Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/308900936

Enterprise Collaboration Systems: An Analysis and Classification of Adoption


Challenges

Conference Paper  in  Procedia Computer Science · October 2016


DOI: 10.1016/j.procs.2016.09.139

CITATION READS

1 318

2 authors:

Susan Patricia Williams Clara S. Greeven


Universität Koblenz-Landau Universität Koblenz-Landau
65 PUBLICATIONS   877 CITATIONS    2 PUBLICATIONS   3 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

CEIR - Enterprise Collaboration Systems (ECS) View project

All content following this page was uploaded by Susan Patricia Williams on 06 October 2016.

The user has requested enhancement of the downloaded file.


Available online at www.sciencedirect.com

ScienceDirect
Procedia Computer Science 100 (2016) 179 – 187

&RQIHUHQFHRQ(17(5SULVH,QIRUPDWLRQ6\VWHPV,QWHUQDWLRQDO&RQIHUHQFHRQ3URMHFW
0$1DJHPHQW&RQIHUHQFHRQ+HDOWKDQG6RFLDO&DUH,QIRUPDWLRQ6\VWHPVDQG7HFKQRORJLHV
&(17(5,63URM0$1+&LVW2FWREHU

(QWHUSULVHFROODERUDWLRQV\VWHPVDQDQDO\VLVDQGFODVVLILFDWLRQRI
DGRSWLRQFKDOOHQJHV
&ODUD6*UHHYHQ6XVDQ3:LOOLDPV 
Institute for Information Systems Research, Faculty of Informatics, University of Koblenz-Landau

$EVWUDFW

,QWKLVSDSHUZHSUHVHQWWKHILQGLQJVRIWKHILUVWSDUWRIDUHVHDUFKSURMHFWH[DPLQLQJWKHDGRSWLRQDSSURSULDWLRQDQGORQJWHUP
XVH RI HQWHUSULVH FROODERUDWLRQ V\VWHPV (&6  7KH DLP RI WKH VWXG\ LV WR LGHQWLI\ WKH FKDOOHQJHV WKDW RUJDQL]DWLRQV HQFRXQWHU
GXULQJ WKH LQWURGXFWLRQ DQG XVH RI DQ (&6 7KURXJK D PHWDDQDO\VLV DQG FODVVLILFDWLRQ RI WKH DFDGHPLF OLWHUDWXUH DQG
FRUURERUDWLQJFRPSDQ\LQWHUYLHZVILYHDGRSWLRQFKDOOHQJHDUHDVZHUHLGHQWLILHGculturebusiness/ operationtechnology in use
benefitsDQGattitude/ behavior7KHFKDOOHQJHVDQGWKHDVVRFLDWHGVXEFKDOOHQJHVDUHGHVFULEHGDQGWKHLUQDWXUHDQGLPSOLFDWLRQV
IRUERWKWKHRU\DQGSUDFWLFHDUHGLVFXVVHG
 
‹7KH$XWKRUV3XEOLVKHGE\(OVHYLHU%9
© 2016 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license
(http://creativecommons.org/licenses/by-nc-nd/4.0/).
3HHUUHYLHZXQGHUUHVSRQVLELOLW\RI6FL.$$VVRFLDWLRQIRU3URPRWLRQDQG'LVVHPLQDWLRQRI6FLHQWLILF.QRZOHGJH
Peer-review under responsibility of the organizing committee of CENTERIS 2016
Keywords:(QWHUSULVHVRFLDOVRIWZDUH (66 (QWHUSULVHFROODERUDWLRQV\VWHPV (&6 DGRSWLRQFKDOOHQJHV

,QWURGXFWLRQ

,Q WKLV SDSHU ZH H[DPLQH WKH FKDOOHQJHV WKDW RUJDQL]DWLRQV HQFRXQWHU GXULQJ WKH LQWURGXFWLRQ RI DQ HQWHUSULVH
FROODERUDWLRQV\VWHP (&6 (&6FRPELQH(QWHUSULVH6RFLDO6RIWZDUH (66 FRPSRQHQWV HJVRFLDOSURILOHVWDJV
ZLNLVEORJV ZLWKWUDGLWLRQDOJURXSZDUHFRPSRQHQWV HJHPDLOJURXSFDOHQGDUVGRFXPHQWOLEUDULHV WRVXSSRUW
VRFLDO EXVLQHVV DQG FRPPXQLFDWLRQ FROODERUDWLRQ FRQWHQW DQG NQRZOHGJH VKDULQJ ZLWKLQ RUJDQL]DWLRQV 7KHVH


&RUUHVSRQGLQJDXWKRU7HOID[
E-mail address:ZLOOLDPV#XQLNREOHQ]GH

1877-0509 © 2016 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license
(http://creativecommons.org/licenses/by-nc-nd/4.0/).
Peer-review under responsibility of the organizing committee of CENTERIS 2016
doi:10.1016/j.procs.2016.09.139
180 Clara S. Greeven and Susan P. Williams / Procedia Computer Science 100 (2016) 179 – 187

³VRFLDOO\HQDEOHG´FROODERUDWLRQV\VWHPVDUHJHQHUDWLQJFRQVLGHUDEOHLQWHUHVWIRUERWKUHVHDUFKHUVDQGSUDFWLWLRQHUV
KRZHYHU WKHUH DUH VWLOO XQFHUWDLQWLHV DERXW WKHLU VXFFHVVIXO DGRSWLRQ DQG DSSURSULDWLRQ 2QH RI WKH SUREOHPV LV
WKDWWKHERG\RIUHVHDUFKWKDWGLUHFWO\RULQGLUHFWO\H[DPLQHVWKHDGRSWLRQRI(&6LVFXUUHQWO\IUDJPHQWHGZLWKIHZ
LQGHSWK HPSLULFDO FDVHV 7KH VWXG\ SUHVHQWHG LQ WKLV SDSHU LVSDUW RI D ZLGHU PXOWLGLVFLSOLQDU\ UHVHDUFK SURJUDP
H[DPLQLQJFROODERUDWLRQV\VWHPVDQGWKHHPHUJLQJGLJLWDOZRUNSODFH7KHVWUHDPRIZRUNUHSRUWHGLQWKLVSDSHULV
GLUHFWHG WRZDUGV LQYHVWLJDWLQJ VRFLRWHFKQLFDO FKDQJH DQG WKH DGRSWLRQ DSSURSULDWLRQ DQG XVH RI (&6 7KH VWXG\
H[DPLQHV WKH FKDOOHQJHV WKDW FRPSDQLHV DUH IDFLQJGXULQJ WKH DGRSWLRQ RI (&6 DQG WKH VWUDWHJLHV DQG DSSURDFKHV
WKH\ WDNH WR DGGUHVVLQJ WKHVH FKDOOHQJHV ,Q WKLV SDSHU ZH SUHVHQW WKH ILQGLQJV RI WKH ILUVW VWDJH RI WKH ZRUN WKH
LGHQWLILFDWLRQ DQG FODVVLILFDWLRQ RI (&6 DGRSWLRQ FKDOOHQJHV 7KURXJK DQ LQGHSWK DQDO\VLV DQG V\QWKHVLV RI WKH
H[WDQWOLWHUDWXUHDQGWULDQJXODWLQJFRPSDQ\LQWHUYLHZVRXUUHVHDUFKREMHFWLYHVDUHWRL LGHQWLI\WKHFKDOOHQJHVWKDW
RUJDQL]DWLRQV H[SHULHQFH GXULQJ WKH SURFHVV RI (&6 LQWURGXFWLRQ DQG LL  WR FODVVLI\ WKH LGHQWLILHG FKDOOHQJHV DQG
XQGHUVWDQG WKHLU LPSOLFDWLRQV IRU (&6 DGRSWLRQ 7KH RXWFRPH LV DQ DQDO\VLV DQG FODVVLILFDWLRQ RI (&6 DGRSWLRQ
FKDOOHQJHV7KHSDSHULVRUJDQL]HGDVIROORZV,QWKHQH[WVHFWLRQZHSURYLGHDEULHIRYHUYLHZRIWKHUHVHDUFKGHVLJQ
DQGDQDO\VLVPHWKRGV7KLVLVIROORZHGE\WKHSUHVHQWDWLRQRIWKHGHULYHGFODVVLILFDWLRQDQGWKHGLVFXVVLRQRIWKH
ILQGLQJVDQGWKHLULPSOLFDWLRQVIRUIXWXUHZRUN

