This document discusses three frameworks used by Gartner Group to analyze information systems research: the technology maturity curve, adoption curve, and identification of strategic technologies. The maturity curve tracks how a technology matures over time through various stages from embryonic to obsolescence. The adoption curve shows how technologies are adopted cumulatively by organizations over time. Considering where technologies fall on these curves can provide insights into appropriate research questions and methodologies. Identifying strategic technologies may help determine promising areas for new research.
Cyber risk at the edge: current and future trends on cyber risk analytics and...Petar Radanliev
Digital technologies have changed the way supply chain operations are structured. In this article, we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the related cyber risks. A taxonomic/cladistic approach is used for the evaluations of progress in the area of supply chain integration in the Industrial Internet of Things and Industry 4.0, with a specific focus on the mitigation of cyber risks. An analytical framework is presented, based on a critical assessment with respect to issues related to new types of cyber risk and the integration of supply chains with new technologies. This paper identifies a dynamic and self-adapting supply chain system supported with Artificial Intelligence and Machine Learning (AI/ML) and real-time intelligence for predictive cyber risk analytics. The system is integrated into a cognition engine that enables predictive cyber risk analytics with real-time intelligence from IoT networks at the edge. This enhances capacities and assist in the creation of a comprehensive understanding of the opportunities and threats that arise when edge computing nodes are deployed, and when AI/ML technologies are migrated to the periphery of IoT networks.
Topic: Critical review of an ERP post-implementation Article (Grade Mark: Distinction of 79%)
Module: Research Principles and Practices
Sheffield Hallam University
Howdy!Take a look at this article and discover cool graduation thesis sample that we prepared for you. Get more here https://www.graduatethesis.org/graduate-thesis-sample/
The document discusses business process reengineering (BPR). It defines BPR as the fundamental rethinking and radical redesign of business processes to achieve dramatic improvements. The key is to focus on processes, not tasks or jobs. It outlines the 5 main activities of BPR: 1) Prepare for reengineering 2) Map and analyze the existing ("as-is") process 3) Design the new ("to-be") process 4) Implement the new process and 5) Continuously improve the process. It provides an example of how BPR was used to dramatically improve an insurance application approval process.
The document provides an overview of the history and growth of Acer from 1976 to 2012. It discusses key events such as Acer becoming the 2nd company to develop 32-bit PCs in 1986. It also outlines Acer's expansion through acquisitions and IPOs in the late 1980s. Graphs show increases in Acer's sales, income, employees and market share over this period. The leadership and management styles of Stan Shih and Leonard Liu who served as CEOs are compared. Finally, the current state of Acer as a global leader in PCs and other technology is presented.
Hot Topic Detection and Technology Trend Tracking for Patents utilizing Term ...Ly Nguyen
This paper proposes a methodology for identifying
hot topics and tracking technology trends from the patent
domain. The methodology uses frequency information in
combination with the International Patent Classification (IPC) to
capture semantic information on word categorization, doing so in
a way that heretofore has not been employed for topic detection
and trend tracking. Term Frequency and Proportional Document
Frequency (TF*PDF) is employed as a means to detect hot topics
from patents, and IPCs are used to calculate semantic
importance of terms based on the IPCs where terms are
distributed. Aging Theory is also used to calculate the variation
of trends over time. Four types of trends including very stable
trends, stable trends, normal trends, and unstable trends are
defined and evaluated based on TF*PDF and TF*PDF combined
with Aging Theory. Experiment results show that for very stable
trends, the combination of TF*PDF and Aging Theory achieves
0.976% in Precision; for stable trends and all trends, TF*PDF
achieves 0.959% and 0.84% in Precision, respectively. By
applying TF*PDF in consideration of semantic information, we
also show a new criteria for weighting hot topics and technology
trend tracking.
Technological Route between Pioneerism and ImprovementRoberto Nani
The document presents a methodology for determining the technological route between pioneering inventions and incremental improvements using patent data. The methodology involves: (1) performing an initial patent search, (2) analyzing patent trends over time to calculate an "intellectual property density", (3) fitting the density data to logistic curves to identify major technological phases, and (4) using text clustering to identify new areas of innovation. As a case study, the methodology is applied to analyze the evolution of textile loom weft insertion technologies from 1932 to 2008. Three major technological phases were identified from the logistic curve fitting, each characterized by midpoint year and other metrics.
In this study, a method to simulate Gartner’s hype cycle [1] is proposed. A search of the academic
literature on this topic provides no clear guidance on how to draw hype cycle curves with mathematical
functions. This article explores a new process for simulating the curve as a combination of bell-shaped
curves and S-shaped curves, and applies this process to some high-tech innovations in Japan. Trends in
technologies such as customer relationship management (CRM), supply chain management (SCM), and
cloud computing are analyzed by using a corpus of 4,772 newspaper articles. For these examples,
Gompertz functions show better fit than logistic functions. For the combined curve, polynomial functions of
degree 9 provide the best fit, with adjusted R-square values of more than 0.97.
Cyber risk at the edge: current and future trends on cyber risk analytics and...Petar Radanliev
Digital technologies have changed the way supply chain operations are structured. In this article, we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the related cyber risks. A taxonomic/cladistic approach is used for the evaluations of progress in the area of supply chain integration in the Industrial Internet of Things and Industry 4.0, with a specific focus on the mitigation of cyber risks. An analytical framework is presented, based on a critical assessment with respect to issues related to new types of cyber risk and the integration of supply chains with new technologies. This paper identifies a dynamic and self-adapting supply chain system supported with Artificial Intelligence and Machine Learning (AI/ML) and real-time intelligence for predictive cyber risk analytics. The system is integrated into a cognition engine that enables predictive cyber risk analytics with real-time intelligence from IoT networks at the edge. This enhances capacities and assist in the creation of a comprehensive understanding of the opportunities and threats that arise when edge computing nodes are deployed, and when AI/ML technologies are migrated to the periphery of IoT networks.
Topic: Critical review of an ERP post-implementation Article (Grade Mark: Distinction of 79%)
Module: Research Principles and Practices
Sheffield Hallam University
Howdy!Take a look at this article and discover cool graduation thesis sample that we prepared for you. Get more here https://www.graduatethesis.org/graduate-thesis-sample/
The document discusses business process reengineering (BPR). It defines BPR as the fundamental rethinking and radical redesign of business processes to achieve dramatic improvements. The key is to focus on processes, not tasks or jobs. It outlines the 5 main activities of BPR: 1) Prepare for reengineering 2) Map and analyze the existing ("as-is") process 3) Design the new ("to-be") process 4) Implement the new process and 5) Continuously improve the process. It provides an example of how BPR was used to dramatically improve an insurance application approval process.
The document provides an overview of the history and growth of Acer from 1976 to 2012. It discusses key events such as Acer becoming the 2nd company to develop 32-bit PCs in 1986. It also outlines Acer's expansion through acquisitions and IPOs in the late 1980s. Graphs show increases in Acer's sales, income, employees and market share over this period. The leadership and management styles of Stan Shih and Leonard Liu who served as CEOs are compared. Finally, the current state of Acer as a global leader in PCs and other technology is presented.
Hot Topic Detection and Technology Trend Tracking for Patents utilizing Term ...Ly Nguyen
This paper proposes a methodology for identifying
hot topics and tracking technology trends from the patent
domain. The methodology uses frequency information in
combination with the International Patent Classification (IPC) to
capture semantic information on word categorization, doing so in
a way that heretofore has not been employed for topic detection
and trend tracking. Term Frequency and Proportional Document
Frequency (TF*PDF) is employed as a means to detect hot topics
from patents, and IPCs are used to calculate semantic
importance of terms based on the IPCs where terms are
distributed. Aging Theory is also used to calculate the variation
of trends over time. Four types of trends including very stable
trends, stable trends, normal trends, and unstable trends are
defined and evaluated based on TF*PDF and TF*PDF combined
with Aging Theory. Experiment results show that for very stable
trends, the combination of TF*PDF and Aging Theory achieves
0.976% in Precision; for stable trends and all trends, TF*PDF
achieves 0.959% and 0.84% in Precision, respectively. By
applying TF*PDF in consideration of semantic information, we
also show a new criteria for weighting hot topics and technology
trend tracking.
Technological Route between Pioneerism and ImprovementRoberto Nani
The document presents a methodology for determining the technological route between pioneering inventions and incremental improvements using patent data. The methodology involves: (1) performing an initial patent search, (2) analyzing patent trends over time to calculate an "intellectual property density", (3) fitting the density data to logistic curves to identify major technological phases, and (4) using text clustering to identify new areas of innovation. As a case study, the methodology is applied to analyze the evolution of textile loom weft insertion technologies from 1932 to 2008. Three major technological phases were identified from the logistic curve fitting, each characterized by midpoint year and other metrics.
In this study, a method to simulate Gartner’s hype cycle [1] is proposed. A search of the academic
literature on this topic provides no clear guidance on how to draw hype cycle curves with mathematical
functions. This article explores a new process for simulating the curve as a combination of bell-shaped
curves and S-shaped curves, and applies this process to some high-tech innovations in Japan. Trends in
technologies such as customer relationship management (CRM), supply chain management (SCM), and
cloud computing are analyzed by using a corpus of 4,772 newspaper articles. For these examples,
Gompertz functions show better fit than logistic functions. For the combined curve, polynomial functions of
degree 9 provide the best fit, with adjusted R-square values of more than 0.97.
Simulating hype cycle curves with mathematical functions some examples of hig...IJMIT JOURNAL
In this study, a method to simulate Gartner’s hype cycle [1] is proposed. A search of the academic
literature on this topic provides no clear guidance on how to draw hype cycle curves with mathematical
functions. This article explores a new process for simulating the curve as a combination of bell-shaped
curves and S-shaped curves, and applies this process to some high-tech innovations in Japan. Trends in
technologies such as customer relationship management (CRM), supply chain management (SCM), and
cloud computing are analyzed by using a corpus of 4,772 newspaper articles. For these examples,
Gompertz functions show better fit than logistic functions. For the combined curve, polynomial functions of
degree 9 provide the best fit, with adjusted R-square values of more than 0.97.
AN ITERATIVE HYBRID AGILE METHODOLOGY FOR DEVELOPING ARCHIVING SYSTEMSijseajournal
With the massive growth of the organizations files, the needs for archiving system become a must. A lot of
time is consumed in collecting requirements from the organization to build an archiving system. Sometimes
the system does not meet the organization needs. This paper proposes a domain-based requirement
engineering system that efficiently and effectively develops different archiving systems based on new
suggested technique that merges the two best used agile methodologies: extreme programming (XP) and
SCRUM. The technique is tested on a real case study. The results shows that the time and effort consumed
during analyzing and designing the archiving systems decreased significantly. The proposed methodology
also reduces the system errors that may happen at the early stages of the development of the system.
AN ITERATIVE HYBRID AGILE METHODOLOGY FOR DEVELOPING ARCHIVING SYSTEMSijseajournal
With the massive growth of the organizations files, the needs for archiving system become a must. A lot of time is consumed in collecting requirements from the organization to build an archiving system. Sometimes the system does not meet the organization needs. This paper proposes a domain-based requirement engineering system that efficiently and effectively develops different archiving systems based on new
suggested technique that merges the two best used agile methodologies: extreme programming (XP) and SCRUM. The technique is tested on a real case study. The results shows that the time and effort consumed during analyzing and designing the archiving systems decreased significantly. The proposed methodology also reduces the system errors that may happen at the early stages of the development of the system.
Chapter 3 Schilling 2017 Types and Patterns of Innovationahmdirvan
This document discusses different types and patterns of innovation. It describes the differences between product and process innovation, radical and incremental innovation, competence-enhancing and competence-destroying innovation, and architectural and component innovation. It also discusses how innovations can be analyzed using dimensions like radicalness and newness. Finally, it covers how the performance and adoption of technologies often follow S-curve patterns over time, and how S-curves can provide insights but also have limitations as a predictive tool.
The document discusses tools and techniques for big data analytics, including A/B testing, crowdsourcing, machine learning, and data mining. It provides an overview of the big data analysis pipeline, including data acquisition, information extraction, integration and representation, query processing and analysis, and interpretation. The document also discusses fields where big data is relevant like industry, healthcare, and research. It analyzes tools like A/B testing, machine learning, and data mining techniques in more detail.
This document summarizes a thesis review on the practices and challenges of implementing agile software development methodology at Ethiopian Airlines. The research studied agile practices through surveys of 72 IT developers and interviews with managers. It found that while agile has benefits, Ethiopian Airlines faces challenges including lack of formal training, awareness issues, documentation problems, and difficulty forming self-organized teams. The researchers proposed a "Task based agile development methodology" guideline to address the challenges and help full adoption of agile. However, the study was limited to one organization and had a small data set.
Extending canonical action research model to implement social media in microb...Debashish Mandal
This document proposes an extension to the canonical action research (CAR) model to increase its flexibility. It summarizes a study that used CAR to implement social media in a microbusiness but encountered limitations due to CAR's rigid structure. To address this, the study adopted a trial-and-error problem-solving approach. Based on these findings, the document proposes an extended CAR model that allows iterations between stages to increase flexibility while maintaining CAR's cyclical nature. This extended model is presented as having theoretical and practical implications for conducting action research.
