AIS Logo
Living knowledge for digital leadership
All AI Governance & Ethics Digital Transformation & Innovation Supply Chain & IoT SME & IT Management Platform Ecosystems & Strategy Cybersecurity & Risk AI Applications & Technologies Healthcare & Well-being Digital Work & Collaboration
Digital Resilience in High-Tech SMEs: Exploring the Synergy of AI and IoT in Supply Chains

Digital Resilience in High-Tech SMEs: Exploring the Synergy of AI and IoT in Supply Chains

Adnan Khan, Syed Hussain Murtaza, Parisa Maroufkhani, Sultan Sikandar Mirza
This study investigates how digital resilience enhances the adoption of AI and Internet of Things (IoT) practices within the supply chains of high-tech small and medium-sized enterprises (SMEs). Using survey data from 293 Chinese high-tech SMEs, the research employs partial least squares structural equation modeling to analyze the impact of these technologies on sustainable supply chain performance.

Problem In an era of increasing global uncertainty and supply chain disruptions, businesses, especially high-tech SMEs, struggle to maintain stability and performance. There is a need to understand how digital technologies can be leveraged not just for efficiency, but to build genuine resilience that allows firms to adapt to and recover from shocks while maintaining sustainability.

Outcome - Digital resilience is a crucial driver for the adoption of both IoT-oriented supply chain practices and AI-driven innovative practices.
- The implementation of IoT and AI practices, fostered by digital resilience, significantly improves sustainable supply chain performance.
- AI-driven practices were found to be particularly vital for resource optimization and predictive analytics, strongly influencing sustainability outcomes.
- The effectiveness of digital resilience in promoting IoT adoption is amplified in dynamic and unpredictable market environments.
Digital Resilience, Internet of Things-Oriented Supply Chain Management Practices, AI-Driven Innovative Practices, Supply Chain Dynamism, Sustainable Supply Chain Performance
Rethinking Healthcare Technology Adoption: The Critical Role of Visibility & Consumption Values

Rethinking Healthcare Technology Adoption: The Critical Role of Visibility & Consumption Values

Sonali Dania, Yogesh Bhatt, Paula Danskin Englis
This study explores how the visibility of digital healthcare technologies influences a consumer's intention to adopt them, using the Theory of Consumption Value (TCV) as a framework. It investigates the roles of different values (e.g., functional, social, emotional) as mediators and examines how individual traits like openness-to-change and gender moderate this relationship. The research methodology involved collecting survey data from digital healthcare users and analyzing it with structural equation modeling.

Problem Despite the rapid growth of the digital health market, user adoption rates vary significantly, and the factors driving these differences are not fully understood. Specifically, there is limited research on how consumption values and the visibility of a technology impact adoption, along with a poor understanding of how individual traits like openness to change or gender-specific behaviors influence these decisions.

Outcome - The visibility of digital healthcare applications significantly and positively influences a consumer's intention to adopt them.
- Visibility strongly shapes user perceptions, positively impacting the technology's functional, conditional, social, and emotional value; however, it did not significantly influence epistemic value (curiosity).
- The relationship between visibility and adoption is mediated by key factors: the technology's perceived usefulness, the user's perception of privacy, and their affinity for technology.
- A person's innate openness to change and their gender can moderate the effect of visibility; for instance, individuals who are already open to change are less influenced by a technology's visibility.
Adoption Intention, Healthcare Applications, Theory of Consumption Values, Values, Visibility
Supply Chain Resilience and Sustainable Digital Transformation with Next-Generation Connectivity in a Smart Port

Supply Chain Resilience and Sustainable Digital Transformation with Next-Generation Connectivity in a Smart Port

Shantanu Dey, Rajhans Mishra, Sayantan Mukherjee
This study investigates how next-generation connectivity, specifically 5G technology, can enhance both the resilience and sustainability of supply chains operating within smart ports. The researchers developed a comprehensive framework by systematically reviewing over 1,000 academic papers and conducting a detailed case study on a major smart port.

Problem Global supply chains face constant threats from disruptions, ranging from pandemics to geopolitical events. There is a critical need to understand how modern technologies can help these supply chains not only recover from shocks (resilience) but also operate in an environmentally and socially responsible manner (sustainability), particularly at vital hubs like ports.

