Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Laurie J. Kirsch is active.

Publication


Featured researches published by Laurie J. Kirsch.


Management Information Systems Quarterly | 2005

Antecedents of knowledge transfer from consultants to clients in enterprise system implementations

Dong-Gil Ko; Laurie J. Kirsch; William R. King

Enterprise resource planning (ERP) systems and other complex information systems represent critical organizational resources. For such systems, firms typically use consultants to aid in the implementation process. Client firms expect consultants to transfer their implementation knowledge to their employees so that they can contribute to successful implementations and learn to maintain the systems independent of the consultants. This study examines the antecedents of knowledge transfer in the context of such an interfirm complex information systems implementation environment. Drawing from the knowledge transfer, information systems, and communication literatures, an integrated theoretical model is developed that posits that knowledge transfer is influenced by knowledge-related, motivational, and communication-related factors. Data were collected from consultant-and-client matched-pair samples from 96 ERP implementation projects. Unlike most prior studies, a behavioral measure of knowledge transfer that incorporates the application of knowledge was used. The analysis suggests that all three groups of factors influence knowledge transfer, and provides support for 9 of the 13 hypotheses. The analysis also confirms two mediating relationships. These results (1) adapt prior research, primarily done in non-IS contexts, to the ERP implementation context, (2) enhance prior findings by confirming the significance of an antecedent that has previously shown mixed results, and (3) incorporate new IS-related constructs and measures in developing an integrated model that should be broadly applicable to the interfirm IS implementation context and other IS situations. Managerial and research implications are discussed.


Management Science | 2002

Controlling Information Systems Development Projects: The View from the Client

Laurie J. Kirsch; Vallabh Sambamurthy; Dong-Gil Ko; Russell L. Purvis

Increasingly, business clients are actively leading information systems (IS) projects, often in collaboration with IS professionals, and they are exercising a greater degree of project control. Control is defined as all attempts to motivate individuals to achieve desired objectives, and it can be exercised via formal and informal modes. Much of the previous research investigating the choice of control mode has focused on direct reporting relationships between IS project leaders and their superiors in a hierarchical setting. However, the client-IS relationships may take on a variety of forms, including both hierarchical and lateral settings. Moreover, prior research has found that the knowledge of the systems development process is a key antecedent of control, yet clients are unlikely to be as knowledgeable as IS professionals about this process. It is therefore unclear whether prior findings will generalize to the client-IS pair, and the goal of this research is to examine the exercise of control across this relationship. Data were gathered from a questionnaire survey of 69 pairs of clients and IS project leaders. The results are largely consistent with prior research on the antecedents offormal control modes, but they shed new insight on the choice ofinformal control modes.


European Journal of Information Systems | 2009

If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security

Scott R. Boss; Laurie J. Kirsch; Ingo Angermeier; Raymond Shingler; R. Wayne Boss

Information security has become increasingly important to organizations. Despite the prevalence of technical security measures, individual employees remain the key link – and frequently the weakest link – in corporate defenses. When individuals choose to disregard security policies and procedures, the organization is at risk. How, then, can organizations motivate their employees to follow security guidelines? Using an organizational control lens, we build a model to explain individual information security precaution-taking behavior. Specific hypotheses are developed and tested using a field survey. We examine elements of control and introduce the concept of ‘mandatoriness,’ which we define as the degree to which individuals perceive that compliance with existing security policies and procedures is compulsory or expected by organizational management. We find that the acts of specifying policies and evaluating behaviors are effective in convincing individuals that security policies are mandatory. The perception of mandatoriness is effective in motivating individuals to take security precautions, thus if individuals believe that management watches, they will comply.


Information Systems Research | 2008

Predictors of Formal Control Usage in IT Outsourcing Partnerships

Sandeep Rustagi; William R. King; Laurie J. Kirsch

Client control over the vendor has been identified as a critical factor in successfully managing information technology outsourcing relationships. Though prior studies have suggested that “how much” control is exercised has significant ramifications for individuals and firms, relatively few studies have operationalized and studied this important concept. In this study, we define the amount of formal control as the variety of mechanisms used by a client to exercise control over a vendor and the extent to which the mechanisms are used. We use literature on transaction cost economics and organizational control to build a model of the antecedents of the amount of formal control. The study uses data from 138 client-vendor matched pairs working in eight large, long-term, ongoing outsourcing arrangements to test specific hypotheses. The results suggest that clients who have technical or relationship management knowledge, or have high levels of trust in their vendors, use formal control mechanisms to a lesser extent. On the other hand, task uncertainty was found to be positively associated with the amount of formal control, and the degree of core competency involved in the outsourced activity was not found to be related to the amount of formal control. These results are discussed, and implications for research and practice are drawn.


