Academia.eduAcademia.edu
34th Bled eConference Digital Support from Crisis to Progressive Change June 27 – 30, 2021, Online Conference Proceedings Editors Andreja Pucihar Mirjana Kljajić Borštnar Roger Bons Helen Cripps Anand Sheombar Doroteja Vidmar June 2021 Title Naslov 34th Bled eConference – Digital Support from Crisis to Progressive Change Subtitle Podnaslov June 27 – 30, 2021, Online Conference Proceedings Editors Uredniki Andreja Pucihar (University of Maribor, Faculty of Organizational Sciences, Slovenia) Mirjana Kljajić Borštnar (University of Maribor, Faculty of Organizational Sciences, Slovenia) Roger Bons (FOM University of Applied Sciences, Germany) Helen Cripps (Edith Cowan University, Australia) Anand Sheombar (HU University of Applied Sciences Utrecht, Netherlands) Doroteja Vidmar (University of Maribor, Faculty of Organizational Sciences, Slovenia) Review Recenzija Ali Acilar (University of Agder), Wirawan Agahari (Delft University of Technology), Huib Aldewereld (HU University of Applied Sciences Utrecht), Alenka Baggia (University of Maribor, Faculty of organizational sciences), Matthias Baldauf (Eastern Switzerland University of Applied Sciences, Campus St. Gallen), Slobodan Beliga (University of Rijeka), Harry Bouwman (Delft University of Technology), Gert Breitfuss (Know-Center GmbH), Christer Carlsson (IAMSR/Abo Akademi University), Roger Clarke (Xamax Consultancy Pty Ltd, ANU, UNSW), Helen Cripps (Edith Cowan University), Shraddha Danani (Management Development Institute), Mark de Reuver (Delft University of Technology), Marja Exalto-Sijbrands (Hogeschool Utrecht), Lauri Frank (University of Jyvaskyla, Faculty of Information Technology), Michael Fruhwirth (Know-Center GmbH), Blaž Gašperlin (University of Maribor, Faculty of organizational sciences), Manuel Geiger (Technische Universität Braunschweig), Maedeh Ghorbanian Zolbin (Åbo Akademi University), Janis Gogan (Bentley University), Katja Gollasch (Zeppelin University), Shengnan Han (Stockholm University), Markku Heikkilä (Åbo Akademi University), Joschka Hüllmann (University of Münster), Jonna Järveläinen (University of Turku), John Jeansson (Linnaeus University), Marija Jović (University of Rijeka, Faculty of Maritime Studies), Stijn Kas (HU University of Applied Sciences Utrecht), Rohit Kaul (Swinburne University of Technology), Tiina Kemppainen (University of Jyvaskyla, School of Business and Economics), Mirjana Kljajic Borstnar (University of Maribor, Faculty of organizational sciences), Tobias Knuth (HSBA Hamburg School of Business Administration), Binod Koirala (TNO), Mohammad-Ali Latifi (Delft University of Technology), Sam Leewis (HU University of Applied Sciences Utrecht) Gregor Lenart (University of Maribor, Faculty of organizational sciences), Juha Lindstedt (Haaga-Helia University of Applied Sciences), Guang Lu (Lucerne University of Applied Sciences and Arts), Markus Makkonen (IAMSR/Abo Akademi University & University of Jyväskylä), Marjeta Marolt (University of Maribor, Faculty of organizational sciences), Sanda Martincic-Ipsic (University of Rijeka), Michael Meyer (Technische Universität Braunschweig), Shahrokh Nikou (Åbo Akademi & Stockholm University), Guido Ongena (HU University of Applied Sciences Utrecht), Chinedu Ossai (Swinburne University of Technology), Niki Panteli (Royal Holloway), Gabriele Piccoli (Louisiana State University and University of Pavia), Gunther Piller (University Mainz - University of Applied Sciences), Marijn Plomp (Vrije Universiteit Amsterdam), Miran Pobar (University of Rijeka), Andreja Pucihar (University of Maribor, Faculty of organizational sciences), Uroš Rajkovič (University of Maribor, Faculty of organizational sciences), Pascal Ravesteyn (HU University of Applied Sciences Utrecht), Liana Razmerita (Copenhagen Business School), Christopher Reichstein (Baden-Wuerttemberg Cooperative State University), Marcel Sailer (DHBW Heidenheim), Navin Sewberath Misser (HU University of Applied Sciences Utrecht), Anand Sheombar (HU University of Applied Sciences Utrecht), Muhammad Shuakat (Epworth Healthcare), Luuk Simons (Delft University of Technology), Koen Smit (HU University of Applied Sciences Utrecht), Ulrik Söderström (Digital Media Lab, Applied physics and electronics), Ronald Spanjers (Roessingh Rehabilitation), Susanne Strahringer (TU Dresden), Christian Thiel (OST Fachhochschule Ostschweiz), Edvard Tijan (University of Rijeka), Nalika Ulapane (University of Melbourne), Marko Urh (University of Maribor, Faculty of organizational sciences), Esther van der Stappen Avans University of Applied Sciences), Stan van Ginkel (HU University of Applied Sciences Utrecht), Doroteja Vidmar (University of Maribor, Faculty of organizational sciences), Doug Vogel (Harbin Institute of Technology), Pirkko Walden (Institute for Advanced Management Systems Research and Åbo Akademi University), Thorsten Weber (UCAM Universidad Católica San Antonio de Murcia), Markus Westner (OTH Regensburg), Gunilla Widén (Åbo Akademi University), Thomas Wozniak (Lucerne University of Applied Sciences and Arts), John Zelcer (Swinburne University Of Technology), Hans-Dieter Zimmermann (Eastern Switzerland University of Applied Sciences, Campus St. Gallen) Technical editors Tehnična urednika Aljaž Murko (University of Maribor, Faculty of Organizational Sciences) Jan Perša (University of Maribor, University Press) Cover designer Oblikovanje ovitka Graphics material Grafične priloge Conference Konferenca Location and date Kraj in datum Organizing committee Organiazacijski odbor Jan Perša (University of Maribor, University Press) Authors 34th Bled eConference - Digital Support from Crisis to Progressive Change Online, June 27 –30, 2021 Matthias Baldauf (Eastern Switzerland University of Applied Sciences, Campus St. Gallen), Roger Bons (FOM Hochschule), Christer Carlsson (IAMSR/Abo Akademi University), Helen Cripps (Edith Cowan University), Matt Glowatz (University College Dublin), Christian Kittl (evolaris next level Research Centre), Mirjana Kljajić Borštnar (University of Maribor, Faculty of organizational sciences), Gregor Lenart (University of Maribor, Faculty of organizational sciences), Marjeta Marolt (University of Maribor, Faculty of organizational sciences), Sanda Martinčić Ipšić (University of Rijeka), Guido Ongena (HU University of Applied Sciences Utrecht), Marijn Plomp (Vrije Universiteit Amsterdam), Andreja Pucihar (University of Maribor, Faculty of organizational sciences), Pascal Ravesteyn (HU University of Applied Sciences Utrecht), Juergen Seitz (Baden-Wuerttemberg Cooperative State University), Anand Sheombar (HU University of Applied Sciences Utrecht), Koen Smit (HU University of Applied Sciences Utrecht), Esther van der Stappen (Avans University of Applied Sciences), Johan Versendaal (HU University of Applied Sciences Utrecht), Doroteja Vidmar (University of Maribor, Faculty of organizational sciences), Doug Vogel (Harbin Institute of Technology), Pirkko Walden (Institute for Advanced Management Systems Research and Åbo Akademi University), Nilmini Wickramasinghe (Swinburne University Of Technology / Epworth Healthcare), Hans-Dieter Zimmermann (Eastern Switzerland University of Applied Sciences, Campus St. Gallen) Published by Založnik Co-published by Izdajatelj Edition Izdaja Publication type Vrsta publikacija Available at Dostopno na Published Izdano University of Maribor University Press Slomškov trg 15, 2000 Maribor, Slovenia https://press.um.si, zalozba@um.si University of Maribor Faculty of Organizational Sciences Kidričeva cesta 55a, 4000 Kranj, Slovenia http://www.fov.um.si, dekanat.fov@um.si 1ST E-book https://press.um.si/index.php/ump/catalog/book/581 Maribor, June 2021 © University of Maribor, University Press /Univerza v Mariboru, Univerzitetna založba Text / Besedilo © Authors & editors, 2021 This book is published under a Creative Commons 4.0 International licence (CC BY 4.0). This license lets others remix, tweak, and build upon your work even for commercial purposes, as long as they credit you and license their new creations under the identical terms. This license is often compared to “copyleft” free and open source software licenses. Any third-party material in this book is published under the book’s Creative Commons licence unless indicated otherwise in the credit line to the material. If you would like to reuse any third-party material not covered by the book’s Creative Commons licence, you will need to obtain permission directly from the copyright holder. https://creativecommons.org/licenses/by /4.0/ https://creativecommons.org/licenses/by/4.0/ CIP - Kataložni zapis o publikaciji Univerzitetna knjižnica Maribor 005:004(082)(0.034.2) 614:004(082)(0.034.2) BLED eConference Digital Support from Crisis to Progressive (34 ; 2021 ; online) 34th Bled eConference Digital Support from Crisis to Progressive Change [Elektronski vir] : June 27 - 30, 2021, online : conference proceedings / editors Andreja Pucihar ... [et al.]. - 1st ed. - E-zbornik. - Maribor : University Press : Faculty of Organizational Sciences, 2021 Način dostopa (URL): https://press.um.si/index.php/ump/catalog/book/581 ISBN 978-961-286-485-9 (Univerzitetna založba Univerze v Mariboru, pdf) doi: 10.18690/978-961-286-485-9 1. Gl. stv. nasl. 2. Pucihar, Andreja COBISS.SI-ID 67230979 ISBN 978-961-286-485-9 (pdf) DOI https://doi.org/10.18690/978-961-286-485-9 Price Cena Free copie For publisher Odgovorna oseba založnika Attribution Citiranje prof. dr. Zdravko Kačič, Rector, University of Maribor Pucihar, A., Kljajić Borštnar, M., Bons R.,Cripps H., Sheombar, A. & Vidmar, D. (2021). 34th Bled eConference – Digital Support from Crisis to Progressive Change: June 27 – 30, 2021, Online Conference Proceedings. Maribor: University Press. doi: 10.18690/978961-286-485-9 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE JUNE 27 – 30, 2021 (ONLINE), CONFERENCE PROCEEDINGS A. Pucihar (ed. et al.) Table of Contents CONFERENCE PROCEEDINGS PAGE A Simulation Model for COVID-19 Public Health Management: Design and Preliminary Evaluation Roger Clarke 1 Factors Contributing to the Business Digital Divide: A Systematic Literature Review Ali Acilar, Dag Håkon Olsen, Niels Frederik Garmann-Johnsen & Tom Roar Eikebrokk 29 Port Community System Business Models Marija Jović, Saša Aksentijević, Borna Plentaj & Edvard Tijan 41 Clinical Tele-Assessment: The Missing Piece in Health Care Pathways for Orthopaedics Oren Tirosh, Muhammad Nadeem Shuakat, John Zelcer & Nilmini Wickramasinghe 53 Make Us Smile! AI and the Violation of Human Intentions Christof Wolf-Brenner 67 Business Data Sharing through Data Marketplaces: A Systematic Literature Review Antragama Ewa Abbas, Wirawan Agahari, Montijn van de Ven, Anneke Zuiderwijk & Mark de Reuver 75 Telemedicine in Slovenia Živa Rant 87 Students’ Satisfaction with e-Learning Systems During the COVID-19 Pandemic—An International Comparative Study Shahrokh Nikou & Seongcheol Kim 97 Linking IT Assets and Competitive Advantage - IT Capabilities of Servitized Business Models Christoph Brosig, Markus Westner & Susanne Strahringer 111 ii Table of Contents. Data Management Platforms: An Empirical Taxonomy Joschka A. Hüllmann, Ajith Sivakumar & Simone Krebber 125 Familiarity Attracts Consumer Attention: Two Methods to Objectively Measure Consumer Brand Familiarity Ursa Bernardic & Benjamin Scheibehenne 141 Physical vs. Digital Interactions: Value Generation Within CustomerRetailer Interaction Manuel Geiger, Franziska Jago & Susanne Robra-Bissantz 153 Alternative Data for Credit Risk Management: An Analysis of the Current State of Research Jan Roeder 167 Health Literature Hybrid AI for Health Improvement; A Design Analysis for Diabetes & Hypertension Luuk PA Simons, Mark A Neerincx & Catholijn M Jonker 181 Smile through the Mask: Emotion Measurement for Stationary Retail Michael Meyer & Susanne Robra-Bissantz 195 How Digital Market Hosts Control Sellers Shraddha Danani & Janis L. Gogan 209 A Novel Combined Business Recommender System model Using Customer Investment Service Feedback Asefeh Asemi & Andrea Ko 223 Solopreneur Digital Ecosystems: Genesis, Lineage and Preliminary Categorization Gabriele Piccoli, Biagio Palese & Joaquin Rodriguez 239 Demographic Differences in the Effectiveness of a Physical Activity Application to Promote Physical Activity: Study Among Aged People Tuomas Kari, Markus Makkonen & Lauri Frank 253 Real-World Reinforcement Learning: Observations from Two Successful Cases Philipp Back 269 Online Proctoring: Adding Human Values to the Equation Marlies van Steenbergen & Irene van der Spoel 283 Health Information Literacy: The Saving Grace During Traumatic Times Maedeh Ghorbanian Zolbin, Khadijah Kainat & Shahrokh Nikou 295 Table of Contents iii. Creating a Taxonomy of Business Models for Data Marketplaces Montijn van de Ven, Antragama Ewa Abbas, Zenlin Kwee2 & Mark de Reuver 309 Barriers to Responsible Consumption in e-Commerce: Evidence from Fashion Shoppers Tiina Kemppainen, Lauri Frank, Markus Makkonen & Oona-Iina Hyvönen 323 User Information Satisfaction Among Female Refugees and Immigrants as Assessed by the Level of Information Literacy on Social Media Khadijah Kainat, Maedeh Ghorbanian Zolbin, Gunilla Widén & Shahrokh Nikou 337 Evaluating an Implementation Protocol for Digitization and Devices in Operating Rooms: a Case Study Navin Sewberath Misser, Joris Jaspers, Bas van Zaane, Hein Gooszen & Johan Versendaal 351 Who Else do You Need for a Data-Driven Business Model? Exploring Roles and Exchanged Values Florian Leski, Michael Fruhwirth & Viktoria Pammer-Schindler 365 ICT-Driven Business Model Innovation in SMEs: The Role of Organizational Capabilities, Firm Size and Age Mohammad-Ali Latifi, Harry Bouwman & Shahrokh Nikou 379 Deceptive Design: Cookie Consent and Manipulative Patterns Thomas Mejtoft, Erik Frängsmyr, Ulrik Söderström & Ole Norberg 393 Designing Call to Action: Users’ Perception of Different Characteristics Thomas Mejtoft, Jonathan Hedlund, Helen Cripps, Ulrik Söderström & Ole Norberg 405 Forming Sustainable Physical Activity Programs Among Young Elderly - A Combined ELM & UTAUT Approach Christer Carlsson, Pirkko Walden, Tuomas Kari, Markus Makkonen & Lauri Frank 417 Segmentation of the Young Elderly Based on Technology Readiness Anna Sell & Pirkko Walden 435 The Shape of Bottom-Up Urbanism Participatory Platforms: A Conceptualisation and Empirical Study Pascal Abel, Dennis Miether, Florian Plötzky & Susanne Robra-Bissantz 451 iv Table of Contents. Soft Skills of The Chief Information Security Officer Jeroen M.J. van Yperen Hagedoorn, Richard Smit, Patric Versteeg & Pascal Ravesteijn 467 Quantum Computer Resistant Cryptographic Methods and Their Suitability for Long-Term Preservation of Evidential Value Thiel Christian & Thiel Christoph 481 Smart Services for Energy Communities: Insights on Options and Priorities from a Multicriteria Mapping Study in Germany Julio Viana, Rainer Alt & Olaf Reinhold 495 Social Robots in Elderly Healthcare: A Burden or a Gift? Stefan van den Eijkel, Dorien Foppen-de Graaf, Robbert Schuurmans, Stefan van Genderen, Koen Smit & Sam Leewis 513 Hello, is Someone There? A Case Study for Using a Social Robot in Dementia Care Koen Smit, Matthijs Smakman, Sil Bakker, Jurgen Blokhuis, Guido Evertzen & Lars Polman 529 A Follow-Up on the Changes in the Use Intention of Digital Wellness Technologies and Its Antecedents Over Time: The Use of Physical Activity Logger Applications Among Young Elderly in Finland Markus Makkonen, Tuomas Kari & Lauri Frank 547 The Effects of Consumer Demographics and Payment Method Preference on Product Return Frequency and Reasons in Online Shopping Markus Makkonen, Lauri Frank & Tiina Kemppainen 563 Copyright Enforcement in the Dutch Digital Music Industry Nerko Hadžiarapović, Marlies van Steenbergen & Pascal Ravesteijn 577 Information Requirement in the Transition Towards a Circular Fashion Industry Marja Exalto-Sijbrands & Pascal Ravesteijn 597 Responsible AI and Power: Investigating the System Level Bureaucrat in the Legal Planning Process Rob Peters, Koen Smit & Johan Versendaal 611 Adapting to the Enforced Remote Work in the Covid 19 Pandemic Liana Razmerita, Armin Peroznejad, Niki Pantelli & Dan Kärreman 629 Table of Contents v. Exploring the Sustainability of Swiss Online Shops: Preliminary Evidence from a Clustering Approach Thomas Wozniak, Guang Lu, Dominik Georgi, Anja Janoschka & Antonia Steigerwald 643 Social Robots for Reducing Mathematics Hiatuses in Primary Education, an Exploratory Field Study Matthijs Smakman, Koen Smit, Eline Lan, Thomas Fermin, Job van Lagen, Julia Maas, David van Vliet & Sam Leewis 657 RESEARCH IN PROGRESS Artificial Intelligence Value Alignment Principles: The State of Art Review from Information Systems Research Shengnan Han & Shahrokh Nikou 675 The Impact of Computer-Mediated Delayed Feedback on Developing Oral Presentation Skills: an Experimental Study in Virtual Reality Bo Sichterman, Mariecke Schipper, Max Verstappen, Philippine Waisvisz & Stan van Ginkel 683 DOCTORAL CONSORTIUM Designing Data Governance Mechanisms for Data Marketplace Metaplatforms Antragama Ewa Abbas 691 Monitoring Remote Service Platforms Using Artificial IntelligenceBased Distributed Intrusion Detection Thorsten Weber & Rüdiger Buchkremer 705 Sensory-Marketing-Evaluation of E-Commerce Websites with Artificial Intelligence Kevin Hamacher & Rüdiger Buchkremer 719 Knowledge-Based Planning and Controlling with Methods of Artificial Intelligence to Increase Efficiency in IT Projects Sascha Brüggen & Alexander Holland 733 Transformation of the BPMN Business Process Model into Smart Contracts for the Hyperledger Fabric Environment Janko Hriberšek 743 vi Table of Contents. Knowledge Risks in Digital Supply Chains Proposal of a Dissertation Project at the School of Business, Economics and Social Sciences University of Graz 755 Johannes P. Zeiringer Conceptual Model for SMEs' Data Maturity Assessment Blaž Gašperlin 769 Impact Assesment of Open Government Data Aljaž Ferencek 779 Development of Prediction Model for Support in Decision-Making Process in Football Academies – Literature Review Rok Vrban 789 INVITED PAPER A SIMULATION MODEL FOR COVID-19 PUBLIC HEALTH MANAGEMENT: DESIGN AND PRELIMINARY EVALUATION ROGER CLARKE Xamax Consultancy Pty Ltd, Canberra, Computer Science, ANU, UNSW Law, Sydney, Australia; e-mail: Roger.Clarke@xamax.com.au Abstract The COVID-19 pandemic has presented governments with challenges not only in relation to bio-medical understanding, medical treatment and health facility operations, but also the management of public health, public behaviour and the economy. In the area of public health management, discrete event simulation modelling is capable of providing considerable assistance to decision-makers. In April 2020, on the basis of publicly available information about the virus and its impacts, an analysis was undertaken of the needs of public health policymakers, and a 16-state / 40-flow model was postulated. The model was revisited in December 2020, and experiences around the world applied in order to evaluate the model's apparent usefulness. This resulted in improved appreciation of its applicability and limitations, a revised model, and plans for further evaluation and application. DOI https://doi.org/10.18690/978-961-286-485-9.1 ISBN 978-961-286-485-9 Keywords: discrete-event simulation, pandemic, public policy, DSS 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 2 1 Introduction From time to time, viral epidemics within individual countries threaten the health and lives of that country's inhabitants, and may wreak havoc on social and economic activities. Once the threat has passed, recovery may be quite brisk, provided that the country is sufficiently economically open. Global pandemics, on the other hand, harbour the potential for health impacts over large regions and potentially the whole world, and may have longer-term impacts on economic wellbeing because all countries' economies have been hampered and hence drivers of recovery are in short supply. A century after 'The Maybe-Spanish Flu' at the end of World War I, the world was subjected to 'The Maybe-Chinese Coronavirus'. Naturally, ways were sought in which information technology (IT) could play a constructive role in the public response to the pandemic. Foreground needs existed in the area of prevention and treatment of the conditions that afflict patients. The particular need that is the focus of the present paper was for assistance in public health management, which seeks to slow the spread of the virus, protect particularly vulnerable sub-populations, ensure capacity to treat sufferers, and ultimately defeat the virus, while sustaining public confidence and achieving sufficiently high levels of compliance. Emergency funding was provided to enable experiments with medical tools (e.g. for infection-testing, antibody-testing, symptom treatments, discovery of the modes of transmission, spread-containment mechanisms and vaccination) and with computing tools (e.g. for contact-detection, proximity-monitoring, contact-tracing, data management and decision support). As is to be expected of urgent, rapidlyperformed experiments with available tools and the brisk conception and development of new tools, a great many projects were ineffective and short-lived. A few, however, delivered very considerable benefits to individuals, societies and economies. The domain addressed by this paper is support for decision-making about public health policy. There is a worldwide need for contributions to public policy in the area. Yet IT's contributions have been at best mediocre. Data gathering, reporting and graphical presentation are helpful, but far from adequate assistance to decisionmakers, and in any case data collection and analysis have been haphazard and often R. Clarke: A Simulation Model for COVID-19 Public Health Management: Design and Preliminary Evaluation 3 ill-informed. To constitute information, and to enable the people responsible for public health management to make decisions, data must have context. That context may be provided by each individual policy-maker's own mental model. However, major programmes of this nature involve many stakeholders with diverse perspectives. The context is therefore multi-dimensional, it features competition among values, and the conception of the problem-space needs to be shared rather than personal. The most powerful form of context is provided by models that are shared, that impose some degree of formality on the problem-space, that are sufficiently graphic that all stakeholders can relate to them, and that have an associated terminology that is reasonably common among the stakeholders. Given such a model, it becomes much easier to identify data that would be valuable input to deliberations, to generate and evaluate alternative courses of action, and to assess both the potential and the actual impacts of interventions. The focus of this article is on a particular form of modelling tool, commonly referred to as 'discrete-event simulation' (DES). DES modelling enables expression of a model that represents a set of COVID-19 states that individuals may pass through, the conditions that determine the paths they follow, and key characteristics of both the states and the transitions. Research was conducted whose purpose was to postulate a model, apply it, assess its efficacy and improve it, in order to support mind-experiments and conversations about the real world into which public policymakers were injecting successive interventions and refinements of interventions. As the purpose was the creation of an artefact, the appropriate approach was design science. A DES model is a socio-technical artefact as that term is used in design science (Niedermann & March 2012, Gregor & Hevner 2013, p.337). The process described by Peffers' Design Science Research Methodology (DSRM) commences with problem identification and definition of objectives, which are followed by design and development (Peffers et al. 2007). Peffers et al. distinguish two related phases towards the end of the design research approach. 'Demonstration' of the use of the artifact solves one or more instances of the problem (e.g. by means of experimentation, simulation or case study), whereas 'evaluation' involves more formal observation and measurement of the new artefact's effectiveness in 4 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE addressing stated objectives. This research included Peffers phases of Problem Definition, Objectives Definition, Design and Expression, and a Demonstration step. The paper commences by briefly summarising key features of the COVID-19 pandemic during the period March to December 2020. An outline is provided of the scope for modelling to assist, at various levels of investigation and decisionmaking. It is argued that discrete-event simulation modelling has a good fit to the needs of public health management. A model is presented which was devised in April 2020 on the basis of then-available information about the pandemic and government responses to it. Developments in the field during the following 8 months are identified, and their implications for that model are investigated. It is concluded that such a model can provide an effective contribution by IT to the decision processes of public health policy-makers. 2 The COVID-19 Pandemic The new virus first came to public notice in the form of an epidemic in the Chinese city of Wuhan beginning in December 2019. Unsurprisingly, it took some time to be recognised and then accepted as a serious threat to public health. On 11 March 2020, based on rapid growth in detected case-numbers in northern Italy, Iran and South Korea, the World Health Organisation (WHO) declared a pandemic. By the end of March 2020, it had exploded in the USA, Spain, Germany and France, with rapid spread emergent in many other countries. In most countries, there was an early peak of infections lasting 2-4 months with deaths following after a 1-3 week lag, then a lull, then 6-8 months later a 'second wave' in many cases worse than the first (Econ 2020). By the end of 2020, substantial second waves were infecting very large numbers of people and killing large numbers, with the cumulative (known) case-count worldwide past 80m and the death-count approaching 2m. On these measures, only two pandemics of the last century have been worse: the 'Spanish Flu' of 1918-20, and HIV/AIDS since 1980. The cause was identified as a form of coronavirus, spread primarily by an infected person coughing or sneezing, or perhaps even speaking or breathing out, contaminated droplets (over a range of perhaps 1m), or possibly aerosols or droplet R. Clarke: A Simulation Model for COVID-19 Public Health Management: Design and Preliminary Evaluation 5 nuclei (very small droplets, over a range of perhaps 3-4m), or by direct contact with another person, or by contaminating 'fomites', i.e. objects and surfaces in the infectee's immediate environment (WHO 2020b). Susceptibility appeared to be quite low under 10 years of age, increasing with age, and very high for those over 70. Impacts on individuals ranged from short-term, unpleasant but variable experiences, to very serious lung malfunction and death from that or consequential causes. Over time, it became apparent that there are small but significant numbers of people who suffer impacts for an extended period after the initial (predominantly pulmonary) impact of the virus (SWPRS 2020). However, most infectees are asymptomatic, decreasing the likelihood of detection and hence increasing the likelihood of spread. A person with the virus may be infectious from 1-3 days before symptom onset, then for a further 1-2 weeks for asymptomatic persons, up to 3 weeks in mild to moderate cases, but much longer in severe cases (WHO 2020c). There were no known treatments for the virus itself. The proportion of hospitalised patients needing admission to Intensive Care Units (ICUs) ranged from 5% to 15%. In some regions, ICU capacity proved inadequate. Mortality was very heavily skewed towards people over 70, with the likelihood of death much higher for those with bronchial and some other relevant or otherwise debilitating conditions. Employees in hospitals and aged care homes were at risk of high viral load, and high-quality hygiene and personal protective equipment (PPE) were essential. Despite precautions, many health care workers succumbed, in the USA about 3,000, 1% of the country's more than 300,000 deaths during 2020 (Gn 2020b). The focus of public health actions was on prevention of spread, most urgently among those at greatest risk. The public health imperative is constrained by the limitations of enforcement powers and resources, and by conflict with freedoms of action and movement, and with economic management. In some jurisdictions, those challenges were exacerbated by a lack of political will. Countries adopted varying approaches to public health management, with highly varying senses of urgency, varying levels of compliance by the public, and highly varying case-counts, fatalitycounts and fatality-rates (WOM 2020). 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 6 3 Modelling IT was applied to the gathering and publication of data, partly to inform and entertain the public, but more critically to support policy-makers in their efforts to understand the phenomenon. This paper investigates the question as to whether the seeming absence of an 'enterprise model' of the undertaking, and of 'information architecture' and 'data models' to support it, have hampered the potential IT contribution, and hence whether return on investment in IT can be improved by applying insights from modelling theory and practice. A model is a simplified representation of a real-world system, which reflects interdependence among the relevant entities, structures and processes. Real-world socio-economic systems are open, complex and highly inter-connected. Simplification necessarily involves limiting the scope of the model, by placing the focus on one sub-system or two or more closely-related sub-systems, at one particular level of abstraction, and by excluding some factors and using proxies for others (Gault et al. 1987). A model therefore cannot replicate the real-world system (von Bertalanffy 1968). However, if key factors are appropriately reflected, experimentation with a model can deliver insights. At the very least, experimentation can suggest what data might be the most valuable to collect. In addition, participation in the modelling process may enhance observers' understanding of the world, and assist in making decisions about actions to take. During the first quarter of 2020, it became clear that COVID-19 had a high infection-rate and was life-threatening for some categories of people. As the epidemic in Wuhan developed into a pandemic, it became increasi8ngly apparent that decision support systems (DSS), and the modelling activities intrinsic to DSS (Sprague 1980, p.1), needed to be applied. During the pandemic, epidemiological models of the SEIR(D) family were muchdiscussed. These treat the population as comprising Susceptible individuals (S – those able to contract the disease), Exposed individuals (E – those who have been infected but are not yet infectious), Infective individuals (I – those capable of transmitting the disease), Recovered individuals (R – those who have become immune), and possibly Dead individuals (D). R. Clarke: A Simulation Model for COVID-19 Public Health Management: Design and Preliminary Evaluation 7 Generally, however, models in the SEIR(D) family lack details needed for public health management purposes: "These models have [provided] information about tipping points and inform[ed] policy decisions. But ... these models are not adequate for modelling the human behavioural aspects that are important in disease transmission and epidemic dynamics" (Siebers et al. 2010, p.206); and Schipper (2020) argued that modelling us during the pandemic, because "the current epidemic model is medical, and narrowly so" (p. 7). This paper adopts the position that appropriate support by IS and IT for publicpolicy decision-makers in dynamic contexts like a pandemic depends on the application of appropriate modelling techniques. They need to be instrumentalist, with a social-engineering orientation. Such models depend on careful definition of the system scope, and the level of abstraction at which the system is being observed. Key requirements of public health management are the establishment and progressive adaptation of a model that clearly distinguishes start-point(s), states, transitions, and end-point(s), and that identifies key attributes of each individual passing through the model (e.g. age-range and relevant-prior-conditions), and supports experimentation with different distributions of those variables. The following section postulates such a model. The adequacy of the model is then tested against the phenomena and interpretations of them reported during the following 8 months of 2020, and adaptations are proposed in an endeavour to improve the model's capacity to assist policy-makers. 4 Simulation Modelling for Public Health Management This section first discusses particular needs that arose during the COVID-19 pandemic in 2020, then outlines the relevant form of modelling, and finally describes an application of it that is argued to be of benefit to policy-makers. 4.1 The Needs of Public Policy-Makers The focus of public health management is "population-based health protection and promotion" (Novick & Morrow 2008, p.60), with efforts "organized and directed to communities rather than to individuals", and with the prevention and control of epidemics high on the priority-list (Novick & Mays 2008, p.3). Key 8 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE functions and practices are (Novick & Morrow 2008, pp. 40-47) are assessment, policy development and assurance. The target-area for modelling activities in public health management is accordingly the processes of the spread of the disease, and the purpose is to deliver insights to policy-makers regarding the shape that interventions may usefully take, and their likely contribution to containing that spread. An important distinction is made in decision theory between factors that are strategic or controllable and those that are environmental or uncontrollable (Peterson 2009). A further distinction is necessary between directly-controllable factors and those that can only be indirectly influenced. For example, outputs include published government advice, formal declarations and laws, whereas outcomes comprise the acts of individuals, which are only influenced, not determined, by advice, declarations and laws. The extent to which public behaviour is compliant with the intentions of public health managers depends on controllable factors such as expression, channels of communication and timing, and on factors that are far less controllable, such as attitudes to authority, perceptions of the health threat, and prior experience of government actions. Two of the key weapons in fighting epidemics are quarantine and isolation. The term 'quarantine' applies to people who have been, or are suspected to have been, exposed to an infectious disease, but who are not at that stage known to be infected. The term 'isolation', on the other hand, is applied to people known to be infected. However, supervision of suspect-quarantine and infectee-isolation may be dependent on inadequately-trained staff, contractors or military personnel. Travel restrictions are difficult to police. Records of attendance at venues are maintained by individuals and venue-operators, and assurance of data quality and datacompatibility is challenging. The implementation of border restrictions may be haphazard where multiple agencies are involved. Public health activities inherently involve a very broad range of stakeholders, and great diversity among perspectives and values spanning the social, economic and psychological dimensions. As a result, decisions are actively contested, and the decision-making processes complex and at best only modestly well-structured. The Vroom-Yetton-Jago Decision Model identifies five decision-making R. Clarke: A Simulation Model for COVID-19 Public Health Management: Design and Preliminary Evaluation 9 implementation styles (Vroom & Yetton 1973, Vroom & Jago 1988). For decisions that have significant impact and require input and 'buy-in' from many participants, the relevant two of the five are consultative (group-based but leader-decided) and collaborative (group-based and group-decided). Because many stakeholders are involved, policy-makers are confronted by diverse views and a rich choice of experts, of approaches to models, of assumptions inherent within them, and hence of the findings presented by the modellers. For consultative and collaborative processes to be effective, participants need to have a shared understanding of the relevant domain and of the terminology used to describe it. Models can contribute to that understanding by reflecting the key features of realworld systems that policy-makers seek to influence. Further, because pandemics develop in unpredictable ways, and new information and insights become available, policy-makers' appreciation of the context is adaptive. It is therefore crucial that policy-makers develop a degree of clarity about the context in which they are working, communicate that to modellers, and update modellers on changes in their perceptions of the relevant systems. The most effective way in which modellers can contribute is to start with an appreciation of the relevant domain, to become familiar with the policy-makers' initial mental models, and to be sufficiently 'embedded' to detect changes in their thinking. Further, modellers must convey enough information about their purposes, their assumptions, the capabilities and limitations of their methods, the nature, quality and quantum of the data that they are using, and the extent to which it has and has not been feasible to test findings against the real world. Without great care, there is a high probability of misunderstandings, and of policy-makers being misled. The following sub-section considers how a particular form of modelling can be used to address these needs. 4.2 The Modelling Method Multiple forms of modelling exist. At the strategic level, for example, system dynamics is appropriate (Brailsford & Hilton 2000, Brailsford et al. 2014). A particular modelling approach that matches well to the needs of public health management during a pandemic is discrete-event simulation (DES) (Allen et al. 10 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 2015). DES modelling involves the identification of the various states that an entity (in this case a person) may be in, their transitions or flows from one state to another, and the factors that determine when transitions occur. A systematic review of publications on DES in health care, in Zhang (2018), concluded that DES has "rich potential ... to provide a broader picture of ... health care systems behavior" (p.9). Currie et al. (2020), in discussing the application of simulation modelling technique to the COVID-19 pandemic, describe DES models as being "typically used to model the operation of systems over time, where entities (people, parts, tasks, messages) flow through a number of queues and activities. They are generally suitable for determining the impact of resource availability (doctors; nurses), on waiting times and the number of entities waiting in the queues or going through the system" (p.85). The Currie article identifies a range of potential applications of DES in the context of the pandemic. In Wood et al. (2020), a report is provided of a DES model "designed to capture the key dynamics of the intensive care admissions process for COVID-19 patients" (p.1). Beyond health facility management, Bolla & Sarl (2020) model flows of COVID patients in Switzerland from home to hospital to ICU and beyond and Jalayer et al. (2020) model "citizens living, working, pursuing their needs and travelling inside a geographical environment" (p.3). Rhodes et al. (2020) perceive models for policy to "blend various heterogeneous data (quantitative, qualitative, abstract, empirical) from various diverse contexts (different viruses, countries, localities, studies, historical periods) ... to enable a decision" (p.2). The authors discuss an "approach to the modelling of pandemics which envisages the model as an intervention of deliberation in situations of evolving uncertainty" (p.1). "The model, precisely because it has latitude as a space of triangulation and speculation, potentiates a working relationship, in which dialogue is made possible" (p.6). Many researchers assume that DES models have to be fed quantitative data, and that the calculations are what matters. For example, the text elided from the p.2 quotation from Rhodes et al. (2020) in the previous paragraph is '[blend] into a single calculative process". This ignores the considerable limits on the usefulness of quantitative analysis in such circumstances, whether conducted mathematically or numerically by experimentation. For example, a comparison across four models of the path of COVID-19 infections in South Africa (Chi et al. 2020) found very wide R. Clarke: A Simulation Model for COVID-19 Public Health Management: Design and Preliminary Evaluation 11 variation in the models' predictions of case-counts and death-counts, highlighting the folly of reliance on any of them. The Rhodes et al. article overlooks the fact that the 'blending', the 'deliberation', the 'speculation', the 'working relationship' and the 'dialogue' are all highly valuable in their own right, and may offer far better value to policy-makers than unverified rules applied to mediocre-quality data in a 'calculative process'. Table 1 identifies ways in which a suitable DES model can be applied in the style of a decision support system to enable Vroom-Yetton-Jago consultative or collaborative policy decision-making. To the extent that the model is adequately articulated, tested for logical completeness, and checked against real-world activities, it is also capable of being used to simulate flows of people through the system, and 'stocks' of people currently in each state. This approach would need to be supplemented by a segmentation analysis, distinguishing in particular:  high-risk-of-mortality categories, e.g. based on vulnerability (age, prior disposing conditions) and on intensity of exposure (health care staff); high-risk-of-being-highly-infective categories ('super-spreaders'); high-risk-of-highly-infective-circumstances ('super-spreader events').   Table 1: Benefits of DES Modelling for Policy Decision Support   The activity of building and reviewing a DES model can assist participants in gaining an understanding of the main states, and the main factors determining transitions between states, that are relevant to decisions about interventions and policy-settings That activity, through the conduct of workshops involving the relevant stakeholders, can assist in identifying differences among the stakeholders' mental models, and in achieving commonality of understanding of: relevant states, and transitions among them relevant attributes of each state and each transition; and key terms, arising from words being used within a structured context rather than loosely in unstructured conversations Consideration of particular actions in light of the model enables sharing of information and insights into the dynamics of the real-world system(s) that policy-makers seek to influence When alternative strategies are being considered, the model may assist stakeholders in the identification of key data needed to support evaluation of o o o   34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 12   the strategies, and hence where resources can be usefully invested in data gathering and data quality assurance, and in finding proxies for data that is too difficult or too expensive to collect The model can assist in experimentation with the impacts that different datavalues might have on the evaluation process and inferences drawn from it The model can be used as a basis for pre-implentation review of conclusions reached, and pre-publication review of public statements and data, to check that important factors have not been overlooked By manipulating key parameters (such as detection-rate; the proportion of infectees needing admission to hospital and to ICU; hospital- and ICU-capacity; treatmentperiods; and mortality-rates), estimates can be made of the limits to the ability of health facilities to cope, and the extent to which urgent investment in additional facilities might be necessary. 4.3 The Postulated Model The purpose of this research was to investigate the extent to which a DES model could support public health management in the context of an rapidly-developing epidemic. During March-April 2020, I postulated a state-transition model, intended to represent the population of a jurisdiction, and the flow of individual members of it through various states associated with infection, hospitalisation, to recovery or death. The intention was to commence with the minimum complexity, in terms of the number of states, flows, and data about each, based on the available information about the challenges that public policy-makers were addressing. The model could then be experimented with, and expanded to the extent necessary to embody a sufficiently rich understanding of the public policy problem-space. Based on government publications and media reports, and taking account of previous SEIR models, it appeared that the model would need to incorporate about a dozen states, 30-40 flows, and data-items representing the key attributes of the people passing through the system. Although a DES model can be applied computationally, that was not the intention, because the complexities and dynamism of the relevant part of the real world are such that the results would inevitably be spurious. The model is a framing tool for the problem-space, intended to help policy-makers formalise their own mental models, appreciate and resolve differences among those models, experiment with the model, and draw inferences relevant to the many decisions they needed to make during the weeks and months of the epidemic. R. Clarke: A Simulation Model for COVID-19 Public Health Management: Design and Preliminary Evaluation 13 The first iteration of the model, of April 2020, is in Figure 1. A textual description of aspects of the model was also developed. Broadly, individuals were conceived as beginning as Uninfected, with a proportion passing through Infection, possibly via Hospitalisation, and on to Immunity or Death. Each of the four broad domains was conceived as encompassing a number of states, such as being in hospital, or in ICU, or in a queue to get into one of them. Various aspects of each state required some articulation, and so did the conditions under which transitions occur between states. The following section outlines the steps undertaken in order to assess the potential of this model to support public health policy decision-makers. 5 Model Testing and Articulation During the process of postulating the model, a variety of design issues arose. Some were formal questions, such as whether and on what basis some of the statetransitions could logically arise, and could be appropriately represented. For example, it quickly became apparent that the representation of Testing as a state was inappropriate. A more useful approach was to specify attributes of each individual, which travelled with them as they passed through the network. The key attributes appeared to be tested-awaiting-result, tested-negative, and tested-positive. That removed one state and four flows, with no loss of model richness. For ease of reading, the state Quarantined was re-numbered as (2). Many other issues, however, were concerned with the appropriate representation of real-world states and processes. In April 2020, it was too early to resolve those issues, with the result that the model depicted in Figure 1 was provisional, even tentative. 14 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Figure 1: The Model Postulated in April 2020 In order to implement the demonstration phase of Peffers' design science method, experience needed to be gained concerning the relevant real-world systems and the appropriateness or otherwise of the representation of them in the model. A conventional way to gain such experience is through case studies. However, as the COVID-19 pandemic was only just developing, no directly-relevant case studies were available. Although case studies of other pandemics could have been sought out, it was already clear that there were distinct differences between the COVID-19 pandemic and other well-documented events, even other coronavirus events. R. Clarke: A Simulation Model for COVID-19 Public Health Management: Design and Preliminary Evaluation 15 A more appropriate method might therefore have been to conduct a contemporaneous field study, seeking embedment within some particular jurisdiction's public health policy apparatus, and preparing a longitudinal case study of that jurisdiction's path, including uncontrolled events, interventions, and subsequent experiences. However, such access would have been very difficult to negotiate (not least in a context in which physical distancing was being imposed). It would also have to a considerable extent limited the testing and articulation process to the factors that arose in a specific jurisdiction. Each country has its own cultural context, and the events, the details of the interventions, the sequences of events, and the timings of events, varied greatly among different jurisdictions. It would be very challenging to try to draw generically useful inferences from such a field study. An alternative approach was accordingly formulated. Monitoring was undertaken of the ongoing reporting of developments, interventions and experiences in countries worldwide. These reports provided a wide range of circumstances against which the efficacy of the model could be reviewed. This section summarises information about interventions, and identifies and briefly discusses some key themes that emerged. Governments around the world responded to COVID-19 with a wide range of interventions intended to protect public health. A scan was undertaken of documents published by relevant international and national government agencies, including WHO (2020d) and ICAO (2020), supplemented by academic articles and media reports. Table 2 identifies mainstream public health interventions, clustered into six groups. It is important that IS and IT be brought to bear to assist policymakers to judge the likely effectiveness of these actions in particular contexts, to design interventions, and to time and manage their implementation, adaptation and eventual withdrawal. Because the infection-vector appeared to be primarily brief, airborne transmission from infectees to those close by, physical separation among people generally (often referred to using the misleading term 'social distancing') was widely adopted. Physical separation is also the objective of quarantine and isolation. Despite the differences in meaning, and the clear explanations provided by a range of national health agencies (e.g. CDC 2020), some agencies were not consistent in their uses of the terms. As a result, media reports evidenced considerable confusion, and it is 16 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE very likely that many people were unclear about the obligations of suspects, contacts and infectees. Table 2: The Primary Public Health Interventions Case Discovery, Management  Identification of suspects  Quarantine of suspects  Testing of suspects  Isolation of infectees  Contact-tracing of infectees  Location of and communication with contacts Personal Protective Measures  Hand hygiene  Respiratory etiquette (sneeze/cough protection)  Avoidance of surfaces  Face-masks  Clinical Personal Protective Equipment (PPE) in hospitals and aged-care facilities Physical Distancing Measures  Physical distancing in public places (1.5m / 4sqm)  Quarantining of suspects  Isolation of infectees  'Work-at-Home' Recommendations to Employers  'Stay-At-Home' Recommendations for at-risk segments Facility Restrictions, Closedown  Hospitals  Aged care facilities  Institutions, e.g. prisons  Group accommodation, e.g. backpacker dormitories  Face-to-face businesses (shops, personal services, gyms)  Workplaces  Entertainment venues  Public gatherings  Geographical areas (cordon sanitaire)  Pre-schools, schools, tertiary educational institutions Environmental Measures  Cleaning of surfaces Travel-Related Measures  Border restrictions  Border screening and testing  Border closure  Stay-at-home, work-at-home  Domestic movement restrictions  Public transport  Private vehicles  Walking R. Clarke: A Simulation Model for COVID-19 Public Health Management: Design and Preliminary Evaluation 17 Countries around the world adopted vastly different approaches to interventions, recognised different triggering events, and timed their interventions differently. Most also changed their approaches over time. Despite the enormous differences in context, some comparisons are feasible, such as among Scandinavian countries. Sweden implemented only limited actions (physical distancing, bans on large gatherings, and travel restrictions), whereas its neighbours used additional and stronger interventions to reduce the opportunity for the virus to spread, including closedown of many more categories of venue, curfews and border closures. The outcome was a death-rate per capita in Sweden during 2020 that was 4-9 times those of its neighbours (Barrett 2020). There may also be lessons to be learnt from the juxtaposition of the apparently worst examples of mismanagement and/or outcomes (in particular, the UK, the USA, Belgium, Brazil) and the most successful (e.g. China, Singapore, New Zealand, Australia). The UK flirted with a no-action 'strategy' rationalised as striving for herd immunity, overrode professional advice, lacked coherent and consistent leadership, reacted slowly to new information, and continually changed tack in a haphazard manner (Minghella 2020). A wide range of media reports and some semi-formal reviews gave rise to the list of public health management behaviours associated with serious failure in Table 3. On the other hand, the most successful countries acted quickly and decisively. A range of interventions, and characteristics of interventions, were associated with success in preventing spread and/or reining in spread that had already begun (e.g. OxCGRT 2020). Table 3: Behaviours Associated with Serious Failure       Data suppression (e.g. during the first few weeks in Wuhan) Disparagement of the epidemic's seriousness by national leaders (e.g. USA, Brazil) Disregard for public health policy advice (e.g. USA) Denial of the efficacy of key interventions and/or support for 'quackery' (e.g. USA) Delay in the implementation of constraints (e.g. Belgium, UK, Sweden) Inaction justified as a means to rapidly attain 'herd immunity' (e.g. UK, Sweden) 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 18   Weak enforcement of constraints (e.g. many countries, particularly in the early stages) Premature easing of effective constraints (e.g. many countries, particularly after the first wave) The list of actions in Table 4 was prepared on the basis of reports about actions and outcomes in China (BBC 2020), New Zealand (Baker et al. 2020, Jefferies et al. 2020), Melbourne (Gn 2020a), and Vietnam and Taiwan (Whitworth 2020). Table 4: Actions Associated with Success Known-Infectee Control Measures      Detect infectees early Isolate infectees immediately, and perhaps household members, especially partners Trace close contacts of infectees quickly Quarantine close contacts of infectees Impose closedown in and near infection hot-spots Community-Spread Control Measures   Suspend or dilute large-scale events in which people are closely-packed, including live entertainment, bars, clubs, churches, rallies, public transport services Suspend sustained-contact circumstances, including face-to-face retail, personal services and workplaces in which physical distancing cannot be achieved High-Risk-Segment Protection Measures   Shield high-risk groups, in particular through lockdown of health and aged care facilities against non-essential entry, application in those facilities of rigid hygiene, and provision to frontline health care staff of fresh, clinical-grade personal protection equipment (PPE) Quarantine new arrivals into the jurisdiction, at least until a test for infection returns a negative result R. Clarke: A Simulation Model for COVID-19 Public Health Management: Design and Preliminary Evaluation 19 Policy-makers needed to make judgements about which interventions were needed, the specifics of their design and application, and the timing of introduction, easing, and suspension. Their judgments were affected by a great many factors. The efficacy of some actions was apparent from the beginning of the pandemic, whereas the value of other actions emerged slowly, with the gradual accretion of understanding. In order to balance health safety against social and economic disruption, it was vital to be able to judge the appropriate length of time for quarantine of suspects and isolation of infectees. That depended on the ability to make reasonable determinations about the required period of confinement (requiring an estimate of when infection occurred) and the circumstances under which shorter and longer periods may be appropriate. A guideline for discontinuing transmission-based precautions that was available in mid-2020 was that patients could be released 10 days after symptom onset plus 3-4 days without symptoms, or, in asymptomatic cases, 10 days after a positive test (WHO 2020a). In some countries, that was later variously extended to 14 days, or adjusted to permit discharge as soon as a negative test result was received. This reflected judgements made about the balance between the risk of transmission and the risk of reduced public support and hence compliance levels. An important aspect of the public health problem is advance warning about the capacity of health facilities to cope with demand. It would be a valuable contribution if the model were able to assist in projecting demand for and supply of hospitalbeds and ICU beds, in total, and by geographical area and hospital. This is likely to be dependent on recent testing rates, positive-result rates, hospitalisation-rates of positive cases, the proportion admitted to ICU, and the periods patients spend in those facilities. The source-data would need to be collected on an ongoing basis, in order to ensure that current indicators were readily to hand. This draws to attention another important attribute of individuals: non-COVID admissions to hospital queues and onwards. Factoring that in enables total demand for hospital and ICU beds to be modelled, and avoids confusing non-COVID-related transitions with those arising from the epidemic. 20 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE One of the challenging questions was the extent to which all infectees have much the same degree of infectiveness, or whether there are 'super-spreaders' who are much more prone to infecting other people and/or contaminating surfaces. If there is considerable variability, effort could be valuably invested in determining what infectee-attributes are associated with 'super-spreaders' and whether it is possible to focus available tracing and quarantine resources on people with those attributes. A complication arose to the estimation of infectiveness when, at the end of 2020, strains of the virus emerged that appeared to be substantially more infective. The importance of the category of people in the the state Undetected-Infected (64) became apparent as the epidemic unfolded in each country, because undetected infectees are a primary source of virus-spread. In order to gain an insight into the overall progress of the epidemic at a population level, an estimate is needed of the Undetected-Infected status, for example by means of adequate random-sample testing of the public for the virus. Strategies are needed to find more of the people who are in that state, so that they can be requested or required to shift state to Isolated (4). Possibilities include extensions to contact-tracing, suspect-definition based on locations and time-periods, infection-testing in the vicinity of hotspots, and random infection-testing. It may be possible to estimate the scale of the count in Undetected (64), by random-testing for antibodies in order to develop estimates of the cumulative count in Undetected-Recovered (88), and to then reason back from there to the scale of current Undetected-Infecteds. To reflect the uncertainties, there are benefits in using ghostly outlines to represent both Undetected-Infected (64) and Undetected-Recovered (88), and inflows to those two states. On the other hand, transitions are visible when an individual moves from Undetected (64) to Detected (3) or Hospital-Queue (5). Considerable discussion arose about the 'excess mortality' statistic, and the ways in which COVID-19 affected that measure. It became clear that the terminal state Dead (99) needed to be categorised more finely. Cause of death needed to distinguish cases where COVID-19 was the cause of death, or was a significant factor in the death because it compounded prior conditions (99A) from all other causes of death, including not only where COVID-19 was not present, but also where infection was, or was assumed to be, present at death but was not listed as a cause (99B). R. Clarke: A Simulation Model for COVID-19 Public Health Management: Design and Preliminary Evaluation 21 This phase of the research stimulated reconsideration of many aspects of the April 2020 model in Figure 1, in order to ensure that it could assist policy-makers in navigating their juridiction's particular maze. The result was the revised model in Figure 2, incorporating many adaptations reflecting the insights arising from 8 months of vicarious learning from many different jurisdictions. Further detail on the revised model is provided in the underlying Working Paper (Clarke 2021). 6 Conclusions Despite the great contemporary enthusiasm for IT, it delivered relatively little value during the COVID-19 pandemic of 2020. This appears to have been attributable to an 'applied' approach, 'throwing technology at the problem' and at worst matching the caricature of 'when you have a hammer in your hand, everything looks like a nail'. It appears more likely that IT can deliver for society and the economy if the approach adopted is both more strategic in nature, and 'instrumentalist' / problem-oriented rather than 'applied' / tool-oriented. That means standing far enough back to be able to identify and describe the problem-space, and then modelling the key aspects of that space. On that base, architectures, process models and data models can emerge and be refined, that will much better serve the needs of decision-makers. The scale of activities, even within a single jurisdiction, has been so great that a detailed assessment of the models used during 2020 is difficult to assemble. The research reported in this paper comprised a mixture of thought-experiment, abstract design, and testing and adaptation of the initial model against information arising from experience across the world during the period May to December 2020. 22 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Figure 2: The Revised Model A model was initially postulated that was envisaged as being suitable as a supporting tool for public policy decisions in relation to public health management. On the basis of new information streaming in during the subsequent months, the need for refinements was apparent. The revised model is capable of further articulation, R. Clarke: A Simulation Model for COVID-19 Public Health Management: Design and Preliminary Evaluation 23 through specification of data models in support of states and flows, and alternative processing rules for state transitions. An example of the kind of development that requires rapid adaptation was the midJanuary 2021 revelation that the hospital readmission rate for people who had recovered from COVID-19, in the UK, during January to September 2020, was 30% – 3.5 times that for the population generally – and 12% died following discharge – 7 to 8 times that for matched control groups Ayoubkhani et al. 2021). This suggests that the incidence of 'Long COVID' or 'post-COVID syndrome (PCS)' may be much higher than previously thought. It also raises questions about the extent to which people in the Recovered (80, 88) and even Vaccinated (90) states are immune to COVID-19, and even whether they are incapable of becoming infective again. The work reported here opens up a variety of possibilities for further research, including:       case studies of individual jurisdictions' decision processes; articulation of the model in specific jurisdictions; presentation of the model to, and workshopping with, policy-makers, in order to gain further understanding of its usefulness; animation of the model, in order to assist in its communication and use; expression of the model in a DES language such as GPSS; experimentation with a mix of actual data and synthetic data. The model proposed and tested in this paper has, by its nature, limited focus. Its target-area is expressly public health management, although it has application also to the adjacent level of health facility management, and implications for population management. It is not suggested that this model subsumes or replaces models at other levels of abstraction. It is contended, however, that public health policymakers, and government ministers and their advisers, can greatly benefit from the development, articulation and ongoing adaptation of a model of this nature. It enables processes to be better understood, strategies considered, and implications of possible interventions thought through. This information can then be combined with that arising from work at other levels of abstraction (bio-medical and medical, on the one hand, and public behaviour management and economic management on the other). 24 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE A very large number of articles have been published during 2020 in the medical, public health management and social policy literatures. In the IS discipline on the other hand, significant contributions have been few and far between. However, see Thomas et al. (2020) and Trang et al. (2020). It is contended that, unless the IS discipline adopts considered, strategic approaches to public policy needs, proponents of IT will be dismissed as 'technological solutionists' and even 'delusionists', and IT and IS will lose their lustre. References Allen M., Spencer A., Gibson A., Matthews J., Allwood A., Prosser S. & Pitt M. (2015) 'What is discrete event simulation, and why use it?' Chapter 5 of 'Right cot, right place, right time: improving the design and organisation of neonatal care networks – a computer simulation study' NIHR Journals Library, May 2015, at https://www.ncbi.nlm.nih.gov/books/NBK293948/ Aron J.L. & Schwartz I.B. (1984) 'Seasonality and period-doubling bifurcations in an epidemic model' J. Theor. Biol. 110:665-679, 1984, at https://www.researchgate.net/profile/Ira_Schwartz/publication/16673793_Seasonality_and _perioddoubling_bifurcations_in_an_epidemic_model/links/59d7a186a6fdcc2aad0645fc/Seasonalit y-and-period-doubling-bifurcations-in-an-epidemic-model.pdf Ayoubkhani D., Khunti K., Nafilyan V., Maddox T., Humberstone B., Diamond I. & Banerjee A. (2021) 'Epidemiology of post-COVID syndrome following hospitalisation with coronavirus: a retrospective cohort study' medRxiv, 15 January 2021, at https://www.medrxiv.org/content/10.1101/2021.01.15.21249885v1 Baker M.G., Kvalsvig A. & Verrall A.J. (2020) 'New Zealand's COVID‐19 elimination strategy' Med J Aust 213, 5 (September 2020) 198-200, at https://www.mja.com.au/journal/2020/213/5/new-zealands-covid-19-elimination-strategy Barrett M. (2020) 'What have Norway, Finland and Denmark got right on Covid-19?' New Statesman, 22 December 2020, at https://www.newstatesman.com/world/europe/2020/12/what-have-norway-finland-anddenmark-got-right-covid-19 BBC (2020) 'Covid-19: China's Qingdao to test nine million in five days' BBC News, 12 October 2020, at https://www.bbc.com/news/world-asia-54504785 von Bertalanffy L. (1968) 'General System Theory: Foundations, Development, Applications' George Braziller, 1968 Bolla P. & Sarl A. (2020) 'Using Discrete Event Simulation model to simulate COVID19 epidemics in Switzerland' ALASS, August 2020, at 14/7/21https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7341703/ Brailsford S., Churilov L. & Dangerfield B. (eds.) (2014) 'Discrete‐Event Simulation and System Dynamics for Management Decision Making' Wiley, 2014 Brailsford S. & Hilton NB. (2000) 'A Comparison of Discrete Event Simulation and System Dynamics for Modelling Healthcare Systems' Proc. ORAHS 2000, Glasgow, pp. 18–39, at https://eprints.soton.ac.uk/35689/1/glasgow_paper.pdf Brauer F. (2008) 'Compartmental Models in Epidemiology' Springer, Lecture Notes in Mathematics, volume 1945, pp. 19-79, at https://link.springer.com/content/pdf/10.1007%2F978-3-540-78911-6_2.pdf R. Clarke: A Simulation Model for COVID-19 Public Health Management: Design and Preliminary Evaluation 25 Budd J., Miller B.S., Manning E.M., et al. (2020) 'Digital technologies in the public-health response to COVID-19' Nature Medicine 26 (August 2020) 1183–1192, at https://www.nature.com/articles/s41591-020-1011-4 CDC (2020) 'Legal Authorities for Isolation and Quarantine' Center for Disease Control, Washington DC, rev. February 2020, at https://www.cdc.gov/quarantine/aboutlawsregulationsquarantineisolation.html Chi Y.-L., Chalkidou K. & Walker D. (2020) 'What Can Policymakers Learn about COVID-19 from Looking at Different Model Estimates?' Center for Global Development, June 2020, at https://www.cgdev.org/blog/what-can-policymakers-learn-about-covid-19-lookingdifferent-model-estimates Clarke R. (2021) 'Simulation Modelling for Public Health Management during the COVID-19 Pandemic' Xamax Consultancy Pty Ltd, January 2021, at at http://rogerclarke.com/EC/CVMB.html Currie C.S.M., Fowler J.W., Kotiadis K., Monks T., Onggo B.S., Robertson D.A. & Tako A.A. (2020) 'How simulation modelling can help reduce the impact of COVID-19' Journal of Simulation 14:2 (2020) 83-97, DOI: 10.1080/17477778.2020.1751570 Econ (2020) 'Tracking the coronavirus across Europe' The Economist, 3 July 2020, at https://www.economist.com/graphic-detail/2020/07/03/tracking-the-coronavirus-acrosseurope Gault F.D., Hamilton K.E., Hoffman R.B. & McInnis B.C. (1987) 'The design approach to socioeconomic modelling' Futures 19, 1 (February 1987) 3-25, at https://www.peakoil.net/files/THE_DESIGN_APPROACH_TO_SOCIO_ECONOMIC_ MODELLING.pdf Giordano G., Blanchini F., Bruno R., Colaneri P., Di Filippo A., Di Matteo A. & Colaneri M. (2020) 'Modelling the COVID-19 epidemic and implementation of population-wide interventions in Italy' Nature Medicine 26 (April 2020) 855–860, at https://www.nature.com/articles/s41591020-0883-7 Gn (2020a) 'Melbourne Covid lockdown rules and coronavirus restrictions explained' The Guardian, 9 November 2020, at https://www.theguardian.com/australia-news/2020/nov/09/melbourne-restrictionsvictoria-lockdown-rules-covid-19-metropolitan-metro-explained-what-you-need-to-know Gn (2020b) 'Our key findings about US healthcare worker deaths to date' The Guardian, 23 Dec 2020, at https://www.theguardian.com/us-news/ng-interactive/2020/dec/22/lost-on-thefrontline-our-findings-to-date Gregor S. & Hevner A. (2013) 'Positioning Design Science Research for Maximum Impact' MIS Quarterly 37, 2 (June 2013 ) 337-355, at https://ai.arizona.edu/sites/ai/files/MIS611D/gregor-2013-positioning-presenting-designscience-research.pdf Gumel A.B., McCluskey C.C. & Watmough J. (2006) 'An SVEIR Model for Assessing Potential Impact of an Imperfect Anti-SARS Vaccine' Mathematical Biosciences And Engineering 3, 3 (July 2006) 485–512 ICAO (2020) 'Public Health Risk Mitigation Measures' International Civil Aviation Organisation, 2020, at https://www.icao.int/covid/cart/Pages/Public-Health-Risk-Mitigation Measures.aspx Jalayer M., Orsenigo C. & Vercellis C. (2020) 'CoV-ABM: A stochastic discrete-event agent-based framework to simulate spatiotemporal dynamics of COVID-19' arXiv (Jul 2020), at 14/7/21https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7341703/ Jayadevan R. (2020) 'The 6 most successful anti-Covid strategies so far, and the reasons why they worked' Onmanorama, 3 June 2020, at https://www.onmanorama.com/lifestyle/health/2020/06/03/most-successful-anti-covidstrategies-reasons-why-they-worked.html Jefferies S., French N., Gilkison C., Graham G., Hope V., Marshall J., McElnay C., McNeill A., Muellner P., Paine S., Prasad N., Scott J., Sherwood J., Yang L. & Priest P. (2020) 'COVID- 26 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 19 in New Zealand and the impact of the national response: a descriptive epidemiological study' Lancet Public Health 5 (October 2020) e612–23, at https://www.thelancet.com/action/showPdf?pii=S2468-2667%2820%2930225-5 Kermack W.O. & McKendrick A.G. (1927) 'A Contribution to the Mathematical Theory of Epidemics' Proc. Roy. Soc. Lond. A 115, 700-721, 1927, at http://www.math.utah.edu/~bkohler/Journalclub/kermack1927.pdf Minghella D. (2020) 'The UK and Covid-19: the tragedy of the road not taken' New Statesman, 22 December 2020, at https://www.newstatesman.com/politics/uk/2020/12/uk-and-covid-19-tragedy-road-nottaken Moss R., Wood J., Brown D., Shearer F., Black A.J., Cheng A.C., McCaw J.M. & McVernon J. (2020) 'Modelling the impact of COVID-19 in Australia to inform transmission reducing measures and health system preparedness' medRxiv, 11 April 220, at http://dx.doi.org/10.1101/2020.04.07.20056184 Niederman F. & March S. (2012) 'Design Science and the Accumulation of Knowledge in the Information Systems Discipline' ACM Transactions on MIS 3, 1 (2012), 1 Peffers K., Tuunanen T., Rothenberger M. & Chatterjee S. (2007) 'A design science research methodology for information systems research' Journal of Management Information Systems, 24, 3 (Winter 2007) 45-77 Nikulin I.I., Woolverton K.E. & Withington M.J. (2020) 'Using Dynamic Models and Empirical COVID-19 Data to Showcase Effective Pandemic Prevention Measures' Worcester Polytechnic Institute, at https://digitalcommons.wpi.edu/iqp-all/5759 Novick L.F. & Mays G.P. (eds.) (2008) 'Public Health Administration: Principles for Population-based Management' Jones & Bartlett, 2008 Novick L.F. & Morrow C.B. (2008) 'A Framework for Public Health Administration and Practice' Ch. 2 in Novick & Mays (2008), pp. 35-68 OxCGRT (2020) 'Codebook' Oxford Covid-19 Government Response Tracker, v.2.6, 09 December 2020, at https://github.com/OxCGRT/covid-policytracker/blob/master/documentation/codebook.md Peterson M. (2009) 'An Introduction to Decision Theory' Cambridge University Press, 2009 Rhodes T., Lancaster K., Lees S. & Parker M. (2020) 'Modelling the pandemic: attuning models to their contexts' BMJ Global Health (June 2020), doi:10.1136/ bmjgh-2020-002914, at https://gh.bmj.com/content/bmjgh/5/6/e002914.full.pdf Schipper H. (2020) 'How pandemic modelling failed policy-makers, and how to do better' MacdonaldLaurier Institute, July 2020, at https://macdonaldlaurier.ca/files/pdf/July_Commentary_Schipper_FWeb.pdf Siebers P.O., Macal C.M., Garnett J., Buxton D. & Pidd M. (2010) 'Discrete-Event Simulation is Dead, Long Live Agent-Based Simulation!' Journal of Simulation 4, 3 (2010) 204-210, at https://link.springer.com/content/pdf/10.1057/jos.2010.14.pdf Silva C.L.S, Batista P.V.C., Lima H.S., Alves M.A., Guimarães F.G. & Silva R.C.P. (2020) 'COVIDABS: An agent-based model of COVID-19 epidemic to simulate health and economic effects of social distancing interventions' Chaos, Solitons & Fractals 139 (October 2020) 110088, at https://doi.org/10.1016/j.chaos.2020.110088 Sprague R.H. (1980) 'A Framework for the Development of Decision Support Systems' MIS Qtly 4, 4 (December 1980) 1-26 SWPRS (2020) 'Post-Acute Covid ('Long Covid')' Swiss Policy Research, August 2020, at https://swprs.org/post-acute-covid-long-covid/ Thomas O., Hagen S., Frank U., Recker J., Wessel L., Kammler F., Zarvic N. & Timm I. (2020) 'Global Crises and the Role of BISE' Business & Information Systems Engineering 62, 4 (June 2020) 385–396, at https://link.springer.com/article/10.1007/s12599-020-00657-w R. Clarke: A Simulation Model for COVID-19 Public Health Management: Design and Preliminary Evaluation 27 Trang S., Trenz M., Weiger W.H., Tarafdar M. & Cheung C.M.K. (2020) 'One app to trace them all? Examining app specifications for mass acceptance of contact-tracing apps' Euro. J. of Infor. Syst. 29, 4 (Jun 2020) 415-428, at https://orsociety.tandfonline.com/doi/full/10.1080/0960085X.2020.1784046 Vroom V.H. & Jago A.G. (1988) 'The New Leadership: Managing participation in organizations' Prentice Hall, 1988 Vroom V.H. & Yetton P.W. (1973) 'Leadership and Decision Making' University of Pittsburgh Press, 1973 Weitz J.S. & Dushoff J. (2015) 'Modeling Post-death Transmission of Ebola: Challenges for Inference and Opportunities for Control' Sci Rep 5, 8751 (March 2015), at https://www.nature.com/articles/srep08751 Whitworth J. (2020) 'Lessons from around the world on fighting COVID’s second wave' The Conversation, 21 November 2020, at https://theconversation.com/lessons-from-around-the-world-on-fighting-covids-secondwave-150432 WHO (2020a) 'Criteria for releasing COVID-19 patients from isolation: Scientific Brief' 17 June 2020, at https://www.who.int/news-room/commentaries/detail/criteria-for-releasing-covid-19patients-from-isolation WHO (2020b) 'Modes of transmission of virus causing COVID-19: implications for IPC precaution recommendations' World Health Organisation, Scientific brief, 29 March 2020, updated 9 July 2020, at https://www.who.int/news-room/commentaries/detail/modes-of-transmission-ofvirus-causing-covid-19-implications-for-ipc-precaution-recommendations WHO (2020c) ' Transmission of SARS-CoV-2: implications for infection prevention precautions: Scientific Brief' World Health Organisation, Interim guidance, July 2020, at https://www.who.int/news-room/commentaries/detail/transmission-of-sars-cov-2implications-for-infection-preventionprecautions#:~:text=The%20incubation%20period%20of%20COVID,to%20a%20confirme d%20case. WHO (2020d) 'Considerations in adjusting public health and social measures in the context of COVID-19' World Health Organisation, Interim guidance, April 2020, rev. November 2020, at https://www.who.int/publications/i/item/considerations-in-adjusting-public-health-andsocial-measures-in-the-context-of-covid-19-interim-guidance WOM (2020) 'Reported Cases and Deaths by Country, Territory, or Conveyance' Worldometer, December 2020, at https://www.worldometers.info/coronavirus/#countries Wood R.M., McWilliams C.J., Thomas M.J., Bourdeaux C.P. & Vasilakis C. (2020) 'COVID-19 scenario modelling for the mitigation of capacity-dependent deaths in intensive care' Health Care Manag Sci. 2020 8 (Jul 2020) 1–10, doi: 10.1007/s10729-020-09511-7, at https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7341703/ Zhang X. (2018) 'Application of discrete event simulation in health care: a systematic review' BMC Health Services Research volume 18, Article number: 687 (2018), at https://bmchealthservres.biomedcentral.com/articles/10.1186/s12913-018-3456-4 28 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE FACTORS CONTRIBUTING TO THE BUSINESS DIGITAL DIVIDE: A SYSTEMATIC LITERATURE REVIEW ALI ACILAR, DAG HÅKON OLSEN, NIELS FREDERIK GARMANN-JOHNSEN & TOM ROAR EIKEBROKK University of Agder, Faculty of Social Science, Kristiansand, Norway; e-mail: ali.acilar@uia.no, dag.h.olsen@uia.no, niels.f.garmann-johnsen@uia.no, tom.eikebrokk@uia.no Abstract The main aim of this study is to review the literature relating to the factors that contribute to the business digital divide. A systematic literature review was conducted using two databases (Scopus and Web of Science). A total of 28 articles were selected and analyzed. The selected studies are conducted in various developing and developed countries, including all firm sizes and different sectors, and cover several different digital technologies. Identified factors determining the business digital divide are categorized as technological, organizational, and environmental factors. The discussion and the potentials for further research are also presented. DOI https://doi.org/10.18690/978-961-286-485-9.2 ISBN 978-961-286-485-9 Keywords: business digital divide, digital divide, systematic literature review 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 30 1 Introduction The rapid and continuous developments of ICTs facilitate access and process data and improve the inter and intra-organizational integration of companies, but at the same time, these technological developments bring a new type of exclusion, the digital divide (Souza, Siqueira, & Reinhard, 2017). A significant number of businesses, especially SMEs, tend to be on the wrong side of the digital divide, and therefore do not benefit from the potential advantages of ICTs. Even though digitalization provides new opportunities for SMEs to benefit from the global economy, significant numbers of SMEs lag behind in the digital transition (North, Aramburu, & Lorenzo, 2019; OECD, 2017). The digital divide can be defined as “the gap between individuals, households, businesses and geographic areas at different socio-economic levels with regard both to their opportunities to access ICTs and to their use of the Internet for a wide variety of activities” (OECD, 2001, p. 5). The digital divide can emerge from individual, organizational, and global levels (Dewan & Riggins, 2005). Unequal access and use of ICT are the main issues of the digital divide. Castells (2002, p. 270) describes the digital divide as “the divide created between those individuals, firms, institutions, regions, and societies that have the material and cultural conditions to operate in the digital world, and those who cannot, or cannot adapt to the speed of change.” As among people, the digital divide also exists among businesses and refers to ICT access and the ability of appropriate use of the technology (Wielicki & Arendt, 2010). In addition to preventing access to ICT, the digital divide prevents commercial applications of these technologies, such as e-business (Di. Gregorio, Kassicieh, & De Gouvea Neto, 2005). Several academic disciplines, from sociology and political science to business and information systems, have been involved in research about the digital divide; and most of these research studies focus on the individual or societal level (Wielicki & Arendt, 2010). The business digital divide is not discussed in the literature as much as the digital divide among people or organizations (Souza et al., 2017). We focus on the digital divide among businesses in this study. It is important to understand the business digital divide since it significantly affects how firms compete in the global market, how they communicate with their customers and business partners, and how they formulate their strategies for e-commerce (Dewan & Riggins, 2005; Wielicki & A. Acilar, D. Håkon Olsen, N. Frederik Garmann-Johnsen & T. Roar Eikebrokk: Factors Contributing to the Business Digital Divide: A Systematic Literature Review 31 Arendt, 2010). This study systematically reviews the literature with the aim of understanding the factors contributing to the digital divide among businesses. The literature review was driven by the following research question: What are the determinant factors of the digital divide among businesses? 