Edward W. N. Bernroider

Edward W. N. Bernroider
Vienna University of Economics and Business | WU · Department of Information Systems and Operations

Professor

About

146
Publications
39,299
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,533
Citations
Additional affiliations
January 2001 - December 2007
Vienna University of Economics and Business

Publications

Publications (146)
Article
Full-text available
This study explores whether an Enterprise Resource Planning (ERP) implementation project mediates the relationship between dynamic pre-adoption capabilities and ERP-enabled business improvements. The results from our field survey of large ERP adopters in Austria suggest that the effects of the two out of three selected dynamic capabilities are depe...
Article
Despite the importance of information security, far too many organizations, in particular banks, are facing behavioral information security incidents. In the context given by the headquarters of a large European banking organization, this single case study investigates whether individual behavioral compliance with the information security policy is...
Article
The aim of this paper is to demonstrate whether stakeholders activating a project shape team building, the structure and magnitude of resource investment levels, and to what extent these levels impact ERP project effectiveness. The process view of an ERP project includes project initiation, system justification and funding, implementation, and earl...
Article
The paper investigates how Information Systems (IS) has emerged as the product of inter-disciplinary discourses. The research aim in this study is to better understand diversity in IS research, and the extent to which the diversity of discourse expanded and contracted from 1995 to 2011. Methodologically, we apply a combined citations/co-citations a...
Article
Motivated by scarce academic consideration of project management control frameworks, this article explores usage, value and structure of frameworks with a focus on the popular Control Objectives for IT and related Technology (CobiT) construct. We attempt to add to an empirically validated structure of internal control over IT project management by...
Preprint
Full-text available
Our society increasingly benefits from Artificial Intelligence (AI). Unfortunately, more and more evidence shows that AI is also used for offensive purposes. Prior works have revealed various examples of use cases in which the deployment of AI can lead to violation of security and privacy objectives. No extant work, however, has been able to draw a...
Conference Paper
Full-text available
In the current era of digital transformations, numerous organizations integrate information and communication technologies (ICTs) into their core operations. However, such transformations can lead to novel risks that have to be governed in the face of disruptions. The emergence of a new risk landscape has given rise to new concepts aimed at safegua...
Conference Paper
Full-text available
This study focuses on digital operational resilience (DOR) to ensure the stability of increasingly integrated digital services, which is currently receiving heightened attention due to ongoing environmental crisis situations. Researchers often relate DOR to planning and preparation activities, such as business continuity or disaster recovery planni...
Chapter
Regulatory bodies, driven by enhanced speed of digital transformations, seek to strengthen the resilience of information and communication technologies (ICT) to ensure their operational integrity. As a result, The Digital Operational Resilience Act (DORA) was recently proposed to unify and enhance ICT risk management of financial institutions by re...
Article
Full-text available
Driven by environmental uncertainty, many organizations today attempt to achieve agility at scale. However, given the variety and complexity of these efforts, there is currently a limited understanding in terms of their most relevant configurations, especially over the process of change. Based on an iterative taxonomy development approach grounded...
Conference Paper
COVID-19 has forced universities worldwide to rapidly change their lectures to a distance setting, leaving students to a high degree on their own and engaging in informal learning. In this regard, user-generated content-based Internet platforms (UGC platforms) such as Wikipedia, YouTube, and Facebook provide users with openly accessible support for...
Article
Full-text available
Purpose The purpose of this study is to investigate the role of connective action characterised by interconnection and personal communication on social media (SM) for participating in collective action in the physical world of social movements. Design/methodology/approach A research model is developed integrating different modes of connective acti...
Chapter
Today’s pervasive use of information systems (IS) not only comes with many opportunities but also with considerable risks especially in relation to cyberattacks, which become increasingly sophisticated and dangerous. Especially organizations providing critical infrastructures are at risk, which are held to account by governments to ensure sufficien...
Conference Paper
COVID-19 has forced universities worldwide to rapidly change their lectures to a distance setting, leaving students to a high degree on their own and engaging in informal learning. In this regard, user-generated content-based Internet platforms (UGC platforms) such as Wikipedia, YouTube, and Facebook provide users with openly accessible support for...
