kranj, Slovenia tel. +386 4 237 42 00, faks +386 4 237 42 99 http://www.fov.um.si, dekanat@fov.uni-mb.si Published: 13. June 2017 © University of Maribor Press All rights reserved. No part of this book may be reprinted or reproduced or utilized in any form or by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying and recording, or in any information storage or retrieval system, without permission in writing from the publisher. CIP - Kataložni zapis o publikaciji Univerzitetna knjižnica Maribor 659.23:004(082)(0.034.2) BLED eConference (30 ; 2017) Digital transformation, from connecting things to transforming our lives [Elektronski vir] : (conference proceedings) / 30th Bled eConference, (June 18 - 21, 2017, Bled, Slovenia) ; editors Andreja Pucihar ... [et al.]. - El. zbornik. - Maribor : University of Maribor Press ; Kranj : Faculty of Organizational Sciences, 2017 Način dostopa (URL): http://press.um.si/index.php/ump/catalog/book/234 ISBN 978-961-286-043-1 (pdf, University of Maribor Press) 1. Gl. stv. nasl. 2. Pucihar, Andreja COBISS.SI-ID 92246017 ISBN 978-961-286-043-1 DOI: https://doi.org/10.18690/978-961-286-043-1 Price: Free copy For publisher: full. prof. Igor Tičar, Ph.D., rector (University of Maribor) https://doi.org/10.18690/978-961-286-043-1 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si 30TH BLED ECONFERENCE: DIGITAL TRANSFROMATION – FROM CONNECTING THINGS TO TRANSFROMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Preface ANDREJA PUCIHAR1 Bled eConference, organized by University of Maribor, Faculty of Organizational Sciences, has been shaping electronic interactions since 1988 and is celebrating its 30th anniversary in 2017. Bled eConference is the oldest, most traditional and well renowned conference in the field. It attracts speakers and delegates from business, government, information technology providers and universities and is the major venue for researchers working in all aspects of “e”. The theme of this year’s conference is dedicated to “Digital Transformation – From Connecting Things to Transforming Our Lives”. The evolution of digital technologies and solutions (e.g. Internet of things, mobile technology, social media, cloud and high performance computing, artificial intelligence and advanced machine learning, virtual and augmented reality, big data & big data analytics, service architecture, digital technology platforms, 3D printing, robotics etc. …) has significantly impacted on the way how business is conducted and had big implications on our lives. The nowadays digital economy calls for transformation of businesses, governments, education and societies as whole. It also calls for enabling policies and politics for cross border and global digital business. Digital transformation is reflected in the organizations’ ability of comprehensive transformation of business activities, processes, competencies and business models in order to take advantage of digital technologies. Digital technologies require changes in our mind set, culture and functioning and have strategic impact on both the organization itself and its business ecosystems. In this year’s conference, we address various aspects of digital transformation and provide directions and guidelines for organizations to overcome challenges on their way of successful digital transformation. Themes covered in the papers of these proceedings are focused to digital transformation challenges, opportunities and cesses, furthermore to business model innovation, social media and big data analytics implementation, e-health, digital wellness and wellbeing experiences, new applications and organizational models, and novel approaches and cases in education in digital economy. CORRESPONDENCE ADDRESS: Andreja Pucihar, Ph.D., Unversity of Maribor, Faculty of Organizational Sciences, Kidričeva cesta 55a, 4000 Kranj, Slovenia e-mail: andreja.pucihar@fov.uni-mb.si. https://doi.org/10.18690/978-961-286-043-1.1 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Table of Contents CONFERENCE PROCEEDINGS A Systematic Approach to Terahertz-based Glucose Monitoring 7 Sasan Adibi, Lemai Nguyen & Andreas Hamper, Freimut Bodendorf & Nilmini Wickramasinghe Music Recommender Systems Challenges and Opportunities for 21 Non-Superstar Artists Christine Bauer, Marta Kholodylo & Christine Strauss POLO: A Framework for Short-term Studies Abroad to Enhance 33 Critical Thinking Amongst Management Students Riccardo Bonazzi, Micahël Poli & Natalie Sarrasin A Co-Creation Based Model For Engaging Citizen Open Data Use 47 Colin Callinan, Murray Scott, Eoin Whelan & Adegboyega Ojo Digital Coaching to Build Sustainable Wellness Routines for Young 57 Elderly Christer Carlsson & Pirkko Walden The Relation Between Process Management and Innovation – A 71 Comparison of the IT and Manufacturing Industries Thom Cats & Pascal Ravesteyn Content Analysis in Support of Critical Theory Research: 87 How to Deliver an Unwelcome Message Without Being Shot Roger Clarke The Impact of Cloud-Based Digital Transformation on ICT Service 111 Providers’ Strategies Trevor Clohessy, Thomas Acton & Lorraine Morgan Decision Makers and Criteria for Patient Discharge - A Qualitative 127 Study Isabella Eigner, Andreas Hamper, Nilmini Wickramasinghe & Freimut Bodendorf ii 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) Table of Contents Analysing Digital Transformation among Hungarian Organizations 139 Péter Fehér, Zoltán Szabó & Krisztián Varga Using Design Thinking to Identify Banking Digitization 151 Opportunities - Snapshot of the Hungarian Banking System Péter Fehér & Krisztián Varga Use of Facebook and Google Platforms for SMEs Business Model 169 Innovation Rimantas Gatautis, Elena Vitkauskaitė & Mark de Reuver The Impact of Clinical Information Systems on Patient Outcomes 183 and Organisational Performance Peter Haddad, Jonathan Schaffer & Nilmini Wickramasinghe Innovation in Micro, Small and Medium Sized Enterprises: New 197 Product Development, Business Model Innovation and Effectuation Jukka Heikkilä & Marikka Heikkilä The Playful Learning Approach for Learning how to Program: A 215 Structured Lesson Plan Robert Heininger, Victor Seifert, Loina Prifti, Matthias Utesch & Helmut Krcmar Emerging Smart Technologies and the European Standardisation 231 System Kai Jakobs Intruder Alert? How Stock Markets React to Potential IT Security 245 Breaches: The Case of OpenSSL Heartbleed Christian Janze Coworking from the Company’s Perspective - Serendipity-biotope 263 or Getaway-spot? Barbara Josef Wellness Technology Use in Everyday Life: A Diary Study 279 Tuomas Kari, Eeva Kettunen, Panu Moilanen & Lauri Frank 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO iii TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) Table of Contents Activity Trackers Influencing Motivation and Awareness: Study 295 Among Fitness Centre Members Eeva Kettunen, Tuomas Kari, Maria Chasandra, Will Critchley & Umut Doğan CustomerSourcing: Intrinsic Motivators 313 Fred Kitchens & Cameron Crane A First Step Towards Learning Analytics: Implementing an 323 Experimental Learning Analytics Tool Justian Knobbout & Esther van der Stappen Personalizing Narratives to Support Motivation for Physical 335 Activity Olli Korhonen, Michael Oduor & Minna Isomursu Serious Games in Healthcare: Results from a Systematic Mapping 349 Study Tanja Korhonen & Raija Halonen Designing an IoT-enabled Gamification Application for Energy 369 Conservation at the Workplace: Exploring Personal and Contextual Characteristics Dimosthenis Kotsopoulos, Cleopatra Bardaki, Stavros Lounis, Thanasis Papaioannou & Katerina Pramatari Consumer Emotions and E-commerce: A Literature Review 385 Matias Lievonen Age Differences in Technology Readiness and Its Effects on 403 Information System Acceptance and Use: The Case of Online Electricity Services in Finland Markus Makkonen, Lauri Frank & Kerttuli Koivisto Local Online Platforms – Surviving in a Global Market 421 Anton Manfreda, Peter Trkman, Aleš Groznik & Jure Erjavec Conceptualizing Digital Transformation in Business Organizations: 427 A Systematic Review of Literature Resego Morakanyane, Audrey Grace & Philip O’Reilly The Appraisal of Facebook Online Community: An Exposition of 445 Mobile Commerce in Social Media Reviews Sunday Adewale Olaleye, Ismaila Temitayo Sanusi & Jari Salo iv 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) Table of Contents Coupons from Deal Sites as Gifts: Impact of Gender, of Age, and of 461 Personality Traits Antonin Pavlicek & Frantisek Sudzina Combining Digitization with Healthcare Service Processes: 471 Value Co-creation Opportunities Through Standard Work Katja Rantala & Heikki Karjaluoto IT on the Shop Floor - Challenges of the Digitalization of 483 Manufacturing Companies Alexander Richter, Shahper Vodanovich, Melanie Steinhüser & Lea Hannola Airport Operations Modelling: Agent Based Modelling of Ground 501 Crews Blaž Rodič & Alenka Baggia Understanding New Emerging Technologies Through 519 Hermeneutics: An Example from mHealth Zaid Zekiria Sako, Sasan Adibi & Nilmini Wickramasinghe Designing and Implementing Common Market for Cross-Game 531 Purchases between Mobile Games Erkki Siira. Elina Annanperä, Otto Simola, Samuli Heinonen, Jani Yli- Kantola & Jari Järvinen Diabetes Lifestyle (e)Coaching 50 Weeks Follow Up; Technology 545 Acceptance & e-Relationships Luuk P.A. Simons, Hanno Pijl, John Verhoef, Hildo J. Lamb, Ben van Ommen, Bas Gerritsen, Maurice B. Bizino, Marieke Snel, Ralph Feenstra & Catholijn M. Jonker Developing a Mobile Application for Managing Anaphylaxis: 561 Discovering Critical Success Factors Koen Smit, Joris Mens & Matthijs Berkhout Transforming Clinical Practice Guideline Usage Through the Use 577 of a Clinical Decision Support System: An explorative study at the University Medical Centre Utrecht Koen Smit, Pieter Koornneef, Julie Nysingh, Mart van Zwienen, Matthijs Berkhout & Pascal Ravesteyn 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO v TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) Table of Contents Propensity to Click on Suspicious Links: Impact of Gender, of Age, 593 and of Personality Traits Frantisek Sudzina & Antonin Pavlicek Do Online Travel Communities Matter? A Literature Review 603 Dandison C. Ukpabi, Ukamaka D. Onyenucheya & Heikki Karjaluoto Cultural Values Inherent in the Design of Social Media Platforms: 617 A Case Study of WeChat Shahper Vodanovich, Brad McKenna & Wenjie Cai Success Factors for Effective Customer Interaction in Digital Sales: 629 a Case from the Digital Investment Service Industry Rüdiger von Nitzsch, Dirk Braun & Roger W.H. Bons Wearables and Wellness for the Young Elderly - Transforming 637 Everyday Lives? Camilla Walden & Anna Sell Reviewing Organizational Design Components for Digital Business 651 Strategy Timo Weinrich Behaviour Intentions to Use RFID Subcutaneous Microchips: A 669 Cross-sectional Slovenian Perspective Borut Werber, Alenka Baggia & Anja Žnidaršič Customer Context and Social CRM: A Literature Review and 685 Research Agenda Matthias Wittwer, Olaf Reinhold & Rainer Alt ERP Solution Acceptance by Students 703 Simona Sternad Zabukovšek & Samo Bobek Characterization of Business Model Research: Bibliometric 719 Analysis and the Future Agenda Ivan Župič, Marko Budler & Peter Trkman vi 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) Table of Contents DOCTORAL CONSORTIUM Information Management in Supply Chain Partnering: Improving 733 Maintenance Processes in Dutch Housing Associations Debby Goedknegt Personalization in Digital Services: Information Technology 749 Supporting Service Personalization Process Doctoral Consortium – Research Proposal Olli Korhonen 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Ki ttl, P. Ravesteijn, R. Clarke & R. Bons A Systematic Approach to Terahertz-based Glucose Monitoring 2 SASAN ADIBI, LEMAI NGUYEN, ANDREAS HAMPER, FREIMUT BODENDORF & NILMINI WICKRAMASINGHE Abstract This paper focuses on the design and development of a non- invasive smart and pervasive mobile solution to measure blood glucose without the need for drawing blood or pricking fingers. Specifically, it examines the possibility of sensors using Terahertz (THz) technology to measure blood glucose. This paper reports on a research in progress looking at identifying and then designing superior strategies for measuring blood glucose. It presents the central role that measuring blood glucose plays in diabetes care management. It then highlights the current methods and problems and concerns with finger pricking. From there, the paper proffers a non-invasive solution using THz technology to measure blood glucose and outlines the approach to design and develop such a solution using a decision science methodology. Keywords: • health informatics • mHealth • diabetes • blood glucose monitoring • non-invasive • terahertz • CORRESPONDENCE ADDRESS: Sasan Adibi, Deakin University, School of Information Technology, 221 Burwood Highway, Burwood, Victoria 3125, Australia, e-mail: sasan.adibi@deakin.edu.au. Lemai Nguyen, Deakin Business School, Department of Information Systems, Deakin, 221 Burwood Highway, Burwood, Victoria 3125,e-mail: lemai.nguyen@deakin.edu.au. Andreas Hamper, The University of Erlangen-Nuremberg, Schloßplatz 4, 91054 Erlangen, Germany, email: andreas.hamper@fau.de. Freimut Bodendorf, The University of Erlangen-Nuremberg, Schloßplatz 4, 91054 Erlangen, Germany, e-mail: freimut.bodendorf@fau.de. Nilmini Wickramasinghe, Epworth HealthCare & Deakin University, 221 Burwood Highway, Burwood, Victoria 3125, Australia, e-mail: nilmini.work@gmail.com. https://doi.org/10.18690/978-961-286-043-1.2 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 8 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Adibi, L. Nguyen, A. Hamper, F. Bodendorf & N. Wickramasinghe: A Systematic Approach to Terahertz-based Glucose Monitoring Introduction Diabetes is a chronic disease that occurs when there is too much glucose in the blood because the body is not producing insulin or not using insulin properly (Diabetes Australia, 2007). As noted by the WHO (World Health Organization, 2016), diabetes is at epidemic proportions globally and needs to be addressed. Diabetes management involves a combination of both medical and non-medical approaches with the overall goal for the patient to enjoy a life which is as normal as possible (Australian Institute of Health and Welfare, 2007, 2008). As there is no cure for diabetes, diabetes must be regularly managed and monitored. Critical to this management regimen is the systematic monitoring of blood glucose levels. However, achieving this goal can be challenging because it requires effective lifestyle management as well as careful, meticulous attention and monitoring by the patient and health professionals (Britt et al., 2007). There is a need for identifying a simple and convenient non-invasive approach to monitoring blood glucose (So et al., 2012). This forms the focus of this research. Background 2.1 Invasive, Semi-Invasive, and Non-Invasive Solutions A key factor in the management of diabetes has been found to be the patient’s self blood glucose monitoring (SBGM) (Guerci et al., 2003; Haller et al., 2004; Karter et al., 2001). As a result of recent research (Farmer et al., 2009; Malanda et al., 2012), General Practice Management of type 2 diabetes (RACGP and Diabetes Australia, 2014-2015) recommends SMBG for patients with type 2 diabetes who are on insulin. Currently, the dominant method to test blood glucose level is invasive. It requires a blood glucose meter, a lancet device with lancets, and test strips. Further, the patient must prick their finger with the lancet sometimes more than four times a day. Finger pricking in SBGM has been found to have several clinical and psychological disadvantages. These are described below. Clinically, there is a risk of skin infection and tissue damage. Repeated finger pricking associated with the depth and possible vibrations of the needle tip while penetrating the skin were found to cause soreness (Burge, 2001) and damage the skin and in severe cases could lead to ulcer on their patient fingers (Dahiya et al., 2012; Giannini & Mayr, 2004). Therefore, this SBGM practice can result in damage to the patient body site. Further, SBGM using a finger prick glucometer is not practical for continuous monitoring of blood glucose (So et al., 2012). As blood glucose levels of a patient change overtime, possible occurrences of hyperglycaemia or hypoglycaemia between measurements may not be recorded. Thus, the measurements may not truly reflect the patient blood glucose pattern (Kannampilly, 2013). 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 9 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Adibi, L. Nguyen, A. Hamper, F. Bodendorf & N. Wickramasinghe: A Systematic Approach to Terahertz-based Glucose Monitoring Psychologically, inconvenience and anxiety of constant performing finger pricking and extracting a drop of blood in patients’ daily lives, and associated physical and emotional pain have always been troublesome in SBGM (Burge, 2001; Karges et al., 2008; Pacaud et al., 1999; Wainstein et al., 2013). In a cross-sectional questionnaire survey with 315 patients with diabetes in the UK, about one third of general diabetes patients were found to have anxiety to finger pricking for SBGM (Shlomowitz & Feher, 2014). Positive correlations were found between anxiety due to finger pricking and avoidance of testing as well as between anxiety due to finger pricking and general anxiety. In previous studies (Burge, 2001; Cradock & Hawthorn, 2002; Koschinsky, 2007), pain and discomfort were consistently found to cause a natural resistance to SBGM, and subsequently result in a lack of adherence to this procedure. Anxiety due to the finger prick method and avoidance of testing were found across different ethnic groups and female patients were found to have greater anxiety to finger pricking SBGM (Shlomowitz & Feher, 2014). The aforementioned disadvantages served to motivate the need for new approaches to SBGM. They can be categorised into two groups. The first group is to support for measuring blood glucose levels in a less painful manner. Wainstein et al. (2013) used a CoolSense device to reduce local pain sensation due to finger pricking. They conducted an experiment with 177 adult patients with type 2 diabetes and concluded that the CoolSense device significantly reduced subjective pain felt by the patients while maintaining the same level of clinical accuracy. Other studies suggest that instead of pricking fingers, patients can prick other areas such as the forearm, knee, earlobe, thigh and abdomen skin (Castilla-Peón et al., 2015; Heinemann, 2008; Nakayama et al., 2008). While pricking alternative body sites were commonly found to reduce pricking fingers to some extent, it did not eliminate the pain completely. Disadvantages of pricking other body sites include lack of accuracy, inconvenience and difficulty of pricking in public, and technology switching costs to purchase new equipment for pricking and measurement (Castilla-Peón et al., 2015; Cradock & Hawthorn, 2002; Heinemann, 2008). The second group of approaches to SBGM is to developing semi-invasive and non- invasive technologies for blood measuring without needle pricks (Makaram et al., 2014; So et al., 2012). Du et al. (2016) propose a biosensor that can detect low-level glucose in saliva. They conducted a study of ten healthy human subjects and conducted that the proposed biosensor can be seen as a potential alterative to SBGM using finger pricking. The protocol of use is still rather complex, consisting of nine steps requiring the patient to chew a sponge in his/her mouth to collect saliva, and later squeeze the collected saliva into the device with a sensor, thus is not easy to use. More studies are required to investigate the accuracy of sensors in detecting low salivary glucose levels, efficiency and practicality of the proposed approach. Zhang et al. (2011) review current developments of non-invasive continuous SBGM methods using ocular glucose. These authors review studies in ocular glucose monitoring: (1) using contact lens-based sensors and (2) using nanostructured lens-based sensors. They concluded that lens sensors have the potential to monitor a wide range of glucose levels quickly and accurately, however there is a safety concern because boronic acid and concanavalin A may be released from 10 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Adibi, L. Nguyen, A. Hamper, F. Bodendorf & N. Wickramasinghe: A Systematic Approach to Terahertz-based Glucose Monitoring the lens into the patient body. Nanostructured lens-based sensors have several advantages (for example better accuracy and sensitivity, less interference with patient vision), further studies are required to improve resolution and sensitivity of the lens, and to determine physiologically relevance and baseline tear glucose concentration (Zhang et al., 2011). Another review of current nanomaterial-based solutions using saliva, sweat, breath and tears as a medium for SBGM suggests that they are far from optimal; further nanotechnology sensing devices need to be manufactured at a low cost to compete with established blood glucose meters (Makaram et al., 2014). One of the most recent advances in the area of semi-invasive glucose monitoring is Abbott’s Freestyle Libre System (HT Correspondent, 2015) which is based on a body attached sensor and a smartphone loaded with the application (Figure 1, adapted from HT Correspondence, 2015). This disposable body attached device (sensor) is equipped with a thin and flexible fibre needle, which is the only invasive part, however the fibre is inserted only once and under the skin of the back of the arm. The sensor can be used continually for 14 days without the need to be replaced. The sensor captures glucose concentration information and once the smartphone that runs the required app scans the sensor, the current and up to 8 hours of glucose levels are read and uploaded to the smartphone (Timothy et al., 2015) Figure 1: Freestyle Libre System, (adapted from Hindustan Times, HT Correspondent (2015) According to Timothy et al. (2015), the accuracy of the FreeStyle Libre system as dependent function of a number of patient-related factors (e.g., diabetes type, gender, insertion site/administration, body mass index, hemoglobin A1c “HbA1c”, age, and rate of change) has been found to be above 85.2% up to 14 days of testing. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 11 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Adibi, L. Nguyen, A. Hamper, F. Bodendorf & N. Wickramasinghe: A Systematic Approach to Terahertz-based Glucose Monitoring Overall, studies in issues associated with SBGM using finger pricking devices and learnings from in current developments of new SBGM methods suggest the following key factors: technology (technical soundness, sensitivity of device, and sufficient quantity and reproduction of medium), clinical accuracy (accuracy of measures, continuity of monitoring), clinical and safety interference with vision patient vision (infection, damage to patient body sites, release of chemicals to patient body, interference with patient vision), ease of use (level of invasiveness, practicality of sample collection and protocols of use), psychological effects (pain and discomfort, anxiety, fear, inconvenience and difficulty of performing tests in public), and costs (manufacturing costs and patient technology switching costs). We develop Table 1 to present the key aspects of problems and concerns identified in the extant literature relating to SBGM. We conceptualise the problem in diabetes care management with the above factors. Therefore, we propose an approach to solution development consisting of patients analytics to focus on the targeted patient cohort, design science engaging patients in testing when it's safe, not early design, to finally propose a new solution to address their concerns and ensuring appropriate monitoring of the care management plan. 12 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Adibi, L. Nguyen, A. Hamper, F. Bodendorf & N. Wickramasinghe: A Systematic Approach to Terahertz-based Glucose Monitoring Table 1: Problems and concerns in current SBGM methods Key aspects Factors Technical Sufficient quantity and reproduction of medium (Makaram et al., feasibility 2014). Sensitivity of device (Zhang et al., 2011) Technical soundness (Makaram et al., 2014; So et al., 2012) Clinical Accuracy of result (Castilla-Peón et al., 2015; Nakayama et al., accuracy 2008; Timothy et al., 2015) Continuity of monitoring (Kannampilly, 2013; So et al., 2012) Side effects and Infection (Dahiya et al., 2012; Giannini & Mayr, 2004) safety Physical damage to the body site (Burge, 2001; Dahiya et al., 2012; Giannini & Mayr, 2004) Release of chemical to body (Zhang et al., 2011) Interference with vision (Zhang et al., 2011) Easy of use Level of invasiveness (Castilla-Peón et al., 2015; Heinemann, 2008; So et al., 2012; Wainstein et al., 2013). Practicality of device, sample collection and protocols of use (Du et al., 2016; Heinemann, 2008) Psychological Pain and discomfort (Burge, 2001; Heinemann, 2008; Karges et effects al., 2008; Koschinsky, 2007; Pacaud et al., 1999; Wainstein et al., 2013) Anxiety and distress (Cradock & Hawthorn, 2002; Shlomowitz & Feher, 2014) Fear of needles and blood (Burge, 2001; Shlomowitz & Feher, 2014) Inconvenience and difficulty of performing tests in public (Castilla-Peón et al., 2015; Heinemann, 2008) Costs Manufacturing costs (Makaram et al., 2014) Patient technology switching costs (Heinemann, 2008) 2.2 Non-Invasive Terahertz Technology Solution The ultimate approach in managing diabetes is based on non-invasive solutions, one approach is using Terahertz technology which is the focus of this section. Terahertz refers to the electromagnetic waves with the frequency range between millimetre-wave and infrared, approximately from 100 GHz up to 10 THz (see Figure 2 adapted from Adibi, 2013). The THz spectrum, also known as the “terahertz gap” is the last portion of the electromagnetic spectrum which has not been fully explored and exploited (Tonouchi, 2007). Terahertz technology is a fast-growing field with applications in biology and medicine, medical imaging, material spectroscopy and sensing, security, monitoring and spectroscopy in pharmaceutical industry, and high-data-rate communications. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 13 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Adibi, L. Nguyen, A. Hamper, F. Bodendorf & N. Wickramasinghe: A Systematic Approach to Terahertz-based Glucose Monitoring In biomedicine, Terahertz technology has so far been used in variety of medical applications, including: skin/breast cancer detection, wound inspection, and dental imaging (Panwar et al., 2013; Yang et al., 2016). Figure 2: Frequency Spectrum of EMR Imaging Technologies, adapted from Adibi (2013) The THz studies have uniquely revealed that medical image diagnoses are possible over wide range of tissues, however much further detailed analyses are required to identify the degree of precision achieved in monitoring blood glucose concentration using THz technology. Proposed solution The technology methods behind the operation of this solution’s proof of concept are based on the following approaches (Jackson et al., 2011): - Terahertz time-domain spectroscopy (THz-TDS) - Terahertz frequency-domain spectroscopy (THz-FDS) - Terahertz imaging using non-destructive evaluation (NDE) These methods are considered to pinpoint the best option for blood-glucose level monitoring from the transmitter/receiver perspectives. The THz transmitter, the operational power, energy consumption level, and safety factors are of significant importance since the solution is ultimately deployed in a smartphone application. From the mentioned approaches, the THz-TDS approach has shown promising behaviour since it was used to measure the full dielectric-based function representing as the absorption coefficient and the refraction index of glucose and galactose between 0.2 THz to 3.0 THz (Zhang, 2008). A few distinct absorption features are identified as the signatures of intra- and intermolecular modes of the hydrogen bonded crystalline structure. 14 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Adibi, L. Nguyen, A. Hamper, F. Bodendorf & N. Wickramasinghe: A Systematic Approach to Terahertz-based Glucose Monitoring The design of the related app that runs on the smartphone platform requires a number of features, including: a fast Digital Signal Processing (DSP) system based on the microcontroller system used in the Arduino platform. The hardware side of the system consists of an open-source 32-bit Atmel ARM processor, which is capable of running fast concurrent processes. The software system features a fast and optimised image processing algorithm aided with Kalman filtering for higher accuracy. The high accuracy results are needed due to highly variable testing environment (handheld application). The system also features remote monitoring and cloud-computing capability. The proof-of- concept involves the identification of the optimal THz sensor, power, frequency spectrum, and reflection analysis for the most optimal application of the Terahertz technology in monitoring under-skin blood glucose levels. The framework is the continuation of the work of reference (Shen et al., 2002), which is based on the Fourier Transform Infrared (FTIR) Spectroscopy. This reference shows the successful deployment of infrared in detecting glucose level of the blood. The lessons learned from this work can directly be used in this project. Once the specific THz approach is selected, the methodological approach is to model the existing solutions and study the physical behaviour of Terahertz technology when radiated onto the human skin and study the depth of penetration and the variations in the reflections. This requires sophisticated THz lab equipment to run experiments on a test dummy, which mimics the human skin and underlying soft tissues. The results between the traditional needle-based sensing are then compared and the precision figures for the Terahertz-based method are evaluated. Then the approach need to be fine-tuned and also other health issues (e.g., technology implications, training, health-hazards, etc.) are then considered. Proposed solution A Design Science Research Methodology (DSRM) will be used to operationalize this research. This approach is particularly appropriate where improving an existing solution is desired and/or there is a need for a new solution to address specific unsolved or unique aspects (Hevner & Chatterjee, 2010; Hevner et al., 2004). DSRM as a process model to carry out research is widely used in the information systems research to create new solutions or to improve existing ones. DSRM process model consists of six process elements (Peffers et al., 2007), starting from identifying the problem and the motivation to conduct research, and concluding with communicating the results and outcomes of the research. Table 2 maps the proposed project to DSRM process elements (Peffers et al., 2007). 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 15 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Adibi, L. Nguyen, A. Hamper, F. Bodendorf & N. Wickramasinghe: A Systematic Approach to Terahertz-based Glucose Monitoring Table 2: Mapping the proposed research to DSRM DSRM process DSRM description Application on this study elements Problem Defining the specific With the increased diabetes identification research problem and population, and the disadvantages of and motivation justifying the value of a conventional blood glucose tests, the solution based on lack of a reliable and easy to use non- knowledge of the state of invasive technology to monitor blood the problem. glucose motivates this research. Definition of The objectives can be The objective is to create and refine objectives of qualitative or quantitative an artefact; i.e. the sensors. the solution i.e. create or improve an artefact respectively based on knowledge of the state of the problem and current solutions, if any, and their efficacy. Design and Creating the artefact, Through several iterations the exact development including the desired range for the frequency for the needed functionality and its Terahertz wave beam will be architecture based of identified. Once the narrow range for knowledge of theory that the frequency for the Terahertz wave can be used to bear in a is identified, the CAD/CAM solution. This is usually programming will occur. an iterative process. Demonstration Demonstrate the use of Simulation-based: This will be done the artefact to solve the in a lab using their simulation set up problem. and mannequins. Clinical: Demonstration of the use of a new device to a sample of targeted patient population. Evaluation Iterate back to better Simulation-based: As needed, design the artefact if iterations will take place, to fine tune needed. the needed range for the Terahertz wave projections. Clinical: Iterative evaluations to ensure that the prototype is truly tailored to meet clinical requirements for the targeted population. Communication Publish and let the value This will include conference of the solution talk about publications, journal publications and itself. other presentation activities. 16 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Adibi, L. Nguyen, A. Hamper, F. Bodendorf & N. Wickramasinghe: A Systematic Approach to Terahertz-based Glucose Monitoring Results and Next Steps Based on our systematic review of the literature to date, we have identified problems and concerns with the current methods for blood glucose monitoring as well as the need for a simple, accurate non-invasive solution to it. To address this void we have proffered a technology solution using sensor technology combined with a smart phone. The next steps now include the design and development of the solutions coupled with establishment of proof of concept, usability and fidelity. This involves four key steps as follows: Phase1: This phase will involve the conducting of multi-dimensional analysis of provided data sets from a diabetic population (in China). The results will provide a clear picture of the current state, reveal critical trends and important patterns regarding this population and assist to identify the patient sample. It is anticipated that target patient cohorts and their demographics as well as geographic and clinical characteristics will be identified for the project to identify who would benefit most from the non-invasive smart solutions. This phase aims to address the first DSRM process elements including problem identification and motivation, and definition of objectives of the solution (see Table 2). Phase 2: Phase 2 will include designing and developing the appropriate sensor technology. The patented solution we have developed uses THz to identify blood sugar readings but this requires critical analysis to isolate the specific THz band. Inputs for this are derived from aspects of the data analytics performed in phase 1 above. Once this is done the required specifications for designing the sensors must be generated. Thus the results at the end of this phase include the design specification for the sensors to be used in the specific context so they are truly tailored to that context. This phase aims to address the subsequent DSRM process elements including design and development, simulation- based demonstration, and associated simulation-based evaluation. Phase 3: Phase 3 will focus on the design and development of the software solution necessary to develop the prototype to be used to measure blood glucose readings. Contemporaneously, the health literacy issues will be examined and an appropriate education and coaching program will be developed for the targeted population. This phase aims to continue the DSRM process element design and development. Phase 4: Phase 4 involves establishment of proof of concept, usability, fidelity and functionality. This will be conducted by running a field study on the selected patient population of 50 patients based on results from phase 1. It is anticipated that the filed study will involve and iterative process to ensure that the prototype is truly tailored to the selected population’s needs and requirements. In addition, HbA1C the standard diabetes marker will be tested at 3 month intervals over a 6 month time frame to assess success of the solution and changes to health literacy at these points will also be assessed. This phase aims to address the DSRM process elements including clinical demonstration, and clinical evaluation using the key aspects (technical feasibility, clinical accuracy, clinical 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 17 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Adibi, L. Nguyen, A. Hamper, F. Bodendorf & N. Wickramasinghe: A Systematic Approach to Terahertz-based Glucose Monitoring side effects and safety, ease of use, psychological effects, and costs) and relevant factors presented in Table 1. As a result, the list of factors will be refined to inform future implementations and evaluations. The DSRM process element communication will take place through the whole project when findings from each phase become available. Discussion and Conclusion Concurrent and independent from the exponential rise of diabetes has been the rise of mobile and sensor technology. The maturing and sophistication of these technologies has enabled them to be sued in many aspects of healthcare and wellness management. The preceding has served to outline another potential area for the adoption of mobile and sensors; namely, to assist with a non-invasive approach for the monitoring and management of diabetes. Specifically, we have identified an opportunity to use Terahertz frequencies to detect blood glucose levels in individuals. Further, we envisage designing and developing this solution by combining sensors with a mobile phone so that detection of blood glucose can not only be non-invasive but truly pervasive. The implications for theory and practice are wide and far reaching. From a theoretical perspective we combine two technology genres mobile and sensors to address a healthcare issue – detection of blood glucose levels using a design science research methodology. This can lead to a better understanding and application of sensor technology in mobile technology. Scientifically backed roadmaps for including innovative sensors (i.e. terahertz sensors) in mobile technology can support further DSRM based research in the field. From the perspective of practice, diabetes as noted by World Health Organization (2016) is global and at epidemic proportions with an estimated of 422 million adults living with diabetes in 2014, and 1.5 million deaths caused by diabetes in 2012. Complications from diabetes can lead to other serious conditions such as heart attack, stroke, blindness, kidney failure and lower limb amputation. Further, the number of pre-diabetic individuals is also considerable. Monitoring and management is the only recognised strategy to maintaining appropriate blood glucose levels and thereby managing diabetes and/or preventing a pre-diabetic becoming a diabetic. Given, the problems and criticisms of finger pricking and other invasive approaches to SBGM, the most prevalent approach to testing blood glucose using a non-invasive Terahertz technology solution which we propose is very attractive to individuals. By learning from glucose monitoring, there is an opportunity to transfer the use of Terahertz technology to test other blood values in a non-invasive way. When such a solution is truly pervasive, it becomes even more attractive. Thus, we believe that the proffered solution will enable diabetic and pre-diabetic individuals to enjoy a better quality approach to monitoring and managing their blood glucose levels. Our future work will focus on establishing usability, fidelity and acceptability of the proffered non-invasive pervasive solution 18 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Adibi, L. Nguyen, A. Hamper, F. Bodendorf & N. Wickramasinghe: A Systematic Approach to Terahertz-based Glucose Monitoring References Adibi, S. (2013). Mobile Health (mHealth) Biomedical Imaging Paradigm. Paper presented at the The 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC’13), Osaka, Japan. Australian Institute of Health and Welfare. (2007). National Indicators for Monitoring Diabetes: Report of the Diabetes Indicators Review Subcommittee of the National Diabetes Data Working Diabetes series no. 6. Cat. no. CVD 38. Canberra: AIHW. Canberra: Australian Institute of Health and Welfare. Australian Institute of Health and Welfare. (2008). Diabetes: Australian Facts Canberra: Australian Institute of Health and Welfare. Britt, H., Miller, G. C., Charles, J., Pan, Y., Valenti, L., Henderson, J., Bayram, C., O'Halloran, J., & Knox, S. (2007). General Practice Activity in Australia 2005-06. Cat. no. GEP 16: Australian Institute of Health and Welfare. Burge, M. R. (2001). Lack of Compliance With Home Blood Glucose Monitoring Predicts Hospitalization in Diabetes. Diabetes Care, 24(8), 1502-1503. Castilla-Peón, M. F., Ponce-de-León-Rosales, S., & Calzada-León, R. (2015). Knee skin pricking to monitor capillary blood glucose is less painful than finger pricking in children with type 1 diabetes. International Journal of Diabetes in Developing Countries, 35(4), 620-623. doi: 10.1007/s13410-015-0342-z Cradock, S., & Hawthorn, J. (2002). Pain, distress and blood glucose monitoring. Journal of Diabetes Nursing, 6(6), 188-191 184p. Dahiya, S., Voisine, M., & Samat, A. (2012). Gangrene from finger pricking. Endocrine, 42(3), 767-767. doi: 10.1007/s12020-012-9787-8 Du, Y., Zhang, W., & Wang, M. L. (2016). Sensing of Salivary Glucose Using Nano-Structured Biosensors. Biosensors, 6(10). Farmer, A. J., Wade, A. N., French, D. P., Simon, J., Yudkin, P., Gray, A., Craven, A., Goyder, L., Holman, R. R., Mant, D., Kinmonth, A. L., & Neil, H. A. (2009). Blood glucose self-monitoring in type 2 diabetes: a randomised controlled trial. Health Technology Assessment, 13(5), pp: iii- iv, ix-xi, 1-50. . doi: doi: 10.3310/hta13150. Giannini, O., & Mayr, M. (2004). Finger pricking. The Lancet, 364(9438), 980. doi: http://dx.doi.org/10.1016/S0140-6736(04)17022-0 Guerci, B., Drouin, P., Grangé, V., Bougnères, P., Fontaine, P., Kerlan, V., Passa, P., Thivolet, C., Vialettes, B., & Charbonnel, B. (2003). Self-monitoring of blood glucose significantly improves metabolic control in patients with type 2 diabetes mellitus: the Auto-Surveillance Intervention Active (ASIA) study. Diabetes & Metabolism, 29(6), pp. 587 - 594. Haller, M. J., Stalvey, M. S., & Silverstein, J. H. (2004). Predictors of control of diabetes: monitoring may be the key. The Journal of Pediatrics, 144(5), 660-661. doi: http://dx.doi.org/10.1016/j.jpeds.2003.12.042 Heinemann, L. (2008). Finger Pricking and Pain: A Never Ending Story. Journal of Diabetes Science and Technology, 2(5), pp. 919-921. Hevner, A., & Chatterjee, S. (2010). Design Research in Information Systems: Theory and Practice (1st ed.): Springer. Hevner, A., March, S., Park, J., & Ram, S. (2004). Design Science in Information Systems Research. MIS Quarterly, 28(1), pp. 75-105. HT Correspondent. (2015, 02 April 2015). Now, keep a check on your diabetes without a prick. Hindustan Times. Retrieved from URL: http://www.hindustantimes.com/mumbai/now-keep- a-check-on-your-diabetes-without-a-prick/story-sB15fHUDHc0FzsmsTqczFP.html 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 19 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Adibi, L. Nguyen, A. Hamper, F. Bodendorf & N. Wickramasinghe: A Systematic Approach to Terahertz-based Glucose Monitoring Jackson, J. B., Bowen, J., Walker, G., Labaune, J., Mourou, G., Menu, M., & Fukunaga, K. (2011). A Survey of Terahertz Applications in Cultural Heritage Conservation Science. IEEE Transactions on terahertz science and technology, 1(1). Kannampilly, J. J. (2013). Continuous Glucose Monitoring System. In D. A. Muruganathan (Ed.), Medicine Update 2013 - Contents (Vol. 23, ch. 43). Mumbai: The Association of Physicians of India (API). Karges, B., Muche, R., Moritz, M., Riegger, I., Debatin, K. M., Heinze, E., Wabitsch, M., & Karges, W. (2008). Low discomfort and pain associated with intensified insulin therapy in children and adolescents. Diabetes Research and Clinical Practice, 80(1), pp. 96-101. Karter, A. J., Ackerson, L. M., Darbinian, J. A., D’Agostino, R. B., Jr., Ferrara, A., Liu, J., & Selby, J. V. (2001). Self-monitoring of blood glucose levels and glycemic control: the Northern California Kaiser Permanente Diabetes registry. The American Journal of Medicine, 111(1), 1- 9. doi: 10.1016/S0002-9343(01)00742-2 Koschinsky, T. (2007). Blood glucose self-monitoring report 2006 reveals deficits in knowledge and action. Diabetes Stoffwechsel Herz., 16, pp. 185-192. . Makaram, P., Owens, D., & Aceros, J. (2014). Trends in Nanomaterial-Based Non-Invasive Diabetes Sensing Technologies. Diagnostics, 4(2), pp. 27-46. doi: doi:10.3390/diagnostics4020027 Malanda, U. L., Welschen, L. M., Riphagen, I. I., Dekker, J. M., Nijpels, G., & Bot, S. D. (2012). SMBG in patients with type 2 diabetes mellitus who are not using insulin. Cochrane Database of Systematic Reviews, 18(1), CD005060. doi: doi: 10.1002/14651858.CD005060.pub3. Nakayama, T., Kudo, H., Sakamoto, S., Tanaka, A., & Mano, Y. (2008). Painless Self-Monitoring of Blood Glucose at Finger Sites. Experimental and Clinical Endocrinology & Diabetes, 116(4), pp. 193-197. Pacaud, D., J.F., L., Buithieu, M., & Yale, J. F. (1999). Blood volumes and pain following capillary punctures in children and adolescents with diabetes. Diabetes Care, 22(9), pp. 1592-1594. Panwar, A. K., Singh, A., Kumar, A., & Kim, H. (2013). Terahertz Imaging System for Biomedical Applications: Current Status. International Journal of Engineering & Technology, 13(2), pp. 33-39. Peffers, K., Tuunanen, T., Rothenberger, M., & Chatterjee, S. (2007). A Design Science Research Methodology for Information Systems Research. J. Manage. Inf. Syst., 24(3), 45-77. doi: 10.2753/mis0742-1222240302 RACGP and Diabetes Australia. (2014-2015). General practice management of type 2 diabetes: The Royal Australian College of General Practitioners. Shen, Y. C., Davies, A. G., Linfield, E. H., Taday, P. F., Arnone, D. D., & Elsey, T. S. (2002). Determination of Glucose Concentration in Whole Blood using FTIR Spectroscopy. Paper presented at the THz-bridge Conference, Capri, Italy. Shlomowitz, A., & Feher, M. D. (2014). Anxiety associated with self monitoring of capillary blood glucose. British Journal of Diabetes and Vascular Disease, 14(2), pp: 60-63. So, C.-F., Choi, K.-S., Wong, T. K. S., & Chung, J. W. Y. (2012). Recent advances in noninvasive glucose monitoring. Medical Devices (Auckland, N.Z.), 5, 45-52. doi: 10.2147/MDER.S28134 Timothy, B., Bode, B. W., Christiansen, M. P., Klaff, L. J., & Alva, S. (2015). Diabetes Technology & Therapeutics. 17(11), pp. 787-794. doi: DOI:10.1089/dia.2014.0378 Tonouchi, M. (2007). Cutting-edge terahertz technology. Nature Photonics, 1(2), pp. 97–105. Wainstein, J., Chimin, G., Landau, Z., Boaz, M., Jakubowicz, D., Goddard, G., & Bar-Dayan, Y. (2013). The Use of a CoolSense Device to Lower Pain Sensation During Finger Pricking While Measuring Blood Glucose in Diabetes Patients—A Randomized Placebo. Diabetes Technology & Therapeutics, 15(8), pp. 688-694. 20 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Adibi, L. Nguyen, A. Hamper, F. Bodendorf & N. Wickramasinghe: A Systematic Approach to Terahertz-based Glucose Monitoring World Health Organization. (2016). Global report on diabetes WHO Library Cataloguing-in- Publication Data: © World Health Organization 2016. Yang, X., Zhao, X., Yang, K., Liu, Y., Liu, Y., Fu, W., & Luo, Y. (2016). Biomedical Applications of Terahertz Spectroscopy and Imaging. Trends in Biotechnology. doi: 10.1016/j.tibtech.2016.04.008 Zhang, J., Hodge, W., Hutnick, C., & Wang, X. (2011). Noninvasive diagnostic devices for diabetes through measuring tear glucose. Journal of Diabetes Science and Technology, 5(1), pp. 166- 172. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Music Recommender Systems Challenges and Opportunities for Non-Superstar Artists 3 CHRISTINE BAUER, MARTA KHOLODYLO & CHRISTINE STRAUSS Abstract Music Recommender Systems (MRS) are important drivers in music industry and are widely adopted by music platforms. Other than most MRS research exploring MRS from a technical or from a consumers’ perspective, this work focuses on the impact, value generation, challenges and opportunities for those, who contribute the core value, i.e. the artists. We outline the non-superstar artist’s perspective on MRS, and explore the question if and how non-superstar artists may benefit from MRS to foster their professional advancement. Thereby, we explain several techniques how MRS generate recommendations and discuss their impact on non- superstar artists. Keywords: • Music Recommender Systems • Non-superstar artists • Popularity bias • Online Business • CORRESPONDENCE ADDRESS: Christine Bauer, Johannes Kepler University Linz, Altenbergerstraße 69, 4040 Linz, Austria, e-mail: christine.bauer@jku.at. Marta Kholodylo, University of Vienna, Universitätsring 1, 1010 Wien, Austria, e-mail: a1048685@unet.univie.ac.at. Christine Strauss, University of Vienna, Universitätsring 1, 1010 Wien, Austria, e-mail: christine.strauss@univie.ac.at. https://doi.org/10.18690/978-961-286-043-1.3 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 22 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Bauer, M. Kholodylo & C. Strauss: Music Recommender Systems Challenges and Opportunities for Non-Superstar Artists 1 Introduction In the era of digitalisation, music has become easier to create, distribute, and access than ever. Music recommender systems (MRS) are meant to assist listeners in navigating through the myriad of available musical works and provide them with suggestions that would fit their preferences and needs. This paper aims to present the most common techniques in music recommendation and how these affect the positions of non-superstar artists. While previous research on MRS typically takes a technical perspective or focusses on the consumers, the artists’ perspective has yet largely been neglected. “The phenomenon of Superstars, wherein relatively small numbers of people earn enormous amounts of money and dominate the activities in which they engage, seems to be increasingly important in the modern world” (Rosen, 2004, p. 215). Still, the impact of MRS on non-superstar artists is particularly important as (i) the vast majority of artists are non-superstar artists (Anderson, 2004; Mulligan, 2013), (ii) the economic situation of non-superstar artists is usually precarious (Bauer & Strauss, 2015), and (iii) the technological and managerial skills required to manage and promote one’s own business as an artist are usually not part of the typical educational paths of aspiring artists (Bauer, 2012; Bauer, Viola, & Strauss, 2011). The importance of non-superstar artists is further underpinned by the “long tail” concept introduced by Anderson (2004, 2006), a model that is specifically applicable to the music industry. This model describes the economic tendency, when there is a concentration of sales on the most popular items (“hits”), which form the head, and then a long tail of less popular items that may fulfil niche demands of potential customers. This model is considered the opposite of the “hit model” (or “short tail”) in industries where an item either becomes a “hit” or does not make any profit at all. The implication is that it is more profitable to sell small amounts of the long tail of less popular items than large amounts of a small number of hits. Later, empirical findings (e.g., Brynjolfsson, Hu, & Simester, 2007) confirm this idea, provided there are effective search and recommender systems available that enable users to access these long-tail items easily. At the same time, MRS is an enabler to introduce niche items to a consumer who usually follows hits only in such a sophisticated (preference-matching) manner, so that this hit-affine user may start consuming long-tail products (Goel et al., 2010). As a result, the employment of recommender systems in the long-tailed online music market enables users to discover and access the work of non-superstar artists. The paper is structured as follows: Section 2 provides a structured overview MRS and their functionality. In Section 3 we explore the influence of MRS on non-superstar artists by explaining the phenomenon of popularity bias, the cold start problem, and superstar economy. Section 4 provides details and results of a semi-structured interview with an artist, followed by the last section containing concluding remarks. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 23 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Bauer, M. Kholodylo & C. Strauss: Music Recommender Systems Challenges and Opportunities for Non-Superstar Artists Music Recommender Systems This section provides an overview of the structure of MRS, its components and functionality, and the most common techniques used. Typically, recommender systems consist of three key components: users, items, and user- item-matching processes. This general structure also applies for MRS, where users are the listeners and items are the music items (music works). The system collects relevant data about its users and applies mathematical models and diverse techniques to find and propose items, which might be of interest for the listener. To recommend items that most likely fit the listeners preferences the system needs to manage data about listeners and music items, the system generates profiles for each of them and determines “good” matches by comparing these profiles (Song, Dixon, & Pearce, 2012). In the following, we discuss in detail the data and approaches associated with the three key components, i.e., user, item and matching. 7.1 User Data In order to be able to make valid recommendations, an MRS requires data about its users’ needs. However, getting such exact data is a costly process (Turnbull, Barrington, & Lanckriet, 2008). Thus, MRS rely on user modeling. The system analyses its users’ data and generates profiles based on their differences to model music preferences and thus determine which music items might be of interest for the individuals. Typically, the user modeling process consists of two sub-processes: (i) user profile modeling and (ii) user experience modeling. User profile modeling is generally used to determine the “position” of the listener in comparison to others based on their features. One of the approaches suggests dividing user profiles based on three major categories: demographic, geographic, and psychographic (Celma, 2008). Further, a number of attributes can be assigned to each category, such as age, gender, country, interests, etc. (Song, Dixon, & Pearce, 2012). Whereas, user experience modeling is meant to approach the users with consideration of their music expertise level, which further can be used to determine some of their expectations towards the MRS (Jennings, 2007; Song, Dixon, & Pearce, 2012; Uitdenbogerd & Van Shyndel, 2002). Combining both approaches, it is possible to predict some of the users’ demands and desires regarding music; for instance, it is possible to predict a user’s preferred ratio of new, previously unknown vs. popular, already known music items she would like to listen to when engaging with a music platform (Anderson, 2006). Some data can be obtained through observing listeners in their actions on the music platform, such as listening patterns (Shao et al., 2009; Song, Dixon, & Pearce, 2012), other data may be retrieved through input inquiries, e.g., surveys to retrieve profile information (Song, Dixon, & Pearce, 2012). 24 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Bauer, M. Kholodylo & C. Strauss: Music Recommender Systems Challenges and Opportunities for Non-Superstar Artists 7.2 Music Item Data Item profiles are based on the metadata of music works. Such item metadata typically differentiates three types: editorial, cultural, and acoustic (Pachet, 2011; Song, Dixon, & Pearce, 2012). Editorial metadata is the type of data provided by music editors, such as name of the artists, name of the composer, title of the musical work (‘track title’), music genre, etc. Such editorial metadata is usually provided by those who submit the music item to the system. Cultural metadata is the result of analysis of data connected to the music item over the Internet. It discovers the associations, emerging patterns, similarities to other musical works based on the data from public sources. Acoustic metadata describes the musical work itself, including its qualities, such as beat, instruments involved, tempo, pitch, mood, etc. It does not require any other data than those related to the musical work itself (Song, Dixon, & Pearce, 2012). 7.3 User-Item Matching Music recommendations rely on mechanisms, matching users and music items. To provide understanding of such matching mechanisms, we present an overview of the most popular techniques employed. Metadata retrieval methods are used to retrieve music items that match input from the user, such as artist’s name, title of a musical work, etc. This technique implies that the users already know data about the musical work they would like to listen to (Song, Dixon, & Pearce, 2012). Collaborative filtering (CF) offers listeners new music (in the sense of “previously unknown to the listener”) based on the listeners’ past evaluations (Uitdenbogerd & Van Shyndel, 2002). There are three approaches: (i) CF determines the “nearest neighbour” user group that share similar tastes. The MRS then suggests items that are typical for this group (memory-based CF); or (ii) the MRS applies a mathematical procedure to suggest – based on the user’s previous ratings to music items – new music items, previously unknown to the respective user (model-based CF) (Adomavicius & Tuzhilin, 2005); or (iii) the MRS combines both approaches to a so-called “hybrid CF” (Song, Dixon, & Pearce, 2012; Wang, de Vries, & Reinders, 2006). Content-based filtering uses characteristics of a musical work (in the machine learning domain also referred to as “features”) to determine similarities between items and derives predictions thereupon (Aucouturier & Pachet, 2002; Li et al., 2004). This way an MRS suggests music items to a user that are similar to those he or she has already listened to (Song, Dixon, & Pearce, 2012; Uitdenbogerd & Van Shyndel, 2002). Since the analysis is based on the qualities of music itself, content-based filtering does not require human input to operate. Demographic filtering techniques create music suggestions based on a user’s personal data (e.g., gender, age). Such filtering techniques divide users into groups based on their 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 25 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Bauer, M. Kholodylo & C. Strauss: Music Recommender Systems Challenges and Opportunities for Non-Superstar Artists personal data and provide music items that match a “typical” user of the respective group (Celma, 2008). This technique usually supplements other filtering techniques such as collaborative or content filtering (Song, Dixon, & Pearce, 2012; Uitdenbogerd & Van Shyndel, 2002). Context-based modeling uses context (e.g., cultural metadata) of music items to come up with suggestions for its MRS’ users. This technique uses open data available on the Internet, such as music reviews, comments, ratings, friends’ lists, etc. (Lamere, 2004). Note, while the terms “context” and “cultural data” are established within a specific meaning in the MRS community (e.g., Schedl, 2013), these terms may be misleading as related communities use these terms with distinct meanings (e.g., for “context" in the context-aware computing community see Bauer & Novotny, 2017, to appear; Dey & Abowd, 2000). Emotion-based modeling creates music recommendations on the basis of the emotions the music item is associated with (Yang & Chen, 2011). This modeling technique provides an emotional grid where users may define a mood and the MRS suggests corresponding music items. Advanced systems analyse musical features of the musical work and associate them with particular emotions. Finally, hybrid methods are the combination of two or more techniques. The goal is to create better predictions than any technique would supply on its own, while avoiding their limitations and problems (Celma, 2008). Impact of Music Recommender Systems on Non-Superstar Artists This section focuses on the position of non-superstar artists in MRS. The information analysed provides both theoretical hypothesis and empirical research on the topic. We tried to estimate the effect that the techniques employed in the user-item matching process (cf. Section 2) have on non-superstar artists; our discussion focusses on the techniques that actually do have an impact on them. Overall, current MRS have some deficiencies that affect the position of non-superstar artists in a negative way. While some problems originate from flaws in system design, sometimes the reasons for these problems are of different nature, mostly inherent to the employed techniques in the user-item matching process (Levy & Bosteels, 2010; Song, Dixon, & Pearce, 2012) (cf. Section 3.1.) In Section 3.2, we outline the positive effects of MRS for the position of non-superstar artists. 26 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Bauer, M. Kholodylo & C. Strauss: Music Recommender Systems Challenges and Opportunities for Non-Superstar Artists 8.1 Popularity Bias One of the most problematic issues that affect the position of non-superstar artists is the so-called popularity bias. In general, the popularity bias phenomenon suggests that over time the most popular music items tend to get more and more attention, while music items in the long tail get less and less attention. In particular, popularity bias is a significant problem when employing CF or context-based filtering due to the nature of the integrated algorithms (Levy & Bosteels, 2010; Song, Dixon, & Pearce, 2012). As concerns MRS, this phenomenon manifests in several ways. For instance, CF uses listeners’ ratings to create recommendations. This implies that popular music items receive generally more ratings than items of the long tail. This, in turn, entails that an MRS recommends popular items (that have more ratings) more frequently than less frequently rated items. This, however, reinforces the popularity of popular items and, thus, also increases their suggestion rates. As a result, items in the long tail receive less and less ratings, and so the system recommends them less frequently (Song, Dixon, & Pearce, 2012). For example, Fleder and Hosanagar (2007) could show this effect in a simulation study. They simulated an MRS based on CF, where music items were recommended based on the results of previous recommendations. Across several different user groups, the overall diversity of consumption by the end of the simulation was decreasing. In other words, the MRS was giving preference to more popular items over time. In a similar way, context-based filtering uses data available about a musical works to derive recommendations. Since popular items are generally better promoted on media and are mentioned in more online sources, overall more information is available about those items compared to items of non-superstar artists (Song, Dixon, & Pearce, 2012). As a result, an MRS employing context-based filtering suggests popular and widely discussed items more frequently than items with less popularity; and this gap grows over time. 8.2 The Cold Start Problem Closely related to the popularity bias is the so-called cold start problem, which refers to the difficulty to get recognition in an early stage when a new user or new item enters a MRS – due to the lack of data related to the user or item (Song, Dixon, & Pearce, 2012). When a listener just starts to use an MRS and has not (yet) submitted much information about herself or her preferences, etc. (e.g., ratings, clicks, etc.), the MRS will only provide her with general recommendations (Celma, 2008). Similarly, when new music items are introduced to a system, they do not make it into the recommendation results because there is not enough data available about these items (cold start), which would trigger the MRS suggestion (Celma, 2008; Song, Dixon, & Pearce, 2012; Uitdenbogerd & Van Shyndel, 2002). In addition, artists new to the market do not only have merely new music items in their portfolio, there is also not much data available about them as artists, entailed with less frequent discussion, promotion, etc. As a result, the chance that new artists’ items are 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 27 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Bauer, M. Kholodylo & C. Strauss: Music Recommender Systems Challenges and Opportunities for Non-Superstar Artists recommended by an MRS are even less likely than that for new items of established artists (Celma, 2008; Song, Dixon, & Pearce, 2012). 8.3 Superstar Economy Speculations In addition to research on the effects of and consequences inherent in the techniques an MRS employs, some sources assume that MRS are biased towards popular tracks not only due to their design and the algorithms employed, but on purpose as hit items generate larger profits than items of non-superstars (due to, e.g., economies of scale). For instance, a marketing report by Media Insights & Decisions in Action Consulting (Mulligan, 2013) concludes that the recording music industry is not at all oriented at long- tail items; according to this source, one of the main reasons for it is that MRS do not only offer popularity-biased recommendations, but also that music platforms get polluted with musical works that are created in “bad” quality (not so pleasant to the listener) on purpose, with the aim to enhance the positions of the already popular music items (hits). Such “bad” musical works sound similar to the bestselling songs, but in comparison the listener would still prefer the more popular, “better” song (Mulligan, 2013). As a result, the sum of sales for hit songs is higher than that for non-hits, so music platforms are more motivated to sell more of popular music items (Guadamuz, 2015). This opinion is supported by findings of research investigating users’ music preferences (e.g., Farrahi et al. (2014) show that users who prefer mainstream music are in general easier to satisfy with an MRS). In contrast, for instance, Levy and Bosteels (2010) investigated whether the MRS employed by the Last.fm platform is indeed biased towards more popular items, as suggested in earlier literature. They compared three different data sets: (i) the one of Last.fm Recommendation Radio, which recommends specific music to specific users based on their (user) data, (ii) the Last.fm Radio data set, which plays music recommended to Last.fm users in general, and (iii) and a data set of the Last.fm music streaming services as a whole, which summarizes the information about what users are listening to while using Last.fm. The findings suggest that Last.fm, as one of the largest worldwide MRS, is biased towards non-hits rather than towards hits in comparison to overall user listening experience, and this bias is stronger for Last.fm Recommendation Radio. Based on these results, the authors conclude that real-world data can significantly differ from simulations and also state that not all MRS seem to be biased towards more popular artists. 28 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Bauer, M. Kholodylo & C. Strauss: Music Recommender Systems Challenges and Opportunities for Non-Superstar Artists 8.4 Impacts of Music Recommender Systems While the topic of popularity bias and the recommender system inadequacies seems to be one of the most broadly studied topics with regard to MRS research, it seems that research has been limited on the existence and the reasons of these phenomena. Yet, exploring the impact of these phenomena on different artist groups (e.g., superstars versus non- superstars) or differentiating in more detail within an artist group (e.g., artists from different genres, countries, age groups, etc.) has not (yet) been investigated. For instance, as mentioned in a Billboard article (Maddux, 2014), researchers and media tend to focus on disadvantages and flaws of MRS’ performances, while neglecting the fact that the existence of the discussed phenomena may be a big advantage for a privileged group of artists. For example, in the “old” music business, when music was either distributed on physical media (e.g., vinyl, CDs) and/or promoted through live shows, it was tremendously challenging for newcomers to the industry to get recognition, if their music did not “score” to become an immediate hit (Anderson, 2004). Now, newcomers (“no names”) have the chance to slowly make their way up in industry by experimenting with the recommendation mechanisms and promoting their works accordingly (Maddux, 2014). The shift from the short-tail to the long-tail model might not be as significant as in other entertainment industries such as films as books, but it is still present and it continues growing (Guadamuz, 2015). This view is supported by the case we investigated and is presented in the following Section 4. Insights from a Real-world Case To gain some insights on how MRS impact non-superstar artists from their point of view, we drew from the experience of an aspiring, non-superstar music band using the Internet as the main tool to promote their music. 9.1 Approach Several criteria motivated the selection of an interviewee to gain hands-on insights on challenges and opportunities for non-superstar artists: recent release of an album, experience with MRS, use of Internet as a main promotion tool, newcomer on the market, limited information about the artists (yet) available on the Internet, and professional attitude and aspiration (no “just for hobby” band). Based on these criteria, we selected a Ukrainian oriental metal band, founded in July 2011 under the name “Parallax”, renamed in 2015 to “IGNEA”. Their first work “Alga” was released in 2015, whereas they released their first full-length album “The Sign of Faith” in 2017 (cf. http://ignea.band). This band was selected to provide insights on the topic of MRS from the artists’ point of view because since their debut in 2011 they mostly use Internet to promote their work 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 29 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Bauer, M. Kholodylo & C. Strauss: Music Recommender Systems Challenges and Opportunities for Non-Superstar Artists and have experience with MRS as a non-superstar artist. It matches the definitions of the long-tail artist in music industry, since it works in a highly specific, niche genre, which is very different from popular music. As one of the founders of the band, vocalist and songwriter, Olga was a highly suitable candidate to provide information regarding IGNEA’s activities. We conducted the interview via Skype using a semi-structured approach (i.e., relevant questions prepared beforehand, but preserving the flexibility to stray away from the intended plan, if the artist provided interesting thoughts on the topic). The interview took 17 minutes (full audio recording is available). We applied content analysis (Krippendorff, 2013) for text reduction, analysis, and interpretation. 9.2 Findings According to the interview, the band promotes their music on the majority of well-known music platforms, such as Spotify, YouTube, iTunes, and others. The music items are submitted to the platforms through a third-party aggregator. Using such a service, the artist may – aside from the name of the artist and the titles of the music items – provide several tags associated with their music items (typically up to three), such as genre, beat, and other similar characteristics describing the music items. The strategic steps on the artist’s side usually consist of the timing for the releases and coming up with tags that would attract the attention of their potential audience. The interview indicates that the band’s overall experience with them as a non-superstar artists is very positive. For instances, about 80% of their listeners and purchasers discovered the band through MRS recommendations. Furthermore, achieving success on the platforms (through MRS) has led to mentions on the media. Overall, our interviewee pointed out that MRS combined with the power of Internet had helped the band to generate international audience instead of regional listeners; currently the majority of their listeners is located in the United States. The interviewee expressed her opinion that she thinks many artists fail on platforms with MRS due to the lack of knowledge and/or effort that the artists put into managing their activities on such platforms, trying to exploit MRS for their own ends. She emphasized the importance of studying and understanding how such systems work, and pointed out the lack of knowledge that artists seem to have about the tools available. She said that those might not be aware of the tools and possibilities and do not sufficiently search for their opportunities. The observation of the lack of managerial skills is backed up by research findings (e.g., Bauer & Strauss, 2015; Bauer, Viola, & Strauss, 2011)). Behaviour on the market, partly resulting from such an educational deficit, may lead to (self-)destruction of the economical basis of aspiring artists (Bauer & Strauss, 2017, to appear). She believes that a good artist can reach success with the help of MRS. She stated that her band will continue using MRS to promote their music in the future. 30 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Bauer, M. Kholodylo & C. Strauss: Music Recommender Systems Challenges and Opportunities for Non-Superstar Artists Among the disadvantages, she complained of the lack of flexibility for submitting information that artists could easily provide to specify and characterise their own music, such as the limited amount of tags they can include when submitting a music item. Another drawback is that most platforms keep confidential what kind of data is used in the employed MRS, and in what way it is used by their algorithms. Furthermore, the artists get access to only very general and aggregated information such as number of plays/purchases and country of origin of the users; accordingly, it is difficult to adjust their strategies efficiently to use the MRS for their own benefit. Conclusion This paper provides insights into mechanisms of current MRS and explored the challenges and benefits that non-superstar artists are confronted with on platforms employing MRS. While research on MRS tends to focus on technical issues and/or explores the field from a rather technical perspective, this work dedicates to the impact on and value generation for the group of artists that provide the vast majority of music items available on platforms using MRS (i.e., non-superstar artists) – a topic that had been neglected so far. We outline several techniques how MRS generate recommendations and discuss their pros and cons. We elaborate the non-superstar artist’s perspective on MRS and present considerations from the point of view of a non-superstar artist. In particular, we explored the question how the professional advancement of non-superstar artists is affected by MRS. It may be concluded from literature that some techniques of MRS do have a negative impact for non-superstar artists as these are biased towards more popular music and fall short in overcoming the cold start problem; yet, some MRS do support the aspiring non- superstar artist. Based on literature and our case elaboration it may further be concluded that MRS provide opportunities for aspiring artists to exploit MRS for their own benefits, as MRS provide a comparatively inexpensive tool for artists to strategically promote their music in a self-determined manner. Further research on the impact of Internet technologies on non-superstar artists may compare the influence, value, and impact of MRS with other means available to this artist group to promote their music. Future work could focus on MRS from the artists’ perspective; with regard to the findings from the interview in Section 4, we believe that the results of such studies could reveal interesting insights and may constitute a valuable contribution to MRS research. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 31 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Bauer, M. Kholodylo & C. Strauss: Music Recommender Systems Challenges and Opportunities for Non-Superstar Artists References Adomavicius, G. & Tuzhilin, A. (2005). Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE Transactions on Knowledge and Data Engineering, 17(6), 734-749. 10.1109/tkde.2005.99. Anderson, C. (2004). The Long Tail. Wired Magazine. Retrieved 4 May 2017, from https://www.wired.com/2004/10/tail/. Anderson, C. (2006). The Long Tail: Why the Future of Business is Selling Less of More. New York, NY: Hyperion. Aucouturier, J.-J. & Pachet, F. (2002). Music Similarity Measures: What’s the Use? In 3rd International Conference of Music Information Retrieval (ISMIR 2002), 13-17 October (157- 163). Paris, France: Ircam - Centre Pompidou. Bauer, C. (2012). Bands as Virtual Organisations: Improving the Processes of Band and Event Management with Information and Communication Technologies. Frankfurt, Berlin, Bern, Bruxelles, New York, Oxford, Vienna: Peter Lang. Bauer, C. & Novotny, A. (2017, to appear). A consolidated view on context for intelligent systems. Journal of Ambient Intelligence and Smart Environments. Bauer, C. & Strauss, C. (2015). Educating artists in management: an analysis of art education programmes in DACH region. Cogent Education, 2(1). 10.1080/2331186x.2015.1045217. Bauer, C. & Strauss, C. (2017, to appear). The dark side of Web 2.0: From self-marketing to self- destruction of music artists. In First Workshop on Green (Responsible, Ethical, Social/Sustainable) IT and IS – the Corporate Perspective (GRES-IT/IS), 22 September. Vienna, Austria: Vienna University of Economics and Business. Bauer, C., Viola, K., & Strauss, C. (2011). Management skills for artists: 'learning by doing'? International Journal of Cultural Policy, 17(5), 626-644. 10.1080/10286632.2010.531716. Brynjolfsson, E., Hu, Y., & Simester, D. (2007). Goodbye pareto principle, hello long tail: The effect of search costs on the concentration of product sales. Cambridge, MA: MIT Center for Digital Business. Celma, Ò. (2008). Music Recommendation and Discovery in the Long Tail. (PhD), Universitat Pompeu Fabra, Barcelona, Spain. Dey, A. K. & Abowd, G. D. (2000). Towards a Better Understanding of Context and Context- Awareness. In Workshop on The What, Who, Where, When, and How of Context-Awareness, part of the 2000 Conference on Human Factors in Computing Systems (CHI 2000), 3 April. The Hague, The Netherlands: ACM. Farrahi, K., Schedl, M., Vall, A., Hauger, D., & Tkalcic, M. (2014). Impact of listening behavior on music recommendation. In 15th Conference of the International Society for Music Information Retrieval (ISMIR 2014), 27-31 October (483-488). Taipei, Taiwan. Fleder, D. & Hosanagar, K. (2007). Recommender systems and their impact on sales diversity. In 8th ACM Conference on Electronic Commerce (EC 2007), 11-15 June (192-199). San Diego, CA: ACM. Goel, S., Broder, A., Gabrilovich, E., & Pang, B. (2010). Anatomy of the long tail: ordinary people with extraordinary tastes. In 3rd ACM International Conference on Web Search and Data Mining (WSDM 2010), 3-6 Feburary (201-210). New York, NY: ACM. Guadamuz, A. (2015). Whatever Happened to the Long Tail? TechnoLlama. Retrieved 4 May 2017, from http://www.technollama.co.uk/whatever-happened-to-the-long-tail. Jennings, D. (2007). Net, Blogs and Rock ’n’ Rolls: How Digital Discovery Works and What it Means for Consumers. London, United Kingdom: Nicholas Brealey. Krippendorff, K. (2013). Content analysis: an introduction to its methodology. Thousand Oaks, CA: Sage. 32 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Bauer, M. Kholodylo & C. Strauss: Music Recommender Systems Challenges and Opportunities for Non-Superstar Artists Lamere, P. (2004). Social Tagging and Music Information Retrieval. Journal of New Music Research, 37(2), 101-114. 10.1080/09298210802479284. Levy, M. & Bosteels, K. (2010). Music Recommendation and the Long Tail. In 1st Workshop on Music Recommendation and Discovery (WOMRAD 2010), ACM RecSys (55-57). Barcelona, Spain: ACM. Li, Q., Kim, B. M., Guan, D. H., & Oh, D. (2004). A Music Recommender Based on Audio Features. In 27th annual international ACM SIGIR conference on Research and development in information retrieval (SIGIR 2004), 25-29 July (532-533). Sheffield, United Kingdom: ACM. Maddux, T. (2014). Tales of Long Tail's Death Greatly Exaggerated. Billboard. Retrieved 4 May 2017, from http://www.billboard.com/biz/articles/news/digital-and-mobile/6121578/tales-of- long-tails-death-greatly-exaggerated-guest. Mulligan, M. (2013). The Death of the Long Tail: The Superstar Music Economy. Retrieved 4 May 2017, from http://www.promus.dk/files/MIDiA_Consulting_- _The_Death_of_the_Long_Tail.pdf. Pachet, F. o. (2011). Knowledge Management and Musical Metadata. In D. G. Schwartz & D. Te'eni (Eds.), Encyclopedia of Knowledge Management (1192-1199): Hershey, PA: Information Science Reference. Rosen, S. (2004). Markets and diversity. Cambridge, MA: Harvard University Press. Schedl, M. (2013). Ameliorating Music Recommendation: Integrating Music Content, Music Context, and User Context for Improved Music Retrieval and Recommendation. In International Conference on Advances in Mobile Computing & Multimedia (MoMM 2013), 2- 4 December. Vienna, Austria: ACM. Shao, B., Wang, D., Li, T., & Ogihara, M. (2009). Music Recommendation Based on Acoustic Features and User Access Patterns. IEEE Transactions on Audio, Speech, and Language Processing, 17(8), 1602-1611. 10.1109/tasl.2009.2020893. Song, Y., Dixon, S., & Pearce, M. (2012). A Survey of Music Recommendation Systems and Future Perspectives. In 9th International Symposium on Computer Music Modelling and Retrieval (CMMR 2012), 19-22 June (395-410). London, United Kingdom. Turnbull, D., Barrington, L., & Lanckriet, G. (2008). Five Approaches to Collecting Tags for Music. In 9th International Conference of Music Information Retrieval (ISMIR 2008), 14-18 September (225-230). Philadelphia, PA: Drexel University. Uitdenbogerd, A. & Van Shyndel, R. (2002). A Review of Factors Affecting Music Recommender Success. In 3rd International Conference on Music Information Retrieval (ISMIR 2002), 13-17 October (204-208). Paris, France: Ircam - Centre Pompidou. Wang, J., de Vries, A. P., & Reinders, M. J. T. (2006). Unifying User-based and Itembased Collaborative Filtering Approaches by Similarity Fusion Categories. In 29th Annual international ACM SIGIR Conference on Research and development in information retrieval (SIGIR 2006), 6-11 August (501-508). Seattle, WA: ACM. Yang, Y.-H. & Chen, H. H. (2011). Music Emotion Recognition. Boca Raton, FL: Taylor & Francis. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons POLO: A Framework for Short-term Studies Abroad to Enhance Critical Thinking Amongst Management Students 4 RICCARDO BONAZZI, MICAHËL POLI & NATALIE SARRASIN Abstract This article presents the preliminary results of an ongoing study to reduce the cost of short-term studies abroad, which are aimed at increasing critical thinking of management students. We propose to combine the notions of apprenticeship, massive open online courses, pedagogy portal and paper template for reflective practice over the cultural adjustment abroad. The resulting framework allows performing four tasks described by the acronym POLO: Pre-departure sessions to prepare students, Observation activities during the trip to enhance their critical thinking, Learning activities done by virtual teams across two universities and Ontological changes to adapt to a new cultural environment. As an instantiation of our model, we briefly describe a course of digital marketing that has been implemented in the last three years, and we share some relevant insights which complement the existing body of knowledge. Keywords: • framework • short-term studies • management students • studies abroad • POLO • CORRESPONDENCE ADDRESS: Riccardo Bonazzi, University of Applied Sciences Western Switzerland, Route de Moutier 14, 2800 Delémont, Switzerland, e-mail: riccardo.bonazzi@hevs.ch. Micahël Poli, University of Applied Sciences Western Switzerland, Route de Moutier 14, 2800 Delémont, Switzerland, e-mail: michael.poli@hevs.ch. Natalie Sarrasin, University of Applied Sciences Western Switzerland, Route de Moutier 14, 2800 Delémont, Switzerland, e-mail: natalie.sarrasin@hevs.ch. https://doi.org/10.18690/978-961-286-043-1.4 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 34 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Bonazzi, M. Poli & N. Sarrasin: POLO: A Framework for Short-term Studies Abroad to Enhance Critical Thinking Amongst Management Students Introduction Some 720 years ago, a book appeared in Europe, marvelling the travel in Asia that Marco Polo started when he was seventeen and that ended when he came back to Venice 24 years later. Although the book contains omissions and exaggerations, it describes how a merchant perceived the wealth and great size of Asian cities and it soon gained popularity in Europe, while inspiring other travellers to travel even further, one of which was Christopher Columbus. The purpose of this article is to describe an ongoing project for teaching professors to design a training program meant to transform any management students, the same way a long journey to Asia transformed a simple merchant into Marco Polo. We define a study exchange program as a program in which students from a university study abroad at one of their institution's partner institutions. Since such programs might be hard to organize from an administrative point of view, this article focuses on short- term study abroad, which lasts less than three months and exposes students to an intensive program that increases their understanding of other cultures, communities, and languages. Short-term, non-language-based study abroad programs can have a positive impact on intercultural sensitivity(Anderson, Lawton, Rexeisen, & Hubbard, 2006). Moreover, previous studies have already shown no statistically significant differences between the semester-long group and the short-term group (Kehl & Morris, 2008). A recent stream of literature has studied how short-term study abroad enhance critical thinking among students (Cai & Sankaran, 2015), which is defined here as the application of focused reflection and reasoned thought, and how to prepare the pre-departure sessions to properly prepare the students (Mantha, 2016). Although the positive effects of a short- term study abroad have been discussed in previous studies, a major barrier for teaching professors is the cost to implement it. In this study, we wish to find a way to lower three components of such cost: (a) the effort required to obtain the economic resources needed to do the trip, (b) the effort required to prepare the students and (c) the effort required to assess the acquisition of relevant competences. In this paper we seek for a set of guidelines that reduce the effort required to organize a short-term study abroad for a university course. Such goal seems to be best addressed by a design science methodology, which seeks for utility rather than truth (Hevner, March, Park, & Ram, 2004) and will be instrumental to develop a framework of guidelines for teaching professors. Therefore, our research question is: how to reduce the cost of a short- term study abroad aimed at increasing the critical thinking of management students? The rest of the paper proceeds as it follows. Section 2 briefly assesses the state of the art with respect to relevant concepts needed to answer our research question. Section 3 describes our methodology and the proposed solution. Section 4 illustrates the 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 35 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Bonazzi, M. Poli & N. Sarrasin: POLO: A Framework for Short-term Studies Abroad to Enhance Critical Thinking Amongst Management Students preliminary results obtained. Section 5 concludes the paper by discussing its limitations and by highlighting possible directions for further investigation. Literature review In this section we introduce three concepts to address our research question: (a) apprenticeship as a way to gather resources for the trip, (b) massive online open course to standardize the content used to prepare the students, (c) information technology to collect information during the trip. (Chieffo & Griffiths, 2003)) point out that the majority of study abroad programs are now short-term and faculty-led, but it does not specifically address the issue of effort required for financing. In this paper, we suggest establishing partnerships with firms and have students do apprenticeship in the firms during the course, in exchange of financial supports for the short term study abroad. This approach is inspired by the Finnish model of education to teach entrepreneurship, the so-called “Team Academy” approach (Leinonen, Partanen, Palviainen, & Gates, 2004) that has already influenced the way management courses are taught (Tosey, Dhaliwal, & Hassinen, 2015). Apprenticeship can be defined as a system of training a new generation of practitioners of a profession with on-the-job training and some accompanying study (classroom work and reading). With respect to internship, apprenticeship is more structured and it requires a close collaboration between the firm and teaching professors. If one assumes that management students are apprentices, who do a project during a semester that includes a short-term study abroad, the pre-departure sessions meant to enable students to perform critical thinking during the period abroad needs to be consequently adapted. Indeed, existing literature has already offered a set of guidelines to increases the critical thinking of students by means of three sessions that addresses three relevant questions: (a) Session 1: Choosing My Adventures (b) Session 2: What’s My Attitude? and (c) Session 3: Building My Skills. Nonetheless, the useful material offered by the authors need to be complemented with other resources that help students solving the problem of the firm. In this sense, one way to train students is to use a massive open online course (hereinafter referred as MOOC), which can be defined as an online course aimed at unlimited participation and open access via the web (Breslow et al., 2013). Online companies, such as Coursera or edX, offer courses from top universities that include videos and tests to assess knowledge acquisition. Although the real value of MOOCs is currently debated (Shea, 2015), xMOOC are a useful approach to assure that the training of students is in line with what is currently taught in other universities, where “x” stands for “extended” meaning that the MOOC complements a course done in class. Finally, it should be taken into account that, during a short-term study abroad, students do not have constant access to a personal computer or to internet access. Therefore, it would be advisable to combine (a) online tools that allows students from different classes to work together and (b) paper templates to carry on and to fill in during the trip to assist 36 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Bonazzi, M. Poli & N. Sarrasin: POLO: A Framework for Short-term Studies Abroad to Enhance Critical Thinking Amongst Management Students the students in their reflective practice. An example of the former is the project “Portal Pedagogy” (Monk, McDonald, Pasfield-Neofitou, & Lindgren, 2015) that connects geographically distant students through technology and curriculum to create a student- centred community of inquiry neither bound by disciplines nor countries. An example of the latter are checklists to assess the different phases of the U-curve adjustment theory (Lysgaand, 1955), which describes how students passes through four stages of adjustment: honeymoon stage, culture shock stage, adjustment stage and mastery stage. Methodology and theoretical model In this section we briefly illustrate (a) how we followed the guidelines of design research and (b) the four components of our framework. 3.1 Design research Since we did not find a theory to design a short-term study abroad with limited resources, we apply design science, which addresses so-called wicked problems, defined as difficult or impossible to solve because of incomplete, contradictory, and changing requirements that are often difficult to recognize (Rittel & Webber, 1973).We follow the six steps of (Peffers, Tuunanen, Rothenberger, & Chatterjee, 2007) to perform design research. 1. Identify problem and motivate: the overall need of international experience was brought by companies, who hire our students after the completion of their university training. The specific need of reducing the effort required to include this activity in the course was due to the limited resources available at the university. 2. Define objectives of the solution: we looked for an existing solution to adapt our course of digital marketing. Once we found the model of (Cai & Sankaran, 2015), we tried to extend it in order to allow quantitative analyses and benchmarks among groups of students. 3. Design and development: we developed the course iteratively over three years. Each year, we improved one of the three cost components. The first year we introduced the notion of apprenticeship to lower the cost of financing. The second year we complemented our courses with MOOCS and we started measuring skills acquisition with external surveys. The third year we developed a travel guide with templates to fill after each visit. 4. Demonstration: each year, we tested the model by travelling with selected students of the course of digital marketing to the same location, in order to allow comparison between different years. 5. Evaluation: we assessed the effort required to organize the short-term study abroad, while measuring the satisfaction of students and companies. 6. Communication: We waited until the third iteration to communicate the results of our model, due to the complexity of the task at hand. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 37 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Bonazzi, M. Poli & N. Sarrasin: POLO: A Framework for Short-term Studies Abroad to Enhance Critical Thinking Amongst Management Students 3.2 Our framework The resulting model has four components that form the acronym POLO, two of which have been fully implemented for a course of digital marketing, and two of which will be implemented in the next iteration. a) Pre-departure sessions: We identified three main themes associated to the experience that students would have done abroad, and that could be improved by digital marketing techniques: tourism, education and strategy consulting for firms. According to (Cai & Sankaran, 2015), there are three components of the theme-based interdisciplinary approach, which we adapted to our situation: (a) Great questions: in order to perform each experience, students had to combine existing notions of information technology, strategy, market analysis and service design. (b) Glocal awareness: during each experience, students had to report how they felt about being immerse in a foreign country and what changed with respect to the local context they were used to. (c) Global awareness: after each experience, students were asked to propose ways to translate the skills learnt in a global context into the ecosystem of the firm, they were working with. Moreover, we had to take into account the interaction between the students and the firm that financed their trip. Since we did not want to personally attend the meetings between the students and the firm, we decided to use a set of proxy measures. We used two MOOCs from Coursera and training material from Google and Facebook to prepare students to the topic of digital marketing. Students were asked to complete the course at home and to come to class prepared to discuss about how to implement the theory into their group project with the firm. Every month, the students had to complete a set of quiz to monitor their mastery of theoretical concepts. In order to measure retention of concepts, we submitted the same quiz more than once. Hence, the first month, students would have to do quiz 1; the second month, they would have to do quiz 1 and quiz 2; the third month, they would have to do quiz 1, quiz 2 and quiz 3, and so on. Only the first quiz led to a summative evaluation; the result of the other quizzes was known by the students but did not change the initial score. That way, we would monitor how many theoretical concepts were put into practice within each group, and to perform risk analysis at the group level. One month before the trip, the firm had to do an intermediary evaluation, and we checked if there were correlations between our risk analyses and the feedback of the firms. b) Observation while being abroad: According to (Cai & Sankaran, 2015), there are three components of the cultural immersion (site visits, activities and assignments): a. Experience: whenever possible, students were advised to observe how locals were behaving with respect to each theme previously defined. 38 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Bonazzi, M. Poli & N. Sarrasin: POLO: A Framework for Short-term Studies Abroad to Enhance Critical Thinking Amongst Management Students b. Reflection: at the end of each day, students were brought to traditional monuments and restaurants to familiarize with the underlying culture of the city. c. Application: students had the opportunity to follow university courses and presentations done by international firms on the same topic. In order to assess the increase in the critical thinking of the students, a set of templates to fill were given. The templates to fill in had the same structure for every theme: (1) analysis of the touchpoints between the student and the service, (b) link between the touchpoints and the concepts of digital marketing learnt in class, (c) observation of existing digital solutions used in the context and difference between theory and practice (d) suggestions for improvement and explications of implementation. c) Learning with another class: This component of the framework is currently under development and it has not been tested yet. In its final stage of development, we envisage to create virtual teams composed by students from two universities in two different countries, which will have to perform a joint task, i.e. to attend the Google Online Marketing Challenge. A groupware with project management functionalities, such as LiquidPlanner, will allow students from the two universities to talk before meeting during the short-term study abroad. Then, students will continue working together from two separate countries. d) Ontological changes: This component of the framework is currently under development and it has not been tested yet. Previous research has already shown that the different stages of the U-curve adjustment theory can be shortened by (a) performing pre-departure exposure to the host culture, (b) teaching techniques of anticipatory adjustments to the host culture and (c) increasing the time spent with host country nationals (Black & Mendenhall, 1991). Accordingly, teaching professors could link the quantitative results obtained during the pre-departure sessions and the data collected during the trip, in order to monitor if the honeymoon and the culture shock stages last too long, and act accordingly. For sake of simplicity, we list here only two propositions derived from the U-curve adjustment theory: (P1) students who spent little time to attend to models, will report the lowest levels of perceived dissimilarity between the approach of the host country nationals and themselves at the beginning of the trip, and (P2) students that have written more of new and appropriate behavior at the beginning of the trip will receive a greater positive reinforcement and will adjust quicker to the new culture. Preliminary test results In this section we illustrate the results of the most recent test the first two components of our model, which was used with a class of 35 students of the course of digital marketing. At the beginning of the academic year, students were split into eight groups depending 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 39 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Bonazzi, M. Poli & N. Sarrasin: POLO: A Framework for Short-term Studies Abroad to Enhance Critical Thinking Amongst Management Students on their interests and skills. The goal of each group project with the firm was the same: to design and implement a digital strategy for the firm. Nonetheless, each group project slightly changed over time, depending on the stage of digital maturity of the firm or the resources available. Each group received theoretical classes once a week and had to meet the company once a month, as part of their apprenticeship. In the middle of the academic year, a short-term study abroad was meant to let students acquire international awareness, by meeting multinational firms and by attending classes in another university. Accordingly, the city of Dublin was chosen, since it hosts the headquarters for the Europe – Middle East – Africa (EMEA) zone of Facebook (marketing), LinkedIn and Twitter, as well as hosting the headquarters of Google Ireland, Microsoft Ireland and Amazon Ireland. In the following paragraphs, we illustrate how we monitored the interactions (a) between the students and the firm during the pre-departure sessions and (b) between the students and their new environment during the observation phase abroad. 4.1 Assessment of knowledge acquisition Since we did not want to personally attend the meetings between the students and the firm, we decided to use a set of proxy measures. Figure 1 illustrates how we monitored the firms. Each student did the quiz 01 three times over the course of one semester. The quiz was composed of 40 questions directly taken from Coursera, and its score ranged from 0/10 to 10/10. After each quiz, we gathered all results of all students and then we extracted the median, the maximum and the minimum for each group. Finally, we assigned the groups to different risk clusters, depending on their maximum and minimum. Table 1: Classification criteria to classify groups into risk clusters Team Leader(s) Slugger(s) Cluster 0 (Max<7/10) 0 (Min<5/10) Panic 0 1 (Min<7/10 Confusion 0 2 (Min>7/10) Theory and no practice 1 (Max<9/10) 0 Tired leader 1 1 Need support 1 2 Committed but leaderless 2 (Max>9/10) 0 Free riders 2 1 Some free riders 2 2 Good leadership Table 1 shows the classification that we used to monitor the groups. If the maximum score was less than 7/10 we assumed that no one was in charge of the team and we assigned a 0 in the first column. If there was a minimum score below 5/10 we assumed that there 40 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Bonazzi, M. Poli & N. Sarrasin: POLO: A Framework for Short-term Studies Abroad to Enhance Critical Thinking Amongst Management Students was at least one slugger and we assigned a 0 in the second column. Usually, teams started all at the best position during quiz 1 (=Good Leadership), where most of the students had 10/10. Nonetheless, over time students started forgetting what was not put into practice. Figure 1: Different trajectories of the eight groups Figure 1 shows that teams L1 and L2 managed to reduce the distance between the maximum score and the minimum score of the third quiz. Hence, one can assume that they managed to involve the potential sluggers in the team. Instead, teams F1 and F2 did not correct the distance between max and min but they managed to keep such distance steady between the quiz 2 and the quiz 3. Team P1 and P2 could not control the amount of free riding in the team and eventually no one took the leadership. Interestingly enough, these two teams did not have problems with the firm. Indeed, by discussing with the firms we realized that the company took the role of the leader and the students decided to follow. Finally, teams T1 and T2 increased the amount of free riding in the team over time and lost the degree of leadership. These teams had issues in their mid-term evaluation, because the two firms did not take the lead. 4.2 Preparation of the theme-based interdisciplinary approach and cultural immersion Table 2 illustrates an example of development of the theme “Strategy consulting”. Students received a printed book with templates to complete, such as the one shown in the example. On day 1, students went to an Irish university and conducted a case study, under the supervision of a teaching professor in charge of the course of digital marketing 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 41 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Bonazzi, M. Poli & N. Sarrasin: POLO: A Framework for Short-term Studies Abroad to Enhance Critical Thinking Amongst Management Students at the hosting university. On day 2, students went to visit the company analysed and where asked to perform reflective tasks to better understand the difference between theory and practice. Table 2: Theme development across day 1 (case study) and day 2 (visit at the firm) Case Study Guinness Dates : Day 01 (15 :00 – 16:00) Part 1: Digital strategy of Guinness Analyze the amount of times the word “Guinness” is searched on Google Ireland, with respect to the word “beer” and “World record”. (https://trends.google.com/trends/explore?geo=IE&q=guinness,guinness%20beer,bee r,%2Fm%2F0pmx5) Part 2: Marketing strategy of Guinness Storehouse Read the HBR article “The Brand Benefits of Places Like the Guinness Storehouse” (https://hbr.org/2015/10/the-brand-benefits-of-places-like-the-guinness-storehouse ). Then, link the keywords used by the reviews on Tripadvisor to the seven principles. Part 3: Your Google Ads to promote the website of Guinness storehouse Design a Google Ad to increase by 1000 the number of tickets sold online to tourists in the month of April. To estimate the budget, assume that the rate of ticket sold is 1% of the people clicking on the ad. To comply with regulations on alcohol advertising, make sure you do not sell alcohol to teenagers. Finally, assume that every ticket sold online saves 3 CHF to Guinness with respect to a ticket sold on the building. Part 1.1 : Digital strategy of Guinness Why is the word «Guinness » searched more than the word « beer » ? (Hint: look at the related queries) ………………………………………………………………………………………… …. Think about an example of how social marketing online allows Guinness to promote its brand, while respecting regulations on advertising of alcoholic beverages ………………………………………………………………………………………… …. 42 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Bonazzi, M. Poli & N. Sarrasin: POLO: A Framework for Short-term Studies Abroad to Enhance Critical Thinking Amongst Management Students Part 1.2 : Marketing @ Guinness Storehouse Principle Keywords Comments 1 2 3 4 5 6 7 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 43 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Bonazzi, M. Poli & N. Sarrasin: POLO: A Framework for Short-term Studies Abroad to Enhance Critical Thinking Amongst Management Students Part 1.3 : Google Ads Goal : 1000 tickets sold on the website of Guinness storehouse (https://www.guinness-storehouse.com/en/tickets ) Time : From March, the 1st to March, the 31st Target 01: Adults 18-40, living in your country Target 02: Teenager 12-18, living in your country You can use the most frequent words used in the reviews of TripAdvisor to define your keywords. Keywords: 1 ..……………………………. 2 ……………………………… 3 ……………………………… Once you have defined your keywords, estimates the cost per click. Let assume here that the cost is 0.03 CHF. Indicate below your estimate of the daily budget and the return on investment. Daily Budget: ………………………………………………………………………………………… …………………………………………… ROI = (gain from investment – cost of investment) / cost of investment ………………………………………………………………………………………… …………………………………………… Guinness Storehouse Dates Day 2 (9 :30 – 11 :30) Planning  09 :15 – 09 :30 : Meeting at the entrance  09 :45 – 10 :45 : Exercise  11 :15 – 11 :30 : Debriefing and beer at 7th floor Once the trip was concluded, we collected all printed book to assess their contents. As it turned out, the classification done at the pre-departure sessions, which was shown in Table 1, allowed to partially predicting the trajectory of the groups. In order to assign groups to cluster, we checked if the templates in their printed book were completed (=2) or partially completed (=1), and if the answers of the participants were similar (=0) or somehow different (=1). Table 3 shows that most groups did not change their internal 44 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Bonazzi, M. Poli & N. Sarrasin: POLO: A Framework for Short-term Studies Abroad to Enhance Critical Thinking Amongst Management Students dynamics, with the exception of the groups with the free riders, where the leader became tired (groups F1 and F2), and one group in “Panic” state, which managed to rebound during the trip abroad. This confirms our first proposition (P1) concerning the importance of the pre-departure stage. Since one group has improved its relative performance during the trip, we need additional information to confirm our proposition concerning the importance of positive reinforcement to teams, which properly prepared before the trip and acquired new and appropriate behaviors in little time. Table 3: Score before and after the short-term study abroad Group Leader Slugger Cluster Before Completed Similarity Cluster After F1 2 0 Free riders 1 0 Tired leader F2 2 0 Free riders 1 0 Tired leader P1 0 0 Panic 0 0 Panic Some free P2 0 0 Panic 2 1 riders T1 1 0 Tired leader 1 0 Tired leader T2 1 0 Tired leader 1 0 Tired leader L1 2 2 Leader 2 2 Leader Some free L2 2 1 riders Discussions and conclusions This article presents the preliminary results of an ongoing study to reduce the cost of a short-term study abroad aimed at increasing the critical thinking of management students and to transform each of them into the Marco Polo of the 21st century. We start by proposing to start by a project that implies apprenticeship in firms and that uses the time spent abroad in order to solve a problem of a company, which could cover the travel expenses in return. Accordingly, we have adapted existing templates for pre-departure sessions of (Mantha, 2016) to include the notions required to solve the problem of the firm, and we have devised a way to use MOOCs and standardized tests to monitor the work of the students. Finally, we have extended the framework of (Cai & Sankaran, 2015) to have the summative and formative evaluation under a quantitative form, to allow benchmarks among students. At its current stage, this study has two major limitations: (1) the first one concerns the two missing dimensions of the POLO framework, which makes it hard to assess its validity as an overall; (2) the second shortcoming concerns the way reflective exercises are constrained by the templates to allow simple benchmarking. Nonetheless, we believe that our preliminary results already offers two interesting contributions to previous knowledge: (a) if students work in teams, the team dimensions should be taken into account and (b) if students work with a sponsor, the dynamic with the firm should be monitored to avoid the situation “tired leader”. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 45 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Bonazzi, M. Poli & N. Sarrasin: POLO: A Framework for Short-term Studies Abroad to Enhance Critical Thinking Amongst Management Students In the future, we intend to develop the two last components of our framework and to test it quantitatively on a larger scale. In the beginning, we shall limit our observation to two classes in two countries, in order to better control for cultural effects. Indeed, we intend to assess an additional proposition derived from Black & Mendenhall (1991), concerning the sources of anticipatory adjustment, such as training or previous international experience, that increase attention and retention processes will in turn speed up the learning process of some students. In order to properly assess the ontological change, we also intend to try a version of the printed book with templates for students, which constrain less their possibility to express themselves. References Anderson, P. H., Lawton, L., Rexeisen, R. J., & Hubbard, A. C. (2006). Short-term study abroad and intercultural sensitivity: A pilot study. International Journal of Intercultural Relations, 30(4), 457–469. Black, J. S., & Mendenhall, M. (1991). The U-curve adjustment hypothesis revisited: A review and theoretical framework. Journal of International Business Studies, 22(2), 225–247. Breslow, L., Pritchard, D. E., DeBoer, J., Stump, G. S., Ho, A. D., & Seaton, D. T. (2013). Studying learning in the worldwide classroom: Research into edX’s first MOOC. Research & Practice in Assessment, 8. Cai, W. W., & Sankaran, G. (2015). Promoting critical thinking through an interdisciplinary abroad program. Journal of International Students, 5(1), 38. Chieffo, L., & Griffiths, L. (2003). What’sa month worth. International Educator, 26–31. Hevner, A. R., March, S. T., Park, J., & Ram, S. (2004). Design science in information systems research. MIS Quarterly, 28(1), 75–105. Kehl, K., & Morris, J. (2008). Differences in global-mindedness between short-term and semester- long study abroad participants at selected private universities. Frontiers: The Interdisciplinary Journal of Study Abroad, 15, 67–79. Leinonen, N., Partanen, J., Palviainen, P., & Gates, M. (2004). Team Academy: a true story of a community that learns by doing. PS-kustannus. Lysgaand, S. (1955). Adjustment in a foreign society: Norwegian Fulbright grantees visiting the United States. International Social Science Bulletin. Retrieved from http://doi.apa.org/index.cfm?fa=search.printFormat&uid=1956-00871- 001&recType=psycinfo&singlerecord=1&searchresultpage=true Mantha, E. (2016). Study Abroad Course Development: Pre-Departure Sessions. Retrieved from http://qspace.library.queensu.ca/handle/1974/15022 Monk, N., McDonald, S., Pasfield-Neofitou, S., & Lindgren, M. (2015). Portal Pedagogy: From interdisciplinarity and internationalization to transdisciplinarity and transnationalization. London Review of Education, 13(3), 62–78. https://doi.org/10.18546/LRE.13.3.10 Peffers, K., Tuunanen, T., Rothenberger, M. A., & Chatterjee, S. (2007). A design science research methodology for information systems research. Journal of Management Information Systems, 24(3), 45–77. Rittel, H. W., & Webber, M. M. (1973). Dilemmas in a general theory of planning. Policy Sciences, 4(2), 155–169. 46 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Bonazzi, M. Poli & N. Sarrasin: POLO: A Framework for Short-term Studies Abroad to Enhance Critical Thinking Amongst Management Students Shea, M. (2015, September 25). MOOC: A University qualification in 24 Hours or less - Opinion. Retrieved March 6, 2017, from http://www.theskinny.co.uk/tech/features/moocs Tosey, P., Dhaliwal, S., & Hassinen, J. (2015). The Finnish Team Academy model: implications for management education. Management Learning, 46(2), 175–194. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons A Co-Creation Based Model For Engaging Citizen Open Data Use 5 COLIN CALLINAN, MURRAY SCOTT, EOIN WHELAN & ADEGBOYEGA OJO Abstract Open data is a somewhat new phenomenon that is increasingly attracting attention from researchers in the academic and practitioner fields. The transformative potential of open data is being examined from various directions and in an interdisciplinary fashion. While major attention has been paid to technical aspects of open data there remains a paucity of research into usage and theoretical contributions. This study aims to examine the factors that influence citizens use of open data. In so doing, we attempt to address the paucity of theory building around open data. We further highlight the potential role that the prominent factors in co-creation can play in engaging the citizen in open data use. Keywords: • Open data • Co-Creation • Openness • Participation • Deliberative citizenship • CORRESPONDENCE ADDRESS: Colin Callinan, NUI Galway, University Road, Galway, Ireland, e- mail: c.callinan1@nuigalway.ie. https://doi.org/10.18690/978-961-286-043-1.5 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 48 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Callinan, M. Scott & E. Whelan & A. Ojo: A Co-Creation Based Model For Engaging Citizen Open Data Use Introduction Open data is an increasingly topical concept which is rapidly growing in popularity amongst governmental organisations, researchers, the business community and other stakeholders. Open data has been defined as 'a “philosophy” or “strategy” that encourages mostly public organizations to release objective, factual, and nonperson-specific data that are generated or collected through the delivery of public services, to anyone, with a possibility of further operation and integration, without any copyright restrictions' (Hossain et al., 2016). Open data can be viewed as a key signifier of the evolving nature of the relationship between government and the citizen as the use of Information Technologies in government holds the promise of enhanced democracy and increasingly engaged citizen participation. Led by former US president Barack Obamas announcement in 2009 that his government would embark upon a transparency strategy that would see much greater levels of openness in government, many governments around the world have since followed suit with increased emphasis on open data as a key component (Huijboom and Van den Broek, 2011). The potential benefits accrued are manifold. These have been categorised by Janssen et al. (2012) as firstly, political and social e.g. more transparency, creation of trust in government, more participation and self-empowerment of citizens etc. Secondly, economic, e.g. economic growth, stimulation of innovation, development of new products and services etc. Thirdly, operational and technical, e.g. counteracting cost associated with recollection and unnecessary duplication of data, optimisation of the administration process, improvement of public policies etc. With the increased availability of Open Data, intense pressure is being brought to bear on different public organisations to release government produced data. There are myriad reasons for this including public spending cost reduction, increased returns on public investment, wealth generation, service delivery and innovation (Janssen et al., 2012, Zuiderwijk et al., 2015). The somewhat romantic view is that this will increase transparency and democratic accountability, create trust in government and self-empower citizens (Janssen et al., 2012). While policy-makers appear to believe that open data will be taken up and used by the public resulting in copious benefits, (Zuiderwijk et al., 2015), this belies the fact that the focus of interest in the literature has been on technical and operationalisation issues and scant attention has been paid to usage, theoretical contributions and the role of the citizen in this process. This research will utilise the theory of value co-creation (Galvagno and Dalli, 2014, Prahalad and Ramaswamy, 2000, Prahalad and Ramaswamy, 2004, Voorberg et al., 2015), and develop a model that explains the factors that influence citizen engagement in the co-creation process. We validate and expand on previous work by Voorberg et al. (2015), to create a theoretical model which we hope to validate through future research. 30TH BLED ECONFERENCE: DIGITAL TRANSORMATION – FROM CONNECTING THINGS TO 49 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Callinan, M. Scott & E. Whelan & A. Ojo: A Co-Creation Based Model For Engaging Citizen Open Data Use Background & Model Development In this section, we examine three relevant areas of literature. First, we discuss the previous work on open data, the definition of the concept and its precursors. Next, we discuss the evolving role of the citizen while paying special attention to the move from consultative to a more deliberative citizenship. Finally, we examine the theory of Co-Creation as a useful analytical tool that can be used to foster greater involvement of the citizen in the workings of state. 2.1 Open Data Bertot et al. (2014) propose a holistic definition of open data which encompasses the theory that ‘certain kinds of data should exist beyond the limits of copyright, patents, censorship, or other parameters often placed around data. Data is disseminated openly so that it is freely available to use, republish, and transform into new products’. The majority of articles, both academic and practitioner focused, have failed to reach consensus or clarity on the exact definition of open data. The defining characteristics of Open Data comprise three essential traits that must feature in order to fulfil the philosophy set out by practitioners and academics. While some researchers have cited additional characteristics such as the necessity for data to be non-privacy restricted and non-confidential, (Janssen et al., 2012), as mentioned above, there is a lack of definitional consensus on these characteristics. To address this shortcoming, a summary of open data definitional characteristics drawn from the literature is illustrated below in Table 1. Table 1: Open Data Definition Characteristics Characteristic Source Hossain et al., 2016, Weerakkody et al., 2016, Produced with Public Money Zuiderwijk et al., 2015, Bates, 2013, Janssen et al., 2012. Hossain et al., 2016, Attard et al., 2015, Bertot et Available Without Restrictions al., 2014, Janssen et al., 2012, Shadbolt et al., on Usage or Distribution 2012. Dawes et al., 2016, Hossain et al., 2016, Published in a Reusable Weerakkody et al., 2016, Huijboom and Van den Format Broek, 2011, Peled, 2011. In the past, this data was preserved by governments for internal usage until the 1960’s when the freedom of information (FOI) campaign pushed for the public disclosure of government data (Sieber and Johnson, 2015). Currently, the movement for greater openness in government has led to an explosion of interest in the open data arena. A clear example is data.gov, one of the most popular portals for open data sets, lists 44 countrywide open data sites proving that the open data movement has spread internationally (Lourenco, 2015). 50 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Callinan, M. Scott & E. Whelan & A. Ojo: A Co-Creation Based Model For Engaging Citizen Open Data Use 2.2 Repositioning The Role Of The Citizen The movement towards openness in government with open data as a key component has the potential to forever alter the relationship between the state and the citizen. Largely, the participation mechanisms enacted over the last quarter of a century have been consultative in nature resulting in little influence over public policy (McLaverty, 2011). These have taken the form of citizens’ assemblies, referendums, citizen juries, public meetings and opinion polling (McLaverty, 2011). These have been largely unsatisfactory in most cases and act as ‘a supplement to traditional representative democracy, rather than an alternative to representative democracy’ (McLaverty, 2011, p. 415). In addition, Dryzek (2000, p. 1) has argued that since the 1990’s, democratic theory has taken ‘a strong deliberative turn. Increasingly, democratic legitimacy came to be seen in terms of the ability or opportunity to participate in effective deliberation on the part of those subject to collective decisions’. He further argues that democratisation takes place along three dimensions: franchise, scope and authenticity. He states that ‘authenticity is the degree to which participation and control are substantive as opposed to symbolic’ (Dryzek, 2000, p. 86). This search for “Dryzekian authenticity” has come about as a result of ‘declines in traditional forms of participation associated with representative democracy’ (McLaverty, 2011, p. 415). 2.3 Co-Creation Co-Creation as a concept has evolved continuously since its antecedents appeared in the form of co-production in the 1980’s. In the sphere of public administration, the seminal papers produced, (Brudney and England, 1983, Parks et al., 1981, Sharp, 1980, Whitaker, 1980), added a solid foundation which was initially built on by Prahalad and Ramaswamy (2000, 2003, 2004). There has been a great deal of discussion in the academic literature concerning the issue of definitional differences relating to co-production and co-creation (Grönroos and Voima, 2013, Leroy et al., 2013). Voorberg et al. (2015) found that when they compared the record definitions of co-production and co-creation, to a large degree, both terms were defined analogously. In addition, they concluded that co-creation and co-production have been used as interchangeable concepts while questioning the feasibility of conceptual clarity. Given the definitional murkiness of the co-creation concept and its interdisciplinary nature, this research will draw from Galvagno and Dalli (2014, p. 644) more broad definition of co-creation as a ‘joint, collaborative, concurrent, peer-like process of producing new value, both materially and symbolically’. 2.4 Barriers To Open Data Use From The Citizen Perspective In order to determine whether non-technical barriers exist to open data use, we reviewed the pertinent literature in the field. We found that there is a lack of articles that examine 30TH BLED ECONFERENCE: DIGITAL TRANSORMATION – FROM CONNECTING THINGS TO 51 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Callinan, M. Scott & E. Whelan & A. Ojo: A Co-Creation Based Model For Engaging Citizen Open Data Use barriers in a non-technical sense. The relevant articles that address the subject directly are examined below. Ohemeng and Ofosu-Adarkwa (2015) examined the Ghana Open Data Initiative (GODI) from a demand side perspective which was initiated in 2012 with the primary aims of administrative efficiency and economic development. They described the level of civil society involvement as ‘abysmal’ and one the main non-technical challenges has been the involvement of citizens in the process. This is explained as a consequence of a skills deficit and a lack of awareness (Ohemeng and Ofosu-Adarkwa, 2015). They further point out the necessity of balancing high and low technology approaches such as adopting a mobile government (M-government) path (Ohemeng and Ofosu-Adarkwa, 2015). Shadbolt et al. (2012) analysed the socio-technical aspects of linked open government data from data.gov.uk. They make clear that the makeup of the user interface is a crucial issue by explaining ‘the ease with which ordinary citizens can access and query the data is a crucial factor for open government data’s value’ (Shadbolt et al., 2012). Huijboom and Van den Broek (2011) examined the open data strategies in five countries (Australia, Denmark, Spain, UK, and USA). They found that one of the top barriers of open data policy was the issue of limited user friendliness. They point out that ‘technical experts of several countries stated that the existing databases should be converted into more user- friendly datasets to be of use for citizens and businesses’ (Huijboom and Van den Broek, 2011). This sample of case studies which address the user perspective endorse the idea that there is a dearth of studies investigating usage of open data from the citizen perspective. They further point towards the existence of non-technical and socio-technical barriers. The Research Model Currently, there is a dearth of literature examining theory contribution and development in the open data field (Magalhaes et al., 2014). Furthermore, as Zuiderwijk et al. (2015) point out, ‘little is known about what predictors affect the acceptance and use of open data’. To address this shortcoming this research paper will attempt to contribute to the advancement of theory by developing a research model that will explain intentionality to use open data. To do so, the authors adapted and extended previous research conducted by Voorberg et al. (2015) in the area of co-creation. Through a review of the pertinent literature, we were able to validate the first three constructs identified by Voorberg et al. (2015). We further validated the risk aversion construct and added trust as a supplementary factor owing to a symbiotic relationship which exists between the two constructs. Finally, we developed the construct of simplicity of task as the academic literature pointed towards its importance and necessity. 52 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Callinan, M. Scott & E. Whelan & A. Ojo: A Co-Creation Based Model For Engaging Citizen Open Data Use Table 2: Prominent Factors in Citizen Co-Creation Construct Definition Reference Voorberg et al., 2015, Bharti et al., 2014, Skills, intrinsic values and Füller, 2010, Etgar, Citizen Characteristics levels of education. 2008, Oreg & Nov, 2008, Payne et al., 2008, Alford, 2002. Voorberg et al., 2015, Citizen Taking part and being part of Füller, 2010, Zwass, Awareness/Ownership something. 2010, Etgar, 2008, Alford, 2002 Networks together with shared Bharti et al., 2014, norms, values and Presence of Social Voorberg et al., 2015, understandings that facilitate Capital Zwass, 2010, Wasko & co-operation within or among Faraj, 2005. groups. Voorberg et al., 2015, Risk averse attitude/trust in Füller et al., 2009, Etgar, Risk Aversion/Trust process. 2008, Jaworski & Kohli, 2006, Alford, 2002. Elina Jaakkola et al., 2015, Zuiderwijk et al., The ease in which the objective Simplicity of Task 2015, Kohler et al., is completed. 2011, Haichao et al., 2011, Alford, 2002. 30TH BLED ECONFERENCE: DIGITAL TRANSORMATION – FROM CONNECTING THINGS TO 53 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Callinan, M. Scott & E. Whelan & A. Ojo: A Co-Creation Based Model For Engaging Citizen Open Data Use It is our belief that these prominent factors in citizen co-creation represent moderating variables that have the potential to alter the relationship between the citizen and the outcome of open data usage. This is visually represented below in figure 1. Figure 1: Research Model Conclusion and Future Work The next step of this ongoing research will be to design and conduct an exploratory cross- sectional pilot survey with current open data users, focusing on the individual as the unit of analysis. To establish the strengths of our survey constructs this will be followed by a series of semi-structured interviews with selected users. It is hoped this will lead to validation of the constructs mentioned previously. Special attention will be paid to theory building and theoretical contribution. Following Doty and Glick (1994, p.233) theory must contain at least three principles to be defined as theory; ‘(a) constructs must be identified, (b) relationships among these constructs must be specified, and (c) these relationships must be falsifiable’. Opening up governmental data is riven with potential and pitfalls. How this is managed by the state will determine the accrual of potential benefits for the private sector and society as a whole. For understandable reasons, previous and current research has focused on technical and operationalisation issues. However, if tangible benefits are to be realised greater attention needs to be paid to the end user. The authors propose a research model from the perspective of the user by employing the theory of co-creation that will help in developing increased understanding of intentionality to use open data. The contributions of this study are twofold. Firstly, adapting and extending prominent factors in co-creation with a view to applying them to intentionality to use open data. Secondly, the attempt to build theory in the area of open data which has been under investigated thus far. 54 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Callinan, M. Scott & E. Whelan & A. Ojo: A Co-Creation Based Model For Engaging Citizen Open Data Use Acknowledgement This publication has emanated from research supported in part by a research grant from Science Foundation Ireland (SFI) under Grant Number SFI/12/RC/2289 References Alford, J. 2002. Why Do Public-Sector Clients Coproduce? Toward A Contingency Theory. Administration & Society, 34, 32-56. Bates, J. 2013. The Domestication of Open Government Data Advocacy in The United Kingdom: A Neo-Gramscian Analysis. Policy & Internet, 5, 118-137. Bertot, J. C., Gorham, U., Jaeger, P. T., Sarin, L. C. & Choi, H. 2014. Big Data, Open Government And E-Government: Issues, Policies and Recommendations. Information Polity, 19, 5-16. Bharti, K., Agrawal, R. & Sharma, V. 2014. What Drives the Customer of World's Largest Market to Participate in Value Co-Creation? Marketing Intelligence & Planning, 32, 413-435. Brudney, J. L. & England, R. E. 1983. Toward A Definition of The Coproduction Concept. Public Administration Review, 59-65. Doty, D. H. & Glick, W. H. 1994. Typologies as A Unique Form of Theory Building: Toward Improved Understanding and Modeling. Academy of Management Review, 19, 230-251. Dryzek, J. S. 2000. Deliberative Democracy and Beyond: Liberals, Critics, Contestations, Oxford University Press on Demand. Elina Jaakkola, A. H., Dr Leena Aarikka-Stenroos, D. & Verleye, K. 2015. The Co-Creation Experience from The Customer Perspective: Its Measurement and Determinants. Journal of Service Management, 26, 321-342. Etgar, M. 2008. A Descriptive Model of The Consumer Co-Production Process. Journal of The Academy of Marketing Science, 36, 97-108. Füller, J. 2010. Refining Virtual Co-Creation from A Consumer Perspective. California Management Review, 52, 98-122. Füller, J., Mühlbacher, H., Matzler, K. & Jawecki, G. 2009. Consumer Empowerment Through Internet-Based Co-Creation. Journal of Management Information Systems, 26, 71-102. Galvagno, M. & Dalli, D. 2014. Theory of Value Co-Creation: A Systematic Literature Review. Managing Service Quality: An International Journal, 24, 643-683. Grönroos, C. & Voima, P. 2013. Critical Service Logic: Making Sense of Value Creation And Co- Creation. Journal of The Academy of Marketing Science, 41, 133-150. Haichao, Z., Dahui, L. & Wenhua, H. 2011. Task Design, Motivation, And Participation In Crowdsourcing Contests. International Journal of Electronic Commerce, 15, 57-88. Hossain, M. A., Dwivedi, Y. K. & Rana, N. P. 2016. State-Of-The-Art in Open Data Research: Insights from Existing Literature and A Research Agenda. Journal of Organizational Computing and Electronic Commerce, 26, 14-40. Huijboom, N. & Van Den Broek, T. 2011. Open Data: An International Comparison of Strategies. European Journal of Epractice, 12, 4-16. Janssen, M., Charalabidis, Y. & Zuiderwijk, A. 2012. Benefits, Adoption Barriers and Myths of Open Data and Open Government. Information Systems Management, 29, 258-268. Jaworski, B. & Kohli, A. K. 2006. Co-Creating the Voice of The Customer. The Service Dominant Logic of Marketing: Dialog, Debate and Directions, 109-117. Kohler, T., Fueller, J., Matzler, K. & Stieger, D. 2011. Co-Creation in Virtual Worlds: The Design of The User Experience. Mis Quarterly, 35, 773-788. Leroy, J., Cova, B. & Salle, R. 2013. Zooming in Vs Zooming Out on Value Co-Creation: Consequences for BtoB Research. Industrial Marketing Management, 42, 1102-1111. 30TH BLED ECONFERENCE: DIGITAL TRANSORMATION – FROM CONNECTING THINGS TO 55 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Callinan, M. Scott & E. Whelan & A. Ojo: A Co-Creation Based Model For Engaging Citizen Open Data Use Lourenco, R. P. 2015. An Analysis of Open Government Portals: A Perspective of Transparency for Accountability. Government Information Quarterly, 32, 323-332. Magalhaes, G., Roseira, C. & Manley, L. Business Models for Open Government Data. Proceedings of the 8th International Conference on Theory and Practice of Electronic Governance, 2014. Acm, 365-370. McLaverty, P. 2011. Participation. The Sage Handbook of Governance, 402-418. Ohemeng, F. L. K. & Ofosu-Adarkwa, K. 2015. One Way Traffic: The Open Data Initiative Project and The Need for An Effective Demand Side Initiative in Ghana. Government Information Quarterly, 32, 419-428. Oreg, S. & Nov, O. 2008. Exploring Motivations for Contributing to Open Source Initiatives: The Roles of Contribution Context and Personal Values. Computers in Human Behavior, 24, 2055- 2073. Parks, R. B., Baker, P. C., Kiser, L., Oakerson, R., Ostrom, E., Ostrom, V., Percy, S. L., Vandivort, M. B., Whitaker, G. P. & Wilson, R. 1981. Consumers as Co-producers of Public Services: Some Economic and Institutional Considerations. Policy Studies Journal, 9, 1001-1011. Payne, A. F., Storbacka, K. & Frow, P. 2008. Managing the Co-Creation of Value. Journal of The Academy of Marketing Science, 36, 83-96. Prahalad, C. K. & Ramaswamy, V. 2000. Co-Opting Customer Competence. Harvard Business Review, 78, 79-87. Prahalad, C. K. & Ramaswamy, V. 2003. The New Frontier of Experience Innovation. Mit Sloan Management Review, 44, 12-18. Prahalad, C. K. & Ramaswamy, V. 2004. Co‐Creation Experiences: The Next Practice in Value Creation. Journal of Interactive Marketing, 18, 5-14. Shadbolt, N., O’Hara, K., Berners-Lee, T., Gibbins, N., Glaser, H., Hall, W. & Schraefel, M. C. 2012. Linked Open Government Data: Lessons from Data.Gov.Uk. Ieee Intelligent Systems, 27, 16-24. Sharp, E. B. 1980. Toward A New Understanding of Urban Services and Citizen Participation: The Coproduction Concept. The American Review of Public Administration, 14, 105-118. Sieber, R. E. & Johnson, P. A. 2015. Civic Open Data at a Crossroads: Dominant Models and Current Challenges. Government Information Quarterly, 32, 308-315. Voorberg, W. H., Bekkers, V. J. J. M. & Tummers, L. G. 2015. A Systematic Review of Co- Creation and Co-Production: Embarking on The Social Innovation Journey. Public Management Review, 17, 1333-1357. Wasko, M. M. & Faraj, S. 2005. Why Should I Share? Examining Social Capital and Knowledge Contribution in Electronic Networks of Practice. Mis Quarterly, 35-57. Whitaker, G. P. 1980. Coproduction: Citizen Participation in Service Delivery. Public Administration Review, 240-246. Zuiderwijk, A., Janssen, M. & Dwivedi, Y. K. 2015. Acceptance and Use Predictors of Open Data Technologies: Drawing Upon the Unified Theory of Acceptance and Use of Technology. Government Information Quarterly, 32, 429-440. Zwass, V. 2010. Co-Creation: Toward A Taxonomy and An Integrated Research Perspective. International Journal of Electronic Commerce, 15, 11-48. 56 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FORM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštna r, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Digital Coaching to Build Sustainable Wellness Routines for Young Elderly 6 CHRISTER CARLSSON & PIRKKO WALDEN Abstract Our focus is on digital wellness services for the “young elderly” (the 60-75 years old) age group. Wellness services will help young elderly people to improve and maintain their independence and their functional capacity. Digital coaching will help the users to build good and effective wellness routines and to sustain and develop them for better health. Potential early adopter groups are identified and the functionality of digital coaching for wellness services is worked out. Keywords: • Digital coaching • Digital wellness services • Wellness • Young elderly • Ageing population • CORRESPONDENCE ADDRESS: Christer Carlsson, Institute for Advanced Managements Systems Research, Joukahaisenkatu 3-5 A, 20520 Turku, Finland, e-mail: christer.carlsson@abo.fi. Pirkko Walden, Institute for Advanced Managements Systems Research, Joukahaisenkatu 3-5 A, 20520 Turku, Finland, e-mail: pirkko.walden@abo.fi. https://doi.org/10.18690/978-961-286-043-1.6 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 58 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Carlsson & P. Walden: Digital Coaching to Build Sustainable Wellness Routines for Young Elderly Background The proportion and socioeconomic relevance of ageing citizens is already high in most EU countries and there is growing political pressure to find trade-offs between the costs and the sub-stance of the care programs. The young elderly (the 60-75 years old) age group represents 18-23 % of the popu-lation in most EU countries; this is a large segment of the population that according to recent statistical estimates will be about 97 million EU citizens by 2020. For ex-ample, this age group will represent 22.6 % of the Finnish population by 2020 and has already reached 1.7 million in Sweden (2015) and 10 million in Italy (2016) (WHO 2014). Furthermore, given their income level and accumulated wealth, the young elderly represents very large and growing markets for digital wellness ser-vices, especially in higher per capita income EU countries. This demographic trend has clear economic and scientific implications (cf. UN 2014).The opportunities and challenges offered by the young elderly market in most EU countries, is a market that so far mostly has been ignored by mobile service developers and providers, offering progressive companies new areas for expansion across the EU and beyond. It also provides fertile ground for collaborative research as it offers potential for researchers to work to find innovative solutions for large user groups, testing and anticipating the benefits and impacts of deploying digital wellness services among the young elderly. We have seen the need to build an industry/research collaboration program to work out the means to build sustainable wellness routines for young elderly that would (i) be progressive and innovative enough to get their interest, (ii) be adaptive and use-ful enough for their individual needs to get adopted as part of daily routines, and (iii) be flexible and meaningful enough for the users and their changing context so that wellness routines would become sustained and con-tribute over time to better health and quality years for the ageing population. The program, which has been worked out in both a national and a H2020 version, is called Digital Wells and has the ambition to help form and support interventions in the daily routines of young elderly so that the interventions form wellness routines. In turn, these routines will help to preserve physical, cognitive, mental and social wellness for the young elderly and help to build the basis for healthier elderly years. To make the interventions usable, practical and sustainable a virtual coach – VAIDYA – has been designed to ease and support the adoption of digital well-ness services among the young elderly and to pave the way for some quickest possible go-to-market initiatives (VAIDYA is an acronym for Virtual Assistance for Intelligent Digital wellness services for Young elderly Autonomy; Vaidya (Sanskrit: वैद्य) is a Sanskrit word meaning "physician"; Pranabhisar Vaidya - the ones who protect lives by curing diseases and exhibits complete knowledge theoretically as well as practi-cally (Wikipedia)). 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 59 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Carlsson & P. Walden: Digital Coaching to Build Sustainable Wellness Routines for Young Elderly Introduction The society needs to have a strategy and priorities for the young elderly which are – and need to be – different from the strategy and priorities for the senior (75+ years old) age group. A majority of the young elderly are healthy, active and socially in-teractive and do not require much intervention or support from the health and social care systems of the society. The logic behind working out digital wellness services for the young elderly is that improved health in this age group will significantly raise the probability for continued improved health in the senior age group, for which ill-health among large numbers of citizens turns out to be very expensive (in Finland the health care costs for the 65+ age group was 3.8 B€ in 2014; statistics show that a Finnish citizen on average spends 80% of their lifetime health care costs during the last 10 years of his/her life) (Statistics Finland 2014). We use wellness (which is more precise than well-being) as the target concept as wellness will tackle different aspects of functional impairment. The WHO defines wellness as “the complete mental, physical as well as social well-being of a person or groups of persons in achieving the best satisfying or fulfilling life and not merely the absence of disease or any form of infirmity (WHO 2014). There has been lively debate over the years about the dimensions of wellness; UCR [12] has compiled the following seven dimensions (here abbreviated):  Social Wellness is the ability to relate to and connect with other people in our world.  Emotional Wellness is the ability to understand ourselves and cope with the challenges life can bring.  Spiritual Wellness is the ability to establish peace and harmony in our lives.  Environmental Wellness is the ability to recognize our own responsibility for the quality of the air, the water and the land that surrounds us.  Occupational Wellness is the ability to get personal fulfilment from our jobs or our chosen career fields while still maintaining balance in our lives.  Intellectual Wellness is the ability to open our minds to new ideas and experiences that can be applied to personal decisions, group interaction and community betterment.  Physical Wellness is the ability to maintain a healthy quality of life that allows us to get through our daily activities without undue fatigue or physical stress. Adams (2003) and Els & de la Rey (2006) show the need for holistic wellness models and have tested this approach with a large empirical study. Here we will avoid any conceptual debate and use the following definition: wellness – to be in sufficiently good shape of mind and body to be successful with all requirements of everyday routines. The choice of wellness instead of health has the benefit that we are not dependent on access to health data that is strictly regulated in most EU countries with confidentiality and privacy limitations. 60 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Carlsson & P. Walden: Digital Coaching to Build Sustainable Wellness Routines for Young Elderly In this paper we will operate with wellness in two dimensions - intellectual wellness and physical wellness. There are of course challenges for introducing digital wellness services; the first chal- lenge is that common wisdom has it that young elderly do not have smartphones. Statistics now show that smartphones are becoming affordable general purpose instruments and will be even more so by the year 2020 (the mobile connection sub- scriptions are more than 100% of the population in most EU countries; the propor-tion of smart phones is closing on 70% in several EU countries). Recent statistics (http://www- teleforum-ry.fi) shows that the number of smartphones in Finland was 6.029 million in 2016 (about 73 % of the young elderly had a smartphone, cf. sec-tion 2); on an average Finnish consumers had 20 apps installed on their smartphones, of which 4 were paid (less than the EU average). A second challenge is the doubt that digital wellness services will be at all attractive to the young elderly; this follows on a belief we have found in the market for mobile value services (Bouwman et al. 2008, 2014, Carlsson & Walden 2012, 2014 )that (i) elderly people will not learn how to use services on mobile phones, (ii) there is no real use for mobile services in their daily routines, (iii) advanced technology should be developed for young people – and (iv) if elderly people use the services it will create the wrong brand image for the service developers. We have now been run-ning a research and development pro-gram for digital wellness services 2014-17 with support from two associations for elderly with more than 100 000 members; our findings show that the mobile service market beliefs are misconceptions. A third challenge is to work out (i) empirically verifiable results on the intervention with digital wellness services, (ii) valid, theory-based results on how the design of digital wellness services will match the multiple wellness criteria, and (iii) empirical verification on how digital wellness services will help reduce functional impairment. There are several research methodologies avail-able to meet this challenge; here we will summarize the three methodologies we are using. Action research has been one of the key directions of service design and work with information systems (Baskerville 1999) for a couple of decades and would in our present case tackle problems with the development and implementation of digital artefacts. The development work is often described as co-creative (Gronroos 2008) – “to find solutions that work and to not care too much about scientific precision”. Design science is another possibility; this is fundamentally a problem solving para-digm with roots in engineering and science and is working out designs in order to find ways to tackle real-world problems. Design science research is described as a paradigm in which a designer answers questions relevant to human problems via the creation of innovation artefacts that will contribute new knowledge (Hevner et al. 2010, Lahrmann et al. 2011, Mettler et al. 2010). The designs build on an under-standing of what is needed to deal 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 61 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Carlsson & P. Walden: Digital Coaching to Build Sustainable Wellness Routines for Young Elderly with the problems; the design is both a process (a set of activities) and a product (called an artefact) and both can be validated and verified to be logically consistent and technically free of errors. Action design research (ADR) (Sein et al. 2011) found that design science is too technologically oriented and is not paying enough attention to the organisational or user context of the artefacts. The ADR works with digital artefacts that are ensem-bles shaped by the user context both when designed and developed and when used. The ADR deals with the dynamics and the complexity of the context – in our case the interventions to create wellness routines - that are problems for engineering-inspired methods; we use the ADR in our research program. The fourth challenge is the realisation that we cannot just create digital services and everything will then take care of itself. This shows that we need to support the building of an infrastructure (typically of SMEs) for design, development, implemen-tation, commercialisation and maintenance; the approach that we propose is to build an ecosystem of service and infrastructure developers and providers and to support them with theory and methodology for agile business SCRUM processes (Bouwman et al. 2014). The paper has been structured in the following way: in section 1 we gave the back-ground and in section 2 the key definitions and a summary of the methodology; in section 3 we summarize results from a study of the acceptance and use of mobile apps and attitudes to wellness among young elderly on the Åland islands; in section 4 we introduce the principles of digital coaching and synergistic hybrid wellness solu-tions; section 5, finally, gives a summary and some conclusions as a basis for the continued work on wellness services. Young Elderly on Mobile Apps and Wellness We will start by addressing two of the challenges we identified (“young elderly do not have smartphones” and “it is doubtful that digital wellness services will be at all attractive to the young elderly”). In a recent project we cooperated with the associ-ation for elderly in the city of Mariehamn (in the Åland Islands) and asked them to invite their young elderly to participate in a survey in the fall 2015; we collected 101 usable answers (26.6 % response rate) (see Carlsson & Walden 2016, Carlsson & Carlsson 2016, for details). The proportion male/female is 44.6/54.5%; 83.1% of the respondents belong to the young elderlly, and a further 14.9% are a bit older; 65.3% are married and 14.9% are widowed; 77.2% have a university or technical/commercial degree (uni-versity education is rather rare for this age group, which is why we combined it with the more common second level degrees), 20.8% have a basic education. 62 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Carlsson & P. Walden: Digital Coaching to Build Sustainable Wellness Routines for Young Elderly In the sample 75.2% are retired and 23.8% are working full- or part-time or are carrying out voluntary work; the most typical annual incomes before tax is < 30 k€ (51.5%), 30- 40 k€ (19.9%), 40-50 k€ (9.9%) and >50 k€ (17.8%). These profiles are typical for the Åland Islands and are representative for their group of young el-derly; here we will use these profiles as a snapshot of the young elderly – we will add to the profiles in the following to get a fuller description of the potential users of digital wellness services. As we plan to run the digital wellness services over smartphones we need to find out how frequent they are in the sample; we asked about the phones in use and found out that a majority (about 73%, but not all) use smartphones; this was con-firmed by the result that 72.9% of the respondents use mobile apps for navigation, weather forecasting, Internet search, etc. (requires smartphones). We added to the profiles of the young elderly by asking how useful, easy to use and valuable mobile apps are for them following Davis (1989) and Venkatesh et al.(2012) structure of questions. For the about 70 respondents that use mobile apps we found that the adoption of mobile apps scored high on a 5-grade Likert scale on several items:  mobile apps are useful in my daily life [4.32];  I will continue to use mobile apps [4.19];  mobile apps help me to carry out my tasks faster [4.08];  using mobile apps helps me to carry out important tasks [3.94];  I can use mobile apps without assistance [3.91];  I have the necessary knowledge to use mobile apps [3.87];  It is easy for me to learn to use mobile apps [3.79];  I can use the mobile apps I need with the phone I have [3.75]. The results give us some insight to build on: (i) the young elderly use of smartphones is sufficient to launch digital wellness services; (ii) the young elderly are confident users of mobile apps, which is a prerequisite for getting the wellness ser-vices adopted. This settles the first challenge (“young elderly do not have smartphones”) and as mobile apps are digital services we can also claim that the second challenge is settled for the sample in the Åland Islands. The research contin-ues, but so far we can stick to the proposal that digital wellness services could be developed and offered on smartphones for the young elderly. Then we moved on to get an understanding of what perceptions the young elderly have of two wellness dimensions, physical and intellectual wellness. A number of proposals scored high on a 6-grade forced scale (101 respondents):  intellectual challenges are important for my wellbeing [4.91];  I get sufficient intellectual stimulation from my everyday life [4.61];  my physical health has been good compared to people around me [4.38];  my resistance to illness is good [4.24]; 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 63 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Carlsson & P. Walden: Digital Coaching to Build Sustainable Wellness Routines for Young Elderly  the amount of information I have to process in my daily life is suitable for me (not too much, not too little) [4.20];  I expect my physical health to remain good [4.14];  I expect my physical health to deteriorate with increasing age [3.94]. The results we got show that the young elderly have clear perceptions of the two wellness dimensions; thus it makes sense to develop digital wellness services. In a next step we intend to cover also the emotional and social wellness dimensions. Then we need to find out if there are any characteristics that could single out the most promising potential users as we want to get good, strong initial adoption of the wellness services. Our idea was that relations between socio-economic charac-teristics, attitudes toward the use of mobile applications and perceptions about wellness would help us to identify promising potential users; details can be found in Carlsson & Walden (2016) and Carlsson & Carlsson (2016). We first run a factor analysis with 19 statements on mobile applications and 11 statements on wellness. The results gave an indication for possible sum variables (cf. Table 1) which were tested for reliability by calculating Cronbach’s alpha coeffi-cients; the target value (α > 0.7) was met for the constructed sum variables (their names show the groupings we found). A non-parametric Mann-Whitney U-test was run in order to explore possible differ-ences be-tween gender, age (combined to two categories: –69 years; 70–), highest level of education (–higher vocational school; technical/commercial degree + univer-sity), marital status (single; in a relationship), current work status (working (full, to some extent, volunteer); retired), annual in-come (–30000 €; 30001–) and the level of experience of using mobile applications (routine; experienced). We found that there were significant differences in the positive attitudes to using mobile apps between the two age groups (cf. Table 1); the younger age group was more positive (cf. mo-bile_ apps_ positive). The more educated group was experi-enced in using mobile apps (cf. mo-bile¬_apps_experienced). The more educated group was socially active in using mobile apps (cf. mobile_apps_social). The group with higher income gave more value to mobile apps (cf. mo-bile_apps_value). Males with higher income had a positive perception of (their) physical well-ness (cf. physical_wellness_positive). The group with a more active work status had a posi-tive perception of their intellectual wellness (cf. intellectual_wellness_positive). We need of course to take some care with making conclusions from the collected data; the sample of 101 respondents was not fully randomly selected and the survey was not fully reliable as we had no possibility to check the circumstances under which the questions were answered. Nevertheless, the results are interesting as the young elderly have not been much studied in this way before. 64 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Carlsson & P. Walden: Digital Coaching to Build Sustainable Wellness Routines for Young Elderly The insight we gained from the Åland island material relative to our overall vision, (i) to get young elderly interested in digital wellness services, (ii) to get them to adopt them and (iii) to make the services part of their daily routines, we should start with young elderly, who are,  Active in full time/part time/volunteer work & advanced users of mobile apps & < 70 years  Experienced users of mobile apps & more educated  Males with good physical health & income > 30 k€ per year  More educated & find mobile apps good value for the price 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 65 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Carlsson & P. Walden: Digital Coaching to Build Sustainable Wellness Routines for Young Elderly Table 1: Reliability analysis for six sum variables, obtained Cronbach’s alpha (all items included, *-marked item removed; used value underlined) and corrected Item-Total Correla-tion 66 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Carlsson & P. Walden: Digital Coaching to Build Sustainable Wellness Routines for Young Elderly Digital Coaching through Digital Fusion In early work with the young elderly (Carlsson & Walden 2014, 2015) we found that the interest in using digital well-ness services on smartphones started to decrease after 2-3 months of continued use; when the services were combined with activity bracelets the period of active use doubled to about 4-6 months. These are early indicators and have something to do with the fact that there is a one-time cost for the activity bracelets (the smartwatches cost around 350 €, the more advanced bracelets 120-250 €, the cheap bracelets 40-50 €). This follows the pattern, that if you have paid for a bracelet you keep up the wellness routines in order to get value for the money you have spent. In an Insight report (http://www.nuance.com) it was found that 95% of applications on smartphones are abandoned within 1 month of download; Gartner found that the abandonment rate of smartwatches is 29%, and 30% for fitness trackers in a study with more than 9500 participants in Australia, U.K. and the U.S. This creates a dilemma for building wellness routines. In order to get health effects among the young elderly the wellness routines need to be sustained for at least 3-5 years, the ideal would be to keep them up for 15-20 years, i.e. well into senior years; there is a need to build variety and advanced, intelligent functionality into the digital wellness services. A way to deal with this dilemma is coaching, i.e. to make variety and innovative, advanced functionality part of the digital wellness services, which will keep the ser-vices interesting. The material we worked out in section 2 already gave us some insight about the young elderly and this should be a starting point for giving the us-ers individual advice and guidance on how to improve their wellness routines (coach-ing) as a function of how advanced they are and what their goals and objectives are. Personal trainers/coaches have been proposed but will be too expensive. We have worked out the functional requirements of the digital coach called VADIYA:  The coach builds on digital fusion: fusion of heterogeneous data sets ((i) in- dividual data, (ii) group/cluster data, (iii) big user group data) from 100+ ap- plications and devices; algorithms to build information from data sets; fusion of sets of information with computational intelligence methods; ontology (fuzzy, soft) to build knowledge from sets of information; approximate rea-soning and soft computing for knowledge fusion  Coaching is built with data, information and knowledge of different granulari- ties (i) context dependent, (ii) individual wellness, goals, (iii) “good practice”  Coaching is adaptive to national language, cultural habits, changes in legisla- tion  VAIDYA coaching is continuous and is built to change dynamically; should be maintained, supported, enhanced, changed, developed (sometimes radically)  VAIDYA is unobtrusive technology: virtual coach on smart phone + omnivore platform that will have 100+ interface solutions for sensor data + data from wearables + new innovations 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 67 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Carlsson & P. Walden: Digital Coaching to Build Sustainable Wellness Routines for Young Elderly  VAIDYA builds on ideal wellness profiles that are worked out; for individuals, for groups/clusters of similar service users, for countries with similar cultures and traditions, etc.; deviations from the ideal profiles worked out with (fuzzy) MCDM methods to offer recommendations of how to make optimal steps towards the ideal profiles A digital personal coach was proposed by Schmidt et al. (2015) to help fitness tracker users to personalize their training. The coaching builds on partially observa-ble Markov processes and Markov decision processes that use data from the fitness trackers; when reported the coach was in first prototype development. The imple-mentation and use of Markov processes may offer some challenges. The digital fusion is needed as data will be multi-dimensional in each one of the four different wellness aspects. Some of the data can be collected with sensors (physical and social wellness) other parts will need a gamification interface and support (cog-nitive and mental wellness) (Hamari et al. 2014). Part of the data needs to be in real time; part of it can be daily and weekly summaries. We will need digital fusion to operate with heterogeneous data from different contexts and for different forms of wellness. All of it should be presented in an understandable and tailorable form for young elderly users, which is known as knowledge fusion. The fusion methods and technology will add value to the digital wellness services:  data fusion offers summary statistics from (several) apps and devices, goal attainment over days, weeks, months  information fusion produces trends, deviations from trends, targets and tar-get revisions; shows levels usually reached by similar service users  knowledge fusion compiles activities to combine, add, enhance information for advice & support; tailors enhanced activity programs An illustration of the differences between data, information and knowledge in the wellness con-text was collected from a Polar A360 activity bracelet and is shown in fig. 1. In work with young elderly groups (Carlsson & Walden 2014, 2015) discussion quite often focused on wellness as a sum of different activities and it was pointed out that “my best (individual) wellness is not achieved by maximizing my physical wellness, but by finding some smart combination of intellectual, physical and social wellness”. Further study showed that wellness could be synergistic, i.e. that combinations of different forms of wellness could be “more than the sum of the individual wellness forms”. Orienteering can produce synergistic wellness: (i) it offers cognitive and in-tellectual challenges in finding the optimal paths through the forest; (ii) it is one of the physically most demanding sports; (iii) the “family of orienteers” is closely knit - also internationally – and promotes social wellness. 68 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Carlsson & P. Walden: Digital Coaching to Build Sustainable Wellness Routines for Young Elderly Similar versions of synergistic wellness activities can be found among the young el-derly – con-certs offer intellectual, emotional and social wellness; volunteer help and support of senior citizens offer physical, emotional and social wellness; singing in choirs offer emotional and social wellness, and so on. The digital coach VADIYA should provide advice and support for synergistic wellness activities - and for hybrids of wellness activities that work out innovative and some-times unique combinations that would offer new challenges for the young elderly users. There is of course the question of time for various activities and support for trade-off between wellness activities, i.e. how to get the best wellness value for time allocated to various activities (which sounds a bit like “productivity of working time”). Figure 1: Data, information and knowledge fusion Summary and Conclusions We noted that the proportion and socioeconomic relevance of ageing citizens is high in most EU countries but that the young elderly has been ignored by the politicians worrying about the ageing population as they are “too active, and in too good shape” to request any budget-funded support from the society. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 69 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Carlsson & P. Walden: Digital Coaching to Build Sustainable Wellness Routines for Young Elderly Thus there are two cases of missed opportunities: (i) there is a potential market for digital (mobile) services that represents 18-23% of the population in most EU coun-tries; the young elderly are estimated to be 97 million by 2020 in the EU countries (a market that should get some business attention); (ii) interventions that create sus-tainable wellness routines among the young elderly will reduce the probability for serious illness among the senior citizens. We use wellness as the target concept – to be in sufficiently good shape of mind and body to be successful with all requirements of everyday routines. In the study in the Åland islands we could identify some first groups of supportive users of digital wellness services; the first group is young elderly who are active in full time/part time/volunteer work and are experienced users of mobile apps and are < 70 years; the second group is young elderly who are experienced users of mobile apps and are more educated; the third group is young elderly who are males with good physical health and an income > 30 k€ per year; the fourth group is young elderly who are more educated and find mobile apps good value for the price. Work with young elderly groups pointed to a dilemma: interest for mobile and digital services tends to diminish rather quickly (in 3-5 months, with activity bracelets in 4-6 months) but well-ness routines need to be sustained for at least 3-5 years to give positive health effects. We proposed to introduce digital coaching as part of the digital wellness services to make the use of them sustained. There is no doubt that much work remains to get wellness routines built and adopted by the young elderly. References Adams, T. B. (2003), The Power of Perceptions: Measuring Wellness in a Glob-ally Acceptable, Philosophically Consistent Way, Wellness Management. www.hedir.org Baskerville, R.L. (1999) Investigating Information Systems with Action Re-search, Communications of the Association for Information Systems, 2(19), 2-31. Bouwman, H., Carlsson, C., de Reuver, M., Hampe, F. & Walden, P. (2014), Mobile R&D Prototypes – What is Hampering Market Implementation, International Journal of Innovation and Technology Management, 11(1) DOI:10.1142/S0219877014400033. Bouwman, H., Vos, H. & Haaker, T. (2008), Mobile Service Innovation and Business Models, Springer, Berlin-Heidelberg. Carlsson, C. & Walden, P. (2016), Digital Wellness Services for the Young Elderly – A Missed Opportunity for Mobile Services, JTAECR, 11( 3), 20-34. Carlsson, C. & Carlsson, J. (2016), Interventions to Form Wellness Routines Among Young Elderly, Proceedings of the 29th eBled Conference, Digital Wellness Track, 406-418 Carlsson, C. & Walden, P. (2015), Digital Wellness for Young Elderly: Research Meth-odology and Technology Adaptation, Proceedings of the 28th eBled Conference, eWellness section, Bled 2015, 239-250. Carlsson, C. & Walden, P. (2014), Performative IS Research - Science Precision versus Practice Relevance, Proceedings of PACIS 2014, Section 9-7 #575, 12 pp. 70 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Carlsson & P. Walden: Digital Coaching to Build Sustainable Wellness Routines for Young Elderly Carlsson, C. & Walden, P. (2012), From MCOM Visions to Mobile Value Services; Roger Clarke, Andreja Puchar & Joze Gricar (eds.), The First 25 Years of the Bled eCon-ference, University of Maribor, Bled, 69-91. Davis, F. D. (1989), Perceived Usefulness, Perceived Ease of Use and User Acceptance of Information Technology, MIS Quarterly, 13(3), 319-340. Els, D.A. & de la Rey, RP (2006), Developing a Holistic Wellness Model, SA Journal of Human Resource Management, 4 (2), 46-56. UCR report on wellness dimensions, https://wellness.ucr.edu/seven_dimensions.html Gartner report on wearables, http://www.gartner.com/newsroom/id/3537117 Gronroos, C., (2008), Service logic revisited: who creates value? And who co-creates? European Business Review, 20 (4), 298–314. Hamari, J., Koivisto, J. & Sarsa, H. (2014), Does Gamification Work? – A Literature Re-view of Empirical Studies on Gamification, Proceedings of HICSS 2014, IEEE 2014, 3025-3034. Hevner, A. & Chatterjee, S. (2010), Design Research in Information Systems, Springer http://www.nuance.com/ucmprod/groups/enterprise/@webnus/documents/collateral/nc_020218.p df Lahrmann, G., Marx, F., Mettler, T., Winter, R., & Wortmann, F. (2011). Inductive De-sign of Maturity Models: Applying the Rasch Algorithm for Design Science Research, Service- Oriented Perspectives in DESRIST 2011. Lecture Notes in Computer Science, vol 6629, 176- 191. Springer, Berlin, Heidelberg, DOI: 10.1007/978-3-642-20633-7_13. Mettler, T., Rohner, P. & Winter, R. (2010). Towards a Classification of Maturity Mod-els in Information Systems, Physica-Verlag HD. Myers, J. E., Sweeney, T. J. & M. Witmer (2005), A Holistic Model of Wellness, http://www.mind- garden.com-/products/wells.htm Rachele, J. N., Washington, T. L., Cuddihy, T. F., Barwais, F. A. & McPhail, S. M. (2013), Valid and Reliable Assessment of Wellness Among Adolescents: Do You Know What You Are Measuring? International Journal of Wellbeing, 3(2), 162-172. Schmidt, B., Eichin, R., Benchea, S. & Meurish, C. (2015), Fitness Tracker or Digital Per-sonal Coach: How to Personalize Training, UBICOMP/ISWV’15, Osaka, Japan, 1063-1067. Sein, M.K., Henfridsson, O., Sandeep, P., Rossi, M. & Lindgren, R. (2011), Action Design Research, MIS Quarterly, 35(1) 37-56. Statistics Finland 2014, 2016, http://www.stat.fi Student Health and Counselling Services, UC Davis (2015), https:// shcs.ucdavis.edu/wellness/, retrieved March 28, 2015. Venkatesh, V., Thong, J. Y. L. & Xu, X. (2012), Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology, MIS Quarterly, 36(1), 157-178. United Nations Department of Economic and Social Affairs (2014), Population ageing and sustainable development, No. 2014/4; available at: http://www.un.org./en/development/desa/population/publications/pdf/popfacts/- Popfacts_2014-4. Pdf; retrieved March 21, 2015. World Health Organization (2014), Preamble to the Constitution, www.who.int, retrieved March 28, 2015. http://www-teleforum-ry.fi/Mobile-content-market-in-Finland-2012-2016-desk.top.pdf, retrieved February 28, 2017. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons The Relation Between Process Management and Innovation – A comparison of the IT and Manufacturing Industries 7 THOM CATS & PASCAL RAVESTEYN Abstract This study investigates whether there are major differences between process management and innovation between the IT and more traditional industries. Although both industries are quite similar, the research results show that the IT industry is more innovative in comparison to more traditional industries. The traditional industries are more risk averse towards new technologies, which makes them less innovative than the IT industry. Keywords: • Business Process Management • maturity models • innovation value chain • innovation adoption • IT industry • manufacturing • CORRESPONDENCE ADDRESS: Thom Cats, University College Cork, College Rd, University College, Cork, Ireland, e-mail: thomcats@outlook.com. Pascal Ravesteyn, HU University of Applied Sciences Utrecht, Nijenoord 1, 3552 AS Utrecht, The Netherlands, e-mail: pascal.ravesteijn@hu.nl. https://doi.org/10.18690/978-961-286-043-1.7 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 72 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Cats & P. Ravesteyn: The Relation Between Process Management and Innovation – A comparison of the IT and Manufacturing Industries Introduction During the last few years there have been many changes for organisations on a global level. Nowadays, through globalisation and the internet, markets change quicker and organisations have a limited amount of time to adopt new trends or change their business models. Therefore, the European Commission (2017) states that innovation is critical in order to improve existing products, services and processes or develop new ones that add value to an organization and increase Europe’s competitiveness on a global economic level. However, besides innovation, organizations are also focusing more and more on the efficiency and effectivity of their processes and therefore business process management (BPM) is getting more attention (Plattfaut et al., 2011; Ravesteyn et al., 2012; Gabryelczyk, 2016). BPM plays a vital role in addressing the priorities of current Chief Information Officers (CIO) because BPM is a key instrument in managing and improving organizational processes with information systems (Gartner, 2010; Plattfaut et al., 2011). Scientific studies that find that BPM maturity models support organizational performance are not new (Rosemann & de Bruin, 2005; Fisher, 2004; Davenport & Short, 1990). However recent research shows that BPM could also be an enabler to the innovation level of an organization (Vom Brocke et al., 2016). What is not described in these studies is whether there is a difference in how BPM and innovation are related between different industries. A relatively young industry such as IT might be expected to be a lot more innovative compared to more traditional industries such as manufacturing. Therefore, the objective of this study is to determine if such a difference exists. The research question for this study is as follows: What are the differences in the relation between BPM and innovation in a comparison between the IT industry and the manufacturing industry? This comparison is made in order to create a broader understanding as to whether and, if so, why the software industry is more innovative when compared to more traditional industries. To be able to analyse this research question a quantitative study is performed based on data collected in three IT companies and two manufacturing companies (in respectively the coffee and the jewellery industry). The remainder of this paper is organized as follows, the next section will discuss the literature on the main constructs in our study, followed by the research method in section 3. Section 4 continues with the results and the paper concludes with the main findings in section 5. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 73 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Cats & P. Ravesteyn: The Relation Between Process Management and Innovation – A comparison of the IT and Manufacturing Industries Literature The theoretical framework (see section 2.4, figure 1) of this study consists of three main constructs: Business Process Management Maturity (BPMM), innovation value chain (IVC) and innovation adoption (IA). In this section each of these constructs is discussed in more detail. For the literature study Google Scholar and the databases of Science Direct, Springer, and Wiley Online Library are used in combination with the following keywords: ‘BPMM and innovation’, ‘Business process management and innovation’, ‘innovation value chain’, ‘innovation adoption’, ‘innovation’, ‘process management and innovation’. The papers that were found were accordingly analysed to determine the relevancy, the findings are discussed below. 2.1 Business process management maturity Business Process Management is a management methodology that exists at different organizational levels on which processes are assessed stepwise with the goal to improve the capabilities of the organisation (van Looy et al., 2013). The maturity of BPM is studied by Rosemann & de Bruin (2005), who created one of the first widely accepted BPMM models. This model is multi-dimensional since it analyses different factors, stages and contexts (Rosemann & de Bruin, 2005). This is in line with Vom Brocke et al. (2016) whom argue that most models in BPM have a “one-size-fits-all approach”, which causes problems that will not account for the situational contexts necessary to gain benefits. Furthermore, Vom Brocke et al. (2016) state that business process management supports an organization in their innovativeness. Rosemann & de Bruin (2005) based the factors of their model on BPM critical success factors, which consist of independent and dependent variables. The assumption is that the higher the score on these variables, the higher the level of success in BPMM. Moreover, they state that an individual organisation should translate process success into the most important BPM-independent success measures. Furthermore, Rosemann & de Bruin (2005) find that there is not a standardized toolkit for every organisation to put BPMM into practice. Fisher (2004) states that a one-dimensional five-stage model for BPMM is not enough. Fisher’s (2004) model exists of two parts, the first part is referred to as the “Five Levers of Change”, which are used to assess the capabilities of an organisation. The second dimension also exists of five factors, representing the five maturity stages of BPMM. This dimension is used to measure the performance of the “Five Levers of Change”. Fisher (2004) measures BPMM by using two different measure points. In contrast, the model of Rosemann & de Bruin (2005) measures BPMM on three levels (stage, factor and scope/context). Evidence is yet to be provided to see whether a multi-factor model is superior when compared to a two-factor model. Finally, Fisher (2004) concludes that the advantages of using BPMM models for companies is that they will improve the efficiency 74 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Cats & P. Ravesteyn: The Relation Between Process Management and Innovation – A comparison of the IT and Manufacturing Industries and lower their costs which, in turn, could result in higher profits. All these advantages combined provide companies a competitive advantage. Another BPPM model is constructed by Ravesteyn et al. (2012) whom used the Capability Maturity Model Integrated (CMMI) as a foundation to establish seven maturity dimensions. The CMMI model has also been used by Rosemann and colleagues in their research (Rosemann et al., 2004; Rosemann & de Bruin, 2005; Rosemann et al., 2006). As the BPMM model by Ravesteyn et al. (2012) is extensively used to research the relation to process performance this model is applied in the conceptual model of this study, here performance is substituted with innovation. In order to measure the level of BPM maturity within an organization Ravesteyn et al. (2012) used 37 items (BPM capabilities) divided over the seven dimensions. To measure the maturity level of the 37 BPM capabilities a Likert scale from 1 (low) – 5 (high) is used. 2.2 Innovation value chain Hansen & Birkinshaw (2007) developed the innovation value chain framework. Their approach requires executives to have an end-to-end view of the innovations in their companies. Their framework will also force executives to focus on the weakest links in the innovation process of the company. The first phase is to “Generate ideas”, come up with new products or services, either from within the company or outside the company; “Convert ideas” is the second phase. At this stage the company has selected the ideas, collected the funds and started the development of the product. The third and final phase is to “diffuse” the developed product or service, this means that the developed product or service concept is used in the organisation or launched in the market. Hansen & Birkinshaw (2007) state that when a manager wishes to use these three phases of the innovation value chain the manager has to focus on six critical tasks: “Internal sourcing, Cross-unit sourcing, External sourcing, Selection, Development and Company wide spread of the idea” (Hansen & Birkinshaw, 2007, p. 122). Ganotakis & Love’s (2012) state that the company’s resources have a significant influence on the innovation process and on the growth of the company. Ganotakis & Love’s (2012), find three main implications in their research: first, the innovation value chain makes it possible to identify the factors that enable a company’s level for growth and productivity when compared to new technological based firms. Secondly, companies which develop and market disruptive innovations show fast growth leading to better productivity and performance. The third and last implication is that the innovation value chain makes it possible to identify the innovation behaviour, focusing on the important role of R&D which influences the success of innovation. Based on the studies by Hansen & Birkinshaw (2007) and Ganotakis & Love (2012) it can be concluded that the innovation value chain is a method that explains the process of innovation from generating ideas to converting ideas and subsequently its diffusion, which leads to new business opportunities in order to generate new revenues. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 75 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Cats & P. Ravesteyn: The Relation Between Process Management and Innovation – A comparison of the IT and Manufacturing Industries Furthermore, this approach also helps to draw the attention to an organisation’s strengths and weaknesses in the innovation process. 2.3 Innovation adoption Damanpour & Wischnevsky (2006) distinguish innovation-generation (as described above as part of IVC) from innovation-adopting. When organisations use innovation adoption the purpose is to change the organisation in such a way that it becomes more effective and develops a more competitive mind set, in order to adapt more easily to new trends in the market. In their research Hameed et al.’s (2012) try to determine the process of IT adoption. Moreover, Al-Jabri & Sohail (2012) developed six hypothesises to show which factors have a profound influence on IT adoption. Both studies support each other: Hameed et al.’s (2012) model provides a general overview and Al-Jabri & Sohail’s (2012) model offers a more specific focus on a few elements influencing IT adoption. In an earlier study on the adoption of internet banking, Tan & Teo (2000) concluded that subjective norms lack a significant relationship with intentions. Perceived behavioural control and attitudinal factors can be used to predict the intentions (in this case to adopt internet banking services). They describe three factors (Attitude to innovation, Subjective norms, and Perceived behavioural control) which influence someone’s or an organization’s intention to adopt a new product or service. This is similar to the study by Al-Jabri & Sohail’s (2012) in which it is concluded that the six factors together provide a solid measurement tool for innovation adoption. 2.4 Conceptual model Derived from the theory and concepts described in the literature study above, the conceptual model (figure 1) for this research consists of three main constructs: BPM maturity, innovation value chain and innovation adoption (variables). For BPM maturity, the framework has the seven dimensions with corresponding BPM capabilities (theorems) from Ravesteyn et al. (2012). The capabilities are used as input in order to develop survey questions to measure each dimension. 76 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Cats & P. Ravesteyn: The Relation Between Process Management and Innovation – A comparison of the IT and Manufacturing Industries Figure 1: Conceptual model The innovation construct in the conceptual model is split up into the two constructs innovation value chain and innovation adoption. The innovation value chain is very focused on the analysis of how innovations come up, whereas innovation adoption focuses on acceptance of the innovation by the final user or adoption of new innovations by the organization. This co-dependency results in the assumption that both theories strengthen each other. Finally, based on this reasoning, the hypothesis (H1) is that there is a positive relation between the BPM maturity and Innovation. Research Method 3.1 Data collection For this study data is used that has been collected as part of a larger research project on BPM and Innovation. For this an online survey tool was used as this makes it very convenient for the respondents to answer the questions in their own time. The data is collected across cultures and in different countries at seven companies. Three out of seven were located in The Netherlands and the other companies were located in Austria, Belgium, China and Ireland. Most of the companies are active in the software industry whereas the other companies are active in manufacturing (such as jewellery and coffee) or the finance sector. The data was collected by a team of six researchers. To ensure the data was collected in the same manner a coding manual was developed to ensure all collected data had the same definitions. In total 200 completed surveys have been collected. In all organisations 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 77 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Cats & P. Ravesteyn: The Relation Between Process Management and Innovation – A comparison of the IT and Manufacturing Industries the survey has been filled in across several departments by C-level to middle management and operational positions. 3.1.1 The questionnaire The survey was constructed by using the structure of the conceptual model. As explained above, the conceptual model shows how many items are used for every dimension of BPMM and for the two innovation constructs. The survey contained 50 questions on the main concepts, 37 questions were divided over the seven dimensions to measure the level of BPM maturity and 13 questions addressed the innovation part. For each statement a Likert scale from 1 to 5 was used to indicate whether the participants strongly disagreed, strongly agreed or stayed neutral. In addition to that, there were also some general questions concerning how knowledgeable the participants were regarding BPM, how the respondents would define BPM, and what position they had within their organisation. 3.1.2 Validity of the research instrument To analyse the validity of the constructs, a Varimax method was used within the factor analysis, which was developed by Kaiser (1958). A rotation factor analysis is the most commonly used method in this type of analysis (Abdi , 2003). The results, of the factor analysis showed that only six components were recognised for BPMM despite the fact that the BPMM construct consists of seven dimensions in the conceptual model. The variable innovation showed three components and there were only two in the conceptual model (innovation value chain and innovation adoption). Based on this analysis it could be argued that the conceptual model could benefit from adjustments, since not all components were recognised. Therefore, a second analysis was performed: the Cronbach alpha was used to determine the reliability of separate components (table 1). Tavakol & Dennick (2011) suggest in their article that a Cronbach alpha should be in the range of 0.70 to 0.95 (Nunnally & Bernstein, 1994; Bland & Altman, 1997; DeVellis, 2003). However, the recommended maximum value is 0.90 (Streiner, 2003). Furthermore, a low indication could be influenced by the number of questions asked for one item or poor interrelatedness between the items (Tavakol & Dennick, 2011). The results in Table 1 showed that all dimensions have a value above the minimum of 0.70 and did not exceed the score of 0.90, which indicated that the results of the collected data were statically reliable. 78 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Cats & P. Ravesteyn: The Relation Between Process Management and Innovation – A comparison of the IT and Manufacturing Industries Table 1: Cornbach Alpha Dimensions Cronbach's Alpha N of Items Process awareness .750 4 Process description .895 6 Process measurement .861 5 Management of processes .827 5 Process improvement .830 6 Process knowledge & resources .745 4 Information technology .884 7 Innovation value chain .841 7 Innovation adoption .735 6 3.1.3 Analysis As Cohen (1992) states that a T-test is widely used to compare means and that it also shows whether the difference between two elements is significant or not, a T-test is conducted to compare the survey results of two sets of companies (IT and manufacturing). This is done by adding three variables in SPSS: company name, industry branch and bucket. This last variable is used to define the groups. Three companies are labelled IT and two were labelled OLD (these are the manufacturer of coffee beans and that of jewellery). Analysis Results 4.1 Level of knowledge on BPM First the respondents were asked to assess their knowledge of BPM. For this they could choose between four different levels. Out of 200 respondents (group IT: 114, group OLD: 61, another 25 respondents are out of scope as they don’t fit into this classification) 35% (IT: 33%, OLD: 33%) had little to no knowledge and practical experience with BPM, 27% (IT: 32%, OLD: 21%) had some knowledge of BPM, but no practical experience, whereas 29% (IT: 29%, OLD: 34%) had some knowledge and limited practical experience with BPM (participated in 1 to 3 projects). Only 10% (IT: 6%, OLD: 11%) of all the respondents had both knowledge and practical experience with BPM (>3 projects). The percentages out of 200 respondents show that a small group of respondents was very experienced and is considered to have a high level of knowledge on BPM. Furthermore, the category OLD shows a higher percentage in this level in comparison to IT. It must be noted that the majority of respondents either had no knowledge of BPM or a limited amount of knowledge and practical experience with BPM, this might have influenced the results. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 79 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Cats & P. Ravesteyn: The Relation Between Process Management and Innovation – A comparison of the IT and Manufacturing Industries 4.2 A comparison of IT and Manufacturing Table 2 shows the mean scores for the BPM maturity dimensions between IT and OLD. The smallest difference between both groups is for measurement of process, meaning that both groups use performance indicators that assess and check processes and use this to improve processes (Ravesteyn et al., 2012). Additionally, BPM maturity dimensions’ process awareness, process description and management of processes show that IT has a higher maturity level in comparison to the companies in the OLD catagory. From these results, it can be concluded that group IT is more aware of the impact that processes, process descriptions and process owners have within their organisation and they incorporate this in their strategy (Ravesteyn et al., 2012). The results also show that group OLD has a higher level of maturity in dimensions’ process improvements and process resources and knowledge. This means that group OLD organizations try to improve their processes more often and also have a support system for process improvements in place. Group OLD also has more resources and employees with process knowledge. Finally, the information technology dimension shows a large difference between the two groups. This indicates that IT companies make more use of information technology to design and carry out processes to produce real-time measurement information in comparison to the manufacturing companies. Table 2: Comparison on BPM maturity dimensions Groups IT OLD N 114 61 Process awareness 3,4934 3,4221 Process description 3,2456 3,1639 Measurement of processes 3,3965 3,3770 Management of processes 3,3386 3,2623 Process improvements 3,1637 3,2732 Process knowledge and resources 3,2281 3,3361 Information technology 3,5288 3,1944 BPM Maturity 3,3421 3,2899 In comparison to the findings described above, the results of the T-test analysis (Table 3) only show a significant difference on information technology (.010) with 95% confidence interval of the difference. 80 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Cats & P. Ravesteyn: The Relation Between Process Management and Innovation – A comparison of the IT and Manufacturing Industries Table 3: T-Test on BPM maturity dimensions Independent Samples Test BPM dimensions Sig. (2-tailed) Mean Difference Process awareness Equal variances .525 .07129 assumed Process description Equal variances .534 .08168 assumed Measurement of Equal variances .876 .01944 processes assumed Management of Equal variances .524 .07630 processes assumed Process improvements Equal variances .305 -.10948 assumed Process knowledge and Equal variances .335 -.10800 resources assumed Information technology Equal variances .010 .33444 assumed BPM Maturity Equal variances .583 .05224 assumed Table 4, shows all means of the innovation dimensions. The results of the phases of the innovation value chain construct show that there is a small difference in regards to idea generation for both groups: both groups tend to agree that their employees are good at creating ideas on their own, but also across the organization. Furthermore, the results show that group IT has a higher mean on idea conversion whereas group OLD has a higher mean on idea diffusion. From these results, it might be concluded that group IT tends to be better in selecting, screening, and funding ideas as well as turn ideas into a minimum viable product, whereas group OLD tends to be better in getting new ideas out of the organisation. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 81 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Cats & P. Ravesteyn: The Relation Between Process Management and Innovation – A comparison of the IT and Manufacturing Industries Table 4: Comparison on Innovation IT OLD Groups N 114 61 Idea generation 3,5702 3,5628 Idea conversion 3,3392 3,2787 Idea diffusion 3,2719 3,3934 Attitude to innovation 3,6623 3,2295 Subjective norms 4,0658 4,0328 Perceived behavioural control 3,2149 2,8770 Innovation value chain 3,4286 3,4169 Innovation adoption 3,6477 3,3798 Innovation 3,5381 3,3983 The results of Table 4 also show that group IT has a higher mean on attitude to innovation and perceived behavioural control in comparison to group OLD. This shows that group IT agrees that the latest innovations benefit their organization and believe that it does not present any risk to their organization. In addition, group IT also scores higher on perceived behavioural control, which indicates that software organizations tend to use the latest innovations, but also agree to have time, money and resources to keep using these latest innovations. Furthermore, based on the subsequent T-test (Table 5), only the difference on attitude to innovation and perceived behavioural control show significance between the two categories (with 95% confidence interval). Moreover, the smallest difference between both groups is created by subjective norms, within the innovation adoption construct, which means that both groups use the latest innovation to stay competitive in the market. On top of this, customers also expect both groups to use the latest innovations. 82 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Cats & P. Ravesteyn: The Relation Between Process Management and Innovation – A comparison of the IT and Manufacturing Industries Table 5: T-test Innovation dimensions Independent Samples Test Innovation dimensions Sig. (2- Mean tailed) Difference Idea generation Equal variances assumed .951 .00733 Idea conversion Equal variances assumed .610 .06049 Idea diffusion Equal variances assumed .455 -.12151 Attitude to innovation Equal variances assumed .000 .43277 Subjective norms Equal variances assumed .794 .03300 Perceived behavioural Equal variances assumed .015 .33786 control Innovation value chain Equal variances assumed .914 .01171 Innovation adoption Equal variances assumed .008 .26788 Innovation Equal variances assumed .116 .13979 As a result of the analysis described above it is possible to conclude that group IT only differs on two dimensions of the conceptual model when compared to other companies. This indicates that, based on this analysis, IT companies tend to be more innovative than manufacturing companies. For traditional organisations this is confirmed by Rosemann (2012) and vom Brocke et al. (2016), who both suggest that BPM does not support the innovation process because it only provides methods and techniques, which support the development of a structure to analyse an organisation. Conclusion 5.1 Main findings In this research the objective was to answer the question: What are the differences in the relation between BPM and innovation in a comparison between the IT industry and the manufacturing industry? Based on our analysis of the differences between IT industry (software companies) and manufacturing (coffee and jewellery companies) we find that these industries are very similar when it comes to the relation between BPM and Innovation. They only differ significantly on the BPM dimension information technology and the innovation adoption dimensions’ attitude to innovation and perceived behavioural control. As Tan & Teo (2000) concluded in their study on mobile banking adoption that perceived behavioural control and attitudinal factors are the key elements that can be used to predict the intention to adopt a new technology, it might be concluded that the IT industry is a step ahead of 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 83 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Cats & P. Ravesteyn: The Relation Between Process Management and Innovation – A comparison of the IT and Manufacturing Industries the manufacturing industry in terms of using information technology and are also able to adapted more quickly to new innovations that are beneficial to their organization, this is something which is to be expected given the nature of IT companies. 5.2 Implications The IT industry and manufacturing industry are surprisingly similar. However, based on this study we find that the manufacturing industry should put more effort towards adopting new technologies in order to be more innovative. For example, organizations can invest more in the latest technologies that could produce real-time measurement information in support of the daily business operations. Besides, investing in new technologies it is also essential to invest in the knowledge of people in order to get the optimal performance out of the latest technologies. 5.3 Limitations A limitation of this study is that data is collected across different industries but also from different countries within Europe and China. Thus, cultural differences could have influenced the answers as Lee et al. (2002) showed that different cultures have different perceptions, therefore our scale for answering the statements could be interpreted differently. Additionally, in this study a Likert scale is used to measure all the dimensions of BPM and innovation based on the most well-known scale from 1 (strongly disagree) to 5 (strongly agree) (Likert, 1932; Gliem & Gliem, 2003), however, literature suggests that a five-point Likert scale is a minimum but it is better to have a broader scale (Allen & Seaman, 2007). Hinkin (1995) researched scale developments and within his review a majority of the researched studies used a five-point scale. Although, the second biggest group used a seven-point scale. According to these results the cultural influence on the Likert scale and the scale-size are arguable and therefore seen as a limitation in this study. Furthermore, in this study a T-test is conducted to investigated the significant differences based on the means between two constructs. As there are also other techniques available to analyze the data, this is also considered as a limitation. 5.4 Recommendations for future research This study has gone some way towards enhancing the understanding of the relationship between BPM and innovation. The conceptual model still needs some refinement because the factor analysis only recognised six out seven BPM dimensions and for innovation three instead of two dimensions. Moreover, more research is required to improve the understanding of the relationship between BPM and innovation within and between different organizations and sectors as well as across cultures. 84 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Cats & P. Ravesteyn: The Relation Between Process Management and Innovation – A comparison of the IT and Manufacturing Industries References Abdi , H. (2003). Factor rotations in factor analyses. Encyclopedia for Research Methods for the Social Sciences. Thousand Oaks: Sage. Retrieved from utdalles.edu: https://www.utdallas.edu/~herve/Abdi-rotations-pretty.pdf Al-Jarbi, I., & Sohail, M. (2012). Mobile banking adoption: Application of diffusion of innovation theory. Journal of Electronic Commerce Research, 13(4), 379-391. Allen, I., & Seaman, C. (2007). Likert scales and data analyses . Quality progress, 40(7), 64. Bland, J., & Altman, D. (1997). Statistics notes: Cronbach's alpha. BMJ, 314-275. Chen, L. (2008). A model of consumer acceptance of mobile payment. International Journal of Mobile Communications, 6(1), 32-52. Cohen, J. (1992). Statistical power analysis. Current directions in psychological science, 1(3), 98- 101. Damanpour, F., & Wischnevsky, J. (2006). Research on innovation in organizations: Distinguishing innovation-generating from innovation-adopting organizations. Journal of Engineering and Technology Management, 23, 269-291. Davenport, T., & Short, J. (1990). The new industrial engineering: information techonology and business process redesign. MIT Sloan Management, 4, 11-27. DeVellis, R. (2003). Scale development: theory and applications: theory and applications. Thousand Oaks: Sage. European Commission. (2017, 2 6). Innovation. Retrieved from ec.europa.eu: https://ec.europa.eu/growth/industry/innovation_en Fisher, D. (2004, September). The Business Process Maturity Model A Practical Approach for Identifying Opportunities for Optimization. Retrieved from bptrends.com: http://www.bptrends.com/publicationfiles/10- 04%20ART%20BP%20Maturity%20Model%20-%20Fisher.pdf Gabryelczyk, R. (2016). Does Grade Level Matter for the Assessment of Business Process Management Maturity? Naše gospodarstvo/Our Economy, 62(2), 3-11. Ganotakis, P., & Love, J. (2012). The Innovation Value Chain in New Technology-Based Firms: Evidence from the U.K. Journal of Product Innovation Management, 29(5), 839-860. Gartner Inc. (2010). Leading in Times of Transition: The 2010 CIO Agenda. Egham, UK: Egham. Gliem, R., & Gliem, J. (2003). Midwest Research-to-Practice Conference in Adult, Continuing, and Community Education. Calculating, interpreting, and reporting Cronbach’s alpha reliability coefficient for Likert-type scales (pp. 82-88). Columbus : The Ohio State University. Hameed , M., Counsell, S., & Swift, S. (2012). A conceptual model for the process of IT innovation. Journal of Engineering and, 29, 358 - 390. Hansen, M. T., & Birkinshaw, J. (2007). The innovation value chain . Harvard Business Review, 121 -130. Hinkin, T. (1995). A review of scale development practices in the study of organizations . Journal of management , 21(5), 967-988. Kaiser, H. (1958). The varimax criterion for analytic rotation in factor analysis. Psychometrika, 23, 187-200. Lee, J., Jones, P., Mineyama, Y., & Zhang, X. (2002). Cultural differences in responses to a Likert scale. Research in nursing & health, 25(4), 295-306. Likert, R. (1932). A Technique for the Measurement of Attitudes. Archives of Psychology, 1932, 140(55), ND. Nunnally, J., & Bernstein, L. (1994). Psychometric theory. New-York: McGraw-Hill Higher, INC. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 85 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Cats & P. Ravesteyn: The Relation Between Process Management and Innovation – A comparison of the IT and Manufacturing Industries Plattfaut, R., Niehaves, B., Pöppelbuß, J., & Becker, J. (2011). DEVELOPMENT OF BPM CAPABILITIES – IS MATURITY THE RIGHT PATH? European Conference on Information Systems (p. nd). nd: Association for Information Systems. Ravesteyn , P., Zoet, M., Spekschoor, J., & Loggen, R. (2012). Is There Dependence Between Process Maturity and Process Performance? Communications of the IIMA, 12(2), 65-80. Rosemann, M. (2012). The three drivers of innovation - what is related BPM/EA readiness? Retrieved from QUT: http://eprints.qut.edu.au/51096/ Rosemann, M., & de Bruin, T. (2005, February). Application of a Holistic Model for determining BPM maturity. Retrieved from bptrends.com: http://www.bptrends.com/publicationfiles/02- 05%20WP%20Application%20of%20a%20Holistic%20Model-%20Rosemann-Bruin%20- %E2%80%A6.pdf Rosemann, M., & de Bruin, T. (2005). Towards a business process management maturity model. Retrieved from eprints.qut.edu.au: http://eprints.qut.edu.au/25194/1/25194_rosemann_2006001488.pdf Rosemann, M., de Bruin, T., & Hueffner, T. (2004). A model for business process management maturity . Conference Proceedings of ACIS 2004. Hobart, Tasmania, Australia, University of Tasmania. Rosemann, M., de Bruin, T., & Power, B. (2006). A model to measure business process management maturity and improve performance. In J. Jeston, & J. Nelis, Business process management (pp. 299-315). London: Butterworth-Heinemann. Streiner, D. (2003). Starting at the beginning: an introduction to coeffecient alpha and internal consistency. Journal of personality assesment, 99-103. Tan , M., & Teo, T. (2000). Factors Influencing the Adoption of. Journal of the Association for Information Systems, 1-44. Tavakol, M., & Dennick, R. (2011). Making sense of Cronbach's alpha . International Journal of Medication Education , 53-55. van Looy, A., de Backer, M., Poels, G., & Snoeck, M. (2013). Choosing the right business process maturity model. Information & Management, 50(7), 466-488. vom Brocke, J., Zelt, S., & Schmiedel, T. (2016). On the role of context in business process management. International Journal of Information Management, 36(3), 486–495 86 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Content Analysis in Support of Critical Theory Research: How to Deliver an Unwelcome Message Without Being Shot 8 ROGER CLARKE Abstract The notion that the powerful shoot messengers who bear unwelcome messages goes back to at least Plutarch and perhaps as far as Sophocles. Researchers whose work is adjacent to, rather than directly within, the disciplinary mainstream, may at times feels that this applies even in academic disciplines. This paper reports on a journey undertaken in order to achieve publication of a critique of papers published in a Special Issue of a leading eCommerce journal. The literature on content analysis was first examined, with particular reference to a range of approaches to literature reviews. Conventional, directed, summative and computational content analysis techniques were considered, and exemplars in the IS literature identified. Because the critique has been undertaken in the critical theory research tradition, the role of criticism in research was also reviewed. The findings enabled refinements to be made to the protocol used for conducting the content analysis, together with strengthening of the robustness of the paper's research method section and improvements to the expression of the research findings. Keywords: • Qualitative Research • Literature Review • Hermeneutic Literature Review • Critical Discourse Analysis • CORRESPONDENCE ADDRESS: Roger Clarke, Principal, Xamax Consultancy Pty Ltd, 78 Sidaway St, Chapman ACT 2611, Canberra, Australia, Visiting Professor, Research School of Computer Science, ANU, Canberra, Acton ACT 2601, Canberra, Australia, Visiting Professor, UNSW Law, The Law Building F8, UNSW Australia, Union Rd, Sydney NSW 2052, Australia, e-mail: Roger.Clarke@xamax.com.au. https://doi.org/10.18690/978-961-286-043-1.8 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 88 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Clarke: Content Analysis in Support of Critical Theory Research: How to Deliver an Unwelcome Message Without Being Shot Introduction This paper reports on experience gained during a research project. The project involved the use of a new body of theory to critique the papers in a Special Issue of a leading eCommerce journal. The resulting paper was submitted to the same journal, and rejected. The grounds were a combination of claimed lack of robustness of the research method and dismay about the fact that the Special Issue papers had been subjected to criticism. I found both of these grounds bewildering. The research method had been carefully prepared, had been previously applied and the results published, and it was, I considered, suitably documented. Moreover, the suggestion that papers should not be subjected to criticism sounded to me like the antithesis of the scientific method to which the journal and the management disciplines generally claim to aspire. I accordingly set out on a deeper study of meta-questions that were affecting the project. What guidance is available in relation to secondary research whose raw data is published academic papers? What particular approaches need to be adopted when the theory-lens through which the observation is being performed arises from critical theory research? What guidance exists for expressing the outcomes of research of this nature? This paper's objective was accordingly to enhance the publishability of the underlying research, by grounding the content analysis technique more firmly in the research methods literature, demonstrating the appropriateness of constructive criticism of published works, and improving the expression of the results. The paper is structured as follows. Brief explanations are provided of the underlying theory, the Special Issue to which it was applied, the research method adopted, and key aspects of the review process. A series of investigations is then outlined, involving searches of relevant methods literatures. This encompasses several variants of literature reviews and content analysis. The nature of criticism is discussed, and critical theory research reviewed. It is concluded that two particular techniques provide the most useful guidance on how to approach a project of this nature. The paper concludes by showing how the insights arising from the journey have enabled enhancements of the research method, and of the manner in which the method and the findings are communicated to the reader. Researcher Perspective The underlying research project adopted the particular theoretical lens of 'researcher perspective'. This was defined in Clarke (2015, 2016b) as: the viewpoint from which phenomena are observed 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 89 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Clarke: Content Analysis in Support of Critical Theory Research: How to Deliver an Unwelcome Message Without Being Shot The papers postulated that: In each research project, at least one 'researcher perspective' is adopted, whether expressly or implicitly, and whether consciously or unconsciously. The researcher perspective influences the conception of the research and the formulation of the research questions, and hence the research design, the analysis and the results. Each particular perspective is specific, not universal. Because the interpretation of phenomena depends on the perspective adopted, the adoption of any single researcher perspective creates a considerable risk of drawing inappropriate conclusions. IS researchers generally adopt the perspective of a participant in an information system (IS) – commonly the organisation that runs it, or an organisation that is connected to it, but sometimes the individuals who use it. Occasionally, researchers may adopt the perspective of an external stakeholder or 'usee', by which is meant a party who is affected by the IS but is not a participant in it. Studies of several samples of refereed publications in the IS literature have shown that a very large proportion of research adopts solely one particular perspective – that of 'the system sponsor'. By that term is meant the organisation that develops, implements or adapts a system, process or intervention, or for whose benefit the initiative is undertaken. The theory advanced in Clarke (2015, 2016b) argues firstly that the single-mindedness of IS researchers is frequently harmful to the interests of other stakeholders, but secondly that the interests of system sponsors are also badly-served by such single-perspective research. Higher-quality research will be achieved through greater diversity in single- perspective research, by dual-perspective research, and by multi-perspective research. The Critique of the Special Issue The above theory relating to researcher perspective was applied to a Special Issue of the journal Electronic Markets, on 'Personal Data Markets', which was published in Volume 25, Issue 2 (June 2015). A market is a context in which buyers and sellers discover one another and transact business, and inherently involves at least two participants, but usually considerably more participants and other stakeholders. The digital surveillance economy that has emerged since c. 2000 is a complex web of markets. Moreover, it involves vastly more capture of consumer data than has ever previously been the case, expropriation of that data for a wide variety of purposes by a wide variety of corporations, and its application to 90 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Clarke: Content Analysis in Support of Critical Theory Research: How to Deliver an Unwelcome Message Without Being Shot narrowcasting of advertisements, behaviour manipulation and micro-pricing. It would therefore appear reasonable to anticipate that projects would adopt varying researcher perspectives. In order to investigate the researcher perspectives adopted in the papers in the Special Issue, a research method was applied that had been developed and refined in several previous studies, some of them reported in Clarke (2015, 2016b). The process specification used is in Annex 1. One important aspect is the extraction of the Research Question (or in the case of constructivist approaches such as Design Science Research, the Objective). In some papers this is explicit, and in others implied, but in some it needs to be inferred. The most vital part of the study is the identification and interpretation of passages of text that disclose the perspective adopted by the researcher. Again, this may be explicit, but it is more commonly implicit, and in many cases it has to be inferred. In order to enable audit, the process includes the recording of the key passages that led to the interpretations made, and publication as Supplementary Materials of the process specification, key passages, codings and interpretations for each paper. The paper was submitted to Electronic Markets in February 2016, went through two rounds of reviews, and was rejected in January 2017. The primary grounds were "[the research article format is not] appropriate, legitimate, or even warranted", "[inadequate] description of the research method used" and "overstated criticism". Each of these was a major surprise, given that copious information was provided about the research method, and critiquing of the existing state of theory is fundamental to any discipline that claims to be scientific. It was plainly necessary for me to assume hostility on the part of reviewers, step back, and gather the information needed to convey to reviewers the appropriateness of the research method and of criticising prior published works. This led to works on content analysis in its many forms, and on the role of criticism in the IS discipline. Related Content Analysis Techniques A significant proportion of research involves the appraisal of content previously uttered by other people. This section briefly reviews categories of research technique whose focus is adjacent to the topic addressed in this paper. 4.1 Qualitative Research Techniques Qualitative research techniques such as ethnography, grounded theory and phenomenology involve the disciplined examination of content, but content of a kind materially different to refereed papers. The text may be generated in natural settings (field research), in contrived settings (laboratory experiments), or in a mix of the two 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 91 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Clarke: Content Analysis in Support of Critical Theory Research: How to Deliver an Unwelcome Message Without Being Shot settings (e.g. interviews conducted in the subject's workplace). The materials may originate as text, or as communications behaviour in verbal form (speech in interviews that is transcribed into text), as natural non-verbal behaviour ('body-signals'), or as non- verbal, non-textual communications behaviour (such as answering structured questionnaires). In other cases, text that arises in some naturalistic setting is exploited by the researcher. Commonly-used sources of this kind include social media content, electronic messages, and newspaper articles. The issues arising with analysis of these kinds of content are very different from those associated with the analysis of carefully-considered, formalised content in refereed articles. 4.2 Informal Literature Reviews A context that is more closely related to the present purpose is the examination of substantial bodies of published research. "Generally three broad categories of literature reviews can be distinguished. Firstly, literature reviews are an integrative part of any research thesis ... Secondly, literature reviews can be an important type of publication in their own right ... However, the most common form of literature review appears as a part of research publications. ... As part of research articles, literature reviews synthesize earlier relevant publications in order to establish the foundation of the contribution made by an article" (Boell & Cecez-Kezmanovic 2014, p.260). A succinct, although rather negative, description of the approach that was common until c. 2000 is as follows: "Traditional literature reviews ... commonly focus on the range and diversity of primary research using a selective, opportunistic and discursive approach to identifying and interpreting relevant literature (Badger et al., 2000; Davies, 2000). In traditional ‘narrative’ reviews, there is often no clear audit trail from primary research to the conclusions of the review, and important research may be missing, resulting in biased and misleading findings, and leading to puzzling discrepancies between the findings of different reviews" (Oakley 2003, p.23). 4.3 Systematic Literature Reviews In 2002, the Guest Editors of an MISQ Special Issue expressly set out to drive improvements in literature review techniques in IS. Their declared aim was "to encourage more conceptual structuring of reviews in IS" Webster & Watson (2002, p.xiv). The Editorial is highly-cited and appears to have had considerable impact on literature reviews published in the IS field. The conduct and presentation of literature reviews has subsequently been influenced by the 'evidence-based' movement in the health care sector. This adopts a structured approach to the task: "Systematic reviews ... synthesise the findings of many different 92 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Clarke: Content Analysis in Support of Critical Theory Research: How to Deliver an Unwelcome Message Without Being Shot research studies in a way which is explicit, transparent, replicable, accountable and (potentially) updateable" (Oakley 2003, p.23, emphasis added). It was subsequently argued within the IS literature that a "rigorous, standardized methodology for conducting a systematic literature review" was still needed within IS (Okoli & Schabram 2010), and the authors proposed the 8-step guide in Figure 1. Directly-Relevant Content Analysis Techniques The focus in this paper is on the appraisal of published research papers. In some cases, the body of work is large. For example, many researchers have studied all articles (or at least the abstracts of all articles) in large sub-sets of papers. The sampling frame is typically one or more journals, most commonly the (atypical, but leading) 'Basket of 8' IS journals. In other cases, the body of work whose content is analysed is smaller, carefully-selected collections, perhaps as small as a single article, book or journal Issue. In order to understand approved practices in this field of research, I adopted a two- pronged approach. Firstly, I searched out papers on the research technique. The findings are outlined in this section. In parallel, I identified relevant exemplars. Extracts from 10 such papers are in Annex 3. Citing Weber (1990), Indulska et al. (2012, p.4) offer this definition: Content Analysis is the semantic analysis of a body of text, to uncover the presence of strong concepts A critical aspect of content analysis is that it seeks to classify the text, or specific aspects of the text, into a manageable number of categories. In Hsieh & Shannon (2005), the following definition is adopted (p.1278): Content Analysis is the interpretation of the content of text data through the systematic classification process of coding and identifying themes or patterns The authors indicate a 7-step process which they attribute to Kaid (1989). See also vom Brocke & Simons (2008): 1. formulation of the research questions 2. sample selection 3. definition of the categories to be applied 4. specification of the coding process 5. implementation of the coding process 6. quality control 7. analysis 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 93 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Clarke: Content Analysis in Support of Critical Theory Research: How to Deliver an Unwelcome Message Without Being Shot As with any research technique, all aspects need to be subject to quality controls. Krippendorff (1980), Weber (1990) and Stemler (2001) emphasise steps 3-5 in relation to the coding scheme and its application. They highlight the importance of achieving reliability. Possible approaches include coding by individuals with strong experience in both the review of articles and the subject-matter, parallel coding by multiple individuals, review of individuals' coding by other parties, and publication of both the source materials and the detailed coding scheets, in order to enable audit by other parties. 94 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Clarke: Content Analysis in Support of Critical Theory Research: How to Deliver an Unwelcome Message Without Being Shot Figure 1: An 8-Step Guide for Systematic Literature Reviews – From Okoli & Schabram (2010) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 95 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Clarke: Content Analysis in Support of Critical Theory Research: How to Deliver an Unwelcome Message Without Being Shot Content analysis techniques exhibit varying degrees of structure and rigour, from impressionistic to systematic, and they may involve qualitative and/or quantitative assessment elements. Quantitative data may be on any of several scales: nominal, ordinal, cardinal or ratio. Data collected on higher-level scales, especially on a ratio scale, is able to be subjected to more powerful inferencing techniques. Qualitative data, on the other hand, may be gathered on a nominal scale (whereby differences are distinguished, but no ordering is implied) or on an ordinal scale (such as 'unimportant', 'important', 'very important'). Quantification generally involves measurement, most fundamentally by counting – which raises questions about the arbitrariness of boundaries, and about configuration and calibration of the measuring instrument(s). Some research methods involve sleight of hand, most commonly by making the largely unjustified assumption that 'Likert-scale' data is not merely ordinal, but is cardinal (i.e. the spaces between the successive terms are identical), and even ratio (i.e. the scale also features a natural zero). Many authors implicitly equate quantification with rigour, and qualitative data with subjectivity. They accordingly deprecate qualitative analysis, or at least relegate it to pre- theoretical research, which by implication should be less common than research driven by strong theories. The majority of authors spend only limited time considering the extent to which the assumptions and the processes underlying the act of quantification may be arbitrary or themselves 'subjective'. Positivism embodies an implicit assumption that computational analysis necessarily leads to deep truth. The assumption needs to be tested in each particular circumstance, yet such testing is seldom evident. A positivist approach to categorising content analysis "along a continuum of quantification" distinguishes "narrative reviews, descriptive reviews, vote counting, and meta-analysis" (King & He 2005, p.666):  "Narrative reviews present verbal descriptions of past studies focusing on theories and frameworks, elementary factors and their roles (predictor, moderator, or mediator), and/or research outcomes, (e.g., supported vs. unsupported) regarding a hypothesized relationship" (p.667). Narrative reviews are seen as having value in some contexts, but as lacking rigour  " Descriptive reviews introduce some quantification, often a frequency analysis of a body of research. The purpose is to find out to what extent the existing literature supports a particular proposition or reveals an interpretable pattern" (p.667)  " Vote counting, also called “combining probabilities” ... and “box score review” ... , is commonly used for drawing qualitative inferences about a focal relationship ... by combining individual research outcomes" (p.667)  " Meta-analysis is a statistical synthesis method that provides the opportunity to view the 'whole picture' in a research context by combining and analyzing 96 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Clarke: Content Analysis in Support of Critical Theory Research: How to Deliver an Unwelcome Message Without Being Shot the quantitative results of many empirical studies" (p.668). Such techniques are also referred to as 'systematic review' and 'meta-triangulation'. King & He's categorisation is helpful, but it involves a switch from largely textual source- materials in the first three categories to wholly quantitative source-materials in the fourth. More usefully still, three approaches are distinguished by Hsieh & Shannon (2005). These are examined in the following sub-sections. 5.1 Conventional Content Analysis / Emergent Coding In this approach, "coding categories are derived directly from the text data". The approach is effective when used "to describe a phenomenon [particularly] when existing theory or research literature on a phenomenon is limited" (p.1279). In such preliminary research, it is normal to allow "the categories and names for categories to flow from the data". Hsieh & Shannon suggests that only selected text is examined (although that appears to be not necessarily the case), and that the context may not be well-defined. The external validity of conclusions arising from this approach may therefore be limited. They conclude that the technique is more suited to concept development and model-building than to theory development. Depending on the degree of generality of the conclusions claimed by the author, full disclosure of the text selection, coding and inferencing procedures may be merely desirable or vital. 5.2 Directed Content Analysis / A Priori Coding In this case, "analysis starts with a theory or relevant research findings ... to help focus the research question ... and as guidance for [establishing and defining] initial codes" (pp. 1277, 1281). Segments of the text that are relevant to the research question are identified, and then coded. To the extent that the declared or inferred content of the text does not fit well to the predefined categories, there may be a need to consider possible revisions of the coding scheme , or even of the theory on which the research design was based. It may be feasible to draw inferences based on counts of the occurrences of categories and/or on the intensity of the statements in the text, such as the confidence inherent in the author's choice of language (e.g. "this shows that" cf. "a possible explanation is that"). As with any theory-driven research, the evidence extracted from the text may have a self- fulfilling-prophecy quality about it, i.e. there is an inevitable tendency to find more evidence in support of a theory than in conflict with it, and contextual factors may be overlooked. In order to enable auditability, it is important that not only the analysis be published, but also the raw material and the coding scheme. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 97 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Clarke: Content Analysis in Support of Critical Theory Research: How to Deliver an Unwelcome Message Without Being Shot 5.3 Summative Content Analysis This "involves counting and comparisons, usually of keywords or content, followed by the interpretation of the underlying context" (p.1277). The first step is to explore usage, by "identifying and quantifying certain words or content in text with the purpose of understanding the contextual use of the words or content" (p.1283). Because of the complexity and variability of language use, and the ambiguity of a large proportion of words and phrases, a naive approach to counting words is problematic. At the very least, a starting-set of terms needs to be established and justified. A thesaurus of synonyms and perhaps antonyms and qualifiers is needed. Allowance must be made for both manifest or literal meanings, on the one hand, and latent, implied or interpreted meanings, on the other. Counts may be made not only of the occurrences of terms, but also of the mode of usage (e.g. active versus passive voice, dis/approval indicators, associations made). The degree of analytical rigour that quantification can actually deliver depends a great deal on a number of factors. Critical among them are: • the text selection; • the express judgements and implicit assumptions underlying the choice of terms that are analysed; • the sophistication and comprehensiveness of the thesaurus applied; and • the significance imputed to each term. 5.4 Quantitative Computational Content Analysis A decade later, it is useful to break out a fourth approach from Hsieh & Shannon's third category. This approach obviates manual coding by performing the coding programmatically. This enables much larger volumes of text to be analysed. The coding scheme may be defined manually, cf. directed content analysis / a priori coding. However, some techniques involve purely computational approaches to establishing the categories, cf. 'machine-intelligent' (rather than human-intelligent) emergent coding. The processing depends, however, on prior data selection, data scrubbing and data-formatting. In addition, interpretation of the results involves at least some degree of human activity. In Indulska et al. (2012, p.4), a distinction is made between: • conceptual analysis, in which "text material is examined for the presence, frequency and centrality of concepts, [which] can represent words, phrases, or more complex definitions"; and • relational analysis, which "tabulates not only the frequency of concepts in the body of text, but also the co-occurrence of concepts, thereby examining how 98 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Clarke: Content Analysis in Support of Critical Theory Research: How to Deliver an Unwelcome Message Without Being Shot concepts (pre-defined or emergent) are related to each other within the documents" Debortoli et al. (2016), on the other hand, distinguish three alternative approaches: • dictionary-based text categorization, which "relies on experts assembling lists of words and phrases that likely indicate text’s membership to a particular category", cf. a priori coding • supervised learning methods "[using] predefined categories; however, one does not explicitly know the mapping between text features and categories" • unsupervised machine-learning methods "for categorizing text [which] find hidden structures in texts for which no predefined categorization exists", cf. emergent coding performed programmatically Given that the 'big data analytics' movement is highly fashionable, vast volumes of data are available, and there is a comfort factor involved in office-based work much of which is automated, it would appear reasonable to anticipate that Quantitative Computational Content Analysis techniques will be a growth-area in the coming few years – at least until their limitations are better appreciated Clarke (2016a, 2016c). 5.5 Content Analysis Within the IS Discipline Content analysis is accepted as a research technique within the IS discipline, but its use has been somewhat limited. For example, in a survey of the papers published in six leading IS journals during the 1990s, Mingers (2003) found that the use of content analysis as a research technique was evident in only four of the journals, and even in those four in only 1-3% of all papers published during that time. In February 2017, of the nearly 15,000 refereed papers indexed in the AIS electronic library, 13 had the term 'content analysis' in the title, and 69 in the Abstract. Annex 3 presents 10 instances which together provide an indication of the range of applications and approaches. A total of 770 papers of the 15,000 contained the term – c. 5%. This is, however, subject to over-inclusiveness (e.g. where the technique is merely mentioned in passing, where the term is used in a manner different from that applied in this paper, and where the technique is applied to interview transcripts rather than to published transcripts). It is also subject to under-inclusiveness (e.g. where some other term is used for essentially the same technique). In recently-published papers, the most common forms of text that have been subjected to content analysis appear to be social media and other message content, with other categories including newspaper articles and corporations' 'letters to shareholders'. The literature relating to the above four categories of content analysis provides a considerable amount of information relevant to the current project. However, there is a 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 99 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Clarke: Content Analysis in Support of Critical Theory Research: How to Deliver an Unwelcome Message Without Being Shot dimension of the project that is not addressed by these techniques, and guidance needed to be sought elsewhere. The Role of Criticism in Research The previous sections have considered the analysis of content. The other area in which further insight was sought relates to the purpose for which the analysis is undertaken. In some cases, the purpose of undertaking content analysis may be simply exposition, that is to say the identification, extraction and summarisation of content, without any significant degree of evaluation. There are benefits in undertaking content analysis in a positive frame of mind, assuming that all that has to be done is to present existing information in brief and readily-accessible form (as indeed much of the present paper does). Alternatively, the researcher can bring a questioning and even sceptical attitude to the work. Is it reasonable to, for example, assume that all relevant published literature is of high quality? that the measurement instruments and research techniques have always been good, well-understood by researchers, and appropriately applied? that there have been no material changes in the relevant phenomena? that there have been no material changes in the intellectual contexts within which research is undertaken? Criticism is the analysis of the merits and faults of a work. The word can be applied to the process (the sequence of actions) or the product (the expression of the analysis and the conclusions reached). There are also common usages of the term 'criticism' in a pejorative sense, implying that the critic is finding fault, is being destructive rather than constructive, and is failing to propose improvements to sustain the merits and overcome the faults. The term 'critique' is sometimes substituted, in an endeavour to avoid the negative impressions, to indicate that the work is systematic, and to bring focus to bear on the contribution being made by both the criticism and the work that is being subjected to it. Criticism plays a vital role in scientific process. The conventional Popperian position is that the criterion for recognising a scientific theory is that it deals in statements that are empirically falsifiable, and that progress depends on scrutiny of theories and attempts to demonstrate falsity of theoretical statements: "The scientific tradition ... passes on a critical attitude towards [its theories]. The theories are passed on, not as dogmas, but rather with the challenge to discuss them and improve upon them" (Popper 1963, p.50). However, senior members of a discipline commonly behave in ways that are not consistent with the Popperian position. This might be explained by the postulates of 'normal science', which view the vast majority of research work as being conducted within a 'paradigm' and subject to its conventions (Kuhn 1962). In more practical terms, the problem may arise because senior members of any discipline have strong psychic investment in the status quo, and – nomatter how cogent and important the argument – 100 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Clarke: Content Analysis in Support of Critical Theory Research: How to Deliver an Unwelcome Message Without Being Shot react negatively against revolutionary propositions. Sharply-worded criticisms appear to be more likely to be published if they are uttered by a senior about a contrarian idea, whereas they seem more likely to be deplored when they are made by an outsider about the contemporary wisdom. Two examples are commonly cited within the IS discipline as suggesting that conservativism is important and criticism is unwelcome. In a section on the tone to be adopted in a Literature Review, Webster & Watson (2002) recommended that "A successful literature review constructively informs the reader about what has been learned. In contrast to specific and critical reviews of individual papers, tell the reader what patterns you are seeing in the literature" (p.xviii, emphasis added). The recommendation to concentrate on 'patterns in the literature' is valuable, because it emphasises that the individual works are elements of a whole. On the other hand, the use of 'in contrast to' is, I contend, an overstatement. To make assertions about a population without providing sufficient detail about the individual instances invites reviewers to dismiss the analysis as being methodologically unsound. It is, in any case, essential to progress in the discipline that each of us be prepared to accept criticism. The advice continued: "Do not fall into the trap of being overly critical ... If a research stream has a common 'error' that must be rectified in future research, you will need to point this out in order to move the field forward. In general, though, be fault tolerant. Recognize that knowledge is accumulated slowly in a piecemeal fashion and that we all make compromises in our research, even when writing a review article" (p.xviii, emphasis added). Here, the authors' expression failed to distinguish between the two senses of the word 'critical'. The authors' intention appears to me to have been to warn against 'overly critical expression'. On the other hand, it is an obligation of researchers to 'think critically' and to 'apply their critical faculties'. I submit that it would be inappropriate for readers of the article to interpret the quotation as valuing politeness among researchers more highly than scientific insight and progress. In the second example, a senior journal editor, providing advice on how to get published in top journals, wrote that "the authors’ contributions should be stated as gaps or new perspectives and not as a fundamental challenge to the thinking of previous researchers. To reframe, papers should be in apposition [the positioning of things side by side or close together] rather than in opposition" Straub (2009, p.viii, emphasis added). This is Machiavellian advice, in the positive, or at least amoral, sense of 'if the Prince wishes to be published in top journals, then ...'