AIS Logo
Living knowledge for digital leadership
All AI Governance & Ethics Digital Transformation & Innovation Supply Chain & IoT SME & IT Management Platform Ecosystems & Strategy Cybersecurity & Risk AI Applications & Technologies Healthcare & Well-being Digital Work & Collaboration
Processes and Performance in Technology-Enabled Teams: The Mediating Role of Team Ambidexterity

Processes and Performance in Technology-Enabled Teams: The Mediating Role of Team Ambidexterity

Patrícia Martins, France Bélanger, Winnie Picoto
This study investigates how team processes, specifically the use of Information Systems (IS) and coordination, impact team performance in technology-reliant environments. It proposes and tests a model where 'team ambidexterity'—the ability to be both efficient (aligned) and innovative (adaptable)—acts as a crucial intermediary link. The research methodology involved an observational study followed by a quantitative survey of 106 members across 33 teams in a single organization.

Problem Organizations increasingly rely on technology-enabled teams, but it's not always clear how team activities translate into better performance. The research addresses a gap in understanding the complex relationship between what teams do (their processes, like using technology) and what they achieve (their performance). It specifically examines whether an emergent team capability, ambidexterity, is the key factor that explains how processes like IS usage and coordination lead to successful outcomes.

Outcome - Team ambidexterity, the ability to balance efficiency with adaptability, is a critical mediator between team processes and performance.
- Effective team coordination and integrated use of information systems (IS) significantly enhance a team's ambidexterity.
- Higher levels of team ambidexterity, in turn, lead directly to improved team performance.
- Simply focusing on technology usage or coordination in isolation is insufficient; fostering a team's ability to be ambidextrous is essential for boosting performance in technology-enabled settings.
Team Performance, Team Ambidexterity, Technology-Enabled Teams, Team Processes, Team Coordination, Information Systems Usage
Research Perspectives: An Encompassing Framework for Conceptualizing Space in Information Systems: Philosophical Perspectives, Themes, and Concepts

Research Perspectives: An Encompassing Framework for Conceptualizing Space in Information Systems: Philosophical Perspectives, Themes, and Concepts

Amir Haj-Bolouri, Kieran Conboy, Shirley Gregor
This study develops a comprehensive framework to help researchers conceptualize 'space' within the field of Information Systems (IS). Based on an extensive, cross-disciplinary literature review, the paper synthesizes philosophical perspectives and spatial concepts relevant to IS phenomena. The resulting framework organizes the understanding of space into four main themes: representing, differentiating, disclosing, and intuitive space.

Problem The concept of 'space' is crucial for understanding many information systems, from geographical data to virtual worlds. However, research in this field lacks a sophisticated and unified way to think about and define space, which limits the potential for new insights and a deeper understanding of IS phenomena. This study addresses this conceptual gap by creating a structured framework to guide researchers.

Outcome - The study introduces a comprehensive framework for conceptualizing space in Information Systems, built from an extensive cross-disciplinary literature review.
- It identifies and defines four prominent spatial themes: Representing Space (mapping physical/virtual phenomena), Differentiating Space (space as a social construct), Disclosing Space (space as an emergent enabler of phenomena), and Intuitive Space (space as felt or sensed).
- Each theme is systematically linked to underlying philosophical perspectives, key characteristics, and specific spatial concepts, providing a rich analytical tool for researchers.
- The paper demonstrates how the framework can be applied to facilitate expansive analysis, re-vision existing IS phenomena (e.g., smart cities, echo chambers), and enhance review and journal practices in the field.
Space, Information Systems, Philosophy, Conceptualization, Encompassing Framework
Setting Priorities for Exploiting and Exploring Digital Capabilities in a Crisis

Setting Priorities for Exploiting and Exploring Digital Capabilities in a Crisis

Sultana Lubna Alam, Kristijan Mirkovski, Rens Scheepers, Dilal Saundage
This study investigates how organizations should prioritize their digital investments during a crisis. Based on an in-depth analysis of 18 Australian organizations' responses to the COVID-19 pandemic, the paper provides a framework for IT leaders to decide whether to exploit existing digital capabilities or explore new ones.