5HVHDUFKGHVLJQ

7KHVWXG\DGRSWVDQLWHUDWLYHLQWHUSUHWLYHDQGTXDOLWDWLYHUHVHDUFKDSSURDFKDQGXVHVDTXDOLWDWLYHPHWDDQDO\VLV
PHWKRG WR discover key challenges that companies face when introducing their enterprise collaboration systems
7ZRPDLQGDWDVRXUFHVDUHXVHGL WKHDFDGHPLFOLWHUDWXUHRQ(66(&6DQGLL FRPSDQ\LQWHUYLHZVWRWULDQJXODWH
WKHILQGLQJVGHULYHGIURPWKHOLWHUDWXUH7KHVWXG\LVRUJDQL]HGLQWRWKUHHSKDVHVDVVKRZQLQ)LJXUH

3KDVH 3KDVH 3KDVH


, QLWLDOLVDWLRQ 'DWD$QDO\VLV , QWHUSUHWDWLRQ
&RQWHQWDQDO\VLVRIDFDGHPLFOLWHUDWXUH 'DWDWULDQJXODWLRQ
,GHQWLI\LQJDQG $QDO\VLVRI
UHYLHZLQJDFDGHPLF FDWHJRULHVVXE
OLWHUDWXUHDQG &DWHJRULHV VXE FDWHJRULHVDQG
VHOHFWLQJLQGXVWU\ VWFRGLQJF\FOH QGFRGLQJF\FOH FDWHJRULHV VFHQDULR
PLQFDVHVLWHV 2SHQFRGLQJ  3DWWHUQFRGLQJ  WULDQJXODWHG GHYHORSPHQW
WKURXJKLQWHUYLHZV

)LJXUH5HVHDUFKVWHSV

Phase 1: Initialisation FRPSULVHV DQ H[WHQVLYH VHDUFK DQG DQDO\VLV RI WKH DFDGHPLF OLWHUDWXUH RQ HQWHUSULVH
FROODERUDWLRQV\VWHPV)ROORZLQJWKHDSSURDFKRI+XIIZHEHJLQZLWKDEURDGVHDUFKRIWKHWRSLFRI(&6ZLWKWKH
YLHZWKDWDGRSWLRQFKDOOHQJHVPD\EHHQFRXQWHUHGLQDOOW\SHVRIVWXG\QRWMXVWWKRVHIRFXVLQJVSHFLILFDOO\RQ(&6
DGRSWLRQ'DWDEDVHVLQFOXGLQJ6SULQJHU/LQN,(((;SORUH'LJLWDO/LEUDU\$&0'LJLWDO/LEUDU\(PHUDOG,QVLJKW
6FLHQFH'LUHFWDQG*RRJOH6FKRODUZHUHVHDUFKHGXVLQJFRPELQDWLRQVRIVHDUFKWHUPVVXFKDV³VRFLDOVRIWZDUH´³H
FROODERUDWLRQ´³ZHE´³HQWHUSULVH´³VRFLDOEXVLQHVV´³FROODERUDWLYHVRIWZDUH´³HQWHUSULVHVRFLDOVRIWZDUH´
³HQWHUSULVHFROODERUDWLRQV\VWHP´³DGRSWLRQ´HWFWRSURYLGHDFRUSXVRISULPDU\DUWLFOHV$VQRZEDOOWHFKQLTXHWR
OLWHUDWXUHVHDUFKLQJZDVWKHQDSSOLHGWRLGHQWLI\DGGLWLRQDOUHOHYDQWDUWLFOHVIURPWKHUHIHUHQFHOLVWVRIWKHSULPDU\
DUWLFOHV,QSDUDOOHOZLWKWKHOLWHUDWXUHVHDUFKFRPSDQ\PLQLFDVHVLWHVZHUHVHOHFWHGDQGLQWHUYLHZVDUUDQJHGIRUWKH
FROOHFWLRQRIWULDQJXODWLQJGDWD,WZDVDSUHUHTXLVLWHWKDWWKHVHOHFWHGFRPSDQLHVKDGLQWURGXFHGDQ(&6DQGZHUH
ZLOOLQJWRVSHDNRSHQO\DERXWWKHLUH[SHULHQFHVDQGWKHDGRSWLRQFKDOOHQJHVWKH\KDGH[SHULHQFHG
Phase 2: Data Analysis LV D TXDOLWDWLYH LQGHSWK OLWHUDWXUH DQDO\VLV WR LGHQWLI\ DQG FDWHJRUL]H (&6 DGRSWLRQ
FKDOOHQJHV7KLVSKDVHZDVRUJDQL]HGLQWKUHHVWHSVWZRF\FOHVRIOLWHUDWXUHDQDO\VLVDQGFRGLQJWRFODVVLI\WKH(&6
DGRSWLRQFKDOOHQJHVIROORZHGE\LQWHUYLHZVLQWKHWZRFDVHVWXG\FRPSDQLHVWRUHILQHWKHFODVVLILFDWLRQDQGFDSWXUH
DQ\DGGLWLRQDOFKDOOHQJHV
Clara S. Greeven and Susan P. Williams / Procedia Computer Science 100 (2016) 179 – 187 181

,QPhase 3: Interpretation and Explanation WKHLGHQWLILHGFKDOOHQJHVDUHWKHQGHVFULEHGLQGHWDLODQGH[HPSODU\