. Unfortunately, it is all-too-easily interpreted as expressing a moral judgement that 'criticism is a bad thing'. The inferences that I draw from the above analysis are as follows: • criticism of previously-published ideas is vital to progress • criticism encounters strong opposition from a discipline's gatekeepers, relevantly in the form of journal editors and reviewers 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 101 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Clarke: Content Analysis in Support of Critical Theory Research: How to Deliver an Unwelcome Message Without Being Shot • to justify publication in top journals, criticism needs to be cogent, to the extent feasible addressed to theory rather than to individual theoreticians, clearly expressed, expressed no more negatively than is necessary in the circumstances, and constructive (or re-constructive) in the sense of showing how theory has been improved as a result of the analysis • to actually achieve publication in top journals, criticism must also be devoid of any weaknesses in any of the conventions of research conduct and presentation, such that the gatekeepers, should they create unreasonable obstacles to publication, expose themselves as valuing social conservatism more highly than scientific progress Critical Theory Research Positivism and interpretivism are well-established schools of research in IS. They have been joined by design science. And they have an odd bedfellow, in the form of what is variously termed 'critical research' and 'critical theory research'. The term 'critical' in this context is different from, but related to, the sense of 'analysis of the merits and faults of a work' discussed in the previous section. Design research is concerned with constructing an artefact, variously of a technological or an intellectual nature. Both positivism and interpretivism, on the other hand, are concerned with description and understanding of phenomena. Sometimes the focus is on natural phenomena, but frequently the interest is in natural phenomena have been subjected to an intervention. Importantly for the present project, however, both positivism and interpretivism involve strenuous avoidance of moral judgements and of 'having an agenda'. Critical theory research, on the other hand, recognises the effects of power and the tendency of some stakeholders' interests to dominate those of other stakeholders. It brings to light "the restrictive and alienating conditions of the status quo" and expressly sets out to "eliminate the causes of alienation and domination" (Myers 1997). "Critical research generally aims to disrupt ongoing social reality for the sake of providing impulses to the liberation from or resistance to what dominates and leads to constraints in human decision-making. Typically critical studies put a particular object of study in a wider cultural, economic and political context, relating a focused phenomenon to sources of broader asymmetrical relations in society ... (Alvesson & Deetz 2000, p.1). "Critical IS research specifically opposes technological determinism and instrumental rationality underlying IS development and seeks emancipation from unrecognised forms of domination and control enabled or supported by information systems" (Cecez- Kezmanovic 2005, p.19). 102 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Clarke: Content Analysis in Support of Critical Theory Research: How to Deliver an Unwelcome Message Without Being Shot In Myers & Klein (2011), three elements of critical research are identified: • insight, which requires depth of study and is a feature also of interpretivist research. An important role is played by reflexivity: "By intentionally expressing, questioning, and reflecting upon their subjective experiences, beliefs, and values, critical researchers expose their ideological and political agendas" (Cecez-Kezmanovich 2001, p.147) • critique, which "goes beyond interpretation to focus the researcher on the power structures that lie behind accepted interpretations" (p.24) • transformation, which is "concerned with suggesting improvements to the conditions of human existence, existing social arrangements, and social theories" (p.24) Appropriate approaches to critical theory research are highly inter-related with the subject-matter, and hence theorists of critical research method avoid offering a recipe or even a process diagram. Myer & Klein (2011) does, however, offer guidance in the form of Principles for Critical Research (pp.24-29): The Element of Critique 1. Using core concepts from critical social theorists 2. Taking a value position 3. Revealing and challenging prevailing beliefs and social practices The Element of Transformation 1. Individual emancipation 2. Improvements in society 3. Improvements in social theories The original theoretical work on 'researcher perspective', on which my current paper is based, is appropriately framed within a critical theory research design. The paper whose rejection stimulated these Notes, on the other hand, uses content analysis to apply that theory to a set of papers in a new and potentially very important research domain. The notions discussed in this section are therefore of general relevance to the establishment of a satisfactory content analysis research design, but do not directly address the issues that I am confronting. The Recognition and Critiquing of Ideological Assumptions Although the references discussed above are of relevance to the problem, they fell short of the need. Two particular sources appeared to provide an appropriate foundation for content analysis of the kind that my research project undertakes. One is an approach to 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 103 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Clarke: Content Analysis in Support of Critical Theory Research: How to Deliver an Unwelcome Message Without Being Shot literature review, and the other an approach to content analysis that the authors in question refer to as 'Critical Discourse Analysis'. 8.1 A Hermeneutic Approach for Conducting Literature Reviews It has been argued that the emphasis on 'systematic' literature reviews noted in s.4.3 above "suppresses aspects of quality in research and scholarship that are at least as important as clarity, countability and accountability – such as intertextual connectivity, critique, interest, expertise, independence, tacit knowledge, chance encounters with new ideas, and dialogic interactions between researcher, 'literature' and 'data'" (MacLure 2005, p.394). In Boell & Cecez-Kecmanovic (2014) it is argued that a constructively loose and iterative process is needed, to avoid undue constraints and unlock insight and creativity: "Highly structured approaches downplay the importance of reading and dialogical interaction between the literature and the researcher; continuing interpretation and questioning; critical assessment and imagination; argument development and writing – all highly intellectual and creative activities, seeking originality rather than replicability [MacLure, 2005, Hart, 1998]" (p.258, emphasis added). The authors "propose hermeneutic philosophy as a theoretical foundation and a methodological approach for studying literature reviews as inherently interpretive processes in which a reader engages in ever exp[a]nding and deepening understanding of a relevant body of literature. Hermeneutics does not assume that correct or ultimate understanding can be achieved, but instead is interested in the process of developing understanding" (p.259). The framework, reproduced in Figure 2, comprises two intertwined cycles: a search and acquisition circle, and a wider analysis and interpretation circle (p.263). 104 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Clarke: Content Analysis in Support of Critical Theory Research: How to Deliver an Unwelcome Message Without Being Shot Figure 2: A hermeneutic framework for the literature review process From Boell & Cecez-Kecmanovic (2014) The authors perceive the mapping and classification of literature as being "a creative process that builds on a deeper understanding of the body of literature achieved through analytical reading. This process may lead to new questions and identify new relevant publications to be included in the body of knowledge" (p.267). The approach embodies "questioning and critical assessment ... of previous research" (p.258), and analysis of "connections and disconnections, explicit or hidden contradictions, and missing explanations" and thereby the identification or construction of "white spots or gaps" (p.267, emphasis added). "A critical assessment of the body of literature ... demonstrates that literature is incomplete, that certain aspects/phenomena are overlooked, that research results are inconclusive or contradictory, and that knowledge related to the targeted problem is in some ways inadequate [Alvesson and S[an]dberg, 2011]. Critical assessment, in other words, not only reveals but also, and more importantly, challenges the horizon of possible 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 105 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Clarke: Content Analysis in Support of Critical Theory Research: How to Deliver an Unwelcome Message Without Being Shot meanings and understanding of the problem and the established body of knowledge" (p.267). 8.2 Critical Discourse Analysis Wall et al. (2015) proposes an approach to content analysis that the authors refer to as 'Critical Discourse Analysis'. Their starting-point is that "the information systems (IS) discipline is subject to ideological hegemony" (p.258). They see this as being harmful, and they argue that "review papers can ... challenge ideological assumptions by critically assessing taken-for-granted assumptions" (p.257). They explain the idea of 'ideological hegemony' as being "the conscious or unconscious domination of the thought patterns and worldviews of a discipline or subdiscipline that become ingrained in the epistemological beliefs and theoretical assumptions embedded in scientific discourse (Fleck, 1979; Foucault, 1970; Kuhn, 2012). In academic literature, a hegemony may manifest as common framing of research topics and research questions, the domination of theories and research methods that carry similar assumptions, common beliefs about what constitutes the acceptable application of research methods, and common beliefs about how research results should be interpreted. "By ideology, we mean those aspects of a worldview that are often taken for granted and that disadvantage some and advantage others. Ideologies are not falsehoods in an empirical sense, but are a constitutive part of researchers’ and research communities’ worldview ... that are removed from scrutiny (Freeden, 2003; Hawkes, 2003). Thus, ideologies can be harmful to individuals who are disadvantaged or marginalized by them, and they can be problematic to scientific research because they represent blind spots" (p.258, emphases added). Wall et al. proposes that a critical review method "based on Habermasian strains of critical discourse analysis (CDA) (Cukier, Ngwenyama, Bauer, & Middleton, 2009; Habermas, 1984)" (p.259) can overcome the limitations of working only within ideological assumptions. CDA "examines more than just a communicative utterance. Foucauldian analysis also examines the context in which an utterance was uttered by assessing power relationships between actors and the structures and processes that guide behavior and constrain the development of knowledge (Kelly, 1994; Stahl, 2008)" (p.261, emphasis added). The process involves the assessment of "violations of four validity claims" (p.261): 1. the communication’s comprehensibility, by which the authors mean "technical and linguistic clarity of communication (Cukier et al., 2009, p. 179)" 2. the communication’s truthfulness, which "refers to the propositional content of communication as represented by complete arguments and unbiased assertions (Cukier et al., 2009; Habermas, 1984)" 106 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Clarke: Content Analysis in Support of Critical Theory Research: How to Deliver an Unwelcome Message Without Being Shot 3. the communication’s legitimacy, which "refers to the representation of different perspectives; all perspectives should be heard and considered (Cukier et al., 2009; Habermas, 1984)" (emphasis added) 4. the speaker’s sincerity, which refers to the correspondence between what a speaker says and what the speaker actually intends by the communicative utterance (Cukier et al., 2009; Habermas, 1984). It is difficult to assess sincerity when a speaker is engaged in unconscious hegemonic participation because the speaker is operating on taken-for-granted beliefs and assumptions. When studying unconscious hegemonic participation, researchers should examine the sincerity of the larger community, which may dominate individual researchers’ worldviews. This examination can be accomplished by examining common metaphor, hyperbole, and connotative language used across discursive utterances (i.e., research publications) (Cukier et al., 2009)" (emphasis added) The authors identify four principles (pp.263-4): 1. Assume that the Publication Process Models the Ideal Speech Situation 2. Assume that Hegemonic Participation is Unconscious 3. Test all Publications for each Validity Claim 4. Conduct Reviews Within and Across IS Subdisciplines They propose a seven-step process (pp. 265-9): 1. Identifying the Problem 2. Specifying the Literature 3. Developing Codes for Validity Claims 4. Analyzing Content and Coding 5. Reading and Interpreting 6. Explaining the Findings 7. Engaging in Critical Reflexivity The hermeneutic approach to literature review and the CDA approach to content analysis, overlaid on the prior literature, enable the design of a content analysis research method with the desired attributes. That research method has a good fit with theory developed using critical theory research. It prioritises depth of insight over narrow, positivist quantification. It encourages the analyst to focus on key validity claims and the hidden assumptions within the text under study. It forces the researcher to confront, and to take into account, their own ideology and agenda. It pushes the researcher in the direction of critique for the purposes of theory construction or re-construction, rather than criticism for its own sake. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 107 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Clarke: Content Analysis in Support of Critical Theory Research: How to Deliver an Unwelcome Message Without Being Shot Application of the Research Findings The preceding sections provide a basis for adapting the research method for my research project. The most significant implications for my work, reflected in Annex 2, were as follows:  It is necessary to convey more clearly that 'researcher perspective' theory is a product of critical theory research, that it has a "focus ... on the power structures that lie behind accepted interpretations", that it "takes a value position" (Myers & Klein 2011, p.24), that it "demonstrates ... that certain aspects/phenomena are overlooked" (Alvesson and Sandberg, 2011), and that it sets out to "challenge ideological assumptions by critically assessing taken-for-granted assumptions" (Wall et al. 2015, p.257) – and that it is accordingly necessary for the content analysis to identify the elements of existing works that reflect the existing power structures  The iterative nature of Boell & Cecez-Kecmanovic (2014)'s hermeneutic approach for conducting literature reviews provides a clear explanation of the need for repetitive loops and introspective questioning by the researcher about their analysis and interpretation of the works. This is reflected in step 7 of the revised process in Annex 2  The distinction between preliminary 'orientational reading' and deep 'analytical reading' (Boell & Cecez-Kecmanovic 2014, p.267) can be used to explain how confidence is gained in the appropriateness of the selection, coding and interpretation of passages in each work. This is reflected in steps 1 and 3 of the revised process in Annex 2  The research method needs to be expressly described as directed content analysis using a priori coding, as described by Hsieh & Shannon (2005, p.1277). However, greater efforts may be needed to "introduce some quantification [such as] frequency analysis" (King & He 2005, p.667), and "tabular, graphical, or pictorial presentations" (Boell & Cecez-Kecmanovic 2014, p.266), in order to upgrade from a 'narrative content analysis' to 'descriptive content analysis'. This is reflected generally, and particularly in step 6 of the revised process in Annex 2  Greater efforts may be needed to convey the means whereby reliability is achieved in selection, coding and interpretation activities, in line with Krippendorff (1980), Weber (1990) and Stemler (2001)  Stress needs to be placed on the third of Wall et al. (2015)'s four validity claims. My proposition is that the papers in the Special Issue are 'violations of the communication's legitimacy', because they do not represent all stakeholder perspectives, but only the interests of a single stakeholder  Care is needed to avoid attributing intent on the part of authors whose papers are criticised, and instead the analysis should "assume that hegemonic participation is unconscious" (Wall et al. 2015, pp.261, 263-4). This is reflected in step 7 of the revised process in Annex 2 108 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Clarke: Content Analysis in Support of Critical Theory Research: How to Deliver an Unwelcome Message Without Being Shot Conclusions This paper has reported on the results of a study of meta-questions affecting a content analysis project. A range of guidance has been located and summarised in relation to secondary research whose raw data is published academic papers. The role of criticism (or critiquing) in IS research has been clarified. The particular challenge has been confronted of how to perform content analysis when the theory-lens through which the observation is being performed arises from critical theory research. The primary purpose of the work has been fulfilled, in that the process specification for the analysis of the relevant papers has been adapted in order to better reflect existing theory relating to content analysis of published works, particularly in a critical theory context. Further, a set of changes to the research method section has been identified, which have implications for the interpretation of the papers and the expression of the critique. In addition, guidance has been assembled on how to, and how not to, commuicate the results. This paper has implications for IS researchers generally. Much of the material that has been summarised applies to all content analysis of published papers, nomatter whether the research approach adopted is positivist, interpretivist, design science or critical theory. A small qualification is appropriate, in that the majority of the material relates to research that goes beyond mere exposition of existing literature and is at least modestly questioning about that literature's quality and/or continuing relevance. This paper goes further, however, in that it contains guidance in relation to constructive criticism of existing works. I contend that IS will become increasingly static, and its outputs will be decreasingly valuable, if it values politeness to authors too highly and puts too little emphasis on constructive criticism of existing literature. The method adopted includes proposals about how a researcher can detect and avoid excessively sharp expression, focus the discussion on the message, avoid shooting the original messenger, and in turn avoid being shot themselves. Acknowledgements The author thanks Professors Robert Davison of the City University of Hong Kong, Dubravka Cecez-Kecmanovic of UNSW, and the reviewers, for constructive suggestions for improvements to the paper. Annexes 1 The Process Specification for the Textual Analysis of the Papers http://www.rogerclarke.com/SOS/PDMP-Process.pdf 2 The Revised Process Specification for the Content Analysis of the Papers http://www.rogerclarke.com/SOS/PDMP-Process-Rev.pdf 3 Content Analysis Exemplars in the IS Discipline 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 109 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Clarke: Content Analysis in Support of Critical Theory Research: How to Deliver an Unwelcome Message Without Being Shot http://www.rogerclarke.com/SOS/CACT.html#CAE References Alvesson M. & Deetz S. (2000) 'Doing Critical Management Research' Sage, 2000 Alvesson M. & Sandberg J. (2011) 'Generating Research Questions Through Problematization' Academy of Management Review, 36, 2 (2011) 247–271 Boell S.K. & Cecez-Kecmanovic D. (2014) 'A Hermeneutic Approach for Conducting Literature Reviews and Literature Searches' Communications of the Association for Information Systems 34, 12, at http://tutor.nmmu.ac.za/mgerber/Documents/ResMeth_Boell_2014_Literature%20Reviews.p df vom Brocke J. & Simons A. (2008) 'Towards a Process Model for Digital Content Analysis – The Case of Hilti' BLED 2008 Proceedings. Paper 2, http://aisel.aisnet.org/bled2008/2 Cecez-Kecmanovic D. (2001) 'Doing Critical IS Research: The Question of Methodology' Ch.VI in 'Qualitative Research in IS: Issues and Trends: Issues and Trends' (ed. Trauth E.M.), pp. 141- 163, Idea Group Publishing, 2001, at https://pdfs.semanticscholar.org/37b1/e4c060b93fcfa04d81f03b750e746ba42f2d.pdf Cecez-Kecmanovic D. (2005) 'Basic assumptions of the critical research perspectives in information systems' Ch. 2 in Howcroft D. & Trauth E.M. (eds) (2005) 'Handbook of Critical Information Systems Research: Theory and Application', pp.19-27, Edward Elgar, 2005 Clarke R. (2015) 'Not Only Horses Wear Blinkers: The Missing Perspectives in IS Research' Keynote Presentation, Proc. Austral. Conf. in Infor. Syst. (ACIS 2015), at https://arxiv.org/pdf/1611.04059, Adelaide, December 2015, PrePrint at http://www.rogerclarke.com/SOS/ACIS15.html Clarke R. (2016a) 'Big Data, Big Risks' Information Systems Journal 26, 1 (January 2016) 77-90, PrePrint at http://www.rogerclarke.com/EC/BDBR.html Clarke R. (2016b) 'An Empirical Assessment of Researcher Perspectives' Proc. Bled eConf., Slovenia, June 2016, at http://www.rogerclarke.com/SOS/BledP.html Clarke R. (2016c) 'Quality Assurance for Security Applications of Big Data' Proc. EISIC'16, Uppsala, 17-19 August 2016, PrePrint at http://www.rogerclarke.com/EC/BDQAS.html Debortoli S., Müller O., Junglas I. & vom Brocke (2016) 'Text Mining For Information Systems Researchers: An Annotated Topic Modeling Tutorial' Communications of the Association for Information Systems 39, 7, 2016 Hsieh H.-S. & Shannon S.E. (2005) 'Three Approaches to Qualitative Content Analysis' Qualitative Health Research 15, 9 (November 2005) 1277-1288, at http://www33.homepage.villanova.edu/edward.fierros/pdf/Hsieh%20Shannon.pdf Indulska M., Hovorka D.S. & Recker J.C. (2012) 'Quantitative approaches to content analysis: Identifying conceptual drift across publication outlets' European Journal of Information Systems 21, 1, 49-69, at /http://eprints.qut.edu.au/47974/ Kaid L.L. (1989) 'Content analysis' In Emmert P. & Barker L.L. (Eds.) 'Measurement of communication behavior', pp. 197-217, Longman, 1989 King W.R. & He J. (2005) 'Understanding the Role and Methods of Meta-Analysis in IS Research' Communications of the Association for Information Systems 16, 32 Krippendorff K. (1980) 'Content Analysis: An Introduction to Its Methodology' Sage, 1980 Kuhn T.S. (1962) 'The Structure of Scientific Revolutions' University of Chicago Press, 1962 MacLure M. (2005) '‘Clarity bordering on stupidity’: where’s the quality in systematic review?' Journal of Education Policy 20, 4 (2005) 393-416, at 110 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Clarke: Content Analysis in Support of Critical Theory Research: How to Deliver an Unwelcome Message Without Being Shot http://www.esri.mmu.ac.uk/respapers/papers-pdf/Paper- Clarity%20bordering%20on%20stupidity.pdf Mingers J. (2003) 'The paucity of multimethod research: a review of the information systems literature' Information Systems Journal 13, 3 (2003) 233–249 Myers M.D. (1997) 'Qualitative research in information systems' MISQ Discovery, June 1997, at http://www.academia.edu/download/11137785/qualitative%20research%20in%20information %20systems.pdf Myers M.D. & Klein H.K. (2011) 'A Set Of Principles For Conducting Critical Research In Information Systems' MIS Quarterly 35, 1 (March 2011) 17-36, at https://pdfs.semanticscholar.org/2ecd/cb21ad740753576215ec393e499b1af12b25.pdf Oakley, A. (2003) Research evidence, knowledge management and educational practice: early lessons from a systematic approach, London Review of Education, 1, 1: 21-33, at ttp://www.ingentaconnect.com/contentone/ioep/clre/2003/00000001/00000001/art00004?cra wler=true&mimetype=application/pdf Okoli C. & Schabram K. (2010) 'A Guide to Conducting a Systematic Literature Review of Information Systems Research' Sprouts: Working Papers on Information Systems, 10, 26 (2010), at http://sprouts.aisnet.org/10-26 Popper K. (1963) 'Conjectures and Refutations: The Growth of Scientific Knowledge' Harper & Row, 1963 Stemler S. (2001) 'An overview of content analysis' Practical Assessment, Research & Evaluation 7, 17 (2001), at http://PAREonline.net/getvn.asp?v=7&n=17 Straub D. W. (2009) 'Editor's comments: Why top journals accept your paper' MIS Quarterly, 33, 3 (September 2009) iii-x, at http://misq.org/misq/downloads/download/editorial/3/ Wall J.D., Stahl B.C. & Salam A.F. (2015) 'Critical Discourse Analysis as a Review Methodology: An Empirical Example' Communications of the Association for Information Systems 37, 11 (2015) Weber R.P. (1990) 'Basic Content Analysis' Sage, 1990 Webster J. & Watson R.T. (2002) 'Analyzing The Past To Prepare For The Future: Writing A Literature Review' MIS Quarterly 26, 2 (June 2002) xiii-xxiii, at http://intranet.business- science-institute.com/pluginfile.php/247/course/summary/Webster%20%20Watson.pdf 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons The Impact of Cloud-Based Digital Transformation on ICT Service Providers’ Strategies 9 TREVOR CLOHESSY, THOMAS ACTON & LORRAINE MORGAN Abstract The relationship between digital transformation and strategy formulation in the context of new digital technologies is emerging as a research area which is ripe for investigation. Recently, information system researchers have focused their attention on exploring this relationship in the context of cloud computing-based digital transformation. However, while extant research has explored this relationship from an adopter perspective, there is a dearth of research which has used an information and communications technology (ICT) service provision viewpoint. Taking the perspective of fifteen ICT service providers, this comparative case study elucidates how cloud-based digital transformation has impacted these organisations’strategy formulation processes. This paper provides the following insights. First, cloud-based digital transformation can positively impact the realisation of strategic objectives in terms of deliberate strategies such as agility and competitive positioning. Second, we present a process model which delineates how ICT service providers’strategy formulation was observed to be an emergent process, encompassing recursive cycles of business model experimentation and iteration, organisational learning and organisational adaptation, primarily as a result of the profound disruptive and innovative impact of cloud-based digital transformation. Keywords: • Digital Transformation • Cloud Computing • Strategy • Case study • ICT service provider • CORRESPONDENCE ADDRESS: Trevor Clohessy, National University of Ireland Galway, J.E. Cairnes School of Business & Economics, 49 Upper Newcastle, Galway, Ireland, e-mail: trevor.clohessy@nuigalway.ie. Thomas Acton, National University of Ireland Galway, J.E. Cairnes School of Business & Economics, 49 Upper Newcastle, Galway, Ireland, e-mail: thomas.acton@nuigalway.ie. Lorraine Morgan, , National University of Ireland Galway, J.E. Cairnes School of Business & Economics, 49 Upper Newcastle, Galway, Ireland, e-mail: lorraine.morgan@nuim.ie. https://doi.org/10.18690/978-961-286-043-1.9 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 112 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Clohessy, T. Acton & L. Morgan: The Impact of Cloud-Based Digital Transformation on ICT Service Providers’ Strategies Introduction In recent years organisations have realigned their information and communications technology (ICT) strategic objectives to provisioning and/or sourcing lower cost, flexible, resilient supply and delivery options as a means of responding to the impacts of globalisation and the associated cost pressures (Mohdzain and Ward 2007). Cloud computing represents an innovative technological advancement which appears to offer a solution to these aforementioned objectives (Ward, 2012; Iyer and Henderson, 2012). Subsequently, incumbent organisations are undergoing cloud-based digital transformation journeys in order to reap the multitude of anecdotal business and strategic benefits. In order for organisations to perform effectively in a digitized and networked economy, an “understanding of the role and relevance of strategy is necessary for effective competitive behaviour” (Mansfield and Fourie, 2004). The role of ICT in developing effective strategies has been well documented (Porter and Millar, 1985; Henderson and Venkatraman, 1993; Atkins, 1994). Strategic ICT can not only support and shape strategy but can also be pivotal in determining commercial viability and represent a source of competitive advantage when used in innovative ways (Croteau and Bergeron, 2001; Zott et al., 2011). However, the concept of ICT-enabled strategy formulation is relatively ambiguous. For instance, Ward (2012) opines that the “knowledge we have developed [over the past 30 years] about information systems strategies appears to have had little impact in some organisations, even though they invest hundreds of millions of pounds in new information systems and digital technology every year. This is evidenced by a global survey conducted by McKinsey (Khan and Sikes, 2013) of 807 executives which revealed that while they acknowledged the strategic importance of digital technologies to their business goes beyond cutting costs (e.g. business efficiency, product and service innovation, entering new markets and so on), they were also dissatisfied with its effectiveness pertaining to enabling overall strategic objectives (e.g. the realisation of forward looking strategies which support growth and innovation). In the context of cloud computing, strategy can be defined as “a set of decisions required to create and deploy a network-based, information service delivery strategy that results in both cost savings and organisational agility (Iyer and Henderson, 2010). However, the current state of art pertaining to cloud-based digital transformation strategies that might be appropriate for ICT service providers is relatively ambiguous. As ICT service providers begin to formulate their cloud strategies, “they need to understand the inherent capabilities that are afforded by cloud computing…[which] can help them gain a competitive advantage by creating opportunities for cost advantage and organisational agility”(Iyer and Henderson, 2010). Having a comprehensive understanding of cloud-based digital transformation is “critical to forming a cloud strategy that will unlock business value worth orders of magnitude more than the costs” (Linthicum, 2012). ICT are strategic insofar as they successfully implemented and are also used to realise strategic intent (Arvidsson, Holmström, and Lyytinen, 2014). For instance, Khanagha et al. (2014) conducted a longitudinal qualitative case study, from 2009 to 2013, of a telecommunication company (Telco) in order to investigate how an established firm organised their digital transformation and strategic arrangements when 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 113 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Clohessy, T. Acton & L. Morgan: The Impact of Cloud-Based Digital Transformation on ICT Service Providers’ Strategies transitioning to provisioning cloud services. The authors identified that as a result of the emergence of disruptive cloud-based digital transformation, the strategy formation process encompasses a “collective experimental learning process revolving around a number of alternative strategic intentions ranging from incremental evolution and transformation to complete replacement of the existing business model” (Khanagha et al., 2014). Currently, there is a dearth of research relating to how cloud–based digital transformation impacts ICT service providers’ strategies. Consequently, research relating to how these concepts develop, interact and harmonise is also underdeveloped. This is pertinent now as the cloud computing paradigm has reached a level of maturity which lays the foundation for IS researchers to investigate how ICT service providers have moulded and sustained their cloud-based digital transformation arrangments (Clohessy et al. 2016, Hess et al. 2016). In order to ensure the long-term business viability and sustainability of the cloud computing paradigm, further research is required to elucidate exemplars of successful and unsuccessful ICT service provider digital transformation arrangements (Chang et al., 2013). Thus, the objective of this research is to: Explore how cloud-based digital transformation impacts ICT service providers’ strategies? The remainder of the paper is structured as follows: The next section builds the theoretical foundation for the study. Then we elucidate our research method. Next, the findings are presented and discussed. Finally, we conclude with implications for theory and practice. Theoretical Underpining 2.1 Cloud-Based Digital Transformation Digital transformation is concerned with “the changes digital technologies can bring about in a company’s business model, which result in changed products or organisational structures or automation of processes” (Hess et al. 2016). The long journey towards digital transformation is often fraught with complexity and ambiguity for incumbent ICT firms (Clohessy et al. 2017). This is compounded by the fact that the transformation of mature business models to digital-based business models encompasses potential nuanced legacy liabilities and issues. This is prominently evidenced by ICT service provider stalwarts such as Dell, Intel, IBM and Hewlett Packard whose struggles pertaining to how to best leverage the benefits of cloud-based digital transformation have been well documented. Frequently, these organisations are operating in unchartered digital waters and as a consequence lack the strategic clarity pertaining to what steps they need to consider prior to and during their digital transformation journey. The cloud computing concept encompasses a recombination of existing and new technologies and differentiates itself from antecedent ICT paradigms via five essential characteristics: rapid elasticty, 114 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Clohessy, T. Acton & L. Morgan: The Impact of Cloud-Based Digital Transformation on ICT Service Providers’ Strategies measured service, broad network access, resource pooling, and on-demand-self-service (Mell and Grance 2011). Cloud computing enables ICT service providers (person, organisation or entity responsible for making a service available to cloud consumers) to virtualise their computational resources and concurrently provision them, via a service orchestration process, typically in the form of Software-as-a-Service (SaaS), Platform- as-a-Service (PaaS) or Infrastructure-as-a-Service (IaaS) (Liu et al., 2011). While there is anectotal evidence which highlights the transformative business and strategic value afforded by cloud computing for ICT service providers (Clohessy et al., 2016, Armbrust et al., 2009), our understanding of how these organisations can develop digtal transformation strategies that effectively align with the value propositions inherent to cloud computing technologies is still limited (Iyer and Henderson, 2012; Chang, Walters and Wills, 2013; Khanagha et al., 2014). 2.2 Bounding the Concept of Strategy In order for IS researchers to have a comprehensive understanding of an organisation’s ICT strategy, it is useful to understand the evolution of their intended and realised strategies (Chan, Huff and Copeland, 1998). Mintzberg and Waters (1985) propose a widely cited comprehensive categorization for strategy which identifies intended, realised, deliberate, unrealised and emergent strategy as constituting key components of the strategy formulation process. This categorization of strategy is suitable for investigating the “peculiarities” of modern emerging ICT (Peppard, Galliers, and Thorogood, 2014) and thus provides a backdrop for this study to better explore the strategy formulation process of ICT service providers (Figure 1). Intended strategy represents the organisation’s official strategy (which may or not be written down) and realised strategy which reflects the outcomes of decisions undertaken by the organisation stakeholders which may manifest from deliberate, emergent, and unrealised strategies. Deliberate strategy is defined simply as “realised as intended”, emergent strategy as “patterns or consistencies realised despite, or in the absence of, intentions” and finally unrealised strategy as “intentions that are unsuccessful in its consequences” (Mintzberg and Waters, 1985). Figure 1: Strategy Research Lens (Mintzberg and Waters, 1985) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 115 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Clohessy, T. Acton & L. Morgan: The Impact of Cloud-Based Digital Transformation on ICT Service Providers’ Strategies We selected the aforementioned seminal categorisation as a basis for conceptualising the concept of strategy for the following reasons. First, no single strategy can be a panacea for an organisation and that the most optimal strategic variables alter due to certain conditions and factors (Zott and Amit, 2008). Given the rapidly evolving nature of the cloud computing paradigm (Ojala and Tyrvainen, 2011), and the subsequent dynamic nature of cloud-based digital transformation (Clohessy et al., 2016), the categorization is well suited for delineating the strategy formulation process and chronicling how ICT service providers have arrived at their current realised strategy. Second, in the context of cloud-based digital transformation, the categorisation enables the identification of problematic issues and emerging patterns of events and behaviours which may have resulted in ICT service providers deviating from their intended strategy (Mintzberg and Waters, 1985; Chan et al., 1998). Third, the categorisation enables business strategy to be “viewed in a non-descriptive manner, being conceived in terms of how companies actually decide and act, not how they should decide and act” (Jansson, 2008). In the next section, we delineate the research method operationalised in order to elucidate our research objective. Methodology This paper’s research objective is to explore how cloud-based digital transformation impacts ICT service providers’ strategies? Due to the dearth of empirical research pertaining to examining the relationships of the focal phenomena under scrutiny, our study is exploratory. Thus, a multi-method, comparative case study research design was selected for the study (Stebbins, 2001, Yin, 2014). The research sampling approach was directed by evolving theoretical concepts, whereby we identified organisations and people from which we expected to elicit the majority of insights into the phenomena of interest (Strauss and Corbin, 1998). For instance, this study encompasses an analysis of both large and small and medium enterprise (SME) ICT service provider firms. The large business model mature (BMM) ICT ventures represent organisations that have significantly longer tenure as ICT service providers that are currently transitioning from ‘pre-cloud’ to ‘cloud-based’ business models. The SME born-on-the-cloud (BOC) ICT ventures represent organisations who do not possess the requisite existing maturity or tenure of pre-cloud business models. These firm’s business models originated on the cloud. Data collection took place between January 2015 and August 2015 using semi- structured interviewing based on a common protocol across 15 ICT service provider organisations. Following the standard practice of using senior management as data sources, (Iyer and Henderson, 2012, Clohessy et al., 2016) we chose a senior manager from each targeted organisation. Interviews lasted between 70 and 120 minutes. The interviews (including follow-up interviews) were conducted until theme exhaustiveness was reached, which manifested when similar themes were being identified and no new themes emerged. All interviews were transcribed, proof read and annotated and then coded using NVivo 10. In order to improve the credibility of the data and provide cross and complementary perspectives on emerging elements, secondary evidence in the form of archival documents and published materials sourced from the ICT service providers’ 116 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Clohessy, T. Acton & L. Morgan: The Impact of Cloud-Based Digital Transformation on ICT Service Providers’ Strategies websites (e.g. white papers, specific ICT service providers case studies, brochures, reports) were collated and analysed. While the study did not undertake a grounded theory approach, in analysing the data, the researcher used an analytical hierarchical data analysis process adopted from Ritchie, Spencer and O’Connor (2003) incorporating open and axial coding techniques based on the recommendations of Strauss and Corbin (1998). Table 1: Data sources for the study. ICT Size** Cloud Services/Business Model*** Interviewee provider* Inno Ltd. Large  Hybrid, public and private managed Cloud CTO and self-service hosting cloud offerings.  Outsourcing and consultancy services. (BMM) MobCon Large  Provision connectivity into cloud IT Cloud CTO solutions via their existing next generation Telco network and bespoke software solutions.  Manage the design, build and implementation of their customers cloud solution ensuring seamless network integration. (BMM( Sigmathen Large  Hybrid, public and private managed Cloud CTO Systems and self-service hosting cloud offerings.  Outsourcing and consultancy services.  Microsoft and SAP value added resellers. (BMM) Gaviour Ltd. Large  Hybrid, public and private managed Cloud Manager and self-service hosting cloud offerings.  Outsourcing and consultancy services. (BMM) ZystemTech Large  Hybrid, public and private managed Cloud Manager and self-service hosting cloud offerings.  Outsourcing and consultancy services. (BMM) SandstemTech SME Bespoke software solutions enable travel CTO companies to derive maximum benefit for their customers. (BOC) Levatte SME  Bespoke procurement software Cloud Manager solution. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 117 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Clohessy, T. Acton & L. Morgan: The Impact of Cloud-Based Digital Transformation on ICT Service Providers’ Strategies  Enables customers to source and evaluate new suppliers. Yet3 SME Bespoke CRM sales management and CEO membership body software solutions. (BOC) FieldZuite SME  Supply IT infrastructure in the form CEO of public, private and hybrid cloud infrastructure hosting.  Disaster recovery and virtual desktop services. (BOC) VClazz SME  Supply IT infrastructure in the form CTO of public, private and hybrid cloud infrastructure hosting.  Microsoft value added resellers. (BOC) Zeta2k SME Bespoke software solution enables CTO customers to visualize their raw log data in order to unlock real time critical insights. (BOC) Med3Care SME Bespoke software solutions aimed at the CEO travel clinic service market segment. (BOC) Braavos PLC SME Bespoke software solution enables CEO customers to integrate and connect their existing core IT infrastructure into an ICT service providers’ offering. (BOC) LYS SME  Supply IT infrastructure in the form CIO of private and hybrid cloud infrastructure managed hosting.  Outsourcing and consultancy services.  Microsoft and Citrix value added resellers. (BOC) WebReve SME Bespoke software solution enables CEO customers to design and build cloud- based website solutions. (BOC) *Company pseudonyms have been applied to protect anonymity. ** Firm size categorised using limits as set by the European Union along the dimensions “number of employees” (e.g. Small 10 -49, Medium 50-249, Large 250+) and “annual turnover”. ***Large firms categorised as ‘business model mature’ (BMM) ventures (e.g. extant pre-cloud business models) while SME firms categorised as “born-on-the cloud” (BOC) business model ventures (e.g. current business model originated on cloud). 118 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Clohessy, T. Acton & L. Morgan: The Impact of Cloud-Based Digital Transformation on ICT Service Providers’ Strategies Findings In this section, we report the empirical results obtained during the analysis of the semi- structured interviews (denoted as sanitised quotes), archival documentation and published materials. It was evident from the study that cloud-based digital transformation not only have a dynamic and turbulent impact on ICT service providers’ strategies (emergent and unrealised) but also have a cogent collective impact in terms of agility and competitive positioning (that is, their deliberate strategy) (see Table 2). Table 2: The impact of cloud computing based digital transformation on realised strategy Realised Strategy Digital Transformation Sources Impact Deliberate Strategy 1. Increased agility - All ICT service providers organisational and - Examples from INNO, operational Zeta2k, FieldZuite, MobCon, LYS, Braavos, SandstemTech 2. Increased strategic All large ICT service acquisitions providers - Examples from Sigmathen Systems, INNO Emergent and 3. Increased strategic All ICT service providers Unrealised Strategy partnerships - Examples from MobCon, Zeta2k , LYS, VClazz, INNO, Med3Care 4. The dynamic nature of cloud-based digital transformation, in All ICT service conjunction with the fluid providers- Examples of the cloud computing from VClazz, Yet3, market, facilitates FieldZuite, MobCon, increased incidences of INNO emergent and unrealised strategy. The strategies for ICT service providers (large and SME) encompassed short and long- term objectives such as cogent market impact, increasing return on investment (ROI), enhanced agility, reinvestment of capital, and reducing capex and opex. For example, study participants in Levatte and Sigmathen Systems described how their strategy is focused on broadening their cloud geographic footprint and growing their customer base in order to increase revenues while the CEO at FieldZuite explained that their primary strategy is about increasing revenues through repeat customers. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 119 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Clohessy, T. Acton & L. Morgan: The Impact of Cloud-Based Digital Transformation on ICT Service Providers’ Strategies All ICT service providers confirmed that their cloud-based business model(s) have significantly impacted the realisation of their company’s strategic objectives (see Table 2) which has been largely the cumulative result of a combination of deliberate, emergent and unrealised strategy. In terms of deliberate strategy, all ICT service providers identified that their main objective for operationalising cloud influenced business models was mainly for agility reasons. For instance, the CTO at INNO described how their cloud strategy was focused on enhancing the agility of the organisation, stating that “the new religion is cloud and we are all about agility and DevOps principals. Our objective is to develop new or improved services faster than we did in the past. All new offerings must be agile and be able to be provisioned at low cost”. This CTO further elucidated that “our new strategy is that we are going to become a SaaS organisation and get out of the hardware business”. The CEO at Braavos pointed out that their cloud-based business models “foster agile and cost effective operations which are currently enabling our strategic objectives of becoming a market leader as a cloud integration service provider”. While the CTO at Zeta2k described how their “cloud enabled business model has allowed us to be very agile and nimble in order to provide a service to a large number of users very quickly, thus facilitating strategic objectives”. Similarly, the CTO in FieldZuite explained that their business model has had a significant collective impact on the company’s strategic objectives by not only enabling them to compete with larger ICT service providers but also to deliver their cloud services with greater efficiency to multiple global locations around the world. Moreover, the CTO in MobCon elucidated on two examples of the cloud business model impact on their strategic objectives. First, he described how cloud computing facilitates enhanced efficiency (e.g. operational, cost and resource) and faster innovation in terms of supporting accelerated cycles of development. For example, cloud computing enables the early deployment of demonstration environments that would otherwise require substantial capital expenditure as a precursor to a full business case. Second, MobCon’s strategic partnering with Amazon Web Services (AWS) facilitated stability in their business model components, thus minimising strategy-business model misalignment issues which may have manifested because of the disruptive nature of cloud computing technology. The CTO in SandstemTech added, “the cloud has enabled us to be more responsive. We have sales pitch for a large airline next week and cloud computing has enabled us to create an enterprise demo environment for them in a matter of hours. The traditional method we would have utilised three years ago would have taken weeks in order to create the same infrastructure for the demo environment”. Strategic acquisitions were also identified as deliberate strategy by all large ICT service providers. For example, the CTO in Sigmathen Systems explained, “it was a deliberate strategic decision to acquire an established managed hosting in ACD (company synonym)“. Prior to this acquisition, the company were losing customers to public cloud offerings. In order to streamline the on-boarding process for cloud customers, the company also acquired an independent software vendor (ISV) start-up company who specialised in subscription billing. 120 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Clohessy, T. Acton & L. Morgan: The Impact of Cloud-Based Digital Transformation on ICT Service Providers’ Strategies The CTO in INNO also pointed out that their decision to acquire an established cloud provider such as CEES was pivotal to their cloud success, stating that “INNO’s acquisition of CEES in 2013 accelerated its cloud computing strategy overnight. We can now use the CEES infrastructure and platform to rapidly deploy existing software services as SaaS”. Partnerships were also identified as an example of deliberate strategy by ICT service providers (e.g. Zeta2k, LYS, VClazz, INNO, Med3Care). Both the interviewees in LYS and VClazz confirmed that it was a deliberate decision for their organisations to operate as value added resellers (VARs) in order to avail of the economies of scale provided by their large ICT service provider partner. All ICT service providers confirmed that their emergent strategy manifested from cloud enabled accelerated rate of business growth and incidences of unrealised strategy. For instance, the CTO in VClazz opined, “as a result of the exponential rate of growth we have experienced provisioning cloud services, we have successfully transitioned from the end- user market to the channel markets”. Similarly, the CEO in Yet3 pointed out that the company’s current realised strategy has manifested as a result of emergent strategy based on their accelerated growth in niche global target markets. In relation to unrealised strategy, IaaS was provided as an example by ICT service providers (e.g. MobCon, FieldZuite, INNO). For example, the CTO in INNO explained how prior to acquiring CEES, their efforts to build their own IaaS proved vexatious, further describing how “it really was a painful process trying to develop our own bespoke IaaS. It didn’t have the scale of AWS, Rackspace, and Azure. It failed simply as there wasn’t a big enough pool of resources for all the customer requirements we had. We did not invest in it aggressively enough and were far too conservative about investing in it”. The CTO in MobCon described how the company were initially going to build their own cloud infrastructure. However, MobCon decided to partner with AWS, a partnership that enabled the company to accelerate its move to provide cloud services to its existing customers. The study identified that the dynamic and recursive nature of ICT service providers’ strategy formulation, business model experimentation, organisational learning and subsequent adaptation when attempting to explore disruptive and/or innovative cloud business models. Figure 2 below depicts the process model we have developed to reflect this recursive process. All ICT service providers confirmed that their cloud strategy formulation and review decisions were largely management-led (e.g. board of management, investors and so on) with changes being dictated by business model(s) component performance (e.g. market analysis, revenue, cost). For example, the CTO at Zeta2k surmised, “our organisation’s strategy is management-led and informed by business model performance, strategic roadmaps, whitepapers, analyst research reports and customer communities’ feedback”, while the CTO at INNO explained how they have a committee of fourteen people responsible for developing corporate strategy for the company’s four divisions (that is, hardware, software, business consulting and technology consulting). However, on the contrary, the CEO at Yet3 described how their strategy is more leadership-led, which is facilitated by the flat structure of the organisation. The CEO elucidated, “while the advisory board help the company to see the forest from the trees, we have employees in Israel, Vietnam and Japan who can influence 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 121 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Clohessy, T. Acton & L. Morgan: The Impact of Cloud-Based Digital Transformation on ICT Service Providers’ Strategies strategic decisions without ever having met the CEO or the advisory board as they know more about the lay of the land than we do”. The CEO asserted that the ability of their globally distributed employees to provide strategic insight on their national landscapes has been a cornerstone of the company’s continued success. Figure 2: The relationships among strategy formulation, business model experimentation and organisational adaptation when exploring an emerging disruptive and/or innovative business model In an effort to maximise the realisation of their strategic intent, all ICT service providers are engaging in business model experimentation and iteration. For example, the cloud manager at Levatte described how they are experimenting and iterating their business model constructs at varying levels within the organisation. The CTO in INNO also explained how their organisation was utilizing a bespoke component business modelling (CBM) technique for formalising and reviewing their product business models. The CBM technique breaks an enterprise down into its constituent segments and enables INNO to take the aforementioned areas and break them down and identify elements which bring business value to the company. The CTO at INNO further elaborated, “the CBM breaks our IT function down into segments which we do that is strategic and operational and tactical. Elements and segments which are important for our operations are maintained whilst other which are not strategically important are outsourced”. The CEO at FieldZuite 122 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Clohessy, T. Acton & L. Morgan: The Impact of Cloud-Based Digital Transformation on ICT Service Providers’ Strategies also explained how the business model impact of the cloud computing paradigm was different to antecedent technologies, pointing out that “customer needs are constantly changing. An inability to review and change individual business model components can result in detrimental effects to the longevity of a ICT service providers’ business”. While the CTO at Sigmathen Systems explained that transition for traditional hardware and software providers to more cloud focused provision methods has had a combined revolutionary and chaotic impact on their business model. The study found that the learning accumulated from this iterative business model process serves as a foundation for organisational adaptation based on the potential, requirements and impacts of the new cloud business model. Strategic organisational adaptation encompassed re-structuring, re-organisation, change of personnel and new ways of managing. The outcomes of this organisational adaptation served as an input for re-evaluating the strategic intent of the organisations. 0ur analysis complements and extends existing research - in particular Khanagha et al., (2014). On the one hand, it confirms the dynamic nature of ICT service providers’ strategic intent in response to disruptive cloud-based digital transformation and also identifies the salient roles of adaptation, business model experimentation and the resulting accruement of new knowledge. However, on the other hand, contrary to their findings that presented structural adaptation as a precursor to business model experimentation, our findings indicate that business model experimentation and iteration and the subsequent derived organisational learning serve as salient inputs to ICT service providers evaluating whether the level of organisational adaptation required to pursue their strategic intent is feasible. This would suggest that ICT service providers are operationalizing a cautionary and evolutionary approach prior to committing substantial finances and resources to restructuring their organisation in order to realise their strategic intent. In the next section, we conclude with implications for research and practice. Implications for Theory and Practice The objective of this study was to conduct an exploratory investigation into how cloud- based digital transformation impacts ICT service providers’ strategies? Both theoretical and practice contributions stem from this research. From a theory perspective, extant empirical research in the area of cloud-based digital transformation has largely focused on adopter perspectives. This study provides a contribution towards a vivid contextual understanding the broader impact of cloud-based digital transformation on both large multinational and SME ICT service providers’ strategies using Mintzberg and Waters’ (1985) seminal research lens. Moreover, our study can further be considered revelatory in that we have incorporated our findings into a new process model (see Figure 2) which demonstrates that business model experimentation and organisational learning serve as salient moderating antecedents to determining the level of organisational adaptation that may be required to realise strategic intent of a cloud-based digital transformation. From a practice perspective, our findings suggest that ICT service providers should continue to focus on using business model experimentation as a means for harmonizing their 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 123 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Clohessy, T. Acton & L. Morgan: The Impact of Cloud-Based Digital Transformation on ICT Service Providers’ Strategies organisation’s strategies with the disruptive and/or innovative idiosyncrasies of cloud- based digital transformation. While the comparative case study proved to be rich in detail, the findings are based on a small purposeful sample of fifteen firms. Thus, this study is naturally limited in terms of it generalisability. However, we took care in relating our research findings in order to relate the idiographic details of the cases to theoretical concepts. Given the exploratory nature of this research and the high-level nature of the new process model, others will need to build theory and subsequently test it. From an organisational learning perspective, future research is warranted from a resource-based view of the firm and dynamic capabilities perspectives in order to explore how successful ICT service providers are exploiting their core resources and competencies in order to take advantage of the opportunities afforded by cloud technology. Additionally, a systems thinking approach could elucidate the implications of altering existing complex relationships, processes, and feedback mechanisms. For example, different change processes may conflict with one another (e.g. there may be potential interference between re-structuring and individual learning). Finally, while the primary objective of this study was to examine the broader impact of cloud-based digital transformation on the strategy formulation process, we believe that studying the strategy archetypes which emerge as a consequence of explicit cloud-based service models (e.g. SaaS, PaaS, IaaS) seems an area ripe for research. Acknowledgement This work was supported, in part, by Science Foundation Ireland grant 10/CE/I1855 to Lero - the Irish Software Research Centre (www.lero.ie). References Arvidsson, V., Holmström, J., and Lyytinen, K. (2014). Information systems use as strategy practice: A multi-dimensional view of strategic information system implementation and use. The Journal of Strategic Information Systems, 23(1), 45-61. Atkins, M. (1994). Information technology and information systems perspectives on business strategies. The Journal of Strategic Information Systems, 3(2), 123-135. Chan, Y. E., Huff, S. L., and Copeland, D. G. (1998). Assessing realized information systems strategy. The Journal of Strategic Information Systems,6(4), 273-298. Chang, V., Walters, R. J., & Wills, G. (2013). The development that leads to the Cloud Computing Business Framework. International Journal of Information Management. Clohessy et al. (2016). The Times they are A-Changin for ICT Service Provision: A Cloud Computing Business Model Perspective 24th European Conference in Information Systems (ECIS) Istanbul, Turkey. Clohessy, T., Acton, T., & Morgan, L. (2016). Running While Standing Still: Rethinking ICT Business Model Decisions for the New Cloud Economy. 29th Bled eConference, Slovenia. Clohessy, Trevor; Acton, Thomas; Morgan, Lorraine (2017). Lessons Learned: How to Leverage Cloud-Based Business Models. Cutter Consortium Executive Update, 20 (7) :1-11. 124 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Clohessy, T. Acton & L. Morgan: The Impact of Cloud-Based Digital Transformation on ICT Service Providers’ Strategies Croteau, A. M., and Bergeron, F. (2001). An information technology trilogy: business strategy, technological deployment and organizational performance.The journal of strategic information systems, 10(2), 77-99. CSA and ISACA (2012). Cloud Computing Market Maturity. Available from https://cloudsecurityalliance.org/media/news/cloud-maturity-study-reveals-top-issues/ (accessed 05th August 2016). DaSilva, C. M., Trkman, P., Desouza, K., and Lindič, J. (2013). Disruptive technologies: a business model perspective on cloud computing. Technology Analysis & Strategic Management, 25(10), 1161-1173. Ehrenhofer, C., and Kreuzer, E. (2012). The Role of Business Model Design in the Service Engineering Process: A Comparative Case Study in the Field of Cloud Computing to Join Service Engineering with Business Model Design. Paper presented at the SRII Global Conference. Hess T, et al. (2016) Options for Formulating a Digital Transformation Strategy. MIS Quarterly Executive. Jun 1;15(2). Henderson, J. C., and Venkatraman, N. (1993). Strategic alignment: Leveraging information technology for transforming organizations. INNO systems journal, 32(1), 4-16. Iyer, B., and Henderson, J. (2010). Preparing For The Future: Understanding The Seven Capabilities Of Cloud Computing. MIS Quarterly Executive, 9(2), 117-131. Iyer, B., & Henderson, J. C. (2012). Business value from clouds: Learning from users. MIS Quarterly Executive, 11(1), 51-60. Jansson, H. (2008). International business strategy in emerging country markets: the institutional network approach. Edward Elgar Publishing. Khan, N. and Sikes, J. (2013). IT under pressure - McKinsey global survey. Available from http://www.mckinsey.com/insights/business_technology/it_under_pressure_mckinsey_global _survey_results (accessed 11th May 2016) Khanagha, S., Volberda, H., & Oshri, I. (2014). Business model renewal and ambidexterity: structural alteration and strategy formation process during transition to a Cloud business model. R&D Management, 44(3), 322-340. Khajeh-Hosseini, A., Sommerville, I., & Sriram, I. (2010). Research Challenges for Enterprise Cloud Computing. Paper presented at the Submitted to 1st ACM Symposium on Cloud Computing, Indianapolis, Indiana, USA. KPMG International (2012). Global Cloud Provider Survey. Available from https://www.kpmg.com/SG/en/IssuesAndInsights/ArticlesPublications/Documents/Advisory- ICE-Breaking-through-the-Cloud-Adoption-Barriers-Glob.pdf (accessed 09th May 2016). Linthicum, D (2012). Buyers Say The Cloud Is Already Tired Out. Available from http://www.infoworld.com/d/cloud-computing/buyers-say-the-cloud-already-tired-out- 203760 (accessed 15th May 2014). Mansfield, G. M., & Fourie, L. C. H. (2004). Strategy and business models-strange bedfellows? A case for convergence and its evolution into strategic architecture. South African Journal of Business Management, 1. Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud computing—The business perspective. Decision support systems, 51(1), 176-189. Mohdzain, M. B., and Ward, J. M. (2007). A study of subsidiaries’ views of information systems strategic planning in multinational organizations. The Journal of Strategic Information Systems, 16(4), 324-352. Mell, P., & Grance, T. (2011). The NIST Definition of Cloud Computing–Recommendations of the National Institute of Standards and Technology. National Institute of Standards and Technology, Special Publication 800-145, Gaithersburg. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 125 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Clohessy, T. Acton & L. Morgan: The Impact of Cloud-Based Digital Transformation on ICT Service Providers’ Strategies Mintzberg, H., and Waters, J. A. (1985). Of strategies, deliberate and emergent. Strategic management journal, 6(3), 257-272. Mintzberg, H., Ahlstrand, B., and Lampel, J. (2005). Strategy Safari: A Guided Tour Through The Wilds of Strategic Management. Simon and Schuster. Ojala, A, and Tyrvainen, P. (2011). Developing Cloud Business Models: A Case Study on Cloud Gaming. IEEE software, 28(4). Peppard, J., Galliers, R. D., and Thorogood, A. (2014). Information systems strategy as practice: Micro strategy and strategizing for IS. J. Strategic Inf. Sys., 23(1), 1-10. Porter, M. E., and Millar, V. E. (1985). How information gives you competitive advantage. Harvard Business Review, 63 (4), 149 – 160. Ritchie, J., Spencer, L., & O’Connor, W. (2003). Carrying out qualitative analysis. Qualitative research practice: A guide for social science students and researchers, 219-262. Stebbins, R. A. (2001). Exploratory research in the social sciences. Sage Publications, London, UK. Strauss, A. L., and Corbin, J. (1998). Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory (2nd ed.), Thousand Oaks, CA: Sage Publications. Ward, J. M. (2012). Information systems strategy: Quo vadis? The Journal of Strategic Information Systems, 21(2), 165-171. Yin, R. K. (2014). Case study research: Design and methods. Sage publications. London, UK. Zott, C., and Amit, R. (2008). The fit between product market strategy and business model: Implications for firm performance. Strategic Management Journal, 29(1), 1-26. Zott, C., Amit, R., and Massa, L. (2011). The business model: recent developments and future research. Journal of Management, 37(4), 1019-1042. 126 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Decision Makers and Criteria for Patient Discharge - A Qualitative Study 10 ISABELLA EIGNER, ANDREAS HAMPER, NILMINI WICKRAMASINGHE & FREIMUT BODENDORF Abstract The decision to discharge a patient involves multiple stakeholders and criteria that need to be considered during this process. This paper aims at identifying the issues, behaviours, and needs for patient discharge with regards to the risk of readmission and the available information in that process using a qualitative approach. For this purpose, focus groups are conducted at an Australian not-for-profit tertiary hospital group and analysed according to three main areas: Decision makers and factors influencing the time of patient discharge, the risk of unplanned readmission and available information. The results of the focus groups indicate the complexity of admission and initial diagnosis as influencing factors and consequences of the time of patient discharge and suggest requirements on how to include this knowledge into future decision making using data analytics. Keywords: • Patient discharge • length of stay • risk of readmission • focus group • decision support • data analytics • CORRESPONDENCE ADDRESS: Isabella Eigner, University Erlangen-Nuremberg, Institute of Information Systems, Lange Gasse 20, 90403 Nuremberg, Germany, e-mail: Isabella.Eigner@fau.de. Andreas Hamper, University Erlangen-Nuremberg, Institute of Information Systems, Lange Gasse 20, 90403 Nuremberg, Germany, e-mail: Andreas.Hamper@fau.de. Nilmini Wickramasinghe, Deakin University, 221 Burwood Hwy, Burwood VIC 3125, Australia, e-mail: n.wickramasinghe@deakin.edu.au; Freimut Bodendorf, University Erlangen-Nuremberg, Institute of Information Systems, Lange Gasse 20, 90403 Nuremberg, Germany, e-mail: Freimut.Bodendorf@fau.de https://doi.org/10.18690/978-961-286-043-1.10 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 128 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) I. Eigner, A. Hamper, N. Wickramasinghe & F. Bodendorf: Decision Makers and Criteria for Patient Discharge - A Qualitative Study Introduction The decision whether or not to discharge a patient is one of the most frequent and complex decisions of clinicians (Harun, Salek, Piguet, & Finlay, 2014). It involves a multidisciplinary team and careful evaluation of several medical and non-medical factors to determine the best time to send a patient home. According to Armitage (1981), “the discharge of medical patients consists often not of a single event but of a lengthy process of negotiation involving professional staff, patients and their relatives” (Armitage, 1981). Thus, a variety of stakeholders and influencing factors are to be considered in this decision. While the implications and requirements of effective discharge planning have been analysed in various studies (Armitage & Kavanagh, 1998; Augustinsson & Petersson, 2015; Chadwick & Russell, 1989; Goncalves-Bradley, Lannin, Clemson, Cameron, & Shepperd, 2016; Mukotekwa & Carson, 2007), the specific time of patient discharge that leads to the best outcome has not yet been considered in detail (Matis, Farris, McAllister, Dunavan, & Snider, 2015). Finding the optimal time of discharge can lead to fewer unnecessary readmissions, enable cost reductions and therefore allow for a better allocation of resources within the hospital. Therefore, this study focuses on the influencing factors that can determine the optimal time of patient discharge, both from a qualitative and cost perspective. For this purpose, involved stakeholders, as well as medical and non-medical criteria that are considered in the discharge decision, have to be identified. To specify the best outcome from a qualitative view, readmission rates are used as a comparative value. From a cost perspective, we utilize, patient length of stay (LOS) as the comparative indicator for the time of patient discharge, as this represents a common cost factor over time. Hospital reimbursements are based on case rates, according to so-called diagnosis-related groups (DRG). For each DRG, a cost weight is set by the Department of Health that determines the reimbursement rate for the hospital for each episode within that DRG. To allow for different types of stay and moderate financial risk, the case mix model has been adapted to include cost weights for shorter or extended hospital stays. In Victoria, a “Weighted Inlier Equivalent Separation (WIES)” is used, where the DRG cost weight is adjusted for time spent in the hospital. Thus, the length of stay highly influences a hospital’s reimbursement rates (State Government of Victoria, Department of Health). Figure 1 displays the development of costs and reimbursements over time. The cost curve includes all costs incurred for procedures, accommodation and maintenance costs. We assume that the curve flattens with increasing time, as cost-intensive procedures occur in the beginning and accommodation costs in the later stages of the stay. A balance of revenues and costs, i.e. the Break-Even-Point (BEP), for a DRG is assumed at the determined average length of stay for a single DRG. As a result, the shading to the left represents the profit zone (cf. Figure 1). For each additional day, the patient is hospitalized in the hospital, the hospital suffers losses. The actual cost curve is hospital- individual and can, therefore, deviate for each episode. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 129 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) I. Eigner, A. Hamper, N. Wickramasinghe & F. Bodendorf: Decision Makers and Criteria for Patient Discharge - A Qualitative Study For a hospital, it would, therefore, seem most profitable to discharge a patient as soon as possible within the inlier range. However, if the patient is readmitted to the hospital for a related cause of the preceding episode, reimbursements can be suspended for the readmitted episode or other penalties might occur (Center for Medicare & Medicaid Services, 2016). Studies have shown that the length of stay has a potential impact on the quality of care and thus the potential risk of readmission of a patient (Baker, Einstadter, Husak, & Cebul, 2004; Heggestad, 2002). While some argue a longer length of stay to be beneficial (Bartel, Chan, & Kim, 2014), other studies show a negative effect with a longer length of stay on outcomes (Saczynski et al., 2010) and risk of readmission (Chopra, Wilkins, & Sambamoorthi, 2016) or even suggest lower readmission rates with a shorter length of stay (Kaboli et al., 2012). Thus, it is vital to determine the point of patient discharge that also considers the lowest risk of readmission. To reach this goal, the process of patient discharge and the involved stakeholders have to be known. Figure 1: Correlation between patient length of stay and costs The purpose of this study is to determine the decision makers and criteria that are relevant in the patient discharge process. For this purpose, focus group interviews are held in an Australian hospital group in Victoria. Based on the results of these interviews, propositions about the patient discharge decision and its implications are derived from the qualitative results. In a subsequent study, these results will be further developed into hypotheses and tested with episode data collected at the respective hospital group. This paper is structured as follows. The related work section briefly describes relevant stakeholders and decision criteria that have been previously identified for the patient discharge process. While a lot of studies suggest qualitative approaches to determine these criteria, we propose a mixed-methods approach to quantify the influences on patient length of stay and the patient discharge respectively. Section three afterwards describes our proposed method and the research design. Subsequently we present the results of the qualitative study and based on that, derive propositions on factors influencing patient length of stay. Finally, the limitations of this study as well as future research opportunities are discussed. 130 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) I. Eigner, A. Hamper, N. Wickramasinghe & F. Bodendorf: Decision Makers and Criteria for Patient Discharge - A Qualitative Study Related Work The following section describes the results of our literature analysis concerning decision makers and decision criteria in the patient discharge process. The results form the basis for our qualitative analysis by supporting the selection of our focus group participants as well informing the development of our semi-structured interview guidelines. 2.1 Decision makers While the final decision to discharge a patient resides with the primary physician, other groups have been shown to influence the time of discharge from the hospital. According to Armitage (1981), relatives play a vital part in the discharge negotiation, where both a shorter or a longer stay than necessary could be requested. Depending on their personal situation, their environment after discharge or their general well-being, a patient can also act as an influencer in the discharge decision. From the hospital personnel perspective, nurses tend to give suggestions and actively participate in the evaluation of a patient’s well-being. As they are the closest caregiver to the patient in the hospital setting, they can sometimes better determine a patient’s status and have a deeper understanding of a patient’s personal situation than the treating physician (Hofmeyer & Clare, 2014). Finally, the treating physician, as well as other consulting doctors primarily, evaluate the clinical factors. They provide the final discharge decision with respect to the input of other stakeholders, clinical guidelines or other underlying conditions, such as ethical considerations (Chadwick & Russell, 1989). 2.2 Decision criteria A literature review conducted by Harun et al. (2014) identified 17 studies analysing the patient discharge process to determine influencing factors in this context. They found several medical and non-medical influences on discharge decision making through either prospective or retrospective studies (cf. Figure 2). Literature shows, that mostly qualitative studies are conducted to identify impacts and behaviours of patient discharge. Thus, the results solely rely on subjective opinions of the interviewees. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 131 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) I. Eigner, A. Hamper, N. Wickramasinghe & F. Bodendorf: Decision Makers and Criteria for Patient Discharge - A Qualitative Study Figure 2: Influencing factors on discharge decision making (Harun et al., 2014) The factors identified in these studies can be assigned into two major categories: Measurable and non-measurable factors Table 1). While non-measurable items can only be gathered and interpreted through qualitative methods, measurable information can be collected and used to quantitatively test their impact on the patient discharge decision and their outcomes. This way, quantitative factors can be used for decision support to complement qualitative factors, such as ethics and intuition. The decision criteria as suggest in this study form the basis for our focus group interview guideline. We thereby especially focus on the measurable factors to initially derive proposition and testable hypotheses in a next step. Table 1: Decision criteria for patient discharge Characteristics Influencing factors Measurable Non-measurable - Diagnosis Disease-related - Severity - Readmission risk - Intuition - Clinician’s experience and - Personality Clinician-related expertise - Perceptions - Level of seniority - Ethics and values - Quality of life - Behaviour - Socioeconomic and - Patient/Family Patient-related functional status preferences or - Ability to self-manage expectations - Insurance - Practice patterns - Resource constraints - General practitioner or Practice-related - Policies and guidelines community care support - Information availability Method This paper presents the first part of a mixed methods approach (Venkatesh, Brown, & Bala, 2013; Venkatesh, Brown, & Sullivan, 2016) following a qualitative study design. As such, mixed methods research “uses quantitative and qualitative research methods, 132 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) I. Eigner, A. Hamper, N. Wickramasinghe & F. Bodendorf: Decision Makers and Criteria for Patient Discharge - A Qualitative Study either concurrently (i.e., independent of each other) or sequentially (e.g., findings from one approach inform the other), to understand a phenomenon of interest” (Venkatesh et al., 2013). This study is conducted sequentially, i.e. the results of the qualitative study in this paper will be evaluated with a quantitative analysis afterward. The aim of this study is to derive propositions on the impacts and implications of time of patient discharge. Thus, in a first step, focus groups are conducted at an Australian hospital group to determine decision makers and criteria for patient discharge and the relevance of readmissions in this context. Figure 2 shows the proposed approach as well as the areas under study. Qualitative study Quantitative study sn D o e Decision makers and riv itis criteria o e p h o yp r Test hypotheses p o p th Risk of readmission lo es ev es eD Figure 2: Mixed methods approach Study population We held three focus groups with 4 participants each, consisting of 7 men and 5 women, thus 12 participants in total. Each session was facilitated by a moderator and lasted about one to two hours. According to Krueger (2015), focus groups should follow five key criteria. First of all, small groups of people are assembled, usually ranging between five to eight people. However, so-called mini-focus groups with four to six people, are becoming increasingly popular as they provide a more comfortable environment for participants and allow every person to be able to participate. Furthermore, the select participants should possess certain common characteristics to be suitable for the topic under discussion. In our study, the homogenous environment of an Australian hospital group is selected as the main criterion in group member selection. The groups consisted of medical and non-medical personnel from various departments, such as the ICU, Research, Clinical Audits, Quality Management and the Emergency Department. The focus of these focus groups, on the one hand, was the determination of stakeholders and decision makers as well as their concerns and criteria for the time of patient discharge. On the other hand, we addressed the topic of the risk of readmission, and how readmissions are detected and handled in the hospital. Next, the goal of focus groups is to collect qualitative data to gain different insights and opinions across groups that can subsequently be compared and contrasted. Finally, this method utilizes a focused discussion „to get a range of opinions about a something like an issue, behaviour, 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 133 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) I. Eigner, A. Hamper, N. Wickramasinghe & F. Bodendorf: Decision Makers and Criteria for Patient Discharge - A Qualitative Study practice, policy, program or idea“ (Krueger & Casey, 2015). A semi-structured interview guideline was prepared and reviewed to ensure consistency throughout all focus groups, yet allow for some flexibility within the specified topics. For this purpose, focus group questions were developed by the research team according to three main areas:  Decision makers and factors influencing the time of patient discharge  Factors influencing the risk of readmissions  Information availability The aim of the focus groups was thereby to identify the issues, behaviours and needs for patient discharge with regards to the risk of readmission and the available information in that process. Results In the following section, we describe the results of our focus group interviews according to our three main areas. We identify decision makers and influencing factors on the patient discharge decision as well as the impact of the risk of readmission. To specify, we utilize the patient length of stay as the comparative indicator for the time of patient discharge. 4.1 Decision makers The results of the focus group support the results from our literature analysis but give a deeper understanding of the discharge negotiation. Requests from family members and patients to stay longer are taken into consideration in accordance with medical necessity and availability of resources. “Family members or patients often push for a longer stay; […] the requests are taken into consideration, but it requires a conversation about the medical necessity”, “Patients and family often ask to stay longer. Since it’s a private hospital that can sometimes be arranged, depending on the available beds.” According to one interviewee, this especially happens with readmission cases, stating that “if they’re nervous, especially if the patient already had multiple readmissions they want to be on the “safe side”. Similar to the results from literature, the focus groups agreed that usually “nurses make the suggestions for discharge, when they feel that the patient is well enough”, but that in the end “the consulting physician has the final say and makes the decision when the patient is discharged”. In case a patient stayed at multiple wards or “saw multiple doctors, they will make a decision together”. Depending on the ward a patient is treated at, there can be specific people in charge that lead the decision. In ICU, one interviewee stated that “the decision to discharge […] is made by the intensive care specialist in conjunction with the treatment team, so the physician, surgeon, etc. The physician will determine if the patient has been stable for a certain time, if the blood tests are, if not normal, at least trending in the right direction.” In the special case of private hospitals as in the case under study, insurance can also play a role in the sense that “if the patient runs out of insurance, then the patient is transferred to a public hospital”. 134 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) I. Eigner, A. Hamper, N. Wickramasinghe & F. Bodendorf: Decision Makers and Criteria for Patient Discharge - A Qualitative Study 4.2 Influencing factors on time of patient discharge Within all groups, the type and severity of the diagnosis were concluded as the most prominent factor. One person stated that „The time of discharge depends on how what they come in with and how frail the patients are and why they needed the medical care in the first place”. Similar, others referred to this as “the complexity of admission” or proposed that the best time of patient discharge mainly “depends on what he/she comes in with”. Our first proposition that is derived from our interviews, therefore, suggests a significant difference within the durations of patient visits: P1: There are significant differences in patient length of stay between different diagnoses. Going further, not only the type of diagnosis but also the severity of the condition and frailty of the patient were mentioned as relevant factors. Therefore, we further propose to differentiate time of patient discharge and length of stay within diagnoses groups: P2: There are significant differences in patient length of stay within diagnoses groups depending on the disease severity. 4.3 Influencing factors on risk of readmission Next, our interviews show a varying perception of the benefits and threats of a later time of patient discharge. While some participants argued that a shorter length of stay is more beneficial for patients (“There are multiple risks of longer hospital stays: infection, blood clots, pressure sores, etc”; “It’s best, to get people out earlier, because an earlier discharge can improve the outcome”), some interviewees propose that they tend to keep critical patients for longer to make sure a patient is healthy enough to leave. One participant stated “The more critical a patient is, the longer the required “period of normality” before they are discharged.” Thus, the time of patient discharge shouldn’t be both too early or too late, leading to our following proposition: P3: The length of stay has a significant impact on the risk of readmission. Furthermore, the interviews show that this applies even more to certain patient groups, especially for chronic diseases. “Especially patients with chronic diseases are often “frequent flyers” in the hospital, for example, renal failure, Diabetes, Airways disease, Cardiac disease. […] These patients make up 80% of medical activity and cost”. We, therefore, conclude the following propositions: P4a: There are significant differences in risk of readmission between different diagnoses. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 135 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) I. Eigner, A. Hamper, N. Wickramasinghe & F. Bodendorf: Decision Makers and Criteria for Patient Discharge - A Qualitative Study P4b: There are significant differences in risk of readmission between within diagnoses groups depending on the disease severity. Figure 4 displays the theoretical model of the derived propositions, visualizing the relationships between diagnosis, disease severity, the length of stay and risk of readmission. Diagnosis P4a P1 P3 LOS Risk of readmission P2 P4b Disease severity Figure 3: Theoretical model of influencing factors on length of stay and risk of readmission 4.4 Information availability The third part of the focus group interviews focused on the type and amount of available data that is required in the discharge process. In general, one interviewee stated the discharge decision requires input about “the objective, medical factors as well as subjective factors”, i.e. intangible information that cannot be measured. These subjective factors are usually determined by the physiologist. The availability of information can also negatively impact the length of stay i.e. lead to a delayed time of patient discharge. “[…] Having the data available sooner or digitally may or may not improve the decision of patient discharge, but It could improve the efficiency of discharge because a delayed discharge is bad for the patient and the hospitals.” A delayed discharge can increase the risk of hospital infections and can result in penalties for the hospital if the length of stay is continuously too long across multiple episodes. Besides increasing efficiency through digitized data, the advances of more complex data analysis and visualization were discussed within one of the focus groups. “It wouldn’t be enough to digitize the information, but to combine the information and use more complex information to show doctors more sophisticated overviews of risk etc.” In that sense, 136 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) I. Eigner, A. Hamper, N. Wickramasinghe & F. Bodendorf: Decision Makers and Criteria for Patient Discharge - A Qualitative Study individual data points might not be critical, but in combination, they might show relevant information to the clinician. As one physician stated: “The complexity [of data] outpaces the availability [of clinicians] to digest the information”. Within this discussion, the application of Business Analytics or Machine Learning methods was proposed as helpful to counteract this complexity. An intuitive visualization is thereby key to filter out the relevant information. “It’s important to quantify and visualize the results from such analyses, e.g. % likelihood of deterioration”. Especially information concerning the potential risk is not yet assessed in detail, even though unnecessary readmissions could be avoided with this knowledge. “The information of risk assessment of a patient is collected, but not really used. If that information was visualized properly (e.g. a different light for a high-risk patient in ED), that would be very helpful.” This information could be both helpful for treatment of individual patients as well as on a more organizational level. For this purpose, aggregated data for each DRG group or specialty could be displayed to improve hospital coordination and management. On an individual level, the risk for each patient could support clinicians to determine the best time of patient discharge. Discussion In this study, we identify decision makers and influencing factors in the patient discharge process and for risk of readmission and shortly discuss the potential of data analytics and visualization in the healthcare context. As the first part of a mixed method study, we develop semi-structured focus groups interviews that are carried out at a not-for-profit tertiary Australian hospital group. The results of the interviews show similar findings as our initial literature review considering decision makers and criteria in patient discharge, but give a deeper understanding of the discharge negotiation. The analysis of these focus groups results in five propositions on the influencing factors on length of stay and risk of readmission in private hospitals. Our aim is to further develop these propositions into a testable model and derive hypotheses on the relationships between these influencing factors. For this purpose, we will collect data on patient episodes at the case hospital to further specify our proposed theoretical framework in a follow-up study. By following a mixed methods approach, the qualitative results of the focus group interviews can be further supported by quantitative evidence and therefore strengthen our initial results. Thus, the identified stakeholders involved in the patient discharge decision can be supported during this process by utilizing data-driven insights to find the optimal time of patient discharge. The results of the focus groups also show a high interest and applicability of data analytics in the healthcare context to enable faster and more evidence-based decision making. This study aims at providing a deeper understanding into the patient discharge process and gives suggestions on how the use of data analytics could support this process in the future. From a research perspective, the quantification of influencing factors on patient 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 137 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) I. Eigner, A. Hamper, N. Wickramasinghe & F. Bodendorf: Decision Makers and Criteria for Patient Discharge - A Qualitative Study length of stay adds to the current understanding of criteria in patient discharge from qualitative studies. Based on these initial results, future studies could use the identified features to address issues related to patient discharge such as the detection of patients at high risk of readmission. This, in turn, could help practitioners to make more evidence- based decisions in the patient discharge process. The results of this study have to be considered under certain limitations. First, the participants of the focus group were selected from a single hospital group. To provide generalizable results, further studies have to be conducted at different sites. Second, the propositions developed in this paper are not yet quantitatively evaluated and are based on the authors’ interpretation of the qualitative results. This restriction will be approached in a follow-up study using patient episode data at the hospital under study. References Saczynski, J. S., Lessard, D., Spencer, F. A., Gurwitz, J. H., Gore, J. M., Yarzebski, J., & Goldberg, R. J. (2010). Declining length of stay for patients hospitalized with AMI: impact on mortality and readmissions. The American journal of medicine, 123(11), 1007–1015. Chopra, I., Wilkins, T. L., & Sambamoorthi, U. (2016). Hospital length of stay and all-cause 30- day readmissions among high-risk Medicaid beneficiaries. Journal of hospital medicine, 11(4), 283–288. Bartel, A., Chan, C., & Kim, S.-H. (2014). Should Hospitals Keep Their Patients Longer? The Role of Inpatient Care in Reducing Post-Discharge Mortality. Cambridge, MA: National Bureau of Economic Research. Baker, D. W., Einstadter, D., Husak, S. S., & Cebul, R. D. (2004). Trends in postdischarge mortality and readmissions: has length of stay declined too far? Archives of internal medicine, 164(5), 538–544. Heggestad, T. (2002). Do Hospital Length of Stay and Staffing Ratio Affect Elderly Patients' Risk of Readmission? A Nation-wide Study of Norwegian Hospitals, Health Services Research, 37(3), 647–665. Venkatesh, V., Brown, S. A., & Sullivan, Y. W. (2016). Guidelines for Conducting Mixed-methods Research: An Extension and Illustration. Journal of the Association for Information Systems, 17(7), 435–495. Krueger, R. A., & Casey, M. A. (2015). Focus groups: A practical guide for applied research (5th ed.). Thousand Oaks, California: SAGE. Venkatesh, V., Brown, S. A., & Bala, H. (2013). BRIDGING THE QUALITATIVE- QUANTITATIVE DIVIDE: GUIDELINES FOR CONDUCTING MIXED METHODS RESEARCH IN INFORMATION SYSTEMS. MIS Quarterly, 37(1), 21–54 Hofmeyer, A., & Clare, J. (2014). The role of the hospital liaison nurse in effective discharge planning for older people: Perspectives of discharge planners. Contemporary Nurse, 8(3), 99– 106. Kaboli, P. J., Go, J. T., Hockenberry, J., Glasgow, J. M., Johnson, S. R., Rosenthal, G. E., et al. (2012). Associations between reduced hospital length of stay and 30-day readmission rate and mortality: 14-year experience in 129 Veterans Affairs hospitals. Annals of internal medicine, 157(12), 837–845. Augustinsson, S., & Petersson, P. (2015). On discharge planning: Dynamic complex processes - uncertainty, surprise and standardisation. Journal of Research in Nursing, 20(1), 39–53. 138 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) I. Eigner, A. Hamper, N. Wickramasinghe & F. Bodendorf: Decision Makers and Criteria for Patient Discharge - A Qualitative Study Chadwick, R., & Russell, J. (1989). Hospital Discharge of Frail Elderly People: Social and Ethical Considerations in the Discharge Decision-making Process. Ageing and Society, 9(03), 277– 295. Armitage, S. K., & Kavanagh, K. M. (1998). Consumer-orientated outcomes in discharge planning: a pilot study // Consumer-orientated outcomes in discharge planning: A pilot study. Journal of Clinical Nursing, 7(1), 67–74. Harun, N. A., Salek, S., Piguet, V., & Finlay, A. Y. (2014). The dermatology outpatient discharge decision: understanding a critical but neglected process. The British journal of dermatology, 170(5), 1029–1038. Armitage, S. K. (1981). Negotiating the discharge of medical patients. Journal of Advanced Nursing, 6(5), 385–389. State Government of Victoria, Department of Health. Casemix funding, from https://www2.health.vic.gov.au/hospitals-and-health-services/funding-performance- accountability/activity-based-funding/casemix-funding. Center for Medicare & Medicaid Services (2016). Readmissions Reduction Program (HRRP), from https://www.cms.gov/medicare/medicare-fee-for-service- payment/acuteinpatientpps/readmissions-reduction-program.html. Matis, T., Farris, J., McAllister, M., Dunavan, C., & Snider, A. (2015). Target times for inpatient discharge scheduling. IIE Transactions on Healthcare Systems Engineering, 5(1), 33–41. Goncalves-Bradley, D. C., Lannin, N. A., Clemson, L. M., Cameron, I. D., & Shepperd, S. (2016). Discharge planning from hospital. The Cochrane database of systematic reviews, (1), CD000313. Mukotekwa, C., & Carson, E. (2007). Improving the discharge planning process: A systems study. Journal of Research in Nursing, 12(6), 667–686. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Analysing Digital Transformation among Hungarian Organizations 11 PÉTER FEHÉR, ZOLTÁN SZABÓ & KRISZTIÁN VARGA Abstract This paper presents the findings of a research on Digital Transformation, performed among the Hungarian companies in the first half of 2016. Investigated organisations consider digital business transformation as a key issue. Many factors influence Digital Transformation readiness: risk-tolerance, development of IT skills, and conscious management of innovations ideas. Adequately aligned IT strategy can be also a catalyst of digital strategies. Keywords: • Digital transformation • Innovation sources • Digital strategy • CORRESPONDENCE ADDRESS: Péter Fehér, Corvinus Business School, Fővám tér 8, 1093 Budapest, Hungary, e-mail: pfeher@informatika.uni-corvinus.hu. Zoltán Szabó, Corvinus Business School, Fővám tér 8, 1093 Budapest, Hungary, e-mail: szabo@informatika.uni-corvinus.hu. Krisztián Varga, Corvinus Business School, Fővám tér 8, 1093 Budapest, Hungary, e-mail: kvarga@informatika.uni-corvinus.hu. https://doi.org/10.18690/978-961-286-043-1.11 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 140 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Fehér, Z. Szabó & K. Varga: Analysing Digital Transformation among Hungarian Organizations Introduction In the new era of technology-enabled competition, many organizations have to deal with disrupting technologies, emerging new competitors, challenging IT-based innovative models. In many industries, digital transformation is a key enabler of future success or survival, by better connecting digitally with consumers, partners, by improving internal efficiency through improved process, by facilitating deeper insight and business intelligence, and by providing enhanced products and services (Capgemini, 2011). The increasing use of integrating digital technologies (social media, mobile applications, business analytics and cloud based services) has a transforming impact on companies and on how their businesses work. The depth of changes is dependent on digital maturity. Digitally less-matured businesses have limited opportunities by concentrating on solving discrete business problems, using individual digital technologies. Digitally most matured organizations develop digital strategy based complex innovations to transform the business (Kane, et.al. 2015). Digital business is a complex approach influencing all aspect of operations, provides several benefits, like improved transparency and control of operations, extension of IT based systems, data collection and analysis, increased integration of business applications, transforms analogue process to streamlined and efficient digital ones. Typical organizations have internal efficiency and operational focus, while the digitally matured organizations the priorities are: automation of processes, distant control and execution of procedures and automation of human activities. Pressures for digital transformation are also present in Hungary. This paper presents the findings of a research on Digital Transformation, as a new and special part of our yearly IT management survey of Hungarian organizations. Research data were collected through anonymous questionnaires, and complemented with case study findings. The questionnaires were filled voluntarily, mostly by top and mid-level executives. Our survey panel consists of over 100 Hungarian organizations, that have critical IT infrastructure, they are valid representatives of conscious Hungarian information management practitioners. Most of the respondents were invited through the Hungarian professional communities (CIO Association, itSMF Hungarian Chapter). Almost 19% of the organisations are micro or small enterprise, 27% are medium-sized enterprise, and 54% of them are large-sized enterprises. Organisations both represent the public sector (22%) and the private sector (78%). Our goal was to explore the attitude of Hungarian companies towards the concept of digital transformation, to identify patterns in the implementation or plans, and to provide a deeper understanding of the problems and impediments of digital transformation oriented initiatives. 30TH BLED ECONFERENCE: DIGITAL TRANSORMATION – FROM CONNECTING THINGS TO 141 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Fehér, Z. Szabó & K. Varga: Analysing Digital Transformation among Hungarian Organizations Based on the survey our intention with this article is to investigate the following issues: • Strategic perspective: How do companies integrate digital transformation concepts to their strategic planning, especially to IT related strategic thinking? • Innovation perspective: What are the origins of innovative ideas in organizations, how do they explore new opportunities? • Implementation perspective: Are the Hungarian organizations prepared for digital transformation? Have they the necessary competencies and resources? What are the major enabling/inhibiting factors? • Technology perspective: What are the relevant IT initiatives, innovative technologies that are frequently used in Hungarian companies? • IT organizational perspective: What is the role of IT units in digital transformation? Survey Results: Digital Transformation in Hungary Research results confirmed that the investigated organisations consider digital business transformation as a key issue. The research also points out that there are many uncertainties on the way towards digitization: organizations cannot foresee the challenges and opportunities, and only some of them marked out clearly their digital business strategy, or even just a few implemented digital transformation projects. Most of the companies are not so enthusiastic about the risk related to the introduction of innovative digital solutions. 2.1 Digital Strategy Bharadwaj et al (2013) states, that a digital strategy should be different of traditional IT strategy. An organization’s IT Strategy should focus on business needs, the ability of IT to meet those needs, how to close any gaps, how decisions will be made and how to measure progress (CIO Magazine, 2008). Dave Aron (2013) from Gartner stated, that IT Strategy is a technical answer to a business question, while Digital Strategy is a business answer to a digital question. So, digital strategy in a cross-functional strategy, that address all functions and processes of an organization. The role of IT strategy is to fulfil the requirements of the digital strategy, that is interpreted as a business strategy. Our research showed, that almost half of the surveyed organizations include digital transformation issues into their organizational strategy, while a little more than a quarter of the organizations include digital transformation questions into their IT strategy. Moreover 10% of the organizational have an independent digital transformation strategy, and 15% of the organizations have no digital strategy at all. 142 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Fehér, Z. Szabó & K. Varga: Analysing Digital Transformation among Hungarian Organizations No interest in digital transformation 15% Independent digital Enterprise strategy transformation includes digital strategy transformation issues 10% 48% Digital transformation is part of the IT strategy 27% Figure 1: Digital transformation is not part of IT strategy The results partly follow the insights of Bharadwaj el al (2013), as most organizations integrate digital questions into their strategy, but there is still a huge number of organisations which still believe the role of IT in these questions. Moreover, if we analyse how the business and IT strategy is related to each other, we can realise, where strategic alignment of business and IT could be accomplished, higher share of business integrated digital transformation is present (65% vs. 50%), and there is no independent digital transformation strategy at all. Companies developing IT strategy as a derivative of the business strategy are less interested in digital transformation, some of them have an independent digital strategy, and the IT unit's influence on digital strategies is weaker. Companies having integrated business and IT strategic planning are more active in digital transformation, and they tend to involve digital innovation to their existing planning activities. Based on these results, an adequately aligned IT strategy can be a catalyst of digital strategies. 30TH BLED ECONFERENCE: DIGITAL TRANSORMATION – FROM CONNECTING THINGS TO 143 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Fehér, Z. Szabó & K. Varga: Analysing Digital Transformation among Hungarian Organizations Figure 2: Level of strategic alignment influences the attitude towards digital strategy 2.2 Innovation Process - The Origin of New Ideas Even though there is the willingness and implementation capacity, solutions are needed that meet external (customer) and internal (staff) requirements. Therefore methods and approaches of idea-generation and collection in companies are key issues. Employee feedback 3.64 Customer feedback 3.58 Analysing of operational data 3.24 Consultants 3.07 NGO, network, conferences, partners 2.91 Suppliers 2.87 1 1.5 2 2.5 3 3.5 4 Figure 3: Both external and internal sources support digital transformation (1-5 scale) 144 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Fehér, Z. Szabó & K. Varga: Analysing Digital Transformation among Hungarian Organizations Based on the survey results idea-collecting activities of companies are somewhat stronger than the medium in average, but there are various levels of emphases on the different sources of innovative ideas. The two most important area mentioned are the external (customer) and internal (employees) related ideas, there is no significant difference between the importance of these sources. Companies put much less emphases on systematic exploration of the operations, collection and evaluation of data related to operations. In addition to these feedback sources the statistically analysed data and focused customer and employee data collection, process monitoring, problem detection may be the best basis for organizations to identify the improvement opportunities of activities, processes customer experience. Although placed backward in the survey, outside opinions (analysts’, consultants’, supply chain representatives’, or partners’ and competitors’ experiences and ideas) can be also a valuable source of innovation. Planning and Implementation Recently many CEOs generally understand the strategic opportunities and threats of digital transformation, and developed a vision or even a strategy for their companies to initiate changes. On the other hand, most organizations have only insufficient skills and knowledge in digital business, which can be a major impediment of executing the digital strategy (HBR 2015). Digital transformation has become the major facilitator of business success, it provides new approaches to optimise processes, improve data analysis and extend customer relationships. Although technology can be mentioned as a key enabler of recent business innovations, it is generally accepted that strategy is the key driver in the digital arena (Kane, et.al. 2015). The digital business transformation can bring significant changes in the life of organizations, but it means also significant risks. This dichotomy can be observed in most of the companies: despite the importance of digital transformation for many organizations, organizational readiness is a key factor in the assessment of risks. While the domestic entities reported the strategic importance of the issue (on a scale of 1-5, 4.15), they evaluated their own preparedness to a much lower level. Organizations estimated their technological knowledge and skills necessary for digital transformation just slightly higher than the medium level. 30TH BLED ECONFERENCE: DIGITAL TRANSORMATION – FROM CONNECTING THINGS TO 145 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Fehér, Z. Szabó & K. Varga: Analysing Digital Transformation among Hungarian Organizations Digital business transformation is important for 4,15 us We understand the digital challenges and 3,73 opportunities We developed significantly our products and 3,5 services with digital solutions Clear digital business strategy was set by the 3,4 leadership We are ready to take risk with implementing 3,36 innovative digital solutions 1 1,5 2 2,5 3 3,5 4 4,5 Figure 4: Despite importance making it happen is not trivial Lack of clear vision and mission is a top barrier mentioned in international research (Rich, 2017), just as cultural and organizational issues. From this perspective, the situation is promising (the importance of the digital transformation is generally accepted), but the key aspects of the implementation capabilities are just slightly better than medium. Culture of innovation is not the strongest feature of many organizations (Capgemini, 2011), so the Hungarian results are also not surprising. In this sense, we can understand the risk-avoidant behaviour of the organizations, since taking a risky step requires preparation and knowledge: • Employees should have IT knowledge and digital skills (and it is not just the privilege of the IT staff), and organizations should consequently develop these skills • The organizations should consciously monitor and evaluate technology trends, innovative solutions should be piloted • companies should set up a group with well-defined goals, roles and responsibilities to implement digital transformation. According to the results of Weill and Aral (2006) high IT savviness is originated from five characteristics of successful organizations, amongst them companywide IT skills and management involvement. Our results showed that companies recognized the strategic importance of the digital transformation, but the implementation related competencies should be developed further. Analysed companies evaluated their ability to give quick response to the fast environmental changes at lower than medium level, so the implementation capability should be significantly improved. 146 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Fehér, Z. Szabó & K. Varga: Analysing Digital Transformation among Hungarian Organizations Most of the leading service providers reported in a survey (Rich, 2017), that they are still in the early stages of their transformation program. The overall observation of our survey was somehow similar, but in Hungary many companies are just in an experimental phase, complaining about many issues – lack of experiences, lack of skills, etc. We have the required technology knowledge and 3,53 competencies for digital business transformation We consciously monitor and evaluate technology 3,41 trends During the development of our workforce digital 3,31 skills have a priority New technologies are continously reviewed and 3,21 piloted We have set the required roles, tasks and 3,02 responsibilities of digital transformation We are able to quickly transform our digital 2,96 solutions to support changing needs 1 1,5 2 2,5 3 3,5 4 Figure 5: There is the will for digital transformation (1-5 scale) The Role of IT in Digital Initiatives In 2016 digital transformation primarily occurred in cloud and mobile platforms, but companies improved their communication technologies and great attention was paid to the integration of social media solutions. The transformation does not only mean the introduction of IT solutions, but also requires the change of organizational operations or the transformation of processes, even with the introduction of radical, new solutions. Our results are similar to other surveys (e.g. BT (2016), where the most widespread disruptive technologies are the cloud (58%), mobility and collaboration (54%); while the popularity of data (BI, big data) related initiatives were much less frequently mentioned in Hungary (19%) than on international level (52%). 30TH BLED ECONFERENCE: DIGITAL TRANSORMATION – FROM CONNECTING THINGS TO 147 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Fehér, Z. Szabó & K. Varga: Analysing Digital Transformation among Hungarian Organizations Cloud solutions 55% Mobile 52% Unified communication 46% Integrating social media 36% Big Data 19% Identity management 8% 0% 10% 20% 30% 40% 50% 60% Figure 6: The most important technologies drive digital transformation (project started in 2016 by the organization) The organizations in our research think, that IT knowledge is necessary to the digital business transformation in all areas – the difference may be in the extent. Not surprisingly, the leader of the list is the IT area, but more importantly, the responders evaluated the existence of digital knowledge in most areas higher, than 'medium'. What's more, the business respondents evaluated digital knowledge in marketing, finance, accounting and logistics more important compared to respondents from IT. While IT knowledge necessary for the business transformation is required from IT professionals by organizations, the role of IT seems to be more supporting: to address security issues, the implementation capacity (supplier management, development, project management), architecture design. Interestingly, participation in innovative projects (initiation or execution) pushed to the end of the list – but it is worth noting that even this category is stronger than 'medium' (1-5 scale: 3.84 and 3.77). 148 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Fehér, Z. Szabó & K. Varga: Analysing Digital Transformation among Hungarian Organizations 5 4.41 4.38 4.37 4.5 4.19 4.17 4 3.84 3.77 3.5 3 2.5 2 1.5 1 Managing IT Delivering digital Leading and Supporting IT Providing the Offering digital Delivering IT security and risk solutions, even with delivering IT initiatives of required solutions for Department related issues the help of projects business architectire for business solutions for suppliers departments digital business business innovation ideas Figure 7: Role of IT departments in digital transformation (1-5 scale) It seems that IT, and IT leaders have to manage an interesting situation: their knowledge is essential to the successful implementation of digital business transformation, but our research showed that in the making of ideas or innovation business areas do not rely on them. Business areas often go their own way, and involve IT areas later – sometimes too late. As evidence, we have seen that most organizations consider the digital transformation strategy distinct from IT strategy, and they put the emphasis on business issues such as how will my business processes change, what can be used from an existing digital toolbox. Since the use of cloud services is increasingly widespread in Hungary, it can happen easily that business areas decide to use IT services without involving the IT - then of course they need integration, standardization, and raise security issues. This leads IT to lose control and the opportunity of proactiveness. Conclusion Our research results showed that the Hungarian companies have a positive attitude towards the digital transformation concept, the general level of awareness is high. Among the analysed topics we discovered some general patterns: • Maturity in Strategic alignment has a positive effect on digital transformation planning and initiatives. • Companies combine external (customer) and internal (staff) innovation ideas, and less active in other potential sources of digital transformation initiatives. • technology is a key enabler of digital transformation, cloud based application and mobile initiatives are still very popular. 30TH BLED ECONFERENCE: DIGITAL TRANSORMATION – FROM CONNECTING THINGS TO 149 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Fehér, Z. Szabó & K. Varga: Analysing Digital Transformation among Hungarian Organizations There are also many problems related to the concept: • The implementation capability should be significantly improved. • IT knowledge and skills are important not just for the actual development, but for the awareness rising and idea generation. The current question that IT managers face nowadays: what will be their role in digital business transformation, and what extent can they remain part of the whole process? While the IT area is best suited to identify and test new technologies, it will have to evolve in order to comply with users', customers' needs, and offer services in business language. Another important area to be developed is speed: if IT is not capable of quick changes or supply fast solutions, business areas can take over control. Acknowledgement The publication was prepared within the Széchenyi 2020 program framework (EFOP-3.6.1-16- 2016-00013) under the European Union project titled: „Institutional developments for intelligent specialization at the Székesfehérvár Campus of Corvinus University of Budapest”. The authors wish to acknowledge the support of the Hungarian CIO Association, and itSMF Hungarian Chapter. References Aron, D. (2013): The Difference Between IT Strategy and Digital Strategy, http://blogs.gartner.com/dave-aron/2013/11/12/the-difference-between-it-strategy-and-digital- strategy/ Bharadwaj, A., El Sawy, O. A., Pavlou, P., and Venkatraman, N. (2013): Digital Business Strategy: Towards a Next Generation of Insights, in MIS Quarterly Vol. 37 No. 2, pp. 471-482/June 2013 BT (2016): The BT CIO report 2016. The digital CIO. British Telecommunications plchttps://www.bt-stemmer.de/ausgabe-newsletter/bt-cio-report-2016-der-cio-als-digitaler- enabler.html?file=tl_files/jkm/theme/downloads/newsletter2016- 06/BT_cio_report_2016_the_digital_cio_final.pdf Capgemini (2011): Digital Transformation: A Roadmap for Billion-Dollar Organization (Report). Capgemini Consulting. 2011. https://www.capgemini.com/resource-file- access/resource/pdf/Digital_Transformation__A_Road-Map_for_Billion- Dollar_Organizations.pdf CIO Magazine (2008): Truth be told, we work half as hard as our competitors on ERP assessments, in CIO Magazine, Vol. 21, No. 8, pp. 31-36. HBR (2015): Driving Digital Transformation: New Skills for Leaders, New Role for the CIO. Harvard Business Review Analytic Services. 2015 Harvard Business School Publishing. https://hbr.org/resources/pdfs/comm/RedHat/RedHatReportMay2015.pdf Kane, Gerald; Palmer, Doug; Nguyen Phillips, Anh; Kiron, David; Buckley, Natasha. (2015): "Strategy, not Technology, Drives Digital Transformation". MIT Sloan Management Review. Retrieved 2016-01-18. http://sloanreview.mit.edu/projects/strategy-drives-digital- transformation/ 150 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Fehér, Z. Szabó & K. Varga: Analysing Digital Transformation among Hungarian Organizations Rich, R. (2017): Digital Transformation: Navigating the Way to Success. Insights Research, TM Forum. https://inform.tmforum.org/research-reports/digital-transformation-navigating-way- success/ Weill, P. D., & Aral, S. (2006): Generating Premium Returns on Your IT Investment. MIT Sloan Management Review, 47(2), 39–48. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Using Design Thinking to Identify Banking Digitization Opportunities – Snapshot of the Hungarian Banking System 12 PÉTER FEHÉR & KRISZTIÁN VARGA Abstract In our research, we used Design Thinking and our "One Week Sprint" methodology to identify digital transformation opportunities for the Hungarian banking sector. Our main findings can be grouped to three main areas: (1) the changing role of branches (2) online, mobile and phone-based services and (3) products and services. The compound of customers is quite heterogeneous in age, education or income status for all banks in our research, therefore, the possibility of generalization of problems and possible solutions is limited. A major challenge for banks is that they need to think up to 20-30 customer segments, and offer services with which can serve the needs of other segments – so generic enough to meet more segments' needs. Of course, the strategies of banks may differ in the targeted segments; however, banks with general strategy can be dominated by competitors concentrating on a niche strategy, or a FinTech, for example, with the widespread application of digital solutions. Keywords: • Digital Transformation • Design Thinking • One Week Sprint • Banking • CORRESPONDENCE ADDRESS: Péter Fehér, Corvinus Business School, Fővám tér 8, 1093 Budapest, Hungary, e-mail: pfeher@informatika.uni-corvinus.hu. Krisztián Varga, Corvinus Business School, Fővám tér 8, 1093 Budapest, Hungary, e-mail: kvarga@informatika.uni-corvinus.hu. https://doi.org/10.18690/978-961-286-043-1.12 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 152 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Fehér & K. Varga: Using Design Thinking to Identify Banking Digitization Opportunities – Snapshot of the Hungarian Banking System Introduction Although the banking industry is a traditional and conservative industry, it has to follow the required changes of digital transformation. Although the banking industry is heavily dependent on technological solutions, this change is not encoded in the genes of the banks. Moreover, identifying possible digital developments is harder, than the banks think. The goal of our research was to analyse to identify customer challenges of Hungarian retail banks, to develop and to test digital ideas to address these challenges. For this research, we were collaborating with seven Hungarian banks, and analysed both online and offline customer challenges. The goal of this paper is to overview the related concept in the literature, and present the results of this research. Related concepts The goal of this chapter is to analyse the current challenges of digital transformation, presenting the challenges of the banking industry, and analysing how customer centric digital innovations can be delivered. 2.1 The challenge of Digital Transformation Digital developments were traditionally dedicated to the responsibility of IT Departments. Although the alignment between business and IT goals was a never-ending discussion of both practitioners and researchers (Henderson and Venkatraman, 1993; Renaud et al (2016); Kahre et al, 2017), the leading role of organizational IT was not really questioned, and outsourcing of IT services usually arose mostly in operational issues. By now, the exclusivity of developing new IT services, and delivering digital innovations has loosened, mainly because of the following reasons:  As digitization reached business departments, the requirement of IT knowledge, and IT savvy employees became vital of organizational success (Weill and Aral, 2006). Therefore business leaders and employees had to acquire digital skills, so IT departments’ knowledge monopoly is under demystification.  As Software-as-a-Service (SaaS) solutions, especially cloud-based solutions became more and more accepted, business units have the opportunity access IT services without involving their IT departments (Katzan, 2009; Foster, 2011; Sultan, 2013). Moreover, introducing a new IT service into business operations via the SaaS model takes less time than the traditional implementation projects (Waters, 2005; Gerhardter and Ortner, 2013).  Not only the speed of implementing new services is an issue, but also the quality of new services. As IT solutions, like infrastructure, or access to internet became 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 153 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Fehér & K. Varga: Using Design Thinking to Identify Banking Digitization Opportunities – Snapshot of the Hungarian Banking System a commodity for most organizations (Carr, 2003), the transaction cost of choosing or changing SaaS services decreased, therefore organizations can select innovative SaaS solutions with lower costs and lower risks. As Carr (2003) urged, “it’s time to rethink IT management”. Therefore, Bharadwaj et al (2013) claim that business units lead the way of digitization, and digital business strategies are separated from traditional IT strategies, as digital strategies address cross-functional business objectives, and changing business processes by utilizing IT resources. Digital strategy is treated as business strategy itself. 2.2 Digitization challenges of the banking sector Digital technologies have been entering the banking industry for years, and the banking industry and banking operations and highly dependent on the IT services (Fung, 2008). Shaikh and Karjaluoto (2016) originates automated retail banking services into the mid- 1960s, because of the requirement of processing the huge number of credit-card related electronic transactions. Since then, digital solutions are not uncommon in the financial sector: ATMs in the late 1960s and 1970s, telephone banking and POS solutions since 1980s, online banking and even mobile banking since late 1990s. Motivations of digitization was faster and cheaper customer service. Despite of these efforts and digital achievements, banking services still seem to be lagged behind general digital technology trends, and behind the digitization of other sectors, especially commerce (Harvey, 2016). The situation is more challenging for the banks, as their customers take their financial services from different service providers (e.g. account, mortgage, commercial credit, credit card, etc.). Easy to access internet-based services make this situation even worse: using SaaS services on the internet provides low transaction costs for trialling, selecting or changing alternate service providers. Moreover, Y-Generation and technology-savvy customers demand and appreciate digital services, and these segments are ready to change for a better digital customer experience (Lipton el al, 2016). Beside the changing customer behaviour, banks have to face new challenges (Harvey, 2016):  As new entrants, FinTech companies offer digital financial services in several niches. FinTech companies act as startups, frame a very specific customer challenge, and offer very specific solutions (e.g. money transfer, microloan, crowdfunding, payment, etc.). One FinTech service probably will not endanger banks, or the banking sector, but together they target small but very profitable slices of the banks' value chains. Surprisingly banks didn’t start to address this challenge, yet (Bunea et al, 2016), although this hybrid financial model seems 154 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Fehér & K. Varga: Using Design Thinking to Identify Banking Digitization Opportunities – Snapshot of the Hungarian Banking System to stick in the market, and questions the role of banks in the following years (Akkizidis and Stagars, 2016).  Technology companies also enter to the market of financial services, as financial services became an integrated segment of their value offerings: Alibaba, Google, Apple, Samsung, etc. provide more and more financial services, which are technologically advanced, and moreover, they can target their existing user base.  Since the financial crisis started in 2008, government and industrial regulations became stricter, and require banks to apply and report these requirements (Goodhart, 2008). These compliance issues require additional investments in technological solutions (reporting, data analysis, fraud protection, anti-terrorism analysis), and makes their service offerings less flexible, and sometimes less user friendly. 2.3 Customer centric digital innovations As customer behaviour is changing, it is not enough simply to offer new digital services, or just to copy the existing services of the competition. Even before the age of digitization, customer experience questions were highly important, and loyalty of banking customers was related to perceived value, service quality, service attributes, satisfaction, image and trust (Beerli, 2004; Lewis and Soureli, 2006). Digital services are expected easy to use, comfortable, natural, but moreover, the solutions should service the need of the customers. FinTech companies, and digital innovators not simply digitalize or automate existing processes, but adequately understand customer challenges or new requirements, in which customer experience has a vital role (Harvey, 2016; Kenesei and Seprődi, 2017). The need of a better-grounded design of products and services started by Herbert Simon (1969, 1996), as defining the role of design as “the transformation of existing conditions into preferred ones” (Simon, 1996:4). Further researches added additional layers to the discourse, applying different epistemology and core concepts (Johansson-Sköldberg et al, 2013):  Rationalism: The science of artificial  Pragmatism: Reflection in action  Postmodernism: Wicked problems  Practice perspective: Designerly ways of knowing  Hermenutics: Creating meaning Nonetheless of the evolvement of the design process, further thinking still refers back to Simon’s framework and practical approaches try to integrate all discussed concepts (Huppatz, 2015). The art of design, the systematic way of designing products and serviced 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 155 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Fehér & K. Varga: Using Design Thinking to Identify Banking Digitization Opportunities – Snapshot of the Hungarian Banking System is labelled as “Design Thinking” (West and Di Nardo, 2016), and applies the following characteristics:  Targets solving non-structured problems  Applies a customer centric approach, analysing customer challenges through observation  Emphasizes the importance of customer value creation and customer experience  Emphasizes the importance of collecting and processing information from various sources  Enhances creativity of participants  Helps to bring together various actors: users, designers, developers, etc. Because of the nature of a general design thinking approach, it is able to be a basis of digital innovations (Izukura et al, 2015; Hosono et al, 2016). Inspired by the overview of different design thinking approaches by Gioia (2011:39) and based on the collection of Dam and Siang (2017) of the Interaction Design Foundation, and processing additional widespread models, a general design thinking process includes the following steps (Figure 1):  Define: defining the scope, problem and challenges, understanding constrains  Explore: explore the target area, context and stakeholders  Interpret: process the explored insights and define the problem to be solved  Ideate: collect, then evaluate multiple solutions  Prototype: develop initial prototypes to illustrate the solution  Iterate: test the prototypes, even is multiple cycles to enhance the idea and to select the most suitable solution  Implement: develop the product or service  Enhance: keep up with the product, provide supper, analyse data and plan further developments (restart the cycle) Define Explore Interpret Ideate Prototype Iterate Implement Enhance Ambrose – Harris (2010) Define Research Ideate Prototype Select Implement Learn Deloitte DeepDive Understand - Observe Visualise Evaluate Implement IDEO Inspire Ideate Implement IDEO HCD Hear Create Deliver Design Council of the UK: 4 D’s Discover Define Develop Deliver Frog Collective Action Toolkit Clarify (Build) Seek Imagine Make Plan What x 4 What is? What if? What wows? What works? The LUMA System Looking Understating Making Sense Know Frame Explore Frame Realize Kumar 101 Intent Context/People insights concepts solution Offerings d.school’s 5 Stages Process Emphatise Define Ideate Prototype Test Design Thinking for Educators Discovery Interpretation Ideation Experimentation Evolution Figure 1: Different models to do design thinking 156 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Fehér & K. Varga: Using Design Thinking to Identify Banking Digitization Opportunities – Snapshot of the Hungarian Banking System Methodology: "One Week Sprint" The goal of our research was to explore and identify customer challenges in retail banking. To achieve this goal, 7 Hungarian banks joined to the project, of which total balance sheet altogether represents 68% of the Hungarian banking industry. Nature of the research, exploring digital banking possibilities, the research was considered explorative. We wanted deeper insight than the traditional surveys and case studies, therefore we decided to select design thinking approach among the qualitative research methods. The Design Thinking approach can provide a deeper understanding of customer-centric challenges than traditional surveys or case studies through deeper involvement of observation. The Design Thinking approach also help to identify and evaluate as many challenges, as possible, and ideate as many solutions, as possible. For the basis of the applied methodology the 5 steps approach of IDEO and Riverdale was selected (Design Thinking for Educators, 2012). Because we have limited time (5 working days) and limited resources (7 project teams, one for each participating bank, 34 project members and 2 coaches) we had to adapt the methodology to fit into these frames. To achieve our goal, we used the following additional sources to construct our research methodology:  The book of Knapp et al (2016) presents the methodology that Google uses for rapid prototyping of their ideas. Although we applied different phases and steps, this book helped a lot how to organize the week. This approach, the agile project blocks also inspired the name of our methodology.  Although we heavily relied on the “Design Thinking for Educators” methodology, we used parts of additional design thinking approaches: Brown (2009); Ambrose and Harris (2010); Stickdorn (2012) Mootee (2013); Kumar (2013); Cosovan and Horváth (2016).  To enhance creativity, we used additional creative techniques during workshops, based on the works of Sibbet (2010); Gray et al (2010); Michalko (2010 and 2011); Zichermann and Cunningham (2012) and Vogel (2014). Based on these resources, we created the “One Week Sprint” format that consists of the following steps and content (Table 1). 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 157 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Fehér & K. Varga: Using Design Thinking to Identify Banking Digitization Opportunities – Snapshot of the Hungarian Banking System Table 1: The “One Week Sprint” methodology Number Phase Purpose Description and guides 0 Preparation Get an overview Collecting good and bad practices and common from a general banking industry, understanding of sharing personal stories. the general Summarise results and creating an challenges of the initial problem map. banking industry Set the goal of the week 1 Discovery Discovery builds Prepare for fieldwork: Build a a solid question guide foundation for Fieldwork: Learn from experts / your ideas users, identify extreme users 2 Interpretation Interpretation Document experiences: share transforms your stories, document problems on experiences / post-it notes stories into Structure problems, find meaningful headlines, turn headlines into insights. statements Don’t jump to conclusion, yet: explore all the problems first, before you go further! Get input from the outside: Explain the themes to someone who is not part of your team Make Insights Actionable! – How might we… Define the needs, through the eyes of the customer/user Add visual reminders (Process charts, Diagrams, Matrixes, Relationship maps) Select the need/problem you want to solve! 3 Ideation Ideation means Brainstorm ideas generating lots of Analyze ideas (Prioritization Grid, ideas. Selection criteria) Evolve your promising ideas Consider even radical ideas, look for the WOW factor! Select a solution to work with 4 Experimentation Experimentation Present your idea visually brings your ideas (paper/ppt prototype, storyboard, to life 158 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Fehér & K. Varga: Using Design Thinking to Identify Banking Digitization Opportunities – Snapshot of the Hungarian Banking System Number Phase Purpose Description and guides diagram, sample process, “create- an-ad”) Present your business model (one- page business canvas for products) Get feedback, test as much as possible, capture feedback learnings Iterate your prototype, create a new prototypes, repeat several times 5 Evolution Evolution is the What will be your MVP? development of Track learnings & document your concept progress over time Plan Next Steps: how will you develop your idea/product further? Create a timeline! Pitch Your Concept! Include risks, costs, benefits, value, etc. During the research, each team was dedicated to a selected bank. Coordination of the teams and methodological assistance were provided by two leading researchers, in the role of design thinking coaches. The research team invested more the 1000 working hours during the 5 days to explore and analyse customer challenges, and provide viable ideas for the banks. In the discovery phase the main goal was to identify as many challenges as possible, while in the interpretation phase the teams prioritised these challenged and reduced them into a few for further work. In the ideation phase the teams brainstormed a huge number of ideas, but during experimentation only a few viable were selected and tested, and the successfully tested and iterated ideas got only the final phase. In the last phase the surviving few ideas were developed further: costs, benefits, risks were analysed, and a project timeline was added (Figure 2). Following this methodology Project teams delivered their research findings at the end of the 5th day, concentrating on the main problems and main solutions. After the One Week Sprint, all the identified challenges, and possible solutions were collected and analysed further by the coaches. This paper presents these aggregated results. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 159 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Fehér & K. Varga: Using Design Thinking to Identify Banking Digitization Opportunities – Snapshot of the Hungarian Banking System Figure 2: Overview of the “One Week Sprint” Research findings Our main findings can be grouped to three main areas:  The changing role of branches  Online, mobile and phone-based services  Products and services In each problem area, we present the identified customer challenges, based on our observation, then we present the possible solutions identified by the project teams. Although each project team was dedicated to a specific bank, customer challenges and problems overlapped of the different banks. 4.1 The changing role of branches Customers articulated their most problems related to branches in Discovery phase (Figure 3.). As we investigated the area of branches in Interpretation phase, it appeared that no one loves to go to bank branches, especially not the younger generation. The access of a branch may be a challenge, since it may be too far, or the opening hours may not fit the customer needs; since they typically are open during working hours - when customers are working too. But once a customer reaches the bank branch, there is typically long waiting and administration time, and in the one hand customers do not always get what they wanted (clerks' quality); in the other hand they are confronted with pushed offers of new 160 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Fehér & K. Varga: Using Design Thinking to Identify Banking Digitization Opportunities – Snapshot of the Hungarian Banking System products, services clerks try to sell them, which also increases the waiting and administration time. The traditional functionality of bank branches was to serve as the central point of customer relations. However, for customers visiting the branch may be "only" a drag, or worse, it can mean frustration for them. From the banks side, the reducing number of customer visits should motivate branches to take advantage of these rare opportunities, improve customer relationships and trying to sell new products and services using their personal presence. From the customers' side, the branch visits are considered as a task with no significant added value, so they would like to do it as fast as possible. And they consider all the things that prevent this (waiting, administration time, listening to offers) as annoyance. Figure 3: Challenges related to branches To manage these problems, nowadays it is considered natural to direct all possible administrative tasks to appropriate online channels (phone, mobile, web). The question remains: what to do with the bank branch where customers do not want to appear in person; and how to convince customers to choose the closest relationship: personal appearance? The question is complicated because of the heterogeneous composition of the banks' customers, and there is no solution that would be appropriate for everyone. There are customers, who prefers personal presence in their sensitive banking affairs - and the customer experience should be ensured for them as well. Suggestions made up during Ideation phase and tested in Experimentation phase: • Enrich waiting time: Waiting is typically a lost time, both for customers and for banks. It is worth to make this time more meaningful, and provide an opportunity for interaction with the bank through personal assistants or electronic solutions. • Know the customers’ intentions in advance: It can speed up administration if customers can arrive to scheduled time, if they can indicate what do they want 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 161 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Fehér & K. Varga: Using Design Thinking to Identify Banking Digitization Opportunities – Snapshot of the Hungarian Banking System to achieve, or what challenges await assistance from the bank in their actual phase of life. • Speed up administration with online started processes: Although not all cases can be fully solved online, it can reduce administrative time in branches if processes can be initialized online, checked in the background; this way only the identification and signings have to be done in the branches. • Change, or extend the function of branches: as the traditionally non-financial service providers enter the market of banking services, so should not the banks be afraid to build up a new kind of profile towards managing relationships with customers. Is not that a more direct connection if the branch is more like a café, where the clerks sit next to the customers with a tablet? Or, if the branch will become a - increasingly fashionable - community office at the same time? Or inverted: what is required for an agent to visit community offices, appearing elsewhere day-by-day as a mobile branch clerk to arrange matters? After all, the branch is not necessarily the physical space, but the place where the issues can be arranged. One full project proposal from the Evolution phase was dealing with how to reduce waiting time and to understand the intentions of customers. If the waiting time may be longer than a few minutes, the customers should not draw a line number, instead, a tablet serves as a personalized caller. Through this device, the authentication of the customer and identification of the customer's preferences can be easily done. The customer can get familiar with the bank offers, and even express their interest in banking products. The customer needs can be assessed in the form of tablet games. It is important, that in these cases the bank can identify the real customer needs and offer those products only, that meet the real needs - even in a personal administration - rather than products typically offered to all customers. If the customer needs can be identified in advance, or detect lack of interest, the personal administration will be targeted, so it can be faster. 4.2 Online, mobile and phone-based services Empowering customers to manage their issues in an online channel seems to be an obvious solution to most of the problems outlined in the previous section. Arranging issues online reduces the need of personal contact, which may ease the customers' life and lower operating costs for the banks themselves. At the same time, managing issues outside the branch (via telephone, mobile, online) leads to challenges (Figure 4), that would have been easy to handle in the branch itself, such as inadequate supply of information, lack of consultation and the functional limitations of the different platforms. Regarding the non-branch channels, the most frequently expressed counter-argument is the issue of security: whether the data of the customer will be stolen, what can ensure the customer that they are communicating with the bank itself, what can guarantee the 162 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Fehér & K. Varga: Using Design Thinking to Identify Banking Digitization Opportunities – Snapshot of the Hungarian Banking System customers that their order will be really executed. These are the challenges we’ve found in Discovery phase with some of the possible reasons from Interpretation phase. Figure 4: Challenges related to electronic channels Suggestions made up during Ideation phase and tested in Experimentation phase:  Let multichannel administration be possible: It is almost inevitable for a bank to be present in a professional manner on all platforms (telephone, online and mobile applications). In our research we have seen examples where the mobile platform was only like a minor advertising space, without meaningful services.  Let the cases be traceable online: It supports customers' need for transparency, if the ongoing issues (transactions, orders, transfers) - regardless to the channel they were initiated - can be monitored online, grouped by issue areas or chronologically.  Provide adequate, professional support to online channels: In the back office of online and mobile applications there are no clerks - because of these channels nature. But if the customer gets stuck, or has questions, it would help them a lot if there is an opportunity to redirect to a more personal channel: online chat, video call, call centre. In addition, because the customer has been authenticated online, no other authentication should be performed again during the transition to the new channel. This solution can reduce the number of lost cases.  The customer should be a partner in security issues: Even though the issue of bank security belongs to the banks, a significant proportion of fraud attempts are targeting customers’ credulity. To prevent this, banks should improve customers' security awareness and manage their business transparently. In Evolution phase, teams were making project plans to solutions which were targeting existing mobile applications without meaningful functionality, or to a augmented reality branch, where customers can manage their issues in the well-known environment of their own branch, with professional clerks as avatars, using internet-based telephony. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 163 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Fehér & K. Varga: Using Design Thinking to Identify Banking Digitization Opportunities – Snapshot of the Hungarian Banking System 4.3 Products and services Regarding to administration in branches, the interviewed and examined customers highlighted in Discovery phase the lack of transparency in the bureaucracy of banking, and that there is a lot of paperwork with all issues (Figure 5). The loan and investment administration turned out to be the most effected with the problem, that the rules and the processes laid down by banks are too complex, complicated and incomprehensive for customers. Customers typically get information from these rules and processes from clerks during the administration - and sometimes different clerks give different information to them for the same issue. That is a common customer complaint that the rules seem to be articulated in a way that the customer may not understand or do not want to understand them. Banks must meet several legal requirements and a significant part of these apply on the cooperation with customers, so the banks have no other option than to enforce the rules applicable to customers. This make the rules and the banking operations for customers - but often also for the clerks - difficult to understand, and what is even worse, following the legislative changes the rules and processes are frequently changing as well. Because of the above mentioned, the customers - regardless of the intention of the banks – can feel that they are at the mercy of these institutions. From the bank's side, ensuring customer experience is becoming more challenging and this can lead to churn of customers. This is one of the most important findings from Interpretation phase. Figure 5: Challenges related to products and services The extent banking services can be customized or personalized, which is also part of the customer experience. Many customers have indicated that there are only a few options of banking services available, and they cannot find those services that meet their own, sometimes not so unique needs. Therefore, if they can find appropriate services in another bank, they consider the possibility of switching banks. 164 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Fehér & K. Varga: Using Design Thinking to Identify Banking Digitization Opportunities – Snapshot of the Hungarian Banking System Suggestions made up during Ideation phase and tested in Experimentation phase:  Simplify banking procedures, increase transparency: the intricately worded rules do not favour the creation of a trust. It should be clear, what are the responsibilities and tasks of the customers, and what are the responsibilities and tasks of the banks. Use visualization elements, process models and flow charts for better understanding. Use the processes, process models as the base of policies and rules, with clearly defined responsibilities. Simpler and more transparent processes increase the efficiency of processes (faster throughput, less errors), and customer satisfaction.  Personalized and proactive services based on the analysis of banking data: Based on the customer transaction data, banks have extreme amount of information about customers' life: income, spending, spending habits. Based on these, banks can offer opportunities to customers proactively.  Banking portfolio expansion with non-banking products and services: As the traditionally non-financial service providers enter the market of banking services, so should the banks open up to non-financial products: travel, commodities and insurance products. The challenge, however, is that the sales effort of these new products should not bother customers in any of the sales channels. From Evolution phase, a project plan visioning an online bank, where personalized advertisements can be seen (not only in the field of banking) based on the data gathered from the chronologic and personal data from the customer is important to mention. Conclusion Although most bank realized the importance of digitization, customer centric approaches are quite new in the Hungarian banking sector. Development is not only a technological question (just copying existing solutions from more developed regions, e.g. USA, Western Europe, of SE Asia), but also a methodological one. In our research we demonstrated a useful, rapid, very focused approach of explore customer challenges, but for a successful project we required a good, and prepared team members. The two coaches were able to provide adequate methodological support. The findings of the project were discussed with the participated banks, given them better insights of customer-centric approaches, through defining the demand. But additional challenges also pressurise banks to develop their systems: eIDAS compliance, PSD2 challenge, GDPR regulation. It is a limitation of this research, that its focusing only on customer (individual customer) related challenges, that mainly visible in front office services. But for Hungarian banks, they have the opportunity to apply matured solutions and technologies: what is still innovative on the Hungarian market, that is already tried out on other market, and we can know the success and failure stories. Therefore, it is important to benchmark the international market, even before deciding on 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 165 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Fehér & K. Varga: Using Design Thinking to Identify Banking Digitization Opportunities – Snapshot of the Hungarian Banking System implementation. Moreover, findings in this research are only a start for further researches, but it was considered a good way to set the basis for further investigations. It is a strategic choice of the incumbent banks, how to manage their relationship to FinTech companies. They can be considered as competitors, as possible partners to work with, but we have also seen a Hungarian bank, that itself developed a Fintech Incubator program. Fintech companies are considered either partners or competitors, but they definitely increase the competition in the sector, and support the digitization efforts. Generally, the applied research identified several customer challenges and offered also several possible digital solutions. Although the project teams couldn’t finish complete, detailed, ready-to-ship products, they made rapid progress, generated and designed a huge number of ideas, and they tested if they are headed in the right direction. In future researches we would like to expand the size of the research: the used one-week- spring approach should be expanded with additional surveys to validate the findings, and to generalize the results. Acknowledgement The publication was prepared within the Széchenyi 2020 program framework (EFOP-3.6.1-16- 2016-00013) under the European Union project titled: „Institutional developments for intelligent specialization at the Székesfehérvár Campus of Corvinus University of Budapest”. The authors would like to thank the work of the unknown authors of the “Design Thinking for Educators (2012)” toolkit, that was very useful for our research purposes . References Akkizidis, I., & Stagars, M. (2016). Toward the Future of the Hybrid Financial Sector. In Marketplace Lending, Financial Analysis, and the Future of Credit (pp. 215–217). John Wiley & Sons, Ltd. DOI: 10.1002/9781119099437.part3 Beerli, A., Martín, J. D., & Quintana, A. (2004). A model of customer loyalty in the retail banking market. European Journal of Marketing, 38(1/2), 253–275. https://doi.org/10.1108/03090560410511221 Bharadwaj, A., El Sawy, O. A., Pavlou, P. A., & Venkatraman, N. (2013). Digital Business Strategy: Toward a Next Generation of Insights. MIS Q., 37(2), 471–482. Brown, T. (2009). Change by Design. HarperBusiness. Bunea, S., Kogan, B., & Stolin, D. (2016). Banks Versus FinTech: At Last, it’s Official. Journal of Financial Transformation, 44([object Attr]), 122–131. Carr, N. G. (2003). IT Doesn't Matter. In: Harvard business review 81(5), 41-59. Cosovan, A., & Horváth, D. (2016). Emóció-Ráció: Tervezés-Vezetés: Designkommunikáció. Vezetéstudomány, XLVII(3), 36–45. Dam, R. F., & Siang, T. Y. (2017). Design Thinking: A Quick Overview. Retrieved March 5, 2017, from https://www.interaction-design.org/literature/article/design-thinking-a-quick-overview (accessed: 2017-03-05) 166 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Fehér & K. Varga: Using Design Thinking to Identify Banking Digitization Opportunities – Snapshot of the Hungarian Banking System Design Thinking for Educators. (2012). IDEO. Retrieved from https://designthinkingforeducators.com Foster, I. (2011). Globus Online: Accelerating and Democratizing Science through Cloud-Based Services. IEEE Internet Computing, 15(3), 70–73. Fung, M. K. (2008). To What Extent Are Labor-Saving Technologies Improving Efficiency in the Use of Human Resources? Evidence from the Banking Industry. Production and Operations Management, 17(1), 75–92. https://doi.org/10.3401/poms.1070.0003 Gerhardter, A., Ortner, W. (2013). Flexibility and Improved Resource Utilization Through Cloud Based ERP Systems: Critical Success Factors of SaaS Solutions in SME. In Innovation and Future of Enterprise Information Systems (pp. 171–182). Springer, Berlin, Heidelberg. Gioia, S. (2011). The Visual MBA, Blurb Goodhart, C. A. E. (2008). The regulatory response to the financial crisis. Journal of Financial Stability, 4(4), 351–358. https://doi.org/10.1016/j.jfs.2008.09.005 Gray, D., Brown, S., & Macanufo, J. (2010). Gamestorming: A Playbook for Innovators, Rulebreakers, and Changemakers. O’Reilly Media. Harvey, D. (2016). Digital transformation in banks: The trials, opportunities and a guide to what is important. Journal of Digital Banking, 1(2), 136–145. Henderson, J., Venkatraman, N. (1993) Strategic alignment: Leveraging information technology for transforming organizations, IBM Systems Journal 32 (1) (1993) 4–16. Hosono, S., Numata, E., & Shimomura, Y. (2016). Servitization Methodology in ICT Service System Design. Procedia CIRP, 47, 18–23. https://doi.org/10.1016/j.procir.2016.03.058 Huppatz, D. (2015). Revisiting Herbert Simon’s “Science of Design.” Design Issues, 31(2), 29–40. https://doi.org/10.1162/DESI_a_00320 Izukura, S., Hosono, S., Sakaki, H., Numata, E., Kimita, K., & Shimomura, Y. (2015). Bridging Non-functional Requirements and IT Service Design. Procedia CIRP, 30, 24–29. https://doi.org/10.1016/j.procir.2015.02.104 Johansson-Sköldberg, U., Woodilla, J., & Çetinkaya, M. (2013). Design Thinking: Past, Present and Possible Futures. Creativity and Innovation Management, 22(2), 121–146. https://doi.org/10.1111/caim.12023 Kahre, C., Hoffmann, D., & Ahlemann, F. (2017). Beyond Business-IT Alignment - Digital Business Strategies as a Paradigmatic Shift: A Review and Research Agenda. Katzan, H. (2011). Cloud Computing Economics: Democratization And Monetization Of Services. Journal of Business & Economics Research (JBER), 7(6). Kenesei, Z., & Seprődi, P. (2017). Service Experience Design, avagy a szolgáltatások tervezésének új kihívásai. Vezetéstudomány, XLVIII(2), 53–66. Knapp, J., Zeratsky, J., & Kowitz, B. (2016). Sprint - How to Solve Big Problems and Test New Ideas in Just Five Days. Simon & Schuster. Lewis, B. R., & Soureli, M. (2006). The antecedents of consumer loyalty in retail banking. Journal of Consumer Behaviour, 5(1), 15–31. https://doi.org/10.1002/cb.46 Lipton, A., Shrier, D., & Pentland, A. (2016). Digital Banking Manifesto: The End of Banks? (MIT Financial technology innovation series) (p. 20). Massachusetts Institute of Technology. Retrieved from http://www.gongxiangcj.com/phpqrcode/upload/7635cb8edd3b5d7cc6fe3081dfaf0c06.pdf Michalko, M. (2010). Thinkertoys: A Handbook of Creative-Thinking Techniques. Berkeley: Ten Speed Press. Michalko, M. (2011). Creative Thinkering - Putting your imagination to Work. Novato, California: New World Library. Mootee, I. (2013). Design Thinking for Strategic Innovation. Hoboken, New Jersey: Wiley. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 167 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Fehér & K. Varga: Using Design Thinking to Identify Banking Digitization Opportunities – Snapshot of the Hungarian Banking System Renaud, A., Walsh, I., & Kalika, M. (2016). Is SAM still alive? A bibliometric and interpretive mapping of the strategic alignment research field. The Journal of Strategic Information Systems, 25(2), 75–103. https://doi.org/10.1016/j.jsis.2016.01.002 Shaikh, A. A., & Karjaluoto, H. (2016). On Some Misconceptions Concerning Digital Banking and Alternative Delivery Channels. International Journal of E-Business Research (IJEBR), 12(3), 1–16. https://doi.org/10.4018/IJEBR.2016070101 Sibbet, D. (2010). Visual Meetings: How Graphics, Sticky Notes and Idea Mapping Can Transform Group Productivity. Wiley. Simon, H. (1969) The Sciences of the Artificial, 1st edn., MIT Press, Cambridge, MA. Stickdorn, M. (2012). This is Service Design Thinking: Basics-Tools-Cases. BIS Publishers. Sultan, N. (2013). Cloud computing: A democratizing force? International Journal of Information Management, 33(5), 810–815. Vogel, T. (2014). Breakthrough Thinking: A Guide to Creative Thinking and Idea Generation. HOW Books. Waters, B. (2005). Software as a service: A look at the customer benefits. Journal of Digital Asset Management, 1(1), 32–39. Weill, P. D., & Aral, S. (2006). Generating Premium Returns on Your IT Investment. MIT Sloan Management Review, 47(2), 39–48. West, S., & Di Nardo, S. (2016). Creating Product-service System Opportunities for Small and Medium Size Firms Using Service Design Tools. Procedia CIRP, 47, 96–101. https://doi.org/10.1016/j.procir.2016.03.218 Zichermann, G., & Cunningham, C. (2011). Gamification by Design: Implementing Game Mechanics in Web and Mobile Apps. O’Reilly Media. 168 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Use of Facebook and Google Platforms for SMEs Business Model Innovation 13 RIMANTAS GATAUTIS, ELENA VITKAUSKAITĖ & MARK DE REUVER Abstract Development of information communication technologies brings increasingly more opportunities for optimising various processes and activities of organisations. In the case of platforms, such as Facebook and Google, it is especially relevant to small and medium-sized enterprises. SMEs can adopt ready-to-use information communication technology solutions provided by those platforms for different aspects of their business. The paper aims to find out how SMEs use possibilities of such platforms to innovate business models. Two cases of Lithuanian SMEs are analysed to check the theoretical assumptions summarised in the paper. The case analysis indicates, that use of the platforms contributes to reaching (new) target customers, making adjustments to value propositions, maintaining customer relationships, channels, and thus becoming key resources and supporting key activities, therefore become key partners. Keywords: • Platform • Business model innovation • Facebook • Google • CORRESPONDENCE ADDRESS: Rimantas Gatautis, Kaunas University of Technology, K. Donelaičio g. 73, 44249, Kaunas, Lithuania, e-mail: rimantas.gatautis@ktu.lt. Elena Vitkauskaitė, Kaunas University of Technology, K. Donelaičio g. 73, 44249, Kaunas, Lithuania, elena.vitkauskaite@ktu.lt. Mark de Reuver, Delft University of Technology, Mekelweg 2, 2628 CD Delft, Netherlands, e-mail: G.A.deReuver@tudelft.nl. https://doi.org/10.18690/978-961-286-043-1.13 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 170 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Gatautis, E. Vitkauskaitė & M. de Reuver: Use of Facebook and Google Platforms for SMEs Business Model Innovation Introduction The development of information communication technologies brought various opportunities and prospects for small and medium enterprises. Very often SMEs are described as slower adopters of innovative information communication technology solutions (Gatautis & Vitkauskaitė, 2009) in comparison to large companies, which have capacity and possibilities to develop and adopt the latest ICT-based innovations. Such situation is caused by the lack of knowledge, strategic forecast, and finances. Facing such situation, SMEs tend to use information communication technology solutions, which can be provided by third parties and third parties take care of the solutions. Such solutions might be provided on various platforms, which offer new opportunities for SMEs. Recently a growing discussion about platforms, their development, and their business models has been observed. These discussions as well as related research address how platform business models might be developed and how successful platform business models are run. However, SMEs usually act as users of the platforms in order to fulfil their needs and gain an advantage in the market. The success of the company is determined by defining and implementing the business model that allows understanding the key aspects of the success. In order to sustain long- term advantages, SMEs should innovate their business models in response to the changing market conditions, i.e. find new ways to expand their value propositions, find new markets and segments. Use of platforms provides various options for SMEs. According to researchers, companies need to consider platforms such as Google, Facebook, Amazon, Apple (Simon, 2011; FaberNovel, 2014, Miguel & Casado, 2016). Our research aims to contribute to understanding how SMEs use platform possibilities to innovate business models and how these decisions are made. SMEs make strategic decision to deploy various platforms as they provide different opportunities, e.g. Google and Apple help to reach customers, Facebook to develop relations, Amazon to use more effective services. The research presented in the paper aims to understand how SMEs evaluate platform possibilities, how the needed functionality of the platform is selected, how SMEs change the business model and how SMEs assess the success of business model change. The four platforms (GAFA – Google, Apple, Facebook, and Amazon) in particular become important partners in business to consumer markets as GAFA takes about 55 percent of user digital life (FaberNovel, 2014). The phenomenon, when new companies appear online by using only the infrastructure of GAFA are also observed. In this paper, we contribute to the research body by analysing the use of Google and Facebook products for business model innovation among Lithuanian SMEs. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 171 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Gatautis, E. Vitkauskaitė & M. de Reuver: Use of Facebook and Google Platforms for SMEs Business Model Innovation Business Implications of Digital Platforms The term “platform” has been attracting the attention of practitioners and researchers in the last decade. The term became so popular that practitioners and researchers started using a new term “platform economy” (Accenture, 2016). Initially, the term “platform” was defined as “digital infrastructure (hardware and/or software) on which different applications can be run, or (by wider definition) allowing for a finite and clearly defined set of uses” (Andersson Schwarz, 2015). Techopedia (2017) suggests the following definition: “a platform is a group of technologies that are used as a base upon which other applications, processes or technologies are developed.” This approach is clearly related to the technical point of view as key characteristics of platform refer to hardware/software aspect and clearly defined set of action. Such definition addresses Google or Facebook platforms at the beginning of their activities as Google served as search engine allowing users to find information, while Facebook served as communication tool providing an attractive and simple way to socialise. However, due to the development of technologies and more active role of platforms in the digital economy, the new term “platform company” appeared. The term aimed to describe company offering a platform or several platforms aiming “to provide marketplaces, distribution of media content, and/or coordination of activities” (Andersson Schwarz, 2015). This definition demonstrated managerial approach emphasising functionality which platforms were offering as a key value proposition. Ballon (2009) even suggested the term “platformisation” referring to new societal trend when companies are developing and offering platforms, and new platform-based business models appear. Platform phenomenon became popular and new term “platform economy” appeared. According to Kenney and Zysman (2015), platform economy is “one in which tools and frameworks based upon the power of the internet will frame and channel our economic and social lives.” Authors identify four essential elements that ensure the functioning of platform economy: infrastructure, training and skills, social protection, and regulatory transition. The growing importance of platforms was also addressed during World Economic Forum 2016 by outlining the importance of platforms for companies and organisations, naming disruption of economic activities, lower market entrance barriers, and in some cases changes to the logic of value creation, capture and transfer to market (World Economic Forum, 2016). As companies face new challenges in adopting platforms these challenges mainly refer to functionalities platforms offer. Companies using platforms (assets developed by other companies) can dedicate more focus for business development and business differentiation. As platforms act mainly as facilitators, companies need to understand how 172 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Gatautis, E. Vitkauskaitė & M. de Reuver: Use of Facebook and Google Platforms for SMEs Business Model Innovation to adopt platforms in their daily activities and how to measure the value platforms bring to their business. The growing number of platforms also indicates the differences between the platforms. Some platforms are oriented to reach consumers (e.g. Google), some facilitate communication and provide services (e.g. Facebook), some facilitate trade (e.g. Amazon). In many cases, platforms act as facilitators enabling companies to enhance value proposition and optimise their activities, but the value for both parties (companies and users) are created through orchestration. Platforms also might be described as “frameworks that permit collaborators – users, peers, providers – to undertake a range of activities, often creating de facto standards, forming entire ecosystems for value creation and capture” (Kenney & Zysman, 2015). Gawer and Henderson (2007) suggested an approach to defining a product as a platform. According to Gawer and Henderson (2007), a product is a platform when “it is one component or a subsystem of an evolving technological system, when it is functionally interdependent with most of the other components in the system, and when end-user demand is for the overall system, so that there is no demand for components when they are isolated from the overall system.” Platforms might be described by several important components (Hagel, 2015): A governance structure, including a set of protocols that determine who can participate, what roles they might play, how they might interact, and how disputes get resolved. An additional set of protocols or standards is typically designed to facilitate connection, coordination, and collaboration. There are different platforms such as Intel, Microsoft, Cisco. Faber Novel (2014) suggest four main platforms: Google, Amazon, Facebook, and Apple. Accenture (2016) names several platforms in various areas: Fiat (connected car), Kaiser Permanente (digital health), Disney (MagicBands), Caterpillar (connected machines), Schneider Electric (smart cities, buildings, and homes), Walgreens (retail pharmacy), Goldman Sachs (customer analytics), Bank of New York Mellon (financial services), McCormick/Vivanda (FlavorPrint), Houghton Mifflin Harcourt (education). Venkatraman et al. (2014) outline several important platform characteristics which create implications of innovations for SMEs, namely scale, scope, and speed. Besides these characteristics, platforms challenge SMEs operational, dynamic and improvisational capabilities and lead to internal changes within the company. As platforms play a major role in value creation, capture and transfer, platforms became a major factor affecting the business model design of companies. The business model concept became popular in last decade, and many researchers deeply investigate this area. The business model can be defined as “description of how an organisation or network of organisations intends to create and capture value from offering 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 173 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Gatautis, E. Vitkauskaitė & M. de Reuver: Use of Facebook and Google Platforms for SMEs Business Model Innovation a service to its customers” (Bouwman et al., 2008). Despite growing popularity, business model research area attracts academic exploration as according to Teece (2010), this area resides somewhere between economics and business strategy and more elaborated research is needed. The related area is business model innovation, which according to Spieth et al. (2014), remains “a slippery construct to study” (Casadesus-Masanell & Zhu, 2013). Within our research context, it is considered that platforms bring new opportunities for value creation and capture, and companies need to rethink their business model logic. This refers to business model innovation concept, which can be defined as “changes in business logic that are new to the firm, yet not necessarily new to the world, and have to result in observable changes in the practices of a BM” (Bouwman et al., 2008). Research Framework There are many approaches to business model analysis. One of the most popular approaches widely accepted by practitioners is Business Model Canvas (Osterwalder & Pigneur, 2010). This approach defines key components of the business model: value proposition, customer segments, channels, customer relations, key activities, key resources, and key partners. As a consequence, decisions regarding these components result in revenue streams and cost structure. In our research, we decided to address two important platforms, namely Facebook and Google. Facebook is easily identified as a platform and companies might obtain various services through “one-stop shop” approach. Google situation is different as Google offers several different services and use of these services causes some confusion for SMEs. SMEs are interested in using such products as AdWords, increasing their position in Google search listing (SEO), use a Google Drive. The comparison between traditional business versus opportunities of Facebook and Google platforms for business model innovation is presented in Table 1. 174 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Gatautis, E. Vitkauskaitė & M. de Reuver: Use of Facebook and Google Platforms for SMEs Business Model Innovation Table 1: Google and Facebook platforms opportunities for business model innovation Business Traditional Google platform Facebook platform model component Customer SMEs serve mass Most of Google Segments might be segments market (no products are based targeted based on segmentation) or on interest in a demographic, apply geographic, certain topic, geographic, and demographic or therefore, enabling behavioural criteria, psychographic segmentation based as well as interests. segmentation criteria, on the interest of Good opportunities rarely behavioural potential customers. to reach niche criteria. Good opportunities markets. to reach niche markets. Value Entirely up to the Change value Enhance value propositions company proposition based proposition on better through: understanding of Change value customer needs. proposition based New value on better proposition for understanding of business (AdSense). consumer needs. Provision of additional information. Channels Different physical Might serves as the Channel for channels, such as main channel for attracting consumer traditional media attracting attention and points of sale, agents, consumers delivering website, e-shop. attention. additional value. Mainly for raise Might serve for awareness and purchase, delivery evaluation of and after sale alternatives. services. Customer Personal service Trigger to initiate Personal service relationships Self-service (e-shop) interactions with (e.g. after sale customers service) Community / Social support Key Infrastructure Google tools for Information on resources Materials business (e.g. customers and their Knowledge/HR Drive, Mail) social behaviour 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 175 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Gatautis, E. Vitkauskaitė & M. de Reuver: Use of Facebook and Google Platforms for SMEs Business Model Innovation Business Traditional Google platform Facebook platform model component Key activities Production or service Collecting of Additional value provision information about delivery Sales customer needs Relations Marketing/advertising (CRM) management Marketing and Marketing and advertising advertising Sales activities Partners Recourse suppliers, Might serve as Might serve as one infrastructure supporting service of main service providers, supplier providers intermediaries Platform adoption is strongly driven by the spread of ICT and many new start-ups adopt platforms for the benefits platforms are offering. Considering such situation, many entrepreneurial SMEs also move towards platform adoption, as this should give them the opportunity to run the business more efficiently. Research method. An analysis of several cases of Lithuanian SMEs using Facebook or Google in their activities was carried out. No distinction was made if SMEs use a platform by themselves or are they supported by business consultants. We believe, that even if SMEs use consultant services they understand benefits of platforms well enough as SMEs invest in the utilisation of the platform. We tried to identify SMEs using Facebook or Google platform. In many cases, we found it complicated as SMEs tend to use both of them, but we identified cases there one platform is key platform and use of the second platform is limited, and therefore the role of the specific platform is more expressed. Interviews were carried out with SME representatives that are most knowledgeable about the use of a given platform within their organisation. Additionally, an observation of actual use of a platform was carried out where possible (e.g. observation of a Facebook page). Empirical Findings 4.1 Case 1. Use of Facebook Platform UAB Socialinis institutas, and more specifically their brand ačiū pačiū, was identified as SME case with the use of Facebook platform for business model innovation. Interview was carried out with the marketing manager of the company (direct quotes from the 176 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Gatautis, E. Vitkauskaitė & M. de Reuver: Use of Facebook and Google Platforms for SMEs Business Model Innovation interview are used in case description thereinafter). Observation results of the Facebook page of the brand were also used for this case description. UAB Socialinis institutas is a socially responsible company that produces and sells toys for children. All products are handmade and produced from natural materials. The company focuses not only on offering high-quality products but also at reducing social exclusion by providing employment to socially vulnerable people with physical disabilities. Over 60% of employees are disabled people. Those employees sew the toys and carry out other sewing assignments as the company takes orders for various sewing services, such as sewing tablecloths and other items. The company is developing its toy brand ačiū pačiū, and expects that in future the brand toys will become the main product of the company, and there will be no need to take orders for other sewing services. For online marketing, the company uses an e-shop http://www.aciupaciu.lt (in Lithuanian), e-catalogue, and Facebook page (https://www.facebook.com/aciupaciu/). They also plan to start using the Instagram account. The company also writes articles, but rarely. The primary reason to start using Facebook was the fact that Facebook was the cheapest and easiest to use way to reach the target customers of the business. At the beginning of the business it was important that the means used would allow reaching customers without larger investments. The other important reason was the responsiveness of the customers, as “it is significantly easier to communicate with them here and now”. It was noticed by the company, that customers nowadays find it simpler and more convenient to write a Facebook message than to write an e-mail. That was important to the company, as they want to be accessible to customers, have personal communication with them, and to have the opportunity to offer personalised products. Facebook provided a platform enabling that kind of communication. Compared to other social media platforms, activity on Facebook achieves the highest engagement from followers. Key features of the Facebook used by the company are: the Facebook page of the brand, instant messaging function, paid advertising options (boosting of the posts, ads for driving leads to the website, carousel ads). Facebook page is administered by an external agency, while the company itself maintains the content. How platform affects business model innovation? First of all use of Facebook enables the company to reach its target customers. In fact, company representative claims that “if not Facebook, I do not know how else we would have reached the customers at that moment when we needed that.” Facebook enabled the company to reach new customers as well. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 177 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Gatautis, E. Vitkauskaitė & M. de Reuver: Use of Facebook and Google Platforms for SMEs Business Model Innovation The company was targeting people from Lithuania. However, they soon discovered getting orders from abroad as well. Facebook is also used as a source for modifying the product, namely the core of the value proposition. Personalised and customised products are offered to customers based on personal communications with them via Facebook messenger. Also, the company uses feedback from their Facebook community to make decisions regarding the products (e.g. asking an opinion about colours of products, or about other features). The latter option is rarely used, however. The communication with the community on Facebook helped the company to understand that customers prefer simple products and designs. “Whenever we placed a more unusual or interesting offer and expected people to prefer it, they would surprise us by choosing more simple and basic option. That helped us to provide more relevant products to our customers.” Facebook page is used as one of the main channels to raise awareness of the products, by introducing and promoting novelties. Advertising possibilities are used for this, e.g. every post is boosted for few days by targeting target customers of the brand. As mentioned, it is also the main channel to communicate with customers. Therefore, to provide post-sales support as well (e.g. “if a customer found out that a piece of child’s clothing she bought does not fit the child, we usually resolve the issue very fast and easy by communicating on Facebook. Another example if a customer is not sure how to wash a toy he bought, we easily provide him with the information”). Facebook is also a crucial platform for maintaining relationships with customers. The messenger is used for personal service, to chat with customers, answer their questions, to find out their requests and preferences. Community (close to 15 000 fans, as of March 2017) relations are also maintained on Facebook page of the brand. 4.2 Case 2. Use of Google Platform The company Transer was identified as SME case with the use of Google platform for business model innovation. Interview was carried out with one of co-owners of the company (direct quotes from the interview are used in case description thereinafter). The company Transer offers translation services for technical text (http://www.transer.net). The company is SME and have five persons directly involved in company activities. There is an extensive partner network as the company hires different interpreters for specific tasks. The company revenues reach about 100K euro per year in the last three years, and according to company CEO, revenues are stabilised. There is no specific reason why Google platform was selected, but the decision is based on a variety of information available in newspapers and journals about Google benefits for business. The first attempt to use Google platform was in 2010 trying to reach a larger number of customers via PPC advertising (Google AdWords). However, this initiative was not successful for several reasons. First of all, the company lacked knowledge and 178 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Gatautis, E. Vitkauskaitė & M. de Reuver: Use of Facebook and Google Platforms for SMEs Business Model Innovation skills to manage PPC campaigns effectively. The second reason refers to competitor behaviour as competitors intentionally were clicking on company advertising and company advertising did not attract visitors to the website. The second attempt to use Google products was much more successful. This time it was decided to use Google Drive and Google Documents in order to save costs and make internal operations more efficient. According to the company owner, the ability to use documentation in a more comfortable way was the reason to start. “I use two separate computers – one in the office and another one at home. Typically, in a rush, I forget the documents, and it means I cannot access them because documents are on another computer. By using Google Drive/Documents, I can access all documents from any computer.” The next step in using Google platforms was to use Google Documents on various cooperation tasks. “As we realised we can all use the same document, we started using this solution for implementing some activities.” After successful use of Google Documents, the company decided to replace CRM system with Google Documents. The attempt was made to share information through Google Documents with partners/interpreters, but it was not successful. Interpreters preferred to call or send email, but not use online documents. How platform affects business model innovation? The company used Google platform for several business model innovations, but only one of attempts was successful. The first attempt was to reach new segments and new customers using Google AdWords, but the lack of knowledge did not result in a desirable outcome. The attempt to use AdWords lasted just for several months. Second attempt related to the optimisation of internal operations and affected key resources and key activities. The Google platform improved internal operations and became part of company infrastructure. As a consequence, the company decreased costs around 500 euro per year. Those are not significant savings, but company CEO considers them as important ones. Discussion From the theoretical research, assumptions were made on the contribution of Facebook and Google platforms on business model innovations. Based on interviews with SME representatives we might state that the impact of Facebook is easily recognised and valued by SMEs as Facebook acts as one-stop-shop. It is more complicated to determine the impact of Google products from SMEs perspective as Google offers various services which might be used by different departments. Facebook platform is perceived as a marketing tool mainly, and in the case of Google, only some features are related to the 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 179 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Gatautis, E. Vitkauskaitė & M. de Reuver: Use of Facebook and Google Platforms for SMEs Business Model Innovation marketing function. Some of Google tools (Documents, Drive) are used entirely for companies internal operations. From case studies, we observe that platforms are used for reaching (new) target segments. In the case of Facebook, this associated with a “typical feature” of modern brand and company successfully maintains its presence on Facebook. From the perspective of Google platform, AdWords were used to reach target segment. However, the company did not manage to do it appropriately as lacked skills to use AdWords. We also find out that companies can successfully use Facebook platform as communication tool allowing to customise value propositions. Facebook messenger plays a major role in getting information about small details of a product (such as colour, shape). Therefore, Facebook Messenger plays an important role in building customer relations. We also observed that platforms (especially Facebook) might act as one of the main channels ensuring information flow and communication between company and target segment. As Google platform offers features targeted towards various activities of companies these features are used to make companies performance more efficient. We observed a case then Google Documents are used for operation coordination and customer relationship management, so the impact of Google platform on key activities is significant. None of the companies referred to platforms as partners, but it is evident that both platforms (Facebook and Google) play an important role as partners (namely providers of services and infrastructure suppliers) in activities of companies. Conclusion Platforms play a greater role in SMEs activities as they give new opportunities for SMEs to innovate in the context of a business model. SMEs typically approach the four main platforms – Google, Apple, Facebook, and Amazon. Some platforms act as one-stop-shop offering different functionalities (Facebook, Amazon), some platforms offer features that are distributed (Google, Apple). Platforms can bring opportunities for innovation in all business model components. Target customers affected through reaching (new) customers. Value proposition through offering customisation. Channels through acting as the main channel for raising awareness and post-sale support. Customer relations by ensuring personal and real-time communication. Key activities and key resources through functionality and tools provided. As a result, those platforms might even become key partners. 180 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Gatautis, E. Vitkauskaitė & M. de Reuver: Use of Facebook and Google Platforms for SMEs Business Model Innovation Analysis of the use of Facebook and Google in Lithuania SMEs indicate adoption of the platforms for a few of business model innovations. Facebook and Google platforms were used to reach (new) target customers. Facebook was also used for customisation of value proposition, as a channel and for customer relations development. Meanwhile, Google products were used for innovation of the key activities component. None of the companies recognised platforms becoming important partners, but platforms role as key partners was observed. References Accenture. (2016). Platform Economy: Technology-driven business model inovation from outside in. Retrieved 12 May 2017, from https://www.accenture.com/fr-fr/_acnmedia/PDF- 2/Accenture-Platform-Economy-Technology-Vision-2016-france.pdf. Andersson Schwarz, Jonas. (2015). Platform logic: The need for an interdisciplinary approach to the platform-based economy. In IPP2016, 22-23 September 2016 [1-19]. Oxford University. Ballon, Pieter. (2009). The Platformisation of the European Mobile Industry. Communications & Strategies. 75, 3rd quarter, 15-33. Bouwman, Harry, Henny de Vos, & Timber Haaker, eds. (2008). Mobile service innovation and business models. Springer Science & Business Media. Casadesus‐Masanell, Ramon, & Feng Zhu. (2013). Business model innovation and competitive imitation: The case of sponsor‐based business models. Strategic Management Journal 34 (4), 464-482. DOI 10.1002/smj.2022 FaberNovel. (2014). GAFAnomics, New Economy, New Rules. Retrieved 12 May 2017, from https://innovate.fabernovel.com/work/study-gafanomics-new-economy-new-rules/. Gatautis, Rimantas, & Elena Vitkauskaitė. (2009). eBusiness policy support framework. Inzinerine Ekonomika-Engineering Economics. 65 (5), 35-46. Gawer, Annabelle, & Rebecca Henderson. (2007). Platform owner entry and innovation in complementary markets: Evidence from Intel. Journal of Economics & Management Strategy. 16 (1), 1-34. DOI 10.1111/j.1530-9134.2007.00130.x. Hagel, John. (2015). The power of platforms. Business Ecosystems Come of Age. 79-89. Deloitte University Press. Kenney, Martin, & John Zysman. (2015). Choosing a future in the platform economy: the implications and consequences of digital platforms. In Kauffman Foundation New Entrepreneurial Growth Conference, 17-19 June 2015 (156-160). Miguel, Juan Carlos, and Miguel Ángel Casado. (2016). GAFAnomy (Google, Amazon, Facebook and Apple): The Big Four and the b-Ecosystem. In Gómez-Uranga, Miguel, J. Barrutia Zabala- Iturriagagoitia, & Jon Barrutia (Eds.). Dynamics of Big Internet Industry Groups and Future Trends (127-148). Springer International Publishing. Osterwalder, Alexander, & Yves Pigneur. (2010). Business model generation: a handbook for visionaries, game changers, and challengers. John Wiley & Sons. Simon, Phil. (2011). The age of the platform: How Amazon, Apple, Facebook, and Google have redefined business. BookBaby. Spieth, Patrick, Dirk Schneckenberg, & Joan E. Ricart. (2014). Business model innovation–state of the art and future challenges for the field. R&D Management. 44 (3), 237-247. 10.1111/radm.12071 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 181 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Gatautis, E. Vitkauskaitė & M. de Reuver: Use of Facebook and Google Platforms for SMEs Business Model Innovation Techopedia. (2017). Platform. Retrieved 14 March 2017, from https://www.techopedia.com/definition/3411/platform Teece, David J. (2010). Business models, business strategy and innovation. Long Range Planning 43 (2), 172-194. DOI 10.1016/j.lrp.2009.07.003 Venkatraman, N. Venkat, Omar A. El Sawy, Paul A. Pavlou, & Anandhi Bharadwaj (2014). Theorizing digital business innovation: platforms and capabilities in ecosystems. Fox School of Business Research Paper No. 15-080. DOI 10.2139/ssrn.2510111 World Economic Forum (2016). Davos 2016 - A New Platform for the Digital Economy. On YouTube. Retireved 12 May 2017, from https://www.youtube.com/watch?v=-pFRIlgEdl0. 182 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons The Impact of Clinical Information Systems on Patient Outcomes and Organisational Performance 14 PETER HADDAD, JONATHAN SCHAFFER & NILMINI WICKRAMASINGHE Abstract We are witnessing significant investments by the healthcare industry globally in information technology (IT) to enhance patient outcomes, safety, efficiency, and financial performance. However, unlike other industries, the complexity of healthcare confounds the evaluation of the business value of these IT solutions and thus to date it has been difficult to clearly articulate the true business value of IT in healthcare contexts. This exploratory study addresses this problem by examining three clinical IT systems in the Australian healthcare context: a nursing documentation (ND) System, a computerized physician order entry (CPOE) solution, and an Incident Reporting System (IRS). The results indicate that these systems have the potential to provide better business value and have direct and indirect impacts on patient outcomes, efficiency, safety, and the overall performance at different levels, depending on a multiplicity of factors all of which need to be considered. Keywords: • Healthcare • Information Systems • Clinical IT • CPOE • Nursing Documentation • CORRESPONDENCE ADDRESS: Peter Haddad, Epworth HealthCare and Deakin University, 221 Burwood Highway, Burwood, Victoria 3125, Australia, e-mail: peter.e.haddad@gmail.com. Jonathan Schaffer, Cleveland Clinic, 9500 Euclid Avenue, Cleveland, Ohio 44195, USA, e-mail: schaffj@ccf.org. Nilmini Wickramasinghe, Epworth HealthCare and Deakin University, 221 Burwood Highway, Burwood, Victoria 3125, Australia, e-mail: nilmini.work@gmail.com. https://doi.org/10.18690/978-961-286-043-1.14 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 184 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Haddad, J. Schaffer & N. Wickramasinghe: The Impact of Clinical Information Systems on Patient Outcomes and Organisational Performance Introduction Optimal healthcare access, quality and value have become global priorities for healthcare domains to combat the exponentially increasing costs of healthcare services (Huang, Seitz, & Wickramasinghe, 2010; Porter, Pabo, & Lee, 2013). Information systems/ information technology (IS/IT) have been promoted as a critical enabler to achieving these priorities (Kenneally et al. , 2013; OECD, 2010a, 2010b). Presently, we are witnessing a staggering range of IS/IT applications in healthcare that have promised to deliver higher quality and safety with greater value (Wickramasinghe & Schaffer, 2010). However, the data supporting these claims is often lacking or poorly supported (Melville, Kraemer, & Gurbaxani, 2004; Lemai Nguyen et al. , 2015). Advocates, in particular, point to the potential reduction in medication errors as a critical advantage (Radley et al. , 2013; Vermeulen et al. , 2014). These singular advantages do not reflect the enterprise viewpoint that is so needed (James, 2013). Further, the debate about the difference IS/IT solutions can make to healthcare quality, efficiency, and safety has only intensified (Buntin, Burke, Hoaglin, & Blumenthal, 2011; Jones, Rudin, Perry, & Shekelle, 2014). In the light of these complex circumstances, there is a critical need for a framework to evaluate the business value of IS/IT in healthcare (Haddad, Gregory, & Wickramasinghe, 2014). Previous research (Haddad, Schaffer, & Wickramasinghe, 2015; Haddad & Wickramasinghe, 2014, 2015) has discussed examining the business value in healthcare IT by leveraging four groups of IS/IT according to their business. These groups classify IS/IT into infrastructural, transactional, informational, and strategic domains (Weill & Broadbent, 1998). Socio-technical aspects (Muhammad, Teoh, & Wickramasinghe, 2013) with healthcare projects are also important to consider. Thus, they are mapped in previous work with the different layers of healthcare delivery including healthcare ecosystem, system structure, delivery operations, and clinical practices (Rouse & Cortese, 2010). This research evaluates the developed model of The Business Value of IT (BVIT) in Healthcare (Figure 1). This model was designed to help evaluate the business value of IT in healthcare (Haddad et al., 2015; Haddad & Wickramasinghe, 2014, 2015). The model itself takes technical and socio-technical perspectives in mind. The former is presented by the work of Weill and Broadbent (1998), which classifies IT investments into four categories based on their business objectives (infrastructural, transactional, informational, and strategic), while the latter is presented by the work of Rouse and Cortese (2010) which classifies various healthcare delivery activities into four levels, namely healthcare ecosystem, system structure, delivery operations, and clinical practices. Specifically, three clinical IT systems at both private and public healthcare settings in Australia were evaluated. The first system is an American made computerized physician order entry (CPOE) system. The second is an Australian made nursing documentation (ND) system, while the third is an Australian made incident reporting system (IRS). The selection of these systems was based on their characteristics as they address the needs of different stakeholders i.e. the ND system helps streamline the 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 185 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Haddad, J. Schaffer & N. Wickramasinghe: The Impact of Clinical Information Systems on Patient Outcomes and Organisational Performance workflow of nurses, the CPOE helps oncologists (a more specialised clinical group than nurses) to manage cancer medications, and the IRS is meant to be use by all of the hospitals’ staff to report incidents. Testing these systems in two different settings serves two purposes: 1) Data triangulation and findings validation and 2) Impact assessment of two different elements in the Australian healthcare ecosystem (private and public healthcare providers) on generating business value from clinical IT. 186 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Haddad, J. Schaffer & N. Wickramasinghe: The Impact of Clinical Information Systems on Patient Outcomes and Organisational Performance Figure 1: The Model of Assessing Business Value of IT in Healthcare 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 187 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Haddad, J. Schaffer & N. Wickramasinghe: The Impact of Clinical Information Systems on Patient Outcomes and Organisational Performance Methods and Settings A multiple case study approach was adopted, as this enables contrasting results for predictable reasons to enhance the generalisation to other case studies (Baxter & Jack, 2008; Yin, 2014). Two case studies were used in this study. The selected cases were chosen based on 1) the volume of IT investments they both made during the last 5 years, 2) their nature (one is public and the other is private) to help identify any differences could result as a result of differences in care delivery models, and 3) having vast ranges of clinical specialties The first is ABC Hospital, a Victorian public hospital established in 2000 and provides care for more than 750,000 people. ABC Hospital has been providing around one million episodes of patient care each year through the efforts of about 10,000 staff. ABC Hospital provides a comprehensive range of clinical services and high-quality acute, sub-acute and palliative care, mental health, drug and alcohol services, and residential care, community health and state- wide specialist services to people and communities that are diverse in culture, age, socio-economic status, population and healthcare needs. The second case study is XYZ Hospital, which is a private hospital and counted as one of the largest not-for-profit private healthcare groups in Australia. With seven sites and two rehabilitation centres, XYZ Hospital has invested more in IS/IT during the last few years than in the past and hence was one of the reasons they were chosen to be included in this study. According to the Chief Financial Officer (CFO), approximately 30% of the capital budget during the last five year was set aside for IT investments in business, infrastructure and clinical systems. Three clinical IT systems were examined; the ND, IRS and the CPOE systems. The ND system was studied within ABC and XYZ hospitals, while the IRS and CPOE systems were studied solely within XYZ Hospital. Prior to conducting the data collection, all ethics approvals had been acquired from both hospitals. For the ND system two sources of data were used; survey1 data collected from ABC Hospital (two sites A and B), and semi-structured interviews at XYZ Hospital. First, the survey was distributed pre and post implementation of the ND system and consisted of six sections. The survey used the unified theory of technology acceptance and use of technology (UTAUT) as the studied ND system is a new system. The survey consisted of: Items related to performance expectancy (PE) (8 questions in this group) Effort expectancy (EE), (4 questions) Social influence (SI) (5 questions) Facilitating conditions (FC) (4 questions) Voluntariness (V) (3 questions) Behavioural intentions (BI) (5 questions) 188 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Haddad, J. Schaffer & N. Wickramasinghe: The Impact of Clinical Information Systems on Patient Outcomes and Organisational Performance UTAUT was used as a technology acceptance model to uncover intentions of users regarding the use of a new system. Inclusion criteria for the survey was: 1) being a nurse, 2) worked for more than 5 years in similar settings, and 3) willingness to participate in the survey. The survey used the lens of UTAUT, and was validated using extensive discussions with academics and experts in the healthcare domain. Required changes were made accordingly. This method is widely used to measure the different aspect of interaction between human resources and health IS/IT, see for example (L. Nguyen et al. , 2015; Oshlyansky, Cairns, & Thimbleby, 2007; Taiwo & DOWNE, 2013; Williams, Rana, Dwivedi, & Lal, 2011). Due to the nature of nurses’ duties, and to our intention to gain instant understanding of how the nurses found the investigated system, a hard copy of the survey was prepared and provided to nurses at the completion of their shift. Those who met the criteria across two sites at ABC Hospital were 39 in site A and 48 in site B with response rates of 60% and 70% respectively. Due to the complexity of the CPOE and IRS systems, and given they both were new during the data collection phase, 23 semi-structured interviews were conducted for healthcare better understanding of the possible business value of these systems. From these interviews specific themes emerged (Pope & Mays, 2013) with critical information and insights from three major groups of professionals in the healthcare industry: executives, clinicians (physicians), and IT personnel. Selecting the participants was based on their role and/or affiliation with the group, as well as their level of interaction with IS/IT investments and projects. The first protocol for the interviews was reviewed by conducting three pilot interviews with medical and IT experts. This phase resulted in a shorter and more focused protocol. Three questions were deleted as they had been designed to ask about systems that never existed in the case study (Yin, 2014), and two questions were added to explore insights from clinical IT experts, i.e. clinical people who are IT savvy. After modifying the interview protocols, the main interviews took place. All of the interviews were audio recorded with full permissions from interviewees, professionally transcribed, verified, and then qualitatively analysed using QSR Nvivo 10 software (Bazeley & Jackson, 2013). Data collected from these interviews were analysed also to understand the business value of the studied systems. These interviews were also used as a primary source of data about the CPOE and IRS systems (Table 1). 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 189 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Haddad, J. Schaffer & N. Wickramasinghe: The Impact of Clinical Information Systems on Patient Outcomes and Organisational Performance Table 1: Research Design System Setting Method Data Sources Participants IRS Private (XYZ interviews 23 Semi- Physicians Australian Hospital) structured Executives system interviews IT personnel ND Private (XYZ interviews 23 Semi- Physicians Australian Hospital) structured Executives system interviews IT personnel Public (ABC UTAUT UTAUT survey Nurses Hospital) based online CPOE Private (XYZ su in rve ter y v iews 23 Semi- Physicians American Hospital) structured Executives system interviews IT personnel Results Data analysis was initiated by mapping the three systems using the Business Value of IT in Healthcare model. Based on the their functionalities, the studied systems were classified as informational IT, which provides information for managing and controlling the firm, as well as supporting decision making, communication and control (Weill & Broadbent, 1998). These systems, though, have other components from the IT Portfolio as Table 2 depicts. For example, the CPOE system is informational in nature, as it helps produce and share information on treatment plans and medication scheduling. However, it has a transactional component, which enables data entry/input like identification, progress notes, medication scheduling, discharge checklist, and treatment plans. In addition, it utilises the IT infrastructure like Internet, Intranet, workstations, servers, and databases. Table 2 also shows the different layers of healthcare delivery from a socio- technical perspective. 190 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Haddad, J. Schaffer & N. Wickramasinghe: The Impact of Clinical Information Systems on Patient Outcomes and Organisational Performance Table 2: Mapping the Three Studied Systems to the BVIT Model eiv Components ND CPOE IRS specterP Internet, Intranet, Internet, Computers, Servers, Internet, Intranet, Intranet, Infrastructure Smart devices in Computers, Computers, wards and at nurse Servers, Databases Servers, stations, databases Databases Data entry/ input, Data entry/ input, Data entry/ input, like like like Vital signs Identification Incident details Fluid balance charts Progress notes Level of reporting Transactional Pain assessment Medication Actions required Identification scheduling Destination of Progress notes Discharge checklist information Wound care Treatment plans Medication Facilitating Producing and Facilitating real information sharing sharing time information within different information on exchange among Informational craft groups rather treatment plans different lio than using paper and medication departments and o records scheduling personnel rtf Po Smart medication Strategic X X IT scheduling All of the systems work in the Australian healthcare ecosystem. Healthcare The only difference is one is being implemented in a private Ecosystem hospital (CPOE and IRS) and the other is being trailed and tested in both private and public hospitals. All of the systems require reengineering healthcare processes to System help generate business value. This includes both internal and Structure inter-organizational processes. y X Detection Detection Detection er Delivery X Diagnosis Diagnosis Diagnosis Deliv Operations Treatment Treatment X Treatment re ca X Recovery Recovery X Recovery lth Clinical ND CPOE IRS Hea Processes 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 191 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Haddad, J. Schaffer & N. Wickramasinghe: The Impact of Clinical Information Systems on Patient Outcomes and Organisational Performance 3.1 The CPOE System The CPOE system, specialized in oncology care, has three modules focused on radiation, medical, and surgical oncology care. At XYZ Hospital, the radiation and medical modules have been implemented, while the surgical module has not yet been acquired. The aim of implementing this system is to replace the manual patients scheduling with an electronic means on a quest to improving the integration of the cancer care process and eliminating prescription errors. The radiation module was implemented in XYZ Hospital two years ago, while the medical module has been recently acquired. Globally, the system has been in use in the market for 10-15 years while in the Australian market, it is been in use for 7 years. Investigating the impact of this system showed that CPOE systems have high potential to optimize both patient outcomes and healthcare efficiency by better aligning with care standards and protocols. Since the introduction of this system, “there’s been a significant reduction in errors because we prescribe according to the protocol. These protocols are quite common and human error in prescribing is common. It has enhanced legibility, all that sort of stuff” as one interviewee descried. For the financial performance, a number of interviewees expected that the system would enhance the financial performance by receiving more referrals from independent oncologists (visiting medical officers (VMOs), but this is subject to complex agreements that have to be reached between the hospital and the VMOs and that is beyond the scope of this paper. 3.2 The ND System The ND system has been envisaged by the developers to replace the paper- based nursing documentation applications in hospital acute wards in both private and public hospitals. The objective of this system is to eliminate time assigned for non-medical duties and allocate more time for patients' care. This is facilitated by putting smart terminals at patients' bedsides, creating more direct interaction between nurses and patients. Providing these smart terminals directly at the bedside should facilitate higher levels of collaboration between ward nurses and other healthcare professionals according to the system’s designers. Results revealed from the UTAUT survey at ABC Hospital showed that this system increased the time for patient assessment from 5.2% to 9.1% of the total time spent by a nurse during a regular ward visit. This was achieved by reducing the time consumed for nursing documentation from 15.7% to 6.4%. Not only did the care time increase, but also the level of transparency, as patients could witness more details about their care provision, and an extra 48.1% of nursing activities were performed at the bedside compared to the process before introducing the ND system. The system helped increase patients safety by having a ‘one-stop-shop’ for patient records as one interviewee described. On the other side, a number of interviewees did not see a 192 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Haddad, J. Schaffer & N. Wickramasinghe: The Impact of Clinical Information Systems on Patient Outcomes and Organisational Performance direct translation between ‘longer care time’ and ‘better care’. One interviewee noted that it is “much more complex than just taking some aspects of the role away”, and even with this new system “I think that even with our new technology that we're testing now, nurses find other things to do” as another interviewee explained. The scope of the system is limited to ward and nursing station. This does not allow the system to cover the end-to- end process of healthcare provision as one interviewee noted in their concerns. In addition, the ND system has demonstrated high potential to increase the healthcare efficiency by reducing the time dedicated for paper records and following patients’ information and records. The nature of the system allows for a “higher number of processes to happen ever than before” as one interviewee noted, which has direct impacts on the efficiency of healthcare delivery through prompts and real time documentation. Also, this system seemed to have some impacts on the clinical decision making process. With all patient data available in the ward in one electronic pool i.e. the ND system, nurses can make clinical decisions or recommendations quicker, and based on more evidence than the paper records as agreed to by the interviewees The results show that the system may have indirect impacts on the financial performance of the facilities. This is by enhancing the reputation of the hospital through their use of state-of-the-art systems that are visible to the patients. A number of interviewees noted that this system has what was termed “face value”. As a private hospital, reputation is a “fundamental part of the business” as one interviewee described. Thus “if patients feel that even just on face value, that the nurses are not scribbling on a piece of paper, but actually, they've got an IT system that provides confidence in the organization”. Other aspects of enhancing the financial performance by using this system included better resource allocation. As the time spent by nurses to perform documentation duties is reduced, nurses are expected to capable to provide care to higher number of patients. 3.3 The IRS System This system is used across almost all of Victoria and beyond in large parts of Australia as well for capturing abnormal clinical incidents. It serves two purposes: documentation of an incident at the time it occurs, to support the classification via an inbuilt algorithm into how serious the incident is, and standardizing the information that's being captured through validation fields, distribution of that information to where it needs to be and then to drive it through into a larger data set of all clinical incidents to support more detailed analysis. This reporting system is web-based and enables all stakeholders to report different levels of incidents irrespective of their criticality. Along with capturing clinical or non-clinical incidents, the IRS enables sharing information with different levels of management and employees without any delay, as one of the closet administrators of this system explains: ”that's about people anywhere in the organization reporting clinical - or incidents of any sort - that a staff or patient. That's dependent upon an IT system having someone locally 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 193 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Haddad, J. Schaffer & N. Wickramasinghe: The Impact of Clinical Information Systems on Patient Outcomes and Organisational Performance doing something that's reasonably easy that makes the information available where it needs to be. Off the back of that incident being reported there are potential triggers or alerts launched to people who need to know. So, if it's a staff incident, O.H.S staff knows about it, as soon as it's entered. If it's a very serious incident, all of the senior management and appropriate clinical risk people know about it straightaway. There are some benefits in terms of information provision”. This system is relatively inexpensive, simple, intuitive, and easy to use, as a majority of the interviewees agreed during our discussions. These features make this system very popular in the Australian Healthcare context. XYZ Hospital purchased this system a few years ago to address an obvious gap in the information flow regarding incidents across the hospital as a number of interviewees agreed: “... [without IRS] we will have no capacity to know, or no realistic capacity, to know what things are going wrong with our patients, and therefore the ability to monitor them, to improve them and to attract that improvement”. Using this system has created a 'cultural shift' towards reporting in the group as one interviewee notes: “We’ve got numbers of things that happened at the time we implemented it. We’ve seen the cultural shift towards reporting; so increased numbers of incidents being reported not occurring because we don't know what occurred. Then we’ve seen the severity of those events go down in the time we’ve used it. Then the frequency of things happening goes down, while we have other indicators implying that reporting is still up”. This shift, in turn, has other impacts on the overall performance of the group. A number of the interviewees emphasized that the use of IRS is associated with increased patient safety, healthcare delivery efficiency, as well as reduced cost of healthcare provision: “If we’re not having patients stay longer because something went wrong, then it’s more efficient. If a patient comes to have a heart operation, and then falls over and breaks their leg, then they stay for another week, have another operation; all of which we potentially are not paid for, so there’s a cost imposed. So there are real benefits.” Discussion This study analyses the business value of IT in three specific healthcare contexts. This was done by using the Business Value of IT in Healthcare Model, which builds upon the IT Portfolio model (Weill & Broadbent, 1998) and the Enterprise of HealthCare Delivery model (Rouse & Cortese, 2010). The results suggest that looking at IS/IT solutions based on their business objectives helps identify which IT systems in the healthcare industry may help create more business value for the studied hospitals. Informational IT was shown to be the most relevant category for the healthcare context. This is consistent with the findings of Weill and Broadbent (1998) that informational IT is important to facilitate seamless information flow between different stakeholders. This is particularly crucial for healthcare providers as clinical decision making is a sophisticated process, and most of the time it requires inputs from different craft groups. Thus, finding an electronic platform that provides dashboard capabilities to nurses and other physicians is prudent for today’s and tomorrow’s healthcare. The results from the interviews showed that information 194 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Haddad, J. Schaffer & N. Wickramasinghe: The Impact of Clinical Information Systems on Patient Outcomes and Organisational Performance sharing that is facilitated through the use of the systems evaluated in this study, IRS, ND, and CPOE has positive impacts on patients’ outcomes, efficiency of operations, and the overall performance of the studied hospitals. The CPOE system shows a potential to increase both patient outcomes and healthcare efficiency by facilitating smoother cancer care delivery and reducing drug prescription errors. The private public nature of hospital did not have any visible impacts on patient outcomes and healthcare efficiency, as the core business is the same between private and public hospitals i.e. patient care.. Private hospitals seem to build upon brand and ‘face value’ elements to attract more patients by introducing state-of-the-art systems, the use of these system was not the first factor the patients took into consideration when making the decision on where to receive the care they need. However, the adoption of such systems attracted patients given everything else in the care delivery was the same with the studied hospitals. On the other side, the results show that embedding IS/IT into various healthcare delivery operations in the studied hospitals has introduced a significant change to both care givers and patients. In addition, given the CPOE is internationally developed, the results from the interviews showed that it still needs some ‘domestication’ to better attend to the uses’ requirements. Similarly, the ND system was still under development during the data collection phase, which resulted in a number of technical problems and thus frustrated the nurses. No downsides were reported with the use of the IRS system. Conclusion Correctly and completely identifying the business value of IT in healthcare contexts remains a challenging task. To address this, three clinical systems were examined to better understand how information technology can facilitate the generation of business value in healthcare. The BVIT model was constructed to map the studied systems, and to understand what role private/public classification can play in the context of the two tier Australian healthcare system. All of the systems had direct and indirect impacts on generating business value. The BVIT model was found to be helpful to investigate the business value of a vast range of clinical IT systems. The next stage of research will study the CPOE system in Australian public hospitals as the systems are implemented. Given that the Australian healthcare system supports both public and private healthcare delivery models and the model in this study was shown to be as relevant in both spheres, this provides strong support for the applicability of this model in other healthcare contexts; namely UK or US where, as discussed earlier, the healthcare systems tend to be essentially public and private respectively. In general, investigating the business value of IT in healthcare is a challenging undertaking, due to the complexity and uniqueness of the healthcare industry. Unlike other industries such as finance, retail, and manufacturing, various non-monetized aspects need to be taken into consideration with evaluating the business value of IT in healthcare. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 195 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Haddad, J. Schaffer & N. Wickramasinghe: The Impact of Clinical Information Systems on Patient Outcomes and Organisational Performance This study has implications for both theory and practice. For theory it significantly describes the development of a systematic and rigorous framework to enable and facilitate the establishment of business value of IT in healthcare and also to value the IT solutions in healthcare irrespective of the public or private nature of healthcare system being studied. For practice it provides a systematic approach that can be applied to any healthcare context irrespective of the underlying healthcare system to facilitate a fuller and deeper identification of the actual business value of IT in a specific healthcare context. Notes 1 For ethical and commercialisation considerations, the reference is available upon request. References Baxter, P., & Jack, S. (2008). Qualitative Case Study Methodology: Study Design and Implementation for Novice Researchers. Qualitative Report, 13(4), 544-559. Bazeley, P. a., & Jackson, K. (2013). Qualitative data analysis with NVivo (Second Edition. ed.): SAGE. Buntin, M. B., Burke, M. F., Hoaglin, M. C., & Blumenthal, D. (2011). The benefits of health information technology: a review of the recent literature shows predominantly positive results. Health Affairs, 30(3), 464-471. Haddad, P., Gregory, M., & Wickramasinghe, N. (2014). Business Value of IT in Healthcare Lean Thinking for Healthcare (pp. 55-81): Springer. Haddad, P., Schaffer, J., & Wickramasinghe, N. (2015). Evaluating Business Value of IT in Healthcare: Three Clinical Practices from Australia and the US. Paper presented at the MEDINFO 2015: EHealth-enabled Health: Proceedings of the 15th World Congress on Health and Biomedical Informatics. Haddad, P., & Wickramasinghe, N. (2014). Conceptualizing Business Value of IT in Healthcare to Design Sustainable e-Health Solutions. Paper presented at the 20th Americas Conference on Information Systems, AMCIS 2014, Savannah, GA, United States. Haddad, P., & Wickramasinghe, N. (2015). The use of a nursing informatics system as an exemplar to investigate business value of IT in healthcare. Health and Technology, 1-9. doi: 10.1007/s12553-015-0100-8 Huang, W., Seitz, J., & Wickramasinghe, N. (2010). Manifesto for e-health success. Paper presented at the the Pacific Asia Conference on Information Systems (PACIS 2010). James, T. J. (2013). A New, Evidence-based Estimate of Patient Harms Associated with Hospital Care. Journal of Patient Safety, 9(3), 122-128. doi: 10.1097/PTS.0b013e3182948a69 Jones, S. S., Rudin, R. S., Perry, T., & Shekelle, P. G. (2014). Health Information Technology: An Updated Systematic Review With a Focus on Meaningful Use. Annals of Internal Medicine, 160(1), 48-54. doi: 10.7326/M13-1531 Kenneally, J., Wilson, B., Porter, M., Murnane, S., McLaughlin, S., Buddrus, U.,... Hoyt, J. (2013). Leveraging IT Capabilities to Accelerate Business Value Impact from Electronic Medical Record Adoption. IVI White Paper Series. Melville, N., Kraemer, K., & Gurbaxani, V. (2004). REVIEW: INFORMATION TECHNOLOGY AND ORGANIZATIONAL PERFORMANCE: AN INTEGRATIVE MODEL OF IT BUSINESS VALUE1. MIS Quarterly, 28(2), 283-322. 196 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) P. Haddad, J. Schaffer & N. Wickramasinghe: The Impact of Clinical Information Systems on Patient Outcomes and Organisational Performance Muhammad, I., Teoh, S., & Wickramasinghe, N. (2013). The need for a socio-technical analysis in E-health: The case of the PCEHR. Nguyen, L., Haddad, P., Mogimi, F., Coleman, K., Redley, B., Botti, M., & Wickramasinghe, N. (2015). Developing an Information System for Nursing in Acute Care Contexts. Paper presented at the PACIS 2015 Proceedings, Singapore. Nguyen, L., Haddad, P., Mogimi, H., Coleman, K., Redley, B., Botti, M., & Wickramasinghe, N. (2015). Developing an Information System for Nursing in Acute Care Contexts. OECD. (2010a). Improving Value in Health Care: OECD Publishing. OECD. (2010b). OECD Health Policy Studies: Improving Health Sector Efficiency, The Role of Information and Communication Technologies. Retrieved from http://RMIT.eblib.com.au/patron/FullRecord.aspx?p=555301 Oshlyansky, L., Cairns, P., & Thimbleby, H. (2007). Validating the Unified Theory of Acceptance and Use of Technology (UTAUT) tool cross-culturally. Paper presented at the Proceedings of the 21st British HCI Group Annual Conference on People and Computers: HCI... but not as we know it-Volume 2. Pope, C., & Mays, N. (2013). Qualitative research in health care: John Wiley & Sons. Porter, M. E., Pabo, E. A., & Lee, T. H. (2013). Redesigning primary care: a strategic vision to improve value by organizing around patients’ needs. Health Affairs, 32(3), 516-525. Radley, D. C., Wasserman, M. R., Olsho, L. E. W., Shoemaker, S. J., Spranca, M. D., & Bradshaw, B. (2013). Reduction in medication errors in hospitals due to adoption of computerized provider order entry systems. Journal of the American Medical Informatics Association: JAMIA, 20(3), 470-476. doi: 10.1136/amiajnl-2012-001241 Rouse, W. B., & Cortese, D. A. (2010). Engineering the System of Healthcare Delivery. Amsterdam: IOS Press. Taiwo, A. A., & DOWNE, A. G. (2013). THE THEORY OF USER ACCEPTANCE AND USE OF TECHNOLOGY (UTAUT): A META-ANALYTIC REVIEW OF EMPIRICAL FINDINGS. Journal of Theoretical & Applied Information Technology, 49(1). Vermeulen, K., van Doormaal, J. E., Zaal, R. J., Mol, P. G., Lenderink, A., Haaijer-Ruskamp, F. M.,... van den Bemt, P. M. (2014). Cost-effectiveness of an electronic medication ordering system (CPOE/CDSS) in hospitalized patients. International Journal of Medical Informatics, 83(8), 572-580. Weill, P., & Broadbent, M. (1998). Leveraging the new infrastructure: how market leaders capitalize on information technology. Boston, Mass.: Harvard Business School Press. Wickramasinghe, N., & Schaffer, J. (2010). Realising Value Driven e-Health Solutions IMPROVING HEALTHCARE SERIES. Washington DC: IBM Center for the Business of Government. Williams, M. D., Rana, N. P., Dwivedi, Y. K., & Lal, B. (2011). Is UTAUT really used or just cited for the sake of it? a systematic review of citations of UTAUT's originating article. Paper presented at the ECIS. Yin, R. K. (2014). Case study research: design and methods (Fifth edition. ed.): SAGE. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Innovation in Micro, Small and Medium Sized Enterprises: New Product Development, Business Model Innovation and Effectuation 15 JUKKA HEIKKILÄ & MARIKKA HEIKKILÄ Abstract Digitalization increases the need for innovation of the business models to a new high, also in micro, small and medium sized businesses (SMEs). Every third SME is engaged in Business Model Innovation (BMI) activities, but few of them in a systematic manner. Earlier empirical and theoretical research suggest that BMI is, and should be, an iterative process of adjustments in pursuit for better performance and success with New Product Development (NPD). NPD and BMI research streams use causal constructs with focus on external technology driven or market driven internal resource optimization. Studies on effectuation and bricolage, in turn, indicate that entrepreneurs’ passion, curiosity, and originality can compensate limited resources for innovation in SMEs. Building on these approaches, we propose a framework to analyze innovation in SMEs with case studies. The empirical data was collected in in Horizon2020 funded Envision project, where we use multiple case study approach. For this study, we select failed, surviving, and successful BMI cases to recommend effective BMI for SMEs and line out directions for future research. Keywords: • Business Model Innovation • New Product Development • Effectuation • Bricolage • SME • Market strategy • Performance • CORRESPONDENCE ADDRESS: Jukka Heikkilä, University of Turku, 20014 Turun yliopisto, 20500 Turku, Finland, e-mail: jups@utu.fi; Marikka Heikkilä, University of Turku, 20014 Turun yliopisto, 20500 Turku, Finland, e-mail: marikka.heikkila@utu.fi. https://doi.org/10.18690/978-961-286-043-1.15 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 198 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) J. Heikkilä & M. Heikkilä: Innovation in Micro, Small and Medium Sized Enterprises: New Product Development, Business Model Innovation and Effectuation Introduction Digital transformation provides opportunities also for start-ups and early stage companies to innovate products and new ways of doing business. Where New Product Development (NPD) takes radical, technology-push disruptive change process as its starting point for new, competitive products (Christensen & Raynor, 2003), an evolutionary view about market-pull incremental effects on operations and products is provided by Business Modelling (McGrath, 2010). These alternative views have been under debate on innovation in corporations (e.g. Christensen et al., 2016). Moreover, studies on micro, small and medium sized organizations’ (SMEs) survival provide growing evidence that entrepreneurial passion and originality can, indeed, compensate limited resources (Stenholm & Renko, 2016). This intrinsic motivation and aspiration of abstract nature, i.e. effectuation – is expected to help SMEs in business model innovation, BMI (Sarasvathy, 2001a,b). The effectual view supplements the above rational, causal theories of market-pull with incremental adjustments and technology push of radical, disruptive change. But are there links between NPD, BMI, and effectuation to performance in the real-life of SMEs? For this purpose, we synthesize a framework for inquiry to find out the elements of failure, survival and performance in select case SMEs. We first discuss NPD and its connection to BMI. Then, we present effectual reasoning and bricolage, and how they are related with BMI. Third, building on the previous discussion, we compose a framework for analyzing innovation activities, strategic intent, and performance of SMEs with five selected SME cases. Finally, we discuss our findings, innovation performance of SMEs, and directions for further research to confirm our tentative results. 1.1 Lessons from innovating new products General finding in NPD literature is that radically new products built on novel technology fail often, mature slow, and are accepted on the market gradually over time due to tardiness of diffusion and negative attitudes towards new technology (Samli & Weber, 2000). But, if such a product offers clear advantage in comparison with competing products, the success rates are improved significantly (Bishop & Magleby, 2004). New technology becomes even more attractive in the light of the findings that on unfulfilled markets novel products tend to sustain longer than products built on minor developments, or product line extensions (Samli & Weber, 2000). Spending big (i.e., >20% of the turnover) on new product R&D works in increasing the number of new successful products (Samli & Weber, 2000). High-quality development teams consisting of dynamic, motivated, experienced and talented developers improves the odds of success further, especially if the management provides direct support, or introduces systematic methodology for NPD (Bishop & Magleby, 2004). 