Susanne Strahringer

Susanne Strahringer
Technische Universität Dresden | TUD · Lehrstuhl Wirtschaftsinformatik

Dr. rer. pol. Dipl.-Wirtsch.-Inf.

About

183
Publications
55,637
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
797
Citations
Introduction
Susanne Strahringer currently works at the Lehrstuhl Wirtschaftsinformatik, Technische Universität Dresden. Susanne does research in Information Systems, Business Administration, and Computer Science.
Additional affiliations
August 2007 - January 2016
Technische Universität Dresden
Position
  • Professor (Full)

Publications

Publications (183)
Article
This is a book review of 'Digitalization Cases Vol. 2 – Mastering Digital Transformation for Global Business' edited by Nils Urbach, Maximilian Röglinger, Karlheinz Kautz, Rose Alinda Alias, Carol Saunders, Martin Wiener. The volume presents 20 case studies in the context of digitization from four continents organized into three topical themes – Di...
Article
Full-text available
We conceptualize the new phenomenon of the Fractional Chief Information Officer (CIO) as a part-time executive who usually works for more than one primarily small- to medium-sized enterprise (SME) and develop promising avenues for future research on Fractional CIOs. We conduct an empirical study by drawing on semi-structured interviews with 40 indi...
Conference Paper
When done right, the use of low code development promises a significant competitive advantage in the software development process for organizations. Thus, multiple vendors have created low code development platforms to ease the use of low code development. However, current research on low code development platforms mainly focuses on the technologic...
Conference Paper
Full-text available
Over the last years, configurational research has become increasingly popular in the Information Systems (IS) discipline. Researchers value configurational methods like Qualitative Comparative Analysis (QCA) as their application contributes to a better understanding of complex phenomena. QCA helps to uncover interrelations of conditions that lead t...
Article
Full-text available
Zusammenfassung Trotz der Relevanz und des Reifegrads des Forschungsbereichs Chief Information Officer (CIO) gibt es nur wenige Studien, die den aktuellen Wissensstand objektiv und umfänglich zusammenfassen. Die vorliegende Arbeit schließt diese Forschungslücke und präsentiert eine umfassende Literaturübersicht über das CIO-Forschungsfeld unter Ver...
Preprint
Full-text available
Despite the relevance and maturity of the Chief Information Officer (CIO) research field, no studies exist that exhaustively summarize the current body of knowledge, focusing on the development of the field over its entire timespan. The paper at hand addresses this research gap and presents an exhaustive literature review on the CIO research field...
Article
When higher-level management of a company has strategically decided to adopt Platform-as-a-Service (PaaS) as a Cloud Computing (CC) delivery model, decision-makers at lower hierarchy levels still need to decide whether they want to post-adopt PaaS for building or running an information system (IS) – a decision that numerous companies are currently...
Preprint
Full-text available
The transition towards services has been imperative for manufacturing firms for years. The change from a productoriented to a more service-dominant business model affects the organizational structure of firms. However, literature provides limited insights into how manufacturing firms organize themselves in this transition. Even though digital techn...
Conference Paper
Full-text available
Due to technological advances, IT is increasingly introduced and managed outside of (or even hidden from) an organisation's IT department. As a result, researchers and practitioners have created multiple concepts describing different facets and trends of this development. While the individual concepts typically focus on different aspects, there are...
Article
This paper analyzes the usage of vignettes as a narrative form in information systems (IS) research. A review of 48 papers from IS top journals with 119 vignettes exposes the versatile usage of vignettes as a narrative form and shows their usefulness in research communication. The paper conceptualizes vignette usage through a taxonomy and archetype...
Article
The publication discusses the adaptation of dedicated known methods for structured content analysis for the usage of smartphone apps, taking into account the specifics of these dynamic media types and resulting consequences for the procedure and content rating. The background is the increasing popularity of apps and the growing demand for precise a...
Article
This paper identifies critical success factors of Business-managed IT based on case study results. Four groups of critical success factors emerge: (1) general approach to Business-managed IT/Business-managed IT strategy, (2) Business-managed IT project prerequisites/Business-managed IT team, (3) Business-managed IT project execution and outcome, an...