2 Methodology In this study, a systematic literature review was conducted. The systematic literature review was conducted in accordance with the Preferred Reporting Items for Systematic Reviews and Meta-analysis (PRISMA) approach (Moher, Liberati, Tetzlaff, Altman, & Group, 2009). PRISMA is well accepted and used in a broad range of academic disciplines in the literature. 2.1 Inclusion and Exclusion Criteria The search process was conducted using two scientific databases: Scopus and Web of Science. These two databases are “two world-leading and competing citation databases” (Zhu & Liu, 2020). We conducted the search with the following keywords: ("digital divide" OR "digital gap") AND (busines* OR firm* OR compan* OR corporate OR corporation* OR "small and medium size* enterpris*" OR SME* OR enterpris*) in “title, abstract, keywords” search fields. After the initial search, search results were restricted to journal articles from 2000 to 2019 in the English language for both databases. Only journal articles were included in this literature review. 2.2 Data Collection The searches of the two databases resulted in 712 records. After 155 duplicate articles were removed, 557 articles remained for further screening. At this stage of the study, articles were excluded on the basis of irrelevant titles or abstracts. After the title and abstract screening process, 71 articles were selected for further full-text analysis. Nine articles could not be obtained from the databases. A total of 62 articles were accessed for full-text screening. Among them, two articles were excluded because they were written in Spanish. Even though database searches were limited based on language, these articles were listed by databases. Twenty-eight articles were 32 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE selected after the full-text screening. In order to code the selected articles, a spreadsheet was created. Full-text articles were excluded, with the following reasons: theoretical, not empirical, data collection methods, and out of focus of this study. The selected articles were coded with the following data: authors’ names, article title, publication year, source title, technology, sample country, data source, data collection method, sample size, firm size, sector, methodology, and determinant factors. The steps of the systematic literature review are shown in Figure 1. Figure 1: Flow diagram for selection of articles, based on PRISMA. 2.3 Systematic Literature Review Results The selected studies in this literature review have been published using samples from countries around the world, including six continents, but mainly from Europe (17 studies) (Table 1). A. Acilar, D. Håkon Olsen, N. Frederik Garmann-Johnsen & T. Roar Eikebrokk: Factors Contributing to the Business Digital Divide: A Systematic Literature Review 33 Table 1: Selected articles, country of sample, technology Country of sample Botswana South Africa USA Australia China Italy Ghana Europe Article Duncombe and Heeks (2002) Moodley (2003) Forman (2005) Gengatharen and Standing (2005) Sun and Wang (2005) Arbore and Ordanini (2006) Hinson and Sorensen (2006) Labrianidis and Kalogeressis (2006) no. A1 A2 A3 A4 A5 A6 A7 A8 Pighin and Marzona (2008) Atzeni and Carboni (2008) Billon, Ezcurra, and Lera‐López (2009) Karen L. Middleton and Chambers (2010) Galve-Górriz and Gargallo Castel (2010) Rodríguez-Ardura and Meseguer-Artola (2010) A9 Italy A10 Italy A11 Europe Technology ICT B2B e-commerce Internet e-marketplaces Internet access & use Broadband E-business A list of ICTs ICT use and process automation ICT Website A12 USA A13 Spain Wifi ICT A14 Spain USA, Spain, A15 Portugal, Poland A16 USA A17 Taiwan A18 Nigeria A19 Europe A20 Europe A21 Europe E-commerce Wielicki and Arendt (2010) K. L. Middleton and Byus (2011) Chang, Wu, and Cho (2011) Oni (2013) Bach (2014) Oliveira and Dhillon (2015) Billon, Lera-Lopez, and Marco (2016) Doherty, Ramsey, Harrigan, and Ibbotson (2016) Billon, Marco, and Lera-Lopez (2017a) Billon, Marco, and Lera-Lopez (2017b) Ayinla and Adamu (2018) Ruiz-Rodríguez, Lucendo-Monedero, and González-Relaño (2018) Jordá Borrell, López Otero, and Contreras Cabrera (2018) Bowen and Morris (2019) A22 A23 A24 A25 Ireland Europe Europe Global A26 Europe ICT-based solutions ICT ICT Applic. of ICT tools ICT indicators B2B e-commerce ICT Broadband technologies ICT ICT BIM technology ICT A27 Global ICT Broadband, website, A28 United Kingdom social media Data in two studies are collected on a global scale. Various technologies are subject to the articles as indicators of the digital divide, such as the Internet, broadband, ebusiness, e-marketplace, website, social media, wifi, e-commerce, and B2B ecommerce. Some studies did not indicate the specific technology; instead, they used 34 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE the general term ICT. The sample sizes of the selected studies vary from 5 to more than 40,000 enterprises. Firm sizes in the studies are also various. Samples include enterprises with different sizes, from micro-enterprises to large-size enterprises, in sectors including manufacturing, finance, service, construction, and food. Four studies (A1, A5, A15, and A20) have samples in more than five sectors. Based on the level of the study, there are two main groups of articles: country or region level and firm-level articles. Country-level articles (A8, A11, A19, A21, A23, A24, A27) mainly used secondary data and applied econometric statistical analyses. Data of the selected studies come mainly from surveys. Almost half of the studies used secondary data. The selected studies used various quantitative methods for analyzing their data, such as the Chi-square test, regression analysis, correlation analysis, ANOVA, MANOVA, factor analysis, cluster analysis, spatial data analysis, logit analysis, structural equation modeling. It is found that there are 54 different factors identified in the selected literature. Based on the selected articles in this literature review, we categorized the factors determining the digital divide as technological (Table 3), organizational (Table 4), and environmental factors (Table 5), using Technology-OrganizationalEnvironmental (TOE) framework (Tornatzky & Fleischer, 1990). Table 3 presents factors related to technology. The most common technological factors reported in the selected articles are identified as perceived usefulness, cost, degree of ICT readiness, and relative advantage. Table 3: Technological Factors Factors Relative advantage Perceived benefits Perceived usefulness Perceived impact on the image of the firm Perceived need Cost Digital awareness The degree of ICT readiness Prior IT investment Technology/interoperability Technology integration Innovation target (technology) to be used Article No. A4, A22 A4 A4, A7, A22 A22 A1 A1, A2, A25 A18 A14, A15, A20 A3 A25 A20 A9 A. Acilar, D. Håkon Olsen, N. Frederik Garmann-Johnsen & T. Roar Eikebrokk: Factors Contributing to the Business Digital Divide: A Systematic Literature Review 35 Table 4 shows organizational factors. The most common organizational factor is firm size. As it is directly related to both firms’ financial ability to acquire and human resources to use, firm size is a prominent factor in adopting the technology. Small businesses with limited financial and human resources struggle with following technological developments. In addition to firm size, several other organizational factors are identified in the articles, such as factors related to human resources (employees´ education, expertise, training, investment per employee), owner's characteristics, internalization, organizational culture, and firm's age. Table 4: Organizational Factors Factors Firm size Firm’s age Organizational Culture Ethnicity Owners age Owner innovativeness Owners Education level Outsourcing strategy Financial constraints Lack of resources Reorganization Internationalization R&D (Innovation capacity) Employees´ education Labor composition Skills and capabilities Training Individual growth ability of employees Geographic dispersion of employees Perceived obstacles Article No. A3, A5, A6, A8, A20 A5, A10 A9, A25 A12, A16 A8, A12 A4 A8 A6 A10 A28 A10 A14, A28 A10, A23 A13, A20, A24 A10 A2, A25 A13, A25 A9 A3 A20 Table 5 presents the identified environmental factors in the selected articles, which are related to the environment of the firm. The most commonly reported environmental factor is location. After that, sector, customers, firms’ pressure, and financial support are other significant environmental factors reported by the researchers. The location of the firm is an important factor in the adoption of technology. The urban and rural divide still exists for businesses. Also, businesses in less developed countries or regions tend to be on the wrong side of the digital divide. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 36 Table 5: Environmental Factors Factors Location Sector Sectoral composition Customers Pressure of firms Network intensity Trading partner collaboration Financial support, subsidies, government support Government policy Legal requirements REM ownership structure and governance Critical mass Infrastructure Innovation performance of the country GDP per capita Fiscal decentralization Population density The extent of countries’ globalization Digital development of the country Accessibility to ICT capabilities of the country Technological readiness of market forces The educational level of the region 3 Article No. A5, A6, A8, A21, A28 A5, A8, A21, A24 A11 A14, A22, A25 A3, A14, A20 A8 A20 A8, A10, A17 A2 A25 A4 A4 A2 A19 A11 A21 A11 A27 A26 A27 A14 A11, A21 Discussion This study has presented the results of a systematic literature review of studies on the digital divide among businesses, published between 2000 and 2019. The business digital divide phenomenon has been investigated in developing and developed countries, particularly in Europe. There is a relatively small number of studies in developing economies. The divide has been approached with different digital technologies, involving adoption and use. The studies suggest that the digital divide exists among businesses in different sizes, sectors, and countries. Identified factors determining the business digital divide are categorized as technological, organizational, and environmental factors. The most commonly reported factors in the articles are identified as firm size, human resources, location, sector, customers, the pressure of firms, financial support, perceived usefulness, cost, and the degree of ICT readiness. A. Acilar, D. Håkon Olsen, N. Frederik Garmann-Johnsen & T. Roar Eikebrokk: Factors Contributing to the Business Digital Divide: A Systematic Literature Review 37 The literature has increasingly emphasized digitalization as an important vehicle for generating value from information technology for society, industry, and enterprises (Reis, Amorim, Melão, Cohen, & Rodrigues, 2019). In order to significantly benefit from digitalization, extensive changes are required in the organization. Digitalization implies significant changes for businesses, including strategy and business models, internal and external processes, organizational culture, etc. (Parviainen, Tihinen, Kääriäinen, & Teppola, 2017), a digital transformation. We found that the literature on the digital divide has barely addressed the digital transformation issues. The size and pace of the digital transformation make investments in digitalization for businesses of all sizes and in all industries inevitable to ensure success and survival (Hossnofsky & Junge, 2019). “Digitalisation is feared as a source of disruption, with the risk that only a few firm will emerge as winners while many firms and workers lose out, leading to a more polarised economic structure” (Veugelers, Rückert, & Weiss, 2019). Therefore, digitalization involves internal and external challenges for businesses, particularly SMEs. With limited financial and human resources, digitalization is a real threat for many SMEs and can widen the digital divide between SMEs and large businesses. Firms need dynamic capabilities to cope with the digital transformation and to adapt to the changing environment. However, it is a challenge for businesses to design mechanisms that enable repeatable, continuous adaptation (Vial, 2019). Besides, it is challenging for businesses to grasp how digitalization can be leveraged to transform their business models to achieve sustainable benefits (Parida, Sjödin, & Reim, 2019). Businesses need to understand how they can continuously derive and leverage value through developing their IT capabilities (Eikebrokk & Olsen, 2007). We, therefore, argue that further studies should explore the digitalization divide, focusing on factors causing the divide in digitalization processes and digitalization capabilities. The business digital divide studies mainly focus on the adoption and use of ICTs, and there are not many studies about outcomes of ICT usage (third-level digital divide) in businesses. For example, there is not much evidence that the digitalization of the business causes a significant productivity boost (Veugelers et al., 2019). Future research can also aim to investigate the divide between businesses in terms of outcomes and benefits of using ICTs. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 38 4 Conclusion The digital divide is a global phenomenon that affects people, organizations, and countries around the world. This study provides a systematic literature review about the factors that contribute to the business digital divide. The review is conducted by using two databases: Scopus and Web of Science. Twenty-eight journal articles published between 2000 and 2019 made up the sample of this study and were analyzed in the review. We investigated the characteristics of the business digital divide research and summarized the research distribution in terms of sample characteristics, methodological approaches, and the digital divide determinants. The digital divide exists among businesses in different sizes, sectors, and countries. Identified factors determining the digital divide are categorized as technological, organizational, and environmental factors. The main limitations of the study can be summarized as follows: Only two databases (Scopus and Web of Science) were used in this study. This review is based on only journal articles written in English. There are certainly other types of publications and studies in different languages, which address the business digital divide. Lastly, it is possible to have different search results using different search strings. Funding: This research received no external funding. References Arbore, A., & Ordanini, A. (2006). Broadband divide among SMEs: The role of size, location and outsourcing strategies. International Small Business Journal, 24(1), 83-99. Atzeni, G. E., & Carboni, O. A. (2008). The effects of grant policy on technology investment in Italy. Journal of Policy Modeling, 30(3), 381-399. Ayinla, K. O., & Adamu, Z. (2018). Bridging the digital divide gap in BIM technology adoption. Engineering, Construction and Architectural Management, 25(10), 1398-1416. Bach, M. P. (2014). Exploring information and communications technology adoption in enterprises and its impact on innovation performance of European countries. Ekonomicky casopis, 62(04), 335-362. Billon, M., Ezcurra, R., & Lera‐López, F. (2009). Spatial effects in website adoption by firms in European regions. Growth and change, 40(1), 54-84. Billon, M., Lera-Lopez, F., & Marco, R. (2016). ICT use by households and firms in the EU: links and determinants from a multivariate perspective. Review of World Economics, 152(4), 629-654. Billon, M., Marco, R., & Lera-Lopez, F. (2017a). Innovation and ICT use by firms and households in the EU: A multivariate analysis of regional disparities. Information Technology and People, 30(2), 424-448. Billon, M., Marco, R., & Lera-Lopez, F. (2017b). Innovation and ICT use in the EU: an analysis of regional drivers. Empirical Economics, 53(3), 1083-1108. A. Acilar, D. Håkon Olsen, N. Frederik Garmann-Johnsen & T. Roar Eikebrokk: Factors Contributing to the Business Digital Divide: A Systematic Literature Review 39 Bowen, R., & Morris, W. (2019). The digital divide: Implications for agribusiness and entrepreneurship. Lessons from Wales. Journal of Rural Studies, 72, 75-84. Castells, M. (2002). The Internet galaxy: Reflections on the Internet, business, and society: Oxford University Press on Demand. Chang, S.-I., Wu, H.-C., & Cho, C.-M. (2011). The development of digital divide assessment mechanism for SMEs: A perspective from the Taiwan manufacturing industry. Journal of Global Information Technology Management, 14(1), 6-34. Dewan, S., & Riggins, F. J. (2005). The digital divide: Current and future research directions. Journal of the Association for information systems, 6(12), 298-337. Di. Gregorio, D., Kassicieh, S. K., & De Gouvea Neto, R. (2005). Drivers of e-business activity in developed and emerging markets. IEEE Transactions on Engineering Management, 52(2), 155-166. Doherty, E., Ramsey, E., Harrigan, P., & Ibbotson, P. (2016). Impact of broadband Internet technologies on business performance of Irish SMEs. Strategic Change, 25(6), 693-716. Duncombe, R., & Heeks, R. (2002). Enterprise across the digital divide: information systems and rural microenterprise in Botswana. Journal of International Development, 14(1), 61-74. Eikebrokk, T. R., & Olsen, D. H. (2007). An empirical investigation of competency factors affecting ebusiness success in European SMEs. Information & Management, 44(4), 364-383. Forman, C. (2005). The Corporate Digital Divide: Determinants of Internet Adoption. Management Science, 51(4), 641-654. Galve-Górriz, C., & Gargallo Castel, A. (2010). The relationship between human resources and information and communication technologies: Spanish firm-level evidence. Journal of theoretical and applied electronic commerce research, 5(1), 11-24. Gengatharen, D. E., & Standing, C. (2005). A framework to assess the factors affecting success or failure of the implementation of government-supported regional e-marketplaces for SMEs. European Journal of Information Systems, 14(4), 417-433. Hinson, R., & Sorensen, O. (2006). E-business and small Ghanaian exporters: Preliminary micro firm explorations in the light of a digital divide. Online Information Review, 30(2), 116-138. Hossnofsky, V., & Junge, S. (2019). Does the market reward digitalization efforts? Evidence from securities analysts’ investment recommendations. Journal of Business Economics, 89(8), 965994. Jordá Borrell, R. M., López Otero, J., & Contreras Cabrera, G. A. (2018). Factors that influence ICT adoption at the country level. PLS-SEM Modelling. Revista De Economia Mundial, 50, 153Labrianidis, L., & Kalogeressis, T. (2006). The digital divide in Europe's rural enterprises. European Planning Studies, 14(1), 23-39. Middleton, K. L., & Byus, K. (2011). Information and communications technology adoption and use in small and medium businesses: The influence of Hispanic ethnicity. Management Research Review, 34(1), 98-110. Middleton, K. L., & Chambers, V. (2010). Approaching digital equity: is wifi the new leveler? Information Technology & People, 23(1), 4-22. Moher, D., Liberati, A., Tetzlaff, J., Altman, D. G., & Group, P. (2009). Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement. PLoS med, 6(7), 264-270. Moodley, S. (2003). Whither business-to-business electronic commerce in developing economies? The case of the South African manufacturing sector. Information Technology for Development, 10(1), 25-40. North, K., Aramburu, N., & Lorenzo, O. J. (2019). Promoting digitally enabled growth in SMEs: a framework proposal. Journal of Enterprise Information Management, 33(1), 238-262. OECD. (2001). Understanding the Digital Divide. OECD. (2017). Enhancing the contributions of SMEs in a global and digitalised economy. Oliveira, T., & Dhillon, G. (2015). From Adoption to Routinization of B2B e-Commerce. Journal of Global Information Management, 23(1), 24-43. Oni, A. O. (2013). Digital divide - a challenge to the real estate practice in Nigeria? Property Management, 31(1), 22-38. 40 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Parida, V., Sjödin, D., & Reim, W. (2019). Reviewing literature on digitalization, business model innovation, and sustainable industry: Past achievements and future promises. Sustainability, 11(2), 391. Parviainen, P., Tihinen, M., Kääriäinen, J., & Teppola, S. (2017). Tackling the digitalization challenge: how to benefit from digitalization in practice. International journal of information systems and project management, 5(1), 63-77. Pighin, M., & Marzona, A. (2008). An Uncontrolled Item of Enterprise ICT Innovation: the High Level Digital Divide. Journal of Information and Organizational Sciences, 32(1), 51-66. Reis, J., Amorim, M., Melão, N., Cohen, Y., & Rodrigues, M. (2019). Digitalization: a literature review and research agenda. Paper presented at the International Joint Conference on Industrial Engineering and Operations Management. Rodríguez-Ardura, I., & Meseguer-Artola, A. (2010). Toward a Longitudinal Model of e-Commerce: Environmental, Technological, and Organizational Drivers of B2C Adoption. The Information Society, 26(3), 209-227. Ruiz-Rodríguez, F., Lucendo-Monedero, A. L., & González-Relaño, R. (2018). Measurement and characterisation of the Digital Divide of Spanish regions at enterprise level. A comparative analysis with the European context. Telecommunications Policy, 42(3), 187-211. Souza, C. A. d., Siqueira, É. S., & Reinhard, N. (2017). Digital divide of small and medium-sized enterprises: An analysis of influencing factors using The TOE theory. RAM. Revista de Administração Mackenzie, 18(2), 15-48. Sun, Y., & Wang, H. (2005). Does Internet access matter for rural industry? A case study of Jiangsu, China. Journal of Rural Studies, 21(2), 247-258. Tornatzky, L. G., & Fleischer, M. (1990). The Processes of Technological Innovation. Lexington, MA: Lexington Books. Veugelers, R., Rückert, D., & Weiss, C. (2019). Bridging the divide: new evidence about firms and digitalisation. Bruegel Policy Contribution Issue# 17 December 2019. Vial, G. (2019). Understanding digital transformation: A review and a research agenda. The Journal of Strategic Information Systems, 28(2), 118-144. Wielicki, T., & Arendt, L. (2010). A knowledge-driven shift in perception of ICT implementation barriers: Comparative study of US and European SMEs. Journal of Information Science, 36(2), 162-174. Zhu, J., & Liu, W. (2020). A tale of two databases: the use of Web of Science and Scopus in academic papers. Scientometrics, 123, 321-335. PORT COMMUNITY SYSTEM BUSINESS MODELS MARIJA JOVIĆ,1 SAŠA AKSENTIJEVIĆ,2 BORNA PLENTAJ3 & EDVARD TIJAN1 1 University of Rijeka, Faculty of Maritime Studies, Rijeka, Croatia; e-mail: jovic@pfri.hr, etijan@pfri.hr 2 Aksentijević Forensics and Consulting, Viškovo, Croatia; e-mail: sasa.aksentijevic@gmail.com 3 Actual d.o.o., Žminj, Croatia, e-mail: bornnaplentaj7@gmail.com Abstract Port Community Systems have become a staple technological platform used to exchange information between the public and private agents and entities involved in ship and cargo services within seaports. In this paper, the theoretical background of the Port Community System is provided, emphasizing the importance of its implementation, and stakeholder collaboration. Different models of introducing an integrated Port Community System in seaports are analysed using literature review and actual cases in some of the most prominent seaports. DOI https://doi.org/10.18690/978-961-286-485-9.3 ISBN 978-961-286-485-9 Keywords: port community system, seaport stakeholders, business models, seaport stakeholder collaboration 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 42 1 Introduction Seaports, defined as a geographical location where cargo changes its transport mode (one of these being a seagoing vessel), are important drivers of the regional economy (Hintjens, Hassel, Vanelslander, & Voorde, 2020). The seaport’s competitiveness depends not only on exceptional geographical position, related to closeness of important markets and connection to seaport hinterland, but also on cost, efficiency, reliability, accessibility, safety, as well as quality of various services it offers, including transportation services, auxiliary services and added value logistic services. Seaports have to continuously improve their operations, both commercial and administrative in order to stay competitive (Tijan, Jović, & Karanikić, 2019). Numerous seaports have already designed and implemented the Port Community System (PCS). PCS allows the users to make service requests and input their information directly into the port’s information system (Keceli, 2011), and enables the intelligent and protected exchange of information between involved public and private port users (Simoni, Schiavone, Risitano, Leone, & Chen, 2020). The higher the level of collaboration and integration between the port and supply chain stakeholders, the greater the sustainability of both the overall supply chain and the port (Tijan, Agatić, Jović, & Aksentijević, 2019). Seaport stakeholders have their own distinctive interests, which may minimize the ability to incorporate the PCS into seaport operations. Nonetheless, numerous seaports have recognized the benefits that PCS brings, and are utilizing it to assist with everyday operations. There is no universal approach to PCS introduction and exploitation, or a universal applicable business model, due to the heterogenous nature of global seaports and their management. Furthermore, the majority of research in this area is focused on digitalization of processes and unification of underlying procedures and document flow, and not on relevant PCS introduction and exploitation models. By working not only on the theoretical aspects of PCS systems, but also in their envisaging and implementation, the authors have identified the lack of applicable knowledge in this area and therefore wanted to verify the pragmatic and empiric findings by cross checking them using scientific resources. To overcome this research gap, the authors have conducted the review of available literature and sources. The goal of the research is to analyze the various PCS business models, given the existence of various stakeholders who have their own particular interests and preferences. Given M. Jović, S. Aksentijević, B. Plentaj & E. Tijan: Port Community System Business Models 43 the fact that the transparency and easy access to data are the basis for successful transport business, the research problem stems from unnecessary costs and lost time due to the outdated business procedures and inadequate execution and monitoring of business processes in transport, which can largely be remedied by introducing a PCS. This paper presents a review of research papers and other sources (such as official webpages of seaports, seaport stakeholders and maritime transport enterprises), ultimately providing a better understanding of PCS business models. 2 Theoretical background Port Community System is the technological platform that enables networking between the public and private agents and entities involved in the ship and cargo services offered by ports (Caldeirinha, Felício, Salvador, Nabais, & Pinho, 2020), through a single point of data entry (Aloini, Benevento, Stefanini, & Zerbino, 2020). Two main values are co-created by the interrelated organizations operating within a PCS: the movement of goods and human beings and enforcing the law, public order, and safety. (Nota, Bisogno & Saccomanno, 2018). Generally accepted guidelines for development of a Port Community System require that PCS is formed by the community for the community and that the community are, in general, shareholders of the PCS Operator. (European Port Community Systems Association, 2011) However, in real PCS scenarios, in many cases, the community are not participants or owners of the PCS Operator, instead, it is often mandated by the governmental body (for example, port authorities) or maintains a mixed management and ownership structure. This presents one of the major issues in PCS building and operations and makes it difficult for PCS to facilitate smooth flow of electronic data and reduce inefficiencies in port business processes. Therefore, the selection of a proper operating model is crucial for the success of every PCS project. While individual business information systems that relate to individual stakeholders process and store only data and messages that are relevant for them, PCS can exchange data that is useful for a wider number of users (Tijan, Aksentijević, & Čišić, 2014). PCS exists in a dynamic network consisting of a significant number of stakeholders (as shown in Figure 1 with different business processes, technologies and roles (Bezić, Tijan, & Aksentijević, 2011). 44 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Figure 1: Port community system and involved stakeholders Source: (Tijan, Kos, & Ogrizović, 2009) PCS is largely based on a strong collaboration between all the involved public and private organizations (Baron & Mathieu, 2013), establishing a link between different types of technologies, processes, people, and standards (Rodon & Ramis-Pujol, 2006). Regional or even global PCSs might be designed (Jović, Tijan, Žgaljić, & Karanikić, 2020), helping to enhance the overall PCS performance in both local and foreign trade activities (Moros-Daza, Amaya-Mier, Garcia-Llinas, & Voß, 2019). In both cases a further standardization of interfaces and processes would be required. The requirements of and benefits for each company would have to be outlined and agreed on in advance (Treppte, 2011). Bringing all users together, PCS enhances the efficiency of the physical flow of freight, drives economic growth, and as a secondary result, assists in reducing externalities such as pollution, congestion, and land use impacts (Irannezhad, Hickman, & Prato, 2017). According to (Zerbino, Aloini, Dulmin, & Mininno, M. Jović, S. Aksentijević, B. Plentaj & E. Tijan: Port Community System Business Models 45 2019), one of the reasons for PCS development is the possibility to reduce the average time frame of port procedures, and to enhance information exchange, consequently improving overall port competitiveness. Going beyond traditional function of PCS to share information, a PCS can offer modules to support a variety of activities (Baalen, Zuidwijk, & Nunen, 2009). The recent versions of PCS include the cloud services, which is becoming a significant factor in the historical development of information technology outsourcing (Johansson & Muhic, 2017). Although a PCS connects multiple systems operated by a variety of organizations that make up a seaport community (IPCSA, 2020), it should be noted that for each port region, a PCS can take different forms in response to various physical, modal, jurisdictional, and operational characteristics (Tsamboulas, Moraiti, & Lekka, 2012). PCS functions may be divided into three categories: port management functions (documents provided to port authorities or terminal operators), customs functions (documents needed for customs clearance) and online platforms for electronic commerce between port users (Keceli, 2011). 3 Methodology The literature review was conducted in order to research the theoretical foundations of models of port community systems. The authors opted to perform the search using only resources in English language and started with the inclusion criteria by using a combination of keyword “Port Community System models” and “Port Community System” (title, abstract and keywords). Web of Science, Google Scholar, ResearchGate databases were mainly used for this purpose. Due to the previously identified lack of the research dealing on this topic, the search for articles was not limited to a specific period, and mostly includes journal articles and conference papers. To ensure that possible useful findings from various fields were not excluded, the authors did not limit the queries to a specific field or index. Furthermore, due to aforementioned lack of research dealing with PCS models, the PCS models are further analysed by means of several real-life implementations such as: Port of Hamburg, The Port Authority of Valencia, Port of Rotterdam, The Antwerp PCS, etc. Using described methodology, a total of 36 resources have been 46 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE identified and used in the description of development and exploitation models of a PCS that follows. 4 Development and exploitation models of a Port Community System Seaport stakeholders have their own preferences, which can decrease the willingness of certain members of the port community to incorporate PCS. The PCS should therefore enable the promotion of autonomy of all participants and at the same time include and support activities in various business processes in relation to seaports. In this respect, such a system does not only deal with internal needs of each individual company, but also with needs of other seaport stakeholders. In particular, the port authority attempts (or should attempt) to optimize the impact of the seaport's activities on the territory in terms of value added (local employment and incomes); on the other hand, the port operators should attempt to maximize the value for the final customer (De Martino, Errichiello, Marasco, & Morvillo, 2013). Depending on a type of stakeholder’s organization and its objectives, ownership model can be private, public or mixed public-private (PPP) (Marek, 2017). If the ownership model is of a private kind, the so-called bottom-up approach would be implemented in the system implementation. In this way, it is expected that the stakeholders (shipping companies, shipping agents, brokers, etc...) will support the work with the PCS since it is accepted by the operators themselves. Ports such as port of Singapore, Hamburg, Felixstowe belong to that kind of PCS model. For example, the Port Community System for the Port of Hamburg is operated by DAKOSY, one of the leading platform and software providers for logistics (IPCSA, 2021a). The PCS connects all stakeholders involved in cargo handling to perform fast, efficient and largely-automated processes in seaports and enables integrated intermodal hinterland handling of all modes of transport (Dakosy, 2021). The top-down approach would be implemented if the ownership model is more similar to the public style, with a focus on port authorities and public bodies as the key stakeholders who determine the speed of implementation and set targets in the development of the PCS system (Marek, 2017). Ports such as Port of Valencia, Port of Rotterdam and Amsterdam belong to public PCS model. M. Jović, S. Aksentijević, B. Plentaj & E. Tijan: Port Community System Business Models 47 The port authority plays an important role in implementing and creating the port development strategy and in coordinating the port community as a whole (João, Batista, Ayala Botto, & Cordón Lagares, 2018). The port authority is responsible for secure, sustainable and competitive port growth and may be a key factor in the implementation of the PCS (Tijan, Agatić, & Hlača, 2012). The implementation of the PCS may allow port authorities to coordinate port activities, monitor the activities of port operators and control port operations more easily (Carlan, Sys, & Vanelslander, 2016). For example, via Valenciaport PCS, the Port Authority of Valencia offers e-commerce solutions that make it easier for goods to move through the ports of Valencia, Sagunto and Gandía, adding a clearly perceptible value to the consumers and port users (“Port Authority of Valencia,” 2021). (Chandra & Hillegersberg, 2017) have conducted a Port of Rotterdam case study in which the importance of cooperation between port authorities and other stakeholders involved in the implementation of the PCS is visible. According to the study (Chandra & Hillegersberg, 2017), due to dissatisfaction with the Port of Rotterdam’s information system, Port Infolink B.V. was established in 2002 (as a separated governance entity). Initiated by the Port of Rotterdam Authority, the prepartnership cooperation process started by defining the most important issues that hinders the efficient flow of goods through the port. The Port Authority was the sole owner of Port Infolink, meaning that it was responsible for the initial investment in the development of the information system. This initiative included other stakeholders in the partnership program delivery phase (e.g. Customs). In early 2009, the next governance life cycle was marked by the merger of Port Infolink in Rotterdam and PortNET in Amsterdam, which provided the Ports of Rotterdam and Amsterdam with a single PCS (Chandra & Hillegersberg, 2017). PPP is, in essence, a mixture of the two previously described ownership models. The aim of this ownership model is either to achieve complete acceptance of the PCS system or active role of private corporations in implementing the PCS system through a top-down approach (Marek, 2017). According to (Klievink, 2015), in public-private collaboration PCS design, data are handed over to the PCS but are still owned by the individual actors submitting the data. This allows government to access the data and allows the PCS to optimize port operations by enabling companies operating in the port data sharing without losing control. Ports such as Port of Barcelona and Antwerp belong to this type of PCS model. PORTIC is the 48 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Port Community System operator in Barcelona and a private-public partnership between the Port Community of Barcelona, Port Authority of Barcelona, Financial Institutions (La Caixa, Banc Sabadell) and the Chamber of Commerce of Barcelona (IPCSA, 2021b). The Antwerp PCS is a cooperation between Antwerp Port Authority and Alfaport Antwerpen -Federation of Port Companies and Logistic Service Providers - private IT-sector ( Descartes – Porthus ) (Waterschoot, n.d.). (Mendes Constante, 2019), outlines the features of business models based on combinations of PCS ownership and operational models. In the scenario where both the PCS ownership and the operational model are private, active engagement by the public sector is required in order to successfully implement complete integration and interoperability between all stakeholders involved. In the scenario where the PCS ownership is public but the operating model is private, private company operates the PCS on a commercial basis whereas public bodies play a crucial role in ensuring that services are provided fairly and neutrally to all stakeholders involved (Mendes Constante, 2019). To summarize, the above points to the fact that when it comes to PCS business objectives, the main goal is to add value and improve the quality of port operations, logistics and the transport chain while at the same time reducing operating costs. It is also important to remember that during development it is extremely important to take care of the selection of PCS model because it will determine the specific financial model and goals that PCS as a project aspires to. 5 Discussion and conclusion Seaports, as complex systems, are of vital importance for global trade activities because the most important international transport corridors and cargo flows pass through them and dictate global trends of economic development. Daily port operations highly depend on information technologies and information systems. They have become irreplaceable elements in numerous seaports where they play an important role in port’s overall business success. Information and communication systems such as PCS have become the staple technical ingredients used in optimal flow of information and provision of quality and efficient transport service and flexible and efficient functioning of port system as an important link in the transport chain. M. Jović, S. Aksentijević, B. Plentaj & E. Tijan: Port Community System Business Models 49 Collaboration between stakeholders is a very important factor that enhances port system functioning. Utilizing coordination with other systems and technologies, they form an entity that significantly affects port system operations efficiency and coordination. Familiar expression stating that the chain is only as strong as its weakest link is certainly applicable to this concept too. If a port is recognizable on the global market, it attracts the largest ships and therefore the largest companies in international shipping industry. On the other hand, if the service it provides is not at an equally high level, or it is provided in a way that stakeholders offering port services are not interconnected and harmonized, the whole chain, including the port itself leave an impression of inconsistency. The ownership and control over the PCS system are often overlooked parameters during the PCS inception phase. A PCS is a constantly developing system that needs to reflect every change in the port’s environment, underlying technology, business processes, legal framework and all stakeholders. As it requires a significant coordination effort for proper functioning, it is very important to involve all stakeholders to provide a meaningful input to this process, reserve proper funding and ensure stakeholders’ collaboration in order to achieve the goal of PCS’s introduction. The limitation of this research is primarily the fact that only English resources were used. PCS systems are adopted world-wide, and it is possible that the research base would be wider if other languages were included too, but that would lead the research outside of the applicable scope and format. Furthermore, PCS implementation is a highly operative endeavour, and many lessons learned are not published in a form of a scientific research, and therefore they cannot be used. Primary research hypothesis was confirmed, as not many quality resources are dealing with the selection of PCS model being a crucial factor in its successful implementation. Most researches are focused to project implementation phases, project management and encompassing all processes as success factors, but take PCS business model as something that is predetermined and not questioned. Additional authors’ finding is that the selection of a proper PCS business model is a prerequisite for its successful implementation and operation, as only the appropriate PCS model can guarantee resource savings typically tied to PCS, as opposed to manual administrative processing or disjointed and heterogeneous port IT systems. 50 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE The implementation of a PCS helps improve the efficiency in communication among port community members, avoids duplicate data entry, optimizes flow and timely exchange of information, and increases protection from unauthorized access. It should enable electronic business operations which should result in a more efficient service, better mutual coordination, decrease in operative expenses and, finally, a more competitive port. Leading international seaports have recognized the importance and advantages of modern technologies in providing high quality services in ports. The research can have many potential new venues and possibilities. PCS systems in the future will have to be highly flexible and interconnected, especially with introduction and absorption of novel technologies like Internet of Things, entire information platforms being delivered using cloud approach, active and passive tags and globally recognized cargo ledgers with distributed and transparent proof of authenticity. Integration of all these technologies will be a challenge for all PCS operators and provide new possibilities for research as those models that are successful now might not be suitable. One realistic possibility of a future research in this area might be analysis of impact of new information technologies on selected PCS business models. Acknowledgements This work was supported by Electronic Transportation Management System e-TMS project (New products and services as a result of research, development and innovation - IRI, Operational Programme Competitiveness and Cohesion, 2018 –2020). References Aloini, D., Benevento, E., Stefanini, A., & Zerbino, P. (2020). Process fragmentation and port performance: Merging SNA and text mining. International Journal of Information Management, 51(C). Baalen, P. J. Van, Zuidwijk, R., & Nunen, J. van. (2009). Port Inter-Organizational Information Systems: Capabilities to Service Global Supply Chains. Foundations and Trends® in Technology, Information and Operations Management, 2(2–3), 81–241. Baron, M., & Mathieu, H. (2013). PCS interoperability in Europe: a market for PCS operators? The International Journal of Logistics Management, 24(1), 117–129. Bezić, H., Tijan, E., & Aksentijević, S. (2011). Port Community Systems - Economic Feasibility Evaluation. Ekonomski Vjesnik / Econviews – Review of Contemporary Entrepreneurship, Business, and Economic Issues, (2), 247–256. M. Jović, S. Aksentijević, B. Plentaj & E. Tijan: Port Community System Business Models 51 Caldeirinha, V., Felício, J. A., Salvador, A. S., Nabais, J., & Pinho, T. (2020). The impact of port community systems (PCS) characteristics on performance. Research in Transportation Economics, 80(C). Carlan, V., Sys, C., & Vanelslander, T. (2016). How port community systems can contribute to port competitiveness: Developing a cost-benefit framework. Research in Transportation Business & Management, 19, 51–64. Chandra, D. R., & Hillegersberg, J. van. (2017). Governance lifecycles of inter-organizational collaboration: A case study of the Port of Rotterdam. Procedia Computer Science, 121, 656– 663. Dakosy. (2021). Port Community System. Retrieved February 3, 2021, from https://www.dakosy.de/en/solutions/cargo-communications/port-community-system De Martino, M., Errichiello, L., Marasco, A., & Morvillo, A. (2013). Logistics innovation in Seaports: An inter-organizational perspective. Research in Transportation Business and Management, 8, 123–133. https://doi.org/10.1016/j.rtbm.2013.05.001 Hintjens, J., Hassel, E. van, Vanelslander, T., & Voorde, E. Van de. (2020). Port Cooperation and Bundling: A Way to Reduce the External Costs of Hinterland Transport. Sustainability, 12(23). European Port Community Systems Association (2011.) How to develop a Port Community System. .Retrieved from http:// https://unece.org/. IPCSA. (2020). Port Community Systems. Retrieved from https://ipcsa.international/pcs IPCSA. (2021a). DAKOSY, Hamburg, Germany. Retrieved February 3, 2021, from https://ipcsa.international/about/members/members-europe-and-north-america/dakosy/ IPCSA. (2021b). PORTIC, Barcelona, Spain. Irannezhad, E., Hickman, M., & Prato, C. G. (2017). Modeling the Efficiency of a Port Community System as an Agent-based Process. Procedia Computer Science, 109, 917–922. https://doi.org/10.1016/j.procs.2017.05.422 João, L. N., Batista, C., Ayala Botto, M., & Cordón Lagares, E. (2018). Computational Framework for Port Community Systems Towards Synchromodal Freight Networks. Estudios de Economia Aplicada, 36–3, 691–714. Johansson, B., & Muhic, M. (2017). Relativism in the Cloud: Cloud Sourcing in virtue of IS Development Outsourcing - A literature review. International Journal of Information Systems and Project Management, 5(4), 55–65. Jović, M., Tijan, E., Žgaljić, D., & Karanikić, P. (2020). SWOT analysis of selected digital technologies in transport economics. In 43rd International Convention on Information, Communication and Electronic Technology (pp. 1635–1640). Opatija, Croatia. Retrieved from https://www.researchgate.net/publication/344440791_SWOT_analysis_of_selected_digital_ technologies_in_transport_economics Keceli, Y. (2011). A proposed innovation strategy for Turkish port administration policy via information technology. Maritime Policy & Management: The Flagship Journal of International Shipping and Port Research, 38(2), 151–167. Klievink, B. (2015). Understanding Public-Private Collaboration Configurations for International Information Infrastructures. In 14th International Conference on Electronic Government (EGOV), (pp. 170–180). Thessaloniki, Greece. Marek, R. (2017). The Role and place of Customs in the port community system experiances from Poland. In The 17th International Scientific Conferences Business Logistics in Moderen Management (pp. 451–469). Mendes Constante, J. (2019). International case studies and good practices for implementing Port Community Systems. Retrieved January 15, 2021, from https://publications.iadb.org/publications/english/document/International_Case_Studies_a nd_Good_Practices_for_Implementing_Port_Community_Systems.pdf Moros-Daza, A., Amaya-Mier, R., Garcia-Llinas, G., & Voß, S. (2019). Port Community System Adoption: Game Theoretic Framework for an Emerging Economy Case Study. In Computational Logistics (pp. 136–153). 52 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Nota, G., Bisogno, M., & Saccomano, A (2018.) A service-oriented approach to modeling and performance analysis of Port Community Systems. In International Journal of Engineering Business Management (pp. 1-17). Port Authority of Valencia. (2021). Retrieved January 29, 2021, from https://www.valenciaportpcs.com/en/community/port-authority/ Rodon, J., & Ramis-Pujol, J. (2006). Exploring the intricacies of integrating with a Port Community System. In 19th Bled eConferences eValues (pp. 1–15). Simoni, M., Schiavone, F., Risitano, M., Leone, D., & Chen, J. (2020). Group-specific business process improvements via a port community system: the case of Rotterdam. Retrieved January 26, 2021, from https://www.tandfonline.com/doi/abs/10.1080/09537287.2020.1824029?journalCode=tppc 20 Tijan, E., Agatić, A., & Hlača, B. (2012). The Necessity of Port Community System Implementation in the Croatian Seaports. PROMET - Traffic&Transportation, 24(4), 305–315. https://doi.org/10.7307/ptt.v24i4.444 Tijan, E., Agatić, A., Jović, M., & Aksentijević, S. (2019). Maritime National Single Window — A Prerequisite for Sustainable Seaport Business. MDPI Sustainability, 11(17), 1–21. Tijan, E., Aksentijević, S., & Čišić, D. (2014). Seaport cluster information systems - a foundation for Port Community Systems’ architecture. In Digital Economy - MIPRO 2014 37th International Convention Proceedings (pp. 1774–1779). Tijan, E., Jović, M., & Karanikić, P. (2019). Economic and ecological aspects of electronic Transportation Management Systems in seaports. Retrieved December 31, 2019, from https://www.bib.irb.hr/1003853 Tijan, E., Kos, S., & Ogrizović, D. (2009). Disaster recovery and business continuity in port community systems. Scientific Journal of Maritime Research, 23(1), 243–260. Treppte, S. (2011). The Role and Scope of Port Community Systems in Providing Data that Enhances Supply Chain Risk Management - A Case Study for Freight Forwarders in the Port of Rotterdam. Retrieved November 14, 2019, from https://www.erim.eur.nl/fileadmin/default/content/erim/research/centres/smart_port/ad min/c_news/110911_st_master thesis_pcss and risk management.pdf Tsamboulas, D., Moraiti, P., & Lekka, A. M. (2012). Performance Evaluation for Implementation of Port Community System. Transportation Research Record: Journal of the Transportation Research Board, (2273), 29–37. Waterschoot, K. (n.d.). Antwerp Port System. Zerbino, P., Aloini, D., Dulmin, R., & Mininno, V. (2019). Towards Analytics-Enabled Effciency Improvements in Maritime Transportation: A Case Study in a Mediterranean Port. Sustainability, 11(16). CLINICAL TELE-ASSESSMENT: THE MISSING PIECE IN HEALTH CARE PATHWAYS FOR ORTHOPAEDICS OREN TIROSH,2 MUHAMMAD NADEEM SHUAKAT,1 JOHN ZELCER2 & NILMINI WICKRAMASINGHE1,2 Epworth Healthcare, Australia; e-mail: drnadeem.work@gmail.com, nilmini.work@gmail.com 2 Swinburne University Of Technology, Australia; e-mail: otirosh@swin.edu.au, john.zelcer@gmail.com 1 Abstract An aging population coupled with longer life expectancy has resulted in an exponential growth in total hip and total knee replacements (THR) (TKR). Especially during the 2020 COVID-19 pandemic, support for patients recovering form THR and TKR was difficult due to reduction in face-toface visits. To address this and enable Australians to have a better patient experience, the following proffers a tele-assessment solution, ARIADNE (Assist foR hIp AnD kNEe), that can provide high quality care, with access for all and support for high value outcomes. DOI https://doi.org/10.18690/978-961-286-485-9.4 ISBN 978-961-286-485-9 Keywords: total hip replacement (THR), total knee replacement (TKR), telehealth, remote monitoring, tele-assessment, tele-rehabilitation, value-based care, healthcare valu proposition 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 54 1 Introduction In Australia, the exponential growth of joint replacements, in particular total hip (THR) and total knee replacements (TKR), is projected to reach an unsustainable burden by 2030 (Ackerman et al., 2019), which has many severe and far-reaching implications for healthcare delivery and for the demand on public and private hospitals. Given several key contributing factors, most notably an aging population and longer life expectancy (Nutt & Solan, 2017), the most prudent way to address this is to leverage technology solutions that can support cost-effective, efficient and effective care delivery post-surgery. We proffer tele-assessment, a noted void in current telemedicine solutions for orthopaedic care, as such a solution. A key bottleneck in the recovery from THR and TKR is the return to appropriate postural and functional control (Russell, Buttrum, Wootton, & Jull, 2011). The current standard clinical pathway involves 12 to 60 face to face visits over a period of three months (The Brigham and Women's Hospital, 2010). This is not only costly and difficult to manage, especially for isolated and disadvantaged populations (The Brigham and Women's Hospital, 2010), but if not done successfully leads to poor clinical outcomes and low patient satisfaction (Jansson, Harjumaa, Puhto, & Pikkarainen, 2020). Moreover, clinical best practice notes that this 3-month window post-surgery is imperative for optimal recovery and best results (Aasvang, Luna, & Kehlet, 2015). To address this critical aspect on the THR and TKR patient journey, and support quality clinical outcomes and patient satisfaction as well as ease the burden for our healthcare system, we design, develop and test ARIADNE (Assist foR hIp AnD kNEe), a pervasive tele-assessment solution that can support clinical tele-assessment to assess postural and functional control to support post-surgery THR and TKR recovery. ARIADNE will enable objective, remote examination and monitoring of patient functional performance during their typically long rehabilitation journey, something that to date is missing from current telemedicine solutions especially in orthopaedic care. By implementing such a pervasive teleassessment solution within traditional practice, we have the potential to: a) improve existing practice patterns, b) shorten the recovery trajectory, c) increase the likelihood for optimal clinical outcomes, and d) support a superior patient experience. O. Tirosh, M. Nadeem Shuakat, J. Zelcer & N. Wickramasinghe: Clinical Tele-Assessment: The Missing Piece in Health Care Pathways for Orthopaedics 55 Background Total hip or knee replacement is a common surgical intervention for treating advanced hip/knee Osteoarthritis (OA). As a strategy to address the burden of disease of OA in Victoria and optimally align health services to consumers’ needs and evidence, the Department of Health and Human Services (Victoria) commissioned the development of a Model of Care (MoC) for Osteoarthritis of the Hip and Knee. A MoC is an evidence and consultation-informed framework that describes what and how health services and other resources should be delivered locally to people who live with specific health conditions. In 2018 (Victorian Musculoskeletal Clinical Leadership Group, 2018), the MoC recommended the “Innovation in service delivery model”. The model was designed to establish: 1) telehealth services to improve consumers’ access to specialist clinics for the purposes of clinical assessment, management planning and treatment, and 2) web-based and smartphone app tools that deliver accurate health information and support behaviour change to consumers and care providers. The development of ARIADNE is designed to addresses the above acknowledgement of the importance of a telemedicine platform to improve health care services for rehabilitation following THR and TKR. (Department of Health, 2010; Victorian Musculoskeletal Clinical Leadership Group, 2018). Tele-rehabilitation via online video communication is an emerging area attracting increased attention as a potential alternative to conventional, face to face rehabilitation, suggested to be an option for people located remotely to reduce the need for frequent travel (Russell et al., 2011). A recent systematic review concluded that tele-rehabilitation can lead to better healthcare at lower costs (Klaassen, van Beijnum, & Hermens, 2016). An example is the tele-rehabilitation system eHAB (NeoRehab, Brisbane, Australia) that enables real-time video conferencing to the patient’s home and includes features such as recording instruction and exercises (Richardson, Truter, Blumke, & Russell, 2017). Similarly, MyRehab offers a telerehabilitation communication system via text or voice messages and videoconference, evaluated in a RCT with THR and TKR patients (Eichler et al., 2017). Indeed, tele-rehabilitation partially addresses some of the requirements of the MoC. However, a critical missing element in current solutions is tele-assessment which supports an objective remote postural and functional assessment integrated with 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 56 web-based management and planning capabilities. ARIADNE addresses this key void by being able to transform standard care with a face to face assessment, mostly available only in major cities with experts, to provide remote assessment access and quality of care to a wider and remote community. Thus, ARIADNE, will significantly enhance Australian health care services, ensuring objective postural and functional examination can be performed. It will provide the foundation for future telemedicine platforms for clinical trials and treatment monitoring. To further improve upon the Australian telehealth system the following objectives need to be addressed: 1. An examination into the measurement consistency and agreement of a newly established tele-assessment system with respect to a face to face clinical based reference condition. 2. A determination of the feasibility and the extent to which the teleassessment can be used by clinicians and patients to achieve effectiveness (accuracy and completeness), efficiency (resources needed for effectiveness) and satisfaction (comfort and acceptability). 3. An assessment of the cost-effectiveness associated with tele-assessment including those related to healthcare, purchase of equipment, mobile phone data usage, and costs associated with establishing and delivering the service, and analysing the results. Overview of ARIADNE In orthopaedics, performance measures following THR and TKR are required to identify patient functional competency and physical progress. In existing clinical practice, these postural and functional measures include: 1) range of motion, 2) postural balance, 3) chair rise, 4) 40 meter fast paced walk, and 5) timed up and go (TUG) (Victorian Musculoskeletal Clinical Leadership Group, 2018), and are executed face to face while the clinician manually records the duration and number of repetitions to complete the task. A more robust objective, but to date only used in research and not in clinical settings due to availability and accessibility, is quantifying performance using Inertial Measuring Units (IMU) motion sensors comprising accelerometers and gyroscopes (Galan-Mercant, Baron-Lopez, LabajosManzanares, & Cuesta-Vargas, 2014; Pham et al., 2018; Witchel et al., 2018) to O. Tirosh, M. Nadeem Shuakat, J. Zelcer & N. Wickramasinghe: Clinical Tele-Assessment: The Missing Piece in Health Care Pathways for Orthopaedics 57 measure linear acceleration and angular velocity, respectively. Once the raw data is captured, the level of performance is quantified by a further well-defined signal processing methods (Adusumilli et al., 2017; Galan-Mercant et al., 2014; Pham et al., 2018; Steinberg, Adams, Waddington, Karin, & Tirosh, 2017; Steinberg, Tirosh, Adams, Karin, & Waddington, 2017). ARIADNE has been developed and designed to support the above requirements and is built from previous work by one of the authors around web based repository applications Gaitabase and PROMsBase (Tirosh, Baker, & McGinley, 2010; Tirosh, Tran, et al., 2019), and leverages his research on the use of IMU motion sensor signals to capture, process, and interpret postural and functional performance (Kuo, Culhane, Thomason, Tirosh, & Baker, 2009; Steinberg, Adams, et al., 2017; Steinberg, Tirosh, et al., 2017; Tirosh, Orland, Eliakim, Nemet, & Steinberg, 2017, 2019, 2020). Gaitabase has been used by world leading gait laboratories for clinical gait analysis, having 22 different centres in 8 different countries on four different continents. PROMsBase is routinely used at Western Health in Victoria to collect patients’ satisfaction and wellbeing data pre and post joint replacement procedures with over 8,000 questionnaires from over 10,000 surgery procedures now collected. In order to be clinically useful as a tele-assessment platform, we extended the technology with unique integration methods of the web based repository system coupled with the motion sensor IMU data captured from a mobile phone. During assessment, the clinician remotely connects to the motion capture app installed on the patient’s mobile phone that is strapped above the ankle (to measure joint angle) or at the lower back (to measure postural control) using an ankle or waist strap, respectively. Once connected, the clinician remotely operates the app while the patient performs the specific functional task as instructed by the clinician. Once the task is completed the clinician remotely saves the mobile sensors data that is automatically uploaded to the web-based application for further processing and analysis. Both the clinician and the patient can login to the web application and generate performance and progress reports. Figure 1 shows an example of the motion sensors data analysis during the clinical tasks. 58 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Figure 1. Example of motion sensor data during Tele-assessment of (A) postural balance, (B) sit stand, and (C) TUG tests. Methodology To test the proposed tele-assessment solution this section outlines the research plan. Tele-assessment is the missing piece in telemedicine care for orthopaedic rehabilitation. Unique aspects of ARIADNE include that it: a) can provide remote, quantified, and postural and function control, and b) provide early detection of deviation, problems and potential complications. Our pilot study will serve to incorporate key co-design principles to ensure clinician and patient input in the design and development of ARIADNE, and then test the definitive solution in terms of: (a) desirability (patients and clinicians), and clinician and patient usability and acceptance, (b) reliability (ability to deliver consistently on key clinical outcomes) and “fit for purpose”, and (c) cost-effectiveness. The tele-assessment platform ARIADNE is very simple to use as it integrates a webbased database and interface platform and motion sensor data that is captured remotely from the patient’s mobile phone while the patient performs their essential postural and functional measures, including (Victorian Musculoskeletal Clinical Leadership Group, 2018): 1) range of motion, 2) postural balance, 3) chair rise, 4) 40 meter fast paced walk, and 5) timed up and go (TUG). The motion sensor data is processed to objectively quantify the patient's performance level. Overview of design To ensure a robust solution it is essential to conduct a feasibility pilot study to measure the desirability, usability, reliability, Minimal Detectable Change (MDC), fit for purpose, and cost-effectiveness, and better access, quality and value of the teleassessment platform for THR and TKR patients. The tele-assessment will be utilised during the conventional THR and TKR standard care pathway. O. Tirosh, M. Nadeem Shuakat, J. Zelcer & N. Wickramasinghe: Clinical Tele-Assessment: The Missing Piece in Health Care Pathways for Orthopaedics 59 Protocol We have secured HREC (Human Research Ethics Committee) approval and now planning for final ARIADNE co-design session with 2 clinicians and 4 patients (2 TKR and 2 THR). Prior to tele-assessment at T0, clinicians and patients will participate in an educational focus group session. In this session participants will be educated on the use of ARIADNE with preparation for their joint replacement journey. Tele-assessments will be performed on 10 occasions including; base-line pre surgery1 (T1), pre surgery-2 (T2), and at 1 (T3), 2 (T4), 3 (T5), 4 (T6), 5 (T7), 6 (T8), 9 (T9), and 12 (T10) weeks post-surgery. The duration of each tele-assessment session is 20 minutes. In each session, the patient will start the app that automatically connects to the clinician web portal. The patient will then insert the mobile phone in the waist pouch and attach it around their waist. The clinician will instruct the patient to perform the tasks (balance, TUG, chair rise, range of motion) while the mobile app captures the motion data and automatically uploads it to the web portal for storage and further analysis. At T2 and T10 patient questionnaires will be administered to assess usability of ARIADNE. In addition, at T10 a clinician focus group will be conducted. Outcome and data analysis: At the completion of the study the following aims will be achieved: Primary Aim (a): assess desirability and usability of ARIADNE: The Unified Theory of Acceptance and Use of Technology (UTAUT) will be used as the theoretical framework underpinning the research, to understand and empirically test the factors that influence the end-users’ acceptance and adoption of the tele-assessment services in THR and TKR patients. The UTAUT includes four determinants; performance expectancy (PE), effort expectancy (EE), social influence (SI), and facilitating conditions (FCs), which can explain 70% of the variance of behavioural intentions (Hoque & Sorwar, 2017), while other models explained approximately 40% of technology acceptance (Lim, 2003). It has been widely adopted in different areas including mobile health such as to investigate the intention to use Physical Activity Apps (Liu et al., 2019), but to our knowledge there 60 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE is no published study applying UTAUT to the investigation of tele-assessment use intention in joint replacement patients. To specify, PE refers to the services of the clinician in the clinician–patient interaction in tele-assessment. EE refers to patients’ perceived ease of interacting with physicians in tele-assessment. SI refers to the impact of other people’s feelings, views, and behaviours on the behavioural intention of patients interacting with clinicians in telehealth. FC refers to users’ perceptions of their ability to perform the behaviour and measure the degree to which the teleassessment fits with their existing values, previous experiences and current needs. Each determinant includes related questions with a 5-point Likert-type response format that ranges from “strongly disagree” (1) to “strongly agree” (5) to measure each construct covering the variables in the research model. The UTAUT will be completed at T1, T8 and T10. Separate analyses will be conducted for older and younger groups of participants in order to test usability and efficacy across all age levels. Primary Aim (b): assess reliability using MDC: The outcome measure for each postural and functional task is calculated by processing the motion sensor signal from the mobile device. The outcome measures are the hip and knee joint maximum range of motion, the magnitude of body sway for the postural balance test, the time taken to complete five repetitions of the sitto-stand manoeuvre test, and time taken to complete the TUG and 40 meter fast paced walk tests. Reliability and MDC will be analysed from the tele-assessment outcome measures (described above) when comparing outcomes between the pre surgery-1 and the pre surgery-2 sessions. The reliability will be estimated using repeated-measures analysis of variance and the intra-class correlation coefficient. Standard error of measure (SEM) and Minimal Detectable Change (MDC) will be calculated utilising the same methodology as our previous study using IMU measurements in gait (Tirosh, Orland, et al., 2019). SEM will be calculated as SD x √1 – ICC, where SD is the standard deviation of all scores from the participants. SEM is also presented as a SEM% by dividing the SEM with the average of the test and retest values. The MDC will be calculated as SEM x 1.96 x √2 to construct 95% CI. Multi-level analysis will be used to test for significant differences across younger and older age groups separately for THR and TKR patients. This is an intention-to-treat method which O. Tirosh, M. Nadeem Shuakat, J. Zelcer & N. Wickramasinghe: Clinical Tele-Assessment: The Missing Piece in Health Care Pathways for Orthopaedics 61 allows for irregular assessment measures, allowing for the control of other variables as needed. Primary Aim (c): evaluate if ARIADNE is fit for purpose: Empirical evidence shows that users will not simply accept and use the technology if it does not fit their needs and improve their performance (Gebauer & Ginsburg, 2009; Junglas & Watson, 2008). Hence, to assess the fit for purpose of ARIADNE, we apply task-technology fit, the degree to which a technology assists an individual in performing his or her task. To measure the level of “fit for purpose” of ARIADNE, during the focus group session conducted at T10, we will ask clinicians to compare their experience with ARIADNE to that without tele-assessment; i.e. as per their normal delivery of care. This will enable us to understand key task characteristics, how the technology supported those tasks, and whether clinician users perceived ARIADNE to perform better, as good as, or worse than face to face assessments. Identified Risks Risk #1 – Poor desirability and reliability of the tele-assessment platform: The tele-assessment platform is built for the purpose of assessing joint replacement intervention postural and functional control outcomes. Thus, it is important for the platform to be desirable and reliable. This risk is mitigated from findings of previous studies on the desirability and reliability of using IMU in measuring postural and functional performance of the proposed tasks in a range of population types including: healthy older adults (Chan, Keung, Lui, & Cheung, 2016; Keogh et al., 2019), Parkinson's disease (Pham et al., 2018), multiple sclerosis (Witchel et al., 2018), and TKR (Huang, Liu, Hsu, Lai, & Lee, 2020), with very good to excellent desirability and reliability. These studies and a systematic review (Keogh et al., 2019) used mobile phone motion sensors, suggesting that mobile phones are non-inferior compared to the other postural and functional measurement techniques. Furthermore, our unpublished preliminary experiment validating our teleassessment knee range with the gold standard video analysis showed excellent correlation (r = 0.98) and very good agreement with clinically acceptable bias of 5.4 degrees with 17.3 and -6.4 degrees for upper and lower 95% confidence bounds respectively. 62 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Risk #2 – Security of the data: to increase data security the data will be stored on Nectar cloud and will be backed up daily. Nectar is an online infrastructure for researchers to store, access, and analyse data remotely, and is managed and funded by the Australian Government through the National Collaborative Research Infrastructure Strategy. Risk #3 – Participants can feel directionless and overwhelmed with the technology: to reduce participant anxiety with the digital technology, the patient advocate team member will provide coaching and mentoring support to participants, enabling them to optimise self-management. Risk #4 – Falls, limited space, and poor environmental set up at home or difficulties to attach the phone to the ankle and/or waist: patients’ home visits will occur to inspect and set up the testing environment, and reduce potential hazards. Risk #5 - Poor Internet connection: the necessary internet connection will utilise the mobile device internet access provider. Data collection is performed using the app installed on the patient’s mobile device, thus a poor network will not disrupt data capture and quality. Results to Date: The assessment of the fidelity, efficacy and fit for purpose of the developed ARIADNE solution requires many stages and is thus a longitudinal study. On the receipt of ethics approval, initial phases of the design science research methodology have been conducted with a small group of patients and clinicians respectively to fine tune the solution. This is an important key step to ensure high clinician and patient use as well as ensure the developed solution will support the required needs for rehab of THR and TKR patients. The ARIADNE solution now has patient and clinician approval and based on a small pilot study demonstrated ease of use and fit for purpose. While not statistically significant, this directional data provides support to progress to the next phase with confidence. The next key step is to conduct a large scale clinical trial to capture key data around the impact of the solution to support THR and TKR patients in their rehabilitation. Once the clinical trial is O. Tirosh, M. Nadeem Shuakat, J. Zelcer & N. Wickramasinghe: Clinical Tele-Assessment: The Missing Piece in Health Care Pathways for Orthopaedics 63 concluded it will then be possible to address issues around deployment of the solution into appropriate clinical contexts. Discussion: ARIADNE is designed to remotely capture, analyse, and interpret body motion using the accelerometer and gyroscope motion sensors embedded in today’s mobile phones. The mobile phones we have today have 3-axial accelerometer and gyroscope components. The accelerometer allows the measurement of linear acceleration in three orthogonal directions (x, y, and z) and the gyroscope allows the measurement of angular velocity in the x, y, and z axes. The linear acceleration and angular velocity signals can be processed and used to analyse body motion and further provide interpretation of the movement quantity and quality, such as level of stability during quiet standing. The ability to remotely connect to a patient's mobile phone and capture accelerometer and gyroscope data creates new opportunities for clinicians, sport trainers, and engineers to remotely quantify and analyse the performance level of any posture and/or movement task. Conclusions: Our designed solution, ARIADNE, represents a novel and unique approach to telehealth rehabilitation in orthopaedic care for THR and TKR patients. To date, current telehealth solutions in this space do not address tele-assessment, which means that there is a significant limitation in the current post-operative critical 12week period for THR and TKR patients. Hence, ARIADNE not only addresses this key void, but it serves to also potentially help to address a major conundrum facing healthcare delivery around THR and TKR. If the results of the clinical trial provide a positive endorsement for ARIADNE, then we would have successfully developed a unique, COVID-19 safe, tele-assessment solution that addresses a key gap in post-surgical recovery for THR and TKR patients. Aknowledgements This study was funded by EMF (Epworth Medical Foundation) Capacity Building Research Grant and Defence Health Foundation Medical Research Grant. 