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 199 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) J. Heikkilä & M. Heikkilä: Innovation in Micro, Small and Medium Sized Enterprises: New Product Development, Business Model Innovation and Effectuation Furthermore, speed of NPD has become increasingly important due to continuous reduction in the product life-cycle time and increased competition due to global, technological progression. Rapid NPD, prototyping, and testing increases likelihood of success, as iterations help in discovering errors, and provide flexibility and better understanding of the product potential on the market early (Chen et al, 2010; Ries, 2011). As an indication of this, Sarja (2016) raised scalability, visibility, and timing as additional factors important to the success on digital products business landscape. As trying to build innovations only on internal technology-push is unlikely to succeed (Samli & Weber, 2000), companies are encouraged instead to focus on their customers’ needs already during the development of the product (Bishop & Magleby, 2004). This also helps to prepare unfulfilled product-markets for innovation. The same applies, if the novel technology and market analysis are used in combination during NPD-process beyond regular interviews with customers and end-users. Careful examination of alternative technologies, products, and markets during the development by product developers with end users further enhances the likelihood of success (Bishop & Magleby, 2004). Interestingly, while the most growth potential in markets is attributed to SMEs (EC, 2014; EASME, 2015), SMEs often are limited in capabilities of the above NPD success factors (Leithold et al., 2016). Thus, creating NPD capability is the first requirement SMEs must fulfil. Noke and Hughes (2010), for instance, show, how SMEs employed strategies that combine their internal capabilities while minimising their internal weaknesses by partnering and outsourcing. Their study thus highlights that it is essential for SMEs to get involved in external NPD partner networks to kick-start the change process and to gear up for superior product-market innovating capability (Noke & Hughes, 2010). We conclude that NPD literature separates technology-push and market-pull as drivers of innovation. Because customer involvement is to help in incremental innovation, involving customers may be detrimental to radical innovation (Scaringella et al., 2017). The reasoning is that when a firm focuses on existing customers, it may not recognize opportunities that arise in emerging markets or customers being offered disruptive solutions by innovators (Christensen, 1997). In the light of the above, it is claimed that the process driven by technology-push leads often to radical innovations, whereas market pull is more often served with incremental innovations to the user needs. However, recent research argue that the two forces are complementary and necessary in NPD (Scaringella et al., 2017; Sarja, 2016). Therefore, building successful new products on new technology is lucrative, because of the potential upside benefits – fast adoption, long lifetime, low competition. However, most of the means for successful new product launch do not depend on the technical skills only, but on the capabilities of the product development teams, systematic management support, ample resources combined with the knowledge and skilled, iterative probing, realization, and shaping of the market, technology and needs. 200 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) J. Heikkilä & M. Heikkilä: Innovation in Micro, Small and Medium Sized Enterprises: New Product Development, Business Model Innovation and Effectuation 1.2 Business Model Innovation Effectiveness Business model innovation means notable changes in the logic how an organization creates, delivers, and captures value. Foss and Saebi (2017) sum ‘mainstream’ BMI outcomes and research directions by analyzing 150 peer-reviewed scholarly articles on BMI published between 2000 and 2015. Their analysis reveal external (e.g., technology, regulatory, stakeholder needs) and internal (e.g., strategy, capabilities) antecedents that drive the BMI (scope, novelty) with expected outcomes (financial performance, innovativeness, cost reduction). This process is moderated by macro-, firm-, or micro- level variables, and emergers as cognitive structures (Foss & Saebi, 2017)1. The structures can either respond to exogenous technological and regulatory changes (e.g., Zott and Amit, 2008; Teece, 2010), or operate as a learning process of iterative analysis and experimentation in response to changes in the environment (e.g., Chesbrough, 2010; McGrath, 2010; De Reuver et al., 2017). We see these as fine tuning the previous view on the NPD incremental adjustment of internal resources. Yet, as evidence suggests, new business models have often been the source, and not the outcome, of industry change (Markides, 2008; Christensen et al., 2016). Companies on ‘traditional’ industries have been able to generate supernormal profits by designing new business models in the presence of major technological progress, or in the absence of regulatory limitations. These new business models have boosted large-scale disruptive industry change reaching far beyond reacting to changes in business environment, or developing new products. It is about being active in innovating and implementing radically new ways of doing business by the management. BMI drivers of SMEs mostly differ from those of previously mentioned industry-changes – a typical high-tech start-up or growth venture builds its future on one product to the global market (Sarja, 2016). Furthermore, we do not know too well what facilitates BMI in entrepreneurial firms, and how are these drivers and obstacles different from incumbents (Foss & Saebi, 2017). A recent empirical study (Bouwman et al., 2016) reports that 37% of SMEs in Europe are involved in BM Innovation, but only 15% of them are familiar with mainstream BM methods like CANVAS, STOF, Visor, or BM Cube. Diverse tools are used, but their use is limited in scope and sophistication, compared to method-based BM-toolsets. More than 50% of the SMEs use consultants for BMI, which may explain the unexpectedly high penetration of BM among the studied SMEs. To conclude, despite the lack of sophistication, BMI is about to become mainstream in SMEs, leveraging their BMI capabilities and capacity. But does our contemporary BMI research capture the unique features of SMEs? 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 201 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) J. Heikkilä & M. Heikkilä: Innovation in Micro, Small and Medium Sized Enterprises: New Product Development, Business Model Innovation and Effectuation 1.3 Effectuation, bricolage and entrepreneurial survival Whereas BMI and NPD literature is mostly focused on causal approaches on developing business towards given goal, the entrepreneurial literature emphasizes the effectual side of businesses, which is considered as the inverse of causal. Causal rationality starts with a pre-determined goal and a given set of means, and seeks to identify the optimal, such as fastest, cheapest, or most efficient alternative to achieve the given goal. The effectuation process is highly subjective, starting from the capabilities and resources of the entrepreneur, and takes this “set of means as given and focus on selecting between possible effects that can be created with that set of means”. (Figure 1, Sarasvathy, 2001a) Figure 1: Causal and effectual reasoning (Sarasvathy, 2001a). Sarasvathy (2001b, p. 252) proposes four aspects that differentiate causal and effectual reasoning. She builds on her conceptual study, and on her empirical enquiry on serial entrepreneurs: Effectuation Entrepreneurs have been shown to have high tolerance for ambiguity. Whereas causation models aim to maximise the potential returns by selecting optimal strategies, the effectuation predetermines how much loss is affordable and focuses on experimenting with as many strategies as possible with the given limited means (Sarasvathy, 2001b). Causation models, such as Porter (1980), emphasise detailed competitive analyses. Effectuation emphasises strategic alliances and pre-commitments from stakeholders as way to reduce uncertainty and to create barriers of entry (Sarasvathy, 2001b). Present business modelling requires extensive partnering from the very beginning for developing new products and viable services. Causation models are appropriate, when, e.g., knowledge or expertise of a specific new technology pre-exists. Effectuation is better for exploiting contingencies that arise unexpectedly over time (Sarasvathy, 2001b). This is where also recent BMI studies have paid attention to (Bouwman et al., 2017). Causal reasoning focuses on predictable aspects of an uncertain future. According to Sarasvathy, effectuation, in turn, focuses on the controllable 202 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) J. Heikkilä & M. Heikkilä: Innovation in Micro, Small and Medium Sized Enterprises: New Product Development, Business Model Innovation and Effectuation aspects of an unpredictable future. For example, causation model, such as Kotler (1991), defines a market – assumed to exist independent of the entrepreneur - as the universe of all possible customers. An effectuating entrepreneur would define her market as a community of people willing and able to commit enough resources and talent to sustain her enterprise’s survival, and creates the market by bringing together enough stakeholders, who buy into her idea (sometimes called as FFF, Family, Friends & Fools). BMI researchers have identified the tendency of entrepreneurs to seek familiarity in business models (Chesbrough & Rosenbloom, 2002), and the challenges they face when confronted with unfamiliar concepts. Later research show that effectuation may play a role in search of BMI effectiveness: e.g. Sosna et al. (2010) suggest that initial BM design takes form on the owner-manager’s cognition and sense-making and in the early phases of NPD and BMI processes may be characterized by effectuation behavior. Effectuation is closely related with bricolage (Fisher, 2012). The term was coined by Weick (1993) in organizational studies, later adopted Baker and Nelson, (2005), and Ciborra (1996) in Information Systems field. Bricolage means good understanding of the resources at hand; innovative, ‘good enough’ use of combinations of resources at hand to problems, or, opportunities; and active self-correcting trial-and-error “make do” - behaviour. For example, Stenholm and Renko (2016) suggest that the entrepreneurs passionate about developing their firms and inventing new solutions are more likely to engage in bricolage. This involves “creative manipulation of ‘existing’ or ‘available’ resources, such as materials and financial resources, to solve a problem at hand or to create new opportunities” (Stenholm & Renko, 2016). Furthermore, bricolage is a form of effectual reasoning of an entrepreneur to avoid the hazards embedded in the critical early stages of a new firm (Stenholm & Renko, 2016). They conclude that “passion for inventing and developing enhances entrepreneurs’ “make do” behavior and, consequently, indirectly increases the chances for entrepreneurial survival”. This is an addition to more rationalistic success factors by NPD and BMI literature. However, there is mixed evidence on the effectiveness of bricolage. For example, in Ciborra’s early (1996) study on a multinational high-tech company, bricolage helped it to adapt, but simultaneously constrained its effectiveness. To summarize, many of the earlier justified criticism towards business planning (e.g. Sarasvathy, 2001b), business modelling, and BMI has been alleviated in recent BMI techniques. Sarasvathy’s original effectuating entrepreneur resembles recent lean startup ideologies (Ries, 2011). Their main argument is that it is rational to bricolage and iterate, because it eventually leads - through an unpredictable groping process - to rational goal (like in satisficing behavior under uncertainty). Lean startup emphasizes also effective and measurable outcomes, like BMI does (Heikkilä et al., 2015). Therefore, effectuation and bricolage should be explicitly embedded in innovation effectiveness evaluation at SMEs. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 203 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) J. Heikkilä & M. Heikkilä: Innovation in Micro, Small and Medium Sized Enterprises: New Product Development, Business Model Innovation and Effectuation 1.4 Synthesis of above research streams Figure 2: Synthesized framework Figure 2. summarizes the concepts of this paper, and spans the framework of inquiry. It links three potential drivers (technology push, market pull, and effectuation) with three methods for innovating (NPD, BMI, bricolage). These are in turn accompanied with three market strategies (sustaining, low end entry, and new market creation (Christensen, 2009)). Eventually, the decisions and steps taken are expected to influence performance, which can range from failure to survival and success. Innovation drivers: Technology push: Technical evolution triggers, or enables new ways of doing business as much as it does create new products. Often the starting point is basic scientific research, or applied research and development in organisations. These proceed through design and development into a product that can be manufactured effectively and economically and then sold on the market. Radical breakthroughs are more likely to be achieved through technology push. Market Pull refers to the need for a new product or a solution to a problem, which comes from the market. These needs might be perceived by an entrepreneur, for instance through market research, which assesses what needs exist, how far they are met by existing products and how the needs might be met more effectively by means of a new or improved innovation. Market pull more often leads to incremental innovations. Effectuation: highly subjective approach, where innovation starts from the capabilities and resources of the entrepreneur. The entrepreneur selects between 204 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) J. Heikkilä & M. Heikkilä: Innovation in Micro, Small and Medium Sized Enterprises: New Product Development, Business Model Innovation and Effectuation possible services/products that she can create with the set of means available to her. Implementation NPD: Product idea passes through a series of stages from ideation through design, manufacturing and market introduction Recent research suggests that technology push and market pull are complementary and necessary for NPD (Scaringella et al., 2017; Sarja, 2016). BMI: Organization, finance, customer, service and technology are main components of the BM. Change in one or several of these may result in business model innovation. Bricolage: utilising the combinations of resources at hand to act on problems, or, opportunities. Self-correcting trial-and-error “make do” -behaviour. Market Strategy High-end strategy: incremental improvements to the current products on markets Low-end strategy: provide a simple or low price solution offering good value for money. New Markets: Serve customers, who were not previously served by existing incumbents. Performance Failure: the business/innovation fails. For instance, the product is redrawn from the markets, or business is in solvency, or bankrupt. Survive: the business/entrepreneur is hanging on, or at high burn rate; avoiding failure, but not profitable. Success: the business is clearly profitable Research Methodology and case selection We use multiple case study approach to analyse BMI effectiveness in five SMEs (Table 1). Multiple cases serve as repetitions, extensions and contrasts to the emerging theory, and the researcher develops an understanding of why certain conditions did or did not occur, and then offers interpretations (Yin, 1984). Data was collected by the authors of this paper and the other consortium partners in a multi-national EU-funded project. The research collection follows a case study protocol, which forms the basis for data gathering and case data repository. This makes the data well-(Sarasvathy, 2001b) structured and suitable for cross case analysis. The protocol is available on request from the authors. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 205 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) J. Heikkilä & M. Heikkilä: Innovation in Micro, Small and Medium Sized Enterprises: New Product Development, Business Model Innovation and Effectuation Table 1: Cases Company OUTCOME Size Atelier Micro Failure Everyone deserves plants Small Survive Fresh Natural Air Medium Survive Event Management Service Small Success Electronic medicine dispenser Medium Success Using subjective sampling, we selected five SME cases with different performance outcomes (failure, survival, success). Under these outcomes, we can first detect whether the drivers, implementation approaches, or market strategies are different for outcomes (they should) and then pursue explanations to the differing outcomes with the synthesized framework (see Figure 2). The cases are listed in Table 1. In the Appendix, we describe and analyze the cases in more detail. Analysis Figure 3: Failure: Atelier (case a) Atelier (case a, figure 3) started as self-employed artist 12 years ago. The entrepreneur was devoted to creating handicraft products (NPD) by combining raw materials in novel ways. Despite the innovative products, the production does not scale up, visibility is hard to get, and timing depends on fashion rather than on Atelier’s action. The atelier had a store where she sells her products to tourists (mainly in summer), or locals looking for a birthday gift etc. She also imitated the competitors by being present in Facebook and in online store. In 2015 she switched from a self-employed person to an independent entrepreneur. Then she could hire a person to run the store and administrative matters. 206 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) J. Heikkilä & M. Heikkilä: Innovation in Micro, Small and Medium Sized Enterprises: New Product Development, Business Model Innovation and Effectuation Unfortunately, the sales could not to cover increasing costs. The business was closed one year after she became an entrepreneur with company status and consequent legal obligations. But, already the same year she started experimenting with a new business idea related to remote life style coaching which she marketed in her Facebook. The case is typical case driven by effectuated entrepreneur and bricolage. Everyone Deserves Plants (case b, figure 4) is an SME initially established by a designer, who had the vision to create a beautiful consumer product for cultivation of herbs in- house. With partner network – such as researchers specialized in greenhouse cultivation - the micro-sized start-up company developed, and recently patented world-wide its unique IT-controlled led light and growth system. In parallel with NPD, they started using BMI tools to design and revise their business model and value proposition (they imitate the BM of Nespresso with alterations), analyze the potential markets, and to create user profiles (i.e., ‘personas’). This way they dared to abandon a fancy and fashionable mobile app for the users, but their analyses proved that there were no markets for remote control feature. The product is competing with other high-end consumer products, because there have not been direct competing products. To increase its sales, the company refocused its sales channel strategy from design shops to high-end malls and warehouses. In four years of operation the size of the company has been growing from four to 13 people. Thanks to its awarded and patented product the SME is attractive to the investors to raise capital, but it has not been able to reach the planned turnover targets and is making loss. Scaling up the production is possible, but the market is still emerging – it seems the visibility of the product and timing of market entry are not optimal. Figure 4: Survivals: Everyone Deserves Plants (case b) and Fresh Natural Air (case c) Case c (figure 4), Fresh Natural Air, started from the idea of the founder, who suffered from poor in-door air quality. He wanted to improve the air quality by bringing part of nature inside, i.e. living plants. He started to build a green wall with a fellow university student, who had both practical and theoretical knowledge on purifying water with ecological means. The first prototypes were put together of plastic and vent duct tape. Simultaneously, they were designing business models using BM canvas. The challenge was to make the product look good and the plants flourish. So, they developed a remote sensing system with embedded sensors to measure the status of the green wall and its 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 207 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) J. Heikkilä & M. Heikkilä: Innovation in Micro, Small and Medium Sized Enterprises: New Product Development, Business Model Innovation and Effectuation environment. This data is analyzed automatically in a cloud software. The adjustments to the plants growth parameters are fed back to the green wall at customer’s premises. Yet, the system needs regular manual maintenance (watering etc.). Imitating benchmark companies from other industry sectors, the SME decided to bundle all – green wall, remote control and maintenance – into one service, which it leases to b-to-b customers. Right timing is hard, despite the good visibility, because the maintenance does not scale up well. Initially the target was new market entry, but later they refocused on clean tech markets, and have an alliance with a large air conditioning incumbent firm, which could help in securing maintenance services in selected cities. The personnel of the company has increased from 3 to 60 in five years. It is making loss, but has doubled its turnover for the last two years. Thanks to its iterative BMI and NPD, (it’s been awarded, too), the SME is seen attractive by the investors. Figure 5: Successes, Event management service (Case d) and Electronic Medicine Dispenser (Case e) Event Management Service, case d (figure 5), was established in 2007 by two co- founders. They worked in hotel and travel business, and found managing events a constant struggle with reservations, cancellations, detailed HoReCa2- arrangements, etc. They were looking to find a service or product to help in this task, but to their surprise they could not find neither affordable services, nor suitable products (software), so they started developing one for themselves, in true NPD sense. In parallel, they made a market survey that confirmed the existence of a niche market for automating of the event arrangement and management in businesses and public sector organizations. The initial in-house, back-office version was further developed to a web-based SaaS service for event management. The market survey made them also known to the potential customers, and their revised product got a flying start from the beginning. The aim was to provide affordable service to cut costs of arranging events on the current market, but they could also reach new customers that were not served by the existing incumbents. Nowadays, the awarded service is available worldwide, and runs constantly through NPD iterations, which ensures compatibility with customers’ information systems. Their initial timing was good, product gained good visibility through the market survey. The current implementation of the platform scales up well. Case d has grown during the last four 208 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) J. Heikkilä & M. Heikkilä: Innovation in Micro, Small and Medium Sized Enterprises: New Product Development, Business Model Innovation and Effectuation years from 12 to 21 persons. Through these years, it has been profitable for several years showing steady turnover growth and even better growth in net income. Electronic Medicine Dispenser, case e (Figure 5), established in 2003, is a high-tech company with technology-push approach. Its innovative new dispenser service was expected to have pull from the market: in addition to its main value proposition of providing improved dispensation safety and quality of medication to the patients, it could promise cost savings to the hospitals and nursing homes. The company is experienced in NPD, but in this case, they used also BMI tools (BM canvas and ecosystem analysis) to support the process. Business modelling revealed that the envisioned product was not lucrative enough for one of the key partners in terms of business. Therefore, case e decided to discontinue the development, and instead, focus its NPD & BMI efforts onto more potentially profitable and feasible products. Even though the dispenser service failed first, company’s partners eventually implemented a derivative design and brought it to market with SME’s major incumbent partner, which is a visible actor with a credible reputation on the market. SME is employing around 120 persons and runs profit. Their present implementation of the service scales up well, and was synchronized on time with the incumbents’ product launch to gain momentum. To us, case e appeared least driven by effectuation, but rather relying on NPD combined with customer and partner network based BMI. Findings and Conclusions Researchers have observed that business model schemas are complex structural representations of the underlying activity systems. As such, they are also difficult to ideate from scratch due to the challenges of working out at once all the attributes and interrelationships comprising a complex system (Baden-Fuller and Morgan, 2010; McGrath, 2010). This means that ideation anchors to a known way of developing new products, elements of a business model, or available resources (bricolage), when met by changing circumstances. This all is expected to depend on entrepreneurial effectuation. Therefore, we expanded the concept of BMI with elements of NPD, effectuation and bricolage of entrepreneurs. Our framework also can depict the market strategies with profitability and sustainability. We used the framework to analyze five case SMEs. Most of the case companies are awarded thanks to their innovative product/service and/or business models, too. The case companies were established around 10-15 years ago. One of them filed in bankruptcy, two are surviving along investors’ funding rounds, and two companies are going strong. Most profitable business model has a scalable product (case d) that meets directly a customer need outside the customers’ core business. BMI plays a minor role, because the business has hit a ‘sunspot’ from the beginning, and is able to keep that position due to constant product updates in close development co-operation with their customer. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 209 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) J. Heikkilä & M. Heikkilä: Innovation in Micro, Small and Medium Sized Enterprises: New Product Development, Business Model Innovation and Effectuation The other successful case (case e) innovated an idea, which could scale-up by co- operating with its partners. However, they could not convince all partners (not all parties are entrepreneurs, but rather risk aversive bureaucracies) to commit to the service at the first place, even though the market was there. The launch did not appear profitable according to business modelling. BMI helped the company, first, to put the market entry on halt, and then, to reconfigure the fundamental idea with more powerful partners and reschedule the launch. Fast business modelling iteration seemed to be a key to successful adjustment to the market needs, improving visibility, and timing in addition to its originally good scalability. Survival cases’ (cases b and c) business models both have a physical, fancy product with extended, IT-based features and lucrative stories, but their business models need constant revisions due to the bottlenecks in expanding to new markets with logistic, linguistic, and product related complications. Fast iteration is a necessity, but contracting, sub- contracting and building the physical operations on various markets takes a time and a lot of entrepreneurial effectuation, but the problems with scalability and timing persist. Finally, the failure (case a) had high-end sustaining product strategy, improving the quality of the existing product and service by formalizing business. However, the SME did not survive on the market with that approach, because it was accruing extra costs, and losing entrepreneurial agility. All the cases follow different paths of evolution and market strategies, and in all survivor cases the take-off has taken years, even with the most successful of the selected case. It hit a bulls-eye niche with NPD, thanks to its effective indirect pre-marketing for the clientele, and has been able to maintain that position by iteratively co-creating integrated new features without losing its core product simplicity. The need for BMI is marginal. It is a textbook example of successful NPD. The companies that could create a viable business model can implement product and BMI very differently. It seems that innovative physical, high-tech products take a long time to develop to a mature profitable business even though entrepreneurs know and iterate their business model regularly (cases b & c). On the other hand, the most profitable of the pack, case d, has a business that is virtual by nature, builds on platforms, and scales up to thousands of users by self-service and has high demand in a niche market. It shares some similarities with case e, which used to develop a portfolio of new products at constant rate, but later to direct their development efforts according to BM analyses towards most potential business prospects. Their business modelling thus articulated the product and business roadmaps in a way that they could be put aside for a while and ramped-up in short notice, as the opportunity emerged. The cases show how effectuation has a strong influence in the initial stages of the innovation. Typically, the idea for the business came from the life or work experiences of the founder(s). What is remarkable in most surviving cases is that the 210 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) J. Heikkilä & M. Heikkilä: Innovation in Micro, Small and Medium Sized Enterprises: New Product Development, Business Model Innovation and Effectuation companies/entrepreneurs learned to broaden their business thinking with BMI. The initial mindset is product-centric, many times with altruistic mind-set of improving the lives of the people, or their environment. Typically, after the rounds of BMI they can improve timing and visibility of their products better to the needs of the markets. However, the problem of scalability with physical products remain. Finally, In SME context, the value of BMI is in iteration and as the means to identify and react upon exogenous changes. The idea of combining NPD, BMI and entrepreneurial effectuation by bricolage seems to reflect the reality in the case companies mostly well. It is also worth noting that BMI improves the entrepreneurs’ product and business development skills, and helps to time innovations entry to the market. Acknowledgement The work leading to these results has received funding from the European Community’s Horizon 2020 Programme (2014–2020) under grant agreement 645791. The content herein reflects only the authors’ view. The European Commission is not responsible for any use that may be made of the information it contains. Notes 1 Doz and Kosonen argue that “…business models stand as cognitive structures providing a theory of how to set boundaries to the firm, of how to create value, and how to organise its internal structure and governance.”, (2010, p. 371). 2 Hotels, Restaurants, Catering Appendix Cases Case A: Atelier Case E: Case B: Everyone Case C: Fresh Case D: Event Electronic deserves plants Natural Air Management medicine Service dispenser Drivers Effectuation. Technology Technology Technology Technology The entrepreneur push: Electronic push: IT push: Sensors, push: SaaS wants to create dispensing controlled led biodynamics, instead of new and device and lightning & embedded SW installed improved remote growth system (patented). software. products monitoring of (patented). Market pull: Market pull: following her medicine use. Market pull: Clean-tech Lack of artistic visions. Market Pull: There was not forerunner related services was Cost saving (yet) markets for with high growth recognized, through reduced product that potential. market creation need of patient consumer could Effectuation: The by survey. visits, improved control via mobile product idea came Effectuation: safety and phone. from the CEO The founder quality. Effectuation: A who suffered from had 10 years of designer wanted to poor indoor air expertise from design a product quality. the field with 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 211 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) J. Heikkilä & M. Heikkilä: Innovation in Micro, Small and Medium Sized Enterprises: New Product Development, Business Model Innovation and Effectuation for cultivating an emerging herbs in-house. vision. Implementation NDP: The NDP: the NDP: the product NDP: The NDP: The method entrepreneur was company was was designed by entrepreneurs founders devoted to accustomed to the founder. created prototypes created the creating and creating high- BMI: BM canvas and minimum product first for implementing tech products. and later Value viable products to internal use, new products. BMI: BM and proposition canvas test the product then offered it Bricolage: She ecosystem was used. with users. to markets. was combining analysis revealed Bricolage: for BMI: BMI: market the raw materials that the BM is expanding to simultaneous analysis in new ways to not viable for international development of showed the create new one of the main markets, they product and BM lack of products by partners. select the target with canvas. products on the herself. cities/countries by Bricolage: The market. hunch, but want its first prototypes viability affirmed were created of by BM analysis duct tape and before entry. some plastic boxes. Market strategy High end: High- Low end: The New market: High end: High- Low end: The quality, unique aim was to use Novel, automated quality service, aim was to use products. high-tech to design product requiring both latest provide cost that was initially remote and on-site technology for saving and to be distributed maintenance, lowering costs affordable via design shops, cooperation with of the activities service for later switched to major air in the clientele. current market. brand warehouses. conditioning New market: incumbent. Reaching new customers by market survey with affordable costs. Performance Failure. The Failing first, Survive. The Survive. The Success: The business was then success. company has not company is SME has been closed. Soon she The business been able to reach making loss, but very profitable was development the planned has doubled its for several experimenting was turnover targets turnover for the years. The size with a new discontinued, the and is making loss. last two years. The of the company business idea of SME put its The size of the size of the has increased life style effort in other company has company has from 12 (2012) coaching. business ideas, increased from 4 increased from 3 to 21 (2015). but ramping up (2013) to 13 (2012) to 60 at opportunity. (2015). SME is (2017). Product The SME is attractive to the story is lucrative profitable. investors. to investors. 212 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) J. Heikkilä & M. Heikkilä: Innovation in Micro, Small and Medium Sized Enterprises: New Product Development, Business Model Innovation and Effectuation References Baden-Fuller, C., & Morgan, M. S. (2010). Business models as models. Long range planning, 43(2), 156-171. Baker, T., & Nelson, R. E. (2005). Creating something from nothing: Resource construction through entrepreneurial bricolage. Administrative science quarterly, 50(3), 329-366. Bishop, G. L. & Magleby, S. P. (2004). A Review of Technology Push Product Development Models and Processes. Proceedings of the American Society of Mechanical Engineers, 16th International Conference on Design Theory and Methodology, Jan. 1, 2004, pp. 383-392. Bouwman, H., Molina-Castillo, F.-J., & de Reuver, M. (2016). Business Model Innovation in European SME: some preliminary findings, Proceedings of the 29th Bled eConference on Digital Economy, June 19-22, 2016, pp. 527-538. Bouwman, H., Heikkilä, J., Heikkilä, M., Leopold, C. & Haaker, T. (2017). Achieving agility using business model stress testing. Electronic Markets (2017), 18.2.2017. doi:10.1007/s12525-016- 0243-0. Chen, J., Damanpour, F., & Reilly, R. R. (2010). Understanding antecedents of new product development speed: A meta-analysis. Journal of Operations Management, 28(1), 17-33. Chesbrough, H. (2010). Business model innovation: opportunities and barriers. Long range planning, 43(2), 354-363. Chesbrough, H., & Rosenbloom, R. S. (2002). The role of the business model in capturing value from innovation: evidence from Xerox Corporation's technology spin‐off companies. Industrial and corporate change, 11(3), 529-555. Christensen, C.M., (1997). The Innovator's Dilemma: When New Technologies Cause Great Firms to Fail. HarperBusiness. Christensen, C.M., Bartman, T., & Van Bever, D. (2016). The hard truth about business model innovation. MIT Sloan Management Review, 58(1), 31. Christensen, C.M., Grossman, J.H., & Hwang, J., (2009). The Innovator’s Prescription: A Disruptive Solution for Health Care. New York: McGraw-Hill. Christensen, C.M., & Raynor, M.E., (2003). The Innovator’s Solution. Harvard Business School Publishing, MA. Ciborra, C. U. (1996). The platform organization: Recombining strategies, structures, and surprises. Organization science, 7(2), 103-118. De Reuver, M., Molina, F.J., & Bouwman, H. (2017). Business model innovation design and experimentation in SMEs: drivers and outcomes. Working paper. Doz, Y.L. & Kosonen, M. (2010). Embedding strategic agility: a leadership agenda for accelerating business model renewal. Long Range Planning, 43(2): 370–382. EASME (2015). Horizon 2020's SME Instrument. Retrieved from http://ec.europa.eu/easme/en/horizons-2020-sme-instrument. EC (2014). The Need for Innovations in Business Models, Final Policy Brief (Deliverable 5), Version 2.5. Retrieved from https://ec.europa.eu/research/innovation-union/pdf/expert- groups/ERIAB-BMI_PB_new_business_models.pdf. May 14, 2014. Fisher, G. (2012). Effectuation, causation, and bricolage: a behavioral comparison of emerging theories in entrepreneurship research. Entrepreneurship theory and practice, 36(5), 1019-1051. Foss, N. J., & Saebi T., (2017). Fifteen Years of Research on Business Model Innovation: How Far Have We Come, and Where Should We Go? Journal of Management. 43(1). 200-227. Kotler, P. (1991). Marketing Management: Analysis, Planning, Implementation, and Control. Englewood Cliffs, NJ: Prentice-Hall. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 213 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) J. Heikkilä & M. Heikkilä: Innovation in Micro, Small and Medium Sized Enterprises: New Product Development, Business Model Innovation and Effectuation Heikkilä, M., Bouwman, H., Heikkilä, J., Solaimani, S., & Janssen, W. (2015). Business model metrics: an open repository. Information Systems and e-Business Management, 14(2), pp. 337– 366. Leithold, N., Woschke, T., Haase, H., & Kratzer, J. (2016) ‘Optimising NPD in SMEs: A best practice approach’, Benchmarking: An International Journal, 23(1), pp. 262–284. McGrath, R. G. (2010). Business models: a discovery driven approach. Long range planning, 43(2), 247-261. Markides, C. C. (2008). Game-changing strategies: How to create new market space in established industries by breaking the rules. John Wiley & Sons. Noke, H., & Hughes, M. (2010). Climbing the value chain: Strategies to create a new product development capability in mature SMEs . International Journal of Operations & Production Management, 30(2), 132-154. Porter, M. E. (1980). Competitive Strategy: Techniques for Analyzing Industries and Competitors. New York: Free Press. Ries, E. (2011). The lean startup: How today's entrepreneurs use continuous innovation to create radically successful businesses. Crown Business. Samli, A. C. & Weber, J. A. E. (2000). A theory of successful product breakthrough management: Learning from success. Journal of Product & Brand Management 9(1): 35–55. Sarasvathy, S.D. (2001a), What Makes Entrepreneurs Entrepreneurial? pp. 1-9. Available at SSRN: https://ssrn.com/abstract=909038https://ssrn.com/abstract=909038 Sarasvathy, S. D. (2001b). Causation and effectuation: Toward a theoretical shift from economic inevitability to entrepreneurial contingency. Academy of Management Review, 26(2), 243-263. Sarja J., (2016). Developing technology pushed breakthroughs. Defining and assessing success factors in ICT industry. Acta Universitatis Ouluensis, 2016. Juvenes Print, Tampere, Finland. Scaringella, L., Miles, R. E., & Truong, Y. (2017). Customers involvement and firm absorptive capacity in radical innovation: The case of technological spin-offs. Technological Forecasting and Social Cha nge. Available online 13 January 2017. Sosna, M., Trevinyo-Rodríguez, R. N., & Velamuri, S. R. (2010). Business model innovation through trial-and-error learning: The Naturhouse case. Long range planning, 43(2), 383-407. Stenholm, P. & Renko, M. (2016). Passionate bricoleurs and new venture survival. Journal of Business Venturing, 31(5), 595-611. Teece, D.J. (2010) Business Models, Business, Strategy and Innovation, Long Range Planning, 43(2-3), 172-194. Weick, K. E., (1993). Organizational Redesign as Improvisation, in Huber, G. P. and Glich W. H., (eds.) Organizational Change and Redesign: Ideas and Insights for Improving Performance, Oxford University Press pp. 346-380. Yin, R. (1984 ). Case Study Research: Design and Meth ods, Sage Publications. 160 pages. Zott, C., & Amit, R. (2008). The fit between product market strategy and business model: Implications for firm performance. Strategic Management Journal, 29, 1–26. doi:10.1002/smj.642 214 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) 30TH BLED ECONFERENCE: DIGITAL TRANSORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons The Playful Learning Approach for Learning How to Program: A Structured Lesson Plan 16 ROBERT HEININGER, VICTOR SEIFERT, LOINA PRIFTI, MATTHIAS UTESCH & HELMUT KRCMAR Abstract IT-based learning has proven to be a useful approach to educate people regardless of their age or other characteristics. However, the developments in IT and its socio-economic implications have a high influence on education with new approaches and methods, such as the playful learning approach (PLA). This approach has been widely researched and can be applied to teach programming as one of the core digital skills. However, scientifically developed and validated structures for PLA units in programming are rare. In this paper, we offer a lesson structure for a PLA to programming by addressing the five core success factors of playful learning. Our structure includes six units and follows an iterative and agile procedure by combining game features with the educational content. Educators and teachers can use the presented results to design the lesson structure in their classes. Furthermore it offers a basis for further research in the area of PLA and can be used as a starting point for the development of educational games and concepts in teaching how to program. Keywords: • IT-based learning • programming • playful approach • best practice • lesson structure • CORRESPONDENCE ADDRESS: Robert Heininger, Technical University of Munich (TUM), Arcisstraße 21, 80333 München, Germany, e-mail: robert.heininger@in.tum.de. Victor Seifert, Technical University of Munich (TUM), Arcisstraße 21, 80333 München, Germany, e-mail: victor.seifert@tum.de. Loina Prifti, Technical University of Munich (TUM), Arcisstraße 21, 80333 München, Germany, e-mail: prifti@in.tum.de. Matthias Utesch, Staatliche Fachober- und Berufsoberschule Technik München, Orleansstraße 44, 81667 München, Germany, e-mail: utesch@in.tum.de. Helmut Krcmar, Technical University of Munich (TUM), Arcisstraße 21, 80333 München, Germany, e-mail: krcmar@in.tum.de. https://doi.org/10.18690/978-961-286-043-1.16 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 216 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Heininger, V. Seifert, L. Prifti, M. Utesch & H. Krcmar: The Playful Learning Approach for Learning How to Program: A Structured Lesson Plan Introduction The term Educational Technology is defined as "the study and ethical practice of facilitating learning and improving performance by creating, using, and managing appropriate technological processes and resources" (Robinson, Molenda, & Rezabek, 2008). E-learning, web-based learning, online learning, and IT-based learning are just a few examples for technological processes and resources based on Information Technology (IT). However, IT is a constantly evolving sector influencing many areas of all our lives. Thus, education is changing since IT allows for many new possibilities; especially in combination with the playful approach to learning. Playful learning, often also called edutainment, is a recent trend in academic education which focuses on the hands-on practice of learning instead of on the sit-and-listen approach, spanning between free play (in which the students play independently), and guided play (where an overseer directs their play)(Lillard, 2013). In the digital economy, there is a huge demand for skilled IT workers, not only in the IT departments but across entire organizations (Capgemini Consulting, 2013; Prifti, Knigge, Kienegger, & Krcmar, 2017). This demand can be satisfied by a broad introduction of students to the digital world and further education in IT skills early on. Additionally, in today’s society, it has become a standard for students to have constant access to the internet and the immediate on-the-spot knowledge provision opportunities that are provided by it. Students use digital means to learn, communicate, access knowledge, and for other professional application (Baggia et al., 2016). A case study involving undergraduate students in Slovenia, stated that 37,5% of the students reported to use the web frequently in more than half of their courses, and 50% even stated that they always use web resources (Kljajić Borštnar, 2012). This trend in students’ behaviour can be observed growing rapidly. In 2002, a case study, involving 2054 students at 27 institutions of higher education across the United Stated, stated that 73% of respondents claimed to use the internet more than the library, while only 9% said they use the library more than the internet for information searching (Jones, 2002). Thus, our nowadays educational systems are facing both, students with highly developed digital skills and the necessity to evolve the digital skills of students in order to support self-regulated personalized learning (cf. Zimmerman, 2002). IT-based learning approaches gain momentum in our digital economy as countless numbers of software projects, for computers as well as for smartphones, are realized with the goal to educate students on different topics. The importance of digital mediums as a form of education is increasing (Blamire, 2010), and many academic researchers, such as McGonigal (2011), Prensky (2005), Gee (2003), Fabricatore (2000), and Pivec and Moretti (2008), put increasing effort into the exploration and validation of teaching techniques using the playful approach as a core concept. Many of these playful approaches use hands-on and self-regulated or personalized learning as a medium to transfer knowledge to students and the usage of the self-regulatory processes has shown strong correlations with high academic achievement (Everson, n.d.) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 217 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Heininger, V. Seifert, L. Prifti, M. Utesch & H. Krcmar: The Playful Learning Approach for Learning How to Program: A Structured Lesson Plan Case studies implementing the playful learning approach (PLA) in all kinds of fields of education are widespread, although the majority of them supplies no scientific results concerning a structure on how to implement such a playful teaching model. Thus, this paper aims to fill this gap and hence to answer the following research question: What would be a best practice for programming lessons by using a playful approach? Fullan (2007) asserted that the moral purpose of education is to equip students with the skills that enable them to be productive citizens when they finish their studies. Thus, in the age of the digital economy improving the digital skills should be one of the topics students ought to learn in school. Trilling and Fadel (2009) called education in information, media, and technology skills vital for the 21st century job market, differentiating between the traditional education subjects and upcoming subjects such as information transformation and coding skills which are much needed in today’s economy. As the structure of a teaching approach is always to some level dependent on the subject and because of the dire state of the computer science education throughout Europe, we focus on the area of computer science, with the special topic of learning how to program, as a framework in which the structure is developed. However, the structure is easily transferrable to other school subjects as the core composition stays the same. Next to the success factors identified for teaching with a playful approach in Heininger, Prifti, Seifert, Utesch, and Krcmar (2017), other factors also need to be taken into account concerning a successful implementation of a study course. Examples are the relevant curriculum (in our case technology and computer science), and specific environment factors of the respective school or university (the weekly hours planned for computer science, the duration of the course, and the chosen programming language). The development of the structure will manipulate certain environmental factors as well as provide opportunities for the students to become motivated, interact in class, and engage with the content of the curriculum on a deeper level than in a “traditional” course in which the lecturer just transfers knowledge by lecturing. The overall goal is to promote continuous passion and motivation to look beyond the box and to become interested in programming. The ideal outcome would manifest in students wanting to code even if there is no extrinsic reason to, such as good grades in school or any other rewards from the outside. The development of the curricular structure and the structure of implementation targets this endeavor. State of the Art Driven by rapidly advancing information technology, many academic researchers have lately delved into the topic of different approaches to education. The benefits and theoretical as well as practical outcomes of playful approaches in education have been 218 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Heininger, V. Seifert, L. Prifti, M. Utesch & H. Krcmar: The Playful Learning Approach for Learning How to Program: A Structured Lesson Plan put to test in many settings, e.g. in undergraduate and postgraduate programs (Connolly, Stansfield, & McLellan, 2006), at high school (Papastergiou, 2009), universities (Colace et al., 2008; Iglesias & Gálvez, 2008; Jantke & Woelfert, 2012), and even at an US Air Force Academy (Fagin, Merkle, & Eggers, 2001). However, scientifically developed and afterwards validated structures for implementation are rare and often not documented. Only Simionescu and Marian (2016) present a proposal for a change of paradigm, based on a playful approach in course structures for efficient student evaluation. In a previous research paper (Heininger et al., 2017) the success factors concerning the playful teaching approach were discussed and evaluated by conducting a literature review of the current state of the art. With this contribution, we aim at answering our research question, by using these success factors as the theoretic part of the basis for our structure. Table 1 shows the five key success factors influencing the outcome of such an endeavor: motivation, integration and involvement in class, the audience-centred focus, giving feedback and enhancing interaction, and the fluent integration of the educational content into the gameplay (Heininger et al., 2017). Table 1: Success factors for teaching with a playful approach, based on Heininger et al. (2017) Success factor Description Motivation The basic reason why people do anything; The variation of individual differences; The attitude, behaviour and study practices Integration and Self-involvement and active participation by students; involvement The shift from the passive recipient to an active integrated partner Adaption to the Specification of the target audience; audience The adaption to the curriculum and environment; The game shall be easy to understand and to play Interaction and Formal as well as informal; feedback The individual response to the student's difficulties; The examination of different ideas and multiple perspectives Integration of Finding an application of the curriculum inside of a educational content gameplay; into gameplay The balance of gameplay and educational content in a game Method Curriculum decision making is generally an iterative and lengthy process, carried out by a broad range of participants and influenced by a wide variety of stakeholders (Van den Akker, 2007). Cho (1998) noted on the same subject that the implementation of curricula is not an event, but a longer change process. Following Biggs and Tang (2007), there are 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 219 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Heininger, V. Seifert, L. Prifti, M. Utesch & H. Krcmar: The Playful Learning Approach for Learning How to Program: A Structured Lesson Plan three levels of learning outcomes at major institutions – at the institutional level, at the degree programme level, and at the course level. As we concentrate on the curriculum of a school, our focus is on the course level learning outcome, while the degree programme level is less distinctive. Furthermore, we limit the computer science curriculum to the subject of learning how to program in order to be able to provide a clear and comprehensive structure. Van den Akker and Voogt (1994) noted that the curriculum should offer materials, which provide concrete and illustrative elaborations of the general program, as well as a framework for broad categories. Biggs and Tang (2007) further remarked the importance and analysed the ‘intended learning outcome’ for the student as it defines the goals of the curriculum. Based on this outcome-based learning concept by Biggs and Tang (2007) we will describe the current state of computer science curricula and point out some major design decisions for our curriculum in this chapter. 3.1 Linking to a School Curriculum Many countries have adjusted their curriculum in the last years, adapting to the changes of the digital economy, which requires new skills (Capgemini Consulting, 2013; Prifti et al., 2017). However, specific curricula are often set at state or city level, not at national level. An example outside of Europe is New York City where a computer science course will be a graduation requirement by 2018 (Taylor & Miller, 2015). In Europe, many countries have begun to adjust their curricula as well, but major changes are still awaited by both, the industry and the academia. Austria for example requires a mandatory course devoted solely to computer science only in grade 9, teaching students about software, hardware, operating systems, and data privacy (Guerra, Kuhnt, & Blöchliger, 2012). Slovenia offers a mandatory computer science course in grade 10 (high school and gymnasium), while offering elective courses in the grades 7-9 and 11-13, teaching students about processing data, computer networks, and programming as well as algorithmic thinking and problem solving (Guerra et al., 2012). However, in 2016, Mori and Lokar (2016) criticized the outdated Slovenian computer science curriculum, dating back to 1998 with minor updates in 2008 as well as the short duration of the mandatory course of only one year. In Germany, the education system is mainly the responsibility of the federal states. In 2012 only two out of sixteen German federal states had mandatory computer science courses – Free State of Saxony in grades 7 and 8; and Free State of Bavaria in the grades 6 to 12, including topics such as introduction to software and hardware, terminology, basic concepts of information technology, computer networks, algorithms, and data modelling (Guerra et al., 2012). However, the curricula for the different types of schools in Germany, respective in each individual state, are often vastly different and some of them do not teach about computer science at all (Deutscher Bildungsserver, 2017). In 2015 a survey with 1002 German parents stated that the majority (56%) considered the children’s preparation by the schools for the digital job market ‘bad’, 5% even considered it ‘very bad’, while only 32% considered it ‘good’ and 3% considered it ‘very good’ (Netzwerk Digitale Bildung, 2015). Overall, the changes in 220 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Heininger, V. Seifert, L. Prifti, M. Utesch & H. Krcmar: The Playful Learning Approach for Learning How to Program: A Structured Lesson Plan the education systems of European countries seem to be far behind the demands of the digital industry. It is hence our goal to develop a structure that gives incentive for students to learn about computer science (in our specific case: how to program) and changes the approach from the traditional path to a playful one. The structure, developed in this contribution, is based on the Bavarian curriculum for vocational schools in introductory computer science courses, which divides the topic of learning how to program into three parts: basics of modern programming languages, programming techniques and data structures, and object-oriented-programming. The basics of modern programming languages include the types of data, arithmetic and logical operators, and output of data. School students learn about basic programming structures such as sequences, single-branching, and multi-branching. Furthermore, this includes how identifiers are structured, type conversion, and how statements are coded by differentiating between logical lines. Advanced programming techniques and data structures are supposed to give the students the ability to create software that is more advanced. " Students create programming-oriented diagrams and use repetition commands and subroutines. They know the necessity of further programming techniques and structures to solve complex problems using varying data structures. Thereby they recognize how to write more effective and clearly arranged software. " (Bayerisches Staatsministerium für Unterricht und Kultus, 2006) The emphasis lies on students learning to independently break a problem down into smaller parts and create advanced pieces of software. The modulation of problems is explained with the use of procedures, functions, giving parameters, and multiple usage of blocks of code. Knowledge about array data structures as well as objects of pre-defined classes are part of the curriculum as well. The overall goal is to teach students about complex structures like loops and functions to give them the ability to differentiate between the use of procedural structures and functions. Object oriented programming is the last part of the computer science curriculum of the vocational schools in Bavaria. “Students ought to gain insight to how coding and handling objects work. Their ability to generate a solution creating functions based on problem is in focus.” (Bayerisches Staatsministerium für Unterricht und Kultus, 2006) The curriculum for object-oriented programming contains knowledge about classes and objects, their attributes and methods, as well as class instantiation. The focus lies on the 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 221 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Heininger, V. Seifert, L. Prifti, M. Utesch & H. Krcmar: The Playful Learning Approach for Learning How to Program: A Structured Lesson Plan definition of classes and calling functions and attributes of the instances, as well as handling the transfer of parameters. This includes calling functionality in other functions as well as setting optional return values. The goal is to teach students about well and systematically designed structures of classes and functionality to ensure their ability to solve complex problems and give them the tools to code on their own in the future. At this point of our contribution, we deem it important to note that the curriculum of vocational schools in Bavaria will be changed in the near future – computer science will soon not be a mandatory subject anymore at all, but rather a voluntary subject in grade 12 and 13 (Staatsinstitut für Schulqualität und Bildungsforschung München, 2017). The content of the voluntary subject will also consist of multiple optional topics from which only a few can be taught as the course will probably not have the required length in order to cover all of them thoroughly. 3.2 Choosing the Programming Language Python The focus of an introduction to programming in secondary schools lies on giving insights into writing software and understanding the basics of programming. The usage of languages developed for children (e.g. Scratch or Snap!), which are based on graphical drag-and-drop handling, seems to be missing the point in this endeavor. Choosing a programming language for beginners, means not only considering technical aspects, for instance run time efficiency, memory consumption, and reliability (Prechelt, 2000), but must be evaluated even more concerning the difficulty of learning the language without prior coding experience. Furthermore, there is the possibility of teaching an industry relevant language like Java, Python, and C++, or a language specifically designed to introduce programming to beginners. In a case study Ivanović, Budimac, Radovanović, and Savić (2015) note that the choice of programming language does indeed not affect the success of students in the course. They also note that "the main goal of the introductory programming course is to teach students essential programming concepts in order to develop their ability to think and solve problems by algorithms, and to acquire new/other programming languages and techniques efficiently" (Ivanović et al., 2015). This allows students to change to other, differently structured programming languages later on, if desired. The language should have a simple syntax, provide easy I/O handling as well as output formatting, use meaningful keywords, and give immediate feedback (Grandell, Peltomäki, Back, & Salakoski, 2006). Python offers many advantages concerning grammar and writing of code: Time wasting matters of style are avoided and indentation not only structures the code grammatically but also visually helps beginners to easily understand which block of code belongs to which functionality. Another advantage of Python is its compactness and that unfamiliar code in Python is usually easy to read. Choosing Python as a programming language affects the curriculum concerning the time, which must be allocated for specific concepts within the language. As an example, 222 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Heininger, V. Seifert, L. Prifti, M. Utesch & H. Krcmar: The Playful Learning Approach for Learning How to Program: A Structured Lesson Plan compared to other languages, writing and structuring Python code happens mainly based on indents, which needs less time to explain to the students than the introduction of keywords like ‘static’ or ‘void’ would take in Java. Python is a language that most people consider easy to learn though it still finds use in ‘big’ software companies like Google: “Python where we can, C++ where we must” (Holderness, 2016) and in games like EVE Online, Battlefield, Mount&Blade, or Civilization IV (Boddie, 2013). Thus, we consider Python as an industry-relevant language. Unlike other languages proposed for teaching to novices, Python is not just a teaching language, it is a language that is suitable for developing real-world applications (Radenski, 2006). An important goal of the Python developers is making Python fun to use, as also can be noticed by the origin of its name, while focusing on code readability, extensibility, and clear error message handling (The Python Software Foundation, 2017). Focusing on gaining insight into what it is really like to code and at the same time considering the shallow learning curve of Python, leaves us at the conclusion that Python is a good start for beginners without prior coding experience. Results In order to clarify the developed structure we divide the topic into its three major components in this chapter. First, we will present the organization of the lectures, which consist of four parts: plan, do, check, and act. Secondly, we will draw up a timeline of the progress of the lessons, tackling the curriculum apportionment and the general concept of introducing students to new knowledge. In the last part of this chapter, we will introduce the educational content, the means of the playful approach, and the main design principles for an educational game. 4.1 Organization of the Lectures The lecture optimally is held by an experienced teacher with previous experience in the playful teaching approach, as well as extensive knowledge in computer science and coding. Computers with the pre-installed software are provided by the school, but the students should still be encouraged to bring their own laptops in order to be able to take notes, and to code in their own environment, as they would back home on their own. Every school student should play and code independently. In the first five minutes of each unit, the teacher repeats the knowledge learned in the last unit, combined with an outlook to what students are required to learn in the current unit, and how it is connected to previous knowledge. As the students will have progressed at different speeds and hence be at different levels of knowledge, the repetition is based on their remarks and input. The underlying idea is to not set a common learning goal for the students for each unit, but to clear up eventual difficulties with previous contents. The students themselves set interim learning goals (Plan). 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 223 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Heininger, V. Seifert, L. Prifti, M. Utesch & H. Krcmar: The Playful Learning Approach for Learning How to Program: A Structured Lesson Plan During the course of each unit the teacher helps and coaches the students if needed. The teacher does not need to approach students but let them work independently in order to give them the freedom to solve problems on their own. The aim behind this endeavor is fostering their motivation, self-value, and to increase their confidence in their own skills. A solution for a problem should not merely be offered by the teacher, but be worked towards together (Do). The last five minutes of the units are for a short repetition of the current content in order to gather more information on the difficulties the students experienced and how they felt about the learning process while playing the game. The students should use the time for self-reflection (Check). The teacher provides handouts for each stage of the game to give the students something tangible to study and base their learning effort on before the exam. In order to keep track of the school student's progress, homework will be assigned to the students. To ensure quality, one of the underlying concepts of this approach is the Plan- Do-Check-Act Cycle (PDCA)1 of W. Deming (Deming, 1986) as illustrated in Figure 1, showing the general lesson structure. short repetition of Do current unit C n h a e l Unit 6 c P k short repetition of short repetition of t c A Do current unit last unit & outlook C n h a e l Unit 2-5 c P k short repetition of short repetition of Do Act current unit last unit & outlook C n h a e l Unit 1 c P k t c A outlook Figure 1: General lesson structure (own illustration) The students will receive instant feedback on their code by the game. The teacher should help if difficulties come up and the students cannot solve a problem based on the feedback of the game or do not understand the error messages. By observing the students play, the teacher will also be able to identify complications in the game-play or during the execution of coding tasks (Act). 224 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Heininger, V. Seifert, L. Prifti, M. Utesch & H. Krcmar: The Playful Learning Approach for Learning How to Program: A Structured Lesson Plan 4.2 Lesson Structure The length of each lesson is 45 minutes as it is custom in the German school system. The time planned for computer science, and more specifically to teach how to program, are six lessons, spread over the course of six weeks. In the Bavarian technical upper vocational schools, the course is mandatory for the students, most of which have no prior experience in coding. In this chapter, we explain the specific content of each lesson. Whenever possible, concepts should be introduced completely and at once, as an exception some concepts are initially introduced in a limited fashion and then revisited in a later topic for full coverage (Radenski, 2006). The lesson structure introduces the students to different concepts and knowledge about coding with a gradually advancing learning curve. The content is structured to build on previous knowledge learned in earlier units and allows for a start without any prior coding experience. The lesson structure is adapted to the curriculum set by the Bavarian Education Ministry and the pre-defined situational and environmental circumstances in the school. The course is divided into six individual units, which are presented in the following and summarized in Table 2. 1st Unit Students are introduced to coding and its use in our daily lives. The educational game will be implemented and its controls will be explained. Beginning with small pieces of code the school student gains knowledge on how to handle the IDLE Python GUI editor to be able to solve tasks and experiment at home on his own. Basic knowledge about assignment of values to variables, mathematical operators, and output, as well as basic data types including integers, floats, and strings. 2nd Unit The students learn about boolean values and conditional structures to give software the ability to react on different types of input. The students learn basic commands to handle arrays and to calculate with boolean operators. The goal is to deepen the knowledge about dealing with different types of output and data while introducing branching structures. Manipulation of arrays and decision structures based on boolean variables, or by analyzing the input, complete this chapter. 3rd Unit The third lesson will give a deeper understanding and further foster the ability to handle more complex data structures. More commands in order to handle arrays are given, such as sorting, reversing, inserting, indexing, and popping elements in arrays. This will be combined with handling the “for”-loop functionality. Iterating over arrays and building decision structures to connect the new knowledge to the 2nd Unit are at the core of this 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 225 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Heininger, V. Seifert, L. Prifti, M. Utesch & H. Krcmar: The Playful Learning Approach for Learning How to Program: A Structured Lesson Plan unit. Students learn how to break down a problem into smaller parts and separate problems in order to be able to find solutions for a bigger task. Table 2: The six units of the lesson structure Unit Content Goal 1 Introduction to coding in the IDLE Ability to handle the coding tools, Python GUI and to the educational first introduction to basic coding and game, output, operators and types of the educational game variables such as string, integer and float 2 Introduction to boolean values and Ability to deal with different types of arrays, conditional structures output/input and connecting basic knowledge of mathematics to programming structures 3 Complex data structures, for loop and Advancing complex code structures, array handling iterating and building extensive decision structures 4 Repetitive use of code by learning Object oriented programming, about methods and classes describing virtual objects by setting attributes and implementing functionality 5 Use of classes, instances, parameter Systematic design of software, transfer, return values in functions readability and transparency of the code 6 Repetition by connecting previously Discover and close gaps in learned knowledge with complex knowledge, deepen the tasks comprehension of the content 4th Unit In this unit, the students learn about repetitive use of code using methods and classes. Methods are introduced in a functional coding style and afterwards connected to classes. Classes will be used as a way to describe objects in a compact way and give functionality to them in order to change their attributes based on input and parameters as well as handling the interaction between classes. Examples of their use will be given and students are expected to add functionality and attributes to an existing class before creating a class on their own. 5th Unit This unit focuses on knowledge about classes while introducing new features involving multiple instances and parameter transfer as well as optional return values. Furthermore, the while-operator in connection with boolean operators and values will be introduced. 226 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Heininger, V. Seifert, L. Prifti, M. Utesch & H. Krcmar: The Playful Learning Approach for Learning How to Program: A Structured Lesson Plan The emphasis of this unit lies on good systematic design of software to ensure readability and transparency of the code. 6th Unit The last unit holds no more additional new knowledge but means to give students the tools to code on their own in the future. It combines previous knowledge of the first six units. The students are given complex tasks in order to recognize potential in coding. The goal of the unit is to discover knowledge gaps in order to help students repeat or deepen specific units in order to achieve full understanding of given code. 4.3 Game, Features, and Educational Content An educational video game is being developed with the single goal of connecting the curriculum (of how to program) with a game that is interesting and fun to play; and simultaneously puts learning into perspective and gives incentive to learn more. The students will be able to see that their own learning environment was created by using the same knowledge they will have at the end of the course. Furthermore, by creating an educational game for learning how to code in a gameplay setting, which resembles widely used and popular interactive development environments (IDE), could incite the motivation, self-esteem, and knowledge in students to carry on coding on their own. Necessary features in an educational game can easily be derived by approaches to satisfy the success factors for the PLA (Heininger et al., 2017): motivation, integration and involvement in class, the audience-centred focus, giving feedback and enhancing interaction, and the fluent integration of the educational content into the gameplay. Main design principles for an educational game can also be derived from the iterative processes of conducting case studies by other authors and evolving and improving an educational game: interaction and iteration of those interactions, adaptive and personalized feedback, clear winning criterion, and no or few opportunities to cheat the game (Tillmann, De Halleux, Xie, Gulwani, & Bishop, 2013). Those criteria have been confirmed by another often cited study of educational games proposing practical steps for designing educational games (Linehan, Kirman, Lawson, & Chan, 2011). A good game is easy to learn but hard to master (Prensky, 2002) meaning the handling of the basic game is easy, but to be good at it becomes more and more difficult the further you advance. The playful approach motivates the students to become more interested in their own education and willingly sacrifice time for it. The game achieves this by students having to work for their knowledge by beating the game, defeating numerous enemies and mastering obstacles. A basic rule of good game-play is to provide the player always with clear short-term goals (Prensky, 2002). In an educational game, this may mean partly beating enemies, collecting coins and jumping over obstacles, but also means solving coding tasks to advance in the gameplay. Beating enemies and collecting coins may obviously not have 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 227 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Heininger, V. Seifert, L. Prifti, M. Utesch & H. Krcmar: The Playful Learning Approach for Learning How to Program: A Structured Lesson Plan a direct impact on the students learning success, but very well can create the joy and motivation to keep on playing, and thus to keep on learning. Examples of collectibles for the sake of their own can be found in numerous games: coins in the Mario series, spraying graffiti in GTA San Andreas, or visiting viewpoints in the Assassins Creed series. Players often do not try to find all collectibles for the purpose of getting a reward but for the sheer pleasure of the treasure hunt. After all, games are supposed to be fun and not purely work. Conclusion Based on former research, concerning the success factors for teaching with a PLA (Heininger et al., 2017) we were able to develop a lesson structure which shows the structures used for a playful approach to teaching. The content is based on the curriculum for technology classes of the Bavarian technical upper vocational schools, as well as Bavarian school norms. However, it can be transferred to other types of schools and curricula as well by customizing the proposed structure to fit different circumstances, such as timeframe of a lesson, length of course, programming language, and previous skill level of students. The lesson plan can be especially useful to be implemented in different German vocational schools, but also in other cultures as the structure’s core is based on outcome-based learning, which was analysed and evaluated by Biggs and Tang (2007) and is used worldwide as a framework for good teaching and assessment. The curriculum was adapted to Python and its specific language constructs. The development of an educational game as an exemplary playful learning approach would be based on the structure created and paired with the educational content of the curriculum. The educational game as an electronic learning platform brings together practice (learning how to program), teachers (as a supporting entity, rather than lecturer), scholars (providing the theoretic foundation and practical knowledge based on previous case studies), and students (as active participants in their own education) in one environment. We chose python as the favourable programming language based on its compactness and intuitiveness, which makes it easy to learn and to use for beginners. Whenever possible, concepts are introduced completely and at once, as an exception some concepts are introduced in a limited fashion and later revisited for full coverage (Radenski, 2006). A professional teacher, who is experienced in the topic of computer science, optimally accompanies the lecture. Five minutes in the beginning as well as at the end of each lesson are used to repeat the knowledge of the last lesson, respectively to recap the knowledge learned in the current lesson. The use of an educational game as shown in this paper and the implementation of a playful teaching approach in a case study at a Bavarian upper vocational school will be part of the research in the future in order to validate the lesson structure. 228 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Heininger, V. Seifert, L. Prifti, M. Utesch & H. Krcmar: The Playful Learning Approach for Learning How to Program: A Structured Lesson Plan Acknowledgement The authors would like to thank the anonymous reviewers for their very helpful suggestions and comments. Additionally, the authors would like to express special thanks to the upper vocational schools at Bavaria, Germany represented by Günter Liebl, Werner Maul, Konrad Maurer, and Thomas Ondak. Notes 1 Originally introduced as Plan – Do – Study – Act (PDSA) References Baggia, A., Žnidaršič, A., Borštnar, M. K., Pucihar, A., Šorgo, A., Bartol, T., . . . Dolničar, D. (2016). Factors influencing the Information Literacy of Students: Preliminary Analysis. Paper presented at the 29th Bled eConference – Digital Economy, Bled, Slovenia. Bayerisches Staatsministerium für Unterricht und Kultus. (2006). Lehrpläne für die Fachoberschule und Berufsoberschule; Unterrichtsfach: Technologie/Informatik Retrieved from https://www.isb.bayern.de/download/9223/lp_fos_bos_technologie.pdf Biggs, J., & Tang, C. (2007). Teaching for quality learning at university (Society for research into higher education Ed. 3 ed.): Open University Press. Blamire, R. (2010). Digital Games for Learning: Conclusions and recommendations from the IMAGINE project. European Schoolnet. Boddie, P. (2013). Python Games. Retrieved from https://wiki.python.org/moin/PythonGames Capgemini Consulting. (2013). The Digital Talent Gap Retrieved from Digital Transformation Research Institute - Capgemini https://www.capgemini.com/resource-file- access/resource/pdf/the_digital_talent_gap27-09_0.pdf Cho, J. (1998). Rethinking Curriculum Implementation: Paradigms, Models, and Teachers' Work. Paper presented at the Annual Meeting of the American Educational Research Association, San Diego, CA, USA. Colace, Francesco, Santo, D., Massimo, Gagliardi, & Nicoletta. (2008). Multimedia Learning in Advanced Computer based Contexts: ‘Discovering Trier’. Paper presented at the 3rd International Conference on Information and Communication Technologies: From Theory to Applications, Damascus, Syria. Connolly, T., Stansfield, M., & McLellan, E. (2006). Using an online games-based learning approach to teach database design concepts. The Electronic Journal of e-Learning, 4(1), 103- 110. Deming, W. E. (1986). Out of the Crisis. Cambridge, MA: MIT Press. Deutscher Bildungsserver. (2017). Bildungspläne / Lehrpläne der Bundesländer für allgemeinbildende Schulen. Retrieved from http://www.bildungsserver.de/Bildungsplaene- Lehrplaene-der-Bundeslaender-fuer-allgemeinbildende-Schulen-400.html Everson, H. (n.d.). Barry Zimmerman. Retrieved from http://learningandtheadolescentmind.org/people_04.html Fabricatore, C. (2000). Learning and videogames: An unexploited synergy. Paper presented at the Annual Convention of the Association for Educational Communications and Technology (AECT), Long Beach, CA, USA. Fagin, B. S., Merkle, L. D., & Eggers, T. W. (2001). Teaching computer science with robotics using Ada/Mindstorms 2.0. Paper presented at the Annual ACM SIGAda International Conference on Ada, Bloomington, Minnesota. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 229 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Heininger, V. Seifert, L. Prifti, M. Utesch & H. Krcmar: The Playful Learning Approach for Learning How to Program: A Structured Lesson Plan Fullan, M. (2007). The new meaning of educational change (4 ed.). New York, NY: Teachers College Press. Gee, J. P. (2003). What video games have to teach us about learning and literacy. Computers in Entertainment (CIE), 1(1), 20-20. Grandell, L., Peltomäki, M., Back, R.-J., & Salakoski, T. (2006). Why complicate things? Introducing programming in high school using Python. Paper presented at the 8th Australasian Conference on Computing Education, Hobart, Australia. Guerra, V., Kuhnt, B., & Blöchliger, I. (2012). Informatics at school - Worldwide. Retrieved from https://fit-in-it.ch/sites/default/files/small_box/Study%20Informatics%20at%20school%20- %20Worldwide.pdf Heininger, R., Prifti, L., Seifert, V., Utesch, M., & Krcmar, H. (2017). Teaching How to Program With a Playful Approach: A Review of Success Factors. Paper presented at the IEEE Global Engineering Education Conference (EDUCON2017), Athens, Greece. Holderness, S. (2016, 27.01.2016). Python at Google. Why Python? Retrieved from https://www.codeschool.com/blog/2016/01/27/why-python/ Iglesias, A., & Gálvez, A. (2008). Effective BD-Binding Edutainment Approach for Powering Students' Engagement at University through Videogames and VR Technology. Paper presented at the Third International Conference on Convergence and Hybrid Information Technology (ICCIT'08), Washington, DC, USA. Ivanović, M., Budimac, Z., Radovanović, M., & Savić, M. (2015). Does the choice of the first programming language influence students' grades? Paper presented at the 16th International Conference on Computer Systems and Technologies, Dublin, Ireland. Jantke, K. P., & Woelfert, C. (2012). A Trojan research tool invading private homes: Concepts and implementations of playful learning. Paper presented at the 1st Global Conference on Consumer Electronics (GCCE), Tokyo, Japan. Jones, S. (2002). The Internet Goes to College: How Students Are Living in the Future with Today's Technology. Retrieved from https://eric.ed.gov/?id=ED472669 Kljajić Borštnar, M. (2012). Towards understanding collaborative learning in the social media environment. Organizacija, 45(3), 100-107. Lillard, A. S. (2013). Playful learning and Montessori education. American journal of play, 5(2), 157. Linehan, C., Kirman, B., Lawson, S., & Chan, G. (2011). Practical, appropriate, empirically- validated guidelines for designing educational games. Paper presented at the SIGCHI Conference on Human Factors in Computing Systems (CHI'11), New York, NY, USA. McGonigal, J. (2011). Reality is broken: Why games make us better and how they can change the world. New York: The Penguin Press. Mori, N., & Lokar, M. (Producer). (2016, 02.02.2017). A New Interactive Computer Science Textbook in Slovenia. [Presentation] Retrieved from http://issep2016.ens- cachan.fr/talks/ISSEP2016_Mori_Lokar_presentation.pdf Netzwerk Digitale Bildung. (2015, 1st December 2015). Umfrage: Eltern erwarten, dass Schulen in Deutschland Digitale Bildung vorantreiben. Retrieved from http://www.netzwerk-digitale- bildung.de/presse/umfrage-eltern-erwarten-dass-schulen-in-deutschland-digitale-bildung- vorantreiben/ Papastergiou, M. (2009). Digital game-based learning in high school computer science education: Impact on educational effectiveness and student motivation. Computers & Education, 52(1), 1- 12. Pivec, M., & Moretti, M. (2008). Game Based Learning: Discover the Pleasure of Learning. Lengerich:: Pabst:Science: Publishers. 230 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Heininger, V. Seifert, L. Prifti, M. Utesch & H. Krcmar: The Playful Learning Approach for Learning How to Program: A Structured Lesson Plan Prechelt, L. (2000). An empirical comparison of C, C++, Java, Perl, Python, Rexx and Tcl. IEEE Computer, 33(10), 23-29. Prensky, M. (2002). The Motivation of Gameplay or, the REAL 21st century learning revolution. On The Horizon, 10(1). Prensky, M. (2005). Engage Me or Enrage Me: What Today's Learners Demand. Educause review, 40(5), 60. Prifti, L., Knigge, M., Kienegger, H., & Krcmar, H. (2017). A Competency Model for "Industrie 4.0" Employees. Paper presented at the 13. Internationalen Tagung Wirtschaftsinformatik (WI 2017), St. Gallen. Radenski, A. (2006). Python First: A lab-based digital introduction to computer science. Paper presented at the Eleventh Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE 06, Bologna, Italy. Robinson, R., Molenda, M., & Rezabek, L. (2008). Facilitating Learning. In A. Januszewski & M. Moleda (Eds.), Educational Technology: A Definition with Commentary. New York: Lawrence Erlbaum Associates. Simionescu, S., & Marian, M. (2016). A playful approach in course structuring for an effective student evaluation. Paper presented at the 20th International Conference on System Theory, Control and Computing (ICSTCC), Sinaia, Romania. Staatsinstitut für Schulqualität und Bildungsforschung München. (2017). LehrplanPLUS. Retrieved from http://www.lehrplanplus.bayern.de/fachlehrplan/fos/13/informatik/wahl-s- abu-g-w Taylor, K., & Miller, C. C. (Producer). (2015, 20.1.2016). De Blasio to Announce 10-Year Deadline to Offer Computer Science to All Students. The New York Times. Retrieved from http://www.nytimes.com/2015/09/16/nyregion/de-blasio-to-announce-10-year-deadline-to- offer-computer-science-to-all-students.html?_r=0 The Python Software Foundation. (2017, Feb 14, 2017). Python 3.6.0 Documentation. Retrieved from https://docs.python.org/3/ Tillmann, N., De Halleux, J., Xie, T., Gulwani, S., & Bishop, J. (2013). Teaching and learning programming and software engineering via interactive gaming. Paper presented at the 35th International Conference on Software Engineering (ICSE), San Francisco, CA, USA. Trilling, B., & Fadel, C. (2009). 21st century skills: Learning for life in our times. San Francisco, CA: John Wiley & Sons. Van den Akker, J. (2007). Curriculum design research. Paper presented at the An introduction to educational design research, Shanghai (PR China). Van den Akker, J., & Voogt, J. (1994). The use of innovation and practice profiles in the evaluation of curriculum implementation. Studies in Educational Evaluation, 20(4), 503-512. Zimmerman, B. J. (2002). Becoming a self-regulated learner: An overview. Theory into practice, 41(2), 64-70. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Emerging Smart Technologies and the European Standardisation System 17 KAI JAKOBS Abstract The standardisation of smart applications and the underlying smart communication infrastructure represent new challenges for European standardisation. This paper identifies and discusses a number of policy issues that the European Standardisation System (ESS) faces or is likely to face in the not-too-distant future. A number of potential steps that the ESS could take to help resolve these issues are sketched. Keywords: • Smart Applications • Smart infrastructure • European Standardisation • CORRESPONDENCE ADDRESS: Kai Jakobs, RWTH Aachen University, Templergraben 55, 52062 Aachen, Germany, e-mail: kai.jakobs@cs.rwth-aachen.de. https://doi.org/10.18690/978-961-286-043-1.17 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 232 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Jakobs: Emerging Smart Technologies and the European Standardisation System A Very Brief Introduction “Standards are not only technical questions. They determine the technology that will implement the Information Society, and consequently the way in which industry, users, consumers and administrations will benefit from it” [EC, 1996; p. 1]. This quote conveys two important insights that are overlooked all too often: • ICT systems simply would not work without underlying standards. • Today’s (ICT) standards are tomorrow’s technology – those that develop (ICT) standards today at the same time shape much of the (ICT) environment we all will use in the future. This holds for ICT standards in general and for standards for ‘smart’ technologies in particular. Basically, the ‘smartness’ emerges from the incorporation of ICT-enabled capabilities into ‘traditional’ applications; ‘Smart Manufacturing’ and ‘Intelligent Transport Systems’ (ITSs) are cases in point. In general, such smart technologies result from the merger of different technologies. The former integrates, among others, production engineering, robotics, control engineering and ICT; the latter transport telematics, traffic engineering and ICT. These applications will deploy a ‘smart’ infrastructure, comprising Cyber-Physical Systems (CPSs) and deploying the Internet of Things (IoT) for communication. These merging technologies represent a considerable problem for standardisation. They will require co-operation between standardisation entities with very different cultures, from equally different backgrounds and used to very different technology life cycles. While this is a general problem, this paper aims to contribute to an answer to the question how well the ESS is likely to fare in this increasingly important and complex environment. Is it future-proof? And if it isn’t – what needs to be done to change that? The remainder of the paper is organised as follows. In sect. 2, a SWOT analysis is used to discuss the ESS. The resulting policy issues are addressed in sect. 3. Finally, sect. 4 presents a rudimentary roadmap and outlines some future steps that the ESS might consider taking to overcome these issues. The European Standardisation System – A SWOT Analysis The SWOT analysis of the ESS aimed at the identification and analysis of the major standardisation-related issues in general and in the field of smart infrastructure and applications in particular. Tables 1 and 2 show the outcome. 30TH BLED ECONFERENCE: DIGITAL TRANSORMATION – FROM CONNECTING THINGS TO 233 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Jakobs: Emerging Smart Technologies and the European Standardisation System Table 1: SWOT analysis of the European standardisation system (general) Strengths Weaknesses  A contradiction-free standards  (Financially) dependent on policy system. makers.  Well-established, consistent system  So far, process not 100% suitable for with close links to European policy fast-moving technologies (CEN, makers. CENELEC).  Close and long-standing co-  Overly European focus (CEN, operation with international CENELEC). counterparts and major NSOs (CEN,  Sub-optimal type of representation CENELEC). (through national delegations; CEN,  Well respected internationally CENELEC). (ETSI).  Very much a ‘rubber-stamping’ (of  Pioneers in innovative approaches IEC standards) entity (CENELEC). towards standardisation (ETSI).  Limited links between research and innovation (R&I) and standardisation.  Low emphasis on standards education. Opportunities Threats  Contradiction-free standards will  Financial dependency on policy help sustain the single market. makers may lead to even stronger  Good links to international bodies European focus and thus reduced can strengthen the EU position in international importance (CEN, the global arena. CENELEC).  High reputation attracts both  The newly imposed focus on speed European and international know- may be counter-productive when it how, contributions and members comes to high-quality standards for (ETSI). long-lasting infrastructures.  Higher democratic legitimacy may  Inadequate links between R&I and increase relevance associated with standards setting hinders European standards (CEN, exploitation of state-of-the-art CENELEC). technical knowledge, may render European standards inadequate and may delay ESOs from addressing crucial future topics.  Mostly ‘rubber-stamping’ of IEC standards will reduce European visibility and influence in this body.  Increased market fragmentation through inadequate incorporation of consortium standards into the ESS. 234 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Jakobs: Emerging Smart Technologies and the European Standardisation System Table 2: SWOT analysis of the European standardisation system (for smart applications and infrastructure) Strengths Weaknesses  Well positioned in the  Very limited activities on smart telecommunication sector (ETSI). applications at European level (all  Long-standing activities in ITS ESOs), infrastructure (CEN, (CEN). CENELEC) and CPSs (all ESOs).  Several NSOs are very active on  Hardly any formal entities smart applications (e.g. the German (Technical Committees (TCs), DIN on Smart Manufacturing and Working Groups (WGs)) in place to the British BSI on Smart Cities). address ‘smart’ aspects (CEN,  Adequate expertise is available on CENELEC). smart infrastructure/applications  No visible approach towards multi- (between ESOs and NSOs). disciplinary standardisation (all  Inclusive approach. ESOs).  Implementation aspects are not considered (mostly CEN, CENELEC).  Hardly any formal links to non- European entities (except ISO/IEC) for all smart applications and the IoT (CEN, CENELEC). Opportunities Threats  The combined expertise of NSOs  Lack of adequate level of activity on and ESOs should be sufficient to smart applications/infrastructure assume a leadership position in may lead to marginalisation in these some smart applications. crucial domains (CEN, CENELEC).  The accommodating attitude  The widely held belief that ICT towards SMEs and ‘non-traditional’ standards in general and IoT-related stakeholders (e.g. NGOs) should be ones in particular should be global an asset in the field of smart may render regional bodies less applications. relevant (CEN, CENELEC).  Lack of links to international Standards Setting Organisations (SSOs; specifically to consortia) may also contribute to future marginalisation in the field (CEN, CENELEC).  Retained mono-disciplinary approach may contribute to reduced interoperability, e.g. between infrastructure and applications.  Failure to consider implementation issues may nullify any potential first mover advantages. 30TH BLED ECONFERENCE: DIGITAL TRANSORMATION – FROM CONNECTING THINGS TO 235 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Jakobs: Emerging Smart Technologies and the European Standardisation System The tables show that both strengths and weaknesses of the ESS result from it being a well-established, long-standing system. On the one hand, good relations with policy makers and their international counterparts together with time-honoured (and bureaucratic) processes have made CEN and CENELEC major players in many fields and entities to be reckoned with. In addition, a contradiction-free set of standards is a major asset. Yet, such systems tend to become self-complacent. For example, until very recently the ESS largely ignored the importance of private standards consortia in the ICT sector. A fairly recent European Regulation [EU, 2012] certainly points in the right direction on this and several other aspects, but it still remains to be seen how things will develop in practice. Specifically, it is still unclear how (and if) the call for both greater speed and more inclusiveness can be answered in practice. That said, greater speed is not a desirable feature per-se. In particular, supposedly long-lived technologies like e.g. communication infrastructures may well benefit from a longer, more thorough and less error-prone process that involves all stakeholders. Inclusiveness would be of special importance for smart applications, where many stakeholders will be involved that are typically absent form ‘normal’ ICT standardisation (e.g. city authorities or NGOs). Moreover, it remains an open issue how the contradiction-free system is to be maintained in the face of the likely wealth of consortium standards eventually used and referenced. From the SWOT analysis it also would seem that there is a real risk of international marginalisation of at least CEN and CENELEC in the fields of smart infrastructure and, particularly, applications. This is primarily due to: • Overly strong European focus If this focus leads to inadequate international links the situation will become worrisome. This will hold especially if it occurs in a field where global standards (possibly with regional adaptations) are a sine-qua-non. • Limited activities on smart applications Limitations materialise in two ways. Most notably, CENELEC focuses the majority of its activities on transposing IEC standards into European ones . Secondly, with the exception of ITS, the ‘smart’ aspects of applications have largely been ignored so far; foci, if any, are on the underlying communication side. The latter is all the more surprising as one of the ESS’ strengths is its close link to policy making. This could be exploited through new European standards setting activities that focus on the upper layers of smart applications. Here, the associated governance aspects imply the needs for such close links between standardisation, government and policy making. Unfortunately, some of the perhaps less obvious issues that may nevertheless have potentially considerable long-term ramifications do not get the attention they deserve. 236 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Jakobs: Emerging Smart Technologies and the European Standardisation System These include primarily the link between R&I and standards setting and the education about standardisation. A weak link to research may imply that important findings never make it into the standardisation process and that, accordingly, standards will be developed that do not take into account the state-of-the-art. As a result, such standards will either not be taken up by the market or be very soon superseded by others. Inadequate (or rather, virtually non-existing) education about standardisation may, in the medium to long term, lead to (at least initially) poorly equipped European standardisers in the international arena. Policy Issues This section looks at some of the issues the ESS faces or is likely to face in the near future. This includes some general ones as well as a number of aspects that relate specifically to the standardisation of smart infrastructures and applications. 3.1 General European Standardisation Issues European standardisation still needs to deal with a number of issues that were identified already many years ago and have been discussed ever since, but in several cases without a satisfactory outcome. These include the need for speed in standards. But speed is not a value in itself. If it supports the timely production of a standard, speed will be beneficial. Otherwise, it may stand in the way of quality and completeness. Accordingly, the popular unqualified focus on speed needs to be questioned. In addition, achieving both ‘speed’ and ‘inclusiveness’ is next to impossible – the larger the number of interested parties around the table, the longer it will take to reach consensus. A case-by-case balance needs to be struck – ‘speed’ must not be the overriding issue when it comes to e.g. standards for security and privacy in smart applications and ‘inclusiveness’ must not be the show- stopper for standardisation of e.g. interfaces to peripheral devices. That is, the necessary and desirable levels of inclusiveness and speed vary between standards (see also e.g. [Sherif, 2003]. The link between R&I and standardisation is another long-standing issue, which also links to education about standardisation. The European Commission’s recent ‘Joint Initiative on Standardisation’ [EC, 2016a] is but the latest attempt to overcome the barriers that still exist between standardisation, innovation and education and the respective communities. Its eventual outcome remains to be seen. In any case, without a closer integration of these domains neither policy makers nor industry will be able to reap the full benefits standards and standardisation offer. Close links between policy making and standardisation exist in the EU. This is a bit of a double-edged sword, though. On the one hand, some standards are not so voluntary anymore (especially in the field of public procurement). “If the producer does not manufacture in conformity with these [harmonised European] standards, he has an obligation to prove that his products conform to the essential requirements” [CEU, 1985]. 30TH BLED ECONFERENCE: DIGITAL TRANSORMATION – FROM CONNECTING THINGS TO 237 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Jakobs: Emerging Smart Technologies and the European Standardisation System On the other hand, these links may well be beneficial when it comes to the standardisation of smart applications where regulatory aspects may well play a role. 3.2 European Smart Application/Infrastructure Standardisation From a standardisation perspective, the development over time in both the application areas and the infrastructural technologies show considerable similarities. In all cases, the complexity of the respective web of SSOs has increased dramatically over the past 20 years, as has the number of relevant entities within individual SSOs (TCs, WGs, etc.). The most notable proliferation of such entities could be observed for the past five to seven years, with the exceptions of ITS and mobile communication, where the development was more homogeneous and far less pronounced peaks occurred around 2005 and in the late 2000s, respectively [Jakobs, 2017]. Another similarity lies in the fact that in all cases but one the establishment of formal SDOs (typically working on predecessor technologies) predate those of consortia by decades (ITS being the exception). Overall, it would seem that up to now consortia play a less important role in the development of smart applications and IoT-related technologies than they do e.g. in the mobile communication sector. ICT systems span the globe and, by definition, the associated standards need to be global as well. The task of regional standards then is to introduce regional specifics (of e.g. regulatory nature) into international standards, while maintaining global interoperability. Alternatively, some such regional specifics may find their way into international standards. However, both cases require dedicated regional standardisation activities. Against this background, a look at the developments in Europe yields a somewhat ambivalent picture. On the bright side, ETSI’s activities on smart applications and, particularly, smart infrastructure through its smartM2M TC and its Partnership Projects (3GPP, oneM2M) are well positioned in the global context. However, the focus is on rather more low-level wireless telecommunication services. On the other hand, the eight CEN Technical Committees identified as being active in the field of ‘Smart Technologies’ in [CEN/CENELEC, 2016] focus almost exclusively on metering and do not really link to ICT, the IoT or CPSs. The one exception is CEN/TC 294 (Communication systems for meters). However, as the name suggests the focus here as well is on the communication system. Perhaps more notable, CEN has long been playing a prominent role in the ITS sector, also covering more application-oriented services. Apart from that, however, CEN and CENELEC seem to have adopted a ‘laggard’ role, with CENELEC largely focussing on the transposition of international standards. According to the ‘Rolling Plan for ICT Standardisation’ [EC, 2016b], CENELEC “works out methods for safe and secure communication protocols for wired and wireless industrial automation applications” in the field of Smart Manufacturing [EC, 2016b]. Yet, this work as well has so far moastly been limited to the adoption of IEC standards. Given the pioneering role that Europe in general and Germany in particular play in this field 238 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Jakobs: Emerging Smart Technologies and the European Standardisation System (‘Industrie 4.0’; see e.g. [GTAI, 2014]), it seems a bit strange that such a leadership position should not be translated into indigenous European standards that could eventually be adopted by ISO or IEC . In fact, the apparent reluctance to play a more active role in smart manufacturing standardisation is also at odds with [EC, 2016a]. This document highlights Europe’s long standing leadership in factory automation and that standardisation has an important role to play in helping European industry to secure this leadership The ESOs’ Coordination Groups on the Smart Grid, Smart Meters and Smart and Sustainable Cities and Communities, respectively, have so far been more policy advisory entities rather than actually active in standards setting. With respect to the IoT, CEN/CENELEC’s standardisation activities are limited to the field of automatic identification and data capture, where a newly (in 2016) formed WG addresses IoT related issues. In this context, the lack of any approach towards truly multi-disciplinary standardisation is worrying. It is also surprising since the European Commission has identified the need for such an approach in [EC, 2016b]. The document calls for multi-disciplinary standardisation in several application areas, including Smart Grid and Smart Cities. Given the almost frantic activities that are going on at the international level this seemingly rather restrained European approach (at least for smart applications) appears a bit odd. In fact, it is in stark contrast to the recommendations made already in [ProSE, 2011]. While these recommendations relate to the field of embedded systems (the not necessarily interconnected predecessors of CPSs), they are equally valid for the standardisation of the IoT and smart applications. The relevant ones (in this context) read: “Recognise the need to value standardisation and to take leadership of standardisation (in appropriate domains). Recognise the need to co-operate on standardisation across competitive boundaries and to reconcile and manage the differences that presently inhibit such co-operation. Invest in the efforts required to bring about standardisation, allowing staff the time and support to bring about long-term benefits. Invest in people and RTD in order to feed the technology pipeline that provides the basis for standardisation”. The above recommendations should be applied at least to those sectors where Europe has assumed – or aims to assume – a leadership position, technologically and/or in standardisation. Specifically, this holds for the ITS sector, where CEN has been (co)- leading the way for a number of years now. Likewise, existing strengths in Smart Manufacturing should be exploited in the standardisation arena (beyond Additive Manufacturing, which is covered by a CEN TC). 30TH BLED ECONFERENCE: DIGITAL TRANSORMATION – FROM CONNECTING THINGS TO 239 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Jakobs: Emerging Smart Technologies and the European Standardisation System Potential Future Steps 4.1 A Very Rough Roadmap for the ESOs in the Field of Smart Infrastructure and Applications This section aims to deepen these insights by identifying actions potentially to be taken by the ESOs to meet external challenges. Fig. 1 shows the underlying framework. Tech R n e o g lo u g la ie t s io / n M / a P r o k l e ic t y Standards Setting Environment Co-operating Entities SSOs Standardisation Standard(s) Figure 1: The roadmap’s framework In an environment characterised by uncertainties a roadmap offers a visual representation of alternative paths towards a strategic goal or a vision (see e.g. [Phaal & Muller, 2009]). Here, the overall goal is a global standardisation environment within which the ESOs play a central role in the standardisation of a smart communication infrastructure and smart applications. To this end, a number of external influences have been extracted from a literature review , a survey8 and the SWOT analysis. They are depicted in Fig. 2, along with the associated actions to be taken to adequately address them and to eventually make the vision a reality. It would appear that two already ongoing trends – strong Asian/Chinese participation in standards setting for smart applications and infrastructure and the need for truly interoperable implementations (as opposed to standards) – may well imply a further reduction of the ESOs’ international importance (specifically of CEN and CENELEC). The same holds for the possible (likely?) trend towards all-IP networks (see e.g. [Jara et al., 2013]). This is hardly going to happen anytime soon, but may well be expected in the medium term. The same holds for a wider deployment of CPSs and of smart applications. Given the current fragmented standardisation landscape and the infancy of the associated 240 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Jakobs: Emerging Smart Technologies and the European Standardisation System standards setting activities, these developments are a) unlikely to be aligned and b) likely to deploy proprietary technology. However, this may increase the need for interoperability and thus for international standards. This, in turn, would represent an opportunity for the ESOs if they managed to position themselves as relevant players in the meantime. Central role for ESOs in the standardisa on of smart systems Intensified Interna onal Chinese/ policies to Asian ac vi es tesu tribn Intensify co-opera on oC with relevant SSOs Reduced Reduced influence Importance of of EU e firms Develop stronger Power shi ESOs profil to IETF/W3C (esp. CEN/CENELEC) Work on ICT Higher interna onal Global Power shi implementa ons relevance of ESOs standardisa on to consor a environment Adopt a more global view New ‘smart’ standardisa on ac vi es Adop on of a mul - disciplinary approach Create joint ESO en ty on ‘smart’ standardisa on Need for Wider deployment Technology standards-based All-IP of CPSs and & Market implementa ons smart applica ons Figure 2: A very rough ‘roadmap’ for ‘smart’ standardisation Fig. 2 shows that the ESOs do not always play the role they could play in the standardisation arena for smart infrastructure/applications. The SWOT analysis revealed a number of issues that need to be addressed. These issues fall into three categories (not all apply to all ESOs): • Limited relevant activities. This has two dimensions. For one, not all relevant technical areas are covered by the ESOs. Moreover, especially CENELEC frequently limits its activities to the transposition of IEC standards into European ones. • Inadequate international interconnectedness. While very good links exist to the ESOs’ respective international counterparts the same may not be said for private international standards consortia. • Process aspects. 30TH BLED ECONFERENCE: DIGITAL TRANSORMATION – FROM CONNECTING THINGS TO 241 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Jakobs: Emerging Smart Technologies and the European Standardisation System • This refers to limited links to relevant research activities, to the equally limited activities in standards education, to the disregard of implementation aspects and to the lack of multi-disciplinary standardisation. These weaknesses will be discussed in the following. 4.2 Limited relevant activities of the ESOs A number of gaps in the ESOs’ standards setting activities may be identified in the realm of smart infrastructure/applications. For one, with the exception of ETSI’s smartM2M group (and its involvement with oneM2M) hardly any activities are to be found. This comes as a bit of a surprise since both CEN and CENELEC have been venturing into the field of communication systems (e.g. in ITS (CEN) and for the smart grid (CENELEC)). Moreover, a smart infrastructure (including particularly the IoT and CPSs) is the basis for all smart applications. Similarly, the activities relating to smart cities are in their infancy at best. Given the necessary tight integration of standards activities on smart applications on the one hand and a smart (communication) infrastructure on the other it would seem that joint ESO activities in the ‘smart’ realm are called for. How exactly such joint activities may look like would have to be discussed. Joint CEN/CENELEC entities have already been established (TCs, WG, Workshops); an extension of this concept to also include ETSI should be considered. This would, on the one hand, strengthen the expertise on the communication side and support multi-disciplinary and integrated standardisation (of applications and infrastructure) on the other. Along similar lines do the virtually non-existing global standardisation activities for CPSs represent an opportunity for Europe. Research in this field has been going on for quite a while now in Europe . This accumulated know-how could be used as basis for European standardisation activities, also e.g. through a TC managed jointly by all ESOs. The other issue relates to the fact that in many cases CENELEC’s main activity seems to be the transposition of IEC standards. For example, in the field of Smart Manufacturing almost all but ten (out of 250+) standards passed by CLC TC65X originated from the IEC. It certainly makes sense not to unnecessary duplicate any work. However, the thought of CENELEC standards solely being based on IEC documents for both ITS and the Smart Grid is a bit worrying. After all, there are European specifics, most notably in the highly regulated field of the Smart Grid. Specific European boundary conditions may also be assumed for e.g. Smart Cities. A higher level of autonomy in these fields is called for. 4.3 Inadequate international interconnectedness The focus of both CEN and CENELEC is clearly on Europe. This is not a bad thing per- se for an ESO. However, the ICT sector is, almost by definition, global. Accordingly, in this sector, which includes smart infrastructure and applications, globally accepted standards are a sine-qua-non. The European Commission has realised that; the Regulation on European standardisation [EU, 2012], which notes that “… the Union should 242 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Jakobs: Emerging Smart Technologies and the European Standardisation System encourage contact between European standardisation organisations and private forums and consortia, while maintaining the primacy of European standardisation”. Nevertheless, CEN and CENELEC together have so far established links with only four international organisations that are of some relevance for the standardisation of smart infrastructure and applications. It may be assumed that this isolation also contributes to the fact that regional standards bodies’ importance in the field is seen as either limited to the identification of specific regional requirements and the associated adaptation of global standards or is questioned altogether [Jakobs & Wehrle, 2017]. As a first step, links to relevant non-European players should quickly be established through formal co-operation and co-ordination mechanisms. 4.4 Process aspects A number of rather diverse aspects fall under this heading. For one, the need for education about standardisation has been highlighted by several sources. Recently, the EU’s ‘Joint Initiative on Standardisation’ observes that “… there is a clear need to explore and promote standardisation as an element of formal education, academic & vocational training, …” [EC, 2016a]. So far, in Europe coverage of standardisation has been very limited in tertiary education. Continuous education is primarily provided by the NSOs and typically focuses on the practical aspects of standards setting, as opposed to e.g. economic or other academic ones. The problem has long been realised; a ‘Joint Working Group on Education about standardization’ was established by the ESOs in 2010. However, the group has been dormant for quite a while. Work on the ‘Programmes for education in Standardisation/Training and awareness on standardisation’ [EC, 2016a] has commenced after initial difficulties; its outcome remains to be seen. Moreover, links between standardisation and Research & Innovation (R&I) need to be improved. This issue has also been on the agenda for quite a while now. Both the ‘Interest’ [Interest, 2007] and, more recently, the ‘Bridgit’ project [Bridgit, 2014] made a number of similar recommendations on how to bridge the gap between standardisation and R&I. In unison, they highlight the need to increase awareness on both sides and to mutually promote and educate. Likewise, incentives need to be offered to researchers to spend resources on standardisation activities; this should be of relevance for research funding organisations (including the EU). For the ESOs, this would include adapted or new processes that are more ‘research-friendly’, i.e. short-lived (akin to e.g. IETF Working Groups). CEN/CENELEC Workshops and ETSI’s Industry Specification Groups are certainly steps in the right direction. However, their usefulness is limited by the fact that no mechanism exists to feed their output into the standardisation process proper (e.g. through the transition of a CEN Workshop to a Working Group). Taking the various recommendations made by the two projects on board would definitely help improve the situation. Not unlike their international counterparts, both CEN and CENELEC stay clear off any implementation aspects. The situation for ETSI is slightly different; their ‘Plugtests’ represent at least a step towards taking implementation issues into account. In any case, 30TH BLED ECONFERENCE: DIGITAL TRANSORMATION – FROM CONNECTING THINGS TO 243 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Jakobs: Emerging Smart Technologies and the European Standardisation System the success of SSOs like the IETF and the W3C may to no small part be attributed to the fact that they consider implementations and proven interoperability as part of their respective standardisation process (see e.g. [Lehr, 1995]). It seems highly unlikely that CEN and CENELEC will change their stance on implementations. Nevertheless, at least for the ICT sector steps ought to be taken to provide the market with what it needs – interoperability. Perhaps a new entity that develops and/or certifies interoperable implementations might be a way forward. The lack of multi-disciplinary standardisation is another issue. The need for such a new way of setting standards for the field of smart infrastructure and applications has been corroborated by survey respondents in [Jakobs & Wehrle, 2017]. A standards setting platform jointly managed by the ESOs has already been suggested above. Such a platform would have the potential to kill two birds with one stone. On the one hand, it would help improve the level of the ESOs’ involvement in the international standardisation of smart infrastructure and smart applications. As the European expertise from the different relevant fields would likely be concentrated on this platform it would also contribute to the goal of multi-disciplinary standardisation. A ‘third bird’ would be the fact that such a major ‘hub’ of standardisation in the ‘smart’ field could also attract other SSOs to enter into co-operation agreements. Such a platform would allow experts from different backgrounds and from several SSOs to meet and to address inherently multi-disciplinary standardisation problems (eventually not necessarily limited to smart infrastructure and applications). References Bridgit project (eds.) (2014). Research Study on the Benefits of Linking Innovation and Standardization. Final Report. http://www.cencenelec.eu/research/news/publications/Publications/BRIDGIT-standinno- study.pdf (accessed 8 December 2016). CEN/CENELEC (2016). CEN-CENELEC Work Programme 2017 – European standardization and related activities. http://www.cencenelec.eu/News/Publications/Publications/cen-cenelec- wp2017_en.pdf (accessed 29 December 2016) CEU (eds.) (1985): New Approach to technical harmonization and standards. Council Resolution 85/C 136/01. http://eur- lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:C:1985:136:0001:0009:EN:PDF (accessed 6 December 2016). EC (eds.) (1996): Communication from the Commission to the Council and the Parliament on ‘Standardization and the Global Information Society: The European Approach’, COM (96) 359. http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:1996:0359:FIN:EN:PDF. (accessed 22 September 2016). EC (eds.) (2016a). Joint Initiative on Standardisation under the Single Market Strategy. http://ec.europa.eu/DocsRoom/documents/17204/attachments/1/translations/en/renditions/pdf (accessed 28 December 2016). EC (eds.) (2016b). Rolling Plan for ICT Standardisation. http://ec.europa.eu/DocsRoom/documents/15783/attachments/1/translations (accessed 21 October 2016). 244 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Jakobs: Emerging Smart Technologies and the European Standardisation System EU (eds.) (2012). Regulation (EU) No 1025/2012 of the European Parliament and of the Council on European standardisation. Retrieved from http://eur- lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2012:316:0012:0033:EN:PDF (accessed 14 April 2016). GTAI (eds.) (2014). Industrie 4.0 – Smart Manufacturing for the Future. http://www.plattform- i40.de/I40/Redaktion/EN/Downloads/Publikation-gesamt/zukunftsbild-industrie-4- 0.pdf?__blob=publicationFile&v=6 (accessed 10 November 2016). INTEREST (2007). What Standard-Setting Bodies Could Do. Retrieved from https://www.comsys.rwth-aachen.de/fileadmin/downloads/Final-Manual_R_D.pdf (accessed 8 December 2016). Jakobs, K. (2017). Standardizing the IoT and its Applications – Learning from the Past?! To be published in: Hassan, Q. et al.: Internet of Things – Concepts, Technologies, Applications, and Implementations. CRC Press, Florida, USA. Jakobs, K.; Wehrle, K. (2017). Cyber-Physical Systems – Future Standardisation for Europe (CPS- FUSE). Final Project Report (available upon request). Jara, A.J.; Ladid, L. & Gómez-Skarmeta, A.F. (2013). The Internet of Everything through IPv6: An Analysis of Challenges, Solutions and Opportunities. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 4(3), 97-118. Lehr, W. (1995). Compatibility standards and interoperability: Lessons from the Internet. In: Kahin, B.; Abbate, J. (eds.): Standards policy for information infrastructure. Pp. 121-147. MIT Press. Phaal, R. & Muller, G. (2009). An architectural framework for roadmapping: Towards visual strategy. Technological Forecasting and Social Change, 76(1), pp.39–49. ProSE (eds.) (2011): Promoting Standardization for Embedded Systems – Strategic Agenda for Standardisation. Final Version. Via http://www.academia.edu/17417433/ARTEMISIA_ProSE_D3_3_StrategicAgenda_Final_De (accessed 5 April 2016). Sherif, M. H. (2003). When is standardization slow?. International Journal of IT Standards and Standardization Research (IJITSR), 1(1), 19-32. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Intruder Alert? How Stock Markets React to Potential IT Security Breaches: The Case of OpenSSL Heartbleed 18 CHRISTIAN JANZE Abstract This exploratory study investigates how potential information technology security breaches affect stock prices. Previous research indicates that stock markets tend to punish firms that experience unsolicited disclosure of information and proprietary data. However, little research exists on the question of whether firms are punished for creating the mere potential for data theft. Based on the information boundary theory, we design our exploratory research model. Subsequently, we utilize a sample of 4,147 stocks of firms headquartered in 43 countries to conduct multiple event studies. We reveal a delayed adverse stock market response to potential IT security breaches as well as a discrimination among firms operating in different industries. Consequently, this work enhances the understanding of the full economic impact of information security measures by shedding light on previously neglected hidden costs. Keywords: • Economics • Finance • Information Security • Event Study • Heartbleed • CORRESPONDENCE ADDRESS: Christian Janze, Goethe University Frankfurt, Theodor-W.-Adorno- Platz 1, 60323 Frankfurt am Main, Germany, e-mail: janze@wiwi.uni-frankfurt.de. https://doi.org/10.18690/978-961-286-043-1.18 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 246 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Janze: Intruder Alert? How Stock Markets React to Potential IT Security Breaches: The Case of OpenSSL Heartbleed Introduction Hardly a day passes without reports of large-scale attacks against IT infrastructures launched by internal and external perpetrators. These attacks frequently result in the unintentional disclosure of confidential information and proprietary data (Liedtke 2014, Zetter 2013). Previous research on the economic impact of IT security breaches on affected firms focuses on realized unsolicited disclosure of information and proprietary data (Acquisti et al. 2006, Campbell et al. 2003, Cavusoglu et al. 2004, Ettredge and Richardson 2002, Goel and Shawky 2009, Hovav and D’Arcy 2003, Kannan et al. 2007, Telang and Wattal 2007). However, we argue that it is equally likely that stock markets punish firms for creating the mere possibility of a data theft. This is because of a diminished trust in the firms' capabilities to protect sensitive data with adversarial effects on future sales and thus its stock price, which resembles the discounted value of expected future dividends (which are directly linked to sales). Thus, within this study, we examine the overall research question of the impact of potential IT security breaches on stock prices. We draw on information boundary theory (IBT) to investigate our research question. Specifically, we study the impact of the Heartbleed vulnerability within the widely used cryptographic library OpenSSL (OpenSSL 2014a) on the value of 4,147 publicly traded firms. OpenSSL is used to secure connections in computer networks (Durumeric et al. 2014) and was enabled on approximately two-thirds of all webservers worldwide when Heartbleed was publicly announced (Goodin 2014). Examples of affected services include Facebook, Instagram, Google Search, Gmail, Youtube, Yahoo Search, Yahoo Mail and Dropbox (Mashable 2014). Our exploratory findings reveal a time-delayed response of stock markets to potential IT security breaches as well as a discrimination among firms operating in different industries. The remaining portion of this paper is structured as follows. Section two provides background on related research, privacy theory as well as our research model. Section three provides information on our research methodology. Section four presents the results of our study and discusses its implications. Section five concludes the study. Background and Research Model 2.1 Research on Realized IT Security Breaches As summarized in Table 1, previous research can be largely divided into the impact of data & security breach announcements on firms and vulnerability disclosures on software vendors (Telang and Wattal 2007). 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 247 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Janze: Intruder Alert? How Stock Markets React to Potential IT Security Breaches: The Case of OpenSSL Heartbleed Table 1: Results of IT Security Related Event Studies by Covered Topic (Partially adapted from Acquisti et al. (2006) and Telang and Wattal (2007)) Time Event Event CAAR Topic Author(s) Period s Window (%) 2000-2005 79 [0, +1] -0.58 Acquisti et al. (2006) 1995-2000 43 [-1, +1] -1.88 Campbell et al. (2003) 1998-2000 66 [0, +1] -2.00 Cavusoglu et al. (2004) 2004-2008 168 N/A -1.00 Goel and Shawky (2009) Firms 1998-2002 23 [-1, +1] N/A Hovav and D’Arcy (2003) 1997-2003 72 [-1, +7] -3.17 Kannan et al. (2007) Ettredge and Richardson Feb. 2000 115 [+1, +3] -3.00%2 (2002) Vend 1999-2004 146 [0, +1] -0.63 Telang and Wattal (2007) ors First, results regarding the overall impact of security & data breach announcements are mixed. While some authors find negative cumulative average abnormal returns (CAARs) of publicly traded firms’ stock prices ranging from -0.58% to -3.17% over short-horizon event windows below 10 days (Acquisti et al. 2006, Cavusoglu et al. 2004, Ettredge and Richardson 2002, Kannan et al. 2007) others don’t. For example, numerous studies find limited evidence of overall abnormal price effects but strong evidence for discrimination among firm and event characteristics (Campbell et al. 2003, Ettredge and Richardson 2002, Hovav and D’Arcy 2003). Campbell et al. (2003) finds no evidence for an overall effect but strong and statistically significant support for negative effects of security breaches that involve unauthorized access to confidential data (-5.46%). Exemplary for evidence of discrimination among the type of firms are Hovav and D’Arcy (2003), who find a statistically negative CAAR of internet-centered firms only and Ettredge and Richardson (2002), who find a negative CAAR of internet-centric firms. Second, software vendors that created vulnerable products were negatively affected and experienced a CAAR of -0.63% associated with the announcement of a vulnerability within their products and services (Telang and Wattal 2007). In summary, previous research focuses on the impact of realized IT security breaches. However, little research exists on the question whether stock markets punish firms for creating the mere potential to breach their IT security. 2.2 Heartbleed Vulnerability On April 7th, 2014, the existence of Heartbleed, a vulnerability within the cryptographic library OpenSSL was publicly announced (Codenomicon 2014, Schneier 2014). Heartbleed is the result of an improper implementation of the Heartbeat Extension (Durumeric et al. 2014) specified in Request for Comments 6520 (RFC6520), and affects official OpenSSL versions 1.0.1 to 1.0.1f (OpenSSL 2014b). Heartbleed creates the 248 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Janze: Intruder Alert? How Stock Markets React to Potential IT Security Breaches: The Case of OpenSSL Heartbleed recurring possibility of unsolicited remote copying of small chunks of random memory content from a service without the need for any authorization or leaving any traces (Schneier 2014). Common Vulnerabilities and Exposures (CVE)-2014-0160 states that Heartbleed “allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys“ (MITRE Corporation 2014). Heartbleed was introduced to the OpenSSL codebase on December 31, 2011 (22:59:57 UTC) (Seggelmann 2012) and widely distributed on March 14th, 2012 with the release of OpenSSL version 1.01 (OpenSSL 2012). Grubb (2014) states that Heartbleed was discovered for the first time on or before March 21st, 2014 by Neel Mahta of Google Security (OpenSSL 2014b). Thus, the exploitation of fully patched services running OpenSSL was theoretically possible for approximately two years. 2.3 Research Model to Study Potential IT Security Breaches The concept of privacy is considered to be of undisputed importance to societies of modern economies (Xu et al. 2008) and has been studied for centuries (Bélanger and Crossler 2011). However, grasping the concept of privacy is cumbersome because of its manifold definitions (Solove 2006). Acquisti et al. (2006) notes that attempts of precise definitions of privacy oftentimes “remain ambiguous, changing with the perspective of the observer”, a view that is shared by Introna and Pouloudi (1999). Nevertheless, in a landmark paper called “The Right to Privacy”, published in 1890 by Warren and Brandeis, the authors reasoned that the concept of privacy gradually evolved over time to “the right to be let alone” (Warren and Brandeis 1890). This view is still reflected by modern definitions with “the notion of privacy as freedom from the judgment of others” (Introna and Pouloudi 1999). Acquisti et al. (2006), defines a privacy incident roughly as a failure of mechanisms designed to protect personal information of customers’, partners’ or employees from threats of technical, managerial, organizational or human nature. The Heartbleed vulnerability thus represents an IT security related privacy incident. IBT is the result of a research program to investigate the impact of monitoring and surveillance technology on the perceived privacy of workers (Stanton and Stam 2003). Xu et al. (2008) describes IBT as an explanatory framework that allows for studying social impacts of information disclosures: IBT states that people possess unique physical or virtual informational spaces. These spaces are limited by clearly defined boundaries. Attempts of external entities to cross these boundaries might be perceived as an intrusion into the informational space. The extent of this perception is dependent on situational and personal conditions (Xu et al. 2008). According to Stanton and Stam (2002), IBT represents the synthesis of three separate constructs: First, the communications boundary management theory (Petronio 1991). Second, the group value approach to organizational justice (Alder 1998, Alder and Tompkins 1997). Third, a general expectancy valence framework for privacy protection (Stone and Stone 1990). IBT is comparable to attempts of Moor (1997) to conceptualize multiple theories of privacy. IBT is in-line with the 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 249 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Janze: Intruder Alert? How Stock Markets React to Potential IT Security Breaches: The Case of OpenSSL Heartbleed reasoning that “the unifying feature of privacy incidents is the violation of certain expectations about how data will be handled” (Acquisti et al. 2006). Xu et al. (2008) show that IBT can be applied in an information privacy context to describe the formation of an individual’s privacy concerns. Table 2 distinguishes two groups of firms by the overall news the public announcement of Heartbleed conveyed to firm stakeholders. Group A includes firms that were protecting their webserver by a vulnerable version of OpenSSL, allowing for the exploitation of Heartbleed. Group B covers firms that were protecting their webserver with an unaffected SSL/TLS solution. Table 2: Groups of Firms by News Heartbleed Conveyed to Stakeholders Heartbleed Webserver Protected by Webserver News to Firms' Group SSL/TLS? Vulnerable? Stakeholders Group A Yes Yes Bad News Group B Yes No Good News Research hypotheses set H1 deals with the overall impact of potential IT security breaches within Group A and B and is based on IBT. We hypothesize that firms within Group A experience a reduction in shareholders’ equity value, approximated by free-float stock prices, at the time of the public announcement of the Heartbleed vulnerability. Primarily because we assume that the announcement induced a re-assessment of firm stakeholders regarding the risk of unwanted information disclosure. This reassessment may result in a change in outcome from an acceptable- to an unacceptable risk as suggested by the IBT. This outcome is primarily driven by an increased perception of privacy intrusion induced by Heartbleed. In other words, stakeholders experienced negative news and responded with a decreased willingness to provide confidential information, which ultimately decreases business opportunity of affected firms. This reduced ability to conduct business will decrease future revenues and ultimately the amount of dividends a firm is able to pay out. Ceteris paribus (same dividend-pay-out ratios, overall growth projections and equity cost of capital) and assuming that stock prices are primarily determined by the present value of expected future dividend payments, this results in a decrease in stock value (Berk and DeMarzo 2011). The resulting research hypothesis, in which negative stock market reactions refer to falling share prices, is explicitly stated as: H1a. Negative stock market reaction in Group A around the public disclosure of potential IT security breaches. Additionally, we hypothesize that Group B firms experienced a positive effect on shareholders’ equity valuations at the time of potential IT security breach announcements. Especially because the knowledge that the firm was not affected by Heartbleed, despite being protected by SSL/TLS – may lead to a positive outcome of the re-assessment of the risk of unwanted information disclosure. This in turn attracts new 250 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Janze: Intruder Alert? How Stock Markets React to Potential IT Security Breaches: The Case of OpenSSL Heartbleed business opportunities through stakeholders, which previously assessed the risk as unacceptable. Furthermore, it is likely that stakeholders of Group A switched to Group B after assessing the risk of Group A firms as unacceptable, which again results in an increased ability of Group B firms to conduct business. Thus, and under the same assumptions regarding the effect on future dividend payments introduced in the last paragraph, this should result in an increase in the stock price of Group B firms: H1b. Positive stock market reaction in Group B around the public disclosure of potential IT security breaches. IBT states that people construct personal informational spaces within boundaries that - among other things – depend on the nature of information in question. We assume that firms in different industries process different types of information, of which some are considered of greater importance than others to the overall risk-evaluation process of firm stakeholders. For example, firms in the Communications or Financial Services industry may process more confidential information than firms in the Materials sector. Thus, we hypothesize that there are industry specific differences in the outcome of the re- assessment of the risk of unwanted information disclosure, which in combination with the reasoning of the last section yields the second set of hypotheses (H2): H2a. Existence of industry specific differences in negative stock market reaction of firms within Group A around the public disclosure of potential IT security breaches. H2b. Existence of industry specific differences in positive stock market reaction of firms within Group B around the public disclosure of potential IT security breaches. Methodology 3.1 Event Study Design Event studies are commonly used to examine the effect of specific events on the value of firms (Konchitchki and O’Leary 2011). While MacKinlay (1997) broadly defines event studies as “using financial market data [to] measure the impact of a specific event on the value of a firm“, others developed a more narrow understanding and note that ”event studies examine the behavior of firms’ stock prices around corporate events“ (Kothari and Warner 2007). In event studies, the timeline is divided into the estimation window, the event window and the post event window (Campbell et al. 1996). Returns are indexed in event time t, where t=0 represents the event date. Returns prior (post) the event date are typically indexed with negative (positive) integers relative to the event date (Acquisti et al. 2006, Campbell et al. 2003). At its core, event studies assess the effect of an event on the performance of a security in the event window by subtracting the expected return of a security from actual observed returns to get abnormal returns and subsequently 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 251 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Janze: Intruder Alert? How Stock Markets React to Potential IT Security Breaches: The Case of OpenSSL Heartbleed aggregating these over time and/or securities. Thus, the estimated abnormal return (AR) ̂_it of a given security i at time t can be written as 𝐴𝑅 ̂ 𝑖𝑡 = 𝑅𝑖𝑡 − 𝐸(𝑅𝑖𝑡 | 𝑋𝑖𝑡), where R_it represents the actual observed ex-post return and E(R_it ┤| X_t) the ex-ante normal return with X_it as the conditioning information of the normal return model (Campbell et al. 1996). Two predominant normal return estimation models (MacKinlay 1997) are the constant mean return model and the market model, in which X_it is the market return that is the same for each security i but changes with t (Campbell et al. 1996). The market model R_it= α_i+β_i R_mt+ξ_it, linearly relates the return R_it of a security i at time t to the return R_mt of market portfolio m at time t with disturbance term ξ_it that exhibits an expected value of zero and variance σ_(ξ_i)^2 (MacKinlay 1997). Parameters of the market model are the intercept α_i and the slope β_i of security i, which can be empirically determined by means of OLS regression using estimation window data (MacKinlay 1997). The abnormal return (AR) ̂_it of security i at time t within the event window using the market model can then be estimated as 𝐴𝑅 ̂ 𝑖𝑡 = 𝑅𝑖𝑡 − 𝛼̂𝑖 − 𝛽̂𝑖𝑅𝑚𝑡, where α ̂_iand (β ̂_i ) ̂ are OLS estimators of the market model. Event studies typically deal with more than one security and event windows that span over multiple days. Abnormal Returns (AR’s) are therefore aggregated to draw overall inferences of the events’ impact on returns (MacKinlay 1997), which can be done across time, across securities and both across security and time (Campbell et al. 1996). The cumulative average abnormal return (CAAR) ̂(a,b) of n securities over a time-period within the event window spanning from t=a to b can be written as 𝑛 𝑏 1 𝐶𝐴𝐴𝑅 ̂ (𝑎, 𝑏) = ∑ ∑ 𝐴𝑅 ̂ 𝑛 𝑖𝑡. 𝑖=1 𝑡=𝑎 Empirical research indicates that stock prices are not normally distributed (Brown and Warner 1985). This is typically addressed by using non-parametric tests when analysing abnormal returns of a single day (Kolari and Pynnonen 2011). However, problems arise when non-parametric tests are applied over multiple days on a CAR basis (Cowan 1992, Kolari and Pynnonen 2010). Thus, Kolari and Pynnonen (2011) proposed a Generalized Rank (GRANK) testing procedure which in simulations outperformed previous non- parametric ranks tests and exhibits superior robustness to serial correlation and increased volatility induced by the event as well as cross-sectional correlation of returns due to 252 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Janze: Intruder Alert? How Stock Markets React to Potential IT Security Breaches: The Case of OpenSSL Heartbleed event day clustering. Additionally, GRANK often has good or higher empirical power when compared to highly popular parametric tests such as the ordinary t-test or BMP t- test. This holds true for event windows of any given length. Therefore, we rely on GRANK in the following. 3.2 Economeric Design Table 3 summarizes the econometric design of each event study designed to put research hypotheses sets H1 and H2 to test and are repeated for good and bad news firms. The event of interest is the public announcement of the Heartbleed vulnerability within the cryptographic library OpenSSL on April 7th, 2014. The market model with daily close prices was chosen for estimating the normal returns. First, because gains from more sophisticated multi-factor models such as CAPM and APT based as Fama-French-3- Factor over statistical models are limited (MacKinlay 1997). Second, the market model is slightly less affected by cross-sectional return correlation in the presence of event-date clustering than the Fama-French-3-Factor-Model (Kolari and Pynnonen 2011). The estimation window length to estimate the regression coefficient is 200 trading days, which roughly equals the mean (median) of 52 papers including event studies in IS research originally compiled by Konchitchki and O’Leary (2011). Three different event window lengths, covering 3, 13 and 23 days respectively are applied. The short-horizon event window of three days complies with the econometric reasoning of superiority of short-horizon event windows by Konchitchki and O’Leary (2011). The medium- and long-horizon event windows are designed to capture potential information leakage prior to the event and delayed stock market reaction and act as a robustness check. Inclusion criteria are varying BICS level 1 classifications of firms and data cleaning rules. Missing close price data was replaced by applying Last Observation Carried Forward (LOCF) and subsequently Next Observation Carried Backward (NOCB) for each security with less than or equal to 20 missing observations, which equals 10% of the estimation window length. Daily returns exceeding 100% were replaced by 0% to remove very few outliers. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 253 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Janze: Intruder Alert? How Stock Markets React to Potential IT Security Breaches: The Case of OpenSSL Heartbleed Table 3: Econometric Design of Event Studies Event Study Configuration ID a b c d e f g h i j k a b c d e f g h i j k a b c d e f g h i j k 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3 3 3 S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E H H H H H H Hypotheses Set 1 2 1 2 1 2 Normal Model (Benchmark Return Market Model (MSCI World Price Index) Index) Model rs Calendar Time (Event Event te Time) 2014-04-07 [0] e Date m Trading Days 1 ra Start 2013-06-28 2013-06-21 2013-06-14 a Calendar Time Estimati P End 2014-04-03 2014-03-27 2014-03-20 y on d Event Time [-201,-2] [-206, -7] [-211, -12] tu Window Trading days 200 t Sne Start 2014-04-04 2014-03-28 2014-03-21 v Calendar Time E Event End 2014-04-08 2014-04-15 2014-04-22 Window Event Time [-1, +1] [-6, +6] [-11, +11] Trading days 3 13 23 Communications x x x x x x Consumer x x x x x x Discretionary Consumer Staples x x x x x x Energy x x x x x x Industri Financials x x x x x x ria es Health Care x x x x x x ite Cr Industrials x x x x x x nio Materials x x x x x x slu Technology x x x x x x cIn Utilities x x x x x x Maximum Missing 20 Data Returns Cleanin Missing Price LOCF x g Data NOCB x Rules Outlier Threshold 100% Empirical Results and Discussion 4.1 Data Set and Descriptive Statistics The primary inclusion criterion applied is the membership of a firm’s stock in at least one of nine selected major stock indices as of June 24th, 2014. The resulting set is presented in Table 4 and includes a total of 4,873 constituents. Removing duplicate stocks that were member of more than one index lowered this number by 726 to a final number of 4,147. 254 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Janze: Intruder Alert? How Stock Markets React to Potential IT Security Breaches: The Case of OpenSSL Heartbleed Price data of all 4,147 stocks in the sample are compiled for the time-period of January 2nd, 2013 to July 21st, 2014. The total number of 1,483,352 HLOC price observations stem from Google Finance (857,447), Bloomberg Professional (527,755), Stooq (84,218) and Quandl (13,012). In addition, daily price data of MSCI World was acquired from Thompson Reuters Datastream. Meta data regarding the vulnerability of each of the 4,147 firms were compiled to assess the potential impact of the Heartbleed vulnerability on affected firms: Heartbleed, as previously shown, affected a multitude of software and hardware solutions: Webservers reached by the Fully Qualified Domain Name (FQDN) were selected as a proxy for a firm’s vulnerability level. FQDNS of 4,137 of the 4,147 firms in the sample could be compiled. The remaining firms did not operate a webserver. Historic scan data from these webservers, allowing for determining each firm’s vulnerability level prior to Heartbleed’s public announcement on April 7th, 2014, originate from Netcraft Ltd. and are aggregated into three categories previously presented in Table 2. In addition, all of the 4,137 available FQDN’s were rescanned on September 1st, 2014 using “Heartbleed-Masstest” written by Al-Bassam (2014). Table 4: Sample Constituents by Stock Index, Coverage, Focus and Operator Index Constituents Coverage Region Operator Bloomberg European 501 Large Cap Europe Bloomberg L.P. 500 CAC 40 40 Large Cap France Euronext N.V. DAX 30 30 Large Cap Germany Deutsche Börse AG EURO STOXX 50 50 Large Cap Europe STOXX Ltd. NASDAQ Composite 2,526 All Cap U.S. NASDAQ OMX Group Inc. Nikkei-225 Stock 225 Large Cap Japan Nikkei Inc. Average S&P 400 400 Mid Cap U.S. S&P Dow Jones Indices LLC S&P 500 501 Large Cap U.S. S&P Dow Jones Indices LLC STOXX Europe 600 600 All Cap Europe STOXX Ltd. Total Constituents 4,147 Figure 1 depicts the distribution of vulnerability levels within the total constituent sample of 4,147 firms before and after the public announcement of Heartbleed on April 7th, 2014. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 255 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Janze: Intruder Alert? How Stock Markets React to Potential IT Security Breaches: The Case of OpenSSL Heartbleed Figure 1: Distribution of Vulnerability Levels within Total Constituent Sample 4.2 Overall Impact (H1) Hypotheses set H1 is concerned with the overall impact of potential IT security breaches on stock prices of publicly traded firms. Table 5 presents empirical results by providing CAARs and results of two-tailed non-directional GRANK-T tests over short-, medium-, and long-horizon event windows. The null hypothesis tested by the tgrank test statistic states that there is no mean effect while the alternative is that there is a mean effect (Kolari and Pynnonen 2011). Table 5: Overall Impact of Potential IT Security Breaches on Publicly Traded Firms Group A "Bad News" Group B "Good News" Event Study n CAAR tgrank p n CAAR tgrank p ES1a ( Short-Horizon) 538 -1.45% 1.52 0.13 1,647 -1.24% 1.39 0.17 ES2a ( Medium-Horizon) 537 -2.94% 1.85 0.07* 1,644 -2.58% 1.81 0.07* ES3a ( Long-Horizon) 536 -5.28% 2.40 0.02** 1,638 -4.30% 2.32 0.02** Hypothesis H1a predicts a negative stock market reaction in Group A around the public disclosure of potential IT security breaches. There is little empirical support of statistical significance for this prediction in the short-horizon event-window as shown in Table 5. However, in the medium- and long-horizon event windows, the Group A CAARs of - 2.94% and -5.28% is of statistical significance at the 10% and 5% level respectively. 256 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Janze: Intruder Alert? How Stock Markets React to Potential IT Security Breaches: The Case of OpenSSL Heartbleed Figure 2: Impact of Potential IT Security Breaches on CAARs Figure 2 presents the development of the overall impact of Heartbleed within each event- horizon: In the short-horizon event window, Group A firms’ CAAR is most negative at the time of the public announcement of Heartbleed. Looking at the medium-horizon event window length, this recovery of Group A continues until April 9th, 2014, when the CAAR starts to drop even further. The long-horizon event window again shows the two local minima of CAAR in Group A on April 7th and April 15th, 2014 and an additional one around March 28th, 2014. Thus, we observe a time-delayed response of stock markets to potential IT security breaches. H1b predicts a positive stock market reaction in Group B around the public disclosure of potential IT security breaches. Table 5 reveals that there is little empirical support for this prediction in the short run. The effect on firms’ stock prices in Group B is negative with CAARs of -1.24%, -2.58% and -4.30% in the respective short-, medium and long-horizon event windows. While this effect was of no statistical significance in the first case, it was 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 257 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Janze: Intruder Alert? How Stock Markets React to Potential IT Security Breaches: The Case of OpenSSL Heartbleed in the latter two cases at the 10% and 5% level. However, Figure 2 reveals that firms in the Group B performed better, relative to firms in Group A. 4.3 Industry Specific Differences (H2) H2a predicts the existence of industry specific differences in negative stock market reaction of firms within Group A around public disclosure of potential IT security breaches. Results presented in Table 6 seem to support this prediction. Most industry specific CAARs in the short-horizon event window are of no statistical significance according to the two-tailed GRANK-T test. However, firms operating in the Consumer Discretionary and Health Care industry experienced CAARs of -1.43 and -2.59%, which are significant at the 10% and 5% level, respectively. Interestingly, when looking at the results of the medium-horizon event window, the statistical significance of the effect on firms in the Consumer Discretionary sector vanishes. Instead, the CAAR of -4.9% of firms in the Communication sector becomes statistically significant at the 1% level. In addition, the effect on the Health Care industry becomes significant at the 1% level with a CAAR of -6.55%. In the long-horizon event window, eight out of ten industries experienced an effect of statistical significance at the 10% level ranging from CAARs of -9.47% to +4.4%. H2b predicts the existence of industry specific differences in positive stock market reaction of firms within Group B around public disclosure of potential IT security breaches: Table 6 indicates that there is little support for this prediction in the short- horizon event window, as only the CAAR of -1.40% in the Consumer Discretionary sector is of statistical significance. Additionally, there is little support for the predicted positive effect as the vast majority of industry specific CAARs is negative. In the medium-horizon event window, three industries experienced a significant effect with CAARs ranging from -3.14 (Communications), over 3.91% (Technology) to -8.82% (Health Care). In the long-horizon event window, these negative effects increases even more. In addition, the negative effects within the Consumer Discretionary and Financials sectors are statistical significance. 258 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Janze: Intruder Alert? How Stock Markets React to Potential IT Security Breaches: The Case of OpenSSL Heartbleed Table 6: Industry Specific Impact of Potential IT Security Breaches on Stock Prices Group A Group B ID Industry n CAAR tgrank p n CAAR tgrank p Short-Horizon Event Window: ES1a All Industries 538 -1.45% 1.520 0.1302 1647 -1.24% 1.389 0.1665 ES1b Communications 47 -1.91% 1.411 0.1598 101 -1.57% 1.444 0.1503 ES1c Consumer Discretionary 129 -1.43% 1.717 0.0876* 231 -1.40% 2.043 0.0424** ES1d Consumer Staples 28 -2.04% 1.415 0.1587 104 0.21% 0.314 0.7536 ES1e Energy 20 -0.02% 0.677 0.4991 76 -1.13% 0.420 0.6751 ES1f Financials 78 -1.17% 0.901 0.3685 404 -1.00% 1.148 0.2525 ES1g Health Care 66 -2.59% 2.237 0.0264** 173 -2.56% 1.123 0.2627 ES1h Industrials 39 -0.88% 0.935 0.3511 182 -1.09% 1.385 0.1677 ES1i Materials 17 -0.48% 0.443 0.6584 96 -0.34% 0.051 0.9593 ES1j Technology 112 -1.27% 1.389 0.1663 225 -2.07% 1.582 0.1153 ES1k Utilities 2 -0.35% 0.225 0.8220 55 0.88% 0.934 0.3513 Medium-Horizon Event Window: ES2a All Industries 537 -2.94% 1.850 0.0658* 1644 -2.58% 1.809 0.0719* ES2b Communications 47 -4.90% 3.037 0.0027*** 101 -3.14% 2.472 0.0143** ES2c Consumer Discretionary 129 -2.15% 1.346 0.1799 231 -2.26% 1.614 0.1081 ES2d Consumer Staples 28 -2.40% 0.105 0.9164 104 -0.24% 0.106 0.9155 ES2e Energy 20 2.30% 1.561 0.1200 76 0.75% 1.176 0.2412 ES2f Financials 78 -1.88% 1.434 0.1531 403 -1.90% 1.354 0.1772 ES2g Health Care 66 -6.55% 2.978 0.0033*** 172 -8.82% 3.641 0.0003*** ES2h Industrials 39 -0.96% 0.515 0.6075 181 -2.00% 1.162 0.2467 ES2i Materials 17 -0.76% 0.626 0.5319 96 0.39% 0.307 0.7592 ES2j Technology 111 -3.74% 1.638 0.1030 225 -3.91% 2.118 0.0354** ES2k Utilities 2 -2.26% 0.500 0.6177 55 0.89% 0.472 0.6372 Long-Horizon Event Window: ES3a All Industries 536 -5.28% 2.399 0.0174** 1638 -4.30% 2.320 0.0214** ES3b Communications 47 -7.90% 2.632 0.0091*** 101 -5.85% 3.028 0.0028*** ES3c Consumer Discretionary 129 -4.40% 1.982 0.0488** 231 -4.27% 2.126 0.0347** ES3d Consumer Staples 28 -3.98% 1.269 0.2059 103 0.33% 1.170 0.2433 ES3e Energy 20 4.40% 1.908 0.0579* 76 -0.67% 0.888 0.3757 ES3f Financials 78 -3.74% 1.902 0.0586* 400 -4.42% 2.272 0.0242** ES3g Health Care 66 -9.47% 3.088 0.0023*** 172 -11.16% 3.924 0.0001*** ES3h Industrials 38 -1.74% 0.259 0.7962 179 -2.56% 1.402 0.1623 ES3i Materials 17 -3.82% 1.940 0.0538* 96 1.95% 1.369 0.1724 ES3j Technology 111 -7.44% 2.504 0.0131** 225 -6.88% 2.947 0.0036*** ES3k Utilities 2 3.65% 2.628 0.0092*** 55 1.12% 0.619 0.5369 Limitations of this work are primarily related to the underlying event study methodology. These can be divided into problems related to theoretical assumptions and research design (McWilliams and Siegel 1997). Theoretical assumptions are (1) efficient markets, (2) no- anticipation of the event examined and (3) the absence of confounding events 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 259 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Janze: Intruder Alert? How Stock Markets React to Potential IT Security Breaches: The Case of OpenSSL Heartbleed (McWilliams and Siegel 1997). First, regarding the efficient markets assumption, we assumed that people are both able to find and make sense of publicly available information. While easy to find, it is possible that firm stakeholders were unable to make sense of it due to the technical sophistication of the Heartbleed vulnerability. Thus, even if large investors were aware of the problem, they may have concluded that other stakeholders were not and assumed no re-evaluation of the risk of unintentional disclosure of private information would take place. Second, event anticipation is unlikely as search query data of Google and Wikipedia revealed no interest in Heartbleed prior its public disclosure. Third, it is not possible to control for confounding events when analyzing a sample of 4,147 firms. However, effects are likely to be wiped out due to the large sample size and are especially unlikely in the short-horizon event window where the economic calendar provided by ECONODAY reveals no event window contaminating news. Typical additional issues of event studies are the sample size, the identification of outliers, the length and justification of the event window and further explanation of abnormal returns (McWilliams and Siegel 1997). Because of the large data sample, explicitly defined outlier return thresholds, theoretically justified event windows and research hypotheses, these should not pose a significant issue. Next to these limitations, future confirmatory studies must examine comparable large scale IT security issues where a multitude of firms are affected. Conclusion and Outlook This paper provides empirical evidence on the global impact of potential IT security breaches on stock markets. Thereby, it enhances the understanding of the full economic impact of information privacy measures by shedding light on previously neglected hidden costs. By drawing on IBT, research hypotheses are developed and put to test by means of multiple large scale event studies covering 4,147 firms headquartered in 43 countries. First, our exploratory study indicates that stock markets react with a time delay to potential IT security breaches. Second, we provide evidence for a discrimination of firms operating in different industries. Therefore, this work extends the understanding of consequences of jeopardized IT security by adding a previously neglected hidden cost component to information privacy considerations. Future scientific research in this field could investigate additional determinants of the discrimination of stock markets between potential and actual IT security breaches. References Acquisti A, Friedman A, Telang R (2006) Is There a Cost to Privacy Breaches? An Event Study. ICIS 2006 Proc. (Paper 94). Al-Bassam M (2014) CVE-2014-0160 multi scanner. Retrieved (November 28, 2014), https://github.com/musalbas/heartbleed-masstest/. Alder GS (1998) Ethical issues in electronic performance monitoring: A consideration of deontological and teleological perspectives. J. Bus. Ethics 17(7):729–743. 260 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Janze: Intruder Alert? How Stock Markets React to Potential IT Security Breaches: The Case of OpenSSL Heartbleed Alder GS, Tompkins PK (1997) Electronic Performance Monitoring: An Organizational Justice and Concertive Control Perspective. Manag. Commun. Q. 10(3):259–288. Bélanger F, Crossler RE (2011) Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems. MIS Q. 35(4):1017–1042. Berk J, DeMarzo P (2011) Corporate Finance 2nd Global Edition. (Pearson Education Limited, Boston ; Munich u.a.). Brown SJ, Warner JB (1985) Using daily stock returns: The case of event studies. J. Financ. Econ. 14(1):3–31. Campbell JY, Lo AW, MacKinlay AC (1996) The Econometrics of Financial Markets (Princeton University Press, Princeton, N.J). Campbell K, Gordon LA, Loeb MP, Zhou L (2003) The economic cost of publicly announced information security breaches: empirical evidence from the stock market. J. Comput. Secur. 11(3):431–448. Cavusoglu H, Mishra B, Raghunathan S (2004) The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers. Int. J. Electron. Commer. 9(1):70–104. Codenomicon (2014) Heartbleed Bug. Retrieved (August 27, 2014), http://heartbleed.com/. Cowan AR (1992) Nonparametric event study tests. Rev. Quant. Finance Account. 2(4):343–358. Durumeric Z, Kasten J, Adrian D, Halderman JA, Bailey M, Li F, Weaver N, et al. (2014) The Matter of Heartbleed. ACM Internet Meas. Conf. IMC. Ettredge M, Richardson VJ (2002) Assessing the Risk in E-Commerce. Proc. 35th Hawaii Int. Conf. Syst. Sci. 194–194. Goel S, Shawky HA (2009) Estimating the market impact of security breach announcements on firm values. Inf. Manage. 46(7):404–410. Goodin D (2014) Critical crypto bug in OpenSSL opens two-thirds of the Web to eavesdropping. Ars Tech. Retrieved (September 22, 2014), http://arstechnica.com/security/2014/04/critical- crypto-bug-in-openssl-opens-two-thirds-of-the-web-to-eavesdropping/. Grubb B (2014) Heartbleed disclosure timeline: who knew what and when. Syd. Morning Her. Retrieved (October 17, 2014), http://www.smh.com.au/it-pro/security-it/heartbleed-disclosure- timeline-who-knew-what-and-when-20140415-zqurk.html. Hovav A, D’Arcy J (2003) The Impact of Denial-of-Service Attack Announcements on the Market Value of Firms. Risk Manag. Insur. Rev. 6(2):97–121. Introna L, Pouloudi A (1999) Privacy in the Information Age: Stakeholders, Interests and Values. J. Bus. Ethics 22(1):27–38. Kannan K, Rees J, Sridhar S (2007) Market Reactions to Information Security Breach Announcements: An Empirical Analysis. Int. J. Electron. Commer. 12(1):69–91. Kolari JW, Pynnonen S (2010) Event Study Testing with Cross-sectional Correlation of Abnormal Returns. Rev. Financ. Stud. 23(11):3996–4025. Kolari JW, Pynnonen S (2011) Nonparametric rank tests for event studies. J. Empir. Finance 18(5):953–971. Konchitchki Y, O’Leary DE (2011) Event study methodologies in information systems research. Int. J. Account. Inf. Syst. 12(2):99–115. Kothari SP, Warner JB (2007) Econometrics of Event Studies. Eckbo BE, ed. Handb. Corp. Finance Empir. Corp. Finance Vol. 1. (Elsevier), 3–36. Liedtke M (2014) 76M households hit by JPMorgan data breach. Wall Str. J. Retrieved (October 6, 2014), http://online.wsj.com/article/AP034ca44ad33f4c888fa1b26988ce76cf.html. MacKinlay AC (1997) Event Studies in Economics and Finance. J. Econ. Lit. 35(1):13–39. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 261 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Janze: Intruder Alert? How Stock Markets React to Potential IT Security Breaches: The Case of OpenSSL Heartbleed Mashable (2014) The Heartbleed Hit List: The Passwords You Need to Change Right Now. Mashable. Retrieved (November 14, 2014), http://mashable.com/2014/04/09/heartbleed-bug- websites-affected/. McWilliams A, Siegel D (1997) Event Studies in Management Research: Theoretical and Empirical Issues. Acad. Manage. J. 40(3):626–657. MITRE Corporation (2014) CVE-2014-0160. MITRE Common Vulnerabilities Expo. Retrieved (August 27, 2014), https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160. Moor JH (1997) Towards a Theory of Privacy in the Information Age. Comput. Soc. 27(3):27–32. OpenSSL (2012) OpenSSL CHANGES. Retrieved (September 22, 2014), http://git.openssl.org/gitweb/?p=openssl.git;a=blob_plain;f=CHANGES;hb=refs/heads/Open SSL_1_0_1-stable. OpenSSL (2014a) About the OpenSSL Project. Retrieved (October 20, 2014), https://www.openssl.org/about/. OpenSSL (2014b) OpenSSL vulnerabilities. Retrieved (August 27, 2014), https://www.openssl.org/news/vulnerabilities.html#2014-0160. Petronio S (1991) Communication boundary management: A theoretical model of managing disclosure of private information between marital couples. Commun. Theory 1(4):311–335. Schneier B (2014) Heartbleed. Schneier Secur. Retrieved (August 29, 2014), https://www.schneier.com/blog/archives/2014/04/heartbleed.html. Seggelmann R (2012) projects/openssl.git/commit. OpenSSL. Retrieved (September 22, 2014), http://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=4817504d069b4c5082161b02a2211 6ad75f822b1. Solove DJ (2006) A taxonomy of privacy. Univ. Pa. Law Rev.:477–564. Stanton JM, Stam KR (2003) Information technology, privacy, and power within organizations: A view from boundary theory and social exchange perspectives. Surveill. Soc. 1(2):152–190. Stone EF, Stone DL (1990) Privacy in organizations: theoretical issues, research findings and protection mechanisms. Res. Pers. Hum. Resour. Manag. (8):349–411. Telang R, Wattal S (2007) An Empirical Analysis of the Impact of Software Vulnerability Announcements On Firm Stock Price. IEEE Trans. Softw. Eng. 33(8):544–557. Warren SD, Brandeis LD (1890) The Right to Privacy. Harv. Law Rev. 4(5):193–220. Xu H, Dinev T, Smith HJ, Hart P (2008) Examining the formation of individual’s privacy concerns: toward an integrative view. ICIS 2008 Proc. (Paper 6). Zetter K (2013) Target Admits Massive Credit Card Breach; 40 Million Affected | WIRED. Retrieved (October 7, 2014), http://www.wired.com/2013/12/target-hack-hits-40-million/. 262 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Coworking from the Company’s Perspective - Serendipity-biotope or Getaway-spot? 19 BARBARA JOSEF Abstract The phenomenon coworking has been around since 2005. While the initial drivers and beneficiaries where microbusinesses and freelancers, corporations have recently started to develop interest in the topic. Not because they see in coworking spaces a candidate to substitute their corporate office with, but because they are interested in the opportunities it offers in addition to the primary and secondary (home office) work location – be it from an innovation management or employee wellbeing standpoint. A pilot project with two Swiss ICT companies analysed the coworking movement from the perspective of corporations and identified value propositions as well as obstacles. Based on the different needs and behaviours of the experiment participants, four personae were identified. The study showed that although utilization by the pilot participants was on a very low level, the signal for change of the organizational culture is an interesting side effect of introducing coworking as an alternative work scenario. Keywords: •Coworking • Virtual Collaboration • Remote Work • Boundary Management • CORRESPONDENCE ADDRESS: Barbara Josef, University of St.Gallen, Dufourstrasse 50, 9000 St. Gallen, Switzerland, e-mail: barbara.josef@unisg.ch. https://doi.org/10.18690/978-961-286-043-1.19 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 264 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Josef: Coworking from the Company’s Perspective - Serendipity-biotope or Getaway-spot? Introduction The emergence of new technologies has changed the nature of work since the early 1980s in two ways. Firstly, the ongoing transformation has an impact on work relations and lead to an increase in nonstandard work arrangements (Kalleberg 2000). Secondly, even within standard work relations, the organization of work is undergoing a significant change, resulting in new ways of collaborating with stakeholder groups inside and outside of organizations. Although the changed nature of work relations is the driver for the phenomena coworking, the focus of this paper is not on the rise of the freelance or gig economy, but on the question how traditional organizations deal with the new work scenario coworking and how they integrate it in the portfolio of existing ones. It is thereby of particular interest, in which ways their usage scenarios are different from the ones of freelancers and microbusinesses and how the collision of the two entities in these third places (Oldenburg 1989) could be beneficial for both. Since coworking is a rather new phenomenon it is not yet elaborately discussed in the academic literature; this is even more the case for coworking from a company’s perspective, where only few articles exist, e.g. Ross & Ressia (2015) who look at coworking as an alternative for “home-based telework” in the public and private sector. The focus of this article is however not on the potential for replacing a work scenario, but on adding it to existing ones. 1.1 The changing nature of work Remote work scenarios are not new - it was the first oil crises in 1973 that helped telework and telecommuting to its triumph (Bailey & Kurland 2002; Nilles 1975). However, today’s highly mobile and connected digital nomads have little in common with these early teleworkers, who completed work outside of the office in an isolated manner, supported by stationary computers, fixed telephones and fax machines (Makimoto & Manners 1997, Messenger & Gschwind 2016). The emergence of mobile devices, cloud computing as well as social software is drastically transforming the way in which companies conduct work and organize collaboration (see also Eagle 2004). Today, work is no longer tied to a time or place which makes the assignment of all employees to a fixed space obsolete (Spreitzer, Garrett & Bacevice 2015). 1.2 The emergence of coworking When Brad Neuberg1 coined the term coworking in 2005 in San Francisco (Spinuzzi 2012) he can’t have foreseen to which significant movement he acted as midwife; at least when it comes to the naming of this new phenomena encompassing the disentanglement of time and space for knowledge work. Looking at coworking from a broader perspective, it has become the symbol for an economy, where non-standard forms of work (an extensive overview of these forms is provided by Capelli & Keller 2013), as alternatives to traditional full time-employments mushroom and force management as well as social 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 265 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Josef: Coworking from the Company’s Perspective - Serendipity-biotope or Getaway-spot? science to rethink existing models and assumptions. The focus of this article is however not on new forms of employment – which have beyond doubt been the catalyst of the whole coworking movement – but the question, which value proposition coworking offers from the perspective of established firms. While “working alone together” (Spinuzzi 2012) is one of the main promises for freelancers and microbusiness, coworking spaces only represent an alternative work scenario for established firms, at least in a short-term view. The relevant question from their standpoint is therefore how these third places (Oldenburg 1989; Gandini 2015) will complement the existing work scenarios – in contrast to freelancers and microbusinesses, who chose coworking as primary work location. These user groups have been subject to various studies in the last decade (Spinuzzi 2012, Capdevia 2013, Moriset 2013). The key question to expand the existing studies on coworking is therefore “what is it for whom?”. Figure 2: Work Scenarios from a Company’s Perspective (Amstutz & Schwehr 2014; Ross & Ressia 2015) 1.3 Definitions of Coworking As coworking is only since recently discussed in the academic literature, various definitions coexist. The most cited one is the one captured in the Coworking Wiki2: “…independent professionals and those with workplace flexibility work better together than they do alone. Coworking spaces are about community-building and sustainability. Participants agree to uphold the values set forth by the movement’s founders, as well as interact and share with one another. We are about creating better places to work and as a result, a better way to work.”. This definition is based on the five values described in the Coworking Manifesto. 266 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Josef: Coworking from the Company’s Perspective - Serendipity-biotope or Getaway-spot? Figure 3: Coworking Values according to the Coworking Manifesto3 As this definition focuses strongly on ideologic goals, the definition has limited validity from a company’s perspective. Based on the accurate overview of the most important aspects of coworking provided by Bouncken and Reuschl (2016) the following own definition shall be used in this article: “Coworking spaces are neutral places, where affiliated and unaffiliated professionals work side by side or in collaboration. The spaces are used by individuals, teams or other cross-organizational groups, during a specific project phase or for an unlimited period, in addition to other work scenarios or exclusively.” The most significant difference between coworking as envisaged by freelancers and microbusinesses in the early years and companies, who only started developing interest recently, is the community aspect. Whereas participating in an active diverse community is for most companies an important benefit, it is not an exclusion criterion. As the present field experiment suggests, coworking also offers attractive opportunities from a boundary management perspective, where the benefit of individual flexibility is more important than mingling with others and fostering “accelerated serendipity” (Chris Messinas, Co- Founder Citizen Space quoted in Moriset 2013). Coworking is far more than a hype, as a look at the growth rate since 2005 confirms. According to Deskmag (2017), both the number of coworking spaces and members continue to grow rapidly; by the end of 2016, 11 300 Coworking Spaces and 835 000 coworking members were counted worldwide, thereof 70 in Switzerland, where the experiment took place. Not included in these numbers are coworking spaces and seats offered by companies – it can be expected that the number of corporate powered workspaces (Schürmann 2013) will also rapidly increase, as can for example be seen in 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 267 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Josef: Coworking from the Company’s Perspective - Serendipity-biotope or Getaway-spot? Switzerland with the Büro Züri4 powered by ZKB, the Welle 75 from Migros, the BusinessPoint6 from Witzig the Office Company or the public Coworking Space of Microsoft Switzerland7. Although these offers look at a first glance similar, it’s important to distinguish between companies, who offer coworking as part of their product range in separate locations and those, who open up their own workspaces to a wider community (Kojo & Nenonen 2016) with the goal to foster new ways of interacting within their ecosystem. Summarized, companies interested in coworking have the following options available: 1. Coworking as an alternative work scenario: Companies offer their employees coworking as an additional work scenario, complementing the corporate office, home office and mobile work. 2. Replacement for the corporate office: Companies refrain from operating their own offices, e.g. for a subsidiary in a specific region, and use a coworking spaces as an office. 3. Coworking as a new offer: Companies offer coworking as part of their product range and/or open their own workspace for collaboration with externals. Research Methodology This research was undertaken with two main goals. The first was to understand the value proposition that coworking offers from the perspective of companies who operate corporate offices, but are interested in alternative work scenarios in addition to the existing ones. The second was to identify different usage scenarios and based on these to derive insights, how companies can integrate this new work scenario in the existing ones. Research was done in an exploratory way, as both the subject coworking and in particular the perspective of established companies is relatively new in the academic literature and not all relevant aspects are yet discovered (Stebbins 2001). In-depth, semi-structured, qualitative research interviews were conducted. This methodology was chosen as the focus was on understanding the new scenario from the point of view of the participants of the field experiment. 2.1 Study participants The basis for this study is a field experiment, in which voluntary participants of two Swiss ICT companies, 9 from the smaller (a local subsidiary from a global corporation) and 16 from the bigger one (headquartered in Switzerland), took place. During 4 months the 25 volunteers were asked to try out coworking. No specifications were made regarding the expected frequency of usage, the combination with existing work scenarios or the visited coworking spaces; they could choose from over 100 coworking locations within Switzerland8. The participants were informed about the project via social intranet, email, face-to-face discussions with their managers and an optional kick-off event. As all participants volunteered, the group was very heterogenous and consisted of members 268 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Josef: Coworking from the Company’s Perspective - Serendipity-biotope or Getaway-spot? from different teams and with different job profiles; most of them were in marketing or sales roles. All participants came from a company and team culture where it was normal and accepted that work was also done outside of the corporate office or the client’s facility. Except for two participants all were employed with a fulltime contract. They varied quite strongly in their degree of mobility – about half of them (11) still had their personal desk, the others worked with a shared desk concept with (11) or without (3) a clearly assigned home base. Some of them had already been in coworking spaces (workshops, meetings, visits) but no participant was experienced with coworking. As the boundaries between mobile knowledge workers and more stationary knowledge workers are blurring (Jarrahi & Thomson 2016), no further distinction regarding degree of mobility was made. During the four months field experiment a few interventions were made (reminders via social intranet and email or personal by line manager) as the utilization of the coworking spaces was on a very low level from the beginning. The interviews were done at the end of the experiment. 2.2 Data collection The study is a qualitative inquiry based on semistructured interviews with 25 participants of a coworking field experiment. The interviews were mostly done in person in meeting rooms provided by the respective employer, a few were done via Skype. Prior to the interview, the interviewer briefly explained the most relevant facts about the field experiment and the focus of the study. This information was already provided in written beforehand in the process of recruiting the voluntary participants. The interviews were audio recorded and transcribed; they ranged in length from 40 to 65 minutes and were conducted in German or English. The interview protocol was open-ended with the goal, to get a detailed understanding of the person’s work disposition (standard workstyle, work arrangement, role, work preferences, strategies for dealing with mobility, use of technology etc.) as well as of their experiences with the new work scenario coworking. 2.3 Data analyses Data analyses was done based on the exploratory grounded approach chosen as methodology for this study. The audio recordings of the interviews were transcribed, imported in to ATLAS.ti and coded in an open way. Based on the first interviews the interview guidance was slightly adapted, however after 15 interviews a certain saturation could be remarked, where no new themes related to the core focus came up. The usage scenarios, personae, and recommendations were done based on the interviews and an extensive literature research on coworking and new work scenarios from the perspective of companies. Findings The findings are presented as follows: first the insights into factors that were analysed by means of the semi-structured interviews are presented in the form of a general evaluation. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 269 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Josef: Coworking from the Company’s Perspective - Serendipity-biotope or Getaway-spot? It is then followed by the identified benefits and obstacles of coworking from the perspective of companies, which is derived from the interviews in combination with literature research. 3.1 General Evaluation  Utilization: The most surprising finding of the coworking experiment was the low utilization figures. On average the participants went 2.9 times in the coworking spaces within the four months and spent 3.6 hours per visit there. It can be expected that the utilization would have been on an even lower level without the interventions which reminded the participant of the project. Whether the low utilization was based on the short experiment duration, the low eagerness to experiment or the schedules of the participants, which did not allow for more time spend in coworking spaces, was not inquired.  Perception of the experiment: Despite the low utilization, the general feedback of the participants towards the project was throughout positive. Most of them interpreted the pilot project as a sign, that their employer not only tolerated working outside of the office (for example in the home office, where cost savings might be a motivation for the employer) but also invested in new ways of working.  Individual productivity: A small majority (12 vs. 9) stated that they were more productive in the corporate office compared to the coworking spaces. It is noteworthy that most of the participants who said they were most productive in the coworking space, do not like to work from home. It might be interesting to do further research on the question, in which ways the personal boundary management strategies (Gisin, Schulze & Degenhardt 2016) and the individual coworking use cases are interlinked. Since all participants used the coworking spaces for individual work and not for team collaboration, only the individual productivity could be observed. The results of the study might be different if whole teams use (the same) coworking space.  Individual creativity: The participants rated the corporate office followed by the home office as the location where they were most creative, coworking only ranked as third. Given that coworking spaces are often referred to as creative hubs, at least from the perspective of freelancers and microbusinesses, it was surprising to see that the corporate workers did not choose them as preferred location for creative work. Nonetheless mentioned a small majority when asked that they had gained new impulses in the coworking spaces - be it by meeting new people or stumbling across new ideas. Some interviewees attributed the lower creativity to the fact, that they did not have whiteboards, flipcharts or other or other visualization tools available in the coworking space or they did not want to transport them after use to continue working with them.  Use of technology: All interviewees stated that they used the same communication and collaboration technologies as they use in the corporate office, at home or when working mobile. What was different was the amount of 270 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Josef: Coworking from the Company’s Perspective - Serendipity-biotope or Getaway-spot? time they spent in calls compared to the corporate office. A lot of participant went to the coworking spaces especially to make calls or to conduct virtual meetings – this was in particular the case, when they were traveling the whole day and tried to use time in-between external meetings in a productive and way. This usage scenario – coworking as a “filler” for productivity - conflicts with the original purpose and focus of most coworking spaces, which is to bring people together and not to foster undisturbed work and retreat. Besides the disturbance by noise or the fear of disturbing others when doing a call in the open space zone, the participants raised concerns regarding data privacy and protection.  Online and offline community management: Belonging to an active community is one of the main reasons for freelancers and microbusinesses to engage in coworking. One aspect of the interview was therefore, whether this element was also looked for by the participants of the experiment. When asked about contacts with other coworkers in the space, the majority reported that they were hardly any exchanges with others. although most of them did not actively look for new encounters, they saw in networking and informal exchanges with new contacts a big advantage of coworking compared to other work scenarios. Some interviewees mentioned, that they would plan their coworking journey differently in the future, e.g. having lunch with the community, participating in local events or blocking time for informal discussions instead of spending the whole day in virtual meetings or working rigidly through their task lists. Most participants were in contact with the coworking host for the check-in procedure; however, they did not notice any community management measures (Capdevila 2013; Spreitzer, Garret, Bacevice 2015), such as an active introduction to other members. Professional Coworking chains such as WeWork offer also a virtual community management platform, which is mainly used to communicate with the members or to facilitate the exchange between the members. The project team in charge of the field experiment set up a group on the enterprise social platform Yammer, which could be accessed by employees of both participating companies. The goal of using an enterprise social network was to facilitate the project coordination between the project leads and the participants, but also to enable networking amongst the participants, for example to coordinate physical meetings in the coworking spaces. Despite the users’ familiarity with enterprise social networking, the group did not attract any interest from the participants and was not used except by the project leads to share background information about the experiment in the beginning. 3.2 Benefits and Obstacles The following table aims at summarizing the gained insights by listing the most important benefits of coworking as well as the perceived obstacles from the point of view of 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 271 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Josef: Coworking from the Company’s Perspective - Serendipity-biotope or Getaway-spot? established companies, who look at coworking as an additional work scenario complementing the existing ones. Table 1: Summary of Findings, References and Mitigation Benefits of Relevance References Coworking Signal for A lot of companies are experienced with Weibel et. al. 2016; change and remote work and do already grant their Messenger & trust knowledge workers a certain flexibility Gschwind 2016; de regarding time and place, which can be Kok 2016; Leclercq- interpreted as a signal of trust. In the Vandelannoitte & interviews the argument was brought up, Isaac 2016; Nicklin, that the signal for change and an output Cerasoli & Dydyn oriented innovation culture was much 2016; de Leede & more convincing in the case of Kraijenbrink 2014 coworking, because it was a conscious investment in the work culture. Many employees suspect that their employers’ tolerance for home office is motivated by potential infrastructure savings in the corporate office. Coworking is therefore a much stronger signal than just allowing remote work. Networking, Although the interviewees were not De Kok 2016; Simula serendipity and deeply involved in the exchange with the & Ahola 2014; knowledge local community, the aspect of Parrino 2015; Nonaka exchange knowledge exchange and networking 1994 ; Anand & Singh with external stakeholders is interesting 2011; Eagle 2004 from an innovation management (serendipitous encounters, open innovation process), diversity (different backgrounds & experiences) and marketing (access to new target groups) perspective. Flexibility and From the individual worker’s Spreitzer, Garrett & efficiency perspective, coworking helps to increase Bacevice 2015; Johns the personal efficiency; it offers spatial & Gratton 2013 flexibility which helps to cope with mobility (e.g. participating in virtual meetings while traveling). From the company’s perspective, an interesting scenario is to temporarily outsource certain activities, phases of projects or teams to coworking locations, which in 272 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Josef: Coworking from the Company’s Perspective - Serendipity-biotope or Getaway-spot? turn helps them, to balance infrastructure costs, as the corporate office does not need to cover for very spatial needs that diverge from the norm. Boundary Knowledge workers differ in their Ashforth, Kreiner & management boundary tactics, with work-life Fugate 2000; Nippert- integration and separation at the two Eng 1996; Gisin, extreme poles. The findings in the study Schulze & suggest that the two types see different Degenhardt 2016 usage scenarios in coworking. For separators, who do not want to work from home, coworking is an interesting option to practice flexibility and safe commuting time without mingling work and private life. Obstacles of Relevance Mitigation Coworking Possibility of The interviewees were missing separate Coworking spaces retreat spaces for calls and virtual meetings. should increase their Because of their spatial separation from repertoire of work internal and external stakeholders, this is scenarios, in particular an obvious need; however it showed at with regard to rooms the same time, that most of them did not for retreat, if they adapt their behaviour and work schedule want to be more to the new space concept during the attractive for observed phase. corporate coworkers. To gain a maximal benefit of this new space concept, it is important that coworkers also reflect their work behaviour and prioritize other, more creative and collaborative activities in the coworking spaces. Data protection A lot of interviewees were insecure It’s important that the & privacy about the correct handling of delicate employees are fully data and information in coworking aware of data spaces, for example if they had to take sensitivity and their laptops with them during breaks or confidentiality if they could sit next to strangers while classifications. reading confidential emails. Even if Privacy shields for the 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 273 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Josef: Coworking from the Company’s Perspective - Serendipity-biotope or Getaway-spot? rooms for confidential phone calls are screen might already available, the insecurity remains, as these help; room dividers settings are not always soundproof. are effective too, but against the principle of openness lived by most coworking spaces. Coordination Despite the positive attitude towards the The introduction of within new work scenario, a lot of interviewees new work formats organization mentioned their fear of increased should be well and team coordination efforts within the team and accompanied by the organization. Some of them corresponding mentioned, that complexity was already measures and team high because one fraction of the team discussions. Team was always traveling or working from chats and enterprise home. This concern raised the question, social platforms can whether the reduced face time for formal support the and informal interactions within the coordination. organization would not lead to a decrease of team productivity, connectedness and identification with the organization. Equipment of Whereas about half of the experiment Coworking spaces space and participants expected to have the same should actively workplaces equipment available in the coworking communicate about space as in the corporate office (monitor, their equipment to ergonomic furniture, flipcharts etc.) the facilitate the selection other half was indifferent; most of the right space. appreciated the variety and “used what was there”. Other important success factors mentioned by many interviewees as important requirements were the network quality and ease of access, a simple booking and billing process for the coworking hours consumed (most stated clearly that the billing should be done via the corporation directly and not via expense management), the geographical location and the proximity to public transportation as well as good quality of coffee. As these factors do not differ from the needs of freelancers and microbusinesses they were not in the focus of the study. 3.3 Coworking Personae Based on the interviews and literature research, the study author tried to identify different poles of usage and expectations and grouped them into different personae. The goal of the personae is not to identify a distinct behavior, but to visualize the different needs which in turn allows to build different coworking journeys. The personae might also be 274 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Josef: Coworking from the Company’s Perspective - Serendipity-biotope or Getaway-spot? helpful when it comes to discussing different situational preferences and spatial needs in the corporate office. A similar attempt to classify the different users was done by Bilandzic & Foth (2013), who distinguish in their studies about coworking in libraries between those who use coworking-spaces mainly because of the offered infrastructure, learners who use coworking-spaces to acquire knowledge and have an exchange with peers, and socializers who search for recognition and acknowledgement. Figure 3: Coworking Personae As Figure 3 shows, the interviewees diverged most regarding the two following axes:  Connectedness: are coworking spaces primarily used to get access to a (different) community or to dissociate from the team/office or family/home?  Disposition: are coworking spaces primarily used to get inspiration from the different space and community or with the goal to increase of efficiency, e.g. bridging time between meetings. Discussion The duration of the observed experiment was a rather short period when it comes to analyzing the acceptance and embedding of this new work scenario into existing ones. It is above all too short to observe the changed behavior based on new interpretations of coworking, which in turn will also lead to new interpretations of the corporate office, home office and mobile work. Orlikowski’s (2008) practice lens addresses changes in technology use over time, where users “may, deliberately or inadvertently, use it in ways not anticipated by the developers”. These new interpretations lead to new work practices – and as these work practices change, interpretations of the technology’s function change too (Leonardi, Treem & Jackson 2010). It would therefore be interesting to observe and discuss theses multiple interpretations and associated changes in work practices over a 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 275 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Josef: Coworking from the Company’s Perspective - Serendipity-biotope or Getaway-spot? longer period. One of these new interpretations was the reason for the title of the study: whereas the experiment leads and study author would have expected, that participants were most interested in new serendipitous encounters, several felt like one participant who stated: “I like coworking. It gives me a rest from my superior and my family.” Addressing these different expectations and perceptions and dealing with the multiple interpretations over time as mentioned is an important management aspect – when companies want to benefit from new work practices, they also need to assume responsibility for the organizational learning process. One concrete example is to address whether it makes sense to go to a coworking space when the agenda is fully booked with calls and virtual meetings. The measured utilization figures are also an interesting point of discussion. Whether they were so low, because the pilot duration was too short or because the participants schedules did not allow much time for experimentation or if they preferred working from home or on the road instead of discovering new scenarios is unclear. The conclusion, that they were not interested in coworking or that it offers no value to companies falls short also with regard to the very positive reactions they expressed in the interviews. Conclusion The biggest consensus amongst all study participant was reached with the question, whether they would like to trade in their corporate office for coworking. None of the interviewees opted for this scenario; most of them mentioned the importance of their office as center of gravity and/or identification. Part of this reaction can be explained, that they were scattered to over 100 locations and participated as individuals, not as teams in the pilot project. One element which came out clearly in the study is that networking, serendipitous encounters and informal knowledge exchange with other members do not come for free in coworking spaces – it needs concrete measures if these benefits are the main motivation for companies to invest in coworking. These findings are in line with other research, e.g. Parrino (2015) who showed in two case studies that co-location does not automatically lead to interactions and knowledge exchange between individuals. Both the focus of the coworking space (community versus business service etc.) as well as the policies that promote interactions amongst members are decisive factors that determine whether interaction and knowledge exchange takes place (Parrino 2015). Similar findings are presented by Spinuzzi (2012) who differentiates between “good neighbours” and “good partners”, depending on whether people just work side by side on their own projects or collaborate in a more intense way. The interviews also highlighted the relevance of the work and leadership culture for the successful adoption of new work scenarios. As Possenriede & Plantenga (2014) demonstrated, both schedule and location flexibility have a positive impact on job satisfaction. However only schedule flexibility has a positive impact on work-life 276 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Josef: Coworking from the Company’s Perspective - Serendipity-biotope or Getaway-spot? balance; location flexibility has a neutral impact. It is therefore important, that coworking is not only seen as an attractive additional work location, but that also a certain autonomy to plan the work schedule is granted. Coworking is not only interesting as a new work scenario outside of the corporate office. Many learnings can also be used for the redesign of the corporate offices and the collaboration culture or as Spreitzer, Bacevice & Garett (2015) comment the current transformation of many corporate offices: “the company is reverse-engineering its office into a coworking space.” Notes 1 see also http://codinginparadise.org/ebooks/html/blog/start_of_coworking.html 2 http://wiki.coworking.org/w/page/16583831/FrontPage 3 http://coworkingmanifesto.com/ 4 www.buero-zueri.ch 5 www.welle7.ch 6 www.witzig.ch/de/find/businesspoint 7 https://blog.hslu.ch/crealab/2016/11/30/wie-innovationsfaehigkeit-und-unternehmenskultur- zusammenspielen/ 8 By the end of 2016, Coworking Switzerland counted 70 Coworking Spaces. The facilitator of this project, the Swiss booking platform Popupoffice.ch, offers over 100 locations, since also spaces that do not fall under the definition of coworking in a narrow sense are included (e.g. single desk in PR agency). References Papers Anand, A., & Singh, M. D. (2011). Understanding knowledge management. International Journal of Engineering Science and Technology, 3(2), 926-939. Amstutz, S., & Schwehr, P. (2014). Human Office: Arbeitswelten im Diskurs (Vol. 5). vdf Hochschulverlag AG Ashforth, B. E., Kreiner, G. E., & Fugate, M. (2000). All in a day's work: Boundaries and micro role transitions. Academy of Management review, 25(3), 472-491. Bailey, D. E., & Kurland, N. B. (2002). A review of telework research: Findings, new directions, and lessons for the study of modern work. Journal of organizational behavior, 23(4), 383-400. Bilandzic, M., & Foth, M. (2013). Libraries as coworking spaces: Understanding user motivations and perceived barriers to social learning. Library Hi Tech, 31(2), 254-273. Bouncken, R. B., & Reuschl, A. J. (2016). Coworking-spaces: how a phenomenon of the sharing economy builds a novel trend for the workplace and for entrepreneurship. Review of Managerial Science, 1-18. Cappelli, P., & Keller, J. R. (2013). Classifying work in the new economy. Academy of Management Review, 38(4), 575-596. Capdevila, I. (2013). Knowledge dynamics in localized communities: Coworking spaces as microclusters. Browser Download This Paper. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 277 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Josef: Coworking from the Company’s Perspective - Serendipity-biotope or Getaway-spot? De Leede, J., & Kraijenbrink, J. (2014). The mediating role of trust and social cohesion in the effects of new ways of working: a Dutch case study. Human Resource Management, Social Innovation and Technology (Advanced Series in Management, Volume 14) Emerald Group Publishing Limited, 14, 3-20. De Kok, A. (2016). The New Way of Working: Bricks, Bytes, and Behavior. In The Impact of ICT on Work (pp. 9-40). Springer Singapore. Eagle, N. (2004). Can serendipity be planned?. MIT Sloan Management Review, 46(1), 10. Gandini, A. (2015). The rise of coworking spaces: A literature review. ephemera, 15(1), 193. Gisin, L., Schulze, H., & Degenhardt, B. (2016). Boundary Management as a Crucial Success Factor for Flexible-Mobile Work, Demonstrated in the Case of Home Office. In Advances in Ergonomic Design of Systems, Products and Processes (pp. 375-394). Springer Berlin Heidelberg. Jarrahi, M. H., & Thomson, L. (2016). The interplay between information practices and information context: The case of mobile knowledge workers. Journal of the Association for Information Science and Technology, 162-179. Johns, T., & Gratton, L. (2013). The third wave of virtual work. Harvard Business Review, 91(1), 66-73. Kalleberg, A. L. (2000). Nonstandard employment relations: Part-time, temporary and contract work. Annual review of sociology, 26(1), 341-365. Kojo, I., Nenonen, S. (2016). Typologies for co-working spaces in Finland–what and how?. Facilities, 34(5/6), 302-313. Kurland NB, Bailey DE (1999) Telework: the advantages and challenges of working here, there, anywhere, and anytime. Organ Dyn 28:53–68. Leclercq-Vandelannoitte, A., & Isaac, H. (2016). The new office: how coworking changes the work concept. Journal of Business Strategy, 37(6), 3-9. Leonardi, P. M., Treem, J. W., & Jackson, M. H. (2010). The connectivity paradox: Using technology to both decrease and increase perceptions of distance in distributed work arrangements. Journal of Applied Communication Research, 38(1), 85-105. Makimoto, T., & Manners, D. (1997). Digital nomad. Wiley. Messenger, J. C., & Gschwind, L. (2016). Three generations of Telework: New ICTs and the (R) evolution from Home Office to Virtual Office. New Technology, Work and Employment, 31(3), 195-208 Moriset, B. (2013). Building new places of the creative economy. The rise of coworking spaces. Nonaka, I. (1994). A dynamic theory of organizational knowledge creation. Organization science, 5(1), 14-37. Nicklin, J. M., Cerasoli, C. P., & Dydyn, K. L. (2016). Telecommuting: What? Why? When? and How?. In The impact of ICT on work (pp. 41-70). Springer Singapore. Nilles, J.M. (1975), ‘Telecommunications and Organizational Decentralization’, IEEE Transactions on Communications 23, 10, 1142–1147 Nippert-Eng, C. (1996, September). Calendars and keys: The classification of “home” and “work”. In Sociological Forum (Vol. 11, No. 3, pp. 563-582). Kluwer Academic Publishers-Plenum Publishers. Oldenburg, R. (1989). The great good place: Cafes, coffee shops, community centers, beauty parlors, general stores, bars, hangout, and how they get you through the day. New York: Paragon House Orlikowski, W. J. (2008). Using technology and constituting structures: A practice lens for studying technology in organizations. In Resources, co-evolution and artifacts (pp. 255-305). Springer London. 278 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Josef: Coworking from the Company’s Perspective - Serendipity-biotope or Getaway-spot? Parrino, L. (2015). Coworking: assessing the role of proximity in knowledge exchange. Knowledge Management Research & Practice, 13(3), 261-271. Possenriede, D. S., & Plantenga, J. (2014). Temporal and locational flexibility of work, working- time fit, and job satisfaction. Ross, P., & Ressia, S. (2015). Neither office nor home: Coworking as an emerging workplace choice. Employment Relations Record, 15(1), 42. Schürmann, M. (2013). Coworking Space. Geschäftsmodell für Entrepreneure und Wissensarbeiter. SpringerGabler, Wiesbaden. Simula, H., & Ahola, T. (2014). A network perspective on idea and innovation crowdsourcing in industrial firms. Industrial Marketing Management, 43(3), 400-408. Spinuzzi, C. (2012). Working alone together: Coworking as emergent collaborative activity. Journal of Business and Technical Communication, 26(4), 399-441. Spreitzer, G., Bacevice, P., & Garrett, L. (2015). Why People Thrive in Coworking Spaces. Harvard Business Review, 9, 2015. Spreitzer, G., Garrett, L., & Bacevice, P. (2015). Should your company embrace coworking?. MIT Sloan Management Review, 57(1), 27. Stebbins, R. A. (2001). Exploratory research in the social sciences (Vol. 48). Sage. Weibel, A., Den Hartog, D. N., Gillespie, N., Searle, R., Six, F., & Skinner, D. (2016). How do controls impact employee trust in the employer?. Human Resource Management, 55(3), 437- 462. Web Pages Bradley Neuberg, http://codinginparadise.org/ebooks/html/blog/start_of_coworking.html, accessed 19.02.2017 Coworking Wiki, http://wiki.coworking.org/w/page/16583831/FrontPage accessed 15.02.2017 Coworking Manifesto, http://coworkingmanifesto.com/; http://wiki.coworking.com/w/page/35382594/Coworking%20Manifesto%20(global%20- %20for%20the%20world) accessed 15.02. 2017 Deskmag, http://www.deskmag.com/en/the-complete-2017-coworking-forecast-more-than-one- million-people-work-from-14000-coworking-spaces-s accessed 19.02.2017 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Wellness Technology Use in Everyday Life: A Diary Study 20 TUOMAS KARI, EEVA KETTUNEN, PANU MOILANEN & LAURI FRANK Abstract Digital wellness technologies and their use have become exceedingly popular. More and more people are using them in their everyday lives. Respectively, the need to understand their users and usage has increased. This study aims to deepen the understanding of how people use and perceive wellness technologies in their everyday lives. Empirically, the study is based on diaries collected from 18 participants over a six-week period, which are analysed using thematic analysis. The results show that the use of wellness technologies can positively influence wellness motivation. Further, they can help people to learn more about their own wellness related behaviour and its effects (learning-effect). Experience of gamification can influence motivation positively. It also seems that some people engage in self-gamification, which is defined in this study as a desire-based action to gamify some recurring activities or bodily functions. Keywords: • Digital Wellness • Wellness Technology • Sports Technology • Gamification • Self-gamification • Diary Study • eHealth • CORRESPONDENCE ADDRESS: Tuomas Kari, University of Jyvaskyla, Seminaarinkatu 15, 40014 Jyväskylän yliopisto, Finland, e-mail: tuomas.t.kari@jyu.fi. Eeva Kettunen, University of Jyvaskyla, Seminaarinkatu 15, 40014 Jyväskylän yliopistoj, Finland, e-mail: eeva.k.kettunen@jyu.fi. Panu Moilanen, University of Jyvaskyla, Seminaarinkatu 15, 40014 Jyväskylän yliopistoj Finland, e-mail: panu.moilanen@jyu.fi. Lauri Frank, University of Jyvaskyla, Seminaarinkatu 15, 40014 Jyväskylän yliopistoj, Finland, e-mail: lauri.frank@jyu.fi. https://doi.org/10.18690/978-961-286-043-1.20 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si 280 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Kari, E. Kettunen, P. Moilanen & L. Frank Wellness Technology Use in Everyday Life: A Diary Study Introduction During the past years, individuals and healthcare sector have become increasingly interested in measuring and promoting various aspects of wellness and health by using different technological solutions. Although different technological solutions for personal wellness have been around for quite a while, the whole business field of wellness technology is still at a relatively unmature stage and rapidly growing (Grand View Research, 2016: Welltodo, 2016). There is a wide variety of products ranging from exercise and wellness applications to activity trackers and versatile sport watches in the market, and completely new solutions are released constantly. Typical to these devices is that they can be used for self-tracking purposes (Kari et al., 2016a). The findings of Miyamoto et al. (2016) suggest that tracking wellness related data alone may result in heightened awareness of daily activity, but it may not be adequate to sustain the use of wellness technologies, which often have low retention rates. Wang et al. (2016) found that a wellness application is more effective the more frequently it is used, and more effective when used over a longer period of time compared to short-term use. Such reports and findings demonstrate the growing need for studying the usage of these technologies. Regardless of the business field, it is essential to understand as much as possible about the target audience. Studying consumers’ motives and habits is important to deepen the understanding about their desires and needs. There exists a wide variety of user characteristics within the wellness technology users, and different target groups have different set of requirements (Warrich, 2016). As wellness technologies are ever more used, there is a growing need to deepen the understanding on their users and thus, it is important to research them to gain new understanding on this matter. The purpose of this study is to deepen the understanding of how people use and perceive wellness technology in their everyday lives. Besides the many aspects regarding wellness technology use itself, the focus of the study is also on how wellness technology gamification is perceived and whether it motivates people in their wellness related activities. Third point of interest is how people think integrating wellness technologies into their lives is seen by other people, and how these thoughts might influence their wellness technology usage in general. The main research questions studied in this paper are: 1) What kinds of feelings do wellness technologies and their use wake among their users? 2) How do people experience gamification with wellness technology and how does technology support gamifying? 3) How do people perceive other people’s views on their wellness technology usage and gamification? The term wellness technology is used as an overall term for different kinds of technological health, wellness, and sports related solutions that people use in their 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FORM CONNECTING THINGS TO 281 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Kari, E. Kettunen, P. Moilanen & L. Frank Wellness Technology Use in Everyday Life: A Diary Study everyday lives. Such solutions include e.g. devices, applications, and services. The study follows a qualitative approach and the empirical analysis is based on diaries collected from 18 participants over a six-week period. The results of this study can help the wellness technology providers in deepening their understanding on wellness technology usage and in providing solutions that are better welcomed by their target audiences. The findings may also assist people working in the healthcare sector in implementing different wellness technologies for health and wellness related purposes. The paper comprises of six sections: introduction, theoretical background, methodology, results, conclusion, and finally the limitations and future research section. Theoretical Background 2.1 Motivation and Wellness Technology The actions and behaviours of individuals are influenced by observations on how other people act. According to Bandura’s social cognitive theory, observational learning and social experience play an important role in people’s personality development and in the development of their self-efficacy (Bandura, 1989). Self-efficacy refers to one’s own belief in one’s own capability to do a task, which in turn affects their motivation to attempt that task. People with high self-efficacy feel a task more attainable and less difficult and trust their abilities to perform it, whereas people with low self-efficacy might perceive a task as too difficult and may be less motivated to perform it (Bandura, 1998). According to Ryan and Deci (2000), motivation can be divided into intrinsic and extrinsic motivation. Intrinsically motivated people perform activities such as exercising just because of the pleasure of doing it, whereas more extrinsically motivated people do the activity because they see it as a tool of gaining something else they are interested in, such as competition prizes from a race or acceptance from their peers. A person who does not have any motivation to perform a task is considered amotivated. There has been a substantial interest in the role of wellness technology to motivate people to be more physically active or to adhere to physical activity guidelines (see e.g. Marcus, Ciccolo & Sciamanna, 2008). In this kind of research, wellness technology is assessed especially from the points of view of various models of behavioural change – especially the transtheoretical model by Prochaska and DiClemente (2015) – or motivational psychology. Results concerning the role of wellness technology are somewhat contradictory. According to a systematic review by Sjögren et al. (2013), one cannot be certain that technology contributes to adherence in intervention studies, but the role of technology should be researched further. However, if technology-based interventions (including exergaming) are used in rehabilitation, wellness technology seems to increase the physical activity of intervention participants (Rintala et al., 2016). This is interesting, 282 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Kari, E. Kettunen, P. Moilanen & L. Frank Wellness Technology Use in Everyday Life: A Diary Study as this research finding suggests that the main motivation for the increase has to be based on personal and intrinsic motivation and it can be strengthened with technology. The reasons why different kinds of wellness technologies are acquired seem to vary. Previous research has shown that the usage intentions of different solutions can be driven by both utilitarian or hedonic perceptions (e.g. Kari & Makkonen, 2014; Makkonen et al., 2012a; Makkonen et al., 2012b). 2.2 Gamification and Exercise Motivation Gamification refers to the use of game elements in non-game contexts (Deterding et al., 2011). The common purpose of gamification is to motivate users to behave in desired ways by making the user experience more playful and enjoyable (Deterding et al., 2013). Implementing gamification has become very popular in various different contexts (Hamari, Koivisto & Sarsa, 2014b). As the utilization of gamification has grown, it has become a subject of growing interest in academic research as well (cf., Hamari, Koivisto & Pakkanen, 2014a; Hamari et al., 2014b). Kari et al. (2016b) proposed recently that a division should be made between the process of gamification and the experience of gamification. Kari et al. (2016b, p. 400) define the process of gamification as “using a set of activities with the aim to implement game elements to non-game context” and the experience of gamification as “a use experience in non-game context that the user perceives as gameful”. Commonly, the process of gamification aims to create an experience of gamification for the user. Yet, the experience of gamification can also arise from non-gamified features (Kari et al., 2016b). In this study, the focus regarding gamification is especially on the experience of gamification. Gamification can be an efficient approach to influence user behaviour and use of an application (Law, Kasirun & Gan, 2011). It can also have a positive impact on motivation in general, but differences occur between different solutions, elements, and also between individuals (e.g. Fitz-Walter, Tjondronegoro & Wyeth, 2012; Gawley et al., 2016; Hamari et al., 2014b; Kari et al., 2016b). In the context of wellness technology, these individual differences can be traced to such personal characteristics as attitudes towards sports technology, exercise habits, and competitiveness. Different people also experience gamification in different ways (Kari et al., 2016b). Overall, the experience of gamification can influence a user’s exercise motivation positively (Kari et al., 2016b). A recent study shows that the relevance of gamification in wellness domain will continue increasing (Kari et al., 2016c) Methodology This study followed a qualitative approach. It can be defined as a diary study based on phenomenographic approach. Phenomenography is a research method originally developed by Ference Marton (1981) in Sweden. As the name suggests, 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FORM CONNECTING THINGS TO 283 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Kari, E. Kettunen, P. Moilanen & L. Frank Wellness Technology Use in Everyday Life: A Diary Study phenomenography is linked to phenomenological philosophy, in which the attention is directed to the world as humans experience it. Hence, the research object here is the human experience on the use of wellness technology in everyday life. Phenomenography is especially popular research method in educational sciences, but lately it has been adapted to information systems (IS) research as well (see e.g. Kaapu & Tiainen 2012). Phenomenography was well suited to the research setting, since phenomenography brings out the essential in users’ view and can reveal the variation in it. Phenomenographic studies are usually based on textual data, e.g. transcribed interviews, essays, or diaries. In the research setting of this study, user diaries were selected as data collection methods. Diary study was selected as the method because its ability to provide more authentic information on human-technology relationships and technology use in situ (e.g. experiences and feelings), as the so-called presentation effects (i.e., participants may act differently due to the presence of a researcher) are diminished (Carter & Mankoff, 2005). The voluntary participants for this study were recruited from a list of participants from an earlier study. They had expressed to be available to participate in research related to sports and wellness technology. The goal was to get 15 to 20 participants for the study. To recruit the participants, during late 2015, invitation e-mail to participate in the study was sent out to 50 potential participants, out of which 35 replied. Out of those 35 who replied, 22 signed up for the study. No restrictions were placed regarding the participants (e.g. their demographics, physical activity level, wellness technology usage, gamification activities), as the goal was to reach varying kinds of participants. However, all the participants were from Finland. The participants were asked to keep a diary of their wellness related technology usage and perceptions for six weeks. They were also asked to provide basic demographic information on a separate sheet. All the participants received an information letter, in which the central terms – wellness technology and gamification – were explained. The participants were also given instructions regarding keeping the diary. They were especially asked to focus on three different aspects in their diaries and write down opinions, thoughts, feelings, experiences, and perceived effects regarding: 1) Wellness technologies and their use, 2) wellness technology and gamification (e.g. using wellness technologies with gamified features, gamifying different health behaviours, experience of gamification), and 3) perceptions on other people’s views on one’s own wellness technology use and gamification. They could choose how to keep the diary themselves. All the participants wrote it electronically. The participants were not given any strict time limits regarding when the six-week period should take place. The return dates of the diaries ranged from December 2015 to February 2016. After the six-week period, the diaries were returned electronically to one of the authors. Out of the 22 participants, four dropped out during the study. As a result, diaries were received from 18 participants. This can be considered to be an adequate amount for this qualitative study. 284 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Kari, E. Kettunen, P. Moilanen & L. Frank Wellness Technology Use in Everyday Life: A Diary Study To analyse the data, thematic analysis was used. This analysis method is often used especially when researching matters of common everyday life, since it provides practical answers to the research problems (Eskola & Suoranta, 2014). It is also the most widely used analysis method of qualitative research (Guest, MacQueen & Namey, 2012) and enables organizing and describing the data with rich detail (Braun & Clarke, 2006). The actual data analysis was guided by Braun and Clarke (2006). Following their suggestion, the guidelines were adjusted to fit the research subject and the data. Thematic analysis was used to identify, analyse, and report patterns within the collected data. The analysis started with familiarizing oneself with the data and marking all the interesting features of it. The data was then divided into three different themes for each individual. The themes were as follow: 1) wellness technology use and perceptions in everyday life, 2) wellness technology and the experience of gamification, and 3) perceptions on other people’s views regarding one’s own wellness technology usage and gamification. After this, all three themes were separately studied by examining all the participants’ answers under that particular theme and searching for similarities and differences. These were then reviewed in relation to the data. The analysis also aimed at interpreting specific aspects and exceptions of the investigated matter. Finally, the report was produced. As Braun and Clarke (2006) propose, the analysis process was a recursive and non-linear, as it moved back and forth between the different phases of analysis. Results In total, the study had 18 participants. Four of the participants were male and 12 were female. The age of the participants ranged from 18 to 70 and the average age was 39.6 years. More detailed description of the sample can be found from the appendix. 4.1 Wellness Technology Use The wellness technologies used by the participants varied from activity trackers and heart rate monitors to smart scales and step counters as well as different mobile applications related to wellness and physical activity. Few also reported the usage of exergames – digital games requiring aerobic physical effort from the player (Kari & Makkonen, 2014) – or other gamified applications. The most common reason for acquiring a device or an application was to get more accurate data on personal exercising or health; data that is not only based on own feelings. GPS features were also considered as important by many participants. Most participants liked how they were able to get varying and interesting data with the help of wellness technology. Many were using the technology to control their exertion level during physical activity either by checking that they were not training with too high intensity or that they were training with intensity high enough. Wellness technologies were also considered to have motivational elements, since they provided a reliable tool for setting goals. Most of the participants reported that wellness technologies had positively affected their motivation by enabling them to see and compare their own exercise data. Seeing longer-term improvement regarding exercise 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FORM CONNECTING THINGS TO 285 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Kari, E. Kettunen, P. Moilanen & L. Frank Wellness Technology Use in Everyday Life: A Diary Study and health typically added their motivation. For some of the participants, using a wellness technology device in their training made them train harder or longer. For example, being able to follow data while exercising could increase motivation to do more through running longer, lifting more weights, or training with higher intensity. “In indoor cycling, I speed up if my heart rate is too low, and while running it is motivating to see how far I have gone”. Some participants reported they were intrinsically motivated to exercise and for some of them using wellness technology did not bring any extra motivation. Some participants reported wellness technology being able to increase their motivation during their more active exercise periods. However, when they feel less physically active, using wellness technology and seeing your own data could actually decrease exercise motivation. Respectively, some reported that when things are going well, the information from the technology makes one happy, but when things are going badly, the information from the technology can be annoying. For some participants, wellness technology also had some educational effects such as learning more about training intensity, calorie consumption, and heart rate levels, and being able to better compare objective data to subjective feelings. This kind of learning- effect could also lead to discontinuance in using the technology, as it was felt that the technology could not provide any new or interesting information. Some participants raised the question about the reliability of wellness technology. They highlighted the fact that their devices sometimes do not work properly. Participants found this annoying since they would rather focus on their own performance during the exercise than thinking whether their device works at that moment. Some participants also emphasised that people should not always blindly trust the information received from wellness technology since the information is never completely individualised for them. Some participants were also reluctant to value wellness technology data and its accuracy over their own feelings. Some were commenting that “Why can exercise be considered hard only then if the result is proven by a sport watch?”. The most common negative remark about wellness technology was related to technical problems that occur during exercise. For some, this might even bring the feeling that the exercise has gone to waste; “If the heart rate monitoring stops working during exercise, I want to throw the device into a rubbish bin”. Another case when technology might bring negative feelings is when people forget to take it along to their exercises or when some wellness application does not work on a specific device. Some participants considered sport watches to be so big in size that they did not want to use them during any other time than while exercising, which limited their usefulness in tracking other everyday wellness related activities such as sleep or general activity. While some participants felt it was “easy” to wear wellness technology devices, others felt wearing them was uncomfortable and sometimes even pointless, for example, when 286 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Kari, E. Kettunen, P. Moilanen & L. Frank Wellness Technology Use in Everyday Life: A Diary Study their training focus was on strength training instead of aerobic training. In other words, the willingness to use technology was also partly associated with the conducted activity or sport. Few participants reported that keeping a log of their own exercises was hard work with or without the help of wellness technology. Some also emphasised the fact that some wellness technology devices and applications are too difficult to use. For one participant, tracking exercises created too much stress about exercising and therefore woke the need to stop using all devices. Several participants associated wellness or sports technology use with hard and intensive training with set goals. They did not consider themselves as athletes and therefore did not see why they would need to use or how they would benefit from using wellness technologies. Some of them were afraid that adding new technologies to their exercise routines would take some of the fun away by making it more goal oriented and strict, subsequently decreasing the intrinsic motivation to be physically active. The study also included four participants from the “young elderly” age group, i.e., 60–75 years of age (Carlsson & Carlsson, 2016). Studying the young elderly age group is deemed important, as they are a growing and a very large group of individuals with a rising need for different digital wellness solutions (Carlsson & Carlsson, 2016). Bearing in mind that the study only had four participants from this category, the data supports this notion by Carlsson and Carlsson (2016), as all the young elderly participants were using some sort of technology to support personal wellness. However, among the young elderly, the polarisation was quite apparent. At its simplest, the technology used by two participants was restricted to just a blood pressure meter or an electronic scale, whereas the other two were using sports computers with their various features and electronic training diaries. Interestingly, only one saw age as any kind of limitation regarding the use of these technologies. 4.2 Wellness Technology and the Experience of Gamification Almost all participants who were using wellness technology reported they were comparing (a form of gamification) their own previous health and exercise related results to their current ones to keep track of their development and fitness level. This data was often received from a sport or wellness technology device. Some participants reported they compared their old and new data also to see how their technique had developed. This kind of comparison also seemed to wake experience of gamification. However, when it comes to sharing data in social media or comparing own data with other people’s data, the situation was different. Most participants felt their exercise data is personal. Few participants compared any of their data with family members’ data or to other people's data that can be seen, for example, in some web service. Only those participants who did some level of competitive sports, more constantly compared their results or data with their training partners. Considering this, it seemed that the experience of gamification rather comes from comparing own data with own data than comparing own data with data from others. An exception to this seems to be different voluntary physical activity 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FORM CONNECTING THINGS TO 287 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Kari, E. Kettunen, P. Moilanen & L. Frank Wellness Technology Use in Everyday Life: A Diary Study challenges that people can participate. Comparing own activity level to that of others within these voluntary challenges was seen as gameful and motivating by those taking part. When participants explicitly reported about the type of gamifying they do, they also most often referred to comparing their own results with their own exercise history and data with the help of some technology. Some participants set a goal to reach enough daily activity, to walk or run the same route with a faster pace than before, or to be able to maintain a lower heart rate than in previous runs. Strength training was also reported to be something where the gamified aim is to reach the “next level”. More competitive exercisers reported gamifying by comparing their own training and race results to previous ones or trying to improve their own scores in competitions or lap times during training. Some participants reported to challenge themselves by tracking their weight on a regular basis. One participant reported using a gamified application to drink enough water. Overall, different technologies were regularly mentioned to support these gamified activities. Considering the motivational effect, many participants reported that this kind of gamifying brought extra motivation. One participant described that the activity tracker reminds a Tamagotchi (a digital pet that was hugely popular in the 1990’s) with the need to “feed it and keep eye on it on a regular basis”. Few participants were also using gamified applications or doing geocaching, which as an activity is all about integrating technology into exercise by adding extra gamified elements into regular hiking, walking, or running session. For these participants, having the gamification element made them venture further and visit different places. Exergaming was also mentioned as a one form of exercise. Among the young elderly, the participants’ reports were similar. Most commonly, the experience of gamification came from comparing own current data with own previous data – often with the help of some technology. This was also considered motivating and an enjoyable means to support reaching personal goals. One also mentioned occasionally playing exergames. It seemed that some people also engage in a sort of self-gamification, which can be defined as a desire-based action to gamify some recurring activities or bodily functions. Pursuing the experience of gamification by self-gamification could begin as non- technical, but later on, some technology was implemented to support the gamifying. 