IS

Keil, Mark

Topic Weight Topic Terms
3.427 project projects failure software commitment escalation cost factors study problem resources continue prior escalate overruns
0.593 control controls formal systems mechanisms modes clan informal used internal literature outsourced outcome theory configuration
0.572 model research data results study using theoretical influence findings theory support implications test collected tested
0.534 governance relational mechanisms bpo rights process coordination outsourcing contractual arrangements technology benefits view informal business
0.431 project projects development management isd results process team developed managers teams software stakeholders successful complex
0.381 capital social ict communication rural icts cognitive society information well-being relational india societal empirically create
0.323 dynamic time dynamics model change study data process different changes using longitudinal understanding decisions develop
0.322 performance results study impact research influence effects data higher efficiency effect significantly findings impacts empirical
0.309 model use theory technology intention information attitude acceptance behavioral behavior intentions research understanding systems continuance
0.298 cultural culture differences cross-cultural states united status national cultures japanese studies japan influence comparison versus
0.290 digital divide use access artifacts internet inequality libraries shift library increasingly everyday societies understand world
0.271 theory theories theoretical paper new understanding work practical explain empirical contribution phenomenon literature second implications
0.269 risk risks management associated managing financial appropriate losses expected future literature reduce loss approach alternative
0.252 research study different context findings types prior results focused studies empirical examine work previous little
0.222 outcomes theory nature interaction theoretical paradox versus interpersonal literature provides individual levels understanding dimensions addition
0.216 business units study unit executives functional managers technology linkage need areas information long-term operations plans
0.213 action research engagement principles model literature actions focus provides developed process emerging establish field build
0.185 results study research experiment experiments influence implications conducted laboratory field different indicate impact effectiveness future
0.185 public government private sector state policy political citizens governments contributors agencies issues forums mass development
0.179 decision making decisions decision-making makers use quality improve performance managers process better results time managerial
0.176 information research literature systems framework review paper theoretical based potential future implications practice discussed current
0.166 level levels higher patterns activity results structures lower evolution significant analysis degree data discussed implications
0.166 programming program programmers pair programs pairs software development problem time language application productivity best nominal
0.163 systems information research theory implications practice discussed findings field paper practitioners role general important key
0.163 issues management systems information key managers executives senior corporate important importance survey critical corporations multinational
0.157 goals goal research setting achieve accounting behavior multiple meet make constraints differing ability particularly association
0.146 offshore offshoring client projects locations organizational vendor extra cultural problems services home sites two-stage arrangements
0.142 validity reliability measure constructs construct study research measures used scale development nomological scales instrument measurement
0.142 process problem method technique experts using formation identification implicit analysis common proactive input improvements identify
0.137 business digital strategy value transformation economy technologies paper creation digitization strategies environment focus net-enabled services
0.136 outsourcing transaction cost partnership information economics relationships outsource large-scale contracts specificity perspective decisions long-term develop
0.134 process business reengineering processes bpr redesign paper research suggests provide past improvements manage enable organizations
0.126 change organizational implementation case study changes management organizations technology organization analysis successful success equilibrium radical
0.114 internal external audit auditing results sources closure auditors study control bridging appears integrity manager effectiveness
