• Nebyly nalezeny žádné výsledky

Limitations and future research

As mentioned in the various studies, these were mainly carried out with Swiss companies.

The survey to review data governance can only be conducted with companies that have im­

plemented data governance at all. The implementation and also the understanding of what is meant by it is interpreted differently from company to company. Even though this has been

6.3 Limitations and future research | 101 taken into account in the definition of the questionnaire, it cannot be ruled out that it could lead to an error in the data collection.

The studies in the dissertation project tried to take different perspectives. However, cross­

industry comparisons would also lead to wrong conclusions and would therefore be explicitly dispensed with. Due to the topic, it was very difficult to determine which companies had persons who could answer the questionnaire at all. As a result, only 75 completed surveys were returned. As a result, the quantitative study tends to have too few data records for data analysis. However, the results were so clear that it cannot be assumed that the picture would change significantly with a larger amount of data.

The studies confirmed that data and decisions understood here as a personal experience ultimately lead to a change or formation of a mental model of decision making. The investi­

gations on shared domains of Eom et al. (2015) could be confirmed in many conversations.

It is therefore not only the forming of know­how but also a decision culture. Since a suf­

ficient data quality cannot be recognized at all by the decision maker, he will rely on his mental model also in the future. These models have a increasing leverage, the deeper they are founded on beliefs and values (Sweeney & Meadows, 2010, p. 243). This means that as the number of new data increases, the level of inconsistency will tend to increase and decision making will increasingly be limited to one’s own mental model.

It is in the nature of man to choose the model that is simpler for him. However, there is a great risk involved by choosing just one approach orfall back to a mental model. A com­

pany’s environment is not becoming easier. Only the one who can adapt agilely and quickly will survive. Problems are not becoming simpler but remain solvable. Speed becomes the game changer. Problems are not easily and quickly recognizable in their complexity and ways to solutions must be developed ever faster. Digital artefacts and social behaviour must be taken into account. Behind a data­driven organization, therefore neither soft nor hard facts must be neglected. Cao (2017) speaks of X­complexities. Data management is a small com­

ponent for the development of complex problem solving systems. And there is still a gap between reality and science. While reality is the complexity in daily life and in the beginning of the thesis discussed exponential development of data after. The in Cao (2016, fig. 2, p. 70) discussedcritical development gaps between data potential and state­of­the­art capabilities are by far not closed yet.

It is an essential part of research to combine models from different disciplines. This is an important part of this research in order to gain new insights. Since data play such an important role in the new business models, one cannot avoid linking management models to them. All research developments that override the interdisciplinary combination of models can be regarded as dangerous because they avoid the real problem in which only a part of the research is considered that cannot provide the solution on its own. At the same time, the research should provide models that have already been tested in practice as abstract solutions.

This should be done through explorative or quantitative research. The DSR approach applied in this dissertation is recommended for this research direction.

List of studies

Partial results of the present work have been elaborated, presented and published as follows:

A The Role of IT Governance in Digital Operating Models

Presented in a former version at the following conference:

1stInternational Conference on Management in the Digital Era (MDE), Prague, Octo­

ber 27–28, 2017.

Published in an adapted version:

Hitz, C. and Schwer, K. (2018), “The role of IT governance in digital operating mod­

els”,Journal of Eastern European and Central Asian Research (JEECAR), Vol. 5 No. 2, pp. 61–79.

B IT­Budgeting Processes in Swiss Banks and How They Are Influ­

enced by Rapidly Changing Regulatory Requirements

Presented in a former version at the following conference:

31st International Business Information Management Association Conference (IBIMA), Milan, April 25–26, 2018.

Published in a former version:

Hitz, C., Krey, M. Albath, M., Wyss, R. and Thoma, P. (2018), “Budgeting Processes for IT­Projects in Swiss Banks Readiness to react to fast changing Market Conditions”, Proceedings of the 31stIBIMA Conference, Milan.

Published in an adapted version:

Hitz, C., Krey, M. Albath, M., Wyss, R. and Thoma, P. (2018), “IT­Budgeting Pro­

cesses in Swiss Banks and How They Are Influenced by Rapidly Changing Regulatory Requirements”,Journal of EU Research in Business (JEURB), Vol. 2018 (2018).

C Principles of Data Definition for the Use of Measuring Governance

Presented in former versions at the following conferences:

10th & 11th International Conferences on New Challenges in Management and Busi­

ness, Dubai, March 23rd, 2018.

7th International Conference Innovation Management, Entrepreneurship and Sustain­

ability (IMES 2019), Prague, May 30–31, 2019.