4.3 Perceptions on Other People’s Views of Wellness Technology Use Most of the participants neither shared their wellness related data with other people nor felt the need to tell anybody that they were tracking their wellness. Some felt exercising was their own personal thing and no one else’s business, and some were reluctant to show their results to anybody because they felt other people exercise more and have better results. Some believed that no one would be interested in whether or not they track their wellness or exercise, because it is considered so normal these days. Some had the 288 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Kari, E. Kettunen, P. Moilanen & L. Frank Wellness Technology Use in Everyday Life: A Diary Study perception that many others usually view tracking as too difficult or time consuming and therefore not worth doing. Some reported that other people had asked them about their use of the device they were wearing. Some participants were even a little bit ashamed of their exercising and results. One participant was worried to be seen as too old-fashioned if anybody knew about the habit of doing exercise with an exercise video. Another participant reported to be sure other people would consider geocaching to be a too childish hobby. Some applications also seem to have a negative image, and people were not eager to admit they were using such application. One such example was a calorie-tracking application, which was associated as a tool for overweight people. One participant felt embarrassed to wear a sport watch due to feeling concerned to be seen as an athlete by others, even though being just a regular exerciser; “In badminton it can be embarrassing to wear a sport watch since my opponent is better than I am. It makes me feel I take this too seriously. I try to start my watch in a way that is as unnoticeable as possible”. The perceptions were similar among the young elderly. If anything, they seemed to feel even more strongly about not wanting to share their own personal data with other people. They also believed that their friends would not be interested in their own data. Respectively, they reported to be very uninterested in the data of their friends. Even though there were more negative perceptions regarding other people’s views on personal wellness technology use, a few participants reported they felt proud and got extra motivation when other people saw them doing something different and positive such as running or using a wellness technology. Conclusion The purpose of this study was to deepen the understanding of how people use and perceive wellness technologies in their everyday lives. The focus was also on related gamification and perceptions regarding other people’s views. A qualitative diary study based on phenomenographic approach was conducted. The study included diaries from 18 participants who kept diaries for six weeks regarding their wellness technology usage and related issues. The most common reason for acquiring a wellness technology was to get more accurate and objective data. Motivational effect was also an important factor behind acquiring one. Based on the data, it seems that the use of wellness technologies can positively influence wellness motivation. For some, a mere buying of a device brings additional motivation, but for the majority, being able to follow personal progress by receiving objective data and that way comparing own results to previous results is the key motivational factor. This implies that it would be worthy for the designers and the parties aiming to increase 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FORM CONNECTING THINGS TO 289 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Kari, E. Kettunen, P. Moilanen & L. Frank Wellness Technology Use in Everyday Life: A Diary Study people’s wellness to provide technologies with features that enable following one’s own progress in desired areas of wellness. In general, wellness technologies can help people to learn more about the level of physical activity and training effects. Regarding the finding that a learning-effect could lead to discontinuance in using the technology, it demonstrates that even if the user would stop using the technology, it does not necessarily mean that the technology or its use would have been a failure, but instead a success in a way of being able to teach the user the things he or she wanted to know. This was an interesting new finding and something to consider, for example, when investigating the retention or use continuance with these technologies and also IS in general. The biggest concerns the users seem to have are related to the situations where the device stops working during an exercise or for some reason does not record the entire exercise session properly. For some, this may even be a reason to stop exercising. Therefore, to achieve longer-term motivation, for some people it would be better to use devices and applications they are already familiar with. Both users and those promoting wellness should acknowledge this. Another concern was related to wearing a wellness device, such as a sport watch. Whereas some described wearing one to be perfectly “easy” and normal, some reported not feeling comfortable wearing one outside exercising or sometimes not even when exercising. This obviously limits their usefulness in tracking other daily wellness related activities. Thus, these devices should be designed as ubiquitous and as easy-to-wear as possible, also acknowledging the look of the device and the different user groups. Regarding gamification, the most common type of gamifying seems to be comparing personal results or data with previous personal data – usually with the help of some technology. This kind of comparison also seemed to wake experience of gamification, which, in turn, was reported to influence motivation positively. It also seems that some people engage in self-gamification, which we define as a desire-based action to gamify some recurring activities or bodily functions. Interestingly, pursuing the experience of gamification by self-gamification can begin as non-technical, but later on, be supported by the use of some technologies. In general, including a gamification element to wellness related activities seems to bring extra challenge, motivation, or even make the activity as more enjoyable. Thus, people struggling with their wellness motivation could try self- gamification or some gamified technological wellness solutions. The designers should undertake the process of gamification, for example, implement their devices and application with gamified features. The societal parties working with wellness promotion might be able to increase the effectiveness of their interventions with gamification. With the exception of more competitive individuals, most participants did not feel the need to share their training data with other people since the information was generally considered personal. Some were also concerned how other people view their wellness technology use. This implies that the marketers of these solutions could benefit from 290 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Kari, E. Kettunen, P. Moilanen & L. Frank Wellness Technology Use in Everyday Life: A Diary Study making it seem that the use of these devices is common and socially acceptable among their target audiences. Regarding the young elderly, experiences of gamification were similar with people of other ages. Compared to others, they felt more strongly about the personality of their own data and felt it to be uninteresting to others. Regarding the usage in general, there seemed to exist polarisation among the participants. These findings support the call made by Carlsson and Carlsson (2016) about the need and importance of studying the habits and experiences that the young elderly have with digital wellness solutions. This study provides interesting insights into people’s everyday use of wellness technologies. The results assist the scholars and wellness technology providers in deepening their understanding on wellness technology usage. The developers can utilize the findings in providing and marketing solutions that are better welcomed by their target audiences. The findings may also assist people working in the healthcare sector in implementing different wellness technologies for health and wellness related purposes. Limitations and Future Research There are few limitations to the study that should be noted. First, studies concerning wellness and exercise behaviour at some level have been known to include the challenge that research subjects may intentionally report their behaviours as more positively than in reality, thus biasing the responses. However, the participants of this study were emphasized that the wellness and exercise behaviour itself are not relevant regarding the study but rather the experiences and perceptions regarding wellness technologies and their use. The intention of this was to minimize the possibility that participating in the study would lead the participants to intentionally change their behaviour. Second, the study was based on the diaries from 18 participants. Although providing a great amount of information, the amount of data should be considered when assessing the results of the study. Especially so in regards with the young elderly, as there were only four of them. One should also consider the female-dominance in the sample. Third, the level of detail in reporting in the diaries varied between the participants. Despite these limitations, this study provides some highly valuable new insights into the subject. Future research could collect diary data from a longer time period and focus on possible behaviour changes regarding wellness behaviour and the usage of wellness technologies. Future research could also repeat similar research with particular focus on some specific user group, for example, the young elderly or athletes. Overall, the whole area of wellness technology usage continues to be an important topic of research. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FORM CONNECTING THINGS TO 291 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Kari, E. Kettunen, P. Moilanen & L. Frank Wellness Technology Use in Everyday Life: A Diary Study Appendix A. Description of the Sample Participant Gender Age Employment status Household type One family without 1 Female 28 Employee kids One family without 2 Female 31 Employee kids One family without 3 Female 22 Student kids One family without 4 Female 25 Student kids 5 Female 31 N/A One family with kids 6 Female 33 Employee One person One family without 7 Female 57 Employee kids 8 Female 28 Unemployed One family with kids 9 Female 55 Employee Single parent 10 Female 63 Unemployed One person 11 Female 66 Pensioner One person 12 Female 30 Home parent One family with kids 13 Male 18 Student N/A One family without 14 Male 33 Employee kids One family without 15 Male 34 Employee kids One family without 16 Male 66 Pensioner kids One family without 17 Female 70 Pensioner kids 18 Female 22 Student Single person References Bandura, A. (1989). Social cognitive theory. In R. Vasta (Ed.) Annals of child development. Vol. 6. Six theories of child development (pp. 1–60). Greenwich, CT: JAI Press. Bandura, A. (1998) Health promotion from the perspective of social cognitive theory, Psychology & Health, (13)4, 623–649. 292 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Kari, E. Kettunen, P. Moilanen & L. Frank Wellness Technology Use in Everyday Life: A Diary Study Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77–101. doi:10.1191/1478088706qp063oa. Carlsson, C., & Carlsson, J. P. (2016). Interventions to form wellness routines among young elderly. In The 29th Bled eConference "Digital economy" Research Volume, 19.–22.6.2016 (pp. 406–418). Bled: University of Maribor. Deterding, S., Björk, S. L., Nacke, L. E., Dixon, D., & Lawley, E. (2013). Designing gamification: creating gameful and playful experiences. In CHI'13 Human Factors in Computing Systems, 27.4.–2.5.2013 (pp. 3263–3266). Paris: ACM. Deterding, S., Dixon, D., Khaled, R., & Nacke, L. (2011). From game design elements to gamefulness: defining gamification. In The 15th International Academic MindTrek Conference: Envisioning Future Media Environments, 28.–30.9.2011 (pp. 9–15). Tampere: ACM. Eskola, J., & Suoranta, J. (2014). Johdatus laadulliseen tutkimukseen. Tampere, Finland: Vastapaino. Fitz-Walter, Z., Tjondronegoro, D., & Wyeth, P. (2012). A gamified mobile application for engaging new students at university orientation. In The 24th Australian Computer-Human Interaction Conference, 26.–30.11.2012 (pp. 138–141). Melbourne: ACM. Gawley, R., Morrow, C., Chan, H., & Lindsay, R. (2016). BitRun: gamification of health data from Fitbit® activity trackers. In International Conference on IoT Technologies for HealthCare, 18.– 19.10.2016 (pp. 77–82). Västerås, Sweden: Springer, Cham. Guest, G., MacQueen, K. M., & Namey, E. E. (2012). Applied thematic analysis. Los Angeles, CA: SAGE. Grand View Research, Inc. (2016). Connected health and wellness devices market worth $612 billion by 2024. Retrieved 30.1.2017, from: www.grandviewresearch.com/press- release/global-connected-health-wellness-devices-market. Hamari, J., Koivisto, J., & Pakkanen, T. (2014a). Do persuasive technologies persuade? A review of empirical studies. In A. Spagnolli, L. Chittaro, & L. Gamberini (Eds.) Persuasive technology 2014 (pp. 118–136). Cham: Springer International Publishing. Hamari, J., Koivisto, J., & Sarsa, H. (2014b). Does gamification work? a literature review of empirical studies on gamification. In 47th Hawaii International Conference on System Sciences (HICSS) 2014, 6.–9.1.2014 (pp. 3025–3034). Waikoloa: IEEE. Kaapu, T., & Tiainen, T. (2012). Phenomenography: an alternative research approach for studying the diversity of user’s understandings. In The 20th European Conference on Information Systems (ECIS) 2012, 11.–13.7.2012 (Paper 29). Barcelona: AIS. Kari, T., Koivunen, S., Frank, L., Makkonen, M., & Moilanen, P. (2016a). Perceived well-being effects during the implementation of a self-tracking technology. In The 29th Bled eConference "Digital economy" Research Volume, 19.–22.6.2016 (pp. 382–392). Bled: University of Maribor. Kari, T., & Makkonen, M. (2014). Explaining the usage intentions of exergames. In The 35th International Conference on Information Systems (ICIS) 2014, 14.–17.12.2014 (pp. 1–18). Auckland: AIS. Kari, T., Piippo, J., Frank, L., Makkonen, M., & Moilanen, P. (2016b). To gamify or not to gamify?: gamification in exercise applications and its role in impacting exercise motivation. In The 29th Bled eConference "Digital economy" Research Volume, 19.–22.6.2016 (pp. 393–405). Bled: University of Maribor. Kari, T., Frank, L., Makkonen, M., & Moilanen, P. (2016c). How is gamification perceived in health and wellness technology companies: Views from four companies of different size. In The 10th Mediterranean Conference on Information Systems (MCIS) 2016, 4.–6.9.2016 (pp. 1-13). Paphos: University of Nicosia. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FORM CONNECTING THINGS TO 293 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Kari, E. Kettunen, P. Moilanen & L. Frank Wellness Technology Use in Everyday Life: A Diary Study Law, F., Kasirun, Z., & Gan, C. (2011). Gamification towards sustainable mobile application. In 5th Malaysian Conference in Software Engineering (MySEC) 2011, 13.–14.12.2011 (pp. 349– 353). Johor Bahru: IEEE. Makkonen, M., Frank, L., Kari, T., & Moilanen, P. (2012a). Explaining the usage intentions of exercise monitoring devices: The usage of heart rate monitors in Finland. In the 18th Americas Conference on Information Systems (AMCIS) 2012, 9.–11.8.2012 (Paper 13). Seattle: AIS. Makkonen, M., Frank, L., Kari, T., & Moilanen, P. (2012b). Examining the usage intentions of exercise monitoring devices: The usage of pedometers and route trackers in Finland. In The 25th Bled eConference ”eDependability: Reliable and Trustworthy eStructures, eProcesses, eOperations and eServices for the Future” Research Volume, 17.–20.6.2012 (pp. 439–453). Bled: University of Maribor. Marton, F. (1981). Phenomenography — describing conceptions of the world around us. Instructional science, 10(2), 177–200. Marcus, B. H., Ciccolo, J. T., & Sciamanna, C. N. (2008). Using electronic/computer interventions to promote physical activity. British Journal of Sports Medicine, 43(2), 102–105. doi:10.1136/bjsm.2008.053744. Miyamoto, S. W., Henderson, S., Young, H. M., Pande, A., & Han, J. J. (2016). Tracking health data is not enough: a qualitative exploration of the role of healthcare partnerships and mhealth technology to promote physical activity and to sustain behavior change. JMIR mHealth and uHealth, 4(1), e5. Prochaska, J., & DiClemente, C. (2015). The transtheoretical approach. In J. C. Norcross, & M. R. Goldfried (Eds.) Handbook of psychotherapy integration (2nd ed.) (pp. 147–171). New York, NY: Oxford University Press. Rintala, A., Hakala, S., Paltamaa, J., Heinonen, A., Karvanen, J., & Sjögren, T. (2016). Effectiveness of technology-based distance physical rehabilitation interventions on physical activity and walking in multiple sclerosis: a systematic review and meta-analysis of randomized controlled trials. Disability and Rehabilitation, (advance online publication), 1–15. doi:10.1080/09638288.2016.1260649. Ryan, R. M., & Deci, E. L. (2000). Intrinsic and extrinsic motivations: classic definitions and new directions. Contemporary Educational Psychology, 25(1), 54–67. doi:10.1006/ceps.1999.1020. Sjögren, T., Haapakoski, M., Kosonen, S., & Heinonen, A. (2013). Teknologian käyttö ja vaikuttavuus liikuntaan liittyvissä interventiotutkimuksissa - järjestelmällinen katsaus. Liikunta & Tiede, 50(1), 75–85. Wang, Q., Egelandsdal, B., Amdam, G. V., Almli, V. L., & Oostindjer, M. (2016). Diet and physical activity apps: perceived effectiveness by app users. JMIR mHealth and uHealth, 4(2), e33. Warraich, M. U. (2016). Wellness routines with wearable activity trackers: a systematic review. In The 10th Mediterranean Conference on Information Systems (MCIS) 2016, 4.–6.9.2016 (Paper 35). Paphos: University of Nicosia. Welltodo London Limited. (2016). The Scandinavia report: wellness trends, growth and market opportunities. Retrieved 30.1.2017, from: www.welltodolondon.com/ the-scandinavia-report- wellness-trends-growth-and-market-opportunities/. 294 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Activity Trackers Influencing Motivation and Awareness: Study Among Fitness Centre Members 21 EEVA KETTUNEN, TUOMAS KARI, MARIA CHASANDRA, WILL CRITCHLEY & UMUT DOĞAN Abstract Consumer fitness technology products are becoming increasingly popular. This leads to interesting questions about the influence of activity trackers on a person’s motivation to exercise. This study explored the role of activity trackers in motivating fitness centre members towards exercising and in increasing their awareness regarding their own health and physical activity. The study included 100 fitness centre members divided into a test group and a control group and three sub-groups: OLD, NEW, and personal trainer (PT) members. The focus was on gym visit frequency during a 10-week test period and on tracking the consistency of activity levels. Participants also completed a pre and post study questionnaire assessing changes in their health and physical activity awareness. The results suggest that an activity tracker does not significantly influence fitness centre members’ gym attendance or overall physical activity levels. Group comparisons reveal no statistically significant differences between groups, but observations of the descriptive statistics indicated that an activity tracker can bring some inspiration and other benefits, especially for PT clients and people who are just starting their new more physically active lifestyle. Using an activity tracker increased participants’ perceived awareness of their own wellbeing, daily sitting time, and amount of sleep. Keywords: • Activity Tracker • Motivation • Goal Setting • Fitness Centre • Health Awareness • Physical Activity • CORRESPONDENCE ADDRESS: Eeva Kettunen, University of Jyvaskyla, Seminaarinkatu 15, 40014 Jyväskylän yliopisto, Finland, e-mail: eeva.k.kettunen@jyu.fi. Tuomas Kari, University of Jyvaskyla, Seminaarinkatu 15, 40014 Jyväskylän yliopisto, Finland, e-mail: tuomas.t.kari@jyu.fi. Maria Chasandra, University of Jyvaskyla, Seminaarinkatu 15, 40014 Jyväskylän yliopisto, Finland, e-mail: maria.m.chasandra@jyu.fi. Will Critchley, University of Jyvaskyla, Seminaarinkatu 15, 40014 Jyväskylän yliopisto, Finland, e-mail: wcritchley@gmail.com. Umut Doğan, University of Jyvaskyla, Seminaarinkatu 15, 40014 Jyväskylän yliopisto, Finland, e-mail: doganumut89@gmail.com. https://doi.org/10.18690/978-961-286-043-1.21 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 296 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) E. Kettunen, T. Kari, M. Chasandra, W. Critchley & U. Doğan: Activity Trackers Influencing Motivation and Awareness: Study Among Fitness Centre Members Introduction The health benefits of physical activity are widely known, yet still the participation rates in regular physical activity are below recommendations (Middelweerd et al., 2014). Commercially available physical activity monitors are becoming increasingly popular for personal use and the entire field of wellness technologies is expected to grow significantly (Grand View Research, 2016). There has also been a substantial interest in scientific research to objectively study individual and group level physical activity and in the role of wellness technology to increase adherence to physical activity guidelines or to be physically more active (see e.g. Marcus, Ciccolo & Sciamanna, 2008). Wearable activity monitors have the potential to help people reach their fitness and health goals by constantly monitoring and giving feedback on activities and bodily responses. Wearable devices may have various applications in other areas, such as in medical safety settings, or leisure and entertainment. Activity trackers and other wearable devices have been found to bring a variety of benefits for their users. For example, Hagströmer, Oja and Sjöström (2007) found that objectively obtained estimates of physical activity yielded different activity patterns and lower values compared to those that were obtained by self-reports. This shows that wearable devices often provide more accurate data compared to self-perception and, therefore, serve as more reliable information source when planning and executing health behaviour change programs. Kari et al. (2016a) found that using a mobile exercise application can enhance the awareness of personal physical activity and motivate towards being more physically active. Moreover, activity trackers could have even more potential in increasing the amount of physical activity, as suggested by Kari et al. (2016b). Yet, it seems that the perceived increase in wellbeing would require a long enough use period for the user to notably perceive any changes (Kari et al., 2016b). A mere tracking of wellness related data may result in increased awareness of daily activity, but may not be sufficient to maintain the use of wellness technologies (Miyamoto et al., 2016). The use of wellness related technology is also more effective the more frequently it is used (Wang et al., 2016). The intention to use such devices is mostly based on utilitarian reasons but also hedonic perceptions play a role (Makkonen et al., 2012a; Makkonen et al., 2012b). O’Brien et al. (2015) evaluated the utility and feasibility of activity trackers among older adults, and found that most users experienced positive outcomes. They also suggested that activity trackers could be useful in improving older adults’ health by monitoring and promoting physical activity (O’Brien et al., 2015). As the popularity of activity trackers is growing tremendously, there is an increasing need to conduct more research on their use. These kinds of investigations enable a deeper understanding of the influences activity trackers have on people’s behaviour. Much of the prior research has concentrated on the feasibility of individual solutions rather than the human aspects, such as psychological and social variables. For companies producing wearable devices or using the devices with their clients, sustained consumer engagement has been named as one of the key challenges. To achieve sustained consumer 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 297 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) E. Kettunen, T. Kari, M. Chasandra, W. Critchley & U. Doğan: Activity Trackers Influencing Motivation and Awareness: Study Among Fitness Centre Members engagement, the companies must understand behavioural science and study motivation, habit formation, and progress toward goals (Endeavour Partners, 2014). The aim of the study was to investigate how using an activity tracker can influence participants’ physical activity behaviour and motivation. It was not the aim of the study to encourage participants to increase or change their exercise behaviour in some way, rather, it was to investigate how the activity tracker influences their exercise behaviour. The main research questions of the study are: 1. Do activity trackers influence fitness centre members’ gym attendance and overall physical activity level? 2. Do activity trackers influence the fitness centre members’ awareness of their physical activity and health related issues? 3. Do activity trackers have a different influence on members with different lengths of membership history or personal trainer members? The activity tracker used in this study was the Polar Loop by Polar Electro Finland (see Polar, 2016). The group using an activity tracker is referred to as the Loop group. The study includes 100 fitness centre members divided into a test group (Loop group) and a control group. Both groups were also divided into three sub-groups: OLD, NEW, and personal trainer (PT) members. Considering the claimed benefits and the rising popularity of wearable activity trackers, the results of this study can benefit several stakeholders. The new knowledge it provides can have theoretical implications for scholars as it increases our understanding on the usage of these devices. The study can also provide practical implications for exercisers, manufacturers, fitness centres, and those working with physical activity promotion. Theoretical Framework 2.1 Motivation and Physical Activity Motivation can be divided into intrinsic and extrinsic motivation (Ryan & Deci, 2000). Self-determination theory is a major component in the discussion of intrinsic and extrinsic motivation and physical activity. Self-determination consists of three psychological needs: autonomy, competence and relatedness. Autonomy refers to the need to be self-initiating in the regulation of personal behaviour, competence represents a person’s need to interact effectively within their environment, and relatedness reflects the person’s need to feel connected to other people. The feeling of these needs can separate or together facilitate intrinsic motivation (Carron, Hausenblas, & Estabrooks, 2003). The most common motives for getting involved with physical activity and exercise are extrinsic factors, such as improved health, improved fitness, or weight loss. However, 298 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) E. Kettunen, T. Kari, M. Chasandra, W. Critchley & U. Doğan: Activity Trackers Influencing Motivation and Awareness: Study Among Fitness Centre Members although extrinsic motives act as catalysts, the focus can often change between initial adaptation and subsequent adherence. This change also applies to the change in the level of self-determination: from non-self-determination to limited, to moderate and finally to full self-determination (Carron, Hausenblas, & Estabrooks, 2003). This study included participants who had different membership periods. “OLD” members were defined of having been going to the gym for more than 9 months, and “NEW” members had been going to the gym for less than 2 weeks. Therefore, it can be assumed that OLD and NEW participant groups might have different levels of self-determination and differences in their types of motivation. Goal setting techniques have been used extensively to enhance motivation and adherence and to improve performance. Studies conducted in exercise settings showed that 99% of participants set multiple personally motivating goals for their exercise participation. These goals were perceived as influencing actual exercise behaviour and helped people acknowledge what exercise behaviour is needed in order to meet their goals. Goal setting also helps people maintain their exercise program and keep up motivation to maintain their level of activity. Goal setting can therefore be seen as a way to maximize effectiveness in reaching exercise and physical activity objectives. The most effective goals in exercise settings tend to be flexible goals that people have set for themselves. (Berger, Pargman, & Weinberg, 2007). According to Abraham and Michie (2008) there are various behaviour change techniques, all of which have different positive aspects. The key is to find the right technique to apply in the correct setting and with the target group. Techniques promoting specific goal setting, self-monitoring of behaviour, review of goals, and performance feedback are considered to be effective (Abraham & Michie, 2008). Health behaviour change interventions tend to be more effective if they are firmly connected with a health behaviour change theory (Middelweerd et al., 2014). Participants were not asked to set any specific goals for themselves. However, Polar Loop users were asked to set their activity tracker to a setting (activity level on 1–3 scale) that best fit their everyday life. This affected the daily activity goal provided by the tracker. Even though Loop group members were not asked to try to meet the daily activity goals, the activity tracker can still be seen as a goal setter by giving people a target for how physically active they should be according to their set activity level. 2.2 Transtheoretical Model of Health Behaviour Change Most health related behaviour change programs have concentrated on negative behaviours, such as alcohol consumption, smoking, or obesity, rather than focusing on increasing positive behaviour such as physical activity and exercise. It is extremely hard to change long-term habits. Behaviour change is a process that occurs over a long time period. The transtheoretical model divides this process into different stages that occur in 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 299 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) E. Kettunen, T. Kari, M. Chasandra, W. Critchley & U. Doğan: Activity Trackers Influencing Motivation and Awareness: Study Among Fitness Centre Members a cyclic model. The stages are precontemplation, contemplation, preparation, action, and maintenance. (Prochaska & Velicer, 1997). The transtheoretical model has been applied to many health behaviour programs (Spencer et al., 2006). In this study, the transtheoretical model was used as a theoretical background for designing the questionnaire. Participants self-evaluated their current stage in becoming more physically active before and after the 10-week test period. However, it is important to remember that 10-weeks is a short time to make any real changes between the stages and therefore the results concerning behavioural change should be interpreted with caution. According to Bandura’s (1997) social cognitive theory there are different reasons why people might need outside help (proxy agent) in order to better reach their set goal. Firstly, people might have lost their means to reach their desired outcome. Secondly, they might think that a third person is more capable of facilitating the achievement toward the desired outcome. Finally, people may want to give control over to somebody else because they want to shift the responsibility of the direct control (Bandura, 1997). In an exercise and physical activity setting the use of proxy agent, often a personal trainer, helps a person to manage environment and task demands as well as gives extra help in regulating and controlling exercise behaviour, developing new skills and helping in lifestyle management (Beauchamp & Eys, 2007). Having a proxy agent also provides a person social support which increases positive outcomes. This can lead to greater likelihood of experiencing full involvement, focus, and enjoyment (Jowett & Lavallee, 2007). Methodology 3.1 Study Design and Data Collection The study follows a quantitative experimental design. The study was carried out among members of a fitness centre located in Finland. The study consisted of two main groups: the test group (Loop group) and the control group. The Loop group members were given Polar Loop activity trackers and H7 heart rate sensors in the beginning of the test period, whereas the control group did not receive these devices. After the study, the Loop group got to keep their devices, and the control group were also given Loops as a reward for participating. The two main groups were further divided into three sub-groups: OLD members (members for at least 9 months), NEW members (members for under 2 weeks) and personal trainer (PT) members (having at least six PT sessions during the study). Participants were recruited via the fitness centre’s e-mail newsletter. All club members were allowed to apply for the study and the first 100 suitable candidates were selected and randomly split into the Loop Group or control group. Both groups had the same number of male and female participants. From the 50 participants in the Loop group, 25 were OLD, 13 were NEW, and 12 were PT. Table 1 shows the number of participants in each group. 300 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) E. Kettunen, T. Kari, M. Chasandra, W. Critchley & U. Doğan: Activity Trackers Influencing Motivation and Awareness: Study Among Fitness Centre Members Table 1: Description of the participants Average Group Sub-group N Female Male age Loop OLD 25 14 11 42.52 PT 12 10 2 41.67 NEW 13 8 5 33.08 Loop total 50 32 18 38.09 Control OLD 25 14 11 38.04 PT 12 10 2 40.42 NEW 13 8 5 28.54 Control 50 32 18 36.32 total Total 100 64 36 37.91 The Loop group was asked to create a Polar Flow account, which made the training observable for research purposes. Data was also collected from the fitness centre’s visitor database, which recorded all the fitness centre visits participants did during the 10-week test period. In addition, a questionnaire concerning the members’ perceptions regarding their own health and fitness and the possible changes the 10-week test period had on them was collected from the participants before and after the test period. The questions were identical both times. The questionnaire included questions regarding current physical activity, sleeping time, daily sitting time, and awareness regarding their own overall wellbeing. The participants could also give feedback regarding their experiences during the study period after the study ended. In the results section, the experiences concerning Loop are reported. The full questionnaire is available from the authors by request. In total, three different data sets were used: 1) One obtained from Polar Flow service, which showed weekly activity goals based on the activity level set on the device, and how well these goals were achieved. 2) One obtained from the fitness centre’s visitor database, which was used to compare the Loop group and the control group as well as their sub-groups to see whether there were differences in physical activity measured by gym visits. 3) One obtained by the pre- and post-study questionnaires, which was used to investigate the changes in the perceptions of the participants. 3.2 Data Analysis The quantitative data from Polar Flow and the visitor database was analysed with IBM SPSS Statistics 21. The data from the questionnaires was transformed into numeric data and also entered to SPSS for further analysis. Means, age range and frequencies were computed in order to obtain the basic information of the test group. This was followed by 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 301 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) E. Kettunen, T. Kari, M. Chasandra, W. Critchley & U. Doğan: Activity Trackers Influencing Motivation and Awareness: Study Among Fitness Centre Members the test of normality, which was done by using the Kolmogorov-Smirnov test for the main groups and Shapiro-Wilk test for different sized sub-groups. Next, the analyses concentrated on the first measurement, which related to gym visit activity. An independent sample T-test was done in order to test differences between the Loop group and control group. Here, the independent variable was the group and the dependant variable was the number of average weekly fitness centre visits within the 10- week period. The same test was also done to compare the sub-groups between the Loop and control group. When testing differences within the Loop group or control group the test method was oneway ANOVA. The same method, oneway ANOVA, was also used in measurements concentrated on Loop group weekly activity percentages and their development. Here the independent variable was the sub-group and the dependent variable was the weekly average activity percentage within the 10-week test period. The last phase of the SPSS analyses was done by using repeated measures MANOVA to test for differences before and after the 10-week period among groups. Results The tests of normality were conducted to investigate normality for the main variables; average gym visits and average activity percentages (only Loop group). The normality tests were done after dividing the data into different sub-groups. Results for the Kolmogorov-Smirnov test for normality indicated that average gym visits were normally distributed within OLD sub-group (D = .110, p = .185). Due to the smaller sample sizes (< 50) for other sub-groups, the results from the Shapiro-Wilk test were more appropriate. These tests indicated normal distribution in all sub-groups. 4.1 Gym Visits and Activity Percentages Regarding the amount of gym visits, T-test was done in order to investigate differences between the Loop group and control group. No statistically significant difference was found, but it can be seen (Table 2) that the average visit amount for the 10-week test period was higher with the Loop group (16.5) compared to the control group (14.8). Table 2: Gym visits – group comparison Gym visits Std. Std. Error Group N Mean Deviation Mean Loop 50 16.5 11.7 1.7 Control 50 14.8 10.2 1.4 A similar comparison was made between Loop group sub-groups and control group sub- groups. No statistically significant differences were found. OLD members in the control group had a higher average compared to the OLD in the Loop group. With the PT and 302 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) E. Kettunen, T. Kari, M. Chasandra, W. Critchley & U. Doğan: Activity Trackers Influencing Motivation and Awareness: Study Among Fitness Centre Members NEW members’ gym visits, it was the opposite. Within both PT and NEW, the Loop group average gym visits were higher than in the control group (see Table 3). Table 3: Gym visits – sub-group comparison Sub-group Gym Visits Std. Error N Std. Deviation OLD Mean Mean Loop 25 13.7 9.8 2.0 Control 25 14.2 11.3 2.3 Sub-group Std. Error N Mean Std. Deviation PT Mean Loop 12 21.8 14.5 4.2 Control 12 17.4 9.2 2.7 Sub-group Std. Error N Mean Std. Deviation NEW Mean Loop 13 17.1 11.5 3.2 Control 13 13.9 9.2 2.5 Figure 1 shows the development of the average gym visits compared by sub-groups. All groups experienced a slight decrease in weekly gym visits. Figure 1: Loop group and control group gym visit development comparison Regarding how well the Loop sub-groups achieved the weekly activity goals provided by the tracker, the Loop’s weekly activity percentage measurements were used. The Loop activity tracker measures the accumulated activity as a percentage of the weekly goal. A 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 303 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) E. Kettunen, T. Kari, M. Chasandra, W. Critchley & U. Doğan: Activity Trackers Influencing Motivation and Awareness: Study Among Fitness Centre Members 100% measurement means a user has achieved that goal. It is also possible to exceed the weekly goal and have a measurement higher than 100%. No statistically significant differences were found between Loop sub- groups in weekly activity percentages. Similar to gym visits, all Loop groups experienced a slight decrease in weekly activity percentages during the test period. However, the decrease was larger with gym visits (see Figure 2). When comparing different Loop sub-groups, the decrease in activity percentages was strongest within OLD, whereas within PT and NEW groups, the decrease was almost non-existent. Figure 2: Loop group activity percentage and gym visit trends Pearson correlation test revealed that gym visits and activity percentages were positively correlated (see Table 4). Table 4: Correlation between gym visits and weekly activity percentages Weekly gym Weekly activity visits % Pearson Correlation 1 .524 Gym visits week Sig. (2-tailed) .000 N 50 50 Pearson Correlation .524 1 Average weekly activity Sig. (2-tailed) .000 N 50 50 4.2 Questionnaire Results All participants received a questionnaire at the beginning and end of the test period. The questionnaire included seven different health, exercise, and gym satisfaction related 304 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) E. Kettunen, T. Kari, M. Chasandra, W. Critchley & U. Doğan: Activity Trackers Influencing Motivation and Awareness: Study Among Fitness Centre Members questions that participants answered based on their own subjective feelings. There were no statistically significant differences in the results of the questionnaires, but some trends were seen. Participants were asked how active they perceived being before and after the 10-week test period. The overall trend was that participants felt they were more physically active after the test period. The only sub-group that perceived a decrease was the Loop group OLD (see Figure 3). Figure 3: Perceived current physical activity level After subjectively estimating their own physical activity level, the participants rated their own satisfaction related to their activity level. Satisfaction levels of all groups increased after the test period, with the exception of the Loop OLD group, which experienced a decrease in their level of satisfaction (see Figure 4). 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 305 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) E. Kettunen, T. Kari, M. Chasandra, W. Critchley & U. Doğan: Activity Trackers Influencing Motivation and Awareness: Study Among Fitness Centre Members Figure 4: Physical activity level satisfaction One question measured how satisfied the participants were with their sleeping time and whether they thought it was sufficient. Results showed that all Loop group sub-groups experienced an increase. The result was opposite in the control group. This indicates that Loop usage increased the Loop group participants’ awareness of their own sleeping, and perhaps also persuaded them to sleep more (see Figure 5). Figure 5: Perceived sleep amount One question concerned the daily sitting time and whether participants thought they sit too much during the day. The Loop group experienced small increases in all sub-groups except the NEW group. In the control group participants were more certain after the test period that they do not sit too much during the day (see Figure 6). 306 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) E. Kettunen, T. Kari, M. Chasandra, W. Critchley & U. Doğan: Activity Trackers Influencing Motivation and Awareness: Study Among Fitness Centre Members Figure 6: Perceived daily sitting time One of the questions concerned participant’s awareness of own state of wellbeing. The results show Loop group participants had an increase in their perceived awareness during the test period. The results of the control group show a small decrease in their perceived awareness (see Figure 7). Figure 7: Perceived awareness of personal wellbeing One question was based on the transtheoretical model measuring the participants’ progress toward a more physically active lifestyle during the test period. The Loop group experienced a small positive increase, and after the test period they perceived to have a more physically active lifestyle than before (see Figure 8). The results were the same with the control group OLD sub-group, but otherwise the control group experienced a 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 307 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) E. Kettunen, T. Kari, M. Chasandra, W. Critchley & U. Doğan: Activity Trackers Influencing Motivation and Awareness: Study Among Fitness Centre Members marginal decrease. The biggest difference between matching sub-groups of Loop and control was in the NEW sub-group. The Loop NEW group perceived a greater increase than control NEW group, which suggests that the Loop can be a useful tool to encourage a more physically active lifestyle for those (new members), who perhaps are more novice with physical activity in general. It should be noted that ten weeks is a relatively short time period to make significant changes or even take a step between levels, so these findings should be considered with caution. Figure 8: Perceived state of transformation 4.3 Feedback Most of the feedback related to the Polar Loop was that participants had learned more about their own wellbeing no matter what their initial starting point was. Some participants mentioned that Loop had changed their awareness and perceptions of their sleeping time, sitting time, and overall physical activity. Some critical comments were related to Polar Loop functions and how the activity tracker was not suitable with the participants own existing devices. A few comments were also related to the pressure that the Loop and goal setting had created; whereas some people felt it was positive and motivating, others first experienced it negatively but eventually learned to cope with it. Only one participant quit using Loop in the beginning of the test period because they felt too much pressure to reach the set goal every day. Conclusion The purpose of this research was to study the role of an activity tracker (Polar Loop) in influencing fitness centre members’ motivation and awareness regarding their own health and physical activity. The study followed a quantitative experimental design and included 100 fitness centre members divided into test and control groups. 308 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) E. Kettunen, T. Kari, M. Chasandra, W. Critchley & U. Doğan: Activity Trackers Influencing Motivation and Awareness: Study Among Fitness Centre Members Although the investigation revealed no statistically significant differences between different groups, some interesting findings can be reported. On average, participants with a Polar Loop visited the gym more often than those without, though the difference was not statistically significant. There was a small decrease in gym visits and activity trends during the 10-week test period in both main groups and in all sub groups. Thus, it can be assumed that an activity tracker alone might not be enough to sustain motivation to visit the gym or to be physically active, but can bring some benefits. Regarding the transformation towards a more physically active lifestyle the difference between Loop and control groups was not statistically significant. On a sub group level, the differences were also not statistically significant, but the results suggest that for new fitness centre members, an activity tracker could provide some tools for achieving intrinsic motivation, which is important when trying to maintain a more physically active lifestyle in the long- term. The results also suggest that there might be a reciprocal benefit where a personal trainer can use the extra information provided by the device to plan the training, while the user can utilize the personal trainer’s knowledge to better understand the data. Overall, it can be concluded that an activity tracker may not significantly influence fitness centre members’ gym attendance and overall physical activity levels but might make them more aware of their health and physical activity which is needed in building long lasting motivation. Considering the high number of fitness centre members who volunteered for the study, it is probable that the Polar Loop worked as an extrinsic source of motivation. Previous studies have shown that exercise applications may increase exercise level and health outcomes leading to increased level of self-efficacy (Litman et al., 2015). Based on some of the participants’ feedback, it was appreciated that Polar Loop offered a tool for personalized goal setting and also provided the participants with personalized information. Providing personalized feedback and increasing awareness about health related issues, the activity tracker may have increased the participants’ level of perceived competence, which is one element in enhancing intrinsic motivation. Thus, in order to help turn the motivation more intrinsic, an activity tracker should provide personalized information and offer a tool for personalized goal setting. Regarding the awareness of personal health and physical activity, on average, both main groups claimed to be more physically active at the end of the study period. This subjective feeling does not match the fitness centre data, which showed that participants in all groups went to the gym less often in the latter part of the study period. Loop group members also seemed to be less active at the end of 10-week period based on the Loop activity percentages. The satisfaction towards one’s own physical activity level followed the development of perceived activity level. These findings support the ones by Adams et. al. (2005), that there can be some biases in self-reports of physical activity. The finding that the Loop group were more concerned about their daily sitting time at the end of the test period, suggests that the information the Loop provided made them more aware and more concerned about their daily sitting time. Thus, activity trackers could be 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 309 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) E. Kettunen, T. Kari, M. Chasandra, W. Critchley & U. Doğan: Activity Trackers Influencing Motivation and Awareness: Study Among Fitness Centre Members used to educate users about their sitting or other inactivity habits. The results also suggest that an activity tracker might increase a person’s perceived awareness of their own state of wellbeing. Whereas the Loop group perceived an increase in their awareness, the control group perceived a decrease. A similar result was found regarding the perceived sleep amount, as the Loop group reported being more satisfied with their amount of sleep, while the control group reported a decrease in satisfaction. Overall, it can be concluded that there are several influences an activity tracker has on one’s awareness of personal physical activity and wellness related behaviour. However, given the contradiction between perceived and measured physical activity levels, the influence can be both positive and negative. Electronic monitoring of daily physical activity can offer tremendous opportunities for people to independently improve their health and wellbeing. However, it is important for the stakeholders working in related fields to acknowledge that the key is not to just implement a device but to find out how the electronic devices are able to deliver useful information that is also motivating and easy to understand for diverse populations. Limitations and Future Research This study has some limitations. The first limitation concerns the sample size, which could have been higher. Even though the sample size is large enough for conducting the statistical analyses and can present the situation among the members of the particular fitness centre, it somewhat limits the generalizability to activity tracker users in general. The second limitation concerns the length of the study. A 10-week period is not necessarily long enough to facilitate changes in awareness or gym visit habits. Particularly, as according to the transtheoretical model of change, it might take several months to generate changes in habit formation. One potentially interesting avenue of future research would be to do a similar study with a larger number of participants, which would provide better statistical representation of the target population. This study could also be done by having a longer study period which would give more reliable results and allow to the transtheoretical model assessment tools to track changes. A follow up questionnaire and measurements could also be done in order to see how the training motivation has developed after end of the study period. Similar study could also be conducted in different fitness centres. Future studies could also include gamification as a motivation driver as well, and examine it more deeply, as it seems that its relevance in this domain will continue increasing (Kari et al., 2016c). Acknowledgement We would also like to show our gratitude to Dr. Taru Lintunen from the university of Jyväskylä for sharing her advice and supporting us during the course of this research. We would also like to thank Polar Electro and SATSELIXIA for providing the possibility and resources for this research. 310 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) E. Kettunen, T. Kari, M. Chasandra, W. Critchley & U. Doğan: Activity Trackers Influencing Motivation and Awareness: Study Among Fitness Centre Members Special thanks to Polar representatives Dr. Raija Laukkanen and Janne Ukkonen for their support and co-operation. References Abraham, C. & Michie, S. (2008). A taxonomy of behaviour change techniques used in interventions. Health Psychology. 27 (3), 379-387. Adams, S. A., Matthews, C. E., Ebbeling, C. B., Moore, C. G., Cunningham, J.E., Fulton, J. & Hebert, J. R. (2005). The effect of social desirability and social approval on self- reports on physical activity. American Journal of Epidemiology. 161 (4), 389-398. Bandura, A. (1997). Self-efficacy: The exercise of control. New York, NY: Freeman. Beauchamp, M. R. & Eys, M. A. (2007). Group dynamics in exercise and sport psychology – Contemporary themes. New York, NY: Routledge. Berger, B. G., Pargman, D. & Weinberg, R. S. (2007). Foundations of exercise psychology. Morgantown, WV: Sheridan Books. Carron, A. V., Hausenblas, H. A. & Estabrooks, P. A. (2003). The Psychology of physical activity. New York, NY: McGraw-Hill Companies. Endeavour partners (2014 January). The future of activity trackers (Part 3): The secret to long-term engagement. Retrieved 15.2.2017, from http://endeavourpartners. net/the-future-of-activity- trackers-part-3-the-secret-to-long-term-engagement/. Grand View Research, Inc. (2016 August). Connected health and wellness devices market worth $612 billion by 2024. Retrieved 15.2.2017, from: www.grandviewresearch.com/press- release/global-connected-health-wellness-devices-market. Hagströmer, M., Oja, P. & Sjöström, M. (2007). Physical activity and inactivity in an adult population assessed by accelerometry. Medicine & Science in Sport & Exercise, 39 (9), 1502- 1508. DOI:10.1249/mss.0b013e3180a76de5. Jowett, S. & Lavallee, D. (2007). Social psychology in sport. Champaign, IL: Human Kinetics. Kari, T., Piippo, J., Frank, L., Makkonen, M. & Moilanen, P. (2016a). To gamify or not to gamify?: Gamification in exercise applications and its role in impacting exercise motivation. In The 29th Bled eConference "Digital economy" Research Volume, 19.–22.6.2016 (pp. 393-405). Bled: University of Maribor. Kari, T., Koivunen, S., Frank, L., Makkonen, M. & Moilanen, P. (2016b). Perceived wellbeing effects during the implementation of a self-tracking technology. In The 29th Bled eConference "Digital economy" Research Volume, 19.–22.6.2016 (pp. 382-392). Bled: University of Maribor. Kari, T., Frank, L., Makkonen, M. & Moilanen, P. (2016c). How is gamification perceived in health and wellness technology companies: Views from four companies of different size. In The 10th Mediterranean Conference on Information Systems (MCIS) 2016, 4.–6.9.2016 (pp. 1-13). Paphos: University of Nicosia. Litman, L., Rosen, Z., Spierer, D., Weinberger-Litman, S., Holdschein, A. & Robinson, J. (2015). Mobile exercise apps and increased leisure time exercise activity: A moderate mediation analysis of the role of self-efficacy and barriers. Journal of Medical Internet Research, 17 (8), e195. doi:10.2196/jmir.4142. Makkonen, M., Frank, L., Kari, T., & Moilanen, P. (2012a). Explaining the usage intentions of exercise monitoring devices: The usage of heart rate monitors in Finland. In the 18th Americas Conference on Information Systems (AMCIS) 2012, 9.–11.8.2012 (Paper 13). Seattle: AIS. Makkonen, M., Frank, L., Kari, T., & Moilanen, P. (2012b). Examining the usage intentions of exercise monitoring devices: The usage of pedometers and route trackers in Finland. In The 25th Bled eConference ”eDependability: Reliable and Trustworthy eStructures, eProcesses, 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 311 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) E. Kettunen, T. Kari, M. Chasandra, W. Critchley & U. Doğan: Activity Trackers Influencing Motivation and Awareness: Study Among Fitness Centre Members eOperations and eServices for the Future” Research Volume, 17.–20.6.2012 (pp. 439–453). Bled: University of Maribor. Marcus, B. H., Ciccolo, J. T. & Sciamanna, C. N. (2008). Using electronic/computer interventions to promote physical activity. British Journal of Sports Medicine, 43 (2), 102-105. doi:10.1136/bjsm.2008.053744. Middelweerd, A., Mollee, J. S., van der Wal, C. N., Brug, J. & te Velde, S. J. (2014). Apps to promote physical activity among adults: A review and content analysis. International Journal of Behavioral Nutrition and Physical Activity, 11 (1), 97. DOI:10.1186/s12966-014-0097-9. Miyamoto, S. W., Henderson, S., Young, H. M., Pande, A. & Han, J. J. (2016). Tracking health data is not enough: a qualitative exploration of the role of healthcare partnerships and mhealth technology to promote physical activity and to sustain behavior change. JMIR mHealth and uHealth, 4 (1), e5. O’Brien, T., Troutman-Jordan, M., Hathaway, D., Armstrong, S. & Moore, M. (2015). Acceptability of wristband activity trackers among community dwelling older adults. Geriatric Nursing, 36 (2), 21-25. DOI:10.1016/j.gerinurse.2015.02.019. Polar. (2016). Polar Loop Activity Band | Polar Global. Retrieved 15.02.2017, from https://www.polar.com/en/products/lifestyle/loop. Prochaska, J. O., Velicer, W. F. (1997). The transtheoretical model of health behavior change. American Journal of Health Promotion. 12 (1), 38-48. DOI:10.4278/0890-1171-12.1.38. Ryan, R. M. & Deci, E. L. (2000). Intrinsic and extrinsic motivations: classic definitions and new directions. Contemporary Educational Psychology, 25 (1), 54-67. doi:10.1006/ceps.1999.1020. Spencer, L., Adams, T. B., Malone, S., Roy, L. & Yost, E. (2006). Applying the transtheoretical model to exercise: A systematic and comprehensive review of the literature. Health Promotion Practice. 7 (4), 428-443. DOI:10.1177/15248399 05278900. Wang, Q., Egelandsdal, B., Amdam, G. V., Almli, V. L. & Oostindjer, M. (2016). Diet and physical activity apps: perceived effectiveness by app users. JMIR mHealth and uHealth, 4 (2), e33. 312 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons CustomerSourcing: Intrinsic Motivators 22 FRED KITCHENS & CAMERON CRANE Abstract Crowdsourcing is a well-developed concept, which has become very prevalent with the growth and development of the Internet; Web 2.0 in particular. CustomerSourcing is a sub-category of Crowdsourcing which has developed a following in recent years. This article explains the development and conceptual underpinnings of CustomerSourcing; followed by the introduction of a 16-point framework for identifying specific intrinsic motivators. The motivation framework is applied to the major categories of Crowdsourcing; followed by a more specific application to CustomerSourcing in particular. The value of such a model is to help web site developers identify the specific motivators for the potential site users; so that the motivators can be enhanced and supported – resulting in improved web sites with increased use and increased frequency of use. Keywords: • CustomerSourcing • Crowdsourcing • Supply Chain • Value Chain • Intrinsic Motivation • CORRESPONDENCE ADDRESS: Fred Kitchens, Ball State University, 2000 W University Ave, Muncie, IN 47306, USA, e-mail: fkitchens@bsu.edu. Cameron Crane, Kronos, Inc., 297 Billerica Road, Chelmsford, MA 01824, USA, e-mail: camscrane@gmail.com. https://doi.org/10.18690/978-961-286-043-1.22 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 314 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) F. Kitchens & C. Crane: CustomerSourcing: Intrinsic Motivators Introduction Conceptually, crowdsourcing is not a new concept at all. It is simply the process of calling upon the general public - the “crowd” – to contribute, by whatever method appropriate, to solving a business problem. In the 1700’s the Alkali Prize was established to solicit from the general public a less expensive method of producing sodium carbonate (Nesta, 2017). And in the 1800’s the Oxford English Dictionary asked the general public for new words which might be added to the dictionary (Brabham, 2013). Successful examples of crowdsourcing can be found throughout history; but the exponential growth of the concept did not begin until the Internet gave quick and easy access to the “crowd” – and particularly, the enabling characteristics of Web 2.0 (Tredinnick, 2006; DeVun, 2009; Chaordix, 2014). Although the concept is nothing new, the term “Crowdsourcing” was coined as recently as 2006 when it appeared in a seminal article, “The Rise of Crowdsourcing” (Howe, 2006). Initially, Howe only described the phenomenon, without providing a succinct definition. After the ‘crowd’ had some time to explore and discuss the concept, Howe proposed a formal definition: “Crowdsourcing is the act of taking a job traditionally performed by a designated agent (usually an employee) and outsourcing it to an undefined, generally large group of people in the form of an open call.” (Howe, 2008) Capability and awareness are the two most important factors in Crowdsourcing. First, the Internet provides the capability of reaching and communicating with the crowd – the general public to which the open call is placed. Second, public awareness of the concept of CustomerSourcing as a new business tool (Horton & Chilton, 2010). As awareness quickly lead to popularity, a wide variety of sub-categories arose, each with varying purposes and characteristics. For example:  CrowdFunding  Cloud Labor (Macrowork and Microwork)  Crowdvoting  Crowdsearching  Crowdsolving  Crowdsourcing  CrowdReviews  CustomerSourcing As a subcategory of crowdsourcing, CustomerSourcing is the focus of this article, as first described by Crane & Kitchens (2013). In particular, the focus will be on the intrinsic motivation which individuals have for participating in CustomerSourcing activities. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 315 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) F. Kitchens & C. Crane: CustomerSourcing: Intrinsic Motivators Rise of CustomerSourcing Many traditional business processes have been altered with advancement of the Internet and e-business (Laudon, 2012); CustomerSourcing is one such example. It can be described as a modification from the traditional value chain and supply chain models; as described here. 2.1 Supply Chain Model The supply chain model is traditionally depicted as a chain of business entities, one leading to the next, in a linear fashion. The supplier leads to the firm, which leads to the distributor, to the retailer, and finally to the customer (Kathawaia, 2003). This represents the flow of goods from raw materials to finished product, as depicted in Figure 1: Supply Chain Model. Figure 1: Supply Chain Model 2.2 Value Chain Model The value chain model depicts the primary activities and support activities occur within a business unit (Porter, 1985). The activities included in the traditional value chain are depicted in Figure 2: Value Chain Activities. Figure 2: Value Chain Activities (Porter, 1985) The effect of the Internet and disintermediation has, in many cases, caused the elimination of the middle-man (Pinto, 2000). Thus, by eliminating the Distributor and retailer from the supply chain model, and by inserting the value chain model in place of the manufacturer/service provider, the resulting new model depicts the customer, a business 316 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) F. Kitchens & C. Crane: CustomerSourcing: Intrinsic Motivators unit with related activities, and the customer; as depicted in Figure 3: Disintermediation and the Merger of Value Chain with the Supply Chain Model. Figure 3: Disintermediation and the Merger of Value Chain with the Supply Chain Model In the realm of e-commerce, all of the traditional functions of the supply chain continue to exist; but the individual firms have been disintermediated. The result is fewer middle- men; perhaps reduced to a single entity providing the services of the entire supply chain. This single firm is then collecting the resources from suppliers, performing some operation on the material to produce a product or service, and supplying the end product to the customer. In the case of Crowdsourcing, the “suppliers” may actually be the “crowd.” The resources generated from the crowd-suppliers could conceivably be anything. Recalling a few of the various sub-categories of crowdsourcing reveals the wide variety of CustomerSourced resources available to a firm:  CrowdFunding could generate operating capital  Cloud Labor (also known as Macrowork and Microwork) could provide some of the necessary labor which is needed to run the firm or produce the output – any of the primary or support activities could be performed by crowd labor  CrowdReviews could provide suggestions for product or service improvement  Crowdsolving might replace a research and development team In short, recalling Howe’s (2008) definition of crowdsourcing, a significant portion of the activities found in the Value Chain Model could be, ‘outsourced to a group of people in the form of an open call.’ The combination of disintermediation and crowdsourcing has created a new landscape in e-commerce. What is even more remarkable is the advent of a particular category of crowdsourcing, called CustomerSourcing. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 317 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) F. Kitchens & C. Crane: CustomerSourcing: Intrinsic Motivators 2.3 CustomerSourcing CustomerSourcing is a unique category of crowdsourcing in which the customers are also serving in the model as the suppliers. The resources which are being provided by the suppliers are actually coming from the customers themselves (Crane & Kitchens, 2013). Perhaps the easiest resource to supply in an e-commerce model would be data. There are many examples of situations where data is supplied to a firm; in which the firm processes the date in some way, and provides it back to the customers. Examples of CustomerSourcing abound. In the most pure form of CustomerSourcing, the customer-suppliers are a closed group; all customers are suppliers, and there are no suppliers who are not customers. A popular example of this situation is found in online- dating sites (Kitchens & Crane, 2014). In this situation the potential customer is required to create an account and upload certain data describing themselves before they are allowed to download any information about other people who might be potential dates. Thus, the customer is forced to first become a supplier, before they may become a consumer of the online-dating site’s services. There are other situations, where the customer-suppliers are not necessarily an exclusive group. Customers might be “potential suppliers;” or suppliers might have an interest in improving the output, but may never choose to consume the resulting output themselves. The social networking industry is built on this concept. Facebook, for example, is the largest social networking site in the world with 1.1 Billion unique monthly visitors (eBiz, 2017). They allow anyone to browse a limited portion of their content (the “public profiles”). To see more content, a potential customer is required to create an account and befriend other customers. This model is depicted in Figure 4: CustomerSourcing Model. Figure 4: CustomerSourcing Model 318 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) F. Kitchens & C. Crane: CustomerSourcing: Intrinsic Motivators Motivation The financial aspect of CustomerSourcing has been explored by Kitchens & Crane (2014); in which the customer-supplier participants were found to fall into 3 broad categories: those with net income, those who broke even, and those who experienced a net outflow. The prospects of breaking even, let alone volunteering to knowingly experience a net financial outflow, gave rise to the question of motivation. Specifically, why do the customer-suppliers participate in an endeavour in which they know they will experience no financial benefit, or will result in a net financial loss? In addition, if these situations harbour ulterior incentives, then perhaps the prospect of financial gain is not the only incentive in the net income category. It has been shown that the motivation for individuals engaged in crowdsourcing can be a mix of intrinsic and extrinsic factors (Aparicio, 2012). 3.1 Intrinsic Motivation Traditionally, intrinsic and extrinsic motivation were thought to be mutually exclusive categories of motivation. The more contemporary view is that these exist as to distinct types of motivation which create a continuum (Vallerand, 1993). While multiple motivators may exist simultaneously, the strength of each motivator may vary from person to person, and from task to task (Aitamurto, 2015; Aitamurto, 2016; Brabham, 2008; Brabham, 2010; Kaufmann, 2011; Brabham, 2012). While financial incentive is one possible motivator on the extrinsic end of the motivation continuum, it may not be the only motivator (extrinsic or intrinsic). On the other end of the continuum, intrinsic motivation can be categorized into sixteen basic desires (Grabmeier, 2000; Riess, 2002). The sixteen categories of intrinsic motivation are:  Acceptance, the need for approval  Curiosity, the need to learn  Eating, the need for food  Family, the need to raise children  Honor, the need to be loyal to the traditional values of one's clan/ethnic group  Idealism, the need for social justice  Independence, the need for individuality  Order, the need for organized, stable, predictable environments  Physical activity, the need for exercise  Power, the need for influence of will  Romance, the need for sex and for beauty  Saving, the need to collect  Social contact, the need for friends (peer relationships)  Social status, the need for social standing/importance  Tranquillity, the need to be safe  Vengeance, the need to strike back and to compete 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 319 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) F. Kitchens & C. Crane: CustomerSourcing: Intrinsic Motivators 3.1.1 Crowdsourcing and Intrinsic Motivation Using these categories, it is possible to classify the major motivators for each of the main crowdsourcing sub-categories. Crowdfunding for example is where the crowd provides financial resources for anything from business start-ups to study-abroad trips for students. Crowdfunding could provide multiple forms of intrinsic motivators. Selecting from the list of 16 intrinsic motivators (Grabmeier, 2000; Riess, 2002), those that most likely apply to Crowdfunding are:  Honor: such as the satisfaction of supporting a family member studying abroad  Curiosity: the opportunity to learn more about a new invention, possibly even being one of the first to own a prototype  Idealism: the opportunity to aid in correcting social justice by supporting an underdog  Saving: the chance to add to a collection in exchange for a financial contribution  Social Status: the chance to be a major (or first) investor in a promising start-up business The classification of forms of crowdsourcing into the 16 forms of intrinsic motivation can be performed for every category. Figure 5: Crowdsourcing and Intrinsic Motivation depicts the classifications for some of the most common forms of crowdsourcing. Figure 5: Crowdsourcing and Intrinsic Motivation 3.1.2 CustomerSourcing and Intrinsic Motivation Focusing specifically on the CustomerSourcing form of Crowdsourcing, it is easy to imagine how each CustomerSourcing site might embody a specific set of intrinsic motivators. Even within the same industry, specific sites may have differing sets of motivators. For example, within the social media industry, two of the leading sites are 320 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) F. Kitchens & C. Crane: CustomerSourcing: Intrinsic Motivators FaceBook and Linkedin. Each has a different purpose and a different audience. This leads to different sets of motivators. FaceBook could have motivators such as:  Acceptance: gaining the reassurance that friends and family approve of one’s choice of holiday or new puppy  Honor: expressing support for one’s family or ethnic group  Independence: an opportunity to express one’s personal opinions or unique interests  Romance: a place to express one’s feelings for another  Social Contact: an opportunity to accept invitations, offer invitations, and to reflect of social events  Curiosity: a place where questions can be posed to friends and family, seeking approval or advice  Idealism: an opportunity to express one’s opinion in an effort to sway public opinion on a social cause  Order: a place where individuals can provide explanation and structure for complex topics  Power: while it is generally considered socially unacceptable; some have used Facebook as a platform for bullying  Social Status: an outlet for the need to brag about oneself  Vengeance: another motivator which is generally considered socially unacceptable; some have used FaceBook to launch social attacks on people or organizations On the other hand, another social media platform, LinkedIn.com, provides a different set of motivators; as do each of the CustomerSourcing platforms. A sample of some of the most common forms of CustomerSourcing, with specific web sites for each, are depicted in Figure 6: CustomerSourcing and Intrinsic Motivation; with the corresponding potential motivators for each. Figure 6: CustomerSourcing and Intrinsic Motivation 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 321 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) F. Kitchens & C. Crane: CustomerSourcing: Intrinsic Motivators Conclusions Identification and classification of intrinsic motivation for crowdsourcing, and more specifically CustomerSourcing, websites is not an activity without consequence. Websites need users. In particular, CustomerSourcing web sites are vitally dependant on their customers as users in order to receive some form of supply for their Value Chain. Yet, some of these sites have no extrinsic benefit to the users – financial or otherwise. Studying these intrinsic factors is vitally important. Site developers need to identify the motivators, and create web sites which support and enhance the users’ intrinsic motivators. The ultimate goal when a site relies on users for some of its value chain items is for an increased number of users, with increased frequency of visits. Further research should seek to quantify the most important motivators which result in increased users and increased frequency of use. References Aitamurto, Tanja (2015). "Motivation Factors in Crowdsourced Journalism: Social Impact, Social Change, and Peer Learning". International Journal of Communication. 9: 3523–3543. Aitamurto, Landemore, Galli (2016). "Unmasking the Crowd: Participants' Motivation Factors, Profile and Expectations for Participation in Crowdsourced Policymaking". Information, Communication & Society. Aparicio, M.; Costa, C.; Braga, A. (2012). "Proposing a system to support crowdsourcing." OSDOC '12 Proceedings of the Workshop on Open Source and Design of Communication. Brabham, Daren C. (2008). "Moving the Crowd at iStockphoto: The Composition of the Crowd and Motivations for Participation in a Crowdsourcing Application". First Monday. Brabham, Daren C. (2010). "Moving the Crowd at Threadless: Motivations for Participation in a Crowdsourcing Application". Information, Communication & Society. 13: 1122–1145. Brabham, Daren C. (2012). "Motivations for Participation in a Crowdsourcing Application to Improve Public Engagement in Transit Planning". Journal of Applied Communication Research. 40: 307–328. Brabham, Daren C. (2013). Crowdsourcing. Cambridge: The MIT Press Essential Knowledge Series. Chaordix. (2014). Crowdsourcing 101. January 21, 2014, www.chaordix.com/crowdsourcing-101 Crane, Cameron; Kitchens, Fred L. (2013) Transforming Traditional Business Models Through Disruptive Technology. Proceedings of the Management, Knowledge and Learning (MakeLearn) International Conference 2013. Zadar, Croatia. June 19-21, 2013. DeVun, Leah (2009). Looking at How Crowds Produce and Present Art. Wired News. November 19, 2009. Doan, A; Ramarkrishnan; R; Halevy, A (2011), "Crowdsourcing Systems on the World Wide Web" (PDF), Communications of the ACM 54 (4): 86–96 eBiz MBA (2017). Top 15 Most Popular Social Networking Sites | February 2017. eBiz MBA: the eBusiness Guide. 2/20/2017 http://www.ebizmba.com/articles/social-networking-websites 2/20/2017 Grabmeier, J. (2000) "New Theory of Motivation Lists 16 Basic Desires That Guide Us". Research News. Ohio State. 2000-06-28. Retrieved 2017-02-15. 322 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) F. Kitchens & C. Crane: CustomerSourcing: Intrinsic Motivators Horton, J.J; Chilton, L.B. (2010). The Labor Economics of Paid Crowdsourcing. Proceedings of the 11th ACM Conference on Electronic Commerce, June 7-9, 2010 (209-218). New York: ACM. Howe, Jeff. (2006). The Rise of Crowdsourcing. Wired Magazine. 14 (6), 1-4. June 6, 2006. Howe, Jeff. (2008). Crowdsourcing: Why the Power of the Crowd is Driving the Future of Business. January 15, 2014, www.crowdsourcing.com. Kaufmann, N.; Schulze, T.; Viet, D. (2011). "More than fun and money. Worker Motivation in Crowdsourcing – A Study on Mechanical Turk". Proceedings of the Seventeenth Americas Conference on Information Systems. Kitchens, F., & Crane, C. (2014) CustomerSourcing: to Pay or be Paid. Proceedings of the 27th Bled eConference, June 1-5, 2014, Bled, Slovenia. Laudon, K. C., & Traver, C. G. (2012). E-commerce: business, technology, society (8th ed.). Boston: Pearson. Nesta. (2017). The Alkali Prize: Sometimes it's a Case of the Right Idea, at the Wrong Time. 2/15/2017, https://www.nesta.org.uk/news/guide-historical-challenge-prizes/alkali-prize Pinto, J. (2000). Disintermediation Stirs up Industrial Automation. Controls Intelligence & Plant Systems Report, March 2000. Porter, M. E. (1985). Competitive advantage: creating and sustaining superior performance. New York: Free Press. Reiss, Steven (2002). Who am I? The 16 Basic Desires that Motivate Our Actions and Define Our Personalities. Berkley Trade. ISBN 978-0425183403. Tredinnick, L. (2006). Web 2.0 and Business. Business Information Review, 23(4), 228-234. Vallerand, R. J. (1993). The Academic Motivation Scale: A Measure of Intrinsic, Extrinsic, and Amotivation in Education. Educational and Psychological Measurement, 52 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons A First Step Towards Learning Analytics: Implementing an Experimental Learning Analytics Tool 23 JUSTIAN KNOBBOUT & ESTHER VAN DER STAPPEN Abstract The educational domain is momentarily witnessing the emergence of learning analytics – a form of data analytics within educational institutes. Implementation of learning analytics tools, however, is not a trivial process. This research-in-progress focuses on the experimental implementation of a learning analytics tool in the virtual learning environment and educational processes of a case organization – a major Dutch university of applied sciences. The experiment is performed in two phases: the first phase led to insights in the dynamics associated with implementing such tool in a practical setting. The second – yet to be conducted – phase will provide insights in the use of pedagogical interventions based on learning analytics. In the first phase, several technical issues emerged, as well as the need to include more data (sources) in order to get a more complete picture of actual learning behavior. Moreover, self-selection bias is identified as a potential threat to future learning analytics endeavors when data collection and analysis requires learners to opt in. Keywords: • Learning Analytics • Tool • Implementation • Experiment • Education • CORRESPONDENCE ADDRESS: Justian Knobbout, HU University of Applied Sciences Utrecht, Nijenoord 1, 3552 AS Utrecht, The Netherlands, e-mail:justian.knobbout@hu.nl. Esther van der Stappen, HU University of Applied Sciences Utrecht, Nijenoord 1, 3552 AS Utrecht, The Netherlands, e-mail: esther.vanderstappen@hu.nl. https://doi.org/10.18690/978-961-286-043-1.23 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 324 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) J. Knobbout & E. van der Stappen: A First Step Towards Learning Analytics: Implementing an Experimental Learning Analytics Tool Introduction Data analytics is already applied in many industries. The educational domain, however, has only recently started using data to improve its processes (Ferguson, 2012). Analytical activities aimed at improving education at a micro-level of educational institutes is called learning analytics: “the measurement, collection, analysis and reporting of data about learners and their contexts, for purposes of understanding and optimizing learning and the environment in which it occurs” (Long et al., 2011). Common research objectives include modelling student behavior in virtual learning environments and prediction of performance (Papamitsiou & Economides, 2014). The learning analytics process comprises four steps: 1) learners generate data, 2) these data are captured, collected and stored, 3) analysis and visualization of the data, and 4) the design and use of data-driven pedagogical interventions (Clow, 2012). The process is a cycle, as the effects of the interventions can again be measured, analyzed, visualized et cetera - see Figure 1. Figure 1: Learning Analytics Cycle (Clow, 2012) Many examples of small-scale learning analytics initiatives exist (cf. MacFadyen & Dawson, 2010; Romero-Zaldivar et al., 2012; Lonn, Aguilar & Teasley, 2015; Fidalgo- Blanco et al., 2015). Our case organization, however, has only very limited experience with the application of learning analytics. To overcome this lack of experience, a learning analytics experiment is conducted. This study aims at identifying and understanding some of the dynamics associated with the implementation of learning analytics tools within the case organization and in educational institutes in general. Two research questions will be answered: 1) what issues are encountered when implementing an experimental learning analytics tool in the case organization’s virtual learning environment, and 2) in what way can the visualizations in the learning analytics teacher dashboard be used to design and perform timely pedagogical interventions? In this study, we will implement a externally developed learning analytics tool and research what barriers need to be overcome in order to apply the visualizations of the tool to education. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 325 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) J. Knobbout & E. van der Stappen: A First Step Towards Learning Analytics: Implementing an Experimental Learning Analytics Tool The remaining of this paper is structured as follows. First, the background of learning analytics processes and our experiment will be provided. We then elaborate on the primarily findings of the experiment conducted thus far. Finally, future work will be described. Background Higher educational institutes implementing learning analytics processes face several difficulties, e.g., changing existing information systems by implementing a learning records store (LRS) and customizing data streams (del Blanco et al., 2013); managing the increase in workload for teachers (Whale, Valenzuela & Fisher, 2013); and making sure all activities are in compliance with privacy legislation (Jisc, 2015). Greller & Drachsler (2012) provide a generic learning analytics framework with six critical dimensions to consider whilst setting up learning analytics services - see Figure 2. Figure 2: Learning Analytics Framework (Greller & Drachsler, 2012) In order to help Dutch higher educational institutes overcome the aforementioned difficulties, SURFnet set up the learning analytics experiment (2016). The experiment provides all instruments – IT-architecture, data standard, algorithms – required to answer five pre-defined pedagogic questions. These questions are sourced from previous research aimed at identifying questions relevant for Dutch educators (Berg et al., 2016). Setting up the tool is relatively easy, as the only necessarily activities involve putting tracking codes on the pages and learning materials in the virtual learning environment. 326 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) J. Knobbout & E. van der Stappen: A First Step Towards Learning Analytics: Implementing an Experimental Learning Analytics Tool Since the codes can easily be copy-pasted, only basic computer skills are required. Once placed, the codes allow data to be stored in a learning records store, from which the data can be analyzed and visualized in a dashboard. See Figure 3 for the learning analytics architecture and Figure 4 for the resulting dashboard as seen with a teachers’ account. Teachers can see the anonymized activities of all learners in the experiment; learners have their individual dashboard and can view their own activities. To ease compliance with Dutch privacy laws, students must opt-in to allow their data being captured and analyzed. Figure 3: Learning Analytics Architecture (source: SURF, 2016) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 327 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) J. Knobbout & E. van der Stappen: A First Step Towards Learning Analytics: Implementing an Experimental Learning Analytics Tool Figure 4: Dashboard As Seen With Teacher Account Our case organization is a large university of applied sciences in the Netherlands. At two locations within the organization the Learning Analytics Experiment is conducted; at the Institute of Engineering and Design (IED) and at the Institute of Teacher Education (ITE). At IED, data is collected by tracking activities performed by first-year students of the Business Engineering undergraduate program enrolled in a statistics course. ITE, on the other hand, educates future secondary school English teachers - the experiment is here conducted in the courses Curriculum Design and ICT-rich Education. Research objectives and method The objective of this study is to research to what extent it is possible to perform learning analytics activities in the case organization’s virtual learning environment and what barriers are encountered when doing so (first phase of the experiment), and to research in what way pedagogical interventions can be designed and performed during the course by teachers based on the visualizations in the learning analytics dashboard (second phase of the experiment). We do this by answering the following research questions: 1. What issues are encountered when implementing an experimental learning analytics tool in the case organization’s virtual learning environment? 2. In what way can the visualizations in the learning analytics teacher dashboard be used to design and perform timely pedagogical interventions? We use the framework of Greller & Drachsler (2012) to create a shareable description of context parameters for this learning analytics project. Below, we describe the first phase of the learning analytics experiment in Table 1. In the section Future Work of this paper, we will provide a description of the proposed second phase. 328 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) J. Knobbout & E. van der Stappen: A First Step Towards Learning Analytics: Implementing an Experimental Learning Analytics Tool Table 1: Learning Analytics Experiment Case Description After the first phase of the experiment, all involved teachers and researchers from SURFnet evaluated the process and outcomes during a focus group. Based on open observations, all experiences worth pointing out by the participants were discussed and notated. As all teachers involved encountered the same issues, consensus was reached fast. This led to the description of the preliminary results, as shown in the next section. Preliminary results The first round of the experiment resulted in several experiences and insights. In this section, we will elaborate on the most pressing results. First, an overview of encountered issues is provided. These are then categorized according to the dimensions of the learning analytics framework (Greller & Drachsler, 2012). 4.1 Technical issues Although it is relatively easy to set up the tracking at the virtual learning environment, some technical issues arose. During the experiment, it became clear that not all activities were tracked. Root cause for this anomaly were the necessity to opt-in for the experiment; students who opted-in only provided permission to capture data from the specific device they used to subscribe. This results in incomplete datasets and renders extensive data 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 329 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) J. Knobbout & E. van der Stappen: A First Step Towards Learning Analytics: Implementing an Experimental Learning Analytics Tool analysis useless. The causing issue has been resolved, so this problem will not appear in the second round of the experiment. Another encountered technical issue relates to the SURFconext connection between the case organization’s virtual learning environment and the SURFnet learning analytics dashboard. With SURFconext, it is possible for students to log in the learning analytics dashboard by using their own institutional username and password. This saves the need to create a new account. To establish the connection, the institutional SURFconext contact person must login his administrator account and provide permission to do so. At the beginning of the experiment, however, the connection was not allowed until only a few hours before the start of the courses. This almost led to cancellation of the experiment as the researchers did not want to confuse students with non-working dashboards and connections. This experience shows the need for institutional-broad support and cooperation in order to make learning analytics work. 4.2 Self-selection bias Students need to opt-in for the experiment, allowing their data being captured and analyzed. Of the 234 Business Engineering students who enrolled in the course (both first-year students and students from later years wanting to retake the exam), 89 opted-in – only 38%. Similar proportions were found at the other institute. After the final exam of the course, the difference between the final grade of the students who participated in the experiment and those who did not were calculated using SPSS. Participants scored an average grade of 5.1 (sd = 2.2) and non-participants an average grade of 4.3 (sd = 2.3). An independent t-test shows there is a significant difference (p = 0.032) between the two groups and students who participated in the experiment scored on average better than those who did not. As no interventions were initiated based on the information in the dashboard, it is suspected that self-selection takes place. Future initiatives involving voluntary participation must account for this effect. 4.3 Need for more data In order to perform effective interventions, rich data is required (Tempelaar et al., 2015; Conijn, 2016). In our experience, the current data is too poor to use for interventions. The lack of sufficient data can partly be traced back to the teachers who put too few tracking codes on their course page of the virtual learning environment. As one of the involved teachers puts it: “next time I will track everything: every page, every article and every video.” The experiment also relied on data from the virtual learning environment only. This provides only one side of the story - anecdotal observations of students using the online materials showed that they sometimes jointly sit together at a single computer to work on assignments, having the system only registering one student. Similarly, interaction between these students cannot be measured this way (Pardo & Kloos, 2011). In our experiment, data from other resources was not aggregated with the data in the learning records store. For example, the virtual learning environment provides students 330 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) J. Knobbout & E. van der Stappen: A First Step Towards Learning Analytics: Implementing an Experimental Learning Analytics Tool the possibility to take quizzes. Quiz data (results, number of attempts, required amount of time to finish), however, are yet not stored and processed in the records store. In order to design and perform effective interventions, these data must be aggregated in future experiments. 4.4 Problem categorization based on learning analytics framework In order to analyze which dimensions of the learning analytics framework (Greller & Drachsler, 2012) are causing problems during the implementation of the tool, we mapped the identified issues to the framework – see Table 2. This shows that four out of six dimensions faced difficulties so even though an almost ‘plug-and-play’ tool is provided, implementing it is a non-trivial endeavor. Table 2: Problems Encountered per Dimension of Learning Analytics Framework Future work The experiment will be continued in the Fall of 2017. At the Institute for Engineering and Design, two courses will implement the learning analytics tool in their course design. One of the courses is taught to fulltime students, the other one to part-time students. This provides the opportunity to explore behavioral differences between participants of the two programs. Furthermore, to date, no interventions were performed based on the data analysis and visualizations in the experiment. Learning analytics research in general often focuses on data collection, management or how data will help to improve education but designing effective pedagogical interventions becomes a critical element (Wise, 2016). Now we have demonstrated the tool can be implemented in the case organization’s virtual 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 331 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) J. Knobbout & E. van der Stappen: A First Step Towards Learning Analytics: Implementing an Experimental Learning Analytics Tool learning environment, we aim to use it for intervention design. This calls for extended requirements, as described in Table 3. The next phase of the experiment will continue the current work and focus on answering the question in what way the visualizations in the learning analytics teacher dashboard can be used to design and perform timely pedagogical interventions. That is, interventions should take place when it is still possible to make changes to the learning behavior, i.e., during the course. Both the practical experiences gained and the to-be performed interventions benefit practitioners from the educational domain as it provides first-hand insights in the dynamics involved with starting learning analytics activities. Table 3: Future Learning Analytics Experiment Case Description References Berg, A., Bogaard, M. van den., Drachsler, H., Filius, R., Manderveld, J., & Schuwer, R. (2015). Grand challenges learning analytics & open en online onderwijs: een 332 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) J. Knobbout & E. van der Stappen: A First Step Towards Learning Analytics: Implementing an Experimental Learning Analytics Tool verkenning [whitepaper]. Retrieved from https://www.surf.nl/binaries/content/assets/surf/nl/kennisbank/2015/rapport-grand- challenges-la--ooo---een-verkenning.pdf on 11 May 2017. Clow, D. (2012). The learning analytics cycle: Closing the loop effectively. Paper presented at the Proceedings of the 2nd International Conference on Learning Analytics and Knowledge, pp. 134-138. Clow, D. (2013). An overview of learning analytics. Teaching in Higher Education, 18(6), 683-695. Conijn, R., Snijders, C., Kleingeld, A., & Matzat, U. (2016). Predicting student performance from LMS data: A comparison of 17 blended courses using moodle LMS. IEEE Transactions on Learning Technologies, Del Blanco, Á., Serrano, Á., Freire, M., Martínez-Ortiz, I., & Fernández-Manjón, B. (2013). E-learning standards and learning analytics. can data collection be improved by using standard data models? Paper presented at the Global Engineering Education Conference (EDUCON), 2013 IEEE, pp. 1255-1261. Ferguson, R. (2012). Learning analytics: Drivers, developments and challenges. International Journal of Technology Enhanced Learning, 4(5-6), 304-317. Fidalgo-Blanco, Á., Sein-Echaluce, M. L., García-Peñalvo, F. J., & Conde, M. Á. (2015). Using learning analytics to improve teamwork assessment. Computers in Human Behavior, 47, 149-156. doi:http://dx.doi.org/10.1016/j.chb.2014.11.050 Greller, W., & Drachsler, H. (2012). Translating learning into numbers: A generic framework for learning analytics. Educational Technology & Society, 15(3), 42-57. Jisc (2015). Code of practice for learning analytics. Retrieved from http://www.jisc.ac.uk/guides/code-of-practice-for-learning-analytics on 11 May 2017. Long, Philip, George Siemens, Gráinne Conole and Dragan Gašević (2011). Proceedings of the 1st International Conference on Learning Analytics and Knowledge (LAK11). Banff, AB, Canada, Feb 27 - Mar 01, 2011. New York: ACM. Lonn, S., Teasley, S., & Krumm, A. (2009). Investigating undergraduates' perceptions and use of a learning management system: A tale of two campuses. Paper presented at the Annual Meeting of the American Educational Research Association (April 16th), San Diego, California. Retrieved June, , 6. pp. 2014. Macfadyen, L. P., & Dawson, S. (2010). Mining LMS data to develop an “early warning system” for educators: A proof of concept. Computers & Education, 54(2), 588-599. Papamitsiou, Z. K., & Economides, A. A. (2014). Learning analytics and educational data mining in practice: A systematic literature review of empirical evidence. Educational Technology & Society, 17(4), 49-64. Pardo, A., & Kloos, C. D. (2011). Stepping out of the box: Towards analytics outside the learning management system. Paper presented at the Proceedings of the 1st International Conference on Learning Analytics and Knowledge, pp. 163-167. Romero-Zaldivar, V., Pardo, A., Burgos, D., & Kloos, C. D. (2012). Monitoring student progress using virtual appliances: A case study. Computers & Education, 58(4), 1058-1067. SURFnet (2016). Het learning analytics experiment. Retrieved from https://blog.surf.nl/het- learning-analytics-experiment/ on 11 May 2017. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 333 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) J. Knobbout & E. van der Stappen: A First Step Towards Learning Analytics: Implementing an Experimental Learning Analytics Tool Tempelaar, D. T., Rienties, B., & Giesbers, B. (2015). In search for the most informative data for feedback generation: Learning analytics in a data-rich context. Computers in Human Behavior, 47, 157-167. Wise, A. F., Zhao, Y., & Hausknecht, S. N. (2014). Learning analytics for online discussions: Embedded and extracted approaches. Journal of Learning Analytics, 1(2), 48-71. 334 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravest eijn, R. Clarke & R. Bons Personalizing Narratives to Support Motivation for Physical Activity 24 OLLI KORHONEN, MICHAEL ODUOR & MINNA ISOMURSU Abstract Technology supporting motivation for physical activity has been a common theme for researchers and companies during the last decade. Mobile devices and applications with diverse features provide novel and personalized ways to motivate users for healthier lifestyles. Features like goal orientation and self-monitoring are common for activity and emotion tracking applications, and lately there has been interest also in the use of narratives. Consequently, in this study we evaluate through a qualitative study how narratives are used to motivate physical activity. We analyze both user and system-specific characteristics using nexus analysis and conclude with three techniques for personalizing narratives. Keywords: • Personalization • Narratives • Motivation • Physical Activity • User Experience • Nexus Analysis • CORRESPONDENCE ADDRESS: Olli Korhonen, University of Oulu, Pentti Kaiteran katu 1, 90014 Oulu, Finland, e-mail: olli.korhonen@oulu.fi. Michael Oduor, University of Oulu, Pentti Kaiteran katu 1, 90014 Oulu, Finland, e-mail: michael.oduor@oulu.fi. Minna Isomursu, IT University of Copenhagen, Nørregade 10, 1165 København, Denmark, e-mail: miis@itu.dk. https://doi.org/10.18690/978-961-286-043-1.24 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 336 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) O. Korhonen, M. Oduor & M. Isomursu: Personalizing Narratives to Support Motivation for Physical Activity Introduction Being physically active is not only beneficial for an individual, but also for the society (Kranz et al., 2013). Modern world health problems like obesity have become common (Campbell, Ngo and Fogarty, 2008; Consolvo et al., 2006) and people are facing difficulties in maintaining physical activity in their everyday lives (Consolvo et al., 2006) which emphasizes the possibility of encouraging more active lifestyles by changing individual exercise habits. Thus, it is evident that people should be encouraged and motivated to maintain their mobility behavior. In recent years, a number of mobile devices and applications that aim at supporting people in their athletic endeavors and other physical activities have emerged and these applications, with various tracking features, encourage people to exercise more (Ahtinen et al., 2008). These exercise applications provide opportunities for personalized health services, which make use of digital data in proactive and personalized ways (Häkkilä et al., 2015). In this study, we examine the use of narratives in motivating users to engage in physical activity. We collected data using participatory observation, a focus-group, and semi- structured interviews, after which we analyzed users’ reasons and motivations for exercising and use of the exercising application applying a nexus analysis (Scollon, 2004) approach. With nexus analysis, the aim is to deepen the understanding of the qualitative data collected (Molin-Juustila et al., 2015). The concept of user experience is widely applied in the fields of human-computer interaction (HCI) and interaction design and it is used for collecting subjective experiences, comprising the interaction between people and products (Forlizzi and Battarbee, 2004). By analyzing these experiences, we search for techniques for personalizing narratives. Our research increases the understanding of narratives as a motivational strategy and their impact on individuals’ motivation. Related Work As modern life has increasingly been intertwined with digital technology, leisure activities are an important arena that have seen a lot of digitalization (Eklund, 2015). In recent years, for example, sports and overall wellbeing are topics receiving increased interest from research as well as from industry (Buttussi, Chittaro and Nadalutti, 2006). For this reason, both software developers and the general audience should be aware of the various ways of and the approaches to how people may be, are being, and will be influenced through the design of computer systems (Oinas-Kukkonen, 2013). The HCI community has strived to promote wellbeing by developing applications and technologies that monitor and track users’ activities. This has mainly been through use of theoretical frameworks derived from persuasion and social psychological theories, which make use of behavioral components like regular feedback and reminders to users in their physical activities (Maitland and Siek, 2009). 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 337 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) O. Korhonen, M. Oduor & M. Isomursu: Personalizing Narratives to Support Motivation for Physical Activity A related concept, gamification, the application of game design elements in non-game contexts (Deterding et al., 2011) has also become prevalent. Gamification can have a positive impact in health and wellbeing (Johnson, et al., 2016) and there have been increasing interests in using game principles in non-game contexts to make a challenging activity, such as exercising, more enjoyable and integrated into the users daily lives (Goh and Razikin, 2015). One basic element in gaming are narratives. In gaming, narratives are used to structure games into logical series’. Unlike traditional narratives in movies, for example, which are linear and fixed, in games, players interact with the narratives, and the structure of the narratives is typically nonlinear (Qin, Patrick Rau and Salvendy, 2009). Among the motivations for exercise is usually a discrepancy between the desired and actual lifestyle, and technology is used to support people towards a lifestyle they would like to lead (Consolvo, McDonald and Landay, 2009). Motivation is an essential feature in exercising as it highlights individual differences in behaviors when engaging in exercise (Patel and O’Kane, 2015). Using exercise applications is a complex mix of motivation towards exercising, satisfaction towards the application, external pressure, and actual effect of the usage of the application (Ahtinen et al., 2009). In this study, we consider both intrinsic and extrinsic motivation (Vallerand and Losier, 1999). Intrinsic motivation refers to exercising for internal reasons like fun and pleasure. Extrinsic motivation emphasizes the role of external factors in motivating behavior. For example, exercising because of the expectation of a reward (Vallerand and Losier, 1999). Recently, motivational factors for exercising have been studied, for example, in the context of young adults doing physical activity (Capel et al., 2015). Capel et al. (2015), found that goal achievement, staying healthy, and social aspects were the key motivational factors for adolescents. More sustainable motivational factors have been studied by Fritz et al. (2014) where the authors interviewed users that had been using persuasive technology devices constantly for at least three months. The authors found that, routinized usage, integration to daily life, numerical feedback, and awareness of the value provided were the key factors that motivated users towards a more sustainable use of technology (Fritz et al., 2014). Research Methodology The research method applied in this study is nexus analysis (Scollon, 2004), a research strategy that uses discourse analysis and other methods well-suited for studying complex social action. In nexus analysis, each social action is thought to be mediated by the interaction order (relationships and power structures) among participants in a particular environment; the historical body–previous knowledge, experience, attitudes, and assumptions that the participants bring into the action; and, the discourses in place, that is, the discourses that are associated with or embedded in the scene of the action (Scollon, 338 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) O. Korhonen, M. Oduor & M. Isomursu: Personalizing Narratives to Support Motivation for Physical Activity 2004). In this study, the concepts of historical body and interaction order are used in our analysis. 3.1 Study Context The artefact under examination is Zombies, Run! Zombies Run! is an exercise application that is available for mobile devices through Google Play and Apple’s App store. It is a running game with zombies as a survival story, is meant to be an immersive adventure, and “the game takes the player into a post-zombie-apocalypse world” (Southerton, 2013). The idea is to be outdoors as the application is story-based and at certain intervals, during the story, one is instructed to do certain things. Users can pick a mission before they start their run or follow a predefined series of missions culminating in an entire season. The unique characteristics related to apocalyptic narratives make the game as a good example of a gamification-based application (Helf and Hlavacs, 2016). The application includes gamification elements such as, rewards, distance challenges, points, as well as supplies to be collected during the runs. Runs can be synced online and progress can be shared in various social media outlets like Facebook. Zombies Run! initially started as a premium service, but recently (in 2015) launched a freemium version–the basic application is free, but additional services and storylines that can improve the user experience come at a fee. 3.2 Data Collection and Analysis Six participants were recruited for this study. All participants were female postgraduate students. We were interested in studying the users’ motivational factors for exercising, usage of the application, and to examine the role of narratives in motivating exercise. According to their level of familiarity with the application, participants were categorized into two groups: Experienced and Inexperienced (Table 1) and were assigned aliases that will be used henceforth to represent them. Inexperienced users had minimal or no prior experience with the application, whereas experienced users had been using the application for at least 2 months. Multiple qualitative data collection methods were used for achieving methodological triangulation. Data was collected using three different methods: 1) a focus group which was video recorded, 2) semi-structured interviews, and 3) participant observations, where participants were asked to think aloud and also video recorded during exercise. Data collection occurred between September and November 2015 and recruitment was mainly done using snowball sampling (Patton, 2005). 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 339 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) O. Korhonen, M. Oduor & M. Isomursu: Personalizing Narratives to Support Motivation for Physical Activity Table 1: Categorization of Participants and Data Collection Participant Experience level Data collection 1. Abbey Inexperienced Participant observation and focus group 2. Becky Experienced Focus group 3. Carla Experienced Focus group 4. Debbie Inexperienced Participant observation and semi-structured interview 5. Ellen Inexperienced Semi-structured interview 6. Felicia Experienced Semi-structured interview The focus group had 3 participants. One inexperienced user, Abbey and two experienced users, Becky and Carla. The focus group consisted of open-ended questions, starting from basic questions related to participants’ motivations for exercise and covering exercising habits, role of technology in exercising, hindrances towards exercise and their experiences of Zombies Run! Following the focus group, participant observation (video recorded) while using the application and three semi-structured interviews, each lasting 40-60 minutes, were conducted. Interviews consisted of similar questions to those in the focus group, and the aim of recording was to capture users’ authentic feelings and user experiences when using the application. Interviews were transcribed and the data was analyzed using NVivo11 software. Data analysis process was twofold: first we identified, and categorized general discourses regarding motivations for exercising, and the role of narratives (and other application features) in exercising. Second, the concepts of interaction order and historical body (Scollon, 2004) were applied, in order to understand the motivations and the role of narratives more clearly. Results Generally, all participants had positive thoughts about exercising, but some of them pointed out the need for extra motivation, which could be provided, for example, by exercise applications. 4.1 Historical Body Historical body refers to an individuals’ background, experiences, beliefs and practices, which may influence their view of and interactions with different media (Scollon, 2004). Abbey, Debbie and Ellen (inexperienced users) had not used the application prior to the study, whereas Becky, Carla and Felicia (experienced users) had. Two of three experienced users participated in the focus group and one in a semi-structured interview. Abbey regularly went to the gym, went jogging, and also walked. Due to her already active lifestyle, she felt that she did not need any extra motivation to exercise (or to use the application). As she had used other activity tracking applications, she was clear on what she expected from such applications. Narratives were not, for her, a compelling 340 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) O. Korhonen, M. Oduor & M. Isomursu: Personalizing Narratives to Support Motivation for Physical Activity reason to use the application. Debbie was video recorded while jogging and participated in a semi-structured interview. She stated that she was physically active and exercised regularly, but at times finding time to exercise was a problem. Debbie also occasionally used activity tracking applications. Ellen participated in a semi-structured interview. She used to exercise in various (playing floorball, participating in group exercises, jogging) ways but the frequency had been decreasing due to tight time schedules and difficulties in starting to exercise again. Becky participated in a focus group. She had been using the application for about half a year and prior to that she hardly exercised. The main reason for using the application was because it was different and she needed something interesting to get her to exercise regularly. The role of narratives was very important in her decision to purchase the application, as can be seen in the following quote: “I bought it (the application) because it is geeky and fun, and it sounded more interesting than other running apps” (Becky). Carla had been using the application for a longer period of time. She enjoyed the zombie genre and liked listening to the narratives. Prior to using the application, she was not very active and she stated that the application helped her to improve her exercise habits. The narratives and pre-set goals motivated her to exercise more because she saw pre-set goals as challenges that had to be completed, which she was incrementally able to do as illustrated by the comments below: “The 5k which I tried first is perfect for anyone who has not been running, but wants to start. You start with really small steps and in the first parts you just run for 30 seconds or something” (Carla). “It really improved my running a lot. I would say, within six months. In the beginning I would run for five kilometers, and after six months I could run twenty, so there is a big difference” (Carla). Felicia participated in a semi-structured interview. She stated that she was physically active but finds it difficult to be consistent. Her motivation to exercise was related to wellbeing as exercising made her feel more energetic. Felicia mostly exercised alone because she wanted to focus on only that when doing it. The quote below illustrates this: “I like exercising alone. For example, if I go to gym, I try to go there as late or as early as I can, so that there is no one else. Also when running, I prefer to run alone” (Felicia). 4.2 Interaction Order Interaction order is about how relationships and technical affordances (if within a technical environment) affect people’s interaction. The interaction order entails studying how mediated actions occur: whether alone, in groups, the time, what precedes or triggers 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 341 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) O. Korhonen, M. Oduor & M. Isomursu: Personalizing Narratives to Support Motivation for Physical Activity an activity and so on (Scollon, 2004). The different kinds of (social) interactions that can take place are supported or encouraged by different design/feature implementations and these in turn control or limit users’ actions. Other than supporting the primary intent, which is jogging, in Zombies Run!, there are game-like features where users collect various supplies that help protect from a zombie attack and can be used to rebuild one’s virtual town. Users can also share information about their exercises via social media channels or via Runkeeper that offers more social features than Zombies Run! Abbey felt that the narratives in the missions were a distraction and they could be shorter. Although the narrative and game-like features are what initially attracted her to the application, Becky felt that they were not an integral part of the running experience. After using the application for a while, Carla and Felicia also stated that the narratives could be improved on by making them shorter or by reducing the time in between stories. There are long pauses in the stories when running that make it difficult to continually concentrate on a mission because one’s focus is, every now and then, shifted away from a particular mission. Carla needed a distraction from the narratives because of the long pauses, and according to Abbey, the option of listening to music during the breaks in the mission was even more of a distraction as one had to switch between “two states of mind”– the joy provided by the music and the concentration needed in the mission. Abbey and Carla also felt that social features were not important for enhancing their experience of or engagement with the application. Becky, on the other hand, felt that social elements were important and a key feature needed to give her that extra motivation to exercise. For Ellen, a lack of actual interactivity in the stories negatively affected her experience with the application. All the participants felt that the virtual rewards did not add any value or interactivity to a mission and the running experience would have been the same with or without them. Debbie, and Ellen felt that it would have been much better if collecting or winning something in the mission would have been linked to a physical activity. For example, in order to win a first-aid-kit, one had to either increase their speed or do jumping jacks that were directly linked to the item collected. Personalization of Narratives Nexus analytic concepts of historical body (life histories and experiences of the participants), and interaction order (relationships between participants engaged in social action) (Scollon, 2004; Molin-Juustila et al., 2015) enabled us to study narratives as a motivational feature. Instead of a generic narrative, narrative adaptation is one method for personalized gaming (Bakkes, Tan and Pisan, 2012). Personalized narratives are related to interactive storytelling, where the game content is personalized according to user preferences (Bostan and Marsh, 2010). We thus agree with Göbel et al (2010) that it is not feasible to create a narrative for each individual user. Therefore, based on our analysis, we propose three different narrative personalization techniques in the form of use cases. 342 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) O. Korhonen, M. Oduor & M. Isomursu: Personalizing Narratives to Support Motivation for Physical Activity 5.1 Personalizing Narratives for Goal Achievement This technique proposes that narratives are personalized based on users’ goals. Once the user sets a personal goal, narratives are personalized to support the achievement of that goal. By monitoring users, the system identifies that achieving a personal goal requires a longer run, for example, and by personalizing the narrative, the system systematically persuades users to achieve their goals. The following quotes present some of the user goals: “You have a certain goal for every exercise you do, and that gives structure to your exercise. I think that is one of the most motivating things for me. To have a certain specific goal” (Ellen). “As for me, I think what I find motivating about running is the improving, getting faster, going further” (Becky). “That is one motivation. Losing a little weight” (Felicia). “…I have run for twenty-five minutes this week even though last week I could only run for fifteen minutes. The number of kilometers I have been running is more related to personal goals. Not that much of the goals set by the system” (Felicia). Personal goals between users vary; some try to lose weight, whereas some want to improve in running. The following use case illustrates this narrative personalization technique: A while back, Ellen was an active young woman but recently she has been demotivated and her husband constantly reminds her about her New Year’s promise to exercise more. Previous sports applications supported her goal settings, but this application also provides narratives tailored to her goals. Her goal is to lose weight and increase the distance she can run. After one month has passed, Ellen is not likely to achieve her goals. Therefore, the application adjusts the narratives to last for 60 instead of 40 minutes (length of basic episode). Goal setting is supported on many sports applications, but personalizing narratives to certain goals set by users is not that common. Once users set their goals, the system personalizes a narrative by either lengthening or shortening an episode to support the achievement of those goals. 5.2 Personalizing Gamification level of Narratives This technique proposes that gamification level is personalized. Some users preferred to passively listen to the narratives without game elements, whereas others would have liked 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 343 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) O. Korhonen, M. Oduor & M. Isomursu: Personalizing Narratives to Support Motivation for Physical Activity more “playful” elements in the narratives, whether it was related to goal achievement, building a virtual base, or the integration of narratives into their surroundings: “Application did not succeed in motivating me because it was not actually interactive at all. I was expecting some interactivity related to achieving my goals” (Ellen). “In the game, base can be improved, but improving that base has no effect on the missions or how the story goes on” (Felicia). “Because I wanted to experience something I started to ‘play the storyline’, like when I heard that bandages or whatever were picked, I started to pick some leaves fallen from the trees” (Debbie). By personalizing gamification level, system could provide more (or less) gamification elements, tasks for users to complete for building the base, or provide “sub” missions that are integrated to certain locations and surroundings of the user. The following use case illustrates this technique: Debbie has heard about Zombies, Run! from her friend Carla. Carla persuades her to try the applications and upon installing it, she is asked to set her location (Springfield) and level of gamification (high or low). After a while, zombies are chasing her as she collects virtual bandages. Concurrently, in the narrative, there are facts integrated to Springfield, where zombies have captured the town hall. To rescue the town hall, she has to run intensively to the hall in order to expel the zombies. Debbie does this and the she is rewarded by getting an extra town hall badge that can be used in her virtual base also. 5.3 Personalizing Genre or Intensity of Narratives This technique proposes that the narrative genre is personalized based on users’ preferences. Some users were willing to have more intense storylines, whereas others preferred milder ones. The following quotes present the ideas of genre based personalization: “You should have different storylines for other people as well, I could never imagine my mom going running with the zombies” (Abbey). “There could be some adjusting in the storylines. You could for instance exclude the zombies or choose a different kind of narrative” (Carla). As zombies are ‘the selling point’ in the application, excluding the theme fully may not be appropriate. However, letting users personalize the intensity/genre of a storyline, from scary to light, could attract a wider audience to the narratives. The following use case illustrates this technique: 344 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) O. Korhonen, M. Oduor & M. Isomursu: Personalizing Narratives to Support Motivation for Physical Activity Felicia, is a true zombie freak who has been organizing annual zombie parades in her local area. She was an early adopter of the application and now she is listening to the narratives again, but with a new scary-mode on. As she jogs, the zombies are ultra- aggressive, and she loves it. This is something she wants to show to her sister. As her sister Abbey tries the scary-mode, she does not like it and quits right away. She blames Felicia for even suggesting her to try that. Felicia calms her sister down and lets her know that the intensity can be adjusted. Switching it from ‘scary’ to ‘light’ she persuades Abbey to try the application again. Abbey decides to go for a jog and instead of an avalanche of zombies, just a few zombies appear and, some of them are even having a “vegetarian picnic” in the park. She enjoys the mode and agrees that it provides a joyful experience. Personalizing narratives for different genres can consist of different levels of storylines. Some can be scary and involve personalization based on the difficulty level (Bakkes et al., 2012), where the run could end up with ‘game over’, if ultra-aggressive zombies catch the user. Vice versa, on the lighter storylines zombies are not aggressive at all. Concluding Remarks Technology plays an important role in motivating people to exercise (Capel et al., 2015) and pervasive devices like smartphones can provide an accessible and personalized platform for applications supporting regular physical exercises (Kranz et al., 2013). In this study, the focus was on investigating the use of narratives as a motivational feature. Findings related to motivations and the role of technology are first discussed, and this is then followed by the use of narratives. All participants exercised (some more than others) and had positive thoughts towards exercising. Although, their intentions to use exercise applications varied. Ahtinen et al. (2009) found that motivation to use exercise applications required both simultaneously enjoying to exercise and satisfaction with the application. In our study, not all participants were satisfied with the application’s features and its technical stability which negatively influenced their intentions to use the application in future. Staying healthy, socializing, and achieving certain goals are key factors that motivate young adults to be active (Capel et al., 2015). Social sharing was found not to be a key motivator, which is consistent with findings in Ahtinen et al. (2008), as most of the participants did not want to/feel the need to share their exercise logs with other people or on online social platforms. The participants were primarily motivated to exercise for health reasons and even though some did not exercise consistently, they considered exercise to be an important part of their overall wellbeing. All participants found goal setting and data tracking as good motivators for exercise. Some users preferred setting goals themselves, and others used the system-set goals. The system-set goals were 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 345 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) O. Korhonen, M. Oduor & M. Isomursu: Personalizing Narratives to Support Motivation for Physical Activity considered by some to be challenging, whereas others felt that these goals did not match their own personal goals. Gamification improves attitudes and enhances exercise (Goh and Razikin, 2015), and the gamification elements supporting goal setting and monitoring were appreciated by all participants. A recurring observation was that the gamified elements should better support the monitoring of pre-set or personalized goals, i.e. to better merge narrative elements of the application with individual’s goals and their tracking. Combining personalization strategies with persuasive systems rather than offering generic solutions has potential for better outcomes and can enhance users’ experiences and achievement of their goals (Berkovsky, Freyne and Oinas-Kukkonen, 2012). However, support for personalization is still at a low level within these systems (Helf and Hlavacs, 2016). Personalizing narratives for each user may not be technically feasible (Göbel et al., 2010), but as users’ motivations vary, personalization should be supported. In our study, three narrative personalization techniques were proposed to support users’ motivation for physical activity. The present study had a limited number of participants with relatively homogenous backgrounds. User experiences were collected using a focus group, participatory observation and semi-structured interviews. Our intention was not to focus on women only, but with snowball sampling, we ended up with such a homogenous user group. Furthermore, at the time we conducted the study, women were the most willing participants and not all of them were available to participate in all the data collection phases. Nevertheless, this provided us an opportunity to combine several qualitative data collection methods, and get detailed qualitative data, but sets limitations for the generalizability of the results as it was limited to a small group of Finnish users. Gender, age and cultural differences were also not considered in this study and therefore the findings cannot be assumed to be widely applicable to different contexts. With different application and users, results may differ. Nonetheless, the study highlights the importance of tailoring and personalization and presents ideas on how this can be done for different user groups. In summary, technology for supporting motivation towards healthier lifestyles has remained a key topic in the fields of HCI and computer science. Development and evaluation of exercise applications with various features have been studied comprehensively. This study qualitatively analyzed the role of narratives to motivate people to exercise by using a nexus analytic approach. The focus was on user experiences related to an exercise application that utilized narratives to motivate users. Our study revealed that features like tracking and goal orientation did motivate users to exercise and so did narratives, however, their usage in wellbeing technology is still in its infancy. Personalization techniques have been used for setting personalized goals, or objectives, but in narratives, these techniques, are not widely studied. In this study, we have proposed three techniques (based on goals, gamification, and genre) for personalizing narratives. 346 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) O. Korhonen, M. Oduor & M. Isomursu: Personalizing Narratives to Support Motivation for Physical Activity References Ahtinen, A., Isomursu, M., Huhtala, Y., Kaasinen, J., Salminen, J., & Häkkilä, J. (2008). Tracking outdoor sports–user experience perspective. Ambient intelligence (pp. 192-209) Springer. DOI: 10.1007/978-3-540-89617-3_13 Ahtinen, A., Isomursu, M., Mukhtar, M., Mäntyjärvi, J., Häkkilä, J., & Blom, J. (2009). Designing social features for mobile and ubiquitous wellness applications. Proceedings of the 8th International Conference on Mobile and Ubiquitous Multimedia, 12. DOI: 10.1145/1658550.1658562 Bakkes, S., Tan, C.T., & Pisan, Y. (2012). Personalised gaming: A motivation and overview of literature. Proceedings of the 8th Australasian Conference on Interactive Entertainment: Playing the System, 4. DOI: 10.1145/2336727.2336731 Berkovsky, S., Freyne, J., & Oinas-Kukkonen, H. (2012). Influencing individually: Fusing personalization and persuasion. ACM Transactions on Interactive Intelligent Systems (TiiS), 2(2), 9. DOI: 10.1145/2209310.2209312 Bostan, B., & Marsh, T. (2010). The ‘interactive’of interactive storytelling: Customizing the gaming experience. International Conference on Entertainment Computing, 472-475. DOI: 10.1007/978-3-642-15399-0_63 Buttussi, F., Chittaro, L., & Nadalutti, D. (2006). Bringing mobile guides and fitness activities together: A solution based on an embodied virtual trainer. Proceedings of the 8th Conference on Human-Computer Interaction with Mobile Devices and Services, 29-36. DOI: 10.1145/1152215.1152222 Campbell, T., Ngo, B., & Fogarty, J. (2008). Game design principles in everyday fitness applications. Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, 249-252. DOI: 10.1145/1460563.1460603 Capel, T., Schnittert, J.F., Snow, S., & Vyas, D. (2015). Exploring motivations of young adults to participate in physical activities. Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, 1409-1414. DOI: 10.1145/2702613.2732800 Consolvo, S., Everitt, K., Smith, I., & Landay, J.A. (2006). Design requirements for technologies that encourage physical activity. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 457-466. DOI: 10.1145/1124772.1124840 Consolvo, S., McDonald, D.W., & Landay, J.A. (2009). Theory-driven design strategies for technologies that support behavior change in everyday life. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 405-414. DOI: 10.1145/1518701.1518766 Deterding, S., Dixon, D., Khaled, R., & Nacke, L. (2011). From game design elements to gamefulness: Defining gamification. Proceedings of the 15th International Academic MindTrek Conference: Envisioning Future Media Environments, 9-15. DOI: 10.1145/2181037.2181040 Eklund, L. (2015). Bridging the online/offline divide: The example of digital gaming. Computers in Human Behavior, 53, 527-535. DOI: 10.1016/j.chb.2014.06.018 Forlizzi, J., & Battarbee, K. (2004). Understanding experience in interactive systems. Proceedings of the 5th Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques, 261-268. DOI: 10.1145/1013115.1013152 Fritz, T., Huang, E.M., Murphy, G.C., & Zimmermann, T. (2014). Persuasive technology in the real world: A study of long-term use of activity sensing devices for fitness. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 487-496. DOI: 10.1145/2556288.2557383 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 347 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) O. Korhonen, M. Oduor & M. Isomursu: Personalizing Narratives to Support Motivation for Physical Activity Goh, D.H., & Razikin, K. (2015). Is gamification effective in motivating exercise? Human- computer interaction: Interaction technologies (pp. 608-617) Springer. DOI: 10.1007/978-3- 319-20916-6_56 Göbel, S., Wendel, V., Ritter, C., & Steinmetz, R. (2010). Personalized, adaptive digital educational games using narrative game-based learning objects. International Conference on Technologies for E-Learning and Digital Entertainment, 438-445. DOI: 10.1007/978-3-642-14533-9_45 Häkkilä, J., Colley, A., Inget, V., Alhonsuo, M., & Rantakari, J. (2015). Exploring digital service concepts for healthy lifestyles. Design, user experience, and usability: Design discourse (pp. 470-480) Springer. DOI: 10.1007/978-3-319-20886-2_44 Helf, C., & Hlavacs, H. (2016). Apps for life change: Critical review and solution directions. Entertainment Computing, 14, 17-22. DOI: 10.1016/j.entcom.2015.07.001 Johnson, D., Deterding, S., Kuhn, K.A., Staneva, A., Stoyanov, S., & Hides, L. (2016). Gamification for health and wellbeing: A systematic review of the literature. Internet Interventions, 6, 89-106. DOI: 10.1016/j.invent.2016.10.002 Kranz, M., Möller, A., Hammerla, N., Diewald, S., Plötz, T., Olivier, P., & Roalter, L. (2013). The mobile fitness coach: Towards individualized skill assessment using personalized mobile devices. Pervasive and Mobile Computing, 9(2), 203-215. DOI: 10.1016/j.pmcj.2012.06.002 Maitland, J., & Siek, K.A. (2009). Technological approaches to promoting physical activity. Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design: Open 24/7, 277-280. DOI: 10.1145/1738826.1738873 Molin-Juustila, T., Kinnula, M., Iivari, N., Kuure, L., & Halkola, E. (2015). Multiple voices in ICT design with children–a nexus analytical enquiry. Behaviour & Information Technology, 34(11), 1079-1091. DOI: 10.1080/0144929X.2014.1003327 Oinas-Kukkonen, H. (2013). A foundation for the study of behavior change support systems. Personal and Ubiquitous Computing, 17(6), 1223-1235. DOI: 10.1007/s00779-012-0591-5 Patel, M., & O'Kane, A.A. (2015). Contextual influences on the use and non-use of digital technology while exercising at the gym. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2923-2932. DOI: 10.1145/2702123.2702384 Patton, M.Q. (2005). Qualitative research Wiley Online Library. Qin, H., Patrick Rau, P., & Salvendy, G. (2009). Measuring player immersion in the computer game narrative. International Journal of Human–Computer Interaction, 25(2), 107-133. DOI: 10.1080/10447310802546732 Scollon, S.W. (2004). Nexus analysis: Discourse and the emerging internet Routledge. Southerton, C. (2013). Zombies, run!’: Rethinking immersion in light of nontraditional gaming contexts. Transmedia: Storytelling and Beyond Digital Interfaces. Vallerand, R.J., & Losier, G.F. (1999). An integrative analysis of intrinsic and extrinsic motivation in sport. Journal of Applied Sport Psychology, 11(1), 142-169. DOI: 10.1080/10413209908402956 348 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Serious Games in Healthcare: Results from a Systematic Mapping Study 25 TANJA KORHONEN & RAIJA HALONEN Abstract There is a need to understand, on a large scale, the role that serious games (SG) in healthcare can play in empowering citizens or patients. This systematic mapping study aims to identify how SG in healthcare is perceived and approached in the literature. A total of 408 studies from 2005-2016 were found, and after screening and exclusion, 83 studies were analysed. This study found that case studies with solution approaches that described design or development and literature reviews were the most popular methods used to analyse SG in healthcare. The biggest demographic groups targeted by SG that were described in these papers were children, the elderly, and patients with certain diseases. According to the results, the top five SG subjects in healthcare are education, exergaming, cognitive rehabilitation, psychology, and physical rehabilitation. The results suggest that the next focus will be on developing general guidelines for SG developers in healthcare, focusing on validation of SG and research of SG maturity models to improve level of development. Future studies should integrate the gaming industry and healthcare professionals. Keywords: • Serious Games • SG • Health Games • Systematic Mapping Study • CORRESPONDENCE ADDRESS: Tanja Korhonen Kajaani, University of Oulu, University of Applied Sciences, Kotkantie 1, 90250 Oulu, Finland, e-mail:tanja.korhonen@kamk.fi. Raija Halonen University of Oulu, Pentti Kaiteran katu 1, 90014 Oulu, Finland, e-mail: raija.halonen@oulu.fi. https://doi.org/10.18690/978-961-286-043-1.25 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 350 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Korhonen & R. Halonen: Serious Games in Healthcare: Results from a Systematic Mapping Study Introduction The current study analysed how earlier studies have approached and presented serious games (SG) in healthcare. The term serious game, or applied game, is used to classify a game in which its main purpose is something other than pure entertainment (Djaouti, Alvarez, Jessel & Rampnoux, 2011; Susi, Johannesson & Backlund, 2007; Zyda, 2005). This group includes several subgroups, including edutainment, advergaming, edumarket games, political games, and training and simulation games, to educate, train, advertise, and influence people (Alvarez et al., 2007). Games can work as motivators or to help change players' behaviour (Baranowski et al., 2013; Ryan, Rigby & Przybylski, 2006). Healthcare services are looking for new functions to empower their customers. SG in healthcare can provide methods for maintaining and developing health in different age groups. The goal can be to provide a new kind of model for self-help or rehabilitation. (Kemppainen, Korhonen & Ravelin, 2014.) Play and entertainment can be effective foundations for serious interventions in healthcare. Nevertheless, there is a need for more research studies that show a causal link between playing video games and health outcomes. (Kato, 2010.) We wanted to understand how SG are seen by researchers. The main research question was: How are serious games in healthcare perceived and approached in the literature? To get the answer, three supplementary questions were presented:  (RQ1) Which journals include papers on serious games in healthcare?  (RQ2) What are the most investigated areas of serious games in the health sector and how have these changed over time?  (RQ3) What research type and methods are most frequently applied? A method of systematic mapping (Kitchenham & Charters, 2007) was selected for getting a broad overview of the chosen area. Systematic mapping study is a proper method to reveal whether there is research evidence on a topic, and to provide any indication of the quantity of evidence (Kitchenham & Charters, 2007). The guidelines provided by Petersen et al. (2008); Petersen, Vakkalanka, and Kuzniarz (2015); and Kitchenham, Budgen, and Brereton (2011) were applied. Existing criteria on research approaches given by Wieringa, Maiden, and Roland (2006) were utilised in the evaluation. This paper presents a systematic mapping study of SG in healthcare and is organised into four major sections: background and related work on SG, research approach, mapping results, and conclusions. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 351 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Korhonen & R. Halonen: Serious Games in Healthcare: Results from a Systematic Mapping Study Background and Related Work The concept of serious games was introduced in the 1970s when it referred to an activity among two or more independent decision-makers seeking objectives in a limited context. In that time, SG were focused on educational functions (Ricciardi & De Paolis, 2014). The concept involves a digital game whose main purpose is something other than pure entertainment and is designed to be used in training, education, and healthcare (Loh, Sheng & Ifenthaler, 2015). Zyda (2005) defined a serious game as: a mental contest, played with a computer in accordance with specific rules that use entertainment to further government or corporate training, education, health, public policy, and strategic communication objectives (p.25). Susi, Johannesson & Backlund (2007) defined SG as: games that engage the user and contribute to the achievement of a defined purpose other than pure entertainment (whether or not the user is consciously aware of it) (p.5). Fullerton (2014) described a digital game as a system in which the whole is greater than the sum of its parts. A digital game creates a structured conflict and provides an entertaining process for players to resolve that conflict (Fullerton, 2014). Game design combines psychological aspects (Rigby & Ryan, 2011) with mechanical and artistic aspects (Fullerton, 2014). Game designers empathise with players, and their main task is to ensure that the game will be entertaining (Adams, 2013.) Juul (2011) defined video game as a game played using computer power and a video display that can be a computer, cell phone, or console game. Video games not only can tell stories, but also allow players to live them (Rigby & Ryan, 2011). Figure 1 illustrates aspects of SG design. 352 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Korhonen & R. Halonen: Serious Games in Healthcare: Results from a Systematic Mapping Study Figure 1: Aspects of Serious Game Design Research on player motivation is founded on knowing what psychological needs games satisfy and how different games fulfil those needs, and immersion, in which a player is transported to a fictional world through storytelling is a valuable asset. This provides information about both positive and negative experiences within games. (Rigby & Ryan, 2011.) In the early 2000s, Rollings and Adams (2003, p.201) defined gameplay as ‘One or more causally linked series of challenges in a simulated environment’, and Adams (2013) later described gameplay as: the challenges presented to players and the actions players are permitted to take, both to overcome those challenges and to perform other enjoyable activities in the game world (p.511). The healthcare sector has strong interests in using new technologies related to health. SG in the health sector can be divided into game-based education of health professionals and improving therapeutic outcomes of patients. Today’s increasing challenges with aging populations and chronic diseases suggest that serious games in healthcare may be one strategy to help with survival (Arnab, Dunwell & Debattista, 2013). Health games can be classified also by their main purpose, type of players, and the stage of disease of patients. The stages of disease of patients include stage of susceptibility (healthy non-patients with the possibility of certain illnesses), pre-symptomatic stage (patients feeling healthy with specific illness), stage of clinical disease (patients or professionals), or stage of recovery or disability (patients or professionals), as divided by Wattanasoontorn, Hernandez, and Sbert (2014), who indicated three main purposes for health games: 1. Games that are designed originally for entertainment and in which a health purpose comes secondary, but can be found in the games. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 353 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Korhonen & R. Halonen: Serious Games in Healthcare: Results from a Systematic Mapping Study 2. Games that include a health topic to pass on knowledge or skills. 3. Training games with medical purposes, including simulations. The classifications by Wattanasoontorn et al. (2014) also divide health games by player, as in patient player (health monitoring, detection, treatment, rehabilitation, education for self-care) and non-patient player (wellness, simulation games). Furthermore, health games can be classified in the areas of physical fitness, education in health, training and simulation, rehabilitation (recovery, therapy), diagnosis and treatment of mental conditions, cognitive functioning and self-control (Susi et al., 2007). Figure 2 illustrates these classifications. Figure 2: Classification of SG in healthcare (Wattanasoontorn et al., 2014; Susi et al., 2007) There are many different stakeholders in the health-game market, such as hospitals, clinics, private-practice physicians (including therapists and personal trainers), government, corporations, other organizations, and individual consumers (Susi et al., 2007). Social Security systems and healthcare providers differ significantly among different countries and on a global scale, with each market area having its own methods to facilitate a healthy lifestyle (Kaleva, Hiltunen & Latva, 2013). Significant changes should be expected, for example, in medical simulations, serious games, and mobile serious games, and an increased need for serious-game analysis is already present (Loh et al., 2015). 354 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Korhonen & R. Halonen: Serious Games in Healthcare: Results from a Systematic Mapping Study Supporting players’ motivations and enhancing behavioural changes are essential in health-game design (Rigby & Ryan, 2011). Design includes using game elements such as surprise and simulation to engage players and enable immersion (Adams, 2013). On the other hand, developing a health game requires a multi-disciplinary team to work together successfully (Kemppainen et al., 2014). It is important to define both the target group and main objective, then design a game accordingly using sound game-design principles in collaboration with health professionals and involving patients as early as possible (Brox, Fernandez-Luque & Tollefsen, 2011). Braad, Folkerts, and Jonker (2013) describe the health-game design process as a game-based intervention process. Their human-centred design method consists of four phases: analysis, design, development, and evaluation. Like Braad et al. (2013), Friess, Kolas, and Knoch (2014) and Deen et al. (2014) use similar processes in SG development in the health sector. They all include strong research and analysis phases at the beginning, and involving different stakeholders is essential. Iterative development processes or the use of prototyping are among their development methods. The game-development process then ends usually with user-group testing and evaluation or validation phases. In the design of SG in health games, the target group should be considered during the development process (Brox et al., 2011; Braad et al., 2013; Friess et al., 2014; Deen et al., 2014). A multi-disciplinary team is necessary to develop a successful and effective health game, and professional knowledge is an essential part of the development process (Kemppainen et al., 2014; Merry et al., 2012). Research Approach To get an overview of SG in healthcare studies, the guidelines for a systematic mapping process (presented in Chapter 3.1, Fig. 1) were followed. This chapter describes the chosen research method and how it was applied. 3.1 Overview of Systematic Mapping Study A standard systematic literature review is usually conducted over a specific research question that can be answered by empirical research (Kitchenham et al., 2011). A mapping study, on the other hand, aims to provide an overview of a topic area through multiple research questions (Kitchenham et al., 2011). Mapping questions are about what we know with respect to a specified topic (Petersen et al., 2015). The results of a systematic mapping -- presented as a visual summary, the map -- help determine in which areas to conduct a conventional systematic literature review (Kitchenham et al., 2011; Petersen et al., 2008). A systematic mapping process (Fig 3) defined by Petersen et al. (2008) consists of the following process steps: definition of research questions, conducting the search for 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 355 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Korhonen & R. Halonen: Serious Games in Healthcare: Results from a Systematic Mapping Study relevant papers, screening of papers, keywording using abstracts, and data extraction and mapping. The categories used in a mapping study are usually based on publication information such as authors’ names, authors’ affiliations, publication source, publication type, publication date, and/or information about the research methods used (Kitchenham et al., 2011). Figure 3: Systematic mapping process (Petersen et al., 2008). Mapping questions often are formulated around what we know with respect to a specified topic and include questions regarding venues, research methods, and trends (Petersen et al., 2015). The search is conducted in relevant databases for all papers in the research field, and, as recommended by Kitchenham and Brereton (2013), the use of IEEE and ACM, as well as two indexing databases, is sufficient. A search string is defined based on the research questions (Petersen et al., 2008). The third step in the systematic mapping process is the screening of papers. Inclusion and exclusion criteria are needed to find relevant papers that answer the research questions (Petersen et al., 2008). Inclusion and exclusion criteria can be related to the relevance of the topic of the article, venue of publication, period considered, requirements for evaluation, and restrictions with respect to language (Petersen et al., 2015). The selection of papers is performed on titles and abstracts, thereby building a classification scheme first, then later reading is extended to introductions and conclusions (Petersen et al., 2015). For classifying the type of research, Kitchenham et al. (2011) and Petersen et al. (2008,2015) recommended using a classification system developed by Wieringa et al. (2006) with six categories: 1. Validation research, which concerns evaluating novel techniques not yet deployed in industry 2. Evaluation research, which concerns evaluating industrial practices 3. Solution proposals, which discuss new or revised techniques 4. Philosophical papers, which structure the field in new ways, such as taxonomies 5. Opinion papers 6. Experience papers, which discuss how someone did something in practice 356 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Korhonen & R. Halonen: Serious Games in Healthcare: Results from a Systematic Mapping Study In the data-extraction phase, relevant articles are sorted into a scheme, such as an Excel spreadsheet. The mapping process ends with a presentation on the frequencies of publications for each category using maps for visualization (Petersen et al., 2008). 3.2 Research Questions To get a broad overview on how serious games in healthcare are perceived and approached in the literature, the following supplementary questions were asked:  RQ1: Which journals include papers on serious games in healthcare?  RQ2: What are the most investigated areas of serious games in the health sector and how have these changed over time?  RQ3: What research types and methods are most frequently applied? The objective of RQ1 was to identify the forums of discussion. The objective of RQ2 was to discover trends in research and possible gaps. The objective of RQ3 was to determine the methods of research used. 3.3 Search and Screening of Papers To get a broad overview of the research area, searches were first conducted on these scientific databases: IEEE, ACM, Scopus, Web of Science, and Google Scholar. At the second stage, the database of Web of Science was left out of the process due to technical problems with remote access. The search string was formulated by considering the properties of each database. Search string: Search for serious games in healthcare, i.e. ‘serious games’ OR ‘serious game’ OR ‘applied game’ AND ‘health’ OR ‘healthcare’ AND ‘design’ or ‘development’. The search strings used for each database and number of search results per database are presented in Table 1. Without the design and development elements of the search parameters, the number of papers filtered out would have totaled 2,199. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 357 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Korhonen & R. Halonen: Serious Games in Healthcare: Results from a Systematic Mapping Study Table 1: Search strings and number of results in databases Databa Web of Google To se IEEE ACM Scopus Science Scholar tal Search ((‘Document (((‘Seriou TITLE-ABS- (((‘Seriou - string Title’:’Serious s games’) KEY(‘Serious s games’) Refined games’ OR OR games’ OR OR search ‘Document (‘serious ‘serious game’ (‘serious to Title’:’serious game’) OR ‘health game’) design, game’ OR OR game’ OR OR develop ‘Document (‘health ‘applied game’ (‘health ment Title’:’health game’) AND game’) game’ OR OR ((‘development’) OR ‘Document (‘applied OR (‘design’)) (‘applied Title’:’applied game’)) AND ((‘health’) game’)) game’) AND AND OR AND ‘Document ((‘develop (‘healthcare’)) ) ((‘develop Title’:’health’ ment’) AND ( LIMIT- ment’) AND OR TO(DOCTYPE,’ OR (p_Title:’deve (‘design’)) cp’ ) OR LIMIT- (‘design’)) lopment’ OR AND TO(DOCTYPE,’ AND ‘Document ((health) ar’ ) ) AND ( ((health) Title’:’design’ OR LIMIT- OR )) (‘healthca TO(SUBJAREA, (‘healthca re’))) ’COMP’ ) OR re’))) LIMIT- TO(SUBJAREA, ’ENGI’ ) ) AND ( LIMIT- TO(LANGUAG E,’English’ ) ) 65 93 95 276 108 79 1 The following inclusion criteria were applied to titles in the screening of papers (reading through titles and abstracts):  Topic of study focuses on serious games in healthcare.  Studies are in the field of software engineering or information systems. The following exclusion criteria were applied to titles in the screening of papers:  Studies presenting summaries of conferences/editorials  Studies presenting non-peer-reviewed material  Studies not presented in English 358 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Korhonen & R. Halonen: Serious Games in Healthcare: Results from a Systematic Mapping Study  Studies not accessible in full text  Books and grey literature.  Studies that are duplicates of other studies. This yielded a total of 479 papers, of which 71 were found to be duplicates, leading to a final total of 408 papers (see Table 2). Table 2: Number of included papers. Database IEEE ACM Scopus Web of Science Google Scholar Total After screening of papers, exclusion of papers outside of focus area. 60 90 221 75 33 479 Duplicates 71 Total 408 3.4 Keywording and Study Selection The basic information in papers, such as authors, titles, years published, source titles, abstracts, digital object identifiers (DOIs), and links were exported into an Excel spreadsheet. This table was used in keywording to find the classification scheme as follows: Abstracts from ACM, IEEE, and Scopus search results were downloaded as text from the Excel spreadsheet to TagCrowd (www.tagcrowd.com) to create an overview of used keywords in the filtered-out abstracts. These keywords are presented in Figure 4 to visualise the volumes of used words in the abstracts. The classification schemes were formed based on the chosen keywords and included research articles. From these keywords and connecting the information with research questions, the following classification schemes were formed: 1. Source Title (RQ1) 2. Aim/target and focus (RQ2), Year (RQ2): using keywords such as behaviour change, cognitive, education/learning, rehabilitation, therapy, exergaming, design/development, user/patient, interaction, persuasive, usability 3. Research type: validation, evaluation, solution, philosophical, opinion, experience (RQ3), and research method (RQ3) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 359 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Korhonen & R. Halonen: Serious Games in Healthcare: Results from a Systematic Mapping Study Figure 4: Frequencies of keywords/index terms. The frequencies of keywords or index terms of ‘serious games in healthcare’ are presented in this order: ACM (upper left), IEEE (upper right), and Scopus (lower left) in Figure 4. 3.5 Data Extraction and Mapping Process To answer research questions, the data was sorted on an Excel spreadsheet (data- extraction form) with basic identification information from papers such as identification number (ID), authors, titles, years published, source titles, DOIs, and links. The classification schemes were added: aim/target and focus, research type, and research method. Since the search results totaled up to 408 papers, it was decided that RQ1 and, partly, RQ2 would be based on the whole body of articles. On the other hand, to be able to answer RQ2 and RQ3 required reading through papers and gathering needed information in classification schemes. It was decided that this would be done in publications that have 10 or more papers in each source publication, restricting the upper limit of read papers to 112. Each of these papers was read to find the above information, which was added to the spreadsheet. At this phase, 18 papers were considered to be not fully in the realm of health games and thus were excluded, and 11 were not available as full text, which brought the number of papers down to 83. If information was not available on the abstract, or the paper was not accessible in full text, it was excluded at this point. Papers were arranged in ascending order by publication time. 360 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Korhonen & R. Halonen: Serious Games in Healthcare: Results from a Systematic Mapping Study The analysis of the results focused on presenting the frequencies of publications for each category. The quality of the sample of studies selected in the inclusion/exclusion process, generalizability of the results of the mapping, and reliability of the conclusions drawn in relation to the data collected were identified as possible threats to the validity of the research. Analysis and Interpretation This chapter is structured with the help of the assisting research questions. 4.1 Venues of Publication (RQ1) To find out which journals include papers on SG in healthcare, the distribution of papers in different publications is visualised in Figure 5, and the publications that have 10 or more papers in each publication are listed in Table 3. The papers were published in 163 different publications, which indicates quite a vast distribution over different sectors; 93 publications included only one (1) paper in this area. Table 3: SG in Healthcare publications with 10 or more papers. Name of Publication Number of Papers IEEE International Conference on Serious Games and 41 Applications for Health (SeGAH) Lecture Notes in Computer Science (including subseries 31 Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) International Conference on Pervasive Computing 15 Technologies for Healthcare Studies in Health Technology and Informatics 15 Games for Health Journal 10 Total 112 The most popular publication was IEEE SeGAH Conference, with 41 papers, the Lecture Notes in Computer Science came in second, with 31 papers. The research area of SG in healthcare covered many research disciplines. Most of the papers were from conferences. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 361 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Korhonen & R. Halonen: Serious Games in Healthcare: Results from a Systematic Mapping Study Number of Papers Proceedings of the International Conference on the Foundations… Lecture Notes of the Institute for Computer Sciences, Social-… International Journal of Multimedia and Ubiquitous Engineering International Conference on Interaction Design and Children Intelligent Systems Reference Library Conference on Future Play Computers and Education Australasian Conference on Interactive Entertainment ACM SIGGRAPH Symposium on Video Games International Games Innovation Conference (IGIC) International Conference on Computer Games CGAMES CHI Conference Extended Abstracts on Human Factors in… International Conference on Digital Health CEUR Workshop Proceedings JMIR SERIOUS GAMES Academic MindTrek Conference ENTERTAINMENT COMPUTING ACM International Conference Proceeding Series International Conference on Pervasive Computing Technologies… IEEE International Conference on Serious Games and… 0 10 20 30 40 50 Figure 5: SG in Healthcare source publications and number of articles with three or more papers. 4.2 Topics and Frequency of Publication (RQ2) To analyse the annual distribution of SG articles in healthcare, the annual distribution was calculated between the years 2005 and 2016. Some of the papers were published in 2017, but those were excluded due to the scheduling of the study. Figure 6 shows the number of papers over the years, and the trend has been increasing until 2014. After that, there was a gap in 2015, and it went back up to 82 in 2016. 362 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Korhonen & R. Halonen: Serious Games in Healthcare: Results from a Systematic Mapping Study Number of Papers 89 2 0 4 6 16 20 40 46 51 56 82 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 Year of publication Figure 6: Number of papers on SG in healthcare between 2005 and 2016. According to a content analysis of 83 papers, the most investigated areas of serious games in the healthcare sector regarding games’ aims are presented in Figure 7. The five top subjects of serious games were:  Education (14)  Exergaming (8)  Cognitive rehabilitation (6)  Psychology (6) and  Rehabilitation (6) 15 ser 10 apPf 5 o 0 … … … n g e… y n y e t e e a e s c a n h y c e… , n g ber o i i i i i n v g o ti m g er es r s ey… t e l o tl ti t n o n t i it o i si n c ewi en HD ul eye CP) n m n i i v a m oi i i a m i l t es t a n D et i ea ( d o i egl h ti i a t s m c a n o at b h a m A b si zy y i en r g p p r t t ea m g a ul a u g g h i au c erv s a s d i o h o c li o c i fa l k u s c r v es d d al a c em n u l Num a acl a u u gl ed c ys b i n r a o o s , y i ss ' a p n d e en em em r a t oi excl ai exer p eart n i l o s h h o ci t c eh v a o p a r n s s er ai r a h s o r h w am o g y o s ex ed c s eh ni yl c o h p s o b k s r b d p a ereb p ma c AIM/TARGET of paper Figure 7: Number of papers according to aim/target of the serious game. Most of the papers focus on describing design and development of a serious game (28). The next most popular focus areas were user-centred design (6) and participatory design (5). This is presented in Figure 8. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 363 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Korhonen & R. Halonen: Serious Games in Healthcare: Results from a Systematic Mapping Study FOCUS of paper (> 1) Virtual Reality Learning Environment Cognitive rehabilitation… Collaborative Game Development Pervasive Gaming Game-based Intervention Design Participatory Design User-centred Design Design/Development 0 5 10 15 20 25 30 Number of papers (> 1) Figure 8: Number of papers grouped by focus of the paper. One way to categorise the most investigated areas of health care was to analyse the target group of developed games. As illustrated in Figure 9, the targeted demographic groups of most serious games in these papers were children (20), the elderly (15), and patients of certain diseases (8). Target Group 25 ers 20 pa P 15 f 10 er o 5 mbu 0 N Figure 9: Number of papers according to target group. 364 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Korhonen & R. Halonen: Serious Games in Healthcare: Results from a Systematic Mapping Study 4.3 Research Types and Methods (RQ3) To analyse the research type and methods, the papers were categorised according to the research types in the classification system by Wieringa et al. (2006). None of the analysed papers were considered Opinion or Experience research. 55% of them were categorised as Solution Research, 19% Philosophical, 15% Validation, and 11% Evaluation Research, which is presented in Figure 10. Research Types Evaluation Validation 11% 15% Philosophical 19% Solution 55% Evaluation Philosophical Solution Validation Figure 10: Research type in papers. Research methods in analysed papers are presented in Figure 11. Most of the papers were classified under case studies and literature reviews/studies. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 365 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Korhonen & R. Halonen: Serious Games in Healthcare: Results from a Systematic Mapping Study Usability testing Intervention Controlled Comparative Research 2% N/A 2% experiment analysis through design Randomized 2% 1% 1% 1% Controlled Trial 3% Quantitative study 7% Case Study 47% Qualitative study 16% Literature review/study 18% Figure 11: Research methods of papers. Conclusions The purpose of the study was to analyse how SG in healthcare are perceived and approached in the literature. To solve the research problem, systematic literature mapping was applied in the study. A total of 408 studies from 2005-2016 were found, and after screening and exclusion, 83 studies were analysed. The results of this systematic mapping could be used to identify gap areas in research of SG in healthcare. Although the concept of serious games is from the 1970s (Ricciardi & De Paolis, 2014), we found out that there were just a few publications who wrote about the phenomenon before 2009. The number of publications increased until 2014, after which there was a gap in 2015, then the number increased again in 2016. Most of the analysed papers came from conferences. The most popular forum of discussion was the IEEE SeGAH conference, with the Lecture Notes in Computer Science coming in second. Since the development of SG in healthcare is multi-disciplinary (Kemppainen et al., 2014; Merry et al., 2012), some of these papers were published in medical journals and thus were not included in this study. Wattanasoontorn et al. (2014) classified health games by their main purpose, types of players, and patients’ stage of disease. The biggest target groups of SG described in this mapping study were children, the elderly and patients with certain diseases. In the analysed studies, the main purpose and type of player were easily found, but none used classifications for stages of disease. The five top topics of SG in healthcare were 366 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Korhonen & R. Halonen: Serious Games in Healthcare: Results from a Systematic Mapping Study education, exergaming, cognitive rehabilitation, psychology, and physical rehabilitation. In educational games, the players were 1) healthy people (informative, preventive approach) of a certain group: children, adolescents, the elderly, etc. 2) patients with certain diseases (informative, educative) or 3) students and professionals in a certain medical area (educative, training, or simulation). Considering the focus and methods of research, the most common approach was to describe design or development of SG by using a case study. Most of these were considered solution proposals as defined by Wieringa et al., thereby discussing new or revised techniques. The focus of most studies was in using user-centred, participatory, and collaborative design models. This supports prior research involving different stakeholders in SG development (Brox et al., 2011; Braad et al., 2013; Friess et al., 2014; Deen et al., 2014). Also, there were some literature reviews that were deemed to be philosophical papers, structuring the research field in new ways. Kato (2010) brought up the need for validation of SG in healthcare, but it was not seen as a topic in many papers. One RCT and a controlled experiment were found, as well as a couple of intervention studies. Few papers covered guidelines for assessment of SG. Many described prototypes of SG were tested with focus groups, but there were no further studies found. There were just a few papers focusing generally on SG design or providing guidelines for SG developers in healthcare, even though there were plenty of cases described. The study unearthed new knowledge on the topic of how serious games in healthcare are perceived and approached in the literature. The results provide a foundation for deeper analysis of the use of SG in the health sector, and suggest that the next focus will be on developing general guidelines for SG developers in healthcare, focusing on validation of SG and research of SG maturity models to improve level of development. The study points to future avenues of research integrating both the gaming industry and healthcare professionals. There are limitations to the study of research mapping, and further studies should be conducted to validate and further extend the knowledge of SG in healthcare. Acknowledgements The research for this paper was financially supported by the Finnish Niilo Helander Foundation. References Adams E. (2013). Fundamentals of Game Design (3rd edition). Pearson Education, Inc. Alvarez J., Rampnoux O., Jessel J., Methel G. (2007). Serious Game: Just a question of posture? Artificial & Ambient Intelligence, AISB'07, April 2007, 420-423. Arnab S., Dunwell I. & Debattista K. (2013). Serious Games for Healthcare: Applications and Implications. IGI Global. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 367 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Korhonen & R. Halonen: Serious Games in Healthcare: Results from a Systematic Mapping Study Baranowski T., Buday R., Thompson D., Lyons E.J., Shirong Lu A., Baranowski J. (2013). Developing Games for Health Behavior Change: Getting Started. Games for Health Journal: Research, Development, and Clinical Applications. 2(4), 183-190. Braad E.P., Folkerts J. & Jonker N. (2013). Attributing Design Decisions in the Evaluation of Game-Based Health Interventions. In Games for Health. Proceedings of the 3rd European conference on gaming and playful interaction on health care. Germany: Springer Fachmedien Wiesbaden. Brox E., Fernandez-Luque L. & Tøllefsen T. (2011). Healthy Gaming - Video Game Design to promote Health. Applied Clinical Information, 2(2), 128-42. Deen M., Heynen E.J.E., Schouten B.A.M., van der Helm P.G.H.P. & Korebrits A.M. (2014). Games 4 Therapy Project: Let’s Talk! Games for Health 2014. Proceedings of the 4th conference on gaming and playful interaction in healthcare. Germany: Springer Fachmedien Wiesbaden. Djaouti D., Alvarez J. Jessel J-P. & Rampnoux O. (2011). Origins of serious games. Serious Games and Edutainment Applications. Springer-Verlag London Limited. Friess R., Kolas N. & Knoch J. (2014). Game Design of a Health Game for Supporting the Compliance of Adolescents with Diabetes. Games for Health 2014. Proceedings of the 4th conference on gaming and playful interaction in healthcare. Germany: Springer Fachmedien Wiesbaden. Fullerton T. (2014). Game Design Workshop. A Playcentric Approach to Creating Innovative Games. Taylor & Francis Group, LLC. Juul J. (2011). Half-Real. Video Games between Real Rules and Fictional Worlds. The MIT Press. Kaleva J., Hiltunen K., Latva S. (2013). Mapping the full potential of the emerging health game markets. Sitra Studies 72. Retrieved 5 February, 2017 from http://www.sitra.fi/julkaisut/Selvityksiä-sarja/Selvityksia72.pdf Kato P.M. (2010). Video Games in Health Care: Closing the Gap. Review of General Psychology, 14 (2), 113-121. Kemppainen, J., Korhonen, T. & Ravelin, T. (2014). Developing Health Games requires multidisciplinary expertise. Finnish Journal of eHealth and eWelfare, 6(4), 200-205. Kitchenham B. & Brereton P. (2013). A systematic review of systematic review process research in software engineering. Inf. Softw. Technol., 55 (12), 2049–2075. Kitchenham B., Budgen D. & Brereton O. (2011). Using mapping studies as the basis for further research – A participant-observer case study. Information and Software Technology. 53 (2011), 638–651. Kitchenham, B., & Charters, S. (2007). Guidelines for performing systematic literature reviews in software engineering. (Technical Report EBSE-2007-01). Keele University, UK: Kitchenham. Retrieved from http://community.dur.ac.uk/ebse/resources/guidelines/Systematic-reviews-5- 8.pdf Loh, C. S., Sheng, Y., & Ifenthaler, D. (2015). Serious games analytics: Theoretical framework. In Serious games analytics (pp. 3-29). Springer International Publishing. Merry, S. N. (2012). The effectiveness of SPARX, a computerized self help intervention for adolescents seeking help for depression: Randomized controlled non-inferiority trial. (Report). British Medical Journal, 344(7857), p. 16. Petersen K., Feldt R., Mujtaba S. & Mattsson M. (2008). Systematic mapping studies in software engineering. Proceedings EASE 08, BCS eWIC. Petersen K., Vakkalanka S. & Kuzniarz L. (2015). Guidelines for conducting systematic mapping studies in software engineering: An update. Information and Software Technology, Vol. 64, pp. 1-18. http://dx.doi.org.pc124152.oulu.fi:8080/10.1016/j.infsof.2015.03.007 368 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Korhonen & R. Halonen: Serious Games in Healthcare: Results from a Systematic Mapping Study Rigby, S. & Ryan, R.M. (2011). Clued to games. How video games draw us in and hold us spellbound. Santa Barbara: ABC-Clio, LLC. Rollings A. & Adams E. (2003). On Game Design. New Riders Publishing. Ryan R.M., Rigby S. & Przybylski A. (2006). The Motivational Pull of Video Games: A Self- Determination Theory Approach. Motivation and Emotion 30(4):344-360. Ricciardi, F., & De Paolis, L. T. D. (2014). A comprehensive review of serious games in health professions. International Journal of Computer Games Technology Vol. 2014, Article IC 787968, 11 pages. http://dx.doi.org/10.1155/2014/787968 Susi T., Johannesson M. & Backlund, P. (2007). Serious Games – an overview. Technical Report HS- IKI -TR-07-001. Retrieved 29 January, 2017 from http://scandinaviangamedevelopers.com/downloads/HS-IKI-TR-07-001_PER.pdf Wattanasoontorn V, Hernandez R.J.G & Sbert M. (2014). Serious Games for e-Health Care. Retrieved 29 January, 2017 from https://www.academia.edu/1621497/Serious_games_for_e- health_care Wieringa, R., Maiden, N., Mead, N., & Rolland, C. (2006). Requirements engineering paper classification and evaluation criteria: A proposal and a discussion. Requirements Engineering, 11(1), 102-107. doi:10.1007/s00766-005-0021-6 Zyda, M. (2005). From visual simulation to virtual reality to games. IEEE Computer, 38 (9), 25- 32. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Designing an IoT-enabled Gamification Application for Energy Conservation at the Workplace: Exploring Personal and Contextual Characteristics 26 DIMOSTHENIS KOTSOPOULOS, CLEOPATRA BARDAKI, STAVROS LOUNIS, THANASIS PAPAIOANNOU & KATERINA PRAMATARI Abstract This paper focuses on determining the important factors that must be considered when designing and developing a gamification application that educates employees in workplaces, towards a more sustainable energy consumption behaviour. We have conducted on-site surveys, as well as unstructured interviews with employees from three different workplaces where we will deploy the app. We present our key findings and propose specific insight and guidelines for experiments aiming towards energy conservation at the workplace through behavioural change. We conclude that the individual contextual characteristics of workplaces lead to the availability of different energy conservation behaviours that can be acted upon by the employees. At the same time, the employees’ preferences for the gamified app include, among others, a collaborative game scenario – that features both intrinsic as well as extrinsic rewards based on the individual participant profile. This research is conducted in the course of a H2020 EU funded project, through which an IoT-enabled energy monitoring platform for workplaces will be developed, with the ultimate goal to change the employees’ energy consumption behaviour through a gamification application. Keywords: • Energy Conservation • Gamification • Workplace • Employee Behaviour • CORRESPONDENCE ADDRESS: Dimosthenis Kotsopoulos, Athens University of Economics and Business, Department of Management Science and Technology, ELTRUN e-Business Research Center, Patision 76, 104 34 Athens, Athens, Greece, e-mail: dkotsopoulos@aueb.gr. Cleopatra Bardaki, Athens University of Economics and Business, Department of Management Science and Technology, ELTRUN e-Business Research Center, Patision 76, 104 34 Athens, Athens, Greece, e-mail: cleobar@aueb.gr. Stavros Lounis, Athens University of Economics and Business, Department of Management Science and Technology, ELTRUN eBusiness Research Center, Patision 76, 104 34 Athens, Athens, Greece, e-mail: slounis@aueb.gr. Thanasis Papaioannou, Network Economics and Services Laboratory, 76 Patission St., 4th floor (Antoniadou wing), Athens 10434, Athens University of Economics and Business, Department of Computer Science, 76 Patission Str., GR-10434, Athens, Greece, e-mail: pathan@aueb.gr. Katerina Pramatari, Athens University of Economics and Business, Department of Management Science and Technology, ELTRUN e-Business Research Center, Patision 76, 104 34 Athens, Athens, Greece, e-mail: k.pramatari@aueb.gr. https://doi.org/10.18690/978-961-286-043-1.26 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 370 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. Kotsopoulos, C. Bardaki, S. Lounis, T. Papaioannou & K. Pramatari: Designing an IoT-enabled Gamification Application for Energy Conservation at the Workplace: Exploring Personal and Contextual Characteristics Introduction Commercial and industrial sources in the US produced three times the CO2 emissions of residential sources in 2010 (Lülfs and Hahn, 2013), while the buildings sector also consumes 20% of the total delivered energy worldwide (Conti et al., 2016). At the same time, the commercial sector features the fastest-growing energy demand, with its consumption projected to grow by an average of 1.6% per year until 2040 (Conti et al., 2016). More importantly, buildings account for 30–45% of the global energy demand, with commercial buildings, and primarily office and university buildings, classified amongst those presenting the highest energy consumption and savings potential (Gul and Patidar, 2015). Therefore, it is important to increase our efforts towards energy conservation in commercial buildings and workplace environments, towards addressing the worldwide recognised issue of energy wastage. Albeit the documented effect of public buildings on energy consumption, only a limited body of research focuses on employees’ energy consumption behaviour, which can certainly play a significant role in the buildings’ energy footprint. Aiming to contribute to this research path, we are participating in an H2020 EU project (2016-2019) that develops a platform, which utilizes Internet of Things (IoT)-enabled smart meters, smart plugs, and low-cost sensors (e.g. NFC, iBeacons) to monitor energy use and, simultaneously, wastage per work device, area and employee. The ultimate goal of this research project is to use the accurate energy consumption data collected from the interconnected devices/things in order to transform the employees’ energy usage behavior. Gamification, “the use of game design elements in non-game contexts” (Deterding et al., 2011), has been identified as an instrument that, when appropriately utilised, could lead to employees’ energy behaviour change. It can support companies to change behaviours, increase and sustain employee engagement and productivity (Webb, 2013), (Pickard, 2015). Furthermore, the active use of gamification for the improvement of business processes results in amplified workers’ positive psychology, and strengthens positive emotions, engagement, relationships, the sense of meaning, as well as accomplishment (Uskov and Sekar, 2015). Thus, we were inspired to build, in the course of the project, a gamification application that receives input from the IoT-enabled platform and provides real-time recommendations to employees in three participating pilot sites, motivating and educating them to adopt a more green behavior. To design an effective gamification app that the employees will adopt and use, we had to consider two important factors during the app’s user requirements analysis: (i) employee personal profiles, needs and preferences, as well as (ii) workplace contextual characteristics. We first performed on-site visits to identify the contextual characteristics of the three different workplace environments that participate in the project. Then, we conducted a series of semi-structured interviews with representative employees (potential app users), to formulate a more holistic view of the three sites’ special requirements. Our 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 371 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. Kotsopoulos, C. Bardaki, S. Lounis, T. Papaioannou & K. Pramatari: Designing an IoT-enabled Gamification Application for Energy Conservation at the Workplace: Exploring Personal and Contextual Characteristics primary focus was on collecting useful insight towards the design of a gamified app that matches the needs and preferences of its end-users, as well as serves the contextual limitations and opportunities of the pilot workplaces. In the next sections of the paper we begin by reviewing related work presented in the literature, discuss our observations through the site surveys, as well as our findings through interviews with employees, and conclude with our future research plans. Related Work 2.1 Energy consumption in Workplaces Energy in public buildings is mostly consumed through space heating and cooling systems – typically the largest energy consumption sources both in the EU and the US (Nguyen and Aiello, 2013) – lights, refrigerators, computers, and other equipment. Additionally, occupant behaviour is an important factor in the consumption of energy in buildings, as it can add, or save one-third to a building’s designed energy performance (Nguyen and Aiello, 2013). However, unlike private households, users at workplaces have by default no direct financial incentive to minimize energy use within their office workspace. Therefore, motivations, as well as incentive structures, for users in organizational settings are different, as no personal monetary gains are normally expected from a change in behaviours. Hence, more altruistic motives, like supporting the organization in energy and monetary savings, contributing to environmental protection, or complying with expectations from colleagues and superiors, can be leveraged to engage in energy saving behaviour at the workplace (Matthies et al., 2011). Studies in energy consumption behaviours emerged with the oil crisis of the 1970s, from a wide range of disciplinary perspectives (Stephenson et al., 2010). Specifically, the findings of a meta-analysis of 156 published information-based energy conservation experiments encouraged us to explore the occupants’ energy behaviour in public buildings (Delmas, Fischlein and Asensio, 2013): (i) non-monetary, information-based strategies can lead to an average reduction in electricity consumption by 7.4%, (ii) monetary incentives, in contrast, lead to a relative increase in energy usage rather than inducing conservation, (iii) energy conservation through behavioural change should be considered alongside efforts to reduce energy consumption through technological improvements. Overall, a limited number of studies exist regarding energy conservation in a work environment, compared to household contexts. Very few studies have also investigated employee energy-related behaviours, none of which involving inter- organisational comparisons (Lo, Peters and Kok, 2012). 2.2 Gamification for Energy Efficiency purposes The basic and most well-known gamification elements are points, badges and leaderboards – a useful starting point for gamification efforts – but a number of additional game elements exist (Werbach and Hunter, 2012). Single elements can fulfil different 372 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. Kotsopoulos, C. Bardaki, S. Lounis, T. Papaioannou & K. Pramatari: Designing an IoT-enabled Gamification Application for Energy Conservation at the Workplace: Exploring Personal and Contextual Characteristics functions, but in interaction with each other they can have varying and complex motivational effects (Sailer et al., 2013). The MDA (mechanics-dynamics-aesthetics) framework is widely used to categorise gamification elements (Zichermann and Cunningham, 2011). Α commonly stated objective behind using gamification is to encourage behaviour change, in the form of increased participation, improved performance, or greater compliance (Seaborn and Fels, 2015). At the same time, gamification in a work environment can focus on business processes, or outcomes, involving participants, or players, both from outside and/or inside a firm, to improve employee satisfaction (Robson et al., 2015). When organizational goals are aligned with participants’ goals, organizations can achieve their goals as a consequence of players achieving their goals, and employees can become fully engaged with new company initiatives (Dale, 2014). Furthermore, since gamification often involves storing and processing personal, potentially sensitive data, this could lead to “transparent employees” within company boundaries and, at the same time, inappropriate extrinsic incentives might crowd out intrinsic motivation (Blohm and Leimeister, 2013). Workplace gamification also needs to apply to long-term, apart from initiative-specific, objectives (Reiners and Wood, 2015). In a corporate setting, players have also tend to be more invested in intra-group, than in inter-group, competition (Nikkila et al., 2011). Gamification might also contradict with some personality types and cultural norms (Shahri et al., 2014), highlighting the importance of designing gamified applications to match their potential users’ profile, by assessing their respective characteristics, as well as preferred game mechanics (Uskov and Sekar, 2015). More specifically, various studies have suggested gamification as a means for motivating energy efficient behaviour. Grossberg et al. conducted a thorough review of gamified energy efficiency initiatives concluding that saving energy is highly rewarding in itself, and the greatest achievement a gamified app could aim for is to outline this fact to its users. Furthermore, they note that energy savings in the range of 3-6% have been reported on a number of studies featuring the application of gamification to reduce energy consumption, with an achievable possible savings of more than 10% (Grossberg et al., 2015). Inspired by the forementioned information, we decided to conduct a thorough observation of the three targeted workplaces, as well as a detailed exploration of the characteristics and preferences of our prospective gamified app participants. Our ultimate goal was to ensure that we will design and develop an effective gamified app that motivates employees towards a more energy-conscious behaviour. Identifying Context and User Requirements 3.1 Physical observation of the workplaces The gamified app will be deployed and pilot-tested in three different workplaces – participating in the forementioned EU-funded project – that are located in different European countries. The first workplace is a public office in Athens, Greece, which provides IT support to the facilities of its home organisation, both locally, as well as in 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 373 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. Kotsopoulos, C. Bardaki, S. Lounis, T. Papaioannou & K. Pramatari: Designing an IoT-enabled Gamification Application for Energy Conservation at the Workplace: Exploring Personal and Contextual Characteristics an on-site calling schedule. There are 55 employees and 14 separate rooms, whilst normally no visitors are hosted. Interestingly, almost a third of the employees are usually out of office, on on-site visits, therefore consuming less energy in general. The highest consumption of energy occurs for heating/cooling through the air-conditioners. Consumption varies, according to the position of the sun relative to the building’s façade. In the summer, cooling is mostly needed in the afternoons, while, in the winter, heating is mostly needed in the mornings. Therefore, the energy usage patterns are affected by: time of day, external temperature and cloud coverage. The second workplace is an electricity regulation agency in Barcelona, Spain, employing 49 employees in total. The building is always open and visitors in the floor covered by the agency are limited. The floor layout includes 1 open-space office area, 8 individual offices, 5 meeting rooms, 1 waiting room, 1 kitchen and restrooms. Employees cannot directly alter the climate conditions in the building, they can however open windows. External temperature and humidity conditions affect energy consumption, while around 40% of electricity consumption is due to air conditioning, as heating is provided by natural gas consumption. Smart meters are installed for monitoring the energy consumption per category of use (i.e., lighting, air conditioning), but no specific strategy for reducing energy-consumption has been set. The third workplace is a public museum at the old City of Luxembourg. It comprises of 4 buildings, containing the exhibition rooms and 25 administrative offices. There are 100 employees in the museum, 40 of which administrative staff. Lights are always on in the exhibition area and visitor restrooms, during the museum’s visiting hours. There are very few automated light switches and, although the daylight prevails in the museum rooms, many lights are kept on for security reasons. The largest part of energy consumption is due to lighting and the climate system in the exhibition rooms, which ensures the museum exhibits are secure and properly preserved. Heating in the administrative offices is controlled per office (1-2 people in the room) where there is no air-conditioning. Employees cannot alter the climate or lighting conditions in the largest part of the facilities, and museum visitors cannot act on the climate controls or any other energy consumption actuator. At a first glance, only the lift usage of visitors may alter their contribution to energy consumption in the museum. Overall, through the physical observation process a number of common, as well as contradictory significant characteristics of the three pilot workplaces were highlighted. Table 1 summarizes our most important findings. 374 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. Kotsopoulos, C. Bardaki, S. Lounis, T. Papaioannou & K. Pramatari: Designing an IoT-enabled Gamification Application for Energy Conservation at the Workplace: Exploring Personal and Contextual Characteristics Table 1: Workplace characteristics to be considered for the design of the gamified application Electricity Public Office Regulation Public Museum Agency Workplace Offices in single Offices in single Three buildings Location floor floor IT support, on Museum, office Nature of work Office work and off-site back-end Number of 55 49 100 Employees Visitors almost none ~65.000 / Year PCs- Y PCs- Y PCs- Y Monitors Y Monitors N Monitors N Fancoils Y Fancoils Y Fancoils Y* Main energy Lighting Y Lighting Y* Lighting Y offending devices Printers Y Printers Y Printers Y & availability to Coffee Y Coffee Y Coffee Y interact with Maker Maker Y Maker them through the Toaster Toaster Y Microwave gamified app Kettle Microwave *all shared units * not in exhibition -only in offices Other possible Windows Y Elevators Y Elevators Y* energy Elevators Y * for employees & conservation visitors behaviours available The museum is different to both the other workplaces, in that it hosts a very large number of visitors per year, whereas close to no visitors are expected in the other two sites. At the same time, the climate and lighting conditions in most of the areas of the museum are very specific and, therefore, lights and climate control cannot be used in a gamified app for these areas. Furthermore, it consists of four whole buildings, as opposed to a single floor office space. The only area of the museum that resembles the other two workplaces is the employees’ backend office area. A special, distinctive feature of the museum is that its visitors could conserve energy by opting to use the stairs instead of the elevator. Regarding the office spaces in all three sites, a lot of similarities exist in the possible targeted behaviours. PCs, monitors and printers can be switched off more often, as well as lights, when not needed. Common area equipment – kettles, coffee makers, toasters and microwave ovens, depending on their availability on each site – can also be 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 375 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. Kotsopoulos, C. Bardaki, S. Lounis, T. Papaioannou & K. Pramatari: Designing an IoT-enabled Gamification Application for Energy Conservation at the Workplace: Exploring Personal and Contextual Characteristics introduced to a gamified app. Such shared equipment, as well as shared printers and lights, could be used in a game, by creating special rules to allocate points according to each individual’s energy conservation. 3.2 User Interviews: Method and Results We performed in-depth, semi-structured interviews with a representative sample of employees per workplace, as a small amount of interviews can produce data capable of addressing a set research goal, selected with careful sampling and a thorough collection technique (Holloway, 1997). Furthermore, following the theoretical saturation rule of qualitative research, we sampled until no new information or insight was produced – 26 employees – also exceeding ten cases in consistence with the suggested valid range of case sampling (Eisenhardt, 1989). Table 2: Interview Guide Demographic info & role in organisation Working conditions in terms of comfort and stress Do you have your own office or do you share it with others? Do you think that energy conservation is a real need or a business hype? Do you think energy consumption is mostly an environmental, or an economic problem? Do you personally save energy at work? Give an example. Do you turn the screen off when you leave the office for a while? Do you like to read on paper in general? Do you consider yourself more energy efficient at home than at work? Are you married? Do you have children? Are they energy-efficient? Do you generally feel colder, or hotter than people around you? Do you consider saving energy at work your personal responsibility? Do you think that more energy can be saved at work? If yes, name as many cases as you can identify where energy is wasted at work. Do you do anything about this waste? Do you think that your own actions matter or only collective actions may have an impact towards this end? Do you think that a reward is deserved for being energy-efficient at work? Monetary or not? If the reward is small, is it still motivating or discouraging for you? Would you change your behaviour to save more energy at work? Do you play games in general? What kind? Do you own a smartphone? Do you use mobile apps? Do you prefer competitive or collaborative games? If we were creating a game at work around energy efficiency, would individual or team competition be preferable to you? Would you prefer a collective goal setting over a competitive setting for this game? 376 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. Kotsopoulos, C. Bardaki, S. Lounis, T. Papaioannou & K. Pramatari: Designing an IoT-enabled Gamification Application for Energy Conservation at the Workplace: Exploring Personal and Contextual Characteristics Our intention was to gain a first understanding of the employees’ habits, needs and preferences regarding energy consumption and gamified apps. We conducted a discussion starting from specific questions, but the order of questions was changing according to the order of the subjects discussed. We intended to elicit mostly spontaneous answers and we encouraged the participants to add their remarks in the end of the conversation, as they saw fit. Moreover, all information collected during the interviews was content analyzed and coded by three independent coders into categories pertaining to the present research. A number of categories were decided upon ahead of time (e.g. Game Element of Point, Badge etc.) while other categories were identified based on the employees‟ responses (e.g. setup of teams). In the case of disagreement on the classification of any particular statement, the disagreements were resolved upon joint discussion. Table 2 includes the questions used to stimulate the conservation. Respectively, Table 3 reports the feedback we received from the employees during the interviews. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 377 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. Kotsopoulos, C. Bardaki, S. Lounis, T. Papaioannou & K. Pramatari: Designing an IoT-enabled Gamification Application for Energy Conservation at the Workplace: Exploring Personal and Contextual Characteristics Table 3: Summary of employee interview results Electricity Public Office Regulation Public Museum Agency Interviewed 5 / 55 9 / 49 12 / 100 Sample 4 Male – 1 5 Male – 4 3 Male – 9 Gender Female Female Female Various: project Various: mgt. (3), Various: management(2), admin.(2), waste administrative (5) administrative Role mgt.(1), energy security-technical (1), app. efficiency (1), (3), managerial developer (1), comms (1), (3), scientific (1) technician(1) finance (1) Shared (vs own) 5/5 5/9 8/12 office Energy conservation is a 3/5 5/9 12/12 real need I save energy at 3/5 5/9 11/12 work Feeling colder / 4/12 feel hotter, hotter than other 1/5 feel colder 4/9 feel colder 4/12 feel colder people I consider saving energy at work my 2/5 7/9 9/12 personal responsibility 5/5: monitors- Identified cases 9/9: lights, printers on 10/12: heating, where energy is appliances left on standby, air- printers, elevators wasted at work afterhours” conditioners Personal, or 2/5 personal, 4/9 personal, 7/12 personal, collective actions 3/5 collective 5/9 collective 5/12 collective have impact? Reward is deserved for being 2/5 5/9 2/12 energy-efficient Even small rewards are 1/5 2/9 7/12 motivating to me 378 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. Kotsopoulos, C. Bardaki, S. Lounis, T. Papaioannou & K. Pramatari: Designing an IoT-enabled Gamification Application for Energy Conservation at the Workplace: Exploring Personal and Contextual Characteristics I play games in 3/5 5/8 5/12 general Competitive vs 8/12 collaborative 3/5 collaborative- 5/9 collaborative- collaborative- game, Individual team competition team competition team competition vs team play Game Goals: 1/5 collective, 4/9 collective, 4/12 collective, Collective vs 1/5 competitive 3/9 competitive 1/12 competitive Competitive Employees in Technicians & IT Special group- Employees in exhibition area print less. based electricity open plan area do not have Administrative consumption share printers and access to many do most of the behaviour lights. energy-saving printing actions.  Air Conditioner temperature  very low in Air Conditioner summer.  No control over temperature not  All lights ON Air always set even with few Conditioning, optimally.  people, or Lights, or Lights left on ample natural opening after operating light, in open Windows in the hours or used space and exhibition areas when ambient Main problems common areas by employees, light suffices. identified by the   Screens and due to Screens and interviewees printers left on restrictions printers left on when unused  Screens, stand-by mode  Excessive Printers, PCs, when leaving.  printing Monitors often Windows  Coffee maker left on standby opened with the left on mode air conditioner  Windows open  Elevators could on with air be used less conditioner on  Elevator overly used Based on the interview results, we can deduce a number of suggestions, regarding the differences and characteristics that a gamified application towards energy conservation should respect. First of all, the varying roles of the participants in the three sites seem to affect their daily duties, as well as their opportunities to act upon specific energy 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 379 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. Kotsopoulos, C. Bardaki, S. Lounis, T. Papaioannou & K. Pramatari: Designing an IoT-enabled Gamification Application for Energy Conservation at the Workplace: Exploring Personal and Contextual Characteristics conservation actions. For example, some need to print a lot of documents according to their duties, while others not at all. At the same time, the employees in the exhibition area of the museum, for example, do not have access to many energy saving actions in general. Secondly, working in a shared space presents further challenges towards designing a gamified app, as the individual actions of the participants also affect their colleagues, and therefore a level of cooperation towards common goals in the game may be preferable in these situations. Comfort levels are a parameter that also needs to be addressed, as the actions of the participants in a game, should not impede on the personal comfort of their colleagues, or lead to tension and disagreements. We should also take into account that some of the participants feel colder/hotter than their colleagues and this issue should not preferably be exacerbated by an app. Interestingly, when asked whether personal or collective actions have an impact on energy conservation at their respective workplaces, the participants were somewhat equally divided, indicating that the game should provide opportunities for both personal and collective actions to be acted upon. The necessity of interviewing the prospective participants of a gamified app towards energy conservation was also demonstrated by the fact that different cases where energy is wasted are unanimously identified by the participants in the three different sites: At the “Public Office”, monitors and printers left on standby upon leaving, at the “Energy Agency” lights and appliances left on afterhours and, at the “Museum” heating, printers and elevators. As per the main problems that employees identified at their respective workplace, regarding energy consuming devices: Employees at the “Public Office” suggested that air conditioner temperature is not always set optimally, lights are left on after operating hours or used when ambient light suffices, screens and printers are left on stand-by mode when leaving and windows opened with the air conditioner on. At the “Energy Agency”, the air conditioner temperature may be very low during summer, all lights are left on even when a few people are present in commonly used areas – or when ample natural light suffices, screens and printers are left on when unused, excessive printing is reported, coffee makers are often left on afterhours, windows are opened with the air conditioner on, and the elevator is overly used by the employees that avoid using stairs instead. At the “Museum”, employees have no control over air conditioning, lights, or opening windows in the exhibition areas due to restrictions, screens, printers, PCs and monitors are often left on standby mode and elevators could probably be used less. All these actions can be targeted through a gamified app, according to the specific needs of each site, towards attaining the optimum behavioural effect on energy conservation. As only some of the prospective participants, in two of the three sites, consider saving energy at work their own personal responsibility, the ones that do could be selected as leaders in a team-play scenario, so that they can provide positive role models for their fellow team mates. Furthermore, since both personal and collective actions are considered to have an impact on energy conservation by some of the participants, a gamified app towards that end should instigate both individual, as well as collective actions. This is further supported by the fact that on all sites the majority of the participants prefer a collaborative game with team competition, while the minority a competitive game 380 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. Kotsopoulos, C. Bardaki, S. Lounis, T. Papaioannou & K. Pramatari: Designing an IoT-enabled Gamification Application for Energy Conservation at the Workplace: Exploring Personal and Contextual Characteristics featuring solo play. The same stands for collective vs competitive goals. An additional interesting finding is also that varying percentages of employees in the three sites believe that a reward is deserved for being energy-efficient at the workplace as well as that the existence of even small rewards is motivating towards the same target. Therefore, a gamified app would be more efficient through the inclusion of tangible rewards, only for a percentage of employees. Depending upon the general trend on each site, as well as their availability by employers, the app could also selectively include these extrinsic means of motivation, to adhere to each specific situation. Finally, as only about half of the participants on all sites play games in general, a gamified app featuring only basic game elements and not an overly complex narrative or gameplay, could be more universally accepted, as well as effective, towards behavioural change. Through the interviewing process, the participants’ also provided some additional interesting insight, regarding what we should consider when designing a gamified app towards energy conservation at their workplace. The most prominent suggestions were:  “Every single small action is important but in the end only collective actions will have a really deep impact.”  “We have to conserve energy responsibly for our future and because we want to do it, not to collect rewards”  “If we combine all the small consumptions, they may add up to a considerable amount of energy saving. The information of how much each device consumes in standby mode should be provided to the users”  “In view of the great differences between the tasks of the Museum's staff, I do not see any possibility for competitive games. A collective goal can be more interesting.”  “The game should have specific rules and a clear target”  “Any awards should be divided between users, based on their contribution in the game.”  “The gamified system should not make people feel guilty about their energy consumption” Conclusion A body of research exists, regarding energy conservation in public buildings, due to their large share in energy consumption worldwide. The use of ICT has also been featured in a number of studies aimed at energy conservation in public buildings. However, the effect of such solutions is limited by the building occupants’ intentions to follow specific energy consumption behaviour. Gamification has been introduced in various contexts to instigate behavioural change, including energy conservation initiatives, where it has been utilised as a means to affect occupant behaviour. The results from the relative studies have been mixed, as well as difficult to compare, due to the vast differences in both the actors’ and contexts’ characteristics. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 381 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. Kotsopoulos, C. Bardaki, S. Lounis, T. Papaioannou & K. Pramatari: Designing an IoT-enabled Gamification Application for Energy Conservation at the Workplace: Exploring Personal and Contextual Characteristics Aiming to amend this issue, we have followed a structured process, involving two steps: On-site visits to prospective pilot sites, as well unstructured interviews with a representative sample of the participants in future gamified apps aimed at energy conservation. We have provided the questionnaire used in the interviewing process, so that it can be used in future similar studies. Through our analysis, we have discovered a number of contextual differences between the pilot sites, as well as in the prospective participants’ available, suggested and preferred actions towards energy conservation at their respective workplaces. At the same time we have also gathered insight, regarding the game related preferences of our participants in our field of application. By combining all this information, we can design a gamified application to better match both our future participants’ context, as well as preferences, leading to an overall better-suited solution to a better-defined problem. Therefore, we expect the effectiveness of our resulting application to be enhanced, compared to cases where neither the context, nor the preferences of the prospective participants of a gamified app have been analysed in advance. Based on our findings, we have identified the main elements that affect the design of a gamified application towards energy conservation in the three workplaces surveyed. Employee roles and daily routines, existing limitations towards specific behaviours within the workplace (e.g. standard procedures - SOPs), the layout in the workplace (shared workspaces vs individual offices), existing employees’ comfort levels, and different opportunities to conserve energy in each workplace, affect the accessibility, as well as impact of specific energy saving actions that can be included in a gamified app. As per the app design itself, in our pilot sites, both personal and collective actions, individual and team play should be considered, while – since only a few of the employees play games – a basic game play could be more effective in energy behaviour change. Apart from its merits, our study also bears some limitations. First of all, we have investigated our prospective participants, by interviewing a sample (12.74 %) of employees. Therefore, our findings would be better grounded, if we were given the opportunity to interview all of the employees at the sites we visited. In addition, we conducted the on-site visits only once in each site, whereas a longitudinal study could provide more accurate results, as well as additional insight not currently recorded. Finally and more importantly, we expect that the validity, as well as usefulness of the methodology we propose, would be significantly enhanced, by a practical application of our findings in an actual gamified energy conservation experiment that would be conducted in our surveyed pilot sites. We aim to proceed towards this direction through our research in the future. 382 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. Kotsopoulos, C. Bardaki, S. Lounis, T. Papaioannou & K. Pramatari: Designing an IoT-enabled Gamification Application for Energy Conservation at the Workplace: Exploring Personal and Contextual Characteristics References Blohm, I. and Leimeister, J. M. (2013) ‘Gamification: Design of IT-based enhancing services for motivational support and behavioral change’, Business and Information Systems Engineering, 5(4), pp. 275–278. doi: 10.1007/s12599-013-0273-5. Conti, J., Holtberg, P., Diefenderfer, J., LaRose, A., Turnure, J. T. and Westfall, L. (2016) International Energy Outlook 2016, With Projections to 2040. May 2016. Washington, DC, U.S.A.: U.S. Energy Information Administration (EIA). doi: DOE/EIA-0484(2014). Dale, S. (2014) ‘Gamification : Making work fun, or making fun of work?’, Business Information Review, 31(2), pp. 82–90. doi: 10.1177/0266382114538350. Delmas, M. A., Fischlein, M. and Asensio, O. I. (2013) ‘Information strategies and energy conservation behavior: A meta-analysis of experimental studies from 1975 to 2012’, Energy Policy, 61, pp. 729–739. doi: 10.1016/j.enpol.2013.05.109. Deterding, S., Sicart, M., Nacke, L., O’Hara, K. and Dixon, D. (2011) ‘Gamification. using game- design elements in non-gaming contexts’, Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems - CHI EA ’11, p. 2425. doi: 10.1145/1979742.1979575. Eisenhardt, K. M. (1989) ‘Building Theories from Case Study Research Published by : Academy of Management Stable URL : http://www.jstor.org/stable/258557 Linked references are available on JSTOR for this article : Building Theories from Case Study Research’, The Academy of Management Review, 14(4), pp. 532–550. Grossberg, F., Wolfson, M., Mazur-Stommen, S., Farley, K. and Nadel, S. (2015) Gamified Energy Efficiency Programs. Available at: http://www.climateaccess.org/sites/default/files/aceee.pdf. Gul, M. S. and Patidar, S. (2015) ‘Understanding the energy consumption and occupancy of a multi- purpose academic building’, Energy and Buildings. Elsevier B.V., 87, pp. 155–165. doi: 10.1016/j.enbuild.2014.11.027. Holloway, I. (1997) Basic concepts for qualitative research. Oxford, UK: Wiley-Blackwell. Lo, S. H., Peters, G. J. Y. and Kok, G. (2012) ‘Energy-Related Behaviors in Office Buildings: A Qualitative Study on Individual and Organisational Determinants’, Applied Psychology, 61(2), pp. 227–249. doi: 10.1111/j.1464-0597.2011.00464.x. Lülfs, R. and Hahn, R. (2013) ‘Corporate greening beyond formal programs, initiatives, and systems: A conceptual model for voluntary pro-environmental behavior of employees’, European Management Review, 10(2), pp. 83–98. doi: 10.1111/emre.12008. Matthies, E., Kastner, I., Klesse, A. and Wagner, H.-J. (2011) ‘High reduction potentials for energy user behavior in public buildings: how much can psychology-based interventions achieve?’, Journal of Environmental Studies and Sciences, 1(3), pp. 241–255. doi: 10.1007/s13412-011- 0024-1. Nguyen, T. A. and Aiello, M. (2013) ‘Energy intelligent buildings based on user activity: A survey’, Energy and Buildings. Elsevier B.V., 56, pp. 244–257. doi: 10.1016/j.enbuild.2012.09.005. Nikkila, S., Linn, S., Sundaram, H. and Kelliher, A. (2011) ‘Playing in Taskville : Designing a Social Game for the Workplace’, CHI 2011 Workshop on Gamification: Using Game Design Elements in Non-Game Contexts, pp. 1–4. Pickard, T. (2015) 5 Statistics That Prove Gamification is the Future of the Workplace, business.com. Available at: http://www.business.com/management/5-statistics-that-prove- gamification-is-the-future-of-the-workplace/ (Accessed: 27 February 2016). Reiners, T. and Wood, L. C. (2015) Gamification in Education and Business. Edited by T. Reiners and L. C. Wood. Cham: Springer International Publishing. doi: 10.1007/978-3-319-10208-5. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 383 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. Kotsopoulos, C. Bardaki, S. Lounis, T. Papaioannou & K. Pramatari: Designing an IoT-enabled Gamification Application for Energy Conservation at the Workplace: Exploring Personal and Contextual Characteristics Robson, K., Plangger, K., Kietzmann, J. H., McCarthy, I. and Pitt, L. (2015) ‘Is it all a game? Understanding the principles of gamification’, Business Horizons. ‘Kelley School of Business, Indiana University’. doi: 10.1016/j.bushor.2015.03.006. Sailer, M., Hense, J., Mandl, H. and Klevers, M. (2013) ‘Psychological Perspectives on Motivation through Gamification’, Interaction Design and Architecture(s) Journal - IxD&A, (19), pp. 28– 37. Seaborn, K. and Fels, D. I. (2015) ‘Gamification in theory and action: A survey’, International Journal of Human Computer Studies, 74, pp. 14–31. doi: 10.1016/j.ijhcs.2014.09.006. Shahri, A., Hosseini, M., Phalp, K., Taylor, J. and Ali, R. (2014) ‘Towards a code of ethics for gamification at enterprise’, Lecture Notes in Business Information Processing, 197, pp. 235– 245. doi: 10.1007/978-3-662-45501-2. Stephenson, J., Barton, B., Carrington, G., Gnoth, D., Lawson, R. and Thorsnes, P. (2010) ‘Energy cultures: A framework for understanding energy behaviours’, Energy Policy. Elsevier, 38(10), pp. 6120–6129. doi: 10.1016/j.enpol.2010.05.069. Uskov, A. and Sekar, B. (2015) ‘Smart Gamification and Smart Serious Games’, in Fusion of Smart, Multimedia and Computer Gaming Technology: Research, Systems and Perspectives. Springer International Publishing, pp. 7–36. doi: 10.1007/978-3-319-14645-4. Webb, E. N. (2013) ‘Gamification : When It Works , When It Doesn ’ t’, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8013 LNCS(PART 2), pp. 608–614. Werbach, K. and Hunter, D. (2012) For The Win: How Game Thinking can revolutionize your business. Philadelphia, PA: Wharton Digital Press, The Wharton School, University of Pensylvania. Zichermann, G. and Cunningham, C. (2011) Gamification By Design, Vasa. doi: 10.1017/CBO9781107415324.004. 384 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Consumer Emotions and E-commerce: A Literature Review 27 MATIAS LIEVONEN Abstract The purpose of this paper is to take a look at the current state of the research related to consumer emotions in the context of electronic commerce (e-commerce). As the popularity of online shopping is constantly growing, the author performed an integrative literature review of 66 journal articles on e-emotions (consumer emotions visible in an online environment) and classified the articles into four groups. According to the analysis of the groups, consumer emotions are present at various points of the e-commerce relationship from pre-purchase intentions to post- consumption behavior. Based on this literature review, directions for future research in e-emotions are also introduced. Keywords: • Emotions • Electronic Commerce • Online Shopping • Literature Review • CORRESPONDENCE ADDRESS: Matias Lievonen, University of Jyväskylä, Seminaarinkatu 15, 40014 Jyväskylän yliopisto, Finland, e-mail: matias.lievonen@jyu.fi. https://doi.org/10.18690/978-961-286-043-1.27 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 386 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Lievonen: Consumer Emotions and E-commerce: A Literature Review Introduction Recent statistics show that consumers are more committed to electronic commerce (e- commerce) than ever. The prediction is that 46.4 % of all Internet users worldwide will purchase products online in 2017 (Statista, 2017). The growing interest in e-commerce also means that varying consumer emotions are likely involved before, during, and after online shopping encounters. Emotions are important during these encounters as alongside trust they attempt to moderate the relationship quality between the consumer and the service provider of online services (Sanchez-Franco & Rondan-Cataluna, 2009). New technologies can enhance the shopping experience, but long-lasting evidence shows that online users are individuals with unique characteristics and emotions (Burke, 2002). Almost two decades ago, scholars indicated that affective and emotional dimensions truly matter as part of the consumer decision-making process on- and offline (Shiv & Fedorikhin, 1999). Emotions differ from similar concepts, such as sensations and feelings, and emotions “are also initiated by some particular objects or events, real or imagined, and they tend to motivate particular kinds of behavior” (Robinson, 2008, p. 155). In this paper, the focus is on e-emotions, which are seen as emotional states of a consumer that are somehow apparent and visible in an online environment. Consequently, consumer e-emotions matter at multiple levels of the service relationship, including pre- and post-consumption stages. Thanks to the development of technology and the expansion of social networking environments, the online environment has changed drastically in recent years making especially post-consumption behaviors more public. For example, electronic word-of- mouth (eWOM) has a significant role in consumer emotion build-up and affects other consumers’ pre-consumption stages (Chu & Kim, 2011). The current development has led to the situation in which communication is also more dynamic and active than ever before (Brodie et al., 2011; Freeman et al., 2010; Luoma-aho & Paloviita, 2010; Luoma- aho & Vos, 2010). Active interaction between consumers, stakeholders, and organizations is part of the so- called engagement process (Brodie et al., 2013; Brodie et al., 2011; van Doorn et al., 2010). Additionally, online users engage with various objects, such as brands, products, and virtual brand communities (Brodie et al., 2013). These engagement processes are often accompanied by different emotions and behaviors that thus play a central role in e- commerce, as well as in stakeholder relations in general (Luoma-aho & Paloviita, 2010). Although literature reviews of online shopping motives and intentions (e.g., Monsuwé, Dellaert, & de Ruyter, 2004), as well as of the adoption of computer-mediated services (e.g., Beldad, de Jong, & Steehouder, 2010), exist, there is an emerging need to generalize the current state of the research related to consumer emotions in the context of online shopping. As technology and consumer behavior are changing, management must understand this development and identify possible consumers’ and customers’ pain points (Lemon & Verhoef, 2016). Currently, the research related to e-emotions and e-commerce 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 387 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Lievonen: Consumer Emotions and E-commerce: A Literature Review is fragmented across various fields and disciplines, and a comprehensive understanding of the topic is difficult. This study responds to this need and is implemented as an integrative literature review. This paper is a preliminary attempt to gather the research literature related to consumer e-emotions in the context of online shopping and the current state of the research across various disciplines—information technology, psychology, communication, and marketing—was synthesized and analyzed. By gathering previous articles published in peer-reviewed journals, the goal in this paper is to classify the literature related to the topic, and through review and synthesis introduce the key findings. This paper is organized as follows: First, the process of the integrative literature review is introduced. Second, the relevant literature gathered during the process is assembled and the results introduced. Third, the results are combined, and the synthesis and analysis of the literature review are presented. The key findings in the literature are addressed. Finally, the validity and reliability of the study are discussed, and suggestions for future research are provided. Methodology: Integrative Literature Review This study utilized the integrative literature review method (see Torraco, 2005). Integrative literature reviews balance between less structured descriptive literature reviews and more structured systematic literature reviews (Birmingham, 2000). This method “is a form of research that reviews, critiques, and synthesizes representative literature on a topic in an integrated way such that new frameworks and perspectives on the topic are generated” (Torraco, 2005, p. 356). Although this study was integrative, it followed Fink’s (2010) model of systematic literature review consistently to add more validity and reliability. The first step in Fink (2010) model is to select the research questions. This step is critical because the research questions aim the researcher in the decision-making process and address what kind of articles should be included (Jesson, Matheson, & Lacey, 2011). This study answers the following research questions: 1) According to previous literature, what kind of research and studies have been put into practice related to consumer emotions in online shopping? 2) According to the literature analyzed in this study, what are the recent key findings related to consumer emotions in e-commerce? The second step was selecting the databases from which to look for literature (Fink, 2010). In this study, the goal was to cover interdisciplinary literature related to emotions in e-commerce across the following disciplines: information technology, psychology, communication, and marketing. The following bibliographic databases were utilized: ABI/INFORM Complete (ProQuest), Business Source Elite (EBSCO), Computer and Information Systems Abstracts (ProQuest), Emerald Insights (Journals) (Emerald), ProQuest Psychology Journals (ProQuest), and PsycARTICLES (the American Psychological Association). 388 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Lievonen: Consumer Emotions and E-commerce: A Literature Review After the databases were selected, search terms were chosen (Fink, 2010). Search terms should frame the topic enough so the appropriate literature can be found. However, the framing should not be too tight (Fink, 2010). The search terms were defined based on the research questions. The literature searches were conducted in February 2017. Advanced or multi-field searches were used in the databases, and the following search terms were applied in order to find relevant literature: emotion* AND online AND shop* OR e- commerce. The search terms were restricted to be present in the key words or subject terms. The author also applied the limitation of the search to peer-reviewed content if this option was applicable in the databases in the advanced search options. The ProQuest and EBSCO databases offered this option and the Emerald and American Psychological Association databases did not offer this option in the advanced search. The input of the search terms in the databases gave the following results: ABI/INFORM Complete (ProQuest), 73 results; Business Source Elite (EBSCO), 13 results; Computer and Information Systems Abstracts (ProQuest), 73 results; Emerald Insights (Journals) (Emerald), 251 results; ProQuest Psychology Journals (ProQuest), 73 results; and PsycARTICLES (American Psychological Association), 1 result. As can be seen from the search results, all ProQuest databases offered the same amount of literature. The results were also similar in content so the three ProQuest databases were treated as one entity during the review process. According to Fink (2010), the preliminary literature searches usually give many results. Therefore, it is important to screen for articles with certain criteria to find the relevant articles (Fink, 2010). After the searches were conducted in the databases, the practical screen and methodological quality screen (Fink, 2010) was applied by executing following inclusion criteria: peer-reviewed journal articles (also including content from the Emerald and APA databases), published since 2006, and studies related to emotions in the context of e-commerce or online shopping. The following research designs and content were excluded from the review: literature reviews and conference proceedings. The review (Fink, 2010) was conducted in two stages. In the first stage, the headings and abstracts of the studies were read. Through this, the most likely relevant literature to include in the final review was found as Jesson et al. (2011) suggested. In the second stage, the literature was scanned more thoroughly. At this stage, it was also important to analyze research designs, findings, and conclusions of the studies before deciding what literature should be included for the final review (Jesson et al., 2011). The articles in the review are shown in Table 1 in the next section. After the literature for the final review was apparent, it was time to synthesize the results (Fink, 2010). These conclusions are introduced in a more specific manner in the following sections, where the content of the review is interpreted and analyzed. The key findings of the studies are also reviewed more thoroughly in later parts of this paper. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 389 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Lievonen: Consumer Emotions and E-commerce: A Literature Review Results of the Literature Review After a careful scan of the available literature, 66 peer-reviewed articles were included in the final review. Studies that had interfaces with consumer emotions in the context of e- commerce were included. This was evaluated through keywords, and how, at the same time, the studies focused on the topic in a recognizable way in the research design and/or findings. Articles that did not match the criteria or did not cover the topic clearly enough were excluded from the review. The literature consisted of studies covering (either directly or indirectly) information technology, psychology, communication, and/or marketing. The articles were classified into four groups: studies related to website design, characteristics, or atmosphere and how they generally affect consumer emotions and behavior; studies related to pre- consumption emotions and predictors of consumers’ online shopping intentions and activities, such as the effects of online user reviews; studies related to consumer emotions during actual online shopping encounters, for example, decision making in purchase situations; and studies related to consumer post-consumption emotions and behavior, such as repurchase intention and commitment to eWOM. In general, recent studies focused on consumer e-emotions during all stages of the (service) relationship. This result supports the assumption that e-emotions are not just restricted to the purchase or buying situation. In fact, consumer emotions and behaviors are under scrutiny in multiple situations. People eagerly read reviews and participate in public discussion before making a purchase decision, and even after the consumption stage, there is a possibility that the experience turns either good or bad. Consumers possibly continue the service relationship, disengage with the service provider (Bowden, Gabbott, & Naumann, 2015), or even engage in eWOM (Chu & Kim, 2011) after e- commerce encounters. Analysis of the Key Findings in the Reviewed Articles The literature was analyzed in the four groups. The idea was to explore and compare the key findings within the groups and draw conclusions based on these findings. The literature is presented in Table 1. In addition, the most relevant and synthesized key findings of the studies of each group, and the authors, are introduced. 390 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Lievonen: Consumer Emotions and E-commerce: A Literature Review Table 1: Reviewed literature Group of the reviewed Relevant key findings Author and year articles 1) Studies related to Consumers’ emotions  Wang et al., 2014 website design, influence their perception  Mazaheri et al., characteristics, or of atmospheric cues (such 2014 atmosphere and how as music and color) on  Mazaheri, Richard, they generally affect websites affecting site & Laroche, 2012 consumer emotions attitude, site involvement,  Fei-Fei et al., 2009 and behavior and purchase intention.  Bui & Kemp, 2013  Zhang et al., 2014a Human images and  Davis, Wang, & human brands on websites Lindridge, 2008 stimulate higher levels of  Young & Im, 2012 enjoyment and positive  Jung-Hwan, Kim, & emotions. Lennon, 2009  Porat & Tractinsky, Product presentation has a 2012 significant effect on  Wu, Cheng, & Yen, consumers’ emotional 2008 responses on websites.  Ding & Lin, 2012  Wu et al., 2014  Jeong et al., 2009  López & Ruiz, 2011 Cultural differences exist  Zhang et al., 2014b 2) Studies related to between online retailer  Pappas et al., 2014 pre-consumption reputation and retail  Lee et al., 2016 emotions and quality, and how they  Kim, Yang, & Bu, predictors of consumers’ online affect consumer 2013 emotional and cognitive  Scholl-Grissemann shopping decisions reactions and intentions & Schnurr, 2016 and activities, such as before shopping.  Yin, Bond, & the effects of online Zhang, 2014 user reviews If online user reviews are  Luo et al., 2011 inconsistent, they affect  Kang, 2014 consumers’ purchase  Peng et al., 2016 intention.  Sharma & Lijuan, 2014 In addition, positive  Quevedo-Silva et emotions mediate the al., 2016 relationship between  Choi & Nazareth, personalization and 2014 purchase intentions.  Yen, 2014  Chen, Wu, & Consumer attitude, Chang, 2013 perceived difficulty of 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 391 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Lievonen: Consumer Emotions and E-commerce: A Literature Review website use, and  Hernandez, Jimenez, shoppers’ previous & Martín, 2009 experience are also  Soto-Acosta et al., antecedents of purchase 2014 intentions.  Jin & Lee, 2014 To create an emotional attachment to browsing and increase purchase intention, online retailers should focus on consumer pleasure and community relationships. 3) Studies related to High-quality web design  Chechen et al., 2016 consumer emotions interface and consumers’  Richard & Chebat, during actual online product involvement 2016 shopping encounters: elicit positive emotions  Guo et al., 2015 for example, decision during shopping. In  Moody et al., 2014 making in purchase addition, consumers'  Bonera, 2011 situations product involvement is  Peiris, Kulkarni, & important for eliciting Mawatha, 2015 positive emotions.  Huang & Kuo, 2012  Yao & Liao, 2011 Cognitive and emotional  Li, Sarathy, & responses play a key role Zhang, 2008 in communication  Ozen & Engizek, through online stores. 2014  Kim & Lennon, A linear relationship 2010 exists between the level of  Ballantine & Fortin, interactivity provided by 2009 an online store and  Hsin & Hsin-Wei, pleasure, which increases 2011 the likelihood of  Moran & Kwak, purchasing. 2015  Penz & Hogg, 2011 Enhanced perceptions of  Liao et al., 2016 human connection and the  Chae & Kun, 2013 formation of emotional  Wang et al., 2007 bonds provide a  Wen et al., 2014 competitive advantage for online retailers. Mixed emotions are likely to lead consumers to leave the stores. 392 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Lievonen: Consumer Emotions and E-commerce: A Literature Review Hedonic value drives online impulse buying tendencies. Positive emotions  Kuo & Wu, 2012 4) Studies related to increase post-  Yunfan, Yaobin, & consumer post- consumption satisfaction, Bin, 2012 consumption which positively affects  Lu, Lu, & Wang, emotions and post-purchase intentions. 2012 behavior, such as In turn, negative emotions  Urueña & Hidalgo, repurchase intention are an important mediator 2016 and commitment to between dissatisfaction  Mohamed et al., word-of-mouth and repurchase intention. 2014  Chou & Hsu, 2016 Satisfaction and  Richard & Habibi, perceived usefulness of a 2016 website contribute to  Jayawardhena & individual online Len, 2009 shopping continuance  Gounaris, intention in the future. Dimitriadis, & Stathakopoulos, Transaction cost 2010 advantage, preview, and  Kim et al., 2014 trust significantly and  Lim, 2015 positively affect  Lin, 2012 satisfaction, which, in  Sharma & Lijuan, turn, influences 2015 repurchase intention.  Vos et al., 2014  Matute et al., 2016 Emotions felt after visiting a web store positively influence the perceptions of the website atmospherics that, in turn, influence a set of behavioral variables ending with intention to (re-)purchase. Online shoppers’ excitement and positive perceived quality lead to positive word-of-mouth (WOM) and increase the intent to return. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 393 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Lievonen: Consumer Emotions and E-commerce: A Literature Review As can be seen in table 1, the studies indicated that the research in e-emotions is diverse and versatile. Moreover, the perspectives in these articles were broad and interdisciplinary. The studies explored consumer online emotions, behaviors, and their relations to e-commerce at multiple levels from pre-purchase to post-consumption stages. Next, this paper takes a closer look on the key findings presented in Table 1. 4.1 Website Design Effects on Consumer Emotions According to the key findings in the articles in Group 1, the website characteristics, design, and atmosphere usually have a major influence on consumers’ emotions, as well as on behavior. First, cultural differences exist in emotional responses and perceptions in online shopping environments (Davis et al., 2008; Mazaheri et al., 2014). Emotions are crucial in the perception stage of the atmospheric and characteristic cues of websites and affect consumers’ attitude toward the site, level of involvement, and purchase intention (Mazaheri et al., 2012; Porat & Tractinsky, 2012; Wang et al., 2014; Wu et al., 2014; Zhang et al., 2014a). Studies show a website that uses images of humans, instead of generic cues, stimulates higher levels of positive emotions and enjoyment (Wang et al., 2014). Music and colors used on these sites also have an effect on the emotional responses of potential customers and users (Bui & Kemp, 2013; Ding & Lin, 2012; Fei-Fei et al., 2009; Wu et al., 2008). Product presentation and store layout are also important as they are emotionally valid characteristics and part of a pleasant shopping experience (Jung-Hwan et al., 2009; Young & Im, 2012). Interestingly, emotional trust has a role in influencing consumers’ purchase intention (Zhang et al., 2014), and cognitive and emotional responses play a key role in communication through the websites (López & Ruiz, 2011). In addition, website patronage intention is affected by pleasure, arousal, entertainment, and esthetic experiences consumers receive (Jeong et al., 2009). 4.2 Pre-consumption Emotions According to the key findings in the articles in Group 2, pre-consumption emotions and expectations of certain e-commerce services are usually influenced by the information available online. The information is often available through user reviews, and through public discussion on social media and discussion forums. However, information overload has a negative effect on consumer emotions and thus affects purchase intention (Soto- Acosta et al., 2014). Short- or long-term price drops significantly affect how consumers respond in public product reviews (Lee et al., 2016). If online user reviews are inconsistent, cognitive trust and emotional trust are affected (Zhang et al., 2014b). As Zhang et al. (2014a) claimed, emotional trust most likely affects purchase intention (Sharma & Lijuan, 2014). Anxious or enthusiastic online reviews are considered more helpful than angry reviews (Yin et al., 2014). The amount of review manipulation also matters. Consumers usually have a 394 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Lievonen: Consumer Emotions and E-commerce: A Literature Review negative view if online reviews are deceptive or manipulated, but the degree of negativity varies depending on the manipulation tactics (Jin & Lee, 2014; Peng et al., 2016). If there is proof that the potential e-commerce retailer has had severe trust violations in the past, reconciliation efforts are meaningful when consumers ruminate on their potential options (Choi & Nazareth, 2014). Strategies for repairing trust are effective in building a positive mood, which, in turn, is an important mediator in rebuilding consumer trust (Chen et al., 2013). Additionally, positive emotions mediate the relationship between personalization and purchase intentions (Pappas et al., 2014), and the consumer’s experience affects these intentions as well (Hernandez et al., 2009). However, the reconciliation tactics should be moderate, as consumers are affected by the tactics used (Choi & Nazareth, 2014; Peng et al., 2016). Moreover, the severity of the trust violation also affects consumer perceptions (Choi & Nazareth, 2014). How these efforts are documented and presented publicly is also important. Consumers seek this information, and they evaluate the firm’s reputation (Kim et al., 2013) so that they can be certain and trust the online shop they are going to use. To create an emotional attachment to browsing and increase purchase intention, online retailers should focus on consumer pleasure and community relationships (Luo et al., 2011). Hedonic choice options are also important as they are more strongly related to positive emotions and pleasurable experiences than utilitarian online shopping options (Scholl-Grissemann & Schnurr, 2016), even though hedonic performance expectancies are not always positively related to usage intentions (Kang, 2014). Cognitive and emotional responses, as well as the interaction, play a key role in communication through websites (Yen, 2014). This also indicates how tempting the websites look to potential customers and how easy the sites are to use (Quevedo-Silva et al., 2016). 