Organization Science | 2010

Investigating the Antecedents of Team-Based Clan Control: Adding Social Capital as a Predictor

Laurie J. Kirsch; Dong-Gil Ko; Mark H. Haney

Organizations are increasingly relying on team-based structures as work becomes more complex, nonroutine, and knowledge intensive. Teams comprised of individuals with diverse skills and expertise may be well suited to perform such work. However, as teams become more prevalent, organizations may struggle with ways to exercise control. Formal controls, with their focus on prespecified rules, performance targets, and hierarchical relationships, may be less effective in a teamwork environment than clan control, in which work-related behavior is motivated by shared norms and values, as well as a common vision, and individuals attempt to be accepted or “regular” members of a team. However, little is known about the antecedents of clan control. Much of the existing empirical research on the antecedents of control has been influenced by Ouchis (Ouchi, W. G. 1977. The relationship between organizational structure and organizational control. Admin. Sci. Quart.22 95--113) framework, which posits clan control is used when managers lack knowledge of means--ends relationships and are unable to measure outcomes. This paper adopts the view that clan control is a “people” or social process and argues that social capital, a construct that reflects connections and relationships among individuals, is a missing, key antecedent of clan control. In particular, we posit that the existence of social capital enables team members, as well as project managers, to facilitate clan control within a team, i.e., team-based clan control. A model is developed and hypotheses are tested using survey data collected from 95 information systems project teams. The results suggest that social capital assets are associated with team-based clan control. Recognizing that the project manager typically has a different level of organizational authority than team members, additional hypotheses are developed relating characteristics of the project manager to team-based clan control. The results of these tests suggest that team-based clan control is also dependent on the managers knowledge of business processes and the application area, coupled with the extent to which he observes the behaviors of the project team. Thus, our results suggest that there are conditions under which team-based clan control is facilitated by the project team as a whole (including team members and project managers), as well as conditions under which team-based clan control is facilitated by project managers in their role as team leaders. Implications and suggestions for future work are discussed.


Decision Sciences | 2000

An Integrative Framework of the Information Systems Development Process

Vallabh Sambamurthy; Laurie J. Kirsch

Despite more than 25 years of research on the processes and outcomes of information systems development in organizations, deficiencies exist in our knowledge about the effective management of complex systems development processes. Although individual studies have generated a wealth of findings, there is a need for a cumulative framework that facilitates interpretation of what has been learned and what needs to be learned about the process of information systems development. This paper reviews prior research on ISD processes and identifies the different types of contributions that have been made to our growing knowledge. More important, it generates a cumulative framework for understanding the process of ISD that could provide a valuable template for future research and practice.


Information Systems Research | 2006

The Effectiveness of Knowledge Transfer Portfolios in Software Process Improvement: A Field Study

Sandra A. Slaughter; Laurie J. Kirsch

Because of challenges often experienced when deploying software, many firms have embarked on software process improvement (SPI) initiatives. Critical to the success of these initiatives is the transfer of knowledge across individuals who occupy a range of roles in various organizational units involved in software production. Prior research suggests that a portfolio of different mechanisms, employed frequently, can be required for effective knowledge transfer. However, little research exists that examines under what situations differing portfolios of mechanisms are selected. Further, it is not clear how effective different portfolio designs are. In this study, we conceptualize knowledge transfer portfolios in terms of their composition (the types of mechanisms used) and their intensity (the frequency with which the mechanisms are utilized). We hypothesize the influence of organizational design decisions on the composition and intensity of knowledge transfer portfolios for SPI. We then posit how the composition and intensity of knowledge transfer portfolios affect performance improvement. Our findings indicate that a more intense portfolio of knowledge transfer mechanisms is used when the source and recipient are proximate, when they are in a hierarchical relationship, or when they work in different units. Further, a source and recipient select direction-based portfolios when they are farther apart, in a hierarchical relationship, or work in different units. In terms of performance, our results reveal that the fit between the composition and intensity of the knowledge transfer portfolio influences the recipients performance improvement. At lower levels of intensity direction-based portfolios are more effective, while at higher levels of intensity routine-based portfolios yield the highest performance improvement. We discuss the implications of our findings for researchers and for managers who want to promote knowledge transfer to improve software processes in their organizations.