VFHQDULRVGHYHORSHGWRH[DPLQHHDFKFKDOOHQJHDQGWKHZLGHUWKHRUHWLFDODQGSUDFWLFDOLPSOLFDWLRQVDUHFRQVLGHUHG

'DWDDQDO\VLVDQGILQGLQJV

7KH DLP RI WKH ILUVW FRGLQJ F\FOH LV WR JHQHUDWH D SUHOLPLQDU\ FRGH WDEOH FRQWDLQLQJ WKH DGRSWLRQ FKDOOHQJHV
LGHQWLILHGIURPWKHOLWHUDWXUHDQDO\VLV(DFKDUWLFOHZDVUHDGDQDO\]HGDQGFRGHGXVLQJDQRSHQFRGLQJDSSURDFK
)ROORZLQJ VHYHUDO FRGLQJ LWHUDWLRQV WKH RXWFRPHV RI WKH ILUVW FRGLQJ F\FOH UHVXOWHG LQ D FRGH FDWDORJXH ZLWK 
GLVWLQFWLYHFRGHV%DVHGRQWKHVHRSHQFRGHVDVHFRQGFRGLQJF\FOHXVLQJSDWWHUQFRGLQJHVWDEOLVKHGPHDQLQJIXO
FDWHJRULHVDQGVXEFDWHJRULHVRIWKHLGHQWLILHGFKDOOHQJHV7RDFKLHYHWKLVVLPLODUFRGHVDUHDVVHPEOHGWRJHWKHUDQG
WKHPDWLFFRGHVGHYHORSHG:KHUHQHFHVVDU\FRGHVRIWKHILUVWFRGLQJF\FOHZHUHUHILQHG)LYHDGRSWLRQFKDOOHQJH
DUHDVZHUHLGHQWLILHGculturebusiness/ operationtechnology in usebenefitsDQGattitude/ behavior HDFKRIZKLFK
FRPSULVHVDJURXSRIFKDOOHQJHW\SHVDQGVXEW\SHVDVVKRZQLQLQ)LJXUH

)LJXUH&ODVVLILFDWLRQRI(&6DGRSWLRQFKDOOHQJHV
182 Clara S. Greeven and Susan P. Williams / Procedia Computer Science 100 (2016) 179 – 187

7RFRQILUPWKHFRGHVLGHQWLILHGIURPWKHOLWHUDWXUHDQDO\VLVDQGWRLGHQWLI\DGGLWLRQDOFRGHVVHPLVWUXFWXUHGIDFH
WRIDFHLQWHUYLHZVZHUHFRQGXFWHGZLWKSUDFWLWLRQHUVLQFOXGLQJWKH&(2DQGDNH\XVHULQWZRWHFKQRORJ\VWDUWXS
FRPSDQLHV 7KH FRGHV IURP WKH OLWHUDWXUH DQDO\VLV ZHUH FURVVUHIHUHQFHG ZLWK GDWD IURP WKH FRPSDQ\ LQWHUYLHZV
7KUHHDGGLWLRQDOFKDOOHQJHVZHUHLGHQWLILHGIURPWKHLQWHUYLHZWUDQVFULSWVWKDWZHUHQRWIRXQGLQSUHYLRXVVWXGLHV
WKHVH DUH Insufficient understanding of relevance Overload Growing complexity ,Q )LJXUH  WKH WKUHH QHZ
FKDOOHQJHFRGHVLGHQWLILHGIURPWKHLQWHUYLHZVDUHPDUNHGZLWKDQDVWHULVN ,QWKHIROORZLQJVHFWLRQVZHGLVFXVV
DQGSURYLGHH[DPSOHVIRUHDFKRIWKHILYHFKDOOHQJHDUHDVDQGWKHLUVXEW\SHV1RWHGXHWRSDJHOLPLWFRQVWUDLQWVZH
FDQQRWLQFOXGHUHIHUHQFHVIRUDOOWKHOLWHUDWXUHDQDO\]HGDQGSURYLGHRQO\NH\H[DPSOHUHIHUHQFHVLQ7DEOHV

3.1. Challenge area: Culture

7KHILUVWFKDOOHQJHDUHDLGHQWLILHGLVCulture7DEOHFRQWDLQVWKHGHVFULSWLRQVRIWKHFKDOOHQJHW\SHVDQGVXE
W\SHV LGHQWLILHG DQG DVVLJQHG WR WKLV FKDOOHQJH DUHD &XOWXUH FKDOOHQJHV DUH RUJDQL]DWLRQDO FKDOOHQJHV WKDW FDQ EH
WUDFHG EDFN WR WKH FRUSRUDWH FXOWXUH EHLQJ VKDSHG E\ PDQDJHPHQW EHKDYLRU DQG DWWLWXGHV DV ZHOO DV WKH FXOWXUDO
YDOXHVDQGQRUPVWKDWH[LVWZLWKLQWKHFRPSDQ\
7DEOH7\SHVDQGVXEW\SHVRIWKHFKDOOHQJHDUHDCulture
&XOWXUH
7\SHRIFKDOOHQJHDQGGHVFULSWLRQ 6XEW\SHRIFKDOOHQJHDQGGHVFULSWLRQ
Low acceptance
0DQDJHULDODVVXPSWLRQWKDWHPSOR\HHVPLVXVHWKH(&6$VDFRQVHTXHQFHDGRSWLRQ
Missing commitment from the DQGXVDJHPD\EHKLQGHUHGE\WKHODFNRIPDQDJHPHQWVXSSRUW 
executives
Low support:
0DQDJHUVGRQRWVXSSRUWWKH
7KHPDQDJHPHQWGRHVQRWSURSHUO\SURPRWHDQGHQFRXUDJHWKHHPSOR\HHVWRXVHWKH
V\VWHP¶VDGRSWLRQDQGXVDJHE\
(&6
HLWKHUQRWHQJDJLQJZLWK
HPSOR\HHVRUE\PLVWUXVWLQJWKHP Insufficient understanding of relevance 
$OWKRXJKWKH(&6KDVEHHQLQWURGXFHGWRPHHWFHUWDLQGHPDQGVWKHPDQDJHPHQW
DVFULEHVRQO\OLWWOHUHOHYDQFHWRLWVXVH

Values and norms impeding Ingrained processes:


change: ,IDV\VWHPKDGQRWDSSHDUHGDVSDUWRIWKHHQWHUSULVH¶VGDLO\ZRUNIORZEHIRUHLWPD\
7KHFRPSDQ\ XQZLWWLQJO\ VWLFNV EHGLIILFXOWIRUWKHFRPSDQ\WRUHPHPEHUFKDQJHV
WRROGZRUNSUDFWLFHVDQGLV Resistance to changes:
XQZLOOLQJWRFKDQJHDQGDGDSW /RZZLOOLQJQHVVWRHPEUDFHWKHV\VWHPLQGLVFXVVLRQGXHWRIHDURIFXOWXUDO
WKHP FKDQJH