0.105 data used develop multiple approaches collection based research classes aspect single literature profiles means crowd
0.102 information strategy strategic technology management systems competitive executives role cio chief senior executive cios sis
0.102 data classification statistical regression mining models neural methods using analysis techniques performance predictive networks accuracy

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Rai, Arun 4 Gregory, Robert Wayne 2 Saarinen, Timo 2 Tuunainen, Virpi 2
Beck, Roman 1 Cule, Paul 1 Depledge, Gordon 1 Hsieh, J. J. Po-An 1
Hornyak, Rob 1 Kasi, Vijay 1 Lyytinen, Kalle 1 Lee, Jong Seok 1
Montealegre, Ramiro 1 Mann, Joan 1 Mixon, Richard 1 Muntermann, Jan 1
M_hring, Magnus 1 Po-An Hsieh, J. J. 1 Robey, Daniel 1 Schmidt, Roy 1
Smith, H. Jeff 1 Tan, Benard C. Y. 1 Tiwana, Amrit 1 Wei, Kwok-Kee 1
Wassenaar, Arjen 1 WŸllenweber, Kim 1
Software project management 5 escalation 4 digital divide 2 digital inequality 2
escalating commitment 2 escalation of commitment 2 IS project failure 2 information system development 2
sunk cost 2 attempted control 1 ambidexterity 1 business process outsourcing 1
balancing 1 blending 1 capital theory 1 cultural capital 1
Control balancing 1 control dynamics 1 control theory 1 controls 1
de-escalation 1 Delphi technique 1 economic capital 1 escalation of commitment behavior 1
field study 1 formal contract 1 grounded theory 1 goal setting theory 1
grounded theory methodology 1 habitus 1 hybrid governance 1 ICT policy 1
implementation 1 IS failure 1 Information systems (IS) project management 1 IT policy 1
information systems failure 1 information systems auditing 1 IS project risk management 1 IS risk management 1
information systems development 1 information technology 1 longitudinal case study 1 mum effect 1
mental budgeting 1 offshoring projects 1 organizational control 1 outsourcing relationships 1
process model 1 project management. 1 project management 1 project controls 1
project estimation 1 paradoxical tensions 1 risk propensity 1 risk perception 1
runaway 1 risk assessment 1 realized control 1 relational governance 1
social capital 1 socioeconomic inequality 1 systems implementation 1 socio-economic inequality 1
sunk cost. 1 survey research 1 software project escalation 1 services 1
technology acceptance 1 transformation programs 1 uncertainty avoidance 1 whistle-blowing 1

Articles (15)

Paradoxes and the Nature of Ambidexterity in IT Transformation Programs (Information Systems Research, 2015)
Authors: Abstract:
    Though information technology (IT) transformation programs are gaining in importance, we know little about the nature of the challenges involved in such programs and how to manage them. Using grounded theory methodology, we conducted a multiyear case study of a large IT transformation program in a major commercial bank, during which we encountered the interrelated themes of paradoxes and ambidexterity. Grounded in our case, we construct a substantive theory of ambidexterity in IT transformation programs that identifies and explains the paradoxes that managers need to resolve in IT transformation programs. The ambidexterity areas we identified are (1) IT portfolio decisions (i.e., IT efficiency versus IT innovation), (2) IT platform design (i.e., IT standardization versus IT differentiation), (3) IT architecture change (i.e., IT integration versus IT replacement), (4) IT program planning (i.e., IT program agility versus IT project stability), (5) IT program governance (i.e., IT program control versus IT project autonomy), and (6) IT program delivery (i.e., IT program coordination versus IT project isolation). What weaves these six areas together is the combined need for IT managers to employ ambidextrous resolution strategies to ensure short-term IT contributions and continuous progress of IT projects while simultaneously working toward IT transformation program success as a foundation for IT-enabled business transformation. However, in addition to this commonality, we find that the nature of paradoxical tensions differs across the six areas and requires slightly different management strategies for paradox resolution. Ambidexterity areas (1), (2), and (3) are associated with IT transformation strategizing and, in addition to balancing short- and long-term goals, require the mutual accommodation and blending of business and IT interests in the spirit of IT-business partnering to achieve IT-enabled business change and IT-based competitiveness. Ambidexterity areas (4), (5), and (6) are associated with IT program and project execution and, in addition to balancing short- and long-term requirements, require a recurrent and dynamic act of balancing ÒlocalÓ needs at the IT project level and ÒglobalÓ needs at the IT program level.