Problem In times of crisis, organizations rely heavily on their digital capabilities for survival and adaptation. However, IT leaders face the critical dilemma of whether to focus limited resources on making the most of current technologies (exploitation) or investing in new, innovative solutions (exploration), with little guidance on how to make this choice effectively.

Outcome - Organizations should assess their 'starting position' at the onset of a crisis across five key factors: people, cultural, technical, managerial, and financial.
- Based on this assessment, one of three crisis responses should be pursued: 'Survive', 'Survive and Thrive', or 'Thrive and Drive'.
- For a 'Survive' response, organizations should focus exclusively on exploiting existing digital capabilities to maintain operations.
- A 'Survive and Thrive' response requires initially exploiting current capabilities, followed by a later shift toward exploring new ones.
- Organizations in a strong position can pursue a 'Thrive and Drive' response, concurrently exploiting and exploring capabilities, with an increasing focus on exploration as the crisis progresses.
crisis management, digital capabilities, exploitation, exploration, organizational ambidexterity, IT leadership, COVID-19
Assessing Incumbents' Risk of Digital Platform Disruption

Assessing Incumbents' Risk of Digital Platform Disruption

Carmelo Cennamo, Lorenzo Diaferia, Aasha Gaur, Gianluca Salviotti
This study identifies three key market characteristics that make established businesses (incumbents) vulnerable to disruption by digital platforms. Using a qualitative research design examining multiple industries, the authors developed a practical tool for managers to assess their company's specific risk of being disrupted by these new market entrants.

Problem Traditional companies often struggle to understand the unique threat posed by digital platforms, which disrupt entire market structures rather than just introducing new products. This research addresses the need for a systematic way for incumbent firms to identify their specific vulnerabilities and understand how digital platform disruption unfolds in their industry.

Outcome - Digital platforms successfully disrupt markets by exploiting three key characteristics: information inefficiencies (asymmetry, fragmentation, complexity), the modular nature of product/service offerings, and unaddressed diverse customer preferences.
- Disruption occurs in two primary ways: by creating new, more efficient marketplace infrastructures that replace incumbents' marketing channels, and by introducing alternative marketplaces with entirely new offerings that substitute incumbents' core services.
- The paper provides a risk-assessment tool for managers to systematically evaluate their market's exposure to platform disruption based on a detailed set of factors related to information, product modularity, and customer preferences.
digital platforms, disruption, incumbent firms, market architecture, risk assessment, information asymmetry, modularity
Lessons for and from Digital Workplace Transformation in Times of Crisis

Lessons for and from Digital Workplace Transformation in Times of Crisis

Janina Sundermeier
This study analyzes how three companies successfully transformed their workplaces from physical to predominantly digital in response to the Covid-19 pandemic. Through a qualitative case study approach, it identifies four distinct transformation phases and the management practices that enabled the alignment of digital tools, cultural assets, and physical spaces. The research culminates in a practical roadmap for managers to prepare for future crises and design effective post-pandemic workplaces.

Problem The COVID-19 pandemic forced a sudden, massive shift to remote work, a situation for which most companies were unprepared. While some technical infrastructure existed, businesses struggled to efficiently connect distributed teams and accommodate employees' new needs for flexibility. This created an urgent need to understand how to manage a holistic digital workplace transformation that aligns technology, culture, and physical space under crisis conditions.

Outcome - Successful digital workplace transformation occurs in four phases: Inertia, Experimental Repatterning, Leveraging Causation Planning, and Calibration.
- A holistic approach is critical, requiring the strategic alignment of three components: digital tools (technology), cultural assets (organizational culture), and physical office spaces.
- A key challenge is preventing the formation of a 'two-tier' workforce, where in-office employees are perceived as more valued or informed than remote employees.
- The paper offers a roadmap with actionable recommendations, such as encouraging experimentation with technology, ensuring transparent documentation of all work, and redesigning physical offices to serve as hubs for collaboration and events.
digital workplace, digital transformation, crisis management, remote work, hybrid work, organizational culture, case study
How SME Watkins Steel Transformed from Traditional Steel Fabrication to Digital Service Provision

How SME Watkins Steel Transformed from Traditional Steel Fabrication to Digital Service Provision

Friedrich Chasin, Marek Kowalkiewicz, Torsten Gollhardt
This study presents a case study of Watkins Steel, an Australian small and medium-sized enterprise (SME), detailing its successful digital transformation from a traditional steel fabricator to a digital services provider. It introduces and analyzes two key strategic concepts, 'augmentation' and 'adjacency', as a framework for how SMEs can innovate and add new revenue streams without abandoning their core business.