7ZR GLIIHUHQW &XOWXUDO FKDOOHQJH W\SHV ZHUH LGHQWLILHG Missing commitment from the executives LV ZKHUH
PDQDJHUVGRQRWHQJDJHZLWKHPSOR\HHVRUPLVWUXVWVWKHPDQGWKXVGRQRWVXSSRUWWKHLUDGRSWLRQDQGXVDJHRIWKH
(&6 ,QVWDQFHV RI WKLV W\SH RI FKDOOHQJH DUH Low acceptance Low support DQG Insufficient understanding of
relevance7KHVHFRQGFKDOOHQJHZHLGHQWLILHGLVValues and norms impeding change,ZKLFKDGGUHVVHVGLIILFXOWLHVLQ
RYHUFRPLQJ LQJUDLQHG ZRUN SURFHVVHV DQG WKH UHVLVWDQFH WR FXOWXUDO FKDQJH ZKLFK PD\ EH LQLWLDWHG E\ WKH (&6
EHLQJ LQWURGXFHG 7KLV W\SH RI FKDOOHQJH KDV WZR DVVRFLDWHG VXEW\SHV Ingrained processes DQG Resistance to
changes

3.2. Challenge area: Business/ Operation

7KHVHFRQGDUHDRIFKDOOHQJHVLGHQWLILHGLVBusiness/ Operation.&KDOOHQJHVLQWKLVDUHDFDQEHDWWULEXWHGWRERWK
LQHIIHFWLYH DQG LQHIILFLHQW XVHV GXH WR RSHUDWLQJ ZLWKRXW FOHDU DQG VXLWDEOH VSHFLILFDWLRQVREMHFWLYHV UHJDUGLQJ WKH
(&6 SURMHFW DV ZHOO DV PLVVLQJ RU SRRU JHQHUDO ZRUN PDQDJHPHQW 7KLV FKDOOHQJH DUHD LQFOXGHV ILYH GLIIHUHQW
FKDOOHQJHW\SHVInappropriate project goalsLack of specific project goalsMissing alignment of structuresLack of
processes DQG Overload 7DEOH  VKRZV WKH GHVFULSWLRQV RI WKH FKDOOHQJH W\SHV DQG VXEW\SHV LGHQWLILHG DQG
DVVLJQHGWRWKLVFKDOOHQJHDUHD

Clara S. Greeven and Susan P. Williams / Procedia Computer Science 100 (2016) 179 – 187 183

7DEOH7\SHVRIWKHFKDOOHQJHDUHDBusiness/ Operation
%XVLQHVV2SHUDWLRQ
7\SHRIFKDOOHQJHDQGGHVFULSWLRQ
Inappropriate project goals
0LVDOLJQPHQWRISURMHFWJRDOVDQGHQWHUSULVHJRDOV
Lack of specific project goals
$ODFNRIVSHFLILFSURMHFWJRDOVPD\OHDGWRWKHDVVXPSWLRQWKDW(&6XVHGRHVQRWOHDGWRZDUGVIXOILOOLQJJRDOVDQGWKXV
SRVVLEO\WRORZPRWLYDWLRQ
Missing alignment of structures
2UJDQLVDWLRQDOKLHUDUFK\VWUXFWXUHDQGWKHVRFLDOVRIWZDUHDSSURDFKIRUPDSRRUPDWFK
Lack of processes
$ODFNRISURFHVVHVZKLFKPDSGDLO\ZRUNSUDFWLFHVWRWKHV\VWHP¶VFDSDELOLWLHVPD\PHDQWKDW(&6XVHDUHVHHQDV
DGGLWLRQDOEXUGHQ
Overload 
(PSOR\HHVPD\EHRYHUZKHOPHGZLWKZRUNIRUFLQJWKHPWRVHWSULRULWLHV7KH\PD\OLNHXVLQJWKH(&6EXWWKH\DUH
RWKHUZLVHHQJDJHGVRWKDWWKH\IRUJHWDERXWLWRUKDYHOLWWOHWLPHWROHDUQKRZWRXVHLW

3.3. Challenge area: Technology in use

&KDOOHQJHVRIWKHDUHDTechnology in useGHDOZLWKWKHKDQGOLQJDQGPDQDJHPHQWRIZRUNDQGZRUNLQJZLWKWKH
(&6 WHFKQRORJ\ LWVHOI 7KLV LQFOXGHV SHUVRQDO DGRSWLRQ KXUGOHV GXH WR IRU LQVWDQFH PLVVLQJ DZDUHQHVV DQG
NQRZOHGJH DERXW WKH QHZO\ LQWURGXFHG (&6 SRRU TXDQWLW\ TXDOLW\ DQG RUJDQL]DWLRQ RI WKH (&6 FRQWHQW DQG
LQIRUPDWLRQPDQDJHPHQWSURFHVVHVDVZHOODVSRRULQWHJUDWLRQRIWKH(&6LQWRWKH,7DQGZRUNHQYLURQPHQW7DEOH
VKRZVWKHGHVFULSWLRQVRIDOOFRGHVDVVLJQHGWRWKLVFKDOOHQJHDUHD

7DEOH7\SHVDQGVXEW\SHVRIWKHFKDOOHQJHDUHDTechnology in use
7HFKQRORJ\LQXVH
7\SHRIFKDOOHQJHDQGGHVFULSWLRQ 6XEW\SHRIFKDOOHQJHDQGGHVFULSWLRQ
Lack of activity
7KH(&6DQGLWVFRPSRQHQWVODFNDFWLYHHQJDJHPHQW$VDUHVXOWWKHFUHDWHGFRQWHQW
Ineffective content PD\QRWEHDFFHSWHGRUHYHQZRUVHWKHV\VWHPPD\QRWEHNHSWDOLYH 
/DFNRIDQDGHTXDWHDPRXQWRI
FRQWHQWDQGRUQRIUHTXHQWO\XSGDWHG Low quality:
FRQWHQWDVZHOODVFRQWHQWRIORZ &RQWHQWHGLWHGLQDZLOOIXOGHVWUXFWLYHPDQQHUWRLQFOXGHLUUHOHYDQWLQIRUPDWLRQ
UHOHYDQFHLPSHGLQJ(&6XVDJH YDQGDOLVP RUFRQWHQWWKDWLVVXEMHFWWRLPPHQVHXQFRQWUROOHGJURZWK$VDUHVXOW
WKHFRQWHQWPD\QRWEHUHXVHGDGGYDOXHRUHPSOR\HHVPD\HQFRXQWHUSUREOHPVLQ
WHUPVRIQDYLJDWLRQRULHQWDWLRQDQGVHDUFK
Uncertainties about social software usage:
(PSOR\HHVZKRDOUHDG\XVHVLPLODUVRFLDOVRIWZDUHWRROVGXULQJOHLVXUHWLPHPD\EH
Low competence: XQVXUHDERXWKRZWRXVHWKHPLQDFRUSRUDWHFRQWH[W
0LVVLQJVNLOOVWRXVHWKH(&6 Low ECS skills, knowledge, and experiences:
0HQWDORYHUORDGRIWKHXVDJHRIWKH(&6GXHWRPLVVLQJ,7VNLOOVNQRZOHGJHDQG
H[SHULHQFHV
System inefficiencies: Poor management of multiple tool/system usage
/RZDZDUHQHVVDERXWWKHV\VWHP¶V ,IDFRPSDQ\PDNHVXVHRIDVHWRIGLIIHUHQWVRFLDOVRIWZDUHWRROVDQGRUV\VWHPV
H[LVWHQFHDQGGLIILFXOWLHVWRFRSHZLWK HPSOR\HHVZLOOSRVVLEO\EHXQFHUWDLQDERXWZKHQWRXVHZKLFKWRRORUV\VWHPIRU
DQXPEHURIGLIIHUHQWWRROVDQG ZKLFKSXUSRVHV
V\VWHPVDVZHOODVWKHJURZLQJ Low awareness about the system’s existence:
DPRXQWRIFRQWHQW (PSOR\HHVGRQRWNQRZDERXWWKHH[LVWHQFHRIWKH(&67KLVPD\EHGXHWRPLVVLQJ
FRPPXQLFDWLRQDQGPDUNHWLQJDFWLYLWLHV
Growing complexity :
:LWKWKHJURZLQJQXPEHURIXVHUVDQGGDWDVWRUHGLQWKH(&6WKHV\VWHP¶V
FRPSOH[LW\LQFUHDVHVZKLFKEULQJVLQFUHDVLQJO\GLIILFXOWFRRUGLQDWLRQDQGGHFUHDVLQJ
184 Clara S. Greeven and Susan P. Williams / Procedia Computer Science 100 (2016) 179 – 187