CONTROL BALANCING IN INFORMATION SYSTEMS DEVELOPMENT OFFSHORING PROJECTS. (MIS Quarterly, 2013)
Authors: Abstract:
    While much is known about selecting different types of control that can be exercised in information systems development projects, the control dynamics associated with ISD offshoring projects represent an important gap in our understanding. In this paper, we develop a substantive grounded theory of control balancing that addresses this theoretical gap. Based on a longitudinal case study of an ISD offshoring project in the financial services industry, we introduce a three-dimensional control configuration category that emerged from our data, suggesting that control type is only one dimension on which control configuration decisions need to be made. The other two dimensions that we identified are control degree (tight versus relaxed) and control style (unilateral versus bilateral). Furthermore, we illustrate that control execution during the life cycle of an ISD offshoring project is highly intertwined with the development of client-vendor shared understanding and that each influences the other. Based on these findings, we develop an integrative process model that explains how offshoring project managers make adjustments to the control configuration periodically to allow the ISD offshoring project and relationship to progress, yielding the iterative use of different three-dimensional control configurations that we conceptualize in the paper. Our process model of control balancing may trigger new ways of looking at control phenomena in temporary interfirm organizations such as client-vendor ISD offshoring projects. Implications for research on organizational control and ISD offshoring are discussed. In addition, guidelines for ISD offshoring practitioners are presented.
The Effect of an Initial Budget and Schedule Goal on Software Project Escalation. (Journal of Management Information Systems, 2012)
Authors: Abstract:
    Software project escalation is a costly problem that leads to significant financial losses. Prior research suggests that setting a publicly announced limit on resources can make individuals less willing to escalate their commitment to a failing course of action. However, the relationship between initial budget and schedule goals and software project escalation remains unexplored. Drawing on goal setting theory as well as sunk cost and mental budgeting perspectives, we explore the effect of goal difficulty and goal specificity on software project escalation. The findings from a laboratory experiment with 349 information technology professionals suggest that both very difficult and very specific goals for budget and schedule can limit software project escalation. Further, the level of commitment to a budget and schedule goal directly affects software project escalation and also interacts with goal difficulty and goal specificity to affect software project escalation. This study makes a theoretical contribution to the existing body of knowledge on software project management by establishing a connection between goal setting theory and software project escalation. The study also contributes to practice by highlighting the potential negative consequences that can result from the nature of initial budget and schedule goals that are established at the outset of a project.
Hybrid Relational-Contractual Governance for Business Process Outsourcing. (Journal of Management Information Systems, 2012)
Authors: Abstract:
    We examined 335 business process outsourcing (BPO) ventures to understand the effect of contractual and relational governance factors on BPO satisfaction from the client's perspective. While both contractual and relational factors explain significant variance in BPO satisfaction, relational factors dominate. By examining interactions between key contractual and relational mechanisms, we found that elements of the two governance approaches operate as substitutes with respect to BPO satisfaction. Specifically, the relational mechanism, trust, was found to substitute for contractually specified activity expectations, goal expectations, and contractual flexibility. Similarly, the relational mechanism, information exchange, was found to substitute for contractually specified activity expectations and goal expectations. Finally, the relational mechanism, conflict resolution, was found to substitute for contractually specified goal expectations. Our results can be applied to more effectively realize controls in outsourcing contexts and to design governance systems that integrate contractual and relational governance mechanisms based on the characteristics of client-vendor relationships.
Addressing Digital Inequality for the Socioeconomically Disadvantaged Through Government Initiatives: Forms of Capital That Affect ICT Utilization. (Information Systems Research, 2011)
Authors: Abstract:
    Digital inequality, or unequal access to and use of information and communication technologies (ICT), is a severe problem preventing the socioeconomically disadvantaged (SED) from participating in a digital society. To understand the critical resources that contribute to digital inequality and inform public policy for stimulating initial and continued ICT usage by the SED, we drew on capital theories and conducted a field study to investigate: (1) the forms of capital for using ICT and how they differ across potential adopters who are SED and socioeconomically advantaged (SEA); (2) how these forms of capitals are relatively impacted for the SEA and the SED through public policy for ICT access; and (3) how each form of capital influences the SED's intentions to use initially and to continue to use ICT. The context for our study involved a city in the southeastern United States that offered its citizens free ICT access for Internet connectivity. Our results show that SED potential adopters exhibited lower cultural capital but higher social capital relative to the SEA. Moreover, the SED who participated in the city's initiative realized greater positive gains in cultural capital, social capital, and habitus than the SEA. In addition, we find that the SED's initial intention to use ICT was influenced by intrinsic motivation for habitus, self-efficacy for cultural capital, and important referents' expectations and support from acquaintances for social capital. Cultural capital and social cultural capital also complemented each other in driving the SED's initial use intention. The SED's continued use intention was affected by both intrinsic and extrinsic motivations for habitus and both knowledge and self-efficacy for cultural capital but was not affected by social capital. We also make several recommendations for future research on digital inequality and ICT acceptance to extend and apply the proposed capital framework.