Selection of Articles Using Data Analytics for Behavioral Dissertation Resear...PhD Assistance
Outcomes in health-related issues including psychological, educational, Behavioral, environmental, and social are intended to sustain positive change by digital interferences. These changes may be delivered using any digital device like a phone or computer, and make them gainful for the provider. Complex and large-scale datasets that contain usage data can be yielded by testing a digital intervention. This data provides invaluable detail about how the users interact with these interventions and notify their knowledge of engagement, if they are analyzed properly. This paper recommends an innovative framework for the process of analyzing usage associated with a digital intervention .
PhD Assistance is an Academic The Best Dissertation Writing Service & Consulting Support Company established in 2001. specialiWeze in providing PhD Assignments, PhD Dissertation Writing Help , Statistical Analyses, and Programming Services to students in the USA, UK, Canada, UAE, Australia, New Zealand, Singapore and many more.
Website Visit: https://bit.ly/3dANXUD
Contact Us:
UK NO: +44-1143520021
India No: +91-8754446690
Email: info@phdassistance.com
LEAN THINKING IN SOFTWARE ENGINEERING: A SYSTEMATIC REVIEWijseajournal
The field of Software Engineering has suffered considerable transformation in the last decades due to the influence of the philosophy of Lean Thinking. The purpose of this systematic review is to identify practices and approaches proposed by researchers in this area in the last 5 years, who have worked under the influence of this thinking. The search strategy brought together 549 studies, 80 of which were classified as
relevant for synthesis in this review. Seventeen tools of Lean Thinking adapted to Software Engineering were catalogued, as well as 35 practices created for the development of software that has been influenced by this philosophy. The study rovides a roadmap of results with the current state of the art and the identification of gaps pointing to opportunities for further esearch.
Simulation in the supply chain context a survey Sergio Terzia,.docxbudabrooks46239
Simulation in the supply chain context: a survey
Sergio Terzia,*, Sergio Cavalierib a Politecnico di Milano, Department of Economics, Industrial and Management Engineering, Piazza Leonardo da Vinci 32, 20133 Milan, Italy b Department of Industrial Engineering, Universita` di Bergamo, Viale Marconi 5, 24044 Dalmine, Italy Received 29 January 2003; accepted 13 June 2003
Abstract
The increased level of competitiveness in all industrial sectors, exacerbated in the last years by the globalisation of the economies and by the sharp fall of the final demands, are pushing enterprises to strive for a further optimisation of their organisational processes, and in particular to pursue new forms of collaboration and partnership with their direct logistics counterparts. As a result, at a company level there is a progressive shift towards an external perspective with the design and implementation of new management strategies, which are generally named with the term of supply chain management (SCM). However, despite the flourish of several IT solutions in this context, there are still evident hurdles to overcome, mainly due to the major complexity of the problems to be tackled in a logistics network and to the conflicts resulting from local objectives versus network strategies. Among the techniques supporting a multi-decisional context, as a supply chain (SC) is, simulation can undoubtedly play an important role, above all for its main property to provide what-if analysis and to evaluate quantitatively benefits and issues deriving from operating in a co-operative environment rather than playing a pure transaction role with the upstream/downstream tiers. The paper provides a comprehensive review made on more than 80 articles, with the main purpose of ascertaining which general objectives simulation is generally called to solve, which paradigms and simulation tools are more suitable, and deriving useful prescriptions both for practitioners and researchers on its applicability in decision-making processes within the supply chain context. # 2003 Elsevier B.V. All rights reserved. Keywords: Parallel and distributed simulation; Supply chain management; High level architecture; Survey 1. Introduction Modern industrial enterprises operate in a rapidly changing world, stressed by even more global competition, managing world-wide procurement and unforeseeable markets, supervising geographically distributed production plants, striving for the provision of outstanding products and high quality customer service. More than in the past, companies which are not able to revise periodically their strategies and, accordingly, to modify their organisational processes seriously risk to be pulled out from the competitive edge. In the 1990s, companies have made huge efforts for streamlining their internal business processes, identifying and enhancing the core activities pertaining to the product value chain, and invested massively in new intra-company information and communicat.
Fintech platform failure rates are disproportionately high, with an estimated 90% failure rate over many years. There is a lack of public information on effective strategies for fintech platforms to survive and succeed. Conventional strategy recommendations may also be less applicable in the fintech context. The authors conducted a literature review of 293 papers on fintech strategies and identified gaps. They developed a theoretical lens based on six strategic logics and evaluated current literature through this lens. Their findings provide a more nuanced understanding of strategic options for fintech platforms to balance differentiation from rivals with meeting stakeholder expectations in changing environments.
Full Paper: Analytics: Key to go from generating big data to deriving busines...Piyush Malik
This document discusses how analytics can help organizations derive business value from big data. It describes how statistical analysis, machine learning, optimization and text mining can extract meaningful insights from social media, online commerce, telecommunications, smart utility meters, and improve security. While tools exist to analyze big data, challenges remain around data security, privacy, and developing skilled talent. The paper aims to illustrate how existing algorithms can generate value from different industry use cases.
This paper presents a project management methodology - developed part of an engineering doctorate research at Warwick University - for managing large scale IT projects with a focus on national ID programmes. The methodology was mainly tested in the United Arab Emirates (UAE) and was followed in three GCC countries. The research demonstrated that by following a formal structured methodology, governments will have better visibility and control over such programmes. The implementation revealed that the phases and processes of the proposed methodology supported the overall management, planning, control over the project activities, promoted effective communication, improved scope and risk management, and ensured quality deliverables.
This document discusses different types and patterns of innovation:
1. It describes product innovation versus process innovation, and radical innovation versus incremental innovation. Radical innovations are new to the world and significantly different, while incremental innovations are marginally different.
2. Innovations can also be competence-enhancing or competence-destroying from the perspective of a firm. Competence-enhancing innovations build on a firm's existing knowledge, while competence-destroying innovations render existing competencies obsolete.
3. Architectural innovations change a system's overall design and interactions, while component innovations only change parts but not the overall architecture. Architectural innovations often have broader impacts.
4. Performance and adoption of
This document discusses the opportunities and challenges of using functional data analysis (FDA) to analyze data from electronic commerce (eCommerce). FDA is well-suited for eCommerce data because it can represent the combination of longitudinal and cross-sectional data that is common in eCommerce. Some challenges in applying FDA to eCommerce data include unevenly spaced time series, nonstationarity due to fast changes, and large databases. The document outlines methods for recovering functional objects from eCommerce data and discusses challenges in choosing the appropriate smoothing method.
A Study of Software Size Estimation with use Case Pointsijtsrd
Estimates for cost and schedule in software projects are based on a prediction of the size of the system. Software size estimation is the most important role in software cost estimation. Use Case Point method can provide software size estimation at the early stage of the development process. Software size estimation is based on the high level speciation of Use Case. This paper describes a simple approach to software size estimation base on use case models the "Use Case Points Method. This model is imported into an estimating tool. To get software size with Use Case Point, the needed factors are the number of use cases and their complexity, the number of actors and their complexity, technical complexity factors TCF , and environmental complexity factors ECF . The system computes unadjusted use case points UUCP , adjusted use case points UPC , and the total effort in staff hours. Aye Aye Seint "A Study of Software Size Estimation with use Case Points" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26531.pdfPaper URL: https://www.ijtsrd.com/computer-science/other/26531/a-study-of-software-size-estimation-with-use-case-points/aye-aye-seint
Knowledge mining is a process of extracting patterns and relationships from databases to improve decision-making. It has various applications including business intelligence, product design, manufacturing, and research profiling. The document then provides three examples: 1) A financial company used knowledge mining to analyze customer data and target marketing promotions. 2) Engineers have used it to help design products by matching requirements to existing part designs. 3) Researchers have used text mining to map relationships between topics in academic literature and identify active individuals and organizations.
This document summarizes six articles on research methods in strategic management published in Organizational Research Methods. It discusses how each article advances understanding of specific methods or construct measurement. It urges readers to apply these methods more broadly to explore new areas of inquiry. It also identifies three directions for further advancing attention to measurement and methodology in strategy research: expanding application of methods to new contexts, exploring linkages between advances in measurement and theory, and considering how methods can reveal previously untested relationships.
This document discusses and compares several agent-assisted methodologies for developing multi-agent systems:
- It reviews Gaia, HLIM, PASSI, and Tropos methodologies, outlining their key models and phases. Gaia focuses on analysis and design, HLIM models internal and external agent behavior, and PASSI and Tropos incorporate UML modeling.
- It then proposes a new MAB methodology intended to address shortcomings of existing approaches. MAB includes requirements, analysis, design, and implementation phases and models such as use case maps and agent roles.
- Finally, it concludes that agent technologies represent a promising approach for developing complex software systems, but that matching methodologies to problem domains and developing princip
Technology S-Curve Analysis (TSC) is a method to determine the relationship between investment in improving technology and corresponding market sales. The curve typically takes the shape of an S as the market develops through phases of launch, growth, maturity, and decline. TSC Analysis is particularly useful for launching new technologies and assessing the remaining lifespan of technologies to guide business strategy and shifting resources to next-generation technologies. TSC Analysis provides intelligence on the current technology lifespan, potential limits, economics of innovation, a company's position, and quantifying investment versus payoff.
The document discusses S curves, which plot cumulative project quantities like costs or hours against time. It describes different types of S curves, including baseline, target, and actual S curves. The document explains how S curves can be used to analyze a project's progress, growth, and slippage. It also provides details on generating S curves from project schedule data and interpreting S curve analyses.
Simulating hype cycle curves with mathematical functions some examples of hig...IJMIT JOURNAL
In this study, a method to simulate Gartner’s hype cycle [1] is proposed. A search of the academic
literature on this topic provides no clear guidance on how to draw hype cycle curves with mathematical
functions. This article explores a new process for simulating the curve as a combination of bell-shaped
curves and S-shaped curves, and applies this process to some high-tech innovations in Japan. Trends in
technologies such as customer relationship management (CRM), supply chain management (SCM), and
cloud computing are analyzed by using a corpus of 4,772 newspaper articles. For these examples,
Gompertz functions show better fit than logistic functions. For the combined curve, polynomial functions of
degree 9 provide the best fit, with adjusted R-square values of more than 0.97.
AN ITERATIVE HYBRID AGILE METHODOLOGY FOR DEVELOPING ARCHIVING SYSTEMSijseajournal
With the massive growth of the organizations files, the needs for archiving system become a must. A lot of
time is consumed in collecting requirements from the organization to build an archiving system. Sometimes
the system does not meet the organization needs. This paper proposes a domain-based requirement
engineering system that efficiently and effectively develops different archiving systems based on new
suggested technique that merges the two best used agile methodologies: extreme programming (XP) and
SCRUM. The technique is tested on a real case study. The results shows that the time and effort consumed
during analyzing and designing the archiving systems decreased significantly. The proposed methodology
also reduces the system errors that may happen at the early stages of the development of the system.
AN ITERATIVE HYBRID AGILE METHODOLOGY FOR DEVELOPING ARCHIVING SYSTEMSijseajournal
With the massive growth of the organizations files, the needs for archiving system become a must. A lot of time is consumed in collecting requirements from the organization to build an archiving system. Sometimes the system does not meet the organization needs. This paper proposes a domain-based requirement engineering system that efficiently and effectively develops different archiving systems based on new
suggested technique that merges the two best used agile methodologies: extreme programming (XP) and SCRUM. The technique is tested on a real case study. The results shows that the time and effort consumed during analyzing and designing the archiving systems decreased significantly. The proposed methodology also reduces the system errors that may happen at the early stages of the development of the system.
Chapter 3 Schilling 2017 Types and Patterns of Innovationahmdirvan
This document discusses different types and patterns of innovation. It describes the differences between product and process innovation, radical and incremental innovation, competence-enhancing and competence-destroying innovation, and architectural and component innovation. It also discusses how innovations can be analyzed using dimensions like radicalness and newness. Finally, it covers how the performance and adoption of technologies often follow S-curve patterns over time, and how S-curves can provide insights but also have limitations as a predictive tool.
The document discusses tools and techniques for big data analytics, including A/B testing, crowdsourcing, machine learning, and data mining. It provides an overview of the big data analysis pipeline, including data acquisition, information extraction, integration and representation, query processing and analysis, and interpretation. The document also discusses fields where big data is relevant like industry, healthcare, and research. It analyzes tools like A/B testing, machine learning, and data mining techniques in more detail.
This document summarizes a thesis review on the practices and challenges of implementing agile software development methodology at Ethiopian Airlines. The research studied agile practices through surveys of 72 IT developers and interviews with managers. It found that while agile has benefits, Ethiopian Airlines faces challenges including lack of formal training, awareness issues, documentation problems, and difficulty forming self-organized teams. The researchers proposed a "Task based agile development methodology" guideline to address the challenges and help full adoption of agile. However, the study was limited to one organization and had a small data set.