Outcome - Next-generation connectivity like 5G can shape the interplay between resilience and sustainability at multiple levels, including facilities, supply chain ecosystems, and society.
- 5G acts as an integrated data and technology platform that helps policymakers and practitioners justify investments in sustainability measures.
- The technology is critical for supporting ecological resilience and community-centric initiatives, such as infrastructure development, asset maintenance, and stakeholder safety.
- Ultimately, advanced connectivity drives a convergence where building resilience and achieving sustainability become mutually reinforcing goals.
Ecological Resilience, Next Generation Connectivity, Sustainability Resilience Interdependence, Smart Ports, Private 5G, Supply Chain Resilience
Best Practices for Leveraging Data Analytics in Procurement

Best Practices for Leveraging Data Analytics in Procurement

Benjamin B. M. Shao, Robert D. St. Louis, Karen Corral, Ziru Li
This study examines the procurement practices of 15 Fortune 500 companies to understand why most are not fully utilizing data analytics. Through surveys and in-depth interviews, the researchers investigated the primary challenges organizations face in advancing their analytics capabilities. Based on the findings, the paper proposes five best practices executives can follow to derive more value from data analytics in procurement.

Problem Many large organizations are investing in data analytics to improve their procurement functions, but struggle to move beyond basic descriptive reports. This prevents them from achieving significant cost reductions, operational efficiencies, and strategic advantages. The study addresses the gap between the potential of advanced analytics and its current limited application in corporate procurement.

Outcome - Most companies studied had not progressed beyond descriptive analytics (dashboards and visualizations).
- Key challenges include inappropriate data granularity, data cleansing difficulties, reluctance to adopt advanced analytics, and difficulty demonstrating ROI.
- Best Practice 1: Define clear taxonomies and processes for capturing high-quality procurement data.
- Best Practice 2: Hire people with the right mix of technical and business skills and provide them with proper analytics tools.
- Best Practice 3: Establish a clear vision for how data analytics will add value and create a competitive advantage.
- Best Practice 4: Frame requests to analytics teams as business problems to be solved, not just data to be pulled.
- Best Practice 5: Foster close collaboration between the procurement analytics team, the IT department, and the enterprise analytics team.
data analytics, procurement, best practices, supply chain management, analytics hierarchy, business intelligence, strategic sourcing
How Walmart Canada Used Blockchain Technology to Reimagine Freight Invoice Processing

How Walmart Canada Used Blockchain Technology to Reimagine Freight Invoice Processing

Mary C. Lacity, Remko Van Hoek
This case study examines how Walmart Canada implemented a blockchain-enabled solution, DL Freight, to overhaul its freight invoice processing system with its 70 third-party carriers. The paper details the business process reengineering and the adoption of a shared, distributed ledger to automate and streamline transactions between the companies. The goal was to create a single, trusted source of information for all parties involved in a shipment.

Problem Before the new system, up to 70% of freight invoices were disputed, leading to significant delays and high administrative costs for both Walmart Canada and its carriers. The process of reconciling disparate records was manual, time-consuming, and could take weeks or even months, which strained carrier relationships and created substantial financial friction in the supply chain.

Outcome - Drastically reduced disputed invoices from 70% to under 2%.
- Shortened invoice finalization time from weeks or months to within 24 hours of delivery.
- Achieved significant cost savings for Walmart Canada and improved cash flow and financial stability for freight carriers.
- Increased transparency and trust, leading to improved relationships between Walmart and its partners.
- Streamlined the process from a complex 11-step workflow to an efficient 5-step automated one.
Blockchain, Supply Chain Management, Freight Invoice Processing, Walmart Canada, Interfirm Processes, Process Automation, Digital Transformation
How an Incumbent Telecoms Operator Became an IoT Ecosystem Orchestrator

How an Incumbent Telecoms Operator Became an IoT Ecosystem Orchestrator

Christian Marheine, Christian Engel, Andrea Back
This paper presents a case study on how a large, established European telecommunications company, referred to as "TelcoCorp," successfully transitioned into a central role in the Internet of Things (IoT) market. It analyzes the company's journey and strategic decisions in developing its IoT platform and managing a network of partners. The study provides actionable recommendations for other established companies looking to make a similar shift.

Problem Established companies often struggle to adapt their traditional business models to compete in the fast-growing Internet of Things (IoT) landscape, which is dominated by digital platform models. These incumbents face significant challenges in building the right technology, creating a collaborative ecosystem of partners, and co-creating new value for customers. This study addresses the lack of clear guidance on how such companies can overcome these hurdles to become successful IoT leaders or "orchestrators."