64 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE References Aasvang, E. K., Luna, I. E., & Kehlet, H. (2015). Challenges in postdischarge function and recovery: the case of fast-track hip and knee arthroplasty. Br J Anaesth, 115(6), 861-866. doi: 10.1093/bja/aev257 Ackerman, I. N., Bohensky, M. A., Zomer, E., Tacey, M., Gorelik, A., Brand, C. A., & de Steiger, R. (2019). The projected burden of primary total knee and hip replacement for osteoarthritis in Australia to the year 2030. BMC Musculoskelet Disord, 20(1), 90. doi: 10.1186/s12891-0192411-9 Adusumilli, G., Joseph, S. E., Samaan, M. A., Schultz, B., Popovic, T., Souza, R. B., & Majumdar, S. (2017). iPhone Sensors in Tracking Outcome Variables of the 30-Second Chair Stand Test and Stair Climb Test to Evaluate Disability: Cross-Sectional Pilot Study. JMIR Mhealth Uhealth, 5(10), e166. doi: 10.2196/mhealth.8656 Chan, M. H. M., Keung, D. T. F., Lui, S. Y. T., & Cheung, R. T. H. (2016). A validation study of a smartphone application for functional mobility assessment of the elderly. Hong Kong Physiother J, 35, 1-4. doi: 10.1016/j.hkpj.2015.11.001 Department of Health, W. A. (2010). Elective Joint Replacement Service Model of Care. Western Australia. Eichler, S., Rabe, S., Salzwedel, A., Muller, S., Stoll, J., Tilgner, N., . . . ReMove-It study, g. (2017). Effectiveness of an interactive telerehabilitation system with home-based exercise training in patients after total hip or knee replacement: study protocol for a multicenter, superiority, noblinded randomized controlled trial. Trials, 18(1), 438. doi: 10.1186/s13063-017-2173-3 Galan-Mercant, A., Baron-Lopez, F. J., Labajos-Manzanares, M. T., & Cuesta-Vargas, A. I. (2014). Reliability and criterion-related validity with a smartphone used in timed-up-and-go test. Biomed Eng Online, 13, 156. doi: 10.1186/1475-925X-13-156 Gebauer, J., & Ginsburg, M. (2009). Exploring the black box of task-technology fit. Communications of the ACM, 52(1), 130-135. Hoque, R., & Sorwar, G. (2017). Understanding factors influencing the adoption of mHealth by the elderly: An extension of the UTAUT model. Int J Med Inform, 101, 75-84. doi: 10.1016/j.ijmedinf.2017.02.002 Huang, Y. P., Liu, Y. Y., Hsu, W. H., Lai, L. J., & Lee, M. S. (2020). Progress on Range of Motion After Total Knee Replacement by Sensor-Based System. Sensors (Basel), 20(6). doi: 10.3390/s20061703 Jansson, M. M., Harjumaa, M., Puhto, A. P., & Pikkarainen, M. (2020). Patients' satisfaction and experiences during elective primary fast-track total hip and knee arthroplasty journey: A qualitative study. J Clin Nurs, 29(3-4), 567-582. doi: 10.1111/jocn.15121 Junglas, I., & Watson, R. (2008). Location-based services. Communications of the ACM, 51(3), 65-69. Keogh, J. W. L., Cox, A., Anderson, S., Liew, B., Olsen, A., Schram, B., & Furness, J. (2019). Reliability and validity of clinically accessible smartphone applications to measure joint range of motion: A systematic review. PLoS One, 14(5), e0215806. doi: 10.1371/journal.pone.0215806 Klaassen, B., van Beijnum, B. J., & Hermens, H. J. (2016). Usability in telemedicine systems-A literature survey. Int J Med Inform, 93, 57-69. doi: 10.1016/j.ijmedinf.2016.06.004 Kuo, Y. L., Culhane, K. M., Thomason, P., Tirosh, O., & Baker, R. (2009). Measuring distance walked and step count in children with cerebral palsy: an evaluation of two portable activity monitors. Gait Posture, 29(2), 304-310. doi: 10.1016/j.gaitpost.2008.09.014 Lim, N. (2003). Consumers’ perceived risk: sources versus consequences. Electronic Commerce Research and Applications, 2(3), 216-228. Liu, D., Maimaitijiang, R., Gu, J., Zhong, S., Zhou, M., Wu, Z., . . . Hao, Y. (2019). Using the Unified Theory of Acceptance and Use of Technology (UTAUT) to Investigate the Intention to Use Physical Activity Apps: Cross-Sectional Survey. JMIR Mhealth Uhealth, 7(9), e13127. doi: 10.2196/13127 Nutt, J. G., & Solan, M. C. (2017). Ageing and orthopaedics. Orthopaedics and Trauma, 31(5), 321325. O. Tirosh, M. Nadeem Shuakat, J. Zelcer & N. Wickramasinghe: Clinical Tele-Assessment: The Missing Piece in Health Care Pathways for Orthopaedics 65 Pham, M. H., Warmerdam, E., Elshehabi, M., Schlenstedt, C., Bergeest, L. M., Heller, M., . . . Maetzler, W. (2018). Validation of a Lower Back "Wearable"-Based Sit-to-Stand and Stand-to-Sit Algorithm for Patients With Parkinson's Disease and Older Adults in a Home-Like Environment. Front Neurol, 9, 652. doi: 10.3389/fneur.2018.00652 Richardson, B. R., Truter, P., Blumke, R., & Russell, T. G. (2017). Physiotherapy assessment and diagnosis of musculoskeletal disorders of the knee via telerehabilitation. J Telemed Telecare, 23(1), 88-95. doi: 10.1177/1357633X15627237 Russell, T. G., Buttrum, P., Wootton, R., & Jull, G. A. (2011). Internet-based outpatient telerehabilitation for patients following total knee arthroplasty: a randomized controlled trial. J Bone Joint Surg Am, 93(2), 113-120. doi: 10.2106/JBJS.I.01375 Steinberg, N., Adams, R., Waddington, G., Karin, J., & Tirosh, O. (2017). Is There a Correlation Between Static and Dynamic Postural Balance Among Young Male and Female Dancers? J Mot Behav, 49(2), 163-171. doi: 10.1080/00222895.2016.1161595 Steinberg, N., Tirosh, O., Adams, R., Karin, J., & Waddington, G. (2017). Influence of Textured Insoles on Dynamic Postural Balance of Young Dancers. Med Probl Perform Art, 32(2), 63-70. doi: 10.21091/mppa.2017.2012 The Brigham and Women's Hospital, I., Department of Rehabilitation Services. (2010). Standard of Care: Total Hip Replacement. Tirosh, O., Baker, R., & McGinley, J. (2010). GaitaBase: Web-based repository system for gait analysis. Comput Biol Med, 40(2), 201-207. doi: 10.1016/j.compbiomed.2009.11.016 Tirosh, O., Orland, G., Eliakim, A., Nemet, D., & Steinberg, N. (2017). Tibial impact accelerations in gait of primary school children: The effect of age and speed. Gait Posture, 57, 265-269. doi: 10.1016/j.gaitpost.2017.06.270 Tirosh, O., Orland, G., Eliakim, A., Nemet, D., & Steinberg, N. (2019). Repeatability of tibial acceleration measurements made on children during walking and running. J Sci Med Sport, 22(1), 91-95. doi: 10.1016/j.jsams.2018.04.006 Tirosh, O., Orland, G., Eliakim, A., Nemet, D., & Steinberg, N. (2020). Attenuation of Lower Body Acceleration in Overweight and Healthy-Weight Children During Running. J Appl Biomech, 1-6. doi: 10.1123/jab.2019-0138 Tirosh, O., Tran, P., Renouf, J., Pergaminelis, N., Purdie, C. N., Ho, A., & Gibbens, A. (2019). PROMsBase: Web-based repository portal for patient-reported outcome measures in orthopaedics. Health Informatics J, 25(3), 867-877. doi: 10.1177/1460458217725904 Victorian Musculoskeletal Clinical Leadership Group. (2018). Victorian Model of Care for Osteoarthritis of the Hip and Knee. Melbourne: MOVE muscle, bone & joint health. Witchel, H. J., Oberndorfer, C., Needham, R., Healy, A., Westling, C. E. I., Guppy, J. H., . . . Klucken, J. (2018). Thigh-Derived Inertial Sensor Metrics to Assess the Sit-to-Stand and Stand-to-Sit Transitions in the Timed Up and Go (TUG) Task for Quantifying Mobility Impairment in Multiple Sclerosis. Front Neurol, 9, 684. doi: 10.3389/fneur.2018.00684 66 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE MAKE US SMILE! AI AND THE VIOLATION OF HUMAN INTENTIONS CHRISTOF WOLF-BRENNER Know-Center GmbH, Graz, Austria; e-mail: christof.brenner@gmx.at Abstract In his book Superintelligence, Nick Bostrom points to several ways the development of Artificial Intelligence (AI) might fail, turn out to be malignant or even induce an existential catastrophe. He describes ‘Perverse Instantiations’ (PI) as cases, in which AI figures out how to satisfy some goal through unintended ways. For instance, AI could attempt to paralyze human facial muscles into constant smiles to achieve the goal of making humans smile. According to Bostrom, cases like this ought to be avoided since they include a violation of human designer’s intentions. However, AI finding solutions that its designers have not yet thought of and therefore could also not have intended is arguably one of the main reasons why we are so eager to use it on a variety of problems. In this paper, I aim to show that the concept of PI is quite vague, mostly due to ambiguities surrounding the term ‘intention’. Ultimately, this text aims to serve as a starting point for a further discussion of the research topic, the development of a research agenda and future improvement of the terminology. DOI https://doi.org/10.18690/978-961-286-485-9.5 ISBN 978-961-286-485-9 Keywords: artificial intelligence, digital ethics, reinforcement learning, control problem, perverse instantiations 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 68 1 Introduction Recently, the importance of being in control of what Artificial Intelligence (AI) does has moved to the center of attention. There appears to be a broad consensus that AI should not do what we homo sapiens do not want it to do. The concept of Perverse Instantiations (PI) consequently describes cases where AI succeeds to achieve goals but does so in violation with our intentions. For instance, best-selling author and philosopher Nick Bostrom brought forward the thought experiment of AI choosing to paralyze human facial muscles into constant smiles to achieve the goal of making humans smile. Of course, similar more or less realistic cases can be constructed for various domains. AI might for instance attempt to achieve the goal of reducing maternal mortality by sterilizing all male homo sapiens, or to improve schoolchildren’s grades by providing them with the answers to the next test beforehand. While ultimately, the goal is achieved in each scenario, the way it was achieved was not intended. According to Bostrom, PI ought to be avoided because of the violation of human designer’s intentions. In this paper, I aim to show that the current concept of PI is quite vague, mostly due to inaccuracies surrounding the term ‘intention’. The prevailing terminology, if we took it seriously, would force us to label most ways of achieving goals that were uncovered by AI as unintended and consequently, as PI. Ultimately, this text serves as a starting point for a further discussion of the research topic and aims to provide reasoning why we should look deeper into the matter at hand. 2 The Meaning of ‘Intention’ At first glance, Bostrom’s definition of PI as AI “discovering some way of satisfying the criteria of its final goal that violates the intentions of the programmers who defined the goal”1 sounds reasonable. In essence, he claims that AI going against the intentions of its designers might lead to undesirable outcomes. But what is the real meaning of ‘intention’ that he has in mind when framing his notion of PI? Revisiting the thought experiment of producing smiles, Bostrom explicates that violating intentions is to be understood as “not to do what the programmers meant when 1 Bostrom 2017, p. 146 C. Wolf-Brenner: Make Us Smile! AI and the Violation of Human Intentions 69 they wrote the code that represents this goal”2. But what did they mean when they tasked AI with coming up with ways to make humans smile? To answer that, we will take a short detour into the realm of Reinforcement Learning (RL) as a state-of-theart example and the technologically simplest instance of AI that Bostrom himself uses when describing PI. RL is a subfield of AI and Machine Learning that is focusing on automatically learning optimal decisions over time. For simplicity’s sake, imagine a mouse-in-alabyrinth kind of experiment. Within the maze, the designer randomly places nondeadly traps and delicious food. A mouse, conceptually referred to as an RL agent3, is placed in the maze and can perceive its environment through its senses. Of course, its objective is to try and obtain as much food as possible without getting hurt by the traps.4 To achieve its goal, the digital rodent can mix and match actions from a finite list of actions called the action space, i.e., turn around, move, wait, gnaw, jump etc. RL can then be understood as repeatedly putting the same mouse into very many mazes to finally make it learn to automatically choose the optimal combination of actions from its action space to maximize the aggregate reward, i.e., eat the maximum amount of food while stepping into the fewest traps.5 3 Perverse Instantiations Emerging from Underspecified Goals If we were to transfer the concept of RL to Bostrom’s example of tasking AI to make us smile, we encounter a few challenges. Initially, we would need to adequately represent the goal in a way so that we can give our agent feedback on how well it has done, which includes translating ‘make us smile’ into a form that the AI can understand. First, it is up for interpretation what counts as a smile. Second, it is unclear whether the AI is meant to achieve the maximum number, duration, intensity etc. of smiles. Third, the term ‘us’ is ambiguous and contextual, potentially leaving us with an AI that might produce a lot of smiling corpses. Bostrom 2017, p. 147 I use the term ‘agent‘ here in the sense in which it is used in the domain of Reinforcement Learning. 4 See Lapan 2020, pp. 1–5 5 Ibid. 2 3 70 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Making humans smile by paralyzing facial muscles might not be intended, but if what is intended is not made explicit in the goals, a RL agent will not be able to take it into account, as it is only interested in maximizing goal achievement, thus reward gain. As shown with Bostrom’s own example, it is in fact not the case that AI discovered a loophole to perversely instantiate the sought-after goals. The problem appears to be the programmers’ vague formulation of goals. Yet, if there is so much room for interpretation, how can we then speak of a violation of intentions? If I kindly ask you to prepare a sandwich for me, and you go ahead and fix up a ham and cheese sandwich, can we really speak of you violating my intentions because unbeknownst to you, I am a vegetarian? It is my firm believe that we should not put the blame on the sandwich-maker if he only knew half of what was truly expected of him. 4 Perverse Instantiations Emerging from the Way Goals Are Achieved Let us, however, assume, that there are cases in which the goals are in fact stated in a way such that the intentions of the programmers are absolutely and unmistakably clear. Could there still be PI? Bostrom’s examples strongly imply that even clear-cut goals can be perversely instantiated by employing unintended ways to reach them. Reconsidering our mouse-in-a-labyrinth scenario, the finite list of actions that the mouse can take to interact with the maze is called the action space. It can be understood as a kind of toolbox that programmers infuse their RL agents with to act in the environment. However, there are two ways I can think of by which a finite list of actions might still circumvent the designer’s intentions. First, knowing all individual actions might simply not be sufficient to check for conformance. For instance, if our mouse in the maze would be able to act in three distinct ways, a solution to optimize reward gain might include chaining together these actions up to ten times, which already amounts to well over 500 possible combinations. There is a significant chance for combinations that the programmers never would have thought of, and therefore, could not have been intended by them. C. Wolf-Brenner: Make Us Smile! AI and the Violation of Human Intentions 71 Second, unexpected interactions between agents and complex environments in RL leave ample room for PI. Researchers tasked RL agents to play hide and seek against each other, and the emerging collaborative strategies far exceeded what was initially anticipated. To win, seekers learned to surf on crates by exploiting the way movement was implemented. By doing so, they were able to overcome the shelters that hiders had built as part of their defensive strategy6. The sheer range of things that agents could do in the game world was simply ungraspable for humans beforehand, which lead to unintended solutions, even though the goal was never unclear or misunderstood. 5 The Intention of Violating Intentions By design, RL scenarios aim to produce optimal solutions for gaining some reward with minimal or no explicit instructions on how to do so. In a way, RL agents having the freedom to experiment within some boundaries is exactly what we intend to do when employing that kind of AI. So, following our arguments from the previous sections, should we label every instance of AI not doing what the programmer meant as PI? When Lee Sedol, one of the best Go players on the planet, sat down to play against AlphaGo, an AI trained by way of RL, the human champion lost four out of five rounds. Move 37, which the AI came up with in the second game, stunned Sedol. In thousands of years of humans playing Go, nobody had ever come up with something as inhuman, unique, or creative.7 But what were the intentions of the designers of AlphaGo? Clearly, they meant to design an AI that can play and excel at Go. Obviously, Move 37 was intended insofar as it is in accordance with the goal, which I loosely interpret as win at Go by playing the game by the rules. But did the programmers intend Move 37? Arguebly, they did not. Move 37 was unexpected for the opponent, the spectators and even more so for the creators of the AI. AlphaGo itself estimated that a human player would have played this move with a probability of one in 10,000 but decided to go for it anyway 8. See Baker et al. 2020, p. 6 See Holcomb et al. 2018, p. 68 8 See Holcomb et al. 2018, p. 70 6 7 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 72 Bostrom does slightly hint at his account of intention being tied to the way goals are achieved in the sense of a method, and not the goals themselves9. If this is the case, labeling cases as PI boils down to the question whether we can at the same time intend to search for the optimal way of satisfying a goal and already know the result of the search. Searching for a solution and already intending it seems contradictory. However, if we tasked AI to make us smile, play Go or eat food and avoid traps, any case of it achieving these goals through unintended ways would still have to labeled as PI. It appears that simply reducing PI to unintended ways to achieve goals is not enough to clearly explain the problem arising from applying AI in such scenarios. 6 Conclusion In this paper, I have shown that the concept of PI hinges on the definition of ‘intention’ and consequently, what the intention latches on to. I have concluded that PI arising from underspecified goals are simply a matter of intentions not being laid out to AI in an understandable, unmistakable, and complete manner. By no means would we be justified to declare our creation at fault, because everything it does is directed at what it knows about our intentions, expressed through goals, and achieving them. Additionally, I have discussed that even for cases in which intentions are perfectly clear to AI, there still is room for PI based on actions and interactions with the environment not being fully understood by designers beforehand. It appears contradictory to claim to have intended a particular way of achieving a goal which AI just now discovered. In contrast, not every time some goal is achieved in a way that designers were previously unaware of is unintended, and thus a case of PI. It is clear that the definition of ‘intention’ plays a pivotal role in identifying PI. However, as I have shown, there is more work to be done on the terminology. First, a starting point for further conceptual contribution to the topic could be an investigation of a potential conflation of the terms ‘unintended’ and ‘unanticipated’ in the context of unintended consequences. This distinction could shed some light on the issue of mislabeling cases as PI. 9 See Bostrom 2017, p. 147 C. Wolf-Brenner: Make Us Smile! AI and the Violation of Human Intentions 73 Second, empirical research could be conducted with regards to what cases of AI, humans or other animals achieving goals through unintended ways people would in fact label as PI. Consequently, bias for or against our artificial creations and fellow planet dwellers could be identified and elaborated on. References Baker, B.; Kanitscheider, I.; Markov, T.; Wu, Y.; Powell, G.; McGrew, B.; Mordatch, I. (2020): Emergent Tool Use From Multi-Agent Autocurricula. In: 8th International Conference on Learning Representations. Addis Ababa, April 26-30, 2020. Bostrom, N. (2017): Superintelligence. Paths, Dangers, Strategies. 2nd ed. Oxford: Oxford University Press. Holcomb, S. D.; Porter, W. K.; Ault, S. V.; Mao, G.; Wang, J. (2018): Overview on Deepmind and its AlphaGo Zero AI. In Proceedings of the 2018 International Conference on Big Data and Education, pp. 67–71. Lapan,, M. (2020): Deep Reinforcement Learning Hands-On. 2nd ed. Birmingham: Packt Publishing. 74 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE BUSINESS DATA SHARING THROUGH DATA MARKETPLACES: A SYSTEMATIC LITERATURE REVIEW ANTRAGAMA EWA ABBAS,1 WIRAWAN AGAHARI,1 MONTIJN VAN DE VEN,2 ANNEKE ZUIDERWIJK1 & MARK DE REUVER1 1 Delft University of Technology, Faculty of Technology, Policy and Management, Delft, The Netherlands; e-mail: a.e.abbas@tudelft.nl, w.agahari@tudelft.nl, A.M.G.Zuiderwijk-vanEijk@tudelft.nl, G.A.deReuver@tudelft.nl 2 Eindhoven University of Technology, Department of Industrial Engineering & Innovation Sciences, Eindhoven, The Netherlands; e-mail: m.r.v.d.ven@tue.nl Abstract Data marketplaces are expected to play a crucial role in tomorrow’s data economy but hardly achieve commercial exploitation. Currently, there is no clear understanding of the knowledge gaps in data marketplace research, especially neglected research topics that may contribute to advancing data marketplaces towards commercialization. This study provides an overview of the state of the art of data marketplace research. We employ a Systematic Literature Review (SLR) approach and structure our analysis using the Service-TechnologyOrganization-Finance (STOF) model. We find that the extant data marketplace literature is primarily dominated by technical research, such as discussions about computational pricing and architecture. To move past the first stage of the platform’s lifecycle (i.e., platform design) to the second stage (i.e., platform adoption), we call for empirical research in non-technological areas, such as customer expected value and market segmentation. DOI https://doi.org/10.18690/978-961-286-485-9.6 ISBN 978-961-286-485-9 Keywords: data markets, data marketplaces, data exchange, business dat sharing, research agenda, systematic literature review, STOF model 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 76 1 Introduction Data marketplaces are expected to play a crucial role in tomorrow’s data economy (European Commission, 2020). Business data sharing via data marketplaces may contribute to overall economic growth by stimulating data-driven innovation, improving the competitiveness of Small and Medium-sized Enterprises (SMEs), and opening up job markets (Virkar et al., 2019). A data marketplace can be broadly defined as a multi-sided platform that matches data providers and data buyers, and that facilitates business data exchange and financial transactions. Key actors that provide data marketplace functionalities include data marketplace owners, operators, and third-party providers (TPPs) (Fruhwirth et al., 2020; Koutroumpis et al., 2020; Spiekermann, 2019). However, despite the alleged potential, data marketplaces generally remain conceptual and hardly commercially exploited. For instance, Microsoft’s Azure Data Marketplace, xDayta, and Kasabi are among out-of-market data marketplaces (Spiekermann, 2019). From an academic perspective, recent trends in the European Union policy-making agendas towards business data sharing have led to a proliferation of data marketplaces studies, resulting in a constantly expanding yet fragmented body of literature. Recent work provides understanding of the state-of-the-art of data marketplaces in practice (e.g., Fruhwirth et al., 2020) but does not provide a comprehensive overview of data marketplaces research in academia. Consequently, we have no clear understanding of the knowledge gaps in data marketplace research. Specifically, we lack understanding of whether research is lacking on topics that would advance data marketplaces towards commercialization. As it stands, it might well be that academic research is focusing on topics that do not help resolve the standstill in data marketplace commercialization. To evaluate this assertion, this paper aims to investigate the current state of the art of data marketplace research. We will conduct a systematic literature review on existing data marketplaces research by adopting the guideline provided by Okoli (2015). To cover the broad range of issues that plays a role in technology commercialization, we use the business model construct as a synthetic device (cf., Solaimani et al., 2015). In this way, our study will be, to our knowledge, the first to provide a comprehensive overview of data marketplace research, which will be beneficial in steering future research towards the commercialization of such marketplaces. In this paper, we consider all data A. Ewa Abbas, W. Agahari, M. van de Ven, A. Zuiderwijk &M. de Reuver: Business Data Sharing through Data Marketplaces: A Systematic Literature Review 77 marketplaces archetypes revealed by Fruhwirth et al. (2020): centralized, decentralized, and personal data trading. In centralized data trading, data marketplaces mediate data exchange from diverse domains and origins, incorporating different data types and pricing mechanisms. Advanced data marketplaces in this archetype employ smart contracts to execute transactions. Decentralized data trading, on the other hand, relies on a decentralized architecture to operate data marketplaces. Finally, personal data trading refers to a Customer-to-Business (C2B) relationship where individuals can sell their personal information to corporations. 2 Research Approach This research employs a Systematic Literature Review (SLR) approach (Okoli, 2015). Our primary database is Scopus, which comprises a comprehensive database of many scientific research papers, including the area we are examining in this study. We selected articles based on three criteria: articles should be (1) written in English; (2) published in a peer-reviewed journal or conference proceedings; and (3) focused on data marketplaces. We use the search terms of ("data marketplace*") OR ("data market*"). The literature search was conducted on 6 July 2020 and resulted in 496 articles. We complemented these articles with nine additional papers that we consider key literature. The articles did not appear in the initial search because, for instance, they do not use the data marketplace term explicitly, neither in the title nor abstract. We extracted the articles’ meta-data and saved it in an Excel spreadsheet (available here: https://doi.org/10.4121/14673813.v1). Next, we analyzed the quality of the identified articles by employing a two-step screening approach. First, we looked into the title and abstract of the selected papers to assess their relevance. We discussed our assessment internally to reach a consensus, resulting in an exclusion of 225 papers. Second, we combined quantitative traditional metrics (e.g., citation numbers) and next-generation metrics (e.g., social media, usage, captures, and mentions) to further select the reviewed papers. The next-generation metrics provided by the Scopus database are known as the PlumX Metrics (Champieux, 2015). To do so, we first calculated the average number of citations from the existing 280 articles as a threshold, in which we include any articles above this average citation number (7.3). If the number of citations of an article was below the threshold, we checked whether the article was published in a high-quality journal or conference proceedings (i.e., ranked above the 78 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 50th percentile in its respective domain). For articles not meeting these criteria, we used the average number of next-generation metrics from the existing 280 articles (social media = 2.1, usage = 44.8, captures = 43.2, mentions = 0.2) to check whether policymakers or practitioners have read the article. In this way, we ensure that the inclusion of our sampling papers reflects both scientific reliability and relevance. In this stage, the number of included papers was 158. Following Solaimani et al. (2015), we used the STOF model to structure the identified articles. It is a generic framework to reconstruct the logic of a business and its ecosystems (Bouwman et al., 2008). Thus, the STOF model enables a highlevel representation of the service domain (S), technology domain (T), organization domain (O), and finance domain (F). The STOF model is suitable for our purpose since it is explicitly designed for ICT-enabled services like data marketplaces. Unlike frameworks such as business model canvas, the STOF model explicitly captures the role of technology in commercialization. Moreover, the STOF model helps understand the dynamics involved in developing successful business models, i.e., market adoption and sustainable profitability of the designed services. Due to the lack of commercialized data marketplaces, it is crucial to understand what we (do not) know about the breadth of the business models of data marketplaces, ranging from their value to how they deliver and capture value. Hence, the STOF model is highly appropriate to structure our discussion. We then read the full text of the 158 remaining articles and classified each article into a STOF model domain. Furthermore, each article was further classified into a category. In classifying an article, we identified its main objective while paying attention to the primary unit of analysis. For example, Munoz-Arcentales et al. (2019) propose an architecture for providing data usage and access control. Since the discussion emphasizes technology needs, we classified this paper into the architecture category in the STOF technology domain. Although some articles can have multiple overlapping topics, we still attempted to assign each article into a single category. We justified this by analyzing the central theme of the discussion. Various articles were independently categorized by multiple authors to assess inter-rater reliability (see the supplementary material). In general, there was a high level of agreement between the authors. We also further excluded some irrelevant articles, including those that did not discuss data marketplaces. Our final sample consisted of 137 articles. A. Ewa Abbas, W. Agahari, M. van de Ven, A. Zuiderwijk &M. de Reuver: Business Data Sharing through Data Marketplaces: A Systematic Literature Review 3 79 Results: STOF Model Categorization This section describes the results of our STOF model categorization. In total, we identified seventeen categories. Figure 1 provides the categorization of the articles. Given the page limitation, we only provide the topic examples for each category. For the whole topic list, please refer to the supplementary material. 27 25 18 12 10 Service (n=18) Organization (n=31) 2 Pricing mechanisms 1 Market analysis Social implications Governance Demographic aspects Data ecosystems 3 Classification framework Data-as-a-Service Technology (n=58) 7 6 3 Security and privacy 2 Information retrieval 2 Data contracts Computational pricing Architecture Value proposition Users’ preferences Data-related aspects 2 4 Economic feasibility 7 6 Finance (n=30) Figure 1 The selected articles categorized using the STOF model (n=137) We identify three categories within the STOF service domain. The first one, the most dominant category, is the value proposition. The studies in this category are generally concerned with means to identify value for end-users of data marketplaces. For example, Perera et al. (2017) and Anderson et al. (2014) explore the value of trading IoT and healthcare data, respectively. An additional example is the value exploration of data marketplaces that trade anonymous personal data (Robinson, 2017). Another category that has received considerable attention from scholars concerns the data-related aspects. This category explores data properties as a unit of analysis, such as data characteristics as economic goods (Demchenko et al., 2018) and approaches to identify data quality problems (Zhang et al., 2019). Meanwhile, literature on the users’ preferences discusses data providers’ willingness to share data 80 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE considering aspects such as anonymity (Schomakers et al., 2020) and data ownership (Kamleitner & Mitchell, 2018). Most publications fall within the STOF technology domain, which can be divided into six categories. In our sample, the most discussed category is the computational pricing, which focuses on technical discussions for data pricing. Publications in this category propose, for instance, online query-based mechanisms (Zheng et al., 2020), an algorithmic solution for data pricing and revenue distribution (Agarwal et al., 2019), a bi-level mathematical programming model that considers data quality (Yu & Zhang, 2017). Following this, many scholars discuss topics related to architecture, generally referring to the various technical components of data marketplaces. Examples of architecture in data marketplaces include blockchain-based system architectures (e.g., Jeong et al., 2020; López & Farooq, 2020), an architecture for data access and control (Munoz-Arcentales et al., 2019), and a reference architecture (Roman & Stefano, 2016). The security and privacy category has also gained much attention in the literature. The topics covered in this category are related to privacypreserving technology (e.g., Niu et al., 2019; Zhao et al., 2019), property right enforcements (Sørlie & Altmann, 2019), and secure information models (Shaabany et al., 2016). Information retrieval topics such as schema (Hatanaka & Abe, 2015) and ontologies (Morrison et al., 2011) are also discussed in the literature. Another category examines the model for data contracts to explicitly specify data usage (Truong et al., 2012). Finally, the data-as-service category explores the structured model for services offered in the Application Programming Interface (API), e.g., Vu et al. (2012). We identify six categories in the STOF organization domain. The most-discussed category is governance, which broadly refers to governing processes by certain actors (e.g., platform owners) via several mechanisms, such as norms or power (Bevir, 2012). Examples of governance topics include discussion about policies and strategies in data marketplaces (Tupasela et al., 2020), construction of a data property protection system (Yu & Zhao, 2019), governance mechanisms in the platform design process (Otto & Jarke, 2019), self-regulation for fairness and transparency for data sharing (Richter & Slowinski, 2019). Moreover, the social implications category explores topics such as ethical concerns (e.g., Ahmed & Shabani, 2019; Ishmaev, 2020), implications of data trading for social, political, economic, and cultural context (Virkar et al., 2019), and challenges faced by private data marketplaces A. Ewa Abbas, W. Agahari, M. van de Ven, A. Zuiderwijk &M. de Reuver: Business Data Sharing through Data Marketplaces: A Systematic Literature Review 81 (Spiekermann et al., 2015). The next category is data ecosystems, which covers the topics of reviewing data ecosystems (Oliveira et al., 2019; W. Thomas & Leiponen, 2016) or exploring market mechanisms for data (Koutroumpis et al., 2020). The category of classifying data marketplaces by developing business model taxonomies (e.g., Fruhwirth et al., 2020; Stahl et al., 2016) is also examined. Finally, the selected research discusses topics such as the composition of the actors’ population (Macdonald & Frank, 2017) and the geographical distribution of victim in stolen data markets (Smirnova & Holt, 2017) is categorized in the demographic aspects. Finally, we identify three categories in the STOF finance domain. Articles in this domain are not equally distributed across categories because most scholars are interested in the pricing mechanism. Unlike the computational pricing (in the STOF technology domain) that focuses on technical aspects, the pricing mechanisms here discuss mathematical or economic approaches in evaluating, valuating, or pricing data in data marketplaces. The topic examples of this category are data trading models that consider privacy valuation (Oh et al., 2020), a debt-credit mechanism for data pricing (Liu et al., 2019), auction-based query pricing (Wang et al., 2019), and pricing mechanisms that aim for revenue or profit maximization (e.g., Mao et al., 2019). Other examples explored in this category are pricing mechanisms based on the Stackelberg game approach (Shen et al., 2019) and data quality scores for data pricing (Stahl & Vossen, 2016). Other categories in the finance domain are the market analysis that includes topics such as estimating the economic value of stolen data market (e.g., Holt et al., 2016; Shulman, 2010), as well as the economic feasibility category that examines Nash equilibria in competition between actors (Guijarro et al., 2019). 4 Discussion and Conclusion This paper aims to investigate the current state of the art of data marketplace research. As shown in figure 1, we reveal that that data marketplace research is still primarily dominated by technical literature. Based on this fact, the pattern of evolution of data marketplace research tends to follow the technology push (i.e., technological advancement drives innovation). We argue that one possible reason behind this may be the availability of funding and projects that are intensely focused on the technological development of data marketplaces (refer to the description of 82 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE EU-funded projects on data markets1). Based on the platform’s lifecycle by Henfridsson and Bygstad (2013), many of these projects are still in the initial phase of the platform’s lifecycle, i.e., the platform design process. This may explain why debate focuses on technical rather than non-technical aspects. This phenomenon indirectly contributes to the limited options for publication venues. The conferences and journals that publish on data marketplaces are primarily found in the technical venues, e.g., the IEEE Access and IEEE Internet of Things Journal. As indicated in the introduction section, data marketplaces are hardly commercially exploited, even though concepts have existed for years. Apparently, they struggle to move from the initial stage into the second stage of the platform’s lifecycle, i.e., the platform adoption. One possible explanation could be that previous studies have not dealt extensively with non-technical topics. Hence, contributions from the academic perspective towards data marketplace commercialization are still scant. For example, little attention has been paid to topics categorized in the service domain (this domain was covered least by our studied papers). Based on business model ideas, this domain is essential and should be the starting point for data marketplaces to be commercially exploited. The topics in the service domain are essential to design services that fulfill customers’ needs. Although a few attempts have been made to discuss relevant topics such as value proposition, many other topics such as customer expected value and market segmentation have barely been discussed in the selected articles. Considering the organizational domain, one crucial overlooked aspect in current literature is value networks that describe actors and their interactions. It is essential to understand the dynamic to align their vision by developing organizational arrangements to achieve the common goal. For the finance domain, current literature mainly emphasizes data pricing. Future data marketplace research should cover other essential topics in the finance domain, such as investments and cost sources, because they are essential to build operating models of data marketplaces. Moreover, data marketplace projects are often conducted in a consortium based on academiapractitioners collaborations (e.g., the EU-funded projects). Academic publications may also reflect the work conducted by practitioners. Hence, considering nontechnical investigations may open opportunities to speed up the platform adoption https://ec.europa.eu/digital-single-market/en/programme-and-projects/eu-funded-projects-data, accessed on February 19, 2021 1 A. Ewa Abbas, W. Agahari, M. van de Ven, A. Zuiderwijk &M. de Reuver: Business Data Sharing through Data Marketplaces: A Systematic Literature Review 83 process in practice. We also suggest looking into the STOF model (Bouwman et al., 2008) for inspiration during the topic exploration process. Our additional impressions after reading and analyzing the articles are as follows. We only found a few studies, e.g., Schomakers et al. (2020), Spiekermann and Korunovska (2017), that conduct empirical investigations in non-technical literature. Moreover, the many technology-focused studies hardly consider the link between technology solution and problem, such as is common in Design Science Research (DSR) approaches (Hevner & Chatterjee, 2010). Stronger links between technical solutions and value-related problems would help focus data marketplaces research so that practical problems are being resolved. Besides, the literature hardly discusses solutions to some core non-technical challenges of data marketplaces, such as: defining data ownership (Koutroumpis et al., 2020), assessing data quality (Koutroumpis et al., 2020), lacking legal frameworks (Richter & Slowinski, 2019), lacking technical expertise and resources to operate the ecosystem (Oliveira et al., 2019), and unclear organizational structure (Oliveira et al., 2019). A limitation of this study is that the topic identification process is subject to the researchers’ knowledge and interpretations about the topic, i.e., different readers may have different judgments. However, independently categorizing the present papers by different authors showed overall alignment. Moreover, the study is limited by its scope and the number of publications included in the analysis due to our criteria, e.g., a single database, the timeframe selection, and a paper quality check. Nonetheless, we argue that we have reached a sufficient level of saturation, i.e., analyzing the last couple of papers did not lead to new categories being identified or major shifts in the distribution of papers among categories. This study contributes to the literature by a) providing a comprehensive overview of current data marketplace research and b) identifying neglected research topics that may contribute to data marketplaces’ growth towards commercialization. We set out potential research topics to shift data marketplaces from the first stage of the platform’s lifecycle, i.e., the platform design, to the second stage, i.e., the platform adoption. Our research provides the essential basis for future research towards the commercialization of data marketplaces. Finally, we call for (empirical) research in non-technological domains to complement the current technology-focused data marketplace research. 84 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Acknowledgments The research leading to these results has received funding from the European Union’s Horizon 2020 Research and Innovation Programme, under Grant Agreement no 871481 – Trusted Secure Data Sharing Space (TRUSTS) and No 825225 – Safe Data-Enabled Economic Development (Safe-DEED). References * 2Agarwal, A., Dahleh, M., & Sarkar, T. (2019). A marketplace for data: An algorithmic solution. Proceedings of the 2019 ACM Conference on Economics and Computation. *Ahmed, E., & Shabani, M. (2019). DNA Data Marketplace: An Analysis of the Ethical Concerns Regarding the Participation of the Individuals. Frontiers in Genetics, 10. https://doi.org/10.3389/fgene.2019.01107 *Anderson, N. G., Pollack, J., & Williams, D. (2014). The value of healthcare data in ophthalmology. Current Opinion in Ophthalmology, 25(3), 191-194. https://doi.org/10.1097/icu.0000000000000047 *Bevir, M. (2012). Governance : a very short introduction. Oxford University Press. Bouwman, H., Faber, E., Haaker, T., Kijl, B., & De Reuver, M. (2008). Conceptualizing the STOF Model. In (pp. 31-70). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-792383_2 Champieux, R. (2015). PlumX. Journal of the Medical Library Association : JMLA, 103(1), 63-64. https://doi.org/10.3163/1536-5050.103.1.019 *Demchenko, Y., Los, W., & de Laat, C. (2018). Data as economic goods: Definitions, properties, challenges, enabling technologies for future data markets. ITUJournal-ICT Discoveries, 1(2). European Commission. (2020). A European Strategy for Data https://eur-lex.europa.eu/legalcontent/EN/TXT/PDF/?uri=CELEX:52020DC0066&from=EN Fruhwirth, M., Rachinger, M., & Prlja, E. (2020). Discovering Business Models of Data Marketplaces. Proceedings of the 53rd Hawaii International Conference on System Sciences. *Guijarro, L., Pla, V., Vidal, J. R., & Naldi, M. (2019). Competition in data-based service provision: Nash equilibrium characterization. Future Generation Computer Systems, 96, 35-50. https://doi.org/10.1016/j.future.2019.01.044 *Hatanaka, H., & Abe, A. (2015). What Type of Information and Scheme does the Data Market Need? Procedia Computer Science, 60, 1309-1317. https://doi.org/10.1016/j.procs.2015.08.197 Henfridsson, O., & Bygstad, B. (2013). The generative mechanisms of digital infrastructure evolution. MIS quarterly, 907-931. Hevner, A., & Chatterjee, S. (2010). Design science research in information systems. In Design research in information systems (pp. 9-22). Springer. *Holt, T. J., Smirnova, O., & Chua, Y. T. (2016). Exploring and Estimating the Revenues and Profits of Participants in Stolen Data Markets. Deviant Behavior, 37(4), 353-367. https://doi.org/10.1080/01639625.2015.1026766 *Ishmaev, G. (2020). The Ethical Limits of Blockchain-Enabled Markets for Private IoT Data. Philosophy & Technology, 33(3), 411-432. https://doi.org/10.1007/s13347-019-00361-y *Jeong, B.-G., Youn, T.-Y., Jho, N.-S., & Shin, S. U. (2020). Blockchain-Based Data Sharing and Trading Model for the Connected Car. Sensors, 20(11), 3141. https://doi.org/10.3390/s20113141 *Kamleitner, B., & Mitchell, V.-W. (2018). Can consumers experience ownership for their personal data? From issues of scope and invisibility to agents handling our digital blueprints. In Psychological ownership and consumer behavior (pp. 91-118). Springer. 2 References with an asterisk indicate the inclusion of this article in the systematic literature review. A. Ewa Abbas, W. Agahari, M. van de Ven, A. Zuiderwijk &M. de Reuver: Business Data Sharing through Data Marketplaces: A Systematic Literature Review 85 Koutroumpis, P., Leiponen, A., & Thomas, L. D. W. (2020). Markets for data. Industrial and Corporate Change, 29(3), 645-660. https://doi.org/10.1093/icc/dtaa002 *Liu, K., Chen, W., Zheng, Z., Li, Z., & Liang, W. (2019). A Novel Debt-Credit Mechanism for Blockchain-Based Data-Trading in Internet of Vehicles. IEEE Internet of Things Journal, 6(5), 9098-9111. https://doi.org/10.1109/jiot.2019.2927682 *López, D., & Farooq, B. (2020). A multi-layered blockchain framework for smart mobility datamarkets. Transportation Research Part C: Emerging Technologies, 111, 588-615. https://doi.org/10.1016/j.trc.2020.01.002 *Macdonald, M., & Frank, R. (2017). Shuffle Up and Deal: Use of a Capture–Recapture Method to Estimate the Size of Stolen Data Markets. American Behavioral Scientist, 61(11), 1313-1340. https://doi.org/10.1177/0002764217734262 *Mao, W., Zheng, Z., & Wu, F. (2019, 2019). Pricing for Revenue Maximization in IoT Data Markets: An Information Design Perspective. *Morrison, N., Hancock, D., Hirschman, L., Dawyndt, P., Verslyppe, B., Kyrpides, N., Kottmann, R., Yilmaz, P., Glöckner, F. O., Grethe, J., Booth, T., Sterk, P., Nenadic, G., & Field, D. (2011). Data shopping in an open marketplace: Introducing the Ontogrator web application for marking up data using ontologies and browsing using facets. Standards in Genomic Sciences, 4(2), 286-292. https://doi.org/10.4056/sigs.1344279 *Munoz-Arcentales, A., López-Pernas, S., Pozo, A., Alonso, Á., Salvachúa, J., & Huecas, G. (2019). An Architecture for Providing Data Usage and Access Control in Data Sharing Ecosystems. Procedia Computer Science, 160, 590-597. https://doi.org/10.1016/j.procs.2019.11.042 *Niu, C., Zheng, Z., Wu, F., Gao, X., & Chen, G. (2019). Achieving Data Truthfulness and Privacy Preservation in Data Markets. IEEE Transactions on Knowledge and Data Engineering, 31(1), 105-119. https://doi.org/10.1109/tkde.2018.2822727 *Oh, H., Park, S., Lee, G. M., Choi, J. K., & Noh, S. (2020). Competitive Data Trading Model With Privacy Valuation for Multiple Stakeholders in IoT Data Markets. IEEE Internet of Things Journal, 7(4), 3623-3639. https://doi.org/10.1109/jiot.2020.2973662 Okoli, C. (2015). A guide to conducting a standalone systematic literature review. Communications of the Association for Information Systems, 37(1), 43. *Oliveira, M. I. S., Lima, G. d. F. B., & Lóscio, B. F. (2019). Investigations into Data Ecosystems: a systematic mapping study. Knowledge and Information Systems, 1-42. *Otto, B., & Jarke, M. (2019). Designing a multi-sided data platform: findings from the International Data Spaces case. Electronic Markets, 29(4), 561-580. https://doi.org/10.1007/s12525-01900362-x *Perera, C., Wakenshaw, S. Y., Baarslag, T., Haddadi, H., Bandara, A. K., Mortier, R., Crabtree, A., Ng, I. C., McAuley, D., & Crowcroft, J. (2017). Valorising the IoT databox: creating value for everyone. Transactions on Emerging Telecommunications Technologies, 28(1), e3125. *Richter, H., & Slowinski, P. R. (2019). The Data Sharing Economy: On the Emergence of New Intermediaries. IIC - International Review of Intellectual Property and Competition Law, 50(1), 4-29. https://doi.org/10.1007/s40319-018-00777-7 *Robinson, S. C. (2017). What’s your anonymity worth? Establishing a marketplace for the valuation and control of individuals’ anonymity and personal data. Digital Policy, Regulation and Governance, 19(5), 353-366. https://doi.org/10.1108/dprg-05-2017-0018 *Roman, D., & Stefano, G. (2016, 2016). Towards a Reference Architecture for Trusted Data Marketplaces: The Credit Scoring Perspective. *Schomakers, E.-M., Lidynia, C., & Ziefle, M. (2020). All of me? Users’ preferences for privacypreserving data markets and the importance of anonymity. Electronic Markets, 1-17. *Shaabany, G., Grimm, M., & Anderl, R. (2016). Secure Information Model for Data Marketplaces Enabling Global Distributed Manufacturing. Procedia CIRP, 50, 360-365. https://doi.org/10.1016/j.procir.2016.05.003 *Shen, B., Shen, Y., & Ji, W. (2019). Profit optimization in service-oriented data market: A Stackelberg game approach. Future Generation Computer Systems, 95, 17-25. https://doi.org/10.1016/j.future.2018.12.072 86 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE *Shulman, A. (2010). The underground credentials market. 2010(3), 5-8. https://doi.org/10.1016/s1361-3723(10)70022-1 *Smirnova, O., & Holt, T. J. (2017). Examining the Geographic Distribution of Victim Nations in Stolen Data Markets. American Behavioral Scientist, 61(11), 1403-1426. https://doi.org/10.1177/0002764217734270 Solaimani, S., Keijzer-Broers, W., & Bouwman, H. (2015). What we do – and don’t – know about the Smart Home: An analysis of the Smart Home literature. Indoor and Built Environment, 24(3), 370-383. https://doi.org/10.1177/1420326x13516350 *Sørlie, J.-T., & Altmann, J. (2019). Sensing as a Service Revisited: A Property Rights Enforcement and Pricing Model for IIoT Data Marketplaces. International Conference on the Economics of Grids, Clouds, Systems, and Services. Spiekermann, M. (2019). Data Marketplaces: Trends and Monetisation of Data Goods. Intereconomics, 54(4), 208-216. https://doi.org/10.1007/s10272-019-0826-z *Spiekermann, S., Acquisti, A., Böhme, R., & Hui, K.-L. (2015). The challenges of personal data markets and privacy. Electronic Markets, 25(2), 161-167. https://doi.org/10.1007/s12525015-0191-0 *Spiekermann, S., & Korunovska, J. (2017). Towards a value theory for personal data. Journal of Information Technology, 32(1), 62-84. https://doi.org/10.1057/jit.2016.4 Stahl, F., Schomm, F., Vossen, G., & Vomfell, L. (2016). A classification framework for data marketplaces. Vietnam Journal of Computer Science, 3(3), 137-143. https://doi.org/10.1007/s40595-016-0064-2 *Stahl, F., & Vossen, G. (2016). Data Quality Scores for Pricing on Data Marketplaces. In (pp. 215224). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-662-49381-6_21 *Truong, H. L., Comerio, M., Paoli, F. D., Gangadharan, G. R., & Dustdar, S. (2012). Data contracts for cloud-based data marketplaces. International Journal of Computational Science and Engineering, 7(4), 280. https://doi.org/10.1504/ijcse.2012.049749 *Tupasela, A., Snell, K., & Tarkkala, H. (2020). The Nordic data imaginary. Big Data & Society, 7(1), 205395172090710. https://doi.org/10.1177/2053951720907107 Virkar, S., Viale Pereira, G., & Vignoli, M. (2019). Investigating the Social, Political, Economic and Cultural Implications of Data Trading. In (pp. 215-229). Springer International Publishing. https://doi.org/10.1007/978-3-030-27325-5_17 *Vu, Q. H., Pham, T.-V., Truong, H.-L., Dustdar, S., & Asal, R. (2012). Demods: A description model for data-as-a-service. 2012 IEEE 26th International Conference on Advanced Information Networking and Applications. *W. Thomas, L. D., & Leiponen, A. (2016). Big data commercialization. IEEE Engineering Management Review, 44(2), 74-90. https://doi.org/10.1109/emr.2016.2568798 *Wang, X., Wei, X., Gao, S., Liu, Y., & Li, Z. (2019). A novel auction-based query pricing schema. International Journal of Parallel Programming, 1-22. *Yu, H., & Zhang, M. (2017). Data pricing strategy based on data quality. Computers & Industrial Engineering, 112, 1-10. https://doi.org/10.1016/j.cie.2017.08.008 *Yu, X., & Zhao, Y. (2019). Dualism in data protection: Balancing the right to personal data and the data property right. Computer Law & Security Review, 35(5), 105318. https://doi.org/10.1016/j.clsr.2019.04.001 *Zhang, R., Indulska, M., & Sadiq, S. (2019). Discovering Data Quality Problems. Business & Information Systems Engineering, 61(5), 575-593. https://doi.org/10.1007/s12599-01900608-0 *Zhao, Y., Yu, Y., Li, Y., Han, G., & Du, X. (2019). Machine learning based privacy-preserving fair data trading in big data market. Information Sciences, 478, 449-460. https://doi.org/10.1016/j.ins.2018.11.028 *Zheng, Z., Peng, Y., Wu, F., Tang, S., & Chen, G. (2020). ARETE: On Designing Joint Online Pricing and Reward Sharing Mechanisms for Mobile Data Markets. IEEE Transactions on Mobile Computing, 19(4), 769-787. https://doi.org/10.1109/tmc.2019.2900243 TELEMEDICINE IN SLOVENIA ŽIVA RANT National Institute of Public Health, Ljubljana, Slovenia; e-mail: Ziva.Rant@nijz.si Abstract Telemedicine could be one of the solutions for challenges in healthcare, especially in this time of the Covid-19 pandemic. The results of the research about the state of telemedicine services in Slovenia are presented in this article. We found several telemedicine solutions in Slovenian healthcare. Metadata for them were collected. The solutions are placed in groups of telemonitoring, provision of healthcare services by remotely connecting patients with a doctor or healthcare professional and remote cooperation for the patient's treatment between doctors or healthcare professionals who are physically at different locations. The opinions of the research participants regarding the challenges associated with telemedicine services in Slovenia were also collected. They are placed in three main groups: financing, healthcare system and healthcare professionals. Telemedicine is a necessity and the future of Slovenian healthcare services. If a solution is to be applied successfully, business processes must be changed so that a practically useful service can arise from the solution. DOI https://doi.org/10.18690/978-961-286-485-9.7 ISBN 978-961-286-485-9 Keywords: telemedicine, telemedicine service, distance healthcare treatment, telemonitoring, information and communication technology 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 88 1 Introduction European citizens are getting older and are increasingly living with chronic diseases. Their health condition often requires enhanced medical attention. Medical support may not be available in remote areas and for certain specialities as easily or as frequently as their health condition would require. (COM(2008)689). So changes in health services are needed. On the other hand, the improvement on the information and communications technology (ICT) field is enormous. It could be successfully used for making changes in healthcare services. Some healthcare treatment can be done remotely. Telemedicine is a proper solution for these challenges, especially in this time of the Covid-19 pandemic. Telemedicine (TM) is the provision of healthcare services, through use of ICT, in situations where the health professional and the patient (or two health professionals) are not in the same location. It involves secure transmission of medical data and information, through text, sound, images or other forms needed for the prevention, diagnosis, treatment and follow-up of patients. (COM(2008)689). Although there are several telemedicine services available in Slovenia, no overview of them is accessible. As suggested by one of the members, the Governing board (GB) of the Slovenian Medical Informatics Association (SDMI) has decided on making the research about usage TM solutions in Slovenia. 2 Methodology The purpose of the research was to learn about the state of telemedicine in Slovenia. The research question was: What is the state of telemedicine in Slovenia? The research was carried out in May and June 2020, after the first wave of the Covid-19 pandemic. In the first phase members of GB SDMI were asked to find and report the TM solutions. Members of GB SDMI were selected because they are from many medical information fields: universities, institutes, healthcare providers, software developers and other experts from the medical information field. They geographically covered all Slovenia. So we could get a very broad view about the selected topic. Ž. Rant: Telemedicine in Slovenia 89 With the aim to collect data we prepared a structured questionnaire. In the second phase we collected key metadata for each solution: name of the solution, members of the development, contact person and contact data, target users, users amount assessment, short solution description, potential for usage on the national level. We also asked for respondents' opinions of three most important challenges and note the person who provided the data. The data was gathered and entered in the same table by the healthcare providers' members, software development companies, experts from the Slovenian universities and the national institute, and other experts from the medical information field. We published the organized table of the answers on the SDMI web page (SDMI, 2020). These answers we analyzed further and the results of the analysis are presented in this article. 3 Results As part of the research, we collected metadata for 15 telemedicine solutions in Slovenian healthcare. We placed them in the following groups:    telemonitoring (model Business to Customer - B2C), provision of healthcare services by remotely connecting patients with a doctor or healthcare professional (model Business to Customer - B2C), remote cooperation for the patient's treatment between doctors or healthcare professionals who are physically at different locations (model Business to Business - B2B). A description of the solutions and their associated services is given below. 3.1 Telemonitoring We have found five solutions for telemonitoring. Telemonitoring is a telemedicine service aimed at monitoring the health status of patients at a distance. Data can be collected either automatically through personal health monitoring devices or through active patient collaboration (e.g. by entering weight or daily blood sugar level measurements into a web-based tool). Data, once processed and shared with relevant health professionals, may be used to optimize the patient's monitoring and treatment protocols (COM(2008)689). 90 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Storitve centra za zdravje na daljavo CEZAR (TM support service provided by the Regional Centre for Telehealth (CEZAR)) (Rudel et al, 2016 Zdrav Vest). The solution was developed by General Hospital Slovenj Gradec, Healthcare Centre Ravne and MKS Electronic Systems Ltd., Ljubljana. It is made for telemonitoring and chronic disease management for patients with diabetes mellitus type 2 or chronic congestive heart failure (SDMI, 2020). Sistem za oddaljeno spremljanje in telemedicinsko obravnavo pacientov (SOSTOP) (The system for patient telemonitoring and telemedicine treatment) (SOSTOP, n.d.) was developed by Ipmit d.o.o., Nova Vizija d.d., Medicina Iljaž d.o.o. and Faculty of Computer and Information Science, Ljubljana. It is made for provision of healthcare services at a distance in family medicine reference clinics for patients with chronic illnesses (SDMI, 2020). T-MED Gluco was developed by MKS d.o.o., Ljubljana and VPD Bled d.o.o. It is made for provision of healthcare services at a distance for patients with diabetes mellitus type 2 and the diabetes clinics (SDMI, 2020). E-zdravje Telekoma Slovenije (eHealth Telekom Slovenia) (Oroszy & Pustatičnik, n.d.) was developed by Telekom Slovenije, d.d., University Medical Centre Ljubljana (UMCL), University Clinic Golnik and National Institute of Public Health Slovenia (NIPH). It is made for remote monitoring of patients with chronic illnesses. It is also used by the UMCL for individual Covid-19 patients in isolation at home (The Fast Mode, n.d.) (SDMI, 2020). E-oskrba (E-care Service) (Ekosmart, n.d.) was developed by Telekom Slovenije, d.d. and the Slovene Federation of Pensioners’ Associations (ZDUS). It enables active, independent and safe living at home to the elderly, patients with chronic diseases, and to disabled persons (SDMI, 2020). 3.2 Remotely connecting patients with a doctor or healthcare professional We have found four solutions for provision of healthcare services by remotely connecting patients with a doctor or healthcare professional. They are made by the software developer companies for the healthcare providers. The patient can communicate with the healthcare professional safely from a distance. The solutions Ž. Rant: Telemedicine in Slovenia 91 provide online scheduling of appointments, ordering electronic prescriptions, electronic referrals and electronic sick leave certificates. Some of them enable safely sharing specialist reports, radiology images and also electronic or even video consultations for distance treatments. doZdravnika.si (doZdravnika.si, n.d.) was developed by SRC Infonet. (SDMI, 2020). Hipokrat - eSodelovanje was developed by LIST d.o.o. (SDMI, 2020). PriZdravniku (Modul PriZdravniku, n.d.), (Storitev eVideoPosvet, n.d.) was developed by Nova Vizija d.d. (SDMI, 2020). Gospodar zdravja (Gospodar zdravja, n.d.) was developed by Gospodar zdravja d.o.o. (SDMI, 2020). 3.3 Remote cooperation between doctors or healthcare professionals who are physically at different locations Seven solutions were found for remote cooperation for the patient's treatment between doctors or healthcare professionals who are physically at different locations. Teletransfuzija (Teletransfuzija, n.d.) was developed by the Blood Transfusion Centre of Slovenia and XLAB, d.o.o. Telemedicine is used to perform mandatory pre-transfusion tests from a distance. From their own location a specialist in transfusion medicine examines, reads, orders further tests and authorises the issue of blood at other locations, where a medical laboratory scientist carries out pretransfusion tests. The computer teleconsultation system covers the entire blood transfusion service in Slovenia since 2005 (SDMI, 2020). TeleFarma (Telefarma, n.d.) was developed by The Faculty of Medicine at the University of Ljubljana (UL MF), SRC Infonet, General Hospital Murska Sobota and Healthcare Centre Škofja Loka. TeleFarma enables all physicians, regardless of their location, equal access to clinical pharmacists and offers better cooperation between physicians and clinical pharmacists (SDMI, 2020). 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 92 There are three telemedicine solutions in Slovenian eHealth under the governance of National Institute of Public Health (NIPH) Slovenia. Telekap (TeleStroke) (Nacionalni inštitut za javno zdravje, NIJZ, n.d.) was developed by Interexport d.o.o., The Division of Neurology, UMCL, Ministry of Health of RS and NIPH Slovenia. The medical specialist from The Division of Neurology supports doctors from other hospitals if a patient is suspected of having a stroke. It takes place through a high quality video-conference, accessible 24 hours a day (SDMI, 2020). Teleradiologija (Teleradiology) (NIJZ, n.d.) was developed by Interexport d.o.o., Ministry of Health of RS and NIPH Slovenia. It is a telemedicine service which involves the electronic transmission of radiographic images from one geographical location to another for the purposes of interpretation and consultation (SDMI, 2020). ePosvet (eConsultation) (NIJZ, n.d.) was developed by IN2 d.o.o., Jesenice General Hospital and Osnovno zdravstvo Gorenjske. It enables consultation between general practitioners and medical specialists about a specific patient with the aim to reduce waiting periods and expedite the treatment process (SDMI, 2020). Mobilni zdravnik (Mobile doctor) was developed by Nova Vizija d.d. It enables sharing medicine data between a nurse and a doctor, who is not in the clinic (SDMI, 2020). 3.4 Challenges We also collected the opinions of the research participants regarding the challenges associated with telemedicine services in Slovenia. These opinions are analysed below. 3.4.1 Financing Funding was the problem most commonly highlighted by respondents. First and foremost, this is funding for telemedicine services provided by healthcare providers. The service is not paid for by Health Insurance Institute of Slovenia (ZZZS), which means that providers cannot be remunerated. It is important for service provision Ž. Rant: Telemedicine in Slovenia 93 to be financially sustainable. The process of accepting new services for funding at the national level needs to be accelerated. Other providers need to be given funding for consultations, and funding also needs to be found for measuring devices and other equipment that the patient receives for measurement purposes. The outdated information and communication equipment in hospitals is also problematic and needs to be replaced. 3.4.2 Healthcare system The respondents highlight the lack of awareness of the importance and potential of services on the part of decision-makers, and the rigidity of the healthcare system when it comes to accepting new services. The profile of the telemedicine system must be raised. Telemedicine services should be linked to national eHealth solutions. There must be cooperation between stakeholders in Slovenia. Interoperability and mobility must be ensured, standards introduced and materials standardised. There is also a lack of trust in the new communication methods. A telemedicine strategy is urgently required in Slovenia, additions must be made to the foundations of the system and to the systemic support for telemedicine and telecare, and standards put in place for the provision of services. The security aspect is also extremely important. New healthcare providers must be brought into the system. Equal access must be ensured for everyone who requires services. 3.4.3 Healthcare professionals The research highlights the lack of awareness of the importance and potential of services on the part of healthcare professionals, and the readiness of healthcare professionals to accept new services. Motivation among healthcare workers is very low and they do not see use of telemedicine as a professional challenge. Healthcare professionals are often unaware that using these services can make their work significantly easier and reduce the amount of time required to treat a patient, and that freeing up telephone lines is vital. While they find the decision to start using telemedicine a difficult one, once they overcome their resistance, they never want to go back. After the first module of the solution is used, it swiftly spreads throughout the institution or into new functionalities. Healthcare professionals are afraid that patients are able to book a specific slot in their timetable without the intervention of a nurse. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 94 4 Discussion In our analysis of the state of telemedicine services in Slovenia, we focused on an unresearched area, which meant that quantitative empirical methods could not be used. Our assessment was that a thorough analysis is the most suitable methodological approach to researching and understanding this area. Slovenia has a long telemedicine tradition stretching back to the ‘Rdeči gumb’ (Red button) system in 1992. Quite a large number of telemedicine solutions were developed (mainly as part of research projects), but not all of them remain in use. One of the reasons for this is most definitely the fact that the successful introduction of telemedicine services requires a change to business processes. (Rant, 2009) (Rant, 2010). A new service is therefore designed and then put into practice. Examples of good practice are Teletransfusion, which has been successfully in place since 2005 and enables the national remote interpretation of pre-transfusion blood tests, and the distance telemedicine monitoring of chronic heart failure and type 2 diabetes patients at the CEZAR Centre for Remote Health at Slovenj Gradec General Hospital (since 2014). The use of telemedicine services is increasing in Slovenia, which is also the result of the Covid-19 pandemic. This is also shown by the operations of the Telemedicine Centre at Ljubljana University Medical Centre, which was established during the pandemic and has provided Covid-19 patients with telemedicine treatment in cooperation with clinical departments. Scientific and professional work in the area of telemedicine has also been under way in Slovenia for quite a few years. The Slovenian Medical Informatics Society (SDMI) organised an expert conference Telemedicina – zdravje na daljavo (‘Telemedicine – Distance Health’) in Ptuj in 2010. Although members of the SDMI drew up the premises for the preparation of a national distance health strategy in 2012, no strategy has yet been forthcoming. There is scant official data on the substantive and financial benefits and weaknesses of telemedicine (Oroszy, 2020), (Rudel et al, 2016 Zdrav Vest). Telemedicine does definitely help to reduce waiting lists and times, the number of hospitalisations, the duration of hospital stays and the impact on patients, which in turn leads to savings in healthcare expenditure and increases the patient’s quality of life. They return to work sooner, which also reduces expenditure on sick leave. Instead of using up Ž. Rant: Telemedicine in Slovenia 95 resources as a result of their absence from work, the patient is able to start creating value again. These solutions also help to relieve the burden on telephone lines and therefore make doctors more accessible. Doctors are less occupied with check-ups and therefore have more time to devote to those patients who need them more. One of the main weaknesses is the funding and financial sustainability of telemedicine provision. However, moves are being made in this area as well, with the Health Insurance Institute of Slovenia (ZZZS) funding some services in 2020 and 2021. Those responsible for developing the services mention the lack of awareness of the importance and potential of telemedicine services on the part of decision-makers and healthcare professionals, and the rigidity of the healthcare system when it comes to introducing new services. Positive promotion must therefore be undertaken, particularly in terms of raising awareness and providing training for healthcare professionals, especially doctors. We have to realise that telemedicine entails a fundamental change to the way we normally treat patients. Business processes often have to be changed and completely reformulated in the face of a brand new service Doctors and other healthcare professionals who wish to become involved must also be included in the process of overhauling business processes. It seems to be valued to repeat the research after the Covid-19 pandemic. 5 Conclusion Telemedicine is a necessity and the future of the Slovenian healthcare services. It helps patients to a better quality of life and brings financial benefits to the healthcare system. Positive promotion, education and training for healthcare professionals must be undertaken. Systemic regulation is required, as is the preparation of policies, strategies and standards at national level. Financial sustainability is needed. It is also very important to take into account the security aspect, as telemedicine processes particular types of personal data. One needs to realise that information and communication technology is not enough in itself, and nor are telemedicine solutions. If a solution is to be applied successfully, business processes must be changed so that a practically useful service can arise from the solution. 96 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE References doZdravnika.si (n.d.). doZdravnika.si. Retrieved February 2, 2021, from https://www.infonet.si/produkti/dozdravnika-si/, https://www.infonet.si/en/blog/vaccination-dozdravnika/ Ekosmart (n.d.). Program Smart System of Integrated Health Care and Home Care. Retrieved February 2, 2021 from http://ekosmart.net/en/2018/06/13/ekosmart-program-presentation-at-thehope-agora-2018-in-stockholm/ European Commission (2008). Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions on telemedicine for the benefit of patients, healthcare systems and society (COM(2008)689). Retrieved January 28, 2021 from https://op.europa.eu/en/publication-detail/-/publication/4e8fb922-24ab-46f6-b1a13c3b2d93d8de/language-en Gospodar zdravja (n.d.). Retrieved January 28, 2021 from www.gospodar-zdravja.si Oroszy, D. (2020). Telemedicinski center UKC Ljubjana (T. Marčun, Ed.). Digitalni mostovi v zdravstvu, pp. 21. Oroszy D., Pustatičnik, P. (n.d.). Smart System of Integrated Health Care and Home Care. Retrieved February 2, 2021 from http://www.hope.be/wp-content/uploads/2019/06/PON-LD-11.30Oroszy.pdf Rant, Ž. (2009). Nove tehnologije prinašajo nove izzive tudi pri poslovnih procesih (V. Rajkovič, Ed.). Nove tehnologije, novi izzivi, str. 1237-1244. Kranj: Moderna organizacija. Rant, Ž. (2010). Poslovni procesi v telemedicini = Business processes in telemedicine. Informatica Medica Slovenica, Vol. 15, str. 39. Maribor: Zdravstveni dom dr. Adolfa Drolca. Rudel D, Slemenik-Pušnik C, Epšek-Lenart M, Pušnik S, Balorda Z, Lavre J. (2016). Telemedicine support to patients with chronic diseases for better long-term control at home. Zdrav Vestn. 