Problem While digital transformation success stories for large corporations are common, there is a significant lack of practical guidance and documented examples for small and medium-sized enterprises (SMEs). This gap leaves many SMEs unaware of the potential of digital technologies and constrained by organizational inertia, hindering their ability to innovate and remain competitive.

Outcome - Watkins Steel successfully transitioned by augmenting its core steel fabrication business with new, high-value digital services like 3D scanning, modeling, and data reporting.
- The study proposes a transformation framework for SMEs based on two concepts: 'digital augmentation' (adding new services) and 'digital adjacency' (leveraging existing assets like customers, data, and skills for these new services).
- Key success factors included contagious leadership from the CEO, embracing business constraints as innovation opportunities, and a customer-centric approach to solving their clients' problems.
- Instead of hiring new talent, Watkins Steel successfully cultivated its own digital experts by empowering existing employees with domain knowledge to learn new skills, fostering a culture of experimentation.
- The transformation allowed the company to move up the value chain, from being a materials provider to coordinating and managing construction processes, creating a more defensible market position.
digital transformation, SME, business model innovation, case study, digital service provision, digital augmentation, digital adjacency
How Everything-as-a-Service Enabled Judo to Become a Billion-Dollar Bank Without Owning IT

How Everything-as-a-Service Enabled Judo to Become a Billion-Dollar Bank Without Owning IT

Christoph F. Breidbach, Amol M. Joshi, Paul P. Maglio, Frederik von Briel, Alex Twigg, Graham Dickens, and Nancy V. Wünderlich
This paper presents a case study on Australian Judo Bank, which successfully implemented an "Everything-as-a-Service" (EaaS) technology strategy. The study analyzes how Judo Bank orchestrated an ecosystem of external IT service providers to build a secure, scalable, and flexible banking platform without owning any IT infrastructure. It describes the benefits, risks, and provides actionable recommendations for other organizations considering an EaaS model.

Problem The Australian banking sector has been traditionally dominated by a few large incumbent banks, creating high barriers to entry and an underserved market for small- and medium-sized enterprises (SMEs). New entrants face significant challenges, including the immense capital expenditure required to build and maintain proprietary IT systems, which stifles competition and innovation in financial services.

Outcome - Judo Bank achieved a billion-dollar valuation and profitability by adopting an EaaS strategy, demonstrating that a bank can operate successfully without owning or managing its own IT infrastructure.
- The EaaS model provided significant benefits, including rapid scalability, operational flexibility, and lower capital expenditure, allowing the bank to focus resources on its core value proposition of relationship banking.
- By becoming a 'service orchestrator' of best-of-breed external solutions, Judo Bank automated back-office processes, enabling its staff to focus on high-value customer interactions.
- The strategy is not without risks, including reliance on third-party viability, market disruptions, and data security, which the bank managed through careful partner selection, robust contracts, and a strong focus on security protocols.
- The case provides a framework for other companies on how to design, manage, and secure an EaaS ecosystem, emphasizing user-centered design and open standards.
Everything-as-a-Service (EaaS), Fintech, Digital Transformation, Cloud Banking, IT Strategy, Service Orchestration, Judo Bank
How Verizon Media Built a Cybersecurity Culture

How Verizon Media Built a Cybersecurity Culture

Keri Pearlson, Josh Schwartz, Sean Sposito, Masha Arbisman
This case study examines how Verizon Media's security organization, known as “The Paranoids,” successfully built a strong cybersecurity culture across its 20,000 employees. The study details the formation and strategy of the Proactive Engagement (PE) Group, which used a data-driven, three-step process involving behavioral goals, metrics, and targeted actions to change employee behavior. This approach moved beyond traditional training to create lasting cultural change.

