Papers by Rudy Hirschheim

With the advances in internet technologies and the emergence of crowdsourcing, organizations are ... more With the advances in internet technologies and the emergence of crowdsourcing, organizations are now increasingly looking outside their boundaries for solving problems. Yet, the success of crowdsourcing processes depends on the sustained participation of crowdsourcing individuals. Previous studies have mainly focused on understanding individuals’ initial motivation for participation with few focusing on the factors that affect individuals’ sustained participation in crowdsourcing contests. None of these studies examined how collaboration affects individuals’ participation behavior in crowdsourcing contests. This study attempts to understand how individuals’ collaboration (in the form of comments and votes) affects their sustained participation in online problem solving contests. This study uses data from the Kaggle website that holds online data science competitions in which individuals submit their proposed solutions with the best solutions being rewarded. Our results show that ind...

The acceptance of Bitcoin as an electronic currency is steadily on the rise. This implies there i... more The acceptance of Bitcoin as an electronic currency is steadily on the rise. This implies there is a surge in the diffusion and adoption of the blockchain technology introduced by Bitcoin as well. Moreover, the potential of this novel disruptive technology has been acknowledged by academic researchers and practitioners alike. IS research has shown that trust is a significant antecedent enabling the adoption of a novel technology and attenuating the apprehensions of risk and uncertainty among consumers. Trust in a technology is formed by the trusting beliefs of a trustor regarding the trustworthiness of the IT artifact. The blockchain technology, the trustee, has features like cryptography, decentralization, hash functions, digital signature, consensus mechanism, which embody trust in the technology. We present an extensive description of Bitcoin as an instantiation of the blockchain technology, while offering a detailed account of the literature on trust in a technology. We conceptu...

In this study, we conceptualize a research model in the context of accommodation sharing platform... more In this study, we conceptualize a research model in the context of accommodation sharing platforms to examine the antecedents of consumers (guests) value co-creation behaviors using the theoretical lens of psychological ownership (PO). We theorize that the mechanisms of perceived control, intimate knowledge and social interactions moderated by platform mediated communications can induce the development of PO towards target accommodations. We conceptualize the outcome of PO as positive value co-creation behaviors (feedback, advocacy, helping and tolerance) that can be valuable for sustaining participation in accommodation sharing. We plan to collect data from Airbnb users and use SEM to test our research model. Theoretically, our research has the potential to contribute to the emerging phenomenon of sharing economy and value co-creation enabled by online platforms. Also, practitioners can use the conceptual framework to leverage value co-creation behaviors for sustaining participation in accommodation sharing.
Journal of the Association for Information Systems, 2019
This essay explores the fixation the field of information systems has with "theory" and my frustr... more This essay explores the fixation the field of information systems has with "theory" and my frustration with this focus, examining where this theory focus came from, why it has been so widely adopted, and how it has led to dysfunction. It also offers some recommended action items that the field can take to redirect its efforts in order to become more relevant, resilient, and resourceful. These actions include, broadening the aperture of what legitimate IS research should include, imploring journal editors to change the way "applied" research is handled, bringing back books as an accepted and valued publication outlet, and moving the field in the direction of engagement.

An Agile Methodology for the Disaster Recovery of Information Systems Under Catastrophic Scenarios
Journal of Management Information Systems, 2017
Abstract We explore the use of an agile methodology for improving the recovery of complex systems... more Abstract We explore the use of an agile methodology for improving the recovery of complex systems under catastrophic scenarios. Our adaptation of Kanban presents a novel, agile approach to overcoming the unique challenges that organizations face during disaster recovery. An action research study approach is employed to test the implementation of Kanban during a complex scenario at a large enterprise. The findings suggest that an adaptive and flexible methodology is required for an efficient disaster recovery in confronting unintended and cascading consequences. This research offers several contributions. First, to our knowledge, this is the first study to detail an approach for disaster recovery using an agile methodology. Second, this study uses a new combination of classic, canonical, and dialogical action research approaches to conduct the first empirical test of the effectiveness of an agile approach during an actual disaster recovery event. Third, in response to this Special Issue, the aforementioned research approach discusses the relationships between information systems researchers and research clients, demonstrating how action research can lead to improved organizational situations.