FOHDUQHVVDERXWLQFRUSRUDWHGFRQWHQWDQGSURFHVVHV
Misuse of time and computing
resources:
(PSOR\HHVVSHQGLQJWRRPXFKWLPH
XVLQJWKH(&6DQGWKXVPLVXVLQJ
FRPSXWLQJUHVRXUFHV


)RXUGLIIHUHQWFKDOOHQJHW\SHVZHUHDVVLJQHGWRWKLVFKDOOHQJHDUHD7KHILUVWGHDOVZLWKSRRUFRQWHQWTXDQWLW\DQG
TXDOLW\ ZKLFK PD\ OHDG WR ORZ DFFHSWDQFH RI WKH (&6 DQGRUTXHVWLRQDEOH XVHIXOQHVV RI WKH (&6 DQG LWV FRQWHQW
Ineffective content 'XHWRGLIIHUHQWGLUHFWFRQVHTXHQFHVWKLVFKDOOHQJHW\SHLVVSOLWXSLQWRWZRVXEW\SHVLack of
activityDQGLow quality
7KHVHFRQGW\SHRIWKLVFKDOOHQJHDUHDGHVFULEHVPLVVLQJFRPSHWHQFHLQXVLQJWKH(&6 Low competence 7KLV
PLVVLQJ FRPSHWHQFH FDQ KDYH GLIIHUHQW PDQLIHVWDWLRQV LQ WKH WZR VXEFKDOOHQJHV LGHQWLILHG Uncertainties about
social software usageDQGLow ECS skills, knowledge, and experience
7KHWKLUGW\SHRIFKDOOHQJHDGGUHVVHVSUREOHPVWKDWFDQEHWUDFHGEDFNWRWKHLQFUHDVLQJFRPSOH[LW\RIWKH(&6DQG
WKH SRRU FRPPXQLFDWLRQ RI DQG DGKHUHQFH WR D GHILQHG SRVLWLRQ RQ WKH UROH RI WKH (&6 ZLWKLQ WKH HVWDEOLVKHG
FRUSRUDWH ,7 HQYLURQPHQW System inefficiencies  6XEFKDOOHQJHV DVVLJQHG WR WKLV FKDOOHQJH W\SH DUH Poor
management of multiple tool/system usageLow awareness about the system’s existenceDQGGrowing complexity
7KHIRXUWKDQGODVWFKDOOHQJHW\SHRIWKLVDUHDLVMisuse of time and computing resources

3.4. Challenge area: Benefits

&KDOOHQJHV RI WKLV DUHD DGGUHVV WKH TXHVWLRQDEOH EHQHILWV RI XVLQJ DQ (&6 ZLWK SHUFHLYHG GLVDGYDQWDJHV
RXWZHLJKLQJ WKH SHUFHLYHG DGYDQWDJHV RI LW 7DEOH  VKRZV WKH FRGHV DQG GHVFULSWLRQV DVVLJQHG WR WKH %HQHILWV
FKDOOHQJH DUHD )RXU GLIIHUHQW FKDOOHQJH W\SHV ZHUH LGHQWLILHG IRU WKLV FKDOOHQJH DUHD 7KH ILUVW GHDOV ZLWK WKH
SHUFHSWLRQRIWKHGLVSURSRUWLRQDOO\KLJKZRUNORDGUHTXLUHGIRUXVLQJWKH(&6 Perceived costs 7KLVFKDOOHQJHW\SH
LVVSOLWXSLQWRWKHWKUHHVXEFKDOOHQJHVHigh time exposureHigh effortDQGProductivity killer
7KH VHFRQG W\SH HQFRPSDVVHV WKH FKDOOHQJHV Privacy concerns DQG Poor anonymity 7KHVH FKDOOHQJHV KDYH LQ
FRPPRQWKDWHPSOR\HHVDUHODFNLQJPHFKDQLVPVWRSURWHFWWKHLUSHUVRQDOLQIRUPDWLRQDQGRUDJDLQVWSHUVRQDOKDUP
Perceived lack of protection  7KH W\SHV Sense of missing rewards DQG Sense of loss of power DUH WZR IXUWKHU
FKDOOHQJHW\SHVRIWKLVDUHD
7DEOH7\SHVDQGVXEW\SHVRIWKHFKDOOHQJHDUHDBenefits
%HQHILWV
7\SHRIFKDOOHQJHDQGGHVFULSWLRQ 6XEW\SHRIFKDOOHQJHDQGGHVFULSWLRQ
High time exposure:
7KHLQGLYLGXDOSHUFHSWLRQWKDWXVLQJWKH(&6LVWRRWLPHFRQVXPLQJ
Perceived costs High effort:
1RWUHFRJQL]LQJWKHEXVLQHVVYDOXH 7KHLQGLYLGXDOSHUFHSWLRQWKDWXVLQJWKH(&6UHTXLUHVDORWSHUVRQDOLQLWLDWLYH
EXWIRFXVLQJRQWKHZRUNORDG Productivity killer:
7KHLQGLYLGXDOSHUFHSWLRQWKDWWKHXVDJHRIWKH(&6GHFUHDVHVWKHRYHUDOO
SURGXFWLYLW\
Perceived lack of protection Privacy concerns:
3HUFHSWLRQWKDWXVLQJWKH(&6 (PSOR\HHVPD\EHUHOXFWDQWWRFRQWULEXWHDQGVKDUHFRQWHQWZLWKLQWKH(&6GXHWR
ODFNVSURWHFWLRQRIWKHSHUVRQDO VHQVLWLYLWLHVWRWKHRSHQQHVVRIWKHVKDULQJHQYLURQPHQW7KH\PD\EHXQZLOOLQJWR
SULYDF\DQGVHQVLWLYHLQIRUPDWLRQ SXEOLVKFRQWHQWLQDFRQWH[WSRVVLEO\EHLQJYLHZHGE\DZLGHUDXGLHQFHRIWKH
FRPSDQ\
Poor anonymity
$QRQ\PRXVFRQWHQWFUHDWLRQDQGHGLWLQJPD\EHSURKLELWHGZLWKLQWKH(&67KH
ODFNRIDQRQ\PLW\PD\UHVXOWLQFRQFHUQVUHJDUGLQJWKHKDUPRIRQHVHOIWKH
FRPSDQ\RUMXULVGLFWLRQ
Sense of missing rewards
$VFRQWHQWFDQXVXDOO\EHHQ
Clara S. Greeven and Susan P. Williams / Procedia Computer Science 100 (2016) 179 – 187 185