Control in Internal and Outsourced Software Projects. (Journal of Management Information Systems, 2009)
Authors: Abstract:
    Although the choice of control mechanisms in systems development projects has been extensively studied in prior research, differences in such choices across internal and outsourced projects and their effects on systems development performance have not received much attention. This study attempts to address this gap using data on 57 outsourced and 79 internal projects in 136 organizations. Our results reveal a paradoxical overarching pattern: controllers attempt greater use of control mechanisms in outsourced projects relative to internal projects, yet controls enhance systems development performance in internal projects but not in outsourced projects. We introduce a distinction between attempted control and realized control to explain this disconnect, and show how anticipated transaction hazards motivate the former but meeting specific informational and social prerequisites facilitate the latter. Our results contribute three new insights to the systems development control literature. First, controllers attempt to use controller-driven control mechanisms to a greater degree in outsourced projects but controllee-driven control mechanisms to a greater degree in internal projects. Second, we establish a hitherto-missing control--performance link. The nuanced differences in internal and outsourced projects simultaneously confirm and refute a pervasive assertion in the information systems controls literature that control enhances performance. Finally, we show how requirements volatility--which can be at odds with control--alters the control--performance relationships. Implications for theory and practice are also discussed.
UNDERSTANDING DIGITAL INEQUALITY: COMPARING CONTINUED USE BEHAVIORAL MODELS OF THE SOCIO-ECONOMICALLY ADVANTAGED AND DISADVANTAGED. (MIS Quarterly, 2008)
Authors: Abstract:
    Digital inequality is one of the most critical issues in the knowledge economy. The private and public sectors have devoted tremendous resources to address such inequality, yet the results are inconclusive. Theoretically grounded empirical research is needed both to expand our understanding of digital inequality and to inform effective policy making and intervention. The context of our investigation is a city government project, known as the LaGrange Internet TV initiative, which allowed all city residents to access the Internet via their cable televisions at no additional cost. We examine the residents' post-implementation continued use intentions through a decomposed theory of planned behavior perspective, which is elaborated to include personal network exposure. Differences in the behavioral models between socio-economically advantaged and disadvantaged users who have direct usage experience are theorized and empirically tested. The results reveal distinct behavioral models and isolate the key factors that differentially impact the two groups. The advantaged group has a higher tendency to respond to personal network exposure. Enjoyment and confidence in using information and communication technologies, availability, and perceived behavioral control are more powerful in shaping continued ICT use intention for the disadvantaged. Implications for research and practice are discussed.
Identifying Software Project Risks: An International Delphi Study. (Journal of Management Information Systems, 2001)
Authors: Abstract:
    Advocates of software risk management claim that by identifying and analyzing threats to success (i.e., risks) action can be taken to reduce the chance of failure of a project. The first step in the risk management process is to identify the risk itself, so that appropriate countermeasures can be taken. One problem in this task, however, is that no validated lists are available to help the project manager understand the nature and types of risks typically faced in a software project. This paper represents a first step toward alleviating this problem by developing an authoritative list of common risk factors. We deploy a rigorous data collection method called a "ranking-type" Delphi survey to produce a rank-order list of risk factors. This data collection method is designed to elicit and organize opinions of a panel of experts through iterative, controlled feedback. Three simultaneous surveys were conducted in three different settings: Hong Kong, Finland, and the United States. This was done to broaden our view of the types of risks, rather than relying on the view of a single culture--an aspect that has been ignored in past risk management research. In forming the three panels, we recruited experienced project managers in each country. The paper presents the obtained risk factor list, compares it with other published risk factor lists for completeness and variation, and analyzes common features and differences in risk factor rankings in the three countries. We conclude by discussing implications of our findings for both research and improving risk management practice.