Published in an abstract version:

Hitz, C., Vojvodic, M. and Basl, J. (2018), “Designing for consistency of evaluation in enterprise governance of IT (EGIT)”,Proceedings of the 10th & 11th International Conferences on New Challenges in Management and Business, Dubai.

Published in proceeding:

Hitz, C., Vojvodic, M. and Wicki, G. (2019), “Principles of Data Definition for the Use of Measuring Governance”,Proceedings of the 7th International Conference Innova­

tion Management, Entrepreneurship and Sustainability (IMES 2019), Prague, pp. 265–

278.

D Other publications

Published in journals:

Schwer, K. and Hitz, C. (2018), “Designing Organizational Structure In The Age Of Digitization”, Journal of Eastern European and Central Asian Research (JEECAR), Vol. 5 No. 1, pp. 1–11.

Schwer, K., Hitz, C., Wyss, R., Wirz, D. and Minonne, C. (2018), “Digital maturity variables and their impact on the enterprise architecture layers”,In Problems and Per­

spectives in Management, Vol. 16 No. 4, pp. 141–154.

Vojvodic, M. and Hitz, C. (2018), “European Industries Customer Centricity Roadmap Stage – Business Process Management Aspect”,Acta Oeconomica Pragensia, Vol. 26 No. 3, 47–69.

Vojvodic, M. and Hitz, C. (2019), “Governance Team Leadership and User Participa­

tion ­ Organizational Practice for Innovative Customer Engagement in Data Compli­

ance Project”,Central European Business Review (CEBR), Vol. 8 No. 2, 15–45.

Published as abstract in proceeding:

Schwer, K. and Hitz, C. (2018), “Variables of the Digital Maturity of Enterprises and the Impact to the Levels of Enterprise Architectures”, Proceedings of the 10th & 11th International Conferences on New Challenges in Management and Business, Istanbul.

List of studies | 105

Published in proceeding:

Vojvodic, M. and Hitz, C. (2018), “Application of Business Process Management (BPM) Tools in European Commercial Sectors as a Measure of Current Maturity of Customer­Centric Model”, Proceedings of the 14th International Strategic Manage­

ment Conference (ISMC), Prague.

Published in non­reviewed journals:

Hitz, C. (2017), “Paradigmenwechsel im Monitoring des IT­Operations­Management”, Netzwoche, Vol. 17/2017, pp. 47.

Hitz, C. (2018), “Wie die Sourcing­Strategie Agilität im Gesundheitswesen schafft”, Netzwoche, Vol. 17/2018, pp. 57.

About

Christian Hitz, lic.oec.inform. HSG

Curriculum Vitae: Christian Hitz is the lead lecturer in business intelligence at the Zurich University of Applied Sciences (ZHAW). He is also the head of the IT Strategy and Man­

agement office at the institute of business information technology. He works in analytics, data warehousing, business intelligence and data science since 1994. Christian Hitz holds a Master’s Degree of the University of St. Gallen (HSG) in Information Management and started his PhD Program at the University of Economics in Prague (VŠE) in 2015.

References

Ali, S., & Green, P. (2012). Effective information technology (IT) governance mechanisms:

An IT outsourcing perspective. Information Systems Frontiers,14(2), 179–193.

Apel, D., Behme, W., Eberlein, R., & Merighi, C. (2015).Datenqualität erfolgreich steuern:

Praxislösungen für Business­Intelligence­Projekte(3., überarb. und erw. Aufl.). Hei­

delberg: dpunkt.verl.

Appel, S., Frischbier, S., Freudenreich, T., & Buchmann, A. (2013). Event Stream Processing Units in Business Processes. In F. Daniel, J. Wang, & B. Weber (Eds.), Business Process Management (pp. 187–202). Berlin, Heidelberg: Springer Berlin Heidelberg.

Arazy, O., Daxenberger, J., Lifshitz­Assaf, H., Nov, O., & Gurevych, I. (2016). Turbu­

lent Stability of Emergent Roles: The Dualistic Nature of Self­Organizing Knowledge Coproduction. Information Systems Research,27, 792–812.

Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., … Zaharia, M.

(2010). A View of Cloud Computing. Commun. ACM,53(4), 50–58.

Asprion, P., & Knolmayer, G. F. (2009). Compliance und ERP­Systeme: Eine bivalente Beziehung. Controlling & Management,53(S3), 40–47.

AXELOS. (2019). From v3 to 4 – This Is the New ITIL. Retrieved from https://www.axelos.

com/news/blogs/february­2019/from­v3­to­4­this­is­the­new­itil

Baets, W. (1992). Aligning information systems with business strategy. The Journal of Strategic Information Systems,1(4), 205–213.

Banker, Hu, Pavlou, & Luftman. (2011). CIO Reporting Structure, Strategic Positioning, and Firm Performance. Mis Quarterly,35(2), 487.

