AIS Logo
Living knowledge for digital leadership
All AI Governance & Ethics Digital Transformation & Innovation Supply Chain & Operations AI Adoption & Implementation Platform Ecosystems & Strategy SME & Entrepreneurship Cybersecurity & Risk AI Applications & Technologies Digital Health & Well-being Digital Work & Collaboration Education & Training
TSAW Drones: Revolutionizing India's Drone Logistics with Digital Technologies
Communications of the Association for Information Systems (2025)

TSAW Drones: Revolutionizing India's Drone Logistics with Digital Technologies

Rakesh Gupta, Sujeet Kumar Sharma, Stevelal Stevelal
This case study examines TSAW Drones, an Indian startup transforming the country's logistics sector with advanced drone technology. It explores how the company leverages the Internet of Things (IoT), big data, cloud computing, and artificial intelligence (AI) to deliver essential supplies, particularly in the healthcare sector, to remote and inaccessible locations. The paper analyzes TSAW's technological evolution, its position in the competitive market, and the strategic choices it faces for future growth.

Problem India's diverse and challenging geography creates significant logistical hurdles, especially for the timely delivery of critical medical supplies to remote rural areas. Traditional transportation networks are often inefficient or non-existent in these regions, leading to delays and inadequate healthcare access. This study addresses how TSAW Drones tackles this problem by creating a 'fifth mode of transportation' to bridge these infrastructure gaps and ensure rapid, reliable delivery of essential goods.

Outcome - TSAW Drones successfully leveraged a combination of digital technologies, including AI, IoT, and a Drone Cloud Intelligence System (DCIS), to establish itself as a key player in India's healthcare logistics.
- The company pioneered critical services, such as delivering medical supplies to high-altitude locations and transporting oncological tissues mid-surgery, proving the viability of drones for time-sensitive healthcare needs.
- The study highlights the strategic crossroads faced by TSAW: whether to deepen its specialization within the complex healthcare vertical or to expand horizontally into other growing sectors like agriculture and infrastructure.
- Favorable government policies and the rapid evolution of smart-connected product (SCP) technologies are identified as key drivers for the growth of India's drone industry and companies like TSAW.
Drone Logistics, Drone Technology, Artificial Intelligence, Cloud Computing, Smart Connected Products (SCPs), Case Study, Logistics Innovation
Digital Resilience in High-Tech SMEs: Exploring the Synergy of AI and IoT in Supply Chains
Communications of the Association for Information Systems (2025)

Digital Resilience in High-Tech SMEs: Exploring the Synergy of AI and IoT in Supply Chains

Adnan Khan, Syed Hussain Murtaza, Parisa Maroufkhani, Sultan Sikandar Mirza
This study investigates how digital resilience enhances the adoption of AI and Internet of Things (IoT) practices within the supply chains of high-tech small and medium-sized enterprises (SMEs). Using survey data from 293 Chinese high-tech SMEs, the research employs partial least squares structural equation modeling to analyze the impact of these technologies on sustainable supply chain performance.

Problem In an era of increasing global uncertainty and supply chain disruptions, businesses, especially high-tech SMEs, struggle to maintain stability and performance. There is a need to understand how digital technologies can be leveraged not just for efficiency, but to build genuine resilience that allows firms to adapt to and recover from shocks while maintaining sustainability.

Outcome - Digital resilience is a crucial driver for the adoption of both IoT-oriented supply chain practices and AI-driven innovative practices.
- The implementation of IoT and AI practices, fostered by digital resilience, significantly improves sustainable supply chain performance.
- AI-driven practices were found to be particularly vital for resource optimization and predictive analytics, strongly influencing sustainability outcomes.
- The effectiveness of digital resilience in promoting IoT adoption is amplified in dynamic and unpredictable market environments.
Digital Resilience, Internet of Things-Oriented Supply Chain Management Practices, AI-Driven Innovative Practices, Supply Chain Dynamism, Sustainable Supply Chain Performance
Rethinking Healthcare Technology Adoption: The Critical Role of Visibility & Consumption Values
Communications of the Association for Information Systems (2025)

Rethinking Healthcare Technology Adoption: The Critical Role of Visibility & Consumption Values

Sonali Dania, Yogesh Bhatt, Paula Danskin Englis
This study explores how the visibility of digital healthcare technologies influences a consumer's intention to adopt them, using the Theory of Consumption Value (TCV) as a framework. It investigates the roles of different values (e.g., functional, social, emotional) as mediators and examines how individual traits like openness-to-change and gender moderate this relationship. The research methodology involved collecting survey data from digital healthcare users and analyzing it with structural equation modeling.