Conference Paper
Full-text available
This paper connects research from business model innovation and information systems by exploring critical IT capabilities for servitized business models. The adoption of servitized business models is a major business model innovation strategy. At the same time, digitalization drives the evolution of IT capabilities at these business models. Scholar...
Conference Paper
Full-text available
Cloud brokers are intermediaries supporting the evaluation, selection, and implementation of cloud services. Especially small and medium-sized enterprises with limited technical competencies struggle with a complex and non-transparent market, selecting and combining services from different cloud service providers. They need guidance in the pre-adop...
Article
The introduction of smart metering in Germany is gaining momentum due to legislative and regulatory foundations and will generate valuable data in the future. Smartphone apps play an important role as an established user interface for evaluating the electricity consumption of private consumers. In this context, we provide a market overview of exist...
Article
Research on cloud computing (CC) has emerged in recent years as the technology has become increasingly important for organizations. As such, practitioners have found it difficult to easily identify what determines CC adoption based on the numerous papers in this regard. Moreover, to add value, further research in the field should identify what rese...
Article
Full-text available
Zusammenfassung Datengetriebene Geschäftsmodelle (DGGM) vereinen zwei zentrale Trends des digitalen Zeitalters: die steigende Bedeutung von („Big“-)Daten und den zunehmenden Fokus auf das Geschäftsmodell als zentrale Gestaltungsebene. Nichtsdestotrotz sind die konzeptuellen Grundlagen und spezifischen Eigenschaften entsprechender Geschäftsmodelle b...
Conference Paper
Full-text available
Phenomena like the digital transformation lead to constantly changing economic requirements for companies and their underlying business models. The concept of an innovation capability maturity model is a possible approach to adapt to these changes by presenting solutions for the improvement of innovation potential, which in turn leads to higher tur...
Conference Paper
Full-text available
Most large-scale organizations adopted Cloud Computing (CC) on a company level in recent years. Managers now face the challenge to appropriately implement CC "operationally", i.e., for information systems (ISs). We refer to this as post-adoption, addressing the extent of technology usage after adoption. Specifically, managers need to choose among t...
Conference Paper
This paper connects research from business model innovation and information systems by exploring critical IT capabilities for servitized business models. The adoption of servitized business models is a major business model innovation strategy. At the same time, digitalization drives the evolution of IT capabilities at these business models. Scholar...
Article
In this paper, we present design principles for business domain-specific e-collaboration (BDSpeC) – a concept that focuses on integrating e-collaboration into the core processes of particular business domains and the corresponding transactional enterprise systems (ESs) supporting these core processes. These principles are based on our research resu...
Article
Full-text available
Zusammenfassung IT-Backsourcing bezeichnet die Re-Integration vormals outgesourcter IT-Services zurück zum auslagernden Unternehmen. Die vorliegende Studie stellt die Ergebnisse einer Umfrage unter IT-Managern zu Einflussfaktoren von IT-Backsourcing-Entscheidungen vor. Es lässt sich feststellen, dass IT-Backsourcing von Unternehmen in unterschiedli...
Article
Purpose IT outsourcing (ITO) has developed into an established practice for organizations but the interorganizational and oftentimes international collaboration it involves comes at a price: Reports from academia and practice suggest that more than 25% of all ITO projects fail, many because of cultural differences between client and provider organi...
Conference Paper
Full-text available
Today, information technology (IT) is not anymore solely deployed and maintained by the IT organization, but also by business units. IT deployed or managed by business units is called Shadow IT (without alignment with the IT organization) or Business-managed IT (in alignment or a split responsibility model with the IT organization), contrasting "cl...
Conference Paper
"In the era of digitalization, companies review how to build competitive advantage drawing on their capabilities. In this context, the paper revisits the concept of IT capabilities. We summarize the “canonical” body of literature to characterize how leading scholars conceptualized and differentiated IT capabilities and then we show how new types of...