ZULWWHQRUHGLWHGE\DQ\ERG\
HPSOR\HHVPD\VHQVHDPLVVLQJ
UHFRJQLWLRQRIWKHLUDXWKRUVKLS
Sense of loss of power
6KDULQJRQH¶VRZQNQRZOHGJH
ZLWKLQWKH(&6PD\EHHYDOXDWHG
DVDODWHQWORVVRILQIOXHQFH

3.5. Challenge area: Attitude/ Behavior

,Q FRQWUDVW WR WKH FKDOOHQJH DUHD Culture WKH FKDOOHQJH DUHD Attitude/ Behavior DGGUHVVHV LQGLYLGXDO DQG QRW
RUJDQL]DWLRQDO OHYHO FKDOOHQJHV (PSOR\HHV PD\ VKRZ LQIOH[LELOLW\ UHJDUGLQJ WKH XVH RI D QHZ V\VWHP PD\ QRW
SURSHUO\FROODERUDWHZLWKLQWKHV\VWHPIRUYDULRXVLQGLYLGXDOFKDUDFWHULVWLFVDQGDWWLWXGHVRUJLYHRQO\OLWWOHSULRULW\
WR(&6XVH7DEOHVKRZVWKHGHVFULSWLRQVRIDOOFRGHVDVVLJQHGWRWKLVFKDOOHQJHDUHD7KUHHGLIIHUHQWFKDOOHQJH
W\SHVRIFKDOOHQJHVZHUHDVVLJQHGWRWKLVFKDOOHQJHDUHD7KHILUVWFKDOOHQJHW\SHRIWKLVDUHDLVDYRLGDQFHRI(&6
XVHDVDOWHUQDWLYHV\VWHPVRUZRUNSURFHGXUHVQRWLQFOXGLQJWKH(&6DUHSUHIHUUHG Inflexibility 7KHFKDOOHQJHVWKDW
FDQEHFODVVHGZLWKWKLVW\SHDUHReliance on other systemsDQGReluctance to learn another system
7DEOH7\SHVDQGVXEW\SHVRIWKHFKDOOHQJHDUHDAttitude/ Behavior
$WWLWXGH%HKDYLRU
7\SHRIFKDOOHQJHDQGGHVFULSWLRQ 6XEW\SHRIFKDOOHQJHDQGGHVFULSWLRQ
Reliance on other systems
Inflexibility (YHQLIDQHZV\VWHPLHWKH(&6PD\ILOODJDSHPSOR\HHVPD\UHO\RQRWKHU
7KHXQZLOOLQJQHVVWROHDUQ(&6 V\VWHPVSRVVLEO\HYHQRQQRQVRFLDOEXVLQHVVVRIWZDUHGXHWRURXWLQHZRUN
XVHDQGWKHUHOLDQFHRQRWKHU SUDFWLFHVRUSULYDF\FRQFHUQVIRULQVWDQFH 
V\VWHPVGXHWRURXWLQHZRUN
SUDFWLFHVOD]LQHVVRUWKHSHUFHLYHG Reluctance to learn another system:
ODFNRIEHQHILWVRIWKH(&6 (PSOR\HHVGRQRWZDQWWROHDUQDQRWKHUV\VWHPLHWKH(&67KLVPD\EHMXVWLILHG
E\DODFNRIWLPHRUWKHGHVLUHWRGRVR
Reluctance to modify other’s content
8QZLOOLQJQHVVWRHGLWDGGVRPHWKLQJWRVRPHRQHHOVH¶VFRQWHQW

Ineffective collaboration Low self-confidence


processes: (PSOR\HHVPD\ODFNVHOIFRQILGHQFHUHVXOWLQJLQHLWKHUQRWFRQWULEXWLQJRUWKH
7KHFROODERUDWLRQSURFHVVZLWKLQ KHVLWDWLRQWRDFWLYHO\DVNRWKHUVIRUFRQWULEXWLRQV
WKH(&6LVFRPSOLFDWHGE\ Avoidance of other’s content and knowledge
LQGLYLGXDOEDUULHUVWRDSSURSULDWH 2WKHUHPSOR\HHV¶FRQWHQWLVDYRLGHG,WLVUDWKHUUHFUHDWHGLQVWHDGRIUHXVHG7KLV
DQGXVHRWKHU¶VFRQWHQWDQGWR EHKDYLRUPD\EHH[SODLQHGE\WKHIHDURIWKHXQNQRZQRUWKHRYHUHVWLPDWLRQRI
FRQWULEXWH SHUVRQDOFDSDELOLWLHV 1RW,QYHQWHG+HUHV\QGURPH 
Employees underperforming
(PSOR\HHVPD\EHWHPSWHGWRXQGHUSHUIRUPLQFROODERUDWLYHVLWXDWLRQVGXHWR
KDUGO\PHDVXUDEOHRXWSXWRIWKHLQGLYLGXDOFRQWULEXWLRQ IUHHULGHUHIIHFW 
Little priority of FROODERUDWLRQ
(PSOR\HHV¶SHUFHSWLRQWKDWXVLQJ 
WKHV\VWHPLVQRWSDUWRIWKHLUSDLG
ZRUN


$QRWKHU W\SH RI FKDOOHQJH RI WKLV FKDOOHQJH DUHD IRFXVHV RQ SHUVRQDO KXUGOHV LQ HIIHFWLYHO\ DSSURSULDWLQJ DQG
DFWLYHO\ XVLQJ WKH (&6 Ineffective collaboration processes  7KHVH KXUGOHV PD\ EH SURYRNHG E\ WKH UHMHFWLRQ RI
RQH¶VRZQRUDQRWKHU¶VFRQWULEXWLRQDVZHOODVE\WKHRSHQQDWXUHRIWKHFROODERUDWLRQWHFKQRORJ\7KHFKDOOHQJHV
Reluctance to modify other’s content Low self-confidence Avoidance of other’s content and knowledge DQG
Employees underperformingZHUHDVVLJQHGWRWKLVFKDOOHQJHW\SH7KHODVWFKDOOHQJHW\SHRIWKLVFKDOOHQJHDUHDLV
Little priority of collaborationZKHUHHPSOR\HHVGRQRWVHHXVLQJWKH(&6DVSDUWRIWKHLUQRUPDOZRUN
186 Clara S. Greeven and Susan P. Williams / Procedia Computer Science 100 (2016) 179 – 187