Batini, C., Cappiello, C., Francalanci, C., & Maurino, A. (2009). Methodologies for Data Quality Assessment and Improvement. ACM Comput. Surv.,41(3), 16:1–16:52.

Bauer, A., & Günzel, H. (2013). Data­Warehouse­Systeme: Architektur, Entwicklung, An­

wendung(4. überarb. und erw. Aufl.). Heidelberg: dpunkt.verlag.

Baumöl, U., & Meschke, M. (2009). Das Management von Datenqualität. Controlling &

Management,53(1), 62–65.

Benner, K. (2016). Airbnb Sues Over New Law Regulating New York Rentals. The New York Times: Technology.

Benz, A., Lütz, S., Schimank, U., & Simonis, G. (Eds.). (2007). Handbuch Governance:

Theoretische Grundlagen und empirische Anwendungsfelder(1. Aufl.).

Bier, C. (2015). Data Provenance. Datenschutz und Datensicherheit ­ DuD, 39(11), 741–

746.

Böhlen, M. H., Gamper, J., Jensen, C. S., & Snodgrass, R. T. (2018). SQL­Based Temporal Query Languages. InEncyclopedia of Database Systems, Second Edition.

Bradley, J., Loucks, J., Macaulay, J., Medcalf, R., & Buckalew, L. (2012). BYOD: A global perspective, harnessing employee­led innovation. Retrieved from https://www.cisco.

com/c/dam/en_us/about/ac79/docs/re/BYOD_Horizons­Global.pdf

Bridges, W. (1991). Managing Transitions: Making The Most Of Change. Hachette Books.

Brown, A. E., & Grant, G. G. (2005). Framing the frameworks: A review of IT governance research. Communications of the Association for Information Systems,15(1), 38.

Buchta, D., Eul, M., & Schulte­Croonenberg, H. (2010). Strategic IT Management: Increase value, control performance, reduce costs(3rd edition).

Bundesamt für Gesundheit. (2016). Kennzahlen der Schweizer Spitäler 2016. Retrieved from https://www.bag.admin.ch/bag/de/home/zahlen­und­statistiken/zahlen­fakten­

zu­spitaelern/kennzahlen­der­schweizer­spitaeler.html

Cao, L. (2016). Data Science: Nature and Pitfalls. IEEE Intelligent Systems,31, 66–75.

Cao, L. (2017). Data Science: Challenges and Directions. Commun. ACM,60(8), 59–68.

CBInsights. (2019). The Complete List of Unicorn Companies. Retrieved from http : / / instapage.cbinsights.com/research­unicorn­companies

Chan, Y. E., & Reich, B. H. (2007). IT Alignment: What Have We Learned? Journal of Information Technology,22(4), 297–315.

Chen, F., Deng, P., Wan, J., Zhang, D., Vasilakos, A. V., & Rong, X. (2015). Data Mining for the Internet of Things: Literature Review and Challenges. International Journal of Distributed Sensor Networks,11(8), 431047.

Cidon, A. (2015). The only way to control BYOD is to embrace it. Health management technology,36(4), 12–13.

Cooper, H. M. (1988). Organizing knowledge syntheses: A taxonomy of literature reviews.

Knowledge in Society,1(1), 104–126.

Dasilva, D., Liu, L., Bessis, N., & Zhan, Y. (2012). Enabling Green IT through Building a Virtual Desktop Infrastructure. In2012 Eighth International Conference on Semantics, Knowledge and Grids (pp. 32–38). IEEE.

Davenport, T. H., Barth, P. F. P., & Bean, R. (2012). How ’Big Data’ is different. (pp. 22–24).

MIT Sloan Management Review.

References | 111 de Haes, S., & van Grembergen, W. (2009a). Enterprise Governance of Information Tech­

nology: Achieving Strategic Alignment and Value(1. Ed.).

de Haes, S., & van Grembergen, W. (2009b). An Exploratory Study into IT Governance Implementations and its Impact on Business/IT Alignment. Information Systems Man­

agement,26(2), 123–137.

de Haes, S., & van Grembergen, W. (2015).Enterprise Governance of Information Technol­

ogy : Achieving Alignment and Value, Featuring COBIT 5(2. ed.).

Deelman, E., Berriman, B., Chervenak, A., Corcho, O., Groth, P., & Moreau, L. (2009).

Metadata and Provenance Management. In A. Shoshani & D. Rotem (Eds.), Scientific Data Management: Challenges, Technology, and Deployment (pp. 433–467).

Denning, P. J., & Lewis, T. G. (2016). Exponential Laws of Computing Growth. Commun.

ACM,60(1), 54–65.