Article
Full-text available
Shadow IT describes covert/hidden IT systems that are managed by business entities themselves. Additionally, there are also overt forms in practice, so-called Business- managed IT, which share most of the characteristics of Shadow IT. To better understand this phenomenon, we interviewed 29 executive IT managers about positive and negative cases of...
Article
Full-text available
Zusammenfassung Ganz im Sinne der Zeitschrift HMD – Praxis der Wirtschaftsinformatik existiert in Deutschland neben anderen Ausrichtungen auch eine explizit auf Praxisorientierung ausgerichtete Wirtschaftsinformatikforschung. Dieser Beitrag behandelt aus verschiedenen Blickwinkeln deren Entwicklungen und Strömungen. Im Mittelpunkt stehen Forschungs...
Chapter
When it comes to the economic and strategic development of companies, maturity models are regarded as silver bullets. However, the existing discrepancy between the large amount of existing, differently developed models and their rare application remains astonishing. We focus on this phenomenon by analyzing the models’ interpretability and possible...
Chapter
Full-text available
Finding and comparing appropriate cloud services that best fit cloud service consumer requirements can be a complex, time-consuming and cost-intensive process, especially for small and medium-sized enterprises. Since there is no “one-fits-all” cloud service provider, companies face the challenge of selecting and combining services from different ve...
Conference Paper
This paper is directed towards IT executives aiming to promote the adoption of cloud computing (CC) within their company. We conducted a longitudinal case study on the evolving CC strategy and its implementation at the multinational company Continental, based on a previous case study by Loebbecke et al. (2012). We narrate Continental's pathway towa...
Article
With the growing importance of IT as competitive advantage, companies aim to increase their digital transformation activities. Consequently, companies are also revisiting their existing IT sourcing arrangements. In the article at hand, the authors explore the concept of IT backsourcing by presenting the results from a quantitative online survey wit...
Article
Two concepts describe the autonomous deployment of IT by business entities: Shadow IT and Business-managed IT. Shadow IT is deployed covertly, that is, software, hardware, or IT services created/procured or managed by business entities without alignment with the IT organization. In contrast, Business-managed IT describes the overt deployment of IT,...
Chapter
Full-text available
Most modeling approaches lack in their ability to cover a full-fledged view of a software system’s business requirements, goals, and capabilities and to specify aspects of flexibility and variability. The modeling language Capability Driven Development (CDD) allows modeling capabilities and their relation to the execution context. However, its cont...
Chapter
Durch eine Integration von Blockchain in bereits bestehende IT-Unternehmenslandschaften können neue Potenziale und Geschäftsideen entstehen. Beispielsweise ergeben sich durch die Kombination von Blockchain-Technologien mit betrieblichen Anwendungen wie Enterprise-Resource-Planning-Systemen, Synergieeffekte zur Verbesserung und Abwicklung neuer und...
Article
Full-text available
To prepare their IT landscape for future business challenges, companies are changing their IT sourcing arrangements by using selective sourcing approaches as well as multi-sourcing with more but smaller sourcing contracts. Companies therefore have to reconsider and re-evaluate their IT sourcing setup more frequently. Collecting data from 251 global...
Conference Paper
Full-text available
Business-managed IT and Shadow IT describe the autonomous deployment/management of IT instances by business units. For the former, this happens in alignment with the IT organization of the enterprise, for the latter, without alignment. We analyze why and how Business-managed IT and Shadow IT transform knowledge sharing with two case studies drawing...
Conference Paper
This paper develops a categorization of cloud security risks, elaborates how they impact information security, and discusses potential security benefits from cloud sourcing. This review integrates the literature on information systems and computer science to summarize managerial and technological mitigation measures that enhance cloud security. The...
Article
Mit IT-Backsourcing werden ausgelagerte IT-Services an das Unternehmen zurückverlagert. Das kann mehrere Gründe haben. Mithilfe eines Framework lässt sich IT-Backsourcing einordnen. Damit die Durchführung reibungslos vonstatten geht, ist einiges zu beachten.