Outcome - Established firms can successfully enter the IoT market by acting as an 'ecosystem orchestrator' that manages a network of customers and third-party technology providers.
- A key strategy is to license an existing IoT platform (a 'white-label' approach) rather than building one from scratch, which shortens time-to-market and reduces upfront investment.
- To solve the 'chicken-and-egg' problem of attracting users and developers, incumbents should first leverage their existing customer base to create demand for IoT solutions.
- Successfully moving from a simple technology provider to an orchestrator requires actively coordinating projects, co-financing promising use cases, and establishing clear governance rules for partners.
- A hybrid growth strategy that balances creating custom, industry-specific solutions with developing scalable, generic components proves most effective for long-term growth.
Internet of Things (IoT), Ecosystem Orchestrator, Telecoms Operator, Industry Incumbents, Platform Strategy, Value Co-creation, Case Study
Taking a Sociotechnical Perspective on Self-Sovereign Identity – A Systematic Literature Review

Taking a Sociotechnical Perspective on Self-Sovereign Identity – A Systematic Literature Review

Lukas Florian Bossler, Teresa Huber, and Julia Kroenung
This study provides a comprehensive analysis of academic literature on Self-Sovereign Identity (SSI), a system that aims to give individuals control over their digital data. Through a systematic literature review, the paper identifies and categorizes the key sociotechnical challenges—both technical and social—that affect the implementation and widespread adoption of SSI. The goal is to map the current research landscape and highlight underexplored areas.

Problem As individuals use more internet services, they lose control over their personal data, which is often managed and monetized by large tech companies. While Self-Sovereign Identity (SSI) is a promising solution to restore user control, academic research has disproportionately focused on technical aspects like security. This has created a significant knowledge gap regarding the crucial social challenges, such as user acceptance, trust, and usability, which are vital for SSI's real-world success.

Outcome - Security and privacy are the most frequently discussed challenges in SSI literature, often linked to the use of blockchain technology.
- Social factors essential for adoption, including user acceptance, trust, usability, and control, are significantly overlooked in current academic research.
- Over half of the analyzed papers discuss SSI in a general sense, with a lack of focus on specific application domains like e-government, healthcare, or finance.
- A potential mismatch exists between SSI's privacy needs and the inherent properties of blockchain, suggesting that alternative technologies should be explored.
- The paper concludes there is a strong need for more domain-specific and design-oriented research to address the social hurdles of SSI adoption.
self-sovereign identity, decentralized identity, blockchain, sociotechnical challenges, digital identity, systematic literature review
“We don't need it” - Insights into Blockchain Adoption in the German Pig Value Chain

“We don't need it” - Insights into Blockchain Adoption in the German Pig Value Chain

Hauke Precht, Marlen Jirschitzka, and Jorge Marx Gómez
This study investigates why blockchain technology, despite its acclaimed benefits for transparency and traceability, has not been adopted in the German pig value chain. Researchers conducted eight semi-structured interviews with industry experts, analyzing the findings through the technology-organization-environment (TOE) framework to identify specific barriers to implementation.

Problem There is a significant disconnect between the theoretical advantages of blockchain for food supply chains and its actual implementation in the real world. This study addresses the specific research gap of why the German pig industry, a major agricultural sector, is not utilizing blockchain technology, aiming to understand the practical factors that prevent its adoption.

Outcome - Stakeholders perceive their existing technology solutions as sufficient, meeting current demands for data exchange and traceability without needing blockchain.
- Trust, a key benefit of blockchain, is already well-established within the industry through long-standing business relationships, interlocking company ownership, and neutral non-profit organizations.
- The vast majority of industry experts do not believe blockchain offers any significant additional benefit or value over their current systems and processes.
- There is a lack of market demand for the features blockchain provides; neither industry actors nor end consumers are asking for the level of transparency or immutability it offers.
- Significant practical barriers include the high investment costs required, a general lack of financial slack for new IT projects, and insufficient digital infrastructure across the value chain.
blockchain adoption, TOE, food supply chain, German pig value chain, qualitative research, supply chain management, technology adoption barriers
How Large Companies Can Help Small and Medium-Sized Enterprise (SME) Suppliers Strengthen Cybersecurity

How Large Companies Can Help Small and Medium-Sized Enterprise (SME) Suppliers Strengthen Cybersecurity

Jillian K. Kwong, Keri Pearlson
This study investigates the cybersecurity challenges faced by small and medium-sized enterprise (SME) suppliers and proposes actionable strategies for large companies to help them improve. Based on interviews with executives and cybersecurity experts, the paper identifies key barriers SMEs encounter and outlines five practical actions large firms can take to strengthen their supply chain's cyber resilience.

Problem Large companies increasingly require their smaller suppliers to meet the same stringent cybersecurity standards they do, creating a significant burden for SMEs with limited resources. This gap creates a major security vulnerability, as attackers often target less-secure SMEs as a backdoor to access the networks of larger corporations, posing a substantial third-party risk to entire supply chains.