Extending canonical action research model to implement social media in microb...Debashish Mandal
This document proposes an extension to the canonical action research (CAR) model to increase its flexibility. It summarizes a study that used CAR to implement social media in a microbusiness but encountered limitations due to CAR's rigid structure. To address this, the study adopted a trial-and-error problem-solving approach. Based on these findings, the document proposes an extended CAR model that allows iterations between stages to increase flexibility while maintaining CAR's cyclical nature. This extended model is presented as having theoretical and practical implications for conducting action research.
Selection of Articles Using Data Analytics for Behavioral Dissertation Resear...PhD Assistance
Outcomes in health-related issues including psychological, educational, Behavioral, environmental, and social are intended to sustain positive change by digital interferences. These changes may be delivered using any digital device like a phone or computer, and make them gainful for the provider. Complex and large-scale datasets that contain usage data can be yielded by testing a digital intervention. This data provides invaluable detail about how the users interact with these interventions and notify their knowledge of engagement, if they are analyzed properly. This paper recommends an innovative framework for the process of analyzing usage associated with a digital intervention .
PhD Assistance is an Academic The Best Dissertation Writing Service & Consulting Support Company established in 2001. specialiWeze in providing PhD Assignments, PhD Dissertation Writing Help , Statistical Analyses, and Programming Services to students in the USA, UK, Canada, UAE, Australia, New Zealand, Singapore and many more.
Website Visit: https://bit.ly/3dANXUD
Contact Us:
UK NO: +44-1143520021
India No: +91-8754446690
Email: info@phdassistance.com
LEAN THINKING IN SOFTWARE ENGINEERING: A SYSTEMATIC REVIEWijseajournal
The field of Software Engineering has suffered considerable transformation in the last decades due to the influence of the philosophy of Lean Thinking. The purpose of this systematic review is to identify practices and approaches proposed by researchers in this area in the last 5 years, who have worked under the influence of this thinking. The search strategy brought together 549 studies, 80 of which were classified as
relevant for synthesis in this review. Seventeen tools of Lean Thinking adapted to Software Engineering were catalogued, as well as 35 practices created for the development of software that has been influenced by this philosophy. The study rovides a roadmap of results with the current state of the art and the identification of gaps pointing to opportunities for further esearch.
Simulation in the supply chain context a survey Sergio Terzia,.docxbudabrooks46239
Simulation in the supply chain context: a survey
Sergio Terzia,*, Sergio Cavalierib a Politecnico di Milano, Department of Economics, Industrial and Management Engineering, Piazza Leonardo da Vinci 32, 20133 Milan, Italy b Department of Industrial Engineering, Universita` di Bergamo, Viale Marconi 5, 24044 Dalmine, Italy Received 29 January 2003; accepted 13 June 2003
Abstract
The increased level of competitiveness in all industrial sectors, exacerbated in the last years by the globalisation of the economies and by the sharp fall of the final demands, are pushing enterprises to strive for a further optimisation of their organisational processes, and in particular to pursue new forms of collaboration and partnership with their direct logistics counterparts. As a result, at a company level there is a progressive shift towards an external perspective with the design and implementation of new management strategies, which are generally named with the term of supply chain management (SCM). However, despite the flourish of several IT solutions in this context, there are still evident hurdles to overcome, mainly due to the major complexity of the problems to be tackled in a logistics network and to the conflicts resulting from local objectives versus network strategies. Among the techniques supporting a multi-decisional context, as a supply chain (SC) is, simulation can undoubtedly play an important role, above all for its main property to provide what-if analysis and to evaluate quantitatively benefits and issues deriving from operating in a co-operative environment rather than playing a pure transaction role with the upstream/downstream tiers. The paper provides a comprehensive review made on more than 80 articles, with the main purpose of ascertaining which general objectives simulation is generally called to solve, which paradigms and simulation tools are more suitable, and deriving useful prescriptions both for practitioners and researchers on its applicability in decision-making processes within the supply chain context. # 2003 Elsevier B.V. All rights reserved. Keywords: Parallel and distributed simulation; Supply chain management; High level architecture; Survey 1. Introduction Modern industrial enterprises operate in a rapidly changing world, stressed by even more global competition, managing world-wide procurement and unforeseeable markets, supervising geographically distributed production plants, striving for the provision of outstanding products and high quality customer service. More than in the past, companies which are not able to revise periodically their strategies and, accordingly, to modify their organisational processes seriously risk to be pulled out from the competitive edge. In the 1990s, companies have made huge efforts for streamlining their internal business processes, identifying and enhancing the core activities pertaining to the product value chain, and invested massively in new intra-company information and communicat.
Fintech platform failure rates are disproportionately high, with an estimated 90% failure rate over many years. There is a lack of public information on effective strategies for fintech platforms to survive and succeed. Conventional strategy recommendations may also be less applicable in the fintech context. The authors conducted a literature review of 293 papers on fintech strategies and identified gaps. They developed a theoretical lens based on six strategic logics and evaluated current literature through this lens. Their findings provide a more nuanced understanding of strategic options for fintech platforms to balance differentiation from rivals with meeting stakeholder expectations in changing environments.
Full Paper: Analytics: Key to go from generating big data to deriving busines...Piyush Malik
This document discusses how analytics can help organizations derive business value from big data. It describes how statistical analysis, machine learning, optimization and text mining can extract meaningful insights from social media, online commerce, telecommunications, smart utility meters, and improve security. While tools exist to analyze big data, challenges remain around data security, privacy, and developing skilled talent. The paper aims to illustrate how existing algorithms can generate value from different industry use cases.
This paper presents a project management methodology - developed part of an engineering doctorate research at Warwick University - for managing large scale IT projects with a focus on national ID programmes. The methodology was mainly tested in the United Arab Emirates (UAE) and was followed in three GCC countries. The research demonstrated that by following a formal structured methodology, governments will have better visibility and control over such programmes. The implementation revealed that the phases and processes of the proposed methodology supported the overall management, planning, control over the project activities, promoted effective communication, improved scope and risk management, and ensured quality deliverables.
This document discusses different types and patterns of innovation:
1. It describes product innovation versus process innovation, and radical innovation versus incremental innovation. Radical innovations are new to the world and significantly different, while incremental innovations are marginally different.
2. Innovations can also be competence-enhancing or competence-destroying from the perspective of a firm. Competence-enhancing innovations build on a firm's existing knowledge, while competence-destroying innovations render existing competencies obsolete.
3. Architectural innovations change a system's overall design and interactions, while component innovations only change parts but not the overall architecture. Architectural innovations often have broader impacts.
4. Performance and adoption of
This document discusses the opportunities and challenges of using functional data analysis (FDA) to analyze data from electronic commerce (eCommerce). FDA is well-suited for eCommerce data because it can represent the combination of longitudinal and cross-sectional data that is common in eCommerce. Some challenges in applying FDA to eCommerce data include unevenly spaced time series, nonstationarity due to fast changes, and large databases. The document outlines methods for recovering functional objects from eCommerce data and discusses challenges in choosing the appropriate smoothing method.
A Study of Software Size Estimation with use Case Pointsijtsrd
Estimates for cost and schedule in software projects are based on a prediction of the size of the system. Software size estimation is the most important role in software cost estimation. Use Case Point method can provide software size estimation at the early stage of the development process. Software size estimation is based on the high level speciation of Use Case. This paper describes a simple approach to software size estimation base on use case models the "Use Case Points Method. This model is imported into an estimating tool. To get software size with Use Case Point, the needed factors are the number of use cases and their complexity, the number of actors and their complexity, technical complexity factors TCF , and environmental complexity factors ECF . The system computes unadjusted use case points UUCP , adjusted use case points UPC , and the total effort in staff hours. Aye Aye Seint "A Study of Software Size Estimation with use Case Points" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26531.pdfPaper URL: https://www.ijtsrd.com/computer-science/other/26531/a-study-of-software-size-estimation-with-use-case-points/aye-aye-seint
Knowledge mining is a process of extracting patterns and relationships from databases to improve decision-making. It has various applications including business intelligence, product design, manufacturing, and research profiling. The document then provides three examples: 1) A financial company used knowledge mining to analyze customer data and target marketing promotions. 2) Engineers have used it to help design products by matching requirements to existing part designs. 3) Researchers have used text mining to map relationships between topics in academic literature and identify active individuals and organizations.
This document summarizes six articles on research methods in strategic management published in Organizational Research Methods. It discusses how each article advances understanding of specific methods or construct measurement. It urges readers to apply these methods more broadly to explore new areas of inquiry. It also identifies three directions for further advancing attention to measurement and methodology in strategy research: expanding application of methods to new contexts, exploring linkages between advances in measurement and theory, and considering how methods can reveal previously untested relationships.
This document discusses and compares several agent-assisted methodologies for developing multi-agent systems:
- It reviews Gaia, HLIM, PASSI, and Tropos methodologies, outlining their key models and phases. Gaia focuses on analysis and design, HLIM models internal and external agent behavior, and PASSI and Tropos incorporate UML modeling.
- It then proposes a new MAB methodology intended to address shortcomings of existing approaches. MAB includes requirements, analysis, design, and implementation phases and models such as use case maps and agent roles.
- Finally, it concludes that agent technologies represent a promising approach for developing complex software systems, but that matching methodologies to problem domains and developing princip
Technology S-Curve Analysis (TSC) is a method to determine the relationship between investment in improving technology and corresponding market sales. The curve typically takes the shape of an S as the market develops through phases of launch, growth, maturity, and decline. TSC Analysis is particularly useful for launching new technologies and assessing the remaining lifespan of technologies to guide business strategy and shifting resources to next-generation technologies. TSC Analysis provides intelligence on the current technology lifespan, potential limits, economics of innovation, a company's position, and quantifying investment versus payoff.
The document discusses S curves, which plot cumulative project quantities like costs or hours against time. It describes different types of S curves, including baseline, target, and actual S curves. The document explains how S curves can be used to analyze a project's progress, growth, and slippage. It also provides details on generating S curves from project schedule data and interpreting S curve analyses.
The S curve is used to spread project costs over time in a bell-shaped curve. It is based on the sine and cosine waves, with the integral of the sine wave producing a leaning S-shaped cumulative cost curve. The document describes tweaking the basic S curve model by introducing variables to skew the timing of costs (make them front-loaded or back-loaded) and adjust the peakness to flatten or steepen the curve. Equations are provided to calculate cost at any point in time or rate of spending based on total project cost, time, skewness, and peakness variables.
This document discusses technology S-curves and their implications for renewable energy alternatives. It finds that both wind and geothermal energy are poised to become more economical than fossil fuels relatively soon based on historical data. Government R&D funding has been lower for wind and geothermal compared to solar, and funding for fossil fuels may be excessive given their diminishing performance. Analyzing renewable technologies through an S-curve lens provides insights not found using other approaches and has implications for future government and industry investment decisions.
The document provides safety instructions and an overview of the features and operation of the Dual 31 Band Equalizer. Key points include:
- The equalizer has 31 frequency bands covering 20Hz to 20kHz that can each be boosted or cut by up to 12dB or 6dB depending on the range setting.
- It has electronically balanced inputs and outputs, variable low cut filter, bypass switches, and LED VU meters.
- The document explains the controls on the front and rear panels and provides instructions for setting up and using the equalizer for different applications such as with a mixer, patchbay, or real time analyzer.
This document discusses the application of S-shaped curves, also known as logistic curves or S-curves, to model the evolution of systems over time. It provides background on the origin and development of S-curves as models of growth. S-curves have been widely used across many domains to describe trends like population growth, market penetration of new technologies, and diffusion of innovations. The document reviews several examples of S-curve applications and discusses their use in areas like technological forecasting and TRIZ problem solving. It argues that S-curves provide forecasting power because growth is ultimately limited by scarce resources based on mathematical concepts like Verhulst's logistic growth equation.
This document presents a case study analyzing the S-curve of a construction project. It describes the original planned S-curve, which projected slow initial progress accelerating in the middle before slowing at completion. Actual progress fell far below this, requiring three adjustments - adding scope, and extending the schedule by 9 months total - to get the project back on track. By the third adjustment, actual progress more closely aligned with the planned S-curve, allowing the project to progress through start-up, growth, and commissioning phases to completion. The case study demonstrates how S-curve analysis can identify issues and inform decisions to successfully manage a project over its lifecycle.
The document provides documentation and a tutorial for implementing an S-curve motion profile in a MyoStat Motion Control system. An S-curve allows for smooth acceleration and deceleration during motion to prevent damage. The K69 parameter controls the S-curve function, with higher values creating a more pronounced curve. The tutorial instructs the user to set parameters, collect speed data, and graph results at different K69 values to observe the S-curve motion profile.
The document discusses optimizing S-curve velocity profiles for motion control. An S-curve velocity profile is a smooth curve that is differentiable to the second order. The document describes decomposing 3D motion into 1D components and synthesizing physical constraints on jerk, acceleration, and velocity for each axis. It then presents calculations for generating an optimized S-curve velocity profile that satisfies the constraints and produces smooth, fast, and accurate motion between a start and end point.