Problem Despite the rapid growth of the digital health market, user adoption rates vary significantly, and the factors driving these differences are not fully understood. Specifically, there is limited research on how consumption values and the visibility of a technology impact adoption, along with a poor understanding of how individual traits like openness to change or gender-specific behaviors influence these decisions.

Outcome - The visibility of digital healthcare applications significantly and positively influences a consumer's intention to adopt them.
- Visibility strongly shapes user perceptions, positively impacting the technology's functional, conditional, social, and emotional value; however, it did not significantly influence epistemic value (curiosity).
- The relationship between visibility and adoption is mediated by key factors: the technology's perceived usefulness, the user's perception of privacy, and their affinity for technology.
- A person's innate openness to change and their gender can moderate the effect of visibility; for instance, individuals who are already open to change are less influenced by a technology's visibility.
Adoption Intention, Healthcare Applications, Theory of Consumption Values, Values, Visibility
Procuring Accessible Third-Party Web-Based Software Applications for Inclusivity: A Socio-technical Approach
Communications of the Association for Information Systems (2025)

Procuring Accessible Third-Party Web-Based Software Applications for Inclusivity: A Socio-technical Approach

Niamh Daly, Ciara Heavin, James Northridge
This study investigates how universities can improve their decision-making processes when procuring third-party web-based software to enhance accessibility for students and staff. Using a socio-technical systems framework, the research conducts a case study at a single university, employing qualitative interviews with procurement experts and users to evaluate current practices.

Problem The procurement process for web-based software in higher education often fails to adequately consider web accessibility standards. This oversight creates barriers for an increasingly diverse student population, including those with disabilities, and represents a failure to integrate equality, diversity, and inclusion into critical technology-related decisions.

Outcome - Procurement processes often lack standardized, early-stage accessibility testing, with some evaluations occurring after the software has already been acquired.
- A significant misalignment exists between the accessibility testing practices of software vendors and the actual needs of the higher education institution.
- Individuals with disabilities are not typically involved in the initial evaluation phase, though their feedback might be sought after implementation, leading to reactive rather than proactive solutions.
- Accessible software directly improves student engagement and fosters a more inclusive campus environment, benefiting the entire university community.
- The research proposes using the SEIPS 2.0 model as a structured framework to map the procurement work system, improve accessibility evaluation, and better integrate diverse expertise into the decision-making process.
Web Accessibility (WA), Procurement, Web-Based Software, Socio-Technical Systems, Higher Education Institutions (HEIs)
Supply Chain Resilience and Sustainable Digital Transformation with Next-Generation Connectivity in a Smart Port
Communications of the Association for Information Systems (2025)

Supply Chain Resilience and Sustainable Digital Transformation with Next-Generation Connectivity in a Smart Port

Shantanu Dey, Rajhans Mishra, Sayantan Mukherjee
This study investigates how next-generation connectivity, specifically 5G technology, can enhance both the resilience and sustainability of supply chains operating within smart ports. The researchers developed a comprehensive framework by systematically reviewing over 1,000 academic papers and conducting a detailed case study on a major smart port.

Problem Global supply chains face constant threats from disruptions, ranging from pandemics to geopolitical events. There is a critical need to understand how modern technologies can help these supply chains not only recover from shocks (resilience) but also operate in an environmentally and socially responsible manner (sustainability), particularly at vital hubs like ports.