4.3 Consumer Emotions During Actual Online Shopping Encounters According to the key findings in the articles in Group 3, emotional and rational routes, as well as e-service quality, influence consumers during the online shopping process (Hsin & Hsin-Wei, 2011; Wen et al., 2014). Not only high-quality website design but also consumers’ product involvement elicits positive emotions during these encounters (Chechen et al., 2016). Emotions encompass pleasure, arousal, and dominance, and they precede cognition (Richard & Chebat, 2016). Moreover, a linear relationship exists between the level of interactivity provided by an online store and pleasure (Ballantine & Fortin, 2009). Pleasure increases the likelihood of purchasing during the e-commerce encounters (Kim & Lennon, 2010), and at the same time, consumers’ previous emotional experiences can affect their behavior (Guo et al., 2015). In these circumstances, using human brands, and utilizing enhanced perceptions of human connections and the formation of emotional bonds, could provide a competitive advantage for online retailers (Ballantine & Fortin, 2009; Chae & Kun, 2013; Wang et al., 2007). Incidental moods tend to increase process impulsivity in online shopping decisions (Huang & Kuo, 2012). Differences in users’ emotional experiences on e-commerce 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 395 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Lievonen: Consumer Emotions and E-commerce: A Literature Review websites are primarily embodied in subjective emotional ratings and eye movements (Guo eta al., 2015). Mixed emotions are likely to lead to consumers leaving the stores (Penz & Hogg, 2011). A common issue for e-commerce retailers is that customers are not ready to proceed through checkout procedures. For example, emotions can have a significant impact on the decision to give personal information that is necessary (such as credit card numbers) to complete a purchase on a website (Li et al., 2008). The consumer’s online shopping cart might already be filled with various products, but especially first-time customers might be suspicious (Li et al., 2008). Trust and distrust coexist in online e-commerce relationships and can result in ambivalence when they have high attitudinal values represented in emotions, beliefs, or behaviors (Moody et al., 2014). Use of the principles of web usability guidelines and trust indicators will improve consumers’ emotion about adopting e-commerce (Peiris et al., 2015) and increase the likelihood that consumers complete the checkout process. The purchase encounter must be as reliable as possible because perceived risk in e-commerce has a significant negative effect on consumers’ satisfaction (Yao & Liao, 2011). Hedonic values and aspects are important for online store users. Hedonic values increase online impulse buying tendencies (Ozen & Engizek, 2014). Interestingly, consumers who are under stress have a higher impulse buying tendency as well (Moran & Kwak, 2015). High or low hedonistic emotional commitment seems to be important to the perception of the usefulness of an online store (Bonera, 2011). For utilitarian products, therefore, it is important to offer a high-quality web design interface and move toward enhancing consumers’ product involvement, as they are also crucial for eliciting positive consumer emotions (Chechen et al., 2016; Liao et al., 2016). 4.4 Post-purchase Emotions According to the key findings in the Group 4 articles, the post-consumption or post- purchase stages are crucial for e-commerce retailers. Customers and consumers tend to expect that after the purchase has been successfully executed, the service relationship will continue, ordered products are received on time, and the product qualities are as expected (Sharma & Lijuan, 2015; Vos et al., 2014). Positive emotions increase post-satisfaction, which positively affects post-purchase intentions as well (Kuo & Wu, 2012). Emotional stability moderates the relationship between the perceived usefulness of a website and satisfaction in online shopping (Mohamed et al., 2014). Emotions felt after visiting a website positively influence consumers’ perceptions of the website atmospherics that, in turn, influence a set of behavioral variables ending with intention to purchase again (Richard & Habibi, 2016). For example, transaction cost advantage, preview, and trust significantly and positively affect satisfaction, which, in turn, influences repurchase intention (Kim et al., 2014). Moreover, satisfaction and perceived usefulness of the website contribute to individual online shopping continuance intention (Lim, 2015; Mohamed et al., 2014). Interestingly, shopping habit increases the influence 396 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Lievonen: Consumer Emotions and E-commerce: A Literature Review of emotional evaluation on continuance, while at the same time habit weakens the impact of rational evaluation on continuance intention (Chou & Hsu, 2016). Online shoppers’ excitement leads to positive word-of-mouth (WOM) and increases the intent to return (Jayawardhena & Len, 2009). Moreover, online service quality has a positive effect on satisfaction, while also influencing, directly and indirectly through satisfaction, consumers’ behavioral intentions: site revisit, word-of-mouth communication, and repeat purchases (Gounaris et al., 2010). Although electronic WOM has a positive direct effect on consumers’ intention to repurchase, quantity has a negative influence (Matute et al., 2016). Thus, it is necessary to monitor the tone of consumers’ public discussion during the post-purchase stage. If service failures have occurred, the switching intentions of consumers who are affected by negative emotions become stronger when the failures are controllable factors that could be managed and prevented (Lin, 2012). However, if consumers are treated in an appropriate way after the failure, the studies show that distributive justice (such as monetary compensation) increases positive emotions and decreases negative ones (Kuo & Wu, 2012). Furthermore, negative emotions also affect repurchase intention (Lu et al., 2012; Yunfan et al., 2012). In addition, procedural justice, such as received fairness from the company, enhances satisfaction, especially after the consumer has complained and the company seeks service recovery (Urueña & Hidalgo, 2016). Conclusions This study was a preliminary attempt to group and analyze peer-reviewed journal articles related to consumer emotions in the context of e-commerce. The author aimed at contributing to academia and practice, and introduced four groups of the current state of consumer e-emotions research in the context of online shopping. Groups 1 and 2 included studies on the effects of website design on emotions and studies on pre-purchase emotions. Groups 3 and 4 included studies on actual online shopping encounters and their effects on emotions, as well as studies on post-purchase emotions and behavior. In addition, the author synthesized and analyzed the key findings of the reviewed studies. By recognizing the emerging need and timely challenge of understanding online users and their emotions better, the goal of this paper was to increase the knowledge of the topic, and the paper brought up new perspectives by combining the previous research findings. According to the analysis, consumer emotions are present at various stages of the e- commerce relationship. For example, website design and characteristics affect consumer emotions, which, in turn, mediate site involvement. In the pre-consumption stage, emotions initiate the purchase intention, and during actual online shopping encounters, positive emotions and trust increase the likelihood of purchases. Post-consumption emotions are also interesting as they mediate the behavioral responses of the consumer, such as word-of-mouth and intention to return to the web store. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 397 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Lievonen: Consumer Emotions and E-commerce: A Literature Review As a preliminary attempt, this study has several limitations. Most noticeably, the search terms and databases used in the process affected the availability of the reviewable literature. Using different search criteria and databases could, naturally, provide alternative results and guide the indications to alternative directions than presented in this paper. However, using similar search terms should be possible in almost any academic database and give similar results. From a research method perspective, an integrative literature review has advantages and disadvantages. The most recognizable difference between this study and systematic reviews was the analysis. Systematic reviews aim at offering a systematic descriptive review analysis or even perform a meta-analysis (Fink, 2010), while the goal of this paper was simply to combine the current state of the research in a condensed form and reconstitute the current knowledge by utilizing conceptual grouping. The author also wanted to synthesize the results and analyze the key findings with flexibility in mind to add something new to the topic as Baumeister and Leary (1997) suggested. Reviews that were conducted too systematically and mechanically might lack essential details. Additionally, integrative literature reviews do not have to differ much from systematic reviews, if they follow a clear pattern and utilize a structured methodological grasp (Salminen, 2011). The author accomplished this by implementing Fink’s (2010) systematic method diversely during the review process. These actions also added credibility and validity to the study (Dixon-Woods, Booth, & Sutton, 2007). This mixed approach was also flexible, as the literature related to the topic was fragmented across various fields and disciplines. Finally, yet importantly, the author’s goal was to follow Torraco (2005) who implied that an integrative literature review has “an important role in stimulating future research on the topic” (p. 364). As the tendency of positive and negative consumer e-emotions in e-commerce is still somewhat unclear, the author suggests that future studies should answer the following research questions: What usually causes positive emotions in the context of e-commerce when customers are motivated and intend to buy from an online store? What emotions are present when consumers have negative e-commerce experiences? What prevents consumers from buying from an online store? References Ballantine, P. W., & Fortin, D. R. (2009). The effects of interactivity and product information on consumers’ emotional responses to an online retail setting. International Journal of Internet Marketing and Advertising, 5(4), 260–271. Baumeister, R. F., & Leary, M. R. (1997). Writing narrative literature reviews. Review of General Psychology, 1(3), 311–320. Beldad, A., de Jong, M., & Steehouder, M. (2010). How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust. Computers in Human Behavior, 26(5), 857–869. Birmingham, P. (2000). Reviewing the literature. In D. Wilkinson (Ed.), Researcher’s toolkit: The complete guide to practitioner research (pp. 25–40). City: Publisher. 398 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Lievonen: Consumer Emotions and E-commerce: A Literature Review Bonera, M. (2011). The propensity of e-commerce usage: The influencing variables. Management Research Review, 34(7), 821–837. doi:10.1108/01409171111146706 Bowden, J. L. H., Gabbott, M., & Naumann, K. (2015). Service relationships and the customer engagement-disengagement conundrum. Journal of Marketing Management, 31(7–8), 774– 806. Brodie, R. J., Hollebeek, L. D., Juric, B., & Ilic, A. (2011). Customer engagement: Conceptual domain, fundamental propositions, and implications for research. Journal of Service Research, 14(3), 252–271. Brodie, R. J., Ilic, A., Juric, B., & Hollebeek, L. D. (2013). Consumer engagement in a virtual brand community: An exploratory analysis. Journal of Business Research, 66(1), 105–114. Bui, M., & Kemp, E. (2013). E-tail emotion regulation: Examining online hedonic product purchases. International Journal of Retail & Distribution Management, 41(2), 155–170. doi:10.1108/09590551311304338 Burke, R. R. (2002). Technology and the customer interface: What consumers want in the physical and virtual store. Academy of Marketing Science, 30(4), 411–432. Chae, S. W., & Kun, C. L. (2013). Exploring the effect of the human brand on consumers’ decision quality in online shopping. Online Information Review, 37(1), 83–100. doi:10.1108/14684521311311649 Chechen, L., Pui-Lai, T., Yun-Chi, W., Palvia, P., & Kakhki, M. D. (2016). The impact of presentation mode and product type on online impulse buying decisions. Journal of Electronic Commerce Research, 17(2), 153–168. Chen, Y., Wu, J., & Chang, H. (2013). Examining the mediating effect of positive moods on trust repair in e‐commerce. Internet Research, 23(3), 355–371. doi:10.1108/10662241311331772 Choi, J., & Nazareth, D. L. (2014). Repairing trust in an e-commerce and security context: An agent-based modeling approach. Information Management & Computer Security, 22(5), 490– 512. doi:10.1108/imcs-09-2013-0069 Chou, S., & Hsu, C. (2016). Understanding online repurchase intention: Social exchange theory and shopping habit. Information Systems and eBusiness Management, 14(1), 19–45. doi:10.1007/s10257-015-0272-9 Chu, S.-C., & Kim, Y. (2011). Determinants of consumer engagement in electronic word-of-mouth (eWom) in social networking sites. International Journal of Advertising, 30(1), 47–75. Davis, L., Wang, S., & Lindridge, A. (2008). Culture influences on emotional responses to on-line store atmospheric cues. Journal of Business Research, 61(8), 806–812. Ding, C. G., & Lin, C. (2012). How does background music tempo work for online shopping? Electronic Commerce Research and Applications, 11(3), 299–307. doi:10.1016/j.elerap.2011.10.002 Dixon-Woods, M., Booth, A., & Sutton, A. J. (2007). Synthesizing qualitative for nursing practice. Systematic Reviews, 7(3), 137–148. Fei-Fei, C., Chin-Shan, W., & David, C. Y. (2009). The effect of online store atmosphere on consumer's emotional responses - an experimental study of music and colour. Behaviour & Information Technology, 28(4), 323–334. doi:10.1080/01449290701770574 Fink, A. (2010). Conducting research literature reviews: From the Internet to the paper. Thousand Oaks, CA: Sage. Freeman, R. E., Harrison, J. S., Wicks, A. C., Parmar, B., & de Colle, S. (2010). Stakeholder theory: The state of the art. Cambridge: Cambridge University Press. Gounaris, S., Dimitriadis, S., & Stathakopoulos, V. (2010). An examination of the effects of service quality and satisfaction on customers’ behavioral intentions in e-shopping. The Journal of Services Marketing, 24(2), 142–156. doi:10.1108/08876041011031118 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 399 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Lievonen: Consumer Emotions and E-commerce: A Literature Review Guo, F., Cao, Y., Ding, Y., Liu, W., & Zhang, X. (2015). A multimodal measurement method of users' emotional experiences shopping online. Human Factors & Ergonomics in Manufacturing & Service Industries, 25(5), 585–598. doi:10.1002/hfm.20577 Hernandez, B., Jimenez, J., & Martín, J. M. (2009). Adoption vs acceptance of e‐commerce: Two different decisions. European Journal of Marketing, 43(9/10), 1232–1245. doi:10.1108/03090560910976465 Hsin, H. C., & Hsin-Wei, W. (2011). The moderating effect of customer perceived value on online shopping behaviour. Online Information Review, 35(3), 333–359. doi:10.1108/14684521111151414 Huang, Y., & Kuo, F. (2012). How impulsivity affects consumer decision-making in e-commerce. Electronic Commerce Research and Applications, 11(6), 582–590. doi:10.1016/j.elerap.2012.09.004 Jayawardhena, C., & Len, T. W. (2009). An empirical investigation into e-shopping excitement: Antecedents and effects. European Journal of Marketing, 43(9), 1171–1187. doi:10.1108/03090560910976429 Jeong, S. W., Fiore, A. M., Niehm, L. S., & Lorenz, F. O. (2009). The role of experiential value in online shopping. Internet Research, 19(1), 105–124. doi:10.1108/10662240910927858 Jesson, J. K., Matheson, L., & Lacey, F. M. (2011). Doing your literature review. Traditional and systematic techniques. London: Sage. Jin M., Y., & Lee, H.-H. (2014). Consumer responses toward online review manipulation. Journal of Research in Interactive Marketing, 8(3), 224–244. doi:10.1108/jrim-04-2013-002 Jung-Hwan, K., Kim, M., & Lennon, S. J. (2009). Effects of web site atmospherics on consumer responses: Music and product presentation. Direct Marketing, 3(1), 4–19. doi:10.1108/17505930910945705 Kang, J. M. (2014). Augmented reality and motion capture apparel e-shopping values and usage intention. International Journal of Clothing Science and Technology, 26(6), 486–499. Kim, H., & Lennon, S. J. (2010). E-atmosphere, emotional, cognitive, and behavioral responses. Journal of Fashion Marketing and Management, 14(3), 412–428. doi:10.1108/13612021011061861 Kim, J., Yang, K., & Bu, Y. K. (2013). Online retailer reputation and consumer response: Examining cross-cultural differences. International Journal of Retail & Distribution Management, 41(9), 688–705. Kim, M. J., Lee, C., Chung, N., & Kim, W. G. (2014). Factors affecting online tourism group buying and the moderating role of loyalty. Journal of Travel Research, 53(3), 380. Kuo, Y., & Wu, C. (2012). Satisfaction and post-purchase intentions with service recovery of online shopping websites: Perspectives on perceived justice and emotions. International Journal of Information Management, 32(2), 127–138. doi:10.1016/j.ijinfomgt.2011.09.001 Lee, K. Y., Jin, Y., Rhee, C., & Yang, S. (2016). Online consumers’ reactions to price decreases: Amazon’s Kindle 2 case. Internet Research, 26(4), 1001–1026. Lemon, K. N., & Verhoef, P. C. (2016). Understanding customer experience throughout the customer journey. Journal of Marketing, 80(6), 69–96. Li, H., Sarathy, R., & Zhang, J. (2008). The role of emotions in shaping consumers’ privacy beliefs about unfamiliar online vendors. Journal of Information Privacy & Security, 4(3), 36–62. Liao, C., To, P., Wong, Y., Palvia, P., & Kakhki, M. D. (2016). The impact of presentation mode and product type on online impulse buying decisions. Journal of Electronic Commerce Research, 17(2), 153–168. Lim, W. M. (2015). Antecedents and consequences of e-shopping: An integrated model. Internet Research, 25(2), 184. Lin, W. (2012). The determinants of consumers' switching intentions after service failure. Total Quality Management & Business Excellence, 23(7-8), 837–854. 400 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Lievonen: Consumer Emotions and E-commerce: A Literature Review López, I., & Ruiz, S. (2011). Explaining website effectiveness: The hedonic-utilitarian dual mediation hypothesis. Electronic Commerce Research and Applications, 10(1), 49–58. doi:10.1016/j.elerap.2010.04.003 Lu, Y., Lu, Y., & Wang, B. (2012). Effects of dissatisfaction on customer repurchase decisions in e-commerce-an emotion-based perspective. Journal of Electronic Commerce Research, 13(3), 224–237. Luo, M. M., Chen, J., Ching, R. K. H., & Liu, C. (2011). An examination of the effects of virtual experiential marketing on online customer intentions and loyalty. The Service Industries Journal, 31(13), 2163. Luoma-aho, V., & Paloviita, A. (2010). Actor-networking stakeholder theory for today’s corporate communications. Corporate Communications: An International Journal, 15(1), 49–67. Luoma-aho, V., & Vos, M. (2010). Towards a more dynamic stakeholder model: Acknowledging multiple issue arenas. Corporate Communications: An International Journal, 15(3), 315–331. Matute, J., Polo-Redondo, Y., & Utrillas, A. (2016). The influence of EWOM characteristics on online repurchase intention: Mediating roles of trust and perceived usefulness. Online Information Review, 40(7), 1090–1110. doi:10.1108/oir-11-2015-0373 Mazaheri, E., Richard, M. O., Laroche, M., & Ueltschy, L. C. (2014). The influence of culture, emotions, intangibility, and atmospheric cues on online behavior. Journal of Business Research, 67(3), 253–259. doi:10.1016/j.jbusres.2013.05.011 Mazaheri, E., Richard, M., & Laroche, M. (2012). The role of emotions in online consumer behavior: a comparison of search, experience, and credence services. Journal of Services Marketing, 26(7), 535–550. doi:10.1108/08876041211266503 Mohamed, N., Hussein, R., Hidayah, A. Z., & Haghshenas, H. (2014). Insights into individual’s online shopping continuance intention. Industrial Management & Data Systems, 114(9), 1453– 1476. Monsuwé, T. P., Dellaert, B. G. C., & de Ruyter, K. (2004). What drives consumers to shop online? A literature review. International Journal of Service Industry Management, 15(1), 102–121. Moody, G. D., Galletta, D. F., & Lowry, P. B. (2014). When trust and distrust collide online: The engenderment and role of consumer ambivalence in online consumer behavior. Electronic Commerce Research and Applications, 13(4), 266–282. doi:10.1016/j.elerap.2014.05.001 Moran, B., M.A., & Kwak, L. E. (2015). Effect of stress, materialism and external stimuli on online impulse buying. Journal of Research for Consumers, 27, 26–51. Ozen, H., & Engizek, N. (2014). Shopping online without thinking: Being emotional or rational? Asia Pacific Journal of Marketing and Logistics, 26(1), 78–93. Pappas, I. O., Kourouthanassis, P. E., Giannakos, M. N., & Chrissikopoulos, V. (2014). Shiny happy people buying: The role of emotions on personalized e-shopping. Electronic Markets, 24(3), 193–206. doi:10.1007/s12525-014-0153-y Peiris, P. M., Kulkarni, D., & Mawatha, C. R. D. S. (2015). Implications of trust and usability on E-commerce adoption. International Journal of Business and Information, 10(4), 519–556. Peng, L., Cui, G., Zhuang, M., & Li, C. (2016). Consumer perceptions of online review deceptions: An empirical study in China. Journal of Consumer Marketing, 33(4), 269–280. doi:10.1108/jcm-01-2015-1281 Penz, E., & Hogg, M. K. (2011). The role of mixed emotions in consumer behaviour. European Journal of Marketing, 45(1), 104–132. doi:10.1108/03090561111095612 Porat, T., & Tractinsky, N. (2012). It's a pleasure buying here: The effects of web-store design on consumers’ emotions and attitudes. Human-Computer Interaction, 27(3), 235–276. Quevedo-Silva, F., Freire, O., Lima-Filho, D. de O., Brandão, M. M., Isabella, G., & Moreira, L. B. (2016). Intentions to purchase food through the internet: Developing and testing a model. British Food Journal, 118(3), 572–587. doi:10.1108/bfj-09-2015-0305 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 401 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Lievonen: Consumer Emotions and E-commerce: A Literature Review Richard, M., & Chebat, J. (2016). Modeling online consumer behavior: Preeminence of emotions and moderating influences of need for cognition and optimal stimulation level. Journal of Business Research, 69(2), 541–553. doi:10.1016/j.jbusres.2015.05.010 Richard, M., & Habibi, M. R. (2016). Advanced modeling of online consumer behavior: The moderating roles of hedonism and culture. Journal of Business Research, 69(3), 1103–1119. Robinson, D. L. (2008). Brain function, emotional experience and personality. Netherlands Journal of Psychology, 64, 152–167. Salminen, A. (2011). Mikä kirjallisuuskatsaus? Johdatus kirjallisuuskatsauksen tyyppeihin ja hallintotieteellisiin sovelluksiin. [What literature review? Introduction to types of literature review in administrative sciences]. University of Vaasa. Retrieved February 1, 2017, from http://www.uva.fi/materiaali/pdf/isbn_978-952-476-349-3.pdf. Sanchez-Franco, M. & Rondan-Cataluna, F. J. (2010). Connection between customer emotions and relationship quality in online music services. Behaviour & Information Technology, 29(6), pp. 633-651. Scholl-Grissemann, U., & Schnurr, B. (2016). Room with a view: How hedonic and utilitarian choice options of online travel agencies affect consumers’ booking intentions. International Journal of Culture, Tourism and Hospitality Research, 10(4), 361–376. Sharma, G., & Lijuan, W. (2014). Ethical perspectives on e-commerce: An empirical investigation. Internet Research, 24(4), 414–435. doi:10.1108/intr-07-2013-0162 Sharma, G., & Lijuan, W. (2015). The effects of online service quality of e-commerce Websites on user satisfaction. The Electronic Library, 33(3), 468–485. doi:10.1108/el-10-2013-0193 Shiv, B., & Fedorikhin, A. (1999). Heart and mind in conflict: The interplay of affect and cognition in consumer decision making. Journal of Consumer Research, 26(3), 278–292. Soto-Acosta, P., Molina-Castillo, J. F., Lopez-Nicolas, C., & Colomo-Palacios, R. (2014). The effect of information overload and disorganisation on intention to purchase online. Online Information Review, 38(4), 543–561. Statista. The Statistic Portal. (2017). Digital buyer penetration worldwide from 2014 to 2019. Retrieved from February 7, 2017, from https://www.statista.com/statistics/261676/digital- buyer-penetration-worldwide/ Torraco, J. C. (2005). Writing integrative literature reviews: Guidelines and examples. Human Resource Development Review, 4(3), 356–367. Urueña, A., & Hidalgo, A. (2016). Successful loyalty in e-complaints: FsQCA and structural equation modeling analyses. Journal of Business Research, 69(4), 1384–1389. Van Doorn, J., Lemon, K. N., Mittal, V., Nass, S., Pick, D., Pirner, P., & Verhoef, P. C. (2010). Customer engagement behavior: Theoretical foundations and research directions. Journal of Service Research, 13(3), 253–266. Vos, A., Marinagi, C., Trivellas, P., Eberhagen, N., Giannakopoulos, G., & Skourlas, C. (2014). Electronic service quality in online shopping and risk reduction strategies. Journal of Systems and Information Technology, 16(3), 170–186. doi:10.1108/jsit-01-2014-0008 Wang, L. C., Baker, J., Wagner, J. A., & Wakefield, K. (2007). Can a retail web site be social? Journal of Marketing, 71(3), 143–157. Wang, Q., Yang, Y., Wang, Q., & Ma, Q. (2014). The effect of human image in B2C website design: an eye-tracking study. Enterprise Information Systems, 8(5), 582–605. doi:10.1080/17517575.2014.925585 Wen, C., R. Prybutok, V., Blankson, C., & Fang, J. (2014). The role of e-quality within the consumer decision making process. International Journal of Operations & Production Management, 34(12), 1506–1536. doi:10.1108/ijopm-07-2013-0352 Wu, C., Cheng, F., & Yen, D. C. (2008). The atmospheric factors of online storefront environment design: An empirical experiment in Taiwan. Information & Management, 45(7), 493–498. 402 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Lievonen: Consumer Emotions and E-commerce: A Literature Review Wu, W., Chia-Ling, L., Chen-Su, F., & Hong-Chun, W. (2014). How can online store layout design and atmosphere influence consumer shopping intention on a website? International Journal of Retail & Distribution Management, 42(1), 4–24. Yao, C., & Liao, S. (2011). Measuring the antecedent effects of service cognition and internet shopping anxiety on consumer satisfaction with e-tailing service. Management & Marketing, 6(1), 59–78. Yen, Y.-S. (2014). The interaction effect on customer purchase intention in e-commerce. Asia Pacific Journal of Marketing and Logistics, 26(3), 472–493. doi:10.1108/apjml-07-2013-0080 Yin, D., Bond, S. D., & Zhang, H. (2014). Anxious or angry? Effects of discrete emotions on the perceived helpfulness of online reviews. MIS Quarterly, 38(2), 539–560. Young, H., & Im, H. (2012). Role of web site design quality in satisfaction and word of mouth generation. Journal of Service Management, 23(1), 79–96. doi:10.1108/09564231211208989 Yunfan, L., Yaobin, L., & Bin, W. (2012). Effects of dissatisfaction on customer repurchase decisions in e-commerce—an emotion-based perspective. Journal of Electronic Commerce Research, 13(3), 224–237. Zhang, H., Lu, Y., Gao, P., & Chen, Z. (2014a). Social shopping communities as an emerging business model of youth entrepreneurship: Exploring the effects of website characteristics. International Journal of Technology Management, 66(4), 319–345. Zhang, K. Z., Cheung, C. M., & Lee, M. K. (2014b). Examining the moderating effect of inconsistent reviews and its gender differences on consumers’ online shopping decision. International Journal of Information Management, 34(2), 89–98. doi:10.1016/j.ijinfomgt.2013.12.001 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Age Differences in Technology Readiness and Its Effects on Information System Acceptance and Use: The Case of Online Electricity Services in Finland 28 MARKUS MAKKONEN, LAURI FRANK & KERTTULI KOIVISTO Abstract Although technology readiness (TR) has been found to influence the acceptance and use of information systems (IS), little is known about how TR varies in terms of different demographic variables and how these demographic variables moderate the effects of TR on IS acceptance and use. In this study, we aim to address this gap in prior research by examining the potential age differences in the four technology readiness index (TRI) constructs as well as their effects on IS use intention and its two main antecedents hypothesised in the technology acceptance model (TAM): perceived usefulness and perceived ease of use. The examination is conducted in the context of online electricity services and based on 1,176 online survey responses collected from Finnish consumers and analysed through structural equation modelling (SEM). The findings of the study suggest age differences in the optimism, innovation, and discomfort constructs of TRI, but not in the effects of any of the TRI constructs on the TAM constructs. These findings and their implications are discussed in more detail especially from the perspective of the so-called “young elderly” segment consisting of individuals aged 60–75 years. Keywords: • Information System Acceptance and Use • Age Differences • Technology Readiness Index • Technology Acceptance Model • Online Electricity Services • CORRESPONDENCE ADDRESS: Markus Makkonen, University of Jyvaskyla, Seminaarinkatu 15, 40014 Jyväskylän yliopisto, Finland, e-mail: markus.v.makkonen@jyu.fi. Lauri Frank, University of Jyvaskyla, Seminaarinkatu 15, 40014 Jyväskylän yliopisto, Finland, e-mail: lauri.frank@jyu.fi. Kerttuli Koivisto, University of Jyvaskyla, Seminaarinkatu 15, 40014 Jyväskylän yliopisto, Finland, e-mail: kerttuli.koivisto@jyu.fi. https://doi.org/10.18690/978-961-286-043-1.28 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 404 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Makkonen, L. F. & K. Koivisto: Age Differences in Technology Readiness and Its Effects on Information System Acceptance and Use: The Case of Online Electricity Services in Finland Introduction In several prior studies (e.g., Lin, Shih & Sher, 2007; Walczuch, Lemmink & Streukens, 2007; Lin & Chang, 2011; Godoe & Johansen, 2012), technology readiness (TR) has been found to significantly influence the acceptance and use of information systems (IS). Typically, individuals who rank higher in terms of TR have been found to be more apt adopters of IS in contrast to those whose ranking is lower. However, in spite of this central role, TR has gained relatively little attention in IS research. For example, little is known about how TR varies in terms of different demographic variables and how these demographic variables moderate the effects of TR on IS acceptance and use as well as its main antecedents. In this study, we aim to address this gap in prior research by examining the aforementioned issues in the case of one highly important demographic variable: age. Age is a demographic variable that has been of high interest in several prior studies on IS acceptance and use. For example, in the well-known and widely used unified theory of acceptance and use of technology (UTAUT) by Venkatesh et al. (2003) as well as its extension UTAUT2 by Venkatesh, Thong, and Xu (2012), age is hypothesised to act as an important moderator for the effects of various antecedent constructs on IS acceptance and use. However, no studies that we are aware of have examined age as a moderator for the effects of TR on IS acceptance and use as well as its main antecedents. We conduct our examination in the case context of online electricity services offered by electric suppliers, which allow their customers, for example, to manage their electricity contracts and track their electricity consumption over the Internet. Such services have become increasingly common in the recent years and offer an ideal case context for the current study because they are often used by individuals with a widely varying age range. The only main exceptions are typically the very youngest and the very oldest individuals, who either still live at their childhood home or live in some sort of communal accommodation, such as a student apartment or a retirement home. As a theoretical framework for conceptualising and operationalising IS acceptance and use, its main antecedents, as well as TR, we utilise the technology acceptance model (TAM) by Davis (1989) and the technology readiness index (TRI) by Parasuraman (2000), which have also been integrated together in several prior studies (e.g., Lin, Shih & Sher, 2007; Walczuch, Lemmink & Streukens, 2007; Lin & Chang, 2011; Godoe & Johansen, 2012). This paper is structured as follows. After this brief introductory section, the theoretical foundation of the paper is discussed in Section 2. After this, the methodology and results of the study are reported in Sections 3 and 4. The results are discussed in more detail in Section 5, concentrating especially on the implications for the so-called “young elderly” segment consisting of individuals aged 60–75 years. Finally, Section 6 considers the limitations of the study and some potential paths of future research. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 405 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Makkonen, L. F. & K. Koivisto: Age Differences in Technology Readiness and Its Effects on Information System Acceptance and Use: The Case of Online Electricity Services in Finland Theoretical Foundation TAM by Davis (1989) is an adaptation of the theory of reasoned action (TRA) by Fishbein and Azjen (1975, 1980) to the IS context, which posits that the acceptance and use of a particular system can be best predicted by the use intention towards it. Use intention, in turn, is hypothesised to be predicted by two main antecedents associated with the perceived system characteristics: perceived usefulness (PU), which has traditionally been defined as “the degree to which a person believes that using a particular system would enhance his or her job performance”, and perceived ease of use (PEOU), which has traditionally been defined as “the degree to which a person believes that using a particular system would be free of effort” (Davis, Bagozzi & Warshaw, 1989). The more useful and easier to use a particular system is perceived to be, the higher should be the intention to use it. In addition, perceived ease of use is hypothesised to act as a predictor of perceived usefulness, so that systems that are perceived as easier to use should also be perceived as more useful. These hypotheses are illustrated in Figure 1. Perceived Usefulness Actual use Use Intention Perceived Ease of Use Figure 1: Technology acceptance model (TAM) Although TAM was originally developed to explain and predict IS acceptance and use only in the organisational context, it has since been applied also outside it. To promote its applicability to other contexts, numerous extensions to the original TAM have been suggested, such as TAM2 (Venkatesh & Davis, 2000) and TAM3 (Venkatesh & Bala, 2008) as well as the aforementioned UTAUT (Venkatesh et al., 2003) and UTAUT2 (Venkatesh, Thong & Xu, 2012). In this study, we utilise only the original TAM as our 406 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Makkonen, L. F. & K. Koivisto: Age Differences in Technology Readiness and Its Effects on Information System Acceptance and Use: The Case of Online Electricity Services in Finland theoretical framework for conceptualising and operationalising IS acceptance and use as well as its main antecedents because we consider it highly applicable to our current case context of online electricity services, which can be characterised as utilitarian self-service technologies. Thus, their use intention is likely to be influenced mostly by the usefulness and ease of use aspects included in the original TAM rather than, for example, the more hedonic, social, and resource related aspects added to it in extensions like UTAUT and UTAUT2. However, like many prior IS studies, we omit the empirical examination of the linkage between use intention and actual use because this would have required a longitudinal rather than a cross-sectional study setting, which was not possible due to practical reasons. As a theoretical framework for TR, we utilise TRI by Parasuraman (2000), which defines TR as “people’s propensity to embrace and use new technologies to accomplish goals in home life and at work” and postulates it to comprise of four co-existing dimensions defined as follows (Parasuraman & Colby, 2015):  Optimism: “a positive view of technology and a belief that it offers people increased control, flexibility, and efficiency in their lives”  Innovativeness: “a tendency to be a technology pioneer and thought leader”  Discomfort: “a perceived lack of control over technology and a feeling of being overwhelmed by it”  Insecurity: “distrust of technology, stemming from scepticism about its ability to work properly and concerns about its potential harmful consequences” Of these four dimensions, optimism and innovativeness are hypothesised to increase TR, whereas discomfort and insecurity are hypothesised to decrease it. TAM and TRI have also been integrated together in several prior studies. For example, in their technology readiness and acceptance model (TRAM), Lin, Shih, and Sher (2007) examined the effects of the aggregate TRI construct on TAM constructs, whereas the studies by Walczuch, Lemmink, and Streukens (2007) as well as Godoe and Johansen (2012) concentrated on effects of the four composite TRI constructs, hypothesising optimism and innovativeness to have a positive effect on PU and PEOU and discomfort and insecurity to have a negative effect on them. In this study, we follow this latter approach by examining the individual effects of the four composite TRI constructs on not only PU and PEOU, but also use intention because in the study by Lin and Chang (2011), TR has been found to affect use intention not only indirectly through PU and PEOU, but also directly. This research model is illustrated in Figure 2. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 407 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Makkonen, L. F. & K. Koivisto: Age Differences in Technology Readiness and Its Effects on Information System Acceptance and Use: The Case of Online Electricity Services in Finland Figure 2: Research model of the study (TAM + TRI) Methodology To examine the potential age differences in TR and its effects on IS acceptance and use, we conducted a self-administered online survey targeted at Finnish consumers between December 2015 and January 2016. Due to the case context of the study, the survey was promoted via the online channels of two electric suppliers (e.g., websites, newsletters, and social media) as well as via the internal communication channels of our university and several discussion forums. To raise the response rate, also several gift cards with a total worth of 356 € were raffled among the respondents. In the survey questionnaire, the 9 items measuring the three TAM constructs of perceived usefulness, perceived ease of use, and use intention were adapted from Davis (1989) as well as Davis, Bagozzi, and Warshaw (1989), whereas the 16 items measuring the four TRI constructs of optimism, innovativeness, discomfort, and insecurity were adapted from the TRI 2.0 scale by Parasuraman and Colby (2015). The exact wording of each item, translated from Finnish to English, is presented in Appendix A. All the items were measured on a five-point Likert scale ranging from 1 (strongly disagree) to 5 (strongly 408 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Makkonen, L. F. & K. Koivisto: Age Differences in Technology Readiness and Its Effects on Information System Acceptance and Use: The Case of Online Electricity Services in Finland agree). The respondents were also able to skip individual items, which resulted in a missing value. The collected data was analysed by using the IBM SPSS Statistics version 24 and the Mplus version 7.11 software. SPSS was mainly used for data preparation and preliminary analysis, whereas Mplus was used for the structural equation modelling (SEM). More information about Mplus can be found in its user’s guide and technical appendices (Muthén & Muthén, 2017). As the model estimator, we used the MLR option of Mplus, which stands for maximum likelihood estimator robust to non-normal data. The missing values in the construct indicators were handled by using the FIML option of Mplus, which stands for full information maximum likelihood and uses all the available data in the model estimation. The potential age differences in the construct means and regression relationships were examined by dividing the sample into three age groups with an approximately equal age range and using multiple group analysis (MGA). Results The conducted online survey was completed by a total of 1,370 respondents. However, to promote the quality of data, 194 of them were excluded from the final sample in two phases. First, we excluded 124 respondents who had not reported being customers of any electric supplier and, thus, were not likely to be able to give reliable assessments on the online electricity services offered by the companies to their customers. Second, we also excluded an additional 70 respondents who had reported missing values in all the items measuring the three TAM constructs. This resulted in a final sample size of 1,176 respondents to be used in the model estimations. Descriptive statistics of this sample are reported in Table 1. All in all, the gender and age distributions of the sample corresponded quite well with those of the adult Finnish population at the end of 2015, which are reported in the final column of Table 1 (Statistics Finland, 2017). The main deviations were the underrepresentation of the age group of under 40 years and the overrepresentation of the age group of 40–59 years. The age of the respondents ranged from 18 to 83 years, with the mean age being 50.4 years (SD = 15.5 years). 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 409 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Makkonen, L. F. & K. Koivisto: Age Differences in Technology Readiness and Its Effects on Information System Acceptance and Use: The Case of Online Electricity Services in Finland Table 1: Sample statistics Sample (N = 1,176) Finland N % % Gender Male 631 53.7 49.2 Female 545 46.3 50.8 Age 18–39 years 308 26.2 34.2 40–59 years 472 40.1 32.0 60– years 396 33.7 33.9 Monthly net income 0–999 € 213 18.1 1000–1999 € 351 29.8 2000–2999 € 343 29.2 3000– € 180 15.3 No response 89 7.6 Socioeconomic status Employed 532 45.2 Unemployed 97 8.2 Student 155 13.2 Pensioner 332 28.2 Other 60 5.1 In the next four sub-sections, we first assess the reliability and validity of the 25 construct indicators and the seven constructs included in the research model: use intention (INT), perceived usefulness (PU), perceived ease of use (PEOU), optimism (OPT), innovativeness (INN), discomfort (DIS), and insecurity (INS). These assessments are based on a model that contains all the aforementioned constructs but does not yet contain any regression relationships between them. This is followed by the estimation of the actual research model and the examination of the potential age differences in the construct means and regression relationships. 4.1 Indicator Reliability and Validity Indicator reliabilities and validities were evaluated by using the standardised loadings and residuals of the indicators, which are reported in Appendix B. In the typical case where each indicator loads on only one construct, it is commonly expected that the standardised loading (λ) of each indicator should be statistically significant and greater than or equal to 0.707 (Fornell & Larcker, 1981). This is equal to the standardised residual (1 – λ2) of each indicator being less than or equal to 0.5, meaning that at least half of the variance of each indicator is explained by the construct on which it loads. As can be seen, the two indicators that were furthest from meeting this criterion were DIS1 and INS4, which both had a standardised loading of less than 0.5. Thus, after assessing that there 410 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Makkonen, L. F. & K. Koivisto: Age Differences in Technology Readiness and Its Effects on Information System Acceptance and Use: The Case of Online Electricity Services in Finland would be no adverse effects on the content validity of the two constructs that they were measuring, we decided to eliminate them and to re-estimate the model. In the re-estimated model, all the indicators now met the criterion or at least were very close to meeting it (DIS4 was furthest away with a standardised loading of 0.672), meaning that the re- estimated model could be considered to exhibit satisfactory indicator reliability and validity. 4.2 Construct Reliability and Validity Construct reliabilities were evaluated by using the composite reliabilities (CR – Fornell & Larcker, 1981) of the constructs, with which it is commonly expected that each construct should have a CR greater than or equal to 0.7 in order for it to exhibit satisfactory reliability (Nunnally & Bernstein, 1994). The CR of each construct is reported in the first column of Table 2. As can be seen, all the constructs met this criterion. In turn, construct validities were evaluated by examining the convergent and discriminant validity of the constructs, which were evaluated by using the two criteria proposed by Fornell and Larcker (1981). They are both based on the average variance extracted (AVE) of the constructs, which refers to the average proportion of variance that a construct explains in its indicators. In order to exhibit satisfactory convergent validity, the first criterion requires that each construct should have an AVE greater than or equal to 0.5, meaning that, on average, each construct should explain at least half of the variance in its indicators. The AVE of each construct is reported in the second column of Table 2. As can be seen, all the constructs except for DIS and INS met this criterion. However, they Table 2: CRs, AVEs, square roots of AVEs (bolded), and correlations of the constructs CR AVE INT PU PEOU OPT INN DIS INS INT 0.951 0.866 0.931 PU 0.881 0.712 0.722 0.844 PEOU 0.894 0.738 0.594 0.869 0.859 OPT 0.835 0.558 0.384 0.532 0.471 0.747 INN 0.828 0.546 0.328 0.309 0.375 0.588 0.739 DIS 0.730 0.475 -0.126 -0.289 -0.399 -0.398 -0.415 0.689 INS 0.739 0.486 -0.151 -0.182 -0.202 -0.459 -0.420 0.637 0.697 In order to exhibit satisfactory discriminant validity, the second criterion requires that each construct should have a square root of AVE greater than or equal to its absolute correlation with the other constructs. This means that, on average, each construct should share at least an equal proportion of variance with its indicators than it shares with the other constructs. The square root of AVE of each construct (on-diagonal cells) and the correlations between the constructs (off-diagonal cells) are reported in the remaining columns of Table 2. As can be seen, all the constructs met this criterion, with the exception of PU and PEOU, which correlated very strongly with each other. However, 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 411 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Makkonen, L. F. & K. Koivisto: Age Differences in Technology Readiness and Its Effects on Information System Acceptance and Use: The Case of Online Electricity Services in Finland this correlation was expected due to the hypothesised effect of PEOU on PU in TAM and, thus, does not warrant the elimination of either of the constructs. 4.3 Estimation Results Figure 3 presents the standardised estimation results of the research model, which was able to explain 56.4 % of the variance in INT, 79.3 % of the variance in PU, and 31.2 % of the variance in PEOU. The effects between the three TAM constructs followed the hypotheses of TAM, with the exception that PEOU was actually found to have a negative, although a very weak and statistically not significant, effect on INT. In contrast, the effect of PEOU on PU as well as the effect of PU on INT were both found as positive and statistically significant. This also caused the total effect of PEOU on INT, which takes into account both the direct and indirect effects (-0.139 + 0.838 x 0.870 = 0.590), to be positive and statistically significant. Figure 3: Estimation results of the research model (standardised) Of the four TRI constructs, the first construct OPT was found to have positive effects on both PU and PEOU, but surprisingly a negative effect on INT, causing the total effect of 412 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Makkonen, L. F. & K. Koivisto: Age Differences in Technology Readiness and Its Effects on Information System Acceptance and Use: The Case of Online Electricity Services in Finland OPT on INT to be 0.316. All these effects were statistically significant. The second TRI construct INN was found to have positive effects on INT and PEOU, but surprisingly a negative effect on PU, causing the total effect of INN on INT to be 0.179. In this case as well, all these effects were statistically significant. The third TRI construct DIS was found to have a negative effect on PEOU, but surprisingly positive effects on both INT and PU. Although these two latter effects were weaker than the former one, they were all statistically significant. However, they caused the total effect of DIS on INT to be only 0.051, which was statistically not significant. Finally, the fourth TRI construct INS was found to have negative effects on both INT and PU, but surprisingly a positive effect on PEOU, which was the only one of these effects that was statistically significant. However, the total effect of INS on INT was only 0.036, which was statistically not significant. The goodness-of-fit statistics of the model are reported in the top-right corner of Figure 3. As can be seen, the χ2 test of model fit rejected the null hypothesis of the model fitting the data. However, instead of actual misfit, this may have been caused by the tendency of the test to underestimate the fit especially in the case of large samples and more complex models (Bentler & Bonett, 1980). For this reason, also four alternative fit indices were used to evaluate the fit: the comparative fit index (CFI), the Tucker-Lewis index (TLI), the root mean square error of approximation (RMSEA), and the standardised root mean square residual (SRMR). Their values clearly fulfilled the commonly accepted cut- off criteria (CFI ≥ 0.95, TLI ≥ 0.95, RMSEA ≤ 0.06, and SRMR ≤ 0.08 – Hu & Bentler, 1999), meaning that the model could be considered to exhibit a good fit with the data. 4.4 Age Differences in Construct Means and Regression Relationships In order to examine the potential age differences in the construct means and regression relationships, we first divided the sample into the age groups of under 40 years, 40–59 years, and 60 years or over and then tested whether a sufficient level of measurement invariance existed across the groups to allow meaningful comparisons between them. At the minimum, the comparison of the regression coefficients requires the existence of configural and metric invariance, whereas the comparison of the construct means requires the existence of configural, metric, and scalar invariance (Steenkamp & Baumgartner, 1998). The testing followed the method formalised by Steenkamp and Baumgartner (1998), in which increasingly strict constraints on parameter equality are added across the groups and the fit of the resulting constrained model is compared to the fit of the unconstrained model. As the main test criterion, we used the χ2 test of difference, corrected with the Satorra-Bentler (2001) scaling correction factor (SCF) due to the use of the MLR estimator. However, because the χ2 test of difference suffers from a similar sensitivity to sample size and model complexity as the χ2 test of model fit, also the changes in the four aforementioned fit indices were considered as suggested by Steenkamp and Baumgartner (1998). The results of the tests are reported in Table 3. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 413 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Makkonen, L. F. & K. Koivisto: Age Differences in Technology Readiness and Its Effects on Information System Acceptance and Use: The Case of Online Electricity Services in Finland Table 3: Tests of measurement invariance and path invariance Model CFI TLI RMSEA SRMR χ2 df SCF Δχ2 Δdf p Full configural 0.979 0.975 0.032 0.040 871.605 627 1.1463 – – – invariance Full metric 0.978 0.975 0.031 0.045 914.525 659 1.1444 42.862 32 0.095 invariance Full scalar < 0.966 0.962 0.038 0.051 1089.681 691 1.1378 192.894 32 invariance 0.001 Partial scalar inv. < 0.970 0.967 0.036 0.048 1038.741 690 1.1379 135.439 31 (INN3 in –39 years) 0.001 Partial scalar inv. < 0.974 0.972 0.033 0.048 989.832 689 1.1383 79.800 30 (INN1 in –39 years) 0.001 Partial scalar inv. < (INN4 in 40–59 0.975 0.972 0.033 0.047 978.096 688 1.1384 66.745 29 0.001 years) Partial scalar inv. (INN2 in 40–59 0.977 0.974 0.032 0.047 957.562 687 1.1388 43.584 28 0.031 years) Partial scalar inv. 0.978 0.975 0.031 0.046 947.172 686 1.1390 32.016 27 0.231 (DIS2 in –39 years) Full path invariance 0.977 0.975 0.031 0.056 985.110 716 1.1398 37.993 30 0.150 First, configural invariance was tested by estimating the model separately for each group while constraining only the simple structure of the model to be equal across the groups. As can be seen, the fit of this full configural invariance model remained approximately as good as the fit of the model without the group separation. Thus, the hypothesis on full configural invariance was accepted. Second, metric invariance was tested by constraining also the indicator loadings equal across the groups and comparing the fit of this full metric invariance model to the fit of the previous full configural invariance model. As can be seen, the χ2 test suggested no statistically significant deterioration in the model fit (Δχ2(32) = 42.862, p = 0.095), which was supported by the four fit indices as well (ΔCFI =-0.001, ΔTLI = 0.000, ΔRMSEA = -0.001, ΔSRMR = 0.005). Thus, also the hypothesis on full metric invariance was accepted. Third, full scalar invariance was tested by constraining also the indicator intercepts equal across the groups and comparing the fit of this full scalar invariance model to the fit of the previous full metric invariance model. As can be seen, in this case, the χ2 test suggested a statistically significant deterioration in the model fit (Δχ2(32) = 192.894, p < 0.001), which was supported by the four fit indices as well (ΔCFI = -0.012, ΔTLI = - 0.013, ΔRMSEA = 0.007, ΔSRMR = 0.006). Thus, the hypothesis on full scalar invariance was rejected. As a result of this, we tested for partial scalar invariance by relaxing the added constraints concerning the equality of indicator intercepts one by one based on the highest modification indices of the model and comparing the fit of these 414 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Makkonen, L. F. & K. Koivisto: Age Differences in Technology Readiness and Its Effects on Information System Acceptance and Use: The Case of Online Electricity Services in Finland partial scalar invariance models to the fit of the full metric invariance model. After relaxing the constrains concerning the equality of the intercepts of INN1, INN3, and DIS2 in the age group of under 40 years as well as the intercepts of INN2 and INN4 in the age group of 40–59 years, the χ2 test did not anymore suggest a statistically significant deterioration in the model fit (Δχ2(27) = 32.016, p = 0.231), which was supported by the four fit indices as well (ΔCFI = 0.000, ΔTLI = 0.000, ΔRMSEA = 0.000, ΔSRMR = 0.001). Thus, the hypothesis on partial scalar invariance, with the indicator intercepts of INN1, INN3, and DIS2 in the age group of under 40 years as well as the indicator intercepts of INN2 and INN4 in the age group of 40–59 years varying across the groups, was accepted. Because the meaningful comparison of construct means requires at least one indicator besides the marker indicator of a construct (INN1 in the case of INN and DIS3 in the case of DIS) to have invariant indicator loadings and intercepts across the groups (Steenkamp & Baumgartner, 1998), this partial scalar invariance prevents the comparisons of the construct mean of INN between the age groups of under 40 years and 40–59 years as well as the age groups of under 40 years and 60 years or over, but still makes them possible between the age groups of 40–59 years and 60 years or over. Meaningful comparisons of the construct mean of DIS across all the age groups are also possible. The results of the comparisons of the construct means are reported in Table 4. The first and the second columns list the differences in the construct means of the age groups of 40–59 years and 60 years or over in comparison to the age group of under 40 years as well as their statistical significance, whereas the third column lists the differences in the construct means of the age group of 60 years or over in comparison to the age group of 40–59 years as well as their statistical significance. All the reported differences are unstandardised in order to ease their interpretation. As can be seen, of the four TRI constructs, statistically significant differences were found in case of all the constructs except for INS. The age groups of 40–59 years and 60 years or over were found to score lower in terms of OPT in comparison to the age group of under 40 years, but having no statistically significant difference between each other. In contrast, the age group of 60 years or over was found to score lower in terms of INN in comparison to the age group of 40–59 years. Both of these age groups also seemed to have higher scores in comparison to the age group of under 40 years but, as mentioned above, these comparisons cannot be meaningfully conducted because of the lack of sufficient measurement invariance. Finally, the score of DIS seemed to rise with age both between the age groups of under 40 years and 40–59 years and the age groups of 40–59 years and 60 years or over. A similar difference was found also in the construct mean of INT, although the differences in the construct means of this construct as well as PU and PEOU were not the main interest of this study. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 415 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Makkonen, L. F. & K. Koivisto: Age Differences in Technology Readiness and Its Effects on Information System Acceptance and Use: The Case of Online Electricity Services in Finland Table 4: Comparisons of construct means (unstandardised) 40–59 years 60– years vs. 60– years vs. vs. –39 years –39 years 40–59 years INT 0.239** 0.441*** 0.202** PU -0.083 0.023 0.106 PEOU -0.068 -0.058 0.010 OPT -0.167** -0.117* 0.049 INN 0.490*** 0.278** -0.212** DIS 0.581*** 0.807*** 0.226*** INS -0.050 -0.081 -0.030 Finally, we tested for the invariance of the regression relationships by constraining also the regression coefficients equal across the groups and comparing the fit of this full path invariance model to the fit of the previous partial scalar invariance model. As can be seen from Table 3, the χ2 test suggested no statistically significant deterioration in the model fit (Δχ2(30) = 37.993, p = 0.150), which was supported by the four fit indices as well (ΔCFI = -0.001, ΔTLI = 0.000, ΔRMSEA = 0.000, ΔSRMR = 0.010), although there was a significant increase in the value of SRMR. Thus, the hypothesis on full path invariance was accepted, meaning that there were no statistically significant differences in the effects of the TRI constructs on the TAM constructs or on the effects of PU and PEOU on INT as well as PEOU on PU across the groups. Discussion and Conclusions In summary, the findings of this study on the potential age differences in TR and its effects on IS acceptance and use suggest several differences in the TRI constructs of optimism, innovation, and discomfort, but no differences in the effects of any of the TRI constructs on the TAM constructs of PU, PEOU, and INT. All in all, the effects of the TRI constructs on the TAM constructs were found to be in line with those found in prior studies (e.g., Walczuch, Lemmink & Streukens, 2007; Godoe & Johansen, 2012), which have also suggested optimism and innovation having the strongest effects on PU and PEOU, whereas the effects of discomfort and insecurity have typically been weaker and often statistically not significant. From a theoretical perspective, the findings of the study promote the understanding on the effects of TR on IS acceptance and use by considering also the vital role of various demographic variables like age. This promoted understanding can be utilised, for example, to better explain and predict the potential differences in the antecedents of IS acceptance and use as well as in IS acceptance and use itself between various user segments. Respectively, from a practical perspective, the findings of the study can be utilised by IS developers and marketers to promote the acceptance and use of the newly introduced systems and services especially in user segments that have traditionally been found more challenging in terms of IS adoption. 416 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Makkonen, L. F. & K. Koivisto: Age Differences in Technology Readiness and Its Effects on Information System Acceptance and Use: The Case of Online Electricity Services in Finland One example of such a segment is the so-called “young elderly” segment, which consists of individuals aged 60–75 years and has often been overlooked, for example, in the development and marketing of digital services in spite of its vast market potential (Carlsson & Walden, 2015; Carlsson & Carlsson, 2016). This segment can be considered as practically equivalent to the age group of 60 years or over in this study because, although this age group contained also individuals that were older than 75 years, about 95 % of the individuals in it were aged 75 years or younger. Thus, if we use the age group of 60 years or over as its proxy, the findings of the study suggest that the young elderly segment is characterised by a slightly lower level of technology optimism in comparison to the individuals aged under 40 years and also a considerably higher level of technology discomfort, especially in comparison to the individuals aged under 40 years but also in comparison to individuals aged 40–59 years. In addition, the young elderly segment seems to be characterised by a lower level technology innovativeness in comparison to individuals aged 40–59 years. Thus, in spite of being on par with the younger individuals in terms of technology insecurity, this all suggests that individuals in the young elderly segment have a somewhat lower level of TR in comparison to younger individuals, which should be taken into account if one wants to maximise the acceptance and use of the newly introduced systems and services in this user segment. Of the aforementioned differences, the most important ones are obviously the differences concerning technology optimism and innovation because these two TRI constructs were the ones that were found having a statistically significant total effect on the intention to use IS when considering both the direct and indirect effects on it. Consequently, when developing and marketing new systems and services to the young elderly segment, special attention should be paid to making them as easily approachable as possible for also people who are typically not at the forefront of adopting new technological innovations as well as to highlighting the benefits that the usage of these new systems and services can bring to their everyday lives. The strategies that aim at doing this may include, for example, marketing and advertising campaigns as well as various technological solutions, such as the usage of tutorials, which lower the threshold to trial the systems and services and make their overall learning curve less steep. The implementation of such strategies is likely to result in two synergetic advantages. First, in the short term, they are likely advance the adoption of the systems and services amongst the users in the young elderly segment with a lower level of TR. Second, in the long term, through this adoption, they are also likely to advance the level of TR in the whole young elderly segment, especially if the use experiences of the adopted systems and services are positive and they are able to fulfil the user expectations towards them. Limitations and Future Research This study can be seen to have three main limitations. First, the study was conducted by analysing the survey data collected from only Finnish consumers, which obviously limits the generalisability of its findings to other countries and cultures. Second, the study was conducted in the case context of online electricity services, which poses limitations on 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 417 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Makkonen, L. F. & K. Koivisto: Age Differences in Technology Readiness and Its Effects on Information System Acceptance and Use: The Case of Online Electricity Services in Finland the generalisability of its findings concerning the effects of the TRI constructs on the TAM constructs, but not on the generalisability of its findings concerning the mean differences in the TRI constructs themselves, since their measurement was conducted independently of the case context in question. Finally, the third main limitation of the study stems from the selection of TAM as the theoretical framework for conceptualising and operationalising IS acceptance and use as well as its main antecedents, which obviously omits the antecedents that have been added to the original TAM in its subsequent extensions, such as UTAUT (Venkatesh et al., 2003) and UTAUT2 (Venkatesh, Thong & Xu, 2012). However, as already stated in Section 2, we consider this selection well-justified because of the utilitarian case context of the current study. Future studies should aim to address the aforementioned limitations by replicating the study also in other countries and cultures as well as in the case context of other types of IS. The selection of the case context should also be reflected in the selection of the theoretical framework for conceptualising and operationalising IS acceptance and use as well as its main antecedents. In addition to age, we also encourage future studies to concentrate on examining the potential differences in terms of other interesting and important demographic variables, such as gender and income. Appendix A: Indicator Wordings INT1 I intend to use the e-services in the following year. INT2 I plan to use the e-services in the following year. INT3 It is likely that I will use the e-services in the following year. PU1 Using the e-services to manage my electricity affairs would be convenient. PU2 Using the e-services would make it easier for me to manage my electricity affairs. PU3 I would find the e-services useful in managing my electricity affairs. PEOU1 I would find the e-services easy to use. PEOU2 My interaction with the e-services would be clear and understandable. PEOU3 Learning to use the e-services would be easy for me. OPT1 New technologies contribute to a better quality of life. OPT2 Technology gives me more freedom of mobility. OPT3 Technology gives people more control over their daily lives. OPT4 Technology makes me more productive in my personal life. INN1 Other people come to me for advice on new technologies. INN2 In general, I am among the first in my circle of friends to acquire new technology when it appears. INN3 I can usually figure out new high-tech products and services without help from others. INN4 I keep up with the latest technological developments in my areas of interest. DIS1 When I get technical support from a provider of a high-tech product or service, I sometimes feel as if I am being taken advantage of by someone who knows more than I do. DIS2 Technical support lines are not helpful because they do not explain things in terms I understand. DIS3 Sometimes, I think that technology systems are not designed for use by ordinary people. 418 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Makkonen, L. F. & K. Koivisto: Age Differences in Technology Readiness and Its Effects on Information System Acceptance and Use: The Case of Online Electricity Services in Finland DIS4 There is no such thing as a manual for a high-tech product or service that is written in plain language. INS1 People are too dependent on technology to do things for them. INS2 Too much technology distracts people to a point that is harmful. INS3 Technology lowers the quality of relationships by reducing personal interaction. INS4 I do not feel confident doing business with a place that can only be reached online. Note: The indicators of OPT, INN, DIS, and INS comprise the TRI 2.0 scale, which is copyrighted by A. Parasuraman and Rockbridge Associates, Inc., 2014. It may be duplicated only with a written permission from the authors. Appendix B: Indicator Loadings and Residuals References Ajzen, I., & Fishbein, M. (1980). Understanding Attitudes and Predicting Social Behavior. Englewood Cliffs, NJ: Prentice-Hall. Bentler, P. M., & Bonett, D. G. (1980). Significance Tests and Goodness of Fit in the Analysis of Covariance Structures. Psychological Bulletin, 88(3), 588–606. doi:10.1037/0033- 2909.88.3.588 Carlsson, C., & Walden, P. (2015). Digital Wellness for Young Elderly: Research Methodology and Technology Adaptation. In Proceedings of the 28th Bled eConference, June 7–10, 2015 (pp. 239–250). Kranj, Slovenia: Moderna Organizacija. Carlsson, C., & Carlsson, J. P. (2016). Interview to Form Wellness Routines Among Young Elderly. In Proceedings of the 29th Bled eConference, June 19–22, 2016 (pp. 406–418). Kranj, Slovenia: Moderna Organizacija. Davis, F. D. (1989). Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly, 13(3), 319–340. doi:10.2307/249008 Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User Acceptance of Computer Technology: A Comparison of Two Theoretical Models. Management Science, 35(8), 982–1003. doi:10.2307/2632151 Fishbein, M., & Ajzen, I. (1975). Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research. Reading, MA: Addison-Wesley. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 419 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Makkonen, L. F. & K. Koivisto: Age Differences in Technology Readiness and Its Effects on Information System Acceptance and Use: The Case of Online Electricity Services in Finland Fornell, C., & Larcker, D. F. (1981). Evaluating Structural Equation Models with Unobservable Variables and Measurement Error. Journal of Marketing Research, 18(1), 39–50. doi:10.2307/3151312 Godoe, P., & Johansen, T. S. (2012). Understanding Adoption of New Technologies: Technology Readiness and Technology Acceptance as an Integrated Concept. Journal of European Psychology Students, 3(1), 38–52. doi:10.5334/jeps.aq Hu, L.-T., & Bentler, P. M. (1999). Cutoff Criteria for Fit Indexes in Covariance Structure Analysis: Conventional Criteria Versus New Alternatives. Structural Equation Modeling, 6(1), 1–55. doi:10.1080/10705519909540118 Lin, J.-S. C., & Chang, H.-C. (2011). The Role of Technology Readiness in Self-Service Technology Acceptance. Managing Service Quality: An International Journal, (21)4, 424–444. doi:10.1108/09604521111146289 Lin, C.-H., Shih, H.-Y., & Sher, P. J. (2007). Integrating Technology Readiness into Technology Acceptance: The TRAM model. Psychology & Marketing, 24(7), 641–657. doi:10.1002/mar.20177 Muthén, L. K., & Muthén, B. O. (2017). Mplus Home Page. Retrieved from http://www. statmodel.com Nunnally, J. C., & Bernstein, I. H. (1994). Psychometric Theory (3rd ed.). New York, NY: McGraw-Hill. Parasuraman, A. (2000). Technology Readiness Index (TRI): A Multiple-Item Scale to Measure Readiness to Embrace New Technologies. Journal of Service Research, 2(4), 307–320. doi:10.1177/109467050024001 Parasuraman, A., & Colby, C. L. (2015). An Updated and Streamlined Technology Readiness Index: TRI 2.0. Journal of Service Research, 18(1), 59–74. doi:10.1177/ 1094670514539730 Satorra, A., & Bentler, P. M. (2001). A Scaled Difference Chi-Square Test Statistic for Moment Structure Analysis. Psychometrika, 66(4), 507–514. doi:10.1007/ BF02296192 Statistics Finland (2017). Statistics Finland. Retrieved from http://www.stat.fi Steenkamp, J.-B. E. M. & Baumgartner, H. (1998). Assessing Measurement Invariance in Cross- National Consumer Research. Journal of Consumer Research, 25(1), 78–90. doi:10.1086/209528 Venkatesh, V., & Bala, H. (2008). Technology Acceptance Model 3 and a Research Agenda on Interventions. Decision Sciences, 39(2), 273–315. doi:10.1111/j.1540-5915.2008.00192.x Venkatesh, V., & Davis, F. D. (2000). A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies. Management Science, 46(2), 186–204. doi:10.1287/mnsc.46.2.186.11926 Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User Acceptance of Information Technology: Toward a Unified View. MIS Quarterly, 27(3), 425–478. Venkatesh, V., Thong, J. Y. L., & Xu, X. (2012). Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology. MIS Quarterly, 36(1), 157–178. Walczuch, R., Lemmink, J., & Streukens, S. (2007). The Effect of Service Employees’ Technology Readiness on Technology Acceptance. Information & Management, 44(2), 206–215. doi:10.1016/j.im.2006.12.005 420 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Local Online Platforms – Surviving in a Global Market 29 ANTON MANFREDA, PETER TRKMAN, ALEŠ GROZNIK & JURE ERJAVEC Abstract Many companies are trying to change their existing business models and start with the digital initiative. Online business will continue to grow; however, in the digital world where almost every organization is present online, the critical success factors for surviving on the market are more than needed. The purpose of the research is thus to study the factors influencing the success/failure of local online platforms’ providers in competition with global providers. The fact that some local providers are even market leaders in a local environment while many others have failed implies that there exist some specific factors determining the success of global competitor in a local market. The study will present a valuable opportunity particularly for new companies or existing companies that are deciding about launching new online services in order to judge whether there is a potential for their service on the market and which factors they should consider before starting the competition with global market leaders. Keywords: • Glocalization • Local online platforms • Global online platforms • Digitalization • Research program • CORRESPONDENCE ADDRESS: Anton Manfreda, University of Ljubljana, Faculty of Economics, Kardeljeva ploščad 17, 1000 Ljubljana, Slovenia, e-mail: anton.manfreda@ef.uni-lj.si. Peter Trkman, University of Ljubljana, Faculty of Economics, Kardeljeva ploščad 17, 1000 Ljubljana, Slovenia, e-mail: peter.trkman@ef.uni-lj.si. Aleš Groznik, University of Ljubljana, Faculty of Economics, Kardeljeva ploščad 17, 1000 Ljubljana, Slovenia, e-mail: ales.groznik@ef.uni-lj.si. Jure Erjavec, University of Ljubljana, Faculty of Economics, Kardeljeva ploščad 17, 1000 Ljubljana, Slovenia, e-mail: jure.erjavec@ef.uni-lj.si. https://doi.org/10.18690/978-961-286-043-1.29 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 422 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Manfreda, P. Trkman, A. Groznik & J. Erjavec: Local Online Platforms – Surviving in a Global Market Introduction Internet with its promise for lowering the cost, potential for increasing the quality of services and efficiency enabled a rapid development for e-business. Nevertheless, the possibility that anyone can have a web page with almost no investment has presented a huge opportunity for creating and advertising business online. The promise of reaching a global market no matter neither the size nor location of the organization seems to raise the hope of many companies. Therefore, in the last few decades almost every company has been trying to leave some presence in the World Wide Web. Mostly due to the promise of “no matter how small you are there is a whole world for you”. The globalization of markets was believed to supplant the multinational commercial and corporations. The future was in offering the same things in the same way everywhere since the global corporations should operate as if the whole world is a single entity (Levitt, 1993). Technological progress made this future even more real. Nowadays, e- commerce is having a larger share of commerce in more and more regions (Barns, 2016). Yet, the promise of internet and the possibility to reach the whole world was not equally successful for all. In the digital era there are again some global organizations dominating the world, while contrary there are several market leaders in local markets that are completely unknown outside their local region. The same applies to the providers of different online platforms offering vouchers, tourism services, auctions and web browsers or social media as well. Despite having global online platform providers like Groupon, Airbnb, e-bay, Google, and Facebook, there are several local online providers in different regions more than successfully facing with the global well known competitors within their regional borders. The purpose of the research is thus to examine the factors that influence the success of local online platforms. The aim is to identify the reasons why some local online platform providers that have been market leaders failed, while other local providers remained successful or even a market leader in a local environment despite the existence of global well-known providers. This research-in-progress paper will present a research program together with the methodological steps that will be performed in our research. Therefore, the paper is divided into two main parts. Firstly, a short literature review is presented followed by the methodology and a research plan. Finally, some concluding remarks and future research possibilities are outlined. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 423 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Manfreda, P. Trkman, A. Groznik & J. Erjavec: Local Online Platforms – Surviving in a Global Market Literature review 2.1 Digitalization The digitization initiative began decades ago; however, it has become more prevalent in the last years and will certainly have an important effect in the next decades (Gerth & Peppard, 2016). It is becoming the most significant technological trend with global consequences (Leviäkangas, 2016) since it is affecting individuals, organizations, communities and entire regions. It is believed that digital transformation will change business processes, customer experience and the entire business models due to the more and more information available for individuals and organizations; and therefore, enables to perform activities even more efficiently (Sganzerla, Seixas, & Conti, 2016). It was even claimed decades ago that business models from the industrial age were not suitable anymore to deal with the (at that time) forthcoming challenges of the information age (Venkatraman & Henderson, 1998). The same may be valid today, where past business models are not suitable to deal with the challenges of the digital transformation era. Moreover, innovative business models were namely claimed to be one of the most important reasons for the success of several organizations tightly connected to the online business like Amazon, Microsoft or eBay (Afuah, 2004). However, is it merely about the innovative business models? Are innovative models enough to penetrate to global market or to become a global leader? Digitization is spreading out in almost all industries sectors; and therefore, it is anticipated that there will be even more “online” competition in a global market. Hence, the question about important factors needed for local companies to survive in a digital world becomes more important as ever before. 2.2 Local versus global providers The debate about local and global providers has its roots in the glocalization concept. It has been denoted as a mixture of globalization and localization (Robertson, 1995) balancing the universal of globalization and the particular of localization. Ideas of glocalization are mainly associated with the international contexts; however, glocalization can be also related to the understanding of cultural differences within regional and national boundaries (Breuch, 2015). Several key areas were distinguished in relation to when and how different cultures access information or use the technologies, including literacy, linguistic difference, physical environment, cultural norms and technological infrastructure (Best & Smyth, 2011). All these areas and specifics should be considered when launching new web services or online platform in local market. 424 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Manfreda, P. Trkman, A. Groznik & J. Erjavec: Local Online Platforms – Surviving in a Global Market Although there are significant cultural differences among nations, some providers succeeded in becoming a global platform provider. As it evident from Figure 1 presenting the market share of leading search engines from January 2010 to October 2016, there is almost no place for competing providers. However, examining the state in different regions suggests that despite having a global market leader, there are local market champion like Baidu in China, Naver in South Korea or Yandex in Russia (ReturnOnNow, 2015). Even in Japan the second strongest provider (Yahoo Japan) is with 40% share much above the global average, while Google with its 57% much below the average. Figure 1: Global market share of search engines 2010-2016 (StatCounter, 2016) At the moment there is an increasing pressure on global services providers to grow along with the needs of their customers in order to offer classier range of services both in terms of extent and geographic coverage (Pollock, 2017). Research Program We decided to delve into this issue with a research program that will identify and validate the factors that influence the likelihood of the success of a local online platform and build a framework for successful deployment of local online platforms when competing with global online platforms. Different research methods will be used in several steps. The first step of our research will be a focus group by which we will be able to clearly define the outline of our further research. The focus groups are restricted to early, exploratory stages of research (Lunt & Livingstone, 1996). They offer an insight to the discussed topic (Grudens-Schuck, Allen, & Larson, 2004). The focus group will consist 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 425 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Manfreda, P. Trkman, A. Groznik & J. Erjavec: Local Online Platforms – Surviving in a Global Market of providers/founders of online platforms and will thus provide an insight into reasons for (lack of) success of local online platforms. The second step will be based on the literature review and results from focus groups. We will conduct a Delphi study with the goal to identify the factors for success of local online platform providers when competing with global online platform providers. Delphi study is a group iterative method that uses controlled opinion feedback group of respondents (Dalkey & Helmer, 1963). It can be used in management disciplines to shape a group consensus of relative importance of issues by using a ranking system (Schmidt, 1997). It can also be used as a method for concept or framework development (Okoli & Pawlowski, 2004). The Delphi study will include two separate groups. One group will be practitioners from the field of online platforms while the other group will be the experts/researchers. This split panel approach is advocated because of the ability to create a joint reality shared by both groups (Linstone & Turoff, 1975). The number of steps in the Delphi study will depend on how fast the consensus will be reached. While some authors suggest that a certain percentage of participants in the study need to reach consensus (the percentages differ), other authors suggest a more qualitative approach to estimate when consensus is reached (Hasson, Keeney, & McKenna, 2000). The Delphi study will be designed based on the principles presented in (Linstone & Turoff, 1975). After identifying the factors for success of local online platform providers, we will conduct several in-depth case studies of local online platforms. Case studies are used in research which is still in the process of understanding, detection and characterization (Stuart, McCutcheon, Handfield, McLachlin, & Samson, 2002). The case studies will be used to verify the identified factors for success of local online platforms by analysing real companies. Conclusion The companies that are offering local online platforms often have to compete with global online platform providers. The purpose of the research is to identify and examine the factors that influence the success of local online platforms when competing with global online platforms. Contrary, the research will also ease the understanding when creating local online platforms has no potential. Our research will include several steps that will help us rigorously identify the factors and verify them. References Afuah, A. (2004). Business models: A strategic management approach. Barns, M. (2016). Global E-Commerce Becoming The Great Equalizer. Retrieved from http://www.forbes.com/sites/greatspeculations/2016/01/20/global-e-commerce-becoming-the- great-equalizer/#19ec96b59868 426 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Manfreda, P. Trkman, A. Groznik & J. Erjavec: Local Online Platforms – Surviving in a Global Market Best, M. L., & Smyth, T. N. (2011). Global/local usability: Locally contextualized usability in the global south Global usability (pp. 9-22): Springer. Breuch, L.-A. K. (2015). Glocalization in Website Writing: The Case of MNsure and Imagined/Actual Audiences. Computers and Composition, 38, Part B, 113-125. doi:http://dx.doi.org/10.1016/j.compcom.2015.09.009 Dalkey, N., & Helmer, O. (1963). An experimental application of the Delphi method to the use of experts. Management science, 9(3), 458-467. Gerth, A. B., & Peppard, J. (2016). The dynamics of CIO derailment: How CIOs come undone and how to avoid it. Business Horizons, 59(1), 61-70. doi:http://dx.doi.org/10.1016/j.bushor.2015.09.001 Grudens-Schuck, N., Allen, B. L., & Larson, K. (2004). Methodology brief: focus group fundamentals. Hasson, F., Keeney, S., & McKenna, H. (2000). Research guidelines for the Delphi survey technique. Journal of advanced nursing, 32(4), 1008-1015. Leviäkangas, P. (2016). Digitalisation of Finland's transport sector. Technology in Society, 47, 1- 15. doi:http://dx.doi.org/10.1016/j.techsoc.2016.07.001 Levitt, T. (1993). The globalization of markets. Readings in international business: a decision approach, 249. Linstone, H. A., & Turoff, M. (1975). The Delphi method: Techniques and applications (Vol. 29): Addison-Wesley Reading, MA. Lunt, P., & Livingstone, S. (1996). Rethinking the focus group in media and communications research. Journal of communication, 46(2), 79-98. Okoli, C., & Pawlowski, S. D. (2004). The Delphi method as a research tool: an example, design considerations and applications. Information & management, 42(1), 15-29. Pollock, B. (2017). Global service is a major concept – regardless of whether your organisation is local, regional or international. Retrieved from http://fieldservicenews.com/service-global- goncept-regardless-whether-organisation-local-regional-international/ ReturnOnNow. (2015). 2015 Search Engine Market Share By Country. Retrieved from http://returnonnow.com/internet-marketing-resources/2015-search-engine-market-share-by- country/ Robertson, R. (1995). Glocalization: Time-space and homogeneity-heterogeneity. Global modernities, 25, 44. Schmidt, R. C. (1997). Managing Delphi surveys using nonparametric statistical techniques. decision Sciences, 28(3), 763-774. Sganzerla, C., Seixas, C., & Conti, A. (2016). Disruptive Innovation in Digital Mining. Procedia Engineering, 138, 64-71. doi:http://dx.doi.org/10.1016/j.proeng.2016.02.057 StatCounter. (2016). Worldwide desktop market share of leading search engines from January 2010 to October 2016 Retrieved from https://www.statista.com/statistics/216573/worldwide- market-share-of-search-engines/ Stuart, I., McCutcheon, D., Handfield, R., McLachlin, R., & Samson, D. (2002). Effective case research in operations management: a process perspective. Journal of Operations Management, 20(5), 419-433. Venkatraman, N., & Henderson, J. C. (1998). Real strategies for virtual organizing. MIT Sloan Management Review, 40(1), 33. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Conceptualizing Digital Transformation in Business Organizations: A Systematic Review of Literature 30 RESEGO MORAKANYANE, AUDREY GRACE & PHILIP O’REILLY Abstract Digital Transformation has gained great research interest in both academia and practice. While existing literature demonstrates new levels of research interest in the area and how business leaders have engaged in digital transformation journeys, there is evidence of a lack of common understanding of this concept. Both research and practice do not have unified views of the fundamental concepts of digital transformation. To this regard, we demonstrate how a systematic literature review was carried out to conceptualize this phenomenon. Using a concept centric matrix, we discuss the current state of the art literature of the concept by describing it in terms of what it is, the characteristics, drivers, impacts and transformed areas. Inconsistencies in the definition and other factors are identified. Towards a more comprehensible approach to understanding this phenomenon, we argue for the reconciliation of the literature and propose a new general and inclusive digital transformation definition. Avenues for further research on digital transformation of business organizations are also shared. Keywords: • Digital Transformation • Digital Technologies • Concept Centric Matrix • Literature Review • CORRESPONDENCE ADDRESS: Resego Morakanyane, University College Cork, College Rd, Cork Ireland, e-mail: resego.morakanyane@gmail.com. Audrey Grace, University College Cork, College Rd, Cork, Ireland, e-mail: a.grace@ucc.ie. Philip O’Reilly, University College Cork, College Rd, Cork, Ireland, e-mail: Philip.OReilly@ucc.ie. https://doi.org/10.18690/978-961-286-043-1.30 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 428 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Morakanyane, A. Grace & P. O’Reilly: Conceptualizing Digital Transformation in Business Organizations: A Systematic Review of Literature Introduction The advent of information and digital technologies - the time characterized by use of information and communication technologies (Siemens 2014) as well as mushrooming of new digital technologies (Resnick 2002), their adoption and use (intended or unintended), presents a new form of transformation: digital transformation (Hanna 2016). In business organizations, this form of organizational transformation, which is technology-enabled, is concerned with the use of information and digital technologies to impact different aspects of the organization. For example, organizations adopt emerging technologies such as social media, mobile technologies, internet of things, cloud technologies, big data analytics, etc. (Resnick 2002, Fitzgerald et.al. 2013) to enhance their daily operations (Aral et.al. 2013, Oestreicher-Singer & Zalmanson 2013, Hanna 2016). As a result, these technologies transform the way business entities operate, creating value and bringing different experiences to various stakeholders involved. Several studies have been carried out to demonstrate how organizations and industries have adopted digital technologies as well as demonstrating their transformational impacts. An MIT Sloan Management Review Research Report (2013) revealed that 78% of executives and managers across various industries, believed achieving digital transformation would be critical to their organizations. Another study by Harvard Business Review Analytics Services (2014) revealed that 50% of business and technology leaders said their organizations were already missing out on new technology- enabled business opportunities. Berman (2012) argues that the key transformational opportunities are: (i) creating new business models; (ii) improving operational processes; and (iii) enhancing customer experiences. Bharadwaj et.al. (2013) reflect on digital transformation era as a time for organizations to rethink the role of IT strategy from that of a functional level strategy to one that integrates IT strategy and business strategy. All these indicate how organizations are increasingly being involved in digital transformation. In fact, in today’s digital era, digital transformation has become an everyday agenda item in business boardrooms. As a result of this, the digital transformation phenomenon has created new research interest across different disciplines, (Bharadwaj et.al. 2013, Lucas et.al. 2013, Sertia et.al. 2013). Although substantial amounts of work is ongoing in this area, this study reveals that research carried out in this regard is still at a nascent stage. There are indications of an immature literature landscape coupled with a limited understanding of the phenomenon. The few literature review papers on digital transformation that were encountered during our search (cf. Besson & Rowe 2012, Cha & Lee 2013, Henriette et.al 2015, Piccinini et.al 2015) indicate a mismatch and conflicting views in the conceptualization of some basic fundamentals of the phenomenon. Constructs such as a definition of the phenomenon, characteristics, drivers, etc. remain vague. In fact, these literature reviews call for more research, especially on the reconciliation and expansion of the digital transformation literature. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 429 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Morakanyane, A. Grace & P. O’Reilly: Conceptualizing Digital Transformation in Business Organizations: A Systematic Review of Literature As per Besson & Rowe (2012) and Cha & Lee (2013) we acknowledge inconsistencies in the digital transformation literature and further argue for its reconciliation and expansion. To trigger this discourse, Westerman et.al. (2014) ask whether digital transformation is the solution to emerging business challenges in the digital era or is another marketing buzz word. A huge challenge remains in the lack of a reconciled definition and fundamental elements of the literature. Many existing studies out view digital transformation as totally different things. For instance, while some authors view a slight technology-enabled change such as implementing a new ERP System as digital transformation, others believe that digital transformation is actually a more radical and evolutionary process that takes place over time (Wang, et.al. 2016, Janowski 2015, Loebbeck & Picot 2015). While some researchers associate digital transformation with business models and strategy, others view digital transformation as a paradigm or as a process (Berman 2012, Berman & Marshall 2014). In light of this, we argue for the extension of literature that describes and articulates the phenomenon of digital transformation; what it is; how it behaves; what drives it; what impacts it creates, as well as where the impacts are felt. We believe that a solid foundation for this phenomenon is required. To this end, a systematic literature review is carried out and a concept centric matrix is developed. Drawing on this matrix, a more inclusive and general definition is constructed. The selection of keywords in this comprehensive definition of digital transformation is explained and avenues for further research are also highlighted. Methodology A scholarly literature search was performed with the aim of retrieving credible peer reviewed and academic research articles in this area (see Table 1). 430 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Morakanyane, A. Grace & P. O’Reilly: Conceptualizing Digital Transformation in Business Organizations: A Systematic Review of Literature Table 1: Using Gass et.al.(2014)’s 4 Phase Literature Analysis Approach Phase How it was used Phase 1: Searching Process Search keywords include: search for academic journals “digital business strategy”, “digital transformation” ,“digitalization”, “IT- & conference papers using enabled Organizational Transformation”, “IT-enabled Enterprise academic databases Transformation”; “digital technologies” Search using keywords and Boolean operators: “digital transformation AND digital business strategy”; “IT enabled transformation AND enterprise transformation”; “enterprise transformation AND digital technologies”; “organizational transformation AND digital transformation”; etc. Phase 2: Screening Process Conditions used to narrow the search include: screening conditions were 1. Articles should be written in English developed and used to focus 2. Articles should be published in 2010 or after results obtained from the 3. Articles should have at least one of the keywords above listed as part searching process of the keywords in the abstract Phase 3: Clustering Process Thematic Areas Identified include: clusters were developed based 1. What is Digital Transformation on thematic areas – constructs 2. Characteristics of Digital Transformation 3. Drivers of Digital Transformation 4. Impacts of Digital Transformation 5. Transformed Areas Phase 4: Analysis Process Thematic Analysis Technique used to develop the Concept Centric thematic analysis technique Matrix: was used to synthesize articles See Table 3 to create a body of literature using constructs above Articles retrieved were scrutinized to extract similar traits and patterns that build up towards the phenomenon, where variables such as: “description of what is”; “characteristics”; “drivers”, “impacts” and “transformed areas” were identified as constructs to the fundamental conceptualization of the phenomenon. The concept centric matrix process (Webster & Watson, 2002) was adopted to synthesize the retrieved articles. This process was carried out within the period of March to October 2016 using Gass, et.al. (2015)’s 4 Phase Approach to literature analysis. Table 1 below illustrates the approach and how it was utilized in this review. The literature search yielded many articles. Criteria from the screening processes were applied to narrow the search and set the final inclusion and exclusion criteria. For searches that yielded many results, the search was sorted according to relevance and only first 10 results were considered. On analysing the metadata, articles that did not meet the criteria set were excluded. While there was a deliberate focus on articles published in the basket of 8, articles from other peer reviewed sources and academic conferences were also considered. Articles included in the final selection were then downloaded and perused in more detail. Analysis revealed that some of the articles retrieved stated the definition of digital transformation, also giving different descriptors such as characteristics, drivers, impacts and transformed areas while others gave a perspective approach of what digital 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 431 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Morakanyane, A. Grace & P. O’Reilly: Conceptualizing Digital Transformation in Business Organizations: A Systematic Review of Literature transformation could mean in specific contexts. Table 2 summaries the type of articles downloaded, defining each type, the number of articles in each type that provided the definition of digital transformation as well as the total number of articles downloaded for each type. Table 2: Articles Retrieved Type of Article Description Definition No Total provided Definition Management Reviews Articles obtained from Business and 2 15 17 Management Review publications of reputable business schools, centre of studies or a collaboration Academic Articles obtained from different peer 9 27 36 Conferences & reviewed academic conferences and Journals journals Total 11 42 53 Digital Transformation: The Current Situation An in-depth analysis of the articles was carried out to determine how authors describe digital transformation. In this process, retrieved articles were used to identify the definition, characteristics, drivers, impacts and the transformed areas as articulated by the authors. A concept centric matrix was developed to capture the different variables for each construct as they are identified. Table 3 is an illustration of the concept centric matrix developed from analysing these articles. 432 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Morakanyane, A. Grace & P. O’Reilly: Conceptualizing Digital Transformation in Business Organizations: A Systematic Review of Literature Table 3: Digital Transformation - Concept Centric Matrix What is Digital Transformation? Strategy Bharadwaj, et.al. (2013); Matt, et.al. (2015); Mithas, et.al. (2013); Hansen & Sia (2015); Granados & Gupta (2013); Process Agarwal, et.al. (2010); Berman & Marshall (2014); Bharosa, et.al. (2013); Janowski (2015); Kreutzer (2014); Loebbecke & Picot (2015); Stieglitz & Brockmann (2012); Tamm, et.al. (2015); Wang, et.al. (2016); Hansen et.al. (2011); Business Model Henriette, et.al. (2015); Stieglitz & Brockmann (2012); Paradigm Shift Berman & Marshall (2014); Piccinini (2015a); What are its Characteristics? Radical Liu et.al. (2011); Berman (2012); Berman & Marshall (2014); Westerman et.al. (2011); Disruptive Berman (2012); Berman & Marshall (2014); Granados & Gupta, (2015); HBR Analytics Services (2014); Fitzgerald, M. et.al. (2013); Evolutionary/continuous Loebbeck & Picot (2015); Janowski (2015); Wang et.al. (2016); Liu et.al. (2011); Complex Janowski (2015); Bharosa et.al. (2013); Matt et.al. (2015); Agarwal (2010); What are the Drivers of Digital Transformation? Digital Technologies Agarwal, et.al. (2010); Berman (2012); Bharadwaj, et.al. (2013); Bharosa, et.al. (2013); Janowski (2015); Kreutzer (2014); Luna-Reyes & Gil-Garcia (2014); Mithas, et.al. (2013); Lucas, et.al. (2013); Stieglitz & Brockmann (2012); Setia, et.al. (2013); Wang, et.al. (2016); Berman & Marshall (2014); Loebbecke & Picot (2015); Westerman et.al. (2011); Digital Capabilities Berman & Marshall (2014); Loebbecke & Picot (2015); Matt, et.al. (2015); Schuchmann & Seufert (2015); Tamm, et.al. (2015); Wang, et.al. (2016); Westerman et.al. (2011); Strategies Berman & Marshall (2014); Bharadwaj, et.al. (2013); Matt, et.al. (2015); Stieglitz & Brockmann (2012); Tamm, et.al. (2015); Mithas, et.al. (2013); Business Models Agarwal, et.al. (2010); Berman & Marshall (2014); Bharadwaj, et.al. (2013); Janowski (2015); Loebbecke & Picot (2015); Luna-Reyes & Gil-Garcia (2014); Matt, et.al. (2015); Mithas, et.al. (2013); Schuchmann & Seufert (2015); Tamm, et.al. (2015); Stieglitz & Brockmann (2012); Value Chain Agarwal, et.al. (2010); Berman & Marshall (2014); Bharosa, et.al. (2013); Janowski (2015); Stieglitz & Brockmann (2012); Tamm, et.al. (2015); Wang, et.al. (2016); What are the Key Impacts of Digital Transformation? Value Creation: Matt, et.al. (2015); Mithas, et.al. (2013); Schuchmann & Seufert (2015); Reshapes Realign Berman (2012); Bharadwaj, et.al. (2013); Luna-Reyes & Gil-Garcia (2014); Redefine Integrate Stieglitz & Brockmann (2012); Johnson & Lederer (2010); Berman & Marshall Collaboration (2014); Chen et.al (2013); Bharosa et.al. (2013); Wang, et.al. (2016); Agarwal, et.al. (2010); Buschmeyer et.al. (2016); Westerman et.al. (2011); Operational Bharadwaj, et.al. (2013); Luna-Reyes & Gil-Garcia (2014); Matt, et.al. (2015); Efficiency: Optimize Mithas, et.al. (2013); Schuchmann & Seufert (2015); Lucas, et.al. (2013); Setia Processes, Omni (2012); Kreutzer (2014); Stieglitz & Brockmann (2012); Tamm et.al. (2015); Channel; Agility; Berman & Marshall (2014); Loebbeck & Picot (2015); Hansen & Sia (2015); Improved Decision Janowski (2015); Bharosa et.al. (2013); Wang et.al. (2016); Agarwal et.al. Making Structural (2010); Berman & Marshall (2014); Chen et.al (2013); Westerman et.al. (2011); Change Create Competitive Bharadwaj, et.al. (2013); Lucas, et.al. (2013); Matt, et.al. (2015); Schuchmann Advantage & Seufert (2015); Kreutzer (2014); Stieglitz & Brockmann (2012); Chen et.al (2013); Westerman et.al. (2011); Improved Bharadwaj, et.al. (2013); Luna-Reyes & Gil-Garcia (2014); Matt, et.al. (2015); Relationships: Enhance Schuchmann & Seufert (2015); Bharosa et.al. (2013); Wang et.al. (2016); 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 433 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Morakanyane, A. Grace & P. O’Reilly: Conceptualizing Digital Transformation in Business Organizations: A Systematic Review of Literature Customer Experiences; Berman (2012); Luna-Reyes & Gil-Garcia (2014); Matt, et.al. (2015); Piccinini Engagement et.al. (2015a); Berman & Marshall (2014); Loebbeck & Picot (2015); Chen et.al (2013); Westerman et.al. (2011); Where are these Impacts Felt (Transformed Areas)? Business Models Berman (2012); Westerman et.al. (2011); Agarwal, et.al. (2010); Berman & Marshall (2014); Bharadwaj, et.al. (2013); Janowski (2015); Loebbecke & Picot (2015); Luna-Reyes & Gil-Garcia (2014); Matt, et.al. (2015); Mithas, et.al. (2013); Schuchmann & Seufert (2015); Tamm, et.al. (2015); Hansen et.al. (2011); Chen et.al (2013); Operational Processes Bharadwaj, et.al. (2013); Lucas, et.al. (2013); Luna-Reyes & Gil-Garcia (2014); Matt, et.al. (2015); Mithas, et.al. (2013); Schuchmann & Seufert (2015); Westerman et.al. (2011); Hansen et.al. (2011); Berman & Marshall (2014); Chen et.al (2013); Customer Experiences Berman (2012); Luna-Reyes & Gil-Garcia (2014); Matt, et.al. (2015); Schuchmann & Seufert (2015); Piccinini et.al. (2015a); Berman & Marshall (2014); Loebbeck & Picot (2015); Luna-Reyes & Gil-Garcia (2014); Westerman et.al. (2011); Gray et.al. (2013); Employees Schuchmann & Seufert (2015); Tamm et.al. (2015); Hansen & Sia (2015); Luna-Reyes & Gil-Garcia (2014); Hansen et.al. (2011); Janowski (2015); Culture Schuchmann & Seufert (2015); Hansen & Sia (2015); Berman & Marshall (2014); Infrastructure Tamm et.al. (2015); Hansen & Sia (2015); Kohli & Johnson (2011); Table 4 lists the definitions obtained from the 11 articles (in Table 2), which were analysed to establish a pattern in the structure of the definitions. Each definition is analysed paying attention to: (i) what keywords and variables have been used to describe this concept, (ii) identifiable patterns that relays how these keywords and variables have been used to develop the definitions. 434 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Morakanyane, A. Grace & P. O’Reilly: Conceptualizing Digital Transformation in Business Organizations: A Systematic Review of Literature Table 4: Digital Transformation - Current Definitions Authors Definition Liu et.al. (2011); “the integration of digital technologies into business processes” “an organizational strategy formulated and executed by leveraging Bharadwaj et.al. (2013); digital resources to create differential value” “the use of digital technologies to enable major business improvements Fitzgerald et.al. (2013); ” “fundamentally altering traditional ways of doing business by redefining Lucas et.al (2013); business capabilities, processes and relationships” Mithas et.al. (2013); “the extent to which an organization engages in any activity of IT” “the use of technology to radically improve performance or reach of Westerman et.al. (2014b); enterprises” “a business model driven by the changes associated with the application Henriette et.al. (2015); of digital technology in all aspects of human society” “characterized by the use of new digital technologies to enable Piccinini et.al. (2015); significant business improvements” “realignment of technology and new business models to more effectively engage digital customers at every touchpoint in the customer experience Schuchmann & Seufert (2015); life cycle” “reflect the pervasiveness of changes induced by digital technologies Chanias & Hess (2016); throughout an organization” “concerned with the changes digital technologies can bring about in a company’s business model, which result in changed products or Hess et.al. (2016) organizational structures or in the automation of processes” A further in-depth analysis of both concept centric matrix (Table 3) and the current definitions (Table 4) revealed that there are significant differences regarding how digital transformation is conceptualised. Nevertheless, a common pattern has been identified in the structure of digital transformation definition, which suggests how the keywords and variables have been used to describe the concept. To qualify and refine this pattern, an iterative process was carried out several times, alternating different variables and keywords in order to attain a more precise yet general structure of the definition. After several iterations, we propose a pattern that suggests that digital transformation is: “… something with certain characteristics; that is driven by something; to create certain impacts; on certain aspects of the organization” Table 5 examines the validity of this proposed definition structure using examples from current definition and concept centric matrix. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 435 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Morakanyane, A. Grace & P. O’Reilly: Conceptualizing Digital Transformation in Business Organizations: A Systematic Review of Literature Table 5: Examining Validity of the Proposed Digital Transformation Definition Structure. Source: Bharadwaj et.al. (2013) Source Bharadwaj et.al. Westerman Hess et.al. (2016) Concept Centric (2013) et.al. concerned with Matrix an organizational (2014b) the changes digital strategy formulated the use of technologies can and executed by technology bring about in a leveraging digital to radically company’s resources to create improve business model, differential value performance which result in or reach of changed products enterprises or organizational structures or in the automation of processes …is Strategy ??? ??? strategy; process; something… business model; paradigm shift; etc. ...with certain ??? Radically Change Radical; Disruptive; characteristics… Evolutionary; continuous, etc. …that is driven formulated and Technology Digital digital technologies; by something… executed by technologies digital capabilities; leveraging digital business models; resources strategies; etc. …to create to create differential Improve Automation value creation; certain value performance enhanced impacts… relationships; omni- channel access; optimize; saving; etc. …on certain Organization wide Enterprise Business model; Operational processes; aspects of the wide Products; business models; organization Organizational strategies; customer structures; experiences; Processes value chain; etc. Using the proposed definition structure, we illustrate the inconsistencies in the literature of this phenomenon using both concept centric matrix and current definitions. In order to reconcile these differences and ‘square this circle’, we draw upon these tables to construct an inclusive and general digital transformation definition. 3.1 Characteristics of Digital Transformation The literature assessed views characteristics of digital transformation as behavioural traits displayed by this phenomenon. Different authors used adjectives to describe these traits, perhaps because of the long term impacts digital transformation have on business organizations. From the analysis, only a few of the articles described the digital transformation phenomenon in terms of its behavioural characteristics. However, notwithstanding the few descriptions, these characteristics could not be ignored because they serve a purpose of putting into perspective the extent of the impact that is created during the transformation: whether the impact is small or large, gradual or abrupt, etc. In 436 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Morakanyane, A. Grace & P. O’Reilly: Conceptualizing Digital Transformation in Business Organizations: A Systematic Review of Literature this instance, the analysed literature characterizes the behaviour of digital transformation as radical, disruptive, evolutionary, continuous and complex. We propose that for a more inclusive and comprehensible description, digital transformation displays more of an evolutionary trait. 3.2 Drivers of Digital Transformation Drivers of digital transformation are attributes that influence and enable the process of digital transformation to take place. Although insufficient, the existing literature identified attributes such as digital capabilities and maturity, digital technologies, strategies, business models etc. as factors that drive the digital transformation agenda in organizations. Ezeokoli et.al. (2016) notices that several studies have articulated digital transformation drivers as: profitability and new revenue growth, customer satisfaction, increased operational efficiency, convenience and the same high-quality technical standard, increase business agility, increased employee productivity and competitive advantage. While it was also observed that in some instance there was an overlap between digital transformation drivers and impacts, caution was exercised to separate the two such that drivers remain attributes that influence and enable while impacts are emerging benefits realised from the process of digital transformation. However, while it is arguable which attribute would be possessing more digital drive, we argue that digital technologies play a vital role in the digital transformation process. We believe the capabilities that these technologies possess, coupled by other factors, such as culture, strategy and digitally savvy human capital is what enables the digital transformation process. Kane et.al. (2015a) argue that simply using digital technologies to drive the digital transformation process is not enough and that it also uses digital capabilities, strategies, culture and talent development. 3.3 Impacts of Digital Transformation Digital transformation impacts are the effects that business organizations experience as a result of the transformation process. While analysed literature has not classified these impacts, we categorize these impacts into customer-focused and organization-focussed categories, customer focused are the effects that impact customers and organization- focussed impact the organization itself. We further argue that these impacts can have a positive or negative effect on both the customer and the organization. Different studies have used different verbs to describe actions that digital transformation has on organizations, however we believe the ultimate impact that organizations want to leverage on digital transformation is value creation – to both the organization and customers. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 437 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Morakanyane, A. Grace & P. O’Reilly: Conceptualizing Digital Transformation in Business Organizations: A Systematic Review of Literature 3.4 Transformed Areas Different authors identify different areas which are impacted during the digital transformation process. Westerman et.al. (2014b) alludes that digital transformation takes places in three key areas of the firm: customer experience, operational processes and business models, suggesting that the effects of digital transformation in business organizations are felt in these three key areas. While Westerman et.al. (2014b) allege that these three key areas are what business leaders focus the enterprise’s transformation efforts towards, from an “orchestrating the organization” lens, it is established that not all key elements that ensure a perfect organizational orchestration have been included. For instance, Bouee (2015) argue that employees should not be left out in the digital transformation journey. Other researchers, including Matt et.al. (2015), Bharadwaj et.al. (2013), etc. demonstrate how digital transformation impacts organizational structure, while Piccinini (2015a), Loebbeck & Picot (2015), etc. allude that digital transformation impacts relationships. In determining the transformed areas, we however argue that as the benefits of digital transformation are to be felt by both the organization and the customers, it is important to ensure that the transformed areas considered for the general description of digital transformation should be inclusive of both organization and customer. We therefore propose that Westerman et.al. (2014b)’s three key transformed areas are more general and inclusive of both the organization and customer. The process was repeated several times, alternating different keywords and variables to ensure rigor and relevance in the proposed definition. It is after iterating several times that the definition below was proposed: Digital transformation is: “an evolutionary process that leverages digital capabilities and technologies to enable business models, operational processes and customer experiences to create value” Towards a More Comprehensive Understanding of Digital Transformation This section discusses the concepts used in our proposed definition and further describes the meaning of each concept. Table 6 gives a simple definition of each of these concepts and subsequently, a justification is provided of why each concept was selected for inclusion in the definition. 438 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Morakanyane, A. Grace & P. O’Reilly: Conceptualizing Digital Transformation in Business Organizations: A Systematic Review of Literature Table 6: Keywords from the New Definition Keyword Simple Definition Evolutionary Process A gradual and ongoing series of activities that brings radical change over a period of time Digital Capabilities technology skills possessed or required by employees, customers and other stakeholders in different areas that can enable the organization to thrive in a digital environment Digital Technologies new and emerging technologies business models, operational Different areas of the organization which are bound to transform processes and customer due to the digital transformation process experiences Value Creation Organization wide effects and benefits realized as a result of the digital transformation effort, realized by both the organization and the customer Defining Characteristic(s) of Digital Transformation: Evolutionary Process indicates that digital transformation phenomena is a continuous process, over a period of time (Schuchmann & Seufert 2015, Loebbeck & Picot 2015, Janowski 2015, Wang et.al. 2016, Liu et.al. 2011, Bharosa et.al. 2013). While digital transformation was referred to as a radical change more than as an evolutionary process, we believe an evolutionary process is a more inclusive term that captures the fact that digital transformation evolves with time, and whenever this evolution takes place, the impacts bring about a radical change to the organization. Also, digital technologies as key drivers of digital transformation are in their nature evolving. While earlier forms of digital transformation entailed the introduction of computer based systems and automation of processes, present day digital transformation is more concerned with adoption and use of emerging technologies, which are in their nature evolving. Drivers of Digital Transformation: Digital Capabilities specifies that in order to thrive in a digital transformation journey, organizations require particular skill set, mind-set and culture that is digital. We argue that relevant skill set and culture - digital capabilities, should be incorporated with digital technologies to achieve the best digital transformation results (Matt et.al. 2015, Schuchmann & Seufert 2015, Tamm et.al. 2015, Berman & Marshall 2014, Loebbeck & Picot 2015). The second key driver identified in our definition, Digital Technologies, indicates that at the foundation of all digital transformation efforts are digital technologies. For technology enabled organizational transformation to take place, technology based systems are at the core of the effort (Besson & Rowe 2012, Cha & Lee 2013). Digital technologies create opportunities that organizations leverage. These opportunities have the potential to transform certain aspects of the organization, especially business models, operational processes and customer experiences. As a result, the organization benefits from impacts of this transformation. Impacts of Digital Transformation: Value Creation is identified as the key impact brought about by digital transformation. This value is realized by both the organization and its 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 439 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Morakanyane, A. Grace & P. O’Reilly: Conceptualizing Digital Transformation in Business Organizations: A Systematic Review of Literature customers. Value realised include many factors, but not limited to: operational efficiencies, improved customer experiences; enhanced business models; strategic differentiation, competitive advantage, improved stakeholder relationships, cost savings, etc. (Berman & Marshall 2014, Loebbeck & Picot 2015, Luna-Reyes & Gil-Garcia 2014, Janowski 2015, Bharosa et.al. 2013, Wang et.al. 2016, Agarwal et.al. 2010). Key Transformed Areas of Digital Transformation: Business Models, Operational Processes & Customer Experiences are acknowledged as the key transformed areas of digital transformation initiatives (Westerman, G. et. al. 2011). Focusing transformation on these 3 key areas naturally engages transformation in other aspects of the organization, thus, enabling the transformation impacts to be felt across the organization. For example, transforming operational processes within the organization has the potential to create an impact in other aspects of the organization, such as improving efficiency, costs saving for both the organization and the customer, resulting in value creation. Conclusion This study has highlighted the lack of a unified and overarching definition of digital transformation as well as inconsistencies in the existing literature. In order to address this gap, a systematic literature review was carried out in order to conceptualize this phenomenon. A concept centric matrix was used to describe the phenomenon in terms of what it is, its characteristics, its drivers, impacts and the transformed areas. Inconsistencies in the definition are also identified and a new and more inclusive definition of digital transformation is constructed and explained. Other gaps that have been identified during the literature review process include insufficient literature on transformational effects of digital technologies on different aspects of the firm and as well as specific to industries. While digital transformation involves the use of digital capabilities and technologies to impact different aspects of the organization in order to create value, it is also important to understand specifically how different types of digital technologies, paired with capabilities, impact particular aspects of the organization. Moreover, it is important to understand the nature of the value that is created through this transformation. Such research would have significant impact on both theory and practice. References Agarwal, R. et.al., (2010); The Digital Transformation of Healthcare: Current Status and Road Ahead; Information Systems Research, Vol 21 No. 4, Pp. 796-809 Alhassan, I. et.al., (2016); Data Governance Activities: An Analysis of the Literature; Journal of Decision Systems, Vol 25 No. s1, Pp. 64-75 Aral, S. et.al. (2013); Social Media and Business Transformation: A Framework for Research; Information Systems Research, Vol 24 No. 1, Pp. 3-13 Benlian, A. & Haffke, I., (2016); Does Mutuality Matter? Examining the Bilateral Nature and Effect of CEO-CIO Mutual Understanding; Journal of Strategic Information Systems, Vol 25, Pp. 104-126 440 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Morakanyane, A. Grace & P. O’Reilly: Conceptualizing Digital Transformation in Business Organizations: A Systematic Review of Literature Berman, S. J. & Marshall, A., (2014); The Next Digital Transformation: From an Individual- Centered to an Everyone-to-Everyone Economy; Strategy & Leadership, Vol 42 No.5, Pp. 9- 17 Berman, S. J., (2012); Digital Transformation: Opportunities to Create New Business Models; Strategy & Leadership, Vol 40 No 2, Pp. 16-24 Besson, P. & Rowe, F., (2012); Strategizing Information Systems-Enabled Organizational Transformation: A Transdisciplinary Review and New Directions; Journal of Strategic Information Systems, Vol 21, Pp 103-124 Bharadwaj, A. et.al., (2013); Digital Business Strategy: Toward A Next Generation Of Insights; MIS Quarterly, Vol 37 No. 2, Pp. 471-482 Bharosa, N. et.al., (2013); Tapping into Existing Information Flows: The Transformation to Compliance by Design in Business-to-Government Information Exchange; Government Information Quarterly, Vol 30, Pp.s9-s18 Bouee, C. (2015); Digital Transformation Doesn’t Have to Leave Employees Behind; Harvard Business Review Buschmeyer, A. et.al., (2016); Organizational Transformation Towards Product-Service System: Empirical Evidence in Managing the Behavioural Transformation Process; Procedia CIRP, Pp. 264-269 Cha, J. K. & Lee, Z., (2013); What Do We Mean by Information Technology Enabled Organizational Transformation; PACIS 2013 Proceedings, 235 Chanias, S. & Hess, T., (2016); Understanding Digital Transformation Strategy Formation: Insights From Europe’s Automotive Industry. PACIS 2016 Proceedings Chen, Y. K. et.al., (2014); Effects of Digital Transformation on Organizational Performance of SMEs; Internet Research, Vol 26 No. 1, Pp. 186-212 Coleman, G. W., et.al., (2010); Engaging the Disengaged: How do we Design Technology for Digitally Excluded Older Adults?; In Proceedings of the 8th ACM Conference on Designing Interactive Systems; Pp. 175-178 Eggers, W.D. & Bellman, J. (2015); The Journey to Government’s Digital Transformation; Deloitte University Press Ezeokoli, F. O. et.al. (2016); Digital Transformation in the Nigeria Construction Industry: The Professionals’ View; World Journal of Computer Application and Technology, Vol 4 No. 3, Pp. 23-30 Fitzgerald, M. (2013); How Starbucks Has Gone Digital; MITSloan Management Review Fitzgerald, M. (2014); Your Digital Journey Is Being Mapped By Your Customers; MITSloan Management Review Fitzgerald, M. et.al. (2013); Embracing Digital Technology: A New Strategic Imperative; MITSloan Management Review Gass, O. et.al., (2015); Conceptualizing Individualization in Information Systems – A Literature Review; Communications of the Association for Information Systems, Vol 37 No. 3, Pp. 64- 88 Granados, N. & Gupta A., (2015); Transparency Strategy: Competing With Information in a Digital World; MIS Quarterly, Vol 37 No. 2, Pp. 637-641 Gray, P. et.al., (2013); Realizing Strategic Value Through Center-Edge Digital Transformation In Consumer-Centric Industries; MIS Quarterly Executive, Vol 12 No.1, Pp. 1-17 Gross, J. et.al. (2013); Accelerating Digital Transformation; CapGemine Consulting Digital Transformation Review Hanna, N. K. (2016); Mastering Digital Transformation: Towards a Smarter Society, Economy, City and Nation. Emerald Group Publishing 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 441 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Morakanyane, A. Grace & P. O’Reilly: Conceptualizing Digital Transformation in Business Organizations: A Systematic Review of Literature Hansen A. et.al. (2011); Rapid Adaptation in Digital Transformation: A Participatory Process For Engaging IS and Business Leaders; MIS Quarterly Executive, Vol 10 No 4, Pp. 175-185 Hansen, R. & Sia, S. K. (2015); Hummel’s Digital Transformation Strategy Towards Omnichannel Retailing: Key Lessons Learned; MIS Quarterly, Vol 14 No. 2, Pp. 51-66 Hart, A. D., & Frejd, S. H., (2013); The Digital Invasion: How Technology is Shaping You and Your Relationships.; Baker Books Hashem, I. et.al., (2015); The Rise of Big Data on Cloud Computing: Review and Open Research Issues; Information Systems, Vol 47, Pp. 98-115 HBR Analytics Services, (2014); The Leadership Edge in Digital Transformation; Harvard Business Revie w HBR Analytics Services, (2015); The Digital Transformation of Business; Harvard Business Review HBR Analytics Services, (2016); Accelerating The Pace of Digital Transformation; Harvard Business Review Henriette, E. et.al., (2015); The Shape Of Digital Transformation: A Systematic Literature Review; MCIS 2015 Proceedings, Paper 10, Pp. 1-19 Hess, et.al., (2016); Options for Formulating a Digital Transformation Strategy; MIS Quarterly Executive, Vol 15 No. 2, Pp. 123-139 Janowski, T. (2015); Digital Government Evolution: From Transformation To Contextualization; Government Information Quarterly, Vol 32, Pp. 221-236 Johnson, A. M. & Lederer, A. L., (2010); CEO/CIO Mutual Understanding, Strategic Alignment, and the Contribution of IS to the Organization; Information & Management, Vol 47, Pp. 138- 149 Kane, G. C., (2015); How Digital Transformation is Making Health Care Safer, Faster and Cheaper; MITSloan Management Review Kane, G. C. et.al. (2015a); Is Your Business Ready for a Digital Future? MITSloan Management Review, Pp 37-44. Kane, G.C. et.al. (2015b); Strategy, Not Technology, Drives Digital Transformation: Becoming a Digitally Mature Enterprise; MITSloan Management Review; Kessler, W. et. al., (2012); Enterprise Transformation and Manufacturing in a Global Place; Information Knowledge Systems Management; Vol 11, Pp. 5-22 Kohli, R. & Johnson, S., (2011); Digital Transformation in Latecomer Industries: CIO and CEO Leadership Lessons from Encana Oil & Gas (USA) Inc.; MIS Quarterly Executive, Vol 10 No.4, Pp. 141-156 Kreutzer, R. T., (2014); Digital Darwinism and the Need for a Digital Transformation; 4th Annual International Conference on Business Strategy, Pp. 38-45 Libert, B. et.al. (2016); 7 Questions to Ask Before Your Next Digital Transformation; Harvard Business Review Liu D. et.al, (2011); Resource Fit in Digital Transformation - Lessons Learned From The CBC Bank Global E-Banking Project; Management Decision, Vol 49 No. 10, Pp 1728-1742 Loebbecke, C. & Picot, A., (2015); Reflections on Societal and Business Model Transformation Arising From Digitization and Big Data Analytics: A Research Agenda; Journal Of Strategic Information System, Vol 24, Pp. 149-157 Lucas, H. C. et.al., (2013); Impact Research On Transformational Information Technology: An Opportunity to Inform New Audiences; MIS Quarterly, Vol 37 No. 2, Pp. 371-382 Luna-Reyes, L. F. & Gil-Garcia, J.R., (2014); Digital Government Transformation and Internet Portals: The co-Evolution of Technology, Organizations and Institutions; Government Information Quarterly, Vol 31, Pp. 545-555 442 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Morakanyane, A. Grace & P. O’Reilly: Conceptualizing Digital Transformation in Business Organizations: A Systematic Review of Literature Matt, C. et.al., (2015); Digital Transformation Strategies; Business Information Systems Engineering, Vol 5, Pp. 339-343 McGrath, R. et.al., (2015); Strategies for the Age of Digital Disruption, CapGemine Consulting Digital Transformation Review Mirsch, T. et.al., (2016); Channel Integration Towards Omnichannel Management: A Literature Review; In Proceeding of the 20th Pacific Asia Conference on Information Systems (PACIS 2016). Mithas, S. et.al., (2013); How a Firm’s Competitive Environment and Digital Strategic Posture Influence Digital Business Strategy; MIS Quarterly, Vol 37 No. 2, Pp. 511-536 Ngai, E. W. T. et.al. (2015); Social Media Research: Theories, Constructs and Conceptual Frameworks; International Journal of Information Management, Vol 35, Pp. 33-44 Oestreicher-Singer, G. & Zalmanson, L. (2013); Content or Community? A Digital Business Strategy for Content Providers in the Social Age; MIS Quarterly, Vol 37 No. 2, Pp. 591-616 Piccinini, E. et.al., (2015a); Changes in the Producer-Consumer Relationship: Towards Digital Transformation, in: Thomas. O.; Teuteberg, F. (Hrsg.): Prpceedings der 12. Internationalen Tagung Wirtschaftsinformatik (WI 2015), Osnabruck, S. Pp. 1634-1648 Piccinini, E. et.al., (2015b); Transforming Industrial Business: The Impact of Digital Transformation on Automotive Organizations; 36th International Conference on Information Systems, Fort Worth Poutiatine, M. I., (2010); What is Transformation?: Nine Principles Toward an Understanding of the Transformational Process for Transformational Leadership; Journal of Transformative Education; Vol 7 No 3, Pp. 189 – 208 Resnick, M., (2002); Rethinking Learning in the Digital Age Schuchmann, D. & Seufert, S., (2015); Corporate Learning in Times of Digital Transformation: A Conceptual Framework and Service Portfolio for the Learning Function in Banking Organizations; iJAC, Vol 8 No. 1, Pp. 31-39 Scott, J. E. (2007); An eTransformation Study Using the Technology-Organization-Environment Framework. BLED 2007 Proceedings, 55. Setia, P. et.al., (2013); Leveraging Digital Technologies: How Information Quality Leads to Localized Capabilities and Customer Service Performance; MIS Quarterly, Vol 37 No.2, Pp. 565-590 Shamo, D. et.al. (2014); Crafting a Compelling Digital Customer Experience; CapGemine Consulting Digital Transformation Review Shirky, C., (2008); Here Comes Everybody: How can Change Happen When People Come Together; Penguin Books, London Siemens, G., (2014); Connectivism: A Learning Theory for the Digital Age Stieglitz, S. & Brockmann, T. (2012); Increasing Organizational Performance by Transforming into a Mobile Enterprise; MIS Quarterly Executive, Vol 11 No. 4, Pp. 189-204 Tamm, T. et.al. (2015); How An Australian Retailer Enabled Business Transformation Through Enterprise Architecture; MIS Quarterly Executive, Vol 14 No 4, Pp. 181-193 Wang, Y. et.al. (2016); Big Data Analytics: Understanding its Capabilities and Potential Benefits to Healthcare Organizations; Technology Forecasting & Social Change; Webster, J. & Watson, R.T. (2002); Analyzing the Past to Prepare for the Future: Writing a Literature Review; MIS Quarterly, Vol 26 No. 2, Pp. 13-23 Weill, P. & Woerner, S. L. (2015); Thriving in an Increasingly Digital Ecosystem; MITSloan Management Review Westerman, G. & Bonnet, D. (2015); Revamping Your Business Through Digital Transformation; MITSloan Management Review 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 443 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. Morakanyane, A. Grace & P. O’Reilly: Conceptualizing Digital Transformation in Business Organizations: A Systematic Review of Literature Westerman, G. et. al. (2011); Digital Transformation: A Roadmap for Billion-Dolllar Organization; MITSloan Management Review Westerman, G. et.al. (2014); The Nine Elements Of Digital Transformation; MITSloan Management Review Westerman, G. et.al. (2014); Leading Digital: Turning Technology into Business Transformation. Harvard Business Press. 444 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kitt l, P. Ravesteijn, R. Clarke & R. Bons The Appraisal of Facebook Online Community: An Exposition of Mobile Commerce in Social Media Reviews 31 SUNDAY ADEWALE OLALEYE, ISMAILA TEMITAYO SANUSI & JARI SALO Abstract Social Commerce is a growing upshot of electronic commerce in Nigeria. It is influencing the existing value networks and turning around the global economy. Many authors have impacted the body of knowledge in the context of mobile commerce and social media as a separate research domain, but the fusion of mobile commerce and social media still need more scholars’ attention most especially in the developing nations. This study applies the hybrid technique to sort out social commerce customers’ reviews, appraise the quality of the extracted data and identify the opinion that transpired between online retailing merchants and online customers. The appraisal theory used for the pairing of mobile commerce and social media explain how attitude and graduation connect engagement in mobile commerce products and services review. The equilibrium of mobile commerce and Facebook stands to improve customer service. This study offers some managerial implications to the social commerce and electronic marketing practitioners. Keywords: • Facebook • Social Media • Sentiment • Mobile Commerce • Review • Appraisal • CORRESPONDENCE ADDRESS: Sunday Adewale Olaleye, University of Oulu, Pentti Kaiteran katu 1, 90014 Oulu, Finland, e-mail: sunday.olaleye@oulu.fi. Ismaila Temitayo Sanusi, University of Eastern Finland, Yliopistokatu 2, 80100 Joensuu, Finland, e-mail: ismails@uef.fi. Jari Salo, University of Helsinki, Yliopistonkatu 4, 00100 Helsinki, Finland, e-mail: jari.salo@helsinki.fi. https://doi.org/10.18690/978-961-286-043-1.31 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 446 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Adewale Olaleye, I. Temitayo Sanusi & J. Salo: The Appraisal of Facebook Online Community: An Exposition of Mobile Commerce in Social Media Reviews Introduction In Nigeria, studies have shown social media’s influence in different sectors such as education (Ezeani and Igwesi, 2012; Asemah, Okpanachi, Edegoh, 2013), health promotion (Carter, 2014), security issues (Chiluwa and Adegoke, 2013), political participation (Ifukor, 2010; Nnanyelugo and Nwafor, 2013). Fink, Kopecky, Bos and Thomas, (2012) described how certain aspects of an online population can be characterized. However, there is a paucity of research in the context of social commerce which is the focus of this study. Nigeria has a potential for social media and mobile commerce as the Facebook users in Nigeria increased to 16,000,000 (Internet World Stats, 2017) which account for 8.4% of its population. This datum makes Nigeria one of the leading Facebook users in Africa. Also, Nigeria is advancing in mobile commerce, and its ultra-connected population is impacting the revenue of the mobile commerce merchants. Averagely, Nigerians are online once every hour and 20% use the internet at least ten times a day (Nwokpoku, 2015). Mobile commerce is growing with innovative add-on feature that is influencing the existing value networks and turning around the global economy (Pousttchi, Tilson, Lyytinen and Hufenbach 2015). One of the leading appurtenances of mobile commerce is social media. The union of mobile commerce and social media is multifarious and involves different actors such as online retailers, customers, service and content providers and regulators across various business sectors (Wang, Yuan, Ture and Tu 2015). Mobile commerce entails mobile devices, social media and mobile applications (Pelet and Papadopoulou 2015). Kaplan and Haenlein (2010) classified social media into six groups such as social networking sites (Facebook), virtual social worlds (second life), blogs, collaborative projects (Wikipedia), content communities (YouTube) and virtual game worlds (World of Warcraft). In 2009, the estimation of Facebook active users reached 175 million (Kaplan and Haenlein 2010) but according to the Facebook active users real-time counts on the internet in February 2017 the user’s number has soared to 1.8 billion. In the space of eight years between 2009 and 2017, there was an increase of 1.6 billion Facebook active users. This is more than the population of many countries in the world, for example, China, whose population is now 1.3 billion. This implies justifications of fusing mobile commerce with social media because of its capability to hold a large online community. The sudden surge of Facebook active users is an interesting insight for mobile commerce vendors to capitalize on for customer’s engagement, sales conversation and profit making. Some authors have impacted the body of knowledge in the context of mobile commerce in Nigeria (Inegbedion, Obadiaru, and Bello 2016, George, Ogunkoya, Lasisi and Elumah (2015) and social media as a separate research domain (Chiluwa and Adegoke 2013, Carter, 2014) but the fusion of mobile commerce and social media needs more study especially in the developing nations. Pournarakis, Sotiropoulos and Giaglis (2017) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 447 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Adewale Olaleye, I. Temitayo Sanusi & J. Salo: The Appraisal of Facebook Online Community: An Exposition of Mobile Commerce in Social Media Reviews discovered a gap in social media data collection and analysis and came up with a computational model that combined the strength of topic and sentiment classification to draw out consumer perception on important subjects in social media. On the other hand, Kaplan and Haenlein (2010) endeavoured to clarify the notion about the real meaning of social media in comparison with close concepts like Web 2.0 and User Generated Content and apprise the companies that wish to adopt social media with the major points of advice. Despite the contribution of recent studies (Pelet and Papadopoulou 2015; Makki and Chang 2015; Hew et al. 2016; Tan et al. 2016), there is still need for more academic impact in the research stream of social commerce. The different researches that focused on the topics relating to the union of mobile commerce and social media are rare and statistical reputation in the developing country such as Nigeria actuate further study of mobile social commerce. Studies have fused social media and mobile commerce (Pelet and Papadopoulou, 2015, Tan, Teo, Tan and Yang, 2016). This study seeks to use hybrid approach that combines different methodology and data analysis techniques. We used netnography, a form of online participant-observational technique (Kozinets, 2010). The study also employed sentiment analysis for mobile commerce Facebook followers’ opinions, sentiments, evaluations, appraisals, attitudes, and emotions towards entities such as products and services (Bing, 2012). This paper is guided by a general objective to analyse the interwovenness of mobile commerce and social media with these specific objectives: (1) to state the importance of social media in online shopping, (2) to analyse online Facebook reviews, sentiment and examine customer service (3) to develop an explanatory theory that associates mobile commerce with social media. Theoretical Framework Appraisal theory claims that people evaluate the personal meaning of an exciting event or events before emotional responses are generated (Cherng and Timmy, 2015). The appraisal theory of emotion has been used to examine the relationships between appraisals, consumption emotions and post-consumption behaviors (Bougie et al., 2003; Nyer, 1997; Soscia, 2007). The form and emergence of emotions depend on cognitive appraisal process which are their byproducts (Bagozzi et al., 1999; Lazarus and Lazarus, 1994). Bloom (2011), said the theory of appraisal shift sentiments classification further and considers the assessment expression as a basic grammatical unit by which an opinion is expressed. Opinion are classified in previous studies mainly to their polarity as positive, negative or neutral besides which appraisal expressions covers additional attributes of opinions that extend the core description of the expressed opinion (Šimko and Korenek, 2014). The basic attributes attitude, which are engagement and graduation are complementary with polarity/orientation (Martin and White, 2005). The identified attributes of appraisal theory are: 448 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Adewale Olaleye, I. Temitayo Sanusi & J. Salo: The Appraisal of Facebook Online Community: An Exposition of Mobile Commerce in Social Media Reviews Attitude – Attitude is the essence of emotion the appraiser conveys about the product or services. It is about a talk on how it affects the appraiser’s feeling such as anger, fear, jealousy, excitement, hostility, satisfaction or appreciation. Emotions or attitudes that can be expressed in appraisal groups, such as: “It’s such a wonderful day!”. In more formal contexts such as news articles, expressions such as “This policy will not work” are considered appraisal groups conveying attitude. Graduation – Graduation refers to the strength or force of emotion and attitude in each appraisal group. Adverbs such as “fairly” or “soulfully” indicate graduation. Words used to express attitude can also contain an indication of graduation, for example, “dislike” versus “detest”. Engagement – Sentiment can be expressed directly or indirectly, or attributed to another source. Engagement is the way speakers or writers express appraisal or engage in the argument. The engagement is monoglossic if the speaker/writer has directly expressed the appraisal, e.g. “The President has no idea what he is talking about”. It is heteroglossic if the speaker/writer has either attributed to another source or has tried to use other methods to prove the point or make it more credible, for example, “Data from previous studies show there is little hope that his strategy will work” (Christopher, Khoo and Jin- Cheon, 2012). Orientation – It recognizes if a term is positive or negative. Some studies refer to this attribute as polarity (Pandey and Iver 2009). In contrast, the polarity attribute represents the fact that a sentimental term can be unmarked or marked. That means that the term “orientation" can be influenced by an expression that negates the meaning of the phrase or a sentence. If a term contains such a negation (not, never), it is labelled as marked. According to Šimko and Korenek (2014), the main advantage of using the appraisal theory in sentiment classification is that it helps to take a look deeper inside the mind of authors who wrote texts and find out their real meaning using linguistic and psychological analysis of their texts. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 449 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Adewale Olaleye, I. Temitayo Sanusi & J. Salo: The Appraisal of Facebook Online Community: An Exposition of Mobile Commerce in Social Media Reviews Figure 1: Social Commerce Model Methodology The growth of technology most especially in the area of social media is aiding the researchers to adopt different research methodology. This paper seeks to use a hybrid approach that combines different methodology and data analysis techniques such as entity and aspect-level sentiment, manual techniques, data mining, text mining and netnography to overcome some of the problems that existing researchers had identified concerning sentiment analysis of social media in their studies. Some of the authors have identified the problem of using slangs, disjointed words, incomplete phrase or sentence and buzz words that lack proper understanding and meaning. Kozinets (2010, p.1) defined netnography as “a form of ethnographic research, adopting the participant-observational approach and taking online interactions as its fieldwork”. Netnography preponderates tourism research stream (Wu and Pearce 2014), but Kozinets (2015) recommends Netnography methodology to researchers that work with social media and other online platforms. The study followed five-stage outlines mapped out by Kozinets (2010) to extract data from electronic commerce Facebook online community as a participant-observer. We planned the data collection, the extraction and the coding to get insight from the data. One of the authors represented himself on the e-commerce Facebook online community as an observer, and we extracted the data with NCapture, a browser plug-in that allows us to capture the data of e-commerce product and service reviewers. We opted for 450 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Adewale Olaleye, I. Temitayo Sanusi & J. Salo: The Appraisal of Facebook Online Community: An Exposition of Mobile Commerce in Social Media Reviews NCapture among others because of its file transfer compatibility with NVivo 11 Plus that we adopted for data coding. For this study, we used NVivo 11 Plus for e-commerce merchants’ classifications and aspect-level sentiment analysis with observance of relevant ethical issues. We also used NVivo 11 Plus for data, text mining and complement it with LikeAlyzer, an online Facebook analysis tool to calculate the Facebook online community engagement rate based on the following formula: p/l = E. P: represent People Talk About This (PTAT – Facebook Followers), L: depicts Likes (Facebook Fans) while E: equals Engagement Rate (Tables 1, 2 and 3 illustrate the engagement rate of 10 General Ecommerce Merchant Retailers, 15 Specialty Retailers and 8 Agency Retailers respectively). Sentiment Data Analysis The emergence of the social media has turned things around in mobile commerce. In social media, retailers can only measure their Return on Investment (ROI) through advertisement in form of sales but to appraise the sold-out products and services rendered to the customers, is a bit challenging. Through online reviews and posts on social media like Facebook, it is easy for online community members to learn from one another, state their experience, express their opinion and synchronise cultures. We adopted five steps process posited for sentiment analysis from the work of Nikumbh, Nikumbh and Gaikwad, (2016). We skipped data collection and text preparation postulated by Nikumbh et al. (2016) because we had earlier used Netnography approach but we used NVivo with manual techniques for sentiment detection, sentiment classification and output presentation. We exported data extracted with NCapture to the NVivo which consists 15,790 General Merchants Retailers reviews, 1,559 Specialty Retailers reviews and only 256 Agency Retailers reviews. All together for 33 electronic merchants in Nigeria, we had 17,605 Facebook reviews. We used the word query to analyse the most frequent one thousand words. The result gave us a clue to the keywords that are necessary for coding to discover emerging themes from the data. We also performed word frequency clustering analysis for the General Merchant Retailers, Specialty Retailers and Agency Retailers (See figure 2 for thematic analysis in details). 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 451 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Adewale Olaleye, I. Temitayo Sanusi & J. Salo: The Appraisal of Facebook Online Community: An Exposition of Mobile Commerce in Social Media Reviews Figure 2: NVivo 11 Plus Thematic Analysis We performed Jaccard similarity coefficient analysis between positive and negative review of Facebook online community reviews for e-commerce products and services. We performed Jaccard statistic test with NVivo 11 Plus to compare the similarity and diversity of positive and negative online community sample. If the sets data result would be 100% similar, it means the closer to 100% signify the intensity of the similarity, and in comparison, 80% will be more similar than 70%. NVivo generates Jaccard’s coefficient result of 0.038961 based on 7235 positive and 1783 negative references. We multiplied the result by 100, and it gives us 4%. The word similarity of positive and negative reviews is 4%. To get the dissimilarity of the positive and negative review, we subtract the Jaccard index from 100% (100-4 = 96%). The Jaccard distance between the positive and negative reviews is 96%. 4.1 Facebook Online Community Engagement Rate The tables below show the mobile commerce engagement rate on Facebook online community in Nigeria. 452 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Adewale Olaleye, I. Temitayo Sanusi & J. Salo: The Appraisal of Facebook Online Community: An Exposition of Mobile Commerce in Social Media Reviews Table 1: General Merchant Retailer No. Page (Status) Likes PTAT ER Like Rank 1. Shoprite 1,192,581 10,191 0.85% 77 2. Konga 1,521,848 3,538 0.23% 64 3. Jumia 6,841,120 31,743 0.46% 74 4. Yudala 16,975 360 2.12% 61 5 Katadeals 840 675 80.36% 82 6 Gloo 27,199 12 0.04% 59 7 Payporte 262,786 33,823 12.87% 86 8 Spar 38,078 755 1.98% 53 Table 2: Specialty Retailer No. Page (Status) Likes PTAT ER Like Rank 1. Atunnise 496 1 0.2% 15 2. Ajebomarket 68,206 209 0.31% 50 3. Ohmashoes 7,336 888 12.1% 77 4. Coliseum 70,053 176 0.25% 39 5. Fashpa 54,510 22 0.04% 38 6. Fastforward 2,427 0 0% 21 7. Jumia Foods 308,024 762 0.25% 53 8. Easyappepite 2,403 2 0.08% 12 9. Mamtus 2,324 5 0.3% 49 10. PCPlant 37,188 96 0.26% 50 11. Slot 284,408 488 0.17% 56 12. Teeday 1,778 2 0.11% 17 13. Shopaholic 9,513 6 0.06% 27 14. Buyright 55,482 29 0.05% 35 15. Shopkudi 13,013 5 0.04% 39 Table 3: Retail Agency No. Page (Status) Likes PTAT ER Like Rank 1. Mystore 56,629 6 0.01% 25 2. PEP 62,445 1,337 2.14% 39 3. Mannastores 23,738 6 0.03% 49 4. MallforAfrica 189,580 4,120 2.17% 73 5. LoyalBonus 5,650 21 0.37% 42 6. Jiji 676,478 120,228 17.77% 80 7. Dealdey 177,518 268 0.15% 46 8. Domestico 11,287 890 7.89% 79 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 453 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Adewale Olaleye, I. Temitayo Sanusi & J. Salo: The Appraisal of Facebook Online Community: An Exposition of Mobile Commerce in Social Media Reviews As shown in the tables 1, 2 and 3 above, the Engagement Rate is calculated by taking the total PTAT (people talking about this) and divide by the total number of ‘likes’. Surveys show that to have success on Facebook, an engagement rate greater than 7% should be met as revealed by Facebook LikeAlyzer tool. In the GMR categorization, it shows that only two of the mobile commerce successfully engaged their customers with 80.36% and 12.87% respectively. All the specialty retailers sampled shows very low engagement with their clients while two of the retail agencies sampled indicated that they recorded success in engaging their customers at 17.77% and 7.89%. This result reveals that generally, most of the Merchants and Vendors do not actually engage their customers. It is very important to note that it is not sufficient to have many ‘likes’ but to have many ‘PTAT’ as well. Many ‘likes’ and low ‘PTAT’ yields a very low engagement rate as seen for example in Shoprite, Jumia and Konga. Recording a high or low ‘PTAT’ and a corresponding number of ‘likes’ will yield a very high engagement rate as evidenced in Katadeals, Payporte and Jiji. It is not enough to have millions of ‘likes’ on the Facebook platforms of mobile commerce while ‘PTAT’ is very low as it is crucial for a successful engagement rate with customers. Our results, based on sentiments detection from the reviews on the e-commerce merchant social media platform (Facebook) are classified under four headings. These are: views on Products and Services, Online Discussion, Merchant’s Response and Online Community Benefits. These classifications identified the attributes of appraisal which include attitude, graduation, engagement and polarity. All these constructs are interlinking in the expressed opinions of consumers on products or services. 4.2 Product and Service Sentiment The analysis starts by investigating polarity, which is useful for determining the overall sentiment orientation or bias of a document or person towards an object or services. Consumers shared their views on products such as electronics, computers, mobile phones, clothing and food items. We extracted the reviews of product and services from the Facebook page of mobile commerce platforms. The excerpts below depict the mind of the reviewers: Positive: I love GMR (FS, Male, Lagos, January 16. 2017) I like RA stores (UAO, Female, Owerri, January 26, 2017) Negative: GMR is selling products that are of low standard, inferior and low quality because I bought a 32-inch Sharp TV and after two weeks the TV couldn't power on. (FP, Male, Lagos, January 4, 2017). Neutral: I have never had any issues with GMR… (AA, Male, Lagos, January 4, 2017). People have been talking about GMR but I never patronize them (IBF, Male, Abeokuta, November 24, 2016). 454 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Adewale Olaleye, I. Temitayo Sanusi & J. Salo: The Appraisal of Facebook Online Community: An Exposition of Mobile Commerce in Social Media Reviews Polarity: The delivery is awesome but, 800 naira is too much within Lagos, I ordered for 6 different items, and they charge me 800 naira for each, which is very bad (AS, Male, Lagos, November 20, 2016). I enjoyed the Lenovo tab I bought from them just that it doesn't have flash so painful (BIR, Female, Ilorin, November 15, 2015). The above quotes from the online shoppers depict their experience and show their positive, negative, neutral and polarity comments on products and services rendered to them by the General Merchant Retailers and Retails Agency. 4.3 Online Discussion The most discussed topic that generated contributions from consumers on the e- commerce platforms as identified are price, product order, customer services, delivery time, product quality, shopping experience, shipping, return items, store location. This is evidenced in figure 2 above. The excerpts below express the mind of the reviewers: Price: how can your price of shipping be more than the goods or items being Bought…If you keep going like this, it will get to a stage where no one will buy anything from GMR (NI, Female, Kano, September 8, 2016). Product Order: Very poor. You place an order and never get a response. If a large company like Amazon with millions of daily orders can easily manage them, why can't… (BA, Male, Lagos, January 9, 2016). Customer Services: The attitude of your rep AO is appalling. He is rude, arrogant and treat customers call with disdain. Please I need my order-xxxxxxxxx delivered tomorrow unfailingly (AMA, Male, Lagos, December 6, 2016). Delivery Time: Customer care was wonderful. GMR especially could work on their delivery time too (JD, Male, Port Harcourt, July 15, 2016). Product Quality: …GMR selling products that are of low standard, inferior and low in quality. (FP, Male, Lagos, January 4, 2017). Shopping Experience: …I have a very terrible experience with SR in Abuja. If they offer you warranty or screen insurance, beware and run for your pocket (OO, Male, Abuja, November 1, 2016), Shipping: GMR started well. I lost confidence in their products after they shipped me fake LG microwave and Havell toaster…(SN, Male, Nasarawa, November 13, 2015). 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 455 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Adewale Olaleye, I. Temitayo Sanusi & J. Salo: The Appraisal of Facebook Online Community: An Exposition of Mobile Commerce in Social Media Reviews Return Items: I bought two short from RA for my baby at their store in Akure but was too small for him. Please can I return it for exchange (OAI, Female, Ekiti, December 27,2015). Store Location: I haven't Patronize RA so I don't know what to say about them (JM, Female, Lagos, May 12, 2016). The expression as seen in price shows the engagement aspect of appraisal with the statement being attributed to another source which shows heteroglossic engagement. In product order, the statement “very poor” shows negative polarity as the next sentence is attitudinal, and further statement expressed heteroglossic engagement. Consumer service review depicts attitude as well as negative like product quality review. For delivery time, the reviewer express graduation with the word “wonderful” used and the review for shopping experience shows negativity and heteroglossic engagement aspect of appraisal. Under shipping, the statement is categorized as polarity reviews made under the return items, and store location is neutral. 4.4 Online Community Benefits The authors deduced certain advantages for the mobile shoppers as evidenced from their Facebook page reviews under the headings of enlightenment, opportunity, involution and co-creation. Enlightenment: How To Make A Teddy Bear Out Of A Towel (RA, January 30, 2017). Lovely. I will try to make one for my grandchildren. Practice makes perfect (CO, Female, Lagos, January 31, 2017). Opportunity: Business opportunity! We are currently Leading an Expansion of a global fuel company and we are competing against the Trillions in Revenue … (OD, Male, Lagos, May 29, 2014). Involution: DO NOT SHOP ON GMR!! Product Quality always totally different from description their coupon doesn't work either they still charge the same amount even after using the coupon...crap!!! Don’t do it please! (AA, Male, Lagos, January 4, 2017). Culture: This include language, cuisine, music, artefact and dressing. The cultural display shows the interplay of various culture represented on the platform due to ethnic diversity of Nigerian states. Co-creation: To maximize customers experience, SR should incorporate a 'trade-in' program. I have a good idea on how this can double the current turnover of SR business. Reach me via 080XXXXXXXX or xxxx@aol.com in case the business is interested in this idea (IA, Male, Iwo, July 13, 2014). 456 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Adewale Olaleye, I. Temitayo Sanusi & J. Salo: The Appraisal of Facebook Online Community: An Exposition of Mobile Commerce in Social Media Reviews Enlightenment as a benefit brings about passing knowledge about something to others. This is shown in the statements made by the reviewers under enlightenment, teaching others how to do new things. Customers advertises, exchange ideas and present business opportunities for other customers alike. 4.5 Merchant’s Response The merchant response is very important for whatever brand to communicate, engage the customers or consumers and redeem the image or solve issues relating to patronage and many more. Some of the excerpts below are from merchant responses to comments on their products and services. So sorry for this experience. Sadly, the item delivered is the item ordered. Since the seal has been broken, we'll be unable to retrieve the item. An agent has been assigned to contact you regarding this. Thank you (GMR Representative, December 21, 2016). We're delighted to receive your feedback and are super glad that you enjoyed our service. (GMR Representative, December 30, 2016). Thank you for your kind words VO, quite appreciated. Please spread the word... And we welcome referrals… (SR Representative, April 2, 2015). The first response given above represent the attitude and the information passed as evident in the merchant comment reveals that the terms and condition of the agency is not known by the consumers as alluded to in the comment. The other responses received encouraging feedbacks about their product and services and they appreciated them. Going by the reviews generally, the rate of reply of the merchant to the reviewers is slow as there are complaints about response rate. It seems there is no personnel designated to answer the queries of customers. Conclusion and Implication Despite the prevalence of e-commerce, mobile commerce and social media as an interwoven study in diver disciplines (Huang and Benyoucef 2015), it is noted that few scholars in the field of electronic marketing have fully explored the connectedness of mobile commerce and social media for customers’ service improvement. This study applies the hybrid technique to sort out social commerce customers’ reviews, appraise the quality of the extracted data and identify the opinion that transpired between online retailing merchants and online customers. The unicity of this study lies in the accessibility of large dataset of online multiculturalism douse with emotion. Although this study is an overture of social commerce in the context of developing countries such as Nigeria, we are able to gain insight into the sentiment of online shopping. Due to this development, it is viewed that this study will set a pace for online shopping customer engagement through social media in electronic marketing. It makes this study one of the foremost in 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 457 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Adewale Olaleye, I. Temitayo Sanusi & J. Salo: The Appraisal of Facebook Online Community: An Exposition of Mobile Commerce in Social Media Reviews Nigeria. Our study contributes to the literature of electronic marketing in several ways. This study demonstrated the importance of social media in e-commerce in a new way by identifying the benefits of online community reviews and exhibited reviewers’ emotions. Though our findings were based on Facebook data generated from 2014 to 2017, the result reflects how online shopping experiences ensued emotion in Facebook Commerce reviews. The study reveals the intensity of positive, negative, neutral and polarity sentiments. This study furthermore emphasized the explanatory power of theory for the union of mobile commerce and social media. The appraisal theory used for the pairing of mobile commerce and social media explain how attitude and graduation connect engagement in the context of products and services review. The equilibrium of mobile commerce and Facebook social media stands to improve customer service. Some managerial implications were offered as it advocates the significance of social media in mobile commerce to the electronic marketing practitioners due to its vastness. Many online consumers have turned Facebook into their second home, and it will be easy for the mobile commerce merchants to reach them for feedback in real-time. The study also emphasizes the importance of Facebook followers and clarify the differences between the Facebook ‘likes’ and ‘PTAT’ as the determinant of customer’s online engagement. The engagement rate is one of the useful metrics for Merchants that uses Facebook online reviews. This study is not without limitations, and its explanation should be treaded carefully. It is a common argument that social media data validity is not a clean-cut (He et al. 2014, Panger 2016) but (Rife et al. 2016) recommends heterogeneous Facebook users and generalized result as a standard for online data validity. Rife et al. (2016), testify to the viability of Facebook data over traditional samples. Demographic data is hard to extract, but we limit the quotes to the reviewers that make their name, sex, domicile available on their Facebook page. There were more positive reviews (80%) than the negative (20%), the neutral and polarity were scanty. Another limitation was that the sample represents general merchants retailing, specialty retailing and agency retailing and only 33 of the mobile commerce retailers were available for this study. According to Fink et al. (2012), social media is a viable means of getting enriching social and cultural data for studying the developing nations. Future studies should endeavour to examine online reviews of social media such as Twitter, Instagram, Google+ and Pinterest regarding mobile commerce as a comparative study. References Asemah, E. S., Okpanachi, A. O, Edegoh, L. O. N. (2013). Influence of Social Media on the Academic Performance of the Undergraduate Students of Kogi State University, Anyigba, Nigeria. Research on Humanities and Social Sciences, 3(12), 90-96. Bagozzi, R.P., Gopinath, M. and Nyer, P.U. (1999). “The role of emotions in marketing”, Journal of the Academy of Marketing Science, 27(2), 184-206. Bloom, K. (2011). Sentiment analysis based on appraisal theory and functional local grammars. Dissertation thesis, Illinois Institute of Technology. Available online: https://www.scss.tcd.ie/khurshid.ahmad/Research/bloom_dissertation.pdf. Accessed May 2nd, 2017. 458 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Adewale Olaleye, I. Temitayo Sanusi & J. Salo: The Appraisal of Facebook Online Community: An Exposition of Mobile Commerce in Social Media Reviews Bougie, R., Pieters, R. and Zeelenberg, M. (2003). “Angry customers don’t come back, they get back: the experience and behavioral implications of anger and dissatisfaction in services”, Journal of the Academy of Marketing Science, 31(4), 377-393. Carter, M. (2014). How Twitter may have helped Nigeria contain Ebola. BMJ: British Medical Journal (Online), 349. Ding, C. G., & Tseng, T. H. (2015). On the relationships among brand experience, hedonic emotions, and brand equity. European Journal of Marketing, 49(7/8), 994-1015. Chiluwa, I and Adegoke, A. (2013). Twittering the Boko Haram Uprising in Nigeria: Investigating Pragmatic Acts in the Social Media. Africa Today, 59(3), 82-102. Soo-Guan Khoo, C., Nourbakhsh, A., & Na, J. C. (2012). Sentiment analysis of online news text: a case study of appraisal theory. Online Information Review, 36(6), 858-878. Ezeani, C.N. and Igwesi, U. (2012). Using Social Media for Dynamic Library Service Delivery: The Nigeria Experience. Library Philosophy and Practice (e-journal), 1-8. Fink C., Kopecky J., Bos N., Thomas M. (2012). Mapping the Twitterverse in the Developing World: An Analysis of Social Media Use in Nigeria. In: Yang S.J., Greenberg A.M., Endsley M. (eds) Social Computing, Behavioral - Cultural Modeling and Prediction. SBP 2012. Lecture Notes in Computer Science, vol 7227. Springer, Berlin, Heidelberg. Fornacciari, P., Mordonini, M and Tomaiuolo, M. (2015). A Case-Study for Sentiment Analysis on Twitter. In Proceedings of the 16th Workshop “From Object to Agents” (WOA15) June 17- 19, Naples, Italy. George, O. J., Ogunkoya O.A., Lasisi J.O. and Elumah L.O. (2015). Risk and Trust in Online Shopping: Experience from Nigeria. Risk, International Journal of African and Asian Studies, 11, 71-77. He, Q., Glas, C. A., Kosinski, M., Stillwell, D. J., & Veldkamp, B. P. (2014). Predicting self- monitoring skills using textual posts on Facebook. Computers in human behavior, 33, 69-78. Hew, J., Lee, V., Ooi, K., & Lin, B. (2016). Mobile social commerce: The booster for brand loyalty? Computers in Human Behavior, 59, 142-154. Huang Z. & Benyoucef, M. (2015). User preferences of social features on social commerce websites: An empirical study. Technological Forecasting & Social Change 95, 57–72. Ifukor, P. (2010). Elections or Selections? Blogging and Twittering the Nigerian 2007 General Elections. Bulletin of Science, Technology, and Society 30(6), 398–414. Inegbedion, H. E., Obadiaru, D. E., & Bello, V. D. (2016). Factors that Influence Consumers’ Attitudes toward Internet Buying in Nigeria. Journal of Internet Commerce, 15(4), 353-375. Internet World Stats (2017). Africa 2017 Population and Internet Users Statistics. Available online: http://www.internetworldstats.com/stats1.htm. Accessed May 2nd, 2017. Kaplan, A. M., & Haenlein, M. (2010). Users of the world, unite! the challenges and opportunities of social media. Business Horizons, 53(1), 59-68. Kozinets, R. V. (2010). Netnography: Doing ethnographic research online. Sage publications. Kozinets, R. V. (2015). Netnography. John Wiley & Sons, Inc. Lazarus, R.S. and Lazarus, B.N. (1994). Passion and Reason: Making Sense of Our Emotions, Oxford University Press, New York, NY. Makki, E., & Chang, L. (2015). Understanding the effects of social media and mobile usage on E- commerce: An exploratory study in Saudi Arabia. International Management Review, 11(2), 98. Martin, J.R., & White, P.R.R. (2005). The Language of Evaluation: Appraisal in English. Palgrave Macmillan, London. Nikumbh, U., Nikumbh, P. & Gaikwad, B. (2016). Sentiment Analysis: On Product Review. International Journal for Research in Engineering Application & Management (IJREAM), 2(2), 1-5. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 459 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Adewale Olaleye, I. Temitayo Sanusi & J. Salo: The Appraisal of Facebook Online Community: An Exposition of Mobile Commerce in Social Media Reviews Nnanyelugo, O and Nwafor, K. A. (2013). Social Media and Political Participation in Nigeria During the 2011 General Elections: The Lapses and the Lessons. Global Journal of Arts Humanities and Social Sciences, 1(3), 29-46. Nwokpoku, J. (2015). How mobile commerce redefines online retail in Nigeria. Available online: http://www.vanguardngr.com/2015/08/How-mobile-commerce-redefines-online-retail-in- Nigeria/. Access May 2nd, 2017. Nyer, P.U. (1997). “A study of the relationships between cognitive appraisals and consumption emotions”, Journal of the Academy of Marketing Science, 25(4), 296-304. Pandey. V., Iver, C. (2009). Sentiment analysis of microblogs. Available online: http://www.stanford.edu/class/cs229/proj2009/PandeyIyer.pdf. Accessed February 12th, 2017. Panger, G. (2016). Reassessing the Facebook experiment: critical thinking about the validity of Big Data research. Information, Communication & Society, 19(8), 1108-1126. Pelet, J-E. and Papadopoulou, P. (2015) ‘Social media and m-commerce’, Int. J. Internet Marketing and Advertising, 9(1), 66–84. Pournarakis, D. E., Sotiropoulos, D. N., & Giaglis, G. M. (2017). A computational model for mining consumer perceptions in social media. Decision Support Systems, 93, 98-110. Pousttchi, K., Tilson, D., Lyytinen, K., & Hufenbach, Y. (2015). Introduction to the Special Issue on Mobile Commerce: Mobile Commerce Research Yesterday, Today, Tomorrow—What Remains to be done? International Journal of Electronic Commerce, 19(4), 1-20. Rife, S. C., Cate, K. L., Kosinski, M., & Stillwell, D. (2016). Participant recruitment and data collection through Facebook: The role of personality factors. International Journal of Social Research Methodology, 19(1), 69-83. Korenek, P., & Šimko, M. (2014). Sentiment analysis on microblog utilizing appraisal theory. World Wide Web, 17(4), 847-867. Soscia, I. (2007), “Gratitude, delight, or guilt: the role of emotions in predicting post consumption behaviors”, Psychology and Marketing, 24(10), 871-894. Tan, W., Teo, H., Tan, C., & Yang, Y. (2016). The social dimension of mobile Commerce– Engaging customers through group purchase. In proceedings of the 3rd International Conference on HCI in Business, Government and Organizations, July 17 – 22, Toronto, Canada. Wang, Y., Yuan, Y., Turel, O., & Tu, Z. (2015). Understanding the development and diffusion of mobile commerce technologies in china: A biographical study with an actor-network theory perspective. International Journal of Electronic Commerce, 19(4), 47-76. 460 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Coupons from Deal Sites as Gifts: Impact of Gender, of Age, and of Personality Traits 32 ANTONIN PAVLICEK & FRANTISEK SUDZINA Abstract There already exist studies on what influences use of deal sites. But there is a gap in literature when it comes to purchasing coupons from deal sites and then using them as gifts. The paper analyzes whether gender, age and personality traits influence such behavior. Big Five Inventory traits and narcissism were used. The impact of age was significant. Significance of agreeableness and of narcissism were somewhat above cutoff value 0.05, therefore borderline significant. All of them have positive effect. Keywords: • Deal Sites • Gifts • Personality Traits • Empirical Research • CORRESPONDENCE ADDRESS: Antonin Pavlicek, University of Economics, Faculty of Informatics and Statistics, Department of System Analysis, Winstona Churchilla 1938/4, 130 67 Praha 3, Czech Republic, e-mail: antonin.pavlicek@vse.cz. Frantisek Sudzina, Aalborg University, Faculty of Social Sciences, Department of Business and Management, Fibigerstraede 5, 9220 Aalborg East Denmark, sudzina@business.aau.dk. https://doi.org/10.18690/978-961-286-043-1.32 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 462 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pavlicek & F. Sudzina: Coupons from Deal Sites as Gifts: Impact of Gender, of Age, and of Personality Traits Introduction Deal sites, also referred to as Group Buying Websites, are a well established trend in on- line commerce to get a better price by volume discount. Original idea behind a deal site is to group consumers together forcing the merchants to offer wholesale prices to these groups. Merchants sell products and services at significantly reduced prices, usually 40% off or more, on the condition that a minimum number of buyers would make the purchase. When the minimum number of orders is reached, the deal becomes activated and all the customers that signed up for the deal become eligible to purchase. If the minimum number of orders is not reached within agreed time period, usually 1 - 7 days, then the deal is cancelled. Group buying promotions can generate a large number of sales in a short period of time thanks to the viral nature of this promotion, often promoted on social networking sites. Merchant’s sales can be boosted by the order of hundreds to thousands of orders in a single day/week. Because deal sites take up to 40 % of the price, the merchant is only making slight margin, sometimes even sustaining short-term loss for the following reasons (Drossos et al., 2015): Cash flow boost Payments for vouchers are processed within short period after the deal is closed so the merchant receives a quick boost in cash flow. Effective advertising Daily deals promoted by group buying websites are fairly inexpensive and they are much more effective at generating real sales rather than just increasing brand awareness. New customers Deal sites are able to attract new clients by offering large discounts that get the first-time customer in the door, although retention of such price sensitive clients can be problem. Groupon is possibly the most well-known deal site. From a business model perspective, it can be classified as affinity club (Johnson, 2010), round-up buyers (like Linder and Cantrell's (2000) buying club), and trade show (like Timmers' (1998) third-party marketplace) in the framework compiled by Taran et al. (2016). In spite of Groupon being the so well-known, group-buying is not the main, nor the mandatory feature of deal sites. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 463 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pavlicek & F. Sudzina: Coupons from Deal Sites as Gifts: Impact of Gender, of Age, and of Personality Traits 1.1 Deal sites in the Czech Republic Deal sites have been present in the Czech Republic since 2009. They gained general popularity in 2010 with the advent of the company Slevomat.cz, the leader of the Czech market, whose name became synonym with group shopping in the Czech Republic. By 2015, the Czech market was reaching an annual growth of 50%, however in the past two years, the market has achieved its growth limits, global market turnover has stabilized and there has been dramatic reduction of the number of firms. In the market, there currently operates 45 active deal sites, top 5 of which control 90% of the market share, leader (slevomat.cz) dominates with 40 %. In August 2011, when the number of companies reached was the highest, there were 204 registered servers (4 times more than today). Czech market cleared and since 2015, there has been a period of consolidation in positions and brands. Slevomat.cz - in 2015 had a turnover of more than CZK 1.2 billion, which is almost a billion more than the rest; deal sites Pepa.cz, Vykupto.cz, Nákupvakci.cz, Hyperslevy.cz have revenues ranging up to around CZK 300 million. Additional figures are provided in Table 1. Table 1: Top Czech deal sites, data from companies’ annual reports Revenue Revenue Employees 2017 Page visits 2012 (mil 2015 (mil daily CZK) CZK) 2017 Slevomat.cz 758 1.200 160 200.000 Vykupto.cz 320 300 35 33.000 Zapakatel.cz 260 Bankruptcy 6/2014 Hyperslevy.cz 159 300 40 30.000 Pepa.cz 138 300 43 66.000 Nakupvakci.cz 102 Bankruptcy 12/2016 Slevoteka.cz 60 105 10 130.000 During the consolidation of the market, there were couple of merges of smaller companies, as well as bankruptcies of a relatively large players (Kouzelnydeda.cz, Zapakatel.cz, Nakupvakci.cz). Discount coupons are still the fourth most common product sold on the Czech e- commerce, the most popular commodities are: Food, Fashion, Things to Do, Health and Fitness (Weight Loss), Travel, Skin Care, Massage, Beauty, Wellness, Education (language courses). 464 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pavlicek & F. Sudzina: Coupons from Deal Sites as Gifts: Impact of Gender, of Age, and of Personality Traits Slevomat.cz is the clear leader among Czech deal sites. It offers the widest range of experiential services such as adrenalin and cultural events, gastronomy and weekend stays. Slevomat stopped selling fashion goods, they focus on services with higher value, especially with the advent of shopping via mobile phone. The portal also provides assurance (in the event of a problem customer gets the money back) to its customers, since in the competitive market, it is crucial to guarantee satisfaction. 1.2 Literature review To the best of authors' knowledge impact of personality traits on gift giving specifically linked to deal sites has not been investigated yet. The literature search has brought only couple of journal articles and a few conference papers investigating gift giving in general. Personality trait can be defined as habitual patterns of behavior, thought, and emotion (Kassin, 2003). Traits are relatively stable over time, differ across individuals (e.g. some people are shy, whereas others outgoing), and influence behavior. Traits are in contrast to states which are more transitory dispositions. Agreeableness is a personality trait manifesting itself mainly in such behavioral characteristics that are generally perceived as kind, cooperative, sympathetic, warm and/or considerate. Narcissism could be defined as the pursuit of gratification from vanity or egotistic admiration. There is a published study of relational signaling over recipient preferences in their gift choices (Ward and Broniarczyk, 2016), which point out, that givers balance their goal to please recipients with gifts that match recipient references against their own goal to signal relational closeness with gifts that demonstrate their knowledge of the recipient. Close givers’ divergence from the gift-registry is not the result of their altruistic search for a “better” gift but is a strategic effort to express relational signals: it occurs only when givers will receive attribution for their choice. Same authors in 2013 also point out, that gift giving creates giver identity threat as a function of social closeness (Ward and Broniarczyk, 2013). They established, that gift giving, in which individuals may make product choices that run counter to their own identities in order to fulfil the desires of the intended recipient. Purchasing an identity- contrary gift for a close (vs. distant) friend who is an integral part of the self can itself cause an identity threat to the giver, who subsequently engage in behaviors that reestablish his identity such as indicating greater identity affiliation with the threatened identity and greater likelihood to purchase identity-expressive products. The role of narcissism, self-esteem and gift giving was discussed by (Hyun et al., 2016) in their exploratory study that identifies romantic gift-giving motivations and examined these motivations in relations to the two personality constructs. A factor analysis found three motivations for romantic gift giving: intrinsic, maintenance, and power motivation. When self-esteem, age, and sex were controlled, narcissism was positively related to maintenance motivation in the past, and maintenance and power motivation in the future. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 465 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pavlicek & F. Sudzina: Coupons from Deal Sites as Gifts: Impact of Gender, of Age, and of Personality Traits Self-esteem was negatively related to power motivation in the past and maintenance motivation in the future, controlling for narcissism, age, and sex. An exploration of influences on attitudes to giving and receiving gifts (Perryer and Tsahuridu, 2013) reports the results of a study that examined the influence of organisational level and education on attitudes towards giving and receiving gifts in exchange for preferential treatment in three cultural groups. Analysis of the data using hierarchical regression revealed that after controlling for age, gender, cultural background, business sector and years of service, respondents' organizational level and education positively influence attitudes to accepting gifts, while only education influences attitudes to giving gifts. Contributions to gift-giving theory from an identity-stripping context (Klein et al., 2015) measured by the Identity-Based Motivation (IBM) model to examine gift giving within the identity-stripping context of Nazi concentration camps, as reported in the memoirs of Holocaust survivors is a bit extreme example of gift-giving oriented scientific paper. By exploring gift giving in this crisis-laden context, authors demonstrate the fundamental role gifts can play in re-establishing personal and social identities and provide insights into the motivations for giving that go beyond the existing paradigms that emphasize social exchange, economic exchange, or agapic giving. The role of adolescents' gift giving in managing their impressions among their peers (Segev et al., 2012) examines adolescents' gift giving using a qualitative methodology, based on impression management theory. Gift-giving motives and the characteristics of the chosen gifts indicated that adolescents use gift giving instrumentally to manage and protect their impressions among their peers. The research provides evidence regarding different types of gifts such as joint, neutral, and twofold gifts. While research on self-gift consumer behavior has shown evidence of the importance of this behavior in Western cultures, there is no understanding of self-gift giving in collectivist cultures. Tynan et al. (2010). used personal interviews to establish the existence of self-gifting in China, and further to compare motivations for and the emotions associated with it. Their findings indicate that self-gifting is less self-oriented for the Chinese than for the British. Gittell and Tebaldi (2006) found that charitable giving by households in the United States is significant. They estimate, that private giving represents more than 2 % of total gross domestic product and is a significant factor in funding the nonprofit sector. Their research adds detailed data and analysis supporting and supplementing research that identifies personal income, capital gains, religious group affiliation, age, volunteerism, and educational attainment as the main factors affecting household giving. The aim of our paper, based on the identified gap in the literature, is to analyze impact of gender, age, and personality traits on purchasing coupons from deal sites as gifts. The 466 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pavlicek & F. Sudzina: Coupons from Deal Sites as Gifts: Impact of Gender, of Age, and of Personality Traits rest of the paper is organized in the following way: In the next section, there is a description what data were collected and how, and how they were analyzed. In the following section, results of the analysis are presented. The last section offers conclusions. Data and Methodology The data was collected in December 2016 to January 2017 using an on-line questionnaire. Respondents were 264 university students from the Czech Republic, of which 140 respondents indicated that they use deal sites, and 124 do not. The analysis of use versus non-use of deal sites from this data set was published in (Sudzina and Pavlíček, 2017). SurveyXact was used for the questionnaire. Unlike Qualtrics, it does not allow to show/hide questions based on answers to questions on the same page. Therefore, the questionnaire was split into two pages and questions for deal sites users appeared on the second page. Seven respondents stopped after the first page and one respondent provided random high numbers as answers for multiple open-ended questions, hence this row was excluded from the analysis. So, the effective sample size is 132 (43 men, 89 women; on average 20 years old). On the second page of the on-line questionnaire, there was a question regarding the number of coupons purchased on deal sites as gifts. The distribution of the answer is provided in Figure 1. Since the distribution of the number of gifts is right-skewed, ordinal logistic regression is used for the analysis. SPSS software was used for the analysis. 45 40 35 30 ts 25 nu 20 Co 15 10 5 0 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Coupons purchased Figure 1: Distribution of the number of coupons purchased on deal sites as gifts 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 467 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pavlicek & F. Sudzina: Coupons from Deal Sites as Gifts: Impact of Gender, of Age, and of Personality Traits Personality traits were measured using Rammstedt and John's (2007) Big Five Inventory- 10, i.e. a shortened 10-item version of the Big Five Inventory questionnaire developed by John and Srivastava (1999), and translated to Czech by Hřebíčková et al. (2016). The instruction was to rate "How well do the following statements describe your personality" with statements "I see myself as someone who..." ... is reserved, ... is generally trusting, ... tends to be lazy, ... is relaxed, handles stress well, ... has few artistic interests, ... is outgoing, sociable, ... tends to find fault with others, ... does a thorough job, ... gets nervous easily, ... has an active imagination, on a 1-5 Likert scale where 1 meant strongly disagree and 5 stood for strongly agree. Extraversion was calculated as an average of the 1st (reversed-scored) and the 6th answer, agreeableness as an average of the 2nd and the 7th (reversed-scored) answer, conscientiousness as an average of the 3rd (reversed-scored) and the 8th answer, neuroticism as an average of the 4th (reversed-scored) and the 9th answer, and openness to experience as an average of the 5th (reversed-scored) and the 10th answer. The researchers are aware of the new version of Big Five Inventory - Big Five Inventory- 2 with 60 items (Soto and John, in press a), and of 30-item short and 15-item extra short versions (Soto and John, in press b) but there is no validated translation available yet. Narcissism was measured right after Big Five Inventory-10 using the same instruction, with the statement ... is of narcissistic nature (note: narcissistic means egotistical, self-focused, vain) The statement was adapted from The Single Item Narcissism Scale (SINS) developed and validated by Konrath, Meier and Bushman (2014). They recommend SINS for online studies. The questions related trust issues have been summarized in an article Trust, innovation, prosperity (Szabo et al., 2013). The questionnaire contained additional questions which were not used in the analysis presented in this paper. 468 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pavlicek & F. Sudzina: Coupons from Deal Sites as Gifts: Impact of Gender, of Age, and of Personality Traits Results The research question is whether gender, age, extraversion, agreeableness, conscientiousness, neuroticism, openness to experience, and narcissism influence how many coupon does a user of deal sites buys as gifts. Since the distribution of the number of gifts is right-skewed, ordinal logistic regression is used for the analysis. Ordinal logistic regression results for the full model are provided in Table 2. Cox and Snell R2 is 0.122, Nagelkerke R2 is 0.126, McFadden R2 is 0.35 and p-value is 0.028. Table 2: Ordinal logistic regression 95% Confidence Interval Std. Lower Upper Estimate Error Wald df Sig. Bound Bound [gift = 0] 4.004 1.841 4.731 1 .030 .396 7.613 [gift = 1] 5.075 1.858 7.459 1 .006 1.433 8.717 [gift = 2] 5.910 1.874 9.946 1 .002 2.237 9.584 [gift = 3] 6.678 1.891 12.476 1 .000 2.973 10.384 [gift = 4] 6.864 1.895 13.118 1 .000 3.149 10.578 [gift = 5] 7.830 1.925 16.542 1 .000 4.057 11.603 [gift = 6] 7.966 1.931 17.024 1 .000 4.182 11.750 [gift = 7] 8.122 1.938 17.570 1 .000 4.324 11.919 [gift = 8] 8.304 1.947 18.197 1 .000 4.489 12.119 [gift = 9] 8.506 1.958 18.872 1 .000 4.668 12.344 [gift = 10] 10.149 2.165 21.971 1 .000 5.906 14.393 Age .315 .097 10.414 1 .001 .124 .506 Extraversion -.022 .186 .014 1 .904 -.387 .342 Agreeableness .414 .231 3.207 1 .073 -.039 .868 Conscientiousness .181 .203 .799 1 .371 -.216 .579 Neuroticism .181 .168 1.155 1 .282 -.149 .510 Openness to .095 .187 .261 1 .609 -.271 .461 experience Narcissism .333 .171 3.769 1 .052 -.003 .669 [gender=male] -.299 .386 .601 1 .438 -1.056 .457 The impact of age was significant. Impact of agreeableness and of narcissism were borderline significant. All of them have positive effect – older, agreeable and narcissist people are more likely to use coupons as a gift. Conclusion Purchasing coupons from deal sites and then using them as gifts is significantly influenced by age (impact of agreeableness and of narcissism is borderline significant). 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 469 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pavlicek & F. Sudzina: Coupons from Deal Sites as Gifts: Impact of Gender, of Age, and of Personality Traits Age could be mediated through several variables, e.g. somewhat older people lived longer, so they gave gifts for a longer period; somewhat older may have a better income; somewhat older people may have a better overview what is available on deal sites that their friends could enjoy. In light of the literature mentioned previously, our research is filling the gap in understanding, how the coupons are used in gift-giving mode and which personal traits can be traced to such behavior. As for implications for marketers, there would be problematic recommendation: either to focus coupon campaigns on older clientele with narcissistic inclinations, or controversy focus on the customers, who are empathetic and altruistic. Rammstedt and John (2007) mentioned that the two-item measure of agreeableness does not have as good properties as measures of the remaining four of Big Five Inventory traits. Therefore, in the future research, it may be worth to add a third item, namely "...is considerate and kind to almost everyone." It could possibly improve significance of agreeableness. Now that there is an indication of impact of narcissism on purchasing coupons as gifts, it is justifiable in future research to use more items to measure narcissism, such as Narcissistic Personality Inventory (Raskin and Terry, 1988) which is probably the most widely used measure of the narcissism and contains 40 forced-choice items. If a longer instrument is to be chosen, such as Five-Factor Narcissism Inventory (Glover et al., 2012), which contains 148 items, it may be advisable to select only certain factors. Acknowledgment Paper was processed with contribution of long term support of scientific work on Faculty of Informatics and Statistics, University of Economics, Prague. References Drossos, D. A., Maragoudakis, M. & Kokkinaki, F. (2015). Buying Behavior on Daily-Deal Sites: The Role of Face Value, Product Involvement, Information, and Website Quality. Journal of Internet Commerce. 14 (2), pp. 200–232. Gittell, R. & Tebaldi, E. (2006). Charitable Giving: Factors Influencing Giving in U.S. States. Nonprofit and Voluntary Sector Quarterly. 35 (4), pp. 721–736. Glover, N., Miller, J. D., Lynam, D. R., Crego, C. & Widiger, T. A. (2012). The Five-Factor Narcissism Inventory: A five-factor measure of narcissistic personality traits. Journal of Personality Assessment. 94 (5), pp. 500-512. Hřebíčková, M., Jelínek, M., Blatný, M., Brom, C., Burešová, I., Graf, S., Mejzlíková, T., Vazsonyi, A. T. & Zábrodská, K. (2016). Big Five Inventory: Základní psychometrické charakteristiky české verze BFI-44 a BFI-10. Československá Psychologie. 60 (6), pp. 567- 583. 470 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pavlicek & F. Sudzina: Coupons from Deal Sites as Gifts: Impact of Gender, of Age, and of Personality Traits Hyun, N. K., Park, Y. & Park, S. W. (2016). Narcissism and gift giving: Not every gift is for others. Personality and Individual Differences. 96, pp. 47–51. John, O. P. & Srivastava, S. (1999). The Big Five trait taxonomy: History, measurement, and theoretical perspectives. In Pervin, L. A. and John, O. P. (Eds.), Handbook of personality: Theory and research, 2nd ed. New York, NY: Guilford Press, pp. 102-138. Johnson, M. W. (2010). Seizing the White Space: Business Model Innovation for Growth and Renewal. Boston, MA: Harvard Business School Press. Kassin, S. (2003). Psychology. USA: Prentice-Hall, Inc. Klein, J. G., Lowrey, T.M. & Otnes, C. C. (2015). Identity-based motivations and anticipated reckoning: Contributions to gift-giving theory from an identity-stripping context. Journal of Consumer Psychology (Elsevier Science). 25 (3), pp. 431–448. Konrath, S., Meier, B. P. & Bushman, B. J. (2014). Development and Validation of the Single Item Narcissism Scale (SINS). Plos One, 9 (8). Linder, J. & Cantrell, S. (2000). Changing Business Models: Surfing the Landscape. Cambridge, MA: Accenture Institute for Strategic Change. Perryer, C. & Tsahuridu, E. (2013). An Exploration of Influences on Attitudes to Giving and Receiving Gifts. Asia Pacific Management Review. 18 (3), pp. 345–357. Rammstedt, B. & John, O. P. (2007). Measuring personality in one minute or less: A 10-item short version of the big five inventory in English and German. Journal of Research in Personality. 41 (1), pp. 203-212. Raskin, R. &Terry, H. (1988). A principal-components analysis of the narcissistic personality inventory and further evidence of its construct validity. Journal of Personality and Social Psychology, 54 (5), pp. 890-902. Segev, R., Shoham, A. & Ruvio, A. (2012). What Does this Gift Say about Me, You, and Us? The Role of Adolescents’ Gift Giving in Managing their Impressions among their Peers. Psychology and Marketing. 29 (10), pp. 752–764. Soto, C. J. & John, O. P. (in press a). The next Big Five Inventory (BFI-2): Developing and assessing a hierarchical model with 15 facets to enhance bandwidth, fidelity, and predictive power. Journal of Personality and Social Psychology. Soto, C. J. & John, O. P. (in press b). Short and extra-short forms of the Big Five Inventory–2: The BFI-2-S and BFI-2-XS. Journal of Research in Personality. Sudzina, F. & Pavlíček, A. (2017). Do gender and personality traits influence use of deal sites? A replication. In The 12th International Conference on Strategic Management and its Support by Information Systems, 25-26 May 2017. Ostrava: VŠB-TU Ostrava. Szabo, S., Ferencz, V. & Pucihar, A. (2013). Trust, innovation and prosperity, Quality Innovation Prosperity. 17 (2), pp. 1–8. Taran, Y., Nielsen, C., Montemari, M., Thomsen, P. & Paolone, F. (2016). Business model configurations: a five-V framework to map out potential innovation routes. European Journal of Innovation Management. 19 (4), pp. 492-527. Timmers, P. (1998). Business models for electronic markets. Electronic Markets, 8 (2), pp. 3-8. Tynan, C., Heath, M. T. P., Ennew, C., Wang, F. & Sun, L. (2010). Self-gift giving in China and the UK: Collectivist versus individualist orientations. Journal of Marketing Management. 26 (11–12), pp. 1112–1128. Ward, M. K. & Broniarczyk, S. M. (2016). Ask and You Shall (Not) Receive: Close Friends Prioritize Relational Signaling over Recipient Preferences in Their Gift Choices. Journal of Marketing Research. 53 (6), pp. 1001–1018. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kitt l, P. Ravesteijn, R. Clarke & R. Bons Combining Digitization with Healthcare Service Processes: Value Co-creation Opportunities Through Standard Work 33 KATJA RANTALA & HEIKKI KARJALUOTO Abstract The study explores some implications of digitized healthcare services for value co-creation opportunities and work standardization and introduces DARIO, a value co-creation model of digitized services. The key development is the model’s focus on service processes that emerge through standardized work, providing opportunities for value co-creation. The DARIO model seeks to combine the theory of value co-creation and operations through lean standard work. The digitization of healthcare services is typically discussed from technological, medical science or customer perspectives, but opportunities for professionals to participate or to perform in the value co-creation process are less widely studied. The digitization of healthcare services changes service processes and the professional’s work. As professionals may not automatically adopt new digital services and uncertainty surrounds the related work processes and workloads, managerial support is needed in defining standard work and for training and target setting in implementing digital healthcare services. Keywords: • Healthcare • Digitization • eHealth • Value Co-creation • Lean • Standard Work • CORRESPONDENCE ADDRESS: Katja Rantala, Jyväskylä University School of Business and Economics, Mattilanniemi 2, Building Agora, 40014 University of Jyväskylä, Finland. E-mail: rantakat@gmail.com. Heikki Karjaluoto, Jyväskylä University School of Business and Economics, Mattilanniemi 2, Building Agora, 40014 University of Jyväskylä, Finland, e-mail: heikki.karjaluoto@jyu.fi https://doi.org/10.18690/978-961-286-043-1.33 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 472 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Rantala & H. Karjaluoto: Combining Digitization with Healthcare Service Processes: Value Co-creation Opportunities Through Standard Work Introduction Governments and healthcare organizations in many countries are looking for ways to transform traditional healthcare services and to develop new services within a digital format. There is strong impetus for this development from legislation and government target setting to increase service availability and to deliver those services cost effectively (Moen et al., 2012; Christensen, 2010; OECD, 2013; Martin, 2009). For healthcare organizations with limited resources, the ever-increasing demand for healthcare services and the complexity of customer situations present huge challenges (Hickie et al., 2007; Christensen et al., 2010). Digitization offers new possibilities in meeting these challenges, as more active, empowered customers interact with healthcare professionals (Lerch et al., 2015), requiring the redesign of service processes. Digitization of health care services is typically discussed from a technological, medical science or customer perspective, and the role of the service provider is less widely studied. The present study aims to enhance understanding of how service providers can address issues of service process change through digitization. For value co-creation, the service provider must consider certain risks and seek to enhance identified benefits, which are dynamic rather than static, making the development of digital services more complex. Risks in the health care service process are often linked to issues of quality, which in this sector relates to the fundamental need for security and high standards of care (Black et al., 2011; Dahlgaard et al., 2011). In digital format, risks of quality failure or variation can be said to diminish as the service is standardized and variation can be controlled (Kenney, 2011; Barnas, 2014; Grunden, 2012). Digitization entails a technological approach to customer and service issues, but the managerial dimension must also be considered. The present study contributes to the discussion on digitized healthcare services by highlighting the need for standardization of work processes. The DARIO value co-creation model of digitized services described here is derived from Prahalad and Ramaswamy’s (2004a) value co-creation building blocks. The key development is the model’s focus on service processes implemented through standardized work, providing opportunities for value co-creation. Literature review Healthcare service systems are transforming rapidly to become more customer-focused, shifting from value proposals to systems of value co-creation (Vargo et al., 2008a). This shift is strongly supported by the changing role of the customer and significant technological developments, offering opportunities for secure and collaborative value co- creation. For health care professionals, the challenge is to integrate digital healthcare services with the overall service process and operations, which inevitably become standardized through digitization. 30TH BLED ECONFERENCE: DIGITAL TRANFSORMATION – FROM CONNECTING THINGS TO 473 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Rantala & H. Karjaluoto: Combining Digitization with Healthcare Service Processes: Value Co-creation Opportunities Through Standard Work 2.1 Value co-creation According to service-dominant logic, both customer and service provider become resource integrators in value co-creation (Vargo et al., 2008a; McColl-Kennedy et al., 2012; Ostrom et al., 2015; Moeller 2008; Vargo et al., 2016). Service-dominant logic further designates the customer as the focal actor in defining value (Vargo et al., 2008a). The customer’s perception of value relates not only to value as service outcome but also as experience or value-in-use (Grönroos et al., 2013; Payne et al., 2008; Vargo et al., 2008a). In a healthcare context, value is generally understood as the outcome of the service process, but the customer experience during the treatment process and the value co-created during the process is seen to be of even greater relevance, irrespective of the final outcome. The changing role of the customer also changes expectations about how healthcare services are delivered, requiring a shift of mindset in service development. Digitization brings the customer into focus, and the digital service process offers mechanisms supporting value co-creation (Saarijärvi et al., 2013; Vargo et al., 2014). In a knowledge- intensive sector such as healthcare, the service provider is especially well positioned to influence the process of co-creating value with the customer through professional expertise and knowledge. As well as interaction, value co-creation involves processes in which the service provider and the customer operate independently in their respective domains (Payne et al., 2008; Grönroos et al., 2013). The nature and existence of these independent processes is of course arguable, as according to Grönroos et al. (2013), value is always co-created only in direct interaction—in other words, there has to be simultaneous interaction between the stakeholders in value co-creation. However, as well as value related to the service provider-customer interaction, there is also value derived from or related to the service process that is actually co-created among stakeholders other than service provider and customer. These independent domains include processes that for the service provider involve co-creation opportunities (Payne et al., 2008), planning and implementation and metrics connected to implementation. For this reason, the service provider can exert significant influence on the creation of customer value by providing opportunities for value co-creation (Payne et al., 2008). Digitized services provide opportunities for mutual benefits, with joint targets set for the entire process according to the principles of value co-creation (Vargo et al., 2008a; Payne et al., 2008). The dialogue between customer and service provider itself becomes an ongoing element of the digitized service process (Prahalad et al., 2004b; Vargo et al., 2008b). Further, digitization increases potential availability of the service as well as better customer access by departing from the traditional direct appointments approach. In addition, risk-benefit evaluation is considered a further building block of value co- creation (Prahalad et al., 2004a) and can be utilized to analyse the impact of digitization on the service. 474 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Rantala & H. Karjaluoto: Combining Digitization with Healthcare Service Processes: Value Co-creation Opportunities Through Standard Work Shared information is one element that enhances the service system by creating opportunities for value co-creation. Digitization creates these opportunities by establishing a platform for sharing information, so introducing transparency to the service process (Maglio et al., 2008; Vargo et al., 2008b; Akaka et al., 2014). In healthcare settings, transparency is closely linked to shared information and to the related concept of shared-decision making (Carman et al., 2017; Gulbrandsen et al., 2016; Hoffman et al., 2014). Based on shared information that the service provider contributes to and facilitates, the customer is empowered to participate actively in shared-decision making. However, transparency does not necessarily deliver value for the customer unless the digital service process is properly integrated into the practical operations through which concrete value co-creation opportunities emerge (Hickie et al., 2007; Martin, 2009). The digital service process requires a new way of operating and a different approach on the part of the service provider. It is therefore necessary to properly define the new processes and to integrate the digital service portal into the service process and operations to ensure that professionals do not act sporadically on the basis that “it is just a gadget or a tool” (Lapão, 2016; Hickie et al., 2007). Given that transparency can be seen to relate to information and to operations, which differ in certain respects, the present study proposes a modification of the DART model (Prahalad et al., 2004a) in the form of DARIO, a new value co-creation model. As described in Figure 1 below, DARIO operationalizes the concept of transparency into information and operations as two distinct features introduced by digitization for value co-creation and the development of digitized services. The model’s key contribution is the focus on service operations through customer activities within the portal and the professional’s standard work as opportunities for value co-creation (Payne et al., 2008). 30TH BLED ECONFERENCE: DIGITAL TRANFSORMATION – FROM CONNECTING THINGS TO 475 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Rantala & H. Karjaluoto: Combining Digitization with Healthcare Service Processes: Value Co-creation Opportunities Through Standard Work Figure 1: DARIO model of value co-creation in digitized services As indicated, operations are an essential contributor to value co-creation, as both customer and service provider use the digital service portal, offering opportunities for value co-creation. For the service provider, operations represent an organizational aspect of value co-creation, as processes and practices need to be integrated with digital processes to operationalize the service. Many eHealth services fail because insufficient attention is paid to actual implementation of the service (van Limburg et al., 2011; Lapão, 2016; Hickie et al., 2007). Based on the value co-creation definition of the customer as the focal value-defining actor, operations must be value-driven—in other words, digital service processes must be developed in close cooperation with the customer, enabling work processes to be successfully integrated. However, developing digital solutions customer needs and changing capabilities require that development is a continuous process, including re-evaluation of processes following actual implementation. 2.2 Operations as standardized service processes The present study views the service provider’s operations as an opportunity for value co- creation and as an element of that value co-creation. Digitization of healthcare services requires effective implementation so that the service provider or the professional can integrate the digital service portal with operations, enabling value to be co-created. If implementation of the digital service portal is not given due consideration but is instead seen as something that “just happens,” implementation may fail or fall short of its full potential for service delivery due to a lack of proper planning (Lerch et al., 2015; Hickie 476 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Rantala & H. Karjaluoto: Combining Digitization with Healthcare Service Processes: Value Co-creation Opportunities Through Standard Work et al., 2007; Christensen et al., 2010). Here, implementation means successful integration of the digital service with the overall service process to ensure seamless care. Professionals who must learn new ways of interacting with the customer do not always receive sufficient support to ensure successful implementation, and the consequences for professionals’ work must be carefully considered and planned in the development phase of the digital service portal. Many healthcare organizations have made huge advances in their operations through standardized procedures and defined targets based on the lean method (Kenney, 2011, Barnas, 2014). Lean is based on continuous improvement and a focus on people, both customers and personnel (Womack, 1996; Grunden et al., 2012). Lean essentially means following the customer’s path through the service process and monitoring that process through the customer’s eyes to become a customer-centered service organization (Rasche 2017). Following the customer path through the service process and developing and planning the new process contribute to more successful implementation of the digital service. Lean philosophy takes the customer as the starting point for the organization’s operations and processes. Understanding the customer’s actions and path through the service process are the key objectives for lean value stream mapping (Womack, 1996; Kenney, 2011; Barnas, 2014). Value stream mapping as a lean tool starts from the customer at the threshold of the service process and follows on through operations, multiple interaction points and sub-processes that the customer encounters. Taking the customer as starting point in the planning of the digital service process is closely analogous to the founding premises of value co-creation. For the service provider, this means keeping the customer in view when developing service processes and operations or work processes. It follows that planning for implementation of the digital service should consider the professional work processes with which use of the digital service portal must be integrated. Risks in the health care service process are often associated with issues of quality. The requirement for quality reflects the requirement for security and high standards of care and treatment (Black et al., 2011, Dahlgaard et al., 2011). In the digital service format, the risks of quality variation or failure arguably diminish as the service is standardized, enabling variation to be controlled (Kenney, 2011; Barnas, 2014; Grunde et al., 2012). By the very nature of the technology, digitization necessitates definition of work processes and operations. Further, according to lean philosophy, the operations defined in the digital service format help to reduce the risks of quality failure or variation, as the service process becomes standardized and variations can be controlled. The concept of standard work refers to how professionals perform operations in a unified and similar way. Standard work looks to create a consensus in the practice of procedures and operations to reduce any variation among practicing professionals. Reduced variation of treatment increases the consistency of quality of operations and outcomes (Kenney, 2011; Barnas, 2014). Standard work is very often misunderstood as excluding the 30TH BLED ECONFERENCE: DIGITAL TRANFSORMATION – FROM CONNECTING THINGS TO 477 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Rantala & H. Karjaluoto: Combining Digitization with Healthcare Service Processes: Value Co-creation Opportunities Through Standard Work possibility of interpretation and the use of professional expertise. However, this is not the objective; on the contrary, standard work reduces wasted time and effort in the service process and so releases the professional’s time and expertise to make a more meaningful contribution to the service process. Digitization of processes can too easily be regarded as a threat to professionals’ work, and more emphasis should be placed on how a standardized work process facilitates non-routine work requiring advanced expertise and knowledge (Gregorio et al., 2008; Lapão, 2016). Methodology The study is based on single case data gathered from a large healthcare organization, using the qualitative methods of thematic and focus group interviews. The single case study facilitates exploration of an industry embarking on a new approach to value creation and implementing processes for value co-creation opportunities through digitization. It is also appropriate when studying a new phenomenon under unusual or (as here) complex circumstances (Eisenhardt et al., 2007). The material obtained through the interviews was further enriched by observations within the organization while participating in two seminars and workshops on digitizing healthcare and its services. The organization in question identified mental health and weight control digital services development groups, from which the interviewees were drawn. Participants in the thematic interviews were selected by means of snowball sampling (Salganik et al., 2004), with each interviewee identifying the next. Interviews continued until the information gathered became repetitive and no longer added to the information from previous interviewees. There were two focus group interviews, involving mixed combination of people who were active participants in the development of these digital healthcare services. In total, 26 people participated in the individual or group interviews. The observations in seminars and workshops consisted of several discussions and workshop tasks with multiple health care professionals who were interested in or participating in digitization of healthcare services. The personal thematic interviews were tape-recorded, and the group interviews were video-recorded with participants’ permission. The recorded material was typed, grouped and organized, utilizing the guiding thematic issues for the purposes of analysis. The material casts light on the attitudes of the organization and its professionals toward digitization, and on understandings and measures concerning the need to define internal processes to meet the challenge at the customer interface for value co-creation. Findings The case organization has several ongoing projects developing digitized healthcare service portals. Very often, implementation of these services would not progress or even seem to fade away because of deficits in service process integration planning, poor understanding of the implications for work procedures and low managerial commitment to implementation. This lack of managerial commitment owed to uncertainty about the 478 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Rantala & H. Karjaluoto: Combining Digitization with Healthcare Service Processes: Value Co-creation Opportunities Through Standard Work new workload and the inability to set clear targets for implementation. While the organization has made significant efforts and there has been substantial development work, the implementation process is slow. “We don’t know if this service is useful or not. We cannot proceed, as we don’t know whether it will overstretch us.” (Physician, workshop participant) The development groups comprised voluntary participants, ensuring their motivation and commitment to developing the services. However, voluntary participation also means that management commitment may be low. While some development groups proceed well and people are committed, there are others whose work lack management commitment, and the lack of sufficient organizational participation resulting in poor planning and potential failure of implementation. “This is a journey toward understanding what this could mean for us.” (Project director, ICT digital services) Based on the interview findings, it seems obvious that careful planning of digital service processes is fundamental for successful implementation enabling value co-creation. “You have to plan changes in the way of working before implementation.” (Project Manager, Administration, Development activities) There are now ongoing efforts to formalize the development work based on a strategic approach to which services to digitize, how to proceed with planning and whom to involve in development. However, there is an evident lack of experience within the organization in defining services, service processes, roles and work descriptions, which is rather resource bound for ICT supporting this development work with less support from the management or from the human resources organization. “We proceed with the lean plan-do-check-act of continuous improvement, with small steps in the development work.” (Project director, ICT digital services) The organization utilizes lean methods for digital service development, involving both personnel and customers. Services are planned and developed on the basis of a customer forum of customer experience experts—that is, real customers for the services to be digitized. For the professionals, defining the service process for digitization introduces the concept of standard work, which assures quality and reduces waste in the process such as missing or lost information, which are also essential features of digitization. “Standard work is also standardization of the work environment.” (Project director, LEAN projects) 30TH BLED ECONFERENCE: DIGITAL TRANFSORMATION – FROM CONNECTING THINGS TO 479 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Rantala & H. Karjaluoto: Combining Digitization with Healthcare Service Processes: Value Co-creation Opportunities Through Standard Work The planning of digital treatment paths is an iterative process, and courage is required in order to learn through an iterative process. “We learn from our experiences and utilize that in subsequent services.” (Quality manager, ICT project office) Results improve each time and enhance the functioning of the digital service process. However, training for new work processes remains secondary in terms of planning, although its importance for the successful implementation of the services has been recognized. Discussion 5.1 Theoretical and managerial contributions The study findings can be discussed in terms of the DARIO model, which links transparency to information and operations as indicated in Figure 1. This more precisely captures what the service provider must consider for successful value co-creation in digital services. The DARIO model contributes to the discussion of digitization of healthcare services, which requires new cross-disciplinary inputs. The findings have several managerial implications. The service provider, who has a huge impact on value co-creation opportunities, must also be a resource integrator—that is, they must be able to integrate the digital service into the overall service along with defined work processes and standard work. This highlights the importance of developing digital services through close interaction between customers and professionals. The development of digital services is based on voluntary involvement by the participants in the development groups. However, from a managerial perspective, this voluntary participation fails to deliver the necessary understanding of the digitized service process to the organization and of the related workload to management. The findings suggest that a lack of clear targets for implementation, including voluntary participation in the development work, hinders integration of resources, which further slows the implementation process and increases the risk of low adaptation. Both of these effects undermine achievement of the ultimate targets of increasing service availability and cost effectiveness in the delivery of healthcare services. Based on these findings, there is an imminent need for systematic involvement of management in the development processes and in defining targets for implementation in terms of number of users and timespan for integrating the digital service within the overall service. The mental therapy service offers a huge range of possibilities to proceed with the customer. There seems to exist uncertainty of and lack of a common description for the proceedings how to combine the digital mental therapy service with sufficient amount of empathy and presence. With the weight control house these are services for various combinations of conditions like anorexia or severe obesity with linkages to mental 480 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Rantala & H. Karjaluoto: Combining Digitization with Healthcare Service Processes: Value Co-creation Opportunities Through Standard Work therapy services as often there is a connection with these issues. During the interviews or in the focus group interviews there was less remarks on the implications to work processes or operations in general concerning the mental therapy services or weight control house services. However, as digitization changes these work processes and service operations tremendously, there emerges a need to redefine work processes or the work. Algorithms behind the service process guide how the service proceeds, but these do not define operations or how the professional integrates the digital service portal into the service process. Lean’s standard work introduces a coercive formula to follow a defined work process in the digital service portal. These findings suggest that the organization still lacks the necessary systematic planning for implementation of the service portals of mental therapy or weight control with defined standardized work processes and training for the professionals for integration with the overall service processes. This suggests a need for systematic involvement of management in defining implementation, training and standardized work in order to gain commitment and ensure successful implementation and value co-creation opportunities within the service process. 5.2 Limitations and directions for future research The study has several limitations. The first of these relates to the theory-building process. An approach combining value co-creation and lean standard work through operations may seem risky, as there is no readily available theoretical precedent, and the model can therefore be considered limited in this regard. Nevertheless, the idea of combining value co-creation and lean offers multiple possibilities for future research. Second, the focus here is on single professionals and their standard work; multiprofessional teams were not considered because of practical constraints. This limitation invites more thorough and separate research on standard work in multiprofessional teams in the context of digital healthcare services. Third, there was no possibility of studying customer operations within the digital service portal for practical reasons of permissions and the need to focus on the professionals. However, customer use of the digital service portal represents an interesting and fruitful area for further research. References Akaka, M. A., & Vargo, S. L. (2014). Technology as an operant resource in service (eco) systems. Information Systems and e-Business Management, 12(3), 367-384. Barnas, K. (2014). Beyond Heroes: A Lean Management System for Healthcare. Appleton, WI: ThedaCare Center for Healthcare Value. Black, A. D., Car, J., Pagliari, C., Anandan, C., Cresswell, K., Bokun, T., McKinstry, B., Procter, R., Majeed, A., & Sheikh, A. (2011). The impact of eHealth on the quality and safety of health care: a systematic overview. PLoS Med, 8(1), e1000387. Carman, K. L., & Workman, T. A. (2017). Engaging patients and consumers in research evidence: applying the conceptual model of patient and family engagement. Patient Education and Counselling, 100(1), 25-29. 30TH BLED ECONFERENCE: DIGITAL TRANFSORMATION – FROM CONNECTING THINGS TO 481 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Rantala & H. Karjaluoto: Combining Digitization with Healthcare Service Processes: Value Co-creation Opportunities Through Standard Work Christensen, H., & Hickie, I. B. (2010). Using e-health applications to deliver new mental health services. Medical Journal of Australia, 192(11), S53-S56. Dahlgaard, J. J., Pettersen, J., & Dahlgaard-Park, S. M. (2011). Quality and lean health care: A system for assessing and improving the health of healthcare organisations. Total Quality Management & Business Excellence, 22(6), 673-689. Eisenhardt, K. M., & Graebner, M. E. (2007). Theory building from cases: Opportunities and challenges. Academy of Management Journal, 50(1), 25-32. Gregório, J., Cavaco, A., & Lapão, L. V. (2014). A scenario-planning approach to human resources for health: the case of community pharmacists in Portugal. Human Resources for Health, 12(1), 58. Grunden, N., & Hagood, C. (2012). Lean-led hospital design: Creating the efficient hospital of the future. Boca Raton: CRC Press. Grönroos, C., & Voima, P. (2013). Critical service logic: making sense of value creation and co- creation. Journal of the Academy of Marketing Science, 41(2), 133-150. Gulbrandsen, P., Clayman, M. L., Beach, M. C., Han, P. K., Boss, E. F., Ofstad, E. H., & Elwyn, G. (2016). Shared decision-making as an existential journey: Aiming for restored autonomous capacity. Patient Education and Counseling, 99(9), 1505-1510. Hickie, I. B., & McGorry, P. D. (2007). Increased access to evidence-based primary mental health care: will the implementation match the rhetoric? Medical Journal of Australia, 187(2), 100. Hoffmann, T. C., Montori, V. M., & Del Mar, C. (2014). The connection between evidence-based medicine and shared decision making. Jama, 312(13), 1295-1296. Kenney, C. (2012). Transforming health care: Virginia Mason Medical Center's pursuit of the perfect patient experience. Boca Raton: CRC Press. Lapão, L. V. (2016). The Future Impact of Healthcare Services Digitalization on Health Workforce: The Increasing Role of Medical Informatics. Studies in Health Technology and Informatics, 228, 675. Lerch, C., & Gotsch, M. (2015). Digitalized product-service systems in manufacturing firms: A case study analysis. Research-Technology Management, 58(5), 45-52. Maglio, P. P., & Spohrer, J. (2008). Fundamentals of service science. Journal of the Academy of Marketing Science, 36(1), 18-20. Martin, G. P., Currie, G., & Finn, R. (2009). Reconfiguring or reproducing intra-professional boundaries? Specialist expertise, generalist knowledge and the ‘modernization’ of the medical workforce. Social Science & Medicine, 68(7), 1191-1198. McColl-Kennedy, J. R., Vargo, S. L., Dagger, T. S., Sweeney, J. C., & Kasteren, Y. V. (2012). Health care customer value cocreation practice styles. Journal of Service Research, 15(4), 370- 389. Moen, A., Hackl, W. O., Hofdijk, J., Van Gemert-Pijnen, L., Ammenwerth, E., Nykänen, P., & Hoerbst, A. (2012). eHealth in Europe: status and challenges. EJBI, 8(1), 2. Moeller, S. (2008). Customer integration—a key to an implementation perspective of service provision. Journal of Service Research, 11(2), 197-210. OECD. (2013). Draft OECD Principles for Digital Government Strategies. Switzerland. Public Governance Committee. Ostrom, A. L., Parasuraman, A., Bowen, D. E., Patricio, L., & Voss, C. A. (2015). Service research priorities in a rapidly changing context. Journal of Service Research, 18(2), 127-159. Payne, A. F., Storbacka, K., & Frow, P. (2008). Managing the co-creation of value. Journal of the Academy of Marketing Science, 36(1), 83-96. Prahalad, C. K., & Ramaswamy, V. (2004a). Co-creation experiences: The next practice in value creation. Journal of Interactive Marketing, 18(3), 5-14. 482 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Rantala & H. Karjaluoto: Combining Digitization with Healthcare Service Processes: Value Co-creation Opportunities Through Standard Work Prahalad, C. K., & Ramaswamy, V. (2004b). Co-creating unique value with customers. Strategy & Leadership, 32(3), 4-9. Rasche, C., Margaria, T., & Floyd, B. D. (2017). Service Model Innovation in Hospitals: Beyond Expert Organizations. In Service Business Model Innovation in Healthcare and Hospital Management (pp. 1-20). Springer International Publishing. Saarijärvi, H., Kannan, P. K., & Kuusela, H. (2013). Value co-creation: theoretical approaches and practical implications. European Business Review, 25(1), 6-19. Salganik, M. J., & Heckathorn, D. D. (2004). Sampling and estimation in hidden populations using respondent‐driven sampling. Sociological Methodology, 34(1), 193-240. van Limburg, M., van Gemert-Pijnen, J. E., Nijland, N., Ossebaard, H. C., Hendrix, R. M., & Seydel, E. R. (2011). Why business modeling is crucial in the development of eHealth technologies. Journal of Medical Internet Research, 13(4), e124. Vargo, S. L., & Lusch, R. F. (2008a). Service-dominant logic: continuing the evolution. Journal of the Academy of Marketing Science, 36(1), 1-10. Vargo, S. L., & Lusch, R. F. (2016). Institutions and axioms: an extension and update of service- dominant logic. Journal of the Academy of Marketing Science, 44(1), 5-23. Vargo, S. L., Maglio, P. P., & Akaka, M. A. (2008b). On value and value co-creation: A service systems and service logic perspective. European Management Journal, 26(3), 145-152. Womack, J. P., & Jones, D. T. (1996). Lean thinking: Banish waste and create wealth in your organisation. New York, NY, 397: Simon and Shuster. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons IT on the Shop Floor - Challenges of the Digitalization of Manufacturing Companies 34 ALEXANDER RICHTER, SHAHPER VODANOVICH, MELANIE STEINHÜSER & LEA HANNOLA Abstract A new generation of information technology (IT), promises significant benefits for manufacturing companies in their daily work. However, the companies are rather slow in taking advantage of the opportunities offered by the current wave of digitalization. This paper starts with an overview of emerging sociotechnical trends in manufacturing. We discuss technology as catalyser of this transformation process and its impact on individual and organisational levels. The intense collaboration with six manufacturing companies in a European project allowed us to identify and further specify four digital challenges: 1) Digitally augmented human work, 2) Worker-centric knowledge sharing, 3) Self-learning manufacturing workplaces, and 4) In-situ mobile learning. The four digital challenges illustrate how companies (can) embrace emerging sociotechnical trends in manufacturing and thus contribute to a better understanding of the changing role of IT on the Shop Floor. Keywords: • Digitalization • Smart factories • Shop floor • Industry • Manufacturing • Sociotechnical • Trends • worker-centric • knowledge sharing • in-situ mobile learning • CORRESPONDENCE ADDRESS: Alexander Richter, IT University Copenhagen, Rued Langgaards Vej 7, DK-2300 Copenhagen S, Denmark & University of Zurich, Rämistrasse 71, 8006 Zürich, Switzerland, e-mail: aric@itu.dk. Shahper Vodanovich, Auckland University of Technology, 55 Wellesley St E, Auckland, 1010, New Zealand, e-mail: shahper.vodanovich@aut.ac.nz. Melanie Steinhüser, University of Zurich, Rämistrasse 71, 8006 Zürich, Switzerland, e-mail: steinhueser@ifi.uzh.ch. Lea Hannola, Lappeenranta University of Technology, Skinnarilankatu 34, 53850 Lappeenranta, Finland, e-mail: Lea.Hannola@lut.fi. https://doi.org/10.18690/978-961-286-043-1.34 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 484 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Richter, S. Vodanovich, M. Steinhüser & L. Hannola: IT on the Shop Floor - Challenges of the Digitalization of Manufacturing Companies Introduction The ever increasing global competition leads industrial companies to engender organisational changes and drive innovations. A new generation of information technology (IT) can contribute to the transformation of the shop floor: on the one hand by advancing the automation of manufacturing processes (Armbruster et al., 2007; Brettel et al., 2014; Chi, 2013) and on the other hand by putting shop floor workers and their skills more in the focus (Campatelli et al., 2016; Steinhüser et al., 2017). However, so far, manufacturing companies have been slow in taking advantage of the possibilities offered by the current wave of digitalization (Hessman, 2013). Yet, we know little about the information needs and possible benefits of IT for the manufacturing sector (Daeuble et al., 2015). Therefore, the goal and main contribution of our study is to identify, describe and explore current challenges that companies are facing due to emerging sociotechnical trends in the manufacturing sector. For this context, we define a digital challenge as the combination of 1) the identification of the problem situation 2) the implementation of a sociotechnical solution to address the problem and 3) the continuous transformation of the existing work practices. We start this paper by presenting emerging sociotechnical trends that are currently engendering changes in manufacturing. We start by discussing technology as catalyser of this transformation process and then discuss its impact on individuals and the organisation (Chapter 2). In Chapter 3, we explain how the close collaboration with six industrial companies in a European project for more than two years (so far) has allowed us to identify and then further specify four digital challenges. Those are 1) Digitally augmented human work, 2) Worker-centric knowledge sharing, 3) Self-learning manufacturing workplaces, and 4) In-situ mobile learning). Next, we illustrate each digital challenge with an example of a company from the project. For each case, we describe the problem situation and then the proposed solutions to overcome problems being faced by each that have been implemented or are currently implemented. Thus, drawing on the insights from these companies we demonstrate how the manufacturing industry can leverage challenges they are experiencing. Beyond practical relevance, this conceptualisation of the current situation as “digital challenges” for manufacturing companies helps building the basis for a better theoretical understanding of the changing nature of IT on the Shop Floor. In Chapter 5, we discuss how to take a step forward by proposing sociotechnical solutions for the workers in response to these digital challenges, to support their work practices and increase job satisfaction. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 485 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Richter, S. Vodanovich, M. Steinhüser & L. Hannola: IT on the Shop Floor - Challenges of the Digitalization of Manufacturing Companies Emerging sociotechnical trends in the manufacturing sector In the following, we present sociotechnical trends that emerge in the context of manufacturing. In order to identify these trends, we thoroughly reviewed the latest literature, the public media as well scientific publications. We categorize the trends into three pillars, as summarized in Figure 1, and discuss them in the following sections: (1) Technology, which is the basis for this transformation and catalyses the other changes on (2) Individual and (3) Organisational levels. Figure 1: Emerging sociotechnical trends in the manufacturing sector 2.1 Technology New technological developments can serve as drivers for change on organizational and individual levels (Köffer, 2015). The following recent technological trends have the potential to substantially affect the workers’ situation on the shop floor and also the organisation of manufacturing environments. The web-based linking of machines, sensors, computers, and also humans, is rapidly moving towards the idea of the connected factory (Bono and Pillsbury 2016). The benefits of the so-called “Internet of Things” (IoT) technologies include reduced down time, increased quality and less waste as well as greater visibility of the manufacturing floor. This connectivity enables companies to leverage the value of their plant floor information and promises an increase in productivity, improved utilization of assets, and better decision-making (Bradley, 2015). Whereas recent technical advances in interoperability 486 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Richter, S. Vodanovich, M. Steinhüser & L. Hannola: IT on the Shop Floor - Challenges of the Digitalization of Manufacturing Companies have resulted in higher maturity of product and process models (Tibaut et al., 2016), companies still face the task of building coherent services when the individual components are technically different and managed by different units. IoT technologies allow devices to communicate automatically and enable companies to monitor, collect, process, and analyse huge amounts of data, which may lead to more precision and the chance to get deep insights into manufacturing processes. Measuring and monitoring real-time data from across the factory leads to rapidly growing data sets that are increasingly gathered by cheap and numerous sources and often so large or complex that traditional data processing applications are inadequate to deal with. In this context, the term big data was coined. To capture business value and meet the demands of smart manufacturing, companies need to be able to manage these large data sets and extract meaning out of them (O’Donovan et al., 2015). This large quantity of data leads to new questions and solutions concerning especially the analysis, search, sharing, updating, and visualization. Advanced analytics in the form of predictive analytics, user behaviour analytics, or certain other methods that extract value from data, are needed to cope with this great amount of data (Lee, 2013; Wambaa et al., 2015). It offers possibilities to make extensive use of analytical tools often capable of providing diverse reporting on any device, anytime. These tools are able to deliver data about companies’ productivity and security as well as supporting decisions according to product configurations, service bundles, and pricing options. The utilization of metrics is evolving at a rapid pace and will become even more pervasive in the future (Van Herreweghe et al., 2015). Danson et al. (2016) state that “industrialized analytics” is increasingly influencing business strategy and commanding substantial investment and connecting analytics capabilities is crucial for manufacturing companies. 