Conference Paper
Full-text available
Representing and reusing the business objects of a domain model for various use cases can be difficult. Especially, if the domain model is acting as a template or a guideline, it is necessary to map the enterprise's individual structure and processes on the shared domain model. Structural modeling languages often do not meet this requirement of reu...
Article
Incomplete conceptualization of the information technology outsourcing (ITO) literature represents a challenge for navigating extant research and engaging into purposeful academic discourse. We extend the analysis of empirical findings on determinants of ITO decisions, outcomes, and governance. We identify increasing levels of research maturity, an...
Article
Shadow IT and Business-managed IT describe the autonomous deployment/procurement or management of Information Technology (IT) instances, i.e., software, hardware, or IT services, by business entities. For Shadow IT, this happens covertly, i.e., without alignment with the IT organization; for Business-managed IT this happens overtly, i.e., in alignm...
Article
This paper extends the existing literature on information systems (IS) backsourcing by the perception of practitioners. For this purpose, we conducted a series of qualitative, semi-structured interviews with IS sourcing experts. The interview questions focused on the participants' perceptions and experiences with the topic, on identifying reasons f...
Article
Full-text available
Experten sehen in der Blockchain-Technologie durch sein verteiltes und transaktionsorientiertes Konzept das Potenzial, neben der Grundlage für digitale Währungen auch weit mehr Bereiche unserer Gesellschaft grundlegend zu verändern. Durch eine Integration von Blockchain in bereits bestehende IT-Unternehmenslandschaften können neue Potenziale und Ge...
Article
[https://tu-dresden.de/bu/wirtschaft/isih/ressourcen/dateien/paper/IJITBAG-Kopper-Fuerstenau-et-al-2018-Shadow-IT-and-Business-Managed.pdf] Research on Shadow IT is facing a conceptual dilemma in cases where previously “covert” systems developed by business entities are integrated in the organizational IT management. These systems become visible,...
Article
Purpose This paper aims to investigate the main tasks, necessary skills, and the implementation of the offshore coordinator’s role to facilitate knowledge transfer in information systems (IS) offshoring. Design/methodology/approach This empirical exploratory study uses the classical Delphi method that includes one qualitative and two quantitativ...
Conference Paper
There is a common understanding amongst academics that information systems (IS) research sometimes has limited relevance for practitioners. This can be explained by the fact that research lags behind the fast moving IS environment, has limited practical applicability and is hard to access. We have focused on the research area of IS backsourcing, an...
Article
Purpose With the rise of digitization, IT organizations are challenged to provide efficient service delivery and offer innovative digital solutions while maintaining a constant resource capacity. To address this challenge, some IT organizations have adopted Lean Management (LM). Although LM is a standard production mode in manufacturing, it is less...
Conference Paper
Full-text available
Research on Shadow IT is facing a conceptual dilemma in cases where previously "covert" systems developed by business entities (individual users, business workgroups, or business units) are integrated in the organizational IT management. These systems become visible, are therefore not "in the shadows" anymore, and subsequently do not fit to existin...
Conference Paper
Full-text available
Information technology outsourcing (ITO) has long been recognized for its numerous potential advantages such as lowering costs or risks and improving efficiency, flexibility, and quality. However, it also exposes client companies to various risks, including vendor lock-in, poor agility, or insufficient vendor expertise in individual domains, especi...
Conference Paper
Full-text available
In industry, product costs must be optimized to ensure long-lasting economic success. Cost optimization should already be performed during product development, in order to leverage its potential. Previous research has shown that information system support is greatly needed within early product cost optimization. Taking this on, we conducted intervi...
Article
Lean management (LM) is well established in manufacturing organizations, and LM adoption in service organizations has recently increased. However, we lack research that focuses on the success of lean management implementations in IT organizations (lean IT). This paper contributes to knowledge of the success factors of lean IT implementation and the...
Book
IT-Governance, das vorausschauende, strukturierte strategische Planen und Steuern der IT, IT-Risikomanagement, das Beherrschen auch neuartiger IT-Risiken und IT-Compliance, das Beachten und Umsetzen relevanter Vorgaben gewinnen insbesondere im Zeitalter der digitalen Transformation zunehmend an Bedeutung. Ziel des Buches in der Reihe Edition HMD is...