7KHRFFXUUHQFHRIWKHLGHQWLILHGFKDOOHQJHVLVOLNHO\WREHKLJKO\FRQWH[WGHSHQGHQW+RZHYHUERWKFDVHVWXG\
FRPSDQLHVUDWHGWKHFKDOOHQJHV³/DFNRIVSHFLILFSURMHFWJRDOV´³/DFNRIDFWLYLW\´³/RZTXDOLW\´³/RZVXSSRUW´
DQG³+LJKHIIRUW´DVKLJKO\VHULRXV

&RQFOXVLRQVDQGIXWXUHZRUN

7KH DGRSWLRQ DQG DSSURSULDWLRQ RI HQWHUSULVH FROODERUDWLRQ V\VWHPV LV SUHVHQWLQJ RUJDQL]DWLRQV ZLWK D UDQJH RI
FKDOOHQJHV ,Q WKLV VWXG\ EDVHG RQ D UHYLHZ RI WKH H[WDQW OLWHUDWXUH DQG FRQILUPLQJ LQWHUYLHZV ZH FODVVLILHG WKHVH
FKDOOHQJHV LQWR ILYH DUHDV &XOWXUH %XVLQHVV 2SHUDWLRQV 7HFKQRORJ\ LQ 8VH %HQHILWV DQG $WWLWXGH %HKDYLRU
:KLOVWPDQ\RIWKHFKDOOHQJHVVXFKDVORZPDQDJHPHQWFRPPLWPHQWDQGXVHUV¶UHVLVWDQFHWRFKDQJHPD\DULVHZLWK
WKHLQWURGXFWLRQRIDQ\QHZEXVLQHVVLQIRUPDWLRQV\VWHPWKHUHDUHRWKHUFKDOOHQJHVWKDWDUHVSHFLILFDOO\SUREOHPDWLF
ZLWK(&6)RUH[DPSOHLQHIIHFWLYHFRQWHQWLQWKH(&6LVDPDMRUSUREOHPWKURXJKlack of activityZKLFKUHVXOWVLQ
QRW HQRXJK XVHDEOH FRQWHQW RU ZKHUH FRQWHQW H[LVWV LW LV RI low quality PDNLQJ WKH V\VWHP LQHIIHFWLYH DQG
XQGHVLUDEOH WR HPSOR\HHV 3RRU SURFHVVHV DQG VWUXFWXUHV LPSHGLQJ DGRSWLRQ LV HVSHFLDOO\ QRWLFHDEOH ZLWK (&6
HPSOR\HHV XVXDOO\ KDYH PDQ\ DOWHUQDWLYHV WR WKH QHZ V\VWHP HJ HPDLO SUHYLRXV JHQHUDWLRQV RI JURXSZDUH HWF 
UHTXLULQJ FOHDUO\ GHPRQVWUDEOH EHQHILWV IURP WKHLU DGRSWLRQ RI WKH QHZ V\VWHP 'LHKO HW DO   IRXQG WKDW
FRPSDQLHVLQWKHLUVWXG\RI(&6DGRSWLRQKDGRQO\UHDOLVHGH[SRVWWKDWWKH\KDGEHHQVLWXDWHGLQDFXOWXUDOFKDQJH
VFHQDULRZLWKWKHLU(&6LPSOHPHQWDWLRQ:LWKWUDQVDFWLRQDOV\VWHPVVXFKDV(53V\VWHPVDGRSWLRQLVDOPRVWDOZD\V
PDQGDWRU\ ZKHUHDV XVH RI DQ (&6 LV YHU\ RIWHQ YROXQWDU\ ,I FOHDU REMHFWLYHV VWUXFWXUHV DQG WUDLQLQJ DUH QRW
DYDLODEOH WKHQ XVHUV KDYH WKH RSWLRQ WR QRW XVH WKH (&6 PDNLQJ WKH FKDQJH PDQDJHPHQW SURFHVV HYHQ PRUH
HVVHQWLDO
$VVWDWHGDWWKHRXWVHWWKLVVWXG\LVSDUWRIDZLGHUUHVHDUFKSURJUDPH[DPLQLQJ(&6DQGVRFLRWHFKQLFDOFKDQJH
7KURXJKWKHGHYHORSPHQWRIWKHDGRSWLRQFKDOOHQJHVFODVVLILFDWLRQZHDOVRLGHQWLILHGWKDWVXFKFKDOOHQJHVDSSHDUDW
GLIIHUHQW VWDJHV LQ WKH DGRSWLRQ SURFHVV DQG WR GLIIHUHQW VWDNHKROGHU JURXSV 7KLV VSDWLRWHPSRUDO DVSHFW RI (&6
DGRSWLRQLVWKHVXEMHFWRIRXUVHFRQGVWXG\FRPELQHGZLWKDQH[DPLQDWLRQRIWKHVWUDWHJLHVWKDWFRPSDQLHVXVHWR
DGGUHVV (&6 DGRSWLRQ FKDOOHQJHV $ OLPLWDWLRQ RI WKH H[LVWLQJ OLWHUDWXUH RQ (&6 DGRSWLRQ LV WKDW WKH PDMRULW\ RI
VWXGLHV DUH FURVVVHFWLRQDO FRQGXFWHG DW D VLQJOH SRLQW LQ WLPH 7R JDLQ ULFKHU LQVLJKWV LQWR WKH DGRSWLRQ DQG
DSSURSULDWLRQ RI (&6 UHTXLUHV LQGHSWK ORQJLWXGLQDO FDVH VWXGLHV WKDW IROORZ WKH HQWLUH DGRSWLRQ SURFHVV IURP WKH
GHFLVLRQWRDGRSWWKURXJKWRWKHSRVWLPSOHPHQWDWLRQFKDQJHSKDVH