85, str. 676–85. Nacionalni inštitut za javno zdravje - NIJZ (n.d.). eZdravje. Retrieved February 2, 2021, from https://www.ezdrav.si/ Modul PriZdravniku (n.d). Retrieved January 28, 2021 from https://www.vizija.si/medicinskainformatika/modul-prizdravniku/ SDMI, m–. (2020). Seznam telemedicinskih rešitev v slovenskem zdravstvu. Ljubljana: Slovensko društvo za medicinsko informatiko. Retrieved January 28, 2021 from https://sdmi.si/files/strokovna_srecanja/Telemedicina%20SDMI%202020.pdf SOSTOP (n.d.). Sistem za oddaljeno spremljanje in telemedicinsko obravnavo pacientov (SOSTOP). Retrieved January 28, 2021 from https://www.vizija.si/medicinska-informatika/sostop/ Storitev eVideoPosvet (n.d.). Retrieved February 1, 2021, from https://www.vizija.si/medicinskainformatika/storitev-evideoposvet/ Telefarma (n.d.). Retrieved February 9, 2021, from https://www.infonet.si/en/blog/telefarma/ Teletransfuzija. (n.d.). Retrieved February 1, 2021, from http://www.ztm.si/en/research/development-education/it--projects/telemedicine-in-bloodtransfusion/ The Fast Mode (n.d). Slovenia's Telekom Slovenije Develops Telehealth Solution to Monitor COVID19 Patients Remotely. Retrieved February 2, 2021, from https://www.thefastmode.com/services-and-innovations/16789-slovenias-telekomslovenije-develops-telehealth-solution-to-monitor-covid-19-patients-remotely STUDENTS’ SATISFACTION WITH E-LEARNING SYSTEMS DURING THE COVID-19 PANDEMIC—AN INTERNATIONAL COMPARATIVE STUDY SHAHROKH NIKOU1 & SEONGCHEOL KIM2 1 Åbo Akademi University, Faculty of Social Sciences, Business and Economics, Turku, Finland, and Stockholm University, Stockholm, Sweden; e-mail: shahrokh.nikou@abo.fi 2 Korea University, Seoul, Korea; email: hiddentrees@korea.ac.kr Abstract In response to the global COVID-19 situation, quarantine measures have been implemented at the educational institutions around the world. This paper aims to determine the antecedent factors predicting the university students’ satisfaction with e-learning systems during the COVID-19 situation. We used structural equation modelling (SEM) and evaluated a conceptual model on the basis of a sample of university students from Finland (n = 131) and South Korea (n = 114). The SEM results showed that the COVID-19 related factors, i.e., COVID19 awareness, perceived challenges during COVID-19 and the educational institutions’ preparedness indirectly influence the satisfaction with e-learning systems. Moreover, we found a statistically significant moderating effect of course design quality, and instructor’s teaching style between the COVID-19 related factors and the satisfaction with e-learning systems. The implications of these results for the management of e‐learning systems are discussed. DOI https://doi.org/10.18690/978-961-286-485-9.8 ISBN 978-961-286-485-9 Keywords: COVID-19, distance learning, e-Learning, higher education, learning management systems 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 98 1 Introduction As a result of the introduction of emerging digital technology, new possibilities for learning and teaching have emerged (Aavakare and Nikou, 2020). Higher education institutions use information and communications technology (ICT) to deliver contents for education and learning (Nikou and Aavakare, 2021). Due to COVID19 pandemic, e-learning has become an emerging paradigm of modern education once again (Arafat et al., 2020; Sun et al., 2008). E-learning relies on the use of advanced digital technologies such as learning management systems (e.g., Moodle) to deliver learning materials and educational content. Given the relatively recent situation in terms of COVID-19 pandemic worldwide, e-learning and the use of learning management systems (LMS) have become increasingly important and a natural tool for providing distance learning/education (Radha et al., 2020). Literature shows that different factors impact students’ satisfaction with e-learning systems. The factors include course design quality and instructors’ teaching style, learning style (Lu and Chiou, 2010), content and interface of e-learning (Al-Rahmi et al., 2015), instruction medium and course content (Peng and Samah, 2006). However, in relation to COVID-19, new factors such as COVID-19 awareness, perceived challenges during COVID-19 and educational institutions’ preparedness have emerged, demonstrating a significant impact on the satisfaction of students with e-learning (Alea et al., 2020; Nikou and Maslov, 2021). Since students’ satisfaction with e-learning system has a significant impact on the intention to use learning educational tools (Ramayah and Lee, 2012), the aim of this paper is to explore factors influencing the satisfaction of university students with e-learning systems. More importantly, we aim to explore factors, which are related to the COVID-19 pandemic. We argue that more research is needed to better understand the underlying impact of COVID-19 related factors in higher education. Hence, we conduct a comparative empirical research, collecting data from Finnish and South Korean university students to address this issue. The research questions guiding this study are: “in relation to the COVID-19 pandemic, what factors are associated with the students’ satisfaction with e-learning systems?” and “What are the similarities and differences between Finnish and South Korean university students in terms of their satisfaction with e-learning?” To address these RQs, we develop an integrated theoretical model that encompasses factors in S. Nikou & S. Kim: Students’ Satisfaction with e-Learning Systems During the COVID-19 Pandemic—An International Comparative Study 99 relation to COVID-19 situation and some other general factors and examine the model through structural equation modelling (SEM). 2 Literature Review and Hypotheses Development E-learning, widely employed in many educational institutions, is an activity of selflearning and a paradigm of teaching and learning to complement face-to-face learning (Aboagye et al., 2021). It facilitates active and independent learning of the learners and provides many opportunities for self-learning. Several factors such as efficiency, reliability and quality of e-learning systems (Almaiah et al., 2020), accessibility and academic issues and the learner motivation (Aboagye et al., 2021) contribute to the usage of such systems and ultimately students’ satisfaction level. Specifically, during COVID-19 pandemic where there is almost no physical presence nor social interactions between learners and instructors (Almaiah et al., 2020), the effect of such factors might become even more important. Alea et al. (2020) showed that there are multiple challenges in terms of the educational preparedness to facilitate distance and independent learning during the COVID-19. Moreover, ICT and Internet connection used by the educational institutions for e-learning may become unreliable and unable to meet the requirement for e-learning in this pandemic situation (Favale et al. 2020). Thus, instructors may have to adopt new teaching style to comply with the limitation and resections imposed by the current situation. As such, we discuss the factors associated with COVID-19 and linked to educational institutions, which are assumed to influence satisfaction with e-learning systems. 2.1 Instructors’ Teaching Style In the higher education, the instructors’ teaching style is considered to be central in the success of the e-learning education. Al-Busaidi and Al-Shihi (2010, p. 1) argued that the success of e-learning relies on the instructors’ acceptance of the learning management systems, which in turns promotes learners to use LMSs. Moreover, Volery and Lord (2000) argued that, for the students’ satisfaction with e-learning systems, instructors must have several competences such as a good control over IT used for teaching and learning as well as to possess sufficient technical abilities to solve potential students’ IT-related technical issues. Moreover, an instructor is 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 100 required to adopt interactive teaching style and encourage students to interact with their peers, hence, we make a hypothesis that: H1: Instructors’ teaching style has a positive effect on the students’ satisfaction with e-learning systems 2.2 Course Design Quality The quality of the course design depends on what is involved in the course, such as course data, educational goals, course layout (Wrigh, 2003). It has been found that course design quality might influence the satisfaction with the e-learning systems (Martín-Rodríguez et al., 2015). Liu and Chu (2010) argued that design quality can be used as a measure of the information quality and the course content quality. Moreover, Uppal et al. (2018) and Garavan et al. (2010) showed that the supportiveness of the overall service, information quality, system quality, content quality and learner support are different aspects of e-learning quality; thus, impacting the use of and the satisfaction with e-learning systems. Hence, we make a hypothesis that: H2: Course design quality has a positive effect on the students’ satisfaction with e-learning systems 2.3 COVID-19 Related Factors Alea et al. (2020) examined the perception of teachers about the preparedness and challenges faced by higher education institutions when e-learning is implemented and found several antecedent factors including (i) COVID-19 awareness, (ii) the educational institutions preparedness to conduct distance learning, and (iii) perceived challenges during COVID-19 in distance learning education. In this study, based on literature discussions provided earlier, and following the recent study conducted by Alea et al. (2020), we use all three COVID-19 related constructs to examine the students’ satisfaction with e-learning systems. In addition, in higher education, factors associated with COVID-19 are understood both as factors associated with the individual’s background, requiring one to engage solely in distant e-learning, and as intermediate factors that affect how the e-learning process is conducted. Thus, we include other factors such as (i) instructors’ teaching style and (ii) course design quality in our proposed conceptual model. Hence, we make the following hypotheses that: S. Nikou & S. Kim: Students’ Satisfaction with e-Learning Systems During the COVID-19 Pandemic—An International Comparative Study 101 H3a: COVID-19 awareness has a positive effect on the instructors’ teaching style H3b: COVID-19 awareness has a positive effect on the course design quality H4a: Perceived challenges during COVID-19 has a negative effect on the instructors’ teaching style H4b: Perceived challenges during COVID-19 has a negative effect on the course design quality H5a: The educational institutions’ preparedness has a positive effect on the instructors’ teaching style H5b: The educational institutions’ preparedness has a positive effect on the course design quality However, in all the above stated hypotheses and as a null hypothesis, we assume that there is no difference between Finnish and South Korean students in any of the measured factors/constructs. 2.4 Satisfaction with e-Learning Systems Student–student interaction, effective support, learning materials, teaching style, education and learning environment all can influence students’ satisfaction with elearning systems (Benigno and Trentin, 2000). Moreover, Almaiah et al. (2020), asserted that the provision and usage of online learning materials in e-learning system becomes the main challenge for many universities during COVID-19 pandemic. The authors further demonstrate that, there are four general challenges in relation to the use of e-learning systems and students’ performance and consequently their satisfaction: technological challenges, individual challenges, cultural challenges and course challenges. In our proposed conceptual model, students’ satisfaction with elearning systems is the dependent variable (see Figure 1). 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 102 Figure 1: Conceptual Model. 3 Research Methodology 3.1 Data Collection and Instrument This is an international comparative study and we collected data from Finland and South Korea. The main reason for selecting these two countries is due to the fact that they are frontrunner in using digital technology in their educational systems, in addition to many other similarities in the use of advanced technologies and digital infrastructures (Jang et al., 2021). We collected data only from university students, two university from Finland and one university from South Korea. Students were from difference subjects such as social sciences and natural sciences. The Finnish data was collected in August 2020 (n = 131) and The Korean data was collected in January 2021 (n = 114). We used an online survey to collect data from both countries. All survey items were derived from validated measures supported by literature. The items have been slightly changed to fit the study context, if needed. Items for measuring COVID-19 awareness (three items), perceived challenges during COVID-19 (four items) and educational institutions preparedness to conduct distance learning (six items) all were derived from Alea et al. (2020, p. 134-136). Items for measuring course design quality (3 items) and instructors’ teaching style (4 items) were derived from Wright (2003). Finally, items for measuring students’ satisfaction with e-learning (four items) were derived from Arbaugh (2000, p. 41). S. Nikou & S. Kim: Students’ Satisfaction with e-Learning Systems During the COVID-19 Pandemic—An International Comparative Study 4 Results 4.1 Descriptive Results 103 The average age of the respondents was 25.8 years-old for the Finnish sample (26.55 years-old for the South Korean sample). In the Finnish sample, there were 73 females and 56 males, and two students preferred not to indicate their gender. In the South Korean sample there were 69 females and 45 males. The use of e-learning systems in the Finnish sample was (< 1 a year n = 61), (1-3 years n = 37), and (> three years n = 32) and one student indicated never used it, whereas the use of elearning systems in the South Korean sample was (< a year n = 31), (1-3 years n = 51), and (> three years n = 32). We used PLS-SEM to assess the path relationships proposed in our research model. PLS-SEM results showed that all factor loadings (except for few items) were above the recommended value of .70. In total, we used 24 items to measure the six constructs and retained 19 items for further analysis. All internal reliability and validity assessments such as Cronbach’s alpha (α), Composite Reliability (CR) and the Average Variance Extracted (AVE) for all constructs were consistent with the recommended threshold values of .70, .70 and .50, respectively (Hair et al., 2019). However, the observed slightly low value of Cronbach’s alpha (α) for COVID-19 awareness (.61). However, as Cronbach’s alpha is a very conservative test, the CR value should instead be used to assess the internal reliability. The result showed the CR value for the COVID-19 awareness satisfied the recommend value, thus we establish the internal validity for this construct. The lowest value of CR was for COVID-19 awareness (.80) and the highest for satisfaction with e-learning systems (.93). Regarding the AVE values for the constructs, the lowest value was .66 and the highest was .80, see Table 1. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 104 Table 1: Descriptive Statistics Construct COVID-19 awareness Instructors’ teaching style Course design quality Perceived challenges during COVID-19 Educational institutions preparedness Satisfaction with elearning 4.2 Items CVID2 CVID3 ITS2 ITS3 ITS4 CDES1 CDES2 CDES3 PCHA2 PCHA3 PCHA4 PEIP2 PEIP3 PEIP4 PEIP5 PEIP6 ESAT2 ESAT3 ESAT4 Loadin g .82 .81 .86 .77 .84 .84 .90 .83 .79 .88 .72 .88 .86 .81 .77 .75 .91 .92 .86 Mean 6.73 6.48 4.42 4.88 4.45 4.91 4.79 4.1 4.81 4.82 5.18 4.59 4.81 4.91 4.77 4.6 3.98 3.71 3.42 Std. .80 1.01 1.58 1.48 1.63 1.74 1.47 1.66 1.79 1.95 1.85 1.74 1.66 1.67 1.72 1.74 1.83 1.87 1.84 α CR AVE .61 .80 .66 .76 .86 .68 .82 .89 .74 .72 .84 .64 .88 .91 .67 .88 .93 .80 Convergent validity and discriminant validity We also assessed the convergent validity to make sure that all measures within each construct which are theoretically expected to relate to one another, were in fact related to each other. Regarding the convergent validity, the values of average variance extracted (AVE) were used to establish the convergent validity in this research. As shown in Table 2, all the AVE values were above the recommended threshold of .50. As per discriminant validity assessment to establish that a construct is different from other constructs, we used the Fornell Larcker criterion. As such, we assessed the AVE scores, all values were lower than the shared variance for all model constructs, see Table 2. Therefore, the discriminant validity was established in this research based on Fornell Larcker criterion (Fornell and Larcker 1981). S. Nikou & S. Kim: Students’ Satisfaction with e-Learning Systems During the COVID-19 Pandemic—An International Comparative Study 105 Table 2: Discriminant Validity COVID-19 awareness Course design qualiy Instructors' teaching style Perceived challenges during COVID-19 Educational institutions preparedness Satisfaction with e-learning 4.3 CVID .813 CDES ITS PCHA .270 .857 .230 .083 PEIP .570 -.189 .823 -.211 .798 .229 .559 .535 -.129 .817 .218 .549 .462 -.404 .426 ESAT .897 Structural Results It should be mentioned that when we report on the structural results, values for the South Korean sample are illustrated in the bracket. The SEM results showed that the satisfaction with e-learning systems was explained by variance of 28% for the Finnish sample [45% South Korean sample], followed by instructors’ teaching style 26% for the Finnish sample [56% South Korean sample] and course design quality 39% for the Finnish sample [34% South Korean sample], see Figure 2. According the SEM results, we found that both (i) the instructors’ teaching style (β = .19; t = 2.381; p = .005 [β = .24; t = 3.101; p = .005]) and (ii) course design quality (β = .40; t = 4.693; p = .001 [β = .52; t = 6.404; p = .001]) significantly impact the satisfaction with e-learning; thus H1 and H2 were supported by the model and we did not find any differences between two samples. Moreover, the results showed that while COVID-19 awareness had no significant effect on the instructors’ teaching style for both samples; thus, rejecting H3a by the model, it had a significant effect on the course design quality (β = .17; t = 1.997; p = .005 [β = .19; t = 3.110; p = .001]) for both sample; thus, supporting the H3b. Unlike our expectations, perceived challenges during COVID19 negatively impact both instructors’ teaching style (β = -.17; t = 2.224; p = .005) and course design quality (β = -.19; t = 2.537; p = .005) for the Finnish sample only; therefore, H4a and H4b were both rejected by the model. Finally, perceived educational institutions preparedness directly and positively influenced both the instructors’ teaching style 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 106 (β = .40; t = 3.884; p = .001 [β = .69; t = 13.191; p = .001]) and course design quality (β = .51; t = 6.647; p = .001 [β = .50; t = 5.847; p = .001]); thus, supporting the H5a and H5b. Figure 2: Structural model results (Korean results are presented in the brackets and bold) We also examined the model to see if the instructors’ teaching style and course design quality mediate the paths between COVID-19 related factors to satisfaction with e-learning systems. The mediation test results revealed interesting results. For example, we found that the path between the perceived educational institutions preparedness to satisfaction with e-learning systems was partially mediated by both instructors’ teaching style and course design quality for both samples. Also, we found that the path between perceived challenges during the COVID-19 to satisfaction with e-learning was partially mediated by the course design quality for the Finnish sample. For the South Korean sample, the path between COVID-19 awareness to satisfaction with e-learning systems was partially mediated by the course design quality. 5 Discussions According the SEM results, we could conclude that both intermediate factors (instructors’ teaching style and course design quality) that affect how the e-learning process is conducted impact both the Finnish and the South Korean students in a similar manner. This finding indicates, although, we found different results when we examined the impact COVID-19 related factor, for both groups these factors are considered to be important elements of the satisfaction with e-learning systems. Moreover, we also found that, for both groups of students, the effect of COVID- S. Nikou & S. Kim: Students’ Satisfaction with e-Learning Systems During the COVID-19 Pandemic—An International Comparative Study 107 19 awareness to instructor’s teaching style is not significant. In fact, the effect of this factor was only significant to the course design quality. Nonetheless, through the mediation test, we found that the effect of COVID-19 awareness to satisfaction with e-learning is indirect and mediated through course design quality. The SEM results show that the effect of perceived educational institutions preparedness to both instructors’ teaching style and course design quality is significant and positive for both groups of students. This is rather important finding, because it shows the importance of the educational institutions and their readiness to provide distance education during the COVID-19. Finally, the effect of perceived challenges during COVID-19 to instructors’ teaching style and course design quality was significant only for the Finnish sample. This is rather surprising, as it indicates that for the South Koran sample all COVID-19 related factors such as perceived challenges during the COVID-19 were not important. However, intermediate factors, e.g. educational institutions preparedness deems to be important and significant, as it had the strongest effect on the instructors’ teaching style and course design quality effect. 6 Conclusion and Limitations This paper investigates factors that impact students’ satisfaction with e-learning systems during the lockdown of the COVID-19 pandemic. We theoretically contribute to literature in threefold manners. First, we develop and empirically investigate an integrated theoretical model, where not only conventional factors (e.g. instructors teaching style) are incorporated into the model, but also a more contextual related factors in relation to the COVID-19 situation are conceptualised in the model. The results show that contextual factors may directly or indirectly impact students’ satisfaction with e-learning systems. Second, by conducting an international comparative research, we contribute to literature by showing different perceptions towards COVID-19 related factors between the Finnish and the South Korean students and how these factors impact their satisfaction with e-learning systems. For instance, for the Finnish students perceived challenges during the COVID-19 is considered to be important but the effect is negative on both instructors’ teaching style and course design quality. Also, for the South Korean sample, the school readiness to facilitate the distance learning is considered to be positively associated with both instructors’ teaching style and course design quality. Thirdly, regardless of the importance of technology in education, the educational 108 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE institutions preparedness to implement and execute e-learning played a central role in boosting students’ satisfaction with e-learning systems. From a more practical standpoint, the results provide useful and new insights for decision-makers at the educational institutions on how advanced learning tools (e.g. LMS) can be used to conduct distance learning and e-learning, while taking contextual factors into account. This is important, because online courses have been available to some extent in both Finnish and South Korean universities. However, due to COVID-19 circumstances it is inevitable that most lectures should be given online. Therefore, it is recommended that educational institutions should have additional efforts and measures to enhance students’ satisfaction with e-learning. There are some limitations in this paper too. For example, all participants selfreported that they were students at the time the data was collected, and we were unable to verify this issue as the survey was conducted online. Also, we only collected data from students; however, we believe that teachers’ perceptions must also be further studied. Finally, we cannot claim that the results can be generalised and might be applicable only to context of this research. References Aavakare, M., & Nikou, S. (2020). Challenging the Concept of Digital Nativeness–Through the Assessment of Information Literacy and Digital Literacy. In International Conference on WellBeing in the Information Society (pp. 211-225). Springer, Cham. Aboagye, E., Yawson, J. A., & Appiah, K. N. (2021). COVID-19 and E-learning: The challenges of students in tertiary institutions. Social Education Research, 1-8. Al-Busaidi, K. A., & Al-Shihi, H. (2010). Instructors' acceptance of learning management systems: A theoretical framework. Communications of the IBIMA, 2010, 1-10. Al-Rahmi, W. M., Othman, M. S., & Yusuf, L. M. (2015). Exploring the factors that affect student satisfaction through using e-learning in Malaysian higher education institutions. Mediterranean Journal of Social Sciences, 6(4), 299. Alea, L. A., Fabrea, M. F., Roldan, R. D. A., & Farooqi, A. Z. (2020). Teachers’ Covid-19 Awareness, Distance Learning Education Experiences and Perceptions towards Institutional Readiness and Challenges. International Journal of Learning, Teaching and Educational Research, 19 (6), 127-144. Almaiah, M. A., Al-Khasawneh, A., & Althunibat, A. (2020). Exploring the critical challenges and factors influencing the E-learning system usage during COVID-19 pandemic. Education and Information Technologies, 25, 5261-5280. Arafat, S., Aljohani, N., Abbasi, R., Hussain, A., & Lytras, M. (2019). Connections between e-learning, web science, cognitive computation and social sensing, and their relevance to learning analytics: A preliminary study. Computers in Human Behaviour, 92, 478-486. Arbaugh, J.B. (2000). Virtual classroom characteristics and student satisfaction with internet-based MBA courses. Journal of management education, 24(1), 32-54. S. Nikou & S. Kim: Students’ Satisfaction with e-Learning Systems During the COVID-19 Pandemic—An International Comparative Study 109 Benigno, V., & Trentin, G. (2000). The evaluation of online courses. Journal of computer assisted learning, 16(3), 259-270. Favale, T., Soro, F., Trevisan, M., Drago, I., & Mellia. M. (2020). Campus traffic and e-Learning during COVID-19 pandemic. Computer Networks, 176, 107290. Fornell, C. G., & D. F. Larcker. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50. Garavan, T. N., Carbery, R., O’Malley, G., & O’Donnell, D. (2010). Understanding participation in e‐ learning in organisations: a large‐scale empirical study of employees. International Journal of Training and Development, 14(3), 155-168. Hair, J. F., Risher, J. J., Sarstedt, M., & Ringle. C. M. (2019). When to use and how to report the results of PLS-SEM. European Business Review, 31(1), 2-24. Jang, M., Aavakare, M., Nikou, S., & Kim, S. (2021). The impact of literacy on intention to use digital technology for learning: A comparative study of Korea and Finland. Telecommunications Policy, 102154. https://doi.org/10.1016/j.telpol.2021.102154. Liu, T. Y., & Chu, Y. L. (2010). Using ubiquitous games in an English listening and speaking course: Impact on learning outcomes and motivation. Computers & Education, 55(2), 630-643. Lu, H. P., & Chiou, M. J. (2010). The impact of individual differences on e‐learning system satisfaction: A contingency approach. British Journal of Educational Technology, 41(2), 307-323. Martín-Rodríguez, Ó., Fernández-Molina, J. C., Montero-Alonso, M. Á., & González-Gómez, F. (2015). The main components of satisfaction with e-learning. Technology, Pedagogy and Education, 24(2), 267-277. Nikou, S., & Aavakare, M. (2021). An assessment of the interplay between literacy and digital technology in higher education. Education and Information Technologies, 1-23. https://doi.org/10.1007/s10639-021-10451-0. Nikou, S., & Maslov, I. (2021). An analysis of students' perspectives on e-learning participation–the case of COVID-19 pandemic. The International Journal of Information and Learning Technology. https://doi.org/10.1108/IJILT-12-2020-0220. Peng, P. J., & Samah, A. (2006). Measuring students' satisfaction for quality education in e-learning university. Unitar E Journal, 2 (1), 11–21. Radha, R., Mahalakshmi, K., Kumar, V. S., & Saravanakumar, A. R. (2020). E-learning during lockdown of Covid-19 pandemic: a global perspective. International Journal of Control and Automation, 13(4), 1088-1099. Ramayah, T. and Lee, J.W.C. (2012). System characteristics, satisfaction and e-learning usage: a structural equation model (SEM). Turkish Online Journal of Educational Technology-TOJET, 11(2), pp.196-206. Sun, P. C., Tsai, R. J., Finger, G., Chen, Y. Y., & Yeh, D. (2008). What drives a successful e-Learning? An empirical investigation of the critical factors influencing learner satisfaction. Computers & Education, 50(4), 1183-1202. Uppal, M. A., Ali, S., & Gullive, S. R. (2018). Factors determining e‐learning service quality. British Journal of Educational Technology, 49(3), 412-426. Volery, T., & Lord, D. (2000). Critical success factors in online education. International Journal of Educational Management, 14(5), 216-223. Wright, C. R. (2003). Criteria for evaluating the quality of online courses. Alberta Distance Education and Training Association, 16(2), 185-200. 110 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE LINKING IT ASSETS AND COMPETITIVE ADVANTAGE - IT CAPABILITIES OF SERVITIZED BUSINESS MODELS CHRISTOPH BROSIG,1 MARKUS WESTNER1 & SUSANNE STRAHRINGER2 1 OTH Regensburg, Faculty of Computer Science and Mathematics, Regensburg, Germany; email: christoph.brosig@oth-regensburg.de, markus.westner@othregensburg.de 2 TU Dresden, Chair of Business Informatics esp. Information Systems in Trade and Industry, Dresden, Germany; email: susanne.strahringer@tu-dresden.de Abstract This paper connects research from business model innovation and information systems by exploring critical IT capabilities for servitized business models. The adoption of servitized business models is a major business model innovation strategy. At the same time, digitalization drives the evolution of IT capabilities at these business models. Scholars argue that it remains unclear how IT capabilities enable servitized business models to build a competitive advantage by achieving cost advantages or differentiation. This paper explores IT capabilities that enable building a competitive advantage for servitized business models based on a qualitative analysis of multiple published case studies. The authors identify configurations of IT capabilities among servitized business models. The findings contribute to servitization research by exploring IT capabilities and how they are combined among servitized business models. The insights help practitioners deploy digital technologies and IT assets effectively as building blocks of IT capabilities to advance their servitized business model. DOI https://doi.org/10.18690/978-961-286-485-9.9 ISBN 978-961-286-485-9 Keywords: resource-based view, IT capability, digital servitization, competitive advantage 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 112 1 Introduction Since the 1980s, firms move from selling products to offering products as a service (Ulaga and Reinartz, 2011; Vandermerwe and Rada, 1988). Firms pursue this servitization of their business models to improve their competitive advantage (Kindström, 2010; Paschou et al., 2020). Nowadays, digital technologies and information technology (IT) assets offer new levers to build a competitive advantage for servitized business models (Kohtamäki et al., 2019; Rapaccini and Gaiardelli, 2015). Multiple scholars have explored specific digital technologies and IT assets for digital servitization (Paschou et al., 2020). The resource-based view suggests that firms need to create IT capabilities to build a competitive advantage based on IT assets (Ross et al., 1996). Despite the increasing number of publications on digital servitization, scholars claim that there is a limited understanding of which IT capabilities enable servitized business models to build a competitive advantage (Coreynen et al., 2017; Grubic and Jennions, 2018). Scholars ask for contributions on how IT capabilities enable different types of competitive advantage (Kohtamäki et al., 2019; Paschou et al., 2020). We contribute to this discussion by a qualitative analysis of 17 published cases of servitized business models answering two research questions (RQ): RQ1: Which IT capabilities enable servitized business models to build a competitive advantage? RQ2: How do IT capabilities enable servitized business models to build a competitive advantage? Our paper is structured along three main parts to address these two questions. First, we introduce digital servitization and the concept of IT capabilities (section 2). Section 3 describes our case selection and case analysis. Section 4 presents our findings on IT capabilities (RQ1) and configurations of how IT capabilities enable competitive advantages at servitized business models (RQ2). Finally, we discuss our findings and conclude our research. C. Brosig, M. Westner &S. Strahringer: Linking IT Assets and Competitive Advantage - IT Capabilities of Servitized Business Models 113 This paper contributes to business model innovation and information systems (IS) research based on a qualitative analysis of multiple cases. Our paper contributes to the sparse research on IT capabilities of servitized business models and shows their role in building a competitive advantage. 2 Research Background Servitization describes the transition of a business model from being product-centric to being service-centric (Vandermerwe and Rada, 1988). While product-centric business models focus on the sales of products, service-centric business models employ products to deliver outcomes as a service (Reim et al., 2015). Scholars suggest mapping business models along a continuum of product- to service-centric (Reim et al., 2015). Digital technologies offer new levers to build a competitive advantage for a business model undergoing servitization (Kohtamäki et al., 2019). Scholars have introduced digital servitization to label the service transition of a business model enabled by digital technologies (Rapaccini and Gaiardelli, 2015). For such a transition, it is critical to understand how digital technologies and IT assets enable a competitive advantage. The resource-based view offers an explanation based on the notion of assets and capabilities. Firms invest in assets and create capabilities to employ these assets to build a competitive advantage. The concept of capabilities links assets and competitive advantage (Grant, 1991). An IT capability describes the ability to employ IT assets to support and enhance a firm’s strategy or work processes to build a competitive advantage (Lu and Ramamurthy, 2011; Ross et al., 1996). This competitive advantage can be a cost advantage or differentiation (Porter, 1985). Scholars distinguish IT capabilities employing various IT assets. There are three types of IT assets: Tangible IT assets include, e.g., hardware, software, or data assets. Intangible IT assets refer to, e.g., IT management practices. Human IT assets are, e.g., specific IT skills (Ross et al., 1996). Over the last years, scholars have introduced digital capabilities as types of IT capabilities (Côrte-Real et al., 2020; Krishnamoorthi and Mathew, 2018). Digital capabilities employ stacks of IT assets as digital technologies to support and enhance 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 114 a firm’s strategy or work processes to build a competitive advantage (Brosig et al., 2020). In this study, we refer to the overarching concept of IT capabilities to cover the range of IT assets. 3 Research Methodology In this section, we describe the data selection and data analysis of our case-based approach. We decided to analyze published case studies about servitized business models due to the early stage of this research stream (Yin, 2014). First, we set up a case base. We searched seven literature databases and selected case studies in a two-step approach. Figure 1 summarizes the search parameters and the screening stages of contributions for our case base. Figure 1: Overview of case study search and screening We adopted our search terms from three extensive servitization literature reviews and chose the consistently used terms (Baines et al., 2017; Kowalkowski et al., 2017; Rabetino et al., 2018) searching in title, abstract, and keywords. We restricted our search to contributions from 2015 until 2020 (time of data collection), as most servitization literature associated with digitally-enabled service transition was published since then (Paschou et al., 2020). Before we screened the data, we chose three screening criteria, whether the contribution (1) is based on a case study (singleor multiple-case studies), (2) indicates competitive advantage of the case firm, and (3) provides information about the employment of IT assets in the case context linked to the competitive advantage. We obtained 17 cases from 15 contributions. Table 1 shows our case base, including reference, name of the case firm as stated in the original reference, industry, and the respective customer group. C. Brosig, M. Westner &S. Strahringer: Linking IT Assets and Competitive Advantage - IT Capabilities of Servitized Business Models 115 Table 1: Overview of the case base Case ID Reference Case name Industry [1] [2] [3] [4] [5] [6] [7] Lim et al. (2015) Beltagui (2018) Chen and Møller (2019) Niño et al. (2015) Saarikko (2015) Bressanelli et al. (2018) Robinson et al. (2016) Car manufacturer Power systems provider Farming equipment provider Chemical equipment provider Telecommunication Household appliances provider Construction provider [8] [9] [10] [11] [12] Sklyar et al. (2019) Reim et al. (2016) Rapaccini et al. (2019) Dalenogare et al. (2019) Weeks and Benade (2015) Clegg et al. (2017) Coreynen et al. (2017) Rymaszewska et al. (2017) Rymaszewska et al. (2017) Rymaszewska et al. (2017) undisclosed Eng. Co. undisclosed undisclosed DigitalCo Alpha Laing O’Rourke Navicula Alpha Alfa undisclosed undisclosed Customer Group B2B/B2C B2B B2B B2B B2B B2C B2B Maritime equipment provider Construction machinery provider Building Equipment Provider Building Equipment Provider Building Equipment Provider B2B B2B B2B B2B B2B Coen Beta Company A B2B B2B B2B Company B Construction Electronic Switchboards Provider Manufacturing Machinery Provider Power Generators Provider Company C Power Transformers Provider B2B [13] [14] [15] [16] [17] B2B We followed the resource-based view for our analysis: first, we coded IT assets among the cases with an open coding approach (Corbin and Strauss, 2015). Second, we analyzed how case firms employ these IT assets to build a competitive advantage, individually or as stacks. As a result, we linked IT assets and competitive advantage by IT capabilities (RQ1). Next, we analyzed configurations of IT capabilities to understand how IT capabilities enable servitized business models to build a competitive advantage (RQ2). 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 116 4 Results In this section, we present three IT capabilities of servitized business models and configurations of how these IT capabilities enable a competitive advantage. For each IT capability, we introduce three examples from our cases. An overview of all examples across our cases can be obtained from the authors. 4.1 IT Capability to Connect the Value Chain The first IT capability employs IT assets to connect the value chain to achieve cost advantages. Table 2 shows three examples based on our cases. Table 2: Selected cases with IT capability to connect the value chain Case ID Observed IT Assets Employment of IT Assets to Generate Competitive Advantage 2  Engine usage data (tangible IT asset)  Virtual engine testing models (tangible IT asset)  Connect value chain (from maintenance delivery to product development) to reduce the efforts to resolve technical malfunctions by virtual engine simulation with engine usage data  Cloud-based management accounting system accessible to service network partners (tangible IT asset)  Connect value chain (accounting) among service partners to uncover costs across the service network and eliminate them 10 Competitive Advantage Cost advantage  Connect value chain (inventory management) with suppliers to ensure availability of materials to avoid project delays at additional costs Cases showing same IT capability [Case IDs]: [2, 6, 7, 9, 10, 11, 12, 13] 13  Inventory management system externally accessible to suppliers (tangible IT asset) Case firms use primarily tangible IT assets, e.g., software systems, to distribute information internally along their value chain, e.g., from maintenance operations to product development or from maintenance operations to spare parts handling. Some case firms offer integration points to external stakeholders, like suppliers or service partners, to connect to their value chains. This connection enables efficient orchestration of processes, e.g., product development or maintenance delivery, and (human) resources, e.g., available maintenance technicians or spare parts. Case firms achieve cost advantages as a competitive advantage from this IT capability. C. Brosig, M. Westner &S. Strahringer: Linking IT Assets and Competitive Advantage - IT Capabilities of Servitized Business Models 4.2 117 IT Capability to Connect Products The second IT capability employs IT assets to connect products to differentiate by value-adding services. Case firms introduce tangible IT assets, e.g., productintegrated sensors, data transmission devices, or software systems to access connected products remotely. Table 3 shows three examples from our cases. Table 3: Selected cases with IT capability to connect products Case ID 3 Observed IT Assets Employment of IT Assets to Generate Competitive Advantage  Software farm management system to connect to farm components (tangible IT asset)  Connect products (farm components to farm management software) to enable digital farm monitoring as an additional service  Software developers, user interface experts, and user experience experts to build software system (human IT asset) 8  Customer portal to manage condition data of maritime vessels and to access 3rd party maritime software (tangible IT asset)  Vessel condition data (tangible IT asset) Competitive Advantage Differentiation by valueadding services  Connect products to enable monitoring of condition data for onshore operations of maritime vessels and to offer 3rd party software access as services  3rd party maritime software (tangible IT asset) 17  Logging device for power transformer data with internet connection (tangible IT asset)  Connect products to enable access to power transformer operations metrics to offer usebased advisory to prolong lifecycle  Usage and operational fault data of power transformers (tangible IT asset) Cases showing same IT capability [Case IDs]: [1, 2, 3, 4, 5, 6, 7, 8, 9, 14, 15, 16, 17] Some cases explicitly mention the employment of human IT assets for this IT capability, e.g., IT skills to integrate sensors into products or skills to develop and deploy code for respective software systems. These IT assets make products connected to offer value-adding services, e.g., remote monitoring, remote maintenance, or use-based advisory. Case firms offer these value-adding services to differentiate as a competitive advantage. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 118 4.3 IT Capability to Interconnect Value Chain and Products The third IT capability employs IT assets to interconnect a value chain and products. This interconnection enables differentiation by performance-based contracts. This IT capability is the ability to employ integration points - between value chain and products - as IT assets to build a competitive advantage. Table 4 offers an outline of three examples from our cases. Table 4: Selected cases with IT capability to interconnect value chain and products Case ID 6 Observed IT Assets Employment of IT Assets to Generate Competitive Advantage  IoT device in washing machines to extract and send data to the provider (tangible IT asset)  Interconnect connected products (usage data) with the value chain (contract monitoring) to operate performance-based contracts  Washing machine usage data (tangible IT asset) Competitive Advantage Differentiation by performancebased contracts  Data analytics tools to detect careless usage of product (tangible IT asset) 9  IoT device in building equipment to extract and send data to the provider (tangible IT asset)  Building equipment condition data (tangible IT asset)  Software systems on availability of maintenance services and spare parts (tangible IT asset) 15  IoT device in machine to extract sensor data and send to the provider (tangible IT asset)  Machine usage and performance data (tangible IT asset)  Integration of connected products (condition data indicating maintenance needs) with the value chain (service systems and inventory data) to schedule maintenance delivery for performance-based contracts  Interconnect connected products (usage/performance data) with the value chain (service organization) for remote support in performance-based contracts  Cloud-based platform to access machine data for service organization (tangible IT asset) Cases showing same IT capability [Case IDs]: [2, 6, 7, 9, 10, 11, 12, 13] Case firms link product data to value chain information. Several firms connect their products to monitor product condition and usage data, as covered in section 4.2. In distinction, this IT capability focuses on the link of such product data to the providers’ value chains, e.g., to anticipate product failure. Firms displaying this IT capability distribute the product data as information along the value chain, e.g., to activate maintenance provision. Interconnecting product data with value chain C. Brosig, M. Westner &S. Strahringer: Linking IT Assets and Competitive Advantage - IT Capabilities of Servitized Business Models 119 information is critical to achieving agreed performance levels of products as a service. 4.4 Configurations of IT Capabilities Among Servitized Business Models We analyzed how the three IT capabilities are distributed in our case firms and found case evidence for four out of eight possible combinations. We refer to each combination as a configuration where each of the IT capabilities is present or absent. Figure 2 shows an overview of these configurations and associated cases. Figure 2: Overview of configurations of IT capabilities among servitized business models We found case evidence for configurations B, C, G, and H, but not for A, D, E, and F. The case evidence supports how configurations of IT capabilities enable servitized business models to build competitive advantage. The IT capability to connect products could be a sufficient IT capability for firms to build a competitive advantage, as shown in the configurations C, G, and H. Still, due to the lack of evidence for configuration D, this cannot be confirmed. The IT capability to connect the value chain is present both individually (configuration B) or in combination with other IT capabilities (configuration H). In contrast, the IT capability to interconnect value chain and products is only present in combination with other IT capabilities (configurations G, H), in particular with the IT capability to connect products. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 120 5 Discussion In this section, we discuss our findings in comparison to existing literature. Our study makes two contributions: we identify IT capabilities for servitized business models (RQ1), and we find configurations of IT capabilities that enable servitized business models to build a competitive advantage (RQ2). We find three IT capabilities among servitized business models that employ IT assets, (1) the IT capability to connect the value chain to achieve cost advantages, (2) the IT capability to connect products to achieve differentiation, (3) the IT capability to interconnect the value chain and products to achieve differentiation. Our study confirms the importance of IT capabilities in linking IT assets with competitive advantage: case firms employ different IT assets to build a similar competitive advantage. Some case firms employ similar stacks of IT assets to build different competitive advantages. IT capabilities help to understand these equifinal ways how IT assets contribute to building a competitive advantage. We show configurations of IT capabilities among our case firms. Configuration B includes case firms focusing on the IT capability to connect the value chain to streamline processes and resources. This configuration is similar to the nature of capabilities of product-oriented business models striving for efficient processes (Kohtamäki et al., 2019; Reim et al., 2015; Ulaga and Reinartz, 2011). Configuration C is based on the presence of the IT capability to connect products. Case firms with configuration C offer their services to support the use of the product: services integrate with the product in use. Case firms with configuration C are similar to usebased solution providers with services as an integral part of their offering to maximize product efficiency for the customer (Kohtamäki et al., 2019; Ulaga and Reinartz, 2011). Configurations G and H include configurations of IT capabilities with the IT capability to interconnect value chain and products. Case firms with these configurations differentiate at least by offering product performance as a service. Literature labels similar business models as result-oriented or outcome providers (Kohtamäki et al., 2019; Reim et al., 2015). C. Brosig, M. Westner &S. Strahringer: Linking IT Assets and Competitive Advantage - IT Capabilities of Servitized Business Models 121 We do not observe configurations A, D, E, and F in our cases. Configuration A is not to be found due to our initial case selection. It would not have contributed to clarifying the IT capabilities of servitized business models. The lack of case evidence for configurations E and F could indicate that the IT capability to interconnect value chain and products is dependent on the IT capability to connect products. Thus, it could be that configurations E and F are theoretically not possible. In contrast to configurations A, E, and F, configuration D could be available among cases beyond our case base. Based on our insights on configurations of IT capabilities, we derive the assumption that specific configurations of IT capabilities support specific types of servitized business models along the continuum from product- to service-centric. 6 Conclusion Our paper helps answer the call for interdisciplinary research at the frontier of business model innovation and IS research (Kohtamäki et al., 2019; Paschou et al., 2020). Section 4 provides an overview of three IT capabilities at servitized business models, (1) the IT capability to connect the value chain, (2) the IT capability to connect products, and (3) the IT capability to interconnect value chain and products (RQ1). We find five configurations of how IT capabilities enable building competitive advantage from rather product- to service-centric servitized business models (RQ2). Practitioners profit from our synthesis of business model innovation and IS research by obtaining transparency about IT capabilities for servitized business models (Baines et al., 2017). Our configurations of IT capabilities offer starting points to invest in assets that may be used to build a competitive advantage. From our case evidence, practitioners also learn that individual IT assets per se do not build a competitive advantage for servitized business models (cf. (Wiener et al., 2020)). Our study is not free from limitations: first, to ensure external validity, we collected cases from multiple research fields. Most cases cover the B2B area, consistent with previous servitization research (Paschou et al., 2020). Therefore, our findings may not be generalizable to the B2C area. Second, we sampled cases from fields where IT capabilities are not the primary research contribution. In some cases, the selected 122 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE cases may not exhaustively cover all IT capabilities of a servitized business model. We decided to mitigate this risk by sampling a broad set of cases to cover contributions from multiple perspectives. For future research, we propose further analyses of IT capabilities for servitized business models. Researchers should continue to analyze how IT capabilities differ among different types of servitized business models along the continuum from product- to service-centric. Researchers could use our hypothesis as a starting assumption. For their analyses, they could apply a configurational approach as IT capabilities of servitized business models appear to create equifinal links between IT assets and competitive advantage. References Baines, T., Bigdeli, A. Z., Bustinza, O. F., Shi, V. G., Baldwin, J. S., & Ridgway, K. (2017). Servitization: Revisiting the State-of-the-Art and Research Priorities. International Journal of Operations & Production Management, 37 (2), 256-278. Beltagui, A. (2018). A Design-Thinking Perspective on Capability Development. International Journal of Operations & Production Management, 38 (4), 1041-1060. Bressanelli, G., Adrodegari, F., Perona, M., & Saccani, N. (2018). Exploring How Usage-Focused Business Models Enable Circular Economy Through Digital Technologies. Sustainability, 10 (3), 639. Brosig, C., Westner, M., & Strahringer, S. (2020). Revisiting the Concept of IT Capabilities in the Era of Digitalization. Proceedings of the 22nd International Conference on Business Informatics, Antwerp. Chen, K.-L., & Møller, C. (2019). A Thousand-Mile Journey Begins With the Very First Step: The Case of a Product-Centric Manufacturing Firm’s Transformation Towards Servitization. CIRP Journal of Manufacturing Science and Technology, 27, 102-113. Clegg, B., Little, P., Govette, S., & Logue, J. (2017). Transformation of a Small-to-Medium-Sized Enterprise to a Multi-Organisation Product-Service Solution Provider. International Journal of Production Economics, 192, 81-91. Corbin, J., & Strauss, A. (2015). Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory (Vol. 4). Thousand Oaks: Sage Publications. Coreynen, W., Matthyssens, P., & Van Bockhaven, W. (2017). Boosting Servitization Through Digitization: Pathways and Dynamic Resource Configurations for Manufacturers. Industrial Marketing Management, 60, 42-53. Côrte-Real, N., Ruivo, P., & Oliveira, T. (2020). Leveraging Internet of Things and Big Data Analytics Initiatives in European and American Firms: Is Data Quality a Way to Extract Business Value? Information & Management, 57 (1), 103141. Dalenogare, L. S., Baseggio, M. M., Ayala, N. F., Le Dain, M.-A., & Frank, A. G. (2019). The Contribution of Smart Glasses for PSS. Procedia CIRP, 83, 318-323. Grant, R. M. (1991). The Resource-Based Theory of Competitive Advantage: Implications for Strategy Formulation. California Management Review, 33 (3), 114-135. Grubic, T., & Jennions, I. (2018). Remote Monitoring Technology and Servitised Strategies – Factors Characterising the Organisational Application. International Journal of Production Research, 56 (6), 2133-2149. C. Brosig, M. Westner &S. Strahringer: Linking IT Assets and Competitive Advantage - IT Capabilities of Servitized Business Models 123 Kindström, D. (2010). Towards a Service-Based Business Model – Key Aspects for Future Competitive Advantage. European Management Journal, 28 (6), 479-490. Kohtamäki, M., Parida, V., Oghazi, P., Gebauer, H., & Baines, T. (2019). Digital Servitization Business Models in Ecosystems: A Theory of the Firm. Journal of Business Research, 104, 380-392. Kowalkowski, C., Gebauer, H., & Oliva, R. (2017). Service Growth in Product Firms: Past, Present, and Future. Industrial Marketing Management, 60, 82-88. Krishnamoorthi, S., & Mathew, S. K. (2018). Business Analytics and Business Value: A Comparative Case Study. Information & Management, 55 (5), 643-666. Lim, C.-H., Kim, M.-J., Heo, J.-Y., & Kim, K.-J. (2015). A Conceptual Framework for Designing Informatics-based Services in Manufacturing Industries. Procedia CIRP, 30, 72-77. Lu, Y., & Ramamurthy, K. (2011). Understanding the Link Between Information Technology Capability and Organizational Agility: An Empirical Examination. MIS Quarterly, 35 (4), 931954. Niño, M., Blanco, J. M., & Illarramendi, A. (2015). Business Understanding, Challenges and Issues of Big Data Analytics for the Servitization of a Capital Equipment Manufacturer. Proceedings of the International Conference on Big Data, Santa Clara. Paschou, T., Rapaccini, M., Adrodegari, F., & Saccani, N. (2020). Digital Servitization in Manufacturing: A Systematic Literature Review and Research Agenda. Industrial Marketing Management, 89, 278-292. Porter, M. E. (1985). The Competitive Advantage: Creating and Sustaining Superior Performance. New York: The Free Press. Rabetino, R., Harmsen, W., Kohtamäki, M., & Sihvonen, J. (2018). Structuring Servitization-Related Research. International Journal of Operations & Production Management, 38 (2), 350-371. Rapaccini, M., & Gaiardelli, P. (2015). Smart Services Initiatives in Product-Centric Companies. Proceedings of the 4th Spring Servitization Conference, Aston. Rapaccini, M., Mauro, S. G., Cinquini, L., & Tenucci, A. (2019). Servitization of SMEs through Strategic Alliances: a Case Study. Procedia CIRP, 83, 176-181. Reim, W., Parida, V., & Örtqvist, D. (2015). Product–Service Systems (PSS) Business Models and Tactics – A Systematic Literature Review. Journal of Cleaner Production, 97, 61-75. Reim, W., Parida, V., & Sjödin, D. R. (2016). Risk Management for Product-Service System Operation. International Journal of Operations & Production Management, 36 (6), 665-686. Robinson, W., Chan, P., & Lau, T. (2016). Finding New Ways of Creating Value A Case Study of Servitization in Construction. Research-Technology Management, 59 (3), 37-49. Ross, J. W., Beath, C. M., & Goodhue, D. L. (1996). Develop Long-Term Competitiveness through IT Assets. Sloan Management Review, 38 (1), 31-42. Rymaszewska, A., Helo, P., & Gunasekaran, A. (2017). IoT Powered Servitization of Manufacturing – An Exploratory Case Study. International Journal of Production Economics, 192, 92-105. Saarikko, T. (2015). Digital Platform Development: A Service-Oriented Perspective. Proceedings of the 23rd European Conference on Information Systems, Münster. Sklyar, A., Kowalkowski, C., Sörhammar, D., & Tronvoll, B. (2019). Resource Integration Through Digitalisation: A Service Ecosystem Perspective. Journal of Marketing Management, 35 (1112), 974-991. Ulaga, W., & Reinartz, W. J. (2011). Hybrid Offerings: How Manufacturing Firms Combine Goods and Services Successfully. Journal of Marketing, 75 (6), 5-23. Vandermerwe, S., & Rada, J. (1988). Servitization of Business: Adding Value by Adding Services. European Management Journal, 6 (4), 314-324. Weeks, R., & Benade, S. (2015). The Development of a Generic Servitization Systems Framework. Technology in Society, 43, 97-104. Wiener, M., Saunders, C., & Marabelli, M. (2020). Big-Data Business Models: A Critical Literature Review and Multiperspective Research Framework. Journal of Information Technology, 35 (1), 66-91. Yin, R. K. (2014). Case Study Research: Design and Methods (5th ed. Vol. 5). Thousand Oaks: Sage Publications. 124 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE DATA MANAGEMENT PLATFORMS: AN EMPIRICAL TAXONOMY JOSCHKA A. HÜLLMANN, AJITH SIVAKUMAR & SIMONE KREBBER University of Münster, Business School, Münster, Germany; e-mail: huellmann@unimuenster.de, ajith.sivakumar@uni-muenster.de, s_kreb01@uni-muenster.de Abstract Data management platforms (DMPs) are a widely used means of placing targeted advertising, for example, commercial or political advertisements. However, only a few academic papers shed light on the platforms’ mechanisms. These mechanisms’ opacity makes it hard for consumers to understand what happens with their data, and regulators struggle to implement effective regulations. Hence, we develop a taxonomy to understand and compare different characteristics of DMPs. Following Nickerson’s (2013) method and combining an inductive and deductive approach, eight dimensions emerge that differentiate DMPs. We evaluate the taxonomy’s applicability and test it with a set of nine DMPs, which we select by feasibility, relevance, and popularity. The application shows that the eight dimensions cover the significant features that explain most of the variance in characteristics between DMPs. The evaluation revealed opportunities for further development of the taxonomy. DOI https://doi.org/10.18690/978-961-286-485-9.10 ISBN 978-961-286-485-9 Keywords: data management platforms, targeted advertising, taxonomy, data economy 126 1 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Glorious Times for Data Management Platforms Investments in targeted commercial advertising are at their peak and projected to grow further in the upcoming years (Zenith, 2019), with entire business models being based on the concept (e.g., Facebook, Instagram, YouTube). Likewise, targeted advertisements are a common practice in political election campaigns. A groundbreaking event was the Cambridge Analytica scandal revealed in 2018. Personal information was used to categorise voters into specific segments to positively influence them with targeted political advertisements regarding the election campaign in 2016 (Berghel, 2018; Cadwalladr & Graham-Harrison, 2018). This event escalated the debate about targeted advertising in politics and sparked controversy about the topic. Discussions center around implications such as data privacy and the manipulation of opinions and consumer behaviour. The enabler of targeted advertising, be it in politics or business, are real-time bidding systems. Realtime bidding systems comprise multiple actors, whose interplay permits the dynamic placement of advertisements targeted to specific users. One of these actors is the data management platform (DMP). As the name suggests, DMPs are information systems used to manage consumers’ data that is collected through online tracking amongst other means. They gained importance as an enterprise technology in recent years (Poleshova, 2017) as the digitalisation of everyday life co-occurs with collecting personal data at an unprecedented scale through tracking online activities on digital devices (Hüllmann et al., 2021). While data in its raw format adds little value, it becomes a valuable asset for businesses, researchers, and other stakeholders by gathering, managing, processing, and analysing it. DMPs provide such functionalities and support systems for all kinds of data-related operations, which are especially important in the context of real-time bidding systems (Poleshova, 2017). DMPs are an important actor in the real-time bidding system. Understanding their functions and mechanisms is a prerequisite for discussing and instating effective regulations surrounding privacy and the manipulation of consumers’ opinions and behaviors. Nevertheless, a taxonomy that characterises the detailed mechanisms of how DMPs add value has not yet been established in the academic literature 1. Thus, in this study, we focus on the functions performed by DMPs and put forward the following research question: Our search for DMP literature and especially a taxonomy on DMPs in the three academic search engines Scopus, Web of Science, and Google Scholar did not yield any results. 1 J. A. Hüllmann, A. Sivakumar &S. Krebber: Data Management Platforms: An Empirical Taxonomy 127 RQ: How can we distinguish the functionalities of data management platforms? What are the discriminating characteristics? We address this question by developing a taxonomy that provides an overview and comparison of DMPs. The taxonomy is developed following the Nickerson et al. (2013) approach using an iterative process that combines inductive and deductive phases. It is evaluated by applying it to nine DMPs. Our taxonomy contributes to a better understanding of DMPs, their functionalities, and their mechanisms. Investigating the characteristics of DMPs (e.g., availability of anonymisation functions, real-time processing) contributes knowledge to the debate on targeted advertising and privacy with implications for future regulations. 2 Data Management Platforms in Real-Time Bidding Systems DMPs are most prominent in the real-time bidding process (see Figure), in which there are two main stakeholders: the advertisers and website operators. To realise real-time targeted advertising, ad-networks take offers of advertising slots from supply-side platforms and match these with bids for advertising slots from demandside platforms. For the matching process, demand-side platforms use real-time processed data from DMPs (e.g., consumer segments), predefined selection criteria, empirical values, and publishers’ predictions about whether the advertising space will be worthwhile (Dawson, 2014; Zhang et al., 2014). If all conditions are met, the deal is closed on the ad-network, and the supply-side platform places the advertiser’s advertisement in the advertising space (Wang et al., 2017). A DMP (usually a separate company from the advertising network) collects, stores, manages, and processes the relevant data. Effective coordination between these multiple actors – ad-network, demand- and supply-side platforms, and a DMP – facilitates targeted advertising for defined consumer segments in near real-time. The information from the data or the data itself might be traded on data marketplaces (Lange et al., 2018). While critics contend that arrangements like this can violate consumers’ privacy, proponents contend that they serve consumers by presenting them with offers likely to appeal to them. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 128 Figure 1: Structure of a Generic Real-Time Bidding System. Sources: Spiekermann, 2019; Yuan et al., 2012 3 Research Method To develop a taxonomy of DMPs that allows for their differentiation, we followed the method proposed by Nickerson et al. (2013). The method follows an iterative process through which the taxonomy is gradually built by adding new characteristics. Initially, we curated a longlist of 48 DMPs using internet sources such as articles or reports from auditing companies (e.g., Andrew et al., 2020; Moffett & Chien, 2019). In our iterations to develop the taxonomy, we derived the characteristics deductively from the literature (Kamps & Schetter, 2018; Wang et al., 2017) and inductively from existing DMPs (Adobe, 2020; Google, 2020; Lotame, 2020; Oracle, 2020b). The iterative process terminated after six iterations because all specified subjective and objective termination conditions were met. With regards to objective termination conditions, this means that (1) no dimension or characteristic was merged or split in the last iteration, (2) each dimension was unique and did not repeat, and (3) each characteristic was unique within its dimension. The five subjective conditions used to evaluate the taxonomy’s quality after each iteration were conciseness, robustness, extensibility, comprehensiveness, and explainability (Nickerson et al., 2013) (see appendix). In the end, the resulting taxonomy was discussed and jointly evaluated by the three authors. The taxonomy’s evaluation was performed using nine DMPs from the longlist (see appendix, Table). We selected these nine DMPs because they met our requirements in terms of 1) feasibility (amount of information and trial J. A. Hüllmann, A. Sivakumar &S. Krebber: Data Management Platforms: An Empirical Taxonomy 129 version availability), 2) relevance (assessing the DMP revenue), and 3) popularity (number of clients and awards, which illustrates the influence and reach of the DMPs that can affect people). For each of the nine DMPs, we gathered the necessary information to apply the taxonomy, relying primarily on official information sources, including the DMPs’ public websites and trial versions if available. In case of incomplete and missing information on the website, we contacted the support via phone, email, or contact form on their website. 4 Taxonomy The eight main dimensions are data import, generable data, data sources, webtracking, data processing functions, external data sources, data export, and data security (see Table). Data import distinguishes three different data types, which can be imported in a DMP. First-party data (FPD) is obtained by companies through previous consumer contact, website visits (Kreutzer, 2018), or directly from the consumer. The latter includes browsing behaviours or socio-demographic data such as gender or age (Cederholm & Simpson, 2018; Kamps & Schetter, 2018). Secondparty data (SPD) is first-party data of an external company acquired through direct partnerships (Kamps & Schetter, 2018). Third-party data (TPD) is anonymised data provided by data resellers or data marketplaces. Generable data distinguishes four types of data that DMPs can generate. One is first-party data collected by DMPs with the help of tracking mechanisms, for example, collecting it from internal customer management systems. Apart from firstparty data, DMPs can identify consumer segments based on offline and online data analyses. The granularity, that is, the level of detail in the consumer segment, may vary. Look-a-like user profiles are generated by DMPs using existing first-party data as a basis. Look-a-like profiles are identified user profiles similar to a company’s consumer profiles in terms of indicators such as age, interests, or hobbies. Machine learning is often integrated into the look-a-like modeling process and increases the number of consumers that can be reached with the advertising campaign. DMPs can also determine unique user profiles and track them across websites by using internal and external data sources. 130 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE The use of cookies is an often mentioned web-tracking method of DMPs. While some DMPs track data without using cookies (e.g., fingerprinting), they do not explicitly mention which alternative methods they use. We refer to them as other methods in the taxonomy. Data sources from which DMPs collect data originate from a company’s website directly, its apps, or social networks. Real-time analysis facilitates the immediate analysis and processing of data, enabling quick decision-making. Data anonymisation functions, segmentation of data into consumer segments, and demand-side platform test functions are common. DMPs’ demand-side test functions are useful when operating with multiple external demand-side platforms to identify the appropriate one for the existing DMP. A wrong choice can harm the advertising campaign to a potential 20% to 40% loss in user profile reach (Joe, 2014). Machine-learning algorithms are used to extract meaningful information from unstructured data, such as product popularity. Waste management removes records in the DMP not relevant for further processing. Integrating external data sources is crucial for some processes, such as the engendering of look-a-like data or the refinement of existing user profiles. In this regard, DMPs either provide a platform themselves with with interfaces to thirdparty platforms through which data can be acquired. Besides, some DMPs integrate partner exchange platforms, which enable companies to establish connections to partners with whom they want to exchange anonymised data. The advantage of this is that the origin of the data is known. Knowing the data source adds transparency and trust on the one hand, and on the other hand, lets people evaluate the quality of the data that originates from the respective source. Usually, DMPs offer a data export option to integrate with interfaces from customer relationship management software, demand-side platforms, supply-side platforms, and ad-networks/ad-exchanges. Some DMPs provide an export option to data marketplaces on which collected data can be sold to external parties. Apart from specific data export options, the export into a generic local file (e.g., a consumer data feed) enables companies to use the exported data for various purposes such as business intelligence tools (Chou et al., 2005). Generally, not only raw data but also processed data can be transferred to other platforms (Kamps & Schetter, 2018). J. A. Hüllmann, A. Sivakumar &S. Krebber: Data Management Platforms: An Empirical Taxonomy 131 Table 1: Taxonomy on DMPs and Evaluation. A = Adobe, G = Google, L = Lotame, M = MediaMath, Ne = Neustar, Ni = Nielson, O = Oracle, S = Salesforce, T = The Trade Desk. Sources referenced by footnotes were used to establish taxonomy dimensions and characteristics, while the “x” in the evaluation reference DMPs that possess the specific characteristic. Taxonomy Dimension Characteristics Data First-Party Data A,B,C,D,E B,C Import Second-Party Data A,C,D,E Third-Party Data A,B,C,D,E Generable First-Party Data A,B,C,D,E,G C,D,F,G Data Consumer Segments A,B,C,D,E,G Look-a-like Data A,B,D,E User Identification A,B,D,E,G Data Apps A,B,D,E SourcesC,D,F,G Social Networks D,E Websites A,B,D,E,G Web Cookies A,B,C,D,E TrackingC,D,G Other Methods A,B,E Data Real-time Analysis B,C,D,E,G Processing Data Anonymization B,D Functions Data Segmentation B,C,D,E,G A,B,C,F,G Demand-side Platform Testing A,B Machine Learning Algorithms A,B,D Waste Management D,E External Partner Exchange Platform A,B,D,E Data Interface for Third Party Data A,B,D,E SourcesD Data Ad-network A,B,C,D,E,G ExportC,F,G Customer Relationship ManagementB,D Data Marketplace A,E Demand-side Platform A,C,D,E,G Export-local-file A,B Supply-side Platform C,D F Data Security Consent Management D,E,F Data Security FunctionA,B,F GDPR A,B,D,E,F A G x x x x x x x x x x x x x x x Evaluation L M Ne Ni x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x S x x x x x x x x T x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x O x x x x x x x x x x x x x x x x x x x x x x x x x x x Sources: AdobeA, 2020; GoogleB, 2020; Kamps & SchetterC, 2018; LotameD, 2020; OracleE, 2020; SchonschekF, 2020; Wang et al.G, 2017 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 132 The dimension of data security focuses on General Data Protection Regulation (GDPR) compliance, data security, and consent management. The GDPR set in place in 2016 by the European Parliament is a set of regulations concerning the processing of personal data in Europe (Art. 1-99 DSGVO). Because the GDPR (Art. 6 Abs. 1 and Art. 7) envisages that companies need users’ voluntary consent before collecting their data, consent management is often integrated into DMPs. We evaluated our taxonomy by analysing and categorising nine DMPs, showing that the eight dimensions cover the significant features that explain most of the variance in the taxonomy’s characteristics across the DMPs. The evaluation results are presented in Table. Through the evaluation, we identified opportunities for extending the criteria catalogue, such as with a cost and usability dimension. 1 Discussion The application of the taxonomy showed that DMPs usually involve first-party and third-party data segmentation in real-time, sometimes with the use of machine learning, following the goal of consumer segmentation. Consumer segmentation makes it possible to implement marketing objectives such as serving targeted advertisements, displaying targeted content, political microtargeting, or personalised price discrimination (Badmaeva & Hüllmann, 2019; Klein & Hüllmann, 2018). It can be used as a foundation for placing advertisements or generating look-a-like data (Kamps & Schetter, 2018). The importance of clustering consumer data into segments in the real-time bidding process is reflected in the evaluation of our taxonomy. Data segmentation is the only data processing functionality that all nine evaluated DMPs provide. Consumer segmentation and the subsequent placement of advertisements have two data-related success factors: data quality and data quantity. First, if the data quality is bad, individuals might have been added to the wrong cluster because the data is inaccurate or inconsistent. Second, the more data is available, the more fine-grained consumer profiles can become, ultimately increasing quality. In light of various webtracking methods and data export options to other actors in the real-time bidding system, critics argue that DMPs operate in contrast to the individual’s data privacy. However, our study shows that while DMPs are not necessarily required to comply J. A. Hüllmann, A. Sivakumar &S. Krebber: Data Management Platforms: An Empirical Taxonomy 133 with the GDPR in their origin countries, most of them do comply with the GDPR because of their European customers who are subject to the GDPR. The DMP’s functionalities supplement the functionalities of other actors in the realtime bidding system, such as supply-, demand-side platforms, ad-networks, and data marketplaces. The option of publishers and/or advertisers to export data to demand- and supply-side platforms makes the real-time bidding process more efficient. Real-time analysis is an essential characteristic because it enables advertisers (or advertisers’ supply-side platform) to determine in real-time, before the advertisement is placed, whether a publisher’s page is related to the advertisement’s content. In that way, advertisements can be placed in advertising spaces where consumers of the target group interact. Another advantage is that placing advertisements on unsuitable or reputation-damaging websites can be avoided (Kreutzer, 2018; Zawadzk & Groth, 2014). Without effective data management, the automated and real-time matching of advertisements and advertising spaces on websites and the realisation of targeted advertisement would hardly be possible. These targeted advertisments help to optimise the reach of advertising campaigns (Yuan et al., 2012), which is why DMPs are valued in practice. The performance of targeted advertising in real-time bidding systems depends on the quality and quantity of the used data. A scenario can occur in which not enough data is available for valuable insights. For such cases, DMPs integrate with data marketplaces to provide publishers and/or advertisers the opportunity to buy and integrate external data, enriching subsequent analyses by creating detailed digital consumer profiles or refining existing user data. Through their characteristic functionalities, DMPs enable effective interaction among different platforms. First-party and third-party data import into a DMP and various export options are exemplary functionalities that facilitate cooperation among actors in the real-time bidding system. For those actors, even though some are direct competitors, the value of cooperating is more significant than not cooperating. Cooperating allows filling gaps in missing functionalities or an expanded portfolio of multiple demand-side platforms to optimize the output of the advertising campaign. Salesforce is, for example, originally known for its customer relationship software but expands its service by collaborating with Google, allowing its customers to use their customer relationship management data with Google Analytics to perform data analyses (Google & Salesforce, 2020). Further, Salesforce 134 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE customers can use Google’s tracking methods to obtain more data and integrate it into the Salesforce DMP. Cooperating is additionally beneficial for DMPs if they want to offer a more extensive portfolio of platforms (e.g., cooperating with multiple demand-side platforms that offer a DMP themselves). A DMP that integrates different and multiple demand-side platforms has the advantage of reaching a broader range of users, as different DMPs can cooperate with different ad-networks or ad-exchanges, and provide customers with multiple options between different demand-side platforms (Oracle, 2020a; The Trade Desk, 2020). In the end, DMPs can be seen as a double-edged sword. On the one side, they provide indirect value to consumers as they support the placement of targeted advertisements and thereby ensure that consumers only see the advertisements that are relevant to them. On the other side, DMPs can contribute to the efficient distribution of harmful distorted or fake content to consumer segments because placed advertisements during the real-time bidding process are not evaluated. In that way, misleading content or fake news can be spread. Creating look-a-like data makes this approach scalable by extending existing consumer segments with consumers that have similar profiles. 