Article
Full-text available
While theoretical concepts for product-costing methodologies have evolved over the decades, little emphasis has been placed on their integration into modern information systems. During a co-innovation workshop at SAP SE, we initiated our collaborative research with selected large-scale enterprises from the discrete manufacturing industry. Moreover,...
Article
Full-text available
Zusammenfassung Basierend auf einer systematischen und umfangreichen Analyse von Praxisbeiträgen zum Thema Schatten-IT, die zwischen September 2015 und August 2016 erschienen sind, beschreibt der vorliegende Artikel Governance-Aspekte zu diesem Phänomen. Er ergänzt damit vorhergehende akademische Studien. Es zeigt sich, dass unter Praktikern der Ei...
Article
Lean Management is a standard production mode that has been familiar to production organizations for several decades. To date, however, academic literature has presented surprisingly little information about the application of Lean Management in Information Technology (IT) organizations, or what is called Lean IT. Drawing upon an empirical qualitat...
Chapter
Das Zeitalter der Digitalisierung durchdringt immer mehr Lebens- und Arbeitsbereiche mit immer komplexeren IT-Lösungen. Es erfordert daher eine verstärkte interdisziplinäre Betrachtung und Diskussion der damit einhergehenden neuartigen Governance-, Risiko- und Compliance-Fragestellungen (GRC-Fragestellungen). Denn nur wer die Gesamtsituation und di...
Chapter
Basierend auf einer systematischen und umfangreichen Analyse von Praxisbeiträgen zum Thema Schatten-IT und einer Interviewstudie mit 16 IT-Führungskräften beschreibt der vorliegende Artikel Governance-Aspekte zu diesem Phänomen. Er ergänzt damit vorhergehende akademische Studien. Es zeigt sich, dass unter Praktikern der Eindruck vorherrscht, dass I...
Conference Paper
Full-text available
Lean Management has been successfully implemented in production organizations since several decades. The study at hand investigates the implementation of Lean Management to IT organizations (Lean IT). The study offers three contributions: First, it explains on a conceptual level how Lean Management can be transferred from production to IT organizat...
Article
Full-text available
Zusammenfassung In der Produktion gilt „Lean Management“ als einer der de-facto Standardmanagementansätze. Lean Management in IT-Organisationen (Lean IT) ist dahingegen in der Praxis weniger verbreitet und in der Wissenschaft kaum erforscht. Dieser Beitrag aggregiert und erweitert die Ergebnisse mehrerer Forschungsarbeiten. Dabei werden vorrangig z...
Chapter
Die Modellierungsforschung kann in der Wirtschaftsinformatik auf eine lange Tradition zurückblicken und stellt nach wie vor ein aktuelles und dynamisches Forschungsgebiet dar. Das folgende Kapitel geht auf die in diesem Gebiet zentralen Begriffe der Modellierung und insbesondere der Metamodellierung ein. Es werden verschiedene Modellbegriffe unters...
Article
Rezensionen zu Alexander Osterwalder, Yves Pigneur Business Model Generation - Ein Handbuch für Visionäre, Spielveränderer und Herausforderer Eric Ries Lean Startup Schnell, risikolos und erfolgreich Unternehmen gründen Frank T. Piller, Dennis Hilgers (Hrsg.) Praxishandbuch Technologietransfer Innovative Methoden zum Transfer wissenschaftliche...
Chapter
Die Wirtschaftsinformatik beschäftigt sich in vielen Bereichen mit Modellbildung. Werden Modelle und Modellbildung selbst zum Gegenstand der Modellierung, so spricht man von Metamodellen. Der sprachbasierten Metamodellierungsauffassung folgend gilt ein Modell als Metamodell bezüglich eines anderen Modells, wenn es ein Beschreibungsmodell der Sprach...
Article
Sustainability is an important factor for long-term entrepreneurial success. Company-wide sustainability management is necessary, and requires software support if it is to be conducted efficiently. This paper aims to investigate the approaches and instruments that large-scale enterprises have implemented for a company-wide sustainability management...