5HIHUHQFHV

6FKXEHUW3:LOOLDPV637KH&RQFHSWRI6RFLDO%XVLQHVV2[\PRURQRU6LJQRID&KDQJLQJ:RUN&XOWXUH"WK%OHGH&RQIHUHQFH-XQH
%OHG6ORYHQLD
/HRQDUGL30+X\VPDQ06WHLQILHOG&(QWHUSULVH6RFLDO0HGLD'HILQLWLRQ+LVWRU\DQG3URVSHFWVIRUWKH6WXG\RI6RFLDO7HFKQRORJLHVLQ
2UJDQL]DWLRQV-&RPSXW0HGLDW&RPPXQ  ±
$QGULROH6-%XVLQHVV,PSDFWRI:HE7HFKQRORJLHV&RPPXQ$&0  ±
5DHWK38UEDFK16PROQLN6%XWOHU%.|QLJV37KH$GRSWLRQRI:HELQ&RUSRUDWLRQV$3URFHVV3HUVSHFWLYH$0&,6
6FKQHFNHQEHUJ':HEDQGWKHHPSRZHUPHQWRIWKHNQRZOHGJHZRUNHU´-.QRZO0DQDJ  ±
:LOOLDPV636FKXEHUW36RFLDO%XVLQHVV5HDGLQHVV6XUYH\&(,55HVHDUFK5HSRUW
6FKXEHUW3:LOOLDPV637KH&DVHRI8QL&RQQHFW±7KH6KDSLQJRIDQ$FDGHPLF&ROODERUDWLRQ3ODWIRUP0XOWLNRQIHUHQ]
:LUWVFKDIWVLQIRUPDWLN 0.:, 
+XII$Designing research for publication/RQGRQ6$*(3XEOLFDWLRQV
6DOGDxD-The Coding Manual for Qualitative Researchers/RQGRQ6$*(
0LOHV0%+XEHUPDQ$0. Qualitative Data Analysis – An Expanded Sourcebook7KRXVDQG2DNV6DJH3XEOLFDWLRQV
$OTDKWDQL):DWVRQ-3DWULGJH+2UJDQL]DWLRQDOVXSSRUWDQG(QWHUSULVH:HEDGRSWLRQDTXDOLWDWLYHVWXG\Proceedings of the twentieth
Americas Conference on Information Systems (AMCIS 2014)6DYDQQDK*HRUJLD86$
+HLQHPDQQ).DW]XQJ$6FKU|GHU+5HFRPPHQGDWLRQVIRUWKH2SHUDWLRQRI:LNLVDVSDUWRI.QRZOHGJH0DQDJHPHQW6ROXWLRQVXVLQJWKH
([DPSOHRI$LUEXVInformation Management and Consulting  
1HGEDO'$XLQJHU$+RFKPHLHU$$GGUHVVLQJ7UDQVSDUHQF\&RPPXQLFDWLRQDQG3DUWLFLSDWLRQLQ(QWHUSULVH3URMHFWVProcedia
Technology
7XUEDQ(/LDQJ73:X63-$)UDPHZRUNIRU$GRSWLQJ&ROODERUDWLRQ7RROVIRU9LUWXDO*URXS'HFLVLRQ0DNLQJGroup Decis Negot
  
7ULPL6*DODQ[KL+7KHLPSDFWRI(QWHUSULVHLQRUJDQL]DWLRQVService Business  
Clara S. Greeven and Susan P. Williams / Procedia Computer Science 100 (2016) 179 – 187 187

+ROW]EODWW/-'DPLDQRV/(:HLVV')DFWRUV,PSHGLQJ:LNL8VHLQWKH(QWHUSULVH$&DVH6WXG\Proceedings of the 28th ACM Conference


on Human Factors in Computing Systems
6WLHJOLW]6'DQJ;XDQ/$GRSWLRQDQG8VHRI&RUSRUDWH:LNLVLQ*HUPDQ6PDOODQG0HGLXPVL]HG(QWHUSULVHVAMCIS 2011 Proceedings
$OO6XEPLVVLRQVSDSHU
'LHKO5.XHWWQHU76FKXEHUW3,QWURGXFWLRQRI(QWHUSULVH&ROODERUDWLRQ6\VWHPV,QGHSWK6WXGLHV6KRZ7KDW/DLVVH]IDLUH'RHV1RW
:RUNProceedings of the 26th Bled Conference
6FRWW-+HVWHU$2UJDQL]DWLRQDO:LNL8VDJH$&RQFHSWXDO0RGHOICIS 2007 Proceedings3DSHU
%HDQ/+RWW':LNL$VSHHG\QHZWRROWRPDQDJHSURMHFWVJournal of corporate accounting & finance  
+DVDQ+3IDII&7KH:LNLDQHQYLURQPHQWWRUHYROXWLRQLVHHPSOR\HHV¶LQWHUDFWLRQZLWKFRUSRUDWHNQRZOHGJHProceedings of the 18th
Australia conference on Computer-Human Interaction: Design: Activities, Artefacts and Environments
&DUERQH)&RQWUHUDV-+HUQiGH]-(QWHUSULVHDQG6HPDQWLF7HFKQRORJLHVIRU2SHQ,QQRYDWLRQ6XSSRUWProceedings of the 23rd
international conference on industrial engineering and other applications of applied intelligent systems - Volume Part IIS
'tD]23XHQWH*:LNL6FDIIROGLQJ$OLJQLQJZLNLVZLWKWKHFRUSRUDWHVWUDWHJ\Information Systems  
+DSSHO+-7UHLW]03UROLIHUDWLRQLQ(QWHUSULVH:LNLVProceedings of the 8th International Conference on the Design of Cooperative
Systems
=HLOOHU06FKDXHU%$GRSWLRQ0RWLYDWLRQDQG6XFFHVV)DFWRUVRI6RFLDO0HGLDIRU7HDP&ROODERUDWLRQLQ60(VProceedings of the 11th
International Conference on Knowledge Management and Knowledge Technologies
6WRFNHU$5LFKWHU$+RHIOHU37RFKWHUPDQQ.([SORULQJ$SSURSULDWLRQRI(QWHUSULVH:LNLV$0XOWLSOH&DVH6WXG\Computer Supported
Cooperative Work (CSCW)  
.RSORZLW]5%XLOGLQJDFROODERUDWLRQVWUDWHJ\KM World  
'LHKO56FKXEHUW3'HU:HJ]XU6RFLDO6RIWZDUH/|VXQJIU8QWHUQHKPHQ%HGUIQLVDQDO\VHIUNROODERUDWLYH7HFKQRORJLHQ
Multikonferenz Wirtschaftsinformatik 2012
.RFK0&6&:DQG(QWHUSULVHWRZDUGVDQLQWHJUDWHGSHUVSHFWLYHProceedings of the Bled eCommerce Conference 2008%OHG
%ODFNZHOO-6KHULGDQ.,QVWRQH.6FKZDUW]'5.RJDQ6'HVLJQDQG$GRSWLRQRI6RFLDO&ROODERUDWLRQ6RIWZDUHZLWKLQ%XVLQHVVHVCHI
EA '09 CHI '09 Extended Abstracts on Human Factors in Computing Systems
.XHWWQHU7'LHKO56FKXEHUW3&KDQJHIDFWRUVLQ(QWHUSULVHLQLWLDWLYHV&DQZHOHDUQIURP(53"Electronic Markets  

'DQLV&6LQJHU'$:LNL,QVWDQFHLQWKH(QWHUSULVH2SSRUWXQLWLHV&RQFHUQVDQG5HDOLW\Proceedings of the ACM 2008 Conference on
Computer Supported Cooperative Work


View publication stats

You might also like