2.2 Individual Level As with any new way of working, or even more general - of doing - individuals need to learn and adopt it, get used to it, and, in the best case, benefit from it. Striving towards a smart factory may have an enormous impact on work practices on the shop floor. Employees face changed processes, they need to handle new technologies and accomplish different tasks. As one out of three trends for the future of manufacturing the World Economic Forum, therefore, identified the focus on the workforce’s skills (McNelly, 2016). With the spreading and growing importance of technology in the manufacturing sector, the need to be able to acquire new skills to get the work done properly increases. Individuals are not only facing changes of technologies, but, as a consequence, also the increasing complexity. Providing workers with information where and when it is needed and, more generally speaking, supporting the employees in their daily work promises significant benefits (Daeuble et al., 2015; Mavrikios et al., 2013). As a consequence, shop floor workers are 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 487 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Richter, S. Vodanovich, M. Steinhüser & L. Hannola: IT on the Shop Floor - Challenges of the Digitalization of Manufacturing Companies expected to solve occurring problems as fast as possible and to constantly improve their work-related knowledge and skills (Appelbaum, 2013; Ullrich, 2016). People who were not born into the digital world have learnt to use different kinds of technology at some stage in their adult lives and are likely to experience some difficulties in accepting technology related changes at work. Conversely, the “digital natives” have grown up with diverse IT. The entering of digital natives into the workplace might mark a paradigm shift (Vodanovich et al., 2010). The way people process information fundamentally differs and depends from how and when they grew up. Thinking patterns have changed and it is very likely that even their brains have physically changed (Ng, 2012; Wang et al 2012). It could be shown, that this implies an ease with which digital natives learn to make use of unfamiliar technologies (Ng, 2012; Wang et al., 2013). They need, however, to be provided with the opportunity to use them for meaningful purposes (Huyler et al., 2015). In order to remain competitive, companies need to take this into account. Another perspective on the same phenomenon is that some employees may be faced with fears about whether digital natives and smart machines will soon take over their jobs (Brynjolfsson and McAfee, 2011). However, humans with the most diverse skills and competencies as well as with valuable experience have always added value to manufacturing processes and this is likely to continue (Gorecky et al., 2014). There is a variety of possible ways in which people and machines will work alongside each other (McAfee and Brynjolfsson, 2014). Of course, some will build, implement, maintain, and operate upcoming technologies. Others will be in roles that machines can’t perform well, such as those involving high levels of experience, intuition, creativity, or empathy (Danson et al., 2016). Therefore, manufacturing companies should not overvalue digital skills at the expense of “traditional” skills. Instead, they are advised to recognize and promote experience and handicraft talent, too. Focusing on all different kinds of skills is a great challenge but it may create advantages for manufacturers, and also positively impact workers’ employment and incomes (Daugherty et al., 2016). When facing this challenge appropriately it is important to rethink and develop group specific learning arrangements and individual work place designs (Köffer, 2015). Organizations will need to examine knowledge-intensive processes and determine which tasks can best be performed by machines and which by humans (Gorecky et al, 2014). Early training and supporting employees to prepare for a collaborative future with smart machines is essential (Danson et al., 2016). 2.3 Organisational Level The exponential growth of data and the convergence of different affordable technologies are transforming organizations. Key infrastructures are underlying considerable changes that play a vital role in securing competitive positions in the manufacturing industry. Anytime retrieval, monitoring and operating of technology infrastructures, even over huge physical distances, enables simultaneous control and coordination of complex 488 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Richter, S. Vodanovich, M. Steinhüser & L. Hannola: IT on the Shop Floor - Challenges of the Digitalization of Manufacturing Companies technological processes. Consequently, a shift can be observed, away from centrally controlled processes towards decentralized, distributed structures and processes. As a result, today’s strategies, value chains and business models will come under increasing pressure (Kagermann, 2015). Companies need to decide whether to react on emergent demands or to proactively contribute to a transition’s design or they can choose between an incremental change versus a radical change (Ullrich et al., 2015). In each case an appropriate change management is crucial. The prevailing view of IT strategy has mostly been that it is a functional-level strategy that must be aligned with a company’s business strategy. The business infrastructure has become digital, though, with increased interconnections among products, processes, and services. The arrival of IoT, Cyber-Physical Systems (CPS) and others allows everything to be networked in order to create a smart environment where people and machines communicate with each other naturally (Kagermann, 2015). This has led to fundamentally transforming not only business processes, products and services but also business strategies. Accordingly, the role of IT strategy has to be rethought, from that of an aligned but subordinated functional-level strategy to one that reflects a fusion between IT and business strategy. Key themes to guide this are, the scope, the scale and the speed of digital business strategy, as well as the sources of future value creation and capture in digital business strategy (Bharadwaj et al., 2013). When addressing a change in strategy, its success strongly depends on a firm’s ability to evolve its corporate culture. Thereby, companies are advised not only to take advantage of emerging technologies, but also, critically, to embrace the new business strategies that those technologies drive. Enterprises must focus on enabling people to accomplish more with technology (Gorecky et al, 2014). They will have to create a new corporate culture that looks at technology as the way to enable people to constantly adapt and learn, continually create new solutions, drive relentless change, and disrupt the status quo. In times where the focus is locked on technology, it is important, in fact, to place people first (Daugherty et al., 2016). Thus, it is the task of managers to promote an organizational climate that supports decentralized and self-responsible use of information assets. For this, many leaders are likely required to develop new skills, resulting in training recommendations for supervisors, who have a prominent position in digital workflows (Köffer, 2015). The rise of the generation of digital natives, as stated above, brings a new kind of employee not only with different attitudes towards technology but also with different outlooks, aspirations, and expectations regarding their employer, their workplaces, and about how work should be organized (Wang et al., 2013). It appears that preferences are shifting towards aspects such as connectivity, information or entertainment (Hanelt et al., 2015). The push towards new forms of working challenges organizations. On the one hand, it is important to thoroughly plan and execute the change, on the other hand, there is strong competition between manufacturers for new employees. A successful employer branding would create sustainable competitive advantages. With the right engagement 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 489 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Richter, S. Vodanovich, M. Steinhüser & L. Hannola: IT on the Shop Floor - Challenges of the Digitalization of Manufacturing Companies strategy, companies can leverage the excitement for technology, teamwork, and digitalization of younger employees to push forward the business (Daugherty et al., 2016). Research Design This study is a part of the international research project FACTS4WORKERS. The objective of FACTS4WORKERS is to create attractive and intelligent work places in a factory of the future. Therefore, we initially studied how practices on the shop floor can be supported through human-centred IT solutions. A deep understanding of workers’ individual practices has been our basis to deliver suggestions (in the form of requirements) for sociotechnical solutions that support smarter work. Guiding through the process of exploring smart factory solutions, we identified four digital challenges together with our six industrial partners from the manufacturing domain. The identification was done in the constitutional phase of the project by conducting a focus group with all six companies. The intense collaboration with the companies over a span of more than two years allowed us to deepen our understanding and to further explore the four specific digital challenges. Further field studies at each of the six companies enabled us to collect data from more than 60 interviews, various observations (also documented by more than 100 photos and 20 videos) as well as at least one further focus group at each partner. For further information about first phases of the data collection please refer to (Heinrich & Richter 2015) and (Denner et al. 2015). This has all contributed to describe their individual challenges in more detail. Digital challenges for manufacturing companies The role of knowledge in manufacturing companies has grown over the last century and innovations and technologies have changed it radically a number of times (Wan et al., 2014). Currently, the focus has drifted towards knowledge-intensive and human-centred manufacturing. Currently and in the future, human workers have an important role in manufacturing environments, as they are capable of complementing modern technology and performing knowledge-intensive work tasks more effectively compared to solely technical approaches. However, this also will require more knowledge management skills from the workers and manufacturing environments. The data gathered from six companies allowed us to identify four digital challenges: 1) Digitally augmented human work, 2) Worker-centric knowledge sharing, 3) Self-learning manufacturing workplaces, and 4) In-situ mobile learning. These fall into different facets of knowledge management. While for example predictive manufacturing focuses stronger on the technological aspects of knowledge aspiration, human-centred manufacturing rather focuses on the social aspects (cf. figure 2). Beyond identifying the 490 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Richter, S. Vodanovich, M. Steinhüser & L. Hannola: IT on the Shop Floor - Challenges of the Digitalization of Manufacturing Companies digital challenges we illustrate all of them with a case vignette each – that gives insights into the situation at the industrial partners’ production environments. Figure 2: Digital challenges for manufacturing companies 4.1 Digitally augmented human work Human shop floor workers deal with information that is increasingly more complex and transforming, combined from multiple sources and types. Augmenting human work with digital technologies means to provide them with an immediate and personalized provision of information at the shop-floor-level, which can be interacted (accessed and modified) according to their needs, roles, preferences and constraints (Kagermann 2015). Our research reveals, that one common request of many assembly and manufacturing workers is to have a better awareness of the process status in order to have a more conscious decision making process and increase their responsiveness to process breakdown/change. To date in many companies the operators need to actively seek the required information and select the correct information from a large number of data sources to carry out their tasks. Thus, the main idea of the challenge is to create a “personal” information feed for a specific worker that could support his activity and empower him to become a smart worker with more autonomy and problem-solving capabilities. The solution should provide also the appropriate tools not just “see” the correct data but also to analyse them in the smartest and personalised way. Not only the access to data has to be personal but also the analysis should be developed and selected in order to provide an understanding of the process that will be profitable for the specific worker. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 491 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Richter, S. Vodanovich, M. Steinhüser & L. Hannola: IT on the Shop Floor - Challenges of the Digitalization of Manufacturing Companies Case vignette 1 Hidria Rotomatika is a Slovenian automotive tier-1 supplier that produces electric stators and rotors for automotive use. We observed operators of the machining departments, who deal with turning and milling machines. A preliminary analysis of the workers needs has highlighted how some operations could be time-consuming and require the acquisition of paper-based data or knowledge from an experienced colleague. These data must be processed manually in order to obtain a smooth process. Especially machine setup processes and measurements of each part could be very complex and time-consuming. This challenge addresses the core issue of providing natural interfaces that allow workers to interact and access knowledge effectively when performing their regular tasks. The challenge is to enable the workers to utilize big data analytics fuelled by automated electronic measurements to make decisions more effectively when calibrating production equipment. Better access to information and analytics would allow to cut production times while increasing product quality and reducing waste due to making better-informed decisions and detecting patterns and trends in product deviations. For the worker, being able to benefit fully from information generated by machines and previous decisions could reduce frustration and help retaining a productive flow of work. In the proposed solution, the workers automatically receive all relevant information in a digital format and obtain a fit solution to fix the problem directly at their current work station. Moreover, the operators acquire more autonomy due to the implementation of a trend analysis of the process, which usually means the degradation of some components or machines. In this case the operator becomes a leader of a proactive analysis phase for the machine maintenance that is actually carried out using a traditional reactive approach (repair actions when the process stops due to e.g. a broken part) by the maintenance team. This allows the operator to gain more autonomy and take charge of advanced tasks that are beneficial both for the process (higher availability of the plant) and its satisfaction (higher autonomy and possibility to be the responsible for the process well-being). 4.2 Worker-centric knowledge sharing Worker-centric knowledge sharing means the utilization of worker-generated content and peer sharing about best practices, problem solving and ideas to fuel organizational learning and even worker-driven innovation (Richter et al., 2013). This includes not only equipping workers with appropriate tools, but also with specific use cases for utilizing these tools (Richter & Riemer, 2013). Empowering workers to share their knowledge transparently with others reduces the risk of productivity bottlenecks e.g. through redundant work and improves the pace and depth of on-the-job learning. At the same time, the worker feels more valued, more socially connected to the work community and better motivated. 492 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Richter, S. Vodanovich, M. Steinhüser & L. Hannola: IT on the Shop Floor - Challenges of the Digitalization of Manufacturing Companies Case vignette 2 thyssenkrupp Steel Europe is an international provider of flat steel. We observed the practices of the mobile maintenance team in the areas of air-conditioning technology and electricity. The occurrence of a fault is reported via phone, email, or fax. Rough information on the type of fault and system is then passed onto the mobile maintenance employee in paper form. Frequently, neither local information of the production site in which the disruption is located nor particular safety instructions are provided. The necessary knowledge is usually acquired through the accompaniment of an experienced colleague or through systematic trial and error, despite a structural knowledge transfer. Since approximately 3,000 different types of systems must be serviced and possibly debugged, employees rarely possess all the relevant information, tools and spare parts to solve a specific problem without a considerable communication effort or multiple journeys. The direct communication in the process of fault elimination is currently supported by mobile phones without access to mobile data. The paper-based, asynchronous information exchange between the employees who are involved in the fault process often leads to delays or redundant work. Furthermore, at the site of the disruption, there is often a lack of knowledge that other employees could deliver. In this case, the opportunities to directly communicate with other colleagues, e.g. to exchange pictures and documents, are missing. Due to the above-mentioned mobility and the numerous and varied challenges which the maintenance personnel faces, it is important that the workers are provided with the necessary information in a bundled, contextual and mobile way. This will be realized through the implementation of a mobile employee-centred knowledge management system that places the maintenance staff at the centre of attention. The solution can provide necessary information on maintenance in two ways: 1) Context-specific information on all systems can be called up by the employee through a mobile information system. 2) Access to colleagues' practical knowledge can be realized through a chat function with the possibility of exchanging images and videos. These two components support the maintenance employee on his way becoming a smart worker who has access to all necessary knowledge. Through this form of knowledge networking, the communication between colleagues can be increased, practical knowledge exchanged and the process of eliminating faults thereby designed in a more efficient way. Due to the accessibility of relevant information, unnecessary journeys can be avoided and the certainty in the employees' actions increased. 4.3 Self-learning manufacturing workplaces Self-learning manufacturing workplaces support workers discovering and sharing knowledge during manufacturing, enhancing their competencies and worker satisfaction. However, the manufacturing knowledge and information is currently often scattered 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 493 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Richter, S. Vodanovich, M. Steinhüser & L. Hannola: IT on the Shop Floor - Challenges of the Digitalization of Manufacturing Companies across a plethora of information silos without a centralized platform to connect, combine, analyse and organize the information according to the present needs of the shop-floor worker. Mastering the complexity of data and information requires sophisticated semantic and data mining technologies to discover the relationships between different sources (Zhong et al., 2015), allowing intelligent search and exploration. With the implementation of advanced IT solutions, IoT technologies and sufficient knowledge management procedures, new possibilities for leveraging the manufacturing knowledge arise. One such concrete advance is the creation of a self-learning manufacturing workplace. Utilizing detailed and consistent data from manufacturing operations, enterprises are able to implement e.g. predictive maintenance and machine-assisted decision making for calibrations that allow reducing unplanned process disruptions and maintaining a smooth workflow (Orio, 2015). Case vignette 3 Hidria Technology Centre is a Slovenian company, which designs and manufactures a wide spectrum of partially or fully automated assembly lines, ranging from simple conveyer belt designs to fully automated lines. These complex and automated manufacturing lines incorporate lots of fault conditions. The loss in efficiency is due to either time-consuming setup and maintenance activities or lacking supplies. In such cases, the line comes to a halt or produces parts that have not been specified. The increase of operating time and the reduction of maintenance time of the assembly lines are therefore in the focus. The main worker needs in this case are derived from one of the customer’s sites: Hidria Dieseltek plant, which produces glowplugs and pressure sensors. One of the challenges in this case is that operators at the shop floor cannot predict up-coming problems or breakdowns, but instead they work mainly on tasks related to reactive maintenance. Thus, supporting tools for shifting operators’ workloads towards more predictive maintenance tasks are desired. Further, operators have to react quickly to resolve problems during manufacturing. The team of operators aim to directly fix small problems like the replacement of defective parts. With larger defaults or more complex problems, the internal maintenance team helps to bring the production up to speed again as quickly as possible. Thus, in this case it is aimed at better supporting the problem-solving activities of the line operators by a new integrated knowledge base of the production line fault analysis. In addition, the solution finding to a problem/breakdown is highly dependent on the experience of the worker, and this knowledge is important to be shared also to less experienced workers for enhancing peer-learning at workplaces. The information and knowledge of manufacturing processes, technologies and solutions is currently scattered across the factory without a centralised platform to store, share and analyse the information according to the present needs of the worker at the shop floor. 494 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Richter, S. Vodanovich, M. Steinhüser & L. Hannola: IT on the Shop Floor - Challenges of the Digitalization of Manufacturing Companies A proposed self-learning approach will monitor a combination of human, process and machine parameters, and supports human-machine interaction. The solution offers: 1) a reactive (alarms), 2) predictive (warnings) and 3) proactive (maintenance) decision support to shop floor workers. Reoccurrence of problems will be minimized by storing and sorting the problems systematically and combining them with user generated solutions into the machine book – thereby enabling self-learning workplaces. The solutions to a specific problem can also be rated by the workers. In addition, an employee can generate new solutions in forms of comments, videos or pictures. As a conclusion, self-learning manufacturing workplaces are able to increase the workers’ autonomy and competence by providing them the knowledge required for carrying out specific tasks. 4.4 In-situ mobile learning The increasingly needed flexibility of workers leads them to perform a wider range of tasks and share more responsibilities in manufacturing (Appelbaum 2013). This causes the pervasive need of overall on-the-job knowledge, available at the right time in the right place. Furthermore, knowledge is subject to continuous change as work practices evolve and requirements change. So far, declarative and often abstract generic knowledge is acquired “off-the-job”, and it appears that this gap can be bridged by mobile learning in the right context (Aehnelt & Wegner, 2015; Frohberg et al., 2009; Ullrich, 2016). Workers need context-aware learning in real-life situations for continued education and training. Since in-situ learning is relatively new to manufacturing environments, the challenge includes finding the optimal way to utilize contextual and real-time machine-generated data, and to design and deliver the learning service so that it is effective, efficient and widely accepted. Case vignette 4 Schaeffler is a large German automotive supplier. The studied plant recently changed the former functional shop floor organization towards a new value stream design. Along with these organizational changes came changes to the role of the individual worker. Formally deeply specialized personnel now works in diversified areas requiring a variety of skills and knowledge. However, expert knowledge is still needed to solve tough problems. Currently there are three steps for competence development within the company: formal trainings for learning factual knowledge, mentoring for the transfer of expert knowledge and the learning directly on the shop floor within real working contexts right at the machines. In these settings, several problems surface: (1) the knowledge transferred in formal trainings is not directly related to specific workplace requirements. (2) Mentoring defines the learning content and its recipients only through specific circumstances. (3) Learning directly on the machine is difficult as the complexity of the problem often requires an expert onsite which induces a resource problem. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 495 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Richter, S. Vodanovich, M. Steinhüser & L. Hannola: IT on the Shop Floor - Challenges of the Digitalization of Manufacturing Companies As a solution, a mobile learning approach enables the company to detach knowledge transfer from formal contexts and enables the learner to consume the knowledge when needed. Four core components allow individual, context specific learning and therefore facilitate a sustainable learning arrangement. 1) The learning system includes a sensory interface to the workplace, sensing the machine state as well as the operator. 2) An automatic evaluation of the incoming sensory data provides context- and situation- sensitive problem-solving and learning content. In case of an unknown or currently unresolvable problem, expert assistance is necessary. 3) In such cases the expert would be included into the situation virtually first using audio/video tele cooperation. 4) With the usage of wearable Augmented Reality (AR) devices, such as data glasses, the learning context becomes completely immersed into the work place and the current work situation. As the worker has both hands free, true parallel working and learning is possible. With the introduction of appropriate learning systems, the transaction costs for identifying and consuming necessary information can be reduced. Also, the breakthroughs in mobile device technologies over the past years now allow the design of innovative learning arrangements whereby the boundaries between working and learning will disappear in the future. Discussion In the last years technical infrastructures have become more and more sophisticated, with large bandwidth networks, affordable software solutions and large storing capacities. Notwithstanding, as we have shown in this paper, a number of sociotechnical trends lead manufacturing companies to change the way they work. One of these changes includes designing people-centred workspaces that pay more attention to their employees and put them into the centre of their efforts (Campatelli et al., 2016; Steinhüser et al., 2017). Creating an environment that contributes to more efficiency and increasing workplace satisfaction requires more than just implementing appropriate technical solutions. As technology matures, the focus of IT development can shift from a largely technical perspective to a more holistic sociotechnical perspective. Rather than focusing on centralized computer systems and treating the worker as an entity, not yet replaced by machines, the humanistic view focuses on human-human interactions where IT serve as tools to deliver support for specific tasks (Nurminen, 1987). When we acknowledge that the human worker keeps a preferred role in future manufacturing systems through the ever-rising demand in complexity, knowledge work and decision making, the humanistic perspective might be the only sustainable point of view to take. Taking this view, it also seams easier to design for basic human needs as autonomy, relatedness and competence (Gagné & Deci, 2005; Spreitzer, 1997) as well as variety (Turner & Lawrence, 1965) in the first place, as these can be formulated as core objectives enabling a humanistic design approach. Advances in technology and organizational themes as well as changes in the society are important input variables that stimulate the creative process of designing future work 496 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Richter, S. Vodanovich, M. Steinhüser & L. Hannola: IT on the Shop Floor - Challenges of the Digitalization of Manufacturing Companies environments. Although called “digital challenges” they have one common theme: Keeping the worker “in the loop” with appropriate information. Moreover, the digital challenges aim to extend the natural sensory reach and information processing capabilities of an individual human worker (self-learning manufacturing workplaces), the field of interaction, e.g. vision, touch or hearing (digitally augmented human work) and further aim to strengthen knowledge absorption capabilities of individuals (in-situ mobile learning) and knowledge distribution within communities (worker-centric knowledge sharing). Conclusion We started this paper with an overview of emerging sociotechnical trends in manufacturing that coalesce to establish new ways of work in smart factories. Technological advancements in terms of IoT, Big Data and others drive organisational change in a manner not previously seen. Organisations must simultaneously incorporate and leverage the increasing shifts in technologies whilst maintaining a corporate culture that facilitates the most efficient and effective work force. Consequently, employees on the shop floor are expected to adjust their work practices to take into account the changing technologies and increasing complexity. Drawing on the detailed insights from six manufacturing companies that we gathered as part of a European project aiming to create attractive and intelligent work places in a factory of the future, we demonstrate how the manufacturing industry can leverage challenges they are experiencing. With this conceptualisation of the current situation as “digital challenges” for manufacturing companies, we contribute to a better theoretical understanding of the changing nature of IT on the Shop Floor. The four illustrated digital challenges span a wide range and are capable of supporting different facets of the knowledge practices in manufacturing companies. Taking into account different knowledge management facets helps to better understand and meet the needs and requirements as expressed by prospective users moving them in the focus of the implementation efforts. We have observed that workers expect new digital solutions to draw on what they already are familiar with from their private lives, e.g. designing, commenting, searching or networking functionalities in the style of well-known internet platforms. In this context, ICT seems to play more and more the role of a hygiene factor that supports the workers in an “invisible” way. This implies that the pure existence of a new solution is not in itself able to give increased satisfaction or lead to higher motivation, however dissatisfaction often results from its absence or inadequate design. This calls for more research that contributes to creating worker-centric factory solutions of the future. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 497 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Richter, S. Vodanovich, M. Steinhüser & L. Hannola: IT on the Shop Floor - Challenges of the Digitalization of Manufacturing Companies Acknowledgement This study has received funding from the European Union's Horizon 2020 research and innovation programme under Grant Agreement n° 636778. We thank the above mentioned industrial partners and our friends and colleagues from Virtual vehicle research center, Università degli Studi di Firenze and Evolaris for their support with this paper. References Aehnelt, M. and Wegner, K. (2015). Learn but work! Towards self-directed learning at mobile assembly workplaces. Proceedings of the 15th International Conference on Knowledge Technologies and Data-driven Business. ACM. Appelbaum, E. (2013). The impact of new forms of work organization on workers. In: Anthony, G., Belanger, J., Lapointe, P. A., & Murray, G. (eds.). Work and Employment in the High Performance Workplace. Routledge. Pp. 120. Armbruster, H., Jung Erceg, P., Pandza, K. and Dreher, C. (2007). Managing knowledge in manufacturing: results of a Delphi study in European manufacturing industry”, International Journal of Foresight and Innovation Policy, 3 (3), pp. 256-276. Bharadwaj, A., El Sawy, O., Pavlou, P. and Venkatraman, N. (2013). Digital business strategy: Toward a next generation of insights. MIS Quarterly, 37(2), pp. 471–482. Bono, R. and Pillsbury, S. (2016). 2016 Industrial manufacturing trends. Strategie& PWC Report. Available at: http://www.strategyand.pwc.com/media/file/2016-Industrial-Manufacturing- Trends.pdf Bradley, A. (2015). Manufacturing Connectivity and Data Integration. Industry Week, 264 (2). Brettel, M., Friederichsen, N., Keller, M. and Rosenberg, M. (2014). How Virtualization, Decentralization and Network Building Change the Manufacturing Landscape: An Industry 4.0 Perspective. International Journal of Mechanical, Aerospace, Industrial, Mechatronic and Manufacturing Engineering, 8 (1) pp. 37-44. Brynjolfsson, E. and McAfee, A. (2011) "Race against the machine." Digital Frontier, Lexington, MA. Campatelli, G., Richter, A., and Stocker, A. (2016). Participative Knowledge Management to Empower Manufacturing Workers. International Journal of Knowledge Management (IJKM), 12(4), pp. 37-50. Chi H-L., Kang S-C. and Xiangyu W. (2013). Research trends and opportunities of augmented reality applications in architecture, engineering, and construction. Automation in Construction, 33, pp. 116-122. Daeuble, G., Oezcan, D., Niemoeller, C., Fellmann, M., Nuettgens, M. and Thomas, O. (2015). Information needs of the mobile technical customer service – a case study in the field of machinery and plant engineering. Proceedings of the 48th Hawaii International Conference on System Science (HICSS). Danson, F., Davenport, T., and Guszcza, J. and Lucker, J. (2016). Analytics Trends 2016. Deloitte Report. Available at: https://www2.deloitte.com/content/dam/html/us/analytics-trends/2016- analytics-trends/pdf/analytics-trends.pdf. Daugherty, P., Carrel-Billiard, M. and Biltz, M. J. (2016). Technology Vision 2016 People First: The Primacy of People in a Digital Age. Accenture Technology Vision. Available at: https://www.accenture.com/t20160314T114937__w__/us-en/_acnme dia/Accenture/Omobono/TechnologyVision/pdf/Technology-Trends-TechnologyVi sion- 2016.pdf 498 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Richter, S. Vodanovich, M. Steinhüser & L. Hannola: IT on the Shop Floor - Challenges of the Digitalization of Manufacturing Companies Denner, J., Richter, A., and Heinrich, P. (2015). First version of requirements of workers and organisations. Project Report D 1.1. FACTS4WORKERS: Worker-Centric Workplaces in Smart Factories. Frohberg, D., Goth, C. and Schwabe, G. (2009). Mobile learning projects: a critical analysis of the state of the art. Journal of Computer Assisted Learning, 25, pp. 307-331. Gagné, M., and Deci, E. L. (2005). Self‐determination theory and work motivation. Journal of Organizational Behavior, 26(4), pp. 331-362. Gorecky, D., Schmitt, M., Loskyll, M. and Zühlke, D. (2014). Human-machine-interaction in the industry 4.0 era. 12th IEEE International Conference on Industrial Informatics. Hanelt, A., Piccinini, E., Gregory, R. W. and Hildebrandt, B. (2015). Digital transformation of primarily physical industries – exploring the impact of digital trends on business models of automobile manufacturers. 12th International Conference on Wirtschaftsinformatik, Osnabrück, Germany. Heinrich, P., and Richter, A. (2015). Captured and structured practices of workers and contexts of organizations. Project Report D 1.2. FACTS4WORKERS: Worker-Centric Workplaces in Smart Factories. Hessman, T. (2013). The Dawn of the Smart Factory. Industry Week, February 2013, pp. 15-19. Huyler, D., Pierre, Y., Ding, W. and Norelus, A. (2015) Millennials in the Workplace: Positioning Companies for Future Success, SFERC 2015: 114. Kagermann, H. (2015). Change through digitization—Value creation in the age of Industry 4.0. Management of permanent change. Springer, Wiesbaden, pp. 23-45. Köffer, S. (2015). Designing the digital workplace of the future – what scholars recommend to practitioners. International Conference on Information Systems. Fort Worth, USA. Lee, J., Lapira, E., Bagheri, B. and Kao, H. (2013). Recent advances and trends in predictive manufacturing systems in big data environment. Manufacturing Letters, 1, pp. 38-41. Mavrikios, D., Papakostas, N., Mourtzis, D. and Chryssolouris, G. (2013). On industrial learning and training for the factories of the future: a conceptual, cognitive and technology framework. Journal of Intelligent Manufacturing. 24 (6). McAfee, A. and Brynjolfsson, E. (2014). The second machine age. Work, progress, and prosperity in time of brilliant technologies. New York: WW Norton & Company. McNelly, J. (2016). How manufacturing can shape our future? World Economic Forum. Available at: https://www.weforum.org/agenda/2016/07/how-manufacturing-can-shape-our-future/. Ng, W. (2012). Can we teach digital natives digital literacy? Computers & Education, 59(3), pp. 1065–1078. Nurminen, M. I. (1987). Different perspectives: What are they and how can they be used? Working Conference on System Design for Human Development and Productivity, Berlin, Germany. O’Donovan, P., Leahy, K., Bruton, K. and O’Sullivan, D.T.J. (2015). Big data in manufacturing: a systematic mapping study. Journal of Big Data, 2(1), p. 20. Orio, G. D., Cândido, G. and Barata, J. (2015). The Adapter module: A building block for Self- Learning Production Systems. Robotics and Computer-Integrated Manufacturing, 36, pp. 25– 35. Richter, A., and Riemer, K. (2013). Malleable End-user Software. Business & Information Systems Engineering, 5(3), pp. 195-197. Richter, A., Stocker, A., Müller, S. and Avram, G. (2013). Knowledge Management Goals Revisited – A Cross-Sectional Analysis of Social Software Adoption in Corporate Environments. VINE: Journal of Information and Knowledge Management Systems, 43 (2), pp. 132-148 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 499 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Richter, S. Vodanovich, M. Steinhüser & L. Hannola: IT on the Shop Floor - Challenges of the Digitalization of Manufacturing Companies Schmidt, R., Möhring, M., Härting, R.-C., Reichstein, C., Neumaier, P., and Jozinović, P. (2015). Industry 4.0-potentials for creating smart products: empirical research results. 18th International Conference on Business Information Systems (BIS). Spreitzer, G. M., Kizilos, M. A. and Nason, S. W. (1997). A dimensional analysis of the relationship between psychological empowerment and effectiveness satisfaction, and strain. Journal of Management, 23(5), 679-704. Steinhüser, M., Waizenegger, L., Vodanovich, V. and Richter, A. (2017). Knowledge Management without Management – Shadow IT in Knowledge-intense Manufacturing Practices. Proceedings of the 25th European Conference on Information Systems (ECIS 2017). Tapscott, D. (2008). Grown Up Digital: How the Net Generation in Changing Your World. HC, Mcgraw-Hill. Tibaut, A., Rebolj, D. and Perc, M. N. (2016). Interoperability requirements for automated manufacturing systems in construction. Journal of Intelligent Manufacturing, 27(1), pp. 251– 262. Turner, A.N. and Lawrence, P.R. (1965). Industrial Jobs and the Workers: An Investigation of Response to Task Attributes. Harvard University, Division of Research, Graduate School of Business Administration. Ullrich, C. (2016). Rules for adaptive learning and assistance on the shop floor, 13th International Conference on Cognition and Exploratory Learning in Digital Age, pp. 261-268. Ullrich, A., Vladova, G., Thim, C. and Gronau, N. (2015). Akzeptanz und Wandlungsfähigkeit im Zeichen der Industrie 4.0. HMD Praxis der Wirtschaftsinformatik, 52(5), pp. 769–789. Van Herreweghe, M., Veronesi, L., Santagate, J., Veronesi, l., Van Herreweghe, M. (2015). IDC FutureScape: Worldwide Manufacturing 2016 Predictions. Vodanovich, S., Sundaram, D. and Myers, M. (2010). Research commentary - digital natives and ubiquitous information systems. Information Systems Research. 21(4), pp. 711–723. Wambaa, S. F., Akter, S., Edwards, A., Chopin, G. and Gnanzou, D. (2015). How “big data” can make big impact: Findings from a systematic review and a longitudinal case study. International Journal of Production Economics, 165, pp. 234–246. Wang, E., Myers, M. and Sundaram, D. (2012). Digital Natives and Digital Immigrants: towards a Model of Digital fluency. Proceedings of the 20th European Conference on Information Systems (ECIS 2012). Wang, Q. E., Myers, M. D. and Sundaram, D. (2013). Digital natives and digital immigrants. Business & Information Systems Engineering 5(6), pp. 409-419. Wan, S., Gao, J.X., Li, D. and Evans, R.D. (2014) Knowledge management for maintenance, repair and service of manufacturing system, 12th International Conference on Manufacturing Research, Southampton Solent University, Southampton. Zhong, R.Y., Huang, G.Q., Lan, S., Dai, Q.Y., Xu, C. and Zhang, T. (2015). A big data approach for logistics trajectory discovery from RFID-enabled production data. International Journal of Production Economics, 165, pp. 260-272. 500 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Airport Operations Modelling: Agent Based Modelling of Ground Crews 35 BLAŽ RODIČ & ALENKA BAGGIA Abstract Contribution presents the results of design research project aimed at the development of a simulation model for regional airports ground crew operations using a novel hybrid DES-ABM approach. We have used DES methodology to model the aspects of airport operations that are static or outside the main scope of our model, e.g. flight traffic, and ABM methodology to model the operation of ground crews, where the scheduling and work processes are variable. Use of ABM allows us to model the dynamic aspects of ground crew operations, such as dynamic scheduling and assignment of crews to flights, making the model more realistic and more flexible than when using DES alone. The hybrid DES-ABM simulation model is to be used in a ground crew scheduling system development for validation and optimization of heuristic scheduling algorithms. The resulting model contributes to the knowledge of domain experts with measurable improvements of ground crew scheduling solutions. Keywords: • airport operations • ground crew • simulation and modelling • agent based modelling • CORRESPONDENCE ADDRESS: Blaž Rodič, Faculty of Information Studies, Ljubljanska cesta 31a, 8000 Novo mesto, Slovenia, e-mail: blaz.rodic@fis.unm.si. Alenka Baggia, University of Maribor, Faculty of Organizational Sciences, Kidričeva cesta 55a, 4000 Kranj, Slovenia, e-mail: alenka.baggia@fov.uni-mb.si. https://doi.org/10.18690/978-961-286-043-1.35 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 502 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Rodič & A. Baggia: Airport Operations Modelling: Agent Based Modelling of Ground Crews Introduction International airports are operating in a competitive environment. The requirements of low cost airlines and prevalence of cost-cutting measures in aviation is forcing airports to optimise their operations and reduce costs while still offering efficient and high quality airline and passenger services. Efficiency, quality and costs are conflicting criteria, presenting airports with a difficult optimisation problem. To improve efficiency and reduce costs, an airport can optimize the availability, i.e. schedule, of resources used for passenger and airplane services. However, airports are complex logistics systems, and the analysis and optimization of processes can be a tedious and time-consuming task. Airport processes have their own specifics since they can be interleaved and can therefore not be analysed separately. Since they are also subject to frequent changes, they cannot be modelled with an exact mathematical approach. A wide range of scheduling problems can be found in the airports and elsewhere in the airline industry. Scheduling problems in these environments do not have straightforward solutions. Their complexity varies according to the number of constraints addressed. Typical scheduling problems in the airport domain are: aircraft scheduling (Bian, Burke, Jain & Kendall, 2005; El Moudani & Mora-Camino, 2000; Gurtner, Bongiorno, Ducci & Miccichè, 2016; Yan & Chen, 2008), ground crew scheduling (Clausen, 2011), disruption management (Pereira, Fadigas, Senna & Moret, 2011)(Løve, Sørensen, Larsen & Clausen, 2002), aircraft landing sequence scheduling (García Ansola, García Higuera, Pastor & Otamendi, 2011; Tavakkoli-Moghaddam, Yaghoubi-Panah & Radmehr, 2012) or personnel training scheduling (Brucker, Qu & Burke, 2011). Particularly in the domain of personnel scheduling, the most popular type of scheduling problem is the aircraft crew scheduling, while the problem of ground crew has mainly been neglected. Nevertheless, if an airline wishes to produce a high quality service for their passengers, the ground crew is as important as the aircraft crew. The aim of our research was to produce a viable approach to solve ground crew scheduling problem at the airport. The contribution of our research is an IT artefact used to automate workforce scheduling and shift generation at a small international airport. The system produces floating shifts adjusted to variation of workforce requirements throughout the day in a fraction of the time needed for manual schedule preparation, and allows dynamic rescheduling in case of unforeseen events or disruptions. In order to achieve optimal workforce deployment, we needed to minimize the criteria of personnel costs and aircraft delay costs. Prevalent methodology for this purpose is discrete event simulation (DES) methodology, which is well suited for well-defined processes. The dynamics of airport operations however requires a certain level of adaptability, and the modelling of adaptable business process requires a flexible methodology, such as ABM. In this research, we addressed the problem of ground crew scheduling in a more efficient and innovative way. A similar solution for a small airport in need of an adaptable system 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 503 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Rodič & A. Baggia: Airport Operations Modelling: Agent Based Modelling of Ground Crews with accurate feedback and the possibility of ad-hoc changes does not exist according to our literature research. This paper presents the development of a novel hybrid DES-ABM simulation model of regional airports ground crew operations, which will be used for schedule verification and optimization, specifically for the optimization of workforce quantity present in work groups covering specific types of tasks during the working day at the airport. The simulation model can be used to support the scheduling process in international airport of similar size. Literature review Since 19% of delays in air traffic are caused by airport operations (Burke et al., 2010), these operations cannot be neglected. Diverse approaches and simulation studies have been presented in the literature. As discussed in Bazargan (2004), to efficiently cover the aircraft maintenance operations, aircraft were classified according to the stopover time. Based on the length of stopover, the entire maintenance program with exact numbers of technicians and daily shifts are proposed. Kleinman, Hill & Ilenda (1998) have used stochastic methods to calculate the delay costs in air traffic. Attempts were even made to influence the schedule of aircraft landings in order to balance the workload of ground staff. Boysen & Fliedner (2011) have tried to adapt the landing schedule in order to efficiently schedule the ground crew. In general, most of the research in the area of airport operations is focused on optimization of airport surface operations (Weiszer, Chen & Stewart, 2015), in some cases divided into passenger-related tasks and aircraft-related tasks (Clausen, 2011). Most of the solutions for ground crew scheduling are focused on only one work group (Chu, 2007; Lin, Xin & Huang, 2015; Weiszer et al., 2015). Herbers (2005) covers some aspects of ground staff planning with proposed procedures for requirement planning. Some of the solutions are limited to fixed shifts and static demands (Lin et al., 2015), while others use mathematical models not appropriate for complex systems (Bazargan, 2004; Qi, Yang & Yu, 2004). In general, the approaches to shift planning and crew assembly often use assumptions with strongly limited validity, or deal with simplified problems, thus limiting wider practical applicability. Methodology 3.1 Design science research Design science research is a process of creating new knowledge through design of novel and innovative artefacts and analysis of their performance with reflection to enable improvement and understand the behaviour of aspects of Information Systems (IS) (Vaishnavi & Kuechler, 2015). According to Hevner, March, Park & Ram (2004), design science research in IS addresses the so called “wicked” problem, characterized by 504 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Rodič & A. Baggia: Airport Operations Modelling: Agent Based Modelling of Ground Crews unstable requirements and constraints, complex interaction between subcomponents, inherent flexibility to change design processes, dependence on human cognitive and social abilities. Considering all these characteristics, we concluded that the problem of ground crew scheduling matches the description given. Similar to other design science research our objective is to develop a technology-based solution to a relevant problem of personnel scheduling (Vaishnavi & Kuechler, 2007). Hevner (2007) introduces the three design science research cycles in a design research project: the relevance cycle, the rigor cycle and the design cycle. The research process model as presented in Vaishnavi & Kuechler (2008) consists of awareness of the problem, suggestion, development, evaluation and conclusion. These steps and cycles, together with the design science research checklist (Vaishnavi & Kuechler, 2007) were used as a guideline to develop the artefact. Our main research question, that we have sought to answer, was:  how can the addition of ABM components to a DES airport ground crew model be used to improve the model in terms of adaptability and comprehensibility? 3.2 Modelling and Simulation A part of the IT artefact development phase was the development of a simulation model for validation and optimization of heuristic scheduling algorithms. According to Borshchev (2013), three different types of simulation methods can be applied to a given problem, based on the abstraction level of the model. System dynamics (SD) (Forrester, 1961; Sterman, 2000), discrete event simulation (DES) (Stewart, 2004), or Agent based modelling (ABM) (Gilbert, 2007) can be used to map the real world problem to the model. Most of the simulation solutions for ground crew scheduling at the airport are based on DES method. Although this approach has historically had a significant success in scheduling process optimization, the addition of ABM based components can add more flexibility to a simulation model. Using ABM, we can model the movement of individual crewmembers (as agents) who can make their own decisions about the performance of the tasks assigned to them according to a predefined set of rules. Most of real events are much easier to model using agents; therefore, the model is more realistic and flexible than the DES model. Nevertheless, both models enable monitoring of resource utilization and other important statistics. According to Siebers, Macal, Garnett, Buxton & Pidd (2010), ABM is a better choice for dynamic process modelling since descriptive models of decision making processes can be included in the model, whereas DES models are more appropriate for the normative approach. Although ABM can be considerably more difficult to develop than SD and DES models, it allows the spatial or geospatial aspect to be included in the behaviour of an individual agent. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 505 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Rodič & A. Baggia: Airport Operations Modelling: Agent Based Modelling of Ground Crews 3.3 Proposed research design In our research, we combined the design science research project with the simulation modelling approach. At the beginning of the research, the identification of opportunities and problems in the actual ground crew scheduling environment took place. Afterwards, the criteria were set to enable evaluation of the efficiency of the proposed artefact. Semi structured interviews were conducted with scheduling experts for each service group with the goal of identifying the tasks and scheduling criteria. In this paper, the second major iteration of the relevance cycle is presented. Outputs from the experimental and field-testing were used to improve the artefact. In the rigor cycle an exhaustive literature and related work study in the knowledge base was conducted to ensure the presented solution is not only a routine design based on the application of known design process and artefacts. Since the combination of DES and ABM has not been previously used to solve the ground crew scheduling problem, our contribution can be seen as an improvement. In the final phase, our artefact came in a form of an instantiation. In the following section, we present the development of our artefact. Following the steps proposed by Vaishnavi & Kuechler (2008), the problem is defined and the model suggestions are given. The model is then developed and evaluated with proper conclusions given. In the phase of development, simulation modelling techniques were used to achieve the given goals. The problem definition The aim of this step is to generate problem awareness. The modelled airport is a regional hub located in the southeast Europe with over 30.000 flights and over 1.400.000 passengers per year. The airport has a single 3300 m long runway equipped with CAT III/B Instrument Landing System, a 23 m wide taxiway, and 25 independent parking positions. Airport’s Aerodrome Reference Code (International Civil Aviation Organization) is 4E. The terminal capacity is 500 passengers per hour, with 13 check-in counters and 2 baggage claim conveyors. The total area of the airport is 320 hectares. The airport was selected for the design research project due to similar size and organization to other regional airports (e.g. Salzburg WA Mozart airport) and the established R&D relationship with the faculty. Ground crew scheduling problem at the considered airport and therefore also the operation of the simulation model is confined with the arrival and departure of the aircraft, i.e. tasks can only be performed on aircraft, present at the airport. The tasks are performed in a predefined time sequence according to several criteria (aircraft size, carrier, etc.). The execution times specified by the airport scheduling experts are deterministic, i.e. fixed, making the model deterministic as well. The execution times are determined from experience and represent the maximum expected task duration. 506 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Rodič & A. Baggia: Airport Operations Modelling: Agent Based Modelling of Ground Crews Until the proposed IT artefact based solution was introduced, management at the airport used spreadsheets to manually generate schedules based on their knowledge and prior experiences. Ad-hoc solutions and schedule changes due to frequent disruptions of the aircraft timetable (arrivals and departures) required a lot of effort and were too slow to allow a timely but optimal response. In addition, the workforce requirements in peak and off-peak times were not properly addressed and have been only partially solved with the employment of part time workers (students). Interviews with manual scheduling experts, e.g. crew managers, were conducted to extract the decision criteria and heuristic rules for scheduling. All the criteria identified were stored in the Flight Information System (FIS), enabling a smooth transition to the algorithm based scheduling. The identified scheduling criteria were as follows:  Type of stopover (arrival or departure),  Flight type (charter, scheduled or transfer),  Aircraft type (320, CRJ, SH3 etc.),  Carrier (9 carriers are currently using the airport),  Destination. 4.1 Ground crew operations The scheduling criteria presented in previous section were used to define tasks which have to be performed for the arriving and departing aircraft. The tasks of the ground crew are performed by crewmembers with appropriate skills. An individual crewmember can have one or more skill groups defined. Each skill group incorporates several different tasks therefore; crewmembers in this skill group are able to perform all the given tasks in their skill group. Some tasks are simple and can be performed by almost any skill group (e.g. luggage handling), while others require specific knowledge or other skills and can therefore be performed only by certain skill groups. With the workforce requirements calculated, shifts have to be defined. Several rules are given to define a start time and the duration of the shift: maximum and minimum duration, allowed start times, number of shifts an employee can be scheduled to during one workday. The availability and schedule of resources used also have to be defined. During one shift, each skill group performs only one type of a task. In general, tasks are divided into three main groups: a) aircraft supply, b) passenger service and c) technical service. Figures 1 and 2 describe the process of passenger service (fixed tasks are not included) for the arrival and departure of a scheduled passenger flight (aircraft of type S, e.g. Canadair CRJ 200 LR). The passenger service department included six different operational tasks, which were mapped to skill groups with the same name, listed in Figure 1. Most of the skill groups required two persons to be assigned to the skill group. The two exceptions are the skill groups lost luggage referee at the arrival and Sales desk referee at the departure, where according to the requirements; two workers should be assigned to the task. The required number of individual workers in specific task group is 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 507 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Rodič & A. Baggia: Airport Operations Modelling: Agent Based Modelling of Ground Crews not shown in the graphical presentation. As it can be seen from Figure 1 and 2, most of the tasks overlap and must be performed simultaneously. The tasks that require a strict sequence are the tasks of guidance and transfer in Figure 2, which cannot be stared before the check-in task is finished. The sales desk in this particular case is opened three hours prior to the departure of the aircraft and stays opened one hour after the departure. The arrival services are mostly completed long before the departure of an aircraft, however they affect the availability of ground crew groups and equipment. Figure 1: The process of passenger service for the arrival of type S aircraft 508 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Rodič & A. Baggia: Airport Operations Modelling: Agent Based Modelling of Ground Crews Figure 2: The process of passenger service for the departure of type S aircraft Our work in the relevance cycle has so far resulted in two versions of heuristic work- force requirement scheduling algorithms and a shift construction algorithm. The algorithm for generation of floating shifts and assignment of individuals to shifts is described in (authors, source anonymized). The shifts are generated according to the generated workforce requirements and shift length demands. In order to automate the validation of algorithm-generated schedules and shorten the algorithm tuning-verification cycle we have developed a simulation model of airport operations used, which combines DES and ABM. The model development is described in the following chapters. Selection of modelling methodology Different simulation methodologies can be used in airport scheduling. While the most frequently used (especially in the case of passenger flow) discrete event simulation (DES) has been used to simulate airport situations for decades, agent based modelling (ABM) has only recently gained attention of the researches in the area of airport scheduling. According to Piera Eroles, Ramos & Fernandez Robayna (2009), DES has proved to be efficient in the case of airport ground crew scheduling problem. ABM has been used in various cases, from optimization of the air transportation system (Bouarfa, Blom & Curran, 2016), to airport capacity prediction (Peng, Wei, Junqing & Bin, 2014). Due to efficient usage of DES and ABM combination in other personnel scheduling domains, we can expect that the combination of both methods can also add significant value in the case of airport ground crew scheduling. While the DES methodology is efficient to represent the flow of agents and diverse resources in the case of airport ground crew scheduling, ABM components allow us to model the activities and the communications 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 509 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Rodič & A. Baggia: Airport Operations Modelling: Agent Based Modelling of Ground Crews between crew groups, their supervisors and aircraft management in detail. Using this methodology, we can lower the level of abstraction and enable a comprehensive insight on the ground crew problem, making it clear and presentation friendly when presenting it to the airport management. In addition to the advantages of the DES, where the resource utilization and time agent spends for individual activities can be addressed and optimized, the ABM allows the spatial insight on agents with detailed ground movements and estimation of time needed for the movements from one site to another. According to Clausen (2011), ground crew tasks can be divided into passenger-related tasks and aircraft-related tasks, where the latter include maintenance, cargo, baggage, loading, cleaning, catering, towing and operations. While some personnel scheduling problems are not constrained with the availability of equipment, ground crew uses several different types of equipment within their tasks. In addition, skills of personnel have to be considered. Only few tasks performed by ground scheduling crew are plain, with no sequences and dependencies defined. Several overlapping tasks have been identified, while other tasks are interconnected. Due to these attributes, the ground crew scheduling problem gains complexity, number of constraints and variations of schedules. Mathematical models used to resolve the personnel scheduling problem in advanced scheduling tools could be used at the level of individual work group, but due to interconnectivity of tasks and resources in a case of ground crew, other techniques need to be employed (Qi et al., 2004). Since high level scheduling solutions can be too costly for small airports, many of them still use solutions which combine manual scheduling with basic spreadsheets or similar basic tools. Model development Since most general-purpose modelling tools are limited to a single methodology (SD, ABM, DES), the combination of DES and ABM methodologies within a system model generally required the utilization and integration of several general-purpose modelling tools or the development of proprietary code for the implementation of the ABM model. However, the AnyLogic tool (http://www.anylogic.com) allows the use of all three simulation methods, and from version 7 it also enables the usage of agents in DES and ABM model, allowing easier combinations of both methods to be implemented in one simulation model. Borshchev (2013) emphasizes the possibility of a DES servers and entities to be implemented as agents and use of agents to introduce inter-component messaging into the model. The latter approach is used in the presented case. DES and ABM models are linked via passing a message between aircraft and work group agents, where aircraft traffic model is presented as a DES model and ground crew work model is presented as ABM model. 510 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Rodič & A. Baggia: Airport Operations Modelling: Agent Based Modelling of Ground Crews 6.1 Model data The simulation model generates arrivals and departures of aircraft based on the flight schedule data transferred from the FIS (Flight Information System of the airport) into internal Anylogic database. Table 1 shows an example of parameters stored in the database, assembled from the FIS. DD1 defines the date of the flight, FLTNO_A and FLTNO_D describe the aircraft’s arrival and departure code. The type of traffic (e.g. C – charter passenger only, F – scheduled cargo/mail, S – scheduled passenger) is defined in column TRFTYP, ST_A and ST_D show the time of arrival or departure, and ROUTE_A and ROUTE_D designate the arrival or departure airport, and ACTYP defines the type of aircraft. Table 1: Flight schedule stored in database DD1 FLTNO_ FLTNO_ TRFTY ST_A ST_D ROUTE_ ROUTE_ ACTY A D P A D P 01.05.201 JP648 S 00:20:0 IST 735 6 0 01.05.201 JP299 S 02:40:0 CPH-BCN 320 6 0 01.05.201 FAH6972 6972 F 06:25:0 VIE F27 6 0 01.05.201 JP376 S 06:45:0 BRU CRJ 6 0 01.05.201 JP649 S 06:50:0 IST 735 6 0 01.05.201 JP102 S 06:50:0 MUC CRJ 6 0 01.05.201 JP938 S 07:00:0 WAW CRJ 6 0 01.05.201 JP687 S 07:05:0 IST 735 6 0 6.2 Aircraft traffic simulation model The level of abstraction and autonomy has to be identified prior to the development of the simulation model. According to available data, we have identified the DES as the most appropriate method to model the aircraft traffic simulation model. For the purpose of personnel scheduling, only arrivals and departments of the flights are important in our simulation model. Further on, the model was upgraded to the ABM elements where the movement of an element on the surface is easier to implement. The arrivals and departures constitute of several discrete tasks that involve ground crew members. Delay elements are used to model a simple delay in the process. In our case, the delay elements include the state of arrival or departure services depending on the 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 511 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Rodič & A. Baggia: Airport Operations Modelling: Agent Based Modelling of Ground Crews ABM of ground services. Services for an individual flight are completed when all the tasks performed by the ground crew are finished. To make the model more transparent, a physical layout of the airport was used and paths of the aircrafts were added to the model. Due to focus on workgroup tasks and client specifications, taxiing and parking logistics were not modelled and are excluded from the model statistics. The aircraft traffic model consists of two submodels: the Arrivals submodel, and the Departures submodel. The separation was a logical sequence of the airport business rules and inability to track individual aircraft in FIS after the arrival. The arrivals submodel uses the arrival schedule from the FIS to generate the aircrafts. Aircraft taxi to the gates (moveToParkA and queueArr) already waits on the apron for an assignment. The submodel of arrivals ends with an element of parking or exit point from the system. While the model of departures assumes the aircraft is present at the airport and available to start the tasks when needed. The departure tasks start times are based on the departure times given in the FIS schedule. The modelled departure times depend on the execution of tasks and should not be delayed when scheduling constraints are defined properly. In the Departures submodel an aircraft first has to move to the gates (elements moveToParkD, queueDept and moveToGates), where it is serviced (e.g. boarded by passengers, loaded with baggage, etc.), with the delay modelled with ServiceDept element. Afterwards, the aircraft moves to the runway (moveToD, TakeOff). The queues were modelled to enable the simulation of an aircraft waiting until a taxiway or a gate or a parking area is available. The FIS data is gathered in the elements arrivals and depts., linked to a local database with arrival and departure schedule and service requirements for each flight. The service requirements are assigned to every aircraft at the moment of its entry in the model according to the ideal heuristic requirements, where the availability of workforce is not an issue. The service task parameters are contained in the messages generated by aircraft agents and sent to the relevant ground crew work group agents. Work group agents maintain an internal queue of tasks, which are executed according to the FIFO (first-in first-out) rule and specified service start time. Since AnyLogic models all DES entities as agents, the addition of the message feature to the DES aircraft traffic model was straightforward. 512 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Rodič & A. Baggia: Airport Operations Modelling: Agent Based Modelling of Ground Crews Figure 3: Main view of the simulation model with DES model of aircraft traffic and airport layout 6.3 Ground crew model Due to relatively rigid process modelling in DES methodology, which hinder the modelling of dynamic aspects of ground crew operation, the decision was made to incorporate ABM to allow dynamic ground crew process modelling, while preserving the required level of abstraction. ABM has allowed us to model the dynamic aspects of ground crew operations with better analogies with the actual processes, making the model more comprehensible. ABM allows us to model the entities and processes in a way that is closer to reality, i.e. the ground service work groups have the role of service stations, however they travel to the aircraft and not vice versa; the sequence of services depends on the availability of service work groups, and the place of an aircraft within a service work groups’ internal queue; and perhaps most important, an aircraft can be serviced by several work groups simultaneously. Each work group agent has an internal state chart model of its task process, as shown in Figure 4. The initial state is Waiting, and here the agent waits for a service request message from an aircraft, with service requirements specifications (i.e. number of personnel, desired start of service, desired end of service). These requests are added to the internal queue and processed according to the FIFO rule. If an agent is in the Waiting 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 513 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Rodič & A. Baggia: Airport Operations Modelling: Agent Based Modelling of Ground Crews state (i.e. free), a request is queued, and model time equals the specified service start time, the work group agent moves to the aircraft, and begins the requested service, and performs until specified end time. After the servicing is complete, the work group agent sends a message to the aircraft and proceeds to the next aircraft in its internal queue or returns to the waiting area. Figure 4: State chart of the ABM of a ground crew group Evaluation The FIS serves as a database for the ground crew scheduling, providing an accurate source of data about arrivals and departures at the airport. The start, end and work requirements of tasks, which have to be performed at an aircraft, are determined by the attributes of the aircraft to be serviced. The availability of workers is determined by the workforce requirements schedule. The schedule is generated and optimized by the heuristic algorithm. By combining the schedule of optimized workforce numbers and ideal requirements of a flight, we can verify the effects of a generated workforce requirements schedule in practice and foresee the potential flight delay costs. Workforce requirements generated by the heuristic method described are used to vary the availability of workers during the simulation run. Workers are modelled as resources and arranged into work groups. Each work group performs only one type of task. A work group is then modelled as an agent. 514 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Rodič & A. Baggia: Airport Operations Modelling: Agent Based Modelling of Ground Crews Flight delays in the simulation results are mainly caused by the occupancy of personnel with other tasks (current priority rules are defined as a FIFO service system). Therefore, the discrepancy between ideal and modelled workforce requirements exists. Delays in the presented model are calculated for departures. Delays are measured by comparing the scheduled departure time as recorded in the FIS, and the departure time as recorded by the simulation model. The modelled delays are however exaggerated because the start times of tasks are not yet optimised and the start of a task is delayed unless all required workers are available. Further development of the model will include the execution of tasks with a reduced number of workers and longer execution time and the execution of tasks at earliest opportunity (i.e. time shifting of tasks) and should model flight delays more accurately. Conclusion Although managing disruptions of airport ground processes is a complex task (Kuster & Jannach, 2006), suitable personnel and equipment scheduling solutions are vital for efficient operation of an airport as a system. International airports face a constant challenge to coordinate all the departments, efficiently perform all operations needed and provide an excellent service to the passengers. Airport ground crew scheduling system does not have a straightforward or mathematical solution which could easily be implemented. The complexity of the problem and the necessity to solve it is not only an attribute of large airports. In our research, no appropriate solution or algorithm to solve the ground crew scheduling problem in a small international airport was found. Therefore a research was conducted to develop and evaluate an artefact to solve the ground crew scheduling problem in a small international airport. Two versions of heuristics were developed in this artefact to implement an efficient scheduling algorithm. The algorithm for generation of floating shifts and assignment of individuals to shifts is described in previous publication (Rodič & Baggia, 2013). Further, on, a simulation model was built to verify the proposed algorithm and enable further optimization of the processes. The simulation model presented used two simulation methodologies, DES and ABM. This combination provides us with an efficient and realistic model, which is used to simulate the results of the developed scheduling algorithm. According to the design science research checklist, all questions were answered during the presented phases. We were able to answer our main research question “How can the addition of ABM components to a DES airport ground crew model be used to improve the model in terms of adaptability and comprehensibility?”: using a suitable tool (i.e. Anylogic), we can combine the ABM and DES methodologies within a single model. Since ABM modelling requires more effort and produces a more complex model, it should be limited to the modelling of system elements, that are by nature dynamic and cannot be suitable modelled using DES methodology. Such an approach improves model comprehensibility 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 515 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Rodič & A. Baggia: Airport Operations Modelling: Agent Based Modelling of Ground Crews by more accurately modelling the behaviour of system elements with autonomous, dynamic behaviour, such as ground crew groups. Limitations of our research stem from the specifics of the airport processes, which are mostly dependent on its size. Therefore the developed approach and artefact can be reliably expected to be applicable only to airports of similar size. Furthermore, the execution times specified by the airport experts are deterministic, i.e. fixed, making the model deterministic as well. The development of a stochastic model would require lengthy recording of actual task execution times and matching with appropriate distribution function. The airport management has decided not to implement such a survey as of this time. Our future work on the research will involve model-based optimization of work-force requirements as outlined in the previous section and the adaptation of the entire scheduling solution to the airport’s development of infrastructure. References Bazargan, M. (2004). Airline Operations and Scheduling. Aldershot: Ashgate Publishing Limited. Bian, F., Burke, E., Jain, S. & Kendall, G. (2005). Measuring the robustness of airline fleet schedules. In G. Kendal, E. Burke, S. Petrovic & M. Gendreau (Eds.), Multidisciplinary scheduling: theory and applications (Vol. 1, pp. 381–392). New York: Springer Science + Business Media. http://doi.org/10.1007/0-387-27744-7_19 Borshchev, A. (2013). The Big Book of Simulation Modeling. AnyLogic North America. Bouarfa, S., Blom, H. & Curran, R. (2016). Agent-Based Modeling and Simulation of Coordination by Airline Operations Control. IEEE Transactions on Emerging Topics in Computing, 4(1), 1– 1. http://doi.org/10.1109/TETC.2015.2439633 Boysen, N. & Fliedner, M. (2011). Scheduling aircraft landings to balance workload of ground staff. Computers & Industrial Engineering, 60(2), 206–217. http://doi.org/10.1016/j.cie.2010.11.002 Brucker, P., Qu, R. & Burke, E. (2011). Personnel scheduling: Models and complexity. European Journal of Operational Research, 210(3), 467–473. http://doi.org/10.1016/j.ejor.2010.11.017 Burke, E. K., De Causmaecker, P., De Maere, G., Mulder, J., Paelinck, M. & Vanden Berghe, G. (2010). A multi-objective approach for robust airline scheduling. Computers and Operations Research, 37(5), 822–832. http://doi.org/10.1016/j.cor.2009.03.026 Chu, S. C. K. (2007). Generating, scheduling and rostering of shift crew-duties: Applications at the Hong Kong International Airport. European Journal of Operational Research, 177(3), 1764– 1778. http://doi.org/10.1016/j.ejor.2005.10.008 Clausen, T. (2011). Airport ground staff scheduling. Retrieved from http://orbit.dtu.dk/services/downloadRegister/5682298/Tommy Clausen PhD. thesis print version.pdf El Moudani, W. & Mora-Camino, F. (2000). A dynamic approach for aircraft assignment and maintenance scheduling by airlines. Journal of Air Transport Management, 6(4), 233–237. http://doi.org/10.1016/S0969-6997(00)00011-9 516 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Rodič & A. Baggia: Airport Operations Modelling: Agent Based Modelling of Ground Crews García Ansola, P., García Higuera, A., Pastor, J. M. & Otamendi, F. J. (2011). Agent-based decision-making process in airport ground handling management. Logistics Research, 3(2–3), 133–143. http://doi.org/10.1007/s12159-011-0052-y Gurtner, G., Bongiorno, C., Ducci, M. & Miccichè, S. (2016). An Empirically grounded Agent Based simulator for the Air Traffic Management in the SESAR scenario. Retrieved from http://arxiv.org/abs/1606.04241 Herbers, J. (2005). Models and Algorithms for Ground Staff Scheduling on Airports. Hevner, A., March, S., Park, J. & Ram, S. (2004). Design Science Research in Information Systems. MIS Quarterly, 28(1), 75–105. Hevner, A. R. (2007). A Three Cycle View of Design Science Research. Scandinavian Journal of Information Systems, 19(2), 87–92. http://doi.org/http://aisel.aisnet.org/sjis/vol19/iss2/4 Kleinman, N. L., Hill, S. D. & Ilenda, V. A. (1998). Simulation optimization of air traffic delay cost. In Proceedings of the 1998 Winter Simulation Conference (Vol. 1, pp. 1177–1181). Washington DC. http://doi.org/10.1017/CBO9781107415324.004 Kuster, J. & Jannach, D. (2006). Handling airport ground processes based on Resource-Constrained Project Scheduling. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4031 LNAI, 166–176. http://doi.org/10.1007/11779568_20 Lin, D., Xin, Z. & Huang, Y. (2015). Ground Crew Rostering for the Airport Check-In Counter. In 2015 IEEE International Conference on Industrial Engineering and Engineering Management (pp. 2–6). Singapore. Løve, M., Sørensen, K. R., Larsen, J. & Clausen, J. (2002). Applications of Evolutionary Computing: EvoWorkshops 2002: EvoCOP, EvoIASP, EvoSTIM/EvoPLAN Kinsale, Ireland, April 3--4, 2002 Proceedings. In S. Cagnoni, J. Gottlieb, E. Hart, M. Middendorf & G. R. Raidl (Eds.), (pp. 315–324). Berlin, Heidelberg: Springer Berlin Heidelberg. http://doi.org/10.1007/3-540-46004-7_31 Peng, Y., Wei, G., Junqing, S. & Bin, S. (2014). Evaluation of Airport Capacity through Agent Based Simulation. International Journal of Grid Distribution Computing, 7(6), 165–174. Pereira, H. B. B., Fadigas, I. S., Senna, V. & Moret, M. a. (2011). Semantic networks based on titles of scientific papers. Physica A: Statistical Mechanics and Its Applications, 390(6), 1192– 1197. http://doi.org/10.1016/j.physa.2010.12.001 Piera Eroles, M. À., Ramos, J. J. & Fernandez Robayna, E. (2009). Airport Logistics Operations. In Y. Merkuryev, G. Merkuryeva, À. M. Piera & A. Guasch (Eds.), Simulation-Based Case Studies in Logistics: Education and Applied Research (pp. 209–228). London: Springer London. http://doi.org/10.1007/978-1-84882-187-3_12 Qi, X., Yang, J. & Yu, G. (2004). Scheduling Problems in the Airline Industry. In J. Y.-T. Leung (Ed.), Handbook of Scheduling: Algorithms, Models and Performance Analysis. Boca Raton: Chapman & Hall/CRC. Rodič, B. & Baggia, A. (2013). Dynamic Airport Ground Crew Scheduling Using a Heuristic Scheduling Algorithm. International Journal of Applied Mathematics and Informatics, 7(4), 153–163. Tavakkoli-Moghaddam, R., Yaghoubi-Panah, M. & Radmehr, F. (2012). Scheduling the sequence of aircraft landings for a single runway using a fuzzy programming approach. Journal of Air Transport Management, 25, 15–18. http://doi.org/10.1016/j.jairtraman.2012.03.004 Vaishnavi, V. K. & Kuechler, W. (2008). Design Science Research Methods and Patterns. Boca Raton: Auerbach Publications. Vaishnavi, V. & Kuechler, B. (2015). Design Science Research in Information Systems Overview of Design Science Research. http://doi.org/10.1007/978-1-4419-5653-8 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 517 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Rodič & A. Baggia: Airport Operations Modelling: Agent Based Modelling of Ground Crews Vaishnavi, V. & Kuechler, W. (2007). Design Research in Information Systems. Wwwisworldorg, 22(2), 1–16. http://doi.org/10.1007/978-1-4419-5653-8 Weiszer, M., Chen, J. & Stewart, P. (2015). Preference-Based Evolutionary Algorithm for Airport Runway Scheduling and Ground Movement Optimisation. IEEE Conference on Intelligent Transportation Systems, Proceedings, ITSC, 2015–Octob, 2078–2083. http://doi.org/10.1109/ITSC.2015.336 Yan, S. & Chen, C. H. (2008). Optimal flight scheduling models for cargo airlines under alliances. Journal of Scheduling, 11(3), 175–186. http://doi.org/10.1007/s10951-007-0020-1 518 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Understanding New Emerging Technologies Through Hermeneutics. An Example from mHealth 36 ZAID ZEKIRIA SAKO, SASAN ADIBI & NILMINI WICKRAMASINGHE Abstract New technologies such as mHealth have entered the health domain as an innovative technology to connect people suffering from a chronic disease with healthcare services to reduce the pressure on healthcare systems. The primary driver for these technologies is data and they contain valuable information. Understanding what the data means and the accuracy of the data can be complex. Hermeneutics has been applied in previous Information Systems studies that interpret data to provide a meaning about unexplored and complex phenomenon. This paper provides background information about Hermeneutics and an example of Hermeneutics applied in a new mHealth study. Keywords: • mHealth • Hermeneutics • Qualitative Study • Information Transformation • Emerging Technologies • CORRESPONDENCE ADDRESS: Zaid Zekiria Sako, Deakin University, 221 Burwood Hwy, Burwood VIC 3125, Australia, e-mail: zsako@deakin.edu.au. Sasan Adibi, Deakin University, 221 Burwood Hwy, Burwood VIC 3125, Australia, e-mail: Sasan.adibi@deakin.edu.au. Nilmini Wickramasinghe, Deakin University, 221 Burwood Hwy, Burwood VIC 3125, Australia, e-mail: n.wickramasinghe@deakin.edu.au. https://doi.org/10.18690/978-961-286-043-1.36 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 520 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) Z. Zekiria Sako, S. Adibi & N. Wickramasinghe Understanding New Emerging Technologies Through Hermeneutics. An Example from mHealth Introduction The Information Technology innovation continuum is creating new and innovative solutions for different industries. Particularly, the healthcare industry is witnessing a new era of innovation (Spanakis et al., 2016) as new emerging technologies such as Mobile Health (mHealth), is being adopted to assist in fighting and managing diseases at both global and individual levels to deliver better health management platforms (Willcox et al., 2015). The technology is delivering innovative solutions through mobile devices that facilitate a number of initiatives that include but not limited to health call centres, treatment compliance, appointment reminders, mobile telemedicine, and patient monitoring (World Health Organization, 2011). These innovative solutions can empower people and patients to be proactive in managing their health through self-management (Guifeng et al., 2015), as self-management can prove critical in reducing healthcare costs while delivering optimal healthcare services (Monsen, Handler, Le, & Riemer, 2014). The empowerment of patients to self-manage is through the delivery of information that allow them to understand their medical conditions (Hayes & Aspray, 2010) and it is through the devices, as the devices act as a getaway for accessing healthcare services through the exchange of data and information. The exchange of data is through secure data transfer mechanisms between patients and healthcare professionals. The data contains valuable information and it is primary driver for the treatment of diseases and empower of individuals to self-manage their health. Figure 1: Example of how technologies are becoming a getaway for patients accessing healthcare services While new technologies are introduced and solutions have been created, how does one interpret the data captured by such devices to learn more about the underlying IT solution that facilitates the transaction between the different stakeholders of an IT healthcare solution? More specifically, from a research perspective, how does accessing secondary data produced by the devices allow the researchers to understand if the technology is delivering the desired outcome? While from the healthcare point of view, how does one evaluate the quality of a solution and whether it is delivering accurate healthcare services? 30TH BLED ECONFERENCE: DIGITAL TRANSORMATION – FROM CONNECTING THINGS TO 521 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) Z. Zekiria Sako, S. Adibi & N. Wickramasinghe Understanding New Emerging Technologies Through Hermeneutics. An Example from mHealth The technologies are new to the health domain and require a well-established research method to understand how they operate, specifically the IT solution that is delivering healthcare services to people and patients. Although today’s modern data analytics platforms are extracting new insights from such technologies to create business value and answer some of the business questions (Tailor, 2015), yet from a scientific perspective it can be challenging. A way to approach the analysis of secondary data from new, emerging technologies can be accomplished through Hermeneutics. Hermeneutics has long been applied in studies where the texts/artefacts are distant from its original authors. The application of Hermeneutics in new emerging technologies is to gain a window through interpretation, into the phenomena lived by the patients interacting with healthcare professionals for the management of diseases while using any of the technologies. The essence of interpretation in such cases, is to understand how the technology is operating, the quality of the primary driver of the technology being data, and the integrity of the information based on the data. The purpose of this study is to understand what data accuracy is, discover the sources of data inaccuracy in health data and the impact inaccurate data has on the Integrity of the Information while determining the most appropriate Machine Learning Algorithm that can detect inaccurate data. The accuracy of the data is understood through Interpretation and it is done through Hermeneutics and Thematic Analysis. Literature Review This section of the paper introduces Hermeneutics with a background around Hermeneutics in the Information Systems (IS) domain and an example from a current research in progress where Hermeneutics is used for analysing secondary data based on an mHealth solution for diabetes. 2.1 Hermeneutics The term Hermeneutics is a modified transliteration of the Greek verb “hermeneuein”, a term that means to express aloud, to explain or interpret and to translate as explained by Kennedy Schmidt (2014) and it is a technique derived from the Interpretive Paradigm (Grbich, 2013). It is also known as the process for making a meaning (Esterberg, 2002). Hermeneutics was thought to have originated as the study of the interpretation of the Bible (Lee & Dennis, 2012) and has been applied in the interpretation of previous work of authors who studied the Bible (Black, 2006). Historically, in ancient Greek, it was believed that Hermes, the mythological messenger god was equipped with language and understanding that enabled him to interpret the messages from the gods and deliver them to the mortals (Butler, 1998). This mythological example illustrates the process for interpreting messages and communicating them with people. The four key terms of language, understanding, interpretation and communication, from the example, are key to Hermeneutics. 522 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) Z. Zekiria Sako, S. Adibi & N. Wickramasinghe Understanding New Emerging Technologies Through Hermeneutics. An Example from mHealth In research, the researcher must be equipped with the language of the subject understudy, understand the messages (data, texts, artefacts), has a method to interpret the texts to effectively communicate the results from the study to the audiences. Although equipped with language and understanding, the interpretation can become an issue. When interpretation becomes an issue, it is an issue of unintelligibility and it occurs when a person does not understand an artefact that he or she came across, and it is known as rebelling against successive smooth understanding (Tkácik, 2016). In research, unintelligibility can occur when the researcher accesses secondary artefacts that are distant from their original authors and has no access to the language that would enable an understanding of the artefacts. The objective of using Hermeneutics in research is to interpret texts that would allow an understanding of phenomena, peoples’ actions and behaviour to address questions that fall under the interpretive paradigm. IS research can be classified as interpretive if it is assumed that our knowledge of reality is gained only through social constructions such as language, consciousness, shared meanings, documents, tools, and other artefacts (Klein & Myers, 1999). Interpreting texts through Hermeneutics is not an easy task and requires an in-depth understanding of Hermeneutics and the interpretation process. The problem with interpretation is that it is a two-fold problem. The first problem is avoiding projecting one’s own viewpoint on the text (Coelho, 2001) and blur the interpretation of the texts as one’s preconceived ideas may influence the interpretation. The second problem is the need to successfully communicate to a variety of audiences (Coelho, 2001). However, ones’ own perceptions and experiences in a subjective, cultural, and historical, as referred to as the lifeworld, can be included in the interpretation of the texts (Høiseth & Keitsch, 2015). In the IS domain, Hermeneutics has had a dominant role in the interpretation of Information Technology (IT)/IS related studies and the results are quite interesting as they provide a fresh view of the IT systems. The widely-known paper of Klein & Myers (1999) set out principles in conducting Hermeneutics in IS, Robert, Wendy and Lucas (2001) for Hermeneutics and meaning making in IS, Boydens and van Hooland (2011) using Hermeneutics in quality of empirical databases and Acker (2015) toward a Hermeneutics of data, are a few examples where Hermeneutics is key ingredient to the study. They all seek to make meaning of the study and providing guidance in finding a meaning to the study (See Table 1). 30TH BLED ECONFERENCE: DIGITAL TRANSORMATION – FROM CONNECTING THINGS TO 523 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) Z. Zekiria Sako, S. Adibi & N. Wickramasinghe Understanding New Emerging Technologies Through Hermeneutics. An Example from mHealth Table 1: Summary of papers where Hermeneutics was applied in the study Paper Summary Author(s) A SET OF PRINCIPLES Use of Hermeneutics to Klein & Myers, 1999 FOR CONDUCTING make sense of failed IT AND EVALUATING implementation INTERPRETIVE FIELD STUDIES IN INFORMATION SYSTEMS HERMENEUTICS AND Introducing IS Robert, Wendy, & Lucas MEANING -MAKING IN Researchers to INFORMATION Hermeneutics, and the SYSTEMS concept of Interpretation HERMENEUTICS Present a conceptual Boydens & van APPLIED TO THE framework to analyse and Hooland, 2011 QUALITY OF improve the quality of EMPIRICAL empirical databases to DATABASES interpret shifts in the quality of databases TOWARD A Using Hermeneutics to Acker, 2015 HERMENEUTICS OF analyse the traces of data DATA left in a networked computing infrastructures Hermeneutics can help render the meaningful of a text (object or phenomenon), which has become obscured or ‘distanced’ in some way, thereby making it no longer immediately obvious (Robert, Wendy, & Lucas, 2011). An obvious everyday example that does not interpretation is a STOP sign as it is either understood or not (Kennedy Schmidt, 2014). When is Hermeneutics needed? Hermeneutics can provide a rich, detailed interpretation of peoples’ experience and texts (Grbich, 2013). Traces of data and metadata left in a network computing infrastructure are becoming computing history where Hermeneutics is needed to provide an interpretation of the data (Acker, 2015). Interpretive research can help IS researchers understand human thoughts and actions in social and organizational contexts; it has the potential to produce deep insights into IS phenomena including managing of IS and IS development (Klein & Myers, 1999). Hermeneutics was also discussed in the development of Information Engineering (Fonseca & Martin, 2005) due to its powerful ability in interpreting users and the system. With new emerging technologies, human actions can be understood through the interpretation of data produced by the devices as they are used by people and patients for specific needs, specifically in healthcare. The data is becoming an extension of people and patients as traces of interaction between patients and medical professionals are 524 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) Z. Zekiria Sako, S. Adibi & N. Wickramasinghe Understanding New Emerging Technologies Through Hermeneutics. An Example from mHealth captured and exchanged to achieve a desired state of well-being. Yet, while the data has served its purpose, it contains valuable information that can help in different scenarios. From the technological side of the solution, it sheds light on how the technology functions, how the underlying data quality help achieve the desired health outcome and what exactly does the data contain that enables this transaction. While mHealth being a new technology where prototype solutions have been developed and commercially available, studies in the actual quality of data is not looked at thoroughly as the technology is still in its early stages. The following section will elaborate on how Hermeneutics is applied to study the emerging technology of mHealth with specific focus on Data Quality. 2.2 Hermeneutics in a Case Study Research of mHealth The preceding section has defined Hermeneutics and its application in IS studies. This section illustrates with an example, the process of applying Hermeneutics in the study of a new emerging technology used for health and disease management. The illustrated example in this paper is from a current research study. The objective of conducting the study is to evaluate data accuracy and information integrity in mHealth solutions, identify how data inaccuracy can occur, test different Machine Learning Algorithms, and evaluate the accuracy of the algorithms in detecting inaccurate data. The selected case study is mHealth for diabetes with the case being patients’ data. The selection of the case study was based on the research question, in which it posed as following: ‘How can Machine Learning be applied in mHealth Solutions to Address Data Accuracy and Information Integrity?’ The research question aligns with the study objectives as it is broken into sections. Starting by which type of Machine Learning, how it can be applied in mHealth, what defines Data Accuracy and Information Integrity. The selection of the case study was based on the research question, as it is one that conforms to Yin’s (2014) criteria for selecting case study, as the form of question is ‘How’, requires no control of behavioural events and focuses on contemporary events. With using case study, the data is secondary, de-identified data of people with diabetes and there was no control of behaviour when the data was produced and it presented a contemporary event. The two sources of data present both structured and unstructured cases of data. The first dataset is of patients with diabetes who have glucose measured through both a device and recorded on paper. The second dataset is extracted from hospital admission records where diabetes was either a factor in admission or was recorded during the admission. These two datasets assist in addressing the research question by using the interpretive paradigm as it allows for the reconstruction of understanding of the social world (Denzin & Lincoln, 2000). Both 30TH BLED ECONFERENCE: DIGITAL TRANSORMATION – FROM CONNECTING THINGS TO 525 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) Z. Zekiria Sako, S. Adibi & N. Wickramasinghe Understanding New Emerging Technologies Through Hermeneutics. An Example from mHealth datasets allow a rich experience in exploring how different diabetes data is collected and for what purpose, with the patients’ experience captured during both scenario. The Hermeneutics method used in this study is adapted from Kim (2013) using the 3 layers consisting of Text, Translation and Interpretation layer (See Figure 2). The 3 layers separate the text into layers where each has its own purpose and that allow for the data to be analysed using Hermeneutics. The text layer is all the text/data in the study and it is the first layer of Hermeneutics. The text starts with the actual datasets. The datasets are reviewed to form an understanding of what the datasets contain, the format they’re in and all the properties of the data including data dictionaries. Once reviewed, the data is then aligned with codes (extracted from Thematic Analysis) from the Literature review that cover Data Quality (each element of Data Quality, source of Data Inaccuracy), Information Integrity and Machine Learning. To simulate the process of disease management for patients with diabetes, the data is mapped against the Omaha Client Care Plan that segments the data into Problem Classification Scheme, Intervention Scheme and Problem Rating Scale for Outcomes. The simulation helps in understanding the role of each instance of data in disease management. After the data is examined and mapped against Omaha System, the data is then divided into training and testing data, and that is to test different Machine Learning Algorithms. These parts form the text layer as they are mainly text and are yet to bring a meaning that would assist in addressing the research question. The text is translated using Thematic analysis. The second layer is the Translation Layer where Thematic Analysis is applied to generate themes that can extract meaning from the text. The Thematic analysis is adapted from Braun and Clarke (2006). Boyatzis (1998) explains Thematic Analysis as a process for encoding qualitative information. The text in this study is secondary data, one where there’s no access to the patients or the medical professionals and they are open for research. The state of the data does not have a meaning and is therefore stateless data. To understand what the text is, Thematic analysis look for patterns in information that at minimum describe and organize possible observations while at maximum interpret aspect of the phenomenon (Boyatzis, 1998). The interpretation of the data occurs at the third layer of Kim’s (2013) model. The Interpretation Layer is interpreting the themes to form an understanding about the phenomenon. The interpretation method is adapted from Taylor, Francis, and Hegney (2013), and it starts with turning to the nature of the lived experiences, that is accessing people who would tell about the phenomenon understudy. The lived experience comes from investigating the experience as it has been lived rather than conceptualizing it by accessing data or people who have an experience related to the research question, that is real and has occurred. Combining the three layers with the Thematic and Hermeneutics analysis is to divide the sections with clear and concise objectives that would allow for Hermeneutics technique 526 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) Z. Zekiria Sako, S. Adibi & N. Wickramasinghe Understanding New Emerging Technologies Through Hermeneutics. An Example from mHealth to be implemented correctly in the right flow. That is by understanding at what stage occurs the text, the translation and the interpretation of the data. Figure 2: Hermeneutics in studying new emerging technologies Findings The purpose of Hermeneutics is to derive understanding from the text under study as explained by Phyl & Carol (2006). The adoption of Hermeneutics in this research has moved the study from analysing electronic data to understanding the meaning of accuracy and how it occurs in a technology based solution such as mHealth. The data was first measured and evaluated against a set of criteria derived from the definitions of Data Quality that were based on World Health Organization (WHO) data quality standards and definitions of Information Integrity from the literature review. To date, the study has found that accuracy occurs at multiple levels with each instance of accuracy intended for specific use (See Figure 3). The first level of accuracy occurs at the validation layer where data is simply validated as either accurate or inaccurate based on the input. The model of this validation measures the input against type of data (text, integer, float, date) and whether they fit the range. This form of validation ensure that the data passes its basic test of meeting the minimum level of accuracy before it is passed on to the next level of validation. This made the Classification Algorithm an appropriate Machine Learning Algorithm that could be applied to filter through the data and test the validity of the data before it is processed. Modern electronic forms apply a simple ‘rule based validation’ where data is tested at the time it is entered and no learning is taken into consideration when the next set of data is entered. Machine Learning powerful capability 30TH BLED ECONFERENCE: DIGITAL TRANSORMATION – FROM CONNECTING THINGS TO 527 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) Z. Zekiria Sako, S. Adibi & N. Wickramasinghe Understanding New Emerging Technologies Through Hermeneutics. An Example from mHealth of learning and predicting data makes it a more suitable technique that would enhance the data quality at the very basic level. The second level of data accuracy examines the properties of the data. Although the data might have passed its first instance of validation, yet the properties might still not be appropriate for its intended purpose such as timely medical reminders, currency and completeness of readings of a patient or symptoms. Achieving this level of accuracy can be accomplished through the Prediction Algorithm that can predict future datasets based on the existing and historical data. This allows for the current values to be cross-examined against what the algorithm have predicted and raise an alert if major discrepancies in the data is detected through the algorithm. Figure 3: Levels of data accuracy in a digital health context The third level of accuracy occurs at the behavioural level where the human behaviour, based on the data, is analysed to understand the meaningfulness or the usefulness of the data and its intended use. This includes decision based behaviour or health outcomes that can detect if a treatment is being adhered to as planned or if there’s a gap in the intervention program for the specific disease. Behavioural accuracy is reflected through the decisions that are being made which can be mapped through Decision Trees or Neural Network algorithms that can simulate a person’s decision making process that would 528 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) Z. Zekiria Sako, S. Adibi & N. Wickramasinghe Understanding New Emerging Technologies Through Hermeneutics. An Example from mHealth allow the medical professional to understand the thinking behind patients’ decisions. This satisfies the collection of the data in an mHealth scenario and in the absence of a medical professional when the data is entered by the patients. While still at an early stage of analysis, these findings are a result of Hermeneutics where the technique has shifted the focus from simply cross-examining the data against certain definitions, to understanding the meaning of accuracy in an mHealth context. Limitations A key drawback for this study is the datasets. The data was not obtained from an actual mHealth solution as the mHealth solutions are still in early development stages. However, the use of the algorithms against data like the ones produced by mHealth solution, particularly one designed for chronic diseases such as diabetes, make the results more appealing and relevant to technologies. The results do not only consider the accuracy of the data but highlight some key areas of where data accuracy might be influenced by behaviour of patients and users of mHealth technologies. Discussion and Conclusion Emerging technologies can hold valuable data that require beyond traditional analytics platforms for the analysis of data from a scientific perspective. Hermeneutics has had a role in previous IS studies and has provide to provide a fresh perspective of IS systems. The new technologies are changing the way patients seek advice from medical professionals, manage their disease, and delivering healthcare services through the platform. This change can have many undiscovered, unexplored phenomenon attached to the technologies that are yet to be studied. The role of Hermeneutics in this study is to assist in the interpretation of the data through a well-designed process that extracts meaningful information from the themes generated by the data. The study is of qualitative nature and not quantitative as it seeks to understand the data, and particularly application of Machine Learning in mHealth. To understand what the data means, and how Machine Learning can be applied, Thematic analysis and Hermeneutics provide rich and detailed coded information with techniques to extract information that provide insights about data and how information is produced. The data is of quantitative nature and the study focuses on understanding a single instance of mhealth designed to assist in a case of chronic disease. It does not aim to statistically evaluate the instances of accurate or inaccurate datasets in a mHealth transaction but instead its objective is understanding in detail the cause of inaccurate data. IS studies have become richer in information, and Hermeneutics has found its place in IS domain as an interpretive technique that seek and explore a deep, powerful meaning of a phenomena. The mHealth technology is capturing peoples’ actions and health 30TH BLED ECONFERENCE: DIGITAL TRANSORMATION – FROM CONNECTING THINGS TO 529 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) Z. Zekiria Sako, S. Adibi & N. Wickramasinghe Understanding New Emerging Technologies Through Hermeneutics. An Example from mHealth information that is becoming an extension of them that requires a technique, like Hermeneutics, to be applied to understand the underlining messages hidden in the data. Similar future studies may incorporate mixed methods approach to strengthen the findings through triangulation of methods that would provide two different perspectives on data. Future Research Directions This research sets the foundation for examining the quality of health data in digital context. There are several areas that will require research to be done to continue delivering high quality healthcare services through mHealth technologies. One key area is the human behaviour when using the technology, especially when entering and transmitting the data. Whilst the human behaviour is understood, another key area is the accuracy of other mHealth technologies when used for the treatment or management of other diseases. References Acker, A. (2015). Toward a Hermeneutics of Data. IEEE Annals of the History of Computing, 37(3), 70-75. doi:10.1109/MAHC.2015.68. Black, C. (2006). Pico's Heptaplus and Biblical Hermeneutics. Leiden: Brill. Boyatzis, R. E. (1998). Transforming qualitative information : thematic analysis and code development: Thousand Oaks, CA : Sage Publications, c1998. Boydens, I., & van Hooland, S. (2011). Hermeneutics applied to the quality of empirical databases. Journal of Documentation, 67(2), 279-289. doi:10.1108/00220411111109476. Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77-101. doi:http://dx.doi.org/10.1191/1478088706qp063oa. Butler, T. (1998). Towards a hermeneutic method for interpretive research in information systems. Journal of Information Technology (Routledge, Ltd.), 13(4), 285. Coelho, I. (2001). Hermeneutics and Method : The 'universal Viewpoint' in Bernard Lonergan. Toronto: University of Toronto Press. Denzin, N. K., & Lincoln, Y. S. (2000). The handbook of qualitative research (2nd ed. ed.). Thousand Oaks, Calif.: Sage Publications. Esterberg, K. G. (2002). Qualitative methods in social research: Boston : McGraw-Hill, c2002. Fonseca, F. T., & Martin, J. E. (2005). Toward an Alternative Notion of Information Systems Ontologies: Information Engineering as a Hermeneutic Enterprise. Journal of the American Society for Information Science & Technology, 56(1), 46-57. doi:10.1002/asi.20099. Grbich, C. (2013). Qualitative data analysis : an introduction: London ; Thousand Oaks, Calif. : SAGE, 2013.2nd ed. Guifeng, J., Pan, Y., Jie, Z., Hengyi, Z., Chengyu, L., Jin, C., . . . Gangmin, N. (2015). A framework design for the mHealth system for self-management promotion. Bio-Medical Materials & Engineering, 26, S1731-S1740. doi:10.3233/BME-151473. Hayes, B. M. E., & Aspray, W. (2010). Health Informatics : A Patient-Centered Approach to Diabetes. Cambridge, MA, USA: MIT Press. Høiseth, M. m. h. n. n., & Keitsch, M. M. (2015). Using Phenomenological Hermeneutics to Gain Understanding of Stakeholders in Healthcare Contexts. International Journal of Design, 9(3), 33-45. 530 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) Z. Zekiria Sako, S. Adibi & N. Wickramasinghe Understanding New Emerging Technologies Through Hermeneutics. An Example from mHealth Kennedy Schmidt, L. (2014). Understanding Hermeneutics Retrieved from http://deakin.eblib.com.au/patron/FullRecord.aspx?p=3060911. Kim, Y. S. (2013). Biblical Interpretation : Theory, Process, and Criteria. Eugene, Or: Pickwick Publications. Klein, H. K., & Myers, M. D. (1999). A SET OF PRINCIPLES FOR CONDUCTING AND EVALUATING INTERPRETIVE FIELD STUDIES IN INFORMATION SYSTEMS. MIS Quarterly, 23(1), 67-93. Lee, A. S. a. a. m. e., & Dennis, A. R. a. i. e. (2012). A hermeneutic interpretation of a controlled laboratory experiment: a case study of decision-making with a group support system. Information Systems Journal, 22(1), 3-27. doi:10.1111/j.1365-2575.2010.00365.x. Monsen, K., Handler, H., Le, S., & Riemer, J. (2014). Feasibility of using the Omaha System for self-report of symptoms by adults with diabetes. Available in the. Online Journal of Nursing Informatics (OJNI), 18(3). Phyl, W., & Carol, P. (2006). Demystifying a Hermeneutic Approach to IS Research. Australasian Journal of Information Systems, Vol 13, Iss 2 (2006)(2). doi:10.3127/ajis.v13i2.39. Robert, D. G., Wendy, L. C., & Lucas, D. I. Hermeneutics and Meaning‐Making in Information Systems: 'Oxford University Press'. Spanakis, E. G. s. i. f. g., Santana, S., Tsiknakis, M., Marias, K., Sakkalis, V., Teixeira, A., . . . Tziraki, C. (2016). Technology-Based Innovations to Foster Personalized Healthy Lifestyles and Well-Being: A Targeted Review. Journal of Medical Internet Research, 18(6), 1-19. doi:10.2196/jmir.4863. Tailor, K. (2015). Health Data's Destiny. Hoboken, UNITED STATES: John Wiley & Sons, Incorporated. Taylor, B. J., Francis, K., & Hegney, D. (2013). Qualitative research in the health sciences methodologies, methods and processes. London: Routledge. Tkácik, L. (2016). Introduction to Philosophical Hermeneutics. Frankfurt, GERMANY: Peter Lang GmbH, Internationaler Verlag der Wissenschaften. Willcox, J. C., Campbell, K. J., McCarthy, E. A., Wilkinson, S. A., Lappas, M., Ball, K., . . . Crawford, D. A. (2015). Testing the feasibility of a mobile technology intervention promoting healthy gestational weight gain in pregnant women (txt4two) - study protocol for a randomised controlled trial. Trials, 16, 209-209. doi:10.1186/s13063-015-0730-1. World Health Organization. (2011). mHealth, New Horizons for health through mobile technologies, Geneva. Retrieved from http://www.who.int/goe/publications/goe_mhealth_web.pdf. Yin, R. K. (2014). Case study research : design and methods: Los Angeles : SAGE, 2014. Fifth edition. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Designing and Implementing Common Market for Cross-Game Purchases between Mobile Games 37 ERKKI SIIRA, ELINA ANNANPERÄ, OTTO SIMOLA, SAMULI HEINONEN, JANI YLI-KANTOLA & JARI JÄRVINEN Abstract The mobile game markets are increasingly competitive and the game publishers are looking for new ways to increase player retention and cross commercialization of games. In this paper, we examine how a purchasing system using virtual currency based common market can be designed and implemented in order to create a larger service platform. The solution enables cross-game purchasing of virtual items from one game into another. We present how such a system can be designed, how it would fit into larger vision of multi-game ecosystem and what kind of limitations there are when implementing such a system. As a result, we describe solution of a bank and a marketplace entity, which are responsible of the transactions, virtual items and connecting games to each other. As a conclusion, we are presenting the expected challenges and expansion plans for the common market system. Keywords: • Mobile games • virtual currency • common market • cross- game purchase • CORRESPONDENCE ADDRESS: Erkki Siira, VTT Technical Research Centre of Finland, Kemistintie 3, FI-02150 Espoo, Finland, e-mail: erkki.siira@vtt.fi. Elina Annanperä, University of Oulu, Pentti Kaiteran katu 1, 90014 Oulu, Finland, e-mail: elina.annanpera@oulu.fi. Otto Simola, Fingersoft, Aleksanterinkatu 4-6, 90100 Oulu, Finland, e-mail: otto.simola@fingersoft.net. Samuli Heinonen, VTT Technical Research Centre of Finland, Kemistintie 3, FI-02150 Espoo, Finland, e-mail: samuli.heinonen@vtt.fi. Jani Yli-Kantola, University of Oulu, Pentti Kaiteran katu 1, 90014 Oulu, Finland, e-mail: jani.yli-kantola@oulu.fi. Jari Järvinen, Fitness Village, Salomonkatu 17 A, 00100 Helsinki, Finland, e-mail: jari.jarvinen@fitnessvillage.com. https://doi.org/10.18690/978-961-286-043-1.37 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 532 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) E. Siira, E. Annanperä, O. Simola, S. Heinonen, J. Yli-Kantola & J. Järvinen: Designing and Implementing Common Market for Cross-Game Purchases between Mobile Games Introduction Mobile games have become a booming branch of gaming industry over the past years. This is mainly due to new smartphones with better displays, faster internet connections, much higher computing power than before and easy and powerful app delivery platforms with monetization abilities. Globally, in 2016, mobile game industry brings in revenue of $36.9 billion yearly, and is expected to grow to $47.4 billion by 2018 (newzoo.com). As the number of games increases, so does the competition to get visibility and share of the players’ interests, and on the other hand to keep the players to play the game they have started once. Keeping players engaged in the mobile game is referred to as player retention. In particularly, in the free-to-play mobile games, player retention is important to the game’s business model. Free-to-play games are freely available to the player, but they typically contain mechanisms that include in-app purchasing in the game, where virtual currency can be bought with real money. Such purchases offered to players are usually virtual items that bring benefits, modifications or personalizations to the game world. Other ways games monetize on their players are for instance selling advertisements; players watch ads in order to proceed or gain advances in the game. Getting the player to spend money one way or the other is vital to the free-to-play games, and in order to retain the players, new ways to get them to returning to the game are needed. Games developed or published by the same gaming house are looking for ways, beyond traditional advertising, to get the player to stay inside their gaming business. At the same time, game industry aims to grow beyond the boundaries of the industry to other fields of entertainment. At the same time, cryptocurrencies, virtual currencies, loyalty programs, etc. are reaching new areas of digital business. The traditional view of economy is being splintered and new ways of payment and currencies are coming every year. Loyalty programs are front- runners in a trend where ability to spend points is extending rapidly and the loyalty points are more and more becoming a currency in traditional sense. Cryptocurrencies like Bitcoin approach this from another direction where the currency is well controlled by rules, but the places where to spend the cryptocurrency are still limited. (Iwamura et al., 2014) Spending is often done by first exchanging the cryptocurrency to more traditional vehicle of credit like euros or dollars and then are spent especially in cases where anonymity of the transaction is not crucial. Cheah (2015) point out that Bitcoin and other cryptocurrencies often behave as an asset and not like a currency as it is subject to lots of speculative actions and the value is changing rapidly. This upheaval in economy and influx of new currencies are affecting the gaming industry as well where games are usually considered as islands where in-game economy is affected only by game mechanics and influx of resources created by players buying virtual items and purchasing power with traditional currencies. In this research, we investigate the possibilities to design a common market for cross- game purchases that can be used in several free-to-play mobile games. The motivation 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 533 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) E. Siira, E. Annanperä, O. Simola, S. Heinonen, J. Yli-Kantola & J. Järvinen: Designing and Implementing Common Market for Cross-Game Purchases between Mobile Games for this is to have stronger gamer cross-pollination between games and to cross-promote and advertise other games in better targeted ways for players. Using the common market platform the players could also buy virtual items to other games, creating more interest for them to stay within the boundaries of the common market. The designed common market would connect the games on game mechanic level through the cross-game purchasing and subsequently creating an exchange rate between game currencies. Instead of using in-game currencies only in one game economy, the target is to expand this thinking to link game economies loosely together. To clarify the scope of the research there is no single currency in games and the designed platform does not allow virtual currencies to be exchanged directly. It means that for instance, ‘gems’ in Game X cannot be exchanged to ‘gold’ in Game Z. However, what the platform would allow to do is to spend ‘gems’ in Game X to purchase virtual items in Game Z. The publisher of Game Z in this situation dictates the selection what is available to be bought. The common market approach does not have to stop only to games, but there will be also a possibility to add non-game items to the common market. For example, coupons to web stores etc. could be bought in-game as well. Our research question are 1) how the cross-game purchasing between mobile games could be designed and implemented and 2) what kind of limitations can be identified regarding game economies, game design and implementation? In our research, we study single- player games that are free to play mobile games, but our findings may extend further. In Chapter 2 we introduce the related research on how virtual currencies and game economies have been studied. In Chapter 3 the methodology for the research is delineated and the use case for the single market cross-game purchasing is described in more detail. In Chapter 4 the implementation of the system is described and in Chapter 5 the findings based on the design concept are discussed. Finally, in Chapter 6 we offer conclusion of the study. Related Research No comparable system for cross-game purchasing between mobile games has been found in our investigation of the pre-existing systems. Therefore, we have studied game economy and virtual currencies, as both are important part of the creation of the common market. Lehdonvirta (2009) categorises virtual currencies as a subset of virtual goods. Virtual goods are goods, which can be mass-produced and are often bought and sold in virtual environments such as massively multiplayer online roleplaying game (MMORPG). Other examples of virtual goods are items and characters. Lehdonvirta notes that very often the virtual currencies in MMORPGs can be traded back into real currencies if wanted, which creates bi-directional connection for the currencies. 534 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) E. Siira, E. Annanperä, O. Simola, S. Heinonen, J. Yli-Kantola & J. Järvinen: Designing and Implementing Common Market for Cross-Game Purchases between Mobile Games Yamaguchi (2004) notes that traditional economics do not consider in-game currencies as real, but in his research the virtual currencies in games do have enough same characteristics than government-issued currencies, so in-game currencies may be considered as real currencies at least in some games. For example, no one is going to buy a Monopoly hotel with a real money, but may buy a virtual item in a MMORPG. Thus, an exchange rate is formed between virtual game currency and traditional money (Yamaguchi 2004). Sasson (2015) has studied free-to-play mobile games and noted how the most successful ones have two currencies used in the same game. He names these currency concepts as a hard currency, which is more closely related to the real money the players are using to the game and soft currency, which is more virtual currency. Soft currency is what players earn in the game by playing it and hard currency needs to be bought with real money or the player needs to earn it somehow which is not directly linked to game flow. If only one currency is used, it limits the user’s spending abilities as monetisation of the game requires the single currency to be hard to obtain and players may not be able to continue without spending real money into the game. Balancing game economy is important as source of currencies need to be in line with the ability to spend the currency. Both soft and hard currency needs to be of value to the user. Sasson (2015) shows that if the currencies are a bit scarce when comparing to the players’ want to continue, the player is more likely to buy some aid to the game with real money. Cryptocurrencies have entered the mainstream of currencies after the launch of Bitcoin in 2009. They have no physical manifestation, but work only in digital environment. From the cryptocurrencies, especially the Bitcoin has gathered trust around it to make it a currency, which can be used in many places. It excels in use cases of anonymous digital transactions where traditional currencies are heavily tracked and have slow and cumbersome processes to transfer money from person A to person B. Bitcoin and other cryptocurrencies - altcoins - are based on the Blockchain technology which is a public distributed ledger with a mechanism for arriving to consensus between all nodes. Cryptocurrencies are very flexible to design and configure. Due to the flexibility, there has been several implementations for different use cases but very few has gathered enough popularity around it to make it as a workable currency. (Bonneau et al 2015) Sharp and Sharp (1997) define loyalty programs as structured marketing efforts which reward and therefore encourage loyalty behaviour. One trend in loyalty programs is to expand the industries participating in the loyalty program. This is especially true in airline industry. This adds value for the customer and make program more attractive to join. Loyalty programs are inherently virtual currencies with restricted abilities to use them. Buchinger et al. (2014) studied four different cases of virtual currencies in loyalty programs and defined how they are different in terms of what they are achieving. Generating and spending currencies are two pillars of the currency behaviour. For example, Bitcoins are created by “mining” them which means performing difficult 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 535 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) E. Siira, E. Annanperä, O. Simola, S. Heinonen, J. Yli-Kantola & J. Järvinen: Designing and Implementing Common Market for Cross-Game Purchases between Mobile Games mathematical puzzles to ensure the transaction coherence in the system. In loyalty schemes, the company creates from thin air the currency, which is promised some value in the loyalty scheme network. The value might change and perhaps the currency has an expiration date. Cryptocurrencies are indestructible in a sense that the “coin” does not leave the system. In transaction, the ownership is changed. In loyalty schemes, the value of the credit is nullified after the purchase, as it has no intrinsic value. Bitcoin and other cryptocurrencies have brought an interesting discussion about the fundamentals of currencies themselves. Mallard et al. (2014) argue that the Bitcoin has a distributed currency model without any issuing organisation. There is only an original ruleset, which has been updated along the evolution of the Bitcoin. The trust is based on the rules and if everything is running normally there is no party, which can change the rules on their own. Traditional currencies like euros and US dollars have a centralized organisation which is responsible of the issuing the currency. Due to history, the ability to issue currency is detached from the daily politicians and central banks have been created. Central banks are deemed the trustworthy organisations, which should behave predictably and not be intimidated by politics and quick gains. Research Method and Context The aim of this study was to design an implementable solution for cross-game purchasing that would make possible to use earned currency in one game to buy virtual items in another game. The possibilities for earning currency was either to play certain games, or import exercise data from wearable sensors (that would be turned into the currency). No matter how the currency was earned, it could be used to make purchases in other games belonging to the system. The additional goal of the currency was that it could be used to gain discounts for purchases made in selected web stores or brick-and-mortar stores. This aim was deemed specific to the needs of the project companies and it was anticipated that the solution for the virtual currency system would have to be tailor-made to the companies in the project. The existing virtual currency systems reviewed above were not seen fitting to the purpose. Therefore, we adopted case study research methodology (see Yin, 2014). Case studies are commonly used in software engineering field to study practical phenomenon in a real life context (Runeson & Höst, 2009). Here, research needs were first to understand the requirements of the multi-game virtual currency system, and then design a working system to purchase virtual items between games and interaction with real life contexts. In later stage, the system will be tested in the real life context. Due to the complex nature of the studied system, this research presents first the vision of the planned cross-game purchasing. The real world complexity determines the limitations of the study, where we first present the created vision of the cross-game purchasing before considering the real-life use. In our study, we also consider the challenges of building such system in real-life, and therefore the trade-offs that can be anticipated at this stage of the study. 536 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) E. Siira, E. Annanperä, O. Simola, S. Heinonen, J. Yli-Kantola & J. Järvinen: Designing and Implementing Common Market for Cross-Game Purchases between Mobile Games The selected case under investigation in hailing form a research project, where companies identified the need for the multi-game currency with options to collect and use it also in real world. The case study comprises of two gaming companies. Fingersoft has made and produced mobile games since 2012, and has several games out at the moment. These games are free-to-play games, and the company has approximately 100 million Monthly Active Users globally. Fitness Village is a new gaming company, focused on developing their first game that targets gamification of exercise, including exercise related virtual game play, and exercise data imported from wearable exercise sensors. In the centre of interest of the participating companies is to design and implement an entire service platform, which imports real world exercises from sensors, and exports the data to selected mobile games as virtual currency, through conversion rate. This currency could be used to buy virtual items from other games. This exercise data part of the research is not studied in this paper, only what happens after the exercise has been changed to an in-game currency. On the other hand, most free-to-play game also have their own internal point or currency systems as the enabler for in app purchases. This currency works in isolation within the game and is often too specific to the game logic in question, to be transferred to other games as such. Meaning, that some type of point or currency conversion is needed for cross-game purchases, as well. The overall vision is to have a so-called common market for cross-game purchasing that combines all the elements together and allows expansion by adding new games and web stores or retailers to the system. Ultimately, this would enable the creation of a functional and powerful digital ecosystem on the top of the technical solution. For the companies in the digital ecosystem, this will give excellent opportunities to monetize their business in various ways. Starting from the existing means in mobile games industry (in-app- purchasing, targeted advertisements, user acquisition, cross-promotion between different games and applications), to also giving an unique selling points for businesses in other domains to market their services and products for the mobile gamers and exercise oriented customers. It is envisioned that this way the players will be more engaged to stay in the gaming ecosystem, since they receive tangible rewards from the time and effort they use on playing and thus improving the game retention. A vision of the common marketplace with virtual currency earning use possibilities is shown in Figure 1. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 537 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) E. Siira, E. Annanperä, O. Simola, S. Heinonen, J. Yli-Kantola & J. Järvinen: Designing and Implementing Common Market for Cross-Game Purchases between Mobile Games Figure 1: Common market service platform vision for the virtual currency (own illustration) It is understood that the realization of the full service platform and virtual system would require a type of banking solution that would keep track of transactions in a secure way. Yet the companies aim not to build too heavy and complicated system that would not allow scalability and would be too complex to maintain. Next, the first working design to be build is constructed and the next steps and foreseen challenges elaborated on. Results The implemented case presented in this paper is only the first part of the research to design and implement the above presented vision as a whole. Although there are two selected games in this case that are part of the interconnected system, the design is still done by taking account that it could serve several games in future and the games can be different kinds of free-to-play mobile games. One selected game is an established game (Game A from Fingersoft) and the other is a game (Game B from Fitness Village) is to be released during year 2017. Both games do have their own currency systems, but there 538 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) E. Siira, E. Annanperä, O. Simola, S. Heinonen, J. Yli-Kantola & J. Järvinen: Designing and Implementing Common Market for Cross-Game Purchases between Mobile Games is a possibility to buy in-game products from another game by using a currency from that game. In this case the possibility to buy virtual items is unidirectional where products in Game A can be bought from Game B. Implementation does not yet cover the buying the products to other direction because in the more established game the user interface part is not yet able to provide this. Both games have dual-currency model similar to what Sasson (2015) described. The currency used to buy virtual products from another game is a “hard currency” which is more difficult to obtain than the “soft currency” making the virtual product more valuable and rare. The publisher of the Game A uses the marketplace platform to put products available for purchase and prices them in the currency, which is used in the Game A. The marketplace has an exchange rate table, which tells how much Game B currency is worth in Game A currency. This exchange rate is determined when new games or entities are entered to the system. Concurrently, other limitations are determined like from which games can the virtual item be bought, how many of the items can be bought in certain amount of time or how much of currency can be used for this. For example, no more than two times per day can the purchases be made per player. The single virtual item can have its limitations as well. For example, one item may be bought five times or just one time. In the Figure 2 is described the high-level architecture of the common market. Figure 2: High-level architecture of common market platform (own illustration) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 539 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) E. Siira, E. Annanperä, O. Simola, S. Heinonen, J. Yli-Kantola & J. Järvinen: Designing and Implementing Common Market for Cross-Game Purchases between Mobile Games In the centre is the combination of marketplace and bank. Marketplace is responsible for keeping count of virtual items that are available for purchase and which of the items has been sold to which player. Sellers can add, edit or remove the items or check how their items have been sold. The marketplace will offer the list of purchasable virtual items for the games. Bank is responsible for the transactions between the games and keeps track what assets are located where and how they are being paid. In addition, the bank has abilities to roll back the transactions if the customer is unhappy and demands his resources back or some technical error has occurred and the purchase did not succeed perfectly. The bank accounts do not store value. They only exist to track the transferred resources and receipt is created from it. The value is afterwards nullified. The reason for this is that the philosophical approach of the bank is not to mimic a traditional bank but provide platform for assets to be exchanged between the games. Both games are benefitting from the exchange from other means than keeping the in-game resources of the other game, thus the in-game resource may be nullified after use. The similarity to a real bank extends to the reliability and robustness of the system. The system needs to be able to detect in vast majority of cases if the transaction was complete and the virtual product bought was actually delivered. In some cases the delivery may be delayed due to problems in networks or servers but in our case the limit for delivery is 24 hours and if the product has not been delivered during that time, it is reimbursed for the customer. When designing the bank entity there was a design choice to be made on how to implement the bank entity and the transactions. In this implementation, the bank is controlled by one actor (in this case a game publisher), but one choice could have been to create more independent platform by utilising blockchain technology which would offer higher scalability and possibly more trustworthiness for other game publishers to join the common market as well. In the end, the closed and controlled system was decided to be the implementation as that is more in line with the business plan. Marketplace platform is for game publisher and third party web stores to control what they have available to be sold in games. For example Game A publisher can put “pink running shoes” for sale and value it at in Game A currency, for example in ‘gems’. The item may have some in-game abilities or be just aesthetical upgrade. Visibilities to different demographics and games has been under discussion, but not yet implemented. In Figure 3, a mock-up of what kind of functionality the platform has for the publisher is shown. 540 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) E. Siira, E. Annanperä, O. Simola, S. Heinonen, J. Yli-Kantola & J. Järvinen: Designing and Implementing Common Market for Cross-Game Purchases between Mobile Games Figure 3. Mock-up of how to add virtual items to marketplace (own illustration) In games, there is a shopping module, which is common for all games that are implementing the common market for cross-game purchasing. When player navigates to the in-game shop, the game asks for a web page, which is created and populated in the marketplace but the visual style can be set by Cascading Style Sheet (CSS) in the game. A default page without modifications can be used as well, but how games are showing the list and how it is navigated to can be up to the game in question. When an item has been bought for a game from another game, it is checked and deployed when game is launched and then user is informed that the item has arrived and it references the other game as a source. The product is deployed only once, after that it is the responsibility of the game to track. Identity management in the common market is important as it should not encourage sharing resources between players but it should encourage one player to play multiple of games. How the identity is shared between games and how they are linked through the bank entity has multiple possible solutions and it has to be taken account how the chosen solution affects the user experience and privacy. The platform does not need to know who the user is but it needs to know that the player playing Game A and Game B is the same person. The reason for this is that even if it would be valuable to know who the player really is, it cannot be a requirement. It is identity provider’s responsibility to know who the player really is. Apple and Google are dominating the mobile game distribution by their AppStore and Google Play -markets. Both are taking their cut from the purchases made in games by 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 541 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) E. Siira, E. Annanperä, O. Simola, S. Heinonen, J. Yli-Kantola & J. Järvinen: Designing and Implementing Common Market for Cross-Game Purchases between Mobile Games real traditional money. The companies are closely guarding their share of the profits. The cross-game purchasing needs to be created in a way that it conforms to the rules set of Apple and Google. Especially this needs to be in line in cases where the games and identities are ranging from one ecosystem to another. In cross-game purchasing there is no money moving between games and the virtual items available must be exclusive for the common market. Discussion According to our research, the common market for cross-game purchasing is a novel solution for higher player retention and advertisement of other games. For players the advertisement part is more subtle than state-of-the art advertisement videos we see now in mobile games. For them the cross-game purchasing is offering value as they are getting something out of it. Implementation is now only between two games and it is likely that the concept would need more games to make impact and be more meaningful for the players. However, as a proof-of-concept it shows that the concept can be implemented and it has some merit. For future research is left the analysis of the impact and how the players are reacting to this concept. Some potential issues have been identified during the design of the common market. First of all the cross-game purchase might affect the game balance in unhealthy way if the items bought from another game are disrupting the player path. This balancing of purchasable items is noted also in Oh and Ruy’s (2007) research for Korean games. For example buying too powerful item too early in the game might derail the whole game and take out the feel of accomplishment from the player. Aesthetic-only items without game effect are easier to add from the game design point of view, but they might leave a subset of players uninterested about the purchase. Implementing the cross-game purchase to a game needs to be part of the game design and designers should weigh what they want from it and how it might affect the game. Another point is the effect of the cross-game purchase to the game where the buying was initiated. When a player is pondering whether he or she should use resources in Game A to purchase something to Game B, the player faces a dilemma where he or she needs to think, if the resources used would help more in Game A than in Game B. Making the player to compare the games and the willingness of progressing in either of the games might lead to feel-bad moments, which should be avoided. Hard-earned currency in Game A is valuable for the player and squandering it to a wrong item might hurt the player desire to play the game further. This dilemma of putting the games against each other in terms of resource usage needs to be researched in future more thoroughly to see how it should be solved in more elegant and user friendly way. Another point for discussion and further research is the data ownership in games. The currency earned by a player in one game and used in another can be tricky from data authorization point of view in cases where Games A and B are developed by companies 542 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) E. Siira, E. Annanperä, O. Simola, S. Heinonen, J. Yli-Kantola & J. Järvinen: Designing and Implementing Common Market for Cross-Game Purchases between Mobile Games that are not in a formal business relationship. Since the currency in game A is owned by the player (not the company which developed the Game A) the marketplace platform is required to request access to the currency from the player him or herself. Only after player has granted access to his or her Game A currency, it can be utilized in game B by the same player via the marketplace platform. It is anticipated that this dilemma can be solved using a standard OAUTH mechanism, but this will be in the scope for further implementations of the system. Conclusions In this research, we studied a novel concept of how common market for cross-game purchasing could be designed and implemented. State-of-the-art mobile games have dual currency system, which provide us the possibility to build on top of that. Any kind of connection between different mobile games is not in mainstream today. In our research, the connection is based on ability to buy virtual items from other games by using in-game currency. The motivation for this to game publishers is to increase player retention in games and use the system to advertise other games. Incentive for the player to take part of this instead of watching periodic advertisement videos he or she gets value by installing new games and playing more. The implementation connects two games and makes it possible to do cross-game purchases to one direction. In future, the connection should be bidirectional and possibly new games are added. The cross-game purchasing needs a marketplace entity and a bank entity. The marketplace entity will manage the items available in games and provide UI for sellers and buyers to interact with the system. The bank entity’s responsibility is to monitor how resources are moving between games and additionally it has the right and the ability to roll back faulty purchases. There are open questions on how the players like the functionality to buy items from other games or even discount coupons from web stores. In Chapter 5 we brought up some open issues and future research directions, which we have encountered during this work. Acknowledgement This work was supported by TEKES (Finnish Funding Agency for Technology and Innovation) and the HILLA research program. References Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J. A. & Felten, E. W. (2015, May). Sok: Research perspectives and challenges for bitcoin and cryptocurrencies. In Security and Privacy (SP), 2015 IEEE Symposium on (pp. 104-121). IEEE. Buchinger, U., Ranaivoson, H. & Ballon, P. (2014) When Loyalty Points Become Virtual Currencies: Transforming Business Models for Online Platforms. E-Business and 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 543 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) E. Siira, E. Annanperä, O. Simola, S. Heinonen, J. Yli-Kantola & J. Järvinen: Designing and Implementing Common Market for Cross-Game Purchases between Mobile Games Telecommunications. ICETE 2013. Communications in Computer and Information Science, vol 456. Springer, Berlin, Heidelberg. Cheah, E. & Fry, J. (2015) Speculative Bubbles in Bitcoin Markets? An Empirical Investigation into the Fundamental Value of Bitcoin. Economics Letters 130, 32-36 Iwamura, M., Yukinobu, K. & Tsutomu, M. (2014) Is Bitcoin the Only Cryptocurrency in Town? Economics of Cryptocurrency and Friedrich A. Hayek Lehdonvirta, V. (2009) Virtual item sales as a revenue model: identifying attributes that drive purchasing decisions. Electronic commerce research, 9(1), 97-113. Newzoo.com (21.4.2016) The Global Games Market Reaches $99.6 Billion in 2016, Mobile Generating 37%. Reviewed 8.2.2017, from https://newzoo.com/insights/articles/global-games- market-reaches-99-6-billion-2016-mobile-generating-37/ Mallard, A., Méadel, C. & Musiani, F. (2014) The paradoxes of distributed trust: Peer-to-peer architecture and user confidence in Bitcoin. Journal of Peer Production, (4), 10. Oh, G. & Ruy, T. (2007) Game design on item-selling based payment model in korean online games. In Proceedings of DiGRA 2007 Runeson, P. & Höst, M. (2009) Guidelines for conducting and reporting case study research in software engineering. Empir Software Eng. 14, 131-164. DOI: 10.1007/s10664-008-9102-8 Sasson, S. (2015) How to build a smart game economy. Reviewed 10.2.2017, from https://techcrunch.com/2015/08/05/how-to-build-a-smart-game-economy/ Sharp, B. & Sharp, A. (1997) Loyalty programs and their impact on repeat-purchase loyalty patterns. International journal of Research in Marketing 14(5), 473–486 Yamaguchi, H. (2004) An Analysis of Virtual Currencies in Online Games. Available at SSRN: https://ssrn.com/abstract=544422 Yin, R.K. (2014) Case study research. Design and methods, 5th ed. London, Sage. ISBN-10: 1452242569 544 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Diabetes Lifestyle (e)Coaching 50 Weeks Follow Up; Technology Acceptance & e-Relationships 38 LUUK P.A. SIMONS, HANNO PIJL, JOHN VERHOEF, HILDO J. LAMB, BEN VAN OMMEN, BAS GERRITSEN, MAURICE B. BIZINO, MARIEKE SNEL, RALPH FEENSTRA & CATHOLIJN M. JONKER Abstract We report on the 50 weeks follow up results from a healthy lifestyle pilot (High Intensity Nutrition, Training & coaching), conducted with 11 insulin-dependent Type 2 Diabetes Mellites (DM2) patients. Hybrid eHealth support was given, with electronic support plus a multi-disciplinary health support team. Regarding the pilot goal of long term healthy lifestyle adoption in senior DM2 patients, challenges were: low ICT- and health literacy. This exploratory design analysis formulates design lessons based on 50 weeks follow up. The first 12 weeks contained intensive face-to-face and eSupported coaching. After that, patient self- management and eTools were key. After 50 weeks, attractiveness and feasibility of the intervention were perceived as high: recommendation 9,5 out of 10 and satisfaction 9,6 out of 10. TAM (Technology Acceptance Model) surveys showed high usefulness and feasibility. Acceptance and health behaviours were reinforced by the prolonged health results: Aerobic and strength capacity levels were improved at 50 weeks, plus Health Related Quality of Life (and biometric benefits and medication reductions, reported elsewhere). We draw three types of conclusions. First, patients’ health literacy and quality of life improved strongly, which both supported healthy behaviours, even after 50 weeks. Second, regarding eHealth theory, iterative growth cycles are beneficial for long term adoption and e-relationships. Third, a design analysis was conducted regarding long term service mix efficacy in relation to key requirements for designing ICT-enabled lifestyle interventions. Several suggestions for long term lifestyle eSupport are given. Keywords: • Type 2 Diabetes (DM2) • eHealth • Lifestyle • Monitoring • Coaching • Blended Care • Service Design • CORRESPONDENCE ADDRESS: Luuk P.A. Simons, Delft University of Technology, Mekelweg 2, 2628 CD Delft, Netherlands, e-mail: L.P.A.Simons@tudelft.nl. Hanno Pijl, Leiden University Medical Center, Albinusdreef 2, 2333 ZA Leiden, Netherlands, e-mail: H.Pijl@lumc.nl. John Verhoef, Leiden University of Applied Sciences, Netherlands, Verhoef.j@hsleiden.nl. Hildo J. Lamb, Leiden University Medical Center, Zernikedreef 11, 2333 CK Leiden, Netherlands, H.J.Lamb@lumc.nl. Ben van Ommen, TNO, Anna van Buerenplein 1, NL-2595 DA The Hague, Netherlands, ben.vanommen@tno.nl. Bas Gerritsen, Health Coach Program, Westeinde 62, 2275 AG Voorburg, Netherlands, e-mail: Bas.Gerritsen@HealthCoachProgram.nl. Maurice B. Bizino, Leiden University Medical Center, Albinusdreef 2, 2333 ZA Leiden, Netherlands, e-mail: M.B.Bizino@lumc.nl. Marieke Snel, Leiden University Medical Center, Albinusdreef 2, 2333 ZA Leiden, Netherlands, e-mail: M.Snel@lumc.nl. Ralph Feenstra, Health Coach Program, Westeinde 62, 2275 AG Voorburg, Netherlands, e-mail: Ralph.Feenstra@HealthCoachProgram.nl. Catholijn M. Jonker, Delft University of Technology, Mekelweg 2, 2628 CD Delft, Netherlands, e-mail: C.M.Jonker@tudelft.nl. https://doi.org/10.18690/978-961-286-043-1.38 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 546 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) L. P.A. Simons, H. Pijl, J. Verhoef, H. J. Lamb, B. van Ommen, B. Gerritsen, M. B. Bizino, M. Snel, R. Feenstra & C. M. Jonker: Diabetes Lifestyle (e)Coaching 50 Weeks Follow Up; Technology Acceptance & e-Relationships Introduction Our Western lifestyle plays a large role in the onset and progression of DM2: type 2 Diabetes Mellitus (Lim 2011). Several lifestyle interventions improved outcomes in type 2 diabetes patients on insulin therapy, most notably: lower blood sugar and lower medication needs (Jenkins 2008; Esposito 2009). However, these are often costly, highly controlled interventions. Moreover, the longer term (> 6 months) sustainability of behaviour changes is limited. The question is: can we do this on a more ‘Do-It-Yourself’ and e-Supported basis? This would have two advantages. First, since behaviour improvements are implemented within patients’ lives, it improves the chances of sustained health behaviour (Simons 2013). Second, it is cheaper. Since 2010 the Health Coach Program has been used to improve lifestyle and metabolic outcomes (including reduced insulin needs for type 2 diabetes (DM2) patients), via eSupport, improved self-management and rapidly improved health behaviours (Simons 2010, Simons 2015). To promote rapid health results, a HINTc (High Intensity Nutrition, Training & coaching) intervention of 12 weeks was developed for this patient population, plus lightweight eSupport and mostly self-management in weeks 13 - 50. The intervention combines improving health literacy with active behaviour change support. This paper discusses follow up results and design lessons after 50 weeks, as part of a larger biomedical study. An important goal of the biomedical pilot study was to promote long term (> 6 months) healthy lifestyle adoption in senior DM2 patients. Even in well- facilitated settings, a majority of interventions lack sustained health effects after 6 months (Verweij 2011). Moreover, in eHealth initiatives, there is always the risk of falling victim to the ‘eHealth law of attrition’ (Eysenbach 2005): meaning that 90% of users are often already lost within a few usage instances. In this study population, there were additional challenges due to their low average ICT- and health literacy. This exploratory design analysis formulates design lessons based on 50 weeks follow up. We focus on feasibility and attractiveness of the HINTc e-supported lifestyle intervention, plus on formulating design lessons. Given the desire to develop cost-effective long term eHealth support relationships with these types of patient groups, a focus is on long term e-relationship support lessons. Medical results will be discussed in another paper. Research Questions:  What are the 50-weeks-follow-up feasibility and attractiveness of the HINTc e- supported lifestyle coaching program; and what are the effects on quality of life?  What design lessons emerge for long term eHealth and e-relationship support? 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 547 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) L. P.A. Simons, H. Pijl, J. Verhoef, H. J. Lamb, B. van Ommen, B. Gerritsen, M. B. Bizino, M. Snel, R. Feenstra & C. M. Jonker: Diabetes Lifestyle (e)Coaching 50 Weeks Follow Up; Technology Acceptance & e-Relationships As part of the design analysis we address: efficacy of the service mix deployed in eSupported lifestyle interventions. We combine the 50-week results from our measurements with a design analysis based on an evaluation framework of requirements for ICT-enabled healthy lifestyle interventions. Theory The eSupported lifestyle program combines coach sessions with electronic dashboarding and self-management. Hybrid programs (face-to-face plus tele-support) have been indicated to be attractive for some time (Demark-Wahnefried 2007, 2008). Finding the right mix between offline and online contacts is an ongoing design research challenge (Pekmezi 2011). In summary, a hybrid or multi-channel service mix is recommended (De Vries 2008, Sperling 2009, Simons 2002, 2006, 2010, 2010b), combining electronic and face-to-face interactions. Still, there are many design challenges, given the multitude of options. For a more extensive discussion, see Simons (2014). Key functionalities to increase health motivations and behaviours in this eSupported lifestyle program are (Simons 2010, 2014 and 2016):  Daily logging of insulin and blood sugar levels: for close progress monitoring of the health coaches, physicians and participants themselves.  Close cooperation with physicians, for rapid medication adjustments initially (avoiding dangerously low blood sugars when insulin dosage is not reduced rapidly enough in the first days), plus medical monitoring/coaching in the following weeks.  A personal online health dashboard with graphs of progress towards adherence targets on the various health behaviours;  Automated feedback on lifestyle aspects where positive scores have been achieved (nutrition, physical activity, stress management or an overall score);  (Tele)coaching by a health coach, generating online reports on progress towards adherence targets in the personal dashboard;  The (tele)coaching sessions can be flexibly planned, based on convenience and participant preference: during in-clinic visits or phone based from home;  Options to ask questions to the coach: via messaging within the dashboard or via email;  Online schedule indicating upcoming events: group sessions, individual coach sessions (when and where), physical measurements, surveys;  A micro-learning Health Quiz accessible via smartphone, mail and/or web;  Reading materials in the mail;  Weekly tips via email on health, motivation and self-management;  Besides individual coaching, group sessions are also used in order to stimulate group support, mutual inspiration and encouragement, plus peer education. 548 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) L. P.A. Simons, H. Pijl, J. Verhoef, H. J. Lamb, B. van Ommen, B. Gerritsen, M. B. Bizino, M. Snel, R. Feenstra & C. M. Jonker: Diabetes Lifestyle (e)Coaching 50 Weeks Follow Up; Technology Acceptance & e-Relationships It was theorized and tested elsewhere that the design challenge of persuasive technology (Fogg 2002, 2009) for health is not just located in the ICT design, but also in the design of the overall service scape, including health effects and coach relationship (Starr 2008, Simons 2014b). It should generate positive, mutually reinforcing service experiences across communication channels and activate long term health motivation and - behaviours, in order to deliver long term health results. This is reflected in the following design evaluation framework for health improvement ICT solutions (Simons 2014), see Figure 1. Health effectiveness: - Health literacy - Health behaviors - Health outcomes - Quality of life and well-being Coaching performance: ICT value adding: - Promoting health actions - Quality of motivators, triggers, experiences - Supporting self-efficacy - Simplicity: familiar interfaces, ease of use - Activating intrinsic motivation - Embedded in and enhancing coach relation Figure 1: Basic requirements when designing ICT-supported healthy lifestyle interventions Figure 1 addresses three evaluation domains: health effectiveness, coaching performance and ICT value adding. It helps evaluate the impact of ICT-enabled interventions and will be used as analysis framework for section 4, Results. Methods, Study Design, Intervention This is a non-randomized, one arm, pilot intervention study of 12 weeks Sept-Nov 2015, plus effect measurement at 50 weeks follow up; approved by the Leiden University Medical Center (LUMC) Ethics Board. The biomedical results will be addressed in a separate paper. The study participants were 11 insulin-dependent Diabetes Mellitus Type- 2 patients. Patients were volunteers and provided written informed consent prior to the study. They were recruited by LUMC from the larger Leiden area in the Netherlands. They were 8 men and 3 women, ages 39-70 years, with widely varying levels of education (although skewed towards the lower end) and of comorbidity. Challenges regarding design of individual training schedules were posed by all the physical constraints in this group: 7 had significant movement restraints (knee- and hip- replacements, cardiovascular blood flow constraints, stents), 5 had neuropathy, and 7 had cardiovascular disease. On average they had been a Type 2 Diabetes (DM2) patient for more than 10 years and they were motivated for trying lifestyle improvements. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 549 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) L. P.A. Simons, H. Pijl, J. Verhoef, H. J. Lamb, B. van Ommen, B. Gerritsen, M. B. Bizino, M. Snel, R. Feenstra & C. M. Jonker: Diabetes Lifestyle (e)Coaching 50 Weeks Follow Up; Technology Acceptance & e-Relationships TAM surveys (Technology Acceptance Model, Venkatesh 2000) were used at weeks 4 and 12 to assess intervention feasibility and attractiveness. In this study, TAM is only used qualitatively, as a tool for user evaluation, not to make technology acceptance calculations or predictions. For this purpose, its eight dependent variables provided us with ample user evaluation insights, compared to the four dependent variables of UTAUT (Venkatesh 2003). Furthermore, user satisfaction evaluations were user plus the RAND SF-8 Health Related Quality of Life survey (Ware 1998). Besides, a standardised sit/stand test is used to assess strength (Csuka 1985) and an Astrand test (1976) for endurance. Study inclusion criteria  Type 2 diabetes mellitus treated by insulin therapy with or without oral blood glucose lowering drugs.  BMI >= 25 kg/m2  Age 30-80 yrs  Dutch language and basic computer competence (for use of email and web based dashboard) Exclusion criteria  Recent (< 3 months) myocardial infarction  Uncontrolled blood pressure (SBP > 170 mmHg and/or DBP > 100 mmHg, 2 out of 3 measurements)  Any chronic disease other than type 2 diabetes hampering participation (at the discretion of the investigator)  Low motivation to participate (score 2 ‘weak’ or 1 ‘very weak’ on a 5-point scale).  Alcohol consumption of more than 28 units per week at present or in the past  Psychiatric disease (as defined by DSM-V)  Claustrophobia  Metal implants or other contraindications for MRI The eSupported lifestyle intervention HINTc (High Intensity Nutrition, Training and coaching) An extensive eSupported lifestyle program is offered, which combines coach sessions with electronic dashboarding and self-management, plus electronic health tips and a digital health quiz game. Intensive coaching is offered for 4 weeks with the purpose of generating self-propelling behaviours and capabilities. In week 1 a low-calorie approach is taken to enable rapid alleviation of fatty liver conditions. The support in weeks 5-12 is more lightweight, with group sessions at the end of weeks 6, 8 and 12, weekly electronic 550 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) L. P.A. Simons, H. Pijl, J. Verhoef, H. J. Lamb, B. van Ommen, B. Gerritsen, M. B. Bizino, M. Snel, R. Feenstra & C. M. Jonker: Diabetes Lifestyle (e)Coaching 50 Weeks Follow Up; Technology Acceptance & e-Relationships tips and a digital health game. The support in weeks 13-50 is: sustained eTool support, plus 6-weekly group coach sessions for sharing and discussing each other’s progress and challenges, for reinstating health literacy lessons and for social group support. As an umbrella overarching the personalized coaching per participant, the general lifestyle advice follows the guidelines of the Harvard Epidemiology and Nutrition Group for nutrition and physical activity, with specific modifications for diabetics. The guidelines are to increase intake of vegetables and low sugar fruits (each 2,5 servings/day or more), to choose whole grains instead of refined grains, to limit sugar and other high glycaemic load foods, to have one daily serving of nuts and/or legumes, to limit intake of red meat and processed meat, to limit intake of trans and animal fats, and to have no more than 2 (male) or 1 (female) alcoholic beverages/day. Physical exercise guidelines are: at least 60 min/day moderate intensity activity (like walking or gardening) and at least 3x30 min/week intensive activity, which was also supported with group training sessions at the LUMC location three times per week (Borg level 12-14). Stress management guidelines are: relaxation exercises for >10 min/day. Results We discuss several types of results. We address answers to the first research question: What are the 50-weeks-follow-up feasibility and attractiveness of the HINTc e-supported lifestyle coaching program, including the positive feedback provided by the improvements in quality of life and physiology (insulin medication, blood sugar, physical stamina)? And to answer the second research question (‘What design lessons emerge for long term eHealth and e-relationship support?), we analyse efficacy of the service mix deployed in eSupported lifestyle interventions, following the framework of Figure 1 from Theory. First, regarding attractiveness and feasibility, satisfaction and recommendation were not only high after 4 weeks (8,7 and 9,0 out of 10 respectively) and 12 weeks (9, 1 and 9,0 out of 10 respectively), but also after 50 weeks: 9,6 and 9,5 out of 10 respectively. This is in contrast with usual patterns where the initial enthusiasm of the first weeks wanes after 3 months. Regarding ‘Health Related Quality of Life’ as measured with the RAND SF-8 an interesting pattern emerged over the 50-week period, as illustrated in Figure 2. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 551 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) L. P.A. Simons, H. Pijl, J. Verhoef, H. J. Lamb, B. van Ommen, B. Gerritsen, M. B. Bizino, M. Snel, R. Feenstra & C. M. Jonker: Diabetes Lifestyle (e)Coaching 50 Weeks Follow Up; Technology Acceptance & e-Relationships Physical and Mental Health over Time 90 80 Score8 70 - 60 D SF 50 RAN 40 wk 0 wk 4 wk 12 wk 50 Time Physical Health Mental Health Figure 2: Physical and Mental Health (RAND SF-8) in weeks 0, 4, 12 and 50. The Physical Health score moved from an average of 50.1 at start to 66.6 at week 4 to 73.1 at week 12, to 62 at week 50, with 76.2 as the Dutch average (Standard Deviation: 13.5). So for Physical Health, we see a steady and significant rise in the first 12 weeks (due to better eating and training), and after that a decline to 62, which is still better than the start. Mental Health went from 68.9 at start, to 82.4 at week 4, to 80.6 at week 12, to 71 at week 50, with 77.6 as the Dutch average (Standard Deviation: 13.7). Experienced Mental Health seems to peak at week 4. This coincides with the large positive surprise that the patients experience in the first 4 weeks: fast improvements in fitness, quality of life, medication, self-efficacy, health literacy, fun and group support, plus a hope for a better future. In the following period between weeks 4 and 12 there is a continued building up of strength and fitness, losing weight, building patterns/habits and gaining longer term self-efficacy. After 12 weeks, group training stops and patients are much more on their own. Patterns diverge, with some continuing to improve further, whereas others decline. Second, some of the physiological improvements of the first 12 weeks were sustained at 50 weeks (a more detailed analysis will follow in a separate publication, based on more reliable and extensive biometric and clinical measurements): average 8% weight loss (was 9% at 12 weeks), roughly 20% lower fasting glucose and 65% lower insulin medication (was 20% lower and 71% lower respectively at 12 weeks, based on data in self-monitoring tool). Clearly, the results in the first 12 weeks helped motivate patients and provided positive feedback that they were on the right track. Still, given the goal of long term (50 weeks) 552 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) L. P.A. Simons, H. Pijl, J. Verhoef, H. J. Lamb, B. van Ommen, B. Gerritsen, M. B. Bizino, M. Snel, R. Feenstra & C. M. Jonker: Diabetes Lifestyle (e)Coaching 50 Weeks Follow Up; Technology Acceptance & e-Relationships health results, it is positive to see that the 12 week results are largely sustained through to week 50. The two measures for physical endurance and strength showed interesting differences over time. Endurance measure VO2max first increased + 45% at week 12 and was + 24% at week 50. Strength (measured via 30 sec sit/stand test) on the other hand was +23% over the 12-week period and further improved to +44% (week 50). Of the 11 participants, 7 have continued intensive exercise in weeks 12-50. Third, the TAM (Technology Acceptance Model) user evaluations of week 12 and 50 shed some further light on patients’ experience and appreciation of the intervention, see also Table 1. Table 1: TAM (Technology Acceptance Model) user evaluation (n=11, weeks 12 and 50) TAM Construct Week 12 Score (out of 7) Week 50 Score (out of 7) 1. Usefulness All items ≥ 6.8 All items ≥ 6.6 2. Effortless -Lowest (5.0): Health Quiz -Lowest (4.8): Food guidelines -& Lowest (5.0): Food/exercise 5.1: Food/exercise logging in logging in dashboard dashboard 5.3: Food guidelines 5.2: Week tip in mail 3. Opinion of social circle All items ≥ 6.3; except ‘other All items ≥ 6.3; except ‘other patients’: 5.4 patients’: 6.0 4. Support All items ≥ 6.0 All items ≥ 6.0 5. Affect All items ≥ 6.4 All items ≥ 6.5 6. Ability All items ≥ 6.0 All items ≥ 5.7 7. Trust All items ≥ 6.2 5.8: Privacy? Rest: 6.5 8. Valuation (e)Support 6.9: Personal Trainers 6.7: Start menu/diet elements 6.8: Health Literacy 6.6: Health Literacy, Personal ‘What helped most to build 6.7: Daily eLog sugar/insulin Trainers, Group sessions health behaviours?’ 6.7: Support Health Coaches 6.5: Support Health Coaches, Physicians 6.6: Support Physicians 6.4: Start Workshop 6.6: Support/advice via mail -Lowest (5.6): Health Quiz, -Lowest (4.6): Homework Week tips, Homework physical physical exercise exercise -2nd Low (5.6): Health Quiz 9. Future Use Intention 6.7: Daily eLog sugar/insulin Only 3 items (rest not 6.6: Regular training/exercise applicable): 6.6: Healthy eating 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 553 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) L. P.A. Simons, H. Pijl, J. Verhoef, H. J. Lamb, B. van Ommen, B. Gerritsen, M. B. Bizino, M. Snel, R. Feenstra & C. M. Jonker: Diabetes Lifestyle (e)Coaching 50 Weeks Follow Up; Technology Acceptance & e-Relationships 6.6: Ask advice Health Coaches 6.4: Regular training/exercise or Physicians 5.8: Use tips and Health Quiz to Lowest (5.0): Food/exercise increase Health Literacy logging in dashboard All other items ≥ 6.0 The TAM (Technology Acceptance Model, Likert scale 1 to 7, strongly disagree to strongly agree, with several negatively coded items) user evaluation at weeks 12 and 50 shows three main patterns. First, these patients were relatively positive at 12 weeks and 50 weeks about all TAM constructs. Aspects that scored particularly high were: usefulness and the support offered by the multidisciplinary health team. Second, some patients were not ICT-literate and clearly had trouble with eTools like the Health Quiz of food/exercise logging. See Simons (2016) for a more extensive discussion on their differences in ICT adoption, which became apparent in the first 12 weeks. Third, we observed that over the course of roughly weeks 12 to 50, attention of participants shifted, also visible in their TAM scores. After initial attention on tools and start up challenges, attention later shifted to health literacy, plus sustaining healthy food and exercise patterns. In hindsight (at week 50), participants started appreciating the intensive start menu and start workshop more, the exercise support continued to be highly valued, plus sustaining healthy patterns in weeks 12 to 50 was top of mind: see the high scores for these elements in TAM constructs 8 (Valuation of support elements) and 9 (Future use). On the level of social support and maintaining a healthy lifestyle focus, the group spontaneously organized monthly meetings together, outside of the hospital setting. The final set of study results regard research question 2, analyses to enable lessons for long term eHealth relationship building. As a basis, we use an efficacy evaluation of the hybrid eSupport mix deployed, at 50 weeks follow up. Table 2 shows the authors’ evaluation using the theory framework of Figure 1. 554 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) L. P.A. Simons, H. Pijl, J. Verhoef, H. J. Lamb, B. van Ommen, B. Gerritsen, M. B. Bizino, M. Snel, R. Feenstra & C. M. Jonker: Diabetes Lifestyle (e)Coaching 50 Weeks Follow Up; Technology Acceptance & e-Relationships Table 2: Authors’ design evaluation at 50 weeks follow up, on design requirements from Figure 1 (authors’ opinions, 5-point scale from - - to ++) Health Effectiveness Coaching Performance ICT Value Adding Health Literacy: Promoting health actions: Motivators, triggers, experience: + Better than the low literacy ++ (e)Coach mix promoted + Most used one or more eTools start, but much forgotten at steps forward for all. in wk 12-50, but large variance. wk 50 by some. +/- Increasing variance after Simplicity: - Increased falling back into 12 weeks. ++ Simple mail reminder for certain old beliefs at wk 50. Supporting self-efficacy: sugar/insulin inputs. (Some were Health behaviours: + Sustained self-efficacy at highly ICT-illiterate.) +/- After 12 weeks: Improved 50 weeks, except for two - Health Quiz and food logging behaviour, but large variance. patients with major life/health being complex for some. Health outcomes: events and low compliance Fit with coach processes: ++ Biomarkers & medication. wk 12-50. ++ eTools: integral part of coach Quality of Life: Activating intrinsic processes and effectiveness. + At wk 50 better than start. motivation: +/- Much motivation support still ++ Getting results and feeling from the coaches, less from tools. better. Continued high satisfaction at wk 50. Table 2 contains several lessons. First, looking at Health Effectiveness, we see mixed results. Biologically, there are large, positive effects for all 11 participants, even at 50 weeks. Even despite the large health, education and psychology differences within the group. However, regarding health literacy and self-management competence, the large differences that were observed at the start, became increasingly pronounced during the 50 weeks follow up. This relates to the second column: Coaching Performance. Promoting health actions and intrinsic motivation worked relatively well. But with those patients that have less self-management skills, it is hard to maintain coaching effectiveness in the 12 to 50 weeks period. Third, regarding ICT Value Adding, it was good that there was a variety of eTools, given the large differences in the patient group regarding ICT literacy and preferences. The simple mail based tool for sugar/insulin monitoring was highly valued by all. And for the multi-disciplinary coach team the eTools were very useful for progress monitoring and pro-active coaching. See section 5.1, design lessons and implications for practice, for further reflection and improvement ideas on eTools. Design Lessons and Implications for Practice Several lessons can be learned from this study in relation to the intensive healthy lifestyle approach and in relation to the suitability of hybrid eHealth support. Plus, we will address options for improvement. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 555 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) L. P.A. Simons, H. Pijl, J. Verhoef, H. J. Lamb, B. van Ommen, B. Gerritsen, M. B. Bizino, M. Snel, R. Feenstra & C. M. Jonker: Diabetes Lifestyle (e)Coaching 50 Weeks Follow Up; Technology Acceptance & e-Relationships First, it is interesting to see in this HINTc intervention that satisfaction is high initially (at 4 & 12 weeks) and stays high or even seems to grow (during at least the first 50 weeks), even though large lifestyle changes are requested from the participants. Our interpretation is that contributing factors for this satisfaction are: gains in self-efficacy and health literacy, seeing results plus feeling results, which activates intrinsic motivation. In other words: the large and growing benefits that patients experience. The benefits, besides medication reduction, are also clearly visible in the increased scores on the Physical and Mental Health dimension of the RAND SF-8 Quality of Life survey. Second, based on qualitative feedback from the participants, it appears that several new, healthier food and exercise patterns started to become ‘the new normal’ already after 4 weeks into the intervention, remaining ‘normal’ for participants at week 12 and 50 as well. Third, opinions varied regarding the suitability of most of the eTools provided (like the health quiz, the email week tips, food and exercise logging). In the short term of the first few weeks, virtually all tools were used by virtually all patients. After several weeks, usage patterns diverged. Two factors appeared important in determining adoption and use of these tools: availability of time, plus ICT literacy (with the latter appearing most important: four participants expressed aversion at using computers. On top of that, individual preferences are important. For example, one participant continued daily food logging for over 50 weeks (whereas all others stopped after week 12), because he liked this form of explicit monitoring. Two other participants continued using the Health Quiz throughout the 50 weeks (the rest did not). Several others continued reading week tips and other health content during the 50 weeks follow up. Clearly, user preferences for the various eSupport tools differed. Fourth, the exception to this varied eTool adoption pattern was the simple, daily mail reminder Tool for sugar/insulin inputs, also described in Simons (2016). This tool was used daily again by the patient group in weeks 48 - 50 to assemble user pattern data. (The tool was not used in between, since care was handed over to their General Practitioners). We think that the combination of high simplicity with high usefulness was the key to its high adoption. The tool was an important basis for the coaching from the multidisciplinary support team. In conclusion: eSupport was not only useful for the patients, but especially for the care givers, providing them with much more extensive views on the users. Fifth, besides eTool support, the group effects and the multidisciplinary support team were highly valued. The patient group arranged several social events together during the weeks 12 – 50 period and every 6 weeks there was a 1-hour gathering at the hospital again with the support team. The hospital team meeting was valued socially, but also for health literacy and practical support. These group effects fostered high levels of interpersonal commitment, which is important for long term relationships and something that is more challenging to achieve with eTools. 556 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) L. P.A. Simons, H. Pijl, J. Verhoef, H. J. Lamb, B. van Ommen, B. Gerritsen, M. B. Bizino, M. Snel, R. Feenstra & C. M. Jonker: Diabetes Lifestyle (e)Coaching 50 Weeks Follow Up; Technology Acceptance & e-Relationships Finally, if we look at future improvement suggestions, several innovation opportunities emerge. First, in the coaches’ professional opinion, strength and endurance improvements could have been significantly larger with more effective training. Thus, in the next diabetes lifestyle project better training equipment will be used. Second, the training progress feedback loop will be used more, with a mail based self-management monitoring tool similar to our sugar/insulin tool. So that even after completion of the group training period together, the coaches can continue monitoring and guiding patients better on their exercise progress. Third, regarding building long term e-relationships, it would not be correct to label the phase of 12 to 50 weeks as ‘maintenance’. Patients are continuously renewing their patterns, experiences and lessons. All in relation to health literacy and health competence. Better (e)Support is needed for these renewed learning processes. Within long term support relationships, there clearly are patient needs for continued learning, growth and discovery. Hence, more functionality will have to be developed to stimulate online, effective search-, interaction- and question/answer behaviours of patients. Both in relation to health literacy questions as well as in relation to health routines, goals and competencies. Implications for Theory As stated before (Simons, 2016) for several of the patients in this group, their learning styles were highly non-cognitive. An (apparent) understanding of health cause and effect seemed to have less impact than experiencing cause and effect. Daily feedback loops between behaviours and (negatively high) sugar values were useful in this regard. For this group, learning is not very much about explicit awareness, intentions, goals, behaviour and maintenance plans, as postulated in models like HAPA (Health Action Process Approach) and i-change (Schwarzer 2010, Wiedeman 2011). This appears to resemble mental models of impulse purchasing in marketing: first acting, then experiencing and opinion forming (Vohs 2007). Next, the term ‘maintenance’ (as used in HAPA for example) seems a miss-qualifier for the longer term phase of health behaviours observed here (12 to 50 weeks). What we observed was closer to processes of: iterative circles, continuous renewal, re- interpretation and discovery. These processes of course include pitfalls for those who have fragile health literacy. The latter group easily tend to fall prey to misbeliefs and misadvise from others around them (patients, family of popular press). Thus, finding effective and efficient formats for continued (e)coaching is very valuable for long term support as part of long term e-relationships with patients. Finally, four of the eleven participants simply disliked using ICT (whether laptop, smart pad or smartphone) for either reading, checking mail or inputting data. Still, the overall- attractiveness of the intervention was rated high, because of a) the large benefits and b) the extensive practitioner- and group support. Thus, the eHealth law of attrition 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 557 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) L. P.A. Simons, H. Pijl, J. Verhoef, H. J. Lamb, B. van Ommen, B. Gerritsen, M. B. Bizino, M. Snel, R. Feenstra & C. M. Jonker: Diabetes Lifestyle (e)Coaching 50 Weeks Follow Up; Technology Acceptance & e-Relationships (Eysenbach 2005) was bypassed, partly thanks to (social) benefits in the context of the ICT. Plus, some cognitive dissonance may have worked to our advantage: if something is a challenge, then people may appreciate their own achievements and results more. This appears to have helped increase motivation for ICT-adoption as well as the extensive lifestyle improvements. Especially in the longer run, their increased self-appreciation and self-efficacy appears to have helped. Conclusion Summarizing from this study, we can conclude a few key points. First, the 12 weeks of intensive training and coaching sustainably (for 50 weeks at least) improved patients’ health awareness, health behaviours, health outcomes and quality of life. Second, a virtuous cycle was started (as noted earlier in other lifestyle eHealth settings, see Simons 2014): better health literacy & behaviours -> better results -> better health literacy & behaviours. This helped patients reverse type 2 diabetes (DM2) progression, lowering all from a very high level of insulin therapy to on average 65% lower levels 50 weeks later, with two patients able to stop insulin therapy. Third, this is a challenging patient group with some being relatively low in health- and ICT literacy. Following the design analysis, the highly simplified solution we created for secure, daily eLogging for sugar/insulin for this group was relatively useful. All patients used it well and it enabled everybody involved to closely monitor progression. Regarding other eTools, appreciation and use varied, and future work is needed to increase long term effectiveness and e-relationship building. This preliminary analysis has several limitations. First, this is only a pilot study with 11 participants. Second, the 50-week data analyses are not complete yet; more biometric and behaviour data analyses still need to be done. Third, regarding external validity, these study results may only apply to motivated individuals, who volunteer for lifestyle training. Fourth, it can be argued that TAM is not the only suitable instrument for evaluating technology adoption. For example, UTAUT (Venkatesh 2003) is also viable. However, UTAUT was developed and validated in organisation contexts, where functional aspects of information systems adoption (like performance and effort expectations) are relatively important. In consumer contexts, items regarding ‘Attitude towards Use’ are relevant as well (Carlsson 2006), and those are part of TAM. Still, on the positive side our results (biological, behavioural, TAM) prove relatively robust across the 11 participants, even though they are diverse in background (education, gender, age, insulin medication levels and co-morbidity, health literacy, coping and learning styles). And this pilot provided an opportunity for design analysis regarding the hybrid service mix deployed and opportunities for long term e-relationship building. Acknowledgement The authors are very thankful to the physiotherapy team of Amy Blansjaar, Jadira Breeveld, Tess Bakker and Monique Bagheri for their great dedication in providing training and support for these patients. 558 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) L. P.A. Simons, H. Pijl, J. Verhoef, H. J. Lamb, B. van Ommen, B. Gerritsen, M. B. Bizino, M. Snel, R. Feenstra & C. M. Jonker: Diabetes Lifestyle (e)Coaching 50 Weeks Follow Up; Technology Acceptance & e-Relationships References Astrand PO. (1976). Quantification of exercise capability and evaluation of physical capacity in man. Prog Cardiovasc Dis; 19(1):51-67. Carlsson, C., Carlsson, J., Hyvonen, K., Puhakainen, J., & Walden, P. (2006). Adoption of mobile devices/services—searching for answers with the UTAUT. In System Sciences, 2006. HICSS'06. Proceedings of the 39th Annual Hawaii International Conference on (Vol. 6, pp. 132a-132a). IEEE. Csuka M., McConnachie (1985). A Simple method for measurement of lower extremity muscle strength. Am J Med;(78):77-81. Demark-Wahnefried, W., Clipp, E., Lipkus, I., Lobach, D. et al. (2007). Main Outcomes of the FRESH START Trial: A Sequentially Tailored, Diet and Exercise Mailed Print Intervention Among Breast and Prostate Cancer Survivors. J Clin Oncol, 25(19), pp. 2709-2718. Demark-Wahnefried W, Jones LW. Promoting a healthy lifestyle among cancer survivors. Hematology-Oncology Clinics of North America. 2008;22(2):319–342. De Vries, H., et al. (2008). The effectiveness of tailored feedback and action plans in an intervention addressing multiple health behaviors. Am J Health Promot. 22(6): p. 417-25. Esposito K, Maiorino MI et al (2009). Effects of a Mediterranean-Style Diet on the Need for Antihyperglycemic Drug Therapy in Patients With Newly Diagnosed Type 2 Diabetes; A Randomized Trial. Annals of Internal Medicine. 151(5):306-314. Eysenbach, G. (2005). The law of attrition. Journal of medical Internet research, 7 (1), e11. Fogg, B.J. (2002). Persuasive technology: using computers to change what we think and do." Ubiquity, December (2002): 5. Fogg, B. J. (2009). A behavior model for persuasive design. Proceedings of the 4th international conference on persuasive technology. ACM, 2009. Jenkins DJA, Kendall CWC et al (2008). Effect of a Low–Glycemic Index or a High–Cereal Fiber Diet on Type 2 Diabetes; A Randomized Trial. JAMA; 300 (23): 2742-2753. doi: 10.1001/jama.2008.808. Lim EL, Hollingworth KG et al. (2011) Reversal of type 2 diabetes: normalisation of betacell function in association with decreased pancreas and liver triacylglycerol. Diabetologia 54: 2506-2514. Lippke, S., Wiedemann, A. U., Ziegelmann, J. P., Reuter, T. and Schwarzer, R. (2009). Self- efficacy moderates the mediation of intentions into behavior via plans. American Journal of Health Behavior, 33(5), 521–529. Pekmezi DW, Demark-Wahnefried W. (2011). Updated evidence in support of diet and exercise interventions in cancer survivors. ActaOncol 50:167–78 Schwarzer, R., et al. (2010). Translating intentions into nutrition behaviors via planning requires self-efficacy: evidence from Thailand and Germany. Int J Psychol. 45(4): p. 260-8. Simons, LPA. (2006). Multi-channel services for click and mortars: development of a design method. PhD Thesis, Delft University of Technology. Simons, LPA and Bouwman, H. (2004). Designing a click and mortar channel mix. International Journal of Internet Marketing and Advertising 1(3): 229–250. Simons LPA, Foerster F., Bruck PA, Motiwalla L & Jonker CM. (2014b). Microlearning mApp to Improve Long Term Health Behaviours: Design and Test of Multi-Channel Service Mix. Paper presented at the 27th Bled eConference. Bled, Slovenia, Proceedings. Retrieval from www.bledconference.org and http://aisel.aisnet.org/bled2014/4 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 559 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) L. P.A. Simons, H. Pijl, J. Verhoef, H. J. Lamb, B. van Ommen, B. Gerritsen, M. B. Bizino, M. Snel, R. Feenstra & C. M. Jonker: Diabetes Lifestyle (e)Coaching 50 Weeks Follow Up; Technology Acceptance & e-Relationships Simons LPA, Foerster F., Bruck PA, Motiwalla L & Jonker CM. (2015). Microlearning mApp Raises Health Competence: Hybrid Service Design. Health and Technology, 5 pp 35-43. DOI 10.1007/s12553-015-0095-1 Simons LPA, Hafkamp MPJ, Bodegom D, Dumaij A, Jonker CM. (2016). Improving Employee Health; Lessons from an RCT. IJVNO, Accepted, to appear in 2016. Simons, LPA, and Hampe, JF. (2010). Service Experience Design for Healthy Living Support; Comparing an In-House with an eHealth Solution. Paper presented at the 23rd Bled eConference. Bled, Slovenia, from www.bledconference.org. Simons, LPA and Hampe, JF. (2010b). Exploring e/mHealth Potential for Health Improvement; A Design Analysis for Future e/mHealth Impact. Paper presented at the 23rd Bled eConference. Bled, Slovenia, from www.bledconference.org. Simons, LPA, Hampe JF, and Guldemond NA. (2012). Designing Healthy Consumption Support: Mobile application use added to (e)Coach Solution. Paper presented at the 25th Bled eConference. Bled, Slovenia, from www.bledconference.org. Simons LPA, Hampe JF, Guldemond NA. (2013). Designing Healthy Living Support: Mobile applications added to hybrid (e)Coach Solution, Health and Technology, 3 (1), pp.1-11. Simons LPA, Hampe JF, Guldemond NA. (2014). ICT supported healthy lifestyle interventions: Design Lessons. Electronic Markets. 24 pp. 179-192. DOI 10.1007/s12525-014-0157-7. Simons, LPA, Pijl M, Verhoef J, Lamb HJ, van Ommen B, Gerritsen B, Bizino MB, Snel M, Feenstra R, Jonker CM. (2016). Intensive Lifestyle (e)Support to Reverse Diabetes-2. Paper presented at the 29th Bled eConference. Bled, Slovenia, from www.bledconference.org. en http://aisel.aisnet.org/cgi/viewcontent.cgi?article=1023&context=bled2016 Simons, LPA, Steinfield C and Bouwman H. (2002) "Strategic positioning of the Web in a multi- channel market approach." Internet Research 12 (4): 339-347. Sperling, R., L.P.A. Simons and H. Bouwman. (2009). Multi-Channel Service Concept Definition and Prototyping, International Journal of Electronic Business, 7 (3), pp.237–255. Starr, J. (2008). The coaching manual: the definitive guide to the process, principles and skills of personal coaching. New York, Prentice Hall. Venkatesh, V. and Davis, F.D. (2000). "A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies," Management Science, 46, 186-204. Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS quarterly, pp. 425-478. Verweij, LM, Coffeng, J., van Mechelen, W., Proper, KI (2011). Meta-analyses of workplace physical activity and dietary behaviour interventions on weight outcomes. Obesity Reviews, Vol 12, No 6, pp. 406-429. Vohs, K. D., & Faber, R. J. (2007). Spent resources: Self-regulatory resource availability affects impulse buying. Journal of consumer research, 33 (4), pp. 537-547. Ware Jr, J.E. and Gandek, B. (1998). "Overview of the SF-36 health survey and the international quality of life assessment (IQOLA) project." Journal of clinical epidemiology 51.11 (1998): 903-912. Wiedemann, A. U., Lippke, S., Reuter, T., Ziegelmann, J. P. and Schwarzer, R. (2011). How planning facilitates behaviour change: Additive and interactive effects of a randomized controlled trial. European Journal of Social Psychology, 41, 42–51. 560 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Developing a Mobile Application for Managing Anaphylaxis: Discovering Critical Success Factors 39 KOEN SMIT, JORIS MENS & MATTHIJS BERKHOUT Abstract Anaphylaxis is a severe and potentially life-threatening allergic reaction that requires immediate treatment. A proposal for the development of a mobile application for supporting anaphylaxis patients was written by a team of allergists, after which this study was performed in order to identify critical success factors for the adoption of such an app. A mixed- method approach is used in order to gather data from a variety of sources, comprising a literature review, a domain expert interview, and a patient survey. One of the most valuable factors proved to be the validation of the medical information provided in the app. Besides this, patients are mostly concerned with the clarity of the presented information. While the proposed app does not fulfill all the identified factors, its development is overseen by medical professionals and endorsed by patient organizations. With a lack of such apps in the Dutch market and the demand indicated by survey respondents, this app has the potential to fill a gap in the support of anaphylaxis patients. Keywords: • Allergens • Anaphylaxis • Apps • Healthcare • Mobile • CORRESPONDENCE ADDRESS: Koen Smit, Digital Smart Services, HU University of Applied Sciences Utrecht, Nijenoord 1, 3552 AS Utrecht, The Netherlands, e-mail: koen.smit@hu.nl. Joris Mens, HU University of Applied Sciences Utrecht, Nijenoord 1, 3552 AS Utrecht, The Netherlands, e-mail: Joris.mens@hu.nl. Matthijs Berkhout, HU University of Applied Sciences Utrecht ,Digital Smart Services, Nijenoord 1, 3552 AS Utrecht, The Netherlands, e-mail: matthijs.berkhout@hu.nl. https://doi.org/10.18690/978-961-286-043-1.39 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 562 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Smit, J. Mens & M. Berkhout: Developing a Mobile Application for Managing Anaphylaxis: Discovering Critical Success Factors Introduction In this paper, we study a mobile application (app) for supporting anaphylaxis patients. The app was proposed by a team from the department for allergology at the University Medical Center Utrecht (UMCU), a large academic teaching hospital in the Netherlands. The app will be developed in collaboration with physicians and patient groups supporting anaphylaxis patients. Anaphylaxis is a type of immediate allergic reaction categorized as type 1 hypersensitivity (Gell & Coombs, 1963), further defined as "... an acute, systemic reaction caused by mast cell–mediator release [which is] potentially life threatening" (Yocum et al., 1999). Anaphylaxis may be caused by a number of triggers, also called anaphylaxis agents, such as foods, medication, insect bites or contact with latex (Kemp & Lockey, 2002). Anaphylactic reactions cause symptoms which may be life-threatening and require an emergency response (Schwartz, 1994). The proposed app is intended to support anaphylaxis patients and their caregivers by providing step-by-step assistance in the case of an anaphylactic reaction. Exposure to allergens that cause anaphylactic reactions may occur via ingestion, inhalation, injection or direct contact (WAO, 2012). Anaphylaxis manifests itself through symptoms such as flushing and itchiness of the skin, difficulty breathing, swelling of the mouth or eyes or an abnormal heart rate (Sampson et al., 2006). An anaphylactic reaction is usually treated by administering a dose of epinephrine (adrenaline) intramuscularly into the thigh using an auto-injector, after which the patient should be admitted to a hospital for further treatment and observation (Sampson, 2003). The exact prevalence of anaphylaxis is difficult to establish, as people may develop sensitivities to allergens at different points in life, or may be unaware of sensitivities to allergens they have not yet been exposed to. Different studies indicate a 0.5% to 2% prevalence in the world's population (Simons, 2010), a 1.21% to 15.04% prevalence (Neugut, Ghatak, & Miller, 2001) and a 1.6% to 7.7% prevalence in the US population (Wood et al., 2014). Data provided in the app's proposal indicates the prevalence of diagnosed food allergy in The Netherlands at 1-2% in adults and 1-3% in children, with 90% carrying emergency medication. For insect bites, the prevalence is 1-3% among the Dutch population. The morbidity and mortality of anaphylaxis are believed to be underestimated due to limited data on its incidence (Brown, McKinnon, & Chu, 2001; Neugut et al., 2001). Evidence points towards an increase in anaphylaxis prevalence (Liew, Williamson, & Tang, 2009), which may be attributed to changes in diet and medicine use (Sheikh & Alves, 2000). Besides the physical symptoms, anaphylaxis is shown to have a societal impact by leading to a decreased quality of life and limiting of social activities for children (Sicherer, Noone, & Munoz-Furlong, 2001), as well as proneness to school absence and decreased participation in the labour market for adolescents (Marklund, Ahlstedt, & Nordström, 2007). Several patient groups aim to support anaphylaxis patients by providing information on the internet. Examples are the National Foundation of Food Allergy (in 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FORM CONNECTING THINGS TO 563 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Smit, J. Mens & M. Berkhout: Developing a Mobile Application for Managing Anaphylaxis: Discovering Critical Success Factors Dutch: Stichting Voedselallergie) and the Dutch Anaphylaxis Network (in Dutch: Nederlands Anafylaxie netwerk). This study aims to determine the critical success factors for the adoption of the proposed anaphylaxis app. To achieve this, we conducted a mixed method approach, containing a literature review, a domain expert interview, and a patient survey. The research question addressed in this paper is defined as follows: RQ: “What are critical success factors for user acceptance of an app to support patients suffering from severe allergic reactions?” The remainder of this paper is organized as follows. First, we provide information with regards to the anaphylaxis app that will be developed by UMCU, analyze similar apps and identify (critical) success factors for the adoption of such apps in literature in the background and related work section. This is followed by the research method in section three. In section four, the results of the mixed method approach are presented. Lastly, in section five, we reflect on the results and applied research methods in the discussion, conclude upon our study, and propose possible directions for future research. Background and related work In this section, the anaphylaxis app will be presented and compared to existing applications. Additionally, the literature with regards to Critical Success Factors (CSFs) is explored and discussed upon. 2.1 The anaphylaxis app The anaphylaxis app studied in this paper was proposed by a team at the department of allergy at the UMCU. The proposal entails a request for funding, which will be needed to start the development of the app for Android and iOS. Currently, no actual app or prototype exists. Development of the app will be performed by the Medical Apps Co- creation Center, also known as MAC³. MAC³ provides centralized services for the development, testing, and research of medical apps. The author of the proposal was interviewed in order to gather background information on the app. The team at UMCU collaborates with the National Foundation for Food Allergy, the Dutch Anaphylaxis Network and the domain group for eczema, which is a part of the Dutch Society of Dermatology and Venereology. These contacts are used to establish requirements for the app and to foster its acceptance in the medical community. The purpose of the app is to provide a better alternative compared to the leaflets that are usually given to patients by physicians, alongside anaphylaxis medication. Such leaflets provide information on emergency procedures but are not always carried by the patient. The app should improve the availability of this information by residing on the 564 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Smit, J. Mens & M. Berkhout: Developing a Mobile Application for Managing Anaphylaxis: Discovering Critical Success Factors smartphones of patients or caregivers. The information provided will be personalized depending on the type of reaction (caused by food or insect bites), the severity of the reaction and the medication the patient uses. Information on reactions caused by other, less common triggers is not explicitly included, but may be covered by the available information on treating reactions caused by food or insect bites. Besides providing assistance in the case of an allergic reaction, the app will provide background information on allergic reactions to be consulted at any time. While similar apps already exist in countries such as the UK and Australia, an app geared towards the Dutch market that is endorsed by patient organizations and contains validated medical information and instructions is not yet available. Country-specific apps are also needed because of differences in medications available per country. 2.2 Related apps/games The current offering of anaphylaxis-related apps was studied in order to explore similarities and differences compared to the proposed app. Apps were collected by performing the search query: ‘Anaphylaxis’ and ‘Allergy’ on the Google Play Store and the Apple App Store, including related apps for any identified app that resulted from our search. The apps and their characteristics, features, and ratings are compared in Table 1. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FORM CONNECTING THINGS TO 565 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Smit, J. Mens & M. Berkhout: Developing a Mobile Application for Managing Anaphylaxis: Discovering Critical Success Factors Table 1: Related app comparison Name Anaphylax Jext Anaphylact Anaphylaxis1 Anaphylax is ic Shock 01 is Allergy Developer Coventry ALK- Small cog Mylan Phacia Inc. Univ. Abelló Platform iOS, iOS Androi Android iOS, Android iOS d Price Free Free € 1.16 Free $ 0.99 Install base Unknown 100- 10-50 100-500 Unknown 500 Target UK UK General US US market Vendor- No Yes No No No specific General informatio Yes Yes Yes Yes Yes n Personalize d Yes Yes No No No advice Emergency Yes Yes No No Yes contacts Expiry Yes Yes No No No reminders Facility Yes No No No Yes Locator Most apps provide similar functionalities, some being more extensive than others. Such functionalities may include general information about anaphylaxis and allergies, instructions for emergency procedures and the use of auto-injectors, medication expiration reminders and interactive maps for finding nearby medical facilities. All apps found are aimed at anaphylaxis patients or caregivers. As evidenced by the available data on the number of installations, there does not appear to be one particularly popular anaphylaxis app. Install base data is only available on the Google Play Store and not on the Apple App Store. In terms of ratings and evaluations of the app, no information was found originating from independent sources. Some of the compared apps are free to use, while others require a small fee. Apps such as the one made by Coventry University are intended for a more general audience of anaphylaxis patients, while the Jext app developed by ALK-Abelló is to be used specifically by patients using Jext-branded auto-injectors. The former app is also the only app found that is endorsed by a local patient organization, namely the UK Anaphylaxis Campaign. 566 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Smit, J. Mens & M. Berkhout: Developing a Mobile Application for Managing Anaphylaxis: Discovering Critical Success Factors 2.3 Critical success factors The current body of knowledge on critical success factors in the context of this study consists of research on both (mobile) allergy management in general and anaphylaxis management. The available literature, which consisted of nine relevant papers, is presented in three main categories; preventative information, providing assistance, and mobile healthcare. 2.3.1 Preventative information Mobile technology is used in several ways to support patients suffering from allergies or anaphylaxis. One of these ways is providing preventative information by enabling patients to scan food items or medications through the use of barcode or NFC technology. A general study into smartphones and barcode scanning by Eichler & Luke (2009) describes a prototype developed by Deutsche Telekom Laboratories called 'Allergy Warner', which provides an alert message when scanning barcodes of food products in the supermarket. The app will contain a personalized allergy profile which looks for matching ingredients in the scanned products. Eicher & Luke argue that modern smartphones can quickly and easily scan and recognize multiple types of barcodes, making them suitable for this purpose. A similar study by Gassner, Vollmer, Prehn, Fiedler, & Ssmoller (2005) concludes that reliable information about food products is difficult to obtain because of different interests of stakeholders in the food value chain. A mobile app that provides such information would fill a gap in the market. Ottenhof (2010) provides a proof of concept for a device-based solution (DBS) that allows customers in supermarkets to scan product packages for allergy information. However, Ottenhof concludes that a lack of information provided by manufacturers proves to be an obstacle. Stierman (2009) found that scanning product packages make it easier for patients to retrieve allergen information. Patients were more likely to buy products they were unfamiliar with thanks to a scanning solution. A study by Möller, Diewald, Roalter, & Kranz (2012) evaluated an application called MobiMed, which allows users to scan medicines in different ways, either through text search, barcode scanning, visual search or Near Field Communication (NFC). This app could then be used to warn patients for medicines that would put them at risk of allergic reactions. Extracting information through NFC was found to be the fastest and most preferable method because the user does not need to search for and scan a barcode. However, the integration of NFC technology in smartphones and packaging is not yet widespread. Ottenhof (2010) found that NFC (or similarly, RFID) technology provides the best matching capabilities because of its high storage capacity and the possibility to tag products on an item level rather than by product type. While this information is easily extracted by modern smartphones, the implementation of RFID/NFC on packaging is 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FORM CONNECTING THINGS TO 567 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Smit, J. Mens & M. Berkhout: Developing a Mobile Application for Managing Anaphylaxis: Discovering Critical Success Factors relatively expensive. Scanning of standard EAN-13 barcodes is the cheapest in terms of implementation since products are already equipped with these barcodes. However, EAN-13 has a low storage capacity and can only identify products on a product level. A backend that provides additional information would be needed. Problems could occur when the composition of one type of product with the same barcode changes over time. When looking at the current literature on providing preventative allergy information to patients, we can conclude that there are still some improvements that can be made to cater to patients. In terms of retrieving the information, a universal, fast and cost-effective method needs to be found to provide contextual information about physical products on a smartphone. Additionally, manufacturers of medicines and food products need to provide allergen information that is easily accessible for consumers. 2.3.2 Providing assistance A series of works by Hernandez et al. describes a personal mobile health device and the associated app used to alert emergency services automatically when an auto-injector is administered to a patient (Hernandez Munoz & Woolley, 2009, 2010; Hernandez Munoz, Woolley, & Baber, 2008). The solution, called PervaLaxis, uses an accelerometer connected to an auto-injector to detect its usage, which is signaled wirelessly to a smartphone using Bluetooth. Emergency services can be contacted automatically through the phone. In a later study, PervaLaxis was further validated by involving patients (Hernandez Munoz & Woolley, 2010). A pilot study was performed, after which the patient sample was increased over time. Use case diagrams were used to test usability and determine important success factors for the solution. These success factors are reported to be: adrenaline injectors expiry alerts, an emergency support button, and adrenaline injection sensing. Limitations identified for this solution were the reliability of the mobile phone transmission and the accuracy of the injection sensor. Other works suggest that instructions for providing assistance to patients should be segmented towards different user groups. This may be done based on the age of the patient and the number of years of experience they have with their illness. Further personalization of the app could be of use here (Miles, Valovirta, & Frewer, 2006; Yu & Ramani, 2006). 2.3.3 Mobile healthcare Obiodu (2012) studied the top 500 medical apps in the Android market and concluded that the majority of apps are designed for healthcare professionals, while it is plausible that most end-users are patients rather than healthcare professionals. One significant problem is that it is often unknown whether medical apps intended for patients provide information that is validated by medical professionals (Haffey, Brady, & Maxwell, 2013). 568 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Smit, J. Mens & M. Berkhout: Developing a Mobile Application for Managing Anaphylaxis: Discovering Critical Success Factors In practice, it is found that medical professionals are often not involved in the development process of medical apps, or that there is a lack of validated sources available in the app (Buijink, Visser, & Marshall, 2013; Rosser & Eccleston, 2011). Beyond this, there are no obvious signs to distinguish medically validated apps from apps that have not been validated, such as an international mark of quality. When an app does not offer a diagnosis, treatment or cure, it cannot be classed as a medical device and will not be subject to the thorough scrutiny of such medical devices. (McCartney, 2013) However, the general information or advice provided by such a medical app may still cause harm to the patient. An increasing number of apps published and the lack of an international safeguard for monitoring medical apps undermines patient safety (Cook & Nolan, 2011; McCartney, 2013; Visvanathan, Hamilton, & Brady, 2012). 2.3.4 Critical Success Factors The literature contains 9 relevant contributions with regards to CSFs applicable in our study. The CSFs of the app can be defined as follows: 1. The information is context-aware through scanning of physical objects; 2. The information is easy to retrieve; 3. The information improves the user's understanding of the subject. When looking at the ability of the app to provide assistance in the event of an allergic reaction and general characteristics of mobile healthcare, the following success factors were identified: 4. The app should provide advice that is validated by medical professionals; 5. The app should provide advice that is tailored to the user's medicines; 6. The app should provide advice that is tailored to the characteristics of the user, such as age or level of experience. In Table 2, the critical success factors are linked to the papers from the literature review. In the header row, the six CSFs identified earlier are transformed into keywords. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FORM CONNECTING THINGS TO 569 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Smit, J. Mens & M. Berkhout: Developing a Mobile Application for Managing Anaphylaxis: Discovering Critical Success Factors Table 2: Meta-analysis regarding CFSs in the current body of knowledge 1. 2. 3. 4. 5. 6. User- Context Ease Understanding Validity Tailored sensitive (Eichler & ✓ ✓ Lüke, 2009) (Gassner et al., ✓ ✓ 2005) (Ottenhof, ✓ ✓ ✓ 2010) (Stierman, ✓ 2009) (Möller et al., ✓ 2012) (Hernandez ✓ ✓ ✓ Munoz et al., 2008) (Hernandez ✓ ✓ ✓ Munoz & Woolley, 2010) (Hernandez- ✓ ✓ ✓ ✓ Munoz & Woolley, 2013) (Miles et al., ✓ ✓ 2006) (Yu & Ramani, ✓ ✓ 2006) Research method 3.1 Interview In this section, we describe the setup, deployment and the evaluation of the interview with a domain expert who is a representative and the founder of the Dutch Anaphylaxis Network, known as NAN in Dutch. The NAN informs and provides support to patients while also keeping in touch with stakeholders, such as food producers, on current issues surrounding allergies. As the interview is semi-structured of nature, the following topics are discussed: 1. The current necessity of an app; 2. Existing knowledge on mobile applications concerning allergy or anaphylactic patients; 3. Critical success factors concerning user acceptance of an app; 4. Additional comments or advice. 570 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Smit, J. Mens & M. Berkhout: Developing a Mobile Application for Managing Anaphylaxis: Discovering Critical Success Factors With regards to CSFs, the domain expert was first invited to provide his own insight into possible CSFs and then asked to evaluate the CSFs identified during the literature review. This was done in order not to create a possible bias by first presenting our findings derived from literature. 3.2 Survey Following the literature review and domain expert interview, a survey was conducted among a sample of patients in order to gather further data on CSFs. As described in section one, the proposed app is aimed at the Dutch market, with a prevalence of diagnosed food allergy at 1-2% in adults and 1-3% in children, with 90% carrying emergency medication. For insect bites, the prevalence is 1-3% among the Dutch population, as indicated by the proposal of the app. All patients in The Netherlands who may be at risk for anaphylactic shock are included in the scope of the survey. The survey was designed to first establish basic information about the patient, such as their age and the number of years of experience they have with anaphylaxis. The patient was also asked if they are familiar with smartphones, including the total years of use and a self-assessed competency rating. A number of possible functionalities for the app were presented to the participants, for which they could indicate their desire for such a functionality in an anaphylaxis app on a Likert scale. These functionalities were adopted and where needed adapted from results of the literature review and domain expert interview. An open-ended question provided respondents the possibility to provide additional functionalities. The ratings given for the functionalities were then used to determine the most valuable functionalities and therefore CSFs for the adoption of the app. Another set of questions adopted from the System Usability Scale (SUS) and Technology Acceptance Model (TAM) determined which usability factors were deemed most important by patients, such as the clarity of the presented information and the interactivity of the app. Finally, the respondents were asked to rate the likeliness of using an anaphylaxis app on a scale of 1 to 10. Results In this section, the results of the interview and the patient survey are presented. 4.1 Domain expert interview The domain expert was positive about the concept of an anaphylaxis app. There is a necessity for such a solution in the domain. With regard to replacing paper leaflets, an app may be useful, but only until the patient has familiarized himself with the information. After this, the app will need additional functionalities to engage and support the patient, such as training users to identify and avoid possible anaphylactic triggers. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FORM CONNECTING THINGS TO 571 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Smit, J. Mens & M. Berkhout: Developing a Mobile Application for Managing Anaphylaxis: Discovering Critical Success Factors The domain expert identified the following CSFs for the adoption of an anaphylaxis app: 1. The app should focus on including avoidance strategies for potential anaphylactic triggers. 2. The app should include gamification, such as a quiz used to test knowledge on allergens and emergency procedures, both for the patient, caregivers as well as friends or family. 3. The app should focus on different user groups since the information needs of each group can differ. Adolescents may more easily ignore food warnings, for example, making it necessary to address them in a different way. 4. The app should be interactive, rather than just providing static content. 5. The app should be free. Earlier research by the domain expert concluded that paid-for apps lead to low adoption rates among patients. 4.2 Patient Survey Contacting patients directly through UMCU proved to be difficult and time-consuming due to the clearance procedures involved. The decision was therefore made to deploy the survey on the website of the NAN, with help of the domain expert interviewed earlier. The NAN receives about 500 unique visitors per day on their website. The survey was featured on the front page for a period of 6 days between from the 21st up until the 26th of June 2014. Patients could voluntarily and anonymously fill out the survey on the website. 276 respondents filled out the survey. The sample consists out of 16.7% male and 79.7% female respondents (3.6% unknown), with an average age of 40.96 years (s = 11.17). Our respondents have an average of 9.81 years of experience with anaphylaxis (s = 7.514). 93.1% of respondents indicate owning a smartphone. With a 46% percent share, Android is the most used mobile operating system, closely followed by iOS at 39.1%. The remaining share goes to other or unknown operating systems (13.8%) and Blackberry (1.1%). The average number of years respondents have been using a smartphone is 3.95 years (s = 2.511). They rate their own competency in the use of mobile phones with a 7.75 (s = 1.797) on a scale of 1 to 10. The desirability of an app to support anaphylaxis patients is rated with an average of 8.34 on a scale of 1 to 10 (s = 1.787), while the probability of the respondents using such an app is rated with an 8.75 (s = 1.903). The three most compelling app features indicated by respondents are the clarity of the information, the medical validation of the information, and the availability of information regarding emergency procedures, with average scores of 6.68, 6.62 and 6.48 on a scale of 1 to 7, respectively. The aspect rated as least important are the presence of an element of play (gamification), a quiz to test allergy knowledge and interactivity of the app, with average scores of 2.66, 3.33 and 4.50, respectively. All CSFs are shown in table 3. 572 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Smit, J. Mens & M. Berkhout: Developing a Mobile Application for Managing Anaphylaxis: Discovering Critical Success Factors Table 3: Survey results Mis Me Std. N sing an Deviation The app must present the information in an organized 274 2 6.68 0.651 manner The app must have a medical validation of the provided 275 1 6.62 0.799 information The app must scan product barcodes for information 273 3 6.48 0.944 The app must give information about emergency 274 2 6.48 0.999 procedures The app must have a list of predefined emergency 275 1 6.43 1.038 contacts The app must give advice about allergy triggers 276 0 6.31 1.328 The app must give advice about the expiration date of 274 2 6.18 1.23 the medicine The app must give guidance for recognizing products 275 1 6.11 1.35 with specific ingredients The app must have guidance for recognizing specific 276 0 6.03 1.366 ingredients The app must give advice about the used medicine 276 0 6.03 1.373 The app must be free of charge 274 2 5.48 1.781 The app must be able to share my allergy information 276 0 5.34 1.799 with my surroundings The app must look attractive 276 0 5.03 1.523 The app must show basic information about allergies 273 3 4.73 1.953 The app must be interactive 274 2 4.5 1.895 A quiz to test the knowledge about allergies 273 3 3.33 1.827 The app needs a challenging game element 274 2 2.66 1.694 (gamification) The open-ended question in the survey asking patients for other desirable functionalities yielded many results. The functionalities provided were categorized by similarity. 22 respondents indicated the desire for a functionality that helps to translate allergens and emergency instructions into another language for when the patient is traveling. 12 respondents wish for an alarm button that can quickly contact emergency services and other predefined contacts, and another 12 respondents wish for a newsfeed containing updates on medication or treatments. Conclusion & Discussion The research questions addressed in this paper was defined as follows: What are the critical success factors for user acceptance of an app to support patients suffering from allergies? To answer this research question, we looked at the results of the analysis of the 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FORM CONNECTING THINGS TO 573 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Smit, J. Mens & M. Berkhout: Developing a Mobile Application for Managing Anaphylaxis: Discovering Critical Success Factors current body of knowledge, the domain expert interview and the patient survey that were performed during this study. The various factors gathered from different sources indicate that a broad range of features is possible in an app that supports anaphylaxis patients. However, different features may appeal to different subgroups of patients depending on the severity of their symptoms, their age, and experience with their illness, among other factors. In literature, a number of studies were found concerning food allergies in general and specific measures for anaphylaxis. The studies on food allergies noted the possibility to scan food packaging as a critical success factor for user adoption in their specific context. The studies related specifically to anaphylaxis, such as the study concerned with automatically detecting the activation of an adrenaline injector through a Bluetooth accelerometer, were more concerned with the validity of the information provided by the accompanying app. However, the UMCU has already indicated that such features will not be included in the app at this time. The factors that remain, based on literature, are that the app should contain medically validated information, be easy to use and improve the user's understanding of the subject, and be sensitive to different user groups. The proposed app will adhere to these factors. The domain expert indicated a number of new factors mainly relating to the interactivity of the app and having certain quiz or gamification elements that test the knowledge and train them to avoid allergens. Another factor mentioned was that the app should be free in order to boost user adoption. Patients surveyed agreed with this, although they did not appear to be very enthusiastic about gamification or quizzes. Once more, new factors were introduced after the patient survey such as the ability to translate allergens and procedure information, providing a newsfeed and a list of predefined emergency contacts. The factors for the medical validation of the information and the availability of clear emergency procedures were also rated highly by patients. Another interesting factor is that patients indicated they would overall be very likely to use such an app. In relation to all of the features that were established in this study, the proposed anaphylaxis app appears to be relatively limited in features. However, the team at UMCU has indicated that the proposed app should be simple and straightforward to use. The decision was made not to include features such as scanning of objects or giving extensive information on types of food that contain allergens. Even though the app does not contain all functionalities that may be seen as critical success factors, the app may still prove to be of added value for patients when its functionalities are fit for purpose. The simplicity of the app will also contribute to the clarity of the information, which was another success factor. An effectiveness study will have to reveal the actual usefulness of the app for patients. The current body of knowledge related specifically to anaphylaxis apps is rather small and anaphylaxis apps are a relative niche market within the medical app landscape, making it difficult to predict the effects the CSFs will have on actual user adoption. 574 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Smit, J. Mens & M. Berkhout: Developing a Mobile Application for Managing Anaphylaxis: Discovering Critical Success Factors Beyond this, we recommend the team at UMCU looks into the possible expansion of the app in the future, in order to include some of the features that were indicated as being desirable for patients. Moreover, our results also indicate a selection of lower rated functionalities for the app. For example, the functionality that was rated lowest in our results was the functionality regarding the addition of a challenging game element (gamification). While we believe that our survey was conducted with the aim to gather data from the appropriate user groups, some of the respondents indicated to be a parent or caregiver. This is usually the case with younger children. There could be a difference between how a sample drawn solely from patient groups versus our sample rate the functionalities presented in a survey. Currently, our results are difficult to link with the existing body of knowledge as no uniform opinion exists on the importance of CSFs and related functionalities. Besides the methods used in this study, further validation should be performed using other patient organizations, medical professionals, domain experts, and patients. In this study, we were only able to contact one medical professional (the author of the proposal for the development of the app) and one representative of a patient organization (the domain expert). Therefore, the results of the survey could be affected by the input from the results of the interview, which were derived from one subject-matter expert. The generalizability of our results could be improved by involving more subject-matter experts from different perspectives (i.e. medical specialties, medical informatics, and academics). In addition to the Dutch market, the development team could also get into contact with other international organizations who have previously developed similar apps in order to find out more about their lessons learned. All in all, we believe that the current potential success of the app lies in the fact that it is being developed by medical professionals in collaboration with patient organizations, which is a highly regarded success factor. In addition, the app will be available for free and is targeted towards the Dutch market, where no such app currently exists. The information given about emergency procedures may indeed prove to be a useful replacement to paper leaflets, once doctors start prescribing the app alongside anaphylaxis medications. From a theoretical perspective, our study provides an overview of CSFs and the importance of those CSFs in the context of a substantial Dutch sample geared towards the development of an app to manage anaphylaxis. From a practical perspective, our results provide direct evidence and directions for development and help in the prioritization of the development of functionalities in similar apps. References Brown, a F., McKinnon, D., & Chu, K. (2001). Emergency department anaphylaxis: A review of 142 patients in a single year. The Journal of Allergy and Clinical Immunology, 108(5), 861–6. https://doi.org/10.1067/mai.2001.119028 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FORM CONNECTING THINGS TO 575 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Smit, J. Mens & M. Berkhout: Developing a Mobile Application for Managing Anaphylaxis: Discovering Critical Success Factors Buijink, A. W. G., Visser, B. J., & Marshall, L. (2013). Medical apps for smartphones: lack of evidence undermines quality and safety. Evidence-Based Medicine, 18(3), 90–2. https://doi.org/10.1136/eb-2012-100885 Cook, T. M., & Nolan, J. P. (2011). Use of capnography to confirm correct tracheal intubation during cardiac arrest. Anaesthesia, 66(12), 1183–4. https://doi.org/10.1111/j.1365- 2044.2011.06964.x Eichler, G., & Lüke, K. (2009). Barcode Application Innovation for Smartphones. GI Jahrestagung, 5. Gassner, K., Vollmer, G., Prehn, M., Fiedler, M., & Ssmoller, S. (2005). Smart Food: Mobile Guidance for Food-Allergic People. In Seventh IEEE International Conference on E- Commerce Technology (CEC’05) (pp. 531–534). IEEE. https://doi.org/10.1109/ICECT.2005.85 Gell, P., & Coombs, R. (1963). Clinical aspects of immunology. Clinical Aspects of Immunology. Haffey, F., Brady, R. R. W., & Maxwell, S. (2013). A comparison of the reliability of smartphone apps for opioid conversion. Drug Safety : An International Journal of Medical Toxicology and Drug Experience, 36(2), 111–7. https://doi.org/10.1007/s40264-013-0015-0 Hernandez-Munoz, L., & Woolley, S. (2013). Mobile Phone Tools with Ambient Intelligence for the Management of Life-Threatening Allergies. … Aspects in Ambient Intelligence, 8, 153– 173. https://doi.org/10.2991/978-94-6239-018-8 Hernandez Munoz, L. U., & Woolley, S. I. (2009). A user-centered mobile health device to manage life-threatening anaphylactic allergies and provide support in allergic reactions. In 2009 9th International Conference on Information Technology and Applications in Biomedicine (pp. 1– 4). IEEE. https://doi.org/10.1109/ITAB.2009.5394347 Hernandez Munoz, L. U., & Woolley, S. I. (2010). A Personal Handheld Device to Support People with Life-Threatening Anaphylactic Allergies (PervaLaxis). International Journal of Handheld Computing Research, 1(1), 64–78. https://doi.org/10.4018/jhcr.2010090904 Hernandez Munoz, L. U., Woolley, S. I., & Baber, C. (2008). A mobile health device to help people with severe allergies. In 2008 Second International Conference on Pervasive Computing Technologies for Healthcare (pp. 8–10). IEEE. https://doi.org/10.1109/PCTHEALTH.2008.4571012 Kemp, S. F., & Lockey, R. F. (2002). Anaphylaxis: A review of causes and mechanisms. Journal of Allergy and Clinical Immunology, 110(3), 341–348. https://doi.org/10.1067/mai.2002.126811 Liew, W. K., Williamson, E., & Tang, M. L. K. (2009). Anaphylaxis fatalities and admissions in Australia. The Journal of Allergy and Clinical Immunology, 123(2), 434–42. https://doi.org/10.1016/j.jaci.2008.10.049 Marklund, B., Ahlstedt, S., & Nordström, G. (2007). Food hypersensitivity and quality of life. Current Opinion in Allergy and Clinical Immunology, 7(3), 279–87. https://doi.org/10.1097/ACI.0b013e32814a569b McCartney, M. (2013). How do we know whether medical apps work? BMJ, 1811(March), 1–2. https://doi.org/10.1136/bmj.f1811 Miles, S., Valovirta, E., & Frewer, L. (2006). Communication needs and food allergy: a summary of stakeholder views. British Food Journal, 108(9), 795–802. https://doi.org/10.1108/00070700610688412 Möller, A., Diewald, S., Roalter, L., & Kranz, M. (2012). MobiMed: comparing object identification techniques on smartphones. In Proceedings of the 7th Nordic Conference on Human-Computer Interaction Making Sense Through Design - NordiCHI ’12 (p. 31). New York, New York, USA: ACM Press. https://doi.org/10.1145/2399016.2399022 576 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Smit, J. Mens & M. Berkhout: Developing a Mobile Application for Managing Anaphylaxis: Discovering Critical Success Factors Neugut, A. I., Ghatak, A. T., & Miller, R. L. (2001). Anaphylaxis in the United States. Archives of Internal Medicine, 161(1), 15. https://doi.org/10.1001/archinte.161.1.15 Obiodu, V. (2012). An Empirical Review of the Top 500 Medical Apps in a European Android Market. Journal of Mobile Technology in Medicine, 1(4), 22–37. https://doi.org/10.7309/jmtm.74 Ottenhof, R. (2010). User-friendly mobile allergy checks: Providing allergy information about food products. University of Amsterdam. Rosser, B. a, & Eccleston, C. (2011). Smartphone applications for pain management. Journal of Telemedicine and Telecare, 17(6), 308–12. https://doi.org/10.1258/jtt.2011.101102 Sampson, H. (2003). Anaphylaxis and emergency treatment. Pediatrics, (111), 1601–1608. https://doi.org/10.1542/peds.111.6.S2.1601 Sampson, H., Muñoz-Furlong, A., Campbell, R. L., Adkinson, N. F., Bock, S. A., Branum, A., … Decker, W. W. (2006). Second symposium on the definition and management of anaphylaxis: summary report--Second National Institute of Allergy and Infectious Disease/Food Allergy and Anaphylaxis Network symposium. The Journal of Allergy and Clinical Immunology, 117(2), 391–7. https://doi.org/10.1016/j.jaci.2005.12.1303 Schwartz, H. J. (1994). Anaphylaxis: A Potentially Fatal, Avoidable, and Often Ignored Clinical Problem. Mayo Clinic Proceedings, 69(1), 93. https://doi.org/10.1016/S0025-6196(12)61622- X Sheikh, A., & Alves, B. (2000). Hospital admissions for acute anaphylaxis: time trend study. BMJ, 320, 1441. Sicherer, S. H., Noone, S. A., & Munoz-Furlong, A. (2001). The impact of childhood food allergy on quality of life. Annals of Allergy, Asthma, & Immunology, 87(6), 461–464. Simons, F. E. R. (2010). World Allergy Organization survey on global availability of essentials for the assessment and management of anaphylaxis by allergy-immunology specialists in health care settings. Annals of Allergy, Asthma & Immunology : Official Publication of the American College of Allergy, Asthma, & Immunology, 104(5), 405–12. https://doi.org/10.1016/j.anai.2010.01.023 Stierman, A. (2009). Barcode reading to determine allergens in food products. University of Amsterdam. Visvanathan, a, Hamilton, A., & Brady, R. R. W. (2012). Smartphone apps in microbiology--is better regulation required? Clinical Microbiology and Infection: The Official Publication of the European Society of Clinical Microbiology and Infectious Diseases, 18(7), 18–20. https://doi.org/10.1111/j.1469-0691.2012.03892.x WAO. (2012). WAO White Book on Allergy 2011-2012. Wood, R. A., Camargo, C. A., Lieberman, P., Sampson, H. A., Schwartz, L. B., Zitt, M., … Simons, F. E. R. (2014). Anaphylaxis in America: the prevalence and characteristics of anaphylaxis in the United States. The Journal of Allergy and Clinical Immunology, 133(2), 461–7. https://doi.org/10.1016/j.jaci.2013.08.016 Yocum, M. W., Butterfield, J. H., Klein, J. S., Volcheck, G. W., Schroeder, D. R., & Silverstein, M. D. (1999). Epidemiology of anaphylaxis in Olmsted County: A population-based study. Journal of Allergy and Clinical Immunology, 104(2), 452–456. https://doi.org/10.1016/S0091- 6749(99)70392-1 Yu, W., & Ramani, A. (2006). Design and Implementation of a Personal Mobile Medical Assistant. Information Technology in Healthcare, 4(2), 92–102. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Transforming Clinical Practice Guideline Usage Through the Use of a Clinical Decision Support System: An Explorative Study at the University Medical Centre Utrecht 40 KOEN SMIT, PIETER KOORNNEEF, JULIE NYSINGH, MART VAN ZWIENEN, MATTHIJS BERKHOUT & PASCAL RAVESTEYN Abstract Medical treatments require a lot of knowledge and skills. To safeguard the quality of healthcare in general, Clinical Practice Guidelines (CPG) are written. Different studies show that the quality of healthcare improves by using CPGs. Based on the advancements in IT, a CPG could best be supported through the use of a Clinical Decision Support System (CDSS). In this paper, we seek to transform the use of several CPGs with regards to anti-clotting medicine and treatments through the utilization of a CDSS at the University Medical Centre Utrecht (UMCU) in the Netherlands. Data analysis shows that many of the included CPGs overlap and that the utilization of a CDSS for the determination of anti-clotting medicine and treatments could result in more effective and efficient decision making. Additionally, during the validation of the CDSS, we derived the attitude of the stakeholders towards the use of a CPG in a pilot study comprising a CDSS and identified several success factors that should be taken into account when designing, validating, and implementing CPGs into CDSS. Keywords: • Clinical Practice Guideline • Clinical Decision Support System • Medical Treatment • Healthcare • CORRESPONDENCE ADDRESS: Koen Smit, HU University of Applied Sciences Utrecht, Nijenoord 1, 3552 AS Utrecht, The Netherlands, e-mail: koen.smit@hu.nl. Pieter Koornneef, HU University of Applied Sciences Utrecht, Nijenoord 1, 3552 AS Utrecht, The Netherlands, e-mail: pieter.koornneef@student.hu.nl. Julie Nysingh, HU University of Applied Sciences Utrecht, Nijenoord 1, 3552 AS Utrecht, The Netherlands, e-mail: julie.nysingh@student.hu.nl. Mart van Zwienen, HU University of Applied Sciences Utrecht, Nijenoord 1, 3552 AS Utrecht, The Netherlands, e-mail: mart.vanzwienen@student.hu.nl. Matthijs Berkhout, HU University of Applied Sciences Utrecht, Nijenoord 1, 3552 AS Utrecht, The Netherlands, e-mail: matthijs.berkhout@hu.nl. Pascal Ravesteyn, HU University of Applied Sciences Utrecht, Nijenoord 1, 3552 AS Utrecht, The Netherlands, e-mail: pascal.ravesteijn@hu.nl. https://doi.org/10.18690/978-961-286-043-1.40 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 578 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Smit, P. Koornneef, J. Nysingh, M. van Zwienen, M. Berkhout & P. Ravesteyn: Transforming Clinical Practice Guideline Usage Through the Use of a Clinical Decision Support System: An Explorative Study at the University Medical Centre Utrecht Introduction Medical protocols are used by physicians as guidelines to perform a diagnosis and subsequently a treatment that fits that diagnosis. These protocols, also referred to as Clinical Practice Guidelines (CPGs), are defined and maintained by medical organizations such as hospitals, but also by national or international governing medical institutions. A CPG may offer specific instructions on which diagnostic or screening tests to use, how to provide medical or surgical services, the duration that patients should stay in a hospital, or regarding other details of clinical practice. These CPGs may contain overlapping content between different medical specialties. To help to determine the right decision for an accurate diagnosis, despite the redundancy (Alonso-Coello et al., 2010), it is possible to implement the different protocols into one Clinical Decision Support System (CDSS). A CDSS can be described as the provision of the knowledge of clinical experts in combination with patient-related information in an information system (Chang et al., 2011). Medical knowledge and patient-related information combined are filtered and presented at the times necessary. These actions are performed to improve patient care by providing an accurate decision on what medicine and corresponding treatment to adhere to (Chang et al., 2011; Minutolo, Esposito, & De Pietro, 2012). Essentially, CPGs are an accumulation of rules with regards to diagnostics, medication and treatments, thus these rules can be programmed in a CDSS. This research paper will explore how the existing anti-clotting CPGs at the University Medical Centre Utrecht (UMCU) can be embedded into a knowledge model to be implemented in a CDSS to support decision making. A similar study by Ozel, Bilge, Zayim, & Cengiz (2013) focused on the development and evaluation of a web-based CDSS that supports Intensive Care Unit providers in making decisions more efficient and effective. This particular study states that “The aim of the study was to develop a supportive web-based system which was constructed in line with the needs and preferences of intensive care physicians and evaluate its efficiency, effectiveness and usability” (Ozel, Bilge, Zayim, & Cengiz, 2013). In contrast to this study, the challenge addressed in this paper is the development of a CDSS containing eight CPGs, each from different specialties at the UMCU. Currently, when the diagnostic, medicine and treatment variables have to be determined for a patient, all involved specialties have to discuss the best course of action, based on their specific CPG. To ensure that medical professionals with different specialties and backgrounds follow decision-making processes in a consistent manner, it is important that the different CPGs are combined (Alonso-Coello et al., 2010). A successful implementation of CPGs into a CDSS will provide stakeholders in medical processes with the ability to systematically make decisions in an effective manner, without the need to discuss medicine and treatment variables with each specialism. Furthermore, the utilization of a CDSS for decision making could result in a reduced error margin as the decisions supported can be 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 579 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Smit, P. Koornneef, J. Nysingh, M. van Zwienen, M. Berkhout & P. Ravesteyn: Transforming Clinical Practice Guideline Usage Through the Use of a Clinical Decision Support System: An Explorative Study at the University Medical Centre Utrecht evaluated appropriately (Ozel et al., 2013). The evaluation of the output is important as it enables the CDSS to ‘learn’ to provide more accurate decision-support (Jiménez-Serrano, Tortajada, & García-Gómez, 2015). To ground our goal to develop a CDSS for the determination of anti-clotting medicine and treatment, the following research question is formulated; RQ: “How can the available anti-clotting CPGs of the UMCU be combined into a CDSS with the aim to support decision making and increase adoption of the CDSS?” The remainder of this paper is organized as follows: in section two the background and related work with regards to CPGs and CDSSs will be explored. Next, the research method is presented in section three. This is followed by section four in which the data collection and analysis are described. Finally, in section five the results of our study are presented and in section six we draw conclusions from our results followed by a discussion with regards to the research study conducted, after which we provide directions for future research. Background and Related Work In literature, several definitions for a CPG exist. In our study, the following extensively cited definition from Field & Lohr (1990) will be used: “systematically developed statements to assist practitioner decisions about appropriate healthcare for specific clinical circumstances.” Since CPGs are developed and implemented in the clinical practice, it has shown a lot of potential for the improvement of the quality of the healthcare (Grol, 2001; Lugtenberg, Burgers, & Westert, 2009). The combination of scientific literature and evidence with insights from clinical experts form the basis for a CPG, usually published by national medical governing bodies, for example, the Dutch College of General Practitioners (NHG) or the American Institute of Medicine and are further specialized and instantiated per hospital. Based on this, recommendations are developed on specific clinical subjects. For example, a clinical subject (i.e. coronary heart disease) is given a score based on the insights from the clinical experts, the height of the total score determines what treatment is supposed to be given. The recommendation according to the score is always backed by scientific literature. These recommendations provide professionals working in healthcare guidance, whom in some cases don’t have the expertise required to effectively and/or efficiently determine medicine and treatment for a patient (Davis & Taylor-Vaisey, 1997). A couple of proven benefits that CPGs realize in the clinical domain are: 1) decision making on appropriate care for patients, 2) promote education and improvement of care processes, 3) reduce unwanted variation in the delivery of health care, and 4) help contain costs. Most of these positive attributes are similar with the benefits from CDSSs (Grol, 2001; Lugtenberg et al., 2009; Woolf, Grol, Hutchinson, Eccles, 1999). However, the utilization of CPGs also poses stakeholders with challenges like how to maintain CPGs so that state-of-the-art knowledge is guaranteed (Shekelle et al., 2001) and how to ensure the validity of its contents (Browman, 2000). 580 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Smit, P. Koornneef, J. Nysingh, M. van Zwienen, M. Berkhout & P. Ravesteyn: Transforming Clinical Practice Guideline Usage Through the Use of a Clinical Decision Support System: An Explorative Study at the University Medical Centre Utrecht 2.1 Implementation of CPGs For a CPG to be effectively utilized, it needs a successful implementation. Multiple studies show that in some cases, after the dissemination of the CPGs, there is a lack of usage in the clinical practice (Cabana et al., 1999; Grol, 2001). A part of the problem is the lack of behavior change by the physicians, this is mostly caused by a lack of agreement with CPGs itself (Gravel, Légaré, & Graham, 2006; Members et al., 2017). The lack of agreement can be based on specific factors, for example, a lack of confidence in the author, or it can be based on the lack of agreement in general (Cabana et al., 1999). Other identified reasons for a failing implementation of CPGs can be the wrong distribution of the CPGs (Grol, 2001). Although these are serious concerns for the adoption and utilization of CPGs, two studies show that, in the Netherlands, a high acceptance and feasibility level is achieved for the development and implementation of CPGs (Grol, 2001; Lugtenberg et al., 2009). Although CPGs help stakeholders in the diagnosis and treatment of diseases, another challenge exists. Most CPGs are printed on paper, which limits practical clinical use (Davis & Taylor-Vaisey, 1997). This is one of the reasons that Clinical Decision Support Systems (CDSSs) are developed (Lamy et al., 2010). The combination of the knowledge of clinical experts with patient-related information is filtered and presented by a CDSS when it is required. There are different sorts of CDSS archetypes. According to Power (2008) those are 1) Model-driven, 2) Data-driven, 3) Communication-driven, 4) Document-driven and 5) Knowledge-based CDSSs. 2.2 Clinical Decision Support Systems Knowledge-based systems are used most and proved most efficient in the CDSSs setting (Sanchez et al., 2013). Knowledge-based systems hold knowledge about a (clinical) domain. In the (clinical) domain, this knowledge is the understanding of the problems and skills for solving these problems (Kalogeropoulos, Carson, & Collinson, 2003; Sanchez et al., 2013). Knowledge-based systems mostly use ontologies for structuring the knowledge. In this paper, we use ontologies that refer to an engineering artifact, as formulated by the popular work of (Guarino, 1998): “These are constituted by a specific vocabulary used to describe a certain reality, plus a set of explicit assumptions regarding the intended meaning of the vocabulary words. This set of assumptions has usually the form of a first-order logical theory, where vocabulary words appear as unary of binary predicate names, respectively called concepts and relations.” Some of the benefits that CDSSs provide are: 1) Providing knowledge to medical professionals at appropriate time and manner, 2) Facilitating an efficient and effective decision making, 3) Reducing preventable medical errors, 4) Improving the overall quality of healthcare for patients and 5) Serving as a didactic tool for critical learning for medical students (Chang et al., 2011; Sanchez et al., 2013). Several studies have proven 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 581 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Smit, P. Koornneef, J. Nysingh, M. van Zwienen, M. Berkhout & P. Ravesteyn: Transforming Clinical Practice Guideline Usage Through the Use of a Clinical Decision Support System: An Explorative Study at the University Medical Centre Utrecht that CDSSs improve the clinical practice and practitioner performance by respectively 64% and 68% (Garg et al., 2005; Kawamoto, Houlihan, Balas, & Lobach, 2005). A recent implementation of a web-based CDSS in an intensive care unit in Turkey shows that the CDSS significantly (positively) contributed in the accuracy of the decision-making by the physicians (Ozel et al., 2013). Although the time for making decisions wasn’t reduced, this study did show that user satisfaction and usability were high. In two test scenarios, 150 questions were posed. In the first scenario, the participants needed to answer these questions without the support of a CDSS, in the second scenario, the CDSS supported the decision-making by the participants. Without the support of a CDSS, 24% of the answers were correct, with the support of a CDSS the number of correct answers increased significantly to 83,2%. Finally, the study states that there is a great need for research and development of CDSSs, especially in the Intensive Care Unit (ICU), since the ICU produces large volumes of data (Ozel et al., 2013). Since the clinical environment is always developing and changing, the knowledge in CDSSs requires a high level of modifiability and maintainability. However, when changes are made in CPGs, it is hard to implement these in the CDSS. This is because it requires both the expertise of the clinical domain as well as the informatics domain (Lamy et al., 2010; Minutolo et al., 2012; Ozel et al., 2013). A possible solution for the problem is simplifying the manner in which knowledge can be modified within CDSSs. This particular functionality is referred to as knowledge editing. If this functionality is simplified in a way that requires less expertise in the informatics domain, adoption of the change process by clinical experts increases as it becomes more easy to modify the CDSS knowledge based on changes in CPGs. For example, this can be achieved with the visualization of the knowledge in schematic plans such as an event-based decision tree (Minutolo et al., 2012). Study Design To construct a CDSS and assess the value of the knowledge in the CDSS, a three-phase research design has been implemented. The first phase comprised the analysis of eight anti-clotting CPGs, followed by the construction of the actual knowledge in the CDSS. The second phase consisted of the validation of the content of the knowledge in the CDSS by a group of medical stakeholders at the UMCU. The third phase comprised the refinement based on the feedback that was received from the medical stakeholders, which was followed by another round of validation, but in an individual setting with the additional goal to evaluate the utilization of CPGs through a DSS. An important factor in determining the appropriate research method to validate the CDSS is the maturity of the research field. In literature we identified several developments and trends regarding the use of DSS in a medical context, however, the research field of CPG usage through a DSS in the Dutch context, to the knowledge of the authors, is still nascent. According to Edmondson & Mcmanus (2007), the focus of research in nascent research 582 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Smit, P. Koornneef, J. Nysingh, M. van Zwienen, M. Berkhout & P. Ravesteyn: Transforming Clinical Practice Guideline Usage Through the Use of a Clinical Decision Support System: An Explorative Study at the University Medical Centre Utrecht fields should be on identifying new constructs and establishing relationships between identified constructs. Therefore the construction of the consolidated anti-clotting CPG will be performed using a round of secondary data collection and analysis, consisting of documents regarding the eight anti-clotting CPGs available at the UMCU. As our goal is to validate the CDSS and to explore the challenges related to the adoption of a CDSS at the UMCU, a wide range of possible ideas or solutions should be explored from different stakeholders. An adequate research method needs to be used to explore a broad range of possible ideas and/or solutions from a complex issue and combine them into one view when a lack of empirical evidence exists. In this light group-based research techniques are adequate (Delbecq & Van de Ven, 1971; Okoli & Pawlowski, 2004; Ono & Wedemeyer, 1994). Examples of group based techniques are Focus Groups, Delphi Studies, Brainstorming and the Nominal Group Technique. The main characteristic that differentiates these types of group-based research techniques from each other is the use of face-to-face versus non-face-to-face approaches. Both approaches have advantages and disadvantages, for example, in face-to-face meetings, provision of immediate feedback is possible. However, face-to-face meetings have restrictions with regard to the number of participants and the possible existence of group or peer pressure. To ground our research results and to eliminate the disadvantages, we combined the face-to-face and non-face- to-face technique by means of applying a focus group as well as individual semi- structured interviews. Data Collection & Analysis Data for this study is collected over a period of two months, between November 2016 and December 2016, through 1) secondary data analysis, 2) one round of validation utilizing a focus group session, and 3) one round of validation utilizing individual semi-structured interviews, see also Figure 1. All three methods of data collection and analysis are further discussed in the remainder of this section. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 583 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Smit, P. Koornneef, J. Nysingh, M. van Zwienen, M. Berkhout & P. Ravesteyn: Transforming Clinical Practice Guideline Usage Through the Use of a Clinical Decision Support System: An Explorative Study at the University Medical Centre Utrecht Figure 1: Development process overview 4.1 Modeling of UMCU CPGs In the first phase, the eight CPGs of UMCU had to be collected and transformed into ontologies to understand the process of a medical examination and to be able to model them in the CDSS pilot at the UMCU. One challenge was that the team of researchers, consisting out of three researchers with experience in knowledge modeling and three researchers with experience in the field of CDSSs, quickly came to the conclusion that the CPGs are predominantly textual documents that rarely visualize the process. The CPGs included in this study were: 1) Bridging Vitamin K Antagonists, 2) Direct Oral Anticoagulants, 3) Heparin-Induced Thrombocytopenia, 4) Unfractionated Herapine Use, 5) start Vitamine K Antagonists, 6) Profylaxe Venous Thromboembolism, 7) Venous Thromboembolism, and 8) Nerve and Neuraxial Blockade with Anticoagulant. The process of transformation of the CPGs into ontologies was conducted as a cyclic approach. First, the researchers with experience in knowledge modeling analyzed the secondary data and modeled the ontologies to be implemented. These ontologies were then submitted for review by the CDSS researchers. This process was repeated five times before the final CDSS pilot for validation in the focus group was established. In order create the CDSS, eight CPGs were developed into a model. This model links ontologies collected from the CPGs in the pilot of the CDSS. To make sure that the modeling of the CPGs was performed adequately, the researchers started with the analysis and modeling of only one ontology, which was then validated by the CDSS researchers. When the first CPG was modeled and found valid, the knowledge modeling researchers started with the development of all CPGs involved and repeated the internal validation 584 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Smit, P. Koornneef, J. Nysingh, M. van Zwienen, M. Berkhout & P. Ravesteyn: Transforming Clinical Practice Guideline Usage Through the Use of a Clinical Decision Support System: An Explorative Study at the University Medical Centre Utrecht process with the CDSS researchers. Based on the developed ontologies, the researchers had to analyze which of the ontologies was characterized by the highest uniqueness as the analysis resulted in overlapping rules and content in the included CPGs. Based on the analysis of the created ontologies, the hemorrhage risk ontology was found most unique and therefore the largest contributor to the determination of anti-clotting medicine and treatment. For this reason, we selected the hemorrhage risk ontology to serve as a basis for the creation of the ‘bridging’ ontology, which contained all decision knowledge from all ontologies to determine anti-clotting medicine and treatment at the UMCU. The ontologies were built using the Decision Support System of BeInformed, a supplier of (C)DSS. The output of the modeling phase was used to prepare and structure the validation of the ontology by means of the focus group session. 4.2 Focus Group Validation Subsequently, to the modeling of the knowledge into the CDSS, the focus group session was prepared and conducted in December 2016; the session had a duration of one and a half hour in total. Before a focus group is conducted, first, a number of key design concepts need to be considered (Morgan, 1996): 1) the goal of the focus group, 2) the selection of participants, 3) the number of participants, 4) the selection of the facilitator, 5) the information recording facilities and 6) the protocol of the focus group. The goal of the focus group was to validate the anti-clotting CDSS. Based on this, we selected eight participants. The selection was done in collaboration with the UMCU. The selection consisted of five specialized physicians, from which each one was responsible for one or more of the CPGs included. Furthermore, two pharmacists and one laboratory expert were involved. The focus group was chaired by an experienced facilitator, one of the CDSS research team members. Additionally, one knowledge modeling research member was present to take notes. As the contents of the ‘bridging’ ontology are confidential, the focus group meeting could not be captured via audio or video. Lastly, the protocol of the focus group was based on the CPGs modeled, which were presented one-by-one during the focus group session. This protocol provided each participant the opportunity to provide feedback per CPG. The results from the focus groups were also utilized to get an impression of the attitude of stakeholders and challenges for stakeholders with regards to the use of a CDSS and develop a list of topics to address in the individual interviews. These particular questions were not posed during the focus group as it would allow for peer pressure amongst the participants, thus would be more appropriate during the semi-structured validation interviews. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 585 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Smit, P. Koornneef, J. Nysingh, M. van Zwienen, M. Berkhout & P. Ravesteyn: Transforming Clinical Practice Guideline Usage Through the Use of a Clinical Decision Support System: An Explorative Study at the University Medical Centre Utrecht 4.3 Semi-Structured Interview Validation After the focus group session was finished the researchers continued to refine the CDSS, for example, by changing the sequence of questions posed by the CDSS and the formulation of the questions. After this, the third phase of this study was conducted, comprising the semi-structured interviews with the same five physicians that participated in the focus group session in phase two. The main goal of the interviews was to validate the refined CDSS based on the feedback provided in the focus group validation session. Furthermore, based on the input of the participants in the focus group session, we managed to develop the following set of four topics that were discussed with each interviewee:  Experiences with regards to the (personal) current use of CPGs  Improvements with regards to the (personal) current use of CPGs  Problems that are anticipated with regards to the use of a CDSS  Significant features that should be included into the CDSS to promote adoption As stated in subsection 4.2, each of the interviewed physicians was responsible for one or multiple CPGs. Furthermore, none of the participants had knowledge on what their co- workers had answered. The individual interviews were audiotaped and transcribed within 48 hours. The interview data was analyzed by linking and categorizing answers from the physicians. If several responses matched they were labeled by the researcher on perceived advantages and disadvantages with regards to working with a CDSS. This was then cross- checked by other researchers from the research team to ensure coding accuracy. This approach resulted in patterns with regards to the four topics that were addressed in the interviews. Results In this section, the results of the three phases executed in this study are reported. First, we present the results of the modeling phase, where we collected, analyzed and transformed the CPGs into ontologies to be implemented into the CDSS. This is followed by the results of the validation focus group session in which we validated the first version of the CDSS and used to prepare the semi-structured interviews. Lastly, the results of the interviews are presented that comprise the validation of the refined CDSS as well as an exploration of the experiences, problems, improvements and significant functionalities with regards to CPGs and CDSSs. 5.1 Modeling phase The first and most complex CPG was transformed in an understandable way to model in the CDSS. The first step was to extract different ontologies from the CPG. Building rules 586 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Smit, P. Koornneef, J. Nysingh, M. van Zwienen, M. Berkhout & P. Ravesteyn: Transforming Clinical Practice Guideline Usage Through the Use of a Clinical Decision Support System: An Explorative Study at the University Medical Centre Utrecht on top of those ontologies is a proven method to model medical knowledge (Minutolo et al., 2012). The hemorrhage risk showed to be the most important factor in determining which treatment should be started and therefore, the first ontology the research team started with. When the hemorrhage risk is known, a treatment could be prescribed. The ontologies modeled that comprised the vitamin K antagonist bridging CPG were as follows: 1) Specialism type, 2) Treatment type, 3) Action at anti-clotting treatment, 4) Indications, 5) Anti-clotting treatment Periopera, 6) Thromboembolic complication risk factor, 7) Hemorrhage risk and 8) CHA2DS2-VASc risk factor, see for an example Figure 2. As stated above, the determination is mostly depended on the level of hemorrhage risk, i.e. whenever a type of surgical intervention depicts a certain risk level, which triggers a certain treatment, none of the other questions about other indications are posed. In the final model, the surgical interventions were categorized in the different kinds of medical specialism. This resulted in a better overview in the first version of the CDSS. First, the medical specialism was posed, before showing the surgical interventions. As soon as the model behind the first version could make a decision based on the different ontologies included, the CDSS would stop posing questions with regards to possible indications and provides a treatment as a suggestion. Figure 2: Example high-level excerpt from the vitamin K antagonist bridging CPG 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 587 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Smit, P. Koornneef, J. Nysingh, M. van Zwienen, M. Berkhout & P. Ravesteyn: Transforming Clinical Practice Guideline Usage Through the Use of a Clinical Decision Support System: An Explorative Study at the University Medical Centre Utrecht 5.2 Focus Group The first version of the CDSS was presented to the hemorrhage risk commission, consisting of the hemorrhage-related CPG owners, of the UMCU. At this presentation, the bridging CPG was shown in the CDSS. The participants expressed mixed feelings about the first version, although it was predominantly positive feedback. Most of the positive feedback concerned the model-driven method of the CDSS. The participants acknowledged that this was a “powerful” method to overcome the complexity of the CPG. A large amount of feedback with regards to the CDSS was provided by the participants and noted by one of the researchers. This feedback comprised errors in the contents of the model. The feedback was used to refine the CDSS after the focus group session. Another topic that was addressed during the focus group meeting was the possibility to store decisions made by physicians. It became clear that the focus group saw this as an opportunity to improve the CPGs. Whenever a physician would execute the CDSS and document his or her decision, statistics could provide or suggest which CPG needs alternation. After the presentation of the first version of the ‘bridging’ CPG, the focus group had some input for the actual functionality of the CDSS. A clear majority of the focus group participants (five or more) addressed the need for an integration with the Personal Health Records (EPD) or at least an import of patient data from EPD, which also should eliminate the overlap between different CPGs. One participant proclaimed that the CDSS would result in ‘cookbook’ medical care. This argument is in conformance with the results of a study about physicians barriers for utilizing CPGs. Cookbook medical care was labeled as a bad attitude against the CPG, showing a lack of agreement with guidelines in general (Cabana et al., 1999). 5.3 Semi-Structured Interviews After the CDSS was refined by the research team based on the feedback acquired in the focus group session in phase two, the semi-structured interviews were conducted. With regards to the first goal, the final design of the CDSS was presented per interviewee. All interviewees provided feedback as part of the validation of the CDSS, which was processed after the third phase of data collection and analysis. The average duration of the interviews was one hour, consisting of 40 minutes for the second round of validation of the CDSS and 20 minutes for the additional topics on experiences, problems, improvements and essential functionality of the CDSS. With regards to the second goal, four topics provided insights into the experiences and preferences of the physicians in using CPGs in a CDSS. In this subsection, we report on 588 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Smit, P. Koornneef, J. Nysingh, M. van Zwienen, M. Berkhout & P. Ravesteyn: Transforming Clinical Practice Guideline Usage Through the Use of a Clinical Decision Support System: An Explorative Study at the University Medical Centre Utrecht our finding that was brought up or confirmed by the majority (three out of five) of the interviewees. With regards to the first topic, the attitude of the current use of the CPGs, the majority claimed that the use of CPGs in the daily practice is an improvement of medical care. This amplifies the conclusion that CPGs are found to be successful in the Dutch clinical setting (Lugtenberg et al., 2009). The majority thought the CPGs, although improving medical care, are indistinct. They claimed this is a consequence of CPGs with a large amount of text. Also, the majority confirmed that the current CPGs are not always state- of-the-art when applied in practice. Some improvements the participants addressed in using CPGs are discoverability, the amount of text and coverage. The majority would like to see that the discoverability of the CPGs is improved. The CPGs should be listed on the intranet, but should also be state- of-the-art when listed. Furthermore, the majority stated that large amounts of text should be prevented in CPGs, which aligns with the attitude of the use of CPGs. The majority also mentioned the need for improvement with regards to the existing amount of overlap between CPGs. Overlap in CPGs is a factor that increases the difficulty in maintaining the CPGs, because if one CPG changes, other CPGs get outdated instantly. Next, we asked what challenges the participants would find in using a CDSS. The majority fear that the implementation of a CDSS will create a large dependency on IT. The interviewees stated that physicians do not want to be dependent on IT too much. Whether this is because of earlier failures of DSS or other IT-related influences remains unknown. Furthermore, the majority doubt the CDSS will be a user-friendly system. Lastly, one particular property of a CDSS was deemed indispensable by the majority of the interviewees; linking to the CPGs that are available on the intranet. Such a construction will not replace how the CPG is used but merely simplify its use. We believe that this preference is caused by the low amount of trust that the interviewees have in a CDSS, specifically with regards to their requirement of state-of-the-art CPGs in the CDSS, which is not always safeguarded, even in the current paper practices at the UMCU. Discussion & Conclusion In this paper, we aimed to find an answer to the following question: “How can the available anti-clotting CPGs of the UMCU be combined into a CDSS with the aim to support decision making and increase adoption of the CDSS?” In this question, two subjects are of relevance; 1) How to combine different anti-clotting CPGs in a CDSS and 2) What do the physicians need to increase the likelihood that they will adopt the CDSS. The data shown in section five shows that a majority of the physicians have uncertainties in the overlap of the various CPGs and the correctness when modifying versions. More 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 589 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Smit, P. Koornneef, J. Nysingh, M. van Zwienen, M. Berkhout & P. Ravesteyn: Transforming Clinical Practice Guideline Usage Through the Use of a Clinical Decision Support System: An Explorative Study at the University Medical Centre Utrecht than half of the physicians indicated that large amounts of text should be avoided in CPGs. In addition, most of the physicians indicated the need for the CPGs to be available on the intranet, next to the CDSS. To merge the different anti-clotting CPGs in a CDSS, the current overlap must be eliminated and the physicians need a guarantee that the state-of- the-art versions will always be applied in the CDSS. Besides this, the CDSS needs to be available in the alignment of the current CPGs. This way, the CDSS will simplify the use of the CPGs but not replace them. From the collected and analyzed data gathered from the various CPG owners, we can conclude that the reactions towards the use of a CDSS are mostly positive. This enthusiasm shows that, despite the physician's doubts with regards to ease of use, they are open for the use of a CDSS and will be likely to adopt it, given the fact that most if not all challenges identified are overcome. Taking a look at our study, several limitations could be identified. One limitation is the available time that was planned for the focus group and the individual interviews. With more time we probably could have delved deeper into the experiences, problems, improvements and essential functionality of a CDSS as perceived by our interviewees in more focus groups. However, this was hard to negate as the physicians stated to have meager time to participate in this kind of research projects and are needed in the UMCU most of their time. We aimed to negate this partly by interviewing the individual participants as this allowed for further data collection and validation without utilizing focus groups which allow multiple stakeholders to be available on the same time and place. Furthermore, our sample composition and sample size are limited to eight stakeholders. While we believe this is appropriate at this stage of design of a CDSS in the context of the UMCU, future research should focus on the utilization of more quantitative research methods such as surveys, using larger sample sizes to increase the generalizability of the results. Also, future stages of development should medical informatics specialists, which excel in extensive testing on the subject-matter as well as the decision making process by a CDSS. In this study, we included a sample of eight stakeholders, which is, according to the guidelines of Dworkin (2012), a valid amount of participants for a qualitative study. Therefore, an important note with regards to future research is that quantitative research methods are dependent on the actual implementation and (partly) adoption of the CDSS in practice. Hence, we encourage the UMCU to invest in further research projects to establish whether a CDSS contributes to the quality (in terms of efficiency and effectiveness) of healthcare. Acknowledgement We would like to acknowledge BeInformed, especially Petri-van de Weerd, B., Rooijen, R. and Dicou, W. for the insightful collaboration during this research project. Also, we would like to thank Driessen, H. J. from UMC eXpert. Furthermore, we would also like to thank the UMCU and stakeholders involved for their cooperation. 590 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Smit, P. Koornneef, J. Nysingh, M. van Zwienen, M. Berkhout & P. Ravesteyn: Transforming Clinical Practice Guideline Usage Through the Use of a Clinical Decision Support System: An Explorative Study at the University Medical Centre Utrecht References Alonso-Coello, P., Ifran, A., Sola, I., Gich, I., Delgado-Noguera, M., Rigau, D., … Schunemann, H. (2010). The quality of clinical practice guidelines over the last two decades: a systematic review of guideline appraisal studies. Quality and Safety in Health Care, 19(6), 1–7. http://doi.org/10.1136/qshc.2010.042077 Browman, G. P. (2000). Improving clinical practice guidelines for the 21st century: Attitudinal barriers and not technology are the main challenges. International Journal of Technology Assessment in Health Care, 16(4), 959–968. Cabana, M. D., Rand, C. S., Powe, N. R., Wu, A. W., Wilson, M. H., Abboud, P.-A. C., & Rubin, H. R. (1999). Why don’t physicians follow clinical practice guidelines? JAMA: The Journal of the American Medical Association, 282(15), 1458–1465. http://doi.org/10.1001/jama.282.15.1458 Chang, Y. J., Yeh, M. L., Lee, C. S., Hsu, C. Y., Li, Y. C. J., & Chiu, W. T. (2011). Cross-domain probabilistic inference in a clinical decision support system: Examples for dermatology and rheumatology. Computer Methods and Programs in Biomedicine, 104(2), 286–291. http://doi.org/10.1016/j.cmpb.2011.07.008 Davis, D. A., & Taylor-Vaisey, A. (1997). Translating guidelines into practice: a systematic review of theoretic concepts, practical experience and research evidence in the adoption of clinical practice guidelines. Canadian Medical Association Journal, 157(4), 408–416. Delbecq, A. L., & Van de Ven, A. H. (1971). A group process model for problem identification and program planning. The Journal of Applied Behavioral Science, 7(4), 466–492. Dworkin, S. L. (2012). Sample size policy for qualitative studies using in-depth interviews. Archives of Sexual Behavior, 41(6), 1319–1320. http://doi.org/10.1007/s10508-012-0016-6 Edmondson, A. C., & Mcmanus, S. E. (2007). Methodological Fit in Management Field Research. Proceedings of the Academy of Management, 32(4), 1155–1179. Garg, A. X., Adhikari, N. K. J., McDonald, H., Rosas-Arellano, M. P., Devereaux, P. J., Beyene, J., … Haynes, R. B. (2005). Effects of computerized clinical decision support systems on practitioner performance and patient outcomes: A systematic review. The Journal of the American Medical Association, 293(10), 1223–38. http://doi.org/10.1001/jama.293.10.1223 Gravel, K., Légaré, F., & Graham, I. D. (2006). Barriers and facilitators to implementing shared decision-making in clinical practice: a systematic review of health professionals’ perceptions. Implementation Science, 1(1), paper 16. Grol, R. (2001). Successes and failures in the implementation of evidence-based guidelines for clinical practice. Med Care, 39(8 Suppl 2), II46-54. http://doi.org/10.1097/00005650- 200108002-00003 Guarino, N. (1998). Formal Ontology and Information Systems. Proceedings of the First International Conference, 46(June), 3–15. http://doi.org/10.1.1.29.1776 Jiménez-Serrano, S., Tortajada, S., & García-Gómez, J. M. (2015). A mobile health application to predict postpartum depression based on machine learning. Telemedicine and E-Health, 21(7), 567–574. Kalogeropoulos, D. A. ., Carson, E. R. ., & Collinson, P. O. . b. (2003). Towards knowledge-based systems in clinical practice: Development of an integrated clinical information and knowledge management support system. Computer Methods and Programs in Biomedicine, 72(1), 65–80. http://doi.org/10.1016/S0169-2607(02)00118-9 Kawamoto, K., Houlihan, C., Balas, E., & Lobach, D. (2005). Improving clinical practice using clinical decision support systems: A systematic review of trials to identify features critical to 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 591 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) K. Smit, P. Koornneef, J. Nysingh, M. van Zwienen, M. Berkhout & P. Ravesteyn: Transforming Clinical Practice Guideline Usage Through the Use of a Clinical Decision Support System: An Explorative Study at the University Medical Centre Utrecht success. BMJ (Clinical Research Editorials), 330(7494), 765–70. http://doi.org/. doi:10.1136/bmj. 38398.500764.8f Lamy, J.-B., Ebrahiminia, V., Riou, C., Seroussi, B., Bouaud, J., Simon, C., … Venot, A. (2010). How to translate therapeutic recommendations in clinical practice guidelines into rules for critiquing physician prescriptions? Methods and application to five guidelines. BMC Medical Informatics and Decision Making, 10, 31. http://doi.org/10.1186/1472-6947-10-31 Lugtenberg, M., Burgers, J. S., & Westert, G. P. (2009). Effects of evidence-based clinical practice guidelines on quality of care: a systematic review. Quality & Safety in Health Care, 18(5), 385– 392. http://doi.org/10.1136/qshc.2008.028043 Members, E. P., Chan, W. V., Pearson, T. A., Bennett, G. C., Cushman, W. C., Gaziano, T. A., & MacKenzie, T. D. (2017). Clinical Practice Guideline Implementation Strategies: A Summary of Systematic Reviews by the NHLBI Implementation Science Work Group: A Report of the American College of Cardiology/American Heart Association Task Force on Clinical Practice Guidelines. Journal of the American College of Cardiology. Minutolo, A., Esposito, M., & De Pietro, G. (2012). A pattern-based knowledge editing system for building clinical Decision Support Systems. Knowledge-Based Systems, 35, 120–131. http://doi.org/10.1016/j.knosys.2012.04.024 Morgan, D. L. (1996). Focus groups as qualitative research (16th ed.). Sage publications. Okoli, C., & Pawlowski, S. D. (2004). The Delphi method as a research tool: an example, design considerations and applications. Information & Management, 42(1), 15–29. Ono, R., & Wedemeyer, D. J. (1994). Assessing the validity of the Delphi technique. Futures, 26(3), 289–304. Ozel, D., Bilge, U., Zayim, N., & Cengiz, M. (2013). A web-based intensive care clinical decision support system: from design to evaluation. Informatics for Health & Social Care, 38(2), 79–92. http://doi.org/10.3109/17538157.2012.710687 Power, D. J. (2008). Decision Support Systems : A Historical Overview. Handbook on Decision support Systems. http://doi.org/10.1007/978-3-540-48713-5_7 Sanchez, E., Toro, C., Artetxe, A., Graña, M., Sanin, C., Szczerbicki, E., … Guijarro, F. (2013). Bridging challenges of clinical decision support systems with a semantic approach. A case study on breast cancer. Pattern Recognition Letters, 34(14), 1758–1768. http://doi.org/10.1016/j.patrec.2013.04.003 Shekelle, P. G., Ortiz, E., Rhodes, S., Morton, S. C., Eccles, M. P., Grimshaw, J. M., & Woolf, S. H. (2001). Validity of the Agency for Healthcare Research and Quality clinical practice guidelines: how quickly do guidelines become outdated? Jama, 286(12), 1461–1467. Woolf SH, Grol R, Hutchinson A, Eccles M, G. J. (1999). Potential benefits, limitations, and harms of clinical guidelines. Bmj, 318(7182), 527–30. 592 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Propensity to Click on Suspicious Links: Impact of Gender, of Age, and of Personality Traits 41 FRANTISEK SUDZINA & ANTONIN PAVLICEK Abstract There already exists a certain, not huge, body of knowledge about impact of personality traits on susceptibility to phishing. But there is a gap when it comes specifically to phishing with links pretending to lead to deal sites. The paper analyzes if gender, age and personality traits influence such behavior. Big Five Inventory traits (extraversion, agreeableness, conscientiousness, neuroticism, openness to experience) and narcissism were used. Impact of openness to experience was significant at 0.05 level, and of narcissism 0.1 level. Significance of remaining independent variables was above 0.1. Openness to experience was linked positively linked to responsible behavior, narcissism was negatively linked. Keywords: • Suspicious Links • Phishing • Deal Sites • Personality Traits • Empirical Research • CORRESPONDENCE ADDRESS: Frantisek Sudzina, Aalborg University, Faculty of Social Sciences, Department of Business and Management, Fibigerstræde 2, 9220 Aalborg, Denmark, e-mail: sudzina@business.aau.dk. Antonin Pavlicek, University of Economics, Faculty of Informatics and Statistics, Department of System Analysis, Winstona Churchilla 1938/4, 130 67 Praha 3, Czech Republic, e-mail: antonin.pavlicek@vse.cz. https://doi.org/10.18690/978-961-286-043-1.41 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 594 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) F. Sudzina & A. Pavlicek: Propensity to Click on Suspicious Links: Impact of Gender, of Age, and of Personality Traits Introduction Deal sites, in one form or another, exist for over two decades. They received a lot of publicity before Groupon's initial public offering. According to a recent study cited by Kotler et al. (2017), "digital coupons now outpace printed newspaper coupons 10 to 1". In other words, use of deal sites is reasonably wide-spread for hackers to also link presumably leading to deal sites for infiltration. To the best of authors' knowledge, nobody investigated impact of personality traits on phishing that is specifically linked to deal sites. (To be more specific, Google Scholar search for the query phishing personality traits deal-sites yielded 5 results, of which none were relevant.) Google Scholar search for phishing personality traits (i.e. without the term deal sites) yielded more than 2000 results, of which (due to quickly decreasing relevance) the first 100 were checked. There were two journal articles and a few conference papers investigating impact of personality traits on phishing in general. Pattinson et al. (2012) discovered that from Big Five Inventory personality traits, higher extraversion and higher openness to experience led to better dealing with phishing e- mails. They state that the findings are interesting because they appear to be counter- intuitive since both of these personality traits should lead people to be more trusting of others which would mean treating some phishing e-mails as genuine. But they do not cite any source that would support the link between any of the two personality traits and trust. On the contrary, our results (Sudzina, 2016a; Sudzina, 2016b) indicate a link between some of the three remaining personality traits and trust or mistrust; but extraversion and openness to experience were not linked to trust nor to mistrust (this holds not only for Big Five Inventory-10 used in the two papers but also for Big Five Inventory-44 (the instrument used by Pattinson et al. (2012)) - though the findings were not published yet). A more comprehensive study, in a sense of using more variables than only personality traits, was conducted by Welk et al. (2015). The impact of extraversion was significant but the sign was negative when only five personality traits were included in the model, the sign was positive in the full model, and the extraversion was not significant when only five personality traits and three trust/distrust variables were included. The remaining results are unclear as the terms used to describe personality traits were anxiety, reservation, calmness, and ability to keep emotions under control. The two items measuring neuroticism are "anxious, easily upset" and "calm, emotionally stable"; they seem to cover 3 of 4 remaining personality traits mentioned by Welk et al. (2015). The remaining term - reservation - looks like the second item to measure extraversion - "reserved, quiet" (reversed scale), so even the findings for extraversion mentioned at the beginning of the paragraph possibly do not hold. There were published a few conference papers on the topic. The most relevant - considering the research design and quality of description of source data, including data collection - is (Alseadoon, I. et al., 2012). They tested impact of Big Five Inventory 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 595 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) F. Sudzina & A. Pavlicek: Propensity to Click on Suspicious Links: Impact of Gender, of Age, and of Personality Traits personality traits on susceptibility to phishing e-mails in two phases. In the first phase, none of the personality traits was significant. In the second phase, openness to experience was significant and extraversion was borderline significant. But the direction of the impact is not clear from the published figures; they provide S.E. in the Table 2 for these two personality traits, not parameter estimates. Alseadoon, I. et al. (2012) provide this argumentation but they do not refer to test results (parameter estimates) at all: Openness users are those who are open to new ideas and experience. E-commerce in Saudi Arabia is just developing, which explains why these users become victims. It can be said that these openness users are enthusiastic to try and test new experiences provided on the Internet (risk takers). Extraverted users become victims because they may judge phishing emails based on their positive emotions. According to Forgas et al. (2008) users’ emotions impact their ability to detect deception. The second most relevant conference paper is (Cho, Cam & Oltramari, 2016). Although they do not describe respondents, nor what instrument was used to measure Big Five Inventory personality traits, they state that (according to their Stochastic Petri Nets model) agreeableness and neuroticism influence whether a given information is received as either trusted or distrusted. Moreover, they state that high neuroticism deteriorates decision performance under low openness and conscientiousness. Other conference papers were theoretical and some of them proposed also a model but they did not collect data nor tested the model. The research question is whether gender, age, extraversion, agreeableness, conscientiousness, neuroticism, openness to experience, and narcissism influence propensity to what a person would click on suspiciously advantageous offer if it led to a deal site. Big Five Inventory framework is used because it is a prevalent framework for personality traits in information systems literature (and it was the only framework used by the reviewed papers on phishing and personality traits). Adding narcissism to Big Five Inventory personality traits follows the trend in information systems literature where narcissism often proves to significantly influence dependent variables. Gender is considered because in many technology studies, men are higher and/or faster in adopting technology. This could possibly lead better understanding of technology, and possibly also to more responsible use of technology. Age is considered because respondents are university students and there could possibly be a measurable change in responsibility between 19 year old students who just started to study and older students. The data come from the Czech Republic. Some reputable deal sites in the Czech Republic accidentally sold coupons for non-existing services. Stories about such experiences were published in Czech newspapers. So, results of the analysis could be influenced by the fact that respondents may have heard about such problems and may be more careful because 596 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) F. Sudzina & A. Pavlicek: Propensity to Click on Suspicious Links: Impact of Gender, of Age, and of Personality Traits of it. Therefore, results may not apply to countries without such negatives stories, e.g. Denmark. The rest of the paper is organized in the following way: In the next section, there is a description of data collection, and how they were analyzed. In the following section, results of the analysis are presented. The last section offers conclusions. Data and Methodology Data were collected between December 2016 and January 2017 using an on-line questionnaire. Respondents were 264 university students from the Czech Republic, of which 140 respondents indicated that they use deal sites, and 124 do not. (The analysis of use versus non-use of deal sites from this data set was published in (Sudzina & Pavlíček, 2017).) SurveyXact was used for the questionnaire. Unlike Qualtrics, it does not allow to show/hide questions based on previous answers on the same page. Therefore, the questionnaire was split into two pages and questions for deal sites users appeared on the second page. Seven respondents stopped after the first page. So, the effective sample size is 133 (43 men, 90 women; on average 20 years old). On the second page of the on-line questionnaire, there was a question "Would you click on suspiciously advantageous offer if it led to a deal site?" and respondents were supposed to answer on a 1-5 Likert scale where 1 meant certainly yes and 5 stood certainly not. In other words, a high number corresponds to positive/responsible behavior. (Even though it is clear what behavior (which end of the scale) is more responsible, three of 133 respondents still stated that they would certainly click on the link, while 20 stated that they certainly would not.) This is the dependent variable for the model presented later in the paper. A generalized linear model (GLM) was used. SPSS software was used for the analysis. A multivariate approach to testing was used. Parameter estimates tables from GLM were provided (instead of ANOVA-style tables) in order to be able to see signs of parameter estimates (not only p-values). The results should be equivalent to a multiple linear regression model estimates in case the dummy variable is set to 1 for male and to 0 for female. R2 and R2adj are provided in order to be transparent about how much a model explains though it may be significant. Personality traits were measured using Rammstedt & John's (2007) Big Five Inventory- 10, i.e. a 10-item version of the Big Five Inventory questionnaire developed by John & Srivastava (1999), and translated to Czech by Hřebíčková et al. (2016). The study by (Pattinson et al., 2012) used Big Five Inventory-44 (John & Srivastava, 1999). Alseadoon, I. et al. (2012) and Welk et al. (2015) used a 10-item Big Five Inventory instrument developed by Gosling, Rentfrow & Swann Jr. (2003) which relies more on 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 597 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) F. Sudzina & A. Pavlicek: Propensity to Click on Suspicious Links: Impact of Gender, of Age, and of Personality Traits adjectives than Big Five Inventory-10 (Rammstedt & John, 2007). The instruction in the questionnaire was to rate "How well do the following statements describe your personality" with statements "I see myself as someone who..."  ... is reserved,  ... is generally trusting,  ... tends to be lazy,  ... is relaxed, handles stress well,  ... has few artistic interests,  ... is outgoing, sociable,  ... tends to find fault with others,  ... does a thorough job,  ... gets nervous easily,  ... has an active imagination on a 1-5 Likert scale where 1 meant strongly disagree and 5 stood for strongly agree. Extraversion was calculated as an average of the 1st (reversed-scored) and the 6th answer, agreeableness as an average of the 2nd and the 7th (reversed-scored) answer, conscientiousness as an average of the 3rd (reversed-scored) and the 8th answer, neuroticism as an average of the 4th (reversed-scored) and the 9th answer, and openness to experience as an average of the 5th (reversed-scored) and the 10th answer. Authors are aware of the new version of Big Five Inventory - Big Five Inventory-2 with 60 items (Soto & John, in press a), and of 30-item short and 15-item extra short versions (Soto & John, in press b) but there is no validated translation available yet. Narcissism was measured right after Big Five Inventory-10 using the same instruction, with the statement  ... is of narcissistic nature (note: narcissistic means egotistical, self-focused, vain) The statement was adapted from The Single Item Narcissism Scale (SINS) developed and validated by Konrath, Meier & Bushman (2014). They recommend SINS for online studies. The questionnaire contained additional questions which were not used in the analysis presented in this paper. Results The research question is if gender, age, extraversion, agreeableness, conscientiousness, neuroticism, openness to experience, and narcissism influence propensity to what a person would click on suspiciously advantageous offer if it led to a deal site. Parameter 598 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) F. Sudzina & A. Pavlicek: Propensity to Click on Suspicious Links: Impact of Gender, of Age, and of Personality Traits estimates for the full model are provided in Table 1. R2 is 0.089, R2adj is 0.030 and p- value is 0.160. Table 1: Parameter estimates for the full model 95% Confidence Interval Std. Lower Upper Parameter B Error t Sig. Bound Bound Intercept 4.836 1.008 4.797 .000 2.841 6.831 Age - -.060 .055 .273 -.168 .048 1.101 Extraversion - -.117 .106 .272 -.328 .093 1.104 Agreeableness - -.178 .130 .172 -.435 .078 1.375 Conscientiousness -.039 .114 -.338 .736 -.265 .188 Neuroticism - -.105 .094 .266 -.292 .081 1.118 Openness to .219 .106 2.064 .041 .009 .430 experience Narcissism - -.181 .096 .062 -.372 .010 1.880 [Gender=male] -.165 .220 -.750 .455 -.600 .270 The impact of openness to experience was significant and impact of narcissism was borderline significant. The former had positive effect, the latter negative. But the model as a whole is not significant. Carlson and Wu (2012) suggest to exclude independent variables that are not significant. Parameter estimates for the reduced model are provided in Table 2. R2 is 0.051, R2adj is 0.036 and p-value is 0.034. Keeping only openness to experience in the model would worsen p-value to 0.085. A model with narcissism only would have a p-value of 0.093. Table 2: Parameter estimates for the streamlined model 95% Confidence Interval Std. Lower Upper Parameter B Error t Sig. Bound Bound Intercept 3.002 .399 7.524 .000 2.212 3.791 Openness to .201 .100 2.000 .048 .002 .400 experience Narcissism - -.167 .085 .052 -.336 .001 1.962 Signs of significant estimates stayed the same when insignificant independent variables were removed. This means that people open to experience are more likely to avoid clicking on suspiciously advantageous offers leading the deal sites, while more narcissistic people are more likely to click on suspiciously advantageous offers. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 599 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) F. Sudzina & A. Pavlicek: Propensity to Click on Suspicious Links: Impact of Gender, of Age, and of Personality Traits Openness to experience had also a significant and positive impact in (Pattinson et al., 2012); moreover, the same impact had also extraversion in their study. Higgins et al. (2007) linked openness to experience to IQ in students. This could possibly explain why they are less likely to click on suspiciously advantageous offers. Conclusion The aim of the research was to investigate if gender, age, extraversion, agreeableness, conscientiousness, neuroticism, openness to experience, and narcissism influence propensity to what a person would click on suspiciously advantageous offer if it led to a deal site. The findings are that people open to experience are more likely to avoid clicking on suspiciously advantageous offers leading the deal sites, while more narcissistic people are more likely to click on suspiciously advantageous offers. Impact of the remaining personality traits, gender, and age was not found to be significant. Openness to experience was found to be linked to IQ in students (Higgins et al., 2007). This could explain more responsible behavior. In addition to that, it may be relevant to consider the extent of use deal sites. It may be possible that people open to experience visit them more or purchase from them more, i.e. they get involved with them more; therefore, they have a better understanding of them, i.e. they are more ("street"-)smart, and this could explain more responsible behavior. Now that there is an indication of impact of narcissism on purchasing coupons as gifts, it is justifiable in future research to use more items to measure narcissism, such as Narcissistic Personality Inventory (Raskin & Terry, 1988) which is probably the most widely used measure of the narcissism and contains 40 forced-choice items, Hypersensitive Narcissism Scale (Hendin & Cheek, 1997) with 10 items or Pathological Narcissism Inventory (Pincus et al., 2009) with has 52 items. If a longer instrument is to be chosen, such as Five-Factor Narcissism Inventory (Glover et al., 2012), which contains 148 items, it may be advisable to select only certain factors. The study was conducted in the Czech Republic where there were fraud cases - coupons for services of non-existent companies were sold on regular deal sites. So, findings are generalizable possibly only for markets with similar negative experience. Further research should establish whether the same findings hold also on markets with no reported fraud cases. Moreover, university students as respondents are possibly more IT literate and tech savvy than the general population. Therefore, it is possible that they are more responsible when it comes to on-line behavior. It is not clear whether it brings any limitation the findings presented or not - if the current signal-to-noise ratio uncovers relationships hard to spot in the whole population (i.e. p-values are lower than they would be in a probabilistic sample), or if having more irresponsible respondents would lead to lower p-values, 600 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) F. Sudzina & A. Pavlicek: Propensity to Click on Suspicious Links: Impact of Gender, of Age, and of Personality Traits possibly identifying relationships not found in the research, or if the findings would be the same. References Alseadoon, I., Chan, T., Foo, E. & Gonzales Nieto, J. (2012). Who is more susceptible to phishing emails? A Saudi Arabian study. In ACIS 2012: Location, location, location: Proceedings of the 23rd Australasian Conference on Information Systems 2012. ACIS, pp. 1-11. Carlson, K. D. & Wu, J. (2012). The illusion of statistical control: Control variable practice in management research. Organizational Research Methods, 15 (3), pp. 413-435. Cho, J. H., Cam, H. & Oltramari, A. (2016). Effect of personality traits on trust and risk to phishing vulnerability: Modeling and analysis. In 2016 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), pp. 7-13. Forgas, J. P. & East, R. (2008). On Being Happy and Gullible: Mood Effects on Skepticism and the Detection of Deception. Journal of Experimental Social Psychology, 44 (5), pp. 1362-1367. Glover, N., Miller, J. D., Lynam, D. R., Crego, C. & Widiger, T. A. (2012). The Five-Factor Narcissism Inventory: A five-factor measure of narcissistic personality traits. Journal of Personality Assessment, 94 (5), pp. 500-512. Gosling, S. D., Rentfrow, P. J. & Swann, W. B. Jr. (2003). A very brief measure of the big five personality domains. Journal of Research in Personality, 37 (6), pp. 504-528. Hendin, H. M. & Cheek, J. M. (1997). Assessing hypersensitive narcissism: A reexamination of Murray's Narcism Scale. Journal of Research in Personality, 31 (4), pp. 588-599. Higgins, D. M., Peterson, J. B., Pihl, R. O. & Lee, A. G. M. (2007). Prefrontal cognitive ability, intelligence, Big Five personality, and the prediction of advanced academic and workplace performance, Journal of Personality and Social Psychology, 93 (2), 298-319. Hřebíčková, M., Jelínek, M., Blatný, M., Brom, C., Burešová, I., Graf, S., Mejzlíková, T., Vazsonyi, A. T. & Zábrodská, K. (2016). Big Five Inventory: Základní psychometrické charakteristiky české verze BFI-44 a BFI-10. Československá Psychologie, 60 (6), pp. 567- 583. John, O. P. & Srivastava, S. (1999). The Big Five trait taxonomy: History, measurement, and theoretical perspectives. In Pervin, L. A. & John, O. P. (Eds.), Handbook of personality: Theory and research, 2nd ed. New York, NY: Guilford Press, pp. 102-138. Konrath, S., Meier, B. P. & Bushman, B. J. (2014). Development and Validation of the Single Item Narcissism Scale (SINS). Plos One, 9 (8). Kotler, P., Armstrong, G., Harris, L. C. & Piercy, N. (2017). Principles of Marketing, 7th European ed. New Jersey: Pearson Publishing. Pattinson, M., Jerram, C., Parsons, K., McCormac, A. & Butavicius, M. (2012). Why do some people manage phishing e-mails better than others? Information Management & Computer Security, 20 (1), pp. 18-28. Pincus, A. L., Ansell, E. B., Pimentel, C. A., Cain, N.M., Wright A. G. C. & Levy, K. N. (2009). Initial construction and validation of the Pathological Narcissism Inventory. Psychological Assessment, 21 (3), pp. 365-379. Rammstedt, B. & John, O. P. (2007). Measuring personality in one minute or less: A 10-item short version of the big five inventory in English and German. Journal of Research in Personality, 41 (1), pp. 203-212. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 601 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) F. Sudzina & A. Pavlicek: Propensity to Click on Suspicious Links: Impact of Gender, of Age, and of Personality Traits Raskin, R. & Terry, H. (1988). A principal-components analysis of the narcissistic personality inventory and further evidence of its construct validity. Journal of Personality and Social Psychology, 54 (5), pp. 890-902. Soto, C. J. & John, O. P. (in press a). The next Big Five Inventory (BFI-2): Developing and assessing a hierarchical model with 15 facets to enhance bandwidth, fidelity, and predictive power. Journal of Personality and Social Psychology. Soto, C. J. & John, O. P. (in press b). Short and extra-short forms of the Big Five Inventory–2: The BFI-2-S and BFI-2-XS. Journal of Research in Personality. Sudzina, F. (2016a). Do gender and personality traits (BFI-10) influence trust? In: Proceedings of the International Scientific Conference of Business Economics Management and Marketing (ISCOBEMM) 2016. Brno: Masaryk University, pp. 31-37. Sudzina, F. (2016b). Do gender and personality traits (BFI-10) influence trust? A replication. Central European Journal of Management, 3 (1), pp. 53-47. Sudzina, F. & Pavlíček, A. (2017). Do gender and personality traits influence use of deal sites? A replication. In The 12th International Conference on Strategic Management and its Support by Information Systems, 25-26 May 2017. Ostrava: VŠB-TU Ostrava. Welk, A. K., Hong, K. W., Zielinska, O. A., Tembe, R., Murphy-Hill, E. & Mayhorn, C. B. (2015). Will the “Phisher-Men” Reel You In? Assessing Individual Differences in a Phishing Detection Task. International Journal of Cyber Behavior, Psychology and Learning, 5 (4), pp. 1-17. 602 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Do Online Travel Communities Matter? A Literature Review 42 DANDISON C. UKPABI, UKAMAKA D. ONYENUCHEYA & HEIKKI KARJALUOTO Abstract The emergence of social media has migrated consumers from peripheral stakeholders to strategic partners whose inputs are critical for successful product and service innovation. Online communities provide a platform for aggregation of consumers from diverse backgrounds; online travel communities (OTCs) have recently attracted growing interest in the information systems and tourism literature because their unofficial boundary spanning role influences consumer interest in destinations. Importantly, this literature remains largely fragmented because of conflicting findings. The present study seeks to integrate prior OTC research in order to understand the motivations and consequences (negative and positive) of OTCs, as well as interaction platforms. Among the 63 reviewed studies, psychological, social, and utilitarian motivations were identified, with both positive and negative consequences for firms and individuals. Additionally, the studies were found to employ different methodological approaches, based on distinct and heterogeneous theories. The paper concludes with some implications and directions for further research. Keywords: • social media • OTC • psychological • social • utilitarian • CORRESPONDENCE ADDRESS: Dandison C. Ukpabi, University of Jyväskylä, Seminaarinkatu 15, 40014 Jyväskylän yliopisto, Finland, e-mail: dandison.c.ukpabi@jyu.fi. Ukamaka D. Onyenucheya, University of Plymouth, Drake Circus, Plymouth PL4 8AA, United Kingdom, e- mail: ukamaka.onyenucheya@plymouth.ac.uk. Heikki Karjaluoto, University of Jyväskylä, Seminaarinkatu 15, 40014 Jyväskylän yliopisto, Finland, e-mail: heikki.karjaluoto@jyu.fi. https://doi.org/10.18690/978-961-286-043-1.42 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 604 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. C. Ukpabi, U. D. Onyenucheya & H. Karjaluoto: Do Online Travel Communities Matter? A Literature Review Introduction The impact of social media on various economic sectors has been widely noted in the literature (Ukpabi & Karjaluoto, 2017). To remain relevant in the competitive landscape of contemporary business, marketers must remain active on different social media platforms (Lee & Hyun, 2015). Consumers see the emergence of social media as an emancipatory platform, migrating them from their previous perceived status as peripheral stakeholders to strategic partners whose inputs are critical for successful product and service innovation (Jung, Ineson, & Green, 2013; Ukpabi & Karjaluoto, 2016). Consequently, the agglomeration into online communities of consumers sharing similar interests and values has witnessed phenomenal recent growth. Interestingly, for about 80% of consumers who participate in online communities (Leader Networks, 2016), 74% of those communities are owned by large corporations (Demand Metric, 2016), and 77% of those corporations report that online communities have significantly improved their brand exposure, awareness, and credibility (MTA, 2016). According to Kang, Tang, and Fiore (2014), consumers participate in online communities for social, psychological, hedonic, and monetary benefits; the need to meet new people, share one’s feelings and access better product and service options are fundamental motivations for that participation. For instance, researchers have found that participation by professionals in online peer communities enhances research collaboration (Jamali et al., 2014). As a consequence, both firm-hosted and independently owned communities are increasing rapidly in number (Casaló, Flavián, & Guinalíu, 2010a). However, online communities have also affected firms and individuals negatively through counter- and alter-brand communities, deceptive posting, lurking, and invasion of members’ privacy (Cova & White, 2010; Dickinson et al. 2017). Online travel communities (OTCs) have recently become a hot topic in the tourism literature because they unofficially occupy a boundary spanning role, so influencing consumer interest in destinations (Cova & White, 2010). As tourism is a hedonic experience that cannot be comprehended prior to consumption, consumers rely on the advice and experiences of others concerning the best travel decisions. A thorough search of the wider literature identified only one review study of online communities (Lee, Vogel, & Limayem, 2003), with none in the OTC research. On that basis, the present systematic literature review has a number of objectives: first, to understand travelers’ motivations for participation in OTC; second, to understand the consequences, at both firm and individual level, of OTC participation; third, to understand the contexts and platforms through which OTC interactivity is fostered; and finally, to provide a conceptual framework that will schematically encapsulate the activities of OTCs. Against this backdrop, the study contributes to the literature by providing a solid platform that integrates the fragmented studies in this research stream. This represents a useful tool for subsequent studies (Okoli & Schabram, 2010), as managers in tourism and destination marketing organizations will also find the concepts and arguments adduced here useful as levers to optimize the value of OTCs for their firms. The rest of the paper is structured as follows. Section 2 discusses the background to OTCs; section 3 describes the research 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 605 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. C. Ukpabi, U. D. Onyenucheya & H. Karjaluoto: Do Online Travel Communities Matter? A Literature Review methodology, and section 4 discusses the results. In conclusion, section 5 discusses the implications of the findings and the study’s wider contribution. Background: Online Travel Communities OTCs can be defined as “groups of people trying to achieve goals, with similar interests, and interested in building relationships, making transactions, and engaging in fantasy, governed by rules and using new information technology as the means” (Wu, Xiao & Wu, 2016, p.2). Development and acceptance of IT means that tourism has undergone continuous transformation, and OTCs attract travelers through reviews and recommendations on platforms such as TripAdvisor, Fodor, Qunar, virtual tourist and Lonely Planet (Wang et al., 2016). Although better understanding is needed, it is known that people join online communities for several reasons: to share views on products; to obtain valuable information; and to create, enhance and sustain social ties between online members (Lee & Hyun, 2016a). In short, consumers join OTCs for psychological, social, and utilitarian reasons (Kang, Tang & Fiore, 2014). OTCs offer travelers an opportunity to share their travel experiences and opinions by posting reviews. These then serve as information references for other travelers, providing valuable information about points of interest (POIs) (e.g., environmental or landscape attractions), gastronomy, weather forecasts, news and safety bulletins. However, there is also a negative side to this increased information sharing within online communities; as reported by Wang et al. (2016), biased, non-credible, or deceptive information can be very challenging for travelers seeking reliable advice. A further problem is that a member of an OTC may be a lurker: someone who does not participate or contribute to any discussion but only reads and reaps the community’s ideas by becoming a part of that community (Seraj, 2012). Additionally, in their evaluation of technological modus operandi and social motivations for membership in 11 OTCs, Dippelreiter et al. (2008) found that although most of the communities are integrating new technologies, some still lack integrative emerging technologies such as SSL encryption and hashed user-id security features. OTCs also need to improve personalized on-trip services to members. Research Methodology 3.1 Literature Search and Selection To conduct the literature search, we first defined key terms for the study, which included online tourism community, virtual community in tourism, tourist online community, Web 2.0 enabled community in tourism, virtual space in tourism, and social media community in tourism. Given the uniqueness of the present study and the need to capture as many relevant articles as possible, we followed Shaikh and Karjaluoto’s (2015) method of combining horizontal search on Google Scholar and vertical search using databases such as Science Direct, SAGE, Wiley, Springer, Emerald, JSTOR, IEEE, Taylor & Francis, 606 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. C. Ukpabi, U. D. Onyenucheya & H. Karjaluoto: Do Online Travel Communities Matter? A Literature Review and Inderscience. We further extended our search to ACM, ABI/INFORM, SCOPUS, and Palgrave, yielding a large initial number of studies. To reduce the number of studies to a manageable size, the inclusion criteria were confined to journal articles, conference papers, and relevant PhD dissertations published between 2005 and 2016. In total, 63 studies were finally selected, comprising 58 journal articles, 2 conference papers, 2 PhD dissertations, and 1 research-in-progress. Results 4.1 Statistics of Findings Geographically, the highest number of publications came from the USA, followed by countries in the European bloc (among which Spain contributed most), and then the East Asian bloc (China, Taiwan, and Hong Kong). Most of the studies were published in 2016 while 2005, 2008 and 2009 each returned the same number of publications (4), with none in 2006 (Figure 1). The most frequently used theory was the technology acceptance model (TAM). However, inspite of the extensions to TAM2 (Venkatesh and Davis, 2000) and TAM3 (Venkatesh and Bala, 2008), all but one study utilized the original TAM. Other theories included social identity theory, flow theory, expectation-confirmation theory, situational strength theory, and interpersonal relationship theory, and some studies used a combination of theories (e.g., Ku, 2014), see Table 1. A majority of studies adopted a hybrid model to characterize use of OTCs, integrating different variables to create a model. (The table containing the analysed studies can be forwarded on request). 11 8 7 7 7 6 4 4 4 4 1 0 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 Figure 1: Year-wise distribution of studies 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 607 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. C. Ukpabi, U. D. Onyenucheya & H. Karjaluoto: Do Online Travel Communities Matter? A Literature Review 21 sle 13 ict 10 r 9 A 5 2 2 of 1 re Numb Figure 2: Articles by database Table 1: Theoretical foundations of prior OTC studies Theory Studies Technology acceptance model 1 Casaló, Flavián & Guinalíu, (2010a); (TAM1) Munoz-Leiva et al. (2012); Ku (2011); Lin (2007); Casaló, Flavián & Guinalíu (2011) Technology acceptance model 2 Ting, Ting & Hsiao (2014) (TAM2) Social identity theory (SIT) Ku (2011); Lee (2005) Flow theory (FT) Wu & Chang (2005); Source credibility Lee, Law & Murphy (2011); Wang et al. (2016); Expectation-disconfirmation theory Casaló, Flavián, & Guinalíu (2011); (EDT) Stepchenkova, Mills, & Jiang (2005) Affordance Cabiddu, Carlo, & Piccoli (2014) Relationship Jung, Ineson, & Green (2013); Kim, Chung marketing/Trust/Customer loyalty & Lee (2011) Beliefs/Attitude Elliot, Li & Choi (2013); Sparks, Perkins & Buckley (2013) Situational strength theory (SST) Hsu & Yen (2016) Stimulus organism response model Jeon, Jang & Barrett (2016) Figure 3 shows the percentage frequency of the various methodological approaches. Among the quantitative studies, survey administration and retrieval were performed primarily through the different online communities and used structural equation modeling as the main analytical tool. However, some of these studies (e.g., Wang et al., 2016) adopted a big data approach, analyzing the credibility of reviews in TripAdvisor and Qunar. While a few of the qualitative studies used face-to-face structured interviews, a majority adopted a netnographic approach; netnography is a qualitative, exploratory, 608 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. C. Ukpabi, U. D. Onyenucheya & H. Karjaluoto: Do Online Travel Communities Matter? A Literature Review online version of ethnographic research that explores cyberculture and behavior (Seraj, 2012; Rokka & Moisander, 2009). 8% Quantitative 14% Qualitative 16% 62% Conceptual Mixed method Figure 3: Methodologies used in the selected studies 4.2 Motivations for Joining Online Travel Communities 4.2.1 Psychological motivations User involvement—that is, the degree of interest in a piece of technology—has been studied across many information systems. In OTC, Wu, Xiao, and Wu (2016) examined the relationship between breadth and depth of involvement and members’ loyalty. They argued that depth of involvement exposes the individual to other activities in the OTC that increase flow experiences, pleasure, satisfaction, and fun. According to Elliot, Li, and Choi (2013), members’ satisfaction increases site stickiness, which also influences transaction intention. However, in evaluating customer purchase involvement and OTC website design, Sanchez-Franco and Rondan-Cataluña (2010) suggested that while OTC website aesthetics and usability increase satisfaction, these effects are moderated by purchase involvement, and level of involvement influences members’ perceptions of the usefulness of OTC websites. Another important psychological factor for OTC membership is escapism. As argued by Lee and Hyun (2015, p. 435), social, family, or romantic loneliness drives peer identification in OTCs; in other words, involvement in OTC activities is primarily a means of overcoming loneliness. Members experience a sense of fulfilment and satisfaction when OTC managers create additional platforms to enhance peer interaction through services like meeting a new companion through a certain travel product, forming a virtual family based on a particular travel view, and talking with a romantic partner about a certain travel product. The conceptual framework in Figure 4 summarizes motivations for participation, the range of OTC contexts, interaction platforms, and consequences (including dark side). 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 609 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. C. Ukpabi, U. D. Onyenucheya & H. Karjaluoto: Do Online Travel Communities Matter? A Literature Review Online Travel Community (OTC) Firm-Hosted Independent Community Context Airline, hotel/ accommodation, events, Motivations festivals, destinations, etc. Consequences Psychological Firm-level factors  Destination brand  Involvement acceptance Interaction  Entertainment  Revisit platforms   Pleasure Destination brand  equity/awareness Fun  Forums  Customer loyalty  Relaxation  Emails  Discounts  Escapism  Newsgroups  Special price breaks  Flow experience  Blogs  Consumer level Chat forums Social Factors   Sympathy  Websites Networking  Offline relationship   Destination/product  Building ties Commitment   Bond Relationship review sites   Trust Interest-based  Collaboration  Romantic  Altruism Utilitarian factors  Dark side Travel advice  Good destination Venting negative  Best price emotions, identity theft, counter brand, alter brand, conflicts (emotional, personality, geographic) Figure 4: Motivations and consequences of online travel community participation 610 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. C. Ukpabi, U. D. Onyenucheya & H. Karjaluoto: Do Online Travel Communities Matter? A Literature Review 4.2.2 Social Motivations Self-expression is an innate human attribute, and participation in OTCs is driven by the individual’s desire for self-expression (Wang, 2016). For this reason, members assign greater importance to the transmission of information than to its reception. Investigating the antecedents and moderators of members’ social satisfaction in OTCs, Yang, Zhang, and Gallagher (2016) identified entertainment, social interaction, and reciprocity as predictors of satisfaction. To enhance members’ interactivity, then, OTC managers should incorporate entertaining features and activities that will maintain and strengthen members’ social ties, whether online or offline. Luo and Huang (2016) proposed that OTC participation is driven by functional, social, psychological, and recreational motives, and that most people join online communities because of the social desire to make more friends. These findings challenge Vogt and Fesenmaier’s (1998) argument that functional needs are seen to be the most important influence on information search. Finally, member reputation, built through exotic profiles shared on members’ pages, influences evaluations of similarity and community that often lead to bonding, offline interaction, and enduring relationships (Kunz & Seshadri, 2015). 4.2.3 Utilitarian motivations The utilitarian approach asserts that a morally correct action is one that provides the greatest benefits over harms for every individual (Santa Clara University, 2017). Chung and Buhalis (2008) argued that, of the three motivations for OTC participation, information acquisition most strongly influences participation and attitude toward the OTC. For this reason, information such as best price, service quality, best destination, and safety are the most common search criteria among travelers. In some cases, OTCs offer specific utilitarian services that increase subscription to its membership. For instance, Luo and Huang (2016) reported that, aside from socio-psychological motivations, participation in couch-surfing OTCs is driven by the utilitarian drive for recreation; those who subscribe for couch-surfing believe that the community has specialists with the requisite skills to ensure that their recreational needs are met. Jeon, Jang, and Barrett (2016) suggested that utilitarian value and online trust mediate the relationship between website interactivity and repurchase intention. Conversely, the importance of utilitarian motivation for OTC participation was challenged by Kang, Tang, and Fiore (2014), who contended that OTC participation on Facebook fan pages was largely driven by hedonic and socio-psychological benefits while functional and monetary benefits had no impact on participation. 4.3 Contexts and Interaction Platforms Our systematic review also revealed different platforms of interaction among community members (Table 2). These include chatrooms, forums, newsgroups, blogs, websites, and review sites. However, the choice of platform depends on one’s motive (psychological, social, utilitarian) for participation. For instance, Facebook fan page members are likely 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 611 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. C. Ukpabi, U. D. Onyenucheya & H. Karjaluoto: Do Online Travel Communities Matter? A Literature Review to visit Facebook fan pages of restaurants when they gain socio-psychological and hedonic benefits from such visits (Kang, Tang, & Fiore, 2014). To increase visit to their fan pages, then, restaurants should constantly upload content that appeals to the hedonic instincts, such as games or live streaming videos of music and current events that will facilitate real-time interactions among members. Additionally, members who use blogs and websites to share their experiences are motivated by communal feelings, unlike the sense of self-recognition that motivates the sharing of experiences on Twitter (Munar & Jacobsen, 2014). Table 2: Contexts and interaction platforms Interaction platform Context Author Facebook Hedonic instincts: games, Kang, Tang, & Fiore, 2014 live streaming videos Blogs Communal feelings Munar & Jacobsen, 2014 Websites Communal feelings Munar & Jacobsen, 2014 E-mail Togetherness, romantic Lee & Hyun, 2015 bonding Chatroom/forums Travel experiences Lee & Hyun, 2016b It is also argued that the use of e-mail as an interaction platform is fundamental for OTC managers seeking to foster social, friendly, and romantic togetherness among community members (Lee & Hyun, 2015). E-mail facilitates close-knit interactions, where members can communicate freely about private issues in a way that may be more difficult on open platforms. However, to sustain OTCs, forums and chatrooms are also necessary, where members freely share travel experiences that will assist others in making travel decisions (Lee & Hyun, 2016b). In summary, members see the OTC as an attraction where they can learn from the experiences of other members, reducing the time taken to search other sources for information about a destination. 4.4 Consequences of Online Travel Communities 4.4.1 Negative effects Studies of online social relationships report negative effects such as extreme verbal inhibition and aggression, bullying, denigration, privacy issues, and lurking (Kim & Raja, 1991; Weber, 2011). The present systematic review revealed both firm- and individual- related negative effects of OTCs. For instance, Cova and White (2010, p. 264), suggested that firm-related negative effects of OTCs have led to the emergence of counter-brand communities—“a phenomenon of aggregation against a company that manages the brand and which leads to the creation of competing brands by members of the community”— and alter-brand communities—“a phenomenon of aggregation around not-for-profit projects that nevertheless creates a brand that can compete with the brands of certain companies.” Members of these alien communities are former adherents of a brand who have moved away because of their frustration with the firm and float activities and 612 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. C. Ukpabi, U. D. Onyenucheya & H. Karjaluoto: Do Online Travel Communities Matter? A Literature Review programs parallel to the brand, aimed at damaging its reputation. In terms of individual- related negative effects, we also identified socio-psychological deviant behaviors that engender repulsive reactions from other members of the OTC. For instance, complaints of bullying and posting of irrelevant topics (Stepchenkova, Mills, & Jiang, 2005) and lurking (Dickinson et al. 2017) are common in OTCs. As argued by Ruiz-Mafe, Tronch, and Sanz-Blas (2016), these negative emotions constitute psychological, social, and privacy risks, and OTC managers should incorporate technologies to curb any such deviant behaviors. 4.4.2 Positive effects Similarly, positive effects of OTC membership are observed at both firm and individual level, including increased brand awareness, functional brand image, brand use, and visit intention (Casaló, Flavián, and Guinalíu, 2010b). Lee and Hyun (2016b) argued that trust is a fundamental driver of membership stickiness, leading eventually to loyalty. To promote loyalty, managers should ensure navigation functionality, security, and privacy protection (Kim, Chung, & Lee, 2011). Trust in the community also fosters a sense of belonging and sharing of emotions and experiences; in most cases, such relationships transfer to the offline world (Luo & Zhang, 2016), ending in some cases in strong bonds such as romantic affairs (Lee & Hyun, 2015). Discussion The aim of the present study was to elucidate the motivations and consequences of OTC participation through a systematic review of existing studies. A thorough and rigorous literature search yielded 63 studies, comprising journal articles, conference papers, and PhD dissertations. Through OTCs, tourists assume the status of destination evangelists, whose gospels about destinations are believed and trusted more than marketers’ messages. Both firm-hosted and independent OTCs promote a range of activities that engender agglomeration of membership to a critical mass, which is seen as an antecedent of success for OTCs (Wang, Yu, & Fesenmaier, 2002). Interestingly, the threat of OTCs emanates from the question of brand ownership, as the emergence of brand communities has shifted brands from private control to publicly socialized phenomena (Cova & White, 2010). By taking an interest in and promoting the activities of OTCs, tourism firms serve a boundary spanning role, with concomitant favorable effects on destination image and visit intention (Casaló, Flavián, & Guinalíu, 2010b). Our review revealed three main motivations for participation in OTCs: psychological, social, and utilitarian. Psychologically, participation in OTCs is motivated by escapism; those seeking travel advice from OTCs do so as an escape from social, family, or romantic loneliness (Lee & Hyun, 2015). Additionally, as an individual stays longer in the OTC, they are more likely to continue (Zhao, Stylianou, & Zheng, 2013), increasing flow experience, enjoyment, and involvement (Wu, Xiao & Wu, 2016). As the social desire to forge ties and bond with others also influences OTC participation, interactivity is a key 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 613 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. C. Ukpabi, U. D. Onyenucheya & H. Karjaluoto: Do Online Travel Communities Matter? A Literature Review factor in members’ flow experiences and sense of belonging through knowledge sharing, community promotion, and offline activities (Wu & Chang, 2005; Qu & Lee, 2011). Additionally, Arenas-Gaitan, Rondan-Cataluna, and Ramirez-Correa (2013) argued that members assign greater importance to the transmission of information than to its reception, as a platform for highlighting and maintaining social status. Finally, information acquisition for best travel decisions, product purchase, and service quality evaluation represent utilitarian motives for participation in OTCs (Chung & Buhalis, 2008), as website interactivity is the cornerstone of members’ functional satisfaction. 5.1 Contributions of the Study Our study contributes to existing knowledge in a number of ways. First, no previous literature review has focused on OTCs. Studies of OTCs have followed different trajectories, with no coherent integration, resulting in disparate and in most cases conflicting findings that resist meaningful interpretation by scholars and managers. This systematic review provides a solid platform that integrates and aggregates these fragmented and disparate studies, offering a useful tool for subsequent studies in this area. Second, by identifying motivations for OTC participation and its positive and negative consequences, both at firm level and for individuals, our study extends prior research on online communities (Cova & White, 2010). Additionally, by explicating the interaction platforms and contexts of OTCs and the arguments adduced herein, this study offers destination managers levers for optimizing the value of OTCs to their firm. Finally, from our synthesis of prior studies and findings, we conclude that online travel communities do indeed matter, and that tourism and destination marketing organizations neglect their strategic importance at their own peril. 5.2 Limitations of the Study and Future Research Direction One of the present study’s limitations is that the data obtained were restricted by date (2005–2016). Future research might usefully increase the sample size by including relevant articles published before 2005. It is also acknowledged that additional factors beyond those investigated here also influence participation in online communities, and further study should more fully investigate these other factors. Finally, extraction and analysis was conducted manually here, which may exclude relevant studies, and automated extraction and analysis should be utilized in future research of this kind. References (Selected) Arenas-Gaitan, J., Javier Rondan-Cataluña, F., & Esteban Ramírez-Correa, P. (2013). Social identity, electronic word-of-mouth and referrals in social network services. Kybernetes, 42(8), 1149-1165. Cabiddu, F., De Carlo, M., & Piccoli, G. (2014). Social media affordances: Enabling customer engagement. Annals of Tourism Research, 48, 175-192. 614 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. C. Ukpabi, U. D. Onyenucheya & H. Karjaluoto: Do Online Travel Communities Matter? A Literature Review Casaló, L. V., Flavián, C., & Guinalíu, M. (2010a). Antecedents and consequences of consumer participation in on-line communities: The case of the travel sector. International Journal of Electronic Commerce, 15(2), 137-167. Casaló, L. V., Flavián, C., & Guinalíu, M. (2010b). Determinants of the intention to participate in firm-hosted online travel communities and effects on consumer behavioral intentions. Tourism management, 31(6), 898-911. Casaló, L. V., Flavián, C., & Guinalíu, M. (2011). Understanding the intention to follow the advice obtained in an online travel community. Computers in Human Behavior, 27(2), 622-633. Chung, J. Y., & Buhalis, D. (2008). Web 2.0: A study of online travel community. Information and communication technologies in tourism 2008, 70-81. Cova, B., & White, T. (2010). Counter-brand and alter-brand communities: the impact of Web 2.0 on tribal marketing approaches. Journal of Marketing Management, 26(3-4), 256-270. Demand Metric (2016). https://www.demandmetric.com/content/online-communities-benchmark- report Dickinson, J. E., Filimonau, V., Hibbert, J. F., Cherrett, T., Davies, N., Norgate, S., ... & Winstanley, C. (2017). Tourism communities and social ties: the role of online and offline tourist social networks in building social capital and sustainable practice. Journal of Sustainable Tourism, 25(2), 163-180. Dippelreiter, B., Grün, C., Pöttler, M., Seidel, I., Berger, H., Dittenbach, M., & Pesenhofer, A. (2008). Online tourism communities on the path to Web 2.0: an evaluation. Information technology & tourism, 10(4), 329-353. Elliot, S., Li, G., & Choi, C. (2013). Understanding service quality in a virtual travel community environment. Journal of Business Research, 66(8), 1153-1160. Hsu, S. H. Y., & Yen, H. R. (2016). Predicting good deeds in virtual communities of consumption: The cross-level interactions of individual differences and member citizenship behaviors. Internet Research, 26(3), 689-709. Jamali, R. H., Russell, B., Nicholas, D., & Watkinson, A. (2014). Do online communities support research collaboration?. Aslib Journal of Information Management, 66(6), 603-622. Jeon, H., Jang, J., & Barrett, E. B. (2016). Linking Website Interactivity to Consumer Behavioral Intention in an Online Travel Community: The Mediating Role of Utilitarian Value and Online Trust. Journal of Quality Assurance in Hospitality & Tourism, 1-24. Jung, T. H., Ineson, E. M., & Green, E. (2013). Online social networking: Relationship marketing in UK hotels. Journal of Marketing Management, 29(3-4), 393-420. Kang, J., Tang, L., & Fiore, A. M. (2014). Enhancing consumer–brand relationships on restaurant Facebook fan pages: Maximizing consumer benefits and increasing active participation. International Journal of Hospitality Management, 36, 145-155. Kim, M. J., Chung, N., & Lee, C. K. (2011). The effect of perceived trust on electronic commerce: Shopping online for tourism products and services in South Korea. Tourism Management, 32(2), 256-265. Kim, M. S., & Raja, N. S. (1991). Verbal Aggression and Self-Disclosure on Computer Bulletin Boards. Ku, E. (2014). Distributed fascinating knowledge over an online travel community. International Journal of Tourism Research, 16(1), 33-43. Ku, E. C. (2011). Recommendations from a virtual community as a catalytic agent of travel decisions. Internet Research, 21(3), 282-303. Kunz, W., & Seshadri, S. (2015). From virtual travelers to real friends: Relationship-building insights from an online travel community. Journal of business research, 68(9), 1822-1828. Leader Networks (2016). http://www.leadernetworks.com/2012/07/nearly-80-of-people- participate-in.html. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 615 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. C. Ukpabi, U. D. Onyenucheya & H. Karjaluoto: Do Online Travel Communities Matter? A Literature Review Lee, H. A., Law, R., & Murphy, J. (2011). Helpful reviewers in TripAdvisor, an online travel community. Journal of Travel & Tourism Marketing, 28(7), 675-688. Lee, H. Y. (2005). Understanding member identification in the online travel communities and member voluntary behaviors (Doctoral dissertation, Oklahoma State University). Lee, F. S., Vogel, D., & Limayem, M. (2003). Virtual community informatics: A review and research agenda. JITTA: Journal of Information Technology Theory and Application, 5(1), 47. Lee, K. H., & Hyun, S. S. (2015). A model of behavioral intentions to follow online travel advice based on social and emotional loneliness scales in the context of online travel communities: The moderating role of emotional expressivity. Tourism Management, 48, 426-438. Lee, K. H., & Hyun, S. S. (2016a). The effects of tourists’ knowledge-sharing motivation on online tourist community loyalty: the moderating role of ambient stimuli. Current Issues in Tourism, 1-26. Lee, K. H., & Hyun, S. S. (2016b). A model of value-creating practices, trusting beliefs, and online tourist community behaviors: Risk aversion as a moderating variable. International Journal of Contemporary Hospitality Management, 28(9), 1868-1894. Lin, H. F. (2007). The role of online and offline features in sustaining virtual communities: an empirical study. Internet Research, 17(2), 119-138. Luo, Q., & Huang, L. (2016). Identity Construction in a Travel-related Virtual Community: A Case Study on a Guangzhou Couch-surfing Community. Journal of China Tourism Research, 1-20. Luo, Q., & Zhang, H. (2016). Building interpersonal trust in a travel-related virtual community: A case study on a Guangzhou couchsurfing community. Tourism Management, 54, 107-121. MTA (2016). http://www.martechadvisor.com/articles/communities-reviews/how-branded-online- communities-can-boost-your-roi/ Munar, A. M., & Jacobsen, J. K. S. (2014). Motivations for sharing tourism experiences through social media. Tourism management, 43, 46-54. Munoz-Leiva, F., Hernández-Méndez, J., & Sánchez-Fernández, J. (2012). Generalising user behaviour in online travel sites through the Travel 2.0 website acceptance model. Online Information Review, 36(6), 879-902. Okoli, C. & Schabram, K. (2010). A guide to conducting a systematic literature review of information systems research. Sprouts work. Pap. Information Systems 10, 26. Rokka, J., & Moisander, J. (2009). Environmental dialogue in online communities: negotiating ecological citizenship among global travelers. International Journal of Consumer Studies, 33(2), 199-205. Ruiz-Mafe, C., Tronch, J. & Sanz-Blas, S. (2016). The role of emotions and social influences on consumer loyalty towards online travel communities. Journal of Service Theory and Practice, 26(5), 534-558. Santa Clara University (2017) Calculating Consequences: The Utilitarian Approach to Ethics. Available at: https://www.scu.edu/ethics/ethics-resources/ethical-decision- making/calculating-consequences-the-utilitarian-approach/ [Accessed 07 January 2017] Sanchez-Franco, M. J., & Rondan-Cataluña, F. J. (2010). Virtual travel communities and customer loyalty: Customer purchase involvement and web site design. Electronic commerce research and applications, 9(2), 171-182. Seraj, M. (2012). We create, we connect, we respect, therefore we are: intellectual, social, and cultural value in online communities. Journal of Interactive Marketing, 26(4), 209-222. Sparks, B. A., Perkins, H. E., & Buckley, R. (2013). Online travel reviews as persuasive communication: The effects of content type, source, and certification logos on consumer behavior. Tourism Management, 39, 1-9. 616 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. C. Ukpabi, U. D. Onyenucheya & H. Karjaluoto: Do Online Travel Communities Matter? A Literature Review Stepchenkova, S., Mills, J., & Jiang, H. (2007). Virtual travel communities: self-reported experiences and satisfaction. Information and Communication Technologies in Tourism 2007, 163-174. Ting, K. C., Ting, P. H., & Hsiao, P. W. (2014). Why are bloggers willing to share their thoughts via travel blogs?. International Journal of Technology Management, 64(1), 89-108. Ukpabi, D. C., & Karjaluoto, H. (2016). Consumers’ acceptance of information and communications technology in tourism: A review. Telematics and Informatics. Ukpabi, D., & Karjaluoto, H. (2017). Influence of Social Media on Corporate Heritage Tourism Brand. In Information and Communication Technologies in Tourism 2017 (pp. 697-709). Springer, Cham. Venkatesh, V. and Bala, H. (2008) ‘Technology Acceptance Model 3 and a research agenda on interventions’, Decision Sciences, Vol. 39, No. 2, pp.273–315. Venkatesh, V. and Davis, F. (2000) ‘A theoretical extension of the technology acceptance model: four longitudinal field studies’, Management Science, Vol. 46, No. 2, pp.186–204. Vogt, C. A., & Fesenmaier, D. R. (1998). Expanding the functional information search model. Annals of Tourism Research, 25(3), 551-578. Wang, H. Y. (2016). Predicting customers’ intentions to check in on Facebook while patronizing hospitality firms. Service Business, 10(1), 201-222. Wang, Y., Chan, S. C. F., Leong, H. V., Ngai, G., & Au, N. (2016). Multi-dimension reviewer credibility quantification across diverse travel communities. Knowledge and Information Systems, 1-26. Wang, Y., Yu, Q., & Fesenmaier, D. R. (2002). Defining the virtual tourist community: implications for tourism marketing. Tourism management, 23(4), 407-417. Weber, H. L. (2011). Missed cues: How disputes can socialize virtual newcomers. Language@ Internet, 8(5). Wu, H., Xiao, T., & Wu, X. (2016). More is better? The influencing of user involvement on user loyalty in online travel community. Asia Pacific Journal of Tourism Research, 1-13. Wu, J. J., & Chang, Y. S. (2005). Towards understanding members' interactivity, trust, and flow in online travel community. Industrial Management & Data Systems, 105(7), 937-954. Yang, X., Zhang, X., & Gallagher, K. P. (2016). The Moderating Effect of Online Community Affiliation and Information Value on Satisfaction With Online Travel Communities in China. Journal of Global Information Technology Management, 19(3), 190-208. Zhao, K., Stylianou, A. C., & Zheng, Y. (2013). Predicting users' continuance intention in virtual communities: The dual intention-formation processes. Decision Support Systems, 55(4), 903- 910. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Cultural Values Inherent in the Design of Social Media Platforms: A Case Study of WeChat 43 SHAHPER VODANOVICH, BRAD MCKENNA & WENJIE CAI Abstract Recently, there has been a tremendous rise in the growth of social media platforms all over the world. Most social media platforms are created for worldwide consumption and it is usually a sig-nificant challenge to develop these platforms for users from various cultural backgrounds. While culturally centric user behaviour of social media platforms has been well- documented, the cultural values inherent within the design of these platforms has not been thoroughly explored. This study proposes a conceptual cultural values model to examine the cultural characteristics inherent within WeChat, a Chinese social media platform. We use a research model based on Chinese cultural val-ues to validate the model for the full scale study. Keywords: • Social Media • Cultural Values • China • Design • CORRESPONDENCE ADDRESS: Shahper Vodanovich, Auckland University of Technology, Department of Information Technology and Software Engineering, 55 Wellesley St E, Auckland, 1010, New Zealand, e-mail: shahper.vodanovich@aut.ac.nz. Brad McKenna, University of East Anglia, Norwich Business School, Norwich Research Park, Norwich, NR4 7TJ, United Kingdom, b.mckenna@uea.ac.uk. Wenjie Cai, University of Surrey, 388 Stag Hill, Guildford GU2 7XH, United Kingdom, w.cai@surrey.ac.uk. https://doi.org/10.18690/978-961-286-043-1.43 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 618 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Vodanovich, B. McKenna & W. Cai: Cultural Values Inherent in the Design of Social Media Platforms: A Case Study of WeChat Introduction While many social media platforms are created for worldwide consumption, it is usually a significant challenge to develop these platforms for users from various cultural backgrounds (Hoehle, Zhang, & Venkatesh, 2015). This is increasingly important as the use of a social media platforms often re-flects the cultural values of the user (Chu & Choi, 2010; Qiu, Lin, & Leung, 2013). While there have been quite a few papers recently published that examine a user–centred approach i.e. how cultural contexts shape social media use (Gan, 2017; Y. Kim, Sohn, & Choi, 2011), there are fewer studies that examine the influence of cultural values on social media platform design. A study by Van Belle- ghem (2011) highlights the differences in social media penetration between Western European countries and others such as India and Brazil. Together with Gong, L. Stump, and G. Li (2014) they conclude that the differences in diffusion of social media across countries highlights the need for global e-marketers to appreciate why people in a particular country may be more receptive to and prone to adopt online social media than people in other countries. This paper attends to this research agenda by reflecting on the underlying cultural values that moti-vate the design of a Chinese social media platform, WeChat. The exploration of cultural values in-herent in the design of social media platforms is motivated by Aral, Dellarocas, and Godes (2013) and Kane, Alavi, Labianca, and Borgatti (2014). Both set of researchers present research frame-works and research agendas to encourage scholars to explore the impacts social media has on or-ganisations and society. Features built into social media platforms either enable or constrain user behaviour, while providing the building blocks to allow interactions of social processes. The design of social media platforms is important to understand because they enable interactions of social pro-cesses and culture that affect the fabric of society (Aral et al., 2013). In the current research in progress paper, our goal is to explore the cultural values inherent in a Chinese based social media platforms using WeChat as an example. While the idea that culture is entwined in the design of information systems and applications is not new (Reinecke & Bernstein, 2013), it is an area that is understudied, especially in the Chinese context. Therefore, the research question for this study is: what are the cultural values inherent in the design of social media plat-forms? WeChat is a mobile instant text and voice messaging communication service and has be-come an important social media platform in China. Because social media such as Facebook, YouTube, and Twitter are blocked in China, WeChat has been specifically created based on im-portant Chinese cultural elements. Lin (2013) asserts that in essence, cultural values represent the most basic and core beliefs of a society, and these beliefs largely influence our communication pat-terns. Hence, culture can potentially play a significant role in the creation of social media platforms, such as WeChat. Research indicates that the most important of Hofstede’s dimensions for distinguishing among na-tional cultures, is collectivism–individualism (Hofstede & Hofstede, 2005; U. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 619 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Vodanovich, B. McKenna & W. Cai: Cultural Values Inherent in the Design of Social Media Platforms: A Case Study of WeChat E. Kim, Triandis, Kâğitçibaşi, Choi, & Yoon, 1994; Triandis & Trafimow, 2001), especially in the context of social media platforms (Chau, 2008). In this paper we use this dimension as a starting point to explore the partic-ular values inherent in Chinese culture that are in turn reflected in the design of WeChat. To this end, we begin by proposing a model which encapsulates one of the key Chinese cultural values – Collectivism – and then use this model to evaluate key features of the WeChat application. This paper serves as the first step of the research process by building the model and providing a preliminary implementation of it. The paper is structured as follows. Firstly we examine WeChat and Chinese cultural values and present our proposed research model. Next we apply our pro-posed model to a social media platform called WeChat. Finally we conclude with our limitations and suggestions for future work. Social Media and WeChat 2.1 Social Media Social media provides a platform for different social groups and communicate and exchange infor-mation (Cao, Lu, Dong, Tang, & Li, 2013). SNS is defined as a web- based software application that helps users to connect and socialize with friends, family members, business partners or other indi-viduals (Gnyawali, Fan, & Penner, 2010). Features and functionality designed into social media af-fect how users interact, coordinate and form relationship networks (McKenna, Vodanovich, & Fan, 2016). There are different types of social media platforms, which provide businesses with many types of interactive communication methods (Rishika, Kumar, Janakiraman, & Bezawada, 2013). Social me-dia, text and instant messaging applications, blogs, wikis and other web forums are growing as a means of supporting additional, often critical and accurate information within the public sphere (Sutton, Palen, & Shklovski, 2008). Social media provides a platform that allows users to communi-cate news and information to others as an alternative form of communication such as television, radio, and print (McKenna et al., 2016). 2.2 WeChat Chinese use of social media is increasing faster than the rest of the world. Chinese consumers tend to consider products or services if they see them mentioned on a social media site. Because social media such as Facebook, YouTube, and Twitter are blocked in China (Lien & Cao, 2014), WeChat is one that marketers could use to directly communicate with their Chinese audience. WeChat is the most widely used social networking service in China and has become an important social media platform for computer-mediated communication (Gao & Zhang, 2013). 620 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Vodanovich, B. McKenna & W. Cai: Cultural Values Inherent in the Design of Social Media Platforms: A Case Study of WeChat The WeChat messaging application is developed by Tencent in China. It is reported that WeChat now delivers more than 1 billion messages per day and that WeChat has attracted more than 700 million users within 2 years of its initial launch (Custer, 2016). WeChat includes regular communica-tion features such as text messages, voice messages, audio and video calls, and chat groups; com-mon SNS features such as friending, posts/comments, Moments (like Facebook news- feed); and novel social features such as Shake, People Nearby, Subscribe, Red Packet, amongst others. The Great Firewall of China (Bamman, O'Connor, & Smith, 2012; Deibert, Palfrey, Rohozinski, Zittrain, & Stein, 2008) plays an inherent part of the WeChat functionality. Similar to practices on Weibo, Baidu and other social media, WeChat reserves the right to restrict particular search terms and deletes messages, threads and groups that contravene strict Chinese protocol (Bamman et al., 2012). Chinese Values in a Social Context Traditionally speaking, Eastern cultures such as China, are collectivistic. They value family, friends and their groups over self. Members of Eastern cultures tend to have fewer, closer and more en-during friendships than members of Western cultures. Collectivism in Asian societies is maintained through a general value placed on social obligations and commitments (Li & Wright, 2000; Noronha, 2002) and familial ties (Sui Pheng & Leong, 2001). While, Hofstede, and Trompenaars, have their critics (with Trompenaars significantly criticised by Hofstede) (see (Froholdt & Knudsen, 2007; Michael D Myers & Tan, 2003)). Criticisms are mainly focused around the fact that that there is no such thing as a ‘national’ cultural identity, and that the cultural dimensions are formulated from a Western perspective. There is however, many countries where the major cultural group is such a dominating factor that, nationally, cultural values do have a national cultural identity, albeit with cultural sub-groups within that national identity. With regard to Hofstede and Trompenaars having a Western viewpoint, in the words of Hampden- Turner and Trompenaars themselves (1997, p. 149): “...social science methodology is not (emphasis added) culture free. There is no neutral point ‘above’ culture from which to view the universe. It follows that many different ways of viewing culture are legitimate” We look beyond these critics and eval-uate Chinese values of collectivism in cultural dimensions which may bring valuable insights in terms of explaining behaviours, in particular the designers’ perspective, which has been largely over-looked. Subsequently, this section is going to develop a framework that assembles Chinese cultural attrib-utes and centralising Chinese collectivistic culture, this is based primarily on Hofstede’s (Hofstede & Bond, 1984; Hofstede & Hofstede, 2005) work. This framework helps to explain the various interre-lated cultural attributes that inherent in the design of Chinese social media platform. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 621 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Vodanovich, B. McKenna & W. Cai: Cultural Values Inherent in the Design of Social Media Platforms: A Case Study of WeChat The social hierarchy as a result of the high power distance in China (Hofstede & Bond, 1984) leads to a strong respect for authority which is evident among Chinese daily practices (Yau, 1988). In a group orientated society, the social hierarchy and respect for authority of the interpersonal relations and the society (Bond & Hwang, 1986; Moise, 2013) is paramount. This cultural value has been largely involved with other cultural values in the discussion of interpersonal relationship in the Chinese context. Guanxi as a Chinese cultural value has been broadly discussed in the investigations of Chinese in-terpersonal relationships in business, society and organization (Buttery & Wong, 1999; Wong & Chan, 1999; Wong & Tam, 2000). This attribute also is a key cultural factor that determines Chinese interpersonal behavior. To build up and maintain a good ‘guanxi’ helps to achieve positive group dynamics and strengthen social ties. Compared with other cultural values, the value of keqi tends to provide a guideline of practice in interpersonal relationships. ‘keqi’, refer to ‘well-manner politeness’ (Yao, 1983), which is a personal attribute as well as an embodiment of harmony in Chinese communication to keep a courteous dis-tance with an acquaintance. Chen (Chen, 2013) argues that the keqi way of communication is the way to sustain the harmonious relationship. Research Methodology This paper is framed within the methodological stance of a case study (Miles & Huberman, 1994) which is useful for investigating contemporary phenomena and their context (M. D Myers, 2013; Yin, 2015). The proposed model in this article (Figure 1) is adapted from two existing models (Mok & DeFranco, 2000; Yau, 1988). This is the starting point of this research, this model centralizes the con-cept of collectivism and suggests a lens from which Chinese culture values can be understood in terms of specific cultural attributes of keqi, guanxi, and respect for authority. These three notions understand the collectivism from interpersonal relations, social hierarchy and harmony- maintenances. This model is designed to be used to provide an understanding of the cultural values inherent in the design of Chinese social media platform. The first step of the research process is presented in the next section, where the authors analyse existing features of WeChat alongside Chinese cultural values. This model can then be used to fur-ther explore the design of the WeChat application. Data will be collected through interviews with designers and developers of WeChat. We will employ a snowballing interview technique which is common in qualitative research (Biernacki & Waldorf, 1981). One of the key problems of snowball-ing as identified by Biernacki and Waldorf is finding participants and starting a referral chain. We can overcome this problem because one of the authors has personal connections to employees at Ten-cent (the creators of WeChat). A second problem is the verifying of potential respondents. This problem can be solved by asking the respondents to only refer other participants for interview if they meet the research criteria we have designed. The interview questions 622 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Vodanovich, B. McKenna & W. Cai: Cultural Values Inherent in the Design of Social Media Platforms: A Case Study of WeChat will be based on the cultural elements discussed earlier and presented in Figure 1 within the context of application de-sign. We aim to have at least 5 interviews, and will continue interviewing until saturation has been reached, should more participants be available. Figure 1: Chinese Cultural Value Model To triangulate (M. D Myers, 2013) the data collected from our interviews, we will also consult doc-umentary sources such as design specifications and screenshots of the WeChat design. All data will be collected in Chinese and translated into English by the Chinese speaking author. Data Analysis will use thematic analysis (Saldaña, 2009) to identify common themes and ideas emerging from the data. Preliminary Results In this section, we present preliminary results from our analysis of WeChat features, which are based on the Chinese culture elements presented above, and the proposed model in Figure 1. This will help us formulate a basis for our interviews with designers and users of this platform in the next step of the research. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 623 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Vodanovich, B. McKenna & W. Cai: Cultural Values Inherent in the Design of Social Media Platforms: A Case Study of WeChat Table 1: Features and Cultural Attributes WeChat Feature Respect for Guanxi Keqi Authority Shake (Chatting with random users who shaking their phones at the same time) People Nearby Subscribe to celebrities or newsletters Red Packet (money transactions) Moments (Social Networking Functions) A feature that demonstrates the cultural attribute of Respect for Authority is the Subscribe func-tionality which enables users to subscribe to a celebrity or to newsletters. The owner of the ac-count has the absolute right to choose and decide what comments to put on under the post. In ad-dition, the creator of a chat group who assembles the group chat has the power to dissolve group, whilst other chat group members can only join or exit the chat group. The Chinese cultural attribute of guanxi can include both the creation of new ties as well as the strengthening of existing ties with people. This attribute is reflected in the features of Shake and People Nearby which spontaneously match people with strangers virtually. Through this feature, WeChat allows people to form instrumental ties with strangers. In addition, Holmes, Balnaves, and Wang (2015) explore the recently introduced feature, Red Packet. This feature digitally imitates the Chinese Lunar New Year tradition of ‘hong bao’ where elders pass money to the young to encour-age prosperity and provide good blessings. The red bags themselves imply a range of expectations that do not need to be made explicit. Unlike the tradition of senior people giving to junior people, the WeChat feature encourages people to give money to anyone. Thus this feature is a way to strengthen or build up social ties – another demonstration of guanxi. And finally, the nuanced design of moments within WeChat emulates the concept of keqi. For ex-ample, while one can post images and links for all of their friends to see and comment on, the comments are only visible if the commentators are friends with each other. This features enables the appearance of “well-mannered politeness” by not allowing acquaintances to necessarily see each other’s comments. The need for privacy which is encapsulated in the attribute of keqi is fur-ther seen in the ability of WeChat users to restrict broadcasts to specific users. 624 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Vodanovich, B. McKenna & W. Cai: Cultural Values Inherent in the Design of Social Media Platforms: A Case Study of WeChat The current design of WeChat affords the practices of these three key cultural attributes – Respect for Authority, guanxi and keqi. Hsu (Hsu, 1985) emphasizes that Chinese are social and psychologi-cally dependent on others and have a strong group orientation; therefore, individualistic behaviour is regarded as an expense to others. For example a number of WeChat features such as Go Dutch and Group Buy further reflects this group orientation. Conclusion Research on social media platform design presents interesting opportunities to examine how plat-form designers can structure and influence user interaction in particular ways (Aral et al., 2013). This research can help shed light on cross-cultural differences related to social media design and will be of great value to social platform designers who are pursuing a mobility strategy targeted to a global audience. Culture is often reflected by or perceived through shared practices in a commu-nity (Chiu, Gelfand, Yamagishi, Shteynberg, & Wan, 2010; Geertz, 1973; Hofstede, 2001). Cultural differences influence communication, behaviour, and values. Asian-based social media tend to have tighter social relationships, with their practices reflecting an indirect communication style and less open self-disclosure; whereas, western based social media tend to have wider social networks, with their practices reflecting a more direct communication style and bolder self-disclosure (Cho, Jung, & Park, 2013). While social media platforms like WeChat have a potential to modernize elements of Chinese cul-ture, they simultaneously act as a vehicle for the reinforcement of traditional Chinese collectivist cultural values (Holmes et al., 2015). We have demonstrated in this paper how a particular social media platform, WeChat, reflects the broader shared cultural values inherent in Chinese society. Our findings do not imply that other cultures other than Chinese are unsuited for using WeChat, as the application is now becoming popular outside of China. However, as it is developed in China, there are Chinese cultural values inherent in its design. Additionally, many of its features are not available outside China. A future part of our larger study will analyse and contrast social media de-signs from other cultures, for example Whatsapp and Facebook, in contrast to Wechat and Weibo. However, this paper only includes the Chinese cultural aspect. This paper has two key limitations; 1) the model proposed in this paper is conceptual and has not been thoroughly validated. Validation could be to carry out via an exploratory study including inter-views and focus groups with the designers, developers and marketers of Chinese social media plat-forms such as Tencent (the creators of WeChat) and Sina (creators of Weibo). This type of study would help us to understand the motivations for the creation of features within each platform. In addition, interviews with users of these platforms would help to determine whether or not these features help engender the cultural attributes discussed in the model. 2) In this paper we focus ex- clusively on the concept of collectivism, however in doing so we may overlook other important val-ues in the Chinese culture such as the concept of Harmony (Wei & Li, 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 625 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Vodanovich, B. McKenna & W. Cai: Cultural Values Inherent in the Design of Social Media Platforms: A Case Study of WeChat 2013). In future research we could extend this study to include other concepts of Chinese culture. In addition, we think it will be useful to explore other nuanced Chinese social media such as Ren-Ren, Weibo and QQ side by side. Additionally, Moreover, we are witnessing a common social media lifecycle emerging, which can be compared to traditional product adoption and product life cycle theory (Rogers, 1976). A social media platform is developed and eventually launched; it grows, and at some point will peter out unless it innovates (Cox, 1967; Torkjazi, Rejaie, & Willinger, 2009). Aral et al. (2013) suggest that by thinking deeply about platform design platform designers have an op-portunity to consider add-on features and other forms of innovation to extend a platforms func- tionality and usability. In its relatively short history WeChat has been able to adapt and alter their life cycle through innovation. This provides an exciting avenue of future research in to the Social Media Lifecycle. References Aral, S., Dellarocas, C., & Godes, D. (2013). Introduction to the special issue-social media and business transformation: A framework for research. Information Systems Research, 24(1), 3- 13. Bamman, D., O'Connor, B., & Smith, N. (2012). Censorship and deletion practices in Chinese social media. First Monday, 17(3). Biernacki, P., & Waldorf, D. (1981). Snowball sampling: Problems and techniques of chain referral sampling. Sociological methods & research, 10(2), 141-163. Bond, M. H., & Hwang, K.-k. (1986). The social psychology of Chinese people: Oxford University Press. Buttery, E. A., & Wong, Y. (1999). The development of a guanxi framework. Marketing Intelligence & Planning, 17(3), 147-155. Cao, Q., Lu, Y., Dong, D., Tang, Z., & Li, Y. (2013). The roles of bridging and bonding in social media communities. Journal of the American Society for Information Science and Technology, 64(8), 1671-1681. Chau, P. Y. (2008). Cultural differences in diffusion, adoption, and infusion of Web 2.0. Journal of Global Information Management, 16(1), i. Chen, G.-M. (2013). The two faces of Chinese communication. The Global Intercultural Communication Reader, 273. Chiu, C.-Y., Gelfand, M. J., Yamagishi, T., Shteynberg, G., & Wan, C. (2010). Intersubjective culture the role of intersubjective perceptions in cross-cultural research. Perspectives on Psychological Science, 5(4), 482-493. Cho, S. E., Jung, K., & Park, H. W. (2013). Social media use during Japan's 2011 earthquake: how Twitter transforms the locus of crisis communication. Media International Australia, 149(1), 28-40. Chu, S.-C., & Choi, S. M. (2010). Social capital and self-presentation on social networking sites: a comparative study of Chinese and American young generations. Chinese Journal of Communication, 3(4), 402-420. Cox, W. E. (1967). Product life cycles as marketing models. The Journal of Business, 40(4), 375- 384. 626 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Vodanovich, B. McKenna & W. Cai: Cultural Values Inherent in the Design of Social Media Platforms: A Case Study of WeChat Custer, C. (2016). WeChat blasts past 700 million monthly active users, tops China’s most popular apps. Tech in Asia. Deibert, R., Palfrey, J., Rohozinski, R., Zittrain, J., & Stein, J. G. (2008). Access denied: The practice and policy of global internet filtering: Mit Press. Froholdt, L. L., & Knudsen, F. (2007). Conceptions of ‘culture'in international communication- Limits to cultural explanations?: Human error in multi-national manning-Hofstede's cultural dimensions: a critical approach Symposium conducted at the meeting of the IMLA-IMEC. The International Maritime Lecturers' Association and the International Maritime English Conference Gan, C. (2017). Understanding WeChat users' liking behavior: An empirical study in China. Computers in human behavior, 68, 30-39. Gao, F., & Zhang, Y. (2013). Analysis of WeChat on iPhone Symposium conducted at the meeting of the 2nd International Symposium on Computer, Communication, Control, and Automation (3CA) Geertz, C. (1973). The growth of culture and the evolution of mind. The interpretation of cultures, 76. Gnyawali, D. R., Fan, W., & Penner, J. (2010). Competitive actions and dynamics in the digital age: an empirical investigation of social networking firms. Information Systems Research, 21(3), 594-613. Gong, W., L. Stump, R., & G. Li, Z. (2014). Global use and access of social networking web sites: a national culture perspective. Journal of Research in Interactive Marketing, 8(1), 37-55. Hoehle, H., Zhang, X., & Venkatesh, V. (2015). An espoused cultural perspective to understand continued intention to use mobile applications: a four-country study of mobile social media application usability. European Journal of Information Systems, 24(3), 337-359. Hofstede, G. (2001). Culture consequences. Comparing Values, Behaviors, Institutions, and Organizations. Hofstede, G., & Bond, M. H. (1984). Hofstede's culture dimensions an independent validation using Rokeach's value survey. Journal of Cross-Cultural Psychology, 15(4), 417-433. Hofstede, G., & Hofstede, G. J. (2005). Organisationer och kulturer: Studentlitteratur. Holmes, K., Balnaves, M., & Wang, Y. (2015). Red Bags and WeChat (Wēixìn): Online collectivism during massive Chinese cultural events. Global Media Journal: Australian Edition, 9(1). Hsu, F. L. (1985). The self in cross-cultural perspective. Culture and self: Asian and Western perspectives, 24, 55. Kane, G. C., Alavi, M., Labianca, G. J., & Borgatti, S. (2014). What’s different about social media networks? A framework and research agenda. MIS Quarterly, 38(1), 275-304. Kim, U. E., Triandis, H. C., Kâğitçibaşi, Ç. E., Choi, S.-C. E., & Yoon, G. E. (1994). Individualism and collectivism: Theory, method, and applications: Sage Publications, Inc. Kim, Y., Sohn, D., & Choi, S. M. (2011). Cultural difference in motivations for using social network sites: A comparative study of American and Korean college students. Computers in human behavior, 27(1), 365-372. Li, J., & Wright, P. C. (2000). Guanxi and the realities of career development: a Chinese perspective. Career Development International, 5(7), 369-378. Lien, C. H., & Cao, Y. (2014). Examining WeChat users’ motivations, trust, attitudes, and positive word-of-mouth: Evidence from China. Computers in human behavior, 41, 104-111. Lin, M. (2013). Electronic word-of-mouth on microblogs: A cross-cultural content analysis of Twitter and Weibo. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 627 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Vodanovich, B. McKenna & W. Cai: Cultural Values Inherent in the Design of Social Media Platforms: A Case Study of WeChat McKenna, B., Vodanovich, S., & Fan, T. (2016). I heart you: how businesses are using social media to increase social capital Symposium conducted at the meeting of the European, Mediterranean & Middle Eastern Conference on Information Systems (EMCIS) Miles, M. B., & Huberman, A. M. (1994). Qualitative data analysis: An expanded sourcebook: sage. Moise, E. E. (2013). Modern China: Routledge. Mok, C., & DeFranco, A. L. (2000). Chinese cultural values: Their implications for travel and tourism marketing. Journal of Travel & Tourism Marketing, 8(2), 99-114. Myers, M. D. (2013). Qualitative Research in Business & Management (2nd ed.): Sage Publications London. Myers, M. D., & Tan, F. B. (2003). Beyond models of national culture in information systems research. Advanced topics in global information management, 2, 14-29. Noronha, C. (2002). Chinese cultural values and total quality climate. Managing Service Quality: An International Journal, 12(4), 210-223. Qiu, L., Lin, H., & Leung, A. K.-y. (2013). Cultural differences and switching of in-group sharing behavior between an American (Facebook) and a Chinese (Renren) social networking site. Journal of Cross-Cultural Psychology, 44(1), 106-121. Reinecke, K., & Bernstein, A. (2013). Knowing What a User Likes: A Design Science Approach to Interfaces that Automatically Adapt to Culture. MIS Quarterly, 37(2), 427-453. Rishika, R., Kumar, A., Janakiraman, R., & Bezawada, R. (2013). The effect of customers' social media participation on customer visit frequency and profitability: an empirical investigation. Information Systems Research, 24(1), 108-127. Rogers, E. M. (1976). New product adoption and diffusion. Journal of consumer Research, 290- 301. Saldaña, J. (2009). The coding manual for qualitative researchers. London: Sage. Sui Pheng, L., & Leong, C. H. (2001). Asian management style versus western management theories: a case study in construction project management. Work study, 50(1), 13-22. Sutton, J., Palen, L., & Shklovski, I. (2008). Backchannels on the front lines: Emergent uses of social media in the 2007 southern California wildfiresWashington, DC. Symposium conducted at the meeting of the Proceedings of the 5th International ISCRAM Conference Torkjazi, M., Rejaie, R., & Willinger, W. (2009). Hot today, gone tomorrow: on the migration of MySpace usersACM. Symposium conducted at the meeting of the Proceedings of the 2nd ACM workshop on Online social networks Triandis, H. C., & Trafimow, D. (2001). Cross-national prevalence of collectivism. Individual self, relational self, collective self, 259-276. Van Belleghem, S., Eenhuizen, M., & Veris, E. (2011). Social media around the world 2011. InSites Consulting. Wei, X., & Li, Q. (2013). The Confucian value of harmony and its influence on Chinese social interaction. Cross-Cultural Communication, 9(1), 60. Wong, Y., & Chan, R. Y.-k. (1999). Relationship marketing in China: Guanxi, favouritism and adaptation. Journal of business ethics, 22(2), 107-118. Wong, Y., & Tam, J. L. (2000). Mapping relationships in China: Guanxi dynamic approach. Journal of Business & Industrial Marketing, 15(1), 57-70. Yao, W. (1983). The importance of being KEQI: A Note on Communication Difficulties. Communicating with China, 71-75. Yau, O. H. (1988). Chinese cultural values: Their dimensions and marketing implications. European Journal of marketing, 22(5), 44-57. Yin, R. K. (2015). Qualitative research from start to finish: Guilford Publications. 628 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Success Factors for Effective Customer Interaction in Digital Sales: A Case from the Digital Investment Service Industry 44 RÜDIGER VON NITZSCH, DIRK BRAUN & ROGER W.H. BONS Abstract In the off-line world, capable sales representatives align their advisory approach with their customerś individual profile to improve the quality of the process and the likelihood of a positive outcome for both parties. However, we see a movement away from the classical advisory settings towards “omni-channel” strategies, where companies serve their customers through a combination of on-line and off-line channels. In this short paper, we undertake a first investigation of how specific characteristics in the customer profile could affect the advisory success and introduce the "OPTI-model". We illustrate the application of our model using the example of Digital Investment Services, knowing that the financial services industry is one area where “omni-channel” strategies have become highly relevant. Keywords: • Customer interaction • omni-channel management • digital sales • digital banking • customer profile • CORRESPONDENCE ADDRESS: Rüdiger von Nitzsch, RWTH Aachen University, Templergraben 55, 52062 Aachen, Germany, e-mail: nitzsch@efi.rwth-aachen.de. Dirk Braun, FOM University of Applied Sciences, Herkulesstraße 32, 45127 Essen, Germany, e-mail: dirk.braun@fom.de. Roger W.H. Bons, FOM University of Applied Sciences, Herkulesstraße 32, 45127 Essen, Germany, e- mail: roger.bons@fom.de. https://doi.org/10.18690/978-961-286-043-1.44 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 630 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. von Nitzsch, D. Braun & R. W.H. Bons: Success Factors for Effective Customer Interaction in Digital Sales: A Case from the Digital Investment Service Industry Introduction The market for digital financial services is moving strongly, resulting from cost-reduction ambitions of the financial service providers. Like in other industries that have developed mass-customized customer interactions and product offerings, Digital Investment Services are expected to follow suit and offer an excellent domain to test our views. For example ING Group, one of the leading banks in Europe, has clearly identified the multi- or omni-channel approach as part of their overall service concepts, and they are organizing themselves accordingly (Hamers, 2016). The community of technology innovators to support these types of interactions is growing rapidly, as is illustrated by the many so called "FinTech" start-ups (Mackenzie, 2015). For financial services with little complexity and limited need for customers to be adviced by a financial expert, many of these services have been developed and successfully implemented. However, Digital Investment Services are often restricted to the transactional part of the service (e.g., buying and selling shares) and/or monitoring current positions through dashboards. The sales and advisory part would be a next challenge in the further digitization of financial services, but in our view requires a keen understanding of the psychology behind the sales process, in particular how the sales process is adjusted based on the customer's profile. If you ever have had interactions with sales representatives in your role as a customer, chances are that you can distinguish effective approaches that fit your needs from the hopeless attempts to push you to buy something. An effective sales representative is fast in recognizing the peculiarities of his potential customer and addresses these in his interaction. For instance, if the sales representative encounters a highly rational customer, he will deliver facts and refrains from the traditional "sales spiel". Is the customer uncertain about his desires, the sales representative will start by assisting the client and by identifying his primary decision criteria. If the client is highly sceptical, the sales representative's first objective should be to gain his trust. Or finally, if the customer wants to know everything there is to know about the product or service, the sales representative will need to show his professional expertise and deliver facts that matter to the customer. Experienced sales representatives not only master these different approaches, but more importantly, they have the skills to recognize when to use them by "reading" the customer in front of them. When we shift our attention to the digital environment and the sales processes there, all of these elements are present as well. Hence, digital sales channels must go beyond product representation and recommendation and interact in such a way with the customer that he feels well taken care of. These interactions do not necessarily need to be executed by humans, as insights from the field of artificial intelligence and in particular self- learning systems show (Hill, Randolph Ford, & Farreras, 2015; Shimazu, 2001). How such systems should operate is partly a technical matter, which is beyond the scope of this article. However, it is also a challenge from a business design perspective. We need 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 631 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. von Nitzsch, D. Braun & R. W.H. Bons: Success Factors for Effective Customer Interaction in Digital Sales: A Case from the Digital Investment Service Industry to determine, which customer characteristics can help to determine if it is worthwhile engaging the customer, and if so, which process steps have to be adjusted and executed according to the customer profile. In this paper we propose a model that offers four dimensions to deliver individualized interactions in digital sales settings, using the example of Digital Investment Services. The OPTI Characteristics Model Based on insights from the behavioral finance literature (e.g., Ariely, 2010; Kahneman, 2012), that studies the psychological aspects involved in making financial decisions, we have identified four different dimensions of a hypothetical customer profile. These foundations give us the conviction that it is possible in a digital setting to align the communication processes and interaction with the customer profile, similar to the sales representative and his empathy and human natural intelligence in our starting example. We refer to these dimensions as the "OPTI Characteristics" (Figure 1). Figure 1: The OPTI Characteristics as foundations for customized customer interactions The denotation of the respective customer specific characteristics within each of the four dimensions enables the construction of a customer specific and individual profile that forms the basis for a customized interaction: Objective, Prudence, Trustful and Interested. The next sections discuss these four characteristics in more detail, using the case example of an investment through a digital service channel. As such we present first ideas how the digital interaction for such an investment would change depending on differences in the characteristics in the customer profile. 2.1 The "OBJECTIVE" Characteristic The dimension Objective captures the existence of rationality in the investment decisions of the customer. A maximum score in this dimension refers to a customer that does not allow any emotions to affect his decision (Kahneman & Tversky, 1979) and who has no cognitive dissonances (Cooper, 2007). He is an analytic, who only cares for factual data, which he carefully weighs before reaching his decision. On the other extreme of the Objective scale, we find the customer who makes all the classical errors known from behavioral finance (Kumar & Goyal, 2015). Examples for these are cyclical investments (Rouette & von Nitzsch, 2006) and investments in primarily domestic stock, as they provide him with a higher sense of control, yet lead him to a poor diversification and 632 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. von Nitzsch, D. Braun & R. W.H. Bons: Success Factors for Effective Customer Interaction in Digital Sales: A Case from the Digital Investment Service Industry unnecessary risk (French & Poterba, 1991). Or he shows a clear level of overconfidence and is convinced he is smarter than the market (Stotz & von Nitzsch, 2005). He is surprised, that after many transactions, he receives a smaller yield on his portfolio when compared to a passive investment on a market index (Barber & Odean, 2001). The construction of the interaction - especially for those customers who tend to make the classical investor mistakes - needs to capture these aspects, support them transparently and deliver a sustainable added value to the customer, without robbing him of the freedom to make the final decisions himself (Sunstein, 2014). An investor who prefers cyclical investments can be informed more actively and prominently that anti-cyclical investments may have some distinct advantages (Daniel, Hirshleifer, & Subrahmanyam, 1998). Alternatively, he could be recommended to delegate more of his portfolio decisions to the system, for instance by offering a periodical rebalancing of the chosen asset allocation (von Nitzsch & Braun, 2017). In essence, all mechanisms could be applied that have become known and discussed under the term Nudging (Thaler & Sunstein, 2008). This refers to the approach that psychological behavior patterns are structurally used to steer people towards a beneficiary path for them and/or society as a whole. 2.2 The "PRUDENT" Characteristic The Prudent characteristic captures how careful and considerate a customer is regarding the conditions that influence a financial decision, or in other words, how well he knows the necessary facts and his own preferences (Van Rooij, Lusardi, & Alessie, 2011). At the maximum of this scale we find the customer who has a complete overview of all his finances. Basically, he can articulate precisely, which investment goals he wants to achieve, while he is able to quantify his targets in relation to his risk appetite (Lusardi & Mitchell, 2014). Conversely, at the other side of the scale, customers have no or very limited insight in their financial situation. They have not yet considered which targets they want to achieve with the investment and are far from knowing which risks they are willing to take in doing so. These customers face a range of ambiguities (uncertainties about the conditions associated with the investment decision) and are feeling highly uncertain (Bossaerts, Ghirardato, Guarnaschelli, & Zame, 2010; Ellsberg, 1961). For the interaction with customers, a correct measurement of this Prudent characteristic is very important, as customers with low prudence are quickly overwhelmed, especially in a digital setting. They are more likely to quit the interaction prematurely, especially since product-specific offers do not help them and they lack recognition that their personal circumstances are "understood" by the digital service (von Nitzsch & Braun, 2017). In our view, future successful Digital Investment Service providers will have the appropriate tools to reduce these ambiguities. Based on the customer type, different tools can be included in the interaction, for instance to first determine the monthly available 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 633 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. von Nitzsch, D. Braun & R. W.H. Bons: Success Factors for Effective Customer Interaction in Digital Sales: A Case from the Digital Investment Service Industry capital for an investment. Subsequently, risks can be visualized in a graphically appealing way. This not only helps to identify the risk profile of the customer, but also provides him with more confidence in his ability to reach a sound decision, as he is structurally engaging in the relevant themes for his decision (von Nitzsch & Braun, 2017). For instance, he receives information how much money is needed for a meaningful retirement plan, the associated risks and benefits etcetera. This reduces the ambiguities and thus facilitates a decision (Van Rooij, Lusardi, & Alessie, 2012). 2.3 The "TRUSTFUL" Characteristic The Trustful characteristic measures the fundamental trust in the digital offering. At the maximum point of the scale, customers trust their service provider and the tools and recommendations the provider delivers. They have no concerns about a lack of security or data privacy that would stop them from using the digital environment. However, if a customer does not (fully) trust the service provider, it will be difficult to envision any interaction, digital or otherwise, between them (Bettiga, Boaretto, & Chen, 2013). Besides providing incomplete data to the tool, the untrusting customer may just want to test how the tool works, without completing the actual process and coming to an investment decision. The impact of this characteristic on the interaction is guided by the insight, that a lack of trust can be best addressed through personal contact (Fehr, 2009). This means - if at all - reverting to an off-line channel, or possibly a video-conference within the tool. Customers with a low score on Trustful should therefore not be asked to execute sensitive steps in the digital environment (Howcroft, Hewer, & Durkin, 2003). For instance, the risk profile of a customer can be determined by attractive digital tools, which would be acceptable to these customers since they do not require sensitive personal data and do not result in financial consequences (von Nitzsch & Braun, 2017). The obvious advantage of a digital service is the size and scope of the available information as well as the determination of the customer preferences. Both elements would be difficult to achieve at a comparable level in a classical service conversation (Heinemann, 2013). Customers on the high end of the Trustful scale can be offered a fully digital interaction and they would likely experience this as added value and added flexibility, as they do not need to be bothered with scheduled meetings, travel time etc. Hybrid modes, where the representative and the customer are sitting together behind the same screen (often based on tablet technology) are getting more popular and show promising advantages for both service provider and customer (Nüesch, Alt, & Puschmann, 2015). 2.4 The "INTERESTED" Characteristic The Interested characteristic captures both the general interest of the customer in financial topics as well as his motivation to find a good answer to a specific question. On the 634 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. von Nitzsch, D. Braun & R. W.H. Bons: Success Factors for Effective Customer Interaction in Digital Sales: A Case from the Digital Investment Service Industry extreme positive side of this scale, customers are continuously looking for comprehensive information and have the ambition to become knowledgeable on financial themes. They are willing to commit time, emotional energy and possibly monetary means to be engaged and to ensure the finances have been well taken care of (Howcroft et al., 2003). This usually results in a higher financial competence, as they already possess a lot of relevant information about the specific financial decision they are contemplating (Lusardi & Mitchell, 2014). The obvious counterpart on this scale is the customer who has absolutely no interest at all in financial themes and does not want to spend any effort on this theme. The customer with a high score on the Interested scale will shy away from a service provider who constructs and/or manages a portfolio without any explanations and arguments. This customers demand a clear understanding why the portfolio decisions have been proposed or taken. Offers that enable the client to identify thematic focal points, such as low carbon-emission investments, provide a good fit to this customer profile. They will value periodical updates beyond the yield development that include other developments in his field of interest (von Nitzsch & Braun, 2017). Conversely, the customer who is in "don't care" mode for all these matters should not be bothered with these themes, beyond the legal requirements the service provider has to comply with as part of his "customer care obligation". It would make him less certain or at the very least he would find it annoying and it would steer him away from his well-intended service provider (Ha & Hoch, 1989). Conclusion and Outlook In this paper we focussed on Digital Investment Services and how they should aim for a level of individualization in the interaction process to fit the customer profile using digital and automated processes. This would not just deliver a custom fit from an investment portfolio perspective, but also achieve that the customer feels well taken care of during the entire interaction and service consumption. It would increase the customer engagement and identification with the product and provider, compared to current standardized digital solutions and interactions, but also the pseudo-individual interactions occurring in retail branches of financial institutions. In particular the characteristics Prudence and Trustful indicate, that already today there is the potential and the need for a combined multi-channel approach. For instance, the actions of the customer in the digital environment when providing information can be captured to provide input for the subsequent service process. If the customer requires a lot of time to answer specific questions and/or makes several revisions, it might indicate ambiguity about that particular question and would provide the possibility to connect a representative via a different channel (voice or video connection) at that time, of course depending on the resources and service model of the provider. Of course, we have only started to scratch the surface in providing customized Digital Investment. Future research should result in an OPTI-profiling instrument and the 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 635 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. von Nitzsch, D. Braun & R. W.H. Bons: Success Factors for Effective Customer Interaction in Digital Sales: A Case from the Digital Investment Service Industry associated translation to the customer profile. Also, the various technical and content components that would be needed to achieve the desired alignment of the customer interaction need to be identified and operationalized, including gaps where current technology does not yet offer solutions. This will be the focus of our next steps, in which we plan to develop such a profiling tool and implement it in a real-life Digital Investment Service. In summary, the OPTI Characteristics are expected to help in the identification of the various archetypical customer types. Knowing their different affinities or attitudes towards the use of digital services will enable the customization of not only the products and portfolio, but also the interaction with the customer, giving them the necessary comfort to use the digital channel if and when they like, possibly in addition to the traditional channel when the situation demands it. Understanding these characteristics helps to design the Digital Investment Services of the future. References Ariely, D. (2010). Predictably Irrational, Revised: The Hidden Forces That Shape Our Decisions. London, UK: Harper Collins Publishers. Barber, B. M., & Odean, T. (2001). Boys will be Boys: Gender, Overconfidence, and Common Stock Investment. The Quarterly Journal of Economics, 116(1), 261–292. Bettiga, D., Boaretto, A., & Chen, S. (2013). Exploring media convergence: evidence from Italy. Journal of Engineering Business …, 5, 53–62. Bossaerts, P., Ghirardato, P., Guarnaschelli, S., & Zame, W. R. (2010). Ambiguity in Asset Markets: Theory and Experiment. Review of Financial Studies, 23(4), 1325–1359. Cooper, J. (2007). Cognitive dissonance: 50 years of a classic theory. London, UK: Sage Publishers. Daniel, K., Hirshleifer, D., & Subrahmanyam, A. (1998). Investor psychology and security market under-and overreactions. The Journal of Finance, 53(6), 1839–1885. Ellsberg, D. (1961). Risk, ambiguity, and the Savage axioms. The Quarterly Journal of Economics, 74(4), 643–669. Fehr, E. (2009). On the economics and biology of trust. Journal of the European Economic Association, 7(2-3), 235–266. French, K., & Poterba, J. M. (1991). Investor Diversification and International Equity Markets. In Amercian Economic Review. American Economic Review, 81(2), 222–226. Ha, Y., & Hoch, S. (1989). Ambiguity, processing strategy, and advertising-evidence interactions. Journal of Consumer Research, 16(3), 354–360. Hamers, R. (2016). Think Forward - Act Now. In M. S. E. F. Conference (Ed.), ING Group. London, UK. Heinemann, G. (2013). No-Line-Handel als höchste Evolutionsstufe des Cross-Channel- Management. Retail Business. Gabler Verlag. Hill, J., Randolph Ford, W., & Farreras, I. G. (2015). Real conversations with artificial intelligence: A comparison between human–human online conversations and human–chatbot conversations. Computers in Human Behavior, 49, 245–250. Howcroft, B., Hewer, P., & Durkin, M. (2003). Banker-customer interactions in financial services. Journal of Marketing Management, 19(9-10), 1001–1020. Kahneman, D. (2012). Thinking, fast and slow. London, UK: Penguin Books. 636 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) R. von Nitzsch, D. Braun & R. W.H. Bons: Success Factors for Effective Customer Interaction in Digital Sales: A Case from the Digital Investment Service Industry Kahneman, D., & Tversky, A. (1979). Prospect theory: An analysis of decision under risk. Econometrica: Journal of the Econometric Society, 263–291. Kumar, S., & Goyal, N. (2015). Behavioural biases in investment decision making–a systematic literature review. Qualitative Research in Financial Markets, 7(1), 88–108. Lusardi, A., & Mitchell, O. S. (2014). The economic importance of financial literacy: Theory and evidence. Journal of Economic Literature, 52(1), 5–44. Mackenzie, A. (2015). The Fintech Revolution. London Business School Review, 26(3), 50–53. Nüesch, R., Alt, R., & Puschmann, T. (2015). Hybrid Customer Interaction. Business & Information Systems Engineering, 57(1), 73–78. Rouette, C., & von Nitzsch, R. (2006). Wie viel Rendite kostet zyklisches Investieren? Die Bank, (8), 18–22. Shimazu, H. (2001). ExpertClerk: navigating shoppers’ buying process with the combination of asking and proposing. In International joint conference on Artificial intelligence (pp. 1443– 1448). Seattle, WA, USA: Morgan Kaufmann Publishers. Stotz, O., & von Nitzsch, R. (2005). The perception of control and the level of overconfidence: Evidence from analyst earnings estimates and price targets. The Journal of Behavioral Finance, 6(3), 121–128. Sunstein, C. R. (2014). Nudging: A very short guide. Journal of Consumer Policy, 37(4), 583–588. Thaler, R., & Sunstein, C. R. (2008). Nudge - Improving decisions about health, wealth and happiness. New Haven (Connecticut), USA: Yale University Press. Van Rooij, M., Lusardi, A., & Alessie, R. (2011). Financial literacy and stock market participation. Journal of Financial Economics, 101(2), 449–472. Van Rooij, M., Lusardi, A., & Alessie, R. (2012). Financial literacy, retirement planning and household wealth. The Economic Journal, 122(560), 449–478. von Nitzsch, R., & Braun, D. (2017). Digitale Vermögensanlage: Auf dem Weg zu individuellen und intelligenten Lösungen. In Banking & Innovation 2017 (pp. 49–62). Germany: Springer Gabler Verlag. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Wearables and Wellness for the Young Elderly - Transforming Everyday Lives? 45 CAMILLA WALDEN & ANNA SELL Abstract Mobile and wearable technologies have unique advantages within health and wellness. Current knowledge on wearables shows, however, that users easily abandon them after an initial use period. We wanted to investigate whether adding a social dimension to wearable use would be valuable in the young elderly age group, and investigate user experiences of wearables when introducing them to people not in the traditional target group of fitness wearables and without previous experience of wearables. In this exploratory study aimed at gaining a holistic picture to guide further research, we utilize multiple research methods to gain rich data. We found that the young elderly had a clear interest in the wearable. Introducing a social dimension to the wearable seemed beneficial as the young elderly quickly formed a both supportive and competitive relation. The social connection formed through the device appeared to be value adding for the participants and seems to at least partially address the previously identified barriers. Keywords: • Young elderly • Third age • Wearables • Wellness • Social wellness • Physical wellness • CORRESPONDENCE ADDRESS: Camilla Walden, Institute for Advanced Management Systems Research, Joukahaisenkatu 3-5 A, 20520 Turku, Åbo Akademi University, Tuomiokirkontori 3, 20500 Turku, Finland, e-mail: camilla.walden@abo.fi. Anna Sell, Institute for Advanced Management Systems Research, Joukahaisenkatu 3-5 A, 20520 Turku, Åbo Akademi University, Tuomiokirkontori 3, 20500 Turku, Finland, e-mail: anna.sell@abo.fi. https://doi.org/10.18690/978-961-286-043-1.45 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 638 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Walden & A. Sell: Wearables and Wellness for the Young Elderly - Transforming Everyday Lives? Introduction Mobile and wearable technologies have unique advantages within health and wellness. Wearables could be a way to help the young elderly to stay active longer and remain well. Even though wearable fitness trackers are not a new technology as such, there is evidence that they have not recently evolved to better meet the requirements of users (Harrison et al 2015). Smartphones are prevalent among the population, but present problems regarding fitness tracking such as problems with data entry (if manual) and inaccuracy of data (if smartphone is not carried on person at all times). Wearables can solve these problems and could thus be a better choice for sustained wellness (see e.g. Amor and James 2015). Current knowledge on wearables shows, however, that users easily abandon them after an initial use period. In a Gartner (2016) report it was found that the abandonment rate of smart watches is 29%, and 30% for fitness trackers in a study with more than 9500 participants. Gartner also found that wearable devices are not found useful enough and users easily get bored with them. The perceived value in relation to the price is not found to be compelling enough, especially in the over 45 years age group. Current wearables only take into account the physical dimension of wellness and they are traditionally targeted mainly at the working age population and already physically active consumers. We wanted to explore (i) how adding a social dimension to wearable use would impact the wellness behaviour in the young elderly participants, and (ii) investigate attitudes towards wearables when introducing them to people not in the traditional target group of fitness wearables and without previous experience of wearables. We use the term young elderly to describe our target group of active 60-75 year olds (Carlsson and Walden 2016). Our definition of the young elderly is similar to the concept of the third age, except with a narrower age frame. The third age is a concept used to describe the time period between retirement and actual old age, a period 25 to 30 years long (see Sadler 2006). The third age or being young elderly is understood as a period of good, active life. Starner (2014) defines wearable computers as any body-worn computers that are designed to provide useful services to the user while she is engaged with other tasks. Besides fitness monitors, Starner includes in his definition e.g. MP3 players, smart watches and also smartphones, depending on how they are used. Lazar et al. (2015, pp 635-636) discuss smart devices with the definition “devices that automatically gather information about users or their environment to assist them in gaining knowledge about themselves and/or taking action”. Fernandez (2014) defines wearables in the broadest sense as including any computer devices that can be carried on person with the purpose of assisting the user. We use the term wearable in line with these definitions. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 639 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Walden & A. Sell: Wearables and Wellness for the Young Elderly - Transforming Everyday Lives? The paper is organized in the following way: after this introductory section we present a literature review of wearables and wellness in section 2. In section 3 we discuss the study design and present the participants chosen for this study. In section 4 we present the results of the study and in section 5 we discuss the findings and the implications of the study. Literature review 2.1 Wearables for wellness For a useful way to discuss wearable technologies for fitness and wellness, Ananthanarayan and Siek (2012) present a taxonomy consisting of (i) goals and users, (ii) persuasion methods, and (iii) data presentation. An example of a relevant goal is motivating physical activity. Persuasion methods belong to either self-monitoring, social influence or fun interaction. Finally, they suggest that data presentation methods are especially important in wearable devices. Regarding social influence, the authors report studies where positive motivating effects were found, but the boundary conditions of successful social interaction in this context are not clear. In line with this, Schmidt et al. (2015) discuss fitness trackers from the viewpoint of sustaining motivation for using them. They suggest that current trackers are technically sufficient in their ability to capture exercise data, but they fail in supporting users’ motivation due to the data not being connected to a clear personal fitness goal. In a small group study on teenage girls, Toscos et al. (2006) investigated the effect of forming virtual peer groups to support exercise motivation. In a post-trial questionnaire, the participants rated group performance to be the strongest method for motivating behaviour change. Engaging in virtual peer groups appears to transform exercise from a solitary self-monitoring activity to a shared experience. Fausset et al. (2013) report on a two-week trial where older adults (61-69 years old) were given fitness wearables to use within their everyday life. Despite initial enthusiasm, only three of eight participants reported continued intention to use the technology. Inaccurate data collection lead to lowered motivation and trust in the device. Uncomfortable design and a sense of wasting time when using the device were also problems. No users reported issues with the ease of use of the devices in the trial. Fritz et al. (2014) interviewed thirty wearable users (from their twenties to mid-60s) who had of their own volition adopted the devices. The duration of use ranged from 3- 54 months. The sample was slanted towards technology-related professions and early adopters. Results suggest that it is beneficial if the system allows support for social interaction. Fritz et al. (2014) found, in line with Fausset et al. (2013), that the accuracy of exercise data was highly important for the users; “appropriate credit for activities is essential for encouraging physical activity” (Fritz et al 2014, p. 495). 640 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Walden & A. Sell: Wearables and Wellness for the Young Elderly - Transforming Everyday Lives? In a 10-month in-the-wild study of an activity tracker smartphone app, Gouveia et al. (2015) report that only 14% of the participants continued use of the tracker after two weeks. All of the users quit before the ten-month period was over. They found initial adoption to be correlated to the stage of behaviour change; participants who had identified a need and were preparing for an exercise-related behaviour change exhibited the highest adoption rate. Participants who were already active or in the maintenance stage of their behaviour change were much less inclined to adopt the tracker. As high rates of abandonment seem to be the norm for activity trackers, Harrison et al. (2015) investigated barriers to use and users’ workarounds to the barriers. Their participants (aged 18 to 55) reported main barriers to be related to inaccuracy, design and lack of social functionality. Interestingly, Harrison et al. note that most of these barriers were identified in research already ten years ago, suggesting that fitness wearables have not evolved significantly in this time period. Lazar et al. (2015) also investigate reasons to abandon wearables; they conclude central reasons to be irrelevant data, too cumbersome usage and the devices not matching the participants’ conceptions of themselves. Preusse et al. (2016) suggest in a study on older adults’ acceptance of activity trackers, that targeting barriers could increase their acceptance of wellness devices during the deployment-phase of adoption. Meyer et al. (2015) also investigate factors influencing the acceptance and usability of wearables. For a recent systematic review on wearable wellness support, please see Warraich (2016). Discontinuation of use is a clear trend in most studies on fitness wearables. Different writers suggest that sustained use might not always be a necessary goal; if behaviour change is achieved and maintained, the tracker might no longer be needed. On the other hand, there is little evidence that behaviour change is retained in the long run after discontinued use of the wearable. Wearables could play a role in sustaining healthy behaviour also after the initial behaviour change. Users in many of the studies call for social functionality. Also frequently reported are difficulties with the accuracy and meaningfulness of the collected data. Most of the studies focus on working-age participants, but some specifically target older adults (Preusse et al. 2016, Fausset et al. 2013). 2.2 Dimensions of wellness Wellness is a concept, which is often described to contain different dimensions. In a wellness model presented by Hettler in 1976 (National Wellness Institute 2017), six dimensions of wellness were introduced: physical, emotional, occupational, spiritual, intellectual and social. In some models, dimensions such as environmental, cultural and 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 641 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Walden & A. Sell: Wearables and Wellness for the Young Elderly - Transforming Everyday Lives? climate are also included (Diener et al. 2009, Dolan et al. 2008, Helliwell 2005, May 2007). In our research we use the six dimensions most frequently mentioned by wellness researchers (for a comprehensive overview of wellness models, see Sell et al. 2017). The dimensions are interrelated to some extent, Figure 1. Physical wellness is supported by the other dimensions of wellness, and vice versa. In this research we are especially interested in the physical and social dimension. Physical wellness is probably the most well-known dimension of wellness. The benefits of physical activities have been proven in many studies (Galloway and Jokl 2000, Wartburton et al. 2006, Penedo and Dahn 2005). Physical wellness generally refers to an individualś physical health, physical activity level, nutrition, self-care, and vitality or longevity (Miller and Foster 2006; Brown and Alcoe 2010, Anspaugh et al. 2004). Figure 1: Dimensions of wellness 642 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Walden & A. Sell: Wearables and Wellness for the Young Elderly - Transforming Everyday Lives? Social wellness is understood as an “appraisal of one’s circumstances and functioning in society”, components of which are e.g. social contribution – the feeling that one is a valued, contributing and important member of society, and social integration – the feeling of belonging to a community and having something in common with those within one’s social sphere (Keyes 1998, p 122). Humans have an inbuilt need of social interaction, and deprivation of social interactions is known to be detrimental to health (Leist 2013). Loneliness is a known risk factor for the elderly, associated with a heightened risk for depression (Golden et al. 2009), Alzheimer’s disease (Wilson et al. 2007), and coronary disease (Sorkin et al. 2002) as well as an increased risk of mortality among men (Holwerda et al. 2012). We believe that supporting social interaction and consequently social wellness through technology is possible, but the research evidence is only emerging and still scarce (see e.g. Kang 2007 [general population], Chopik 2016, Baecker et al. 2014 [elderly]). Part of our aim is to gain knowledge on how social interaction can be mediated through technology in order to maintain wellness. With social interaction we mean not only face- to-face interaction, but also e.g. interaction that can be same time / different place, different time / different place. Physical activities are known to be related to the social dimension. Social support is known to be a positive predictor for physical activities (Trost et al. 2002). Especially for women this relationship is an important aspect (see e.g. Eyler at al. 1999). Participants and study design This is an exploratory study aiming at gaining a holistic picture to guide further research. We utilize multiple research methods to gain rich data; we employ focus groups, individual interviews, a six-week trial of the target technology divided into three two- week phases with planned interventions, and finally quantitative measurement of the participants’ activity levels collected with the Physical Activity Scale for Elderly (PASE) instrument. The PASE results are not reported in this study, as they did not help us understand the participants better. For the study we recruited five participants, three men and two women, all between the ages of 60-75. All participants were smartphone and computer users, three of the participants also used a tablet computer. None of the participants had experience of wearables. The participants were chosen through purposive sampling with a clear definition on the desired participant profiles. We wanted participants with smartphone experience, within the age range 60 to 75 years old and both male and female. Aron, born 1942 is a medical doctor. He is married and has a yearly income exceeding 50 000 euros. He is an active computer user and he has a smart phone. His hobbies are singing and participating in different groups, for example rotary. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 643 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Walden & A. Sell: Wearables and Wellness for the Young Elderly - Transforming Everyday Lives? Barbara, born 1946 has a bachelor’s degree and was working within international business. She is married and has a yearly income between 30 000 – 40 000 euros. She is using a computer, a tablet and a smart phone on a daily basis. Her main hobby is volunteer work for the Red Cross. Carl, born 1946 is a doctor in business administration and is working as a part-time management consultant in his own company. He is married and has a yearly income between 30 000 – 40 000 euros. He is an active computer user and he has a smart phone. He is playing tennis on a regular basis. Doug, born 1946 has a doctoral degree in political science. He is married and his yearly income exceeds 50 000 euros. He is an active computer user and he has a smart phone. His hobby is cycling. Ellen, born 1940 has a master’s degree in education and has worked in primary education as a language teacher until retirement at age 68. She is divorced and has a yearly income between 30 000 – 40 000 euros. She uses a computer, a tablet and a smart phone. In her free time she goes to the gym, reads and does handicrafts. For the study we had access to the fitness bracelets Fitbit Charge and Polar Loop. Both bracelets offered similar functions: a pedometer, sleep monitoring, watch, and keeping track of reaching a daily activity goal. The Fitbit allowed forming groups of users who could follow each other’s activity levels and send messages to each other. The Fitbit had the possibility of vibrating alarms. Two participants used a Polar Loop, the Fitbit Charge by the remaining three. We divided the study into three two-week long phases: Phase 1 The first phase of the study started in September 2015. Each of the participants was invited to the research institute individually for getting started with the study. The bracelets were set up at the institute together with the participants. The main functionalities were shown individually to the participants and possible questions were addressed. Participants were encouraged to be in touch if any questions or problems would arise. The pilot group was asked to wear the bracelet on their non-dominant hand. They were instructed to only take the bracelet off while showering/going to the sauna /swimming or while charging it. The activity bracelets synchronized automatically with the phones, throughout the day. After two weeks, a telephone interview was made. At the same time the participants received instructions for the following two week phase of the study, phase 2. 644 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Walden & A. Sell: Wearables and Wellness for the Young Elderly - Transforming Everyday Lives? Phase 2 The participants with the Fitbit charge activity tracker were connected with each other, so that they could follow each other’s achievements on the Fitbit application. We wanted to test if this social aspect would have a motivational impact on the users. No manipulation was conducted with the Polar Loop users. After two weeks a telephone interview was again conducted. Also the participants received new instructions for the following two week phase of the study, phase 3. Phase 3 The Fitbit Charge users were promised a free lunch, if they could exceed their steps with 5% from the previous week. All of the three participants managed to do this within the given time-frame. Polar Loop users were not manipulated. At the end of phase 3, a phone interview was conducted. Findings 4.1 Practical insights All the participants completed the six-week bracelet trial successfully and had an overall positive experience. There were some practical issues hampering the usage and usefulness of the bracelets however. One concern shared by all participants was that they like for the wearables to measure also other kind of exercise besides steps, such as cycling, swimming and stretching. Also incidental exercise, such as lifting things or working in the garden does not get recorded. The sleep monitoring was found useful, but not always accurate. At times, the bracelet seemed to record sleep, even if the user was awake. The design of the bracelets themselves received some criticism. The Fitbit was difficult to attach on the arm. The attachment is not secure; the bracelet falls off occasionally, even during the night. The Loop on the other hand was difficult to adjust to the right size; to cut the bracelet and get the pins in place. The Loop attachment was also not secure and would open occasionally by itself. On both bracelets, the text on the screen was easy to see. The information received from the bracelet was seen as enough. The participants lifted out the risk of getting too much information. Also the participants voiced that too many features (such as in smartwatches) might become confusing. An annoyance was that when charging the wearable, it shows as inactivity on the application. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 645 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Walden & A. Sell: Wearables and Wellness for the Young Elderly - Transforming Everyday Lives? The participants felt using the bracelet to be motivating. They moved more and checked the steps regularly and made an extra effort to collect enough steps. The achievements during one day mattered more, than the overall weekly report, since the days are so different. 4.2 General observations Even in this age group, people are not free from peer pressure. One member felt, that it is embarrassing to use a smartphone; many of her friends have not been using computers at work and thus have a skeptical attitude towards technology. This means that elderly taking into use new technology, such as a s fitness bracelet, might benefit from e.g. encouragement from people who matter to the person (see e.g. technology adoption studies). Things that restrict or hinder the participants from exercising were discussed. The fear of walking alone (for women) and not wanting to travel too far in order to be able to exercise were mentioned. The participants were also encouraged to discuss things that might restrict their friends from exercising, in order to lower inhibitions or shame associated to not exercising. Different ailments were mentioned as an obstacle. Being lazy and being too comfortable at home on the sofa were brought forward, and on the other hand that it is difficult to start something new and take the first step. Other activities might restrict participating in physical exercise, such as devoting time to taking care of grandchildren. Being worried about the way one looks might be a restriction. Also there is a worry that gym personnel or personal trainers are not necessarily knowledgeable or interested in the exercise needs of the elderly. The focus group participants felt motivated to exercise due to the bracelets. One of the participants was not a frequent walker before the study, but reported finding the joy of being outside through the bracelet trial. The participants reported also other things which motivate them to be physically active. A dog was mentioned as a great motivator for getting outside, also alleviating the fear of walking alone mentioned by the women in the study. The feeling after exercising is motivating, as well as the physical effects of it, such as losing weight and noticing an increase in your flexibility. One of the themes of the concluding focus group session was different campaigns to promote exercise participation. The focus group participants found benefits in being a member of some social group and doing something together. But they also identified restrictions in this; you cannot walk as fast as you would like to and you have to decide together on a suitable day and time. Virtual campaigns, where the participants are not necessarily exercising at the same time or in the same place on the other hand were criticized for allowing participants to fake that you are doing something while you are not. 646 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Walden & A. Sell: Wearables and Wellness for the Young Elderly - Transforming Everyday Lives? The functions that the participants hoped for in a bracelet were a ‘stop snoring’-alarm and reminders. They also hoped for alerts when the users’ patterns change from the normal, such as sleeping more or less. Body temperature measurement was wished for, as well as possibility to share the data easily with others. The wearable needs to be durable and comfortable to wear in all activities, so it is not forgotten off the hand. It needs to endure swimming, sauna, dirt etc. They also hoped for a GPS function to increase their feeling of safety when moving outside. 4.3 Introducing the social dimension Current research on fitness wearables indicates that they fail to engage users in the long run. Despite giving the user access to more accurate data on e.g. exercise and sleep than is possible through apps, but something seems to be missing. We wanted to investigate what, if any, impact including a social dimension would have. The participants in our focus group shared many common characteristics, but were not members of the same social network from before. Linking three of the participants together with the bracelet and smartphone app had some effects on their exercise behaviour. They reported experiencing positive peer pressure and elements of competition through seeing each other’s achievements. They followed their peers actively and increased their own exercise in order stay ahead of the “competition” or “not be the worst”. Also when we at phase 3 applied some external pressure through promising a reward for all participants who increased their step count with 5% or more, all respondents did reach the target, but they reported their main motivation behind it to be keeping abreast with the other participants rather than the reward. The participants also spontaneously started to send each other supportive messages. The virtual social group enabled the participants to have the feeling of being part of a social activity, without having to deal with the practicalities of actually exercising together and losing their autonomy and independence. Discussion Based on our experience, we believe that introducing functionality to the young elderly in a sequential manner, rather than all at once, might help overcome adoption-related challenges. An overload of functions is likely to happen when introducing a new device, which might cause confusion to such a degree that satisfaction is low and the will to continue using the device is impacted. The young elderly focus group had a clear interest in the wearable, even though they do not match the usually advertised target group. Introducing a social dimension to the wearable seemed beneficial as the young elderly quickly formed a both supportive and competitive relation. This is a novel finding, as 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 647 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Walden & A. Sell: Wearables and Wellness for the Young Elderly - Transforming Everyday Lives? previous research has not highlighted the importance of building in support for the social dimension of wellness in wearables. The social connection formed through the device appeared to be value adding for the participants. The social dimension spurred on the participants to maintain or even increase their level of physical activity, which in itself is an important finding with implications for wellness service design. It seems to at least partially address the previously identified barrier of meaningless data, as giving a social context to the users’ data made it more interesting. As a consequence of this, adding a social dimension would likely aid in lowering the abandonment rate of wellness wearables. The comparison to other users also had a direct impact on the decisions the users were making; the participants could see that their peers were ahead of them in steps and then decide to make their daily walk longer. We found it interesting that the competitiveness was so present and motivational also in this age group. It remains a challenge for future research to investigate whether it is prevalent in the young elderly, and whether it differs between cultures. The trialed devices allowed for social interaction, but we found the functions somewhat limited. With regard to the fact that the social dimension seems to be highly important for motivation, we suggest device manufacturers to put efforts into developing this dimension. For example, the pedometer data is rather one-dimensional and as such might not sustain interest for too long. Adding information about the users’ average speed or length of average walks taken might be interesting for the social group. A social function that the participants hoped to see in future devices was the possibility to see where friends are located in order to join them for exercise. We did not continue to formally follow the participants after the two-month trial, but we have knowledge that at least two of the participants still use the device daily, eighteen months after the trial. This is in itself interesting, as in most studies such long-term use is not achieved. We assume this might be related both to the sequential introduction of functions and the role of the focus group administrator, but this needs to be investigated further. Limitations of the study at hand include the impossibility of replicating individual case studies and the fact that the results and findings might be different if the study participants would have had a different demographic profile, e.g. have less prior knowledge of technology. On the other hand, our study design enabled us to gain a very rich picture of the participants, which will be helpful in informing and designing future studies. To address the limitations of the current study we are continuing our research with a larger, more heterogenic sample and with different research designs (e.g. a survey study). References Amor, J. D. & James, C. J. (2015). Setting the scene: Mobile and wearable technology for managing healthcare and wellbeing. In Engineering in Medicine and Biology Society (EMBC), 37th Annual International Conference of the IEEE, pages 7752-7755. IEEE. 648 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Walden & A. Sell: Wearables and Wellness for the Young Elderly - Transforming Everyday Lives? Ananthanarayan, S. & Siek, K. A. (2012). Persuasive wearable technology design for health and wellness. In Wellness Interventions and HCI Workshop at Pervasive Healthcare 2012, pp. 236- 240, IEEE. Anspaugh, D., Hamrick, M. & Rosato, F. (2004). Wellness: Concepts and Applications 6th ed. Boston: McGraw Hill. Baecker, R., Sellen, K., Crosskey, S., Boscart, V., & Barbosa Neves, B. (2014, October). Technology to reduce social isolation and loneliness. In Proceedings of the 16th international ACM SIGACCESS conference on Computers & accessibility (pp. 27-34). ACM. Brown, C. & Alcoe, J. (2010) The heart of wellbeing, a self- help approach to recovering, sustaining and improving wellbeing. Journal of Holistic Healthcare, 7(1). Carlsson, C. & Walden, P. (2016). Digital Wellness Services for Young Elderly - A Missed Opportunity for Mobile Services. Journal of Theoretical and Applied Electronic Commerce Research, 11(3), pp 20-34. Chopik, W. J. (2016). The benefits of social technology use among older adults are mediated by reduced loneliness. Cyberpsychology, Behavior, and Social Networking, 19(9), 551-556. Diener,E., Wirtz,D., Biswas-Diener,R., Tov.,W., Kim-Prieto,C., Choi,D. & Oishi,S.(2009).New Measures of Well-Being:Flourishing and Positive and Negative Feelings. In E.Diener(ed.). Assessing Well-Being: The Collected Works of Ed Diener, Social Indicators Research Dolan, P., Peasgood,T. & White,M.(2008). Do we really know what makes us happy? A review of the economic literature n the factors associated with subjective well-being. Journal of economic psychology,29, pp.94-122. Eyler, A.A., Brownson, R.C., Donatelle,R.J., King, A.C., Brown,D. & Sallis J.F. (1999). Physical activity social support and middle-and older-aged minority women: results from a US survey.Social Science & Medicine, 49(6) pp 781–789. Fausset,C.B., Mitzner,T.L., Price,C.E., Jones,B.D., Fain,B.W. & Rogers, W. A. (2013). Older adults’ use of and attitudes toward activity monitoring technologies. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol 57, pages 1683–1687. SAGE Publications. Fernandez, P. (2014). Wearable technology: beyond augmented reality. Library Hi Tech News 31(9). Fritz, T., Huang, E. M., Murphy, G. C. & Zimmermann, T. (2014). Persuasive technology in the real world: a study of long-term use of activity sensing devices for fitness. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 487–496. ACM. Galloway,M.T. & Jokl,P. (2000) Aging Successfully: The importance of physical activity in maintaining health and function. Journal of American academy orthopaedic surgeons, 8, pp 37- 44. Gartner report on wearables (2016), http://www.gartner.com/smarterwithgartner/the-present-and-future-of-wearables/. Read on Jan 15th 2017. Golden, J., Conroy, R. M., Bruce, I., Denihan, A., Greene, E., Kirby, M. & Lawlor, B. A. (2009). Loneliness, social support networks, mood and wellbeing in community‐dwelling elderly. International journal of geriatric psychiatry, 24(7), pp694-700. Gouveia, R., Karapanos, E. & Hassenzahl, M. (2015). How do we engage with activity trackers?: A longitudinal study of Habito. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp1305–1316. ACM. Harrison, D., Marshall, P., Bianchi-Berthouze, N. & Bird, J. (2015). Activity tracking: barriers, workarounds and customisation. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp617–621. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 649 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Walden & A. Sell: Wearables and Wellness for the Young Elderly - Transforming Everyday Lives? Helliwell, J.,F. (2002). How’s life? Combining individual and national variables to explain subjective well-being. National Bureau of Economical Research. http:/www.nber.org/papers/w9065. Holwerda, T. J., Beekman, A. T., Deeg, D. J., Stek, M. L., van Tilburg, T. G., Visser, P. J., Schmand, B., Jonker, C. & Schoevers, R. A. (2012). Increased risk of mortality associated with social isolation in older men: only when feeling lonely? Results from the Amsterdam Study of the Elderly (AMSTEL). Psychological medicine, 42(04), pp843-853. Kang, S. (2007). Disembodiment in online social interaction: Impact of online chat on social support and psychosocial well-being. CyberPsychology & Behavior, 10(3), pp475-477. Keyes, C. L. M. (1998). Social well-being. Social psychology quarterly, 121-140. Lazar, A., Koehler, C., Tanenbaum, J. & Nguyen, D. H. (2015). Why we use and abandon smart devices. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pages 635–646. ACM. Leist, A.K. (2013). Social Media Use of Older Adults: A Mini-Revview. Gerontology, 59, pp.378- 384. May, D.(2007). Determinants of well-being. 1-7. Memorial University of New Foundland and New Foundland and Labrador statistic. Agency. http://www.community accounts.ca Meyer, J., Fortmann, J., Wasmann, M. & Heuten, W. (2015). Making lifelogging usable: Design guidelines for activity trackers. In Multimedia Modeling, pp323–334. Springer. Miller, G. and Foster L.(2010). Critical Synthesis of Wellness Literature. University of Victoria. Faculty of Human and Social Development and Department of Geography. National Wellness Institute, The Six Dimensions of Wellness, http://www.nationalwellness.org. Retrieved on April 26th 2017. Noelker, L.S. & Browdie, R. (2014). Sidney Katz MD: A New Paradigm for Chronic Illness and Long-Term Care. Gerontologist 54(1), pp13-20. Penedo,F.J. & Dahn, J.R. (2005). Exercise and well-being: a review of mental and physical health benefits associated with physical activity. Current opinion in psychiatry, 18(2), pp189-193. Preusse, K. C., Mitzner, T. L., Fausset, C. B. & Rogers, W. A. (2016). Older adults’ acceptance of activity trackers. Journal of Applied Gerontology, 36(2):127-155. Schmidt, B., Eichin, R., Benchea, S. & Meurisch, C. (2015). Fitness Tracker or Digital Personal Coach: How to Personalize Training. UbiComp/ISWC’15 Adjunct, September 7-11, 2015, Osaka, Japan, pp1063-1067. ACM. Sadler, W. A. (2006). Changing life options: Uncovering the riches of the third age. LLI Review, 1(1), 11-20. Sell, A., Walden, C. & Walden, P. (2017). My Wellness as a Mobile App. Identifying Wellness Types among the Young Elderly. In Proceedings of the 50th Hawaii International Conference on System Sciences, pp 1473-1483, IEEE. Sorkin, D., Rook, K. S & Lu, J. L. (2002). Loneliness, lack of emotional support, lack of companionship, and the likelihood of having a heart condition in an elderly sample. Annals of Behavioral Medicine, 24(4), 290-298. Starner, T. (2014). How Wearables Worked their Way into the Mainstream. IEEE Pervasive Computing 13(4). Toscos, T., Faber, A., An, S. & Gandhi, M.P. (2006). Chick Clique: Persuasive Technology to Motivate Teenage Girls to Exercise. CHI 2006, April 22-27, 2006, Montréal, Québec, Canada, pp 1873-1878, ACM. Trost, S.G., Owen, N., Bauman, A.E., Sallis, J.F. & Brown, W. (2002). Correlates of Adults’ participation in physical activity: review and update. Med Sci Sports Exerc., 34(12):1996-2001 Warburton,D., E.,R., Nicol.,C.,W. & Bredin, S.,D.(2006). Health benefits of physical activity: The evidence. CMAJ, 174(6), pp801–809. 650 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) C. Walden & A. Sell: Wearables and Wellness for the Young Elderly - Transforming Everyday Lives? Warraich M. U (2016). Wellness Routines with Wearable Activity Trackers: A Systematic Review, MCIS 2016 Proceedings. 35. http://aisel.aisnet.org/mcis2016/35 Wilson, R. S., Krueger, K. R., Arnold, S. E., Schneider, J. A., Kelly, J. F., Barnes, L. L., ... & Bennett, D. A. (2007). Loneliness and risk of Alzheimer disease. Archives of general psychiatry, 64(2), 234-240. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Reviewing Organizational Design Components for Digital Business Strategy 46 TIMO WEINRICH Abstract The view on information technology strategy has changed significantly. In the past, a functional-level view was prevailing, where information technology (IT) strategy was subordinate to a deliberate business strategy and needed alignment. Recently, rapid developments in digital technologies leaves no industry untouched and IT becomes an enabler and differentiator for businesses. Therefore, IT strategy exceeds the view of alignment towards a fusion of business- and IT-strategy– coined as digital business strategy (DBS). Yet, strategies are inextricably linked to organizational design in order to function well. Consequently, a DBS requires a suitable underlying organizational design. This paper aims to explore the very organizational design components for DBS by examining the state of the art literature. Specifically, this paper sheds light on the organizational design components of strategy, structure, processes, rewards, and people. The research method is a review of relevant literature at the intersect of information systems (IS) and management. Conclusions, implications for research and practice are presented. Keywords: • Digital Business Strategy • Organizational Design • Literature Review • CORRESPONDENCE ADDRESS: Timo Weinrich, University of Goettingen, Chair of Electronic Finance and Digital Markets, Platz der Göttinger Sieben 5, 37073 Göttingen Germany, e-mail: timo.weinrich@wiwi.uni-goettingen.de. https://doi.org/10.18690/978-961-286-043-1.46 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 652 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Weinrich: Reviewing Organizational Design Components for Digital Business Strategy Introduction In the past, the predominant view on IT strategy was a functional-level view. IT strategy was treated subordinate to a deliberate business strategy and needed to be aligned with it (Henderson & Venkatraman, 1993; Venkatraman, 1994). However, steady improvements in price/performance ratio of technology as well as advances in information, computing, communication, and connectivity technologies bring new functionalities, which affect society and economy at large. In today’s uncertain environment, IT supplies crucial dynamic capabilities and becomes an imperative part of strategy formulation (O. A. El Sawy, A. Malhotra, Y. Park, & P. A. Pavlou, 2010; Yoo, Henfridsson, & Lyytinen, 2010). For example, digital technologies (combinations of information, computing, communication, and connectivity technologies) have the power to change business strategy towards a cross functional, modular, distributed nature with global business processes that ”enable work to be carried out across boundaries of time, distance and function” (Bharadwaj, El Sawy, Pavlou, & Venkatraman, 2013, p. 472). To capture this development, Mithas and Lucas (2010) and Omar A El Sawy, Arvind Malhotra, YoungKi Park, and Paul A Pavlou (2010) introduced the concept of DBS: Instead of viewing IT strategy subordinate to business strategy, the authors conceptualize a fusion of business strategy and IT strategy. The concept promotes the view, that IT strategy is much more than just a functional strategy because, nowadays, digital resources are an integral part of almost every organizational area. Digital technologies can create a differential value and increase innovative strength to generate a competitive advantage. Consequently, they are more than just systems and technologies (Bharadwaj et al., 2013). Bharadwaj et al. (2013) further elaborate on the DBS concept and provide a general understanding of DBS. The authors identify key themes and possible research directions, which the authors center around scope, scale, speed and sources of value creation and capture of DBS. (i) scope: DBS transcends functional areas, digitization of products and services, disruption of traditional supply chains towards ecosystems; (ii) scale: scaling of IT as an adaptive capability, network effects enabled by multisided platforms, information abundance, scaling via partners; (iii) speed of: product launches, decision making, supply chain orchestration, network formation and adaptation; (iv) sources of value creation and capture: increased value from information, value creation from multisided business models, value creation through coordinated business models in networks and value appropriation through the control of digital industry architecture. Whereby, Bharadwaj et al. (2013) remark that the identified trends and organizational shifts are merely illustrative and not exhaustive. Yet, any strategy needs a matching organizational design in order to be carried out. The organizational design may unleash organizational capabilities (combination of skills, processes, technologies, and human abilities that differentiate a company), which in turn can translate to a competitive advantage – the overall purpose of strategy (Kates & Galbraith, 2010). Any change in strategy requires a change of organizational design (Dosi, Nelson, & Winter, 2001). Thus, organizations that pursue a DBS also need a matching organizational design that is different from “traditional designs” (Bharadwaj et 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 653 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Weinrich: Reviewing Organizational Design Components for Digital Business Strategy al., 2013). Similarly, Matt, Hess, and Benlian (2015, p. 341) state “with different technologies in use and different forms of value creation, structural changes are often needed to provide an adequate basis for the new operations. Structural changes refer to variations in a firm’s organizational setup […]”. Such organizational changes are independent of the industry or organizations and usually have certain aspects in common (Matt et al., 2015). In sum, a novel organizational design under DBS is acknowledged, but research that explicitly addressees and reviews this subject is scarce. Therefore, the following research question is formulated to address this research gap: “What is the state of knowledge on organizational design in the context of digital business strategy?” In order to answer the research question, we adopt the organizational design perspective of Galbraith (1977), a well-established organizational design framework, which consists of five interrelating categories: strategy, structure, processes, rewards, and people (see 2.2 Framework). Accordingly, the unit of analysis is on the organizational level perspective. Methodology 2.1 Literature Review Paré, Trudel, Jaana, and Kitsiou (2015) provide a detailed view on different review types. The authors develop a typology shown in “Table 1: literature review types”, including a brief description of each type: Table 1: Literature review types by Paré et al. (2015) Review Type Description Narrative Unstructured approach to identify existing knowledge on a certain topic or subject Descriptive Structured approach to identify existing knowledge on a certain topic or subject Scoping/ mapping Uncovering the amount and nature of literature on a certain topic Meta-analyses Quantitative evaluation of similar studies by combining their data Qualitative Qualitative evaluation of similar studies by combining their systematic reviews data Umbrella/overview Integrates multiple systematic reviews (quantitative or qualitative) Theoretical Draws on multiple existing studies (empirical and conceptual) and transcends them to a model or higher conceptual framework Realist/ meta- Theory driven to inform, enhance, extend or supplement narrative existing reviews Critical Analyzes existing knowledge and reveals inconsistencies, contradictions, controversies or weaknesses 654 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Weinrich: Reviewing Organizational Design Components for Digital Business Strategy This piece of research is most in line with a descriptive review type because it shares numerous aspects with this type: (i) it summarizes the prior knowledge, (ii) the scope of the research question is relatively broad, (iii) the search process (following paragraph) is comprehensive, (iv) the identified literature is of conceptual and empirical nature, (v) the identified literature is selected via certain predefined selection criteria (following paragraph), (vi) due to the relatively young phenomenon of DBS, an appraisal for only high quality is not the focus (vii) synthesizing and analyzing the identified literature centers thematically around a given framework (following section) (Paré et al., 2015). A detailed and systematic search process is important to yield a rigorous, unbiased, objective, transparent and replicable review. Therefore, a review should provide explicit information on how the literature is identified, selected, assessed and synthesized. First, it should outline the research question(s), sources searched, search terms, search strategy and inclusion / exclusion criteria. Afterwards, the actual search is performed. The relevant literature is selected according to the chosen selection criteria and subsequently analyzed. Evidence is summarized and presented (Boell & Cecez-Kecmanovic, 2014; Wolfswinkel, Furtmueller, & Wilderom, 2013). The research questions, already presented in the introduction, is ”What is the state of knowledge on organizational design in the context of digital business strategy”. The initial keyword search for the topic relevant literature is conducted by drawing on 50 major IS journals and 16 IS conferences as proposed by Levy and Ellis (2006, p. 186). It is complemented by the Financial Times 50 list (FinancialTimes, 2017). In doing so, the scope of our search covers the dual aspects of DBS and organizational design for this study, i.e., management literature on the one hand and IS literature on the other hand. In the following, the three major steps to conduct this literature review are presented: (i) keyword search, (ii) backward search and (iii) forward search (Webster & Watson, 2002): (i) The keywords applied for searching within the journals and conference proceedings are "digit* business strateg*" OR "digit* strateg*", whereby asterisks are placed to cover any variation of the words. The keyword search is applied to peer-reviewed only and title, abstract and keywords fields (if not available, full text). The selection for relevant articles takes places by reading the title, keyword, and abstract first (or further if still unclear). The criteria for judging the relevancy of the obtained articles is an explicit (i) linkage to DBS and (ii) linkage to the organizational design framework (following section 2.2 Framework). (ii) The next step is to perform a backward search, i.e., reviewing the citations of all relevant articles identified during the keyword search. Applying the same selection criteria for the backward search one obtains relevant prior articles that should be considered for this study. (iii) Finally, the last step is the forward search, which is the process of identifying relevant articles that build on the previously identified articles, also known as cited by. For this process, Web of Science and Google Scholar are used because 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 655 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Weinrich: Reviewing Organizational Design Components for Digital Business Strategy both search engines proved to show occasionally diverging search results and therefore complement each other. Again, for this step the introduced relevancy criteria are applied, which resulted in the final sample of 39 articles (see section 6 Appendix “Table 2: concept matrix of analyzed articles and organizational design components”). 2.2 Framework Organization design can be viewed as a chain of decisions and choices and collectively refers to the “process of configuring structures, processes, reward systems, and people practices to create an effective organization capable of achieving the [digital] business strategy” (Kates & Galbraith, 2010, p. 1). Initially, it originates from Galbraith (1977) well-established organizational design framework that consists of the intertwined components of strategy, structures, processes, rewards and people. The following paragraph introduces each component briefly. The component strategy determines a company’s course of action and can be understand as the cornerstone of the organizational design. It origins from the decision-makers’ understanding of the various environmental influences such as new technologies, competitors, customers, suppliers etc. Essentially, it is the success formula to gain a competitive advantage and differentiation. Structure refers to the organizational chart and key roles. Some common types of organizational structures are functional, product, geographic, or customers-centric structures. It represents the possibilities of how to group different people together in an organization. Furthermore, it clarifies responsibilities, decision-making powers, and authorities. The component processes refers to any connected activity that is linked with the information flow within and across an organization. Processes dissolve collaboration barriers that may result from an organizations’ structure. Well-designed processes ensure that e.g., the right people find each other to innovate a new product. Processes can determine mechanisms for collaboration and therefore how well units within and across organizations work together. Rewards have the purpose to harmonize the behavior and performance of individuals with the overall goals of an organization. It includes e.g., rewards based on measures or variable compensation. The component people contains practices like selecting, training, staffing and developing of people to gain desired capabilities and a mind-set to successfully execute the strategy. This may include e.g., competencies like interpersonal skills and decision making capabilities such as considering multiple points of view (Kates & Galbraith, 2010). 656 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Weinrich: Reviewing Organizational Design Components for Digital Business Strategy Findings The following subsections present the findings of the identified literature on DBS and organizational design along the framework’s components of strategy, structure, processes, rewards, and people. Whereby, the appendix includes a summarizing table “Table 2 Concept matrix of analyzed articles and organizational design components” and figure “Figure 1: Cumulative articles published on DBS and organizational design components”. 3.1 Strategy Following a DBS implicates establishing new capabilities, e.g., process-, customer and performance management (Mithas, Agarwal, & Courtney, 2012). Specifically, organizations desire an increased agility and responsiveness, multi-channel ecosystem connectivity, visualization and governance of data and information. In order to obtain this, organizations need to invest in multiple IT-enabled efforts (Freitas Junior, Maçada, Brinkhues, & Montesdioca, 2016). In fact, Mithas, Tafti, and Mitchell (2013) show that under higher industry dynamics, organizational spending differs for DBS related activities and vice versa for industry growth and concentration. Technology related investments may allow organizations to solve ambidextrous strategies, like a DBS, because it often involves pursuing multiple goals at once e.g., by following revenue growth and cost reduction at the same time (Bonchek & France, 2015; Mithas et al., 2012). However, Woodard, Ramasubbu, Tschang, and Sambamurthy (2013) show that organizations are path-dependent when it comes to designs of their existing digital artifacts. The authors refer to “design moves”, resulting options/debt of past investments that enable/constrain strategic actions of organizations. Strategic paths can also be disrupted via a destabilization of self-reinforcing mechanisms resulting from digitalization (Wenzel, Wagner, Wagner, & Koch, 2015). Though, DBS is not only about optimizing internal operations or responding to single competitors, it is also about the responsiveness and awareness of the whole competitive environment (Mithas et al., 2013). This may open up new choices for digital business models, like Netflix, who first started with efficient delivery system of physical DVDs and later, due to digitization of media, the organization seized the opportunity and became the market leader for online media streaming (Mithas & Lucas, 2010). Therefore, IT does not just support strategic goals but increasingly becomes an enabler of strategic goals (Hess, Matt, Benlian, & Wiesböck, 2016). As strategy originates from the decision makers understanding of environmental influences (Kates & Galbraith, 2010), for DBS, this is the case for pervasive digital technologies (Bharadwaj et al., 2013). Digital technologies are an integral part of DBS formulation (Yoo et al., 2010). In line, the identified literature shows, that many DBS of organizations encompasses engaging in harnessing digital technologies to gain a competitive advantage and differentiation. This includes engaging in social media for various purposes. Organizations increasingly use social media such as wikis or blogs for internal and external communication and collaboration (Delerue & Vuori, 2012; Ross et al., 2016). Regarding social networks, 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 657 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Weinrich: Reviewing Organizational Design Components for Digital Business Strategy organizations leverage and create value from it by fostering additional transactions out of social media relationships. Catlin, Patiath, and Segev (2014) emphasize to digitally connect with (existing) customers by extending digital marketing activities, to retain customers and improve cross- and up-selling. A more nuanced view is provided by Oestreicher-Singer and Zalmanson (2013), who demonstrate that social media should not just be a substitute to offline marketing activities. In order to generate value from social media, organizations need to “[…] take a strategic rather than techno-centric view of social media, that integrate social media into the consumption and purchase experience” (Oestreicher-Singer & Zalmanson, 2013, p. 591). However, social media does not always complement organization’s DSB. Increasingly, social media companies compete with e.g., news media or mobile services providers (Palekar & Sedera, 2015). Yet, social media is much more of just another customer touchpoint. Next to wearables, tracking customers via cookies or app permissions etc., social media is a valuable source of information. For example, combined with data analytics it yields customer insights and a better customer understanding (Catlin et al., 2014). Analytics can provide meaningful insights and enable organizations to scale recommendations and offer products and services on a highly personalized level (Bonchek & France, 2015; Ross et al., 2016). Thus, the analysis of large data is often an integral part of DBS to e.g., become a more customer centric organization because ”[…] the buyer, not the seller, determines which dimensions of value matter and how offers compare” (Keen & Williams, 2013, p. 644). Other application fields of analytics within DBS also include the support for strategic and tactical decision-making and business processes (Watson, Wixom, Hoffer, Anderson- Lehman, & Reynolds, 2006). In sum, analytics of large datasets are a key under DBS (Bhimani, 2015) and has the power to create a sustainable competitive advantage (Erevelles, Fukawa, & Swayne, 2016). Next to social media and analytics, cloud computing is also frequently mentioned within the identified articles. Yet, Goutas, Sutanto, and Aldarbesti (2015) highlight, that many organizations simply adopt it without having a clear DBS. In order to unleash the full potential of cloud computing, it not only has to fit to the existing processes and systems, but also has to be part of an overall DBS. DBS on cloud computing usually encompass the intention for optimization, innovation and/or disruption (Berman, Kesterson-Townes, Marshall, & Srivathsa, 2012b). Nevertheless, the overall focus should be the value creation to customers by e.g., increasing software security and customization. Only then, cloud computing enables DBS to transition to new, digital business models (Berman, Kesterson-Townes, Marshall, & Srivathsa, 2012a). Likewise, in a qualitative study Cowen, Johnston, and Vuke (2016) show, how cloud computing increasingly becomes an integral part of organizations DBS in a developing country. Their main findings indicate that via cloud solutions, organizations achieve a better return on capital, improved quality and efficiency, better customer relationship and innovation acceleration and it has a cultural impact. Finally, Ross, Beath, and Sebastian (2015) highlight that, in order to realize a competitive advantage from digital technologies in general, organizations need to gain a holistic 658 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Weinrich: Reviewing Organizational Design Components for Digital Business Strategy picture and not just focus on individual solutions. This means, to invest with caution, to achieve integrated and not just isolated solutions. For example, not only to just invest in mobile technology by offering apps and customer service (Catlin et al., 2014). Overall, “ […] a strategic focus that directs their technology spending [on] social, mobile, analytics, cloud, and internet of things technologies” (Ross et al., 2015, p. 2), is needed to foster new capabilities that make sense for DBS. 3.2 Structure To implement a DBS successfully, organizations have to align their structure correspondingly. Literature shows, that there are several common practices for DBS. In general, Catlin et al. (2014) emphasize, that the governance and operating model need to fit to the organizations “digital maturity”. Together with an increasing digital maturity a lot of the organizational functions become decentralized and embedded in business unit activities. Increasingly, organizations create units that consist of cross-functional teams e.g., of technology and operation for business lines, to achieve a better responsiveness (Sia, Soh, & Weill, 2016). Others contributions highlight the launch of innovation labs detached from an organization (Ross et al., 2015). In sum, organizations need to decide how to integrate digital operations into their existing structures or separate it from the core business (Hess et al., 2016). Additionally, DBS needs to be communicated organization-wide by the senior management and managers at all levels across an organization should be enlisted in technology decisions. In so doing, Mithas and Lucas (2010) and Sia et al. (2016) point out, that the CEO, CIO and the senior management need to work tightly together to execute a DBS. For example, the “CIOs must engage their business counterparts to shape IT decisions and create buy-in for IT efforts” (Mithas & Lucas, 2010, p. 4). Likewise, not all power over the DBS should be located at a single department, for example, at the marketing department, which might only lead to customers’ attention shortly but will not provide sustainable value (Haque, 2015). Some organizations introduce a Chief Digital or Data Officer (CDO), a dedicated position within an organization who is in charge of the DBS. In this case, too, interactions and collaboration between the CDO and the other management is critical for DBS success. The CDO role, tasks, responsibilities and reporting structure need to be articulated clearly – particularly with respect to the CIO as a neighbored manager (Haffke, Kalgovas, & Benlian, 2016; Hansen & Sia, 2015; Horlacher, 2016). Especially, since it is known that a tight CIO-CEO reporting structure is beneficial for differentiation (Banker, Hu, Pavlou, & Luftman, 2011). Thus, the reporting structure needs to fit to the DBS of an organization. In sum, DBS affects the whole organizational structure along with the power over the DBS execution, which may vary from organization to organization (Hess et al., 2016). In line, Matt et al. (2015) come to the conclusion, that there is no distinct answer, who should be in charge of the DBS. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 659 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Weinrich: Reviewing Organizational Design Components for Digital Business Strategy 3.3 Processes As introduced, the component processes refers to any connected activity that is linked with the information flow within and across the organization. The following paragraphs highlight the (i) information flow within an organization, (ii) the information flow from the outside in and, (iii) from the inside out of an organization. First, the credo for DBS is “what can be digitized will be digitized” to cut costs and increase service quality. Therefore, digitization, optimization and standardization of processes are imperative to allow for e.g., straight-through processing or and rapid product configuration (Catlin et al., 2014; Hess et al., 2016; Ross et al., 2016). As already mentioned for the component structures, teams from different departments or innovation labs are a common practice. The intention is to achieve a culture of experimentation, agility for innovation processes and an increase in the speed of product launches. This includes “test-and-learn” processes and allow failures as an example for new product development and as a part of the innovation process (Bonchek & France, 2015; Ross et al., 2016; Sia et al., 2016). It is increasingly encouraged that every employee can participate and give feedback (Sia et al., 2016). Additionally, social media is often used to internally or externally crowdsource ideas (Delerue & Vuori, 2012). Under DBS sophisticated customer service processes are gaining more and more importance to achieve customer orientation and customer response in order to answer changing customer demands. Setia, Venkatesh, and Joglekar (2013, p. 585) exemplarily state that for ”[…] the sophistication of customer service processes and goals of customer service performance, firms may customize their initiatives to build effective digital designs across customer service units”. Second, nowadays organizations usually operate within whole business ecosystems and make use of shared products and platforms and processes become increasingly commoditized. Markus and Loebbecke (2013) introduced the term “commoditized processes”, which are processes that are conducted in the same way, for example by using SAP or Salesforce. In contrast, standardized processes can still be customized individually e.g., an industry norm. Organizations that use commoditized processes do not necessarily have to interact in some way, but it can accelerate activities like (future) partnering or outsourcing (Markus & Loebbecke, 2013). Yoo et al. (2010) point out, that it can be a challenge for organizations to coordinate and manage distributed and dynamic processes of maintaining and designing IT infrastructures at a corporate level. Nevertheless, it is not a question of if but how to interface to customers, partners and suppliers because they are a critical source of innovation under DBS (Keen & Williams, 2013). More and more, organizations need to be able to integrate and process heterogenic internal and external information and knowledge resources. Being able to combine and store data from various databases can be used for different fields of application (Ross et al., 2016), such as a seamlessly omni-channel experience for customers (Hansen & Sia, 2015) or speed up the decision making process by using e.g. real-time business intelligence (Watson et al., 2006). In addition, it becomes increasingly important to not 660 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Weinrich: Reviewing Organizational Design Components for Digital Business Strategy only know the customer but also to process and lever relevant information e.g., via analytics as shown in the subsection strategy (Bonchek & France, 2015). This also requires integrating different sources of information such as new channels like apps, social media and webpages, not only with traditional offline channels but also with the inventory management system (Oestreicher-Singer & Zalmanson, 2013; Ross et al., 2015; Ross et al., 2016). Third, in today’s world of ubiquitous information, stakeholder of an organization like their customers are empowered, well informed and want organizations to be transparent about their product quality, features, etc. in order to trust them (New, 2010). Therefore, organizations need to take care of the process, which and how information flows from the inside out. Granados and Gupta (2013) argue that transparency is a relevant part of DBS and organizations should selectively and strategically disclose information to their stakeholders. Nevertheless, Grover and Kohli (2013) debate, that organizations need to be cautious about exposing systems’ software, process, and information, which might expose strategic intentions to competitors and thus potentially give away a competitive advantage. In line, Dewan, Freimer, and Jiang (2007) highlight that transparent information, such as stock and price information, could also be used by competitors and not only by customers. In sum, under DBS the information flow out of an organization can be described as a balancing act of giving away just the right information to stakeholders (Grover & Kohli, 2013). 3.4 Rewards The organizational design component rewards shows the fewest results in the literature. Only Catlin et al. (2014) emphasize that organizations need to reward a more risk-taking behavior, which should yield in a test-and-learn culture. However, the authors are not explicit on how this behavior is rewarded only that “digital spend [should be] measurable in terms of return on investment.” (Catlin et al., 2014, p. 3). Similarly, when it comes to the specific person(s) that are in charge of the DBS endeavor, their incentives should be directly linked to the target and progress of the DBS (Matt et al., 2015). 3.5 People The role of digital talents is crucial for organizations that engage in DBS because new skillsets are required as digital technologies impact organizations at large (Hess et al., 2016). For example, it requires managers not only to think in terms of business or IT but with a deep understanding of DBS (Bonchek & France, 2015). Specifically, competencies and knowledge is required on how to synchronize IT and business strategy, IT governance, implement IT projects, and manage the organizational IT infrastructure in order to be successful in DBS (Haffke et al., 2016; Hansen & Sia, 2015; Mithas et al., 2012; Mithas & Lucas, 2010; Valentine & Stewart, 2015). Leaders need to be open towards innovation and know how digital technologies and ubiquitous information affect their organization. This also includes an organization’s ecosystem, which consist of their 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 661 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Weinrich: Reviewing Organizational Design Components for Digital Business Strategy stakeholders like customers, alliances, employees, suppliers etc. Such an understanding is the foundation to lever digital resources and create value for an organization (Bennis, 2013; Favaro, 2016; Sia et al., 2016). In so doing, it may help an organization to preserve a competitive advantage or to gain new competencies and define a new competitive advantage (Mithas et al., 2012; Mithas & Lucas, 2010). Nevertheless, managers need to be capable to communicate the DBS and their beliefs organization wide to create a common understanding (Mithas & Lucas, 2010). This is especially important because DBS affects the whole organization and any change may bring resistance to some degree (Matt et al., 2015). Digital talents can either be recruited externally or internally, by hiring people with the sufficient experience from academic institution or other (digital) organizations, mergers and acquisitions or training via dedicated digital training programs (Catlin et al., 2014; Hess et al., 2016; Matt et al., 2015). Summary and Conclusion Overall, this literature review contributes to the body of DBS and organizational design. It sheds light on DBS and organizational design by specifically looking at the components of strategy, structure, processes, rewards and people (Bharadwaj et al., 2013; Galbraith, 1977). Considering strategy, it is evident, that digital technologies have to be an integral part of DBS. Yet, the majority of identified articles specializes on certain digital technologies under DBS and do not treat them in a holistic manner as frequently emphasized (Ross et al., 2015). Additionally, there is a strong focus on harnessing cloud computing, analytics and social media under DBS. Whereas, mobile technologies are underrepresented but not less important (Cisco, 2017). In terms of structures, this piece of research points out that under DBS organizational functions become increasingly decentralized. It is also evident that the reporting structures and decision-making power shifts since DBS is an organization-wide endeavor and needs orchestration within and across the organization. However, how organizations achieve this is quite heterogeneous (Matt et al., 2015). Regarding the component processes, an increasing interfacing with the ecosystem, which includes customers, partners, suppliers and possibly competitors, is key. Organizations need to be capable to lever their ecosystem because it is a critical source of value creation by e.g., fostering innovation (Keen & Williams, 2013). Regarding the component rewards, this literature review found surprisingly little on harmonizing individual behavior with the overall goal of an organization. While literature mentions the importance of this aspect, only little information is given. Finally, the component people shows that to follow a DBS, digitally skilled employees and leaders are needed, which understand digital technologies, their strategic implications and know how to create business value from it. Overall, this literature review is able to show that in order to carry out a DBS, organization design requires a large shift. Yet, the presented organizational design components for DBS should not be treated mutually exclusive but as interrelating components, which need to be closely aligned to complement each other to be successful. 662 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Weinrich: Reviewing Organizational Design Components for Digital Business Strategy Limitations of this literature review exist because, for example, an organizational design perspective is adopted, which inhibits an in depth examination of DBS from an ecosystem perspective – another important aspect of DBS e.g., Pagani (2013). Additionally, only literature is included that explicitly refers do digital strategy / digital business strategy and components of the framework. This contribution has practical and research implications likewise. The practical implications highlight the need for a suitable organizational design under DBS. In doing so, this review also shows practical audience, common organizational shifts for the components strategy, structures, processes, rewards and people. These design components are directly under the control of leaders and, therefore, organizations pursuing a DBS can draw from these insights and transfer them to their organizational context. Moreover, companies should reconsider existing portfolios of single DBS speedboat initiatives and treat them in a more holistic manner by orchestrating them. By doing so, the initiatives complement each other meaningfully and unleash their full potential. Common research implications for literature reviews are uncovering research gaps and pinpointing possible future research questions. Thus, a review typically can give guidance for future research (Webster & Watson, 2002). For strategy, future research directions encompass how and which single and formerly isolated digital technology solutions complement each other. Due to this, future research is emphasized to yield an integrative and holistic picture of digital technologies under DBS. In addition, mobile devices are getting smarter and mobile data traffic is increasing exponentially (Cisco, 2017). Yet, their implications for DSB are still not fully examined and require future research. For the component structure, one can observe heterogeneous approaches of organizations. Therefore, an analysis of which structure may lead to superior organizational performance is emphasized. This may include reporting structures and distribution of power in general, new roles like the CDO, team settings like cross-functional teams etc. For the component processes, integrating and analyzing different sources of large amounts of information becomes increasingly important differentiator and a source of value. Yet research at the intersection of DBS and digital business infrastructure, i.e., how do incumbent firms build a digital business infrastructure, is still scarce. Another research gap is evident for the component rewards. Future research may look at how to harmonize individual behavior with DBS, including metric and measures. Finally, organizational design can influence not only organizational performance but also organizational culture (Kates & Galbraith, 2010). Organizational culture is an output of the “[...] cumulative design decisions that have been made in the past and of the leadership and management behaviors that result from those decisions.“ (Kates & Galbraith, 2010, p. 3). This means leadership cannot directly influence organizational culture but indirectly via the organizational design. The impact of DBS on organizational performance has been proposed and examined in some recent contributions, e.g. (Freitas Junior et al., 2016; Leischnig, Wölfl, & Ivens, 2016). However, little is known on how culture changes or looks like under an organizational design for DBS. Therefore, future 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 663 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Weinrich: Reviewing Organizational Design Components for Digital Business Strategy research should elaborate on this topic. Additionally, drawing on a different framework for DBS could yield additional insights. Finally but yet importantly, a change in organizational design under DBS indents to unleash new capabilities, that in turn may lead to a new business models (DaSilva & Trkman, 2014). Thus, questioning, what are new or typical business models resulting from pursing DBS with a corresponding organizational design. Appendix Table 2: Concept matrix of analyzed articles and organizational design components. S=social media, M=mobile technologies, A=analytics C=cloud computing, G=general, IN=information flow within an organization, OI=information flow outside in of an organization IO=information flow inside out of an organization. # Reference Strategy Structu Process Rewa Peop re rd le I O I S M A C G N I O 1 Banker et al. (2011) • 2 Bennis (2013) • 3 Berman et al. (2012) • 4 Bharadwaj et al. (2013) • 5 Bhimani (2015) • 6 Bonchek and France (2015) • • • • • 7 Catlin et al. (2014) • • • • • • • 8 Cowen et al. (2016) • 9 Delerue and Vuori (2012) • • 1 • 0 Dewan et al. (2007) 1 • 1 Erevelles et al. (2016) 1 • 2 Favaro (2016) 1 • 3 Freitas Junior et al. (2016) 1 Oestreicher-Singer and Zalmanson • • 4 (2013) 1 • 5 Goutas et al. (2015) 1 • 6 Granados and Gupta (2013) 1 • 7 Grover and Kohli (2013) 1 • • 8 Haffke et al. (2016) 1 • • • 9 Hansen and Sia (2015) 664 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Weinrich: Reviewing Organizational Design Components for Digital Business Strategy 2 • 0 Haque (2015) 2 • • • • 1 Hess et al. (2016) 2 • 2 Horlacher (2016) 2 • • • 3 Keen & Williams (2013) 2 • 4 Markus and Loebbecke (2013) 2 • • • 5 Matt et al. (2015) 2 • • • 6 Mithas and Lucas (2010) 2 • 7 Mithas et al. (2013) 2 • • 8 Mithas et al. (2012) 2 • 9 New (2010) 3 • 0 Palekar and Sedera (2015) 3 • • • • 1 Ross et al. (2016) 3 • • • • • • • 2 Ross et al. (2015) 3 • 3 Setia et al. (2013) 3 • • • 4 Sia et al. (2016) 3 • 5 Valentine and Stewart (2015) 3 • • 6 Watson et al. (2006) 3 • 7 Wenzel et al. (2015) 3 • 8 Woodard et al. (2013) 3 • • 9 Yoo et al. (2010) 1 6 2 8 4 12 7 9 4 2 12 Sum 1 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 665 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Weinrich: Reviewing Organizational Design Components for Digital Business Strategy 39 30 19 20 9 5 6 1 2 2 2 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 Figure 1: Cumulative articles published on DBS and organizational design components. The numbers on the line represent the cumulative articles published up to the corresponding year. References Banker, R. D., Hu, N., Pavlou, P. A., & Luftman, J. (2011). CIO Reporting Structure, Strategic Positioning, and Firm Performance. MIS Quarterly. 35 (2), 487-504. Bennis, W. (2013). Leadership in a Digital World: Embracing Transparency and Adaptive Capacity. MIS Quarterly. 37 (2), 635-636. Berman, S. J., Kesterson-Townes, L., Marshall, A., & Srivathsa, R. (2012a). How Cloud Computing Enables Process and Business Model Innovation. Strategy & Leadership. 40 (4), 27-35. Berman, S. J., Kesterson-Townes, L., Marshall, A., & Srivathsa, R. (2012b). The Power of Cloud: Driving Business Model Innovation. IBM Institute for Business Value. Bharadwaj, A., El Sawy, O. A., Pavlou, P. A., & Venkatraman, N. (2013). Digital Business Strategy: Toward a Next Generation of Insights. MIS Quarterly. 37 (2), 471-482. Bhimani, A. (2015). Exploring Big Data’s Strategic Consequences. Journal of Information Technology. 30 (1), 66-69. Boell, S. K., & Cecez-Kecmanovic, D. (2014). On Being ‘Systematic’ in Literature Reviews in IS. Journal of Information Technology. 30 (2), 161-173. Bonchek, M., & France, M. (2015). The Best Digital Strategists Don't Think in Terms of Either/Or. Harvard Business Review. 1-5. Catlin, T., Patiath, P., & Segev, I. (2014). Insurance Companies' Untapped Digital Opportunity. Harvard Business Review. 