Problem Human error is a primary cause of cybersecurity breaches, with reports indicating it's involved in up to 85% of incidents. Standard cybersecurity awareness training is often insufficient because employees fail to prioritize security or find security protocols cumbersome. This creates a significant gap where organizations remain vulnerable despite technical defenses, highlighting the need for a deeper cultural shift to make security an ingrained value.

Outcome - The rate of employees having their credentials captured in phishing simulations was cut in half.
- The number of accurately reported phishing attempts by employees doubled.
- The usage of the corporate password manager tripled across the company.
- The initiative successfully shifted the organizational mindset by using transparent dashboards, positive reinforcement, and practical tools rather than relying solely on awareness campaigns.
- The study provides a replicable framework for other organizations to build a security culture by focusing on changing values and beliefs, not just actions.
Cybersecurity Culture, Organizational Behavior, Change Management, Verizon Media, Phishing Simulation, Employee Training, Information Security
Best Practices for Leveraging Data Analytics in Procurement

Best Practices for Leveraging Data Analytics in Procurement

Benjamin B. M. Shao, Robert D. St. Louis, Karen Corral, Ziru Li
This study examines the procurement practices of 15 Fortune 500 companies to understand why most are not fully utilizing data analytics. Through surveys and in-depth interviews, the researchers investigated the primary challenges organizations face in advancing their analytics capabilities. Based on the findings, the paper proposes five best practices executives can follow to derive more value from data analytics in procurement.

Problem Many large organizations are investing in data analytics to improve their procurement functions, but struggle to move beyond basic descriptive reports. This prevents them from achieving significant cost reductions, operational efficiencies, and strategic advantages. The study addresses the gap between the potential of advanced analytics and its current limited application in corporate procurement.

Outcome - Most companies studied had not progressed beyond descriptive analytics (dashboards and visualizations).
- Key challenges include inappropriate data granularity, data cleansing difficulties, reluctance to adopt advanced analytics, and difficulty demonstrating ROI.
- Best Practice 1: Define clear taxonomies and processes for capturing high-quality procurement data.
- Best Practice 2: Hire people with the right mix of technical and business skills and provide them with proper analytics tools.
- Best Practice 3: Establish a clear vision for how data analytics will add value and create a competitive advantage.
- Best Practice 4: Frame requests to analytics teams as business problems to be solved, not just data to be pulled.
- Best Practice 5: Foster close collaboration between the procurement analytics team, the IT department, and the enterprise analytics team.
data analytics, procurement, best practices, supply chain management, analytics hierarchy, business intelligence, strategic sourcing
Self-Sovereign Identity and Verifiable Credentials in Your Digital Wallet

Self-Sovereign Identity and Verifiable Credentials in Your Digital Wallet

Mary Lacity, Erran Carmel
This paper provides an overview of Self-Sovereign Identity (SSI), a decentralized approach for issuing, holding, and verifying digital credentials. Through an analysis of the technology's architecture and a case study of the UK's National Health Service (NHS), the authors explain SSI's business value, implementation, and potential risks for IT leaders.

Problem Current digital identity systems are centralized, meaning individuals lack control over their own credentials like licenses, diplomas, or work histories. This creates inefficiencies for businesses (e.g., slow employee onboarding), high costs associated with password management, and significant cybersecurity risks as centralized databases are prime targets for data breaches and identity theft.

Outcome - Self-Sovereign Identity (SSI) empowers individuals to possess and control their own digital proofs of credentials in a secure digital wallet on their smartphone.
- SSI can dramatically improve business efficiency by streamlining processes like employee onboarding, reducing a multi-day manual verification process to a few minutes, as seen in the NHS case study.
- The technology enhances privacy by enabling data minimization, allowing users to prove a specific attribute (e.g., being over 21) without revealing unnecessary personal information like their full date of birth or address.
- For organizations, SSI reduces cybersecurity risks and costs by eliminating centralized credential databases and the need for password resets.
- While promising, SSI is an emerging technology with risks including the need for widespread ecosystem adoption, the development of sustainable economic models, and ensuring robust cybersecurity for individual wallets.
Self-Sovereign Identity (SSI), Verifiable Credentials, Digital Wallet, Decentralized Identity, Identity Management, Digital Trust, Blockchain
Using Lessons from the COVID-19 Crisis to Move from Traditional to Adaptive IT Governance

Using Lessons from the COVID-19 Crisis to Move from Traditional to Adaptive IT Governance

Heiko Gewald, Heinz-Theo Wagner
This study analyzes how IT governance structures in nine international companies, particularly in regulated industries, were adapted during the COVID-19 crisis. It investigates the shift from rigid, formal governance to more flexible, relational models that enabled rapid decision-making. The paper provides recommendations on how to integrate these crisis-mode efficiencies to create a more adaptive IT governance system for post-crisis operations.