Dobie, G. (2016). Allianz Global Corporate & Specialty SE: Allianz Risk Barometer–Die 10 größten Geschäftsrisiken 2016. Retrieved from https://www.agcs.allianz.com/news­

and­insights/news/allianz­risk­barometer­2016.html

Eidgenössischer Datenschutz­ und Öffentlichkeitsbeauftragter. (2013). Bring Your Own Device (BYOD). Retrieved from https : / / www . edoeb . admin . ch / edoeb / de / home / datenschutz/arbeitsbereich/bring­your­own­device­­byod­.html

Eidgenössischer Datenschutz­ und Öffentlichkeitsbeauftragter EDÖB. (2002). Leitfaden für die Bearbeitung von Personendaten im medizinischen Bereich. Retrieved from https://www.edoeb.admin.ch/edoeb/de/home/datenschutz/dokumentation/leitfaeden/

bearbeitung­von­personendaten­im­medizinischen­bereich.html

English, L. P. (1999).Improving data warehouse and business information quality: Methods for reducing costs and increasing profits. New York, NY: John Wiley & Sons.

Eom, M., Kahai, S., & Yayla, A. (2015). Investigation of How IT Leadership Impacts IT­

Business Alignment through Shared Domain Knowledge and Knowledge Integration.

Americas Conference on Information Systems Proceedings, Human Capital in Infor­

mation Systems (SIGLead).

Eulerich, M., Lohmann, C., Haustein, S., & Tunger, D. (2014). Die Entwicklung der be­

triebswirtschaftlichen Corporate Governance­Forschung im deutschsprachigen Raum

— Eine State of the Art­Analyse auf der Basis bibliometrischer Daten.Schmalenbachs Zeitschrift für betriebswirtschaftliche Forschung,66(7), 567–600.

Ezrachi, A., & Stucke, M. E. (2016). Virtual Competition.Journal of European Competition Law & Practice,7(9), 585–586.

Faulds, M., Bauchmuller, K., Miller, D., Rosser, J., Shuker, K., Wrench, I., … Wadsworth, R., et al. (2016). The feasibility of using ‘bring your own device’(BYOD) technology for electronic data capture in multicentre medical audit and research. Anaesthesia,71(1), 58–66.

Federal Act on Data Protection (FADP). (1992). 235.1, The Federal Assembly of the Swiss Confederation.

Federal Office for Information Security (BSI). (2007). IT Security Guidelines. Retrieved from https://www.bsi.bund.de/DE/Themen/ITGrundschutz/ITGrundschutzDownloads/

itgrundschutzDownloads_node.html

Fink, A. (2013). Conducting research literature reviews: From the internet to paper(4. Ed.).

Los Angeles: SAGE Publications.

Fink, K., & Ploder, C. (2008). Decision Support Framework for the Implementation of IT­

Governance. InProceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008) (pp. 432–432).

Fisher, J. M. (2012). John Fisher’s Personal Transition Curve ­ The Stages. Retrieved from https://www.businessballs.com/freepdfmaterials/fisher­transition­curve­2012bb.pdf Foltz, P. W., Kintsch, W., & Landauer, T. K. (1998). The measurement of textual coherence

with latent semantic analysis. Discourse processes,25(2­3), 285–307.

Forrester, J. W. (1971). Counterintuitive behavior of social systems. Theory and Decision, 2(2), 109–140.

Fredericksen, A. R. (2014). Mobile Device Policies for Healthcare Organizations (Doctoral dissertation, The College of St. Scholastica).

Froehlich, A. (2017). WLAN Architecture: Cloud­Managed Vs. On­Premises. Retrieved from https://www.networkcomputing.com/cloud­ infrastructure/wlan­ architecture­

cloud­managed­vs­premises/656949372

Fröhlich, M., & Glasner, K. (2007, April 25). IT Governance ­ Leitfaden für eine praxis­

gerechte Implementierung(1.).

Galanis, L., Wang, Y., Jeffery, S. R., & DeWitt, D. J. (2003). Locating Data Sources in Large Distributed Systems. In Proceedings of the 29th International Conference on Very Large Data Bases ­ Volume 29 (pp. 874–885). Berlin, Germany: VLDB Endowment.

Gantz, S. D. (2014).The Basics of IT Audit: Purposes, Processes, and Practical Information.

Waltham, MA: Syngress.

Gartner Group. (2015). Top 10 Strategic Technology Trends for 2016. Retrieved from https://www.gartner.com/en/newsroom/press­releases/2015­10­06­gartner­identifies­

the­top­10­strategic­technology­trends­for­2016

Garvin, D. A. (1988). Managing quality: The strategic and competitive edge. New York, NY: Free Press.