Outcome - Next-generation connectivity like 5G can shape the interplay between resilience and sustainability at multiple levels, including facilities, supply chain ecosystems, and society.
- 5G acts as an integrated data and technology platform that helps policymakers and practitioners justify investments in sustainability measures.
- The technology is critical for supporting ecological resilience and community-centric initiatives, such as infrastructure development, asset maintenance, and stakeholder safety.
- Ultimately, advanced connectivity drives a convergence where building resilience and achieving sustainability become mutually reinforcing goals.
Ecological Resilience, Next Generation Connectivity, Sustainability Resilience Interdependence, Smart Ports, Private 5G, Supply Chain Resilience
Exploring the Role of Third Parties in Digital Transformation Initiatives: A Problematized Assumptions Perspective
Communications of the Association for Information Systems (2025)

Exploring the Role of Third Parties in Digital Transformation Initiatives: A Problematized Assumptions Perspective

Jack O'Neill, David Pidoyma, Ciara Northridge, Shivani Pai, Stephen Treacy, and Andrew Brosnan
This study investigates the role and influence of external partners in corporate digital transformation projects. Using a 'problematized assumptions' approach, the research challenges the common view that transformation is a purely internal affair by analyzing existing literature and conducting 26 semi-structured interviews with both client organizations and third-party service providers.

Problem Much of the existing research on digital transformation describes it as an initiative orchestrated primarily within an organization, which overlooks the significant and growing market for third-party consultants and services. This gap in understanding leads to problematic assumptions about how transformations are managed, creating risks and missed opportunities for businesses that increasingly rely on external expertise.

Outcome - A fully outsourced digital transformation is infeasible, as core functions like culture and change management must be led internally.
- Third parties play a critical role, far greater than literature suggests, by providing specialized expertise for strategy development and technical execution.
- The most effective approach is a bimodal model, where the organization owns the high-level vision and mission, while collaborating with third parties on strategy and tactics.
- Digital transformation should be viewed as a continuous process of socio-technical change and evolution, not a project with a defined endpoint.
- Success is more practically measured by optimizing operational components (Vision, Mission, Objectives, Strategy, Tactics - VMOST) rather than solely focusing on a reconceptualization of value.
Digital Transformation, Third Parties, Managed Services, Problematization, Outsourcing, IT Strategy, Socio-technical Change
Best Practices for Leveraging Data Analytics in Procurement
MIS Quarterly Executive (2022)

Best Practices for Leveraging Data Analytics in Procurement

Benjamin B. M. Shao, Robert D. St. Louis, Karen Corral, Ziru Li
This study examines the procurement practices of 15 Fortune 500 companies to understand why most are not fully utilizing data analytics. Through surveys and in-depth interviews, the researchers investigated the primary challenges organizations face in advancing their analytics capabilities. Based on the findings, the paper proposes five best practices executives can follow to derive more value from data analytics in procurement.

Problem Many large organizations are investing in data analytics to improve their procurement functions, but struggle to move beyond basic descriptive reports. This prevents them from achieving significant cost reductions, operational efficiencies, and strategic advantages. The study addresses the gap between the potential of advanced analytics and its current limited application in corporate procurement.

Outcome - Most companies studied had not progressed beyond descriptive analytics (dashboards and visualizations).
- Key challenges include inappropriate data granularity, data cleansing difficulties, reluctance to adopt advanced analytics, and difficulty demonstrating ROI.
- Best Practice 1: Define clear taxonomies and processes for capturing high-quality procurement data.
- Best Practice 2: Hire people with the right mix of technical and business skills and provide them with proper analytics tools.
- Best Practice 3: Establish a clear vision for how data analytics will add value and create a competitive advantage.
- Best Practice 4: Frame requests to analytics teams as business problems to be solved, not just data to be pulled.
- Best Practice 5: Foster close collaboration between the procurement analytics team, the IT department, and the enterprise analytics team.
data analytics, procurement, best practices, supply chain management, analytics hierarchy, business intelligence, strategic sourcing
How Walmart Canada Used Blockchain Technology to Reimagine Freight Invoice Processing
MIS Quarterly Executive (2021)

How Walmart Canada Used Blockchain Technology to Reimagine Freight Invoice Processing

Mary C. Lacity, Remko Van Hoek
This case study examines how Walmart Canada implemented a blockchain-enabled solution, DL Freight, to overhaul its freight invoice processing system with its 70 third-party carriers. The paper details the business process reengineering and the adoption of a shared, distributed ledger to automate and streamline transactions between the companies. The goal was to create a single, trusted source of information for all parties involved in a shipment.