Problem Traditional IT governance systems are often slow, bureaucratic, and focused on control and risk avoidance, which makes them ineffective during a crisis requiring speed and flexibility. The COVID-19 pandemic exposed this weakness, as companies found their existing processes were too rigid to handle the sudden need for digital transformation and remote work. The study addresses how organizations can evolve their governance to be more agile without sacrificing regulatory compliance.

Outcome - Companies successfully adapted during the crisis by adopting leaner decision-making structures with fewer participants.
- The influence of IT experts in decision-making increased significantly, shifting the focus from risk-avoidance to finding the best functional solutions.
- Formal controls were complemented or replaced by relational governance based on social interaction, trust, and collaboration, which proved to be more efficient.
- The paper recommends permanently adopting these changes to create an 'adaptive IT governance' system that balances flexibility with compliance, ultimately delivering more business value.
IT governance, adaptive governance, crisis management, COVID-19, relational governance, formal governance, decision-making structures
Building an Artificial Intelligence Explanation Capability

Building an Artificial Intelligence Explanation Capability

Ida Someh, Barbara H. Wixom, Cynthia M. Beath, Angela Zutavern
This study introduces the concept of an "AI Explanation Capability" (AIX) that companies must develop to successfully implement artificial intelligence. Using case studies from the Australian Taxation Office and General Electric, the paper outlines a framework with four key dimensions (decision tracing, bias remediation, boundary setting, and value formulation) to help organizations address the inherent challenges of AI.

Problem Businesses are increasingly adopting AI but struggle with its distinctive challenges, particularly the "black-box" nature of complex models. This opacity makes it difficult to trust AI, manage risks like algorithmic bias, prevent unintended negative consequences, and prove the technology's business value, ultimately hindering widespread and successful deployment.

Outcome - AI projects present four unique challenges: Model Opacity (the inability to understand a model's inner workings), Model Drift (degrading performance over time), Mindless Actions (acting without context), and the Unproven Nature of AI (difficulty in demonstrating value).
- To overcome these challenges, organizations must build a new organizational competency called an AI Explanation Capability (AIX).
- The AIX capability is comprised of four dimensions: Decision Tracing (making models understandable), Bias Remediation (identifying and fixing unfairness), Boundary Setting (defining safe operating limits for AI), and Value Formulation (articulating and measuring the business value of AI).
- Building this capability requires a company-wide effort, involving domain experts and business leaders alongside data scientists to ensure AI is deployed safely, ethically, and effectively.
AI explanation, explainable AI, AIX capability, model opacity, model drift, AI governance, bias remediation
Key Lessons from Bosch for Incumbent Firms Entering the Platform Economy

Key Lessons from Bosch for Incumbent Firms Entering the Platform Economy

Daniel Hodapp, Florian Hawlitschek, Felix Wortmann, Marco Lang, Oliver Gassmann
This study analyzes eight platform projects within the Bosch Group, a major German engineering and technology company, to understand the challenges established firms face when entering the platform economy. The research identifies common barriers related to business logic, value proposition, and organizational structure. Based on the lessons learned at Bosch, the paper provides actionable recommendations for managers at other incumbent firms.

Problem Established, non-digital native companies (incumbents) often struggle to transition from traditional, linear business models to platform-based models. Their existing structures, processes, and business logic are optimized for internal efficiency and product sales, creating significant barriers when trying to build and scale platforms that rely on external ecosystems and network effects.