Communications of the Association for Information Systems, 2017
Building highly available information technology (IT) infrastructures has become critical to many... more Building highly available information technology (IT) infrastructures has become critical to many corporations' survival. However, the disaster recovery (DR) industry lacks a common enterprise framework to capitalize on the value that DR provides corporations due in part to inadequate conceptual frameworks for DR that can facilitate the alignment of corporate efforts toward corporate resiliency. To address this problem, we propose a new conceptualization for the DR of enterprise architecture. This conceptual framework comprises DR layers that describe the nature of DR and its related components from a functional and technical point of view. We discuss the benefits of these DR layers to DR teams and compare our approach to traditional thinking. Further, we present a case study, its findings, and their implications for DR. As a result, we demonstrate how our layered framework of enterprise architecture provides a unified understanding of the DR practice, which one can then use to support decision making and corporate alignment of the DR practice and its associated technology.
Journal of the Association for Information Systems, 2019
This paper presents seven scholarly commentaries on Hirschheim's "Against Theory" essay published... more This paper presents seven scholarly commentaries on Hirschheim's "Against Theory" essay published in this issue of the Journal of the Association for Information Systems. Each commentary is written by a renowned IS researcher. Following the individual commentaries is Hirschheim's response to the commentaries. Each commentary provides an insightful exegesis on theory in its own right and, collectively, the commentaries and response provide thought-provoking reflections for researchers in IS and beyond.
The role of benchmarking services in demonstrating IS effectiveness to senior management
European Conference on Information Systems, 1994
Issues and approaches to appraising technological change in the office: A consequentialist perspective
Human-Computer Interaction, Dec 1, 1987
ABSTRACT Offices have always been complex social systems. With the growth of office automation th... more ABSTRACT Offices have always been complex social systems. With the growth of office automation they will have to be recognized as socio-technical systems. The problems of prediction of consequences of change — in particular, technological change — in such systems are examined in some length and the limitations of causal analysis noted. A distinction between causal and hermeneutic modes of prediction is drawn. Hermeneutic modes of prediction are advocated as necessary in addition to predictions based on causal models in order to overcome the shortcomings of the latter. The results of a hermeneutic predictive exercise are reported which shed some light on the possible impact of future technological change in the office.
Realizing Outsourcing Expectations: Incredible Promises, Credible Outcomes
Palgrave Macmillan UK eBooks, 2009
Drawing from the firsthand experiences of senior executives and Information Technology (IT) manag... more Drawing from the firsthand experiences of senior executives and Information Technology (IT) managers in North American and British companies, this chapter summarizes the expectations they had for outsourcing and explains what went wrong — and why — when expectations were not met. Successful outsourcing experiences are then used to outline a prescription for ensuring that expected benefits are fully realized. All too often outsourcing success is declared even before the ink on the contract is dry. This study has key, perennial things to say on expectations, and on realism about outcomes from outsourcing. It is also an important precursor to our follow-up study on outcomes and success detailed in Chapter 12.
Communications of the Association for Information Systems, 2002
Whether Information Systems should or should not be part of the core business school curriculum i... more Whether Information Systems should or should not be part of the core business school curriculum is a recurring discussion in many universities. In this article, a task force of 40 prominent information systems scholars address the issue. They conclude that information systems is absolutely an essential body of knowledge for business school students to acquire as well as a key element of the business school's long-run strategic positioning within the university. Originally prepared in response to draft accreditation guidelines prepared by AACSB International, the article includes a compilation of the concepts that the authors believe to be the core information systems knowledge that all business school students should be familiar with.
Conceptual and Paradigmatic Foundations of ISD
Cambridge University Press eBooks, Oct 27, 1995
Paradigmatic Analysis of ISD Methodologies
Cambridge University Press eBooks, Oct 27, 1995
Paradigmatic Analysis of Data Modeling Approaches
Cambridge University Press eBooks, Oct 27, 1995
Information systems research : contemporary approaches & emergent traditions : proceedings of the IFIP TC8/WG 8.2 Working Conference on the Information Systems Research Arena of the 90's Challenges, Perceptions, and Alternative Approaches : Copenhagen, Denmark, 14-16 December 1990
Elsevier eBooks, 1991

International Conference on Information Systems, 1988
An area which continues to receive considerable attention in both the popular and academic press ... more An area which continues to receive considerable attention in both the popular and academic press is that of information systems development (ISD). Over the years, numerous books and papers have been written on the subject. This is hardly surprising given the vital role information systems are thought to play in the survivability of today's organizations. Attention has been focused on the approaches or methodologies for developing information systems. Although a vast number of methodologies have been developed, there is little empirical knowledge of their virtue. Comparative studies are still rare. The CRIS (Comparative Review of Information Systems Development Methodologies) Conferences of IFIP's TC8.1 were an attempt to shed light on the matter. Four conferences have taken place so far: The function of CRIS 1 was to "take stock" of the various methodologies (Olle, Sol, and Verrijn-Stuart 1982); CRIS 2 intended to compare them, to provide a "feature analysis' (Olle, Sol, and Tully 1983); CRIS 3 sought to provide "practical experience" (Olle, Sol, and Verrijn-Stuart 1986). A fourth took place this past September and focussed on "automated tools for systems development." Although the intention was laudable, CRIS has not been an unequivocal success: The results are inconclusive and, more fundamentally, the issue of "evaluation" has proved elusive. Moreover, CRIS has highlighted a number of basic problems which have yet to be resolved. For example, what exactly is an information system development methodology (ISDM)? Do practitioners use ISDMs? What are the implications of using a particular ISDM? These questions would seem to need answering before one could attempt any serious evaluation of ISDMs, yet they remain largely unresolved. It is easy, however, to understand why this is the case: They are not easily 4. Socio-technical variables in information systems development methodology evaluation
Communications of the Association for Information Systems, 2020
In this paper, we elucidate robust action as a research framework for the information systems (IS... more In this paper, we elucidate robust action as a research framework for the information systems (IS) field. We contend robust action provides a suitable frame to conduct pragmatist research in IS and can be useful in researching the multi-faceted terrain of social justice. The robust action frame has its roots in pragmatism, and, moreover, given the history of American pragmatism as rooted in social justice, robust action can provide a suitable frame to confront broad-scale issues on a societal scale-a topic that little IS research has examined. We define robust action's components, illustrate its philosophical rooting in the pragmatist tradition, and show how one can use it.
Assessing Legitimacy of Blockchain Applications
Theory Through Argument: Applying Argument Mapping to Facilitate Theory Building
European Journal of Information Systems, 2021
This paper proposes an extension of Fletcher and Huff’s (1990) argument mapping technique, which ... more This paper proposes an extension of Fletcher and Huff’s (1990) argument mapping technique, which focuses on an examination of individual arguments, to depict the broader argumentative terrain of a ...
Uploads
Papers by Rudy Hirschheim