decision support systems | 2008

A decision support system for managing inventory at GlaxoSmithKline

Jennifer Shang; Pandu R. Tadikamalla; Laurie J. Kirsch; Lawrence H. Brown

Firms often turn to supply chain software to streamline and standardize operations. A challenge is how to best utilize the data provided by the software. One approach is to import the data into Decision Support Systems (DSS) to build special-purposed decision aids. This paper presents an effective inventory management model for GlaxoSmithKline (GSK). The DSS effectively determines the safety stock level and the number of weeks forward coverage (WFC) for each SKU (Stock Keeping Unit). We discuss GSKs experiences relative to the literature on DSS design, implementation, and usage. This research shows implementing the proposed decision support system would provide GSK a distinct competitive advantage. However, careful implementation is necessary to fully realize the potential of the DSS.


Journal of Strategic Information Systems | 2006

Requirements determination for common systems : turning a global vision into a local reality

Laurie J. Kirsch; Mark H. Haney

Abstract A ‘common’ information system is one that is intended to satisfy the needs of multiple user groups within a firm for a particular functionality (e.g. one order entry system to be used by all divisions of a global firm). Such systems are often comprised of both core (or common) software modules, as well as local modules to support regional requirements. One of the most significant challenges for any information systems (IS) project is determining information requirements. The requirements determination process is especially difficult in this context in which common, global requirements must be forged from disparate, and potentially conflicting, local needs and priorities. This paper reports on case studies of two projects undertaken to globally deploy common systems, and it develops a model of the requirements determination process. The proposed model posits stakeholders engage in knowledge acquisition and negotiation processes in order to determine global requirements as well as to foster consensus and buy-in, on the part of the local regional stakeholders, to the global system. The findings also suggest that knowledge acquisition is a relatively structured, rational approach to learning about local needs and requirements, where stakeholders share an awareness of the corporate vision for global standards and agree on the need for a new system. Negotiation, in contrast, is less structured and more political, with different parties lobbying for their own interests as they endeavor to identify common requirements for the new global system. Finally, the results suggest that the requirements determination process is influenced by an articulated corporate vision for a global system, needs and priorities of the local regions, and the organizational roles and skills of key stakeholders. Implications of the results are drawn and suggestions for future research are offered.


Information Systems Research | 2016

Facilitating the Transformational: An Exploration of Control in Cyberinfrastructure Projects and the Discovery of Field Control

Gregory D. Moody; Laurie J. Kirsch; Sandra A. Slaughter; Brian Kimball Dunn; Qin Weng

Emerging from rapid advances in digitization and technological capabilities is a new form of information systems development project: cyber projects. Cyber projects are complex, massive, and ambitious, often involving hundreds of academic, government, and industry professionals, requiring years of development, and costing millions of dollars. In our study, we examine how control is exercised in cyber projects. Based on a longitudinal study over eight years, we develop a process theory of the control of cyber projects. Initially we observe that project control is driven by the field, i.e., all of the individual or collective entities that subscribe to the general purpose of the project. This form of control is later replaced by a more bureaucratic form from government-sponsored entities to ensure that traditional project objectives are met. Once construction begins and the field understands the implications and promise of the project, we observe that control is again exerted by the primary project users in the field, complemented by authority-based control exerted by the government-sponsored entisty in the field.

Collaboration


Dive into the Laurie J. Kirsch's collaboration.

Top Co-Authors

Avatar

Sandra A. Slaughter

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Mark H. Haney

University of Pittsburgh

View shared research outputs
Top Co-Authors

Avatar

Dong-Gil Ko

Indiana University Bloomington

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ingo Angermeier

Spartanburg Regional Medical Center

View shared research outputs
Top Co-Authors

Avatar

R. Wayne Boss

University of Colorado Boulder

View shared research outputs
Researchain Logo
Decentralizing Knowledge