Outcome - Incumbent firms face three primary barriers when entering the platform economy: 1) learning the new business logic of platforms, 2) proving the platform's value to internal stakeholders, and 3) building an organization that supports external collaboration.
- To overcome the learning barrier, firms should use personal communication and illustrative analogies of successful platforms to create a common understanding across the organization.
- To prove value, teams should build a minimal viable platform (MVP) early on to demonstrate potential and use key metrics that reflect user engagement, not just registration numbers.
- To build a suitable organization, firms can structure platform initiatives as separate innovation projects or even independent companies to provide the autonomy and external focus needed to build an ecosystem.
platform economy, incumbent firms, digital transformation, business model innovation, case study, Bosch, ecosystem strategy
How Instacart Leveraged Digital Resources for Strategic Advantage

How Instacart Leveraged Digital Resources for Strategic Advantage

Ting Li, Yolande E. Chan, Nadège Levallet
This study analyzes the grocery delivery service Instacart to demonstrate how companies can strategically manage digital resources to gain a competitive edge in a turbulent market. It uses the Instacart case to develop a framework that explains how to navigate the evolving business landscape, create value, and overcome challenges to capturing that value. The paper concludes with five practical recommendations for managers aiming to thrive in the digital world.

Problem In today's digital economy, businesses have access to powerful and versatile digital resources, but many executives struggle to leverage them effectively. Companies often face difficulties in balancing the creation of value for their entire ecosystem (partners, customers) with capturing sufficient value for their own firm. This study addresses the challenge of how to orchestrate digital resources to achieve sustained strategic advantage amidst fast-emerging competitors and complex partnership dynamics.

Outcome - Instacart's success is attributed to four key achievements: simultaneously evolving its digital infrastructure and business model, maintaining 'technology ambidexterity' by both exploiting existing tech and exploring new innovations, dynamically managing knowledge flows from its vast data, and building a flexible relationship portfolio with customers, shoppers, and retail partners.
- Based on the case, the study offers five key actions for managers: 1) Take bold risks, as there are no predefined limits in the digital world; 2) Build resilience by viewing failures as learning experiments; 3) Leverage third-party services to fill internal knowledge and infrastructure gaps; 4) View rivals and partners as a continuum, as these relationships can change quickly; 5) Create future opportunities by making strategic investments in new ventures.
Instacart, digital resources, strategic advantage, platform strategy, value creation, value capture, digital transformation
How Walmart Canada Used Blockchain Technology to Reimagine Freight Invoice Processing

How Walmart Canada Used Blockchain Technology to Reimagine Freight Invoice Processing

Mary C. Lacity, Remko Van Hoek
This case study examines how Walmart Canada implemented a blockchain-enabled solution, DL Freight, to overhaul its freight invoice processing system with its 70 third-party carriers. The paper details the business process reengineering and the adoption of a shared, distributed ledger to automate and streamline transactions between the companies. The goal was to create a single, trusted source of information for all parties involved in a shipment.

Problem Before the new system, up to 70% of freight invoices were disputed, leading to significant delays and high administrative costs for both Walmart Canada and its carriers. The process of reconciling disparate records was manual, time-consuming, and could take weeks or even months, which strained carrier relationships and created substantial financial friction in the supply chain.

Outcome - Drastically reduced disputed invoices from 70% to under 2%.
- Shortened invoice finalization time from weeks or months to within 24 hours of delivery.
- Achieved significant cost savings for Walmart Canada and improved cash flow and financial stability for freight carriers.
- Increased transparency and trust, leading to improved relationships between Walmart and its partners.
- Streamlined the process from a complex 11-step workflow to an efficient 5-step automated one.
Blockchain, Supply Chain Management, Freight Invoice Processing, Walmart Canada, Interfirm Processes, Process Automation, Digital Transformation
How an Incumbent Telecoms Operator Became an IoT Ecosystem Orchestrator

How an Incumbent Telecoms Operator Became an IoT Ecosystem Orchestrator

Christian Marheine, Christian Engel, Andrea Back
This paper presents a case study on how a large, established European telecommunications company, referred to as "TelcoCorp," successfully transitioned into a central role in the Internet of Things (IoT) market. It analyzes the company's journey and strategic decisions in developing its IoT platform and managing a network of partners. The study provides actionable recommendations for other established companies looking to make a similar shift.