The document discusses how to generate S-curves in Oracle Primavera P6 to analyze project progress and performance. S-curves show cumulative costs, labor hours, or other metrics plotted against time and typically have an S-shape. In Primavera P6, S-curves can be generated by activity or resource in the usage profile windows. Various analysis can then be done by comparing baseline, target, and actual S-curves to determine project growth, slippage, and progress. The S-curves can also be published from Primavera P6 as prints or embedded in webpages.
This document describes a methodology for modeling S-curves to forecast cost distribution over time for construction projects. It discusses three approaches to S-curve modeling: 1) Analyzing cost-time curves from literature, 2) Examining data from completed projects, and 3) Creating standard critical path models. The results from each approach are presented through mathematical expressions and diagrams. Finally, the results of the three approaches are integrated to develop final S-curves showing standard cost dynamics over time for different project types (buildings, tunnels, motorways). The proposed methodology can be used to forecast cost schedules during early project phases when detailed information is limited.
This document summarizes an optimization model for a contractor's S-curve developed using genetic algorithms. The model aims to minimize total construction costs while considering the tradeoff between different resource productivity and costs of resource mobilization/demobilization. An example project is optimized, resulting in a smoother resource allocation and lower total cost compared to the early and late schedules. The optimal S-curve developed from the model provides a baseline for measuring impacts of changes on construction costs.
This document discusses innovation lifecycles and how companies can leverage S-curves to drive breakthrough growth. It contains the following key points:
1. Products, services, and technologies progress along S-curves over time from emergence to maturity. Understanding where opportunities fall in their lifecycles can help companies innovate and avoid disruption.
2. Companies often fail to transition to new S-curves due to not focusing on or defending emerging technologies, cultural inertia, or lack of foresight.
3. Organizational strategies like leadership, structure, and metrics should evolve to support innovation or optimization depending on a business's point in the lifecycle. Tailoring the organization maximizes growth across the portfolio
This document discusses three frameworks used by Gartner Group to analyze information systems research: the technology maturity curve, adoption curve, and identification of strategic technologies. The maturity curve tracks how a technology matures over time through various stages from embryonic to obsolescence. The adoption curve shows how technologies are adopted cumulatively by organizations over time. Considering where technologies fall on these curves can provide insights into appropriate research questions and methodologies. Identifying strategic technologies may help determine promising areas for new research.
The document discusses an S-curve model that relates per-capita income to insurance penetration. It finds:
1) Estimating life and non-life insurance penetration globally yields an S-curve, where income elasticity starts and ends at 1 but exceeds 1 at intermediate income levels.
2) For life insurance, the income at maximum elasticity is $15,000, while for non-life it is $10,000.
3) Using purchasing power parities rather than market exchange rates increases estimated penetration levels and elasticities for developing countries.
This document discusses exploring the limits of technology S-curves by examining their usefulness for managers in planning new technology development. It focuses on the disk drive industry as a case study. The author makes four key points: 1) S-curves accurately describe industry-level technology substitution patterns, 2) to improve products, managers must oversee both component and architectural technology development, 3) S-curves describe individual firm experiences with components but cannot prescribe strategy, and 4) attackers gain advantage in this industry through architectural, not just technological, innovation in new applications.
This document describes proposed changes to improve a model for estimating project S-curves based on project attributes and conditions. The key changes are:
1. Changing the model outputs from the polynomial function's parameters (a, b) to the inflection point position (p) and slope (s), which better indicate schedule performance.
2. Adding two new input factors - project difficulty and participant competence - to capture schedule influences beyond basic attributes like cost and duration.
3. Using fuzzy inference systems instead of neural networks to build transparent input-output relationships from historical project data, applying fuzzy clustering and hybrid training.
The goal is to develop a model that more accurately predicts project progress curves by incorporating schedule performance indicators
The document discusses patterns of technological substitution that challenge the traditional S-curve model. It presents several historical examples that demonstrate more complex substitution patterns than the smooth S-curve, including: concatenated generations in steelmaking technologies; overlapping generations in IBM mainframe computers; and a case of long-term feedback reversing the substitution of DDT as an insecticide due to environmental concerns. The author argues that accounting for these complex real-world patterns requires broadening the theoretical framework for understanding technological substitutions.
This document discusses the history and development of semiconductors and integrated circuits. It describes how the transistor enabled electronics to be performed using silicon, leading to solid-state electronics like transistor radios. The integrated circuit was developed using the planar process to fabricate multiple transistors on silicon wafers. Moore's Law, proposed in 1965, predicted that the number of transistors on an integrated circuit would double every 18 months. This prediction has proven remarkably accurate and has driven innovation in the semiconductor industry for over 40 years. Continued shrinking of circuit elements has enabled faster processing speeds, higher functionality, and lower costs over time.
The document summarizes the key points from the book "Jumping the S-Curve" by Paul Nunes and Tim Breene. It discusses how companies can succeed by repeatedly climbing business S-curves and jumping to new S-curves before performance plateaus. To climb an S-curve, companies must identify a large market opportunity, build the necessary capabilities, and attract top talent. To jump to a new S-curve, companies must manage hidden S-curves, develop edge-centric strategies, reconstitute leadership teams early, and cultivate a talent pipeline. High performers are able to continually reinvent themselves through repeated S-curve climbing and jumping.
How Barcodes Can Be Leveraged Within Odoo 17Celine George
In this presentation, we will explore how barcodes can be leveraged within Odoo 17 to streamline our manufacturing processes. We will cover the configuration steps, how to utilize barcodes in different manufacturing scenarios, and the overall benefits of implementing this technology.
This presentation was provided by Rebecca Benner, Ph.D., of the American Society of Anesthesiologists, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
How to Download & Install Module From the Odoo App Store in Odoo 17Celine George
Custom modules offer the flexibility to extend Odoo's capabilities, address unique requirements, and optimize workflows to align seamlessly with your organization's processes. By leveraging custom modules, businesses can unlock greater efficiency, productivity, and innovation, empowering them to stay competitive in today's dynamic market landscape. In this tutorial, we'll guide you step by step on how to easily download and install modules from the Odoo App Store.
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...indexPub
The recent surge in pro-Palestine student activism has prompted significant responses from universities, ranging from negotiations and divestment commitments to increased transparency about investments in companies supporting the war on Gaza. This activism has led to the cessation of student encampments but also highlighted the substantial sacrifices made by students, including academic disruptions and personal risks. The primary drivers of these protests are poor university administration, lack of transparency, and inadequate communication between officials and students. This study examines the profound emotional, psychological, and professional impacts on students engaged in pro-Palestine protests, focusing on Generation Z's (Gen-Z) activism dynamics. This paper explores the significant sacrifices made by these students and even the professors supporting the pro-Palestine movement, with a focus on recent global movements. Through an in-depth analysis of printed and electronic media, the study examines the impacts of these sacrifices on the academic and personal lives of those involved. The paper highlights examples from various universities, demonstrating student activism's long-term and short-term effects, including disciplinary actions, social backlash, and career implications. The researchers also explore the broader implications of student sacrifices. The findings reveal that these sacrifices are driven by a profound commitment to justice and human rights, and are influenced by the increasing availability of information, peer interactions, and personal convictions. The study also discusses the broader implications of this activism, comparing it to historical precedents and assessing its potential to influence policy and public opinion. The emotional and psychological toll on student activists is significant, but their sense of purpose and community support mitigates some of these challenges. However, the researchers call for acknowledging the broader Impact of these sacrifices on the future global movement of FreePalestine.
How to Manage Reception Report in Odoo 17Celine George
A business may deal with both sales and purchases occasionally. They buy things from vendors and then sell them to their customers. Such dealings can be confusing at times. Because multiple clients may inquire about the same product at the same time, after purchasing those products, customers must be assigned to them. Odoo has a tool called Reception Report that can be used to complete this assignment. By enabling this, a reception report comes automatically after confirming a receipt, from which we can assign products to orders.
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...EduSkills OECD
Andreas Schleicher, Director of Education and Skills at the OECD presents at the launch of PISA 2022 Volume III - Creative Minds, Creative Schools on 18 June 2024.
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
1. The Impact of Gartner’s Maturity Curve,
Adoption Curve, Strategic Technologies
on Information Systems Research, with
Applications to Artificial Intelligence, ERP,
BPM, and RFID
Daniel E. O’Leary
University of Southern California
ABSTRACT: How does technology maturity and adoption affect samples, research
issues, and use of methodologies in information systems? What is a source of some
research issues in strategic and emerging technologies? This paper addresses these
questions and others using some frameworks generated by a well-known corporate
research group.
Gartner Group has been an icon to its corporate clients. However, Gartner has
received only limited attention by academics. This paper examines three related frame-
works used by Gartner for analyzing information systems ͑IS͒ and accounting informa-
tion systems ͑AIS͒ research. Although researchers have previously examined the adop-
tion curve, they generally have ignored the impact of the technology maturity curve and
the interaction of the two curves. The paper generates a number of findings, including
the finding that where a technology is on the maturity curve limits and facilitates the
type of research questions that can be addressed regarding that technology. In addi-
tion, Gartner’s “strategic technologies” can provide a basis for understanding which
technologies are likely to be appropriate for analysis by researchers.
Keywords: Gartner; maturity curve; adoption curve; strategic technologies; AIS
research; information systems research; artificial intelligence; enterprise
resource planning systems; ERP; business process management; BPM;
radio frequency identification; RFID.
INTRODUCTION
T
he Gartner Group provides information about a wide range of technologies, generally to
corporate clients, to facilitate the analysis and purchase of technologies. Although Gartner
is well-known in practice, there has been limited research in information systems ͑IS͒ or
accounting information systems ͑AIS͒ regarding frameworks used by Gartner for technology
This is an extended version of an earlier paper that was presented at the 2008 American Accounting Association Annual
Meeting in Anaheim, CA. The author thanks Paul Steinbart for his comments and suggestions on an earlier version of this
paper.
1
BY: REV: netscape@pub4/third/CLS_journals3/GRP_eta/JOB_v6-i1/DIV_002901eta
JOURNAL OF EMERGING TECHNOLOGIES IN ACCOUNTING American Accounting Association
Vol. 6 DOI: XXXX
2009
pp. 1–XXXX
Corresponding author: Daniel E. O’Leary
Email: oleary@usc.edu
Published Online: xx xxxx
1
2. maturity or adoption. Further, there has been limited research using Gartner’s so-called “strategic
technologies.” Although O’Leary ͑2008͒ initiated an analysis of AIS research from the perspective
of Gartner’s so-called “hype cycle,” this paper analyzes information systems research from the
perspective of the maturity and adoption curves, which have found broader-based acceptance.
Purpose of this Paper
Previous AIS researchers ͑e.g., Murthy and Wiggins 1999͒ have examined the overall issue of
what constitutes research in AIS. Other researchers have suggested the use of particular kinds of
research, e.g., case studies ͑Baker 2002͒ or design science ͑e.g., March and Smith 1995͒, to
investigate information systems research issues. However, it is not clear when case studies or other
methodologies ͑e.g., design science͒ are appropriate, or which technologies likely should be in-
vestigated.
In addition, researchers ͑Sutton 2005͒ have indicated that AIS is an applied discipline and that
AIS research can guide practice. However, there has been limited assessment of the flow of
contribution from practice to AIS. By using some of Gartner’s models, this paper suggests the
notion that practice also influences theory, and that both could gain from taking each other into
account.
Rogers ͑1983͒ and others have examined the impact of the “adoption curve,” e.g., studying
characteristics of firms at different stages, such as “innovator firms,” for technology diffusion.
However, the role of the maturity of technology has not received the same level of attention and
has not been juxtaposed to technology adoption.
Accordingly, the specific purpose of this paper is to examine some of the implications of three
different theoretical frameworks, used in practice, on research in accounting information systems.
In particular, I will examine how the passage of a technology through a life cycle ͑as captured by
Gartner’s maturity cycle and the adoption curve͒ affects the research that is done on or about that
technology. In addition, I will examine how using that life cycle can facilitate choice of a meth-
odology and a technology to analyze the effect of the technology. Further, I integrate Rogers’
͑1983͒ adoption curve into the analysis in order to drive additional understanding, examining the
joint impact of the stage of technology and adoption curve on firms. Finally, I examine the
potential use of Gartner’s strategic technologies to facilitate the choice of technologies to research.
I find that different research methodologies are appropriate or inappropriate at particular times
in the technology life cycle, based on factors that can be identified from the maturity cycle and
adoption curves. In addition, I find that empirical research about technologies is vulnerable to
sample bias, depending on where technologies are in their life cycle. I also find that the “strategic
technologies” concept provides an apparent approach for identifying new technologies research
investigations in AIS.