Keeping Mum as the Project Goes Under: Toward an Explanatory Model. (Journal of Management Information Systems, 2001)
Authors: Abstract:
    The problem of "runaway" information systems (IS) projects can be exacerbated by the reluctance of organizational members to transmit negative information concerning a project and its status. Drawing upon relevant bodies of literature, this paper presents a model of the reluctance to report negative project news and develops hypotheses to be tested. An experiment, which was designed to test these hypotheses for both internal and external reporting alternatives, is then described. Two factors are manipulated: (1) the level of impact associated with project failure should an individual fail to report negative information, and (2) the level of observed behavioral wrongdoing associated with the project. The results explain a significant portion of the variance in the reluctance to report negative information and suggest that some differences in internal and external reporting behavior. Implications for research and practice are discussed.
A CROSS-CULTURAL STUDY ON ESCALATION OF COMMITMENT BEHAVIOR IN SOFTWARE PROJECTS. (MIS Quarterly, 2000)
Authors: Abstract:
    One of the most challenging decisions that a manager must confront is whether to continue or abandon a troubled project. Published studies suggest that failing software projects are often allowed to continue for too long before appropriate management action is taken to discontinue or redirect the efforts. The level of sunk cost associated with such projects has been offered as one explanation for this escalation of commitment behavior. What prior studies fail to consider is how concepts from risk-taking theory (such as risk propensity and risk perception) affect decision makers' willingness to continue a project under conditions of sunk cost. To better understand factors that may cause decision makers to continue such projects, this study examines the level of sunk cost together with the risk propensity and risk perception of decision makers. These factors are assessed for cross-cultural robustness using matching laboratory experiments carried out in three cultures (Finland, the Netherlands, and Singapore). With a wider set of explanatory factors than prior studies, we could account for a higher amount of variance in decision makers' willingness to continue a project. The level of sunk cost and the risk perception of decision makers contributed significantly to their willingness to continue a project. Moreover, the risk propensity of decision makers was inversely related to risk perception. This inverse relationship was significantly stronger in Singapore (a low uncertainty avoidance culture) than in Finland and the Netherlands (high uncertainty avoidance cultures). These results reveal that some factors behind decision makers' willingness to continue a project are consistent across cultures while others may be culture-sensitive. Implications of these results for further research and practice are discussed.
DE-ESCALATING INFORMATION TECHNOLOGY PROJECTS: LESSONS FROM THE DENVER INTERNATIONAL AIRPORT. (MIS Quarterly, 2000)
Authors: Abstract:
    Project failure in the information technology area is a costly problem, and troubled projects are not uncommon. In many cases, these projects seem to take on a life of their own, continuing to absorb valuable resources, while failing to deliver any real business value. While prior research has shown that managers can easily become locked into a cycle of escalating commitment to a failing course of action, there has been comparatively little research on de-escalation, or the process of breaking such a cycle. Through de-escalation, troubled projects may be successfully turned around or sensibly abandoned. This study seeks to understand the process of de-escalation and to establish a model for turning around troubled projects that has both theoretical and practical significance. Through a longitudinal case study of the IT-based baggage handling system at Denver International Airport (DIA), we gathered qualitative data on the de-escalation of commitment to a failing course of action, allowing us to inductively develop a model of the de-escalation process as it unfolded at DIA. The model reveals deescalation as a four-phase process: (1) problem recognition, (2) re-examination of prior course of action, (3) search for alternative course of action, and (4) implementing an exit strategy. For each phase of the model, we identified key activities that may enable de-escalation to move forward. Implications of this model for both research and practice are discussed.