5 Conclusions, Limitations, and Outlook With this study we contribute a taxonomy that helps to understand and distinguish DMP functionalities. The taxonomy establishes a common ground for discussions on implications, for example, with regards to data privacy, data security, and the manipulation of opinions and consumer behaviour. It further helps to grasp the DMP’s role in real-time bidding systems. Through an inductive and deductive procedure, eight taxonomy dimensions were identified that cover the main functionalities and mechanisms of DMPs. To ensure the reliability and validity of our taxonomy, we evaluated it with nine selected DMPs. Our developed taxonomy and its application clarify which characteristics define a DMP and guide discussions about specific functions and mechanisms of DMPs. The comparison of different DMPs in course of the evaluation is additionally helpful for practitioners when choosing a particular DMP for adoption. J. A. Hüllmann, A. Sivakumar &S. Krebber: Data Management Platforms: An Empirical Taxonomy 135 As a limitation, we note that the developed taxonomy categories and characteristics undergo change as data management platforms undergo change. For example, new legal regulations may be set in place over time, or new data sources emerge. In that sense, the taxonomy is only valid until change happens in data management platforms and new characteristics and dimensions emerge. Therefore, future research should investigate the changes that DMPs go through to update the proposed taxonomy. Besides this limitation, future research opportunities are available that extend and refine the taxonomy. We can specifically think of webtracking, that would benefit from a refinement. In our study, we lacked information on the application of other tracking methods as well as which cookie types are used by DMPs. Altogether our study provides first insights into the functionalities and mechanisms and thereby the role of DMPs in the RTBS. Yet, more research is needed in this field and the meaning of remaining actors needs to be studied to fully understand real-time bidding systems and their implications. References Adobe. (2020). Daten-Management-Plattform. Adobe. Retrieved February 28, 2021, from https://www.adobe.com/de/experience-cloud/topics/data-management-platform-dmp.html Andrew, F., Foo Kune, L., & Schmitt, E. (2020). Gartner Magic Quadrant for Ad Tech. Retrieved February 24, 2021, from http://www.mediamath.com/news/mediamath-named-a-leader-ingartners-magic-quadrant-for-ad-tech/ Badmaeva, T., & Hüllmann, J. A. (2019). Investigating Personalized Price Discrimination of Textile-, Electronics- and General Stores in German Online Retail. Proceedings of the 14th International Conference on Wirtschaftsinformatik (WI). Berghel, H. (2018). Malice Domestic: The Cambridge Analytica Dystopia. The IEEE Computer Society, 51, 84–89. https://doi.org/10.1109/MC.2018.2381135 Cadwalladr, C., & Graham-Harrison, E. (2018, March 17). Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach. The Guardian. Retrieved February 24, 2021, from https://www.theguardian.com/news/2018/mar/17/cambridge-analyticafacebook-influence-us-election Cederholm, A., & Simpson, I. (2018). Warum First Party Daten eine der wertvollsten Informationsquellen für einen Marketer sind. PIWIK. Retrieved February 28, 2021, from https://piwikpro.de/blog/warum-first-party-daten-eine-der-wertvollsteninformationsquellen-fuer-einen-marketer-sind/ Chou, D. C., Bindu Tripuramallu, H., & Chou, A. Y. (2005). BI and ERP integration. Information Management & Computer Security, 13(5), 340–349. https://doi.org/10.1108/09685220510627241 Dawson, P. (2014). Realtime Advertising in Social Networks. In O. Busch (Ed.), Realtime Advertising: Digitales Marketing in Echtzeit: Strategien, Konzepte und Perspektiven (pp. 177–185). Springer Gabler. https://doi.org/10.1007/978-3-658-05358-1_1 Dun & Bradstreet. (2020). Dun & Bradstreet - Accelerate Growth and Improve Business Performance. Retrieved February 28, 2021, from https://www.dnb.com/ 136 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Google. (2020). Google Marketing Platform – Werbung und Analysen in einer Lösung. Retrieved February 28, 2021, from https://marketingplatform.google.com/intl/de/about/ Google, & Salesforce. (2020). Salesforce and Google Cooperation. Google;Salesforce. Retrieved February 28, 2021, from https://cloud.google.com/salesforce?hl=de Hüllmann, J. A., Krebber, S., & Troglauer, P. (2021). The IT Artifact in People Analytics: Reviewing the Tools to Understand a Nascent Field. Proceedings of the 16th International Conference on Wirtschaftsinformatik (WI). Joe, R. (2014). The Great DMP Debate. Ad Exchanger. Retrieved February 28, 2021, from https://www.adexchanger.com/data-exchanges/the-great-dmp-debate/ Kamps, I., & Schetter, D. (2018). Performance Marketing - Der Wegweiser zu einem mess- und steuerbaren Marketing – Einführung in Instrumente, Methoden und Technik (1st ed.). Springer Gabler. https://doi.org/10.1007/978-3-658-18453-7 Klein, S., & Hüllmann, J. (2018). Datenkapitalismus akademischer Wissenschaftsverlage. Wirtschaftsdienst, 98(7), 477–480. https://doi.org/https://doi.org/10.1007/s10273-0182318-3 Kreutzer, R. T. (2018). Praxisorientiertes Online-Marketing: Konzepte - Instrumente - Checklisten (J. Blind & R. Stumpfrock (eds.); 3rd ed.). Springer Gabler. https://doi.org/10.1007/978-3-65817912-0 Lange, J., Stahl, F., & Vossen, G. (2018). Datenmarktplätze in verschiedenen Forschungsdisziplinen: Eine Übersicht. Informatik Spektrum, 41, 170–180. https://doi.org/https://doi.org/10.1007/s00287-017-1044-3 Lotame. (2020). Data Management Platform. Retrieved February 28, 2021, from https://www.lotame.com/products/data-management-platform/ Miller, G. A. (1956). The magical number seven, plus or minus two: some limits on our capacity for processing information. Psychological Review, 63(2), 81–97. https://doi.org/10.1037/h0043158 Moffett, T., & Chien, A. (2019). The Forrester WaveTM: Data Management Platforms, Q2 2019. Forrester Research, Inc. Retrieved February 28, 2021, fro https://www.adobe.com/offer/forrester-dmp-wave-2019.html# Nickerson, R. C., Varshney, U., & Muntermann, J. (2013). A Method for Taxonomy Development and its Application in Information Systems. European Journal of Information Systems, 22(3), 336– 359. https://doi.org/10.1057/ejis.2012.26 Oracle. (2020a). Media and Data Ecosystem. Retrieved February 28, 2021, from https://www.oracle.com/de/data-cloud/products/data-managementplatform/ecosystem.html Oracle. (2020b). Oracle Data Management Platform (formerly BlueKai). Oracle; Retrieved February 28, 2021, from https://www.oracle.com/de/data-cloud/products/data-managementplatform/ Poleshova, A. (2017). Umfrage zur Nutzung und Nutzungsabsicht von Technologien im Marketing weltweit 2017. Retrieved February 28, 2021, from https://de.statista.com/statistik/daten/studie/745360/umfrage/nutzung-undnutzungsabsicht-von-tech-nologien-im-marketing-weltweit/ Schonschek, O. (2020). So finden Sie die richtige Data-Management-Plattform. High Text Verlag. Retrieved April 15, 2021, from https://www.onetoone.de/artikel/db/138456cr.html Spiekermann, M. (2019). Data Marketplaces: Trends and Monetisation of Data Goods. Intereconomics, 54(4), 208–216. https://doi.org/10.1007/s10272-019-0826-z The Trade Desk. (2020). Data Management Platform (DMP). Retrieved February 28, 2021, from https://www.thetradedesk.com/products/data-management-platform-dmp Wang, J., Zhang, W., & Yuan, S. (2017). Display advertising with real-time bidding (RTB) and behavioural targeting. Foundations and Trends in Information Retrieval, 11(4–5), 297–435. https://doi.org/10.1561/1500000049 J. A. Hüllmann, A. Sivakumar &S. Krebber: Data Management Platforms: An Empirical Taxonomy 137 Yuan, S., Abidin, A. Z., Sloan, M., & Wang, J. (2012). Internet Advertising: An Interplay among Advertisers, Online Publishers, Ad Exchanges and Web Users. Information Processing & Management, June. http://arxiv.org/abs/1206.1754 Zawadzk, V., & Groth, A. (2014). Granularität schafft Mehrwert für jedes Ziel. In O. Busch (Ed.), Realtime Advertising: Digitales Marketing in Echtzeit: Strategien, Konzepte und Perspektiven (pp. 145–160). Springer Gabler. https://doi.org/10.1007/978-3-658-05358-1_13 Zenith. (2019). Global Programmatic Advertising Spending from 2019 to 2021. Statista. Retrieved April 12, 2021, from https://www.statista.com/statistics/275806/programmatic-spendingworldwide/ Zhang, W., Yuan, S., & Wang, J. (2014). Optimal real-time bidding for display advertising. Proceedings of the 20th ACM SIGKDD, 1077–1086. https://doi.org/10.1145/2623330.2623633 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 138 Appendix Evaluation of the Taxonomy: Table provides an overview of the nine DMPs that we selected from the longlist to be included in our study together with the respective sub-criteria with which we assessed the DMPs’ relevance, feasibility, and popularity. Table 2: Nine Data Management Platforms for Taxonomy Evaluation. In the revenue column, M stands for Million, and B stands for Billion, in the Awards Column, FW stands for Forrester Wave. DMP Relevance Year Revenue Adobe 2019 11,17 B + + 148 Gartner Google Audience 2020 160,74 B + - - Gartner Lotame 2020 14,25 M + + >8 FW Mediamath DMP 2020 104,7 M + - - Gartner & FW Nielsen 2018 6,50 B + - - FW OneID von Neustar 2017 1,20 B + - >75 FW Oracle DMP 2019 39,50 B + - 6 FW Salesforce DMP 2020 17,10 B + + >150k FW The Trade Desk 2018 447 + Video 10 Gartner M Feasibility Info Trial Popularity Clients Awards Sources: Andrew et al., 2020; Dun & Bradstreet, 2020; Moffett & Chien, 2019 Subjective Ending Conditions: The subjective ending conditions following Nickerson et al. (2013) are conciseness, robustness, comprehensiveness, extensibility, and explainability. Conciseness is used to limit the number of dimensions, thus focusing on the quality of the taxonomy. Our taxonomy on DMPs has eight dimensions, which from our point of view, is an appropriate number because a possible objective ending condition falls in the range of seven plus or minus two (Miller, 1956). Robustness evaluates whether the chosen dimensions and J. A. Hüllmann, A. Sivakumar &S. Krebber: Data Management Platforms: An Empirical Taxonomy 139 criteria are meaningful in the application and allow the differentiation of the investigated objects. The dimensions and characteristics in the taxonomy point to the elementary functions that DMPs can have but that are not mandatory or a musthave and may therefore vary depending on the DMP. Thus, robustness is fulfilled. Comprehensiveness verifies that all dimensions are included and that new objects can be classified. We tested the taxonomy on nine DMPs and the results show that all nine can be classified using the DMP. Even though the sample is small we assume that the taxonomy’s comprehensiveness is appropriate. Since we used popular DMPs for our evaluation, future studies should investigate whether the categories are comprehensive for DMPs that are less popular. Extensibility considers the simple extension of the taxonomy. This ending condition is given because the taxonomy’s structure is easy, without any subdimensions in place. Researchers who find additional characteristics or dimensions to be necessary can build on our work. Finally, explainability evaluates how exactly the dimensions explain the object. The taxonomy takes into account the fundamental functionalities of DMPs (e.g., data import, data processing functions). In that way, the taxonomy explains what constitutes DMPs and what are their foci (e.g., using first-party data, consumer segmentation). Thus, we argue that also the fifth ending condition is fulfilled and with it our research goal to explore the essence of DMPs. 140 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE FAMILIARITY ATTRACTS CONSUMER ATTENTION: TWO METHODS TO OBJECTIVELY MEASURE CONSUMER BRAND FAMILIARITY URSA BERNARDIC1 & BENJAMIN SCHEIBEHENNE2 1 University of Geneva, Geneva School of Economics and Management, Switzerland; e-mail: ursa.bernardic@unige.ch 2 Karlsruhe Institute of Technology, Institute for Information Systems and Marketing, Germany; e-mail: scheibehenne@kit.edu Abstract Brand familiarity is an important and frequently used concept in marketing research and practice. Existing measures of brand familiarity typically rely on subjective self-reports and Likert scales. Here we develop and empirically test two implicit measures to quantify brand familiarity. Based on research in visual attention and computer image processing, observers in a first visual search task are incentivized to quickly find a target brand among varying numbers of competitor brands. In the second approach, we measure the speed at which observers can identify a target brand that is gradually revealed. Both approaches are validated in preregistered experiments. Results show that reaction times predict brand familiarity on an individual level beyond conventional self-reports, even when controlling for “bottom-up” visual features of the brand logo. Our findings offer an innovative way to objectively measure brand familiarity and contribute to the understanding of consumer attention. DOI https://doi.org/10.18690/978-961-286-485-9.11 ISBN 978-961-286-485-9 Keywords: brand familiarity, objective measure, visual attention, top-down features 142 1 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Introduction and theoretical background Marketing practitioners and academics have long recognized the importance of brand familiarity – a consumer’s prior direct or indirect experiences with the brand (Kent & Allen, 1994). Past research showed that brand familiarity impacts advertisement, evaluation, and consumer choice. Consequently, brand familiarity became a key element in models of brand strength and brand equity (e.g. Aaker, 1997; Erdem, 1998; Keller, 2013). For companies, measures of brand familiarity provide managerial insights on how their brand compares to competitors' brands, which allows for more effective marketing campaigns and hence sustain brand growth and sales (Nielsen Marketing Report, 2020). In marketing research, a substantial body of empirical work has focused on correlations between brand familiarity and other marketing constructs. Findings show that brand familiarity influences brand memory, explicit attitudes toward the brand, and advertising effectiveness in both, traditional advertising (Pieters, Warlop, & Wedel, 2002) and newer formats, such as movies (Brennan & Babin, 2004). Despite this importance of brand familiarity, an overview of recent academic and industry work reveals that brand familiarity has (almost) always been assessed using subjective self-reports, typically based on the Likert Scale where respondents indicate how familiar they are with a given brand with verbal anchors that range from not at all familiar/extremely unfamiliar to very familiar/extremely familiar (Zhou & Nakamoto, 2007). While such self-reports are cost and time-efficient, they come with a number of disadvantages that limit their validity (De Houwer, 2006). Firstly, they rely on language and are thus not culture-free and can be prone to different interpretations and translations. This makes it hard to compare and aggregate answers in an increasingly globalized market where global brands need to assess and compare their familiarity across different languages, countries, and cultures. Secondly, subjective scales are also hard to incentivize and therefore are more prone to response-order effect (increasing the tendency for respondents to select the first response available to them on the answer scale), donkey vote effect (selecting the same response for all questions), demand effects (the tendency of respondents to respond positively), and dishonesty. However, even when consumers want to answer honestly, there is a mismatch between the way consumers experience and think about the world and the methods marketers use to collect this information (Zaltman, 2003). As such, subjective scales require introspective ability and the psychometric properties of data U. Bernardic & B. Scheibehenne: Familiarity Attracts Consumer Attention: Two Methods to Objectively Measure Consumer Brand Familiarity 143 from Likert-scales are debated (Li, 2013). For example, there is an ongoing debate about whether a Likert scale is ordinal or interval. A typical ordinal scale can measure the orders of the ratings, but it cannot tell us about the intervals between responses and thus results in information lost during measurement. On the other hand, a typical interval scale implies that the difference between any two consecutive scales reflects equal differences in the variable measured, which leads to information lost during measurement (Wu & Leung, 2017). Building on recent findings and models of visual attention in marketing (Sample, Hagtvedt, & Brasel, 2020), and in cognitive science (Wolfe & Horowitz, 2017), we empirically test whether and how brand familiarity impacts visual attention, and bridge the gap by proposing an innovative way to objectively measure brand familiarity. Thus the current paper has two objectives. The first is to transfer knowledge from cognitive science and computer visual processing literature to a consumer behavior setting and test whether we can distill top-down effects from bottom-up factors with more ecologically familiar stimuli, brand logos. If this is possible, this will naturally lead to the establishment and proof of concept for an implicit measure of real-world personal brand familiarity. The second is to bring into the spotlight the construct of brand familiarity on visual attention. 2 Experiments 2.1 Experiment 1: Using Visual Search Task to study how brand familiarity impacts visual attention Up to date, it remains an open question whether consumers would show advantages for familiar or on contrary, novel stimuli. In line with these inconsistent results, a recent review in the area of vision research called for more contribution to the understanding of how familiarity influences visual attention (Wolfe, 2020). Study 1 was designed to provide a first test of the hypothesis that brand familiarity as opposed to brand novelty impacts consumers’ attention in a visual search task. Study 1 was preregistered prior to data collection on OSF (OSF link to preregistration). 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 144 Design and measurement A total of 100 participants were recruited on the Mechanical Turk website and preselected based on not having color-blindness, owning a mobile phone, and having no extensive connection with China (MAge=35.9, SDAge=10.5, 37% females). Participants were instructed to find different smartphone app logos (“targets”) among either 7 or 23 distractor logos. Half of the targets consisted of familiar app logos from the Google Play store, the other half consisted of unfamiliar logos from apps that were primarily used in China. Each participant completed 200 trials that were split into 4 blocks. At the beginning of each trial, the target logo was displayed in the center of the screen for 1 second. Then, a new screen appeared with a 5x5 grid that contained the target among the distractor logos at random positions. Figure 1 shows an example of this setup. As soon as participants identified the target brand on this grid they had to press a button on the keyboard. Once they pressed the button, all app logos disappeared from the grid and participants had to click on the grid position where the target had been displayed. For this last task, there was no time pressure. Participants received feedback after each trial in terms of points, which were exchanged into the monetary bonus at the end of the experiment. Familiar and unfamiliar logos were visually matched according to color, shape and number of characters and were pretested on a similar sample for familiarity. All logos were resized to 160x160 pixels to ensure the equivalent image size. Figure 3: Screenshots of the visual search task in the first experiment Procedure The experiment started with color-blindness, the Ishihara test (Ishihara, 1994), and a screen resolution check. Next, participants read an instruction of the visual search task and completed a training block with 10 trails. After training, participants finished 200 experimental trials, separated into 50-trial blocks that corresponded to U. Bernardic & B. Scheibehenne: Familiarity Attracts Consumer Attention: Two Methods to Objectively Measure Consumer Brand Familiarity 145 each of four conditions. Besides the main experimental manipulation of target familiarity, we also manipulated distractor familiarity. These yield four experimental conditions in a 2x2 design: finding a familiar target among unfamiliar distractors (FU), familiar target among familiar distractors (FF), and vice versa (i.e. UF and UU). The order of the four blocks was counterbalanced between participants. All conditions were pseudorandomized among participants and randomized on the trial level. As a manipulation check at the end of the experiment, participants rated their familiarity with the app logos on a 4-point (1= unfamiliar to 4=familiar) scale. Results and discussion The familiarity ratings at the end of the experiment were significantly higher for the familiar app icons (mean=3.7, SD = 0.7) than the unfamiliar app icons (mean=1.2, SD=0.6), suggesting our manipulation of familiarity was successful. In line with our prediction, familiar targets (median = 568ms) were found slightly faster than unfamiliar targets (median = 585ms). The average difference of 17 milliseconds and the corresponding effect size was very small though (Cohen’s d = 0.08). To test which variables systematically influenced the reaction times, and to avoid the pitfalls of null-hypothesis testing (Baker, 2016) we estimated a linear mixed effect model using lme4 package in R (version 1.1-26, Bates et al., 2015). The regression model assumes random intercepts for individuals and accounts for possible dependencies due to the repeated measurement design. The baseline model includes intercept as a single fixed effect, location of the target, and set size (denoted as m0). Next, we added predicted variables of target familiarity rating as a fixed effect (denoted m1). A tested variable has a credible influence on prediction accuracy if adding it to the regression equation improves model fit. To select the best-fitting model we used Bayesian information criteria (BIC), which takes model complexity into account by introducing a penalty term for the number of parameters in the model. While absolute values of BIC are difficult for interpretation, BIC differences (ΔBIC) between models can be transformed into Bayes factors, which offer more intuitive explanations. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 146 A regression model that contained familiarity as a categorical predictor of reaction times explained the observed data better than a baseline model that did not include the predictor. Table 1 (Exp 1) shows a comparing of both regression models. As can be seen from the table, the Bayesian Information Criteria (BIC) of the difference between a null model (m0) and model that included target familiarity (m1) was 18 (ΔBIC), which translates into a Bayes factor (BF) of 7104 (Wagenmakers, 2007). A BF of 7104 indicates that based on the observed data, the model including the target familiarity rating is 7104 times more probable. Results from additional exploratory (i.e. not pre-registered) analyses suggest that distractor familiarity also impacts visual search. In particular, search efficiency was higher when the target and distractor familiarity do not match (FTUD and UTFD), than when they do match (FTFD and UTUD). Using a similar model comparison approach as above yields a Bayes factor (BF) of 602 in favor of the model that includes distractor familiarity as a predictor. To summarize, Study 1 demonstrated that brand familiarity as opposed to brand novelty enhances visual attention. Thus, the results provide initial evidence that visual search tasks provide an implicit measure of brand familiarity. Table 1: Regression coefficients of the best fitting mixed-effects models Exp 1: Online study (US vs PCR brands) m0 m1 m2 Fixed effects (Intercept) 18.556 18.741 18.646 Target Location 0.884 0.885 0.887 Set Size 0.266 0.266 0.266 U. Bernardic & B. Scheibehenne: Familiarity Attracts Consumer Attention: Two Methods to Objectively Measure Consumer Brand Familiarity Target Rating -0.075 Distractor Condition 147 -0.075 0.190 Model fit log(likelihood) -23182 -23168 -23157 AIC 46374 46349 46329 BIC 46410 46392 46380 Note. Best fitting models were chosen using BIC which punishes for model complexity and number of parameters. Corresponding Bayesian Factors (BF) for nested models were calculated as BF = exp(ΔBIC/2) (Wagenmakers, 2007). 2.1.1 Experiment 2: Developing a video recognition task The findings of the first experiment provide converging evidence for the influence of brand familiarity on visual search efficiency. As such, it indicates that the experimental search paradigm that we used can be implemented as an implicit measure of brand familiarity. However, given the relatively small effect size, the task at hand requires relatively many repetitions within subjects. This limits its practical value, for example in the context of quick marketing surveys. To overcome these limitations, this second study at hand proposes an alternative implicit measure that is based on qualitative differences between the perception of familiar and unfamiliar stimuli (OSF link to preregistration). Previous research on face familiarity explored different manipulations of image stimuli, such as Gaussian blur, and contrast negation (Balas, Cox, & Conwell, 2007). While such image manipulation impaired perception for face familiarity studies, neither Gaussian blurring, linear stretching, nor contrast negation did not challenge the perception of brands (Sandford, Sarker, & Bernier, 2018). Therefore, we developed a perceptual decision task in which participants watch a video that gradually changes from a noisy mask to a given target 148 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE brand. Participants are instructed to press a button as soon as participants recognize the brand. The main dependent variables are reaction time and recognition accuracy. Design and measurement A total of 73 students from Swiss University, participated in the lab study (MAge=22.2, SDAge=1.99, 57% females). As preregistered, all participants who did have an extensive connection to another country (Switzerland for Slovene participants, and Slovenia for Swiss participants) or preferred that their data would not be included were excluded from further analysis. Stimuli and Procedure To test whether a video task could be used to distinguish the different levels of brand familiarities, we manipulated brand familiarity by using national brands from two countries, Switzerland and Slovenia. A pre-selected set of brand logos from both countries from the second study was presented to participants from Switzerland. Participants in the experiment were instructed to detect a logo in a video, which went from pure noise to the target brand image. The noisy starting point was generated by drawing a random RGB value for each pixel of the video. As the video progressed, random sets of noisy pixels were gradually replaced with pixels from the target image. The number of “flipped” pixes was determined based on an inversely s-shaped function (we used a scaled beta function) such that at the beginning of the video many pixels were flipped while in the middle part the flip rate was decreased. Each participant saw 20 video sequences. The logos in the videos were randomly drawn from the set of 20 videos; representing 10 unfamiliar logos and 10 familiar logos. To incentivize participants, they received trial-to-trial feedback in terms of points on their speed and accuracy after each round. More precisely, each video lasted for 20 seconds and participants started with 200 points, and for each millisecond participant took, we deducted 1 point from their score. If the participant didn’t correctly identify the brand logo, or if the video was played for more than one time, the participant would receive 0 points. At the end of the experiment, the average of all points was exchanged for lottery tickets. Among all lottery tickets from all U. Bernardic & B. Scheibehenne: Familiarity Attracts Consumer Attention: Two Methods to Objectively Measure Consumer Brand Familiarity 149 participants, we selected one winning number, and participant holding that number received 100 CHF of bonus. Figure 2: Screenshots of the video task. Results and Discussion In line with our prediction, Swiss participants were faster at finding swiss logos than Slovene logos in a video task. Using uninformative priors (Raftery, 1995) the difference between the Bayesian Information Criteria the baseline model (m0) and the extended model (m1) which included familiarity rating was 128, which translates into a Bayes factor (BF) of 4.4e+21 (Wagenmakers, 2007). In other words, familiar brands (swiss) were recognized more than 2 seconds faster (MRT =11.64, CIRT =0.25) than unfamiliar (Slovene) brands (MRT =13.87, CIRT =0.25) In summary, Study 2 provides evidence that also video task can predict brand familiarity. It demonstrates that visual attention is driven by brand familiarity and that the video task at hand provides an implicit measure of brand familiarity 3 Final Discussion and implications Our research sheds light on a prevalent, yet understudied research question of how brand familiarity affects visual attention. Across studies, we find converging empirical evidence that familiarity affects visual search efficiency. As a methodological contribution, we introduced two implicit measures of brand familiarity that rely on reaction times and thus avoid the pitfalls of subjective selfreports based on Likert scales. These paradigms can be used as a blueprint for researchers and practitioners alike. Moreover, all studies implemented incentive 150 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE alignment in which participants are rewarded for correct responses. Together with the use of real-world stimuli, this enhances the external validity of our findings. To the best of our knowledge, this is the first work that explores the effect of brand familiarity on search efficiency while controlling for distractor familiarity and bottom-up effects. We hope that our work inspires future research in several notable ways. First, it would be interesting to find out if visual search tasks can be designed to quantify both, bottom-up and top-down effects. We see a variety of interesting and unanswered questions in the marketing and branding domain such as whether and how bottom-up features, such as previous location and other design features interacts with top-down features, such as familiarity and goals. Recent research on brand logo design sheds light on the effectiveness of many bottom-up features; however, it is only studied with unfamiliar brands (Lieven, Grohmann, Herrmann, Landwehr, & van Tilburg, 2015; Luffarelli, Stamatogiannakis, & Yang, 2019). With recent changes in logos of global brands (Google, Messenger from Facebook), empirical research on how these visual elements (bottom-up effects) interact with brand familiarity, is needed. Second, we see the potential for the refinement and further development of objective measures based on implicit response times. Here, a nearby goal would be to further refine the proposed methods to achieve larger effect sizes and hence fewer repetitions within subjects. The current work further hints at the possibility of future research at the intersection between marketing and cognitive (neuro)science. For example, in visual attention, recent research by Sample, Hagtvedt, and Brasel (2019) could provide worthwhile theoretical foundations. In the long run, this work may also inform the effective design of new logos. In addition, future work may also test the observed top-down effects on visual attention with neuroscientific methods, and thus further strengthen the link between marketing and basic research on (visual) cognition and cognitive neuroscience. To conclude, observations that familiar brands are detected faster than unfamiliar brands improve our understanding of effective marketing and brand positioning, especially in attention bottleneck settings (i.e. mobile phones, online shops, crowded shelves), where attention is a scarce resource. Current research also presents a new look at fundamental studies on how to objectively measure brand familiarity. The U. Bernardic & B. Scheibehenne: Familiarity Attracts Consumer Attention: Two Methods to Objectively Measure Consumer Brand Familiarity 151 methods presented here may help brand managers to monitor brand familiarity, give insights about visual attention attributes of their logos, and determine how their brands can stand out to consumers during the very short exposures they have in online settings and even more on mobile screens. References Aaker, J. L. (1997). Dimensions of brand personality. Journal of Marketing Research, 34(3), 347–356. https://doi.org/10.2307/3151897 Balas, B., Cox, D., & Conwell, E. (2007). The effect of real-world personal familiarity on the speed of face information processing. PLoS ONE, 2(11), 1–5. https://doi.org/10.1371/journal.pone.0001223 Brennan, I., & Babin, L. A. (2004). Brand placement recognition: The influence of presentation mode and brand familiarity. Handbook of Product Placement in the Mass Media: New Strategies in Marketing Theory, Practice, Trends, and Ethics, 6491, 185–202. De Houwer, J. (2006). Handbook of implicit cognition and addiction. Sage Publications, Inc. Erdem, T. (1998). An empirical analysis of umbrella branding. Journal of Marketing Research, 35(3), 339–351. https://doi.org/10.2307/3152032 Keller, K. L. (2013). and Measuring , Brand Managing Customer-Based Equity, 57(1), 1–22. Kent, R. J., & Allen, C. T. (1994). Competitive Interference Effects in Consumer Memory for Advertising: The Role of Brand Familiarity. Journal of Marketing, 58(3), 97. https://doi.org/10.2307/1252313 Li, Q. (2013). A novel Likert scale based on fuzzy sets theory. Expert Systems with Applications, 40(5), 1609–1618. https://doi.org/10.1016/j.eswa.2012.09.015 Lieven, T., Grohmann, B., Herrmann, A., Landwehr, J. R., & van Tilburg, M. (2015). The effect of brand design on brand gender perceptions and brand preference. European Journal of Marketing, 49(1), 146–169. https://doi.org/10.1108/EJM-08-2012-0456 Luffarelli, J., Stamatogiannakis, A., & Yang, H. (2019). The Visual Asymmetry Effect: An Interplay of Logo Design and Brand Personality on Brand Equity. Journal of Marketing Research, 56(1), 89–103. https://doi.org/10.1177/0022243718820548 Malinowski, P., & Hübner, R. (2001). Malinowski&HÜbner(2001).pdf, 63(3), 458–463. Pieters, R., Warlop, L., & Wedel, M. (2002). Breaking through the clutter: Benefits of advertisement originality and familiarity for brand attention and memory. Management Science, 48(6), 765– 781. https://doi.org/10.1287/mnsc.48.6.765.192 Qin, X. A., Koutstaal, W., & Engel, S. A. (2014). The hard-won benefits of familiarity in visual search: Naturally familiar brand logos are found faster. Attention, Perception, and Psychophysics, 76(4), 914–930. Raftery, A. E. (1995). Bayesian Model Selection in Social Research. Sociological Methodology, 25(1995), 111–163. Sample, K. L., Hagtvedt, H., & Brasel, S. A. (2020). Components of visual perception in marketing contexts: a conceptual framework and review. Journal of the Academy of Marketing Science, 48(3), 405–421. https://doi.org/10.1007/s11747-019-00684-4 Sandford, A., Sarker, T., & Bernier, T. (2018). Effects of geometric distortions, Gaussian blur, and contrast negation on recognition of familiar faces. Visual Cognition, 26(3), 207–222. https://doi.org/10.1080/13506285.2017.1407853 Shen, J., & Reingold, E. M. (2001). Visual search asymmetry : The influence of stimulus familiarity and low-level features, 63(3), 464–475. 152 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Wagenmakers, E.-J. (2007). A practical solution to the pervasive. Psychonomic Bulletin and Review, 14(5), 779–804. Wang, Q., Cavanagh, P., & Green, M. (1994). Familiarity and pop-out in visual search, 56(5), 495–500. Wolfe, J. M. (2020). Visual Search: How Do We Find What We Are Looking For? Annual Review of Vision Science, 6, 539–562. https://doi.org/10.1146/annurev-vision-091718-015048 Wolfe, J. M., & Horowitz, T. S. (2017). Five factors that guide attention in visual search. Nature Human Behaviour, 1(3), 1–8. https://doi.org/10.1038/s41562-017-0058 Wu, H., & Leung, S. O. (2017). Can Likert Scales be Treated as Interval Scales?—A Simulation Study. Journal of Social Service Research, 43(4), 527–532. Zaltman, G. (2003). How customers think: Essential insights into the mind of the market. Harvard Business Press., 27(3), 480. https://doi.org/10.2501/s026504870808013x Zhou, K. Z., & Nakamoto, K. (2007). How do enhanced and unique features affect new product preference? the moderating role of product familiarity. Journal of the Academy of Marketing Science, 35(1), 53–62. https://doi.org/10.1007/s11747-006-0011-3 PHYSICAL VS. DIGITAL INTERACTIONS: VALUE GENERATION WITHIN CUSTOMER-RETAILER INTERACTION MANUEL GEIGER, FRANZISKA JAGO & SUSANNE ROBRA-BISSANTZ Technische Universität Braunschweig, Chair of Information Management, Braunschweig, Germany; e-mail: m.geiger@tu-bs.de, f.jago@tu-bs.de, s.robrabissantz@tu-bs.de Abstract The traditional retail sector is currently facing major challenges, particularly due to digitalisation and the associated changes in customer behaviour, increasing demands in the service world, new technologies and other factors. The COVID19 pandemic has accelerated and intensified this process. From a retailer's point of view, it is essential to create value for the customer through digital interactions. In this article, a study based on the Value in Interaction Model investigates whether it is possible for physical retailers to make a digitally supported interaction as valuable as the direct contact in the store and what influence this has on the Perceived Relationship Quality. The results show that the difference in perceived value between the physical and digital retailer interaction is relatively small. This proves that when the interaction layers are actively designed with a focus on value, a digital interaction can be almost as valuable as the traditional in-store interaction. DOI https://doi.org/10.18690/978-961-286-485-9.12 ISBN 978-961-286-485-9 Keywords: value in interaction, retail, digital interaction, relationship quality, value generation 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 154 1 Introduction Not only since the COVID-19 pandemic the stationary retail sector has been facing major challenges. Digitalization (Hagberg et al., 2016) and the accompanying changes in customer behaviour (Spaid & Flint, 2014), new and innovative competitors with disruptive approaches and advantages, increasing demands in the service world (e.g. same day delivery), new technologies (e.g. emotion-based IS support (Meyer et al., 2021)) and sales channels - all this means a major change to stationary retail and the associated traditional mechanisms and approaches. The development shows that retailers must avoid a further loss of customer contact (HDE, 2019) at all costs. We suggest that the interactions with the customers and their design must be placed in the center of attention. To create meaningful and valuable interactions, Geiger et al. (2020) have proposed the Value in Interaction Model (consisting of three layers: Relationship Layer, Matching Layer and Service Layer (see Figure 1). Customers access the digital offers of companies via digital interfaces, they use digital mediation platforms or comparison offers, inform themselves in web shops or via apps. Ultimately, a more or less successful and thus, valuable digital interaction then decides which products or services the customer chooses. It is no longer sufficient for a retailer to have only competences to deliver its standard service offering. The interactions should be actively designed on the three layers to generate (positive) value for all participating actors. As described, it becomes apparent that the stationary retail sector has major problems in designing valueadded IT-supported interactions. While larger companies usually have both the financial and human resources to drive such developments, smaller ones often lack directly implementable solutions. One such potentially promising and easy-todeploy service is the use of a messenger channel for customer communication. In the context of this article, a study based on the Value in Interaction Model examines whether it is possible for physical retailers to make a digitally supported interaction just as valuable as the direct contact in the store and what effect this has on the Perceived Relationship Quality (PRC). After briefly explaining the Value in Interaction Model in the second section, section 3 deals with the PCR. Section 4 focuses on the methodology of the study and data collection before deriving the hypotheses in Section 5. While the results of the survey are presented in section 6, we finally draw a conclusion and give an outlook in section 7. M. Geiger, F. Jago &S. Robra-Bissantz: Physical vs. Digital Interactions: Value Generation Within Customer-Retailer Interaction 2 155 Value in Interaction In marketing, theories like Service Logic (SL) or Service Dominant Logic (S-D logic) have been developed, which show companies how they can successfully design services in a very strongly customer-centric view (e. g. Grönroos, 2006; Vargo & Lusch, 2004). These service-centric theories have changed the way of thinking about what happens in business. The focus lies on the value for the customer, which is always created by a service. It is then no longer the provider with its product that creates value, but the value arises from the fact that the customer makes use of the provider's competences – called Value in Use (Grönroos, 2006). This value is measured solely from the added value that the customer derives from it. The dedicated consideration of the Value in Use of a service has proven to be a starting point for successful market offers. It is therefore obvious to also measure digital interactions by the value they offer for the customer. Wikström (1996) already pointed out that value is created in dialogue between actors within interactions. Interactions refer to practices in which actors are integrated into each other's processes (Grönroos & Ravald, 2011). They always should serve to realise specific purposes. However, the human being as a social being achieves a value in the interaction itself during communication. As described by Geiger et al. (2020b), the Value in Interaction can be created through digital services in the interaction and is based on the providers special competences Figure 1: Value in Interaction Model and Perceived Relationship Quality. Source: based on Geiger et al. (2020a) The basis of any interaction is a connection between the actors in a shared Interaction Space (Grönroos, 2006), which can be provisioned by both actors. Such an Interaction Space can be the physical store of a retailer, but also a digital space, such as a website, an app or the usage of a messenger. Through interactions in this Interaction Space, the 156 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE actors have the opportunity to engage with the other actor or to influence their behaviour (Geiger et al., 2020a). However, this is only successful if the interaction is also seen as valuable by both actors (Fyrberg & Jüriado, 2009). From the provider's point of view, the goal is to open up Interaction Spaces with customers, to expand them if possible, or to be able to open them up again and again. The Value in Interaction arises within such an Interaction Space. It develops through and during the interaction, it unfolds its effect in the moment and thus influences the further processes of joint value creation (co-creation). In addition to the learning effects from successful interactions for follow-up interactions, value at the three layers also plays a longterm, direct role in the context of the actors' relationship (Geiger et al., 2021). However, the mere existence of an interaction does not lead to value. Rather, it depends on the quality of the interaction (Fyrberg & Jüriado, 2009). Thus, an interaction characterised by mediocre or even negative aspects (lack of quality) will have a negative impact on the PCR of the customer with the service or product (Geiger et al., 2021). Initial studies have shown that the composition of the Value in Interaction Model is basically suitable for significantly influencing the PRQ (Geiger et al., 2021). As a result, a large proportion of the PRQ can be explained by the Value in Interaction. This shows that the Relationship Layer, Matching Layer and Service Layer should be taken into account from a company's perspective when designing any interaction. If a company, and here in particular the bricks and mortar retail, manages to satisfy the needs of the customer on the individual layers in the interaction, this positively influences the PRQ. In addition to the actual competences in service provision, this requires further competences in order to be able to actively shape the individual layers of the Value in Interaction. Interactions that are adapted to the needs are thus relevant in order to build a high relationship quality between actors. 3 Perceived Relationship Quality From a business perspective, an interaction with customers should always positively influence the relationship between the actors in order to contribute to shaping a long-term relationship. The Relationship Value described in the Value in Interaction Model consists, among other things, of the relationship-relevant advantages and disadvantages that the customer makes use of (Cronin et al., 1997; Dodds et al., 1991; Grewal et al., 1998). A relationship-relevant advantage can be, for example, higher esteem and a more confidential relationship, a disadvantage a resulting dependency. However, the advantages are not derived from the value, but primarily M. Geiger, F. Jago &S. Robra-Bissantz: Physical vs. Digital Interactions: Value Generation Within Customer-Retailer Interaction 157 from the PRQ (Hennig‐ Thurau & Klee, 1997). This thus depends closely on the expectations of both parties as well as their subjective evaluation of the satisfaction - and this concretely in every contact, every interaction between the actors. Thus, the value resulting from the Relationship Layer in the Value in Interaction Model is relatively more important in the initial stage of a relationship than at a later stage. The longer the relationship lasts, the more important the PRQ becomes. As already proven (Geiger et al., 2021), it can therefore be assumed that a successful interaction, which results in a positive Value in Interaction, also positively influences the PRQ and is thus a cornerstone for a long-term customer relationship. Relationship quality consists of several components, on which research is largely unanimous. Based on the long-term accepted view of Hennig‐Thurau & Klee ( 1997) (based on e.g. Crosby et al. (1990), Dorsch et al. (1998), Garbarino & Johnson (1999) and Smith (1998)) PRQ can be measured by (1) customer satisfaction, (2) the trust of the customers and (3) commitment to the relationship. The PRQ of the two parties involved has a significant impact on the duration and intensity of the underlying relationship (Hennig‐ Thurau & Klee, 1997). Accordingly, the PRQ is one of the most important determinants in the evaluation of a relationship in terms of permanence and intensity. 4 Research Methodology and Data Collection This paper aims to find out whether a digital interaction between retailer and customer leads to a comparable value generation in the context of Value in Interaction and what effect this has on the PRQ. In the following section, the research methodology used, and the data collection are presented. 4.1 Operationalisation of the Model Scales In order to obtain robust results, validated scales from existing research were used for data collection. The scales used in this paper for the components under investigation are well established and well founded in the literature. The scale of Relationship Value is captured by the "Relationship Value" (RV), which is represented by the four items from (Nguyen & Nguyen, 2011). The Matching Value is measured via the “Decision Convenience” (DC), "Access Convenience" (AC) and the "Benefit Convenience" (BC) (Colwell et al., 2008). Based on the work of Ruiz et al. (2008), 158 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE the Service Value consists of the "Service Value" (SV), the "Service Quality" (SQ) and the "Perceived Sacrifice" (PS). PRQ, as already mentioned, consists of the three scales "Relationship Satisfaction" (RS), "Trust" (TR) and "Commitment to the Relationship" (CR) (Adjei et al., 2010; Morgan & Hunt, 1994; Wulf et al., 2001). All scales were translated from English into German using DeepL 1 and adapted to the scenarios. In addition, items with inappropriate content were excluded due to the subject of the study. All scales were measured on a 5-point Likert scale (5=strongly agree). The survey also asked about gender, age and if they can empathise well with the described situation. Internal consistency for each of the scales was examined using Cronbach’s alpha. By eliminating items, a substantial increase in alpha could be achieved (see section 6). 4.2 Data Collection and Sample The data was collected via an online survey conducted in German and distributed via various mailing lists of a German university and via platforms like SurveyCircle and Pollpool2. Before the survey was made available to the public at the end of December 2020, a pretest was held with five participants. The actual survey took three weeks. Participation was voluntary in all cases. Two different scenarios for (a) interaction in physical retail (scenario 1) and (b) digital interaction of physical retail via messenger (scenario 2) were described in detail. In order to make it easier for the test persons to empathies, the textual description of the situation was underpinned with pictures. The use cases were about a gift search for a third person one day before Christmas. In scenario 1 (S1), the consultation took place in a bookstore, in scenario 2 (S2) the bookstore interacted via WhatsApp Messenger. To ensure comparability, the interaction via messenger was identical to the interaction in physical retail. Where an exact transfer of the physical interaction into the digital interaction was not possible, adequate services were used (e. g. direct takeaway of the gift in scenario 1 vs. same-day delivery in scenario 2). The allocation to the two scenarios was done randomly with a probability of 50 % in each case. The data was analysed using SPSS Statistics 25. DeepL: www.deepl.com https://www.surveycircle.com/de/ and https://www.poll-pool.com/: Study dissemination platform for generating participants 1 2 M. Geiger, F. Jago &S. Robra-Bissantz: Physical vs. Digital Interactions: Value Generation Within Customer-Retailer Interaction 159 150 participants completed the entire questionnaire. Five data sets had to be eliminated due to uniform response behaviour. In the end 145 valid responses were available. The demographic information on the sample and other characteristics of the subjects are listed in Table 1. Table 1: Demographic Information Characteristic Sample Size Age Sex Empathise well with the situation 5 Distribution 145 (scenario 1: 74, scenario 2: 71) Range: 19 – 59 years Mean: 28,4 Median: 26,0 male: 53 (scenario 1: 28, scenario 2: 25) female: 92 (scenario 1: 46, scenario 2: 46) other: 0 scenario 1: 94,6% (70 participants) scenario 2: 78,9% (56 participants) Derivation of hypotheses The direct social interaction in 1-to-1 counselling in physical retailing has advantages in shaping the relationship. Creating an equivalent experience in the digital space seems more difficult due to the lack of human interaction and related physically visible expressions (e. g. emotions via voice pitch or body language) (Otto & Chung, 2000). It can therefore be assumed that direct interaction in physical retail has an advantage over digital interaction in shaping the interaction on the Relationship Layer and thus in achieving value. H1: Physical retail interaction can achieve higher Relationship Value than a digital interaction performed by physical retail. Information is needed to match the interaction components with the needs of the actor to design the relationship and service layer. This information about the customer is either already available in physical retail or it is the responsibility of the sales staff to find it out. In the context of this study, a stand-alone interaction was investigated. Thus, there was no existing information about the customer and the concrete needs. Due to the personal interactions and direct responses, it must be 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 160 assumed that interaction in physical retail has an advantage over digital interaction in shaping the interaction on the Matching Layer and thus in achieving value. H2: Physical retail interaction can achieve higher Matching Value than a digital interaction performed by physical retail. If the goal of a customer is to find a gift, as in the context of the study conducted, physical retail can also express its advantages. Inspiration is a core function in retailing (Böttger, 2015). With creating a stimulating shopping environment and due to the service of physical examination and direct availability (Otto & Chung, 2000) physical retailer can inspire their customers in their stores. Therefore, it can be assumed that direct interaction in physical retail has an advantage over digital interaction in shaping a valuable Service Layer. H3: Physical retail interaction can achieve higher Service Value than a digital interaction performed by physical retail. As already examined by Geiger et al. (2021) in a recent study, the three layers of Value in Interaction have an influence on the PRQ. Following the explanations of the preceding hypotheses, it can therefore also be assumed that direct interaction in physical retail has an advantage over digital interaction when it comes to PRQ. H4: Physical retail interaction can achieve a higher PRQ than a digital interaction performed by physical retail. 6 Results For the following comparison of the two scenarios on the different layers of Value in Interaction and PRQ, different statistical methods were used. To ensure valid results, the internal consistency of the scales was checked using Cronbach's α. Thus, no item of the Relationship Value scale, two of the eight items in the Matching Value (MV) scale for S1, two of the seven items of the Service Value (SV) scale for S1 and S2 and three (S1) respectively one (S2) of the 16 items of the PRQ scale had to be eliminated. The data was tested for normal distribution using the Shapiro-Wilk Test. The results indicate a non-normal distribution for all scales (p<0.01). Since ordinal scaled data was analysed, the Mann-Whitney-U-Test (U) was used to find out whether the central tendencies of the independent samples differ. Since the sample M. Geiger, F. Jago &S. Robra-Bissantz: Physical vs. Digital Interactions: Value Generation Within Customer-Retailer Interaction 161 is larger than 30, we report the asymptotic 2-sided significance. The results are shown in Table 2. Table 2: Statistical results α RV MV SV PRQ S1 S2 S1 S2 S1 S2 S1 S2 .797 .824 .876 .853 .894 .864 .900 .903 Mean Rank 77.54 68.27 83.89 61.65 83.19 62.38 83.98 61.56 U Z Sig.3 2291.000 -1.337 .181 1821.500 -3.195 .001*** 1873.000 -2.997 .003*** 1814.500 -3.215 .001*** Mdn 4.67 4.13 4.50 4.17 3.85 3.53 r .265 .249 .267 Significance level (two-tailed): *** < 1 % Relationship Value: For Relationship Value there was no statistically significant difference in S1 and S2, U = 2291.00, Z = -1.337, p = .181. H1 must be rejected for this reason. Matching Value: A comparison of the two mean ranks between S1 (83.89) and S2 (62.38) shows that the two groups might have a different central tendency. The Matching Value is higher with the physical interaction; exact Mann-Whitney-U-Test: U = 1821.500, p = .001. H2 can thus be confirmed. Service Value: Again, a comparison of the two mean ranks between S1 (82.19) and S2 (62.38) shows that the two groups might have a different central tendency. The Service Value is higher with the physical interaction; exact Mann-Whitney-U-Test: U = 1873.000, p = .003. H3 can thus be confirmed. Perceived Relationship Quality: Finally, when comparing the two mean ranks between S1 (83.98) and S2 (61.56), it can be reported that the two groups might have a different central tendency as well. The PCR is higher with the physical interaction; exact Mann-Whitney-U-Test: U = 1814.5000, p = .001. H4 can therefore also be confirmed. 3 Asymptotic 2-sided significance 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 162 7 Conclusion and Outlook Due to the high values, the results basically show that the use cases were suitable to represent a valuable interaction in retail. In the end, three of the four hypotheses were confirmed. While no statement can be made about the value creation on the Relationship Layer, the physical interaction manages to generate more value on the Matching Layer and the Service Layer. As was to be expected, this also leads to a higher PRQ. The biggest difference was .45 on the Matching Layer. At this layer, it thus seems to be a particular challenge to find out the exact need of the customer in the context of a digital interaction. This is also understandable, as the use case in question here involved an initial contact between the customer and the retailer. It can be assumed that on the basis of several successive interactions, a better knowledge base can be created by data storing and interpreting the different interactions. Surprisingly, however, the difference in perceived value (Matching Value and Service Value) between the physical and the digital retailer interaction is rather small. This shows that when the layers are actively designed with a focus on value, a digital interaction can be almost as valuable as the traditional in-store interaction. Previous studies have shown that the three layers of Value in Interaction are capable of significantly influencing the PRQ (Geiger et al., 2021). PRQ for digital retail interaction is .32 lower than physical interaction. So, when it comes to relationship quality, the additional benefit between the different interaction channels also seems to be low. In order to be able to actively shape the individual layers of the Value in Interaction, further competences are required in addition to the actual competences in standard service delivery (Geiger et al., 2020b). In addition, many former customers are no longer (physical) accessible to retailers due to declining customer frequency (HDE, 2019), with the COVID-19 pandemic accelerating this process by five years (IBM, 2021). Customer behaviour itself is changing (Spaid & Flint, 2014) and especially the younger prefer to shop online instead (Sabanoglu, 2017). Accordingly, it is all the more important for retailers to place digital interactions and their valuable design at the heart of their business. With regard to the limitations, it must be taken into account that the scales used were created by different authors and thus may have been perceived differently by the participants. The extent to which it is possible to achieve a higher value with digital interactions or whether digitally supported interactions (digital plus direct interaction) are the best way to generate value should be further researched. Even though there are already initial studies on the impact of the three layers on PRQ (Geiger et al., 2021), a precise analysis of this relationship M. Geiger, F. Jago &S. Robra-Bissantz: Physical vs. Digital Interactions: Value Generation Within Customer-Retailer Interaction 163 should be carried out in the context of the use cases described here. In further research, the concrete influencing components of an interaction are also to be identified in order to develop concrete guidelines and design patterns for the active design of interactions on this basis. In addition, the technologies currently discussed in IS and their applications such as emotion recognition (Meyer et al., 2019), personality mining (Ahmad et al., 2021), AI or chatbots are to be examined in relation to the Value in Interaction Model. The aim is to find out how these technologies have to be integrated into the interactions between retailers and customers in order to generate value and what contribution they make to the PRQ in comparison to each other. References Adjei, M. T., Noble, S. M., & Noble, C. H. (2010). The influence of C2C communications in online brand communities on customer purchase behavior. Journal of the Academy of Marketing Science, 38(5), 634–653. https://doi.org/10.1007/s11747-009-0178-5 Ahmad, R., Siemon, D., & Robra-Bissantz, S. (2021). Communicating with Machines: Conversational Agents with Personality and the Role of Extraversion. 11. https://doi.org/10.24251/HICSS.2021.492 Böttger, T. (2015). Inspiration in Marketing: Foundations, Process, and Application [University of St. Gallen, School of Management, Economics, Law, Social Sciences and International Affairs]. https://www1.unisg.ch/www/edis.nsf/SysLkpByIdentifier/4395/$FILE/dis4395.pdf Colwell, S. R., Aung, M., Kanetkar, V., & Holden, A. L. (2008). Toward a measure of service convenience: Multiple‐item scale development and empirical test. Journal of Services Marketing, 22(2), 160–169. https://doi.org/10.1108/08876040810862895 Cronin, J. J., Brady, M. K., Brand, R. R., Hightower, R., & Shemwell, D. J. (1997). A cross‐sectional test of the effect and conceptualization of service value. Journal of Services Marketing, 11(6), 375–391. https://doi.org/10.1108/08876049710187482 Crosby, L. A., Evans, K. Rr., & Cowles, D. (1990). Relationship Quality in Service Selling: An Interpersonal Influence Perspective. Journal of Marketing, 54(3), 68–81. https://doi.org/10.2307/1251817 Dodds, W. B., Monroe, K. B., & Grewal, D. (1991). Effects of Price, Brand, and Store Information on Buyers’ Product Evaluations. Journal of Marketing Research, 28(3), 307–319. https://doi.org/10.2307/3172866 Dorsch, M. J., Swanson, S. R., & Kelley, S. W. (1998). The Role of Relationship Quality in the Stratification of Vendors as Perceived by Customers. Journal of the Academy of Marketing Science, 26(2), 128–142. https://doi.org/10.1177/0092070398262004 Fyrberg, A., & Jüriado, R. (2009). What about interaction?: Networks and brands as integrators within service‐dominant logic. Journal of Service Management, 20(4), 420–432. https://doi.org/10.1108/09564230910978511 Garbarino, E., & Johnson, M. S. (1999). The Different Roles of Satisfaction, Trust, and Commitment in Customer Relationships. Journal of Marketing, 63(2), 70–87. https://doi.org/10.2307/1251946 Geiger, M., Moser, J.-M., & Robra-Bissantz, S. (2021). Value in Interaction meets Relationship Quality: Der Wert von Interaktionen für eine langfristige Kundenbeziehung. HMD Edition 2020, 10. 164 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Geiger, M., Robra-Bissantz, S., & Meyer, M. (2020a). Focus on Interaction: Applying Service-Centric Theories in IS. 33RD BLED EConference Enabling Technology for a Sustainable Society, 8. https://doi.org/10.18690/978-961-286-485-9.46 Geiger, M., Robra-Bissantz, S., & Meyer, M. (2020b). Wie aus digitalen Services Wert entsteht: Interaktionen richtig gestalten. HMD Praxis der Wirtschaftsinformatik, 57(3), 385–398. https://doi.org/10.1365/s40702-020-00611-0 Grewal, D., Monroe, K. B., & Krishnan, R. (1998). The Effects of Price-Comparison Advertising on Buyers’ Perceptions of Acquisition Value, Transaction Value, and Behavioral Intentions. Journal of Marketing, 62(2), 46–59. https://doi.org/10.2307/1252160 Grönroos, C. (2006). Adopting a service logic for marketing. Marketing Theory, 6(3), 317–333. https://doi.org/10.1177/1470593106066794 Grönroos, C., & Ravald, A. (2011). Service as business logic: Implications for value creation and marketing. Journal of Service Management, 22(1), 5–22. https://doi.org/10.1108/09564231111106893 Hagberg, J., Sundstrom, M., & Egels-Zandén, N. (2016). The digitalization of retailing: An exploratory framework. International Journal of Retail & Distribution Management, 44(7), 694–712. https://doi.org/10.1108/IJRDM-09-2015-0140 HDE. (2019). Online-Monitor 2019. Handelsverband Deutschland. https://einzelhandel.de/index.php?option=com_attachments&task=download&id=10168 Hennig‐Thurau, T., & Klee, A. (1997). The impact of customer satisfaction and relationship quality on customer retention: A critical reassessment and model development. Psychology & Marketing, 14(8), 737–764. https://doi.org/10.1002/(SICI)1520-6793(199712)14:8<737::AID-MAR2>3.0.CO;2-F IBM. (2021). IBM U.S. Retail Index. https://www.ibm.com/industries/retail Meyer, M., Helmholz, P., Rupprecht, M., Seemann, J., Tönnishoff, T., & Robra-Bissantz, S. (2019). From the Inside Out: A Literature Review on Possibilities of Mobile Emotion Measurement and Recognition. 27. https://aisel.aisnet.org/bled2019/23 Meyer, M., Siemon, D., & Robra-Bissantz, S. (2021). Emotion-based IS support for CustomerSalesperson Interaction. 10. https://doi.org/10.24251/HICSS.2021.538 Morgan, R. M., & Hunt, S. D. (1994). The Commitment-Trust Theory of Relationship Marketing. Journal of Marketing, 58(3), 20–38. https://doi.org/10.2307/1252308 Nguyen, T. D., & Nguyen, T. T. M. (2011). Enhancing relationship value between manufacturers and distributors through personal interaction: Evidence from Vietnam. Journal of Management Development, 30(4), 316–328. https://doi.org/10.1108/02621711111126800 Otto, J. R., & Chung, Q. B. (2000). A Framework for Cyber-Enhanced Retailing: Integrating ECommerce Retailing with Brick-and-Mortar Ret. 8. Ruiz, D. M., Gremler, D. D., Washburn, J. H., & Carrión, G. C. (2008). Service value revisited: Specifying a higher-order, formative measure. Journal of Business Research, 61(12), 1278– 1291. https://doi.org/10.1016/j.jbusres.2008.01.015 Sabanoglu, T. (2017). Online shopping preference in the United States as of 2017, by age group. Statista.Com. https://www.statista.com/statistics/242512/online-retail-visitors-in-the-us-byage-group/ Smith, J. B. (1998). Buyer–Seller relationships: Similarity, relationship management, and quality. Psychology & Marketing, 15(1), 3–21. https://doi.org/10.1002/(SICI)1520-6793(199801)15:1<3::AID-MAR2>3.0.CO;2-I Spaid, B. I., & Flint, D. J. (2014). The Meaning of Shopping Experiences Augmented By Mobile Internet Devices. Journal of Marketing Theory and Practice, 22(1), 73–90. https://doi.org/10.2753/MTP1069-6679220105 Vargo, S. L., & Lusch, R. F. (2004). Evolving to a New Dominant Logic for Marketing. Journal of Marketing, 68(1), 1–17. https://doi.org/10.1509/jmkg.68.1.1.24036 Vargo, S. L., & Lusch, R. F. (2008). Service-dominant logic: Continuing the evolution. Journal of the Academy of Marketing Science, 36(1), 1–10. https://doi.org/10.1007/s11747-007-0069-6 M. Geiger, F. Jago &S. Robra-Bissantz: Physical vs. Digital Interactions: Value Generation Within Customer-Retailer Interaction 165 Wikström, S. (1996). Value creation by company‐consumer interaction. Journal of Marketing Management, 12(5), 359–374. https://doi.org/10.1080/0267257X.1996.9964422 Wulf, K. D., Odekerken-Schröder, G., & Iacobucci, D. (2001). Investments in Consumer Relationships: A Cross-Country and Cross-Industry Exploration. Journal of Marketing, 65(4), 33–50. https://doi.org/10.1509/jmkg.65.4.33.18386 166 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE ALTERNATIVE DATA FOR CREDIT RISK MANAGEMENT: AN ANALYSIS OF THE CURRENT STATE OF RESEARCH JAN ROEDER University of Goettingen, Faculty of Business and Economics, Goettingen, Germany; e-mail: jan.roeder@uni-goettingen.de Abstract Determining credit risk is important for banks and nonbanks alike. For credit risk management, the heterogeneous data generated today can potentially complement the established data such as balance sheet ratios. It has not yet been clearly shown which alternative data sources, such as social media or satellite data, provide added value and how this value can be extracted effectively. This review provides an overview of the intersection between these areas and develops a research agenda. The analysis of the 29 identified papers shows that the use of financial news is analyzed most frequently. Social media has also been used to some extent. The use of other alternative data sets, such as geospatial data, has been analyzed infrequently. The empirical evidence suggests that alternative data can provide both explanatory and predictive benefits in credit risk management. Convergence in terms of analytical approaches and evaluation offers the potential to advance the field. DOI https://doi.org/10.18690/978-961-286-485-9.13 ISBN 978-961-286-485-9 Keywords: credit risk, alternative data, literature review, unstructured data 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 168 1 Introduction Determining credit risk is an essential task for banks and non-banks. For example, non-banks need to monitor their accounts receivables exposure and banks judge the creditworthiness of borrowers (Koulafetis 2017). In addition to established credit risk indicators (i.e., balance sheet ratios or market-based indicators (Altman and Saunders 1997)), the interest in using supplementary alternative data sources (ranging from sensor to social media data) has increased. The promising aspect is a potentially low rivalry of such data for risk management, i.e., the usefulness does not necessarily diminish with increasing dissemination of the data (Monk et al. 2019). Additionally, Mengelkamp et al. (2015) call for a further investigation of how usergenerated content, which can be understood as a type of alternative data, can be integrated into corporate credit risk analysis. Although several literature reviews are situated at the intersection of alternative data (specifically text data) and finance research in general (Loughran and McDonald 2016; Nassirtoussi et al. 2014; Xing et al. 2017), there is none for the intersection of credit risk and alternative data specifically. Therefore, this paper’s underlying research questions (RQ) are: 1) What is the current state of research on using alternative data for supporting credit risk management? And building on that: 2) What are research gaps that future research should address? After outlining the theoretical foundations, I define relevant parameters for the literature review. Afterwards, the results are presented and analyzed. Based on the gained insights, a research agenda is formulated, which can help to guide future research. 2 Theoretical Background 2.1 Alternative and Heterogeneous Data Alternative data describes potentially decision-relevant but underutilized data sources, which are only available in unstructured form and cannot be used in established forecasting or risk models without prior processing (Monk et al. 2019). The potential originates from the idea that these data sources can contain important signals, for example, to identify changed customer behavior or risk situations. Especially because social media posts or anonymized credit card transactions occur with a higher frequency compared to more traditional information sources like earnings conference calls, these data sources could help to improve our risk understanding (Monk et al. 2019). The spectrum of alternative data ranges from app J. Roeder: Alternative Data for Credit Risk Management: An Analysis of the Current State of Research 169 usage data, anonymized credit card transactions, point of sales data, or job advertisements to data on the utilization of cruise ships (alternativedata.org 2020). Roughly classified, such data can originate from individual processes, business processes, or even sensors (Monk et al. 2019). However, the universe of alternative data is so broad that no exhaustive enumeration can be provided. It should also be noted that alternative data is ultimately a collective term. There may be differences in the volume, granularity, relationality, or accuracy of the data (Monk et al. 2019; Roeder et al. 2020). This also means that different techniques for processing, storage, and analysis may be necessary. 2.2 Credit Risk Management Credit risk describes the threat that a borrower does not repay a granted loan or fails to meet contractual obligations (Caouette et al. 2008). Types of financial risk besides credit risk include strategic risk, market risk, or compliance risk (Lam 2014). The credit risk management (CrRM) process includes the identification of risk, credit risk assessment (CRA), treatment of risk, and implementation of actions (Van Gestel and Baesens 2008). In CRA, a distinction can be made between accounting-based models (e.g., Z-score by Altman (1968)) and market-based models (Das et al. 2009). Empirical findings indicate that both approaches can be combined to increase the explanatory power (Das et al. 2009). Since the second Basel accord permits banks to use internal-rating-based approaches, they use more advanced methods (McNeil et al. 2015). Machine learning models have become increasingly relevant for credit risk prediction in recent years, of which Chen et al. (2016) provides an overview. A fundamental distinction is made based on the analyzed entity. Publicly traded companies follow strict requirements regarding corporate disclosure. Hence, accounting ratios, market-based metrics (e.g., credit default swaps (CDS), bond spreads), and credit ratings can be utilized. For private companies, the available data universe is more limited. It includes credit ratings, past transactions, industry specifics or the quality of management (Schumann 2002). However, this paper does not analyze private individuals. In a broader sense, credit risk could include all literature on stock price forecasting, etc. For this broad perspective, please refer to existing research (Loughran and McDonald 2016; Nassirtoussi et al. 2014; Xing et al. 2017). In contrast, this literature review focuses on research dealing with the credit risk of public and private companies using the automated analysis of alternative data. Table summarizes the scope of this paper. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 170 Table 1: Scope of the literature review (bold is examined in more detail in this paper) Broadness of (credit) risk understanding Entity assessed 3 Risk management Public comp. Credit risk Credit risk management assessment Private comp. Individual Sovereign Research Method This study builds on the work on literature reviews by Webster and Watson (2002) and vom Brocke et al. (2009) to synthesize existing research on alternative data for CRA. First, I define criteria for the relevance of papers. Table shows the inclusion criteria. For research to be relevant, it must examine the intersection between CrRM and alternative data. The focus lies on underexplored data sources such as news, social media, or even sensor data. Table 2: Relevance criteria applied in the literature search Required inclusion condition Label “Relevant” Label “Borderline” Deals with CrRM (e.g., identifies, assesses, or monitors credit risk) of companies (public and private). Uses alternative data (e.g., satellite images, …) that occurs irregularly/with high frequency, uses innovative approaches. Uses established data sources (e.g., form 10-K data) but utilizes interesting approaches transferable to alternative data. A comprehensive database search is conducted to identify relevant prior work. Conference and journal papers are included since the research area under investigation is still quite young. The search process is shown in Figure. J. Roeder: Alternative Data for Credit Risk Management: An Analysis of the Current State of Research OR OR unstructured alternative heterogeneous heterogeneity text mining 171 social media news satellite AND traffic sensor credit risk credit rating counterparty risk credit scoring default risk Search terms credit default concentration risk bankruptcy probability of default Read title, abstract 6220 matches Databases Read full article 59 matches Database ACM Digital Library AISeL Business Source Premier Emerald Insight IEEE Xplore Hits 1 6 4 2 2 Inclusion criteria Backward and forward search 22 matches Database JSTOR Proquest ABI INFORM ScienceDirect Springer Link Hits 0 1 4 2 29 matches Database Union Catalog (GVK) WiSo Backward Search Forward Search Hits 0 0 4 3 Figure 1: Literature search process 4 Results 4.1 Result Analysis The papers in Error! Reference source not found. show the following discipline distribution (not shown in table): Finance (11), information systems (12), and computer science (6). The moderate number of papers can be attributed to the novelty of this research area. The availability of data sources is tightly coupled with the entity whose credit risk is assessed. As a side note, papers tend to exclude banks because their financial metrics are distributed differently and therefore may not be comparable (e.g., Lu et al. (2015)). The number of papers analyzing public companies is distributed relatively evenly between non-banks (27) and banks (19). Not publicly traded companies were analyzed less frequently (6). The reason could be that more data is available for exchange-listed companies due to the disclosure obligations. Regarding the granularity of the analysis, eight studies are carried out at the annual level and five at the quarterly level. In these studies, accounting ratios can be integrated into the analysis straightforwardly. The situation is different for the analyses at a monthly (1), weekly (2), and daily level (4), where traditional regression analyses can be problematic due to autocorrelation issues when using quarterly numbers. Regarding alternative data sources, it is apparent that financial news (11) has been analyzed the most, followed by annual reports including 10-K filings (8) and posts on social media (6). Other data sources are transactions on B2B platforms 172 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE (1), search engine sentiment (1), or data on staffing decisions (1). No research on using textual financial analyst reports for CrRM could be identified. For the dependent variables, a categorical variable is used eight times and the credit rating by rating agencies seven times. The CDS spread is also used seven times as a dependent variable. In addition, the bond spread (2), the LIBOR-OIS spread (1), and equity volatility (1) need to be mentioned. One difference between the two main categorical measures and the CDS spread is that the CDS spread is a continuously updated market-based measure. Error! Reference source not found. also shows the statistical models, which link the endogenous variable to the signals extracted from alternative data sources. Finance-centric literature often uses logistic, linear, and panel regression to ensure sufficient interpretability. Here, the clustering of the data regarding the company and time period tends to be modeled explicitly, as is done using panel regression models in seven cases (e.g., Bao and Datta (2014); Liebmann et al. (2016); Tsai et al. (2016)). Contributions focused on machine learning often use more complex models (e.g., random forest or neural network) and optimize them extensively to optimize the predictive accuracy. Papers also develop custom architectures. For example, Zhao et al. (2019) propose a network architecture to incorporate financial variables and unstructured data. The data split (not in Error! Reference source not found. due to space limitations) indicates the extent to which a model’s forecasting capability has been verified. Fundamentally, both traditional statistical approaches (hypothesis testing and regression), often assessed in-sample, as well as insights stemming from machine learning, which often uses cross-validation, make important contributions. The identified data splits range from classical regression without a split (15) (Bao and Datta 2012; Hu et al. 2018) over the two-way split (10), i.e., train-test split, (Altman et al. 2010) to cross-validation (2), e.g., (Choi et al. 2020) and not available (2). Due to the relatively large number of publications without a data split, statements regarding the out-of-sample performance need to be interpreted cautiously. Regarding the central findings of the identified papers, the importance of the sentiment extracted from financial news for CRA could be shown quite consistently in varying research setups (Janner and Schmidt 2015; Liebmann et al. 2016; Lu et al. 2012; Norden 2017). The same applies to the volume of news (Tsai et al. 2016). The results are more ambiguous for automated topic extraction since the topic models and assigned topic labels vary from study to study. (Bao and Datta 2014; Hajek et al. J. Roeder: Alternative Data for Credit Risk Management: An Analysis of the Current State of Research 173 2017). For example, the topics “restructuring” and “investment policy” are found to be important in one study (Hajek et al. 2017) and “macroeconomic risk” and “funding risk” in another (Bao and Datta 2014). Fernandes and Artes (2016) and González-Fernández and González-Velasco (2019) represent more unusual approaches. The former uses spatial data to improve the CRA; the latter shows that search engine activity correlates with a credit risk measure. All in all, most papers identify an added value of the variables obtained from alternative data, providing explanatory value or improving the predictive power. Concerning design knowledge, few papers are fully situated in the design science research (DSR) paradigm. Design requirements or principles remain rather implicit. Hristova et al. (2017) propose the RatingBot and a process to extract a credit rating from text but the requirements arising from the problem domain could be formulated more explicitly. Zhao et al. (2019) propose a default prediction framework. However, the abstraction towards design principles or even theories is absent. Hence, a lot of untapped potential for research in the DSR paradigm is apparent. Table 3: Publications identified in the literature review (If not specified “Entities” includes banks and non-banks; * signals borderline relevance) Research paper Entities Alt. data source Risk measure Main results Event study, hypothesis test Credit analyst hiring has an impact on bond but not stock return Alternative data on legal actions by creditors helps to increase predictive power Proposed Sent-LDA improves identification of risk types With Sent-LDA, 2/3 risk types not relevant, three show risk increase and five decrease Fin. variables with complementary qualitative data achieves the best result Combination of fin. variables and qualitative data achieves the best prediction (Aktug et al. 2015) (Altman et al. 2010) PR NB Q Other Default category Log. reg. (Bao and Datta 2012)* (Bao and Datta 2014)* PU Y Annual reports Unsupervised Not applicable PU Y Annual reports Equity volatility Panel reg. (Cecchini et al. 2010)* PU Y Annual reports Default category SVM (Choi et al. 2020)* PU NB Y Annual reports Credit rating SVM, NN, RF Human resource (dep. variable) Bond spread Statistical Model Granul. PU E 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 174 (Fernandes and Artes 2016) (GonzálezFernández and GonzálezVelasco 2019) (Gül et al. 2018) PR NB NA Spatial data Default category Log. reg. PU BA W Search engine CDS spread Linear reg. PU NA Social media Credit rating (Hajek et al. 2017)* PU Y Annual reports Credit rating Multiple criteria decision making Log. reg., decision tree, NBN, RF, … (Hristova et al. 2017)* PU Y Annual reports Credit rating Log reg., naïve bayes, SVM, … (Hu et al. 2018)* PU Y Annual reports CDS spread Panel reg. (Janner and Schmidt 2015) PU E Financial news Bond spread Event study hypothesis test (Liebmann et al. 2016) PU D Financial news CDS spread Panel reg. (Lu et al. 2012) PU NB Q Financial news Credit rating Mod. probit, SVM (Lu et al. 2015) PU NB Q Financial news Default category Log. reg. (Mengelkam p et al. 2015) PU,PR NB M Social media Default category Hypothesis test, (Mengelkam p et al. 2016) PU,PR NB NA Social media k-nearestneighbor Default category Frequency counts The inclusion of a spatial risk factor improved bankruptcy identification Inclusion of search enginebased sentiment index improved credit risk prediction Social media was found to be useful in CRA for half of the companies Risky firms mention restructuring less and domestic market difficulties more frequently Classification model and text representation are important determinants of accuracy Evidence for an inverse relationship between readability and CDS spreads Explanatory power of corp. news for bonds is comparable to power for stock market Based on sentiment, CDS traders and equity traders interpret the same news differently News coverage is significantly associated with credit downgrades Distress indicator derived from financial news possesses significant explanatory power More social media posts and worse sentiment for financially instable companies; classification accuracy above 50%. Sentiment dictionary achieves 67.9% accuracy compared to 49.97% by domain-independent dictionary J. Roeder: Alternative Data for Credit Risk Management: An Analysis of the Current State of Research (Mengelkam p et al. 2017)* (Norden 2017) PU,PR NB NA PU D Social media Default category (proxy) Log. reg., dec. tree, SVM, … Financial news CDS spread Panel reg. (Onay and Öztürk 2018) PU NA Social media Not applicable Not applicable (Safi and Lin 2014) PR NB NA Commerc e platform Solvency proxy Log. reg. (Smales 2016) PU BA D Financial news CDS spread, Panel reg. (Tsai et al. 2010) PU Y Financial news Credit rating Ordered logit/ probit model (Tsai et al. 2016) PU NB Q CDS spread Panel reg. (Yan et al. 2019) PU NA Financial news, Ann. reports Financial news Entity association Uni- and bidirect. GRU (Yang et al. 2020) PU D Financial new CDS spread Panel reg. (Yuan et al. 2018) PU Q Social media Credit rating Log reg., RF, NN, SVM (Zhao et al. 2019) PU W Financial news Default category GAM, NN LIBOR spread 175 SVM and bag-of-words show the best performance for Tweet classification Financial news show significant influence on the way CDS spreads change Review shows rising relevance of non-traditional data sources for credit scoring Measures from commerce platform (membership period, page views) help to explain creditworthiness Significant negative relationship between news sentiment and CDS spread changes Sentiment analysis of corporate news shows explanatory contribution for credit rating High news volume and negative sentiment are associated with an increase in credit risk Modeling of relation between firms using neural network improves classification Inverse relationship of news sentiment and CDS spread; more pronounced in cases of higher analysts’ earnings forecasts dispersion Topic model that incorporates emotion detection achieves improved accuracy Combination of financial measures and social media data improves accuracy 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 176 Table 4: Definition of abbreviations Entities Granularity Stat. model 4.2 PU (public), PR (private), BA (bank), NB (non-bank) E (Events), D (Daily); W (Weekly), M (Monthly), Q (Quarterly), Y (Yearly), NA (not available) Logistic regression (log. reg.), panel regression (panel reg.), support vector machine (SVM), neural network (NN), random forest (RF), naïve Bayesian network (NBN), gated recurrent unit (GRU), generalized additive model (GAM) Research Agenda The following research agenda for future research on using alternative data for CrRM is derived from the analysis. Research gap (RG) 1. research on non-public companies. There is still a lack of research that focuses on small and medium-sized non-public companies since there is less information (e.g., market-based metrics) available. RG 2. need for research using irregularly occurring/frequent data sources. There is still untapped potential to analyze signals from alternative data with varying frequency to support decision-making in CrRM. RG 3. research beyond quarterly frequency. For the used methods and findings, more research on how alternative data can support CrRM is needed, ranging from the monthly to intraday level. RG 4. convergence between econometrics and machine learning-based studies regarding methods and evaluation. There is a distinct divergence between the fields, which calls for more interdisciplinary research to allow rigorous evaluations and more comparable results. RG 5. Research on design knowledge. Due to the rather implicit use of DSR in many cases, further research is needed to create expand knowledge related to the design of risk management systems utilizing alternative data (principles and theories). 5 Discussion and Conclusion In terms of practical implications, the studies suggest that alternative data can contain decision-relevant signals. The question arises how the CrRM process and skill profiles (data integration/analysis) for risk managers may evolve. Will the in-house capabilities for CRA need to increase, or will such insights be procured from external entities? This paper contributes to research by 1) identifying and classifying research addressing the intersection of CrRM and alternative data and 2) deriving a research agenda that encompasses the most prominent research gaps. Like any research, this study has potential limitations. Literature reviews are affected by publication bias. J. Roeder: Alternative Data for Credit Risk Management: An Analysis of the Current State of Research 177 Additionally, the search could fail to identify relevant literature because related terms were not considered. Also, the alternative data that studies use was mostly in English. Moreover, only published research could be considered, not proprietary models used by banks. To answer RQ1, the literature review classified 29 papers in which alternative data provides a basis for enhanced CrRM. The proposed research agenda consists of the most prominent research gaps, thereby addressing RQ2. Overall, the evidence suggests that alternative data can improve CrRM in terms of a better understanding of the risk situation and the predictive performance. References Aktug, R. E., Nayar, N., and Salas, J. M. 2015. “Are Credit Rating Agency Analysts Valuable?,” The Journal of Risk Finance (16:4), pp. 378-394. alternativedata.org. 2020. Retrieved 02/25/2021, from www.alternativedata.org. Altman, E. I. 1968. “Financial Ratios, Discriminant Analysis and the Prediction of Corporate Bankruptcy,” The Journal of Finance (23:4), pp. 589-609. Altman, E. I., Sabato, G., and Wilson, N. 2010. “The Value of Non-Financial Information in Small and Medium-Sized Enterprise Risk Management,” Journal of Credit Risk (6:2), pp. 1-33. Altman, E. I., and Saunders, A. 1997. “Credit Risk Measurement: Developments over the Last 20 Years,” Journal of Banking & Finance (21:11-12), pp. 1721-1742. Bao, Y., and Datta, A. 2012. “Summarization of Corporate Risk Factor Disclosure through Topic Modeling,” Proceedings of the 33rd International Conference on Information Systems, Orlando, FL. Bao, Y., and Datta, A. 2014. “Simultaneously Discovering and Quantifying Risk Types from Textual Risk Disclosures,” Management Science (60:6), pp. 1371-1391. Caouette, J. B., Altman, E. I., Narayanan, P., and Nimmo, R. 2008. Managing Credit Risk: The Next Great Financial Challenge. Hoboken, New Jersey: John Wiley & Sons, Inc. Cecchini, M., Aytug, H., Koehler, G. J., and Pathak, P. 2010. “Making Words Work: Using Financial Text as a Predictor of Financial Events,” Decision Support Systems (50:1), pp. 164-175. Chen, N., Ribeiro, B., and Chen, A. 2016. “Financial Credit Risk Assessment: A Recent Review,” Artificial Intelligence Review (45:1), pp. 1-23. Choi, J., Suh, Y., and Jung, N. 2020. “Predicting Corporate Credit Rating Based on Qualitative Information of Md&a Transformed Using Document Vectorization Techniques,” Data Technologies and Applications (54:2), pp. 151-168. Das, S. R., Hanouna, P., and Sarin, A. 2009. “Accounting-Based Versus Market-Based Cross-Sectional Models of Cds Spreads,” Journal of Banking & Finance (33:4), pp. 719-730. Fernandes, G. B., and Artes, R. 2016. “Spatial Dependence in Credit Risk and Its Improvement in Credit Scoring,” European Journal of Operational Research (249:2), pp. 517-524. González-Fernández, M., and González-Velasco, C. 2019. “An Alternative Approach to Predicting Bank Credit Risk in Europe with Google Data,” Finance Research Letters (35). Gül, S., Kabak, Ö., and Topcu, I. 2018. “A Multiple Criteria Credit Rating Approach Utilizing Social Media Data,” Data & Knowledge Engineering (116), pp. 80-99. Hajek, P., Olej, V., and Prochazka, O. 2017. “Predicting Corporate Credit Ratings Using Content Analysis of Annual Reports – a Naïve Bayesian Network Approach,” FinanceCom 2016, Frankfurt, Germany: Springer International Publishing, pp. 47-61. 178 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Hristova, D., Probst, J., and Eckrich, E. 2017. “Ratingbot: A Text Mining Based Rating Approach,” Proceedings of the 38th Int. Conference on Information Systems, Seoul, South Korea, pp. 119. Hu, N., Liu, L., and Zhu, L. 2018. “Credit Default Swap Spreads and Annual Report Readability,” Review of Quantitative Finance and Accounting (50:2), pp. 591-621. Janner, S., and Schmidt, D. 2015. “Are Economically Significant Bond Returns Explained by Corporate News? An Examination of the German Corporate Bond Market,” Financial Markets and Portfolio Management (29:3), pp. 271-298. Koulafetis, P. 2017. Modern Credit Risk Management: Theory and Practice. London: Palgrave Macmillan. Lam, J. 2014. Enterprise Risk Management: From Incentives to Controls. Hoboken, New Jersey: John Wiley & Sons, Inc. Liebmann, M., Orlov, A. G., and Neumann, D. 2016. “The Tone of Financial News and the Perceptions of Stock and Cds Traders,” Int. Review of Financial Analysis (46), pp. 159-175. Loughran, T., and McDonald, B. 2016. “Textual Analysis in Accounting and Finance: A Survey,” Journal of Accounting Research (54:4), pp. 1187-1230. Lu, H.-M., Tsai, F.-T., Chen, H., Hung, M.-W., and Li, S.-H. 2012. “Credit Rating Change Modeling Using News and Financial Ratios,” ACM Trans. on Management Inf. Systems (3:3), pp. 1-30. Lu, Y.-C., Wei, Y.-C., and Chang, T.-Y. 2015. “The Effects and Applicability of Financial Media Reports on Corporate Default Ratings,” Int. Review of Economics & Finance (36), pp. 69-87. McNeil, A. J., Frey, R., and Embrechts, P. 2015. Quantitative Risk Management: Concepts, Techniques and Tools - Revised Edition, (2 ed.). Princeton, New Jersey: Princeton University Press. Mengelkamp, A., Hobert, S., and Schumann, M. 2015. “Corporate Credit Risk Analysis Utilizing Textual User Generated Content - a Twitter Based Feasibility Study,” Proceedings of the 19th Pacific Asia Conference on Information Systems, Singapore. Mengelkamp, A., Rojahn, M., and Schumann, M. 2017. “Evaluating Machine Learning Algorithms for Sentiment Classification of Tweets in Credit Assessment,” ECSM 2017 4th European Conference on Social Media, Vilnius, Lithuania, pp. 209-216. Mengelkamp, A., Wolf, S., and Schumann, M. 2016. “Data Driven Creation of Sentiment Dictionaries for Corporate Credit Risk Analysis,” Proceedings of the 22nd Americas Conference on Information Systems, San Diego, CA. Monk, A., Prins, M., and Rook, D. 2019. “Rethinking Alternative Data in Institutional Investment,” The Journal of Financial Data Science (Winter 2019), pp. 14-31. Nassirtoussi, A. K., Aghabozorgi, S., Ying Wah, T., and Ngo, D. C. L. 2014. “Text Mining for Market Prediction: A Systematic Review,” Expert Systems with Applications (41:16), pp. 7653-7670. Norden, L. 2017. “Information in Cds Spreads,” Journal of Banking & Finance (75), pp. 118-135. Onay, C., and Öztürk, E. 2018. “A Review of Credit Scoring Research in the Age of Big Data,” Journal of Financial Regulation and Compliance (26:3), pp. 382-405. Roeder, J., Muntermann, J., and Kneib, T. 2020. “Towards a Taxonomy of Data Heterogeneity,” Proceedings of the 15th International Conference on Wirtschaftsinformatik, Potsdam, Germany. Safi, R., and Lin, Z. 2014. “Using Non-Financial Data to Assess the Creditworthiness of Businesses in Online Trade,” Proceedings of the 18th Pacific Asia Conf. on Information Systems, Chengdu, China. Schumann, M. 2002. “Bonitätsbeurteilungen Und Kreditprüfungen Im Electronic Business,” in Electronic Business: Theoretische Aspekte Und Anwendungen in Der Betrieblichen Praxis, R. Gabriel and U. Hoppe (eds.). Heidelberg: Physica-Verlag HD, pp. 413-427. Smales, L. A. 2016. “News Sentiment and Bank Credit Risk,” Journal of Empirical Fin. (38), pp. 37-61. Tsai, F.-T., Lu, H.-M., and Hung, M.-W. 2010. “The Effects of News Sentiment and Coverage on Credit Rating Analysis,” Proceedings of the 14th Pacific Asia Conf. on Inf. Systems, Taipei, Taiwan. Tsai, F.-T., Lu, H.-M., and Hung, M.-W. 2016. “The Impact of News Articles and Corporate Disclosure on Credit Risk Valuation,” Journal of Banking & Finance (68), pp. 100-116. J. Roeder: Alternative Data for Credit Risk Management: An Analysis of the Current State of Research 179 Van Gestel, T., and Baesens, B. 2008. Credit Risk Management: Basic Concepts: Financial Risk Components, Rating Analysis, Models, Economic and Regulatory Capital. Oxford, United Kingdom: Oxford University Press. vom Brocke, J., Simons, A., Niehaves, B., Niehaves, B., Reimer, K., Plattfaut, R., and Cleven, A. 2009. “Reconstructing the Giant: On the Importance of Rigour in Documenting the Literature Search Process,” Proceedings of the 17th European Conference on Information Systems, Verona, Italy. Webster, J., and Watson, R. T. 2002. “Analyzing the Past to Prepare for the Future: Writing a Literature Review,” MIS Quarterly (26:2), pp. xiii-xxiii. Xing, F. Z., Cambria, E., and Welsch, R. E. 2017. “Natural Language Based Financial Forecasting: A Survey,” Artificial Intelligence Review (50:1), pp. 49-73. Yan, C., Fu, X., Wu, W., Lu, S., and Wu, J. 2019. “Neural Network Based Relation Extraction of Enterprises in Credit Risk Management,” 2019 IEEE International Conference on Big Data and Smart Computing (BigComp), Kyoto, Japan, pp. 1-6. Yang, S., Liu, Z., and Wang, X. 2020. “News Sentiment, Credit Spreads, and Information Asymmetry,” North American Journal of Economics & Finance (52). Yuan, H., Lau, R. Y. K., Wong, M. C. S., and Li, C. 2018. “Mining Emotions of the Public from Social Media for Enhancing Corporate Credit Rating,” 2018 IEEE 15th International Conference on e-Business Engineering (ICEBE), Xi'an, China, pp. 25-30. Zhao, Y., Shen, Y., and Huang, Y. 2019. “Dmdp: A Dynamic Multi-Source Default Probability Prediction Framework,” Data Science and Engineering (4:1), pp. 3-13. 180 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE HEALTH LITERATURE HYBRID AI FOR HEALTH IMPROVEMENT; A DESIGN ANALYSIS FOR DIABETES & HYPERTENSION LUUK PA SIMONS, MARK A NEERINCX & CATHOLIJN M JONKER Delft University of Technology, Faculty of Computer Science, Delft, Netherlands; e-mail: l.p.a.simons@tudelft.nl, M.A.Neerincx@tudelft.nl, C.M.Jonker@tudelft.nl Abstract Increasingly, front runner patients and practitioners want to use state-of-the-art science for rapid lifestyle based cure of diseases of affluence. However, the number of new health studies per year (>500.000) is overwhelming. How to quickly assess state-of-the-art and use new opportunities for rapid patient DIY (Do-It-Yourself) health improvement? In order to develop a health literature hybrid AI to aid DIY rapid health improvement, we analyze user side functional requirements. A cross case design analysis is conducted for hypertension and T2D (Type 2 Diabetes), two major cardiometabolic conditions in our society. Our analysis shows that current DIY health support is ‘watered down’ advise, prone to medicalizing rather than empowering patients. We propose hybrid AI user requirements and discuss how a 2030 hybrid AI health support system can stimulate new ways of working in health and cure. DOI https://doi.org/10.18690/978-961-286-485-9.14 ISBN 978-961-286-485-9 Keywords: health, self management, AI quantifie self, service design, QFD, personal medicine 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 182 1 Introduction When it comes to lifestyle related diseases like cardiovascular disease, Type 2 Diabetes (T2D), dementia and colorectal-, prostate- and other forms of cancer, it turns out that key to our health is our biological self-repair. In virtually all our cells and tissues, damage is being repaired on a continuous basis (Li, 2019). This fact is still largely underutilized by patients and by healthcare professionals. Nor are we using the options to rapidly improve self-repair effectiveness (with biometric progress feedback on a daily basis) from healthy lifestyle choices on foods, exercise, sleep etc (Greger & Stone, 2016). Already in 2009 Safeway CEO and the corporate Coalition to Advance Healthcare Reform have calculated that 74% of health costs come from only four conditions (cardiovascular disease, type 2 diabetes, obesity and cancer) which are largely preventable or reversible (Burd, 2009). The Lancet EAT committee reiterated this urgency to use options for prevention and reversal of disease more effectively: we cannot afford our current approach, not in health nor in ecology (Willett, 2019). As discussed elsewhere, health improvement options are welcomed by many (though not all) patients around the moment of diagnosis (Simons, 2020a). There are groups of front runner patients and practitioners who want to use state-of-theart science for rapid lifestyle based cure of diseases of affluence. Moreover, research increasingly shows that from a biology perspective, health self-repair is more effective than current ‘best available’ medical treatments (largely because self-repair is biologically more plausible and more advanced, thanks to millions of years of evolution, Greger & Stone, 2016, Li, 2019). The number of well conducted RCT’s (Randomized Controlled Trials) showing rapid health improvements within a matter of hours, days or weeks is rapidly growing, largely in the domains of cardio- and metabolic conditions, plus increasingly so in the onco- and neurology domains: depression and even dementia (Greger & Stone, 2016, Bredesen 2017, 2018, Ornish & Ornish 2019, Simons 2020a, 2021a, 2021b). However, DIY health priorities are difficult to choose, since the number of yearly new studies on health is so large that the field can be overwhelming. For example, even when limiting the search to only the year 2019, Scholar Google finds >500.000 studies on ‘health’, of which >60.000 are on ‘healthy lifestyle’. Furthermore, 2019 L. PA Simons, M. A Neerincx &C. M Jonker: Health Literature Hybrid AI for Health Improvement; A Design Analysis for Diabetes & Hypertension 183 has >150.000 studies on ‘obesity’ and >180.000 studies on ‘cardiovascular health’. In short, every working day of the year there are >2000 new studies on health: good luck keeping up with that! And whether you are a practitioner or a patient, you likely have tasks which preclude reading many hours of literature every day. Given this enormous amount of literature, it is also quite easy to get lost in sub-branches, while losing sight of the bigger picture. In order to help practitioners and DIY patients to navigate this massive amount of science and help them capture, assess and use the best and most recent available evidence on lifestyle interventions for disease reversal, we aim to develop a health literature AI. Thus, the main research question is: What are user requirements for a health literature AI in order to support successful DIY healthy lifestyle choices for health self-repair? 2 Literature From a biology and health engineering perspective, some of the most promising recent health discoveries use our innate mechanisms for rapid bodily self-repair (Li, 2019). We want to help people experience and measure improved health, possibly within days, with rapid feedback of progress from health measurements. For design purposes, we take a ‘2030’ view from the future, using ‘optimism by method’: assuming maximum use of the dynamic nature of our biology for selfrepair and temporarily ignoring current healthcare barriers. Our aim is to promote cure via rapid health self-repair feedback cycles. This needs an approach with personal iteration cycles, see Figure 1, using (Cross, 1994, Simons, 2020a) goals analysis (problem space), intervention planning (solution space) and measurement portfolio (evaluation space). We can translate this health iteration cycle into DIY health questions for the hypertension and T2D cases of this paper. DIY health questions for a patient (or a practitioner guiding him/her) may become: 184 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 1. What is the underlying biology of the condition (causes, outlook, risk factors)? (= Problem Space) 2. What are the most effective lifestyle interventions (& their attractiveness)? (= Solution Space) 3. What are suitable health tracking options (behaviors, symptoms, biometrics)? (= Evaluation Space) Figure 1: Personal iteration cycles for rapid health self-repair.1 Various forms of goal setting based on personal preferences and individual coaching, eTool use like microlearning for health, Quantified Self (QS) progress tracking and peer coaching have all been shown to aid success (Simons, 2015, 2016, 2020b). Generally, it is important that patients can set their own priorities and plans, while also using practitioner support (Simons, 2014). This is not only important from a personal perspective (motivation plus a suitable fit with personal preferences and context), but it is also important from the perspective of science and up to date evidence. Lifestyle advice for patients is often outdated, due to slow adoption in health care. On average, new findings take about two decades before they enter standard clinical practice (Balas & Boren, 2000). The practical implication is that for front runner patients with ambition in DIY health improvement, science has a lot more effectiveness and evidence to offer than is visible in regular patient lifestyle guidelines. The same challenge exists for practitioners wanting to support DIY 1 Besides biology opportunities of self-repair, overall health iteration success depends on the full picture of choosing personal goals and behaviours that are best suited for one’s preferences and context. See Simons (2010, 2013, 2014) for information on intervention planning. L. PA Simons, M. A Neerincx &C. M Jonker: Health Literature Hybrid AI for Health Improvement; A Design Analysis for Diabetes & Hypertension 185 health for their patients. Below, we describe how we use a cross-case analysis to find user requirements that must be fulfilled in order for the health literature AI system to aid DIY health intervention choices. 3 Method Our research question is a design analysis question. The analysis is an example of design research rather than design science (Vaishnavi & Kuechler, 2004), since design research aims at generating (domain specific) knowledge for solving a given problem. Our analysis will follow design cycle phases 1 and 2 of (Verschuren & Hartog, 2005): ‘1. first hunch’ and ‘2. assumptions and requirements’. Our first hunch is that we need to explicate the gaps in common sources of information for DIY patients (health care lifestyle guidelines and Google Scholar2). In other words: which needs or gaps should be filled with the health literature AI to aid DIY health intervention choices? Second, can we formulate ‘Voice of the Patient’ user requirements? We use the first step from QFD (Quality Function Deployment) for software design. This means we explicate ‘the voice of the user/patient’, using words that users might use themselves (Simons & Verhagen, 2008, Schockert & Herzwurm, 2018), to indicate their needs when using the AI system. (Next, outside the scope of this paper, come steps to validate this with user testing and to form a QFD matrix translating user requirements to technology attributes.) Since we want a domain-independent structure of the AI health literature support system, we use two different health domains for our DIY case analyses: hypertension and T2D (Type 2 Diabetes). We see them as suitable cases, since they are relevant (with these conditions impacting respectively 50% and 30% of people in affluent countries), different (managed and researched by different specialists) and obviously lifestyle related. We analyze the Dutch situation: What are some of the main health care lifestyle sites and guidelines that patients encounter? What do we observe if we compare that to leading edge lifestyle interventions? Our approach is similar to action research in the sense that we have a high level of 'access' to the current practices and patients in these domains, 3 while at the same We take Scholar Google as a reference point for exploring recent studies, since it is so widely used. By providing 6 months of lifestyle coaching (Simons et al., 2010, 2017) for literally thousands of patients and caregivers in these domains, over the course of the past 10 years. 2 3 186 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE time trying to help them in navigating the information diversity they encounter. Many 'front runner DIY patients' are not average. Although they are higher educated on average, we see their struggles on a daily basis in trying to digest and use the available health science for their DIY health choices. Simultaneously, we see potential for AI to help them. The user analysis in this paper is meant as a first iteration for 'user requirements' that would support their search and decision needs. A fruitful way to start, is to evaluate the current routes/tools they use and analyze the user needs that become apparent from that process. In the analysis section below, we will take the following steps for our case and user needs analysis (for T2D & hypertension), in two main paragraphs: 1. (a) Case analysis Health care advise: What are some of the main health care lifestyle sites and guidelines that patients encounter for their condition? 1. (b) Evaluation from the design goal perspective: What omissions do we see if we compare results from step 1(a) to leading lifestyle intervention science? 2. (a) Case analysis Science, via Google Scholar: What is the content, diversity, clarity and applicability of the information found? 2. (b) Translation to ‘voice of the patient’ user requirements: How could the AI system support my needs and decisions? 4 Analysis, cases T2D & hypertension 4.1 Health care lifestyle guidelines vs. DIY health decisions As an exemplary search route for a DIY patient with T2D in the Netherlands, we started with a google search (in Dutch) with: “I have diabetes, what can I do?” This led to a top 3 of respectable online sources: www.thuisarts.nl (most visited NL site for family doctor questions), www.diabetesfonds.nl (NL diabetes research & funding) and www.dvn.nl (‘Diabetes Vereniging NL’ patient association). L. PA Simons, M. A Neerincx &C. M Jonker: Health Literature Hybrid AI for Health Improvement; A Design Analysis for Diabetes & Hypertension 187 Table 1: Case analyses: What is advised vs. omitted on traditional health care sites? Advised (a) Omitted (b)4 T2D (Type 2 Diabetes) -Lower your blood sugar by eating well (fruits, veggies, nuts, yogurt. No sugary drinks) brisk walk 30 min/day or 60 min/day if overweight. -If that doesn’t work: pills. -Manage it well: 3-monthly medical checks. -T2D is >90% avoidable with healthy lifestyle. -Interventions exist that remove >75% of meds in 4 weeks. -Causes: insulin resistance, lipotoxicity, inflammation: 1-wk reset interventions very effective. Hypertension -Stop smoking, eat well (fruits, veggies, wholegrain, fibers, less saturated fat), less salt, brisk walk 2,5 hrs/week, less stress. -Other factors: weight, alcohol, fatty foods (& some meds) -If cardiac risks: pills. -Discuss checkups with doctor. -Hypertension >90% avoidable with healthy lifestyle. -Interventions exist that remove >50% of meds in 4 weeks. -Causes: endothelial function & inflammation: food has more & faster effect than medication. Apart from the similarities, also summarized in Table 1, it is interesting to see that www.thuisarts.nl is more directed towards medication and 3-monthly checks for complications. Whereas the other two sources explain the causal roles of health behaviors and insulin sensitivity better. Figure 2: Food page of www.dvn.nl directly contradicts www.dvn.nl advise. Sources from longstanding research lines: overall (Roberts & Barnard, 2005), in T2D (Hu, 2001, Fuhrman & Sorensen, 2012, Simons, 2016, 2021a) in hypertension, endothelial health and inflammation (Niskanen, 2004, Franzini, 2012, Rodriguez-Leyva, 2013, Dickinson, 2014, Kapil, 2015, Siervo, 2015, Greger & Stone, 2016). 4 188 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE A similar search for hypertension gave as top 3 sources: www.thuisarts.nl again, www.hartstichting.nl (cardiac research funding & patient education) and www.zorgkaartnederland.nl (patient association to compare care providers). Of these, www.hartstichting.nl gives most lifestyle support, but not anywhere close to scientific state-of-the-art. Three aspects are fascinating about these sources: (1) all the relevant and evidence based health facts they do not give, see ‘Omitted’ in Table 1 summary (2) tendencies to medicalize instead of empower patients (3) the contradictions and biases that persist from Dutch food culture. As two examples of bias, all three T2D sources are clear that saturated fats make things worse. Which they give as one of the reasons that meats should be avoided. Still, Figure 2 shows what the very first picture is on the www.dvn.nl healthy foods page: a meat based dish. And we all know that 1 picture speaks louder than 1000 words… A second example of Dutch food bias is cheese. Despite its high saturated fat content, all three T2D sites say that cheese is perfectly healthy for T2D patients, without providing any justification. The cheese advice is biologically implausible and it contrasts with large empirical studies (Guasch-Ferré, 2017, Drouin-Chartier, 2019) showing clear T2D risk reductions when replacing cheese and butter with less harmful foods5. 4.2 Scientific studies vs. DIY health decisions As illustrated in section 4.1, healthy lifestyle advice on main patient support sites is watered down and prone to cultural and historical biases. In other words: outdated and not suited to patients or practitioners that prefer high impact interventions. Hence, the question is: what if we go directly to the scientific state-of-the-art, how easily will we find clear and actionable answers? Though one could argue that scientific studies are not useful since they are not written for DIY health questions, one could also argue the opposite: when looking for the latest findings and evidence, what better place to look than science? The AI for DIY health we aim for, is meant to bridge both sides of this equation. Outside our scope, there are ample discussions (Campbell & Campbell, 2016, Fuhrman & Sorensen, 2012, Greger & Stone, 2016, Greger, 2019) of how our health institutions are living in bubbles of ‘not rocking the boat’, l eading to culturally biased and watered down advice. Which is quite different from the high impact interventions that leading edge DIY patients and practitioners are looking for. 5 L. PA Simons, M. A Neerincx &C. M Jonker: Health Literature Hybrid AI for Health Improvement; A Design Analysis for Diabetes & Hypertension 189 Figure 3: Illustration of study diversity when searching for DIY health answers. One sees when using Google Scholar, see Figure 3, that the body of scientific studies is not only large, but also highly diverse, with many different subdisciplines in science having their own language and focus. For example, the search results for measuring insulin sensitivity (or -resistance) are way too diverse and technical for helping a patient with his/her daily or weekly progress tracking question. A simple ‘ask your doctor to measure it via an OGTT (Oral Glucose Tolerance Test)’ would be more helpful. In Table 2 we summarize our main Scholar search findings with regard to the section 2 patient questions: causes, interventions and measurements. Table 2: Use cases science: study overview & contents evaluation Study Search Content T2D (Type 2 Diabetes) -Causes: diverse papers, many with a genetics, cell or pharma focus, or on complications (cardiac, renal, retina etc). Different results per population. Psycho-socio-cultural factors. -Interventions: widely varying results & difficult to assess why. Reviews= ‘average’ results, not highest impact. -Measuring: either ‘medi-tech’ details or quarterly checks & sugar management or ‘modest’ QS for walking, weight loss etc. Hypertension -Causes: many forms (resistant, pulmonary, nondipping, secondary) correlates & co-morbidities of hypertension. -Interventions: apart from many drugs intervention also a long lifestyle interventions tradition. Hard to find and compare dose-response for components: salt, meat, smoke, sports, stress, alcohol, fruits, veggies, fiber etc. -Measuring: Many on 24-h ambulatory monitoring. ‘Manage it’ is checkups (& often drugs). 190 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Another finding is that Google Scholar search results aid in exploring the field, but they are not qualified overviews, see also Figure 3. Overviews exist in the various academic subdisciplines, like literature reviews or meta-analyses, but they often match poorly to the more action-focused ‘voice of the patient’ questions we hear on a daily basis. These are questions on e.g. feasibility of interventions, what is most useful to do and to measure and how to deal with dilemma’s and tradeoffs? In answer to our Research Question and including the concerns above, we get as draft ‘voice of the patient’ user requirements for the AI system: 1. What are the main causal lifestyle factors that I can potentially influence? 1.1. How large are the effects per causal factor? 1.2. What is the quality of evidence to support this? 2. What are the most effective lifestyle interventions? 2.1 Which are relatively easy and/or attractive for me? 2.2 Which offer rapid, noticeable health results? 3. How can I rapidly measure my health progress? 3.1 Which measurements are low cost & practical for DIY? 3.2 Which are reliable health progress indicators (=have good external validity)? 4. Which attributes above need tradeoff decisions? If we then look at for example questions 2.1 (intervention ease and attractiveness) or 2.2 (rapid results), we find that most academic overviews are not outlined along these lines. The AI system will need to provide functionality to fill that void and help answer these questions for front runner DIY patients and practitioners. 5 Discussion & Conclusion: AI for next level Quantified Self An important limitation to our study is that our results still need validation via user testing. Preferably via a Wizard of Oz type of study, with questions like: What would you like to know? Which searches would you use? How would result XYZ help you? What display of results would you like? And in terms of design process, the next QFD step has to be taken: translation of the user requirements to technical attributes which fulfill those requirements for the AI system. L. PA Simons, M. A Neerincx &C. M Jonker: Health Literature Hybrid AI for Health Improvement; A Design Analysis for Diabetes & Hypertension 191 Still, our analyses illustrate that standard lifestyle guidelines are rather meager for health DIY purposes (section 4.1) whereas the scientific information is huge and hard to assess, with many different 'bubbles' within the scientific community whose discussions are highly specialized and disjunct (section 4.2). When designing AI support, there are three reasons for a hybrid AI system (which includes expert mediated interpretations) rather than stand-alone AI. First, human interpretation of research design and study validity are needed to counter ‘fabricated pseudo-science’ lifestyle studies which are often industry-sponsored (Campbell & Campbell, 2016, Greger & Stone, 2016, Simons, 2020a). Second, to avoid ‘newness bias’. For example the PCRM (Physicians Committee for Responsible Medicine) show how ‘serious scientists’ have abandoned studying cholesterol effects of eggs decades ago, since the results were so clear, leaving the field open to biased egg industry studies under labels like ‘recent studies show ..’ (Barnard, 2019). Third, due to all kinds of confounding factors, lifestyle intervention successes can be difficult to achieve, thus cluttering the scientific field with mediocre results. If 90% of attempts for a certain intervention were less successful, how do we interpret and present the 10% that were very successful? Although this 10% may not form a majority, they often do lead the way forward for new lifestyle successes. Conclusion Front runner patients and practitioners aiming for rapid DIY health improvements have a lot to offer for pioneering the frontiers of a more sustainable and effective '2030' healthcare. This will become even more powerful when they have a shared state-of-the-art health literature view thanks to the hybrid AI system we aim to develop. For diseases of affluence, if ''health is what happens between doctors' visits'', this is a cheaper, more effective way to deliver health care. Aknowledgements This research was (partly) funded by the https://www.hybrid-intelligence-centre.nl/ a 10-year programme funded the Dutch Ministry of Education, Culture and Science through the Netherlands Organisation for Scientific Research, grant number 024.004.022 and by EU H2020 ICT48 project ``Humane AI Net'' under contract $\# $ 952026. 192 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE References Balas, E. A., & Boren, S. A. (2000). Yearbook of medical informatics: managing clinical knowledge for health care improvement. Stuttgart, Germany. Barnard, N. D., Long, M. B., Ferguson, J. M., Flores, R., & Kahleova, H. (2019). Industry Funding and Cholesterol Research: A Systematic Review. American Journal of Lifestyle Medicine, 1559827619892198. Bredesen, D. (2017). The end of Alzheimer's: The first program to prevent and reverse cognitive decline. Penguin. Bredesen, D. E., Sharlin, K., Jenkins, D., Okuno, M. et al (2018). Reversal of cognitive decline: 100 patients. J Alzheimers Dis Parkinsonism, 8(450), 2161-0460. Burd, Steven A. (2009), “How Safeway Is Cutting Health-Care Costs,” Wall Street Journal, Eastern Edition, June 12, A15. Campbell, T. C., & Campbell II, T. M. (2016). The China Study: Revised and Expanded Edition: The Most Comprehensive Study of Nutrition Ever Conducted and the Startling Implications for Diet, Weight Loss, and Long-Term Health. BenBella Books, Inc. Cross, N. (1994). Engineering Design Methods; Strategies for Product Design (2nd ed. ed.). Chichester: John Wiley & Sons. Dickinson, K. M., Clifton, P. M., Burrell, L. M., Barrett, P. H. R., & Keogh, J. B. (2014). Postprandial effects of a high salt meal on serum sodium, arterial stiffness, markers of nitric oxide production and markers of endothelial function. Atherosclerosis, 232(1), 211-216. Drouin-Chartier, J. P., Li, Y., Ardisson Korat, A. V., Ding, M., Lamarche, B., Manson, J. E., ... & Hu, F. B. (2019). Changes in dairy product consumption and risk of type 2 diabetes: results from 3 large prospective cohorts of US men and women. Am J Clin Nutr, 110(5), 1201-1212. Franzini, L., Ardigo, D., Valtuena, S., Pellegrini, N., Del Rio, D., Bianchi, M. A., ... & Zavaroni, I. (2012). Food selection based on high total antioxidant capacity improves endothelial function in a low cardiovascular risk population. Nutrition, Metabolism and Cardiovascular Diseases, 22(1), 50-57. Fuhrman, J., & Sorensen, C. (2012). The End of Diabetes. HarperCollins. Greger, M., & Stone, G. (2016). How not to die: discover the foods scientifically proven to prevent and reverse disease. Pan Macmillan. Greger, M. (2019) How Not to Diet: The Groundbreaking Science of Healthy, Permanent Weight Loss. Flatiron Books. Guasch-Ferré, M., Becerra-Tomas, N., Ruiz-Canela, M., Corella, D., Schröder, H., Estruch, R., ... & Salas-Salvadó, J. (2017). Total and subtypes of dietary fat intake and risk of type 2 diabetes mellitus in the Prevención con Dieta Mediterránea (PREDIMED) study. Am J Clin Nutr, 105(3), 723-735. Schockert, S., & Herzwurm, G. (2018). Agile Software Quality Function Deployment. Software Engineering und Software Management 2018. Hu, F. B., Manson, J. E., Stampfer, M. J., Colditz, G., Liu, S., Solomon, C. G., & Willett, W. C. (2001). Diet, lifestyle, and the risk of type 2 diabetes mellitus in women. New England journal of medicine, 345(11), 790-797. Kapil, V., Khambata, R. S., Robertson, A., Caulfield, M. J., & Ahluwalia, A. (2015). Dietary nitrate provides sustained blood pressure lowering in hypertensive patients: a randomized, phase 2, double-blind, placebo-controlled study. Hypertension, 65(2), 320-327. Li, W. (2019). Eat to Beat Disease: The Body’s Five Defence Systems and the Foods that Could Save Your Life. Random House. Niskanen, L., Laaksonen, D. E., Nyyssönen, K., Punnonen, K., Valkonen, V. P., Fuentes, R., ... & Salonen, J. T. (2004). Inflammation, abdominal obesity, and smoking as predictors of hypertension. Hypertension, 44(6), 859-865. Ornish, D., & Ornish, A. (2019). Undo it!: How simple lifestyle changes can reverse most chronic diseases. Ballantine Books. L. PA Simons, M. A Neerincx &C. M Jonker: Health Literature Hybrid AI for Health Improvement; A Design Analysis for Diabetes & Hypertension 193 Roberts, C. K., & Barnard, R. J. (2005). Effects of exercise and diet on chronic disease. Journal of applied physiology, 98(1), 3-30. Rodriguez-Leyva, D., Weighell, W., Edel, A. L., LaVallee, R., Dibrov, E., Pinneker, R., ... & Pierce, G. N. (2013). Potent antihypertensive action of dietary flaxseed in hypertensive patients. Hypertension, 62(6), 1081-1089. Siervo, M., Lara, J., Chowdhury, S., Ashor, A., Oggioni, C., & Mathers, J. C. (2015). Effects of the Dietary Approach to Stop Hypertension (DASH) diet on cardiovascular risk factors: a systematic review and meta-analysis. British Journal of Nutrition, 113(1), 1-15. Simons, LPA & Verhagen, WP. (2008). Applying value-sensitive design and quality function deployment to healthcare ICT: the case of Dutch primary care unit dossiers. Journal of Design Research 7 (2): 155-176. Simons, L. P. A., & Hampe, J. F. (2010). Service Experience Design for Healthy Living Support; Comparing an In-House with an eHealth Solution. The 23rd Bled eConference, pp. 423-440. Accessed 2010 from www.bledconference.org Simons LPA, Hampe JF, Guldemond NA. (2013). Designing Healthy Living Support: Mobile applications added to hybrid (e)Coach Solution. Health and Technology. 3 (1) pp.85-95. DOI 10.1007/s12553-013-0052-9 Simons LPA, Hampe JF, Guldemond NA. (2014). ICT supported healthy lifestyle interventions: Design Lessons. Electronic Markets. 24 pp. 179-192. DOI 10.1007/s12525-014-0157-7. Simons LPA, Foerster F., Bruck PA, Motiwalla L & Jonker CM. (2015). Microlearning mApp Raises Health Competence: Hybrid Service Design. Health and Technology, 5 pp 35-43. DOI 10.1007/s12553-015-0095-1 Simons, L. P., Pijl, H., Verhoef, J., Lamb, H. J. et al (2016). Intensive Lifestyle (e) Support to Reverse Diabetes-2. In Bled eConference (p. 24), accessed Dec 20, 2016 www.bledconference.org. Simons LPA, Hafkamp MPJ, Bodegom D, Dumaij A, Jonker CM. (2017). Improving Employee Health; Lessons from an RCT. Int. J. Networking and Virtual Organisations, Vol. 17, No. 4, pp.341– 353. DOI https://doi.org/10.1504/IJNVO.2017.088485 Simons, LPA, (2020a). Health 2050: Bioinformatics for Rapid Self-Repair; A Design Analysis for Future Quantified Self, pp. 247-261, 33rd Bled eConference. June 28-29, Bled, Slovenia, Proceedings retrieval from www.bledconference.org. ISBN-13: 978-961-286-485-9, DOI: https://doi.org/10.18690/978-961-286-485-9.17. Simons, LPA, Heuvel, AC van den, Jonker CM. (2020b). eHealth WhatsApp for social support: design lessons. International Journal of Networking and Virtual Organisations, 23(2), 112-127. DOI https://doi.org/10.1504/IJNVO.2020.108857. Simons, LPA, Pijl M, Verhoef J, Lamb HJ, van Ommen B, Gerritsen B, Bizino MB, Snel M, Feenstra R, Jonker CM. (2021a). e-Health Diabetes; 50 Weeks Evaluation. Int. J. Biomedical Engineering and Technology, Accepted (DOI will follow) Simons, LPA, (2021b). Health 2050: Faster Cure via Bioinformatics & Quantified Self; A Design Analysis, Int. J. Biomedical Engineering and Technology, Submitted. Vaishnavi, V., & Kuechler, W. (2004). Design Research in Information Systems. Accessed Aug 16, 2009 from http://desrist.org/design-research-in-information-systems Verschuren, P., & Hartog, R. (2005). Evaluation in Design-Oriented Research. Quality and Quantity, 39, pp. 733-762. Willett, W., Rockström, J., Loken, B., Springmann, et al (2019). Food in the Anthropocene: the EAT– Lancet Commission on healthy diets from sustainable food systems. The Lancet, 393(10170), 447-492 194 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE SMILE THROUGH THE MASK: EMOTION MEASUREMENT FOR STATIONARY RETAIL MICHAEL MEYER & SUSANNE ROBRA-BISSANTZ Technische Universität Braunschweig, Chair of Information Management, Mühlenpfordtstr. 23, 38106 Braunschweig, Germany; e-mail: m.meyer@tubraunschweig.de, s.robra-bissantz@tu-braunschweig.de Abstract The global pandemic caused by the coronavirus disease (COVID-19) changes the lives of many people all over the world. In the context of stationary retail, a strong change of customer behavior occurs as mandatory safety measures like wearing facemasks and distance regulations have come into place. The sales personnel’s ability to understand and react to customers’ emotions is critical for service interactions and the customers’ overall satisfaction. Unfortunately, facemasks make it difficult to recognize other’s emotions and may lead to misinterpretation and confusion. To address this problem, this paper proposes the design of self-assessment interfaces that offer the customer an easy way to enter their emotions. As part of a Design Science Research (DSR) project, we designed three interfaces and evaluated them over the course of a design cycle. The results indicate that it is possible to use self-assessment technology in stationary retail to measure customer emotions. DOI https://doi.org/10.18690/978-961-286-485-9.15 ISBN 978-961-286-485-9 Keywords: emotion, customer, retail, self-assessment, interaction 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 196 1 Introduction The global pandemic caused by the coronavirus disease (COVID-19) changes the lives of many people all over the world. Besides the physical health issues, COVID19 evokes negative emotions like fear, sadness and anger (Aslam et al., 2020). In the context of stationary retail, a strong change of customer behavior occurs. Mandatory safety measures like wearing face masks and distance regulations have an influence on the customer (Yang et al., 2021). Stationary retail is a domain that particularly suffers from the grip of the pandemic, because it is already scarred by the digital transformation. The advancing digitalization ensures high sales in e-commerce, but simultaneously poses challenges to stationary retail (Doherty & Ellis-Chadwick, 2010). Since personal interaction with sales personnel is the main advantage of stationary retail, it is crucial to properly support the customer during this challenging time (Otto & Chung, 2000). Customer behavior cannot be explained solely by considering rational aspects (Kahneman, 2003) and is often affected by emotions (van Dolen et al., 2004). The sales personnel’s ability to understand and react to the customers’ emotions is critical for service interactions and customers’ overall satisfaction (Bahadur et al., 2018). To protect oneself and others, the wearing of facemasks is recommended or mandatory, especially in indoor environments. Unfortunately, facemask make it difficult to recognize the emotions of others and may lead to misinterpretation and confusion (Carbon, 2020). To address this problem and support the interaction between customers and sales personnel, this paper proposes the design of self-assessment interfaces that provide a simple way for customers to enter their emotions. Our aim is to determine whether ITsupported self-assessment offers a suitable approach to measure customer emotions in stationary retail. Furthermore, the goal of this contribution is to generate design knowledge in order to provide digital support for stationary retail. Our research follows the Design Science Research (DSR) paradigm (Hevner et al., 2004) and in particular the General Methodology of Design Science Research (Vaishnavi et al., 2015). The research question of this paper is: How can emotion-self-assessment interfaces (ESAI) for stationary retail be designed? The paper is structured as follows: In section 2 and 3, we explain the importance of interaction between customers and sales personnel as well as the relevance of emotions. In section 4, the underlying methodology and the resulting design cycle are explained. Section 5 describes the design of three ESAI based on existing emotion theories, that were M. Meyer & S. Robra-Bissantz: Smile through the Mask: Emotion Measurement for Stationary Retail 197 later evaluated in a user test. In section 6, the results of the evaluation are presented. Finally, the papers ends with a conclusion. 2 Customer-Salesperson Interaction The current difficulties in stationary retail are mainly caused by the digital transformation (Hagberg et al., 2016). Thereby, stationary retail is being threatened by the shift from physical to digital. In particular, e-commerce and the possibility of mobile shopping through smart devices are creating new challenges (Fulgoni, 2015; Reinartz et al., 2019). Although some retailers are able to retain customers through multi-channel strategies, so-called ‘internet pure players’ account for a large share of the trade (Keyes, 2018). The advantages stationary retail still has are the qualification of the sales personnel and the resulting customer services which can be offered (Otto & Chung, 2000), particularly the option of social interaction with the sales personnel (Gutek et al., 1999). This interaction creates a connection between the sales personnel and the customer within a common interaction space (Fyrberg & Jüriado, 2009), that may contribute to a mutual value creation (Grönroos, 2006). However, the mere existence of an interaction is not enough to ensure value creation (Fyrberg & Jüriado, 2009). An unfitting interaction between the sales personnel and the customer negatively impacts customer satisfaction and salesperson comfort (Groth & Grandey, 2012), whereas a successful interaction can lead to increased trust, stronger loyalty, and improved comfort in future interactions (Geiger et al., 2020b; Grönroos & Voima, 2013). The currently predominant COVID-19 pandemic intensifies the critical situation for stationary retail, not only because stores are oftentimes temporarily closed but because the sales personnel has difficulties to fully recognize the customer’s emotions displayed by facial expressions due to facemasks (Adolphs, 2003; Carbon, 2020). In a situation in which the stationary retail is reliant on offering customers good service, this can lead to inappropriate responses. Empathy, care and concern are especially important for ensuring appropriate interactions (Diebner et al., 2020). Therefore, it is vital for the sales personnel to be able to correctly recognize and respond to customer emotions, in order to form the basis for a valuable interaction (Geiger et al., 2020a; Mattila & Enz, 2002; Meyer et al., 2021). ESAI offer the possibility of opening up a common interaction space in which the customer can actively participate in service creation. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 198 3 Customer Emotions Emotions influence how people think, communicate and interact, and lead to high mental activities that are perceived as positive or negative (Cabanac, 2002). The digital transformation has already produced various technical options for emotion measurement. In contrast to automatic measurement, self-assessment offers a simple way of measuring emotions that does not require cameras, microphones, or biofeedback readings (Betella & Verschure, 2016; Meyer et al., 2019). Furthermore, emotions are subjectively experienced in different ways (Barrett et al., 2006). Thus, self-assessment provides a suitable way to subjectively assess customer emotions (Barrett et al., 2006; Mau, 2009). There are significant correlations between the customers emotion, behavior and satisfaction (Burns & Neisner, 2006; Martin et al., 2008). Positive emotions are caused by a friendly and pleasant behavior of the sales personnel as well as the negotiation of good prices (Menon & Dubé, 2000). Furthermore, a successful interaction between the sales personnel and the customer evokes positive emotions because social needs are met (Lee & Dubinsky, 2003). Customers with positive emotions show higher satisfaction and improved loyalty (Burns & Neisner, 2006). Negative emotions on the other hand reduce customer satisfaction, which can lead to cancellation of purchases, lasting damage to the customer relationship and negative word-of-mouth (Gelbrich, 2010; Ou & Verhoef, 2017). Negative emotions occur when customers are treated rudely or when they are unsure which product to buy or whether they should by it in the first place (Menon & Dubé, 2000). The sales personnel acts as a critical link between the store and the customer and therefore has a strong influence on the customer’s emotions (Lee & Dubinsky, 2003). The empathic ability of the sales personnel can support customer satisfaction, whereas a lack of empathy and the resulting inability to understand the customer’s emotion can have a negative impact on the interaction and the perception of the service (Agnihotri & Krush, 2015). 4 Methodology Our research project is based on the systematic and iterative DSR paradigm proposed by Hevner et al. (2004) that combines behavioral science and designoriented research, and adds rigor as well as theory to generate prescriptive knowledge about the design of artifacts, such as software, methods, models or concepts (Hevner et al., 2004). Hevner et al. state that in order to create design knowledge, the M. Meyer & S. Robra-Bissantz: Smile through the Mask: Emotion Measurement for Stationary Retail 199 development, demonstration, justification and evaluation of an artifact is important. This design knowledge covers three fundamental aspects in DSR: (1) the problem space, (2) the solution space and (3) knowledge that describes the effectiveness of the solution through the generated artifact(s), which is called evaluation. The evaluation describes to what extent the constructed novel artifacts (solution space) address the problem space and satisfy the stakeholders of the problem. Our objective is to design ESAI for stationary retail. In this way, we plan to contribute design knowledge (solution space) to address an emotion-based support for the interaction between the customer and the sales personnel (problem space). This covers knowledge on how ESAI can be designed, including expository instantiations as representations of the design knowledge for purposes of testing (Iivari, 2015). We follow a model for comprehensive DSR projects that involve multiple design steps (see Figure 1) (Vaishnavi et al., 2015). Figure 1: Design Cycle 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 200 5 Artifact Design To approach our research objective, asking whether IT-supported self-assessment offers a suitable approach to measure customer emotions in stationary retail, we designed three different ESAI (see Figure 2). Following the “exploring by building”principle, the design of the ESAI is very diverse and has an explorative character (Vaishnavi et al., 2015). Due to the high diffusion of smartphones among retail customers, all interfaces were implemented in the form of mobile applications (Fulgoni, 2015). The interface design on the left side of Figure 2 is based on the Circumplex Model of Affect (CMoA) (Russell, 1980). The CMoA classifies a variety of emotions using the two dimensions valence and arousal. However, the interface was modified by reducing the complexity of the original. This resulted in four emotional situations. The situations 1 and 2 represent high arousal situations, which are either negative (angry/frustrated) or positive (excited/happy), whereas situations 3 and 4 represent situations of low arousal, which can be negative (sad/tired) or positive (pleased/relaxed). For each emotional situation, an input field was realized in the interface. The emotional situation of the customer can be entered by a tap on one of the input fields. The Affective Slider (AS)-Interface in the middle of Figure 2 was designed close to the Affective Slider by Betella & Verschure (2016). This ESAI measures the two dimensions valence and arousal by adjusting emoticons on sliders. In the AS-Interface, the user is therefore able to choose how “happy” and how “excited” he or she is. The emoticons provide feedback about the status of the slider through their facial expressions. For example, if the emoticon for valence is on the left edge, it appears sad; if it is on the right edge, it appears happy. The slider for excitement behaves accordingly: If the emoticon is on the left, it looks relaxed, if it is on the right, it looks excited. After the appropriate emotional situation of the customer is set, it can be entered via the submit button. Finally the Wheel of Emotions (WoE)-Interface on the right side of Figure 2 is based on the wheel of emotions by Plutchik (2001). Plutchik distinguishes between eight basic emotions which can be expressed in different intensities. Again, the interface was modified by reduction of the complexity. For the design of the interface only the medium intensity emotions (e. g. anger instead of rage, sadness instead of grief) were used, since these fit better with the context of use. To distinguish the eight input fields more clearly, different colors and symbols were applied. To input an emotion, the customer rotates the wheel until the suitable emotion is found, then selects it by tapping on it. M. Meyer & S. Robra-Bissantz: Smile through the Mask: Emotion Measurement for Stationary Retail 201 Figure 2: CMoA, AS, WoM 6 Interface Evaluation Although designed for mobile applications, the user test was implemented through web applications in a browser window (due to the safety reasons during the COVID19 pandemic). The user test itself consisted of a short introduction to the topic, the interaction with the three ESAI, and subsequent questioning. In order to avoid a preference of one interface, the three interfaces were presented to the participants in a random order. The evaluation of the ESAI was based on the User Experience Questionnaire (UEQ) respectively its modular extension (UEQ+), which allows to freely select and combine individual user experience scales (Schrepp & Thomaschewski, 2019). For the evaluation of the ESAI, the scales Clarity, Visual Aesthetics, and Efficiency were chosen. All UEQ+ scales used a seven-point Likert scale (1 = totally disagree, 7 = totally agree). Clarity describes the impression of arrangement, structure and visual complexity of a graphical user interface (Otten et al., 2020). Visual Aesthetics measures whether the user perceives the interface as beautiful and appealing (Schrepp & Thomaschewski, 2019). Efficiency measures whether the user has the impression that he or she can achieve the goals related to the usage of the interface with minimal effort (Laugwitz et al., 2008). In addition to the UEQ+ scales, various statements and questions concerning emotions and interactions were formulated and rated on a five-point Likert scale (1 = totally disagree, 5 = totally agree). The user test ends with open-ended questions regarding 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 202 general criticism as well as missing features. Participants were recruited by distributing the user test via internal mailing lists from a German university. 58 people participated in the survey, with 14 people dropping out before completion, leaving 44 complete datasets. The age of the participants ranges from 16 to 67 years, with an average age of 30.07 years. 59% of the participants are male, 39% female, and 2% other. Table 1 shows the descriptive statistics (mean (M), standard deviation (SD)) of the user test as well as Cronbach´s alphas (α) for the scales Clarity, Visual Aesthetics, and Efficiency. Table 1: Results of the UEQ+ UEQ+ (7-point LikertScale) Clarity Visual Aesthetic s Efficienc y CMoA AS WoM α M SD M SD M SD 5.64 1.12 4.81 1.71 5.56 1.18 0.85 4.98 1.26 4.33 1.60 5.94 0.85 0.81 5.39 1.29 4.44 1.70 4.90 1.52 0.84 Clarity was rated the highest for CMoA (M = 5.64, SD = 1.12) and the WoE (M = 5.56, SD = 1.18). In terms of Visual Aesthetics, the WoE was rated highest by a relatively large margin (M = 5.94, SD = 0.85). Efficiency was rated the highest for the CMoA (M = 5.39, SD = 1.29), followed by the WoE (M = 4.90, SD = 1.52). The AS was rated lowest for all three scales (Clarity: M = 4.81, SD = 1.71; Visual Aesthetics: M = 4.33, SD = 1.60; Efficiency: M = 4.44, SD = 1.70). For further analysis, the data was tested for normal distribution using the Shapiro-Wilk test. The results indicate non-normal distribution (p < 0.01 for all scales). A non-parametric Friedman test of differences among repeated measures was conducted that retendered a Chi-square value of 55.46, which showed significant differences between the three ESAI (p < 0.01). Post-hoc tests (Dunn-Bonferroni tests) pointed out two significantly differences: First, Visual Aesthetics significantly differs between the AS and the WoM (Z = -1.03, p < 0.01, Cohen's effect size: r = 0.16). Second, Visual Aesthetics M. Meyer & S. Robra-Bissantz: Smile through the Mask: Emotion Measurement for Stationary Retail 203 significantly differs between the CMoA and the WoE (Z = -0.60, p < 0.05, Cohen's effect size: r = 0.09). The effect sizes correspond to a weak effect. Table 2: Results of the statements No. 1 2 3 4 5 6 Statement (5-point Likert-Scale) I am satisfied with the selection of emotions. A good interaction with the sales personal is important to me. Emotions are important in the interaction between customers and sales personnel. IT support for interaction between customers and sales personnel is useful. Giving the customer the possibility to enter his or her emotions is useful. I am willing to share my emotions with the sales personnel. CmoA M SD 4.27 0.66 Interface AS M SD 3.30 1.21 WoE M SD 4.30 0.63 M SD 4.68 0.56 4.02 0.93 3.95 0.91 4.11 0.84 3.59 1.17 Tables 2 and 3 show the results of the statements and questions. In terms of satisfaction with the selection of emotions (Statement 1), the WoE received the highest rating (M = 4.30, SD = 0.63), closely followed by the CMoA (M = 4.27, SD = 0.66). This is consistent with the fact that most people say they like WoM the best (Question 1). The participants rate the interaction with the sales personnel as important (M = 4.68, SD = 0.56) and confirm that emotions are an important element in the interaction (M = 4.02, SD = 0.93) (Statements 2 & 3). In addition, the participants agree that the input of emotions (M = 4.11, SD = 0.84) as well as the digital support of the interaction between customers and sales personnel is useful (M = 3.95, SD = 0.91) (Statements 4 & 5). Whether customers are willing to enter their emotions was rated lowest compared to the other statements and shows the largest standard deviation (M = 3.59, SD = 1.17). The evaluation of the open questions revealed further insights about the ESAI. The use of emoticons as well as symbols were repeatedly highlighted positively. The use of colors was also mentioned as being positive. Furthermore, additional functions were desired. One 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 204 participant expressed that he/she would like to give the reason for his/her emotion. In addition, two participant would like to indicate whether contact with sales personnel is desired or not. Moreover, one participant would like to indicate his/her location in the store as well as an automatic recognition of whether he/she is entering or leaving the store. Three participants stated that they would not use an ESAI under any circumstances and would rather keep their emotions to themselves, because far too much customer data is already collected in general. Two participants stated that they would only use an ESAI if they received discounts or coupons. In total, 26 participants would use an ESAI in stationary retail, whereas 18 would not use it or were uncertain (Question 2). Table 3: Results of the questions No. Question CmoA 1 2 7 Overall, which of the three interfaces did you like best? Would you use the interface that you liked the most in stationary retail? Answer AS WoE 16 10 18 Yes No Uncertain 26 12 6 Conclusion & Outlook The aim of this paper was to answer the question “How can emotion-selfassessment interfaces (ESAI) for stationary retail be designed?”. Furthermore, it should be examined whether IT-supported self-assessment offers a suitable approach to measure customer emotions in stationary retail. As part of a DSR project, we designed three ESAI and evaluated them over the course of a design cycle. The user test (n = 44) shows that all ESAI were generally rated as positive (above the midpoint of the used UEQ+ scales) and continued to be perceived as useful by customers (Statement 5). Statistically significant differences could be shown in the evaluation of Visual Aesthetics between the WoM and the CMoA as well as the WoM and the AS. The CMoA and the WoE were rated the highest in all UEQ+ scales and were also perceived to be the best overall (Question 1). The reason for this may be due to the fact that the CMoA and the WoM offer the customer discrete emotions or concrete emotional situations. In contrast, the AS offers a more abstract representation of emotions through its two dimensions. In addition, the M. Meyer & S. Robra-Bissantz: Smile through the Mask: Emotion Measurement for Stationary Retail 205 CMoA and WoM are characterized by a greater use of colors. The use of colors was highlighted as positive along with the use of emoticons and symbols in the openended questions. Therefore, important design knowledge includes the use of discrete emotions as well as the use of colors and emoticons or other symbols to describe the emotions. In the course of this paper, we were able to show that it is possible to use IT-supported self-assessment in stationary retail to capture customer emotions (Statement 5 & Question 2). Furthermore, the evaluation emphasizes the importance of emotions for a successful interaction between customers and sales personnel (Statement 3) (Adolphs, 2003; Geiger et al., 2020a). Derived from the open questions, it became clear that emotions are a very personal topic. Therefore, special attention should be paid to the secure processing and storage of customer data. The resulting design knowledge should be further refined in the next design cycle. A direct comparison of different design features would be a logical step in this process. In addition, a suitable method must be created to display the customer’s emotions to the sales personnel. Furthermore, the open-ended questions offer a variety of additional features besides the actual measurement of the customer’s emotions, which will be addressed in further research projects. A strong limitation of this work is its highly exploratory nature, which does not allow for direct comparison of individual design features such as the input method, the number and form of emotions displayed, and the use of colors and symbols. Another limitation derives from the fact that the user test was implemented digitally using browser applications instead of the originally planned – and still intended – mobile applications. The designed ESAIs give the customer the opportunity to actively participate in creating a successful interaction between him and the sales personnel by entering his/her own emotions. In this way, stationary retail is supported in utilizing its key competencies of personal interaction properly. However, the success of the ESAI ultimately depends on whether customers want to participate and whether they are honest. References Adolphs, R. (2003). Cognitive neuroscience of human social behaviour. Nature Reviews. Neuroscience, 4(3), 165–178. Agnihotri, R., & Krush, M. T. (2015). Salesperson empathy, ethical behaviors, and sales performance: The moderating role of trust in one’s manager. Journal of Personal Selling & Sales Management, 35(2), 164–174. 206 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Aslam, F., Awan, T. M., Syed, J. H., Kashif, A., & Parveen, M. (2020). Sentiments and emotions evoked by news headlines of coronavirus disease (COVID-19) outbreak. Humanities and Social Sciences Communications, 7(1), 1–9. Bahadur, W., Aziz, S., & Zulfiqar, S. (2018). Effect of employee empathy on customer satisfaction and loyalty during employee–customer interactions: The mediating role of customer affective commitment and perceived service quality. Cogent Business & Management, 5(1), 1491780. Barrett, L. F., Mesquita, B., Ochsner, K. N., & Gross, J. J. (2006). The Experience of Emotion. Annual Review of Psychology, 58(1), 373–403. Betella, A., & Verschure, P. F. M. J. (2016). The Affective Slider: A Digital Self-Assessment Scale for the Measurement of Human Emotions. PLoS ONE, 11(2). Burns, D. J., & Neisner, L. (2006). Customer satisfaction in a retail setting: The contribution of emotion. International Journal of Retail & Distribution Management, 34(1), 49–66. Cabanac, M. (2002). What is emotion? Behavioural Processes, 60(2), 69–83. Carbon, C.-C. (2020). Wearing Face Masks Strongly Confuses Counterparts in Reading Emotions. Frontiers in Psychology, 11. https://doi.org/10.3389/fpsyg.2020.566886 Diebner, R., Silliman, E., Ungerman, K., & Vancauwenberghe, M. (2020). Adapting customer experience in the time of coronavirus. http://ceros.mckinsey.com/coronavirus-promo Doherty, N. F., & Ellis-Chadwick, F. (2010). Evaluating the role of electronic commerce in transforming the retail sector. The International Review of Retail, Distribution and Consumer Research, 20(4), 375–378. Fulgoni, G. M. (2015). The Rise of the Digital Omnivore: What It Means for Advertisers, Publishers, and App Developers. Journal of Advertising Research, 55(2), 115–119. Fyrberg, A., & Jüriado, R. (2009). What about interaction?: Networks and brands as integrators within service‐dominant logic. Journal of Service Management, 20(4), 420–432. Geiger, M., Robra-Bissantz, S., & Meyer, M. (2020a). Wie aus digitalen Services Wert entsteht: Interaktionen richtig gestalten. HMD Praxis der Wirtschaftsinformatik, 57(3), 385–398. Geiger, M., Robra-Bissantz, S., & Meyer, M. (2020b). Focus on Interaction: Applying Service-Centric Theories in IS. Proceedings of 33rd Bled EConference Enabling Technology for Sustainable Society, 665–672. Gelbrich, K. (2010). Anger, frustration, and helplessness after service failure: Coping strategies and effective informational support. Journal of the Academy of Marketing Science, 38(5), 567–585. Grönroos, C. (2006). Adopting a service logic for marketing. Marketing Theory, 6(3), 317–333. Grönroos, C., & Voima, P. (2013). Critical service logic: Making sense of value creation and co-creation. Journal of the Academy of Marketing Science, 41(2), 133–150. Groth, M., & Grandey, A. (2012). From bad to worse: Negative exchange spirals in employee–customer service interactions. Organizational Psychology Review, 2(3), 208–233. Gutek, B. A., Bhappu, A. D., Liao-Troth, M. A., & Cherry, B. (1999). Distinguishing between service relationships and encounters. Journal of Applied Psychology, 84(2), 218–233. Hagberg, J., Sundstrom, M., & Egels-Zandén, N. (2016). The digitalization of retailing: An exploratory framework. International Journal of Retail & Distribution Management, 44(7), 694–712. Hevner, A. R., March, S. T., Park, J., & Ram, S. (2004). Design Science in Information Systems Research. 32. Iivari, J. (2015). Distinguishing and contrasting two strategies for design science research. European Journal of Information Systems, 24(1), 107–115. Kahneman, D. (2003). Maps of Bounded Rationality: Psychology for Behavioral Economics. American Economic Review, 93(5), 1449–1475. Keyes, D. (2018). Amazon captured 4% of US retail sales in 2017. Business Insider. https://www.businessinsider.com/amazon-captured-4-of-us-retail-sales-in-2017-2018-1 Laugwitz, B., Held, T., & Schrepp, M. (2008). Construction and Evaluation of a User Experience Questionnaire. In A. Holzinger (Hrsg.), HCI and Usability for Education and Work (S. 63– 76). Springer. M. Meyer & S. Robra-Bissantz: Smile through the Mask: Emotion Measurement for Stationary Retail 207 Lee, S., & Dubinsky, A. (2003). Influence of salesperson characteristics and customer emotion on retail dyadic relationships. The International Review of Retail, Distribution and Consumer Research, 13(1), 21–36. Martin, D., O’Neill, M., Hubbard, S., & Palmer, A. (2008). The role of emotion in explaining consumer satisfaction and future behavioural intention. Journal of Services Marketing, 22(3), 224–236. Mattila, A. S., & Enz, C. A. (2002). The Role of Emotions in Service Encounters. Journal of Service Research, 4(4), 268–277. Mau, G. (2009). Die Bedeutung der Emotionen beim Besuch von Online-Shops: Messung, Determinanten und Wirkungen (1. Aufl). Gabler Verlag. Menon, K., & Dubé, L. (2000). Ensuring greater satisfaction by engineering salesperson response to customer emotions. Journal of Retailing, 76(3), 285–307. Meyer, M., Helmholz, P., Rupprecht, M., Seemann, J., & Tönnishoff, T. (2019). From the Inside Out— A Literature Review on Possibilities of Mobile Emotion Measurement and Recognition. Proceedings of 32th Bled eConference Humanizing Technology for a Sustainable Society, 719– 743. Meyer, M., Siemon, D., & Robra-Bissantz, S. (2021). Emotion-based IS support for CustomerSalesperson Interaction. Proceedings of the 54th Hawaii International Conference on System Sciences, 4426–4435. Otten, R., Schrepp, M., & Thomaschewski, J. (2020). Visual clarity as mediator between usability and aesthetics. Otto, J. R., & Chung, Q. B. (2000). A Framework for Cyber-Enhanced Retailing: Integrating ECommerce Retailing with Brick-and-Mortar Retailing. Electronic Markets, 10(3), 185–191. Ou, Y.