Outline of this Paper
This paper proceeds in the following manner. The first section has provided the motivation
and the outline of the paper. The next section briefly reviews Gartner’s maturity curve, the adop-
tion curve, and Gartner’s notion of strategic technologies. The third section drills down on the
maturity curve and its implications for AIS research. The fourth section analyzes in more detail the
adoption curve, examining both Gartner’s cumulative adoption curve and Rogers’ ͑1983͒ curve.
The fifth section studies the impact of integrating the maturity and adoption curves, and facilitates
an understanding that empirical research may be gathering biased samples. The sixth section
provides an example to illustrate the discussion, using enterprise resource planning systems. The
seventh section examines some extensions to the maturity curve. The eighth section analyzes
1
BY: REV: netscape@pub4/third/CLS_journals3/GRP_eta/JOB_v6-i1/DIV_002901eta
2 O’Leary
Journal of Emerging Technologies in Accounting Volume 6, 2009
American Accounting Association
3. Gartner’s notions of strategic technologies as a basis of understanding which technologies are
likely to have an impact in AIS. The final section briefly summarizes the paper, and discusses the
contribution and some extensions.
MATURITY CURVE, ADOPTION CURVE, AND “STRATEGIC TECHNOLOGY”
Linden and Fenn ͑2003, 6; see also Fenn 2007, 7͒ indicated that “several technology life cycle
models attempt to gauge the evolution of a technology. The two most popular are the…͓maturity
curve͔, which shows the increase in a technology’s performance over time, and the adoption curve,
which shows market adoption over time.” The maturity curve and cumulative adoption curve are
summarized in Figure 1.
Maturity Curve: Technology Change Categories
The maturity curve traces a technology’s change over time as it matures to meet user needs,
and takes the form of a so-called “S” curve. Effectively, the curve maps the cumulative capability
level of a technology. Labels for different stages in the maturity curve have been generated by
Gartner and are referred to as the “maturity levels.” Fenn ͑2007͒ lists key characteristics for the
FIGURE 1
Adoption S Curve and Maturity Curve
Source: Fenn (2007).
1
BY: REV: netscape@pub4/third/CLS_journals3/GRP_eta/JOB_v6-i1/DIV_002901eta
The Impact of Gartner’s Maturity Curve 3
Journal of Emerging Technologies in Accounting Volume 6, 2009
American Accounting Association
4. seven different levels or stages of the framework ͑see Table 1͒: embryonic, emerging, adolescence,
early mainstream, mature mainstream, legacy, and obsolescence. The curve can be integrated with
the different qualitative levels as seen in Figure 2.
Adoption Curve: Firm Adoption Characteristics
The adoption curve has been presented in two different formats. The cumulative version, used
by Gartner, is the adoption curve that traces the cumulative adoption of a technology over time. At
the intersection of the maturity and adoption curves, a technology has achieved roughly a 20
percent adoption rate. Further, when cumulative adoption decreases, it indicates that the technol-
ogy is obsolete and users are shunning it for other technologies.
Rogers ͑1983͒ also investigates the adoption curve and includes additional information to the
probability density version of the adoption curve ͑in contrast to the cumulative version͒, as seen in
Figure 3. So-called “ideal” types of firms are generated based on when the technology is adopted:
innovators, early adopters, early majority, late majority, and laggards. The characteristics of these
levels are summarized in Table 2.
“Strategic Technology”
“Strategic technology” is a bit different from the two previous frameworks. The term implies
a value to enterprises that is associated with the technology, not just with how mature the tech-
nology is or how much adoption the technology is getting. In particular, Gartner ͑2007͒ defines a
strategic technology as a technology:
TABLE 1
Maturity Levels
Maturity Level Status Products/Vendors
Embryonic In labs None
Emerging Commercialization by vendors
pilots and deployments by
industry leaders
First generation high price
much customization
Adolescent Maturing technology
capabilities and process
understanding uptake
beyond early adopters
Second generation less
customization
Early Mainstream Proven technology vendors,
technology and adoption
rapidly evolving
Third generation more out of
box methodologies
Mature Mainstream Robust technology not much
evolution in vendors or
technology
Several dominant vendors
Legacy Not appropriate for new
developments cost of
migration constrains
replacement
Maintenance revenue focus
Obsolete Technology is rarely used;
new technology has
supplanted original
technology
Used/resale market only
Source: Fenn ͑2007͒, available at: http://www.gartner.com/DisplayDocument?idϭ509085.
1
BY: REV: netscape@pub4/third/CLS_journals3/GRP_eta/JOB_v6-i1/DIV_002901eta
4 O’Leary
Journal of Emerging Technologies in Accounting Volume 6, 2009
American Accounting Association
5. with the potential for significant impact on the enterprise in the next three years. Factors that denote
significant impact include a high potential for disruption to IT or the business, the need for a major
dollar investment, or the risk of being late to adopt.
Unlike the maturity curve or the adoption curve, the notion of strategic technologies is fo-
cused virtually entirely on the presentation of ten specific technologies for each year. The strategic
technologies for 2004–2008 are summarized in Table 3.
MATURITY CURVE AND INFORMATION SYSTEMS RESEARCH
The maturity level framework provides a view of the use of technology changing over time
͑Table 1 and Figure 2͒. We will examine the impact of the technology maturity of a technology on
AIS research by examining each of the stages.
Embryonic
The “embryonic” stage is the first stage on the maturity curve. It is at this stage that most
hardware and computer science-like research is done and that technology design questions are
FIGURE 2
Adoption Curve and Maturity Curve with Levels and Adoption Rates
Sources: Linden and Fenn (2003) and Fenn (2007).
1
BY: REV: netscape@pub4/third/CLS_journals3/GRP_eta/JOB_v6-i1/DIV_002901eta
The Impact of Gartner’s Maturity Curve 5
Journal of Emerging Technologies in Accounting Volume 6, 2009
American Accounting Association
6. asked. Further, the models that ultimately are embedded in software and applications are initiated
at this stage, before commercialization. For example, Hart et al. ͑1978͒ developed an expert
system in a geology domain that laid out key principles of representing uncertainty in expert
systems. This is truly a stage where design science ͑Hevner et al. 2004͒ dominates. There is no
data for empirical analysis or even case studies of the impact of the technology on organizations,
and no actual information about so-called “things gone right” or “things gone wrong” with the
technology in organizations, since it has not really been deployed in organizations. However, at
this stage, research can begin to anticipate developments and applications by soliciting expert
opinion ͑O’Leary 2002͒, e.g., in Delphi studies ͑Baldwin-Morgan 1993͒. Further, behavioral re-
search might be done that anticipates the use of the technology, e.g., user interface design. Survey
research done at this stage can only be exploratory about what a user might want or not want,
because the technology has not been deployed in real-world settings at this stage.
Emerging
Technologies at the emerging level are being placed in application environments for the first
time and thus are “emerging” out of the laboratories. There is commercialization by vendors, and
there are pilots and deployments by industry leaders. However, the technology is first-generation.
Because the technology and its underlying models have not stabilized, design science develop-
ments by academics may contribute to the overall development of the technology. Further, design
science researchers can facilitate organizational adoption with further developments in the tech-
nology.
It is at this stage in a technology’s maturity that researchers and implementers can begin to see
what is going right with applications and what is going wrong. Case studies might be used to
capture some of those characteristics to better understand the situation of the technology in orga-
FIGURE 3
Adapter Categorization on Basis of Innovativeness
Source: Rogers (1983, 247).
1
BY: REV: netscape@pub4/third/CLS_journals3/GRP_eta/JOB_v6-i1/DIV_002901eta
6 O’Leary
Journal of Emerging Technologies in Accounting Volume 6, 2009
American Accounting Association
7. nizations, as individual firms implement the technology ͑e.g., Sviokla and Keil 1988͒. Further,
surveys or interviews with experts, vendors, and industry leaders can begin to understand what is
or is not working as the technology is introduced into organizations. At this stage, vendors may be
reaching out to academics to help with the technology diffusion. As a result, some researchers
might develop prototypes or pilot implementations themselves to study the technology as situated
in organizations ͑Barker and O’Connor 1989͒.
As technologies move from embryonic to emerging ͑and even into later͒ stages, issues other
than the functionality of the technology become apparent and important. For example, as the
technology is placed into organizational settings, related issues such as security become important.
For example, as expert systems emerged from the laboratories, O’Leary ͑1990͒ analyzed how
security would become an important part of such systems if they were accepted into organizations.
Research investigating the consequences—anticipated or unanticipated—of the new technology
might be initiated at this and later stages as the technology is better understood.
At this stage, data can be gathered from organizational settings for empirical research
͑O’Leary and Turban 1987͒. However, the data is of limited application because the sample of data
is biased, for a number of reasons: the technology is of the first generation, the number of adopters
is small, adopters need substantial resources because the technology has a high price, and the
technology often must be customized to meet user needs.
Behavioral research may be used to find limitations or strengths in technology use. For
example, behavioral research can help understand a technology’s limitations from the user’s or
manager’s perspective and drive change to the second generation.
TABLE 2
Adopter Categories
Adopter Category Key Characteristics Role
Innovators Venturesome, eager to try new
ideas. Communication
patterns among innovators
are common.
Launches new idea in the
social system by importing
the innovation from outside
system.
Early Adopters Respectable, has the greatest
degree of opinion
leadership. The people to
check with before using a
new idea.
Decrease uncertainty about an
idea by adopting it and then
conveying an evaluation to
near peers.
Early Majority Deliberate, adopt just before
the average. Interact with
peers, but not in a
leadership position.
Provide deliberate willingness
in adopting innovations, but
not lead.
Late Majority Skeptical, adopt just after the
average. Innovations are
approached with skeptical
and cautious air.
Their scarce resources mean
that almost all of the
uncertainty about an idea
must be removed before they
adopt it.
Laggards Traditional, they possess no
opinion leadership. Their
point of reference is in the
past. When laggards adopt,
the innovation may have
already been superseded.
Last to adopt an innovation.
Source: Rogers ͑1983͒, pp. 247–251.
1
BY: REV: netscape@pub4/third/CLS_journals3/GRP_eta/JOB_v6-i1/DIV_002901eta
The Impact of Gartner’s Maturity Curve 7
Journal of Emerging Technologies in Accounting Volume 6, 2009
American Accounting Association
8. Adolescent
Since the technology is now in its second generation, there are fewer opportunities to address
design science issues. However, case studies are likely to be important as leading firms struggle to
implement the technology. Since the technology is now in its second generation, the technology is
beginning to stabilize. Further, organizations are gaining experience with the technology so that
best practices are beginning to emerge. Accordingly, research using case studies or surveys on
“things gone right” and “things gone wrong” is likely to find its way into the literature and the
classroom. For example, Barker and O’Connor ͑1989͒ investigated the use of expert systems at
Digital Equipment, providing insights into what was working and what were some key problems.
As firms begin to adopt the technology, opinion studies become less interesting since there are
actual settings in which the technology is being implemented ͑O’Leary 2002͒. However, as firms
TABLE 3
Strategic Technologies 2004–2008
2004 2005 2006 2007 2008
Instant Messaging Instant
Messaging
Virtualization Open Source Green IT
Real-Time Data Warehousing Wider Use of
WLANs
Grid
Computing
Virtualization Unified
Communications
Wireless LANS Taxonomies Service
Oriented
Business
Applications
Service
Registries and
Repositories
Business Process
Modeling
Web Services IP Telephony Pervasive
Computing
Business
Process
Management
Suites
Metadata
Management
Network Systems Management Software
Treated as a
Service
OLED/LEP
Technologies
Enterprise
Information
Management
Virtualization 2.0
IP Telephony Static and
Unshared
Island, Real-
Time
Enterprise
͑RTE͒
Infrastructure
Location
Aware
Services (e.g.,
RFID)
Ubiquitous
Computing
Mash-Ups and
Composite Apps
Utility Computing Utility
Computing
Linux Information
Access
Web Platform and
WOA
Grid Computing Grid Desktop
Search
Web 2.0 Ajax
Rich Clients
Computing Fabric
Network Security Technologies Network
Security
Convergence
Micro-
commerce
Web 2.0
Mash-Up
Composite
Model
Real World Web
RFID Tags RFID Tags Instant
Messaging
Communities
and Collective
Intelligence
Social Software
Compiled November 2008.
Technologies in italics occur more than one year.
1
BY: REV: netscape@pub4/third/CLS_journals3/GRP_eta/JOB_v6-i1/DIV_002901eta
8 O’Leary
Journal of Emerging Technologies in Accounting Volume 6, 2009
American Accounting Association
9. adopt the technology, impact studies about the actual effect of the technology gather interest.
Further, survey research about the use of the technology can be developed since some firms
actually are implementing the technology.
Sample bias using empirical research can emerge at this step. Some firms may be using
different ͑either first or second͒ generations of the technology. For example, the adoption of RFID
by Metro ͑Ton et al. 2005͒ requires choosing which generation of RFID chips is to be used. Thus,
empirical findings about RFID and other technologies may be driven by the different versions of
the technologies actually used, as well as by the firms using them, as discussed below. Further, the
coexistence of multiple generations may confound and camouflage results.