WHY SOFTWARE PROJECTS ESCALATE: AN EMPIRICAL ANALYSIS AND TEST OF FOUR THEORETICAL MODELS. (MIS Quarterly, 2000)
Authors: Abstract:
    Software projects can often spiral out of control to become ‘runaway systems’ that far exceed original budget and schedule projections. The behavior that underlies many runaway systems can best be characterized as ‘escalation of commitment to a failing course of action.’ The objectives of this study were to: (1) understand the extent to which IS projects are prone to escalate, (2) compare the outcomes of projects that escalate with those that do not, and (3) test whether constructs associated with different theories of escalation can be used to discriminate between projects that escalate and those that do not A survey was administered to IS audit and control professionals and, to establish a baseline for comparison, the survey was designed to gather data on projects that did not escalate as well as those that did escalate. The results of our research suggest that between 30% and 40% of all IS projects exhibit some degree of escalation. Projects that escalated had project outcomes that were significantly worse in terms of perceived implementation performance and perceived budget/schedule performance, as compared to projects that did not escalate. Using constructs from theories that have been used to explain the escalation phenomenon, we were able to test various logistic regression models for their ability to discriminate between projects that escalate and those that do not. To construct our models, we explored constructs derived from self-justification theory, prospect theory, agency theory, and approach avoidance theory. While constructs derived from all four theories were significant in logistic regression models, the completion effect construct derived from approach avoidance theory provided the best classification of projects, correctly classifying over 70% of both escalated and non-escalated projects.
Turning Around Troubled Software Projects: An Exploratory Study of the Deescalation of Commitment to Failing Courses of Action. (Journal of Management Information Systems, 1999)
Authors: Abstract:
    Project failure in the information systems field is a costly problem and troubled projects are not uncommon. In many cases, whether a troubled project ultimately succeeds or fails depends on the effectiveness of managerial actions taken to turn around or redirect such projects. Before such actions can be taken, however, management must recognize problems and prepare to take appropriate corrective measures. While prior research has identified many factors that contribute to the escalation of commitment to failing courses of action, there has been little research on the factors contributing to the deescalation of commitment. Through deescalation, troubled projects may be successfully turned around or sensibly abandoned. This study seeks to clarify the factors that contribute to software project deescalation and to establish practical guidelines for identifying and managing troubled projects. Through interviews with forty-two IS auditors, the authors gathered both quantitative and qualitative data about the deescalation of commitment to troubled software projects. The interviews sought judgments about the importance of twelve specific factors derived from a review of the literature on deescalation. Interviews also generated qualitative data about specific actors and actions taken to turn troubled projects around. The results indicate that the escalation and deescalation phases of projects manifest different portraits. While there were no factors that always turned projects around, many actors triggered deescalation, and many specific actions accounted for deescalation. In the majority of cases, deescalation was triggered by actors such as senior managers, internal auditors, or external consultants. Deescalation was achieved both by managing existing resources better and by changing the level of resources committed to the project. We summarize the implications of these findings in a process model of project deescalation.
Pulling the Plug: Software Project Management and the Problem of Project Escalation. (MIS Quarterly, 1995)
Authors: Abstract:
    Information technology (IT) projects can fail for any number of reasons and in some cases can result in considerable financial losses for the organizations that undertake them. One pattern of failure that has been observed but seldom studied is the IT project that seems to take on a life of its own, continuing to absorb valuable resources without reaching its objective. A significant number of these projects will ultimately fail, potentially weakening a firm's competitive position while siphoning off resources that could be spent developing and implementing successful systems. The escalation literature provides a promising theoretical base for explaining this type of IT failure. Using a model of escalation based on the literature, a case study of IT project escalation is discussed and analyzed. The results suggest that escalation is promoted by a combination of project, psychological, social, and organizational factors. The managerial implications of these findings are discussed along with prescriptions for how to avoid the problem of escalation.
Understanding Runaway Information Technology Projects: Results from an International Research Program Based on Escalation Theory. (Journal of Management Information Systems, 1994)
Authors: Abstract:
    Information technology (IT) projects can fail for any number of reasons, and can result in considerable financial losses for the organizations that undertake them. One pattern of failure that has been observed but seldom studied is the runaway project that takes on a life of its own. Such projects exhibit characteristics that are consistent with the broader phenomenon known as escalating commitment to a failing course of action. Several theories have been offered to explain this phenomenon, including self-justification theory and the so-called sunk cost effect which can be explained by prospect theory. This paper discusses the results of a series of experiments designed to test whether the phenomenon of escalating commitment could be observed in an IT context. Multiple experiments conducted within and across cultures suggest that a high level of sunk cost may influence decision makers to escalate their commitment to an IT project. In addition to discussing this and other findings from an ongoing stream of research, the paper focuses on the challenges faced in carrying out the experiments.