Problem Established companies often struggle to adapt their traditional business models to compete in the fast-growing Internet of Things (IoT) landscape, which is dominated by digital platform models. These incumbents face significant challenges in building the right technology, creating a collaborative ecosystem of partners, and co-creating new value for customers. This study addresses the lack of clear guidance on how such companies can overcome these hurdles to become successful IoT leaders or "orchestrators."

Outcome - Established firms can successfully enter the IoT market by acting as an 'ecosystem orchestrator' that manages a network of customers and third-party technology providers.
- A key strategy is to license an existing IoT platform (a 'white-label' approach) rather than building one from scratch, which shortens time-to-market and reduces upfront investment.
- To solve the 'chicken-and-egg' problem of attracting users and developers, incumbents should first leverage their existing customer base to create demand for IoT solutions.
- Successfully moving from a simple technology provider to an orchestrator requires actively coordinating projects, co-financing promising use cases, and establishing clear governance rules for partners.
- A hybrid growth strategy that balances creating custom, industry-specific solutions with developing scalable, generic components proves most effective for long-term growth.
Internet of Things (IoT), Ecosystem Orchestrator, Telecoms Operator, Industry Incumbents, Platform Strategy, Value Co-creation, Case Study
Acquisition of Complementors as a Strategy for Evolving Digital Platform Ecosystems

Acquisition of Complementors as a Strategy for Evolving Digital Platform Ecosystems

Nicola Staub, Kazem Haki, Stephan Aier, Robert Winter, Adolfo Magan
This study examines how digital platform owners can accelerate growth by acquiring 'complementors'—third-party firms that create add-on products and services. Using Salesforce as a prime case study, the research analyzes its successful acquisition strategy to offer practical recommendations for other platform companies on integrating new capabilities and maintaining a coherent ecosystem.

Problem In the fast-paced, 'winner-take-all' world of digital platforms, relying solely on internal innovation is often too slow to maintain a competitive edge. Platform owners face the challenge of rapidly evolving their technology and functionality to meet customer demands. This study addresses how to strategically use acquisitions to incorporate external innovations without creating confusion for customers or disrupting the existing ecosystem.

Outcome - Make acquisitions across all strategic directions of the platform's evolution: extending core technology, expanding functional scope, and widening industry-specific specialization.
- Use acquisitions as a mechanism to either boost existing proprietary products or to initiate the development of entirely new ones.
- Prevent acquisitions from confusing customers by presenting all offerings in a single, comprehensive overview (like Salesforce's 'Customer 360') and actively communicating changes and benefits.
- Adopt a flexible, case-by-case approach to integrating acquired companies, tailoring the technical, branding, and licensing strategies to each specific situation.
digital platforms, platform ecosystems, acquisitions, complementors, Salesforce, business strategy, ecosystem evolution
Models for API Value Generation

Models for API Value Generation

Nigel P. Melville, Rajiv Kohli
This study investigates how non-tech companies can effectively leverage Application Programming Interfaces (APIs) to create business value. Through in-depth case studies of three large firms in the education, distribution, and healthcare sectors, the research identifies and defines three distinct models for API value generation. Each model is characterized by a different combination of investment in people, processes, and technology, offering a unique value proposition.

Problem While APIs are known to enable cost savings, revenue enhancement, and new business models, there is limited understanding of how traditional, non-tech firms actually use them to achieve these benefits. This research addresses the gap by providing clear frameworks that companies can use to assess their API strategy and maturity.

Outcome - The research identified three distinct models for API value generation: the Efficiency Value Model (EVM), the Focused Value Model (FVM), and the Transformed Value Model (TVM).
- The Efficiency Value Model (EVM) is the most basic, focusing on using APIs for internal efficiency gains like faster system integration and application development.
- The Focused Value Model (FVM) is more strategic, involving significant investment in an API infrastructure to drive value in a specific business area, such as e-commerce or supply chain management.
- The Transformed Value Model (TVM) is the most advanced, where an extensive, firm-wide API infrastructure is used to fundamentally change the business, create new services, and lead industry innovation.
- The study concludes that successful API strategy requires a holistic infrastructure encompassing people, processes, and technology, and recommends a series of strategic and tactical actions for firms to develop their API capabilities.
API, API value generation, digital innovation, business value models, API infrastructure, digital transformation, non-tech firms
Load More Showing 72 of 229