Again, behavioral research may drive a better understanding of the strengths and weaknesses
of technology usage. Behavioral research can be an important source of information to drive
change in technology to the third generation, introduced as the technology goes early mainstream.
Early Mainstream
As applications go mainstream, unbiased sample empirical research that relates to organiza-
tional adoption becomes more feasible, because a larger sample of firms has now adopted the
technology. As a result, it is at this stage that large-scale empirical analysis can begin to analyze
firm characteristics. However, design science and modeling issues become less important, as many
of the major problems have already been addressed in the third generation of products. Similarly,
case studies are of less interest because a number of organizations have already adopted the
technology. The quality of opinion data is overridden by actual experience with the technology
͑e.g., O’Leary 2002͒. Behavioral research that needs mature artifacts can now be developed since
the third generation of products exists ͑e.g., Arnold et al. 2006͒.
Mature Mainstream
Similar to early mainstream, in the mature mainstream, important research issues associated
with technology adoption and diffusion can be addressed using empirical research, as researchers
can follow the flow of adoption across firms and industries. It is at this stage that full empirical
analysis of unbiased samples of accounting and stock market data is likely to be feasible. On the
other hand, design science applications generally are too late, unless they push the technology ͑or
a portion of it͒ back in the maturity curve through new developments. Case studies are no longer
of much interest, because the technology is already implemented in a number of environments.
Behavioral research can be used at this stage. In particular, behavioral research that employs
fully developed artifacts can be used. For example, Arnold et al. ͑2006͒ analyzed an expert system
that probably would be categorized as early or mature mainstream. Their research likely could not
be done until an artifact that was sufficiently developed could be investigated.
Legacy
As systems move into legacy environments there are a large number of examples of the
technology, but the technology is so widespread that few “secrets” of its use exist. Design science,
cases, opinion, surveys, etc., are not of general interest, since most issues have been addressed.
Legacy technologies are well accepted and widely dispersed. Unfortunately, from an information
systems perspective, so-called legacy systems have received only limited attention ͑e.g., Bisbal et
al. 1999͒.
At times, the need to fix legacy systems has generated additional research concerns. For
example, with the year 2000 problem, substantial attention was devoted to legacy software. As
firms make additional applications available online, potentially including legacy applications,
issues of the security of legacy applications may become increasingly important. In general,
1
BY: REV: netscape@pub4/third/CLS_journals3/GRP_eta/JOB_v6-i1/DIV_002901eta
The Impact of Gartner’s Maturity Curve 9
Journal of Emerging Technologies in Accounting Volume 6, 2009
American Accounting Association
10. legacy systems can provide a large sample; because of the systems’ legacy status, firms are less
likely to be concerned about the disclosure of value-creating capabilities. As a result, reasonable
samples of firms conceivably could be generated for empirical research. Unfortunately, there is
likely to be only limited interest in studies about legacy systems. However, as we can see from the
changing maturity levels, “Today’s emerging technology is tomorrow’s legacy technology.”
Obsolete
As technologies move out of the legacy category, they become obsolete. A life cycle analysis
leads to an interesting finding that apparently little research ͑AIS or management information
systems͒ is done on technology at this stage. However, it would appear that there are important
research questions that can be addressed. For example, understanding what makes a technology
“obsolete” might be used to predict when a technology will become obsolete. In particular, what
signals can suggest that a technology is no longer going to be used? Is it lack of support by a
vendor that ultimately categorizes a technology as obsolete?
Applying to AIS Research
Different methodologies and corresponding research questions can be addressed at different
stages of a technology. For example, at the embryonic stage, design science activities, such as the
development of models, software, and hardware, are likely to drive the research, since there is
limited descriptive data about how the technology works. At the embryonic stage, design science
approaches, such as prototyping or modeling, can be the primary tools. Further, at the embryonic
stage, expert opinion about the technology or its use is likely to be sought out.
At the emerging and adolescent stages, there is likely to be a focus on case studies that can
generate information about best practices, things gone right, and things gone wrong. Expert opin-
ion may be of interest in the case of emerging issues such as the situation of the technology in
organizations. At these stages, empirical research is likely to be generated using biased samples.
As an example, technology at the emerging stage is first-generation and is more costly than it will
be at later stages. Such “mixes” of technologies may bias away from finding results.
However, as the technology moves into later maturity levels, such as early and mature main-
stream, alternative research approaches become feasible and preferred. Movement of a technology
into early mainstream and mature mainstream allows researchers to gather larger samples of
technology uses and to examine issues such as the impact on stock prices or accounting measures,
without biased samples, using empirical archival studies. However, at these stages, design science,
case studies, surveys, and opinions are not of general interest.
Particular technology maturity levels are likely to be amenable to particular research ques-
tions. For example, Table 4 summarizes some applications to the maturity level framework, fo-
cusing on potential research issues and methodologies that match the maturity level information
and research issues. Table 5 provides another approach to map maturity level onto accounting
application type.
Finally, from a sample perspective, it is likely that the sample of firms at each stage is
different. For example, firms involved at the embryonic stage are likely to have different charac-
teristics than firms involved only at the legacy stage. Firms at the embryonic stage are likely to
have research and development dollars that can be spent on such activities. Such firms also are
likely to be in industries where it may be necessary to be aware of the development of such
technologies. Accordingly, more dynamic industries are likely to be involved in the development
of a technology at the embryonic stages. From a research perspective, that suggests a potential bias
in the sample of firms gathered at particular stages. Accordingly, maturity stage may be a corre-
lated omitted variable that should be accounted for in empirical studies.
1
BY: REV: netscape@pub4/third/CLS_journals3/GRP_eta/JOB_v6-i1/DIV_002901eta
10 O’Leary
Journal of Emerging Technologies in Accounting Volume 6, 2009
American Accounting Association
11. ADOPTION CURVE: FIRM CHARACTERISTICS AT DIFFERENT STAGES
The adoption curve also has qualitative stages, as seen in Table 2. There has been a substantial
literature aimed at understanding the adoption process of technologies and how actors on that
curve differ from one another. In this section we examine the characteristics associated with the
different categories, including “innovator,” “early adopter,” “early majority,” “late majority,” and
“laggards.”
There are a number of implications about the adoption curve for information systems re-
search. First, where a technology is on the adoption curve indicates something about the number
TABLE 4
Maturity Levels, Research Issues, and Research Methodologies
Maturity Level Sample Research Issues Research Methodologies
Embryonic What is it? How can I get it
to work?
Design Science, Model
Development, Prototyping,
Expert Opinion
Emerging How does it work in an
organization? What are the
benefits of the technology?
Design Science, Prototyping,
Case Studies, Survey of
Impacts, Benefits of
Technology Behavioral
Study for Design
Adolescent Why are firms adopting? What
went wrong in
implementations?
Case Studies, Limitations of
Technology
Early Mainstream How are organizations
adopting to the technology?
What is the measurable
impact of the technology?
Behavioral Studies of System
use, Descriptive Research
using Stock Prices or
Accounting Measures
Mature Mainstream What is the measurable impact
of the technology?
Descriptive Research using
Stock Prices or Accounting
Measures
Legacy Other issues, some not
technology related, such
project management or
updating concerns
Descriptive Research since not
a Competitive Advantage
Obsolete What happened, so we don’t
do it again?
Case Studies Empirical
Analysis
TABLE 5
Maturity Level versus Accounting Type
Financial Managerial Auditing Tax Systems
Embryonic
Emerging
Adolescent
Early Mainstream
Mature Mainstream
Legacy
Obsolete
1
BY: REV: netscape@pub4/third/CLS_journals3/GRP_eta/JOB_v6-i1/DIV_002901eta
The Impact of Gartner’s Maturity Curve 11
Journal of Emerging Technologies in Accounting Volume 6, 2009
American Accounting Association
12. of firms that are available as a sample for research. In the beginning there are few firms available
for empirical analysis, while by the end there are substantial numbers of firms.
Second, as discussed in Rogers ͑1983͒, Mahler and Rogers ͑1999͒, and others, there are
distinct differences between the firms in the five categories on the adoption curve. For example, as
noted in Mahler and Rogers ͑1999, 730͒, “Strong relationships exist between innovativeness
scores and various indicators of bank size, such as total assets, employees, number of branches,
number of subsidiaries, and number of customers.” In a range of studies, “size” differentiates firms
that fall into different categories, such as “innovators” ͑Mahajan et al. 1990͒.
Third, as discussed by Harrison and Waite ͑2006͒, the benefits of adopting a technology vary
significantly by adoption curve category. As a result, the business cases apparently differ based on
which category the firm occupies, with innovators generating substantially greater benefits along a
range of dimensions. In addition, Pennings and Harianto ͑1992͒ found that adoption curve cat-
egory was dependent, in part, on existing technology infrastructure and prior experience. But they
also found size was an important variable.
Applying to IS and AIS Research
In any case, this discussion illustrates that both the number of firms available as data points
and the categories of firms on the adoption curve have different characteristics. These are critical
findings from a research perspective, since they imply that the findings of any empirical analysis
of firms will vary based on which group of firms the research is conducted upon and at what point
along the adoption curve the research is done. Further, simply the number of firms using the
technology and available as data points will vary based on location in the adoption cycle.
In particular, since the different categories of adopters have different characteristics, such as
size, this would suggest that analyses of firms that are innovators or early adopters will not
generalize to other categories. For example, innovators and laggards provide different samples of
firms, and have not only different characteristics, but also different reasons and strategies for
adopting a technology. As a result, we are likely to find different results in terms of the impact of
a technology if we use a sample of innovators as compared to a sample of laggards, or some
broader base of firms. Accordingly, the results of an analysis on innovators or early adopters likely
will not generalize to other groups of firms. As an example, O’Leary and Watkins ͑1995͒ inves-
tigated general characteristics of firms that had implemented artificial intelligence in internal
auditing. Because the results were obtained largely from “innovator” firms in artificial intelligence,
it is likely that some of the results generated may not generalize to firms in other parts of the
adoption curve.
INTERACTION BETWEEN ADOPTION AND MATURITY CURVES: FIRMS VERSUS
TECHNOLOGY
Empirical research depends on analysis of the behavior of large groups of firms at some point
in time. As a result, in order to do empirical research, we need to be able to generate large
unbiased samples of firms, or recognize that the results are limited to a particular category of user.
The joint interaction between the adoption and maturity curves is useful in identifying the
types of firms involved at different technology adoption levels. For example, from Figure 2, we
can map the 5 percent adoption and the 20 percent adoption marks to the maturity curve. Quali-
tatively we can see that roughly 5 percent of the adoptions occur by the time the technology has
moved from “embryonic” to “emerging” to “adolescence.” Further, 20 percent of the adoption
corresponds to having the technology move through “early mainstream.” Further, we can map the
qualitative categories from adoption and maturity to each other as seen in Table 6 providing a map
of the types of firms in the sample at the different portions of the technology life cycle.
1
BY: REV: netscape@pub4/third/CLS_journals3/GRP_eta/JOB_v6-i1/DIV_002901eta
12 O’Leary
Journal of Emerging Technologies in Accounting Volume 6, 2009
American Accounting Association
13. Examining the interaction of adoption curves and maturity curves in Table 5 ͑based on
Figures 2 and 3͒, we notice that particular types of firms are most likely to adopt a technology at
a particular point in time. As a result, sampling can result in biased samples. For example, if data
is gathered at the time the technology is in the embryonic stage, we are likely to have a sample of
“innovator” firms only. Similarly, if the data is gathered at the emerging or adolescent stages, then
we will find our sample dominated by innovators and early adopters. Until the early mainstream,
we are unlikely to have any balance in our sample. Further, it will not be until a technology enters
the mature mainstream that we will have a relatively unbiased sample. Interestingly, even at that
time we are not likely to have so-called laggards in our sample, so there are still sample biases.
As seen in Table 6, the adoption and maturity curves are highly but not perfectly correlated.
In particular, there can be multiple adopter groups in a maturity group, and adopter groups can
appear in multiple maturity categories. For example, “innovators” appear in both the “embryonic”
and “emerging” categories, while the “emerging” category has both “innovators” and “early adopt-
ers.”
EXAMPLE: ERP (ENTERPRISE RESOURCE PLANNING) SYSTEMS
As reported in O’Leary ͑2000͒, in 1993, during the early days of client-server computing, the
entire ERP market was around $300 million. By 2005, SAP, the largest vendor, had revenue of
$10.5 billion ͑Maguire 2006͒.
We can try and map the ERP development to the maturity cycle. Based on O’Leary ͑2000͒,
ERP was an emerging technology in 1993, since the market was small ͑less than 5 percent of total
adoptions, i.e., adoption percent͒ and the products were in their first generation. As of 1994 and
1995, a few industry leaders, such as Cisco ͑Cottelear et al. 1998͒, had begun to implement ERP
software.