Problem Before the new system, up to 70% of freight invoices were disputed, leading to significant delays and high administrative costs for both Walmart Canada and its carriers. The process of reconciling disparate records was manual, time-consuming, and could take weeks or even months, which strained carrier relationships and created substantial financial friction in the supply chain.

Outcome - Drastically reduced disputed invoices from 70% to under 2%.
- Shortened invoice finalization time from weeks or months to within 24 hours of delivery.
- Achieved significant cost savings for Walmart Canada and improved cash flow and financial stability for freight carriers.
- Increased transparency and trust, leading to improved relationships between Walmart and its partners.
- Streamlined the process from a complex 11-step workflow to an efficient 5-step automated one.
Blockchain, Supply Chain Management, Freight Invoice Processing, Walmart Canada, Interfirm Processes, Process Automation, Digital Transformation
Unexpected Benefits from a Shadow Environmental Management Information System
MIS Quarterly Executive (2021)

Unexpected Benefits from a Shadow Environmental Management Information System

Johann Kranz, Marina Fiedler, Anna Seidler, Kim Strunk, Anne Ixmeier
This study analyzes a German chemical company where a single employee, outside of the formal IT department, developed an Environmental Management Information System (EMIS). The paper examines how this grassroots 'shadow IT' project was successfully adopted company-wide, producing both planned and unexpected benefits. The findings are used to provide recommendations for business leaders on how to effectively implement information systems that drive both eco-sustainability and business value.

Problem Many companies struggle to effectively improve their environmental sustainability because critical information is often inaccessible, fragmented across different departments, or simply doesn't exist. This information gap prevents decision-makers from getting a unified view of their products' environmental impact, making it difficult to turn sustainability goals into concrete actions and strategic advantages.

Outcome - Greater Product Transparency: The system made it easy for employees to assess the environmental impact of materials and products.
- Improved Environmental Footprint: The company improved its energy and water efficiency, reduced carbon emissions, and increased waste productivity.
- Strategic Differentiation: The system provided a competitive advantage by enabling the company to meet growing customer demand for verified sustainable products, leading to increased sales and market share.
- Increased Profitability: Sustainable products became surprisingly profitable, contributing to higher turnover and outperforming competitors.
- More Robust Sourcing: The system helped identify supply chain risks, such as the scarcity of key raw materials, prompting proactive strategies to ensure resource availability.
- Empowered Employees: The tool spurred an increase in bottom-up, employee-driven sustainability initiatives beyond core business operations.
Environmental Management Information System (EMIS), Shadow IT, Corporate Sustainability, Eco-sustainability, Case Study, Strategic Value, Supply Chain Transparency
“We don't need it” - Insights into Blockchain Adoption in the German Pig Value Chain
International Conference on Wirtschaftsinformatik (2025)

“We don't need it” - Insights into Blockchain Adoption in the German Pig Value Chain

Hauke Precht, Marlen Jirschitzka, and Jorge Marx Gómez
This study investigates why blockchain technology, despite its acclaimed benefits for transparency and traceability, has not been adopted in the German pig value chain. Researchers conducted eight semi-structured interviews with industry experts, analyzing the findings through the technology-organization-environment (TOE) framework to identify specific barriers to implementation.

Problem There is a significant disconnect between the theoretical advantages of blockchain for food supply chains and its actual implementation in the real world. This study addresses the specific research gap of why the German pig industry, a major agricultural sector, is not utilizing blockchain technology, aiming to understand the practical factors that prevent its adoption.