Gebauer, M., & Windheuser, U. (2015). Strukturierte Datenanalyse, Profiling und Geschäft­

sregeln. In K. Hildebrand, M. Gebauer, H. Hinrichs, & M. Mielke (Eds.), Daten­ und Informationsqualität: Auf dem Weg zur Information Excellence (pp. 87–100).

References | 113 Ghosh, D. (2013). SOFT and HARD Deleted Records and Change Data Capture in Data Warehouse. Retrieved from http : / / www . disoln . org / 2013 / 12 / SOFT ­ and ­ HARD ­ Deleted­Records­and­Change­Data­Capture­in­Data­Warehouse.html

Glavic, B. (2014). Big Data Provenance: Challenges and Implications for Benchmarking.

In D. Hutchison, T. Kanade, J. Kittler, J. M. Kleinberg, F. Mattern, J. C. Mitchell, … H.­A. Jacobsen (Eds.), Specifying Big Data Benchmarks (Vol. 8163, pp. 72–80).

Goltsche, W. (2006). COBIT kompakt und verständlich(1.).

Goodrich, K., & de Mooij, M. (2014). How ‘social’ are social media? A cross­cultural comparison of online and offline purchase decision influences. Journal of Marketing Communications,20(1­2), 103–116.

Götz, B., Köhntopp, F., Mayer, B., & Wagner, G. (2008). Einsatz einer ganzheitlichen GRC­

Softwarelösung. HMD Praxis der Wirtschaftsinformatik,45(5), 89–98.

Grosser, T. (2013). Data Governance ­ Daten effizienter nutzen. Retrieved from https : //www.sas.com/de_ch/whitepapers/ba­wp­barc­data­governance­2267466.html Grosser, T. (2016a). Wege zur Data Governance ­ Teil 1. Retrieved from http://barc.de/

Artikel/wege­zur­data­governance­teil­1

Grosser, T. (2016b). Wege zur Data Governance ­ Teil 3. Retrieved from http://barc.de/

Artikel/wege­zur­data­governance­teil­3

Gruber, T. R. (1995). Toward principles for the design of ontologies used for knowledge sharing? International Journal of Human­Computer Studies,43(5­6), 907–928.

Hamari, J., Sjöklint, M., & Ukkonen, A. (2016). The sharing economy: Why people partici­

pate in collaborative consumption. Journal of the Association for Information Science and Technology,67(9), 2047–2059.

Hanschke, I. (2010). Strategic IT management: A toolkit for enterprise architecture man­

agement.

Helfert, M., Herrmann, C., & Strauch, B. (2001). Datenqualitätsmanagement. St. Gallen:

Institut für Wirtschaftsinformatik, Universität St. Gallen.

Hevner, A. R. (2007). A three cycle view of design science research. Scandinavian journal of information systems,19(2), 4.

Hevner, A. R., March, S. T., Park, J., & Ram, S. (2004). Design science in information systems research. Management Information Systems Quarterly,28(1), 75–105.

Hilbert, M., & López, P. (2011). The World’s Technological Capacity to Store, Communicate, and Compute Information. Science,332(6025), 60–65.

Hildebrand, K., Gebauer, M., Hinrichs, H., & Mielke, M. (2015). Daten­ und Information­

squalität: Auf dem Weg zur Information Excellence(3., erw. Aufl.).

Hitz, C., Krey, M., Albath, M., Wyss, R., & Thoma, P. (2018). IT­Budgeting Processes in Swiss Banks and How They Are Influenced by Rapidly Changing Regulatory Require­

ments. Journal of EU research in business,2018(785563).

Hitz, C., & Schwer, K. (2018). The role of IT governance in digital operating models.Journal of Eastern European and Central Asian Research (JEECAR),5(2), 61–79.

Hitz, C., Vojvodic, M., & Wicki, G. (2019). Principles of Data Definition for the Use of Measuring Governance. In O. Dvouletý, M. Lukeš, & J. Mísař (Eds.), Innovation Management, Entrepreneurship and Sustainability (IMES 2019) [Proceedings of the 7th international conference], May 30–31, 2019 (pp. 265–278). Department of En­

trepreneurship, Faculty of Business Administration. Prague: University of Economics.

Hoedl, R. (2010). Enterprise Governance of IT zur Prävention von Wirtschaftskriminalitäts­

Delikten, dargestellt an einem Betrugsfall: Normative und strategische Führungsaspekte (Master Thesis, Hochschule Luzern, Luzern).

IDG Connect. (2014). Threat, Violation and Consumerization Impact. Retrieved from http://resources.forescout.com/ ForeScout Technologies ­ State of IT Cyber Defense Maturity Report.