1-5. Cisco. (2017). Mobile Forecast Projects 70 Percent of Global Population Will Be Mobile Users. Retrieved 02.03.2017, from https://newsroom.cisco.com/press-release- content?articleId=1741352. 666 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Weinrich: Reviewing Organizational Design Components for Digital Business Strategy Cowen, D., Johnston, K. A., & Vuke, K. (2016). How Cloud Computing Influences Business Strategy Within South African Enterprises. In: Proceedings of the IEEE International Conference on Emerging Technologies and Innovative Business Practices for the Transformation of Societies (EmergiTech), 272-278. DaSilva, C. M., & Trkman, P. (2014). Business Model: What It Is and What It Is Not. Long Range Planning. 47 (6), 379-389. Delerue, H., & Vuori, M. (2012). Exploring Uses of Social Media in a Global Corporation. Journal of Systems and Information Technology. 14 (2), 155-170. Dewan, R. M., Freimer, M. L., & Jiang, Y. (2007). A Temporary Monopolist: Taking Advantage of Information Transparency on the Web. Journal of Management Information Systems. 24 (2), 167-194. Dosi, G., Nelson, R., & Winter, S. (2001). The Nature and Dynamics of Organizational Capabilities: OUP Oxford. El Sawy, O. A., Malhotra, A., Park, Y., & Pavlou, P. A. (2010). Research Commentary-Seeking the Configurations of Digital Ecodynamics: it Takes Three to Tango. Information Systems Research. 21 (4), 835-848. El Sawy, O. A., Malhotra, A., Park, Y., & Pavlou, P. A. (2010). Seeking the Configurations of Digital Ecodynamics: it Takes Three to Tango. Information Systems Research. 21 (4), 835- 848. Erevelles, S., Fukawa, N., & Swayne, L. (2016). Big Data Consumer Analytics and the Transformation of Marketing. Journal of Business Research. 69 (2), 897-904. Favaro, K. (2016). Don't Draft a Digital Strategy Just Because Everyone Else is. Harvard Business Review. 1-4. FinancialTimes. (2017). 50 Journals Used in FT Research Rank. Retrieved 14.11.2016, from https://www.ft.com/content/3405a512-5cbb-11e1-8f1f-00144feabdc0. Freitas Junior, J. C., Maçada, A. C., Brinkhues, R., & Montesdioca, G. (2016). Digital Capabilities as Driver to Digital Business Performance. In: Proceedings of the Americas Conference on Information Systems (AMCIS), 1-5. Galbraith, J. R. (1977). Organization Design. Boston: Addison Wesley Publishing Company. Goutas, L., Sutanto, J., & Aldarbesti, H. (2015). The Building Blocks of a Cloud Strategy: Evidence from Three SaaS Providers. Communications of the ACM. 59 (1), 90-97. Granados, N., & Gupta, A. (2013). Transparency Strategy: Competing with Information in a Digital World. MIS Quarterly. 37 (2), 637-642. Grover, V., & Kohli, R. (2013). Revealing Your Hand: Caveats in Implementing Digital Business Strategy. MIS Quarterly. 37 (2), 656-662. Guzzo, R. A., Jackson, S. E., & Katzell, R. A. (1987). Meta-Analysis Analysis. Research in Organizational Behavior. 9 (1), 407-442. Haffke, I., Kalgovas, B. J., & Benlian, A. (2016). The Role of the CIO and the CDO in an Organization’s Digital Transformation. In: Proceedings of the International Conference on Information Systems (ICIS), 1-20. Hansen, R., & Sia, S. K. (2015). Hummel's Digital Transformation Toward Omnichannel Retailing: Key Lessons Learned. MIS Quarterly Executive. 14 (2), 51-66. Haque, U. (2015). Your Digital Strategy Shouldn’t Be About Attention. Harvard Business Review. 1-4. Henderson, J. C., & Venkatraman, H. (1993). Strategic Alignment: Leveraging Information Technology for Transforming Organizations. IBM systems journal. 32 (1), 472-484. Hess, T., Matt, C., Benlian, A., & Wiesböck, F. (2016). Options for Formulating a Digital Transformation Strategy. MIS Quarterly Executive. 15 (2), 1-38. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 667 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Weinrich: Reviewing Organizational Design Components for Digital Business Strategy Horlacher, A. (2016). Co-Creating Value-the Dyadic CDO-CIO Relationship During the Digital Transformation. In: Proceedings of the European Conference on Information Systems (ECIS), 1-11. Kates, A., & Galbraith, J. R. (2010). Designing Your Organization: Using the Star Model to Solve 5 Critical Design Challenges. San Francisco: John Wiley & Sons. Keen, P., & Williams, R. (2013). Value Architectures for Digital Business: Beyond the Business Model. MIS Quarterly. 37 (2), 642-647. Leischnig, A., Wölfl, S., & Ivens, B. (2016). When Does Digital Business Strategy Matter to Market Performance? In: Proceedings of the International Conference on Information Systems (ICIS), 1-16. Levy, Y., & Ellis, T. J. (2006). A Systems Approach to Conduct an Effective Literature Review in Support of Information Systems Research. Informing Science: International Journal of an Emerging Transdiscipline. 9 (1), 181-212. Markus, M. L., & Loebbecke, C. (2013). Commoditized Digital Processes and Business Community Platforms: New Opportunities and Challenges for Digital Business Strategies. MIS Quarterly. 37 (2), 649-654. Matt, C., Hess, T., & Benlian, A. (2015). Digital Transformation Strategies. Business & Information Systems Engineering. 57 (5), 339-343. Mithas, S., Agarwal, R., & Courtney, H. (2012). Digital Business Strategies and the Duality of IT. IEEE IT Professional. 14 (5), 2-4. Mithas, S., & Lucas, H. C. (2010). What is your Digital Business Strategy? IEEE IT Professional. 12 (6), 4-6. Mithas, S., Tafti, A., & Mitchell, W. (2013). How a Firm's Competitive Environment and Digital Strategic Posture Influence Digital Business Strategy. MIS Quarterly. 37 (2), 511-536. New, S. (2010). The Transparent Supply Chain. Harvard Business Review. 1-5. Oestreicher-Singer, G., & Zalmanson, L. (2013). Content or Community? A Digital Business Strategy for Content Providers in the Social Age. MIS Quarterly. 37 (2), 591-616. Pagani, M. (2013). Digital Business Strategy and Value Creation: Framing the Dynamic Cycle of Control Points. MIS Quarterly. 37 (2), 617-632. Palekar, S., & Sedera, D. (2015). Destabilizing Digital Business Strategy through Competing- Complementarity of Social Media. In: Proceedings of the Pacific Asia Conference on Information Systems (PACIS), 1-17. Paré, G., Trudel, M.-C., Jaana, M., & Kitsiou, S. (2015). Synthesizing Information Systems Knowledge: A Typology of Literature Reviews. Information & Management. 52 (2), 183-199. Ross, J. W., Beath, C. M., & Sebastian, I. (2015). Why Nordstrom’s Digital Strategy Works (and Yours Probably Doesn’t). Harvard Business Review. 1-4. Ross, J. W., Sebastian, I. M., Beath, C., Mocker, M., Fondstad, N., O., & Moloney, K. G. (2016). Designing and Executing Digital Strategies. In: Proceedings of the International Conference on Information Systems (ICIS), 1-16. Setia, P., Venkatesh, V., & Joglekar, S. (2013). Leveraging Digital Technologies: How Information Quality Leads to Localized Capabilities and Customer Service Performance. MIS Quarterly. 37 (2), 565-590. Sia, S. K., Soh, C., & Weill, P. (2016). How DBS Bank Pursued a Digital Business Strategy. MIS Quarterly Executive. 15 (2), 105-121. Valentine, E., & Stewart, G. (2015). Enterprise Business Technology Governance: Three Competencies to Build Board Digital Leadership Capability. In: Proceedings of the Hawaii International Conference on System Sciences, 4513-4522. Venkatraman, N. (1994). IT-Enabled Business Transformation: from Automation to Business Scope Redefinition. Sloan Management Review. 35 (2), 73-87. 668 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) T. Weinrich: Reviewing Organizational Design Components for Digital Business Strategy Watson, H. J., Wixom, B. H., Hoffer, J. A., Anderson-Lehman, R., & Reynolds, A. M. (2006). Real-Time Business Intelligence: Best Practices at Continental Airlines. Information Systems Management. 23 (1), 7-18. Webster, J., & Watson, R. T. (2002). Analyzing the Past to Prepare for the Future: Writing a Literature Review. MIS Quarterly. 26 (2), xiii-xxiii. Wenzel, M., Wagner, D., Wagner, H.-T., & Koch, J. (2015). Digitization and Path Disruption: An Examination in the Funeral Industry. In: Proceedings of the European Conference on Information Systems (ECIS), 1-18. Wolfswinkel, J. F., Furtmueller, E., & Wilderom, C. P. M. (2013). Using grounded theory as a method for rigorously reviewing literature. European Journal of Information Systems. 22 (1), 45-55. Woodard, C. J., Ramasubbu, N., Tschang, F. T., & Sambamurthy, V. (2013). Design Capital and Design Moves: The Logic of Digital Business Strategy. MIS Quarterly. 37 (2), 537-564. Yoo, Y., Henfridsson, O., & Lyytinen, K. (2010). Research Commentary — the New Organizing Logic of Digital Innovation: an Agenda for Information Systems Research. Information Systems Research. 21 (4), 724-735. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Behaviour Intentions to Use RFID Subcutaneous Microchips: A Cross-sectional Slovenian Perspective 47 BORUT WERBER, ALENKA BAGGIA & ANJA ŽNIDARŠIČ Abstract This paper presents the second iteration results of a study investigating the possibility of radio frequency identification device subcutaneous microchip (RFID-SM) usage as a substitute for personal identification, healthcare issues, shopping or payments, and home usage. Our aim was to investigate the readiness to use SM-RFID in everyday life. In the study, we used an extended Technology Acceptance Model (TAM) to verify the main concerns regarding the use of RFID-SM among Slovenian people. The survey responses were gathered from October until December 2016. After evaluating the model, it can be concluded that the fit of the model is good and the significant path of dependence are similar as in the first study from 2014. Similar to previous results, the Health Concerns have a negative effect on the Perceived Trust and Perceived Usefulness of SM-RFID adoption. On the other hand, the Perceived Trust and Perceived Usefulness have a positive effect on the Behaviour Intention to use SM-RFID. Keywords: • RFID • subcutaneous microchip • implant • adoption • everyday life • CORRESPONDENCE ADDRESS: Borut Werber, University of Maribor, Faculty of Organizational Sciences, Kidričeva cesta 55a, 4000 Kranj, Slovenia e-mail: borut.werber@fov.uni-mb.si. Alenka Baggia, University of Maribor, Faculty of Organizational Sciences, Kidričeva cesta 55a, 4000 Kranj, Slovenia e-mail: alenka.baggia@fov.uni-mb.si. Anja Žnidaršič, University of Maribor, Faculty of Organizational Sciences, Kidričeva cesta 55a, 4000 Kranj, Slovenia e-mail: anja.znidarsic@fov.uni-mb.si. https://doi.org/10.18690/978-961-286-043-1.47 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 670 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Werber, A. Baggia & A. Žnidaršič: Behaviour Intentions to Use RFID Subcutaneous Microchips: A Cross-sectional Slovenian Perspective Introduction In the era of the Internet of things (IoT) the information and communication technology (ICT) is used to support everyday tasks of people (e.g. Baquero, Cabrera & De Sousa, 2016). The number of different smart or magnetic stripe cards, keys and various other devices for personal identification, financial transactions, unlocking of doors, etc. has become unmanageable. When near field communication (NFC) became available on mobile phones, some cards were offered as a mobile service. To increase security, most of the magnetic cards were equipped or replaced with radio frequency identification device (RFID) microchip and NFC possibility. RFID microchips can be used for shopping, health care services, logistics, car industry and domestic usage. During the research on diverse types of personal identification, questions about a unified type of identification arose. People are no longer willing to operate with the diversity of identification cards and passwords needed to efficiently manage their professional and personal life. Recent studies have shown that the RFID technology is secure enough to be used for personal identification and some attempts were made to use RFID subcutaneous microchip implants (RFID-SM) (Bergmann et al., 2012; Gasson & Koops, 2013; Madrid, Korsvold, Rochat & Abarca, 2012; Soares dos Santos et al., 2013). Body-implantable devices for non-medical purposes are emerging as a hot topic that has the potential to permeate throughout society (Catherwood, Finlay & McLaughlin, 2016). According to Graafstra (interviewed by Michael, 2016), the attitude of consumers has changed from being unaware about the possible usage of RFID implants to general acceptance of RFID implants as a kind of jewellery. In recent years, people are becoming aware that the RFID-SM present a plausible future (Michael, Michael & Perakslis, 2015). Heffernan, Vetere & Chang (2017) even introduce a new concept called “insertables”. Nevertheless, some researchers still explore the potential negative impact of enforced microchipping (Bradley-Munn, Michael & Michael, 2016), while others look for highly positive effects of RFID implants. Namely, implantation of RFID microchips in tumours may provide a new method for cancer treatment (Lai, Chan & Singh, 2016). The literature review showed several attempts to research the readiness of RFID-SM adoption from the provider’s viewpoint (e.g. hospital management, doctors) (Cao, Jones & Sheng, 2014; Hossain & Quaddus, 2015), while only a few of them dealt with the end- users (e.g. patients) (Katz & Rice, 2009). In addition, most of the studies are focused only on RFID-SM usage for the healthcare purposes. This research is a continuation of the research conducted in 2014 (Werber & Žnidaršič, 2015), when readiness of potential RFID-SM users to adopt the microchips in their everyday life was researched. There are two reasons of survey repetition and upgrade: • The attitudes towards technology acceptance change rapidly, so we wanted to compare the new results with the results from 2014, 30TH BLED ECONFERENCE: DIGITAL TRANSORMATION – FROM CONNECTING THINGS TO 671 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Werber, A. Baggia & A. Žnidaršič: Behaviour Intentions to Use RFID Subcutaneous Microchips: A Cross-sectional Slovenian Perspective • The study was extended from Slovenia to some other countries (e.g. Poland, Croatia). • In this paper, the responses gathered in Slovenia are presented, to enable a consistent comparison with the results gathered in 2014 (Werber & Žnidaršič, 2015). Similar to Chong, Liu, Luo & Keng-Boon (2015), the basic Technology Acceptance Model (TAM) was extended with three additional external variables which enabled us to include all of our research questions. Health Concerns (HC) were included in the model according to the results of previous studies on RFID adoption (Foster & Jaeger, 2007; Katz & Rice, 2009; Rotter, Daskala & Compano, 2008), Perceived Trust (PT) has similar to HC gained a lot of attention in the research community (Garbarino & Johnson, 1999; Smith, 2008; Suh & Han, 2002; Tung, Chang & Chou, 2008; Wu & Chen, 2005). Furthermore, age was included as a predictor variable of Behaviour Intention to Use (BIU) since younger people are more prone to adopt new technologies (Burton-Jones & Hubona, 2006; Morris & Venkatesh, 2000). RFID microchip With the development of technology and robotic production, the capacity of microchip has multiplied while the size of it was minimised. The biggest challenge today is not the size of a microchip (0,05mm x 0,05mm). The problem is the size of the antenna that should be at least 1mm long to get reliable results (Burke & Rutherglen, 2010). Depending on power needed for operating, RFID microchips are categorised into three types: passive, active and semi-passive. While passive devices don’t need any internal power, the active do and their life time depends on battery capacity, usually not longer than one year (Ruiz-Garcia, Lunadei, Barreiro & Robla, 2009). Semi-passive devices present a combination of both other types. While data stored in a passive NFC RFID-SM microchip can be read with the help of electromagnetic field produced by a reader device, the sensor (temperature sensor, PH sensor, etc.) needs a power supply (Badia-Melis et al., 2014). To overcome this problem, the researchers are trying to develop rechargeable implanted batteries that produce electricity with the chemical reaction of body fluids – glucose bio-batteries (Yazdi et al., 2017). We can find the application of RFID microchip in manufacturing, supply chain management (Yee-Loong Chong et al., 2015), logistic, automotive industry, livestock production (Iyasere, Edwards, Bateson, Mitchell & Guy, 2017), food production and public sector (Dwivedi, Kapoor, Williams & Williams, 2013). RFID microchip is used in shops, passports, proximity cards, automated toll-payment transponders, ignition keys, contactless credit-cards, smart bracelets, smart finger rings, smart watches, etc. (Juels, 2006). 672 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Werber, A. Baggia & A. Žnidaršič: Behaviour Intentions to Use RFID Subcutaneous Microchips: A Cross-sectional Slovenian Perspective In healthcare we can use RFID for resource management (Fisher & Monahan, 2008). There are also RFID systems for tracking patients and personnel (Baker, 2016; Fosso Wamba, Anand & Carter, 2013). Besides, the high number of health care errors (up to 98,000 per year) causing death can be reduced when using RFID system for monitoring patients (Baker, 2016). There were several attempts of using RFID-SM in vivo. The first human with active RFID-SM implant was Professor Kevin Warwick in 1998. He was able to programme doors to open and lights to switch on when he approaches the RFID reader. He removed the chip after nine days in order to avoid possible health complications due to the battery lifetime. In 2002 the Jacobs family members were implanted by Very chip (Ip, Michael & Michael, 2008). One of first recorded commercial use of RFID-SM was in 2004 in the Baja Beach Club in Barcelona, Spain, and Rotterdam (Ip et al., 2008; Michael & Michael, 2010). An RFID-SM with a unique code for identification of very important persons (VIP) was used to enable electronic payment and access to VIP areas of the club. The name of the person was displayed publicly on screens upon their entrance to the club. In 2005, three employees of the U.S. Company Citywatcher.com were implanted with microchips for access control application. In the same year, the Very Chip was used for medical reasons to identify patients for the first time in the USA. Volunteers were chipped in hand or arm with local anaesthetics. The system was able to recognize 16 digit identification code to identify and gain an insight into patient medical record data (Michael & Michael, 2013). The author of the book RFID toys (Graafstra, 2006), Amal Graafstra’s initial motivation to get a chip implant was for the convenience of eliminating keys (Ip et al., 2008). In 2013 first commercial company called Dangerous Things was established and started to sale the first RFID-SM for home use (Michael, 2016). The presented study considered the usage of the passive NFC RFID-SM of size 2mm x 12mm, similar to the glass-coated used for animals’ identification. There are more than 5 million house pets with such chips, which enable identification of the pet’s owner (Juels, 2006). Research approach 3.1 Data collection The study about attitudes toward RFID-SM among Slovenians was performed from April to December 2016. The link to the web questionnaire was sent via email to members of researchers’ social networks and it was posted on the faculty web page. 3.2 Questionnaire and research hypotheses The research model includes all three basic concepts of TAM (Morris & Venkatesh, 2000; Ronteltap, Fischer & Tobi, 2011): Perceived Ease of Use (PEU), Perceived Usefulness (PU), and Behaviour Intention to Use (BIU). The basic concepts are combined with two 30TH BLED ECONFERENCE: DIGITAL TRANSORMATION – FROM CONNECTING THINGS TO 673 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Werber, A. Baggia & A. Žnidaršič: Behaviour Intentions to Use RFID Subcutaneous Microchips: A Cross-sectional Slovenian Perspective external factors (Werber, Baggia & Žnidaršič, 2016): Perceived Trust (PT) and Health Concerns (HC). Furthermore, two manifest variables are included: age and painful procedure; first with hypothesized direct impact on BIU, and the second on HC. PU has seven items which are in accordance with items proposed by proposed by Davis (1989) in the original TAM model. Five of them were adopted from (Katz & Rice, 2009), and two additional items on storing information about organ donation and a general statement on saving lives in different medical conditions were added. PEU and PT items were adopted based on Davis (1989) and Smith (2008), respectively. PT refers to an individual’s trust that the state, banks and healthcare systems will be able to ensure the security and protection of gathered personal data. Items composing HC construct were prepared based on extensive literature review of medical research papers (e.g. Foster & Jaeger, 2007; Katz & Rice, 2009; Rotter, Daskala & Compano, 2008) and they measure possible threats of RFID-SM usage. BIU reflects four different possible types of the RFID-SM usage (healthcare purposes, for identification purposes, for shopping and payment, and for everyday home usage) as pointed out in the interviews. The exact items wording can be found in Table 1. AS noted above, each model component was measured by several items (Table 1). The items of HC, PT, the last item of PU, and PEU were measured on a 5-point Likert-type scale of agreement; the first six items for PU were measured on a 5-point Likert-type scale of acceptability, while the items of BIU were measured as dichotomous variable (yes/no). Research hypotheses are presented in Figure 1. We proposed ten hypotheses. Nine of them were adopted from the 2014 study, and one new was added. We assumed that perceived experience on implantation procedure (“implanting RFID-SM is a painful procedure”) has a positive impact on HC. The predicted relationships among concepts included in the model are presented with arrows, where a plus sign (+) represents positive impact and a minus sign (-) negative impact. 674 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Werber, A. Baggia & A. Žnidaršič: Behaviour Intentions to Use RFID Subcutaneous Microchips: A Cross-sectional Slovenian Perspective Figure 1: Research hypotheses 3.3 Data analyses The proposed hypotheses in the research model were analysed with structural equation modelling (SEM). In this paper, presented results were obtained based on the analyses of 291 respondents, who provided at least partial responses on the variables included in the model (252 responses were complete). There is no general recommendation on minimal sample size required for SEM. Hair et al. (2006) suggested the sample size between 150 and 400, while Loehlin’s rule of thumb (Siddiqui, 2013) suggests that the sample size should be at least 50 more than eight times the number of measured items in the model. Since our model consists of 25 measured variables, the minimal sample size should be 250, which indicates that the analysed sample size of 291 respondents is sufficient to achieve the statistical power necessary for SEM with three or more measured items per latent variable. To use all, also partial information obtained from the respondents, multiple imputations was used when analysing the data in order to improve the validity of the results (Mackinnon, 2010). The research model was evaluated in two steps. First, measurement model was investigated, followed by the analyses of the structural model (Kline, 2011). To confirm, that the constructs are correctly defined, first data screening and confirmatory factor analysis (CFA) was performed, followed by SEM. Our hypotheses assume several relationships between variables which could be analysed with several multiple regressions, but SEM was employed for its ability to analyse relationships between latent and observed variables simultaneously (Teo, 2011). Several statistics were calculated before SEM, and the detailed results are omitted due to limitation of the paper length. 30TH BLED ECONFERENCE: DIGITAL TRANSORMATION – FROM CONNECTING THINGS TO 675 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Werber, A. Baggia & A. Žnidaršič: Behaviour Intentions to Use RFID Subcutaneous Microchips: A Cross-sectional Slovenian Perspective Here, we will only list the performed analyses to justify the corrections of the data analyses and results presented. To assess whether the data are approximately normal and therefore appropriate for CFA and SEM, the absolute values of skewness and kurtosis were calculated. The Cronbach’s alpha coefficients were calculated for each of the five constructs in our research model to determine the extent of the internal reliability. The construct validity of each scale was assessed using CFA, and it was evaluated via the convergent validity and the discriminant validity. The convergent validity was examined based on three concepts (Fornell & Larcker, 1981; Koufteros, 1999): a) estimates of the standardized factor loadings which should exceed 0.5 (or even 0.7), b) composite reliability (CR) for each latent variable which should exceed 0.7, and c) average variance extracted (AVE) measuring the amount of the common variance between the indicators and their construct in relation to the amount of variance attributable to measurement error for each latent variable, which should exceed 0.5. In order to investigate the discriminant validity of the measurement model, the square root of AVE of each latent variable was compared to the correlations between the latent variables. In the final step, to evaluate the impact of proposed relationships among constructs in the research model, SEM was used. Since there are endogenous (dependent) binary variables in the model, the robust weighted least squares mean and variance-adjusted (WLSMV) estimation in the lavaan R-package was used (Rosseel, 2014). In order to assess the fit of the measurement model and the structural model, the overall fit was examined based on various sets of commonly-used fit indices: χ2/df which should be lower than 3 (Teo & Zhou, 2014); indices TLI and CFI which should be at least 0.9 in order to indicate adequate model fit (Koufteros, 1999). The root mean square error of approximation (RMSEA) should be below 0.06 (Teo & Zhou, 2014) or at least below 0.08 as proposed by (MacCallum, Browne & Sugawara, 1996). Results of the SEM analyisis are presented in the Results section. The values of standardized path coefficients (β) and corresponding z-values reflect the relationships among the latent variables in terms of the magnitude and statistical significance. For every endogenous latent variable the coefficient of determination (R2) is also calculated, which should be above 0.1 (Escobar-Rodriguez & Monge-Lozano, 2012) to confirm the predictive capability of the model. Findings and results 4.1 Sample characteristics The sample consists of 59% of women and 41% of men. Among the respondents, 33% are in primary school, secondary school or at the university. More than half of the respondents (54%) are employed, 6% are unemployed, while 7% are retired. The age of 676 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Werber, A. Baggia & A. Žnidaršič: Behaviour Intentions to Use RFID Subcutaneous Microchips: A Cross-sectional Slovenian Perspective the respondents ranges from 11 to 79 years, with an average age of 35.7 years and SD = 15.0 years. 4.2 Descriptive statistics of the questionnaire items under study Table 1 presents descriptive statistics (mean (M) and standard deviation (SD)) of 24 variables included in the research model. On average, respondents agree the most with the statement that subcutaneous microchips can integrate multiple functions at the same time (M = 4.02). If we examine the four items of HC closely, we can see that respondents are worried due to treats of possible allergies (M = 3.27), and an impact on the nervous system (M = 3.14). On the other hand, they are less concerned due to possibility of microchip movements in their bodies (M = 2.97) and due to effects on emotional behaviour (M = 2.95). Items of BIU were measured as dichotomous variables. In Table 1 the percentages of the respondents who positively answered on the individual question are presented. The highest proportion of the respondents (43%) would insert an RFID-SM for health care purposes and the smallest proportion of the respondents (20%) would have microchips for shopping and payment in a way that microchip would replace debit cards, credit cards, and profit cards. The means were calculated also for four components. Mean values are above 3 for three components: 3.08 for HC, 3.76 for PEU, and 3.46 for PU, which indicates that the overall response could be classified as positive. The mean of PT is equal to 2.71, which indicates that perceived trust on security issues provided by state, banks, and healthcare system is somehow low. 30TH BLED ECONFERENCE: DIGITAL TRANSORMATION – FROM CONNECTING THINGS TO 677 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Werber, A. Baggia & A. Žnidaršič: Behaviour Intentions to Use RFID Subcutaneous Microchips: A Cross-sectional Slovenian Perspective Table 1: Descriptive statistic of the questionnaire items Model N=291 Questionnaire items comp. Mean SD Subcutaneous microchips can be threatening to my health ns because of the possibility of movement in my body. (HC1) 2.97 1.187 Subcutaneous microchips may affect my emotional behaviour ncer C) (control of human behaviour, etc.). (HC2) 2.95 1.265 h Co (H Subcutaneous microchips can be threatening to my health lt because of possible allergies. (HC3) 3.27 1.196 eaH Subcutaneous microchips can be threatening to my health because of their impact on the nervous system. (HC4) 3.14 1.206 The state will ensure the security and the protection of human t rights (security of identity documents, passport, identity theft, rus tracking via GPS, no records should be archived without the T consent of the person observed). (PT1) 2.57 1.271 ) ) ed T Banks will provide security (payment, discretion of operation, iv (P ce transactions, etc.). (PT2) 2.70 1.297 er The healthcare system will provide security (personal data, P medical data, information on treatments, organ donation, etc.). (PT3) 2.84 1.29 Subcutaneous microchips could be used: for monitoring the health of the user, e.g. pulse or blood pressure. (PU1) 3.60 1.127 sse for warning about potential health problems or complications uln (e.g. diabetes). (PU2) 3.73 1.09 for storing medical info for accident or emergency. (PU3) 3.64 1.097 Usef U) for personalized health info. (PU4) 3.21 1.198 ed (P iv for storing information about organ donation. (PU5) 3.21 1.2 ce Users of the subcutaneous microchips should have lower health erP insurance premiums. (PU6) 3.03 1.246 Subcutaneous microchips may save your life (e.g. unconsciousness, cardiac pacemaker, sugar detector, insulin dispenser, etc.). (PU7) 3.81 1.066 Subcutaneous microchips are always available. (PEU1) 3.53 1.117 ed Subcutaneous microchips cannot be lost. (PEU2) 3.79 1.068 iv f Use U) Subcutaneous microchips cannot be stolen (high-security ce o E er se (P protection). (PEU3) 3.18 1.317 P aE Subcutaneous microchips can integrate multiple functions at the same time. (PEU4) 4.02 0.888 678 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Werber, A. Baggia & A. Žnidaršič: Behaviour Intentions to Use RFID Subcutaneous Microchips: A Cross-sectional Slovenian Perspective re du inful Implanting RFID-SM is a painful procedure. 2.89 1.167 a ce P roP Percentage Would you insert a subcutaneous microchip: of positive responses for healthcare purposes (identification, storage of medical data, o 43% information on organ donation, etc.)? n t for identification purposes (ID card, passport, driving licence, 28% ntio etc.)? IU) Inte B for shopping and payment (debit cards, credit cards, profit 20% cards, etc.)? ur io Use ( for everyday home usage (unlocking house or apartment, car, v 23% computer, mobile phone, etc.)? ehaB if you were assured that GPS positioning and tracking were not 29% possible? 4.3 Results of the SEM First, measurement model was evaluated. The item PEU3 on RFID-SM security protection was removed from the PEU construct, and consequently from the model, due to combination of its standard loading slightly above 0.5 (0.515) and its variance which was twice as big as for other construct items. Standardized factor loadings for items in the (final) model exceed a threshold of 0.5 for convergent validity, 19 of them exceed also stricter threshold of 0.7. The AVE for all five constructs reach and exceeds a threshold of 0.5 for convergent validity (HC 0.53, PT 0.74, PEU 0.50, PU 0.54, BIU 0.85). In our measurement model, the obtained value of χ2/df = 1.465 (χ2 = 291.502, df = 199) is lower than 3, and both TLI = 0.89 and CFI = 0.90 are close to 0.9. The RMSEA is equal to 0.040, and the upper bound of RMSEA 90% confidence interval (0.030, 0.050) is lower than 0.06. According to the set of the calculated fit indices, it could be concluded that measurement model fits the sample data reasonably well. Therefore, the fit of the structural model could be evaluated. The goodness-of-fit of the SEM was evaluated with the same set of indices as for the measurement model. The results show that the model has a good fit: χ2/df = 2.154 (χ2 = 523.343, df = 266), TLI = 0.88, CFI = 0.89, and RMSEA = 0.063 with its 90% confidence interval (0.056, 0.070). 30TH BLED ECONFERENCE: DIGITAL TRANSORMATION – FROM CONNECTING THINGS TO 679 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Werber, A. Baggia & A. Žnidaršič: Behaviour Intentions to Use RFID Subcutaneous Microchips: A Cross-sectional Slovenian Perspective The results of the structural model are presented with standardized path coefficients (β) (and corresponding z-values), which reflect the strength of the relationships among the latent variables (Figure 2). For every endogenous latent variable also the coefficient of determination (R2) is presented. The predictive capability of the model is satisfactory because all coefficients of determination (R2) are above 0.1. The smallest R2 is for HC and it is equal to 0.246, R2 for PT is 0.278, for PU is equal to 0.514, and the highest value of R2 is for BIU (0.578). Figure 2: The results for structural model Table 2 presents overview of the results for ten proposed research hypotheses regarding their acceptance or rejections. 680 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Werber, A. Baggia & A. Žnidaršič: Behaviour Intentions to Use RFID Subcutaneous Microchips: A Cross-sectional Slovenian Perspective Table 2: Overview of the results for ten proposed research hypotheses Hypothesis Supported H1a: Health Concerns has negative impact on Perceived Trust. Supported H1b: Health Concerns has negative impact on Perceived Usefulness. Supported H2a: Painful Procedure has positive impact on Health Concerns. Supported H3a: Perceived Trust has positive impact on Perceived Usefulness. Supported H3b: Perceived Trust has positive impact on Behaviour Intention to Supported Use. H4: Perceived Usefulness has positive impact on Behaviour Intention Supported to Use. H5a: Perceived Ease of Use has positive impact on Perceived Trust. Supported H5b: Perceived Ease of Use has positive impact on Perceived Trust. Supported H5c: Perceived Ease of Use has positive impact on Behaviour Not Intention to Use. supported H6: Age has positive impact on Behaviour Intention to Use. Supported We can see from Figure 2 and Table 2 that based on the values of the standardized path coefficients and the corresponding z-values nine out of ten hypotheses were supported. Details are discussed below. Basic TAM model proposes three positive relationships among constructs. Two of them were supported, while one was rejected. The positive effects of PU on BIU (hypotheses H4) and positive effects of PEU on PU (hypothesis H5b) were supported. Hypothesis H5c regarding positive effect of PEU on BIU could not be supported. This is in accordance with the finding of the research from 2014, where this relationship has also not been confirmed. That result shows that ease of use is not an important predictor of BIU. If the respondents find the microchips useful, then they would implant them regardless their availability and handiness. The impacts of Age on BIU and of the Painful Procedure on HC are the strongest in the model. The variables PU and BIU have three significant predictors that can explain 51% and 58% of its total variance, respectively. HC have a negative effect on both PT and PU (hypotheses H1a and H1b), where the impact is slightly stronger to the PT. PT has a positive impact on PU (H3a) as well as direct effect on BIU (H3b). As expected, Age has a strong direct negative impact on BIU (hypothesis H6). Conclusion Since most of the research has studied the willingness to adopt RFID-SM technology from the viewpoint of providers (e.g. Hospital management), and only a few studies dealt with end-user willingness to adopt RFID-SM, we decided to research this gap in 2014. 30TH BLED ECONFERENCE: DIGITAL TRANSORMATION – FROM CONNECTING THINGS TO 681 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Werber, A. Baggia & A. Žnidaršič: Behaviour Intentions to Use RFID Subcutaneous Microchips: A Cross-sectional Slovenian Perspective Due to the high frequency of technological advances, we have repeated and extended our study in 2016. The latter results are presented in this research paper. The research topic is rather delicate. There are ethical questions whether or not should we put something unnatural under our skin. Hundreds of deaf people with hearing implants will surely not reject interventions in their bodies to enable their hearing. The same goes for patients with cardiac pacemakers and diabetes patients. There are thousands of orthopaedic patients with different implants. In the first research, back in 2014, no statistically significant correlations between the attitude towards earrings, piercing and tattoos and willingness to use RFID-SM existed. Although we would expect that the people willing to puncture their skin just to change their appearance, would also be prone to RFID-SM if they find the advantages of such system inspiring. Most of the researched items showed a slightly more positive attitude towards the RFID- SM than two years ago. In addition, people are less concerned, since all items on Perceived Trust have higher average values. In addition, the recent results again showed that Perceived Ease of Use does not have a statistically significant influence on the Behaviour Intention to Use. The fact the implantation of RFID-SM is a painful procedure, positively influences the concept of Health Concerns. Although the Perceived Trust has slightly raised, Health Concerns are still evaluated as significant predictor of Perceived Trust and Perceived Usefulness. The result showed that the attitude towards the RFID- SM implantation is still negative. The respondents probably do not realize that most of the medical implants work the same way as an RFID-SM. According to the results, most of the issues on RFID-SM adoption perceived by the end users are slowly losing their importance. Due to different reasons, public has become more open to the possibility of using the RFID-SM for different purposes. Therefore, more studies on the safety of RFID-SM should be conducted. New, preferably less invasive ways to enable a unified personal identification should be proposed. This paper presents only the results of the survey conducted in Slovenia, therefore, our further research will include the results of the surveys gathered in other European countries to establish whether similarities in the attitudes toward RFID-SM adoption exists. A general extended TAM model for the intention to use the RFID-SM will be generated, where also an impact of privacy rights and privacy threats on Perceived Trust and indirectly on Behaviour Intention to Use will be examined. References Badia-Melis, R., Garcia-Hierro, J., Ruiz-Garcia, L., Jiménez-Ariza, T., Robla Villalba, J. I. & Barreiro, P. (2014). Assessing the dynamic behavior of WSN motes and RFID semi-passive tags for temperature monitoring. Computers and Electronics in Agriculture, 103, 11–16. http://doi.org/10.1016/j.compag.2014.01.014 682 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Werber, A. Baggia & A. Žnidaršič: Behaviour Intentions to Use RFID Subcutaneous Microchips: A Cross-sectional Slovenian Perspective Baker, J. D. (2016). The Orwellian Nature of Radio-Frequency Identification in the Perioperative Setting. AORN Journal, 104(4), 281–284. http://doi.org/10.1016/j.aorn.2016.08.012 Baquero, J. S. M., Cabrera, F. L. & De Sousa, F. R. (2016). A miniaturized low-power radio frequency identification tag integrated in CMOS for biomedical applications. 2016 1st Symposium on Instrumentation Systems, Circuits and Transducers, INSCIT 2016 - Proceedings, 10–13. http://doi.org/10.1109/INSCIT.2016.7598209 Bergmann, G., Graichen, F., Dymke, J., Rohlmann, A., Duda, G. N. & Damm, P. (2012). High- tech hip implant for wireless temperature measurements in vivo. PLoS ONE, 7(8), 1–7. http://doi.org/10.1371/journal.pone.0043489 Bradley-Munn, Michael & Michael. (2016). Sociology of the docile body. In 2016 IEEE International Symposium on Technology and Society (ISTAS) (pp. 1–6). http://doi.org/10.1109/ISTAS.2016.7764047 Burke, P. & Rutherglen, C. (2010). Towards a single-chip, implantable RFID system: Is a single- cell radio possible? Biomedical Microdevices, 12(4), 589–596. http://doi.org/10.1007/s10544- 008-9266-4 Burton-Jones, A. & Hubona, G. S. (2006). The mediation of external variables in the technology acceptance model. Information & Management, 43(6), 706–717. http://doi.org/10.1016/j.im.2006.03.007 Cao, Q., Jones, D. R. & Sheng, H. (2014). Contained nomadic information environments: Technology, organization, and environment influences on adoption of hospital RFID patient tracking. Information & Management, 51(2), 225–239. http://doi.org/10.1016/j.im.2013.11.007 Catherwood, P. A., Finlay, D. D. & McLaughlin, J. A. D. (2016). Intelligent Subcutaneous Body Area Networks: Anticipating Implantable Devices. IEEE Technology and Society Magazine, 35(3), 73–80. http://doi.org/10.1109/MTS.2016.2593219 Davis, F. D. (1989). Perceived Usefulness , Perceived Ease Of Use , And User Acceptance. MIS Quarterly, 13(3), 319–339. http://doi.org/10.2307/249008 Dwivedi, Y. K., Kapoor, K. K., Williams, M. D. & Williams, J. (2013). RFID systems in libraries: An empirical examination of factors affecting system use and user satisfaction. International Journal of Information Management, 33(2), 367–377. http://doi.org/10.1016/j.ijinfomgt.2012.10.008 Escobar-Rodriguez, T. & Monge-Lozano, P. (2012). The acceptance of Moodle technology by business administration students. Computers & Education, 58(4), 1085–1093. http://doi.org/10.1016/j.compedu.2011.11.012 Fisher, J. a & Monahan, T. (2008). Tracking the social dimensions of RFID systems in hospitals. International Journal of Medical Informatics, 77(3), 176–83. http://doi.org/10.1016/j.ijmedinf.2007.04.010 Fornell, C. & Larcker, D. F. (1981). Evaluating Structural Equation Models with Unobservable Variables and Measurement Error. Journal of Marketing Research, 18(1), 39–50. http://doi.org/10.2307/3151312 Fosso Wamba, S., Anand, A. & Carter, L. (2013). A literature review of RFID-enabled healthcare applications and issues. International Journal of Information Management, 33(5), 875–891. http://doi.org/10.1016/j.ijinfomgt.2013.07.005 Foster, K. R. & Jaeger, J. (2007). RFID inside: The murky ethics of implanted chips. IEEE Spectrum, 44(3), 24–29. http://doi.org/10.1109/MSPEC.2007.323430 Garbarino, E. & Johnson, M. S. (1999). The Different Roles of Satisfaction, Trust, and Commitment in Customer Relationships. American Marketing Association, 63(2), 70–87. http://doi.org/10.2307/1251946 30TH BLED ECONFERENCE: DIGITAL TRANSORMATION – FROM CONNECTING THINGS TO 683 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Werber, A. Baggia & A. Žnidaršič: Behaviour Intentions to Use RFID Subcutaneous Microchips: A Cross-sectional Slovenian Perspective Gasson, M. N. & Koops, B.-J. (2013). Attacking Human Implants: A New Generation of Cybercrime. Law, Innovation & Technology, 5(2), 248–277. http://doi.org/10.5235/17579961.5.2.248 Graafstra, A. (2006). RFID Tpys. Indianapolis: Wiley Publisher Inc. Heffernan, K., Vetere, F. & Chang, S. (2017). Towards insertables: Devices inside the human body. First Monday, 22(3). Retrieved from http://journals.uic.edu/ojs/index.php/fm/article/view/6214 Hossain, M. A. & Quaddus, M. (2015). Radio frequency identification (RFID) adoption: A cross- sectional comparison of voluntary and mandatory contexts. Information Systems Frontiers, 17(5), 1057–1076. http://doi.org/10.1007/s10796-013-9482-1 Ip, R., Michael, K. & Michael, M. G. (2008). The Social Implications of Humancentric Chip Implants : A Scenario - “ Thy Chipdom Come , Thy Will be Done ” The Social Implications of Humancentric Chip Implants. In Collaborative Electronic Commerce Technology and Research (pp. 1–11). Madrid, Spain: IEEE Computer Society. Iyasere, O. S., Edwards, S. A., Bateson, M., Mitchell, M. & Guy, J. H. (2017). Validation of an intramuscularly-implanted microchip and a surface infrared thermometer to estimate core body temperature in broiler chickens exposed to heat stress. Computers and Electronics in Agriculture, 133, 1–8. http://doi.org/10.1016/j.compag.2016.12.010 Juels, A. (2006). RFID security and privacy: a research survey. IEEE Journal on Selected Areas in Communications, 24(2), 381–394. http://doi.org/10.1109/JSAC.2005.861395 Katz, J. E. & Rice, R. E. (2009). Public views of mobile medical devices and services: A US national survey of consumer sentiments towards RFID healthcare technology. International Journal of Medical Informatics, 78, 104–114. http://doi.org/10.1016/j.ijmedinf.2008.06.001 Kline, R. B. (2011). Principles and practice of structural equation modeling. Guilford publications. Koufteros, X. A. (1999). Testing a model of pull production: a paradigm for manufacturing research using structural equation modeling. Journal of Operations Management, 17(4), 467–488. http://doi.org/10.1016/S0272-6963(99)00002-9 Lai, H. C., Chan, H. W. & Singh, N. P. (2016). Effects of radiation from a radiofrequency identification (RFID) microchip on human cancer cells. International Journal of Radiation Biology, 92(3), 156–161. http://doi.org/10.3109/09553002.2016.1135264 MacCallum, R. C., Browne, M. W. & Sugawara, H. M. (1996). Power analysis and determination of sample size for covariance structure modeling. Psychological Methods, 1(2), 130–149. http://doi.org/10.1037/1082-989X.1.2.130 Madrid, C., Korsvold, T., Rochat, A. & Abarca, M. (2012). Radio frequency identification (RFID) of dentures in long-term care facilities. The Journal of Prosthetic Dentistry, 107(3), 199–202. http://doi.org/10.1016/S0022-3913(12)60057-2 Michael, K. (2016). RFID/NFC implants for bitcoin transactions. IEEE Consumer Electronics Magazine, 5(3), 103–106. http://doi.org/10.1109/MCE.2016.2556900 Michael, K. & Michael, M. G. (2010). The diffusion of RFID implants for access control and epayments: A case study on Baja Beach Club in Barcelona. International Symposium on Technology and Society, Proceedings, (July 2007), 242–252. http://doi.org/10.1109/ISTAS.2010.5514631 Michael, K. & Michael, M. G. (2013). The future prospects of embedded microchips in humans as unique identifiers: the risks versus the rewards. Media, Culture & Society, 35(1), 78–86. http://doi.org/10.1177/0163443712464561 Michael, M. G., Michael, K. & Perakslis, C. (2015). Überveillance, the Web of Things, and People: What is the culmination of all this surveillance? IEEE Consumer Electronics Magazine, 4(2), 107–113. http://doi.org/10.1109/MCE.2015.2393007 684 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) B. Werber, A. Baggia & A. Žnidaršič: Behaviour Intentions to Use RFID Subcutaneous Microchips: A Cross-sectional Slovenian Perspective Morris, M. G. & Venkatesh, V. (2000). Age Differences in Technology Adoption Decisions: Implications for a Changing Work Force. Personnel Psychology, 53(2), 375–403. http://doi.org/10.1111/j.1744-6570.2000.tb00206.x Ronteltap, A., Fischer, A. R. H. & Tobi, H. (2011). Societal response to nanotechnology: Converging technologies-converging societal response research? Journal of Nanoparticle Research, 13(10), 4399–4410. http://doi.org/10.1007/s11051-011-0473-1 Rosseel, Y. (2014). The lavaan tutorial. The lavaan tutorial. Retrieved from http://lavaan.ugent.be/tutorial/tutorial.pdf Rotter, P., Daskala, B. & Compano, R. (2008). RFID implants: Opportunities and and challenges for identifying people. IEEE Technology and Society Magazine, 27(2), 24–32. http://doi.org/10.1109/mts.2008.924862 Ruiz-Garcia, L., Lunadei, L., Barreiro, P. & Robla, J. I. (2009). A review of wireless sensor technologies and applications in agriculture and food industry: state of the art and current trends. Sensors (Basel, Switzerland), 9(6), 4728–50. http://doi.org/10.3390/s90604728 Siddiqui, K. (2013). Heuristics for sample size determination in multivariate statistical techniques. World Applied Sciences Journal, 27(2), 285–287. http://doi.org/10.5829/idosi.wasj.2013.27.02.889 Smith, C. (2008). Human microchip implantation. Journal of Technology Management and Innovation, 3(3), 151–156. http://doi.org/10.4067/S0718-27242008000100015 Soares dos Santos, M. P., Ferreira, J. a F., Ramos, a, Simões, J. a O., Morais, R., Silva, N. M., … Oliveira, T. (2013). Instrumented hip implants: electric supply systems. Journal of Biomechanics, 46(15), 2561–71. http://doi.org/10.1016/j.jbiomech.2013.08.002 Suh, B. & Han, I. (2002). Effect of trust on customer acceptance of Internet banking. Electronic Commerce Research and Applications, 1(3–4), 247–263. http://doi.org/10.1016/S1567- 4223(02)00017-0 Teo, T. & Zhou, M. (2014). Explaining the intention to use technology among university students: a structural equation modeling approach. Journal of Computing in Higher Education, 26(2), 124–142. http://doi.org/10.1007/s12528-014-9080-3 Tung, F. C., Chang, S. C. & Chou, C. M. (2008). An extension of trust and TAM model with IDT in the adoption of the electronic logistics information system in HIS in the medical industry. International Journal of Medical Informatics, 77(18), 324–335. http://doi.org/10.1016/j.ijmedinf.2007.06.006 Werber, B., Baggia, A. & Žnidaršič, A. (2016). Factors Affecting the Intention to Use RFID Subcutaneous Microchip Implants for Healthcare Purposes. Manuscript Submitted for Publication. Werber, B. & Žnidaršič, A. (2015). The use of subcutaneous RFID microchip in health care - a willingness to challenge. Health and Technology, 5(1), 57–65. http://doi.org/10.1007/s12553- 015-0105-3 Wu, I.-L. & Chen, J.-L. (2005). An extension of Trust and TAM model with TPB in the initial adoption of on-line tax: An empirical study. International Journal of Human-Computer Studies, 62(6), 784–808. http://doi.org/10.1016/j.ijhcs.2005.03.003 Yazdi, A. A., Preite, R., Milton, R. D., Hickey, D. P., Minteer, S. D. & Xu, J. (2017). Rechargeable membraneless glucose biobattery: Towards solid-state cathodes for implantable enzymatic devices. Journal of Power Sources, 343, 103–108. http://doi.org/10.1016/j.jpowsour.2017.01.032 Yee-Loong Chong, A., Liu, M. J., Luo, J. & Keng-Boon, O. (2015). Predicting RFID adoption in healthcare supply chain from the perspectives of users. International Journal of Production Economics, 159, 66–75. http://doi.org/10.1016/j.ijpe.2014.09.034 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Customer Context and Social CRM: A Literature Review and Research Agenda 48 MATTHIAS WITTWER, OLAF REINHOLD & RAINER ALT Abstract Social Media have emerged as further source of information for businesses. Data from Social Media have the potential to enable companies in better understanding and serving their customers. This requires the combination of two perspectives – the inside-out view underlying traditional CRM applications on the one and the out-side-in view inherent in the rather dynamic and situation-specific data from e.g. So-cial Media on the other hand. The latter form the basis for understanding customer context, which is explored in this paper. This paper contributes to existing research by developing a customer context model and related information through conducting a structured literature review. It then proposes a matching of Social Media data from Twitter to the model and discusses available data sources of context infor-mation. The overall aim is to support customer-dominant business strategies by building up on the Social CRM approach. Keywords: • Customer Context • Customer-dominant Logic • Social Media • Social Customer Relationship Management • CORRESPONDENCE ADDRESS: Matthias Wittwer, Leipzig University, Augustusplatz 10, 04109 Leipzig, Germany, e-mail: wittwer@wifa.uni-leipzig.de. Olaf Reinhold, Leipzig University, Augustusplatz 10, 04109 Leipzig, Germany, e-mail: reinhold@wifa.uni-leipzig.de. Rainer Alt, Leipzig University, Augustusplatz 10, 04109 Leipzig, Germany, e-mail: rainer.alt@uni-leipzig.de. https://doi.org/10.18690/978-961-286-043-1.48 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 686 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Wittwer, O. Reinhold & R. Alt: Customer Context and Social CRM: A Literature Review and Research Agenda Introduction The use of Social Media has increased considerably within the last years. Today, social networks such as Facebook and Twitter report 1.8 billion respectively 320 million active users (Facebook, 2017; Twitter, 2017). Users of these networks not only share their opinions on products or companies or complain about products or services. They also share personal information that are potentially relevant for an interaction with companies (Heller Baird & Parasnis, 2011; Kaplan & Haenlein, 2010; Woodcock, Green, & Starkey, 2011). For companies, using information from these sources might be valuable since they originate directly from the customers them-selves. This development drives the necessity to automate the acquisition and pro-cessing of social data and to integrate it with Customer Relationship Management (CRM) applications. This interconnection of Social Media on the one and CRM appli-cations on the other hand is referred to as Social CRM (Alt & Reinhold, 2012). This concept is a means to meet the personal agendas of a company’s customers (Greenberg, 2010) and therefore requires personalization based on additional cus-tomer information. As today’s customers expect collaborative and personalized interactions with com-panies (Baumöl, Hollebeek, & Jung, 2016) most businesses declare customer-orientation as a part of their business strategy (Alt, 2016). However, there are two different notions of customer-orientation, a seller and a buyer perspective, and this research adopts the latter, which refers to the customer and his respective benefits. This perspective is also named outside-in (buyer) perspective and contrasts the in-side-out (seller) perspective (Saeed, Yousafzai, Paladino, & De Luca, 2015). This paper suggests that context information are an adequate and promising means to satisfy this expectation and to understand the higher- order needs of a customer. Context is relevant to many interaction scenarios between providers and consumers (Adomavicius, Mobasher, Ricci, & Tuzhilin, 2011; Dey, 2001) and might lead to a new understanding of the customer, who actively influences and orchestrates the configuration of products and services across multiple providers (Reinhold, Wittwer, Alt, Kirsten, & Kiess, 2017). In addition, the current paper adopts the perspective of customer-dominant logic (CDL), an approach that places customers in the center of business activities and pursues an outside-in perspective. This requires that businesses understand their customers in terms of their respective situation that usually is not part of classical CRM applications. This paper argues that highly relevant information can be cap-tured from additional data sources, such as Social Media. As there is relatively little research on customer context, this paper clarifies the term, derives a customer con-text model for Social CRM from literature and complements this model with specific context elements. Hence, the following two research questions are formulated:  RQ1: How can the term context be defined from a customer’s perspective?  RQ2: Which context elements and data sources are relevant within a Social CRM? 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 687 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Wittwer, O. Reinhold & R. Alt: Customer Context and Social CRM: A Literature Review and Research Agenda To answer the research questions, two research methods are applied: First, a struc-tured literature review was conducted in order to clarify both the term customer con-text and its constituents and to finally derive a context model. Second, a mapping of the constituent context elements with Social Media data is provided. To achieve the research aim, the paper is structured as follows: The second chapter introduces the conceptual foundations, i.e. the CDL and Social CRM. Thereafter, chapter three pre-sents the literature review and derives the model as well its elements and finally de-scribes the matching. Chapter four discusses the findings and, finally, the paper con-cludes with a summary and the formulation of future research questions. Conceptual foundation 2.1 Customer-dominant logic The term and concept of CDL originated from the fields of relationship marketing and service research (Heinonen et al., 2010). Compared to other approaches, such as the service-dominant logic (SDL), CDL is a perspective on business from a cus-tomer’s viewpoint and therefore emphasizes how customers embed services (or products) in their lives rather than how businesses can provide services to custom-ers (Heinonen & Strandvik, 2015). CDL therefore answers the question “What can we offer to customers that they are willing to purchase and pay for?” instead of asking “How can we sell more of our existing offerings?” (Strandvik, Holmlund, & Edvardsson, 2012). In order to answer this question, businesses need to apply ade-quate methods to understand customers and their logic. The concept of CRM, which is a combination of customer-oriented strategies and technologies, aims at long-term profitable relationships (Greenberg, 2010) and of-fers means (e.g. customer segmentation and analytics, campaign management) to better understand customers. However, CRM systems offer an inside-out view on a customer, i.e. they create customer profiles (cf. Neckel & Knobloch 2015) that hold information (i.e. action data, reaction data, personal data, and potential data) about customers (cf. Neckel & Knobloch 2015; Reimer & Becker 2015) that are known to a company from past interactions. A complementing approach is the outside-in view as mentioned before which contributes information from the customers themselves and therefore complements classical customer profiles. This view might also con-tribute to a firm’s competitive advantage as market requirements can be anticipated ahead of competitors (Day, 1994). Hence, traditionally stored customer information (inside-out view) is rather static and needs to be complemented by rather dynamic information (outside-in view). These initial considerations drive the need to enhance the concept of a CDL by proposing the application of a deeper understanding of the customer. 688 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Wittwer, O. Reinhold & R. Alt: Customer Context and Social CRM: A Literature Review and Research Agenda 2.2 Social Media and Social CRM Social Media can be defined as web-based internet applications that allow the crea-tion, access, and exchange of user-generated content (Greenberg, 2010). Kaplan and Haenlein (2010) propose a classification for Social Media which encompasses among others social networking sites (e.g. Facebook) and micro blogs (e.g. Twit-ter). Facebook and Twitter are amongst the largest Social Media and contain millions of public postings each day. These channels represent platforms for the information exchange between customers and are therefore a valuable source of customer and context information. For example, a single tweet delivers up to 60 different attrib-utes that help in further enriching CRM data with information provided by customers themselves (e.g. their current situation, needs or problems). The term Social CRM denotes a customer-oriented concept that integrates Social Media with CRM applications and thereby opens a broad spectrum of potential use cases in the area of marketing, sales and service (Greenberg, 2009; Alt & Reinhold, 2012). Among the examples are to derive knowledge on target customers and influ-encers or on product improvements as well as online customer interaction. It there-fore widens the understanding of classical CRM applications as it includes the out-side-in perspective on a customer. An important element of Social CRM is the inte-gration of unstructured data from the social web, such as product- or brand-based data and further context elements. This requires techniques for monitoring and ana-lyzing social content and integrating results into CRM processes. In this context, Reinhold and Alt (2012) proposed five task areas as elements of an integrated Social CRM. Here, Social Media Monitoring forms one of the components and aims at au-tomatically identifying business-relevant information. The related monitoring steps (cf. Bengston et al. 2009; Bruns & Liang 2012; Stavrakantonakis et al. 2012) and their respective outcomes (cf. Stieglitz et al. 2014; Zhang & Vos 2014) are described and further consolidated in literature (Wittwer, Reinhold, & Alt, 2016). Elements of a customer context model for Social CRM 3.1 Defining customer context The literature review followed the methodology suggested by vom Brocke et al. (2009), which comprises the steps (1) defining the review scope, (2) conceptualizing the topic and (3) the literature search itself. Starting with the first step, the scope of the literature review followed Cooper (1988, cf. Table 1) and focused on research outcomes and theories (i.e. definitions and elements). It aimed at the integration of existing knowledge and was conceptually organized to cluster similar works. The perspective may be characterized as a neutral representation for both specialized scholars as well as practitioners as the target audience. The results are finally repre-sentative for the IS community as respective data sources were queried. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 689 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Wittwer, O. Reinhold & R. Alt: Customer Context and Social CRM: A Literature Review and Research Agenda Table 1: Characteristics of the literature review Characteristic Categories research research Focus theories applications outcomes methods Goal integration criticism central issues Organization historical conceptual methodological Perspective neutral representation espousal representation specialized general general Audience practitioners scholars scholars public exhaustive central / Coverage exhaustive representative and selective pivotal The keyword search (cf. Table 2) was performed on the databases of EBSCO, IEEE, and ScienceDirect in title (TI), publication title (PT), abstract (AB), and keywords (KW). The first search string (steps 2 and 3) (“customer context”) was supplement-ed with the terms “consumer context” and “patient context” as the initial number of search results was low (22). Only reviewed contributions published since the year 2000 and such that are written in English language were considered in order to en-sure transparency of results on the one hand and currentness on the other hand. The number of search results for all three keywords and the named restrictions was 146 and formed the basis for a deeper analysis. Each publication was screened in the named fields and, if marked as relevant to the concept of customer (or con-sumer or patient) context, the full-text was read to extract relevant items. Since it was found that context may either be related with application systems or their re-spective users (customers), a further restriction was made towards the user per-spective. This view aligns with the CDL perspective as it helps businesses to under-stand customers and their individual, situation-based needs. Table 2: Results of the literature search Keywords Number of results Databases Search fields A B C Initial Evaluated EBSCO TI, AB, KW 14 54 2 70 5 TI, PT, AB, IEEE 2 7 13 22 1 KW ScienceDirect TI, AB, KW 6 29 19 54 8 Total - 22 90 34 146 14 690 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Wittwer, O. Reinhold & R. Alt: Customer Context and Social CRM: A Literature Review and Research Agenda After screening all publications, the relevant contributions to the understanding of customer context were selected (14). While analyzing the papers in detail it was found that they contribute to either a definition, the understanding of elements or a classification of the latter. The following table presents the resulting papers and indi-cates their main contribution. Table 3: Context definitions, elements and dimensions from the literature review Author(s) Context definition Context elements Context dimensions (Helgason & “(…) objects of - Biologic make up, Jobe, 2006) interest or history, environment quantities which potentially can take on different numerical or other values. ” (Bose & Chen, " (…) services, Location/position, - 2009) which take into time, mobile consideration the technology context data of consumers such as time, location etc." (Gard & “(…) where - Describe Kring, 2009) participants were; environmental who participants contexts of were with; what schizophrenia participants were patients as where doing (…)” participants were, who participants were with, and what participants were doing (Griffin & De “An adaptation of Blood sugar level - Leastar, 2009) the presence mechanism to convey patient context derived from smart devices. ” 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 691 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Wittwer, O. Reinhold & R. Alt: Customer Context and Social CRM: A Literature Review and Research Agenda Author(s) Context definition Context elements Context dimensions (Sannino & De “(…) patient Patient posture - Pietro, 2011) context means (lying, standing), patient posture, movement (walking, movement, breath, running), breath, temperature etc. ” temperature, heart rate (min, max, threshold), time/interval (Haas‐ - Product knowledge, - Kotzegger & prior experience, Schlegelmilch, perceived 2013) geographical distance (Steel, “(…) stimuli and - - Dubelaar, & phenomena that Ewing, 2013) exist in the environment surrounding an individual or operational unit that has an impact on the individual or unit and can limit or provide opportunities for behaviour and attitudes in an organisational setting.” (Kristina “What are - - Heinonen, customers doing? ”, 2014) “(…) what customers do and experience in their own lives and businesses beyond service offerings (…)” 692 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Wittwer, O. Reinhold & R. Alt: Customer Context and Social CRM: A Literature Review and Research Agenda Author(s) Context definition Context elements Context dimensions (Pappachan, - Age/age group, - Yus, Joshi, & gender, location (city, Finin, 2014) state, location), profession, diseases in the area, symptoms, activity (Chou, Chen, “(…) specific - - & Conley, customer needs and 2015) values (…)” (Nemoto, Uei, “(…) a set of Personalities, Environment Sato, & spatial-temporal knowledge, skills, attributes, customer Shimomura, elements related to relationship with attributes, 2015) the person or others, social trends, environment states, product. In economic customer states addition, these circumstances, spatial and/or technology direction, temporal elements public consciousness, are called health conditions, contextual humors, emotions, elements (…)” behaviors, season, location, weather, temperature (Boulemtafes, - Available (medical) - Rachedi, & resources (devices), Badache, location, constraints 2016) impacting a user’s mobility, available communication networks, sensing infrastructures (Kahveci, - Current medication, - Yuksel, & medical history, tests, Laleci allergies, reactions, Erturkmen, drug therapies 2016) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 693 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Wittwer, O. Reinhold & R. Alt: Customer Context and Social CRM: A Literature Review and Research Agenda Author(s) Context definition Context elements Context dimensions (McHeick, - Blood pressure, - Nasser, carotid stenosis, Dbouk, & symptoms, age, Nasser, 2016) speech impairment, unilateral weakness The results in the table show that solely one research paper provides besides a def-inition of context also dimensions and associated elements (cf. Nemoto et al., 2015) whereas most papers (8) provide information on solely one of these aspects. Both context dimensions as well as models are sparsely described in current research as indicated above. Definitions of context are applicable to different spheres of life and are either comparatively broad or enumerative and therefore do not foster a com-mon understanding of the term. However, there are papers that consider the cus-tomer and his environment as relevant components of context (Gard & Kring, 2009; Nemoto et al., 2015; Steel et al., 2013) which aligns with the customer-centered view of context within this paper. In addition and from a Social CRM perspective, context is conceived as additional information originating from the customer (e.g. through analyzing Social Media), which is called outside-in perspective in the follow-ing. It furthermore intends to supplement the existing inside-out view on a customer (e.g. customer profiles within CRM applications). Therefore, this research defines customer context as customer- centered, dynamic and domain-independent infor-mation that might be used in different spheres of life (e.g. mobility, health) and provide additional information about the customer and his environment. Given this definition, a further specification of context by defining its constituents is necessary and described in the following. 3.2 Structuring customer context In addition to the above-mentioned definitions of context, literature also provides a framework for structuring customer context respectively describes specific context elements. For this research, the schema of Nemoto et al. (2015) fits best as it is the only framework that suggests context dimensions, clusters context elements within these dimensions and aligns with the view on the customer and his environment. The other papers found mainly discuss definitions and elements and only a few (three, cf. Table 3) mention related context dimensions. The resulting model (Figure 1) summarizes context elements provided in the reviewed literature and is extended by examples for each element. It has to be considered that the given list of context elements is not exhaustive. However, the model differs the two before mentioned perspectives on context information, i.e. the customer and his environment. The characteristics of these information are furthermore distinguished into individual or global on the one and long- term or short-term validity on the other hand (Nemoto et al., 2015). With regard to a Social CRM system, individual context information belong to a specific customer whereas global information form the basis for describ-ing customer segments. Gathered 694 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Wittwer, O. Reinhold & R. Alt: Customer Context and Social CRM: A Literature Review and Research Agenda context are grouped into rather short-term or long-term valid information and therefore signals either a temporary interaction op-portunity (e.g. based on the location and preferences of a customer) or a general market demand (e.g. based on a community’s demand). Figure 1: Customer context model for Social CRM (based on Nemoto et al., 2015) With regard to customer profiles, the attributes in the model describe the before mentioned action, reaction, personal and potential data and enable businesses to complement or enrich their customer profiles. This serves as a basis for Social CRM processes such as for example customer segmentation and campaign management. Within a Social CRM the most relevant source of data are Social Media as they ena-ble businesses to get closer to the customer than ever before (Alt, 2016) and pro-vide a rich set of data about customers and customer segments. Wearables, such as smart watches, are a second source of information. They deliver relevant user-centered information such as pulse rate, activity level, pedometer, altimeter, loca-tion, time, distance, or temperature. Especially health-related information from those devices are regarded as an addition to specific medical devices, such as heart rate monitors, which are a further source of information and may possess a higher accuracy of data capturing as they are calibrated and approved. 3.3 Context elements from Social Media With regard to a Social CRM application, two principle methods of context infor-mation acquisition may be distinguished (Reinhold et al., 2017). The first method is a direct user input as a response to an input prompt. This may be the case when a customer inputs information himself, for example in order to search or configure a service offering (e.g. mobility services such as Quixxit , Outfittery ). The second method is an indirect user 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 695 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Wittwer, O. Reinhold & R. Alt: Customer Context and Social CRM: A Literature Review and Research Agenda input, which gathers data with or without a customer’s knowledge. This may be the case when mobile applications automatically collect e.g. location data in order to offer relevant mobility services. This research focuses on the latter and assumes a conscious transfer of context information from a cus-tomer towards a company. In this setting, a customer is aware that certain data may be transferred. Capturing context from Social Media refers to the second method and may either be performed by using a social network’s application programming interface (API; “mined context”) or by using specific Social CRM applications (such as Social Media Analytics, Monitoring or Text Mining applications) or external service providers such as Google Fit (“derived context”; Henricksen et al., 2005). For example, using the Twitter API delivers the name of a user and the raw text of a tweet. Applications of Social Media Monitoring and Analytics on the other hand aggregate and interpret available context information and are able to create further information that were not available from the API. For example, based on a user’s tweets SMA applications provide an overview about different topics a user is interested in and his attitude or sentiment towards these topics. Figure 2 summarizes both methods to capture con-text information from Social Media. Figure 2: Methods for capturing context from Social Media The following table presents the results of a mapping between context elements from the model (see Figure 1) and available context information from the Twitter API. The matching refers to the indirect and mined method of capturing context in-formation (see the highlighted path in Figure 2) and was conducted by reviewing all available attributes from the Twitter API and assigning them to a suitable context element in the model based on the attribute’s description in the API. The table pre-sents directly available data elements, which are mainly related to the context di-mensions 2-4 (first column). The contained information might be enriched by apply-ing e.g. SMA or Business Intelligence applications (cf. Wittwer, Reinhold, Alt, Jessen, & Stüber, 2017). However, especially for the first context dimension (environment attributes) the derivation of information is necessary in order to obtain further in-sights. 696 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Wittwer, O. Reinhold & R. Alt: Customer Context and Social CRM: A Literature Review and Research Agenda Table 4: Directly available context information from Twitter Context Context Available attributes from Twitter dimensions elements Social trends t enm tes Economic n u (requires deriving further context information o ib circumstances ir using Social CRM applications) vn Attr E Available technology Personality User name, preferences, language, timestamp, user tesu description, verification status ib Knowledge Listed count Attrerm Skills User description stou Relationship Contributors, favorite count, favourites count, C with others followers, friends count Health Text, user description, hashtags Emotions Text, user description, hashtags States Activity Text, coordinates, place, description, statuses er count, hashtags m stou Behavior Text, statuses count C Preferences Text, profile background color, description, hashtags, media t Devices Text, named entities, hashtags en m Time Coordinates, time zone noirv States Location Coordinates, place, named entities, hashtags nE Weather Coordinates, place, hashtags Based on the model and using the Twitter API, a software implementation could extract the given information and build a specific context model. By extracting fur-ther tweets from an individual, the model gradually completes. For example, the tweet text might reveal information on an individual’s emotions, preferences as well as interests and thereby frame his “customer states”. In addition, information such as coordinates and 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 697 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Wittwer, O. Reinhold & R. Alt: Customer Context and Social CRM: A Literature Review and Research Agenda time zone indicate the residence or whereabouts and frame the “environment states”. Finally, the user name, language and user description frame “customer attributes”. Discussion Following Heinonen and Strandvik (2015), the essential features of CDL are the business perspective, customer logic, offerings, value formation, and customer eco-systems. The results of this research contribute especially to the understanding of the customer logic and therefore improve the relevance of product or service offer-ings. Current research falls short in providing a common understanding of customer con-text with a structured collection of related context information and the instantiation with Social Media data. Therefore, this paper complements existing research by ad-dressing these aspects. As a first result and with respect to RQ1 this research pre-sents a definition of customer context in Social CRM settings and provides a concep-tual model to structure the concept and its constituents. As a second result and re-ferring to RQ2, the model is adapted with a non-exhaustive list of context elements found during a literature review. It builds on the results from multiple research disci-plines (information systems, marketing and management, and healthcare) and therefore aims to be applicable to multiple spheres of live, e.g. mobility, communi-cation, and health. The paper then discusses several data sources of context infor-mation (RQ2), focusing especially on Social Media as a rich data source. The pro-vided mapping shows that relevant context information are available within Social Media and relates them to the model. These results are discussed together with a CDL perspective on customer relation-ships. In CDL as a marketing perspective, customer logic is a concept describing a customer’s activities, experiences, and goals (Heinonen et al., 2010). Each custom-er’s logic is individual, can change and may be influenced (e.g. by others or external effects) or may change over time. Within a Social CRM, customer context is a spe-cific and structured enabler that helps businesses to understand this customer logic as it captures individual information, especially from Social Media, either by sensing or deriving context information. Customer context extends the often stressed 360° view on a customer (Chen & Popovich, 2003; Sussin, Friedman, & O’Kane, 2015; van Looy, 2016) by incorporating outside-in data with existing inside-out data and thereby puts the customer at the center of business activities. As a result, it is the basis to enable a cross-provider understanding of customers. This research provides the starting point for individualized, customer- centered Social CRM processes based on the captured data from Social Media. The described context information might be used in Social CRM processes, such as the definition of personas, which represent specific needs, characteristics, or preferences of a target or target group or within a so called “social customer value dashboard”, which contains weighted context ele-ments that calculate to a sum and provide information about the relevance of an offering for a target or target group. This briefly illustrates practical and exemplary application perspectives of the concept within a CDL strategy. 698 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Wittwer, O. Reinhold & R. Alt: Customer Context and Social CRM: A Literature Review and Research Agenda Ultimately, these re-sults form the basis for businesses to answer the initially raised question “What can we offer to customers that they are willing to purchase and pay for?”. Conclusions and outlook This research presents an analysis of current literature on customer context. It de-rives a definition of context, a model, context dimensions as well as specific context elements from literature in order to substantiate a common understanding of the concept for Social CRM. Thereafter, the paper describes a mapping of context ele-ments with Social Media data using Twitter as an example. As business environ-ments are increasingly competitive, the need to understand customers and their in-dividual logic is an inevitable success factor for them. Methods and sources for the collection of context information are discussed and it is postulated that especially Social Media deliver a large amount of data (besides e.g. wearables and medical devices) that may help to transform a company’s inside-out perspective towards an outside-in perspective. However, the following considerations reflect on the limitations of this research and thereby formulate a short exemplary research agenda, which shall be addressed by future research. The aspects reflect on the application of the concept, the investiga-tion of benefits for both customers and businesses and the necessity to control the access to context information:  First, it is necessary to further research on the proposed model’s applicability to service (or product) providers and extend the given list of context infor-mation. Furthermore, an application of the model to other application fields, such as medicine, shall be addressed and could be beneficial. With respect to the openEHR standard (openEHR Foundation, 2017) for Electronic Health Records (EHR) possibly valuable (patient) context information could supple-ment clinical information such as basic information, medications list, thera-peutic precautions and the social situation. For example, using a case study approach could identify further context elements and application fields of rel-evance.  Second, further research also needs to answer the questions of how to mod-el and digitally represent context information. For example, XML notations and annotation models (e.g. W3C Web Annotation Data Model) may be a suitable digital representation of context information to be exchanged be-tween application systems, such as Social CRM and recommender systems.  Third, research needs to address the resulting benefits that may arise from the incorporation of customer context into product or service offerings (or medical treatments) from both a company’s and particularly from a custom-er’s perspective. For example, a presumable selling potential could be based on a specific demand.  Finally and within such a customer-centered and data-based business strate-gy, privacy aspects are highly relevant and need to be considered by further research. The argumentation of this research is based on the assumption that 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 699 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Wittwer, O. Reinhold & R. Alt: Customer Context and Social CRM: A Literature Review and Research Agenda publicly available data can be used within a business context but rising questions on privacy, data sovereignty, data usage, and data control still have to be answered to prevent a misuse of social data which entails latent risks e.g. for personal rights (Alt & Reinhold, 2016). With regard to the data control aspect, a proposed solution is a customer-owned “context app” which provides a central control mechanism to the user. For example, a cus-tomer could decide selectively, e.g. during a service configuration process, which additional context information he will provide in order to configure a service congenial to his need. With the rising use of Social Media on the one and the also rising demand of collab- orative and personalized interactions with companies on the other hand, the latter need to apply methods to better understand their customers. Customer context (from Social Media) is a promising means to achieve this aim as it helps to under-stand customers and their respective needs. It therefore helps to bring customers and companies closer together. References Adomavicius, G., Mobasher, B., Ricci, F., & Tuzhilin, A. (2011). Context-Aware Recommender Systems. AI Magazine, 32(3), 67–80. Alt, R. (2016). Electronic Markets on customer-orientation. Electronic Markets, 26(3), 1–5. https://doi.org/10.1007/s12525-015-0215-9 Alt, R., & Reinhold, O. (2012). Social Customer Relationship Management (Social CRM). Business & Information Systems Engineering, 4(5), 287–291. Alt, R., & Reinhold, O. (2016). Social Customer Relationship Management. Berlin: SpringerGabler. https://doi.org/10.1365/s35789-011-0027-y Ang, L. (2011). Community relationship management and social media. Journal of Database Marketing & Customer Strategy Management, 18(1), 31–38. https://doi.org/10.1057/dbm.2011.3 Baumöl, U., Hollebeek, L., & Jung, R. (2016). Dynamics of customer interaction on social media platforms. Electronic Markets, 199–202. https://doi.org/10.1007/s12525-016-0227-0 Bengston, D. N., Fan, D. P., Reed, P., & Goldhor-Wilcock, A. (2009). Rapid Issue Tracking: A Method for Taking the Pulse of the Public Discussion of Environmental Policy. Environmental Communication: A Journal of Nature and Culture, 3(3), 367–385. Bose, I., & Chen, X. (2009). A framework for context sensitive services: A knowledge discovery based approach. Decision Support Systems, 48(1), 158–168. https://doi.org/10.1016/j.dss.2009.07.009 Boulemtafes, A., Rachedi, A., & Badache, N. (2016). A study of mobility support in wearable health monitoring systems: Design framework. In Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA (Vol. 2016–July). https://doi.org/10.1109/AICCSA.2015.7507158 Bruns, A., & Liang, Y. (2012). Tools and Methods for Capturing Twitter Data During Natural Disasters. First Monday, 17(4–2). Chen, I. J., & Popovich, K. (2003). Understanding customer relationship management (CRM): People, process and technology. Business Process Management Journal, 9(5), 672–688. 700 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Wittwer, O. Reinhold & R. Alt: Customer Context and Social CRM: A Literature Review and Research Agenda Chou, C.-J., Chen, C.-W., & Conley, C. (2015). Creating Sustainable Value Through Service Offerings. Research Technology Management, 58(2), 48–56. https://doi.org/10.5437/08956308X5802214 Cooper, H. M. (1988). Organizing knowledge syntheses: A taxonomy of literature reviews. Knowledge in Society, 1(1), 104. https://doi.org/10.1007/BF03177550 Day, G. S. (1994). The Capabilities of Market-Driven Organizations. Journal of Marketing, 58(4), 37–52. https://doi.org/10.2307/1251915 Dey, A. (2001). Understanding and Using Context. Personal and Ubiquitous Computing, 5(1), 4– 7. Facebook. (2017). Facebook Q4 2016 Earnings. Retrieved from http://d1lge852tjjqow.cloudfront.net/CIK-0001326801/bc7a177c-abb0-4b3c-a11b- ee67c656c2e1.pdf Gard, D. E., & Kring, A. M. (2009). Emotion in the daily lives of schizophrenia patients: Context matters. Schizophrenia Research. https://doi.org/10.1016/j.schres.2009.07.017 Greenberg, P. (2009). Time to Put a Stake in the Ground on Social CRM. Retrieved June 1, 2015, from http://the56group.typepad.com/pgreenblog/2009/07/time-to-put-a-stake-in-the-ground- on-social-crm.html Greenberg, P. (2010). CRM at the speed of light: social CRM strategies, tools and techniques for engaging your customers (4th ed.). New York et al.: McGraw-Hill. Griffin, L., & De Leastar, E. (2009). Social networking healthcare. In Proceedings of the 6th International Workshop on Wearable, Micro, and Nano Technologies for Personalized Health: “Facing Future Healthcare Needs”, pHealth 2009 (pp. 75–78). https://doi.org/10.1109/PHEALTH.2009.5754825 Haas‐Kotzegger, U., & Schlegelmilch, B. B. (2013). Conceptualizing consumers’ experiences of product‐harm crises. Journal of Consumer Marketing, 30(2), 112–120. Heinonen, K. (2014). Multiple perspectives on customer relationships. International Journal of Bank Marketing, 32(6), 450–456. https://doi.org/10.1108/IJBM-06-2014-0086 Heinonen, K., & Strandvik, T. (2015). Customer-dominant logic: foundations and implications. Journal of Services Marketing, 29(6/7), 472–484. https://doi.org/10.1108/JSM-02-2015-0096 Heinonen, K., Strandvik, T., Mickelsson, K., Edvardsson, B., Sundström, E., & Andersson, P. (2010). A Customer Dominant Logic of Service. Journal of Service Management, 21(4), 531– 548. https://doi.org/10.1108/09564231011066088 Helgason, C. M., & Jobe, T. H. (2006). Representing Causation in Medicine: How Fuzzy “Sets as Points” Capture the Uniqueness of the Patient, Context, and Change in the Fuzzy Unit Hypercube. In IEEE International Conference on Systems, Man and Cybernetics (pp. 1786– 1792). Taipei. Heller Baird, C., & Parasnis, G. (2011). From social media to social customer relationship management. Strategy & Leadership, 39(5), 30–37. Henricksen, K., Indulska, J., & McFadden, T. (2005). Modelling context information with ORM. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3762 LNCS, 626–635. Kahveci, K., Yuksel, M., & Laleci Erturkmen, G. B. (2016). Enhancing mobile spontaneous adverse drug event reporting through electronic health records. In eChallenges e-2015 Conference Proceedings (pp. 1–8). https://doi.org/10.1109/eCHALLENGES.2015.7441054 Kaplan, A. M., & Haenlein, M. (2010). Users of the World, Unite! The Challenges and Opportunities of Social Media. Business Horizons, 53(1), 59–68. McHeick, H., Nasser, H., Dbouk, M., & Nasser, A. (2016). Stroke Prediction Context-Aware Health Care System. In Proceedings - 2016 IEEE 1st International Conference on Connected 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 701 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Wittwer, O. Reinhold & R. Alt: Customer Context and Social CRM: A Literature Review and Research Agenda Health: Applications, Systems and Engineering Technologies, CHASE 2016 (pp. 30–35). https://doi.org/10.1109/CHASE.2016.49 Neckel, P., & Knobloch, B. (2015). Customer Relationship Analytics. Heidelberg: dpunkt.verlag. Nemoto, Y., Uei, K., Sato, K., & Shimomura, Y. (2015). A Context-Based Requirements Analysis Method for PSS Design. Procedia CIRP, 30, 42–47. openEHR Foundation. (2017). EHR Information Model. Retrieved from http://www.openehr.org/releases/RM/latest/docs/ehr/ehr.html Pappachan, P., Yus, R., Joshi, A., & Finin, T. (2014). Rafiki: A Semantic and Collaborative Approach to Community Health-Care in Underserved Areas. 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, (CollaborateCom), 322–331. https://doi.org/10.4108/icst.collaboratecom.2014.257299 Reimer, K., & Becker, J. U. (2015). What customer information should companies use for customer relationship management? Practical insights from empirical research. Management Review Quarterly, 65(3), 149–182. https://doi.org/10.1007/s11301-014-0110-z Reinhold, O., Wittwer, M., Alt, R., Kirsten, T., & Kiess, W. (2017). Exploring Context from the Consumer Perspective: Insights from eBusiness and Health Care. In W. Abramowicz, R. Alt, & B. Franczyk (Eds.), Business Information Systems Workshops: BIS 2016 International Workshops, Leipzig, Germany, July 6-8, 2016, Revised Papers (pp. 340–346). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-52464-1_31 Saeed, S., Yousafzai, S., Paladino, A., & De Luca, L. M. (2015). Inside-out and outside-in orientations: A meta-analysis of orientation’s effects on innovation and firm performance. Industrial Marketing Management, 47, 121–133. https://doi.org/10.1016/j.indmarman.2015.02.037 Sannino, G., & De Pietro, G. (2011). A smart context-aware mobile monitoring system for heart patients. In IEEE International Conference on Bioinformatics and Biomedicine Workshops (pp. 655–695). Stavrakantonakis, I., Gagiu, A.-E., Kasper, H., Toma, I., & Thalhammer, A. (2012). An Approach for Evaluation of Social Media Monitoring Tools. In 1st International Workshop on Common Value Management (Vol. 2012, pp. 52–64). Steel, M., Dubelaar, C., & Ewing, M. (2013). Developing customised CRM projects: The role of industry norms, organisational context and customer expectations on CRM implementation. Industrial Marketing Management, 42(8), 1328–1344. Stieglitz, S., Dang-Xuan, L., Bruns, A., & Neuberger, C. (2014). Social Media Analytics. Business & Information Systems Engineering, 6(2), 89–96. https://doi.org/10.1007/s12599-014-0315-7 Strandvik, T., Holmlund, M., & Edvardsson, B. (2012). Customer needing: a challenge for the seller offering. Journal of Business & Industrial Marketing, 27(2), 132–141. https://doi.org/10.1108/08858621211196994 Sussin, J., Friedman, T., & O’Kane, B. (2015). How to Incorporate Social Data for CRM Into Your Quest for a 360-Degree View of the Customer. Gartner Inc. (Vol. G00273280). Twitter. (2017). Twitter Fourth Quarter 2016 Results. Retrieved from http://files.shareholder.com/downloads/AMDA-2F526X/3906676478x0x927279/AC2897AE- A9F6-43A7-B150-52300045809C/Q416_ShareholderLetter.pdf van Looy, A. (2016). Social Media Management. Technologies and Strategies for Creating Business Value. Cham et al.: Springer International Publishing. vom Brocke, J., Simons, A., Niehaves, B., Riemer, K., Plattfaut, R., & Cleven, A. (2009). Reconstructing the Giant: On the Importance of Rigour in Documenting the Literature Search Process. In Proceedings of the European Conference on Information Systems. Verona. Wittwer, M., Reinhold, O., & Alt, R. (2016). Social Media Analytics in Social CRM – Towards a Research Agenda. In Proceedings of the 29th Bled eConference (pp. 1–18). Bled. 702 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) M. Wittwer, O. Reinhold & R. Alt: Customer Context and Social CRM: A Literature Review and Research Agenda Wittwer, M., Reinhold, O., Alt, R., Jessen, F., & Stüber, R. (2017). Social Media Analytics Using Business Intelligence and Social Media Tools -- Differences and Implications. In W. Abramowicz, R. Alt, & B. Franczyk (Eds.), Business Information Systems Workshops: BIS 2016 International Workshops, Leipzig, Germany, July 6-8, 2016, Revised Papers (pp. 252– 259). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-52464-1_23 Woodcock, N., Green, A., & Starkey, M. (2011). Social CRM as a business strategy. Journal of Database Marketing & Customer Strategy Management, 18(1), 50–64. https://doi.org/10.1057/dbm.2011.7 Zhang, B., & Vos, M. (2014). Social media monitoring: aims, methods, and challenges for international companies. Corporate Communications: An International Journal, 19(4), 371– 383. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons ERP Solution Acceptance by Students 49 SIMONA STERNAD ZABUKOVŠEK & SAMO BOBEK Abstract ERP acceptance by its users in companies has been researched by several authors while ERP acceptance by students within study programmes has not been researched so often. For teachers should be important to know which factors have influence on student ERP acceptance. Our study researches student acceptance of ERP solutions while they are exposed to ERP solution and they are involved in ERP actual use. Our research is based on TAM which provides a basis for tracing impact of external factors on internal beliefs (perceived usefulness – PU and perceived ease of use – PEOU), attitudes (AT), intentions (behavioural intention – BI) and actual use. Research model includes additional external factors such as: experience with computer, computer self-efficiency, personal innovativeness toward IT, computer anxiety, user manuals (help), system quality, social influence (environment), training and education etc. Research was conduct within a group of 121 students after short interaction with Microsoft Dynamics NAV ERP solution. Results show that most important external factors for student ERP acceptance are: individual benefits, training and education on ERP system and quality of ERP system. Keywords: • ERP solutions • students • ERP acceptance • TAM • CORRESPONDENCE ADDRESS: Simona Sternad Zabukovšek, University of Maribor, Faculty of Economics and Business, Razlagova ulica 14, 2000 Maribor, Slovenia, e-mail: simona.sternad@um.si. Samo Bobek, University of Maribor Faculty of Economics and Business, Slovenia, Razlagova ulica 14, 2000 Maribor, e-mail: samo.bobek@um.si. https://doi.org/10.18690/978-961-286-043-1.49 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 704 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Sternad Zabukovšek & S. Bobek: ERP Solution Acceptance by Students Introduction The most used integrated software solutions in companies from almost all industries worldwide are Enterprise Resource Planning (ERP) solutions. Number of ERP users is growing very fast and majority of employees are using ERP solutions daily at their work. Because this, on labour market is huge demand for students with knowledge of ERP solutions. In past few years, a lot of universities included topics from ERP solutions in their curriculums through different subjects such as: Accounting Information Systems, Enterprise Resource Planning, Information Systems etc. While number of ERP solution user is growing, a lot of research studies regarding ERP user adoptions/acceptance are emerging (for example see Costa et al., 2016). The most used research models are (Awa et al., 2016): technology acceptance model (TAM; Davis, 1989), theory of reasoned action (TRA; Ajzen & Fishbein, 1980), theory of planned behaviour (TPB; Ajzen, 1991), innovation diffusion theory (IDT; Rogers, 2003), stage model (SM; Poon & Swatman, 1999), technology-environment-organization (T-O-E; Tornatzky & Fleisher, 1990); and resource-based view (Caldeira & Ward, 2003). In this area, TAM is one of the most suitable and widely used model to study adoption in IS (Shih and Huang, 2009; Sternad et al., 2011; Costa et al., 2016) and therefore numerous IS researchers apply this method to ERP research. The key purpose of TAM is to provide a basis for tracing impact of external factors on internal beliefs (perceived usefulness - PU and perceived ease of use – PEOU), attitudes (AT), intentions (behavioural intention - BI) and actual use (Davis et al., 1989). Despite ERP acceptance by its users in companies has been researched by several authors, ERP acceptance by students within study programmes has not been researched so often. Our goal is to research external factors which influence student acceptance of ERP solutions. Our research model is based on TAM and include factors of original TAM (perceived ease of use – PEOU, perceived usefulness – PU, attitude toward using ERP system – AT, behaviour intention – BI, actual use - Use) but our research model modify external factors. We have included additional external factors which we think that will have impact on ERP acceptance: experience with computer, computer self-efficiency, personal innovativeness toward IT, computer anxiety, user manuals (help), system quality, social influence (environment), training and education etc. The research approach is based on short interaction (after 12 hours) contact with ERP solution. The survey was conducted among group of students, who do not have any knowledge regarding ERP solutions before. After description of ERP solutions and literature review, research model is described in details and results of study are presented and discussed. ERP solutions ERP solution is usually referred to as a category of business-management software. Typically, this is a suite of integrated applications which an organization can use to collect, store, manage and interpret data from their daily business activities. ERP 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 705 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Sternad Zabukovšek & S. Bobek: ERP Solution Acceptance by Students solutions provide an integrated and continuously updated view of core business processes using common database. ERP solutions track business resources—cash, raw materials, production capacity—and the status of business commitments: orders, purchase orders, and payroll. The applications that make up the system share data across various departments (manufacturing, purchasing, sales, accounting, etc.) that provide the data (Almajali, Masa’deh & Tarhini, 2016). ERP facilitates information flow between all business functions and manages connections to outside stakeholders (Bidgoli, 2004). Most ERP systems incorporate best practices which means the software reflects the vendor's interpretation of the most effective way to perform each business process (Monk & Wagner, 2009). The organization Gartner Group first used the acronym ERP in the 1990s (Wylie, 1990). ERP systems experienced rapid growth in the 1990s, because of the year 2000 problem and the introduction of the euro that disrupted legacy systems, many companies took the opportunity to replace their old systems with ERP (Monk & Wagner, 2009). ERP systems initially focused on automating back office functions (functions which did not directly affect customers), while front office functions (functions which directly dealt with customers, e-business or supplier relationship management (SRM) became integrated later, when the Internet simplified communicating with external parties. The ERP II was introduced in 2000 by the Gartner organization (Bond et al., 2000) and describes web– based software that provides real–time access to ERP systems to employees and partners (such as suppliers and customers). Their role expands traditional ERP resource optimization and transaction processing and leverages information in the resources under its management to help the organizations collaborate with other organizations. ERP II solutions are typically used to enable collaborative initiatives such as supply chain management (SCM), customer relationship management (CRM), and business intelligence (BI) among business partner organizations through the use of various e- business technologies (Møller, 2005; Ruhi, 2016). Organization Gartner Group (Ganly et al., 2013) in year 2013 introduced the term "postmodern ERP" (some call it also eXtended ERP – xERP). According to Gartner's definition of the postmodern ERP strategy, legacy, monolithic and highly customized ERP suites, in which all parts are heavily dependable on each other, should sooner or later be replaced by a mixture of both cloud-based and on premise applications, which are more loosely coupled and can be easily exchanged if needed. Early ERP providers focused on large enterprises, smaller enterprises increasingly use ERP systems in last few years. The worldwide ERP market grew from 3.8% from 24.4B USD in 2012 to 25.4B USD in 2013. SAP is in market leadership position, follow by Oracle, Sage, Infor and Microsoft (Pang et al., 2013). ERP will remain basic software in the organisations. 706 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Sternad Zabukovšek & S. Bobek: ERP Solution Acceptance by Students Literature review Technology Acceptance Model Several theoretical models have been used to investigate the determinants of acceptance and the use of new information technology (IT), such as the theory of reasoned action (TRA; Fishbein and Ajzen, 1975), the theory of planned behaviour (TPB; Ajzen, 1991), the theory of the technology acceptance model (TAM; Davis et al., 1989), innovation diffusion theory (IDT; Rogers, 2003), stage model (SM; Poon & Swatman, 1999), technology-environment-organization (T-O-E; Tornatzky & Fleisher, 1990); and resource-based view (Caldeira & Ward, 2003). Compared to competing models, TAM is believed to be more parsimonious, predicative, and robust (Venkatesh and Davis, 2000; Lu et al., 2003; Liu and Ma, 2006), and so among the theoretical models is most widely used by IS/IT researchers (Davis, 1989; Davis et al., 1989; Amoako-Gyampah and Salam, 2004; Lee et al., 2010; Costa et al., 2016) and therefore numerous IS researchers apply this method to ERP research. TAM posits that two beliefs − perceived usefulness (PU) and perceived ease of use (PEOU) − are of primary relevance for computer acceptance behaviour (Davis et al., 1989). PU is defined as “the degree to which a person believes that using a particular system would enhance his or her job performance” (Davis 1989, p. 320). PEOU in contrast, refers to “the degree to which a person believes that using a particular system would be free of effort” (Davis 1989, p. 320). The two central hypotheses in TAM state that PU and PEOU positively influence an individual’s attitude towards using a new technology (AT), which in turn influences his or her behavioural intention (BI) to use it. Finally, intention is positively related to the actual use (U). TAM also predicts that PEOU influences PU, as Davis et al., (1989, p. 987) put it, “effort saved due to the improved perceived ease of use may be redeployed, enabling a person to accomplish more work for the same effort”. The key purpose of TAM is to provide a basis for tracing the impact of external factors on internal beliefs, attitudes, and intentions (Davis et al., 1989). Original TAM is presented in Figure 1 in grey rectangle. The original TAM is well established and tested and furthermore, a variety of extensions regarding external factors by examining the antecedents of PU and PEOU has been developed such as TAM 2 (Venkatesh and Davis, 2000), UTAUT (Venkatesh et al., 2003) and TAM 3 (Venkatesh and Bala, 2008). ERP solutions Even though TAM can be applied to a variety of technologies, the constructs of TAM need to be extended by customizing factors for specific information systems (Calisir et al., 2009). Few studies, have investigated ERP user acceptance and usage utilizing TAM, and most of them investigate a small number of external factors (for latest researches see Calisir et al., 2009; Shih & Huang, 2009; Sun et al., 2009; Youngberg et al., 2009; Lee et al., 2010; Sternad et al. 2011; Sternad & Bobek, 2013, 2014; Mayeh et al., 2016; Costa et al., 2016). See table 1. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 707 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Sternad Zabukovšek & S. Bobek: ERP Solution Acceptance by Students Table 1: ERP Literature on TAM. Source: Updated from Sternad et al. (2011). Author(s) Focus Amoako-Gyampah They tested the impact of four cognitive constructors (PU, & Salam, 2004. PEOU, perceived compatibility, and perceived fit) on AT and symbolic adoption. Nah et al., 2004. Their study evaluated the impact of one belief construct (shared beliefs in the benefits of a technology) and two technology success factors (training and communications) on PU and PEOU in one global organisation. Shivers-Blackwell They researched student readiness for change (through gender, & Charles, 2006. computer self-efficacy, and perceived benefits of ERP) on BI regarding ERP implementation. Bradley & Lee, They investigated via case studies the relationship between 2007. training satisfaction and the PEOU, PU, effectiveness, and efficiency in implementing an ERP solution at a mid-sized university. Hsieh & Wang, They researched the impact of PU and PEOU on extended use. 2007. Bueno & Salmeron, They developed a research model based on TAM for testing the 2008. influence of the critical success factors (top management support, communication, cooperation, training, and technological complexity) on ERP implementation. Kwahk & Lee, They examined the formation of readiness for change 2008. (enhanced by two factors: organisational commitment and perceived personal competence) and its effect on the perceived technological value of an ERP solution leading to its use. Uzoka et al., 2008. They extended TAM to research the selection of ERP by organisations using factors: impact of system quality, information quality, service quality, and support quality as key determinants of cognitive response as well as which ERP solution to purchase/use. Calisir et al., 2009. They examined factors (subjective norms, compatibility, gender, experience, and education level) that affect users’ BI to use an ERP solution based on potential ERP users at one manufacturing organisation. Scott & Walczak, They investigated students cognitive engagement, prior 2009. experience, computer anxiety, and organizational support as determinants of computer self-efficacy in the use of a multimedia ERP system’s training tool Shih & Huang, Their study attempted to explain BI and AU through 2009. incorporated additional behavioural constructs: top management support, computer self-efficacy, and computer anxiety. 708 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Sternad Zabukovšek & S. Bobek: ERP Solution Acceptance by Students Sun et al., 2009. They extended IT usage models to include the role of ERP’s perceived work compatibility in users’ ERP usage intention, usage, and performance in work settings. Youngberg et al., They researched impact of PEOU, result demonstrability, and 2009. subjective norm on PU and impact of it on usage behaviour. Lee et al., 2010. They examined factor organisational support (formal and informal) on original TAM factors. Sternad et al., 2011. They expose and research external factors which have influence on ERP users in operation phase and investigate the impact of those factors on ERP solution use in company. Sternad They extent original TAM with groups of external factors Zabukovšek& (personal characteristics and information literacy, system and Bobek, 2013. technology characteristics, and organizational-process characteristics) and work compatibility and researched influence the ERP adoption among 44 companies in maturity phase. Sternad Zabukovšek They research and compare the importance of external factors & Bobek, 2014. for two global solutions - SAP and Microsoft Dynamics NAV – regarding user acceptance. Costa et al., 2016. They extended original TAM with factors top management support, training, and the system quality and research their impact on adoption and user satisfaction. Mayeh et al., 2016, They examined the effects of factors absorptive capacity (for understanding, for assimilating and for applying), communication and trust (system and vendor) through original TAM and intention to use ERP solution. Just two from above table (Shivers-Blackwell and Charles, 2006; Scott and Walczak, 2009) researched students ERP acceptance through TAM model. But both authors used small numbers of external factors. Shivers-Blackwell and Charles (2006) also researched student readiness to use ERP technology through model TAM, but they researched ERP acceptance after students read an online newsletter provided by the ERP communication, education, and training team entitled “What is ERP”. Participants were then solicited by their professors to complete the survey. So, they did not have practical experience with use of ERP solution. Their research shows that gender and perceived ERP benefits are related to students’ readiness for change, and readiness for change is a significant predictor of students’ attitude toward usage of the ERP system. Scott and Walczak (2009) examined cognitive engagement, prior experience, computer anxiety, and organizational support as determinants of computer self-efficacy in the use of a multimedia ERP system’s training tool. They also examined the impact of computer self-efficacy on its acceptance. The sample consisted of 239 students taking an ERP course elective in the information systems undergraduate and graduate programs. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 709 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Sternad Zabukovšek & S. Bobek: ERP Solution Acceptance by Students Student ERP acceptance To examine ERP users’ use of ERP systems, we need to extend the TAM. Synthesizing prior researches on TAM and researches on ERP systems, a conceptual model that represents the cumulative body of knowledge accumulated over the years from TAM and ERP research has been developed (Figure 1). Figure 1: Conceptual Model Our goal is to research student acceptance of ERP solutions while they are involved in ERP topics after short interaction with the systems (after 12 hours) and which external factors have impact on it. We are preparing conceptual model which will include factors of original TAM (perceived ease of use – PEOU, perceived usefulness – PU, attitude toward using ERP system – AT, behaviour intention – BI, actual use - Use). Therefore, we use hypothesizes from original TAM (Davis, 1989; Davis et al., 1989): H1: Perceived ERP ease of use (PEOU) has positive and direct effect on perceived ERP usefulness (PU). H2: Perceived ERP ease of use (PEOU) has positive and direct effect on attitude toward ERP system (AT). H3: Perceived ERP usefulness (PU) has positive and direct effect on attitude toward ERP system (AT). H4: Attitude toward ERP system (AT) has positive and direct effect on behaviour intention (BI). H5: Behaviour intention (BI) has positive and direct effect on actual use (Use). 710 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Sternad Zabukovšek & S. Bobek: ERP Solution Acceptance by Students Even though TAM can be applied to a variety of technologies, the constructs of TAM need to be extended by customizing factors for specific information systems. One problem with TAM research is that most researchers investigate small number of external factors. In case of ERP acceptance, several external factors may influence user acceptance. Thus, the conceptualisation of multiple, higher-order factors (in our case second-order factors) must be investigated to understand user behaviour. We expose in prior researches that external factors could be distributed among three groups of factors which are personal characteristics and information literacy (PCIL), system and technological characteristics (STC), and organizational-process characteristics (OPC) (see Sternad et al., 2011, Sternad and Bobek, 2013; Sternad and Bobek, 2014). In these three groups, we are trying to capture many external factors which influence ERP user acceptance in operational phase. Since we research student acceptance of ERP solution we must adjust and add some other external factors. Personal characteristics and information literacy (PCIL) includes personality characteristics that can influence individuals’ perceptions of ERP system acceptance and usage. Because goal of our research is to research student acceptance of ERP solutions we expose those factors which could have impact of their acceptance of course lectures and exercises regarding ERP solution. We expose several external factors in group PCIL which are: personal innovativeness toward IT (Yi et al., 2006; Thompson et al., 2006), computer anxiety (Venkatesh, 1998; Venkatesh et al., 2003), computer self-efficiency (Venkatesh and Davis, 2000; Venkatesh et al., 2003; Shih and Huang, 2009) and individual benefits (Hsu et al., 2015). In contrast to most IT implementation research, the fact that ERP implementation research is focused on one technology has enabled the effect of specific technological characteristics to be examined. Surveying different research following external factors has been exposed in group of STC: system performance (Venkatesh et al., 2003; Kositanurit et al., 2006), user manuals (help) (Kelley, 2001; Kositanurit et al., 2006), quality of ERP system (Costa et al., 2016) and quality of information in ERP system (Hsu et al., 2015). Organizational-process characteristics (OPC) capture various social processes, mechanisms, and support organizations that guide individuals to facilitate the use of an ERP system. OPC includes social influence (Venkatesh, 1998; Venkatesh et al., 2003) and training and education on ERP system (Amonko-Gyampah and Salam, 2004; Bueno and Salmeron, 2008; Bobek and Sternad, 2011). Therefore, it is hypothesized: H6: A group of external factors influence use of the ERP system through the conceptual factor personal characteristics and information literacy (PCIL). H7: A group of external factors influence use of the ERP system through the conceptual factor system and technological characteristics (STC). H8: A group of external factors influence use of the ERP system through the conceptual factor organizational-process characteristics (OPC). 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 711 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Sternad Zabukovšek & S. Bobek: ERP Solution Acceptance by Students Research design and procedure The components of the proposed model are PU, PEOU, AT, BI and U, where PU and PEOU influenced by various external factors. The external factors are distributed among three second-order constructs which are: personal characteristics and information literacy (PCIL), system and technological characteristics (STC), and organizational process characteristics (OPC). Second-order factors are composed by specifying a latent variable which represents all the manifest variables of the underlying lower-order factors. PCIL includes: personal innovativeness toward IT, computer anxiety, computer self-efficiency and individual benefits. STC is composed of: system performance, user manuals (help), quality of ERP system and quality of information in ERP system. OPC includes: social influence and training and education on ERP system. Our conceptual model includes 15 first-order factors and 3 second-order factors. We already did researches regarding user acceptance of ERP solutions (different phases, various ERP solutions, countries etc.) in organizations. The instrument was pilot tested with a group of 30 ERP users in one organization. Based on the results of the pilot testing, revisions and additions were made to the instrument. All the items of factors were measured on a 7-point Likert scale, ranging from ‘strongly disagree’ to ‘strongly agree’; the scale was adopted from relevant prior research and adapted to relate to the context of student‘s ERP usage. Demographic information was collected as well. The survey was conducted among group of 121 students. The group included students who have course E-business (all students of professional programme in the 3th year). They do not have any knowledge regarding ERP solutions at the beginning of the course. Course includes 15 teaching hours lectures from ERP topics with focus on the business processes in Microsoft Dynamics NAV and 15 teaching hours exercises in computer lab where they have hands on training of some business processes in Microsoft Dynamics NAV (introduction, purchasing process, manufacturing process and sales process). We are using version Microsoft Dynamics NAV 2016 (NAV). The survey was carried out after short interaction with NAV solution (after 1st month; 12 hours). We distributed paper version of questionnaire after 12 hours contact with ERP solution in the beginning of lecture and gave them half an hour to solve it. Students had 8 hour of lectures about ERP solutions, Microsoft Dynamics solutions and Microsoft Dynamics NAV, purchasing process in NAV and production process in NAV and 4 hours of computer lab exercises, where get familiar with navigation in NAV solution, purchasing process in NAV solution till then. 121 questionnaires were properly filled out by respondents and used for the purpose of analysis. Respondents were 38.8% (47) male and 61.2% (74) female. They have topics regarding Microsoft Dynamics NAV 2016 - 4 hours per week: 2 hours lectures, 2 hours computer lab exercises and 0 individual work (students usually study before exams). The average age of students is 21.66 years. 712 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Sternad Zabukovšek & S. Bobek: ERP Solution Acceptance by Students Analysis and results Demographic data were analysed by SPSS. All other empirical data were analysed PLS technique, using Smart PLS 3.2.1. Partial least squares (PLS) approach can be employed to estimate the parameters of a hierarchical model and also allows the conceptualisation of higher-order factors through the repeated use of manifest variables (Tenenhaus et al., 2005). A higher-order factor can thus be created by specifying a latent variable which represents all the manifest variables of the underlying lower-order factors. We employed a PLS approach because of the relatively small number of samples of valid data and our desire to analyse second-order factors. Data was analysed in two stages involving a PLS technique using Smart PLS 3.2.1 (Ringle et al., 2015). All measurement scales were examined for their psychometric properties (reliability, convergent validity, and discriminant validity) prior to testing hypotheses (bootstrapping with 500 subsamples). Results of measurement model were satisfactory (results can be obtained by authors). The hypothesis testing results utilize bootstrapping (with 500 subsamples) to test the statistical significance of each path coefficient using t-tests, as recommended by Chin (1998). Results of this analysis are shown in Figure 2. Figure 2: Results of structural model analysis Our research confirms results of original TAM. Perceived ERP ease of use (PEOU) has weak but significant effect on perceived ERP usefulness (PU) (H1; b = 0.199, p<0.05) and strong significant effect on attitude toward using ERP system (AT) (H2; b = 0.376; p<0.01). Perceived ERP usefulness (PU) has strong significant effect on attitude toward using ERP system (AT) (H3; b = 0.358; p<0.01). Attitude toward using ERP system (AT) strongly influences on behaviour intention (BI) (H4; b = 0.586; p<0.01) and behaviour intention (BI) strongly influences on actual use (Use) (H5; b = 0.445; p<0.01). Second- order factors (PCIL, OPC and STC) have significant positive effect on perceived usefulness (PU) and on perceived ease of use (PEOU). PCIL has a strong positive effect 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 713 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Sternad Zabukovšek & S. Bobek: ERP Solution Acceptance by Students on perceived ERP usefulness (PU) (b = 0.439, p<0.01). OPC has a weak but significant effect on perceived ERP usefulness (PU) (b = 0.223, p<0.05). STC has very strong positive effect on perceived ERP ease of use (PEOU) (b = 0.632, p<0.01), and these findings provide empirical support for hypotheses H6, H7, and H8. 7 Discussion Our results of original TAM model go with results of other researchers who research IT/IS acceptance (Davis, 1989; Davis et al,. 1989; Heijden, 2001; etc.). Both, perceived ERP usefulness (PU) and perceived ERP ease of use (PEOU) have strong positive effect on ERP usage, where relationship of perceived ERP ease of use (PEOU) is a little stronger. This is not consistent with Davis (1989), Davis et al. (1989) and Simon and Paper (2007) who expose that perceived usefulness (PU) has stronger positive effect on IT/IS usage as perceived ease of use (PEOU), while perceived ease of use (PEOU) has not so strong or even not statistical effect on IT/IS usage after some time of usage. On the other hand, results of some researches show stronger effect of perceived ease of use (PEOU) on attitude toward using ERP system (AT) then perceived ERP usefulness (PU) on attitude toward using ERP system (AT) (for example see Nah et al., 2004). Because survey was carried out after short period of ERP solution learning it could be reason for that result. Some IT/IS researches show strong positive effect perceived ERP ease of use (PEOU) on perceived ERP usefulness (PU) (Heijden, 2001; Davis, 1989), but this is not consistent with our study, where perceived ERP ease of use (PEOU) has weak positive effect on perceived ERP usefulness (PU). Empirical findings on that relationship in the context of ERP are different, since some researches did not confirm a statistically significant relationship between two (Hwang, 2005; Shivers-Blackwell and Charles, 2006; Shih and Huang, 2009), while other researches confirmed a statistically significant positive relationship (Amonko-Gyampah and Salam, 2004; Hsieh and Wang, 2007; Bueno and Salmeron, 2008; Calisir et al., 2009; Lee et al., 2010). Factor attitude toward using ERP system (AT) is vital in the TAM model and has very strong positive effect on behavioural intention (BI) and through it also indirect strong positive effect on actual use (Use), which is consistent with other researches (Pijpers and Montfort, 2006; Simon and Paper, 2007; Nah et al., 2004). The aim of this research was to identify external factors which influence student ERP usage after they were involved in ERP topics after short interaction with the systems. Based on the analytical results, we can see that it is possible to observe more external factors through second-order factors. The fact that ERP implementation research is focused on one solution (technology) has enabled the effect of specific technological characteristics to be examined. We have not found any research which has examined the effects of system and technology characteristics (STC) upon the ERP system’s user acceptance (except ours, see Sternad et al., 2011; Sternad Zabukovšek and Bobek, 2013, 2014). STC has strong impact on perceived ease of use (PEOU) through external factors system performance, quality of NAV system and quality of information in NAV system. Factor user manuals is not statistically significant – it could be because students did not work alone (individual work) and they did not use user manuals until then. 714 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Sternad Zabukovšek & S. Bobek: ERP Solution Acceptance by Students Second order factor Personal characteristics and information literacy (PCIL) has through personal innovativeness toward IT (software tools and applications) and individual benefits greater impact on perceived usefulness (PU) than second order factor Organizational-process characteristics (OPC) through social influence and training and education on ERP system. This means that for students are more important fact that they see individual benefits using NAV systems and that they like to use any computer tool/applications then social influence and training and education on ERP system. Furthermore individual benefits (enhance awareness and recall of future job, enhance effectiveness in the job, increases productivity, positive effect on my future career etc.) has stronger effect on perceived usefulness (PU) than personal innovativeness toward using software tools and applications (I like to experiment with new IT, I‘m usually the first to try out new IT, I like to experiment with new IT). Factors computer anxiety and computer self-efficiency are not statistically significant – these students are students of higher class (third year at faculty), who had several courses related to IT during the primary and secondary schools and also at the time of the study. Factor training and education of NAV (lectures provide overview on business processes in NAV, materials of lectures/lab exercises are appropriate, based on lectures I understand why I have to be able to use NAV) has stronger effect on perceived usefulness (PU) than social influence (people (teachers, students, professionals) who have influence on students’ perception regarding NAV/ERP). 8 Conclusion The aim of this research was to research which external factors have impact on students‘ acceptance of ERP within study programme, while they are exposed to ERP solution (in our case Microsoft Dynamics NAV). We want to know how to motivate students to take seriously course E-business where we teach students ERP solution Microsoft Dynamics NAV. We exposed 10 external factors which have impact on student ERP acceptance. This work extended previous researches by incorporating groups of external factors, which have influence on students ERP acceptance. Studying the influence of more external factors on constructs not only contributes to the theory development, but also helps in designing teachers’ curriculum. Our research shows that external factors personal innovativeness toward IT (software tools and applications) and individual benefits (regarding future job) are very important personal factors which have impact on students ERP usage, while computer anxiety and computer self-efficiency are not important. It could be because students did not work alone (individual work) and they did not use user manuals until then. Organisational- process factor training and education of ERP is more important than factor social influence (people (teachers, students, professionals) who have influence on students’ perception regarding NAV/ERP) and therefore we suggest to teachers put a lot effort to prepare excellent teaching materials and to try to explained students’ ERP topics related content in an easy way. Scott and Walczak (2009) results show the importance of intrinsic and extrinsic motivation of to ERP training, through cognitive engagement (a form of 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 715 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Sternad Zabukovšek & S. Bobek: ERP Solution Acceptance by Students intrinsic motivation) and organizational support (a form of extrinsic motivation). Understanding of ERP solutions is challenging for students, because they do not have practical experience of how ERP solutions is used in enterprises. Important system- technological factors are system performance, quality of NAV/ERP system and quality of information in NAV/ERP system, while factor user manuals is not important after short interaction with the system. The implications for researchers and practitioners include an extended version of TAM through second-order factors to improve the explanatory power of ERP usage. The technique (PLS approach) for analysis of model was used. This study has certain limitations which may present the opportunity for further research. Since the respondents were limited to one group of students in Slovenia, this study should be extended to other counties. Further research is needed to explore the importance of presented external factors in different time frames (after introduction of course, at the end of course) as well as include additional external factors. Another limitation is also that research was conducted for one ERP solution –Microsoft Dynamics NAV, because of that the importance of external factors of different ERP solutions also could be explored (SAP, Infor ERP etc.). References Ajzen, I. (1991). The theory of planned behaviour. Organizational Behaviour and Human Decision Processes. 50, 179–211. DOI: 10.1016/0749-5978(91)90020-T. Almajali, D. A., Masa’deh, R., & Tarhini, A. (2016). Antecedents of ERP systems implementation success: a study on Jordanian healthcare sector. Journal of Enterprise Information Management. 29(4), 549–565. DOI: 10.1108/JEIM-03-2015-0024. Amoako-Gyampah, K., & Salam, A. F. (2004). An extension of the technology acceptance model in an ERP implementation environment. Information & Management. 41, 731–745. DOI:10.1016/j.im.2003.08.010. Awa, H. O., Ukoha, O., & Emecheta, B. C. (2016). Using T-O-E theoretical framework to study the adoption of ERP solution. Cogent Business & Management. 3, 1–23. DOI: 10.1080/23311975.2016.1196571. Bidgoli, H. (2004). The Internet Encyclopaedia, Volume 1. New Jersey: John Wiley & Sons, Inc. Bond, B., Genovese, Y., Miklovic, D., Wood, N. Zrimsek, B. & Rayner, N. (2000). ERP IS Dead – Long Live ERP II. Gartner Group. Retrieved March 10, 2017, from https://www.gartner.com/doc/314701/erp-dead--long-live. Bueno, S. & Salmeron, J. L. (2008). TAM-based success modelling in ERP. Interacting with computers. 20 (6), 515–523. DOI: 10.1016/j.intcom.2008.08.003. Calisir, F., Gumussoy, C. A., & Bayram, A. (2009). Predicting the behavioural intention to use enterprise resource planning systems—An exploratory extension of the technology acceptance model. Management Research News. 32(7), 597–613. DOI: 10.1108/01409170910965215. Chin, W. W. (1998). Issues and opinion on structural equation modelling. MIS Quarterly. 22(1), 7–16. Costa, C., Ferreira, E., Bento, F. & Aparicio, A. (2016). Enterprise resource planning adoption and satisfaction determinants. Computers in Human Behaviour. 63, 659–671. DOI: 10.1016/j.chb.2016.05.090. 716 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Sternad Zabukovšek & S. Bobek: ERP Solution Acceptance by Students Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly. 13(3), 319–340. DOI: 10.2307/249008. Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theoretical models. Management Science. 35(8), 982–1003. DOI: 10.1287/mnsc.35.8.982. Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention, and behaviour: An introduction to theory and research. Reading, MA: Addison-Wesley. Ganly, D., Kyte, A., Rayner, N. & Hardcastle, C. (2013). Predicts 2014: The Rise of the Postmodern ERP and Enterprise Applications World. Gartner Group. Retrieved March 10, 2017, from https://www.gartner.com/doc/2633315/predicts--rise-postmodern-erp. Heijden, H. (2001). Factors influencing the usage of websites: the case of a generic portal in the Netherlands. In 14th Bled electronic commerce conference e-Everything: e-Commerce, e- Government, e-Household, e-Democracy. Bled Slovenia. Hsieh, J. J. P. A. & Wang, W. (2007). Explaining employees' extended use of complex information systems. European journal of information systems. 16 (3), 216–227. DOI: 10.1057/palgrave.ejis.3000663. Hsu, P.-F., Yen, H. R., & Chung, J.-C. (2015). Assessing ERP post-implementation success at the individual level: Revisiting the role of service quality. Information & Management. 52(8), 925– 942. DOI:10.1016/j.im.2015.06.009. Hwang, Y. J. (2005). Investigating enterprise systems adoption: uncertainty avoidance, intrinsic motivation and the technology acceptance model. European journal of information systems. 14 (2), 150–161. DOI: 10.1057/palgrave.ejis.3000532. Kelley, H. (2001). Attributional analysis of computer self-efficacy: dissertation. (Unpublished doctoral dissertation). London, UK: Richard Ivey School of Business. Kositanuri, B., Nqwenyama, O. & Osei-Bryson, K. M. (2006). An exploration of factors that impact individual performance in an ERP environment: an analysis using multiple analytical techniques. European journal of information systems. 15, 556–568. DOI: 10.1057/palgrave.ejis.3000654. Lee, D. H., Lee, S. M., Olson, d. L., & Chung, S. H. (2010). The effect of organizational support on ERP implementation. Industrial Management & Data Systems. 110(2), 269–283. DOI: 10.1108/02635571011020340. Liu, L., & Ma, Q. (2006). Perceived system performance: A test of an extended technology acceptance model. Journal of Organizational and End User Computing. 18(3), 1–24. DOI: 10.1145/1161345.1161354. Lu, J., Chun-Sheng, Y., Liu, C., & Yao, J. E. (2003). Technology acceptance model for wireless internet. Internet Research: Electronic Networking Applications and Policy. 13(3), 206–222. DOI: 10.1108/10662240310478222. Mayeh, M., Ramayah, T., & Mishra, A. (2016). The role of absorptive capacity, communication and trust in ERP adoption. The Journal of Systems and Software. 119, 58–69. DOI: 10.1016/j.jss.2016.05.025. Møller, C. (2005). ERP II: a conceptual framework for next-generation enterprise systems? Journal of Enterprise Information Management. 18(4), 483–497. DOI: 10.1108/17410390510609626. Monk, E. & Wagner, B. (2009). Concepts in Enterprise Resource Planning - 3rd.ed. Massachusetts: Course Technology Cengage Learning Boston. Nah, F. F., Tan, X. & Teh, S. H. (2004). An empirical investigation on end-users' acceptance of enterprise systems. Information resources management journal. 17(3), 32–53. DOI: 10.4018/irmj.2004070103. Pang, C., Dharmasthira, Y., Eschinger, C., Brant, K. F. & Motoyoshi, K. (2013). Market Share Analysis: ERP Software, Worldwide, 2013. Gartner Group. Retrieved March 10, 2017, from https://www.gartner.com/doc/2729518/market-share-analysis-erp-software. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 717 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Sternad Zabukovšek & S. Bobek: ERP Solution Acceptance by Students Pijpers, G. G. M. & Montfort, K. (2006). An investigation of factors that influence senior executives to accept innovations in information technology. International journal of management. 23(1), 11–23. Poon, S., & Swatman, P. (1999). An exploratory study of small business internet commerce issues. Information & Management. 35(1), 9–18. DOI:10.1016/S0378-7206(98)00079-2. Ringle, C. M., Wende, S., & Becker, J.-M. (2015). SmartPLS 3. Boenningstedt: SmartPLS GmbH. Retrieved February 8, 2016, from http://www.smartpls.com. Rogers, E. (2003). Diffusion of Innovations (4th ed.). New York: The Free Press. Ruhi, U. (2016). An experiential learning pedagogical framework for enterprise systems education in business schools. The International Journal of Management Education. 14, 198–211. DOI: 10.1016/j.ijme.2016.04.006 1472-8117. Scott, J. E., & Walczak, S. (2009). Cognitive engagement with a multimedia ERP training tool: Assessing computer self-efficacy and technology acceptance. Information & Management. 46, 221–232. DOI: 10.1016/j.im.2008.10.003. Shih, Y. Y., & Huang, S. S. (2009). The actual usage of ERP systems: An extended technology acceptance perspective. Journal of Research and Practice in Information Technology. 41(3), 263–276. Shivers-Blackwell, S. L. & Charles, A. C. (2006). Ready, set, go: Examining student readiness to use ERP technology. Journal of Management Development, 25(8), 795–805. DOI: 10.1108/02621710610684268. Simon, S. J. & Paper, D. (2007). User acceptance of voice recognition technology: an empirical extension of the technology acceptance model. Journal of organizational and end user computing. 19(1), 24–50. Spol, T. (2016). 5 Factors Facilitating the Transition to the Postmodern ERP Era. CIOReview. Retrieved January 1, 2016, from http://enterprise-resource- planning.cioreview.com/cxoinsight/5-factors-facilitating-the-transition-to-the-postmodern- erp-era-nid-7292-cid-96.html. Sternad Zabukovšek, S., Gradišar, M., & Bobek, S. (2011). The influence of external factors on routine ERP usage. Industrial management + data systems. 111(9), 1511–1530. DOI: 10.1108/02635571111182818. Sternad, S., & Bobek, S. (2013). TAM-based external factors related to ERP solutions acceptance in organizations. International Journal of Information Systems and Project Management. 1(4), 25–38. DOI: 10.1016/j.protcy.2013.12.004. Sternad, S., & Bobek, S. (2014). Comparative analysis of acceptance factors for SAP and Microsoft Dynamics NAV ERP solutions in their maturity use phase: enterprise 2.0 issues. In M.M. Cruz- Cunha, F. Moreira, & J. Varajao (Eds.), Handbook of research on enterprise 2.0: technological, social, and organizational dimensions (pp. 389–415). Hershey, New York: Business Science Reference, IGI Global. Sun, Y., Bhattacherjee, A., & Ma, Q. (2009). Extending technology usage to work settings: The role of perceived work compatibility in ERP implementation. Information & Management. 46(6), 351–356. DOI:10.1016/j.im.2009.06.003. Tenenhaus, M., Vinzi, V. E., Chatelin, Y. M., & Lauro, C.(2005). PLS path modelling. Computational Statistics & Data Analysis, 48, 159–205. DOI: 10.1016/j.csda.2004.03.005. Thompson, R., Compeau, D. & Higgins, C. (2006). Intentions to use information technologies: an integrative model. Journal of organizational and end user computing. 18(3), 25–46. DOI: 10.4018/joeuc.2006070102. Tornatzky, L., & Fleisher, M. (1990). The process of technology innovation. Lexington: Lexington Books. Venkatesh, V. & Bala, H. (2008). Technology acceptance model 3 and a research agenda on interventions. Decision sciences, 39 (2), 273–315. DOI: 10.1111/j.1540-5915.2008.00192.x. 718 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) S. Sternad Zabukovšek & S. Bobek: ERP Solution Acceptance by Students Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science. 46(2), 186–205. DOI: 10.1287/mnsc.46.2.186.11926. Venkatesh, V., Morris, M. G., Davis, F. D., Davis, G. B. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly. 27(3), 425–479. Wylie, L. (1990). ERP: A Vision of the Next-Generation MRP II, Scenario S-300-339. Gartner Group. Retrived April, 12, 1990. Yi, Y. M., Fiedler, K. D. & Park, J. S. (2006). Understanding the role of individual innovativeness in the acceptance of IT-based innovativeness: comparative analyses of models and measures. Decision Sciences. 37(3), 393–426. DOI: 10.1111/j.1540-5414.2006.00132.x. Youngberg, E., Olsen, D., & Hauser, K. (2009). Determinants of professionally autonomous end user acceptance in an enterprise resource planning system environment. International Journal of Information Management. 29(2), 138–144. DOI:10.1016/j.ijinfomgt.2008.06.001. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Characterization of Business Model Research: Bibliometric Analysis and the Future Agenda 50 IVAN ŽUPIČ, MARKO BUDLER & PETER TRKMAN Abstract The term business model has gained widespread use. Several papers discussing its origins and value have been published recently. However, most of them are more of a descriptive analysis of past research. We provide a more rigorous investigation with the help of bibliometric methods of citation analysis, bibliographic coupling and co-word analysis to examine 308 articles on business models published in the period 2010- 2015. Bibliometric methods build maps of science fields based on citation information and are able to quantitatively complement literature reviews. We extracted bibliographical data from the Web of Science database. Our algorithm found four clusters of business model research. We also visualized the top 80 keywords in a heat map which presents clear thematic picture of business model conceptual domain. Keywords: • bibliometric methods • bibliographic coupling • co-word analysis • business mode l• CORRESPONDENCE ADDRESS: Ivan Župič, University of Ljubljana, Faculty of Economics, Kardeljeva ploščad 17, 1000 Ljubljana, Slovenia, ivan.zupic@ef.uni-lj.si. Marko Budler, University of Ljubljana, Faculty of Economics, Kardeljeva ploščad 17, 1000 Ljubljana, Slovenia, marko.budler@ef.uni-lj.si. Peter Trkman, University of Ljubljana, Faculty of Economics, Kardeljeva ploščad 17, 1000 Ljubljana, Slovenia, peter.trkman@ef.uni-lj.si. https://doi.org/10.18690/978-961-286-043-1.50 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 720 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) I. Župič, M. Budler & P. Trkman: Characterization of Business Model Research: Bibliometric Analysis and the Future Agenda Introduction Hyper-turbulent environment and contemporary issues in incumbent businesses established the need for in-depth observations of companies’ business models and their components. Elaborating on the absence of consensus on what a business model is or what it is not (DaSilva & Trkman, 2014), we provide readers the insights from the most important areas within a business model research in the infant stage of business model topic (before 2011) and 6 years after Zott, Amit, and Massa (2011) identified some of the most visible clusters in business model research. Despite the discrepancies in its definition, business model is usually recognized as a set of resources through which transactions generate value for the company and its customers (Teece, 2010). Business models are necessary for capturing value and constructing organizations’ capabilities (Teece, 2010). This vice versa relationship led Zott, Amit, and Massa (2011) to conclusion that business models enable a holistic perspective for observing organizations and their businesses. The assessment of business models, their usage and future trends is helpful, since it can provide us with the insights about the main topics in business and its associated theoretical traditions (Zott, Amit, & Massa, 2011). Drawing on the on-going research, our paper provides bibliometric methods which can be used to identify the most influential keywords and future trends in field of business models. Since academic attention paid to business models has recently increased substantially (Spieth, Schneckenberg, and Ricart 2014) a bibliometric analysis can provide a coherent map of contemporary business model research and assist both scholars and practitioners in innovating business models, along with recognizing the future trends in that area. Our aim is to identify the past conversations (Huff, 1999) within business model literature and future avenues. Several excellent reviews of the field (Zott, Amit, & Massa 2011; Spieth, Schneckenberg, & Ricart, 2014) relied on the method of structured literature review to establish the state of the art in the field. Our contribution is to complement these reviews with bibliometric methods that use quantitative bibliographical data (Zupic & Čater, 2015). In this way we can tap into the knowledge created by scholars in the field who expressed their opinion by citing (or not!) specific articles and books. Such an investigation also forms an excellent basis to speculate on whether business model will survive as a term within strategic management and information systems literature as a distinct term to e.g. competitive advantage, strategy or digital transformation. Literature review Every organization employs a business model that encompasses how value is created, delivered and captured (Teece, 2010). An ample amount of research revealed that the consensus on what a utilization, development and structure of a business model has not been reached yet (Zott, Amit, & Massa, 2011). That is why business model has been 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 721 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) I. Župič, M. Budler & P. Trkman: Characterization of Business Model Research: Bibliometric Analysis and the Future Agenda applied to different environments and utilized within a different context (Zott, Amit, & Massa, 2011). Besides, phenomena such as the emergence of e-businesses and surge of technology innovations have influenced the development of business models. Business model is quite difficult to be depicted without a broader understanding of the environment in which organization operates. Despite that, some authors made an attempt to introduce business model through text and graphics (Casadesus-Masanell & Ricart, 2011; Ross, Vitale, & Weill, 2002) in order to provide managers with a unique template for designing a winning business model. In spite of not having a universally applicable ‘template’, business model does depict “the content, structure, and stewardship of transactions that enable value creation in future business opportunities” (Zott & Amit, 2008). Teece (2010) ads data and other evidence into business model concept, since these two seem to support the value proposition for end-users. Finally, a line between strategy and business model was given by Casadesus-Masanell and Ricart (2011), who identified a business model as a reflection of a firm’s strategy. Additionally, business model not only resonates company’s strategy but also links technological innovation to strategy (Chesbrough & Rosenbloom, 2002). Innovation and technology are two facets of business models development, whereas only a scant amount of scholars have more or less successfully conceptualized business models’ elements and relationships (Osterwalder, Pigneur, & Tucci, 2005; Baden-Fuller & Haefliger, 2013). According to Zott and colleagues an adequate business model is the one with value network encompassing both value creation and value capture, meaning to include all stakeholders and distribution channels along the entire supply chain of a certain organization. A company should not focus only on improving business model elements but to develop them in such a way that it will be able to continually change its existing or add a new business model as a response to unexpected changes (Trkman, Budler, & Groznik, 2015). Unfortunately, managers usually respond by optimizing only each of the element of the current business model (DaSilva, Trkman, DeSouza, & Lindič, 2013). This is insufficient, because the development of a new business model entails a paradigm shift, which requires an in-depth analysis of customers, competitors and partners (Teece, 2010). More importantly, the emphasis should be on articulation of business model and an evaluation “against the current state of the business ecosystem, and against how it might evolve” (Teece, 2010). The allure of business models is that they are based on observation and theorizing (Baden-Fuller & Morgan 2010), making them a perfect template for running companies’ businesses. Business model development is a long-term process (Dmitriev, Simmons, Truong, Palmer, & Schneckenberg, 2014) that can ‘shake’ the markets or vice versa as seen when the emergence of information-communication technologies (ICT) stroke the concept of a business model (DaSilva & Trkman, 2014). In fact, authors have shown how difficult it is to create a winning business model, especially in the era of disrupting ICT innovations (DaSilva et al., 2013). In light of this, a great variety of business models became ‘ICT- enabled’, since, after all, ICT provides organization with new channels for interacting 722 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) I. Župič, M. Budler & P. Trkman: Characterization of Business Model Research: Bibliometric Analysis and the Future Agenda with customers (Wu, Guo, & Shi, 2013). Besides, there is yet a case to be made for sustainable business models (Stubbs & Cocklin, 2008), since sustainable business models are the ones interacting with and augmenting company’s resources, partnerships and relations with customers (Matos & Silvestre, 2013). In regard to developing business models, we have seen an ample amount of companies (Singapore Airlines, Nestle, SHM etc.) possessing multiple business models in order to cope with different niches and preferences from end-users. Real-life business environment establish a need for using multiple business models (Martínez-Olvera, 2009); however, doing this might be a double-edged sword (Markides & Charitou, 2004). A great challenge to be addressed when companies try to utilize two different business models is that two (or more) business models will sooner or later interfere, causing conflicts. Two solutions were advised (Markides & Charitou, 2004); first, organization could physically separate both of the business models to avoid their interactions or, second, business models could be merged in order to exploit synergies. There has been a common misunderstanding on how to distinguish a strategy from a business models. Not only due to similarities between these two but also because of the strategic function embedded in business models (Osterwalder, Pigneur, & Tucci, 2005). DaSilva and Trkman (2014) understand a strategy as a key determinant in the development of capabilities that enable future business models within an organization. Another distinction between strategy and a business model has been provided by (Casadesus-Masanell & Ricart, 2011); authors claim that “every organization has some business model”, whereas “not every organization has a strategy”. As business models are seen as a source of competitive advantage, the interplay between the strategy and the business models gained its importance (Zott, Amit, & Massa, 2011). Finally, there is a business model innovation defined as ‘the discovery of a fundamentally different business model in an existing business’ (Markides, 2006), or as a quest for finding a new template on which an organization could create and capture value not only for its customers but also for its stakeholders (Spieth, Schneckenberg, & Ricart, 2014). Business model innovation can lead to organization achieving competitive advantage if the model is enough revolutionary and difficult for imitation by competitors (Teece, 2010). Incumbent businesses tend to elicit value from innovative ideas and disruptive technologies throughout their business models (Zott, Amit, & Massa, 2011). Interestingly, the process can work vice versa, since business models are often shaped by modern technology and innovations (Zott, Amit, & Massa, 2011). Business model or the development of business model can be seen as a stage between an idea growing from invention towards innovation (Dmitriev et al. 2014), however, with an emphasis on business model ensuring that not only technology is engraved but also that the innovation is economically sound (Chesbrough & Rosenbloom, 2002). 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 723 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) I. Župič, M. Budler & P. Trkman: Characterization of Business Model Research: Bibliometric Analysis and the Future Agenda Methodology We mapped the business models literature with bibliometric methods (Zupič & Čater, 2015). These methods use the citation information in bibliographical databases to extract meaningful information about the structure of scientific fields. The quantitative information gathered from bibliometric analysis can be a useful complement to the traditional structured literature review. Specifically, we used the methods of citation analysis, bibliographic coupling (Kessler, 1963) and co-word analysis (Callon, Courtial, Turner, & Bauin, 1983). Citation analysis measures the influence of specific documents or journals by measuring their citation frequencies. If certain article or journal is more cited it is assumed it had greater influence on the literature than its less cited counterparts. Bibliographic coupling uses the similarity of reference lists to establish connections among scientific publications. For example, if ten publications appear in both reference lists of two scientific papers, this means that these two papers are connected with coupling strength of ten. The stronger the coupling strength, the stronger the connecting link. When this information is gathered for all relevant publications in the scientific field of interest, clustering methods can be applied to delineate the structure of the field and identify the substreams of research. Co-word analysis, on the other hand, connects the word terms by their appearance in the same title or abstract. If two terms appear together multiple times this means that the connection link between them is stronger. Again, putting together this information for the whole scientific field gives us a clear thematic picture of the field’s conversations. We searched Thomson Reuters Web of Science (WoS) for “business model” in the topic (i.e. title, abstract or keywords) of published articles in the time period 2010-2015. We selected this period because we wanted to analyse the current conversations and not the past literature. The search returned 1533 entries, which we further filtered for Business, Management and Economics categories. Of the remaining 598 articles we selected only document types of ‘article’, ‘editorial material’ and ‘review’ which left us with 580 entries. The abstracts of all 580 documents were read and rated (Yes-include/Not- include) by two authors. Criterion for inclusion in the sample was that business model was one of central themes of investigation in the research study. Articles that only passingly mentioned business model concept were excluded from the sample. After rating the articles independently the interrater agreement was 86.4%. The differences on the remaining 79 articles were reconciled by re-reading the abstracts by both raters together and reaching decision whether to include the contentious article. After this process 308 articles were left. 724 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) I. Župič, M. Budler & P. Trkman: Characterization of Business Model Research: Bibliometric Analysis and the Future Agenda Findings We have conducted three types of analyses of business model literature. First, the citation analysis shows the most important publications outlets for contemporary business model research, which journals consist the knowledge base of business model research and which documents are the most cited within the literature. Second, the bibliographic coupling followed by the application of network community finding algorithm provides the structure of contemporary business model research that is based on the quantitative citation data. Finally, the co-word analysis of most important keywords in abstracts and titles shows the topical domain of business model research. 4.1 Citation analysis Table 1 summarizes which journals published the most articles in the 2010-2015 period (left part of the table) and which journals are most cited (right part of the table). Profiles of journals that publish business model research reflect the main focuses of business model literature. First, there are strategy journals (Long Range Planning, Strategic Entrepreneurship Journal, Technology Analysis & Strategic Management and Strategic Organization) meaning that business model construct is of main interest to strategy scholars. Second, there are two premier journals oriented to practitioners (Harvard Business Review and California Management Review). This reflects that business models have value for managers. Third and most numerous group are innovation and technology management journals (Research-Technology Management, R&D Management, International Journal of Technology Management, Technological Forecasting and Social Change). These reflect that innovative business models are considered as a primary vehicle for commercializing technological innovations. Last two groups of journals are oriented to marketing (Industrial Marketing Management and Electronic Markets) and general management (European Management Journal, Management Decision and Chinese Management Studies). The absence of top tier management journals (like Academy of Management Review or Academy of Management Journal) in this list is notable. It looks like that business model research is mainly published in specialized outlets and management journals below top tier. The list of 25 most cited documents in Table 1 is comprised almost exclusively of business model articles. The knowledge base of contemporary business model research is therefore dominated by previous business model studies with very weak outside influences. The most cited paper is Teece (2010) with 102 citations which means that almost a third of core business model articles published between 2010-2015 cited that paper. There are several authors that have multiple entries on the top 25 list: Christoph Zott and Raphael Amit have five co-authored articles on the list while Henry Chesbrough has four articles or books. The only document that is not part of business model research stream is Eisenhardt's (1989) paper on building theories from case study research. This reflects the fact that the majority of the empirical articles on business models are based on qualitative case studies. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 725 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) I. Župič, M. Budler & P. Trkman: Characterization of Business Model Research: Bibliometric Analysis and the Future Agenda Table 1: Top 25 most cited documents in business model literature No. Document 102 Teece DJ, 2010, V43, P172, Long Range Plann 99 Amit R, 2001, V22, P493, Strategic Manage J 91 Chesbrough H, 2002, V11, P529, Ind Corp Change 72 Morris M, 2005, V58, P726, J Bus Res 70 Zott C, 2011, V37, P1019, J Manage 70 Zott C, 2008, V29, P1, Strateg Manage J 70 Chesbrough H, 2010, V43, P354, Long Range Plann 66 Magretta J, 2002, V80, P86, Harvard Bus Rev 64 Casadesus-Masanell R, 2010, V43, P195, Long Range Plann 63 Zott C, 2010, V43, P216, Long Range Plann 58 Zott C, 2007, V18, P181, Organ Sci 47 Demil B, 2010, V43, P227, Long Range Plann 46 Eisenhardt KM, 1989, V14, P532, Acad Manage Rev 44 Osterwalder A., 2010, Business Model Gener 42 Mcgrath RG, 2010, V43, P247, Long Range Plann 38 Shafer S. M., 2005, V48, P199, Bus Horizons 37 Johnson MW, 2008, V86, P50, Harvard Bus Rev 36 Baden-Fuller C, 2010, V43, P156, Long Range Plann 30 Sosna M, 2010, V43, P383, Long Range Plann 28 Osterwalder A., 2005, V16, P1, Communications Ass I 27 Chesbrough H. W, 2006, Open Business Models 27 Timmers P., 1998, V8, P3, Electron Mark 27 George G, 2011, V35, P83, Entrep Theory Pract 25 Hedman J, 2003, V12, P49, Eur J Inform Syst 25 Chesbrough H., 2007, V35, P12, Strategy Leadership 4.2 Bibliographic coupling We narrowed down the selection to articles that were cited at least two times per year. Before implementing bibliographic coupling we further excluded 14 articles with coupling strength less than 20 (i.e. which share less than 20 common pairs of references with all other articles; the data about these articles is insufficient for coupling and we can assume these articles are not part of the core document set). After these steps, 62 articles 726 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) I. Župič, M. Budler & P. Trkman: Characterization of Business Model Research: Bibliometric Analysis and the Future Agenda were left in the sample. We have visualized four clusters of business model research in Figure 1. Figure 1: The four clusters of business model research based on bibliographic coupling Cluster 1 (red) is the largest with 22 articles. The dominant theme is the interface between technological innovation and business model of the firm. Main topics in this cluster include the role of technological innovation (Baden-Fuller & Haefliger, 2013; Bohnsack, Pinkse, & Kolk, 2014) and technological discontinuities (Sabatier, Craig-Kennard, & Mangematin, 2012), the cognitive aspect of business model concept (Baden-Fuller & Mangematin, 2013; Martins, Rindova, & Greenbaum, 2015) but also reviews of the field (Zott, Amit, & Massa, 2012). Cluster 2 (green) contains 19 articles. The vast majority of authors in this cluster are focusing on understanding the idea (concept) of a business model by identifying and explaining its meaning (DaSilva & Trkman, 2014). Authors execute ‘sensemaking’ out of business models and try to make them context-dependent with regard to organizational strategy. A major question in this cluster is the distinction between business model and strategy (Casadesus-Masanell & Ricart, 2010). Additionally, the authors examine what is the role of business model when constituting strategies. In light of ‘sensemaking’, some of the authors have pursued their research to elucidating changing meaning of the business models, how the business model notion is changed due to the environment, and how to distinguish between various business models. Cluster 3 (blue) has 12 articles. It is predominantly strategy-based and the core of this cluster is represented by several publications of the 2010 Long Range Planning special issue on business models (e.g., Wirtz, Schilke, & Ullrich, 2010; Teece, 2010; Zott & Amit, 2010). 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 727 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) I. Župič, M. Budler & P. Trkman: Characterization of Business Model Research: Bibliometric Analysis and the Future Agenda Cluster 4 (yellow) is the smallest with 9 articles. The topics in this cluster are predominantly rooted in marketing themes. For example, the papers in this cluster explore the definition of markets as configurations (Storbacka & Nenonen, 2011a; Storbacka & Nenonen, 2011b), the usefulness of business models construct for service-based companies and the integration of products and services (Kindström, 2010; Kindström & Kowalkowski, 2014; Barquet, de Oliveira, Amigo, Cunha, & Rozenfeld, 2013), solution business models (Storbacka, Windahl, Nenonen, & Salonen, 2013; Storbacka, 2011) and business models in project-based firms (Kujala, Artto, Aaltonen, & Turkulainen, 2010; Kujala et al., 2011). 4.3 Co-word analysis We visualized the text in abstracts and titles with co-word analysis. 6170 different terms are used in 308 abstracts. We selected top 133 terms with at least 10 appearances (multiple appearances in same document count only once). We visualized 60% of the most relevant terms, resulting in 80 keywords. We further filtered out keywords that were research-related, like 'methodology', 'findings' and similar. We visualized remaining keywords with heat-map in Figure 2. Warmer areas (red and yellow colours) represent more frequently used keywords and their proximity means that the terms are often used together. Figure 2: Co-word analysis of titles and abstracts of business model publications 728 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) I. Župič, M. Budler & P. Trkman: Characterization of Business Model Research: Bibliometric Analysis and the Future Agenda The area on the right shows papers emphasizing the importance of business model innovation, its meaning in change management and its role, especially in terms of enhancing organizations’ performance, as emphasized by Casadesus-Masanell and Ricart (2011). Furthermore, central cluster of keywords confirmed business model as the most important ‘tool’ for delivering value to customers; however, the value cannot be elicited from business model if organizations lack cutting-edge technology. In fact, not only technology but also various elements and capabilities play an important role when it comes to refining a business model (Trkman et al., 2015). Another two (centre-left corner and top-left corner) clusters have pointed out that business model is redeemed as a system or a concept encircled around its focal element–product. Discussion In preliminary research we examined the 308 articles on business models published in the period 2010-2015. In further research we will also examine articles before 2010 and articles published in 2016. Business model topic has covered the emergence of e- businesses and surge of technology innovations that influenced the vast majority of organizations. It can be discussed how much a business model is context-dependent, nevertheless, the future research should give us more information about business models’ elements and the interplay between them. Further, by examining articles published in different periods thoroughly, we tend to investigate how the business model research has changed over time and, second, contemplate which future avenues are most likely to be addressed. The results of the citation analysis of the papers and the four identified clusters by bibliographic coupling jointly paint a coherent picture of the business model research. The disciplinary landscape spans from technological innovation through strategy to marketing. This is reflected in the journals that publish business model research, which also include practitioner outlets like Harvard Business Review. This makes the business model construct uniquely positioned to integrate the supply- and demand-side approaches to strategy (Priem, Li, & Carr, 2012). Conclusion We used bibliometric methods to examine state of the art of business model research. We identified the most influential documents in contemporary literature, divided the literature into four clusters and visualized its topical structure. Our analysis provides a useful tool for both veteran and new researchers who want to move the field forward. 6.1 Limitations Bibliometric methods have several well-known limitations. First, it is not possible to determine based on solely citation data why certain document was cited. It could be because the citing author(s) thought the cited reference was important foundation for their 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 729 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) I. Župič, M. Budler & P. Trkman: Characterization of Business Model Research: Bibliometric Analysis and the Future Agenda work, but it could be also to refute the claims in cited document or ritually cited because certain citations (usually of old, important and widely cited publications) are expected in the specific scientific fields. Second, our analysis encompasses the most cited works and most used keywords. It is possible that some smaller research substreams were missed even though they could comprise an important but less cited niche. Finally, we have deliberately taken into account only categories "business", "economics", and "management" as we wanted to thoroughly examine the articles published in these mainstream areas. We tend to expand that in further research. 6.2 Further research First, researchers could pursue the question why the ‘conversations’ of business models are usually happening only within a certain ‘bundle’ (Zott, Amit, & Massa, 2011) and what would be the implications of an interplay between these various sub-areas. Second, researchers could initiate follow-up studies on co-word analysis, evaluating whether a synergy between these sub-areas enabled the proliferation of incumbent business models (e.g. sustainable business models). Finally, taking into consideration the results of our inquiry from the journals could lead researchers to a better understanding of the fields and industries interfering with the continuous development of business models. References Afuah, A., & Tucci, C. L. (2000). Internet Business Models and Strategies: Text and Cases (1st ed.). New York: McGraw-Hill Higher Education. Baden-Fuller, C., & Haefliger, S. (2013). Business Models and Technological Innovation. Long Range Planning, 46(6), 419–426. Baden-Fuller, C., & Mangematin, V. (2013). Business models: A challenging agenda. Strategic Organization, 11(4), 418–427. Baden-Fuller, C., & Morgan, M. S. (2010). Business Models as Models. Long Range Planning, 43(2–3), 156–171. Barquet, A. P. B., de Oliveira, M. G., Amigo, C. R., Cunha, V. P., & Rozenfeld, H. (2013). Employing the business model concept to support the adoption of product–service systems (PSS). Industrial Marketing Management, 42(5), 693–704. Bohnsack, R., Pinkse, J., & Kolk, A. (2014). Business models for sustainable technologies: Exploring business model evolution in the case of electric vehicles. Research Policy, 43(2), 284–300. Callon, M., Courtial, J.-P., Turner, W. A., & Bauin, S. (1983). From translations to problematic networks: An introduction to co-word analysis. Social Science Information, 22(2), 191–235. Casadesus-Masanell, R., & Ricart, J. E. (2010). From Strategy to Business Models and onto Tactics. Long Range Planning, 43(2–3), 195–215. Casadesus-Masanell, R., & Ricart, J. E. (2011). How to design a winning business model. Harvard Business Review, 89(1/2), 100–107. Chesbrough, H., & Rosenbloom, R. S. (2002). The role of the business model in capturing value from innovation: evidence from Xerox Corporation’s technology spin-off companies. Industrial and Corporate Change, 11(3), 529–555. 730 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) I. Župič, M. Budler & P. Trkman: Characterization of Business Model Research: Bibliometric Analysis and the Future Agenda DaSilva, C. M., & Trkman, P. (2014). Business Model: What It Is and What It Is Not. Long Range Planning, 47(6), 379–389. DaSilva, C. M., Trkman, P., Desouza, K., & Lindič, J. (2013). Disruptive technologies: a business model perspective on cloud computing. Technology Analysis & Strategic Management, 25(10), 1161–1173. Dmitriev, V., Simmons, G., Truong, Y., Palmer, M., & Schneckenberg, D. (2014). An exploration of business model development in the commercialization of technology innovations. R&D Management, 44(3), 306–321. Eisenhardt, K. M. (1989). Building Theories from Case Study Research. Academy of Management Review, 14(4), 532–550. Huff, A. S. (1999). Writing for scholarly publication. Sage Publications, Inc. Kessler, M. M. (1963). Bibliographic coupling between scientific papers. American Documentation, 14(1), 10–25. Kindström, D. (2010). Towards a service-based business model – Key aspects for future competitive advantage. European Management Journal, 28(6), 479–490. Kindström, D., & Kowalkowski, C. (2014). Service innovation in product-centric firms: a multidimensional business model perspective. Journal of Business & Industrial Marketing, 29(2), 96–111. Kujala, S., Artto, K., Aaltonen, P., & Turkulainen, V. (2010). Business models in project-based firms – Towards a typology of solution-specific business models. International Journal of Project Management, 28(2), 96–106. Kujala, S., Kujala, J., Turkulainen, V., Artto, K., Aaltonen, P., & Wikström, K. (2011). Factors influencing the choice of solution-specific business models. International Journal of Project Management, 29(8), 960–970. Magretta, J. (2002). Why Business Models Matter. Harvard Business Review. Markides, C. (2006). Disruptive Innovation: In Need of Better Theory*. Journal of Product Innovation Management, 23(1), 19–25. Markides, C., & Charitou, C. D. (2004). Competing with dual business models: A contingency approach. The Academy of Management Executive , 18(3), 22–36. Martínez-Olvera, C. (2009). Benefits of using hybrid business models within a supply chain. International Journal of Production Economics, 120(2), 501–511. Martins, L. L., Rindova, V. P., & Greenbaum, B. E. (2015). Unlocking the Hidden Value of Concepts: A Cognitive Approach to Business Model Innovation. Strategic Entrepreneurship Journal, 9(1), 99–117. Matos, S., & Silvestre, B. S. (2013). Managing stakeholder relations when developing sustainable business models: the case of the Brazilian energy sector. Journal of Cleaner Production, 45, 61–73. McGrath, R. G. (2010). Business Models: A Discovery Driven Approach. Long Range Planning, 43(2–3), 247–261. Osterwalder, A., Pigneur, Y., & Tucci, C. L. (2005). Clarifying business models: Origins, present, and future of the concept. Communications of the Association for Information Systems, 16(1), 1. Priem, R. L., & Butler, J. E. (2001). Tautology in the resource-based view and the implications of externally determined resource value: Further comments. Academy of Management Review, 26(1), 57–66. Priem, R. L., Li, S., & Carr, J. C. (2012). Insights and New Directions from Demand-Side Approaches to Technology Innovation, Entrepreneurship, and Strategic Management Research. Journal of Management, 38(1), 346–374. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 731 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) I. Župič, M. Budler & P. Trkman: Characterization of Business Model Research: Bibliometric Analysis and the Future Agenda Ross, J. W., Vitale, M. R., & Weill, P. (2002). FROM PLACE TO SPACE: Migrating to Profitable Electronic Commerce Business Models. SSRN Electronic Journal. Sabatier, V., Craig-Kennard, A., & Mangematin, V. (2012). When technological discontinuities and disruptive business models challenge dominant industry logics: Insights from the drugs industry. Technological Forecasting and Social Change, 79(5), 949–962. Spieth, P., Schneckenberg, D., & Ricart, J. E. (2014). Business model innovation – state of the art and future challenges for the field. R&D Management, 44(3), 237–247. Storbacka, K. (2011). A solution business model: Capabilities and management practices for integrated solutions. Industrial Marketing Management, 40(5), 699–711. Storbacka, K., & Nenonen, S. (2011a). Markets as configurations. European Journal of Marketing, 45(1/2), 241–258. Storbacka, K., & Nenonen, S. (2011b). Scripting markets: From value propositions to market propositions. Industrial Marketing Management, 40(2), 255–266. Storbacka, K., Windahl, C., Nenonen, S., & Salonen, A. (2013). Solution business models: Transformation along four continua. Industrial Marketing Management, 42(5), 705–716. Stubbs, W., & Cocklin, C. (2008). Conceptualizing a “Sustainability Business Model.” Organization & Environment , 21(2), 103–127. Teece, D. J. (2010). Business Models, Business Strategy and Innovation. Long Range Planning, 43(2–3), 172–194. Trkman, P., Budler, M., & Groznik, A. (2015). A business model approach to supply chain management. Supply Chain Management: An International Journal, 20(6), 587–602. Wirtz, B. W., Schilke, O., & Ullrich, S. (2010). Strategic Development of Business Models. Long Range Planning, 43(2–3), 272–290. Wu, J., Guo, B., & Shi, Y. (2013). Customer knowledge management and IT-enabled business model innovation: A conceptual framework and a case study from China. European Management Journal, 31(4), 359–372. Zott, C., & Amit, R. (2008). The fit between product market strategy and business model: implications for firm performance. Strategic Management Journal, 29(1), 1–26. Zott, C., & Amit, R. (2010). Business Model Design: An Activity System Perspective. Long Range Planning, 43(2), 216–226. Zott, C., Amit, R., & Massa, L. (2011). The Business Model: Recent Developments and Future Research. Journal of Management, 37(4), 1019–1042. Zupic, I., & Čater, T. (2015). Bibliometric methods in management and organization. Organizational Research Methods, 18(3), 429–472. 732 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Information Management in Supply Chain Partnering: Improving Maintenance Processes in Dutch Housing Associations 51 DEBBY GOEDKNEGT Abstract Maintenance processes of Dutch housing associations are often still organized in a traditional manner. Contracts are based on lowest price instead of ‘best quality for lowest price’ considering users’ demands. Dutch housing associations acknowledge the need to improve their maintenance processes in order to lower maintenance cost, but are not sure how. In this research, this problem is addressed by investigating different supply chain partnering principles and the role of information management. The main question is “How can the organisation of maintenance processes of Dutch housing associations, in different supply chain partnering principles and the related information management, be improved?” The answer is sought through case study research. Keywords: • supply chain partnering • information management • building information model (BIM) • maintenance • process innovation • CORRESPONDENCE ADDRESS: Debby Goedknegt, Utrecht University of Applied Sciences, Nijenoord 1, 3552 AS Utrecht, The Netherlands, e-mail: debby.goedknegt@hu.nl. https://doi.org/10.18690/978-961-286-043-1.51 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 734 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. Goedknegt: Information Management in Supply Chain Partnering: Improving Maintenance Processes in Dutch Housing Associations Introduction The Netherlands has a strong tradition of social housing for lower income groups. Within this tradition, housing associations are a major player (Boelhouwer et al., 2014) something which dates back to the 1901 Housing Act. In the beginning, social housing was operated from the pillarization, the politico-denominational segregation. After World War II, the Dutch government managed and prescribed how, what and where to build. From the mid-1990s, the government withdrew itself and stimulated self-reliance (Van Gijssel, Gärtner, Bos, Van Dellen, & Minke, 2014). Today, the social housing system is failing, the decreasing support from society is a crucial threat to the future of the system (Boelhouwer et al., 2014). Therefore, innovation of the system, among other things by regaining commitment between the housing associations and their target population, is vital (Boelhouwer et al., 2014). A focus on core activities is, together with the first benchmark by Aedes in 2015 (the national organisation promoting the interests of social housing organisations in the Netherlands), the first step in the right direction. With rental incomes that are just sufficient to cover the expenses for management and maintenance, more efficient cooperation with maintenance companies can lead to more efficient maintenance processes and lower maintenance costs (Gruis, 2011). It is believed by both scholars and practitioners that more efficient cooperation can be achieved through supply chain partnering and the effective use of information systems. Especially for housing associations, where the organisation of maintenance occurs in a complex environment. The very diverse property portfolio of housing associations is one of the complexing aspects. The portfolio’s consists of recently completed new built houses, post-war dwellings and houses completed in the intervening period. Furthermore, they lack unity regarding (i) construction quality, (ii) compliance with present living requirements, (iii) method of recording the construction and installation engineering information, and (iv) accessibility to and completeness of this information (Jak, 2016; Mans, 2016). Supply chain partnering (SCP) has become a prominent phenomenon among academics and professionals working in the construction sector (Briscoe & Dainty, 2005; Eriksson, 2015; Gruis, 2011; Segerstedt et al., 2010; Tennant & Fernie, 2014; Venselaar, Gruis, & Verhoeven, 2015; Vrijhoef & Ridder, 2007). Several benefits are ascribed to better coordinated cooperation between supply chain partners, including cost reduction, increase of quality, shorter execution times, and more opportunities for innovation and learning (Eriksson, 2015; Gruis, 2011; Segerstedt et al., 2010; Tennant & Fernie, 2014; Vrijhoef & Ridder, 2007). And although information management is a prerequisite for successful implementation of SCP, there is little attention for the relation between the implementation of SCP and information management. Furthermore, most research on information management in construction focuses on building information modelling (BIM) for new construction (A. Adriaanse, Voordijk, & Dewulf, 2010; Almarshad & Motawa, 2012; Azhar, 2011; Fox & Hietanen, 2007; Love, Matthews, Simpson, Hill, & Olatunji, 2014; Miettinen & Paavola, 2014; Motawa & Almarshad, 2013) while benefits 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 735 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. Goedknegt: Information Management in Supply Chain Partnering: Improving Maintenance Processes in Dutch Housing Associations of BIM could also apply to maintenance. BIM use facilitates the integration of stakeholders thereby reducing fragmentation, improves knowledge management and communication, cooperation, decision-making, and performance of maintenance, and reduces maintenance costs (A. Adriaanse et al., 2010; Almarshad & Motawa, 2012; Azhar, 2011; Deshpande, Azhar, & Amireddy, 2014; Fox & Hietanen, 2007; Love, Simpson, Hill, & Standing, 2013; Van der Vlist, Arno J, Vrolijk, & Dewulf, 2014). However, to fully benefit from BIM coordination of stakeholders and stakeholders’ actions is required (Van der Vlist, Arno J et al., 2014). Research on SCP also focuses mostly on new construction, which is surprising since new construction is still mostly about one-time projects while maintenance is an ongoing series of activities. It is the latter that generates opportunities for a more structural cooperation between supply chain partners and also a more structural coordination of activities, resources, and benefits and risks. This research addresses these opportunities and identifies the coordination mechanisms that help improve information management as well as the implementation of SCP. This research proposal has the following structure, hereafter the problem definition and formulated research question are discussed. Subsequently section three describes the research methodology while section four elaborates on the expected results. Future development of this research is discussed in section five. Problem definition Opportunities for implementation of SCP are particularly evident in the social housing sector in Northwest Europe, including the Netherlands. In Northwest Europe, the social housing sector is managed by professional property managers, who are capable of building professional partnerships with their contractors. In general, the housing sector is under increased financial pressure, which triggers social landlords to look for more efficient ways of working. According to the Housing Act 2015, Dutch housing associations must focus on building, renting out, and managing and maintaining social housing, and invest in the livability of the neighbourhood. The Housing Act 2015 also allows for commercial activities (such as private sector dwellings in a neighbourhood where houses are being demolished to provide a better mix of lower and higher income groups within the neighbourhood) but only when commercial parties have no interest (Rijksoverheid, 2015). This is executed within a framework of (i) less (governmental) subsidies (Gruis, 2011); (ii) various organisational structures; and (iii) a differentiated property portfolio. In addition, the internal business operations of Dutch housing associations are neither transparent nor efficient. An understanding of the activity-based costs is often imperfect (Boelhouwer et al., 2014), while the necessity to manage costs forces housing associations to develop structures of strategic stock management (Bouw Research, 2013) and a housing stock with sufficient flexibility to anticipate to future developments. In addition, the social rent that is actually paid to the housing association is often lower than the (economic or market) value of the housing services generated by the houses (Gruis, 2002). The internal management of housing associations is often 736 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. Goedknegt: Information Management in Supply Chain Partnering: Improving Maintenance Processes in Dutch Housing Associations neither transparent nor functional (Boelhouwer et al., 2014). Potentially, about 80% of all housing associations could improve their processes regarding maintenance (Aedes, 2015). Koolma & Allers (2013) also indicate there is ample room for efficiency gains in the Dutch housing association sector. In the current organisational structure of maintenance, housing associations still tend to do a lot of maintenance activities themselves. This is costing them a lot of time and money, therefore revenues from rent are just sufficient to cover management expenses (Gruis, 2011). Both scholars and practice recommend that housing associations change their maintenance processes in order to lower the costs involved (Dreimüller, Gruis, & Snoeijs, 2013). This starts with changing the type of contract. Traditionally, parties rely on formal, dyadic contracts that specify each party's financial and other rights, responsibilities, and duties (Lavikka, Smeds, & Jaatinen, 2015). And traditional approaches to maintenance lead to more management time, unnecessary costs, and poor maintenance decision-making (Alshawi, Goulding, Sharp, & Jones, 2012). In addition, in construction projects, the relationship between firms typically last for the duration of the project (Vrijhoef & Ridder, 2007), meaning that learning across and between projects to improve processes hardly ever occurs. Also, construction projects are often criticised because of the performance of contractors, with lower than expected performance in time, costs, quality, and satisfaction levels of clients (Ferrada & Serpell, 2014). Kempton (2009) identified a significant problem with communication and a lack of coordination between the corporate goals of the development, management, and maintenance departments. This is illustrated by three employees of a medium sized Dutch housing association who point out that the new building projects department is an independent entity within the housing association. As a result, one of the key challenges is to have sufficient information available for maintenance work, such as specifications, information on previous maintenance work, a list of specialist professionals to conduct work, etc. (Motawa & Almarshad, 2013). Information is often not available and available information is often not complete or up-to-date nor easily shared among supply chain members. Maintenance processes could be improved through improving coordination and information management processes. This is not provided by a dyadic contract since this type of contract neither provides a shared goal for all project partners, nor specifies the organisational or technological mechanisms to align information and knowledge flows between the project partners (Lavikka et al., 2015). A dyadic contract will more likely lead to fear of opportunism, to an experienced lack of trust in the beginning of the project, which in turn leads to more procedural coordination mechanisms to benefit project outcomes and to reduce project risks (Lavikka et al., 2015). Here, a transition towards integrative supply chain processes appears desirable, because maintenance projects require an approach with a clear and integral set of requirements, where all involved parties cooperate as a well-oiled team (Vijverberg, Van der Krogt, & Keus, 2013). Furthermore, transparency and an increase in efficiency are necessary for the legitimacy of housing associations in society (Aedes, 2015). 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 737 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. Goedknegt: Information Management in Supply Chain Partnering: Improving Maintenance Processes in Dutch Housing Associations The idea of a shift from a fragmented (dyadic) into an integrative way of construction is also a generalised technological promise of building information modelling (BIM) technologies (Miettinen & Paavola, 2014). However, this does not provide a realistic conception of the complexity of the conditions of the implementation of BIM (Miettinen & Paavola, 2014). According to Love et al. (2014) BIM technology in itself has no inherent value; having BIM technology in place will not necessarily provide benefits or create value for a housing association, benefits only arise from its effective use. This asks for coordination of stakeholders’ actions (Van der Vlist, Arno J et al., 2014). And learning to cooperate as partners is a social accomplishment, rather than a technical feature (Bresnen, 2010). Partnering must involve the production of new working practices at a local (supply chain) level (Bresnen, 2010). The implementation of BIM could help as it facilitates the integration of the roles of all stakeholders (Azhar, 2011). In 2014 Nobakht stated in Cobouw, a daily (online) magazine for construction professionals, that despite the changes and challenges housing associations are facing, structural innovations of the current business models were still omitted. He believes that the barrier for structural innovations lies in the originating small scale building sector, with a traditional way of thinking, a monoculture, and a lack of knowledge regarding strategic business problems (Nobakht, 2014). Construction clients appear to distrust their main contractors who, in turn, distrust their subcontractors and suppliers, and individual players have very little stake in the long-term success of, and therefore no commitment to resulting structure. (Briscoe & Dainty, 2005). The core of the problem is that fragmentation (A. M. Adriaanse, 2014; Behera, Mohanty, & Prakash, 2015) is thought to be of interest to all involved parties although it leads to loss of information, misunderstandings, pointing at each other, sub-optimizations, and additional work (Vijverberg et al., 2013). Although it is believed that supply chain integration must lead to improvement by developing a more stable environment (Vrijhoef & Ridder, 2007), several barriers prevent this integration. The traditional fragmentation leads to resistance towards supply chain integration due to perceived extra costs, partners are unaccustomed to share knowledge across project phases and are unaware of potential benefits (Nam & Tatum, 1992). Successful integration of the construction supply chain is possible. For instance through a multi- party contract which aligns financial interests and builds trust between supply chain partners in the beginning of the project; the contract aligns information and knowledge flow between the project partners by specifying organisational and technological mechanisms (Lavikka et al., 2015). Long term supply chain partnerships (i) make it easier to be vulnerable and communicate freely and thus to establish common norms and good team practices, and (ii) are also positively associated with improved working practices and an increased level of trust (Buvik & Rolfsen, 2015). In high trust groups, coordination is more effective leading to greater efficiency and hence better performance (Dirks, 1999). Coordination theory is relevant for improving the cooperation in supply chains (Kanda & Deshmukh, 2008; Li & Wang, 2007), especially in combination with the concept of boundary objects (Bresnen, 2010). However, thus far this theory has not been applied to supply chains in the construction industry. Coordination theory has been defined by 738 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. Goedknegt: Information Management in Supply Chain Partnering: Improving Maintenance Processes in Dutch Housing Associations Malone and Crowston (1990) as “a body of principles about how activities can be coordinated, that is, how actors can work together harmoniously”. Li and Wang (2007) distinguish two supply chain types, centralised and decentralised. They state that construction supply chains are decentralised supply chains, which are more difficult to coordinate because this requires a scheme to allocate the benefits of coordination throughout the supply chain to maintain the interest and participation of all dependent supply chain partners (Li & Wang, 2007). For this agency theory “offers a unique, realistic, and empirically testable perspective on problems of cooperative effort” (Eisenhardt, 1989). It analyses the relationship that develops in an economic exchange when an individual (the principal) concedes authority to another (the agent) to act in his or her name (Cuevas‐Rodríguez, Gomez‐Mejia, & Wiseman, 2012). The exercise of coercive and legal power has a strong negative effect on collaborative behaviour, while rewards have a positive effect (Nyaga, Lynch, Marshall, & Ambrose, 2013). The central goal of agency theory is to stop opportunistic behaviour in a situation where parties have different goals and the information supply is incomplete (i.e. the traditional maintenance practice at Dutch housing associations). Coordination theory and agency theory are complementary because where the latter theory presents a partial view of the world that ignores a good bit of the complexity of organisations (Eisenhardt, 1989), the former theory fills this gap by looking at the complexity of cooperation between organisations. Because supply chains are complex with many activities usually spread over multiple organisations and sometimes over lengthy time horizons, it is necessary to overlay a coordinated system (Kanda & Deshmukh, 2008). This coordinated system may include an explicit definition of processes, responsibilities, and structures aligned with overall objectives of the whole supply chain to bring together multiple functions and organisations (Kanda & Deshmukh, 2008). This implies that all these organisations and the people within the organisations have to face, and preferably employ, one of the four dialogical learning mechanisms of boundaries (Akkerman & Bakker, 2011):  Identification, which is about coming to know what the diverse practices are about in relation to one another;  Coordination, which is about creating cooperative and routinized exchanges between practices;  Reflection, which is about expanding one's perspectives on the practices;  Transformation, which is about collaboration and co-development of (new) practices. The results of this research are specifically aimed at realising recommendations for improving maintenance processes at Dutch housing associations by improving the collaboration (and coordination) of the supply chain processes. Based on the discussion as described above the results should provide an answer to the following main research question: 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 739 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. Goedknegt: Information Management in Supply Chain Partnering: Improving Maintenance Processes in Dutch Housing Associations How can the organisation of maintenance processes at Dutch housing associations in different supply chain partnering principles and the related information management be improved? Related sub-questions are:  What coordination methods are used to align goals and objectives, to align decision-making, to share information, and to align cooperation?  Do supply chain partners experience the benefits of SCP (improved performance, reduced project costs, reduced project risks)?  To what extent does BIM support the coordination method of sharing information?  What are other IT systems used in the cooperation?  What problems occur in using the coordination mechanisms, and how can these problems be improved? Methodology This research follows the applied research perspective as described by Kumar (2014). The chosen perspective for the objectives of the research is that of explanatory research since little is known about the research topic (Kumar, 2014). This is combined with descriptive research in order to describe systematically the situation (Kumar, 2014). The mode of enquiry perspective is that of a qualitative approach (Kumar, 2014) and therefore the form of case studies is chosen to retain a holistic and real-world perspective (Yin, 2013). A case study is interpretive and descriptive because it attempts to understand and portray results-oriented planned maintenance through the participants’ interpretation of their context (Runeson & Höst, 2009). The case study design is also chosen because (i) the main research question is a ‘how’ question, (ii) the researcher has no control over actual behavioural events, and (iii) the degree of focus is on contemporary events (Yin, 2013). The research aims to discover which coordination mechanisms are used (i) to align goals and objectives in the supply chain, (ii) to align decision-making by the supply chain partners, (iii) to share information within the supply chain, and (iv) to align cooperation in the supply chain. But also to discover whether the benefits of SCP (e.g. (i) improved project performance (e.g. project coordination, work processes, problem solving processes, organizational learning, quality of project results), (ii) reduced project costs (e.g. less redundant work and wastage), and (iii) reduced project risks (project delay, over-budget, poor quality) (Arvitrida, Robinson, & Tako, 2015; Bresnen, 2007; Challender, Farrell, & Sherratt, 2014; Love, Irani, Cheng, & Li, 2002; Soosay & Hyland, 2015; Vrijhoef & de Ridder, 2007; Wong & Cheung, 2004) are present in the cases. Further objectives are to investigate what ICT systems are used, the problems that occur in using the coordination mechanisms, and how these problems can be improved. 740 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. Goedknegt: Information Management in Supply Chain Partnering: Improving Maintenance Processes in Dutch Housing Associations This research consists of two (replicable) cases. For these cases, a two-case case study design (Yin, 2013) is chosen in order to describe and explain SCP in planned maintenance at Dutch housing associations. The findings from these cases are assessed in a wider context through a survey. Research results are published four times during the research. The first paper is a literature review, the second paper is based on the results of the first case study, the third paper is based on the results of the second case study, and the fourth paper is based on the survey results. The final thesis is composed based on the published papers (see also figure 1). Figure 1: Research method (Goedknegt, 2017) The coordination processes of supply chain integration at Dutch housing associations are described through a literature study. This is supported by literature on coordination theory, agency theory, boundary crossing, and information management. Literature is found through desk research and snowballing using scientific databases such as Science Direct and scholar.google.com. Results of this literature review will be used in the case studies. Case study evidence may come from six sources: documents, archival records, interviews, direct observations, participant observations, and physical artefacts (Yin, 2013). And because in case study research it is important to use multiple sources of evidence (Yin, 2013), this research makes use of the following sources: documents, archival records, interviews, and direct observations. The researcher will not participate in the maintenance process, therefore participant observation is not used. The researcher remains “a passive observer, watching and listening to activities and drawings conclusions from this” (Kumar, 2014). Also, physical artefacts are not used because processes are researched, not technical operations (Yin, 2013). Furthermore, two types of interviews will be used: prolonged case study interviews (“in which interviewees can be asked about their interpretations and opinions about people and events or their insights, explanations, and meanings related to certain occurrences”) and survey interviews (Yin, 2013). The direct observations will contain observations of meetings and maintenance activities (Yin, 2013). Both case studies are organised to the same theory in order to strive for generalizable findings (analytic generalisations) that go beyond the specific cases (Yin, 2013). This means that this research adopts the holistic multiple-case design and is a literal replication 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 741 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. Goedknegt: Information Management in Supply Chain Partnering: Improving Maintenance Processes in Dutch Housing Associations of two cases as described by Yin (2013). In all cases (i) maintenance must be executed within a supply chain; (ii) within the supply chain all partners commit to predetermined results; (iii) maintenance is described by the housing association (in consultation with tenants and the contractor) as technical performance demands; and (iv) the contractor assures both housing association and tenants that the technical performances are achieved. Results from both case studies will be validated (or rejected) through a survey amongst other Dutch housings associations and their maintenance contractors. The first object of study is a maintenance supply chain at a local Dutch housing association, founded in 1913. For this housing association, supply chain partnering is an important feature since 2011. They believe in the benefits of SCP and execute 80% of their maintenance work through SCP. In this case study, the main contractor is a new supply chain partner who has proven his reliability and skills in a small project. The following roles are included in the study: the project manager of the housing association, the foreman of the main contractor, the project manager of the most important subcontractor(s) and the project manager of the (main) supplier(s). It is important to point out that the project that is researched is the first of this particular main contractor. Aspects of study are the sub-questions as stated in section two. In more detail, it is researched what mechanisms are in place to establish supply chain integration for the maintenance activities using coordination mechanisms and boundary crossing mechanisms (see table 1). The first column in table 1 shows the supply chain integration mechanisms (after Briscoe & Dainty, 2005). The second and third column show matching coordination and boundary crossing mechanisms for each of the supply chain integration mechanisms. In the fourth column, the matching maintenance activities are added. In other words, the table shows what maintenance activities contribute to supply chain integration. 742 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. Goedknegt: Information Management in Supply Chain Partnering: Improving Maintenance Processes in Dutch Housing Associations Table 1: Conceptual model (Goedknegt, 2017) Supply chain Coordination Boundary Maintenance integration mechanisms crossing (construction) (Briscoe & (Kanda & (Akkerman & activities Dainty, 2005) Deshmukh, 2008; Bakker, 2011) (Lavikka et al., Koolwijk et al., 2015; Tucker et 2015; Li & Wang, al., 2014) 2007; Malone & Crowston, 1990; Malone & Crowston, 1994) Develop effective Align decision- Identification Establish communication making (e.g. (othering, maintenance systems throughout through legitimating co- service standards. the phases of the (electronic) existence). Set up supply chain, meeting and Coordination collaborative Ensure good and communication (communicative decision-making. reliable flows of tools). connection, Use building information, Establish increase boundary information Establish standardisation of permeability, modelling (BIM). mechanisms for outputs. routinization) Use project problem Reflection management resolution. (perspective software and making and techniques. Ensure that all Align goals and taking). Establish a supply chain objectives within Transformation procurement partners have the supply chain. (confrontation, strategy. knowledge of each recognising shared Establish a joint other’s processes problem space, financial incentive. Ensure that all hybridization). Set up an supply chain organisational partners are able to design. align their Agree on a process processes. for collaborative working. Agree on common definitions. Use the pull technique of Lean construction 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 743 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. Goedknegt: Information Management in Supply Chain Partnering: Improving Maintenance Processes in Dutch Housing Associations Focus on Structure joint Establish efficient coordinated working sharing of work practices. working through resources. Align work (i) project Establish an ICT- practices. management system to transfer Establish quality techniques, and (ii) information and control procedures. alignment of ICT- knowledge (e.g. Key project systems (e.g. BIM). partners work co- BIM). Set up SC located. contracts. Use building Planning project information phases together. modelling (BIM). Use and project management software and techniques. Expected results Based on our study of the literature, the following elements are a prerequisite for the improvement of the maintenance processes (see figure 2) (Goedknegt & Ravesteijn, 2016): (i) supply chain partners have a joint understanding of the mutual (inter)dependencies between all supply chain partners; (ii) supply chain partners align their goals and objectives; (iii) supply chain partners agree on the coordination of decision-making; and (iv) supply chain partners agree on the exchange and availability of information and knowledge (regarding the maintenance processes). The assumption is that by identifying and applying the coordination mechanisms (see figure 2), information management (through implementing BIM) and supply chain partnering, and thus maintenance processes will improve. This will lead to all previously mentioned benefits (e.g. improved project performance, reduced costs, and reduced project risks). Preliminary case study observations (of the first case study) show a difference in the approach to SCP. The property managers ambition is results-oriented cooperation with a permanent network of supply chain partners based on affordability, availability, and quality. He believes that data must be secured and available and knowledge must be assured, for example by using BIM. The project manager, however, does not talk about results-oriented cooperation but about performance oriented cooperation with responsible supply chain partners. He also draws up performance oriented contracts per project which contravenes to both the literature on trust and SCP and the housing association’s own supply chain principles. The main contractor has aligned his goals with those of the housing association regarding the project, he puts the quality of living of the tenants during and after the maintenance activities first. Further research must give more insight into the actual cooperation process and its effects. 744 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. Goedknegt: Information Management in Supply Chain Partnering: Improving Maintenance Processes in Dutch Housing Associations Figure 2: Conceptual model (Goedknegt, 2017) Future Development The literature study is the rationale for subsequent future research. Although more scientific and practical research can be incorporated, this study has already shown that research regarding improving maintenance processes at Dutch housing associations is missing. Therefore, research will be executed through case studies at two Dutch housing associations currently implementing results-oriented maintenance processes. These case studies aim to reveal how the different constructs in our conceptual model help improve the information management, supply chain management and thus the maintenance processes. These results will then be tested via a qualitative survey with relevant stakeholders (e.g. housing associations, main contractors, subcontractors). This will contribute to the implementation of SCP in the construction industry. According to Van der Boon (manager R&D, innovation, business development) at Leertouwer (a technical service provider in electrical engineering, climate control and ICT) many housing associations are still stuck in the previous century, steering at lowest cost based on Excel documents, sometimes even lacking the knowledge and skills to see the bigger picture (Van der Boon, 2016). Van der Boon (2016) also stresses that although SCP is very relevant, construction is still an industry where phases are viewed as stand-alone, and learning across phases is still not common. When one phase is finished, information is not well nurtured, and cooperation and coordination are not common. Communication is key, and a change in culture is necessary. It is important to understand the role, responsibilities and processes of all actors. Wolf (managing director of Vines Building 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 745 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. Goedknegt: Information Management in Supply Chain Partnering: Improving Maintenance Processes in Dutch Housing Associations Engineers) states that BIM, as a vehicle for improving the coordination of information of maintenance processes, can be used to change the current maintenance processes into processes based on sharing knowledge and information and empowering process stakeholders (Wolf, 2014). Acknowledgement The author wish to acknowledge Dr. ing. Pascal Ravesteijn and Ir. Ellen van Keeken for their useful comments on this paper. References Informal interviews Jak, F., prognosis manager De Alliantie, www.de-alliantie.nl, 26 January 2015 Mans, P., Strategy and Policy advisor, De Alliantie, www.de-alliantie.nl, 12 February 2016 Van der Boon, M., R&D, innovation, business development, www.leertouwer.nl, 26 January 2016 Vos, A., region manager De Alliantie, www.de-alliantie.nl, 15 January 2015 Wolf, W., managing director Vibes Building Engineers, www.vibes.nl, 12 December 2014 Public lectures Adriaanse, A. M. (2014). Bruggen bouwen met ICT. Gruis, V. (2011). Kansen bij cocreatie. samenwerk bij woningrenovatie: Openbare les 2011. (Openbare les). Utrecht: Hogeschool Utrecht. Retrieved from http://hu.surfsharekit.nl:8080/get/smpid:45461/DS1/ Books Kumar, R. (2014). Research methodology. London: Sage Publications Ltd. Yin, R. K. (2013). Case study research: Design and methods Sage publications Proceedings from conferences Almarshad, A., & Motawa, I. A. (2012). BIM-based knowledge management for building maintenance. Paper presented at the CIB W078 2012: 29th International COnference, Beirut, Lebanon. Arvitrida, N. I., Robinson, S., & Tako, A. A. (2015). How do competition and collaboration affect supply chain performance? an agent based modeling approach. Paper presented at the 2015 Winter Simulation Conference (WSC), 218-229 Goedknegt, D., Ravesteijn, P. (2016). Towards Results-Oriented Maintenance Processes at Dutch Housing Associations. Proceedings of CIB W78 Conference 2016. Kempton, J. (2009). Modern methods of construction: Maintenance issues in the registered social landlord sector. Paper presented at the Procs Annual ARCOM Conference, 7-9. Malone, T. W., & Crowston, K. (1990). What is coordination theory and how can it help design cooperative work systems? Paper presented at the Proceedings of the 1990 ACM Conference on Computer-Supported Cooperative Work, 357-370. 746 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. Goedknegt: Information Management in Supply Chain Partnering: Improving Maintenance Processes in Dutch Housing Associations Vrijhoef, R., & de Ridder, H. (2007). A systems approach for developing a model of construction supply chain integration. Paper presented at the 4th Nordic Conference on Construction Economics and Organisation, 3. Vrijhoef, R., & Ridder, H. (2007). Supply chain systems engineering in construction. Paper presented at the Proceedings CIB World Building Congress, 14-17. Reports Aedes (2015). Grote stap gezet, wereld te winnen. Rapportage Aedes-benchmark 2014. Vereniging van woningcorporaties. Bouw Research, S. (2013). Leidraad resultaatgericht vastgoedonderhoud. Retrieved from http://www.sbrcurnet.nl.www.dbproxy.hu.nl/producten/publicaties/leidraad-resultaatgericht- samenwerken-bij-investeren-en-onderhoud/titelpagina Dreimüller, A., Gruis, V., & Snoeijs, C. (2013). De regie-corporatie. naar een doelmatige maatschappelijke verhuurder. Effectory (2015). Sectormagazine woningcorporaties. Kansen voor succesvollere woningcorporaties. Effectory, Amsterdam. Koolma, H., & Allers, M. (2013). De doelmatigheid van woningcorporaties in kaart gebracht. Van Gijssel, A., Gärtner, R., Bos, R., Van Dellen, R., & Minke, P. (2014). Blue sky memo. Over greenfields, de toekomst en bouwstenen voor een visie.Aedes Vijverberg, G., Van der Krogt, H., & Keus, D. (2013). Leidraad resultaatgericht samenwerken bij investeren en onderhouden. (Leidraad).SBR. Government publications Rijksoverheid (2015). Commerciële en maatschappelijke activiteiten woningcorporaties. Downloaded at 2016.01.16 from https://www.rijksoverheid.nl/onderwerpen/woningcorporaties/inhoud/activiteiten- woningcorporaties Journal Articles Adriaanse, A., Voordijk, H., & Dewulf, G. (2010). Adoption and use of interorganizational ICT in a construction project. Journal of Construction Engineering and Management, 136(9), 1003- 1014. Akkerman, S. F., & Bakker, A. (2011). Boundary crossing and boundary objects. Review of Educational Research, 81(2), 132-169. Alshawi, M., Goulding, J., Sharp, M., & Jones, K. (2012). Perceived inefficiency in social housing maintenance. Construction Innovation, 12(4), 414-428. Azhar, S. (2011). Building information modeling (BIM): Trends, benefits, risks, and challenges for the AEC industry. Leadership and Management in Engineering, 11(3), 241-252. Behera, P., Mohanty, R., & Prakash, A. (2015). Understanding construction supply chain management. Production Planning & Control, 26(16), 1332-1350. Boelhouwer, P., Elsinga, M., Gruis, V., Priemus, H., van der Schaar, J., & Thomsen, A. (2014). Wonen 6.0: Over de toekomst van de sociale huisvesting in Nederland. Bresnen, M. (2007). Deconstructing partnering in project-based organisation: Seven pillars, seven paradoxes and seven deadly sins. International Journal of Project Management, 25(4), 365-374. Bresnen, M. (2010). Keeping it real? constituting partnering through boundary objects. Construction Management and Economics, 28(6), 615-628. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 747 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. Goedknegt: Information Management in Supply Chain Partnering: Improving Maintenance Processes in Dutch Housing Associations Briscoe, G., & Dainty, A. (2005). Construction supply chain integration: An elusive goal? Supply Chain Management: An International Journal, 10(4), 319-326. Buvik, M. P., & Rolfsen, M. (2015). Prior ties and trust development in project teams–A case study from the construction industry. International Journal of Project Management, 33(7), 1484-1494. Challender, J., Farrell, P., & Sherratt, F. (2014). Partnering in practice: An analysis of collaboration and trust. Proceedings of the Institution of Civil Engineers-Management, Procurement and Law, 167(6), 255-264. Cuevas‐Rodríguez, G., Gomez‐Mejia, L. R., & Wiseman, R. M. (2012). Has agency theory run its course?: Making the theory more flexible to inform the management of reward systems. Corporate Governance: An International Review, 20(6), 526-546. Deshpande, A., Azhar, S., & Amireddy, S. (2014). A framework for a BIM-based knowledge management system. Procedia Engineering, 85, 113-122. Dirks, K. T. (1999). The effects of interpersonal trust on work group performance. Journal of Applied Psychology, 84(3), 445. Eisenhardt, K. M. (1989). Agency theory: An assessment and review. Academy of Management Review, 14(1), 57-74. Eriksson, P. E. (2015). Partnering in engineering projects: Four dimensions of supply chain integration. Journal of Purchasing and Supply Management, 21(1), 38-50. Ferrada, X., & Serpell, A. (2014). Selection of construction methods for construction projects: A knowledge problem. Journal of Construction Engineering and Management, 140(4), B4014002. Fox, S., & Hietanen, J. (2007). Interorganizational use of building information models: Potential for automational, informational and transformational effects. Construction Management and Economics, 25(3), 289-296. Gruis, V. (2002). Portfolio management in the social rented sector: Valuation, risk analysis and strategy development. Housing Studies, 17(2), 245-265. Kanda, A., & Deshmukh, S. (2008). Supply chain coordination: Perspectives, empirical studies and research directions. International Journal of Production Economics, 115(2), 316-335. Lavikka, R. H., Smeds, R., & Jaatinen, M. (2015). Coordinating collaboration in contractually different complex construction projects. Supply Chain Management: An International Journal, 20(2), 205-217. Li, X., & Wang, Q. (2007). Coordination mechanisms of supply chain systems. European Journal of Operational Research, 179(1), 1-16. Love, P. E., Irani, Z., Cheng, E., & Li, H. (2002). A model for supporting inter‐organizational relations in the supply chain. Engineering Construction and Architectural Management, 9(1), 2-15. Love, P. E., Matthews, J., Simpson, I., Hill, A., & Olatunji, O. A. (2014). A benefits realization management building information modeling framework for asset owners. Automation in Construction, 37, 1-10. Love, P. E., Simpson, I., Hill, A., & Standing, C. (2013). From justification to evaluation: Building information modeling for asset owners. Automation in Construction, 35, 208-216. Miettinen, R., & Paavola, S. (2014). Beyond the BIM utopia: Approaches to the development and implementation of building information modeling. Automation in Construction, 43, 84-91. Motawa, I., & Almarshad, A. (2013). A knowledge-based BIM system for building maintenance. Automation in Construction, 29, 173-182. Nam, C., & Tatum, C. (1992). Noncontractual methods of integration on construction projects. Journal of Construction Engineering and Management, 118(2), 385-398. 748 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) D. Goedknegt: Information Management in Supply Chain Partnering: Improving Maintenance Processes in Dutch Housing Associations Nyaga, G. N., Lynch, D. F., Marshall, D., & Ambrose, E. (2013). Power asymmetry, adaptation and collaboration in dyadic relationships involving a powerful partner. Journal of Supply Chain Management, 49(3), 42-65. Runeson, P., & Höst, M. (2009). Guidelines for conducting and reporting case study research in software engineering. Empirical Software Engineering, 14(2), 131-164. Segerstedt, A., Olofsson, T., Bankvall, L., Bygballe, L. E., Dubois, A., & Jahre, M. (2010). Interdependence in supply chains and projects in construction. Supply Chain Management: An International Journal, 15(5), 385-393. Soosay, C. A., & Hyland, P. (2015). A decade of supply chain collaboration and directions for future research. Supply Chain Management: An International Journal, 20(6), 613-630. Tennant, S., & Fernie, S. (2014). Theory to practice: A typology of supply chain management in construction. International Journal of Construction Management, 14(1), 56-66. Van der Vlist, Arno J, Vrolijk, M. H., & Dewulf, G. P. (2014). On information and communication technology and production cost in construction industry: Evidence from the Netherlands. Construction Management and Economics, 32(6), 641-651. Venselaar, M., Gruis, V., & Verhoeven, F. (2015). Implementing supply chain partnering in the construction industry: Work floor experiences within a Dutch housing association. Journal of Purchasing and Supply Management, 21(1), 1-8. Wong, P. S., & Cheung, S. (2004). Trust in construction partnering: Views from parties of the partnering dance. International Journal of Project Management, 22(6), 437-446. Newspaper articles Nobakht, F. (2014). Bouw komt moeizaam van verslaving af. In: Cobouw. Downloaded at 2014.09.02 from www.cobouw.nl 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) A. Pucihar, M. Kljajić Borštnar, C. Kittl, P. Ravesteijn, R. Clarke & R. Bons Personalization in Digital Services: Information Technology Supporting Service Personalization Process 52 OLLI KORHONEN Abstract Personalization technologies are widely applied for providing appropriate products and services for individual users. Service providers utilize personalization technologies for understanding the individual user needs, and for personalizing their service offerings for those needs. That perspective follows the value models of manufacturing, wherein service provider personalizes the services for the user, and where the roles of service provider and user are distinct. However, propositions that markets have transformed to services, wherein services are co-created between actors, is not supporting the traditional personalization perspective properly. For example, healthcare services are not only personalized for the user, but in co-creation with the user. Therefore in my research proposal, the aim is to examine service personalization, and the role of IT in the service personalization process, from the perspectives of different actors. Keywords: • Personalization • Service Design • Healthcare Service • Service-Dominant Logic • Human-Computer Interaction • CORRESPONDENCE ADDRESS: Olli Korhonen, University of Oulu, Pentti Kaiteran katu 1, 90014 Oulu, Finland, e-mail: Olli.korhonen@oulu.fi. https://doi.org/10.18690/978-961-286-043-1.52 ISBN 978-961-286-043-1 © 2017 University of Maribor Press Available at: http://press.um.si. 750 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) O. Korhonen: Personalization in Digital Services: Information Technology Supporting Service Personalization Process Introduction Personalization has remained an increasingly intriguing concept among scholars (Sunikka and Bragge, 2012). Through the digitization of everything (Brynjolfsson and McAfee, 2014), more and more information about user preferences is available for service providers (Salonen and Karjaluoto, 2016). Rapidly evolving digital technology provides novel platforms and channels for service delivery (Vehmas et al., 2015), and consequently for personalization (Sunikka and Bragge, 2012). In principle, personalization consists of two core components: 1) The understanding of user needs and 2) personalization of services based on those needs (Kaptein and Parviainen, 2015). In both these components, a wide variety of personalization technologies, such as recommendation systems are utilized. In other words, the purpose of personalization is to adapt standardized products or services to the individual user needs, and that personalization is carried out by the marketer on behalf of the user (Montgomery and Smith, 2009). The concept of personalization is often used interchangeably with another one-to-one marketing concept, customization, which on the contrary is user-led, and where the user proactively “personalizes” the service elements from the marketing mix, based on their own preferences (Kwon and Kim, 2012; Salonen and Karjaluoto, 2016). In this research, we follow the viewpoint from Sunikka and Bragge (2008) who view personalization as an umbrella term, including other closely related concepts like customization. Based on the aforementioned personalization principles, it can be argued that personalization is a service provider-led concept, where service provider decides the suitable services for an individual user, based on the information gathered. These viewpoints follow the value models of manufacturing (Lusch and Vargo, 2014), where the service provider personalizes the services for users, who then receive the services, for example in the forms of product recommendations. However, unlike manufacturing and tangible products, services, often intangible by their nature, are carried out in collaboration (co-creation) between actors (Vargo and Lusch, 2004). The service delivery may also involve more actors than service provider and the user only. Therefore, instead of emphasizing the distinction, where the marketer carries out personalization and the user receives the personalization, it is important to examine personalization from the different actors’ viewpoints, as with services, the actors together construct the personalized service. Problem Definition Personalization has remained a puzzling concept among scholars for decades (Sunikka and Bragge, 2008). The scholars in information systems (IS), computer science, economics, services, and marketing have studied the concept through different lenses, with an aim to optimize services to the individualized user needs (Fan and Poole, 2006; Kwon and Kim, 2012. In the IS field, personalization is typically technologically 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 751 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) O. Korhonen: Personalization in Digital Services: Information Technology Supporting Service Personalization Process emphasized, studied in the web context and examined from the perspective of a single software (Sunikka and Bragge, 2012). That viewpoint has typically included two primary actors into the personalization process. 1) The service provider, who personalizes the service offerings, and 2) the user, who receives the personalized service offerings. This distinction follows the value models of manufacturing (Goods-Dominant Logic, G-D), where companies produce (create) value and users consume (destroy) that value (Lusch and Vargo, 2014). Companies try to understand users’ needs, and to personalize the service offerings for those needs. In order to do so, different information technology (IT) solutions, such as personalization technologies are widely adopted. However, Service-Dominant Logic (S-D) has challenged this thinking by proposing that markets have shifted from manufacturing and goods-dominance to services (Vargo and Lusch, 2004; Lusch and Vargo, 2014; Häikiö and Koivumäki, 2016). Unlike tangible products, services can be defined as: “the application of specialized competences (knowledge and skills) through deeds, processes, and performances for the benefit of another actor or the actor itself” (Vargo and Lusch, 2004). In other words, any act done intentionally for benefiting an actor can be considered as a service. Services are often intangible by their nature, but are occasionally supported by tangible products. In contrast to products though, the value in services is bound to knowledge and skills that are delivered (co-created) in exchanges between actors. In my research plan, the aim is to examine personalization of digital services through S- D logic lens, and the role IT plays in the service personalization process. Unlike concrete products, intangible services can consist of multiple steps and phases, and often involve multiple actors in the service delivery process. That can be illustrated with a healthcare example, where the primary purpose of a healthcare company is not to sell tangible products to patients, but to serve the patients’ needs collaboratively with by the patient. Furthermore, this service can be supported by tangible devices, like monitors for self- measurements, and involve multiple actors, such as medical doctor, patient, or the healthcare service provider that together construct the personalized service. The aim of my research is therefore to answer to the following questions:  How IT supported personalization can be viewed from the perspective of different actors taking part in the service delivery?  How and what support IT can provide for different actors in the service personalization process? Research Methodology My research will apply qualitative research methods, but also quantitative methods may be used to support the findings. The primary material for my research comes from two case studies (Eisenhardt, 1989), conducted in collaboration with two large service providers. The data from those case studies consists of service documentations and the interviews (semi-structured interviews and focus groups) with the people who have been 752 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) O. Korhonen: Personalization in Digital Services: Information Technology Supporting Service Personalization Process designing the services under analysis. The data is collected and analyzed iteratively throughout the studies using qualitative data analysis approach (Miles and Huberman, 1994), with an aim to interpret and construct understanding of the situation where the examined phenomenon takes place (Klein and Myers, 1999). For example, in the case study (paper 3), two focus groups were conducted first, for getting an overview of the problem area. In the focus groups, more general and open-ended questions were discussed, with an aim to gain understanding of the unit of analysis (which in that case was a depression care pathway). Second, the findings from the focus groups were used to formulate the themes for the semi-structured interviews, where the aim was to ask detailed questions from the key informants that were selected by selective sampling technique (Sandelowski, 1995). In practice, those were the medical doctors that had been designing the examined care pathway. After the semi-structured interviews, the findings were categorized thematically and summarized into a table form. Third, a validating interview was conducted for validating the prior findings and to provide potentially complementary data. In the future, the plan is to utilize similar settings in another case study (paper 4) regarding to the service provider perspective. For the user perspective (paper 5), user experiences (e.g. Forlizzi and Battarbee, 2004) will be collected using different types of interviews (as it was done in paper 1). That data can also be supported by quantitative data, in the forms of surveys that the service provider has already conducted with the service users. In addition to aforementioned case studies, other qualitative analysis methods are used in single papers, such as Nexus analysis (Scollon, 2004) to deepen the understanding on user experiences about motivation for exercising (paper 1) and Interaction analysis (Jordan and Henderson, 1995) for studying service interaction between user and service clerk in a context of technology-mediated car rental service (paper 2). Preliminary/Expected Results In overall, by covering the viewpoints of different actors, the aim of my research is to increase the understanding of value creation between different actors for personalized services in the framework of S-D logic and to examine the role of IT in the service personalization process. As a technology-emphasized concept, personalization is mostly studied using the G-D logic principles and with the value models of manufacturing. Due to the idea of market transformation to services, it is important to examine personalization 1) in the service context, 2) from the different actors’ perspectives, and 3) to provide knowledge on the versatile role of IT in the service personalization process. Therefore the planned articles for examining the phenomenon are presented in the Table 1. Regarding to the preliminary findings, we have conducted an interpretive case study (Klein and Myers, 1999) for examining IT support for personalization in the healthcare service context (paper 3). In healthcare services, personalization is provided as a premise as individual conditions and needs vary between healthcare users (Berry and Bendapudi, 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 753 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) O. Korhonen: Personalization in Digital Services: Information Technology Supporting Service Personalization Process 2007). As medical doctors are specialists in the healthcare domain, the services are typically personalized based on their professional knowledge for individual healthcare users, with support from IT and other tangible technology (such as laboratory measurement devices). In other words, IT is used as an artefact to provide the right information for the right person, in the right format (Von Thiele Schwarz, 2016). Therefore our study focused on examining the role of IT in the healthcare service personalization process. Our results from that study illustrate that personalization intertwines automatized support from IT with a more collaborative nature where service personalization occurs in co-creation and interaction between actors. Therefore, for illustrating our findings (from paper 3), we categorized different personalization types under three main categories, based on the automatization level provided by IT: 1) Coercive personalization is automatized and does not allow interpretation of the human actor, 2) Data display personalization is automatized, but interpreted manually by medical doctors, 3) Collaboration-based personalization is supported by automatization, but the emphasis is on interpretation and co-creation between actors. 754 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) O. Korhonen: Personalization in Digital Services: Information Technology Supporting Service Personalization Process Table 1: Planned articles for the doctoral research Paper Perspective Role of Results technology #1 Personalized User (experiences) Application, The focus on Gamification: designed to examining the use of Narratives for entertain/support narratives as a Supporting exercising motivational feature Motivation for – proposing three Exercising. techniques for narrative personalization #2 Service Interaction Analysis of the Enables technology- The focus on Flow Analysis technology- mediated capturing evidence Technique for Service mediated interaction communication on how variations of Personalization. between user and service flows can be service clerk made visible in the technology-mediated service environment. #3 Identifying Medical doctor Intertwining the role IT support for Personalization In A (service designer) from support that is healthcare service Care Pathway: A primarily personalization, Single-Case Study Of automatized, to based on the The Finnish supportive, that automatization level Healthcare Service provides provided by IT: 1) Provider interpretative data Coercive for co-creation personalization, 2) between actors Data display, 3) Collaboration-based personalization #4 Personalization in Service provider Technology enables In the future (2017) the healthcare perspective (Either remote service: Case study of designer or measurements and a remote company) communication measurement device between actors ½ (DRAFT) (patient and service provider) #5 Personalization in User (patient) Technology enables In the future (2017- the healthcare perspective remote 18) service: Case study of measurements and a remote communication measurement device between actors 2/2 (patient and service (DRAFT) provider) #6 (Optional) Holistic (all actors) Framework of the IT In the future (2018) Synthesis of the case support for service study findings personalization (DRAFT) 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO 755 TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) O. Korhonen: Personalization in Digital Services: Information Technology Supporting Service Personalization Process Future Development In the near future, we have plans to conduct another case study in collaboration with a large service provider (paper 4 and 5). The aim is to examine both the user and service designer (or company) perspective and to provide insights how the personalized services are constructed in co-creation between these actors, and what is the role IT plays in the service co-creation. For the final paper (paper 6), the aim is to draw an overview, a holistic framework regarding to service personalization. That framework covers the perspectives of different actors and presents the diverse role of IT in the service personalization process. References Berry, L.L. and Bendapudi, N. (2007). Health care a fertile field for service research. Journal of Service Research, 10(2), 111–122. Brynjolfsson, E., & McAfee, A. (2014). The second machine age: Work, progress, and prosperity in a time of brilliant technologies. WW Norton & Company. Eisenhardt, K.M. (1989). Building theories from case study research. Academy of management review, 14(4), 532–550. Fan, H., & Poole, M.S. (2006). What is personalization? Perspectives on the design and implementation of personalization in information systems. Journal of Organizational Computing and Electronic Commerce, 16(3-4), 179–202. Forlizzi, J., & Battarbee, K. (2004). Understanding experience in interactive systems. Proceedings of the 5th Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques, 261-268. Häikiö, J., & Koivumäki, T. (2016). Exploring Digital Service Innovation Process Through Value Creation. Journal of Innovation Management, 4(2), 96–124. Jordan, B., & Henderson, A. (1995). Interaction analysis: Foundations and practice. The journal of the learning sciences, 4(1), 39–103. Kaptein, M., & Parvinen, P. (2015). Advancing e-commerce personalization: Process framework and case study. International Journal of Electronic Commerce, 19(3), 7–33. Klein, H.K., & Myers, M.D. (1999). A set of principles for conducting and evaluating interpretive field studies in information systems. MIS Quarterly, 67–93. Kwon, K., & Kim, C. (2012). How to design personalization in a context of customer retention: Who personalizes what and to what extent? Electronic Commerce Research and Applications, 11(2), 101–116. Lusch, R.F., & Vargo, S.L. (2014). Service-dominant logic: Premises, perspectives, possibilities, Cambridge University Press. Miles, M.B., & Huberman, A.M. (1994). Qualitative data analysis: A sourcebook. Beverly Hills: Sage Publications. Montgomery, A.L., & Smith, M.D. (2009). Prospects for Personalization on the Internet. Journal of Interactive Marketing, 23(2), 130–137. Sandelowski, M. (1995). Sample size in qualitative research. Research in nursing & health, 18(2), 179–183. Scollon, S.W. (2004). Nexus analysis: Discourse and the emerging internet Routledge. 756 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES (JUNE 18 – 21, 2017, BLED, SLOVENIA) O. Korhonen: Personalization in Digital Services: Information Technology Supporting Service Personalization Process Sunikka, A., & Bragge, J. (2012). Applying text-mining to personalization and customization research literature–Who, what and where? Expert Systems with Applications, 39(11), 10049– 10058. Sunikka, A., & Bragge, J. (2008). What, who and where: insights into personalization. In Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008). IEEE, p. 283. Vargo, S.L., & Lusch, R.F. (2004). Evolving to a new dominant logic for marketing. Journal of marketing, 68(1), 1–17. Vehmas, K., Ervasti, M., Tihinen, M., & Mensonen, A. (2015). Digitalization Boosting Novel Digital Services for Consumers. Advances in Computer Science: an International Journal, 4(4), 80–92. von Thiele Schwarz, U. (2016). Co-care: Producing better health outcome through interactions between patients, care providers and information and communication technology. Health Services Management Research, 29, 10–15.