Outcome - Stakeholders perceive their existing technology solutions as sufficient, meeting current demands for data exchange and traceability without needing blockchain.
- Trust, a key benefit of blockchain, is already well-established within the industry through long-standing business relationships, interlocking company ownership, and neutral non-profit organizations.
- The vast majority of industry experts do not believe blockchain offers any significant additional benefit or value over their current systems and processes.
- There is a lack of market demand for the features blockchain provides; neither industry actors nor end consumers are asking for the level of transparency or immutability it offers.
- Significant practical barriers include the high investment costs required, a general lack of financial slack for new IT projects, and insufficient digital infrastructure across the value chain.
blockchain adoption, TOE, food supply chain, German pig value chain, qualitative research, supply chain management, technology adoption barriers
How Large Companies Can Help Small and Medium-Sized Enterprise (SME) Suppliers Strengthen Cybersecurity
MIS Quarterly Executive (2024)

How Large Companies Can Help Small and Medium-Sized Enterprise (SME) Suppliers Strengthen Cybersecurity

Jillian K. Kwong, Keri Pearlson
This study investigates the cybersecurity challenges faced by small and medium-sized enterprise (SME) suppliers and proposes actionable strategies for large companies to help them improve. Based on interviews with executives and cybersecurity experts, the paper identifies key barriers SMEs encounter and outlines five practical actions large firms can take to strengthen their supply chain's cyber resilience.

Problem Large companies increasingly require their smaller suppliers to meet the same stringent cybersecurity standards they do, creating a significant burden for SMEs with limited resources. This gap creates a major security vulnerability, as attackers often target less-secure SMEs as a backdoor to access the networks of larger corporations, posing a substantial third-party risk to entire supply chains.

Outcome - SME suppliers are often unable to meet the security standards of their large partners due to four key barriers: unfriendly regulations, organizational culture clashes, variability in cybersecurity frameworks, and misalignment of business processes.
- Large companies can proactively strengthen their supply chain by providing SMEs with the resources and expertise needed to understand and comply with regulations.
- Creating incentives for meeting security benchmarks is more effective than penalizing suppliers for non-compliance.
- Large firms should develop programs to help SMEs elevate their cybersecurity culture and align security processes with their own.
- Coordinating with other large companies to standardize cybersecurity frameworks and assessment procedures can significantly reduce the compliance burden on SMEs.
Cybersecurity, Supply Chain Management, Third-Party Risk, Small and Medium-Sized Enterprises (SMEs), Cyber Resilience, Vendor Risk Management
Promoting Cybersecurity Information Sharing Across the Extended Value Chain
MIS Quarterly Executive (2025)

Promoting Cybersecurity Information Sharing Across the Extended Value Chain

Olga Biedova, Lakshmi Goel, Justin Zhang, Steven A. Williamson, Blake Ives
This study analyzes an alternative cybersecurity information-sharing forum centered on the extended value chain of a single company in the forest and paper products industry. The paper explores the forum's design, execution, and challenges to provide recommendations for similar company-specific collaborations. The goal is to enhance cybersecurity resilience across interconnected business partners by fostering a more trusting and relevant environment for sharing best practices.

Problem As cyberthreats become more complex, industries with interconnected information and operational technologies (IT/OT) face significant vulnerabilities. Despite government and industry calls for greater collaboration, inter-organizational cybersecurity information sharing remains sporadic due to concerns over confidentiality, competitiveness, and lack of trust. Standard sector-based sharing initiatives can also be too broad to address the specific needs of a company and its unique value chain partners.

Outcome - A company-led, value-chain-specific cybersecurity forum is an effective alternative to broader industry groups, fostering greater trust and more relevant discussions among business partners.
- Key success factors for such a forum include inviting the right participants (security strategy leaders), establishing clear ground rules to encourage open dialogue, and using external facilitators to ensure neutrality.
- The forum successfully shifted the culture from one of distrust to one of transparency and collaboration, leading participants to be more open about sharing experiences, including previous security breaches.
- Participants gained valuable insights into the security maturity of their partners, leading to tangible improvements in cybersecurity practices, such as updating security playbooks, adopting new risk metrics, and enhancing third-party risk management.
- The collaborative model strengthens the entire value chain, as companies learn from each other's strategies, tools, and policies to collectively improve their defense against common threats.
cybersecurity, information sharing, extended value chain, supply chain security, cyber resilience, forest products industry, inter-organizational collaboration
Showing all 12 podcasts