Iguer, H., Medromi, H., Sayouti, A., & Tallal, S. (2016). Including EAS­SGR IT Risk Framework in an IT GRC Global Framework. In E. Sabir, H. Medromi, & M. Sadik (Eds.), Advances in Ubiquitous Networking (Vol. 366, pp. 525–533).

ISACA. (2012).COBIT 5: Rahmenwerk für Governance und Management der Unternehmens­

IT. Rolling Meadows, IL: ISACA.

ISACA. (2019). COBIT 2019. Retrieved from http://www.isaca.org/cobit/pages/default.aspx ISO. (2015). ISO 9000:2015(en) Quality management systems — Fundamentals and vocab­

ulary. Retrieved from https://www.iso.org/obp/ui/#iso:std:iso:9000:ed­4:v1:en

ISO/IEC. (2014). ISO/IEC TR 38502:2014(en) Information technology — Governance of IT — Framework and model. Retrieved from https://www.iso.org/obp/ui/#iso:std:iso­

iec:tr:38502:ed­1:v1:en

IT Governance Institute. (2007). COBIT 4.1: Framework, Control Objectives, Management Guidelines, Maturity Models. Rolling Meadows, IL: IT Governance Institute.

Jäschke, T., Thiel, C., & Wickinghoff, D. V. (2015). mHealth im Kontext des elektronischen Patientendossiers. Studie im Auftrag von eHealth Suisse.

Jifa, G., & Lingling, Z. (2014). Data, DIKW, Big Data and Data Science.Procedia Computer Science,31, 814–821. 2nd International Conference on Information Technology and Quantitative Management, ITQM 2014.

Johanning, V. (2014, November 27). IT­Strategie: Optimale Ausrichtung der IT an das Business in 7 Schritten(1.).

Johannsen, W., & Goeken, M. (2006). IT­Governance ­ neue Aufgaben des IT­Managements.

HMD Praxis der Wirtschaftsinformatik,43(250), 7–20.

References | 115 Johnston, T. (2014). Bitemporal Data: Theory and Practice. Waltham, MA: Morgan Kauf­

mann.

Jonker, J., & Pennink, B. (2010). The Essence of Research Methodology: A Concise Guide for Master and PhD Students in Management Science.

Joshi, A., Bollen, L., Hassink, H., Haes, S. D., & Grembergen, W. V. (2018). Explaining IT governance disclosure through the constructs of IT governance maturity and IT strategic role. Information & Management,55(3), 368–380.

Kagermann, H. (2017). Chancen von Industrie 4.0 nutzen. In B. Vogel­Heuser, T. Bauern­

hansl, & M. ten Hompel (Eds.), Handbuch Industrie 4.0 Bd.4: Allgemeine Grundlagen (pp. 237–248).

Kagermann, H., Österle, H., & Jordan, J. M. (2011).IT­driven business models: Global case studies in transformation. Hoboken, NJ: John Wiley & Sons.

Kamiske, G. F., & Brauer, J. (2011). Qualitätsmanagement von A bis Z: Erläuterungen moderner Begriffe des Qualitätsmanagements(7., aktualisierte und erw. Aufl.).

Kehoe, B., Patil, S., Abbeel, P., & Goldberg, K. (2015). A Survey of Research on Cloud Robotics and Automation. IEEE Transactions on Automation Science and Engineer­

ing,12(2), 398–409.

Keyes, J. (2014). BYOD for Healthcare. New York, NY: Auerbach Publications.

Kneuper, R. (2015). Messung und Bewertung von Prozessqualität – Ein Baustein der Gov­

ernance. HMD Praxis der Wirtschaftsinformatik,52(2), 301–311.

Koeffer, S., Ortbach, K., & Niehaves, B. (2014). Exploring the Relationship between IT Consumerization and Job Performance: A Theoretical Framework for Future Research.

Communications of the Association for Information Systems,35, 14.

Kotter, J. P. (2011). Leading change: Wie Sie Ihr Unternehmen in acht Schritten erfolgreich verändern. München: Vahlen.

Krey, M. (2018). A framework for the adoption of bring your own device (BYOD) in the hospital environment. The GSTF Journal on Computing,6(1), 77–88.

Lee, J. S., Pries­Heje, J., & Baskerville, R. (2011). Theorizing in Design Science Research.

In H. Jain, A. P. Sinha, & P. Vitharana (Eds.),Service­Oriented Perspectives in Design Science Research (pp. 1–16). Berlin, Heidelberg: Springer Berlin Heidelberg.

Lee, Y. W. (2006). Journey to data quality. Cambridge, Mass: MIT press.

Lewin, K. (1947). Frontiers in Group Dynamics [Concept, method and reality in social science; social equilibria and social change]. Human Relations,1(1), 5–41.