Article
Full-text available
Extant research on the control of IS development projects is largely oriented around control choices and enactments from the perspective of managers, thereby neglecting employees’ legitimacy perceptions. Little is known about how such perceptions affect employees’ intentions to comply with controls. To address this shortcoming, we conducted a facto...
Conference Paper
Agile information system development (ISD) projects are often characterized by high levels of information asymmetry, a condition when one party has imperfect information about the other. This condition can negatively affect IS development, especially in the agile context, which promises fast development cycles and the ability to cope with frequentl...
Conference Paper
Full-text available
Managers choose and implement controls to promote employee behavior that contributes to IS development (ISD) project success. Still, ISD project failure rates remain high, suggesting that project controls employed are often not effective. In this regard, existing IS project control research commonly considers how managers configure controls (in ter...
Chapter
Full-text available
Over the past decade, agile scaling concepts in organizations have gained considerable momentum and renewed attention especially from business practice . While agility has its roots in software development, the concept of agile at scale aims at more generally applying agile practices in organizations across different industries. Academic research i...
Article
Full-text available
This study investigates whether balanced forms of organizational cultures moderate the effects of potential and realized absorptive capacities (ACs) to simultaneously generate exploratory and exploitative innovations. Using empirical survey data collected from 138 small to medium-sized enterprises (SMEs), we applied partial least squares (PLS) stru...
Article
Full-text available
Large enterprise resource planning (ERP) programs and their critical success factors (CSFs) have been subject to intensive research in recent years. One of the key challenges is their complexity in terms of their duration, context, and social dynamics. The aim of this study is to investigate these matters with the help of an interpretative case stu...
Article
Full-text available
In organizations, users' compliance with information security policies (ISP) is crucial for minimizing information security (IS) incidents. To improve users' compliance, IS managers have implemented IS awareness (ISA) programs, which are systematically planned interventions to continuously transport security information to a target audience. The un...
Chapter
Full-text available
This study provides a comparative analysis on the relative importance of social information and communication systems (SICS) to acquire and assimilate knowledge in the organizational context. Theoretically, we relate these knowledge processing stages to Potential Absorptive Capacity (PAC). As the usage of SICS to manage knowledge in organizations i...
Conference Paper
This paper describes the development of an information security framework that aims to comparatively assess the quality of management processes in the context of cyber-security of organizations operating within critical infrastructure sectors. A design science approach was applied to establish a framework artifact that consists of the four dimensio...
Article
Decision strategies and the level of cognitive effort humans devote to decision-making are highly sensitive. This study investigates the role of feedback interventions in decision aids (DAs) to direct the user’s attention and consequently increase the level of effort spent on the thinking in multi-attribute selection problems. Guided by four resear...
Conference Paper
Full-text available
Social media have been implicated in the recent social movements in much of the Arab world. This study examines the use of social media (SM) platforms, namely Facebook, YouTube and Twitter, in the movements that took place in Egypt during 2011-2013. In particular, we explore the relative usefulness of SM affordances for each platform and relate to...
Article
The aim of this study is to understand the influence of social information systems (SIS) on absorptive capacity (AC) and innovation in Austrian SMEs. For this purpose, a framework was developed and empirically tested using a nationwide, mixed-mode survey on a random sample of 138 SMEs of knowledge-intensive industries. The results show that the bac...
Conference Paper
Full-text available
Our aim is to understand how information security awareness (ISA) programs affect the intention of employees for compliant information security behavior. We draw on Protection Motivation Theory (PMT) to uncover indirect influences of ISA programs, and seek to identify the extent to which intention translates into actual compliance is contingent on...
Conference Paper
Social Media Analytics has developed into a new research field within information science in the last years. Due to this fact, currently only a few research results about the usage of Social Media Analytics exist. To fill this gap, we conducted an international delphi study among selected higher education institutions (HEIs) in Germany, Austria and...
Article
Although information integration is generally considered beneficial for supply chain management, the performance of supply chain information integration is found with mixed results in both practices and the extant literature. Based on the organizational information processing theory, this study aims to show how the contextual factors pertaining to...
Chapter
The paper investigates how Information Systems (IS) has emerged as the product of interdisciplinary discourses. The research aim in this study is to better understand diversity in IS research, and the extent to which the diversity of discourse expanded and contracted from 1995 to 2011. Methodologically, we apply a combined citations/co-citations an...