Outcome - SME suppliers are often unable to meet the security standards of their large partners due to four key barriers: unfriendly regulations, organizational culture clashes, variability in cybersecurity frameworks, and misalignment of business processes.
- Large companies can proactively strengthen their supply chain by providing SMEs with the resources and expertise needed to understand and comply with regulations.
- Creating incentives for meeting security benchmarks is more effective than penalizing suppliers for non-compliance.
- Large firms should develop programs to help SMEs elevate their cybersecurity culture and align security processes with their own.
- Coordinating with other large companies to standardize cybersecurity frameworks and assessment procedures can significantly reduce the compliance burden on SMEs.
Cybersecurity, Supply Chain Management, Third-Party Risk, Small and Medium-Sized Enterprises (SMEs), Cyber Resilience, Vendor Risk Management
Promoting Cybersecurity Information Sharing Across the Extended Value Chain

Promoting Cybersecurity Information Sharing Across the Extended Value Chain

Olga Biedova, Lakshmi Goel, Justin Zhang, Steven A. Williamson, Blake Ives
This study analyzes an alternative cybersecurity information-sharing forum centered on the extended value chain of a single company in the forest and paper products industry. The paper explores the forum's design, execution, and challenges to provide recommendations for similar company-specific collaborations. The goal is to enhance cybersecurity resilience across interconnected business partners by fostering a more trusting and relevant environment for sharing best practices.

Problem As cyberthreats become more complex, industries with interconnected information and operational technologies (IT/OT) face significant vulnerabilities. Despite government and industry calls for greater collaboration, inter-organizational cybersecurity information sharing remains sporadic due to concerns over confidentiality, competitiveness, and lack of trust. Standard sector-based sharing initiatives can also be too broad to address the specific needs of a company and its unique value chain partners.

Outcome - A company-led, value-chain-specific cybersecurity forum is an effective alternative to broader industry groups, fostering greater trust and more relevant discussions among business partners.
- Key success factors for such a forum include inviting the right participants (security strategy leaders), establishing clear ground rules to encourage open dialogue, and using external facilitators to ensure neutrality.
- The forum successfully shifted the culture from one of distrust to one of transparency and collaboration, leading participants to be more open about sharing experiences, including previous security breaches.
- Participants gained valuable insights into the security maturity of their partners, leading to tangible improvements in cybersecurity practices, such as updating security playbooks, adopting new risk metrics, and enhancing third-party risk management.
- The collaborative model strengthens the entire value chain, as companies learn from each other's strategies, tools, and policies to collectively improve their defense against common threats.
cybersecurity, information sharing, extended value chain, supply chain security, cyber resilience, forest products industry, inter-organizational collaboration
SUPPORTING COMMUNITY FIRST RESPONDERS IN AGING IN PLACE: AN ACTION DESIGN FOR A COMMUNITY-BASED SMART ACTIVITY MONITORING SYSTEM

SUPPORTING COMMUNITY FIRST RESPONDERS IN AGING IN PLACE: AN ACTION DESIGN FOR A COMMUNITY-BASED SMART ACTIVITY MONITORING SYSTEM

Carmen Leong, Carol Hsu, Nadee Goonawardene, Hwee-Pink Tan
This study details the development of a smart activity monitoring system designed to help elderly individuals live independently at home. Using a three-year action design research approach, it deployed a sensor-based system in a community setting to understand how to best support community first responders—such as neighbors and volunteers—who lack professional healthcare training.

Problem As the global population ages, more elderly individuals wish to remain in their own homes, but this raises safety concerns like falls or medical emergencies going unnoticed. This study addresses the specific challenge of designing monitoring systems that provide remote, non-professional first responders with the right information (situational awareness) to accurately assess an emergency alert and respond effectively.

Outcome - Technology adaptation alone is insufficient; the system design must also encourage the elderly person to adapt their behavior, such as carrying a beacon when leaving home, to ensure data accuracy.
- Instead of relying on simple automated alerts, the system should provide responders with contextual information, like usual sleep times or last known activity, to support human-based assessment and reduce false alarms.
- To support teams of responders, the system must integrate communication channels, allowing all actions and updates related to an alert to be logged in a single, closed-loop thread for better coordination.
- Long-term activity data can be used for proactive care, helping identify subtle changes in behavior (e.g., deteriorating mobility) that may signal future health risks before an acute emergency occurs.
Activity monitoring systems, community-based model, elderly care, situational awareness, IoT, sensor-based monitoring systems, action design research
Showing all 11 podcasts