Likert, R. (1932). A technique for measurement of attitudes. In R. S. Woodworth (Ed.), Archives of Psychology (pp. 5–55). New York, NY: The Science Press.

Liu, L., & Özsu, M. T. (Eds.). (2009). Encyclopedia of Database Systems.

Lohr, S. (2012). The Age of Big Data. The New York Times, SR1.

Louis, A., & Nenkova, A. (2012). A Coherence Model Based on Syntactic Patterns. In Proceedings of the 2012 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning (pp. 1157–1168). Jeju Island, Korea: Association for Computational Linguistics.

Lu, C., Saifullah, A., Li, B., Sha, M., Gonzalez, H., Gunatilaka, D., … Chen, Y. (2016).

Real­Time Wireless Sensor­Actuator Networks for Industrial Cyber­Physical Systems.

Proceedings of the IEEE,104(5), 1013–1024.

Lubke, G. H., & Muthén, B. O. (2004). Applying Multigroup Confirmatory Factor Models for Continuous Outcomes to Likert Scale Data Complicates Meaningful Group Com­

parisons.Structural Equation Modeling: A Multidisciplinary Journal,11(4), 514–534.

Makimoto, T., & Manners, D. (1997). Digital nomad. New York, NY: John Wiley & Sons.

Maletic, J. I., & Marcus, A. (2000). Data Cleansing: Beyond Integrity Analysis. In Iq (pp. 200–209). Citeseer.

Mangiapane, M., & Büchler, R. P. (2015). Modernes IT­Management: Methodische Kombi­

nation von IT­Strategie und IT­Reifegradmodell.

Markides, C. (2006). Disruptive Innovation: In Need of Better Theory*. Journal of Product Innovation Management,23(1), 19–25.

Marshall, S. (2014). IT consumerization: A case study of BYOD in a healthcare setting.

Technology Innovation Management Review,4(3).

Maryska, M., Doucek, P., & Nedomova, L. (2015). Corporate Informatics and Strategic Management. Procedia Economics and Finance,26, 651–656.

Mayer, N., Barafort, B., Picard, M., & Cortina, S. (2015). An ISO Compliant and Integrated Model for IT GRC (Governance, Risk Management and Compliance). InEuropean Conference on Software Process Improvement (pp. 87–99).

McAfee, A., Brynjolfsson, E., Davenport, T. H., Patil, D. J., & Barton, D. (2012). Big data:

the management revolution. Harvard business review,90(10), 60–68.

Meijer, M., Smalley, M., Taylor, S., & Dunwoodie, C. (2011). ITIL® and BiSL®: Sound guidance for business­IT alignment from a business perspective.

Mladenow, A., Bauer, C., & Strauss, C. (2014). Social Crowd Integration in New Product Development: Crowdsourcing Communities Nourish the Open Innovation Paradigm.

Global Journal of Flexible Systems Management,15(1), 77–86.

Moore, G. E. (1965). Cramming more components onto integrated circuits. Electronics, 38(8).

Morbey, G. (2011). Datenqualität für Entscheider in Unternehmen.

Moyer, J. E. (2013). Managing Mobile Devices in Hospitals: A Literature Review of BYOD Policies and Usage. Journal of Hospital Librarianship,13(3), 197–208.

References | 117 Naumann, F. (2007). Datenqualität. Informatik­Spektrum,30(1), 27–31.

Ogie, R. (2016). Bring Your Own Device: An overview of risk assessment.IEEE Consumer Electronics Magazine,5(1), 114–119.

Ortiz­Ospina, E. (2019). The Rise of Social Media. Retrieved from https://www.ourworldindata.

org/rise­of­social­media

Orton, J. D., & Weick, K. E. (1990). Loosely Coupled Systems: A Reconceptualization.

Academy of Management Review,15(2), 203–223.

Österle, H., & Otto, B. (2010). Consortium Research. Business & Information Systems Engineering,2(5), 283–293.

Otremba, S. (2016). GRC­Management als interdisziplinäre Corporate Governance: Die Integration von Revision, Risiko­ und Compliance­Management in Unternehmen(Dis­

sertation, Universität Hohenheim, Hohenheim).

Otto, B., Kokemüller, J., Weisbecker, A., & Gizanis, D. (2011). Stammdatenmanagement:

Datenqualität für Geschäftsprozesse. HMD Praxis der Wirtschaftsinformatik, 48(3), 5–16.

Otto, B., & Österle, H. (2016). Corporate Data Quality : Voraussetzung erfolgreicher Geschäftsmodelle.

Ouchi, W. G. (1979). A Conceptual Framework for the Design of Organizational Control Mechanisms. Management Science,25(9), 833–848.