Article
This article provides an empirical examination of the Turkish software industry to understand how its current profile, managerial practices and perceptions are shaped by the context of an emerging economy and its cultural background. In comparison to a developed economy with a very different culture, Austria, employees, know-how, and access to new...
Conference Paper
The aim of this paper is to demonstrate whether knowing or applying selected multi-criteria decision support (MCDS) methods make decisions more effective or efficient in the context of IT project proposals. Results from a nationwide empirical survey conducted in Austria (N = 114) show a method diffusion - infusion gap. In other words, many organiza...
Conference Paper
Full-text available
The widespread diffusion of smartphones and their growing importance for private and business use have created new challenges for IS research. This study explores the potential negative effects of smartphone addiction on beliefs and implications for technology use. Using a quantitative survey linking smartphone addiction with technology acceptance,...
Chapter
When making decisions, many people tend to rely on their instinctive choices instead of trusting and adopting those suggested by decision support systems. Feedback interventions can be used to subliminally direct and assist decision makers’ attention to increase the accuracy of the decision. This paper seeks to further develop our understanding of...
Conference Paper
Research on Critical Success Factors (CSFs) for ERP (Enterprise Resource Planning) implementations has paid so far little attention to (1) ERP programs and challenges stemming from interdependent, related projects, and (2) intergroup relations, which are particularly evident in these implementations. We approach this gap and identify CSFs through a...
Conference Paper
Full-text available
This paper provides an exploratory analysis of cultural conflicts that potentially hinder knowledge sharing in the context of cross-national and knowledge-intensive projects including Austrian and Chinese project members. We firstly give an overview of central cultural concepts from a national viewpoint, highlight typical conflicts in projects, and...
Article
Full-text available
of a paper presented at Microscopy and Microanalysis 2013 in Indianapolis, Indiana, USA, August 4 – August 8, 2013.
Article
Full-text available
Immer mehr Unternehmen setzen betriebswirtschaftliche Standardsoftwarepakete wie beispielsweise SAP R/3 oder BaaN ein. Die Auswahl und die Einführung solcher Systeme stellt für die meisten Unternehmen ein strategisch wichtiges IT-Projekt dar, das mit massiven Risiken verbunden ist. Bei der Auswahl des am besten geeigneten Systems gilt es einen Grup...
Article
Motivated by information technology evaluation problems identified in a large public sector organization, we propose how evaluation requirements can be supported by a framework combining different models andmethods from information systems evaluation theory. The article extends the content, context, process perspectives of organizational change wit...
Conference Paper
Full-text available
The aim of this paper is to explore the relative importance of web 2.0 tools for an organizations' ability to identify and assimilate valuable external information. Theoretically, we relate these knowledge processing abilities to organizational absorptive capacity. As the usage of Web 2.0 tools to manage knowledge in organizations is becoming commo...
Conference Paper
The purpose of this research in progress is to analyse bank employee risk behaviour concerning IT operational risks in Austrian banks. The two-staged empirical study focuses on the role of IT risk culture and internal controls in relation to employee risk behaviour and the effectiveness of different awareness building practices in banking companies...
Conference Paper
The aim of this research is to discover practical insights and suitable methods to effectively manage IT operational risk in Austrian banking companies. We applied an exploratory case study approach and data were conducted using semi-structured face-to-face interviews with senior risk managers. The findings further improve our understanding of how...
Article
Full-text available
This paper aims to shed light on the dynamics of information systems (IS) as a discipline in the making. We use the ideas of the sociologist Abbott to propose three different stages of a discipline’s development: differentiation, competition, and absorption. These stages reflect how disciplines go through different cycles and how they acquire, cons...
Conference Paper
Full-text available
Experience driven behaviors depend on the spatio-temporal variation in the activity pattern of cortical neurons in the brain. This variation builds on those cellular properties that specify single nerve cells within the enormous complexity of their connections, their synaptic plasticities (i.e. experience dependent changes of synaptic contacts) and...