In the late 1990s ERP likely was in adolescence. In 1998 Deloitte published a report titled
“ERP Second Generation” ͑Deloitte 1998͒. As a result, we can assume that at this time the
technology was in the second generation. As further evidence, in 2000, Gartner declared, “ERP is
dead, long live ERP II” ͑Bond et al. 2000͒, drawing a line in the sand indicating the end of one era
and the beginning of another. In the same Deloitte ͑1998͒ report, the focus was on benefits, i.e.,
“things gone right.” Further, O’Leary ͑2004͒, using data from 1999, developed a comparative
study to the Deloitte ͑1998͒ report.
In the early 2000s there was evidence that ERP had entered the “early mainstream” to “mature
TABLE 6
Integrating Maturity and Adoption Categories
“At what maturity level do different groups adopt a technology?”
Innovators
Early
Adopters
Early
Majority
Late
Majority Laggards
Adoption
%
Embryonic x
Emerging x x
Adolescent x 5%
Early Mainstream x x 20%
Mature Mainstream x x
Legacy x x
Obsolete x
Maturity % 2.50% 13.50% 34% 34% 16%
1
BY: REV: netscape@pub4/third/CLS_journals3/GRP_eta/JOB_v6-i1/DIV_002901eta
The Impact of Gartner’s Maturity Curve 13
Journal of Emerging Technologies in Accounting Volume 6, 2009
American Accounting Association
14. mainstream” level, since most ERP software had become web-enabled, and the technology entered
the third generation. As a result, it was not surprising, if we look back and take note, that there was
a criticism of the use of expert opinion, as a research methodology, at a relatively late date in
ERP’s maturity curve ͑O’Leary 2002͒ because actual data existed. By sometime around 2005, it
was likely that ERP had entered the mature mainstream level of the maturity cycle.
ERP Cases
In order to further analyze this issue, I have summarized the enterprise resource planning
͑ERP͒ systems case studies available from the Harvard collection ͑Table 7͒. The very first cases,
published in 1995 and 1996, were concerned with processes and ERP systems. This corresponds to
issues addressed with emerging and adolescent technologies. The case by Davenport ͑1995͒ in-
vestigating Heatway, suggests that the relationship between reengineering and ERP systems was
not well-understood. Through 1996 and into 1999, the concern was with the classic ERP life cycle
of requirements analysis, choice, and implementation, when ERP was in its adolescence and was
becoming early mainstream. The limited understanding of the technology is exemplified by
Cisco’s budget generation and project time estimates, which were found to be relatively unfounded
͑Cottelear et al. 1998͒. However, around 2000, the focus shifted to integration between ERP
systems and integration of ERP systems with so-called “e-business.” Since that time other ERP
cases have focused on emerging issues such as upgrading an existing ERP system ͑e.g., McAfee
et al. 2004͒ or business intelligence. That corresponds to the technology going through early
mainstream to mature mainstream, as issues related to how the systems would interface with
customers and internal systems were addressed along with issues such as making money with the
technology.
ERP Research and the Maturity Cycle
Interestingly, some empirical work on ERP systems was done by a number of authors in the
early 2000s. Poston and Grabski ͑2001͒ was a groundbreaking study that used data from 1989–
1997. As a result, it is possible that their sample was biased to maturities in the embryonic,
emerging, or possibly the beginning of adolescence stages. In addition, the firms that they inves-
tigated were likely “innovators” or at least “early adopters;” that likelihood could also potentially
bias the results. Poston and Grabski ͑2001͒ found no improvement in selling, general or admin-
istrative, or residual income. An alternative potential explanation from the maturity curve is that
the technology will have a high price and be highly customized in general in the emerging stage
or not meet user needs. Based on the maturity curve argument, we would anticipate that the cost
function changes as the technology moves along the maturity curve. As a result, a more recent
sample of firms, associated with third-generation technology, might provide a different set of
findings; of course, this is an empirical question.
EXTENSION: CHANGES TO TECHNOLOGIES THROUGH THE MATURITY MODEL
A number of changes can influence technologies and affect their life cycle, resulting in
changes to the maturity curve ͑e.g., Fenn 2007͒. First, technologies can be embedded in other
technologies and cease to function as stand-alone. This seems to be a life cycle aspect of many
developments in artificial intelligence ͑e.g., O’Leary and Watkins 1992͒. Second, technologies
may splinter into other concepts, or other technologies may merge together. For example, knowl-
edge discovery is generally thought to consist of techniques from artificial intelligence and statis-
tics. Third, technologies can become extinct, or at least substantially decrease in apparent use, at
any point in the life cycle. Fourth, the audience for a technology can change, also influencing the
life cycle. For example, KPMG’s knowledge management system was initially aimed only at
1
BY: REV: netscape@pub4/third/CLS_journals3/GRP_eta/JOB_v6-i1/DIV_002901eta
14 O’Leary
Journal of Emerging Technologies in Accounting Volume 6, 2009
American Accounting Association
15. TABLE 7
List of ERP Cases
Case
Original
Date Issues Sector Issuer
Order Management
Reengineering at Heatway
1995 Process Reengineering Private Harvard
Vandelay Industries, Inc. 1996 ERP Design, Best Practices
and Cost
Private Harvard
Medalco: The SAP Proposal 1996 ERP Requirements Analysis
and System Choice
Private Ivey
Cisco Systems: Implementing
ERP
1998 ERP Requirements Analysis,
Choice, and Implementation
Private Harvard
Timberjack Parts: Packaged
Software Selection Project
1998 ERP System Choice and
Requirements Analysis
Private Harvard
Tektronix, Inc.: Global ERP
Implementation
1999 ERP Implementation Private Harvard
Harley Davidson Motor
Company: Enterprise
Software Selection
1999 ERP Requirements Analysis
and System Choice
Private Harvard
Rich Con Steel 1999 ERP Choice, Design and
Implementation
Private Harvard
IBM Technology Group 2000 ERP Integration for E-
Business
Private Harvard
Whirlpool Europe 2001 Cost Benefit of ERP
Implementation
Private Harvard
Moore Medical 2001 Peripheral to ERP Private Harvard
Extricity, Inc. 2001 ERP Integration for E-
Business
Private Harvard
Digital China Holdings
Limited: ERP as a Platform
for Building New
Capabilities
2002 Relationship between ERP
and E-Commerce
Private Harvard
Business Intelligence Software
at Sysco
2004 Getting to ERP Information
through Business Intelligence
Private Harvard
Enterprise IT at Cisco 2004 2004 ERP Upgrade Private Harvard
KL World Wide Enterprises,
Inc.: Putting Information
Technology to Work
2005 E-business, ERP is peripheral Private Northeastern
Information Technology at
COSCO
2005 Business Impact of ERP Private Harvard
Esterline Technologies: Lean
Manufacturing
2006 Peripheral to ERP Private Harvard
Richter: Information
Technology at Hungary’s
Largest Pharma
2008 3rd Wave of ERP System
Issues,
Data warehouse, IT
Governance
Private Ivey
Return of the JEBI 2002 ERP and Procurement
Integration
Public Sector HKU
Indian Oil Corporation
Limited: Project Manthan
2004 Years into an ERP
Implementation
Public Sector Ivey
The San Diego City Schools 2006 Return on Investment Public Sector Kellogg
Enterprise Resource Planning
Software: Ongoing
Maintenance Cost Benefit
Analysis
2006 Determine whether or not to
upgrade or change vendors
Public Sector Ivey
1
BY: REV: netscape@pub4/third/CLS_journals3/GRP_eta/JOB_v6-i1/DIV_002901eta
The Impact of Gartner’s Maturity Curve 15
Journal of Emerging Technologies in Accounting Volume 6, 2009
American Accounting Association
16. partners ͑Gladstone and Eccles 1995͒ and not at lower-level knowledge workers. However, the
system ultimately was implemented to focus on providing knowledge to all knowledge workers.
Fifth, technologies can go on “hold” or have no recognized specific applications in accounting or
auditing. For example, “grid computing” appears to have limited applications for domains such as
accounting and auditing.
These many changes can be reflected in the maturity curve. In particular, Gartner’s maturity
model can be extended to account for major changes in a technology. For example, supply chain
capabilities were integrated into enterprise resource planning systems, generating a more complete
solution with greater cumulative capabilities. One representation of that rapid increase in capa-
bilities is summarized in Figure 4. That figure captures the following scenario. A technology is
going through a normal maturity, gradually gaining new capabilities. However, at some point in
time, a large number of capabilities are added simultaneously. This results in a large jump in the
capabilities curve.
An interesting issue in Figure 4 is that after each innovation, there is a “dip” in the capabili-
ties. This is consistent with the notions of technology adoption in two ways. First, after any
technology adoption there is a time when new technology does not bring improvements, because
the full implications of how to use the technology are not clear. When radio frequency identifi-
cation ͑RFID, discussed below͒ was first used in a supply chain environment, some suppliers used
a “slap and ship” approach. This meant that they just put the tag on the goods being shipped, but
the tag may have been inappropriate ͑e.g., the wrong generation͒ or in the wrong spot to be read,
etc. As a result, performance did not improve, and costs increased, as firms often relied on
paper-based processes to convey the same, duplicate information. Second, as seen with disruptive
technologies ͑Bower and Christensen 1995͒, innovations often lead to short-term decreases in
capabilities.
FIGURE 4
Maturity Curve with Innovations
1
BY: REV: netscape@pub4/third/CLS_journals3/GRP_eta/JOB_v6-i1/DIV_002901eta
16 O’Leary
Journal of Emerging Technologies in Accounting Volume 6, 2009
American Accounting Association
17. STRATEGIC TECHNOLOGIES AND AIS
Gartner’s “strategic technologies” list provides insights into what Gartner thinks are those
technologies that will have a large impact in the next three years or so. As a result, these are likely
to be technologies that are in the adolescent or early mainstream stages in the maturity framework.
The notion of a strategic technology has limited theoretical structure, generally resulting in a
yearly list of particular technologies. A summary of five years of top ten strategic technologies is
given in Table 3.
In Table 3, I have italicized those technologies that show up more than once. In some cases
the names are exact, while in others they are just very similar ͑business process management suites
versus business process modeling, and grid computing versus grid͒.
There were roughly 36 different technologies over the five-year period, or about seven new
technologies per year. Web services/software as a service lasted the longest, with versions in four
different years. Many of the technologies, such as “instant messaging,” “virtualization,” and “grid
computing,” apparently do not have substantial uniquely accounting application or concerns.
However, this list would appear to provide a starting point for a range of AIS research topics. For
example, as discussed later in the paper, business process management appears to provide an
important technology for AIS researchers.
Research strategies could include choosing technologies that had appeared on “r” ͑for some r
greater than or equal to 1͒ different lists of strategic technologies. Alternatively, researchers might
limit their selection to the most recent set of technologies, or focus on those that had the clearest
accounting and auditing applications.
In AIS, in addition to the technology, researchers need to consider the area of application
͑Table 5͒. In particular, that typically means that researchers choose a technology that has a basis
in one of the functional areas of accounting, e.g., financial accounting or management accounting
͑e.g., business process management͒, but also occurs early in the life of the technology. Generally,
AIS researchers would chose a technology for which there is a match to an accounting problem or
accounting subdiscipline. Some technologies, such as RFID, at this time do not have well-
established or direct accounting ties. As a result, the matching of technology to accounting area
becomes a critical research activity early in the life cycle.
Business Process Management
Business process management ͑BPM͒ has been given many definitions, including the follow-
ing definition by Microsoft:
BPM is the use of an integrated set of key performance indicators that are used to monitor an
organizational process in real time. Business process management ͑BPM͒ is a management disci-
pline that combines a process-centric and cross-functional approach to improving how organiza-
tions achieve their business goals. A BPM solution provides the tools that help make these pro-
cesses explicit, as well as the functionality to help business managers control and change both
manual and automated workflows.
In 2007 business process management was included among the top ten strategic technologies
͑Gartner 2007͒. Further, based on Table 3, we can see that BPM shows up as a strategic technol-
ogy in both of the last two years.
Business process management is a virtual merger of management accounting and accounting
information systems. BPM is about managing a process, but it is also about choosing the right key
performance indicators—ones that are aligned with strategy and facilitate management of that
process. Interestingly, apparently there has been little research by AIS academics in the area of
BPM. O’Leary ͑2009͒ provides a BPM design science structure for a particular accounting pro-
cess. Based on the discussion earlier in the paper, we are likely to find some different kinds of
1
BY: REV: netscape@pub4/third/CLS_journals3/GRP_eta/JOB_v6-i1/DIV_002901eta
The Impact of Gartner’s Maturity Curve 17
Journal of Emerging Technologies in Accounting Volume 6, 2009
American Accounting Association
18. research as we move through either the maturity cycle. For example, “things gone right” or “things
gone wrong,” based on information flows about positive or negative events, are likely to appear as
a technology goes into adolescence or even early mainstream. Recently, some case studies have
begun to be developed illustrating some of the BPM issues ͑O’Leary 2009͒. Behavioral research
might examine design issues at first and then move to analysis of implemented systems. As the
technology matures, we might see research about how stock market price or accounting measures
are influenced by disclosures about BPM, as the sample becomes less biased away from the early
adopters.