Ozsoyoglu, G., & Snodgrass, R. T. (1995). Temporal and real­time databases: A survey.

IEEE Transactions on Knowledge and Data Engineering,7(4), 513–532.

Palfrey, J. G., & Gasser, U. (2008). Born Digital: Understanding the First Generation of Digital Natives. New York, NY: Basic Books.

Peffers, K., Tuunanen, T., Rothenberger, M. A., & Chatterjee, S. (2007). A Design Science Research Methodology for Information Systems Research. Journal of Management Information Systems,24(3), 45–77.

Peppard, J., Edwards, C., & Lambert, R. (2011). Clarifying the ambiguous role of the CIO.

MIS Quarterly Executive,10(1), 31–44.

Perroud, T., & Inversini, R. (2013). Enterprise Architecture Patterns: Practical Solutions for Recurring IT­Architecture Problems.

Pescher, J. (2009). Change­Management: Taxonomie und Erfolgsauswirkungen (Doctoral dissertation, TU Darmstadt).

Philippon, T. (2016).The FinTech Opportunity(Working Paper No. 22476). National Bureau of Economic Research.

Piro, A., & Gebauer, M. (2015). Definition von Datenarten zur konsistenten Kommunikation im Unternehmen. In K. Hildebrand, M. Gebauer, H. Hinrichs, & M. Mielke (Eds.), Daten­ und Informationsqualität (pp. 141–154).

Potůček Martin, Veselý, A., & Nekola, M. (2004). Understanding Governance: Theory, Measurement and Practice: Measurement of Governance. CESES Papers, (5).

Prensky, M. (2001). Digital Natives, Digital Immigrants Part 1. On the Horizon,9(5), 1–6.

Pring, B., Davis, E., & Boland, V. (2019). 21 More Jobs of the Future: A Guide to Getting and Staying Employed through 2029. Cognizant Technology, Center for the Future of Work, Teaneck, NJ, USA.

Provost, F., & Fawcett, T. (2013). Data Science and its Relationship to Big Data and Data­

Driven Decision Making. Big Data,1(1), 51–59. PMID: 27447038.

Pugliese, L., Woodriff, M., Crowley, O., Lam, V., Sohn, J., & Bradley, S. (2016). Feasibility of the “Bring Your Own Device” Model in Clinical Research: Results from a Randomized Controlled Pilot Study of a Mobile Patient Engagement Tool. Cureus,8(3).

Queiroz, M., Tallon, P. P., Sharma, R., & Coltman, T. (2018). The role of IT application orchestration capability in improving agility and performance.The Journal of Strategic Information Systems,27(1), 4–21.

Racz, N. [N.], Panitz, J. C., Amberg, M., & Seufert, A. (Eds.). (2010). Governance, Risk

& Compliance (GRC) Status Quo and Software Use: Results From a Survey Among Large Enterprises, Brisbane, Australia: Proceedings of the 21st Australasian Confer­

ence on Information Systems (ACIS).

Racz, N. [Nicolas], Weippl, E., & Seufert, A. (2010). A Frame of Reference for Re­

search of Integrated Governance, Risk and Compliance (GRC). In B. De Decker &

I. Schaumüller­Bichl (Eds.), Communications and Multimedia Security (pp. 106–

117). Berlin, Heidelberg: Springer Berlin Heidelberg.

Reder, B. (2013). Private Smartphones ­ Ja gerne, aber bitte mit VPN. Retrieved from http://vpnhaus.ncp­e.com/de/2013/private­smartphones­ja­gerne­aber­bitte­mit­vpn/

Robertson, B. (2016). Holacracy : ein revolutionäres Management­System für eine volatile Welt. München: Verlag Franz Vahlen.

Rohweder, J. P., Kasten, G., Malzahn, D., Piro, A., & Schmid, J. (2015). Informationsqualität – Definitionen, Dimensionen und Begriffe. In K. Hildebrand, M. Gebauer, H. Hinrichs,

& M. Mielke (Eds.), Daten­ und Informationsqualität: Auf dem Weg zur Information Excellence (pp. 25–46).

Ruoss, S. (2015). Digital Switzerland 2015 (abstract) (Master’s thesis, Hochschule für Wirtschaft Zürich HWZ).

Rust, R., & Kannan, P. K. (2003). E­service: A new paradigm for business in the electronic environment. Communications of the ACM,46, 37–42.

Savor, T., Douglas, M., Gentili, M., Williams, L., Beck, K., & Stumm, M. (2016). Continu­

ous Deployment at Facebook and OANDA. InProceedings of the 38th International Conference on Software Engineering Companion (pp. 21–30).