Article
Although Operational Research (OR) has successfully provided many methodologies to address complex decision problems, in particular based on the rationality principle, there has been too little discussion regarding their limited consideration in IT evaluation practice and associated decision making satisfaction levels in an organisational context....
Conference Paper
Full-text available
This paper seeks to tackle the current confusion about the constituent dimensions of IT Governance (ITG) and inconsistent operationalisation approaches inhibiting advances in research and organisational ITG practice. Through a structured literature review of ranked high-quality publications augmented by a meta-case study with five underlying projec...
Chapter
Full-text available
Morphometric SEM 3D analysis is currently used to analyze (a) the geometry of microvascular trees in terms of vascular parameters (i.e. diameters, interbranching distances, branching angles and intervascular distances) and (b) to determine bifurcation indices, asymmetry- and area ratios given in arterial bifurcations respectively in venous mergings...
Article
Full-text available
This article investigates Enterprise Resource Planning absorption in transition and developed economies in Central and Eastern Europe. Using absorptive capacity theory and data envelopment analysis, we view organizational transformation in Enterprise Resource Planning absorption as an economic production process. Despite converging Enterprise Resou...
Article
This article seeks to enhance acceptance of the profile distance method (PDM) in decision support systems. The PDMis amultiple attributive-based decision making as well as a multiple method approach to support complex decision making and uses a heuristic to avoid computationally complex global optimization.We elaborate on the usability of themethod...
Conference Paper
This paper investigates methods for assessing IT induced business transformations based on a quantitative empirical Austrian study. We show that decision makers are gaining more information about methods but are not equally applying their knowledge in practice. We observed a noticeable gap between levels of diffusion (known) and infusion (used) of...
Conference Paper
This article strives to support research and practice in the application of decision and valuation models to IT infrastructure projects in public administration. The aim is to present the elements needed to flexibly embrace evaluation structure, management and quantification methods. We sketch how different models can work together in a complementa...
Conference Paper
This paper seeks to improve usability and semantics of complex decision support based on multiple criteria and data envelopment analysis using the profile distance method. We recognize the need of decision making practice for more intuitive and understandable decision support in complex and comprehensive settings by proposing three areas for improv...
Article
Full-text available
In this paper we demonstrate how the profile distance method was transformed into a software environment enabling the decision maker to utilize a complex decision making tool without any advanced knowledge of the underlying mathematical and technical features. We present theoretical and technical aspects as well as contextual and usage related info...
Conference Paper
Motivated by a rising demand for feasible and practical decision aids this article relaxes the need for complete pairwise comparisons in Analytic Hierarchy Process (AHP) based approaches regularly applied in multiple criteria decision making practice. We propose a method based on the k-walk procedure from Graph Theory to extract a weighted ranking...
Conference Paper
This pilot study involves an investigation into how organisations learn in a social sector environment in the Caribbean. The purpose of this paper is two-fold. First it explores the relationship between perceptions of new knowledge in relation to exploratory learning. Second, it outlines emerging issues for further research. Exploratory learning is...
Conference Paper
To many, information systems has become an autonomous discipline that offers a number of concepts, methods and techniques to deal with problems related to the implementation of information systems in organisations. Despite the diversity of these and their use in practice, there is still a need to clarify where we are in terms of becoming a discipli...
Conference Paper
One of the most complex and problematic issues in Information Systems and Accounting is the design of effective control systems to prevent failures of business processes and fraud in enterprises. Recent examples of failures include banks where direct debit payments default or fail, incorrect cheque and reference numbers are processed, or Personal I...
Conference Paper
This paper documents the effect of expended resources, committed time and implemented level of functionality in Enterprise Resource Planning (ERP) projects on success measures comprising system quality, information quality, service quality, net benefits, and financial consequences for the organisation. The measurement dimensions of ERP success clos...
Conference Paper
Full-text available
This research report provides preliminary results in terms of ERP system selection criteria across five European Union countries based on empirical studies. The paper provides a structured list of decision making criteria considered in ERP decisions and contrasts weights as well as achievement levels across countries. Research was guided by the Del...
Article
I investigated the role of IT governance in driving the success of ERP projects. The tool for assessing ERP value was a comprehensive, multivariate and validated model adapted from the widely used Delone and McLean model of IS success. This showed that ERP investments were more effective in organizations having an IT governance domain consisting of...