RFID (Radio Frequency Identification)
RFID is a technology that can be used to uniquely identify objects. We find it multiple times
in the top ten strategic technologies over the time period 2004–2008. In 2004, Metro ͑Ton et al.
2005͒ and other large retailers began implementing the first generation of RFID. There was much
talk about how the technology needed to come down in price, and expenses are a key part of Ton
et al. ͑2005͒. At that time, few firms had really adopted the technology, and there was limited
experience with the technology by firms. Although there was a substantial push by some large
retailers, such as Wal-Mart, apparently RFID had not received the attention that had been ex-
pected. Thus, RFID fits nicely into the “emerging” technology category. Because the technology is
emerging, we would expect case studies like Ton et al. ͑2005͒ as a first step. In addition, Ton et al.
͑2005͒ begins to provide an analysis of “what went right” and “what went wrong.” For example,
in 2004, Metro’s plan was to have over 250 retail stores, 10 distribution centers, and 100 suppliers
using RFID, but at the time of the case there were 13, nine, and 33, respectively. The case allows
analysis of why the number of retail stores and suppliers was substantially lower, while the
distribution center target was almost reached. Thus, the case study allows analysis of what went
right and what went wrong and where the technology fits.
There has been little research on RFID and accounting information systems. O’Leary ͑2006͒
discussed a number of potential accounting uses of RFID. For example, RFID could be used to
implement specific identification of inventory as a financial reporting strategy. Such specific iden-
tification also could be useful in an auditing context as part of inventory analysis. Without RFID,
specific identification of individual items would be too costly or not feasible. Geerts and O’Leary
͑2008͒ generated a design theory investigation of a database modeling of RFID based on so-called
“highly visible supply chains.” Until RFID has a larger base of adopters, the amount of data about
RFID and the extent to which that data is biased will provide limited analysis.
SUMMARY, EXTENSIONS, AND CONTRIBUTIONS
This paper has focused on the maturity curve, the adoption curve, and some of the tools that
Gartner has developed to analyze the maturity and adoption of a technology. The paper examined
how those tools might be used to understand and anticipate research issues in accounting infor-
mation systems. It was found that different portions of the maturity curve and the adoption curve
have different characteristics and different research opportunities. Accordingly, the interaction
between the two curves provides us with insights as to how the sample may be biased at various
points in time. Further, the curves provide insight as to when particular types of research, e.g., case
studies or design science applications, are likely to occur.
Extensions
There are a number of extensions to this research. First, although the growth curve has been
the subject of substantial research, e.g., Rogers ͑1983͒ and others, the maturity curve has not
received the same level of academic investigation. As a result, future research could investigate
1
BY: REV: netscape@pub4/third/CLS_journals3/GRP_eta/JOB_v6-i1/DIV_002901eta
18 O’Leary
Journal of Emerging Technologies in Accounting Volume 6, 2009
American Accounting Association
19. characteristics of that curve in more detail. Second, Figure 4 provides an extension to the maturity
curve based on adding a large portion of capabilities. However, other versions likely could be
developed for other sets of changes in capabilities. Third, although this paper provides numerous
examples, additional examples could be elicited and examined. Fourth, this paper argued that
empirical research might be using biased samples in a number of settings. Accordingly, an impor-
tant extension would be to review previous studies and try to determine where some of those
biases have slipped in and how the results were affected. Fifth, the issue of biased samples in the
analysis of technology may also be applied to the notion of the so-called “productivity paradox”
͑Grover et al. 1998͒ ͑e.g., Pennings and Harianto 1992͒. For example, technology is more expen-
sive and more brittle at the emerging stage, but less expensive and more flexible at latter stages. As
a result, greater productivity gains, at lower costs, are likely later in the maturity and adoption
curves.
Further, this same approach can be used outside of technology and refer to ideas and their use.
For example, accounting concepts such as activity-based costing or Sarbanes-Oxley likely go
through the same maturity and adoption curves, and thus could be studied from the same perspec-
tives, as technology. In the same sense that there are potential sample biases with technologies,
there would be potential sample biases in those studies.
Table 6 also provides an additional potential extension. The data gathered there suggests that
public and private sectors go through different adoption cycles at different times. As seen in the
FIGURE 5
Public versus Private Sector Adoption Curves for ERP
1
BY: REV: netscape@pub4/third/CLS_journals3/GRP_eta/JOB_v6-i1/DIV_002901eta
The Impact of Gartner’s Maturity Curve 19
Journal of Emerging Technologies in Accounting Volume 6, 2009
American Accounting Association
20. table, cases about the public sector were addressing some of the same issues that had been
addressed a decade earlier in the private sector. One example of a potential relationship between
ERP adoption curves is illustrated in Figure 5.
Contributions
Apparently, there has been limited integration of research from firms such as Gartner into
academic research. This research used the maturity cycle and level to investigate which research
methods can be used at different points in the life cycle of a technology. Accordingly, this research
has brought important frameworks that relate to technology diffusion into AIS.
While most previous research focused on the adoption curve ͑e.g., Rogers 1983͒, this paper
examined the maturity curve. In particular, this paper merged the two concepts of technology
maturity and enterprise adoption ͑e.g., Table 5͒.
Another contribution of this paper is the notion that the type of research that can be done is
tied to where the technology is on the maturity curve and adoption curve, and that, as a result,
researchers have different strategies when doing research in technologies. For example, design
research is most likely at the embryonic or emerging stages. Further, it is at those same stages that
opinion research is most helpful. However, empirical research at those stages will be done using
biased samples.
In addition, this paper provides a contribution to potential and existing empirical research. In
particular, the adoption and maturity curves help understand the potential biases that can be found
in samples of firms when empirical research is undertaken.
REFERENCES
Arnold, V., N. Clark, P. Collier, S. Leech, and S. Sutton. 2006. The differential use and effect of knowledge-
based system explanations in novice and expert judgment decisions. MIS Quarterly 30: 79.
Baker, C. 2002. Towards increased use of action research in accounting information systems. Accounting
Forum 24 ͑4͒: 366–378.
Baldwin-Morgan, A. 1993. The impact of expert system audit tools on auditing firms in the year 2001: A
Delphi investigation. Journal of Information Systems 7 ͑1͒: 16–34.
Barker, V., and D. O’Connor. 1989. Expert systems for configuration at Digital. Communications of the ACM
32 ͑3͒: 298–318.
Bisbal, J., D. Lawless, B. Wu, and J. Grimson. 1999. Legacy information systems: Issues and directions.
IEEE Software ͑October͒: 2–10.
Bond, B., Y. Genovese, N. Miklovic, B. Zrimsek, and N. Rayner. 2000. ERP is dead, long live ERP II.
Gartner Group research note. October 4. Available at: http://www.pentaprise.de/cms_showpdf..
Bower, J. L., and C. M. Christensen. 1995. Disruptive technologies: Catching the wave. Harvard Business
Review ͑January–February͒: 43–53.
Cottelear, M., R. Austin, and R. Nolan. 1998. Cisco Systems, Inc.: Implementing ERP. Harvard Business
School Case No. 9-699-022. Boston, MA: Harvard Business Publishing.
Davenport, T. 1995. Order Management Reengineering at Heatway. Harvard Business School Case No.
9-996-005. Boston, MA: Harvard Business Publishing.
Deloitte. 1998. ERP’s Second Wave. New York, NY: Deloitte Consulting.
Fenn, J., and A. Linden. 2005. Gartner’s hype cycle special report for 2005. August 5. Available at: http://
www.gartner.com/DisplayDocument?doc_cdϭ130115.
——–. 2007. Understanding Gartner’s hype cycles, 2007. July 5. Available at: http://www.gartner.com/
DisplayDocument?idϭ509085.
Gartner. 2007. Gartner defines the top ten strategic technologies for 2008. Press release. October 9. Available
at: http://www.gartner.com/it/page.jsp?idϭ530109.
1
BY: REV: netscape@pub4/third/CLS_journals3/GRP_eta/JOB_v6-i1/DIV_002901eta
20 O’Leary
Journal of Emerging Technologies in Accounting Volume 6, 2009
American Accounting Association
21. Geerts, G., and D. O’Leary. 2008. RFID and Inventory in the Supply Chain: An REA and Design Science
Approach for Visibility. Proceedings of the American Accounting Association Annual Meeting. Ana-
heim, CA.
Gladstone, J., and R. Eccles. 1995. KPMG Peat Marwick: The Shadow Partner. Harvard Business School
Case No. 9-492-002, Boston, MA: Harvard Business Publishing.
Grover, V., J. Teng, A. Segars, and K. Fielder. 1998. The influence of information technology diffusion and
business process change on perceived productivity: The IS executive’s perspective. Information &
Management 34 ͑3͒: 141–59.
Harrison, T., and K. Waite. December 2006. A time-based assessment of the influences, uses, and benefits of
intermediary website adoption. Information & Management 43 ͑8͒: 1002–1013.
Hart, P., R. Duda, and M. Einaudi. 1978. Model design in the prospector consultant system for mineral
exploration. Mathematical Geology 10 ͑5͒.
Hevner, A., S. March, J. Park, and S. Ram. March 2004. Design science in information systems research.
Management Information Systems Quarterly 28 ͑1͒: 75–106.
Linden, A., and J. Fenn. 2003. Understanding Gartner’s Hype Cycles. Gartner Strategic Analysis Report No.
R-1971. May 30. Stamford, CT: Gartner Inc.
Maguire, J. 2006. The future of ERP. November 15. Available at: http://itmanagement.earthweb.com/erp/
article.php/3643966.
Mahajan, V., E. Muller, and R. K. Srivastava. 1990. Determination of adopter categories by using innovation
diffusion models. Journal of Marketing Research 27 ͑1͒: 37–55.
Mahler, A., and E. Rogers. 1999. The diffusion of interactive communication innovations and the critical
mass: The adoption of telecommunication services by German banks. Telecommunications Policy 23:
719–740.
March, S., and G. Smith. 1995. Design and natural science research in information technology. Decision
Support Systems 15: 251–266.
McAfee, A., F. W. McFarlan, and A. Wagonfeld. 2004. Enterprise IT at Cisco (2004). Harvard Business
School Case No. 9-605-015. Boston, MA: Harvard Business Publishing.
Murthy, U., and C. Wiggins. 1999. A perspective on information systems research. Journal of Information
Systems 13 ͑1͒: 3–6.
O’Leary, D. E., and E. Turban. 1987. The organizational impact of expert systems. Human Systems Man-
agement 7 ͑1͒: 11–19.
——–. 1990. Security in expert systems. IEEE Expert 5 ͑3͒: 59–70.
——–, and P. R. Watkins. 1992. Integration of intelligent systems and conventional systems: Requirements
for coordinating multiple agents for diagnostic systems. International Journal of Intelligent Systems in
Accounting Finance & Management 1 ͑2͒: 135–150.
——–, and P. R. Watkins. 1995. Expert Systems in Internal Auditing. New York, NY: Markus Wiener.
——–. 2000. Enterprise Resource Planning Systems. Cambridge, U.K.: Cambridge University Press.
——–. 2002. When and how do we use heterogeneous expert opinion as a basis for research on ERP systems?
Journal of Information Systems 16: 115–126.
——–. 2004. Enterprise resource planning systems: An empirical analysis of benefits. Journal of Emerging
Technologies in Accounting 1: 63–72.
——–. 2006. Radio Frequency Identification (RFID) and AIS. Proceedings of the American Accounting
Association Annual Meeting, Washington, D.C., August.
——–. 2008. Gartner’s hype cycle and information system research issues. International Journal of Account-
ing Information Systems 9: 240–252.
——–. 2009. Generating and using knowledge for business process management: SYSCO as a case study.
Advances in Business Process Management ͑forthcoming͒.
Pennings, J. M., and F. Harianto. 1992. The diffusion of technological innovation in the commercial banking
industry. Strategic Management Journal 13: 29–46.
Poston, R., and S. Grabski. 2001. Financial impacts of enterprise resource planning implementations. Inter-
national Journal of Accounting Information Systems 2: 271–294.
Rogers, E. 1983. Diffusion of Innovations. New York, NY: The Free Press.
1
BY: REV: netscape@pub4/third/CLS_journals3/GRP_eta/JOB_v6-i1/DIV_002901eta
The Impact of Gartner’s Maturity Curve 21
Journal of Emerging Technologies in Accounting Volume 6, 2009
American Accounting Association
22. Sutton, S. 2005. The role of AIS research in guiding practice. International Journal of Accounting Informa-
tion Systems ͑March͒: 1–4.
Sviokla, J., and M. Keil. 1998. DuPont’s Artificial Intelligence Implementation Strategy #189036. Boston,
MA: Harvard Business School Press.
Ton, Z., V. Dessain, and M. Stachowiak-Joulain. 2005. RFID at the Metro Group. Harvard Business School
Case No. 9-606-053. Boston, MA: Harvard Business Publishing.
1
BY: REV: netscape@pub4/third/CLS_journals3/GRP_eta/JOB_v6-i1/DIV_002901eta
22 O’Leary
Journal of Emerging Technologies in Accounting Volume 6, 2009
American Accounting Association