Article
This article provides insights into e-marketing utilisation in terms of Business-to-Consumer (B2C) e-business in conjunction with endogenous success factors and business performance-related criteria for Austrian micro and small to medium software enterprises (MEs and SMEs). The exploratory analysis is based on primary data collected from 141 Austri...
Conference Paper
This paper examines Business Process Management tools with a multiple attributive assessment framework based on the utility ranking and AHP method. It supplies a comprehensive list of eligible criteria for the assessment and provides a comparative analysis in terms of their features and development focus in relation to a commercial market leader (A...
Chapter
The use of ICT in the Austrian judicial system can be described as widespread. Currently, a plethora of different benchmarking studies have been published ranking different countries according to their e-government readiness or maturity, but they are inconclusive, so no results are given here. For discussion of these studies, see for example Lee, T...
Chapter
Enterprise resource planning (ERP) projects are highly complex information technology (IT) based business initiatives that should be grounded on a strategic infrastructure decision adding value to the firms’ IT infrastructure capability. Not every ERP project is seen in this sense and research has placed a focus on the more technical viewpoint of E...
Chapter
Full-text available
The evaluation of investments in information systems (IS) is usually based on conflicting criteria applied to the available alternatives, and the results are aggregated into a single ranking. The aggregation process is regularly complicated and biased through the usage of criteria weights. This article simply suggests avoiding the weighting process...
Article
In this article we introduce a comprehensive yet efficient approach based on data envelopment analysis (DEA) with restricted multipliers for accountable and understandable multiple attribute decision making (MADM). Information system (IS) appraisals are motivated and used for illustrating the proposed methodology. Results show that the given DEA ba...
Article
Full-text available
This research article is set against the background of Enterprise Resource Planning (ERP) as a solution to address operational and technical integration to support daily operations. It aims at characterising ERP projects by their reasons for initiation in particular considering integration criteria and at highlighting connecting implementation cons...
Chapter
This article focuses on decision making for Information System (IS) selection, in particular in the context of business applications. The complexity of business IS is increasing continuously, covering a wide range of different aspects. These aspects can be adequately covered by multiple criteria in decision making methods, which have been developed...
Article
This article addresses the area of decision making for information systems (IS). We recognize the great demand for methods and techniques that can be of practical help by presenting a new, conceptual approach, the profile distance method, to support the IS selection problem. This approach combines the merits of two prominent concepts individually a...
Conference Paper
Full-text available
This paper targets the area of business Information System (IS) decision making, where accountable and understandable decision support is needed for all involved stakeholders. When information systems investments are evaluated based on applying different dimensions or attributes to the available alternatives the results have to be consolidated into...
Article
Full-text available
This article elaborates on the applicability of basic and extended data envelopment analysis (DEA) models for various information system (IS) decision use-cases including illustrative examples from an enterprise resource planning (ERP) software investment appraisal. The usage of data envelopment analysis models and their extensions for IS decisions...
Article
Durch die zunehmende Verbreitung des IT- und Geschäftsprozess-Outsourcings gewinnt das Management der Outsourcing-Beziehungen an Bedeutung. Die ausgelagerten Prozesse sind auf Grundlage eines von allen Beteiligten akzeptierten Qualitätsbegriffs durch Standards und Prozeduren zur Qualitätssicherung und -kontrolle zu begleiten. Der Beitrag zeigt anha...
Article
Full-text available
This article assesses key aspects of IT governance comprising strategic planning especially alignment, value delivery, and control objectives through an empirical study of Austrian medium sized and large enterprises. Enterprise Resource Planning (ERP) systems are in general seen as key information systems supporting e -business processes. The findi...
Article
Realising information technology (IT) decisions and implementations are consistently seen as major challenges of business management faced with increasingly complex IT environments. This article seeks to increase the awareness of the multiple attributive decision making methodology (MADM) in the context of enterprise resource planning (ERP) project...
Conference Paper
Full-text available
Simulations preserve the knowledge of complex dynamic systems and consequently transfer the knowledge of the cohesions of it s elements to a specified target group. As the progress in information technology and therefore the dynamic e-business driven economy adapts even faster to the business demands, new ways to preserve this growing amount of kno...