-C., & Verhoef, P. C. (2017). The impact of positive and negative emotions on loyalty intentions and their interactions with customer equity drivers. Journal of Business Research, 80, 106–115. Plutchik, R. (2001). The Nature of Emotions: Human emotions have deep evolutionary roots, a fact that may explain their complexity and provide tools for clinical practice. American Scientist, 89(4), 344–350. Reinartz, W., Wiegand, N., & Imschloss, M. (2019). The impact of digital transformation on the retailing value chain. International Journal of Research in Marketing, 36(3), 350–366. Russell, J. A. (1980). A circumplex model of affect. Journal of Personality and Social Psychology, 39(6), 1161–1178. Schrepp, M., & Thomaschewski, J. (2019). Design and Validation of a Framework for the Creation of User Experience Questionnaires. International Journal of Interactive Multimedia and Artificial Intelligence, 5(Regular Issue). Vaishnavi, V. K., Kuechler, W., & Kuechler, W. (2015). Design Science Research Methods and Patterns: Innovating Information and Communication Technology, 2nd Edition. CRC Press. van Dolen, W., de Ruyter, K., & Lemmink, J. (2004). An empirical assessment of the influence of customer emotions and contact employee performance on encounter and relationship satisfaction. Journal of Business Research, 57(4), 437–444. Yang, K., Kim, J., Min, J., & Hernandez-Calderon, A. (2021). Effects of retailers’ service quality and legitimacy on behavioral intention: The role of emotions during COVID-19. The Service Industries Journal, 41(1–2), 84–106. 208 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE HOW DIGITAL MARKET HOSTS CONTROL SELLERS SHRADDHA DANANI1 & JANIS L. GOGAN2 1 Development Institute, Gurgaon, Haryana India; e-mail: shraddhadanani@gmail.com University, Waltham Massachusetts, United States of America; e-mail: jgogan@bentley.edu 2 Bentley Abstract How do hosts of digital markets exercise control over sellers? Our three-case study, set in India, reveals that seller control portfolios used by large digital market hosts differ from control portfolios in other contexts (reported in prior research). The platform host neither preselects nor hires most sellers; this limits hosts’ control options. The platform supports many shortduration transactions, yet some related processes take place offline – again limiting hosts’ control options. In this context of many-sellers, many-buyers, digital market hosts (similar to other controllers) attempt to balance formal and informal controls. By identifying specific control mechanisms that hosts utilize, our study findings provide a useful foundation to support further research on control challenges in digital markets and other digital platforms. DOI https://doi.org/10.18690/978-961-286-485-9.16 ISBN 978-961-286-485-9 Keywords: digital market, digital platform, control, case research 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 210 1 Introduction Control is both necessary and insufficient to digital platform success (Tiwana et al. 2010; Buchwald et al. 2014, Shafiei Gol et al. 2019). A digital market is a digital platform that connects buyers and sellers via their computers or mobile devices. Digital market hosts confront several control challenges. Sellers are not platform employees, and most sellers are independent entities; they voluntarily participate and may exit at any time. Unlike many other digital platforms, on a digital market many sales transactions involve both on-platform and off-platform processes. Because of this, the platform host's control leverage is limited (Felin & Zenger 2014). Their control authority is further constrained by the fact that hosts and sellers are not colocated (difficult to observe off-platform behavior). Reflecting these and other concerns, prior studies indicate that many platform hosts try to coax participants to align with platform priorities (Parker & Van Alstyne 2018), such as by orchestrating participants' interactions (Brown & Grant 2005; Tiwana 2014). Most platform hosts aim to strike a balance between tight and loose control, and between attracting and controlling buyers and sellers (de Reuver et al. 2018, Parker & Van Alstyne 2018). Some helpful automated controls are embedded in digital platform software (Parker & Van Alstyne 2018), and hosts also have the option of evicting participants who misbehave (Parker & Van Alstyne 2018; Aulkemeier et al. 2019). Since eviction is a last resort, it would be helpful to chronicle in detail how digital market platform hosts actually exercise control over sellers, by closely examining their seller control portfolios, and circumstances that influence which controls are used and when. A recent study (Croitor et al. 2021) investigated sellers' perceptions about digital market hosts' use of two formal and informal control modes (described below). However, to date no prior in-depth study has comprehensively examined how digital market hosts exercise control over sellers. Thus, our three-case study posed the following research question: How do digital market hosts exercise control over participating sellers? 1.1 Brief Overview of Prior Control Research An organization's portfolio of manual and computer-based control mechanisms aims to prevent, detect, and correct adverse events, in ways that align with strategic and operational priorities for organizational control (Cardinal et al. 2017), accounting control (Gelinas & Dull 2008), or IS control (Kirsch et al. 2002; S. Danani & J. L. Gogan: How Digital Market Hosts Control Sellers 211 Choudhury & Sabherwal 2003; Heiskanen et al. 2014; Remus & Wiener 2012, Wiener et al. 2019). Prior studies categorize control mechanisms in two modes: 1) formal (process controls and outcome controls) and 2) informal (relational controls and mechanisms that support self-control) (Chua et al. 2012; Merchant & Van der Stede 2017). Until recently, prior platform studies articulated control challenges and offered guidance on balancing control portfolios in terms of these higher-level control modes; most prior platform control studies did not closely investigate the specific formal and informal control mechanisms hosts used to achieve balanced control (Yoo et al. 2012; Halckenhaeusser et al. 2020). A survey of sellers on Amazon and Etsy (Croiter et al. 2021) reveals that control perceived to be strict (e.g., screening mechanisms that block undesired sellers) negatively affect sellers' intrinsic motivation, their perceptions of platform usefulness, and their satisfaction with the platform. Informal relational controls -what Ouchi (1980) referred to as Clan Control -- positively influenced seller perceptions. Croitor et al. contributed helpful early findings on sellers' attitudes about specific controls, and their behavioral intentions. A recent literature review (Danani, 2021) called for in-depth comprehensive examination of specific control mechanisms that digital market hosts use to exercise control over sellers. The remainder of this paper is structured as follows. In Section 2 we describe our research method. After presenting findings from our three-case study in Section 3, we briefly discuss those findings which are consistent with prior control studies, and point to other findings which uniquely reflect the digital market context. In Section 4 we discussion contributions, study limitations, and future research opportunities. 2 Research Method Case research is appropriate for learning ‘how’ and ‘why’ managerial phenomena unfold in complex contexts (Yin 2009). Our three-case study sought to learn in detail how digital market hosts exercise control over sellers. We identified three prominent digital markets operating in India (home country of first author). Each digital market serves many consumers and many sellers. MC, GC, and FC (companies anonymized) are each at a mature stage of operations (neither startup nor in decline). Each digital market connects many consumers with 100,000 or more sellers, offering many 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 212 products. From left to right, Table 1 summarizes key features of these three digital market cases, in the order in which we gathered data. For each case, semi-structured interviews were conducted with an operations manager, merchant manager, operations head, and merchant head. Snowball sampling led us to other interviewees. Interview and site observation notes were typed within 24 hours and corroborated/triangulated case findings were confirmed with each firm’s operations manager and also with owners of some seller firms. 12 interviews were conducted at MC , 12 at GC; 9 at FC. Interview findings were compared with more than 360 company resources, including training materials, policy documents, manuals, dashboards, digital communications, and observed system interfaces. Here are two triangulation examples: 1) A content manager’s interview was corroborated with MC's catalogue creation guideline documents. 2) An operations manager interview was corroborated with training documents, seller portal and operations guideline documents. Table 1: Three Digital Market Hosts MultiCart (MC) October 2018--Jan 2019 Launched 2007 80M product SKUs 100,000 sellers 100M + consumers GlobalCart (GC) January 2017-- July 2018 Launched 2012 100M + product SKUs 400,000 sellers 120,000 active sellers 150M + consumers FastCart (FC) March 2019--May 2019 Launched 2010 60M + product SKUs 300,000 sellers 60% to 75% active sellers 10M + consumers In 2007 MC targeted a niche market. Later it expanded into electronics, apparel, appliances, books, toys, other consumer products, and groceries. Today it targets consumers all over India. GC operates in many countries; this study focused on its operations in India. Its systems and infrastructure connect small to medium size mostlyindependent sellers with consumers all over India. FC does not produce or trade any products under its brand. Its logistics infrastructure services 3000 Indian cities. FC targets consumers in smaller towns. It offers low-price high-volume products. S. Danani & J. L. Gogan: How Digital Market Hosts Control Sellers 213 Our analysis utilized both a positivist lens (we coded case data for known control mechanisms, classified in informal or formal control modes), and a grounded theory lens (we identified control mechanisms not discussed in prior studies and, iterating between data collection and analysis, we identified new control themes). Thus, both open and axial coding described each organization’s control portfolio. For example, three open codes – specify delivery milestones, specify target timeframe, clearly defined interaction success criteria -- were grouped into an axial code: Clearly defined performance criteria. When necessary, we re-contacted interviewees to clarify details and obtain supporting documents (e.g., after analysing a merchant manager interview, we asked this interviewee to clarify details about performance metrics and evaluation criteria). Interview findings were corroborated via primary-source or secondary-source documents and other interviews. This helpful triangulation led us to modify some initial concepts. For example: we saw that MC training documents and guidelines transferred process knowledge to sellers. Later, we obtained evidence indicating that training did help sellers perform effectively. Thus, we mapped training to both formal process control and informal self-control. 3 Study Findings The study findings revealed that hosts' seller control portfolios are comprised of control mechanisms implemented at three levels: system (automated control mechanisms), participants (control exerted by host employees, consumers, peer sellers and seller themselves) and host firm (policies, initiatives, values and culture). Figure 1, a Digital Market Seller Control Framework, summarizes three broad levels of control mechanisms (automated, participant-level, host firm-level), mapped to formal and informal control modes, and influencing consumer-seller interactions. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 214 Figure 1: Digital Market Platform Seller Control Framework Table 2 (shaded in grey) summarizes conventional (single-mode) formal and informal seller controls identified in the three cases. Table 3 (not shaded) summarizes hybrid (multi-mode or multi-mechanism) controls in the three cases. Table 2 Three-Case Comparison: Single-Mode Controls in Digital Market Platforms Mechanism Mode MC GC FC √ Formal Controls OC: Outcome control PC: Process Control a: automated f: firm p: participant Verify adherence to catalogue guidelines, participation terms PC a, p √ √ Measure rate of order acceptance by seller OC a √ √ NO Measure consumer returns (indirectly gauge product quality) OC a √ √ NO Measure product quality through customer returns OC a, p √ √ NO Measure consumer satisfaction on order cycle OC a √ √ √ S. Danani & J. L. Gogan: How Digital Market Hosts Control Sellers 215 Measure seller order (value + volume) in a given period OC a √ √ NO Measure consumer satisfaction on query/issue resolution OC a, p √ √ Measure number of completed returns request OC a √ √ NO Support sellers through community platform RC p, f √ √ NO Assist sellers with registration, catalogue creation, other setup RC p √ √ √ Assist sellers with issue resolution RC p √ √ √ Connect with seller through calls and meetings RC p √ √ √ Encourage sellers to recruit new sellers to the platform RC p NO √ NO Organize seller group events RC f √ √ NO + Training: platform norms, values and objectives RC f √ √ Sellers decide re pricing, promotion, QC, packaging, shipping SC p √ √ Link financial benefits with order performance SC a, p √ √ NO √ Informal Controls RC: Relational Control; SC: Support of Self-Control √ √ Most formal controls are enacted via automated systems. An MC operations manager stated that automated controls monitor consumers' product return requests, and that “we do not monitor if the seller packed the right product, as ordered by the consumer.” GC’s operations manager said “For every order, performance against checkpoint parameters is recorded. The system calculates average value [for] a 30-day [period].” 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 216 Table 3 Three-Case Comparison: Hybrid Controls (multiple mechanisms/modes per control) Mechanism Mode MC GC FC Measure time to pack and ship PC a, OC a √ √ √ Measure time to deliver to end consumer PC a, OC a √ √ NO Measure pickup reattempt rate PC a, OC a N O √ NO Measure time taken to resolve consumer query/issue PC a, OC √ √ √ Measure time taken to process refunds on returns request PC, OC √ √ NO Create promotional events RC, SC √ √ NO + Organize seller appreciation events RC, SC √ √ + Promote seller success stories RC, SC √ √ NO + Provide access to comprehensive training material RC, SC √ √ √ Best practices training: QC, packaging, shipping, etc. RC, SC √ √ NO SC, PC √ √ √ Controls that Combine 2 Formal Modes PC: process control; OC: outcome control Controls that Combine 2 Informal Modes RC: relational control; SC: support for self-control √ Controls that Combine Formal and Informal Modes Training: order delivery, queries, returns), performance criteria S. Danani & J. L. Gogan: How Digital Market Hosts Control Sellers 217 Automatically cancel order if not shipped on time SC, PC √ √ √ Display system-generated seller service rating OC, SC √ √ NO Prominently display high performing sellers’ products OC, SC √ √ NO Prominently display products highly rated by consumers OC, SC √ √ NO Hosts rely on employee teams to manually measure sellers' content quality, and rely on consumers to judge sellers' product and service quality. All three hosts encourage consumers to evaluate sellers via quantitative and qualitative ratings of product quality, service experience, and seller query resolution. These ratings are displayed on or linked to sellers' product listing pages). Consumer evaluations weigh heavily in hosts’ overall seller ratings (along with sellers' sales per evaluation period. All sellers receive training that explains terminology, processes and instructions. MC and GC community portals target all sellers with these resources. Other informal controls aim to build relationships with sellers. Host teams attempt to keep sellers engaged with their platform (participant-level relational controls). For example, MC and GC invite high-performing sellers to local city chapter events. “Sellers who perform well are very important for us,” said an MC Operations Manger. “We need to … support them if there is an issue.” Awards and recognition events (firm-level controls) also aim to strengthen high performing sellers' association with the platform. A host merchant coordinator organizes meetings, calls, awards events, advanced training seminars and other events. MC merchant coordinator: “We meet up with them, one to one or in a group setting, region-wise. ” Other control mechanisms encourage seller self-control, and these intertwine with formal controls, such as performance-triggered rewards and penalties. MC's Operations Manager stated that sellers “control their performance. We openly display their performance report card … [Sellers try to] keep their consumers happy and get good ratings.” FC manager: “The weighted average of customer ratings for a seller is displayed next to seller name on every product listing. Future customers can view the rating, identify the reason ...” Hosts respond to poor performance with 218 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE warnings or penalties. GC Operations Manager: “We observe [a problematic seller] for a fixed number of days. If performance does not improve, we completely deactivate the seller account and remove all listings.” 4 Contributions, Limitations and Directions for Further Researc The three cases reveal that hosts use many formal and informal controls, including providing resources that enable seller self-control. Hosts also deputize consumers to exercise control over sellers, through quantitative ratings and qualitative feedback. Consistent with the ‘Goldilocks’ challenge (Ghazawneh & Henfridsson 2013), hosts aim for balance; that is, overall control that is neither too-tight nor too-loose (Tiwana 2014; Benlian et al. 2015). In digital markets, the Goldilocks challenge appears to be partly influenced by interdependence among hosts, sellers and buyers, and partly influenced by the fact that sellers and consumers are only loosely tied to the market platform (they can buy or sell elsewhere). In this interdependent yet loosely-coupled context, hosts apply tight system-based controls, and authorize consumers to exercise tight control by evaluating sellers' product and service quality. Hosts offset tight controls with looser informal relational controls and by mechanisms that support seller self-control. We believe a similar balancing of formal/informal and preventive/detective controls likely applies in other contexts characterized by both interdependence and loose coupling -- such as platforms that support ride-sharing, short-term home rentals and other 'sharing economy' services. Future in-depth and holistic case studies set in these other digital platform contexts are still needed. Our study was based in India, which limits the generalizability of our findings. Future case studies can usefully focus on culturally-different contexts like Europe, North or South America, East Asia, and Africa. An embedded-cases study of a huge multinational like Amazon or AliBaba could inevestigate why and to what extent controls are chosen and exercised differently by headquarters versus managers in different regions. Our study provides a helpful foundation for future case studies as well as large-sample surveys investigating hosts' reliance on specific seller control mechanisms (in differently-configured control portfolios). S. Danani & J. L. Gogan: How Digital Market Hosts Control Sellers 219 Our study did not directly examine how specific controls affect seller employees' attitudes or behaviour (an important early contribution of Croitor et al. 2021). In future studies, it would be helpful to take a 3600 view of stakeholder responses to a broader set of formal and informal control mechanisms (important, since hosts need to fairly balance sellers’ and consumers’ interests). Studies informed by servicedominant logic (Lusch & Nambisan 2015) could helpfully explore whether and how value cocreation (or inadvertent value destruction) is associated with differentlyconfigured digital platform control portfolios. In our three cases, hosts focused on building relationships with high-performing sellers. As for high-potential (but as yet under-performing) sellers (e.g., those serving small but profitable market niches or offering innovative products which consumers do not yet understand): our findings suggest that digital market hosts adopt a 'sink or swim' approach. Perhaps this is because a seller's success potential is hard to spot. Stronger data analytics might help hosts identify high-potential sellers by attending to faint signals that point to consumer acceptance and likely profitability in small market niches. Future design-science studies could contribute, by testing alternative analytic techniques that may strengthen those faint signals. Our three-case study revealed that digital market hosts allow sellers to decide how to carry out many processes (on-platform and off-platform). Advanced information systems and supporting infra-structures might in future enable hosts to exercise tighter automated control. Our case study provides a basis for comparison with future studies that could chronicle whether and how host control changes as smarter systems (supported by artificial intelligence, blockchains, etc.) take on additional control functions, and also chronicle how host employees, sellers and consumers react to such changes. Given the rapid evolution of ICT, many future studies utilizing multiple research methods, are needed, to continue to shed helpful light on mechanisms of control in digital markets and on other digital platforms. References Aulkemeier F., Iacob M., van Hillegersberg J. 2019. Platform-based collaboration in digital ecosystems. Electronic Markets (29), 597–608. Benlian A., Hilkert D., Hess, T. 2015. How open is this platform? The meaning and measurement of platform openness from the complementors’ perspective, Journal of Information Technology, 30:3), 209–228. 220 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Brown A.E. & Grant, G.G. 2005. Framing the frameworks: A review of IT governance research. Communications of the Association for Information Systems (15), 696–712. Buchwald A., Urbach N., Ahlemann F. 2014. Business value through controlled IT: Toward an integrated model of IT governance success and its impact. Journal of Information Technology (29:2), 128–147. Choudhury V. & Sabherwal R. 2003. Portfolios of control in outsourced software development projects. Information Systems Research (14:3), 291–314. Chua C.E.H., Lim W.-K., Soh C., Sia S.K. 2012. Enacting clan control in complex IT projects: A social capital perspective, MIS Quarterly (36:2), 577-600. Cram W.A., Brohman/ M.K., Gallupe, R. B. 2016a. Hitting a moving target: a process model of information systems control change. Information Systems Journal (26:3), 195–226. Cram W.A., Brohman K., Gallupe R.B. 2016b. Information systems control: A review and framework for emerging information systems processes. Journal of the Association for Information Systems (17:4), 216–266. Cram W.A & Gallupe B.R. 2016. A method to evaluate information systems control alignment. Journal of Information Systems (30:1), 117–135. Croitor, E., Werner, D., Adam, M., Benlian, A. 2021. Opposing effects of input control and clan control for sellers on e-marketplace platforms. Electronic Markets, 1-16. Danani, S. 2021. How and Why Do Digital Market Platform Hosts Exercise Control Over Selers? PhD Thesis, Management Development Institute, Gurgaon. India. de Reuver M., Sørensen C., Basole R.C. 2018. The digital platform: A research agenda. Journal of Information Technology (33:2), 124–135. Eisenhardt K.M. 1989. Building theories from case study research. Academy of Management Review (14:4), 532–550. Felin T. & Zenger T.R. 2014. Closed or open innovation? Problem solving and the governance choice. Research Policy. (43:5), 914–925. Fichman R., Dos Santos B., Zheng Z. 2014. Digital innovation as a fundamental and powerful concept in the information systems curriculum. MIS Quarterly (38:2), 329-A15. Gelinas U.J. & Dull R.B. 2008. Accounting Information Systems, 7th Edition. Thomson Southwestern. Ghazawneh A. & Henfridsson O. 2013. Balancing platform control and external contribution in thirdparty development: The boundary resources model. Information Systems Journal, 23(2), 173– 192. Gregory R.W. & Keil M. 2014. Blending bureaucratic and collaborative management styles to achieve control ambidexterity in IS projects. European Journal of Information Systems (23:3), 343356. Halckenhaeusser A, Foerderer J., Heinzl A. 2020. Platform governance mechanisms: An integrated literature review and research directions. Proceedings of ECIS 2020. Heiskanen A., Newman M., Eklin M. 2008. Control, trust, power, and the dynamics of information system outsourcing relationships: a process study of contractual software development. Journal of Strategic Information Systems (17:4), 268–286. Kirsch L.J. 1997. Portfolios of control modes and IS project management. Information Systems Research (8:3), 215-239 Kirsch L.J., Sambamurthy V., Ko, D-G, Purvis R.L. 2002. Controlling information systems development projects: The view from the client. Management Science (48:4), 484–498. Lusch R.F. & Nambisan S. 2015. Service innovation: A service-dominant logic perspective. MIS Quarterly (39:1), 155-176. Merchant K.A. & Van der Stede W.A. 2017. Management Control Systems: Performance Measurement, Evaluation and Incentives, Pearson Education. Ouchi W.G. 1980. Markets, bureaucracies, and clans. Administrative Science Quarterly (25:1), 129– 141. Parker G., & Van Alstyne M. 2018. Innovation, openness, and platform control. Management Science (64:7), 3015–3032. S. Danani & J. L. Gogan: How Digital Market Hosts Control Sellers 221 Remus U. & Wiener, M. 2012. The amount of control in offshore software development projects, Journal of Global Information Management (20:4), 1-26. Rustagi S., King W.R., & Kirsch L.J. 2008. Predictors of formal control usage in IT outsourcing partnerships. Information Systems Research (19:2), 126–143. Shafiei Gol E., Stein M.-K. & M. Avital. 2019. Crowdwork platform governance toward organizational value creation. Journal of Strategic Information Systems. Tiwana A. 2014. Platform Ecosystems : Aligning Architecture, Governance, and Strategy. Morgan Kaufmann. Tiwana A., Konsynski B., Bush A.A. 2010. Platform evolution: Coevolution of platform architecture, governance, and environmental dynamics. Information Systems Research (21:4), 675–687. Wiener M., Mähring M., Remus U., Saunders C., Cram W.A. 2019. Moving IS project control research into the digital era: The “why” of control and the concept of control purpose. InformationSystems Research (30:4), 1387–1401. Yin R.K. 2009, Case Study Research: Design and Methods, (4th Ed). Sage Publications. Yoo Y., Boland Jr. R.J., Lyytinen K., Majchrzak A. 2012. Organizing for Innovation in the Digitized World. Organization Science, 23(5), 1398–1408. 222 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE A NOVEL COMBINED BUSINESS RECOMMENDER SYSTEM MODEL USING CUSTOMER INVESTMENT SERVICE FEEDBACK ASEFEH ASEMI & ANDREA KO Corvinus University of Budapest, Doctoral School of Business Informatics, Budapest, Hungary; e-mail: asemi.asefeh@uni-corvinus.hu, andrea.ko@uni-corvinus.hu Abstract The aim of the study was to present a new business model of an investment recommender system using customer investment service feedback based on fuzzy neural inference solutions and customized investment services. The model designed to support the system’s process in investment companies. The type of research was qualitative and used of exploratory study and extensive library research. The model divided into two main parts using customer investment service feedback: data analysis and decision making. In this model, seven group factors proposed to implement the model of the proposed system of investment jobs through the potential investors. Machine learning use in this process and next ANFIS, which is an implementation of the neural art community uses the establishment of fuzzy logic judgment directly forward. The system act like a system consultant, studies the investor's past behavior and recommends relevant and accurate recommendations to the user for most appropriate investment. DOI https://doi.org/10.18690/978-961-286-485-9.17 ISBN 978-961-286-485-9 Keywords: recommender system, business model innovation, investment, customer feedback, ANFIS 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 224 1 Introduction The study of customer behavior in the management of affairs is in many respects almost a new issue, in this regard, there are very few resources to study and learn about the experiences of others in the world. The importance and dimensions of paying attention to the behavior of online customers have not yet received enough attention. Recommendation systems are the tools used to supply pointers to customers based on their requirements (Kanaujia et al., 2017). This research will provide a new method for investment service customization using a recommender system based on ANFIS. We designed a novel combined recommender system framework based on a neuro-fuzzy inference system. In this way, the effective factors from customer experiences will categorize by machine learning techniques and factor analysis. Since a recommender system framework will design to provide suitable and novel customer investment service. These systems act usefully if they implement based on customer experience. The main issue in this research is what business model can be designed for a recommender system ANFIS-based, to present investment recommendations based on investor types and investment indicators? 2 Theoretical Framework In this research, the customer is the investor. The investor, as a customer, buys services or investment products from the investment company or investment consulting companies. Investor is “a person who puts money into something in order to make a profit or get an advantage” (Cambridge Dictionary, n.d.). The theoretical foundations of this research are summarized in key concepts as the following. 2.1 Investor Behavior Understanding the investor's behavior as a customer is complex in the decisionmaking process when buying a product or service. Investor behavior is the result of various cognitive processes, social interactions and social institutions, and the ability of investment firms to predict investor behavior is very important. A deep understanding of investors behavior creates more opportunities to predict and guide their behavior. The use of intelligent recommender systems is also an effective tool in predicting investor behavior. Various factors influence the analysis of investor behavior. One of these factors refers to the experience that the customer or investor A. Asemi & A. Ko: A Novel Combined Business Recommender System model Using Customer Investment Service Feedback 225 gains in using the services or product of an investment company. This experience has a significant impact on both his loyalty and attracting new investors. One of the important dimensions of customer behavior is its social nature. Although we collect data from investors about their behavior, but the influence of other investors, social institutions and social regulations governing society are also very important in these behaviors. Therefore, the investors can only be understood and examined based on their relationships with other investors and in the framework of a larger social environment. “Customer engagement behavior can serve as a useful framework for classifying and segmenting customers, based on their propensity to engage and the types of engagement behaviors they display” (van Doorn et al., 2010). Of course, investors can be either individuals or organizations. Due to the differences between these two types of investors, there is a lot in common between them. 2.2 Investor Behavior in Investment Decision Making Most investors do not act individually in decision making and consider the opinions of different people in the investment process. In families, different people may be involved in different stages of the investment decision process. The lower the investment, the smaller the number of people involved in the decision-making process. Of course, depending on the cognitive aspects of individuals and their individual characteristics, how they consult with different people in decision making is different. People who are involved in decision-making may even come from a variety of backgrounds. In a family decision, the number of people present in a decision and the type of people are usually constant. Investor behavior varies in different investment situations and in the decision-making process. This behavior includes how to decide on the type of investment, how to invest, places to invest, review of different portfolios, evaluation of services and products offered by investment companies. The decision-making method varies depending on whether the investor is involved in a new investment or needs an extension of a previous investment. In a simple investment situation, the investor needs to take a series of simple steps, but in a non-simple investment situation, he needs more information and time to ensure the investment decision. Of course, it is necessary to point out that in some investments, such as investing in cryptocurrency, it is a kind of game with money. In this regard, a large amount of information and technical and fundamental analysis is required. Slovic (1972) says the basic tenet of those in charge of helping the investor to make market decisions seems to be "the more information, 226 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE the better." Various key factors play a role in investor behavior when making investment decisions. For example, the opinion of specialists, the opinion of people who have experience in the field of investment and are experts in the field of investment. Even the opinion of people who have invested in a field for the first time can be effective in the decision-making process of other investors. Direct or indirect marketing of media and social networks in the field of investment news can have a great impact on investor behavior when making investment decisions. Executors or agents of investment in various fields and their performance are also effective in this process. Finally, it can be said that the most important and effective factor is the opinion of investors who directly use the products and services of an investment company. Awareness of the needs of investors and knowledge of the investment decision process is the basis of the success of an investment company. These companies must be able to pass the investor through various decision-making stages step by step. Including in recognizing the need, gathering information about that investment field of interest to the investor or suitable for the investor, evaluating different options, investing decisions and significant issues in investor behavior after the investment. Adequate knowledge and understanding of investment companies helps them to design effective and successful portfolios for investment. Christensen and Bower (1996) stated that “technological advances can exceed the required performance in a market, technologies that can initially only be used later in emerging markets can attack major markets and move incoming companies to victory over established companies”. It can be said that the design of investment proposing systems is one of these technical and effective advances in the investment market. 2.3 Investor experience & feedback An investor's experience as a customer is the result of the investor's interaction with the company that assists an individual or organization in investing and uses the company's products and services in the investment. This investment can be made directly by the investor or by an intermediary. The experience gained can be during and after the investment. “This interaction is made up of three parts: the customer journey, the brand touchpoints the customer interacts with, and the environments the customer experiences (including digital environment) during their experience. Good customer experience means that the individual's experience during all points of contact matches the individual's expectations. Gartner asserts the importance of A. Asemi & A. Ko: A Novel Combined Business Recommender System model Using Customer Investment Service Feedback 227 managing the customer's experience” (Verhoef, et al, 2009). Customer experience implies customer involvement at different levels – such as rational, emotional, sensorial, physical, and spiritual (Janakiraman, Meyer, & Morales, 2006). The experience of investors may be gained directly or indirectly. In direct experience, the process of interaction starts from the investor, while in indirect experience, the investor gains the experience from news media in different contexts. Even this experience can be achieved through verbal interaction with other investors. “Customer experience is created by the contribution of not only the customers' values but also by the contribution of the company providing the experience” (Gentile et al, 2007). All of the events experienced by customers before and after a purchase are part of the customer experience. What customer experience is personal and may involve sensory, emotional, rational, and physical aspects to create a memorable experience. In the retail industry, both companies and customers play a big role in creating customer experience (Andajani, 2015). The investor’s experiences can be in the form of “investor feedback”. Customer feedback exposes their degree of satisfaction and assists product, customer success, and advertising groups to recognize the place there is room for improvement. Companies can gather customer feedback proactively via polling and surveying customers, interviewing them, or asking for reviews (Customer Feedback Definition | Pendo.io Glossary). Gartner believes that "the company's customer outstanding experience greatly influences their long-term exchange behavior and reflects the true drivers of loyalty" (www.gartner.com). The investor feedback helps to measure the satisfaction of the investment company's products and services. Without investor feedback, no company can be assured of the value of the product or service it offers. The more importance is given to investor feedback, the easier it is to retain the investor and the higher the investor loyalty. It is possible to receive feedback in different ways. Depending on the different investor groups, types of services, and products, the appropriate application can be used. The method of receiving investor feedback should be commensurate with their needs and conditions and it should be at any time and in the simplest possible way with proper access. Another important issue is the proper and timely use of investor feedback in the use of products and services. The use of intelligent systems is very effective in skillful and timely analysis of investor feedback. 228 2.4 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Investment Recommender System The information system here is any kind of system where a lot of information is stored, and the information system can be equipped with Recommender Systems. “Recommender Systems (RSs) are software tools and techniques that provide suggestions for items that are most likely of interest to a particular user” (Burke, 2007), (Resnick et al., 1994), (Resnick &Varian, 1997). Liang (2008) believes that RSs are a type of DSSs that analyzes user behavior and proposes based on its results. Recommender systems are a digital solution supporting financial investments. This digital support is usually implemented by recommender systems, which gives customized offer for customers according to their needs. Figure 1 shows the relation between the basic sections of the ontology with Recommender System. As mentioned before, the information system here is any kind of system with a large amount of stored information. This information system can be equipped with recommender systems. In the recommender investment systems, this program uses the techniques and methods of the recommender system to meet the information needs of the customer in investing. In fact, a recommender system is designed for the user. Customer or investor behavior plays a key role in evaluating the recommender system. We cannot evaluate the recommender system without considering the user as a separate class. For this reason, we consider the behavior of the user (investor) of this system as the main feature of the investor in using the recommender system. Figure 1: Relation between the basic sections of the ontology with recommender system A. Asemi & A. Ko: A Novel Combined Business Recommender System model Using Customer Investment Service Feedback 229 Usually, the client or investor is looking for an answer to their information needs in investing. Seek means search, and search is what the user says when the search is done. Of course, instead of a human user, we can also consider a machine user or, in a more advanced form, an investor robot. To implement the core function of the investment recommender system, identifying useful items for the client or investor must anticipate that an item is worth the investment recommendation. To do this, the system must be able to predict the profitability of some items for investment. Even the system can compare the usefulness of some items for investment with others. Based on this comparison, the system then decides which items to recommend for investing based on the customers’ group. Various recommendation techniques are used to predict items based on the needs or preferences of the investor. 2.5 Business Model Innovation Business model innovation is the development of new, unique concepts supporting an organization's financial viability, including its mission, and the processes for bringing those concepts to fruition (Cole, 2015). In this research, we presented a novel model of investment recommender system that supports the processes of achieving the goals of investment companies in the business model. Various technologies in the application of recommender systems are important applications in presenting current business models applied in investment portfolio to investors. 3 Literature Review Paranjape-Voditel and Umesh (2013) proposed a stock market portfolio recommender machine based totally on association rule mining that analyses inventory records and suggests a ranked basket of stocks. In 2017 proposed a collaborative filtering-based recommender device for monetary analysis based on Saving, Expenditure, and Investment the usage of Apache Hadoop and Apache Mahout (Kanaujia et al.,2017). Hernández et al. (2019) evaluated the state of the art on Financial Technology for the layout of a novel recommender system. They presented a social computing platform that is proposed, based on Virtual Organizations, that allows enhancing person experience in moves that are related to the method of funding recommendation. Tejeda-Lorente et al (2019) proposed a novel recommender system, which is conscious of the risks related to unique hedge funds, considering multiple factors, such as modern-day yields, historic 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 230 performance, diversification by way of industry, etc. Tarnowska et al., (2020) presented a Recommender System for Improving Customer Loyalty. This recommender system addressed various important problems. (1) it presents a favored framework to assist managers to decide which moves are possible to have the largest influence the internet promoter rating. (2) the consequences are based totally completely definitely on multiple clients. (3) its dietary supplements ordinary textual content mining alternatives. The recommender gadget allows users to view specific, anonymous feedback related to the right clients. (4) ultimately, the computer offers a sensitivity assessment feature. 4 Research Methodology The study is exploratory research. The qualitative data collection methods applied to collect data from previous research and library studies. In this research, a novel business model for an investment recommender system proposed based on ANFIS that analyses customer data and suggested several recommendations based on customer needs. This model is different compared to existing systems because it found the correlation between potential customers' demographic/personality traits, potential customer’s investment indicators, and investment’s products and services and on this base, recommends a portfolio based on the customers’ needs. An intelligent fuzzy framework uses for generating association rules. The novel methods implement using machine learning and fuzzy logic. Thorough experimentation performs on the Portfolio dataset based on a web-based investment questionnaire. Our approach demonstrates the application of soft computing techniques like data mining, machine learning, factor analysis, and fuzzy classification in the design of recommender systems. 5 A Novel Combined Recommender System Business Model Based on the extensive study on the previous research, we propose four main steps in our investment recommender system business model. In the first step, the customer’s types clustered by an unsupervised machine learning technique based on multiple variables that are extracted from gathered data by the questionnaire. In the second step, the same variables analyze by the factor analysis method to identify customer’s investment indicators. This nomination can be based on strong features in each category. Also, the expert viewpoints can use to finalize the indicators. In A. Asemi & A. Ko: A Novel Combined Business Recommender System model Using Customer Investment Service Feedback 231 the third step, an ANFIS solution develops based on the output of the first step for predicting the customer investment type. An artificial neural community implementation, ANFIS is based totally on Takagi–Sugeno FIS at first presented by Jang (1993). It makes fuzzy logic judgment deployment extra straightforward in contrast to the normal neural network simulations as defined in (Asemi & Asemi, 2014). The input of ANFIS is a summarization of factors in the previous step and the output is scoring categories for the customer. For example, if a category gets the highest score means that the considered customer’s investment belongs to this category. In ANFIS two types of rules are contributed for prediction, i) rules which are designed based on data training and ii) rules which we design based on our analysis from customer categorization and expert viewpoints. In this model, we designed membership functions on ANFIS based on the nature of input factors and measurement scales. In the fourth step, a recommender system provides proper recommendations for the customer with a predicted type. The customers can invest based on these recommendations. Figure 2 shows the research framework. It shows how we answered the research question of the study. According to different functions, the research design divided into three phases: First Phase (Data gathering): The data-gathering phase includes the data acquisition layer and the data storage layer. Second Phase (Data analysis): The second phase includes two functions: (a) machine learning techniques (clustering and factor analysis) and (b) ANFIS. Third Phase (Decision): This phase includes the recommendation layer, and it presents information to the customer and receives their feedback. This feedback shows the probability errors, then the errors refer to the data analysis phase for correction. According to different functions, the business recommender system model structure includes these layers: 1. data acquisition layer, 2. data storage layer, 3. machine learning layer, 4. ANFIS layers (fuzzification, implication rules, normalization, defuzzification, integration, or aggregated output membership function), 5. investment recommendation and feedback layer, or application layer. All the parts of the research framework are specified as follows: 5.1 Data Acquisition Layer The purpose of this layer is to collect data from the users and find out how conscious their readers are about their finances. In the web-based investment questionnaire, they asked about the savings, spending habits, use of digital financial solutions, 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 232 communication ways, satisfaction form different financial companies, banks, & organizations, or their view of the state of the economy in the years to come, and demographic data. The data transfer to the next layer cloud data storage from this layer. This type of system recommends items based on user demographics. The basic premise of these recommender systems is to provide different recommendations for different groups of users. Many websites today offer simple and effective recommendations based on user demographic and personalized information. For example, users are referred to specific websites based on their language or country. The offers may also be customized according to the age of the user. While these approaches have been quite common in the marketing, relatively little recommender systems research has been done on demographic based recommender systems. 5.2 Data Storage Layer The data storage layer stores all the data of users in the company’s private server. The data storage layer adopts a set of different data processing formats so that it can focus on data storage. The investment data reformat in this layer and transfer to the machine learning layer. The customer/user’s data analyse based on the attributes. The data classified based on the demographic and personality traits in this section. 5.3 Machine Learning Layer Clustering and Factor Analysis is the most important part of this layer, which performs data analysis through data mining and machine learning algorithms. This layer takes data from the data storage layer and transfers classified factors to the ANFIS layer. The data entered the machine learning layer after data collection and integration into the storage space for data analysis. In the proposed layer, the attributes classification used to automatically classify the customer types and to identify customer investment indicators. A. Asemi & A. Ko: A Novel Combined Business Recommender System model Using Customer Investment Service Feedback 233 Figure 2: A Novel Business Recommender System Model Using Customer Investment Service Feedback There are two basic functions in this layer included clustering and the factor analysis for the variables from the previous layer. We clustered due7 to its wide range of features and the ability to compare output in different ways, good guide, efficient graphical interface, compatibility with Windows, and having a comprehensive reference. For the factor analysis the system uses Python. The next function of this layer uses the exploratory factor analysis to indicate customer investment indicators. In this method, the researcher tries to discover the infrastructural structure of a relatively large set of variables. At this stage, there is no initial theory. The researcher must identify and discover the factors involved in the customer's investment that may be hidden. This method is used to summarize a set of variables and new factors 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 234 identify and introduce based on the correlation between the variables. These factors are prepared to be transferred to the next layer ANFIS for the next function. This exploratory analysis can be structuring, modelling, or hypothesizing. 5.4 ANFIS Layer In this layer, the Sugeno fuzzy model will use for the ANFIS system. This system includes five layers as the following (Asemi, et al. 2019). Layer 1: Neurons in this layer only direct the external input signals to the next layer. This layer is the first hidden layer and the fuzzy layer of the ANFIS model. Fuzzy neurons receive an input signal. Then they decide on the degree of dependence of this signal on the neural fuzzy set. Layer 2: This layer is the fuzzy rule layer and the second hidden layer. Each neuron in this layer is associated with only one fuzzy Sugeno law. Layer 3: This layer is the normalization layer and the third hidden layer. Each neuron in this layer receives and calculates signals from all neurons in the third layer. This is called normalized Firing Strength. This value determines to what extent the relevant law is valid for the inputs in the result. Layer 4: This layer is the fourth hidden layer and the diffusion layer. Each neuron in this layer is related to the corresponding normalized neuron in the fourth layer. It also receives the first input signals (x1, x2...). The defuzzied neuron in this layer calculates the weight of the result of a rule. Layer 5: This layer is called the output layer. In this output layer, the neurons of the previous stage are added together. Finally, by defuzzification, fuzzy outputs are converted to numeric outputs. There is only one neuron in this layer. The defuzzification method is the same as the Centre of Gravity. A. Asemi & A. Ko: A Novel Combined Business Recommender System model Using Customer Investment Service Feedback 5.5 235 Application Layer In this layer, the application mainly customized to customers' needs and displays recommendations based on investment company’s products and services. The application layer connected to the data analysis phase, so the end-user (customer) can access the source of investment recommendations in their investment platform using companies' applications. Applications required by the customer to use recommendations in the investment platform are in this part of the model. The system can receive the customer’s feedback in this layer and the probability errors refer to the data analysis section for detection. 6 Conclusion The research objective was to provide a new, novel business model for investment recommender systems using customer investment service feedback based on neurofuzzy inference solutions and customized for investment service. The research question was what business model can be designed for a recommender system ANFIS-based, to present investment recommendations based on investor types and investment indicators? To answer the question, a business model of an investment recommender system designed to support the investment process for the customers. Tarnowska et al., (2020) presented a Recommender System for Improving Customer Loyalty. The recommender system designed by Tejeda-Lorente et al (2019) relates to unique hedge funds that consider multiple factors, such as modern-day yields, historic performance, diversification by way of industry, etc. In the proposal of Hernandez et al. (2019), they present the functions of agents and an algorithm that improves the accuracy of the Recommender agent which oversees the Case-based reasoning system. The data corresponds to the user's characteristics, asset classes, profitability, interest rate, history stock market information, and financial news published in the media. Paranjape-Voditel and Umesh (2013) proposal was a recommender machine-based totally on association rule mining. The model presented in this research is based on the ANFIS system. This model is divided into three main parts: data collection from the investor, analysis of investor data and decision making. In the designed model, seven group factors are identified to implement the proposed investment system model through the customer or potential investor data set. These seven groups include: demographic data, personality traits, investor attitudes toward digital solutions, investor current financial status and savings, investor awareness of potential risks, and investor 236 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE financial plan information. In the proposed model, the initial data is collected through a web-based platform and transferred to the machine learning section, which is the first part of the data analysis section. In this section, customer investment criteria and types of customers are extracted. Then the types of investors are clustered and investment indicators are factor analyzed. The output obtained from this layer is transferred to the second part of the data analysis section. In the ANFIS layer, data is analyzed in six steps and investment proposals are extracted for each investor cluster. These suggestions are presented to the customer in the application layer using designed applications. Investor feedback is also received to improve and develop the system at this layer. The objective of this business recommender system model is to support the investment companies, individual investors, and fund managers in their decisions by suggesting the investment products and services based on the customers' needs, experiences, and traits. References Andajani, E. (2015). "Understanding Customer Experience Management in Retailing". Procedia - Social and Behavioral Sciences. 2nd Global Conference on Business and Social Sciences (GCBSS2015) on "Multidisciplinary Perspectives on Management and Society", 17–18 September 2015, Bali, Indonesia. 211: 629–633. https://doi.10.1016/j.sbspro.2015.11.082 Asemi, A. & Asemi, A. (2014) Intelligent MCDM method for supplier selection under fuzzy environment. Int J Inf Sci Manag (IJISM) 12(2):33–40. Asemi, A., Salim, S.S.B., Shahamiri, S.R., Asemi, A., & Houshangi, N. (2019). Adaptive neuro-fuzzy inference system for evaluating dysarthric automatic speech recognition (ASR) systems: a case study on MVML-based ASR. Soft Computing. 23, 3529–3544. https://doi.org/10.1007/s00500-018-3013-4 Burke, R. (2007). Hybrid web recommender systems. In: The Adaptive Web, pp. 377–408. Springer Berlin / Heidelberg Christensen, C. M., & Bower, J. L. (1996). Customer Power, Strategic Investment, and the Failure of Leading Firms. Strategic Management Journal, 17(3), 197–218. https://doi.org/10.1002/(SICI)1097-0266(199603)17:3<197::AID-SMJ804>3.0.CO;2-U Cole, B. (2015). What is business model innovation?. Definition from WhatIs.com. SearchCIO. Retrieved March 06, 2021, from https://searchcio.techtarget.com/definition/business-modelinnovation Customer Feedback Definition | Pendo.io Glossary. (n.d.). Pendo.Io. Retrieved April 20, 2020, from https://www.pendo.io/glossary/customer-feedback/ Gartner Says Marketers Must Focus on Helping Customers in Order to Remain Competitive Today. (n.d.). Gartner. Retrieved April 20, 2020, from https://www.gartner.com/en/newsroom/press-releases/2019-04-29-gartner-says-marketersmust-focus-on-helping-customer Gentile, Ch, Spiller, N., & Noci, G. (2007). "How to Sustain the Customer Experience: An Overview of Experience Components that Co-create Value with the Customer". European Management Journal. 25 (5): 395–410. https://doi.10.1016/j.emj.2007.08.005 A. Asemi & A. Ko: A Novel Combined Business Recommender System model Using Customer Investment Service Feedback 237 Guarino N. (1995). Formal Ontology, Conceptual Analysis and Knowledge Representation: The Role of Formal Ontology in the Information Technology, International Journal of HumanComputer Studies, Vol. 43, Nos. 5/6, pp. 625-640. Hernández, E., Sittón, I., Rodríguez, S., Gil, A. B., & García, R. J. (2019). An Investment Recommender Multi-Agent System in Financial Technology. In M. Graña, J. M. López-Guede, O. Etxaniz, Á. Herrero, J. A. Sáez, H. Quintián, & E. Corchado (Eds.), International Joint Conference SOCO’18-CISIS’18-ICEUTE’18 (Vol. 771, pp. 3–10). Springer International Publishing. https://doi.org/10.1007/978-3-319-94120-2_1 Holzman, Ph.S. (2020). Personality. Encyclopædia Britannica, Encyclopædia Britannica, Inc. February 24, Available at https://www.britannica.com/topic/personality, Access Date: April 12, 2020 Investment service—FCA Handbook. (n.d.). Retrieved April 20, 2020, from https://www.handbook.fca.org.uk/handbook/glossary/G603.html Investment. (2020). In Wikipedia. https://en.wikipedia.org/w/index.php?title=Investment&oldid=951351513 Investor. (n.d.). Retrieved February 25, 2021, from https://dictionary.cambridge.org/dictionary/english/investor Jang, J.R. (1993). "ANFIS: adaptive-network-based fuzzy inference system". IEEE Transactions on Systems, Man and Cybernetics. 23 (3): 665–685. https://doi.10.1109/21.256541 Janakiraman, N., Meyer, R.J., Morales, A.C. (2006). "Spillover Effects: How Consumers Respond to Unexpected Changes in Price and Quality". Journal of Consumer Research. 33 (3): 361–369. https://doi.10.1086/508440. ISSN 0093-5301 Kanaujia, P. K. M., Manjusha, P., & Siddharth, S. R. (2017). A Framework for Development of Recommender System for Financial Data Analysis. International Journal of Information Engineering & Electronic Business, 9 (5),18-27. Liang, T.P. (2008). Recommendation systems for decision support: An editorial introduction. Decision Support Systems. 45 (3). 385-386. https://doi.org/10.1016/j.dss.2007.05.003. Resnick, P., Iacovou, N., Suchak, M., Bergstrom, P., Riedl, J.: Grouplens (1994). An open architecture for collaborative filtering of netnews. In: Proceedings ACM Conference on ComputerSupported Cooperative Work, pp. 175–186 Resnick, P., Varian, H.R. (1997). Recommender systems. Communications of the ACM 40(3), 56–58 Sarkar, D., Bali, R., Sharma, T. (2018) Machine Learning Basics. In: Practical Machine Learning with Python. Apress, Berkeley, CA. Available at: https://doi.org/10.1007/978-1-4842-3207-14 Slovic, P. (1972). Psychological Study of Human Judgment: Implications for Investment Decision Making. The Journal of Finance, 27(4), 779–799. https://doi.org/10.2307/2978668 Tejeda-Lorente, Á., Bernabé-Moreno, J., Herce-Zelaya, J., Porcel, C., & Herrera-Viedma, E. (2019). A risk-aware fuzzy linguistic knowledge-based recommender system for hedge funds. Procedia Computer Science, 162, 916. van Doorn, J., Lemon, K. N., Mittal, V., Nass, S., Pick, D., Pirner, P., & Verhoef, P. C. (2010). Customer Engagement Behavior: Theoretical Foundations and Research Directions. Journal of Service Research, 13(3), 253–266. https://doi.org/10.1177/1094670510375599 Verhoef, P.C.; Lemon, K.N., Parasuraman, A.; Roggeveen, A., Tsiros, M., Schlesinger, L.A. (2009). "Customer Experience Creation: Determinants, Dynamics and Management Strategies". Journal of Retailing. Enhancing the Retail Customer Experience. 85 (1): 31–41. https://doi.10.1016/j.jretai.2008.11.001 238 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE SOLOPRENEUR DIGITAL ECOSYSTEMS: GENESIS, LINEAGE AND PRELIMINARY CATEGORIZATION GABRIELE PICCOLI,1 BIAGIO PALESE2 & JOAQUIN RODRIGUEZ3 1 Louisiana State University and University of Pavia, Business Education Complex, Baton Rouge, Los Angeles 70803, United States of America; e-mail: gpiccoli@cct.lsu.edu 2 Northern Illinois University, College of Business, DeKalb, Illinois 60115, United States of America; e-mail: bpalese@niu.edu 3 Grenoble Ecole de Management, 12 rue Pierre Sémard, 38000 Grenoble, France; e-mail: joaquin.rodriguez@grenoble-em.com Abstract This paper traces the genesis and lineage of solopreneur digital ecosystems. These ecosystems, fostered by a digital environment that is infrastructural, combinatorial and servitized, are enabling the rise to prominence of the solopreneur. We theorize solopreneur digital ecosystems as the latest incarnation of systems beyond firm control, with digital platforms and digital marketplaces as their principal enablers. In an effort to compare them from the perspective of the solopreneur, we categorize solopreneur digital ecosystems on three dimensions: algorithmic control, commoditization, and lock-in. Our work contributes a framework that solopreneurs can use to identify ecosystems in which they can optimally invest their talents and scarce resources. We discuss the findings of this mapping and draw implications for research and practice. DOI https://doi.org/10.18690/978-961-286-485-9.18 ISBN 978-961-286-485-9 Keywords: digital ecosystems, solopreneur, digita resources, creato economy, gig economy 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 240 1 Introduction The prediction that “by reducing the costs of coordination, information technology will lead to an overall shift toward proportionately more use of markets-rather than hierarchies-to coordinate economic activity” (Malone et al 1987 p. 484) has proven true. What the prediction did not foreshadow, however, was that such markets would also be digital. As software continues to “eat the world” (Andreessen 2011), digital ecosystems have dramatically impacted business strategies and society more generally. One such impact is on individual’s revenue generating activities and the growing opportunity to unbundle work from employment. As automation and machine learning advancements threaten a larger swath of traditional jobs (Manyika et al 2017), there is an unprecedented opportunity for human talent to be unleashed in digital ecosystems that enable demand and offer matching at a never-before-seen scale (Jin 2020). According to the Oxford Dictionary, a solopreneur is »a person who sets up and runs a business on their own«. Solopreneurs, of course, are not a novelty of the digital age. But interest in solopreneurship has grown noticeably in the last two decades 1 due to the rise of what we call solopreneur digital ecosystems (SDE). SDEs promise to simplify access to (self-)employment, particularly in disadvantaged or marginalized communities, by providing digital tools enabling solopreneurs to organize their work and overcome some of the barriers to employment they usually face (Dillahunt and Malone 2015). However, selection of a SDE is a critical early decision by solopreneurs seeking to maximize the return on their invested time and talents. This article takes the solopreneur perspective, investigating how digital enablers of different SDEs affect solopreneurs’ strategic options. It contributes to a cohesive research agenda centered on SDE by providing an early categorization of their digital enablers and a framework to evaluate competing SDE. It also draws implications for research and practice based on the categorization of the ecosystems. 1 The term did not appear until 1996, according to the Google Books ngram viewer, and grew more than 63-fold between its advent and 2019. G. Piccoli, B. Palese &J. Rodriguez: Solopreneur Digital Ecosystems: Genesis, Lineage and Preliminary Categorization 2 241 Theoretical foundations Before the advent of the Internet, organizational information systems were fully controlled by the firm that built, purchased or commissioned them to an outsourcer to operate on the firm’s behalf. But the internet and the services built on top of it ushered in an era of systems beyond firm control. Systems beyond firm control are information systems neither designed nor commissioned by a firm that the organization must use to compete (Palese and Piccoli 2018). They are socio-technical arrangements that enable transactions and value exchanges. Online review systems, a prototypical example, have transformed how travelers search and share information. Their features and functionalities are not designed or controlled by travel companies, yet hoteliers, restaurateurs, and other travel operators cannot ignore dominant ones (e.g., TripAdvisor, Booking). Systems beyond firm control are ecosystems: groups of interacting and interdependent entities and their environments. SDEs are a special kind of ecosystem in which the bulk of participants are solopreneurs serving end-consumers in an infrastructural, combinatorial and servitized environment that provides digital enablers (Piccoli et al 2020). Those digital enablers are digital platforms and digital marketplaces that allow the solopreneurs to organize and commercialize their work without formally joining a company in a traditional employment working arrangement. Digital enablers are the novel instruments solopreneurs use to create their products/services and/or the organizational processes to manage and run a business operation independently. The definition of SDE advanced here is broad enough to encompass gig economy workers (e.g., Uber), social media influencers (e.g., Instagram) and digital creators (e.g., Twitch). It is in line with recent research that identifies “platform ecosystems” as “semi-regulated marketplaces that foster entrepreneurial action under the coordination and direction of the platform sponsor, or as multisided markets enabling transactions among distinct groups of users” (Jacobides et al 2018 p. 2258). To categorize the variety of SDE, it is important to recognize the characteristics of the digital enablers that make them possible. To the best of our knowledge, the literature lacks such categorization, which makes it difficult to evaluate the inevitable trade-offs between competing SDEs and offer reliable guidance for maximizing 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 242 cospecialized investments in competing ecosystems. We introduce and define the major categories of digital enablers that shape modern SDE. 2.1 Digital Marketplaces Digital marketplaces are the digital spaces in which buyers and sellers “exchange product information, coordinate, and transact” (Pavlou and Gefen 2004 p. 40). They exercise control over the products and services listed by sellers (Eaton et al 2015). Thus, digital marketplaces differentiate themselves by exercising control over the type, characteristics, number, and quality of products and services offered by sellers. They enable trust between buyers and sellers by guaranteeing levels of customer protection (e.g., refunds), reliable payment transfers (e.g., escrow services), and mechanisms to ensure that transactions are based on accurate and reliable information (e.g., ratings) (Pavlou and Gefen 2004. Finally, they facilitate discovery of products and services by customers (Li et al 2018). Digital marketplaces with a significant number of suppliers incur high search costs and seek to reduce costs by implementing tools that enable customers to easily find products and services of interest. 2.2 Digital Platforms In line with recent literature, we define digital platforms as evolving sociotechnical systems with modular design architecture that expose digital resources module designers use to produce innovations (Constantinides et al 2018). We define digital resources as a specific class of digital objects (Faulkner and Runde 2019) that a) are modular; b) encapsulate objects of value, namely specific assets and/or capabilities; c) and are accessible by way of a programmatic bitstring interface (Piccoli et al 2020). By specifying a modular architecture and exposing digital resources, digital platforms enable the creation of new modules (i.e., complementors) that extend their functionality. More importantly, they offer combinatorial and servitized resources solopreneurs can leverage to build innovative products and services (i.e., vertical platforms) and devise new business models (i.e., horizontal platforms). Depending on their architecture, characteristics, and variety of digital resources exposed, digital platforms engender different levels of generativity (Zittrain 2006). For example, a highly generative platform like Roblox enables solopreneurs to create an infinite variety of games and applications for the Roblox “metaverse.” On the other end of G. Piccoli, B. Palese &J. Rodriguez: Solopreneur Digital Ecosystems: Genesis, Lineage and Preliminary Categorization 243 the spectrum (i.e., the extensibility of the platform is zero), the platform becomes a tool. For example, Substack provides a number of resources for solopreneurs in newsletter and podcasting spaces. These individuals can create products (e.g., a newsletter) and run businesses (e.g., manage mailing lists, collect payment) by configuring/using instruments made available by Substack. However, Substack does not expose interfaces that enable complementors to contribute new modules or enable solopreneurs to extend the functionality of existing modules. 2.3 Integrated Platforms and Marketplaces While early research treated platforms and marketplaces as interchangeable constructs (Rochet and Tirole, 2003), more recent work has articulated the difference between the two (Benlian et al 2015). An increasing number of organizations purposefully integrate and simultaneously manage a digital platform and a digital marketplace (Ghazawneh and Henfridsson 2015). By doing so they concurrently control marketplace and platform functionalities. The integration of the two yields unprecedented power through the simultaneous control of the products/services (via platform ownership) and distribution and monetization channel (via marketplace ownership). In this type of SDE, solopreneurs are required to abide by both a prespecified product or business architecture and marketplace governance rules enforced by the owner of digital enablers at the center of the ecosystem. Examples include ecosystems anchored by such firms as Amazon in retail, Spotify in podcasting, or Deliveroo in food delivery. They represent the latest examples in the evolution of systems beyond firm control. 3 Solopreneur digital ecosystems as algorithmic economies Solopreneur digital ecosystems are characterized by resources made available by digital platform and digital marketplace owners. Those resources enable transactions between solopreneurs and consumers as well as creation of solopreneurs’ products or services. Thus, SDEs become “algorithmic economies” in which decision-making coordination and control functions are embedded in the ecosystem’s digital enablers’ algorithms (Möhlmann et al 2020). Consider, for example, product visibility in physical retail. It is characterized by limited shelf space, managed through ad hoc contractual agreements, and has stable underlying performance drivers. Conversely, digital shelves in a digital marketplace are theoretically unlimited, and product 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 244 visibility is determined by evolving algorithms that operate in real time and are often proprietary and inscrutable. This distinctive characteristic of algorithmic economies represents an added layer of complexity solopreneurs need to manage when joining a digital ecosystem. 4 Preliminary classification dimensions Keeping with our focus on investigating how the digital enablers of different SDEs affect solopreneurs’ strategic options, we advance a preliminary categorization of SDEs based on analysis of the primary digital enablers of each ecosystem. These enablers expose digital, IT and complementary resources (Piccoli and Ives 2005, Piccoli et al 2020) supporting solopreneurs in the development and/or commercialization of their innovations (i.e., products and services). Solopreneurs in turn orchestrate a purposefully arranged set of resources in pursuit of their goals. Such goals are typically commercial, measured in revenue and profits, but can also be personal (e.g., self-actualization, validation). The focus on solopreneurs as the primary beneficiaries of our work requires a categorization that, while concentrating on digital enablers as the unit of analysis, is designed to be practical for solopreneurs deciding in which ecosystems to optimally invest their talents and scarce resources. Specifically, we adopt the following three dimensions:   Algorithmic control. This dimension captures the automatic enforcement of control mechanisms through algorithms implemented in software programs (Möhlmann et al 2020). It determines the degrees of freedom solopreneurs can exert as they operate within the ecosystem. It includes control over the product or service specifications (e.g., Uber’s eligibility for Uber Black as a rating above 4.85), control over the manner in which work is organized (e.g., Uber's expectation that riders accept a ride withing 15-30 seconds), and control over the solopreneur's relationships with customers and the visibility of their offerings (e.g., Uber's algorithmic matching of riders to drivers). Commoditization. Commoditization stems from the design features adopted by digital enablers. While the fungibility of what the solopreneurs produce is an important consideration, with highly fungible solopreneur offerings being more substitutable, commoditization is a function of the resources that the enablers expose to solopreneurs and the functionalities G. Piccoli, B. Palese &J. Rodriguez: Solopreneur Digital Ecosystems: Genesis, Lineage and Preliminary Categorization  5 245 available to users. Consider the example of Instacart, the grocery delivery marketplace, and Dumpling, a competing digital platform designed to offer “everything you need to start, run, and grow your own personal shopping business.” Instacart personal shoppers are entirely fungible, since there are no features in Instacart to request a specific shopper and all interactions between the shopper and the customer are managed within the app. Conversely, Dumpling's design is geared toward enabling the shopper to develop and maintain a base of recurring customers who trust her. Over time, personal shoppers on Dumpling become non-fungible to their loyal customers. Creator lock-in. Lock-in is a function of switching costs, defined as the current value of all the tangible and intangible co-specialized investments the solopreneur has made in the ecosystem (Piccoli and Ives 2005). The higher the switching costs, the more difficult it is for solopreneurs to continue operating when migrating to a competing ecosystem. Uber drivers lose their driving history and reputation score if they migrate to a competitor (e.g., Lyft). Since history and reputation are critical input to the matching algorithm, or the ability to offer premium services (e.g., Uber Black), lockin is substantial. Conversely, while a writer migrating from Substack needs to learn how to operate her newsletter in the competing ecosystem (e.g., Revue), Substack writers own their mailing list and payment relationship with subscribers (i.e., switching costs are relatively low). However, “even when switching costs appear low, they can be critical for strategy” (Shapiro and Varian 1999, p. 108), with the critical element being “not the absolute magnitude of the cost of switching, but its size relative to the value received from the [platform resources]” (Piccoli and Ives, 2005 p. 762). Data and Results While the three dimensions are clearly related, they capture different aspects of the decision-making space solopreneurs must investigate when deciding which ecosystem to select. We screened 200 digital enablers, evaluating the Gross Merchandise Value (GMV), number of active solopreneurs and users in their ecosystems.2 We selected the top 10 by GMV, by number of users and number of 2 We used the list on Sidehustlestack (https://sidehustlestack.co/) as the starting point of our selection. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 246 solopreneurs. We classified the resulting 30 distinct SDEs3 by type of primary digital enabler (i.e., digital platforms, marketplaces and integrated platforms and marketplaces) and rated them on a scale from 1 (lowest) to 5 (highest) for algorithmic control, commoditization and lock-in.4 The top 30 solopreneur digital ecosystems are anchored by 4 digital platforms, 14 digital marketplaces and 12 integrated platforms and marketplaces. We detected significant variability across the three dimensions of algorithmic control, commoditization and lock-in (Table ). Table 1: Descriptive Statistics by Digital Enabler category Number Algorithmic control (mean) Algorithmic control (sd) Commoditization (mean) Commoditization (sd) Lock-in(mean) Lock-in(sd) Digital Platforms 4 2.25 Marketplaces 14 2.64 Integrated Platforms and Marketplaces 12 2.83 0.50 1.08 0.84 2.25 3.29 3.17 0.50 0.83 1.19 2.75 0.50 3.14 0.95 3.33 1.07 These results indicate that the characteristics of solopreneur digital ecosystems heavily depend on the design choices of their primary digital enablers rather than on uncontrollable or inherent characteristics of the ecosystems. In other words, the solopreneurs compete within an algorithmic economy they can perhaps influence, but certainly cannot control (i.e., a system beyond firm control). Instead control of the system rests with the firms that design, manage and own the primary digital enablers. Our results also show significant differences across the three types of digital enablers, with marketplaces and integrated platforms and marketplaces showing similar patterns, while platforms diverge. This preliminary observation may indicate some mimetic tendencies by competing digital enablers. Alternatively, it may If a platform was among the top 10 in multiple lists, we included it only once. On each list we continued selection until we classified 10 digital enablers of solopreneur digital ecosystems (e.g., Uber was top 10 in all 3 dimensions, but we included it only in the top 10 by GMV). 4 Following Krippendorff (2018) we provided a classification procedure to two independent coders (available upon request to the authors) and computed inter-rater reliability. We recorded a kappa value of 0.93. In the second stage, a third coder reviewed only the SDEs without full agreement. Those SDEs were discussed among the coders in a consolidation meeting that lead to full agreement. 3 G. Piccoli, B. Palese &J. Rodriguez: Solopreneur Digital Ecosystems: Genesis, Lineage and Preliminary Categorization 247 be that the type of digital enabler constrains, at least in part, its owner's design choices (see discussion). Table 2: GMV, users and solopreneurs statistics by ecosystems type Ecosystem type GMV (mean) Users (mean) Solopreneurs (mean) Digital Platforms 456,750,000 175,750,000 366,667 Digital Marketplaces 507,092,857 98,838,182 1,780,000 Integrated Platforms and Marketplaces 1,562,829,667 24,740,000 1,533,917 SDEs anchored by firms that integrate a platform and a marketplace in our sample have the highest average GMV (Table), about three times higher than an SDE anchored by either a digital marketplace or a digital platform. This result shows the power of integrating the two enablers, likely stemming from their ability to control resources underpinning solopreneurs' products/services and their transactions with consumers. It appears that the most successful firms that integrate both a platform and a marketplace enable superior value propositions and successfully aggregate customers demand, resulting in higher GMV. Marketplaces, be it as a standalone enabler or when integrated with a platform, attract, on average, a larger number of solopreneurs, with digital platforms only reaching a fifth of the other two types of digital enablers. This result may depend on the draw and incentives SDEs anchored by a digital marketplace create for solopreneurs. As marketplaces provide direct access to customers, it is a simple strategic decision to join – but simple may not imply advantageous (see discussion). The above argument leads to the expectation that marketplaces also dominate in number of users. The opposite is true in our sample, which suggests marketplaces only draw a subset of consumers in most markets. 5 Conversely, lacking a marketplace, digital platforms focus on providing tools to reach and serve all consumers in an addressable market. When successful, digital platforms empower solopreneurs to serve customers both directly and across marketplaces – resulting in successful digital platforms attracting twice as many customers as the average marketplace and seven times as much as the average integrated platform and Amazon, widely seen as a monopolist in the US, only controls about 35% of ecommerce transactions by value and only 6% of all retail. 5 248 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE marketplace. Charting distributions of SDEs across the three dimensions shows how most combinations are completely absent (87.2%), with 21 of the 30 observations concentrated in only 7 combinations. While the low number of ecosystems codified in this preliminary study is likely responsible for these results, the observation points to some converge toward the dominant designs. Moreover, stricter configurations (e.g., 4, 5, 5) appear viable only when the digital enabler encompasses a marketplace. 6 Discussion and Conclusions Taken together, our results suggest that while the draw of marketplaces may be inescapable, solopreneurs must be weary of their power. The limited number of digital platforms we categorized, compared to the other two types of digital enablers, suggests that control of a marketplace contributes to growth in terms of GMV and the ability to attract solopreneurs. However, digital platforms dominate in the number of users in the ecosystem. In other words, controlling a marketplace helps firms that own the primary digital enabler of a solopreneur digital ecosystem to also serve as the catalyst for supply. We speculate this feature attracts solopreneurs because it simplifies their “route to market.” However, such simplification comes at a cost, making the solopreneurs more dependent on the firm that owns critical marketplace resources since they mediate the solopreneur's ability to develop a digital relationship with customers. The above result is corroborated by the average score of each digital enabler type on algorithmic control, commoditization and lock-in. Digital enablers that include a marketplace are fairly consistent, with scores that exceed digital platforms by about 30%. We ascribe this result to the control marketplaces exert over solopreneurs' commercialization practices. Moreover, there appears to be a positive correlation between algorithmic control and commoditization, which hints at the need to standardize the signals and variables used for representing solopreneurs' creations. In other words, there may be an implicit commoditization pressure of solopreneurs' creations, even when not purposedly designed by digital enabler owners who, in search of efficiency through algorithmic control, seek to enforce standards in categorization and evaluation of offers. Solopreneurs in these digital ecosystems compete for visibility with only a limited understanding of the algorithm’s inner workings and the casual paths that govern the relationship between actions and results. The algorithms can rapidly, continuously, and comprehensively evaluate G. Piccoli, B. Palese &J. Rodriguez: Solopreneur Digital Ecosystems: Genesis, Lineage and Preliminary Categorization 249 solopreneurs’ products and services, resulting in an economy that is hypercompetitive and commoditizing toward suppliers (Möhlmann et al 2020). The above pressures are not present in digital platforms, which lack marketplace control. The search for algorithmic efficiency is focused on work processes that enable the solopreneur and result in a low commoditization score. Digital platforms may inherently spur differentiation and innovation in product/service and business model/operations. We are convinced that design choices by the digital enabler owners are critical; however, preliminary results point to structural differences between the types of enablers. We summarize our analysis in the following 2x2 matrix, mapping the depth and breadth of commercialization services and of product and/or operations support digital enablers provide (Figure). Figure 2: Dimensions of Digital Enablement in Solopreneur Digital Ecosystems Source: authors The matrix captures the type of analysis our work offers to solopreneurs seeking to strategically invest their talents and scarce resources. On the one hand, deeper support generally speeds up product/service creation, market access and transaction completion. But when leveraging a wider array of digital resources offered by the enablers, the solopreneur must carefully analyze the design to evaluate the resulting degree of algorithmic control, commoditization and lock-in. As an illustration, we mapped the 10 most representative SDE in our sample. We hope that, despite its 250 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE limitations, our preliminary work will inspire future research focused on helping the emerging middle class of solopreneurs (Jin 2020) to take advantage of the increasing opportunities to unbundle work from employment in solopreneur digital ecosystems. References Andreessen, M. (2011). “Why Software Is Eating the World,” Wall Street Journal. (https://www.wsj.com/articles/SB10001424053111903480904576512250915629460, accessed July 15, 2018). Benlian, A., Hilkert, D., & Hess, T. (2015). How open is this Platform? The Meaning and Measurement of Platform Openness from the Complementers’ Perspective. Journal of Information Technology, 30(3), 209–228. https://doi.org/10.1057/jit.2015.6 Constantinides, P., Henfridsson, O., and Parker, G. G. (2018). Platforms and Infrastructures in the Digital Age, Information Systems Research (29:2), pp. 381–400. (https://doi.org/10.1287/isre.2018.0794). Dillahunt, T. R., and Malone, A. R. 2015. “The Promise of the Sharing Economy among Disadvantaged Communities,” in Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI ’15, New York, NY, USA: Association for Computing Machinery, April 18, pp. 2285– 2294. Eaton, B., Elaluf-Calderwood, S., and Sorensen, C. (2015). “Distributed Tuning of Boundary Resources: The Case of Apple’s IOS Service System,” MIS Quarterly (39:1), 217+ Faulkner, P., and Runde, J. (2019). Theorizing the Digital Object, MIS Quarterly (43:4). Jacobides, M. G., Cennamo, C., and Gawer, A. (2018). “Towards a Theory of Ecosystems,” Strategic Management Journal (39:8), pp. 2255–2276. (https://doi.org/10.1002/smj.2904). Jin, L. (2020) The Creator Economy Needs a Middle Class. Harvard Business Review. Jin, L. (2020) Unbundling Work from Employment. Substack. Available at: https://li.substack.com/p/unbundling-work-from-employment Li, L., Chen, J., & Raghunathan, S. (2018). Recommender system rethink: Implications for an electronic marketplace with competing manufacturers. Information Systems Research, 29(4), 1003-1023. Malone, T., Yates, J., and Benjamin, R. (1987). Electronic markets and electronic hierarchies. Communications of the ACM 30 (6), 484-497 Manyika, J., Chui, M., Miremadi, M., Bughin, J., George, K., Willmott, P., Dewhurst, M. (2017). A future that works: Automation, employment, and productivity. Mckinsey. Available at: https://www.mckinsey.com/~/media/McKinsey/Featured%20Insights/Digital%20Disrupti on/Harnessing%20automation%20for%20a%20future%20that%20works/MGI-A-futurethat-works_Full-report.pdf Möhlmann, M., Zalmanson, L., Henfridsson, O., & Gregory, R. W. (2020). Algorithmic management of work on online labor platforms: when matching meets control. MIS Quarterly: Management Information Systems, 1-54. Palese, B., and Piccoli, G. (2018). Effective Use of Systems Beyond the Firm’s Control: The Case of Online Review Systems, In Proceedings of the 39th International Conference of Information Systems, San Francisco, USA Pavlou, P. and Gefen, D. (2004.) Building effective online marketplaces with institution-based trust Information Systems Research, 15 (1) (2004), pp. 35-62 Piccoli, G., and Ives, B. (2005). II-Dependent Strategic Initiatives and Sustained Competitive Advantage: A Review and Synthesis of the Literature, MIS Quarterly (29:4), pp. 747–776. G. Piccoli, B. Palese &J. Rodriguez: Solopreneur Digital Ecosystems: Genesis, Lineage and Preliminary Categorization 251 Piccoli, G., Rodriguez, J, and Grover, V. (2020) Strategic Initiatives and Digital Resources: Construct Definition and Future Research Directions. , In Proceedings of the 41st International Conference of Information Systems, India Rodriguez, Joaquin, and Gabriele Piccoli. "Competing within Aggregators: Competitive Moves in the Deliveroo Online Delivery Platform." (2020). Rochet JC, Tirole J (2003) Platform competition in two-sided markets. Journal of the European Economic Association 1(4):990–1029 Shapiro, C., and Varian, H. R. (1999). The art of standards wars. California management review, 41(2), 8-32. Tapscott, D. (2001). Rethinking strategy in a networked world [or why Michael Porter is wrong about the internet]. strategy and business, 34-41. Zittrain, J. (2006). The Generative Internet. Harvard Law Review, Vol. 119, p. 1974, Available at SSRN: https://ssrn.com/abstract=847124 252 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE DEMOGRAPHIC DIFFERENCES IN THE EFFECTIVENESS OF A PHYSICAL ACTIVITY APPLICATION TO PROMOTE PHYSICAL ACTIVITY: STUDY AMONG AGED PEOPLE TUOMAS KARI,1 MARKUS MAKKONEN1 & LAURI FRANK2 1 Institute for Advanced Management Systems Research, Turku, Finland, 2University of Jyvaskyla, Jyvaskyla, Finland; e-mail: tuomas.t.kari@jyu.fi, markus.v.makkonen@jyu.fi 2 University of Jyvaskyla, Faculty of Information Technology, Jyvaskyla, Finland; e-mail: lauri.frank@jyu.fi Abstract The global population is ageing and simultaneously the life expectancy at older ages is improving. To support healthy and active aging, it is imperative to find solutions to support physical activity (PA) in older age. Digital wellness technologies are a potential solution, but in order for such technologies to be successful, research is needed to gain a better understanding on their use and effectiveness among aged people. To address this need, this study investigated the effectiveness of a physical activity application to promote PA behavior among aged people of different demographics (gender, age, education, marital status). PA levels were measured before taking the application into use and after 12 months of use. The results suggest that a physical activity application can be effective in promoting PA behavior among aged people as there was a notable and a statistically significant increase in walking and total PA levels between baseline and 12-month follow-up. Regarding the demographic differences, there were very few differences in the changes in PA levels between different demographics, suggesting the effectiveness is not subject to the demographic background of the user. DOI https://doi.org/10.18690/978-961-286-485-9.19 ISBN 978-961-286-485-9 Keywords: digital wellness, wellness technology, mobile wellness application, mobile application, physical activity, aged people, young elderly, IPAQ-E, follow-up study, physical activity application 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 254 1 Introduction The global population is ageing and practically all countries are experiencing growth in the proportion of their older population. Globally, the number of people aged over 65 years is projected to double by 2050, and at the same time, the life expectancy at older ages is improving (United Nations 2019). This makes healthcare and policy makers concerned, and it is imperative to find more solutions to support PA in older age. PA has significant health benefits and contributes to the prevention of noncommunicable diseases across all age groups, but also aids in upkeeping the ability to function when a person gets older and is vital to ward off frailty and age-related illness (Hoogendijk et al. 2019). The World Health Organization (WHO) as well as several national health institutes provide research-based PA guidelines. Yet, insufficient PA is a major global problem across all age groups (WHO 2020). For example, the WHO (2020) recommends that people aged 65 years and older should do at least 150–300 minutes of moderate PA or at least 75–150 minutes of vigorous PA per week, or an equivalent combination. Balance and muscle-strength exercises should also be conducted regularly. Additional health benefits can be reached with more PA. In Finland, where our study was conducted, only around one fourth of the people aged 60 years and older meet these guidelines (THL 2019). Thus, innovative solutions to promote PA among aged people are urgently needed. Digital wellness technologies, that is, “digital technologies that can be used to support different aspects of wellness” (Kari et al. 2021), represent a potential solution. There are various PA devices, applications, and services, the use of which has become increasingly common for diverse types of users with different PA levels (Kettunen et al. 2017; Moilanen et al. 2014). Their potential to promote PA behaviors among aged people has been suggested, but more research on their effectiveness is called for (e.g., Carlsson & Walden 2017; Larsen et al. 2019; Seifert et al. 2018). To address this, our study investigates the following research question: How effectively can a physical activity application promote PA behavior among aged people of different demographics? For PA, we follow the definitions by WHO (2020). The investigated demographics are gender, age, education, and marital status. By addressing this, we contribute to the IS stream of research on the ability of digital wellness technologies to influence behavior change and also provide insights on how they could support changes in PA behavior among aged people. The study is part of an ongoing research program in which aged people participants take into use a mobile physical activity application. T. Kari, M. Makkonen & L. Frank: Demographic Differences in the Effectiveness of a Physical Activity Application to Promote Physical Activity: Study Among Aged People 2 255 Digital Wellness Technologies Among Aged People A key reason for using digital wellness technologies and physical activity applications is often the expected positive effects on PA behavior and health. When using digital wellness technologies, the users are receptive to potential changes in their PA behavior. As Oinas-Kukkonen (2013, p. 1225) notes, “information technology always influences people’s attitudes and behaviors in one way or another”, either intendedly or unintendedly. There is a plethora of information systems that can be used to persuade (either positive or negative) behavior changes (Oinas-Kukkonen 2013). Such systems are often discussed in the literature using the terms persuasive systems (e.g., Oduor & Oinas-Kukkonen 2021) or persuasive technology (e.g., Fogg 2003). On this line, Oinas-Kukkonen (2013) presented the concept of behavior change support system (BCSS), defined as “a socio-technical information system with psychological and behavioral outcomes designed to form, alter or reinforce attitudes, behaviors or an act of complying without using coercion or deception”. Digital wellness technologies (e.g., physical activity applications) can act as BCSSs in several ways, as by using such technologies, the users are exposed to different user experiences that can act as drivers for future PA behaviors (e.g., Kari et al. 2016a; Karppinen et al. 2016). Hence, using such technologies can potentially change and support PA behaviors in various ways. For example, digital wellness technologies can be used to increase PA levels (e.g., Larsen et al. 2019; Romeo et al. 2019), and to reduce sedentary behaviors (e.g., Stephenson et al. 2017). They can support goalsetting (e.g., Gordon et al. 2019; Kirwan et al. 2013), and some advanced products also include digital coaching features (e.g., Kari & Rinne 2018; Kettunen et al. 2020; Schmidt et al. 2015). Features for social support are another benefit (e.g., Sullivan & Lachman 2017). They can also make PA more compelling via gamification (Kari et al. 2016b; Koivisto & Hamari 2019) or exergaming (e.g., Kari 2014; Kari et al. 2019; Loos & Zonneweld 2016). Moreover, digital wellness technologies can provide different feedback, which can increase the user’s awareness of PA and motivate to improve related behavior (e.g., Wang et al. 2016). However, the “learning-effect” resulting from the increased awareness may also lead to use discontinuance (Kari et al. 2017, p. 285). One should also note that sometimes users face negative and harmful experiences with these technologies (Rockmann 2019). The perceived compatibility is also important (Makkonen et al. 2012). 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 256 Digital wellness technologies have been found promising in terms of promoting wellness and PA behavior among aged people, however, questions have been posed regarding their effectiveness. In studies focusing on aged people, Changizi and Kaveh (2017) found that mobile health solutions can improve PA, self-management, and self-efficacy among other things. Muellmann et al. (2018) found interventions utilizing eHealth solutions to be effective in promoting PA at least on short-term. Similarly, Yerrakalva et al. (2019) found that mobile health application-based interventions are potential in promoting PA and reducing sedentary time on short term. Larsen et al. (2019) found low-quality evidence for a moderate effect of physical activity monitor-based interventions on PA. Stockwell et al. (2019) found that digital behavior change interventions may increase PA and ability to function. A common conclusion in these studies is that more high-quality studies are required. 3 Methodology To investigate how effectively can a physical activity application promote PA behavior among aged people of different demographics (gender, age, education, marital status), we examined the changes in PA levels between baseline (before taking the application into use) and follow-up (after 12 months of use). Thus, the participants of this study consist of those partaking in the research program and using the application for a whole 12 months or longer. 3.1 The Physical Activity Application Used in the Study The application was developed for the target group in the ongoing research program. The application operates on the Wellmo application platform (Wellmo 2019), where its features constitute their own entity. Wellmo supports iOS and Android operating systems. The central features are related to tracking PA, including for example, logging conducted PA and following it through weekly, monthly, and yearly reports. User can also import data from external PA services supported by Wellmo platform. T. Kari, M. Makkonen & L. Frank: Demographic Differences in the Effectiveness of a Physical Activity Application to Promote Physical Activity: Study Among Aged People 3.2 257 Research Setting, Data Collection, and Analysis The first field groups in the research program started in June 2019, after which new groups have started continuously. The study was conducted in Finland, and the field groups (i.e., participants) were recruited via the Finnish pensioners’ associations. No limits beyond age were set for partaking, meaning that the baseline PA level could be anything from very low to very high. Each field group was assigned a field researcher who guided the participants in taking the application into use and using it. The participants used the application in daily life and conducted PA according to their own preferences, meaning they were not provided with any specific PA programs to follow or goals to reach out for, but instead could freely conduct PA how and when they preferred. The application and its use were free of charge for the participants, but they were required to have their own smartphone. The data on PA levels were collected with surveys and measured as a self-report by using the IPAQ-E (Hurtig-Wennlöf et al. 2010). The IPAQ-E is a modified version of the short-format IPAQ (Craig et al. 2003; Ekelund et al. 2006), and it has been culturally adapted and validated for the elderly (Hurtig-Wennlöf et al. 2010). The IPAQ and IPAQ-E are designed to provide a set of well-developed instruments that can be used to obtain comparable estimates of PA (IPAQ group 2005a). The IPAQ is the most widely used and validated PA questionnaire (Lee et al. 2011; van Poppel et al. 2010). The IPAQ-E focuses on collecting self-reported PA data on sitting time, walking, moderate PA, and vigorous PA from the period of last seven days. For this study, the IPAQ-E questionnaire was translated from Swedish to Finnish following the wording of the Finnish short-format IPAQ. As there were Finnish and Swedish (both are official languages in Finland) speaking participants, both language versions were used. The baseline data was collected with printed questionnaires in organized meetings. The participants were given oral and written instructions on answering. The follow-up data was collected with an online questionnaire, each participant receiving a survey invitation link via email. The local ethical committee was contacted before the start of the research program deeming that no separate approval was needed for this study. All participants gave a written informed consent. 258 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Before the analysis, the Guidelines for the data processing and analysis of the International Physical Activity Questionnaire (IPAQ group, 2005b) and the guidelines presented by Hurtig-Wennlöf et al. (2010) were followed. First, before the analysis, the standard methods for the cleaning and treatment of IPAQ datasets were conducted (IPAQ group 2005b, p. 10-11). Second, the results are presented in median minutes per week rather than means, together with the interquartile ranges (25th–75th percentile) (IPAQ group 2005b); and as advised by Hurtig-Wennlöf et al. (2010, p. 1853), the results are presented in time in minutes spent in different intensities instead of converting into metabolic equivalent of task values (MET) and MET-minutes, except for the total PA which is presented in MET-min per week. Total PA was calculated using the formula: 3.3*walking min + 4.0*moderate min + 8.0*vigorous min (IPAQ group 2005b). However, as Hurtig-Wennlöf et al. (2010) note, the used weighting factors correspond to activity-specific MET values in adults and might not be appropriate for older people (e.g., moderate intensity level in the elderly is likely lower than the same intensity level in younger adults). Yet, they assumedly “can still reflect the proportions of PA intensities and are therefore useful for ranking participants with regard to PA” (Hurtig-Wennlöf et al. 2010, p. 1853). The analysis was conducted with the IBM SPSS Statistics 26 software. The changes in sitting and different types of PA behavior (walking, moderate, vigorous) as well as total PA were analyzed by comparing the PA levels between the baseline and the follow-up. The statistical significance of the overall changes in PA levels were analyzed with the Wilcoxon signed-rank test (Wilcoxon, 1945) as the focus was on medians. For our particular interest in the differences in changes between different demographics, we conducted two different analyses: 1) we compared the differences in changes between the sub-groups of each demographic variable separately by using the Mood’s median tests with statistical significance level set to 0.05, and 2) we analyzed the changes in PA levels by using quantile (median) regression with the aforementioned demographic variables as explanatory variables and the baseline PA levels as a control variable. Missing values were handled by excluding the responses of a certain participant to a certain item if s/he had not responded it in both data collection rounds (a participant could have missed the follow-up for some reason or dropped out from the program entirely). Thus, the exact number of respondents slightly varies between the items. For the analysis, we formed broader sub-groups. For example, the different sub-groups of marital status were combined into broader “In a relationship” and “Not in a relationship” sub-groups. T. Kari, M. Makkonen & L. Frank: Demographic Differences in the Effectiveness of a Physical Activity Application to Promote Physical Activity: Study Among Aged People 259 Results 442 research program participants had been partaking for 12 months or more 1. Of them, 294 responded to the IPAQ-E at both baseline and 12-month follow-up and formed the sample of this study (descriptive statistics reported in Table 1). Table 1: Descriptive statistics of the sample of this study (N=294) Gender Male Female Other Age (mean 69.7 years – standard deviation 4.2 years) –64 years 65–69 years 70–74 years 75 years or over Marital Status Married Common-law marriage Single Divorced Widow(er) N/A Highest level of education Primary education Vocational education University of applied sciences University N/A Language Finnish Swedish 1 At the time of conducting the study. n % 109 185 0 37.1 62.9 0.0 26 110 127 31 8.8 37.4 43.2 10.5 202 25 9 36 20 2 69.2 8.6 3.1 12.3 6.8 – 16 200 20 50 8 5.6 69.9 7.0 17.5 – 227 67 77.2 22.8 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 260 3.3 Overall Changes in the PA Levels The statistical significance of the overall changes (all participants as one group) in the PA levels were analyzed with the Wilcoxon signed-rank test (Wilcoxon, 1945), the results of which are presented in Table 2. Regarding the overall changes in the median minutes per week spent in different intensities, there was a notable and statistically significant increase in walking. The median minutes per week for sitting and vigorous PA remained unchanged, whereas moderate PA had a very small but statistically not significant decrease. As for total PA MET-min, there was a notable and statistically significant increase. Table 2: Overall changes in the PA levels (N=294) Overall Sitting Walking Moderate Vigorous Total PA 3.4 Baseline (min/week) Follow-up (min/week) Change n Median 25th–75th Median 25th–75th Median 283 276 284 286 264 2100 540 240 60 4098 1680–2940 273–840 120–450 0–240 2251–6435 2100 840 233 60 4518 1680–2730 405–1260 90–420 0–240 2326–6753 0 75 0 0 213 p 0.661 < 0.001 0.529 0.603 0.037 Differences in the Changes in PA Levels When comparing the differences in changes in PA levels between the sub-groups of each demographic variable separately by using the Mood’s median tests (Table 3), there was a statistically significant difference between marital statuses in sitting and walking (those not in a relationship increased walking time more than those in a relationship, but they also increased sitting time, whereas those in a relationship did not) and between age groups in walking (those aged 70 years or older increased walking time, whereas those aged under 70 years did not). When explaining the changes in PA levels by using quantile (median) regression with the aforementioned demographic variables as explanatory variables and the baseline PA levels as a control variable (Table 4), there was a statistically significant difference between genders in walking (females having a more positive (or less negative) change than males) and between marital statuses in sitting (those not in a relationship having a more positive (or less negative) change than those in a relationship, which in the case of sitting is of course an undesirable change). These results also show that, in general, the higher the T. Kari, M. Makkonen & L. Frank: Demographic Differences in the Effectiveness of a Physical Activity Application to Promote Physical Activity: Study Among Aged People 261 baseline level the less positive (or more negative) change there has been in sitting, walking, moderate PA, vigorous PA, and total PA. Table 3: Changes in median PA levels between the sub-groups (N=294) Change (min/week) Gender Sitting Walking Moderate Vigorous Total PA Marital status Sitting Walking Moderate Vigorous Total PA Highest education Sitting Walking Moderate Vigorous Total PA Age Sitting Walking Moderate Vigorous Total PA n Median 107 105 104 109 100 -105 20 0 0 -86 25th–75th Male -840–420 -180–313 -180–180 -140–65 -1544–2018 Change (min/week) n Median 176 171 180 177 164 0 150 0 0 501 In a relationship 218 212 219 221 203 0 25 0 0 107 -630–420 -140–420 -180–180 -120–83 -1581–2376 130 131 134 131 125 0 65 0 0 129 -534–420 -55–420 -180–158 -145–90 -1682–2419 0 0 0 0 44 –69 -630–420 -125–420 -180–180 -60–90 -1467–2527 Female -420–420 0–600 -180–131 -60–90 -1308–2667 p 0.305 0.173 0.520 0.987 0.205 Not in a relationship 63 62 63 63 59 420 240 20 0 948 Vocational/Primary 210 200 206 209 189 25th–75th -420–840 0–630 -140–180 -60–100 -740–2838 0.001 0.021 0.111 0.785 0.183 Academic 65 68 70 70 68 153 145 150 155 139 0 93 0 0 806 -420–420 -136–360 -120–158 -53–101 -977–2541 0.879 0.779 0.903 0.910 0.083 0 150 0 0 530 70– -420–525 0–520 -180–150 -135–90 -1480–2462 0.565 0.011 0.403 0.763 0.109 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 262 Table 4: Results from the quantile regression (N=294) Gender: Female Ref: Male Age: –69 Ref: 70– Marital status: Not in a Ref: In a relationship Highest education: V/P Ref: Academic Intercept Baseline PA level Sitting Walking Moderate Vigorous Total PA 38.182 191.45** -47.14 -19.34 523.44 -190.91 -80.13 -12.86 5.13 -529.79 343.64* 55.66 4.29 -2.76 43.521 0 -37.11 -8.57 -1.97 -191.20 1145.46* 259.74** 158.57** 31.97 1996.48** ** -0.545*** -0.309*** -0.643*** -0.566*** -0.389*** Pseudo R2 0.178 0.098 0.148 0.148 0.102 The cells present the sizes and the statistical significances of the effects of the demographic variables on changes in PA levels after controlling the baseline PA levels; *p<0.05, **p<0.01, ***p<0.001; Ref = Reference group; Highest education: V/P = Vocational/Primary. 4 Discussion and Conclusions The main purpose of this study was to investigate the following research question: How effectively can a physical activity application promote PA behavior among aged people of different demographics? The study participants took into use a physical activity application to track their everyday PA. The self-reported PA was measured by using the IPAQ-E at two time points: before taking the application into use and after 12 months of use. The changes in four types of PA behavior (sitting, walking, moderate, vigorous) and total PA as well as demographic differences were analyzed. As a response to the research question, in general, the results suggest that a physical activity application could be effective in promoting PA behavior among aged people as there was a notable and statistically significant increase in walking and total PA between baseline and 12-month follow-up. There was no statistically significant change in sitting, moderate PA, nor vigorous PA. These results are mostly in line with a recent systematic review on the ability of physical activity monitors to promote PA behaviors among older adults (Larsen et al. 2019). Moreover, for the vast majority of the participants in the present study the baseline measurement took place before the COVID-19 related restrictions, whereas for all the participants the follow-up measurement took place during the restrictions, which in Finland led to temporal closure or restricted access to different exercise facilities and also paused T. Kari, M. Makkonen & L. Frank: Demographic Differences in the Effectiveness of a Physical Activity Application to Promote Physical Activity: Study Among Aged People 263 many of the group activities. Considering this, another positive observation is that the participating aged people were able to upkeep or even increase their PA levels during these restrictions. The results also indicate that physical activity applications can be effective among aged people under free-living PA without accompanied active PA counseling or specific PA programs to follow. This is an important finding, as for most of the potential users, taking an application or another digital wellness technology into personal use just by themselves is a much more accessible option than signing up for a PA intervention or program with PA counselors. Regarding the demographic differences, the analyses show little differences in the changes in PA behavior between the sub-groups. Although the results give a cautious indication that the effectiveness might be better among those not in a relationship, people aged 70 years or older, and females, in general, the effectiveness of a physical activity application to promote PA behavior change among aged people does not seem to considerably depend on the demographic background (gender, age, education, marital status) of the user. For the designers and developers this indicates that modifying the physical activity applications for different demographics of aged people may not be worthwhile, but we speculate that application modifications could be more in place for users of different PA backgrounds, as this likely has more effect on the user’s needs towards PA solutions. Further research on this is warranted. In terms of BCSSs and behavior change, the results indicate that physical activity applications can be utilized as BCSSs to support or persuade PA behavior change across different demographics; also for longer-term, as implied by the change in the PA levels after 12 months of use. Hence, from a more practical standpoint, such technologies could be used in different PA promotion programs and interventions or be taken into use by (aged) people looking for solutions to support their PA or PA behavior change. They could also be utilized to support PA during exceptional times, such as those when there are restrictions or home confinements in force. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 264 5 Limitations & Future Research This study has some limitations that should be acknowledged. First, those participants not tracking their PA before taking the application into use could have had a less accurate view on their baseline PA, whereas by using the application this view might have gotten more accurate. Hence, the latter measurement of PA could have been more accurate. Second, on average, the participants seemed to represent a rather physically active share of the aged population, which limits the generalization. For future research, it would be valuable to acquire more participants with lower PA levels to minimize non-participation bias. Third, due to the lack of control group, it is not certain whether the changes in PA resulted mainly from using the application or because of taking part in the study. We also cannot rule out the possible influence of some other uncontrolled factors, such as the COVID-19 pandemic and the resulting restrictions, which have potentially influenced some participants’ PA levels around the follow-up. Hence, further related research is warranted. Future research with different digital wellness technologies and focus on other changes besides behavior would be valuable. As long-term research on related topics is much called for, we plan to continue the follow-ups to complement earlier study findings (e.g., Carlsson et al. 2020; Kari et al. 2021; Makkonen et al. 2020). Acknowledgements The Social Insurance Institution of Finland has funded the DigitalWells program and research project. References Carlsson, C., Kari, T., Makkonen, M., Frank, L., Walden, P. (2020). Sustainable physical activity programs for young elderly – A fuzzy AHP approach. In Proceedings of the 33rd Bled eConference “Enabling Technology for a Sustainable Society”, pp. 423-438. University of Maribor, Bled, Slovenia. Carlsson, C., Walden, P. (2017). Digital coaching to build sustainable wellness routines for young elderly. In Proceedings of the 30th Bled eConference “Digital Transformation – From Connecting Things to Transforming Our Lives”, pp. 57-70. University of Maribor, Bled, Slovenia. Changizi, M., Kaveh, M. H. (2017). Effectiveness of the mHealth technology in improvement of healthy behaviors in an elderly population—A systematic review. mHealth, 3, 51. Craig, C. L., Marshall, A. L., Sjöström, M., Bauman, A. E., Booth, M. L., Ainsworth, B. E., ... Oja, P. (2003). International physical activity questionnaire: 12-country reliability and validity. Medicine & Science in Sports & Exercise, 35, 1381-1395. T. Kari, M. Makkonen & L. Frank: Demographic Differences in the Effectiveness of a Physical Activity Application to Promote Physical Activity: Study Among Aged People 265 Ekelund, U., Sepp, H., Brage, S., Becker, W., Jakes, R., Hennings, M., Wareham, N. J. (2006). Criterionrelated validity of the last 7-day, short form of the International Physical Activity Questionnaire in Swedish adults. Public Health Nutrition, 9, 258-265. Fogg, B. J. (2003). Persuasive technology: using computers to change what we think and do. Morgan Kaufmann Publishers, San Francisco, CA. Gordon, M., Althoff, T., Leskovec, J. (2019). Goal-setting and achievement in activity tracking apps: a case study of MyFitnessPal. In Proceedings of the World Wide Web Conference, pp. 571-582. ACM, New York, NY. Hoogendijk, E. O., Afilalo, J., Ensrud, K. E., Kowal, P., Onder, G., Fried, L. P. (2019). Frailty: implications for clinical practice and public health. The Lancet, 394, 1365-1375. Hurtig-Wennlöf, A., Hagströmer, M., Olsson, L. A. (2010). The International Physical Activity Questionnaire modified for the elderly: aspects of validity and feasibility. Public Health Nutrition, 13, 1847-1854. IPAQ group. (2005a). International Physical Activity Questionnaire. https://sites.google.com/site/ theipaq/home/, accessed 10.2.2021. IPAQ group. (2005b). Guidelines for Data Processing and Analysis of the International Physical Activity Questionnaire (IPAQ). https://sites.google.com/site/theipaq/scoring-protocol/, accessed 10.2.2021. Kari, T. (2014). Can exergaming promote physical fitness and physical activity? a systematic review of systematic reviews. International Journal of Gaming and Computer-Mediated Simulations, 6, 59-77. Kari, T., Kettunen, E., Moilanen, P., Frank, L. (2017). Wellness technology use in everyday life: a diary study. In Proceedings of the 30th Bled eConference “Digital Transformation – From Connecting Things to Transforming Our Lives”, pp. 279-294. University of Maribor, Bled, Slovenia. Kari, T., Koivunen, S., Frank, L., Makkonen, M., Moilanen, P. (2016a) Critical Experiences During the Implementation of a Self-tracking Technology. In Proceedings of the 20th Pacific Asia Conference on Information Systems, pp. 1-16. AIS, Chiayi, Taiwan. Kari, T., Makkonen, M., Carlsson, J., Frank, L. (2021). Using a Physical Activity Application to Promote Physical Activity Levels Among Aged People: A Follow-Up Study. In Proceedings of the 54th Hawaii International Conference on System Sciences, pp. 1242-1251. University of Hawai'i at Manoa, Hawaii. Kari, T., Piippo, J., Frank, L., Makkonen, M., Moilanen, P. (2016b). To gamify or not to gamify? gamification in exercise applications and its role in impacting exercise motivation. In Proceedings of the 29th Bled eConference “Digital economy”, pp. 393-405. University of Maribor, Bled, Slovenia. Kari, T., Rinne, P. (2018). Influence of digital coaching on physical activity: motivation and behaviour of physically inactive individuals. In Proceedings of the 31st Bled eConference “Digital Transformation – Meeting the Challenges”, pp. 127-145. University of Maribor, Bled, Slovenia. Kari, T., Salo, M., & Frank, L. (2019). Role of Situational Context in Use Continuance After Critical Exergaming Incidents. Information Systems Journal, 30, 596-633. Karppinen, P., Oinas-Kukkonen, H., Alahäivälä, T., Jokelainen, T., Keränen, A. M., … Savolainen, M. (2016). Persuasive user experiences of a health Behavior Change Support System: A 12-month study for prevention of metabolic syndrome. International Journal of Medical Informatics, 96, 51-61. Kettunen, E., Kari, T., Makkonen, M., Frank, L., Critchley, W. (2020). Young elderly and digital coaching: a quantitative intervention study on exercise self-efficacy. In Proceedings of the 33rd Bled eConference “Enabling Technology for a Sustainable Society”, pp. 469-484. University of Maribor, Bled, Slovenia. Kettunen, E., Kari, T., Moilanen, P., Vehmas, H., Frank, L. (2017). Ideal types of sport and wellness technology users. In Proceedings of the 11th Mediterranean Conference on Information Systems, 12 pages. AIS, Genoa, Italy. 266 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Kirwan, M., Duncan, M., Vandelanotte, C. (2013). Smartphone apps for physical activity: a systematic review. Journal of Science and Medicine in Sport, 16, e47. Koivisto, J., Hamari, J. (2019). The rise of motivational information systems: a review of gamification research. International Journal of Information Management, 45, 191-210. Larsen, R. T., Christensen, J., Juhl, C. B., Andersen, H. B., Langberg, H. (2019). Physical activity monitors to enhance amount of physical activity in older adults – a systematic review and metaanalysis. European Review of Aging and Physical Activity, 16, 7. Lee, P. H., Macfarlane, D. J., Lam, T. H., Stewart, S. M. (2011). Validity of the international physical activity questionnaire short form (IPAQ-SF): A systematic review. International Journal of Behavioral Nutrition and Physical Activity, 8, 115. Loos, E., Zonneveld, A. (2016). Silver gaming: serious fun for seniors? In International Conference on Human Aspects of IT for the Aged Population, pp. 330-341. Springer, Cham. Makkonen, M., Frank, L., Kari, T., Moilanen P. (2012). Examining the usage intentions of exercise monitoring devices: The usage of pedometers and route trackers in Finland. In Proceedings of the 25th Bled eConference, pp. 439-453. University of Maribor, Bled, Slovenia. Makkonen, M., Kari, T., and Frank, L. (2020). Applying UTAUT2 to Explain the Use of Physical Activity Logger Applications Among Young Elderly. In Proceedings of the 33rd Bled eConference “Enabling Technology for a Sustainable Society”, pp. 567-582. University of Maribor, Bled, Slovenia. Moilanen, P., Salo, M., Frank, L. (2014). Inhibitors, enablers and social side winds: explaining the use of exercise tracking systems. In Proceedings of the 27th Bled eConference, pp. 23-37. University of Maribor, Bled, Slovenia. Muellmann, S., Forberger, S., Möllers, T., Bröring, E., Zeeb, H., Pischke, C. R. (2018). Effectiveness of eHealth interventions for the promotion of physical activity in older adults: A systematic review. Preventive Medicine, 108, 93-110. Oinas-Kukkonen, H. (2013). A foundation for the study of behavior change support systems. Personal and Ubiquitous Computing, 17, 1223-1235. Oduor, M., Oinas-Kukkonen, H. (2021). Committing to change: a persuasive systems design analysis of user commitments for a behaviour change support system. Behaviour & Information Technology, 40, 20-38. Rockmann, R. (2019). Don’t Hurt Me… No More? An Empirical Study on the Positive and Adverse Motivational Effects in Fitness Apps. In Proceeding of the European Conference on Information Systems, 17 pages. AIS, Stockholm & Uppsala, Sweden. Romeo, A., Edney, S., Plotnikoff, R., Curtis, R., Ryan, J., Sanders, I., ... Maher, C. (2019). Can smartphone apps increase physical activity? systematic review and meta-analysis. Journal of Medical Internet Research, 21, e12053. Seifert, A., Schlomann, A., Rietz, C., Schelling, H. R. (2017). The use of mobile devices for physical activity tracking in older adults’ everyday life. Digital Health, 3, 1-12. Schmidt, B., Benchea, S., Eichin, R., Meurisch, C. (2015). Fitness tracker or digital personal coach: how to personalize training. In Adjunct Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp. 1063-1067. ACM, Osaka, Japan. Stephenson, A., McDonough, S. M., Murphy, M. H., Nugent, C. D., Mair, J. L. (2017). Using computer, mobile and wearable technology enhanced interventions to reduce sedentary behaviour: a systematic review and meta-analysis. Journal of Behavioral Nutrition and Physical Activity, 14, 105. Stockwell, S., Schofield, P., Fisher, A., Firth, J., Jackson, S.E., Stubbs, B., Smith, L. (2019). Digital behavior change interventions to promote physical activity and/or reduce sedentary behavior in older adults: A systematic review and meta-analysis. Experimental Gerontology, 120, 68-87. Sullivan, A. N., Lachman, M. E. (2017). Behavior change with fitness technology in sedentary adults: a review of the evidence for increasing physical activity. Frontiers in Public Health, 4, 289. THL – The Finnish Institute for Health and Welfare. (2019). Physical activity in the adult population in Finland – the FinHealth Study. Report 48/2019. T. Kari, M. Makkonen & L. Frank: Demographic Differences in the Effectiveness of a Physical Activity Application to Promote Physical Activity: Study Among Aged People 267 United Nations. (2019). World population ageing 2019. https://www.un.org/en/development/desa/ population/publications/pdf/ageing/WorldPopulationAgeing2019-Highlights.pdf, accessed 9.2.2021. Van Poppel, M. N., Chinapaw, M. J., Mokkink, L. B., Van Mechelen, W., Terwee, C. B. (2010). Physical activity questionnaires for adults: a systematic review of measurement properties. Sports Medicine, 40, 565-600. Wang, J. B., Cataldo, J. K., Ayala, G. X., Natarajan, L., Cadmus-Bertram, L. A., ... Pierce, J. P. (2016). Mobile and wearable device features that matter in promoting physical activity. Journal of Mobile Technology in Medicine, 5, 2-11. Wellmo. (2019). Mobile health platform. https://www.wellmo.com/platform/, accessed 9.2.2021. Wilcoxon, F. (1945). Individual Comparisons by Ranking Methods. Biometrics Bulleting, 1, 80-83. World Health Organization. (2020). WHO guidelines on physical activity and sedentary behaviour. https://www.who.int/publications/i/item/9789240015128, accessed 9.2.2021. Yerrakalva, D., Yerrakalva, D., Hajna, S., Griffin, S. (2019). Effects of mobile health app interventions on sedentary time, physical activity, and fitness in older adults: Systematic review and metaanalysis. Journal of Medical Internet Research, 21, e14343 268 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE REAL-WORLD REINFORCEMENT LEARNING: OBSERVATIONS FROM TWO SUCCESSFUL CASES PHILIPP BACK Aalto University School of Business, Department of Information and Service Management, Helsinki, Finland; e-mail: philipp.back@aalto.fi Abstract Reinforcement Learning (RL) is a machine learning technique that enables artificial agents to learn optimal strategies for sequential decision-making problems. RL has achieved superhuman performance in artificial domains, yet real-world applications remain rare. We explore the drivers of successful RL adoption for solving practical business problems. We rely on publicly available secondary data on two cases: data center cooling at Google and trade order execution at JPMorgan. We perform thematic analysis using a pre-defined coding framework based on the known challenges to real-world RL by DulacArnold, Mankowitz, & Hester (2019). First, we find that RL works best when the problem dynamics can be simulated. Second, the ability to encode the desired agent behavior as a reward function is critical. Third, safety constraints are often necessary in the context of trial-and-error learning. Our work is amongst the first in Information Systems to discuss the practical business value of the emerging AI subfield of RL. DOI https://doi.org/10.18690/978-961-286-485-9.20 ISBN 978-961-286-485-9 Keywords: reinforcement learning, AI adoption, thematic analysis, machine learning, self-learning agents 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 270 1 Introduction Reinforcement Learning (RL) is a machine learning technique that enables artificial agents to learn optimal strategies for sequential decision-making problems (Sutton & Barto, 2018). No direct supervision is provided; the agent learns by trial-and-error while interacting with a (virtual) environment and receiving feedback on its actions. Over the past decade, RL has achieved superhuman performance in a series of artificial domains. In a seminal paper by Google DeepMind (Mnih et al., 2015), an RL system learned how to play different Atari games, such as Breakout and Space Invaders, on a human or even superhuman level. This breakthrough started an RL frenzy in the scientific community and was presumably a major reason for Google to acquire DeepMind for $650 million in 2014. The next milestone came with AlphaGo, the first computer program to master the ancient Chinese board game of Go (Silver et al., 2017); a feat that experts believed was still decades away as the number of possible game states exceeds the number of atoms in the known universe. Over 200 million people watched online as AlphaGo beat the world's best Go player, Lee Sedol, 4 to 1 during The Google DeepMind Challenge. In the aftermath of the game, Lee Sedol described his opponent as following: "I thought AlphaGo was based on probability calculation and that it was merely a machine. But when I saw this move, I changed my mind. Surely, AlphaGo is creative” (Silver, Hubert, Schrittwieser, & Hassabis, 2018). Despite its many opportunities, RL also presents significant challenges that have prevented wide-spread adoption in the real world (Dulac-Arnold et al., 2019). Google's DeepMind unit, conqueror of Atari, Go, and StarCraft II has been losing an estimated $1 billion over the past three years while trying to transfer its impressive work from artificial domains to real-world products - so far with little success. Interestingly, Information Systems (IS) research has largely ignored the emerging AI subfield of RL. The research landscape remains dominated by the computer science community who continues to present algorithmic improvements that are usually evaluated on artificial problems. IS often treats AI technologies as mere tools for certain applications, such as decision making, supply chain management, market predictions, or innovation, rather than as objects of research themselves (Shmueli & Koppius, 2011). Specific AI subfields, such as machine learning, big data analytics, or predictive modeling, remain under-researched despite their rising importance to P. Back: Real-World Reinforcement Learning: Observations from Two Successful Cases 271 management (Nascimento, da Cunha, de Souza Meirelles, Scornavacca Jr, & de Melo, 2018). Case in point: RL has already been discussed in IS as a tool for music recommendation (Liebman, Saar-Tsechansky, & Stone, 2019), but not yet as novel AI subfield (object). However, amidst the ongoing RL hype, IS would serve practitioners well by treating RL as on object of study itself. Already 30 years ago, King (1984) pointed to a gap between inflated claims on what AI-based expert systems may be able to do, and what has actually been delivered. More recently, Nascimento et al. (2018) confirmed that claims made by AI vendors and the media seem ahead of what is supported by research findings. By critically examining RL’s potential business value, IS would continue its long history of educating practitioners about the possibilities and challenges of novel AI technology. To quote Noel Sharkey, emeritus professor of Artificial Intelligence and Robotics at the University of Sheffield: "[...] the wrong idea of what robotics can do and where AI is at the moment it's very, very dangerous." (Delcker, 2018). To this end, we conduct a qualitative exploratory study on two successful cases of real-world RL adoption: data center cooling by Google and trade order execution by JPMorgan. The research question that this paper seeks to address is: What factors drive successful real-world adoption of Reinforcement Learning for practical business problems? By studying “how others did it", we hope to provide decision-makers with a better understanding of RL's opportunities and pitfalls; and how to overcome them. 2 Theoretical Background 2.1 Reinforcement Learning Overview RL is one of the three machine learning paradigms, alongside supervised and unsupervised learning (Sutton & Barto, 2018). An RL agent learns by interacting with its (virtual) environment (Figure 1). At each time step 𝑡, the agent observes the environment state 𝑠𝑡 and chooses an action 𝑎𝑡 from the set of available actions. The environment moves to the next state 𝑠𝑡+1 and the agent receives a reward 𝑟𝑡+1 based on the transition (𝑠𝑡 , 𝑎𝑡 , 𝑠𝑡+1 ). The goal of an RL agent is to learn an optimal strategy (policy) which maximizes the expected cumulative reward. No direct supervision is provided to the agent; it is never directly told the best course of action. Rather, the agent has to learn from the consequences of its actions via trial-anderror. The only guidance comes from the numerical reward, a reinforcement signal 272 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE that encodes how good it is to take an action in a certain state. The agent must reason about the long-term consequences of its actions although the immediate reward associated with its action might be negative. For example, a stock trading agent may learn to accept small daily losses in exchange for a significant payoff when the market sentiment changes. Thus, RL is particularly well suited for sequential decisionmaking problems that include long-term versus short-term reward trade-offs1. Figure 1: Reinforcement Learning framework Source: Sutton & Barto (2018) 2.2 Known Challenges to Real-World Reinforcement Learning Dulac-Arnold et al. (2019) identified nine challenges that – if present in an underlying real-world problem - must be addressed to productize RL: 1. training off-line from limited (historic) logs of the system’s behavior 2. learning on the real system from limited (historic) data samples 3. high-dimensional continuous state and action spaces that become computational infeasible to search over (curse of dimensionality) 4. safety constraints that should never or at least rarely be violated 5. tasks that may only be partially observable (non-stationary/stochastic) 6. reward function design (unspecified, multi-objective, or risk-sensitive) 7. system operators who desire explainable policies and actions 8. inference that must happen in real-time at the system’s control frequency2 9. large and/or unknown delays in the system actuators, sensors, or rewards 1 Given the scope and limitation of this study, we refrain from a more detailed technical overview of RL and kindly refer the interested reader to Sutton & Barto (2018). 2 The task can be run neither faster nor slower than real-time. This limits the quick generation of massive amounts of training, as well as slow, computationally expensive modeling approaches. P. Back: Real-World Reinforcement Learning: Observations from Two Successful Cases 3 273 Methodology To examine the drivers of successful RL adoption for practical business problems, we conducted a qualitative exploratory study on two cases: data center cooling by Google and trade order execution by JP Morgan. We selected the two cases based on the simple fact that they are – to the best of our knowledge – some of the only instances where RL has been successfully deployed in practice. We intentionally did not consider cases of self-driving cars and user-recommendation systems, as they are either not yet production-ready (Osiński et al., 2020), or use simpler forms of RL, such as contextual bandits (Amat, Chandrashekar, Jebara, & Basilico, 2018). 3.1 Data Collection We rely on publicly available material for exploring the use of RL at Google and JPMorgan. Our sources include research publications, blog posts, newspaper articles, and published interviews with company representatives. We chose this form of qualitative secondary analysis (Heaton, 2008) because both case companies are reluctant to give interviews on the inner workings of their RL systems that would go beyond what they already chose to disclose. Nevertheless, useful insights can be gained from a careful analysis of various publicly available sources. 3.2 Data Analysis We performed a thematic analysis using a pre-defined coding framework. Thematic analysis is a method for systematically identifying, organizing, and offering insights into patterns of meaning (themes) across a data set (Braun & Clarke, 2012). This method allowed us to identify what is common to the way in which the topic – what drives successful RL adoption for practical business problems - was described across multiple data items, and to make sense of those commonalities. As themes, we used the nine challenges to real-world RL (Section 2.2) by Dulac-Arnold et al. (2019). After becoming familiar with the data, we consolidated all sources in text format and systematically searched for the pre-defined themes. For example, the excerpt “We send simulated orders to the exchange, we simulate how they execute, we simulate market impact, and then we feed the reward and batches of execution back to the agent’s brain […]” (QuantMinds365, 2018) related to “data efficiency” (theme 2) and “reward function design” (theme 6). Finally, we synthesized our findings in three key observations. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 274 4 Findings Here we present our findings to answer the research question of what factors drive successful real-world adoption of Reinforcement Learning for practical business problems. We start with a general overview of optimal trade execution at JPMorgan and data center cooling at Google. Next, we present the findings of our thematic analysis, i.e. how RL has been productized in each case. Finally, we highlight the business value that RL offered over competing solutions. Overall, the thematic analysis of secondary data sources produced observations on four out of the nine themes: training from fixed logs (1), learning from limited samples (2), safety constraints (4), and reward function design (6). 4.1 Case 1: Optimal Trade Execution (JPMorgan) Banks and financial service firms have long been using algorithms to make equity trading more efficient. In 2017, JPMorgan, one of the leading global financial services firm with assets of $2.6 trillion, announced LOXM, an AI-based limit-order placement engine that takes efficient trade execution to new heights. LOXM can execute equity trades at maximum speed and at optimal prices, and allows clients to offload large equity positions without causing market swings (Terekhova, 2017). Optimal trade execution is a non-trivial problem: client needs differ, market conditions vary, and legal regulations must be met. An AI agent must learn to operate in the environment of bid/ask prices, and monitor the liquidity on both sides of the order book (QuantMinds365, 2018). JPMorgan addressed these challenges by using RL. They constructed a market simulator from billions of past trades to provide the RL agent with a learning environment (Nevmyvaka, Feng, & Kearns, 2006; Vyetrenko et al., 2019). This simulator approach eliminated the need to learn directly from limited historic samples (theme 2). The artificial environment receives orders from the agent, simulates market impact, and sends rewards back to the agent who then updates its understanding of what actions are good/bad. In an interview, Vaslav Glukhow, Head of EMEA e-Trading Quantitative Research at JPMorgan, explained the process as following: “In this approach we have an action, and the action is how much to place, P. Back: Real-World Reinforcement Learning: Observations from Two Successful Cases 275 what price, and for how long. It makes sense for the agent to be intelligent about the quantity that it asks for, and it needs to be smart in terms of how long it needs to place that order – if it gives the order for too long it will lose the opportunity and it will need to execute at a higher price. All these things need to be taken into consideration and the agent needs to be aware of the consequences of each action." (QuantMinds365, 2018). The agent is rewarded (theme 6) for being efficient in the market in the form of a scalar reward signal that encodes how well the agent splits large orders into smaller, more efficient “child” orders compared to executing the large “parent” order at once (Vyetrenko & Xu, 2019). LOXM makes use of RL's ability to balance long- and short-term rewards; the total rewards are not necessarily the sum of local rewards. Since LOXM’s depute in 2017, RL has proven its real-world worth for optimal trade execution. According to JPMorgan, the system provides significant savings and far outperforms both manual and existing automated trading methods (Terekhova, 2017). 4.2 Case 2: Data Center Cooling (Google) Cooling is a critical component of data center operations. Servers produce considerable amount of heat, and high temperatures may lead to lower IT performance or equipment damage (Lazic et al., 2018). Dealing with excess heat is one of the biggest, most expensive factors when running a modern data center. Past solutions to the temperature problem have included moving data centers to cooler climates, or even situating them at the bottom of the ocean. In 2018, Google announced that it has handed control over the cooling of several of its behemoth data centers to an AI that optimizes effective power management. The system learns how to adjust fans, ventilation, and other equipment to lower power consumption (Knight, 2018). Two years earlier, in 2016, Google had already presented an earlier version that made recommendations to human data center managers, who would then decide whether to implement them (Evans & Gao, 2016). The new system is managing cooling all by itself, although a human can still intervene. "It's the first time that an autonomous industrial control system will be deployed at this scale, to the best of our knowledge", said Mustafa Suleyman, head of applied AI at DeepMind, an AI company that was acquired by Google in 2014 (Knight, 2018). 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 276 Google uses RL to find optimal control policies for their complex, large-scale data center systems. Google does not explicitly disclosure how the RL learning environment has been constructed (Lazic et al., 2018), only that historic control data has insufficient information to directly train an RL agent (theme 2). However, earlier work has shown that neural networks can model Google's data center dynamics with 99.6% accuracy (Kava, 2014). Thus, it can be assumed that Google is using the latter model as a simulator to construct the RL environment. To ensure safe operation already during training (theme 4), Google used historic control logs (theme 1) to limit each control variable to a safe range. In the absence of such data, the safe range could be initialized conservatively and gradually expanded (Lazic et al., 2018). According to Google, deep RL has proven highly effective at operating cooling systems: the system consistently achieves a 40% reduction in the amount of energy used for cooling (Evans & Gao, 2016). 5 Discussion In both applications - optimal trade execution and data center cooling - the goal was to find an optimal strategy for a sequential decision-making problem. Despite very different domains, both applications share certain characteristics that allowed RL to be applied in practice. In the following, we discuss some of the key challenges in RL (Dulac-Arnold et al., 2019) and how Google and JPMorgan overcame them. 5.1 Observation 1: Learning Directly from Historic Data is Still Difficult Standard supervised learning is teaching by example, whereas RL is teaching by experience. The agent gathers experience by interacting through trial-and-error with its environment; like a virtual playground. The learning by trial-end-error framework can be applied to almost any sequential decision-making problem, but this generality comes at a price: RL is hugely sample inefficient, meaning it requires a lot of training data. Imagine trying to learn a new board game, but instead of studying the rule book or recalling your experience from other board games, you simply take random moves while only receiving the final game score as feedback. What quickly strikes humans as a ludicrous endeavor is precisely how many RL problems are framed. Indeed, given enough time and computational power, the trial-and-error approach should converge to a (near-) optimal strategy, but what is enough? For AlphaGo it took 5 P. Back: Real-World Reinforcement Learning: Observations from Two Successful Cases 277 billion games of self-play and around $35 million in computing costs to beat the best human Go player. Since RL agents require a lot of experience, and experience is gathered by interacting with an environment, the way in which a (real-world) problem can be represented as an RL environment is critical. Most of RL's successes have been with artificial systems that can be simulated, such Atari games (Mnih et al., 2015), Go (Silver et al., 2017), DOTA (Berner et al., 2019), and StarCraft II (Vinyals et al., 2019). The reason for this is that simulators allow us to generate unlimited training data - an advantage that can hardly be overstated in the context of sample inefficient learning. An RL agent might not be able to gather sufficient experience from a set of finite training data, but with a simulated environment it can continue to interact and learn until a (near-) optimal policy is found. Moreover, simulators eliminate much of the messiness that an agent may face in the real world and thus provide stable benchmarks against which new algorithms can be compared. Simulated environments therefore also play an important role in algorithmic research. Unfortunately, out-of-the-box simulators rarely exist for real-world applications. The two herein presented applications addressed this issue by improving the fidelity of the simulations to a point where the gap between simulations and the real world was so small that things learned in simulation were directly transferable to the real world. JPMorgan used billions of past trades to construct a market simulator that closely reflected the true market dynamics (Vyetrenko et al., 2019). Similarly, Google managed to simulate data center dynamics with 99.6% accuracy (Kava, 2014). In contrast to training directly on a (limited) historic dataset (theme 2), simulators offer unlimited opportunities to learn. Assuming that the simulator accurately reflects the real system, it then becomes possible to transfer the learned optimal strategy directly from the artificial environment to the real world. The existence of an environment simulator, or the ability to construct one from historic data or first principles, is therefore a common characteristic of successful real-world RL applications. Observation 1: If the tasks in a field can be accurately simulated, RL may dramatically improve the state of the art in that field over the next few years. 278 5.2 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Observation 2: It’s All about Rewards The desired behavior of an RL agent has to be encoded in a reward function. Without direct expert guidance, the reward function is the only source of feedback that tells the agent what action in which state was good. Unfortunately, reward function design is notoriously difficult as it must capture exactly the desired behavior. An ill-defined reward function will cause the RL agents to break in surprising, counterintuitive, and sometimes amusing ways. One of the most (in-) famous examples of faulty reward functions is an RL agent learning to play the CoastRunners game (Clark & Amodei, 2016). The goal of the game - as understood by most humans - is to finish a boat race quickly and (preferably) ahead of others. Players are not directly rewarded for progressing around the course but earn points by hitting targets laid out along the racetrack. The human who designed the reward system simply assumed that the overall game score would implicitly reflect the goal of finishing the race. However, the targets were positioned so that the RL agent could gain a high score without ever having to finish the race. Instead, the agent finds an isolated lagoon where it can turn in a large circle and repeatedly knock over three targets, timing its movement so as to always knock over the targets just as they repopulate. Despite repeatedly catching on fire, crashing into other boats, and going the wrong way on the track, the agent manages to achieve a higher score using this strategy than is possible by completing the race in the normal (human) way (Clark & Amodei, 2016). The counterintuitive strategy leads to scores that are on average 20% higher than what is achieved by human players. Reward function design becomes even more complex when systems have multidimensional costs, or when product owners cannot even articulate clearly what they want to minimize (Dulac-Arnold et al., 2019). In both herein presented cases, however, it was possible to encode the desired agent behavior as a scalar reward signal (theme 6): minimize trading costs and energy consumption. Neither JPMorgan nor Google had to perform any tricks to encode a complex behavior or multidimensional objective as a scalar reward. The natural representation of the desired system behavior thus greatly contributed to the suitability of RL. P. Back: Real-World Reinforcement Learning: Observations from Two Successful Cases 279 Observation 2: An agent’s desired behavior must be able to be expressed exactly as a reward function. 5.3 Observation 3: Safety First Most physical systems can damage themselves and their environment if operated incorrectly. When neither a simulator nor sufficient training data are available, and when the RL agents has to gather experience by interacting directly via trial-anderror with the real system, safety becomes important; not only during the final system operation, but also during the exploratory learning phase. For example, a self-driving car cannot be allowed to explore all possible actions, including crashing full speed into a wall, until it has eventually mastered to stay within its lane. (Un)fortunately, safety violations will likely be very rare in historic logs and thus do not provide sufficient opportunity to learn from them (Dulac-Arnold et al., 2019). Furthermore, safety constraints are often assumed ("it's just common sense!") and are not even specified explicitly. Moreover, it may not be possible to impose strict limits by describing the action or state space directly; instead, hazard-avoiding behavior must be learned. Safety constraints were crucial in both herein discussed applications of RL. Google's data center represents a large-scale system that can suffer catastrophic damage when operated incorrectly. JPMorgan had to consider legal, regulatory, and ethical constraints that may prohibit certain trading activities. As discussed in Section 5.2, it is notoriously difficult to express fine-grained behaviors in the reward function. Constrained RL is thus a viable alternative to prohibit the agent from learning, or even exploring, certain actions. Observation 3: Trial-and-error learning makes safety considerations during training and control highly important. 6 Conclusion and Further Directions Reinforcement Learning has achieved superhuman performance in many artificial domains, yet real-world applications remain rare. We conducted a qualitative study to explore the drivers of successful RL adoption for practical business problems. We used pre-defined themes based on the known challenges to real-world RL by Dulac- 280 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Arnold et al. (2019) to perform a thematic analysis on secondary data that described how Google and JPMorgan successfully deployed RL for data center cooling and optimal trade execution. Three success drivers emerged: simulatability of the problem dynamics, a natural representation of the desired agent behavior as a reward function, and compliance with safety constraints during trial-and-error learning. Our work is amongst the first in IS to approach RL as a separate object of study. By exploring two successful real-world RL applications, we hope to shine some light on the practical business value of this emerging AI subfield. Notwithstanding some useful insights, this study is limited by the use of publiclyavailable secondary data. For example, we were only able to identify four out of the nine themes (challenges) in our dataset. Especially the Google case could have benefited from more details. This study is thus a mere first step towards a more complete understanding of the practical business value of RL. For the future, we hope to collect primary data through interviews with key people who were involved in the design and deployment of the herein described RL solutions at Google and JPMorgan. Such data would allow us to directly analyze the technical details of the RL systems, rather than using high-level (textual) descriptions. Our study is further limited by having only two case companies. It will be interesting to extend our study to future use cases of RL once this method has become more widely adopted. Finally, it would be interesting to tackle a new application area with RL, and to document how the known challenges are addressed during the design process. References Amat, F., Chandrashekar, A., Jebara, T., & Basilico, J. (2018). Artwork personalization at Netflix. Proceedings of the 12th ACM Conference on Recommender Systems, 487–488. Vancouver, Canada. Berner, C., Brockman, G., Chan, B., Cheung, V., Dębiak, P., Dennison, C., … Hesse, C. (2019). Dota 2 with large scale deep reinforcement learning. ArXiv Preprint ArXiv:1912.06680. Braun, V., & Clarke, V. (2012). Thematic analysis. In APA handbook of research methods in psychology, Vol 2 (pp. 57–71). Washington, DC: American Psychological Association. Clark, J., & Amodei, D. (2016). Faulty Reward Functions in the Wild. Retrieved September 20, 2020, from https://openai.com/blog/faulty-reward-functions/ Delcker, J. (2018). Europe divided over robot ‘personhood.’ Retrieved November 10, 2020, from https://www.politico.eu/article/europe-divided-over-robot-ai-artificial-intelligencepersonhood/ Dulac-Arnold, G., Mankowitz, D., & Hester, T. (2019). Challenges of real-world reinforcement learning. ArXiv Preprint ArXiv:1904.12901. P. Back: Real-World Reinforcement Learning: Observations from Two Successful Cases 281 Evans, R., & Gao, J. (2016). DeepMind AI reduces Google data centre cooling bill by 40%. Retrieved September 20, 2020, from https://deepmind.com/blog/article/deepmind-ai-reduces-googledata-centre-cooling-bill-40 Heaton, J. (2008). Secondary analysis of qualitative data: An overview. Historical Social Research/Historische Sozialforschung, 33–45. Kava, J. (2014). Better data centers through machine learning. Retrieved August 21, 2020, from https://blog.google/inside-google/infrastructure/better-data-centers-through-machine/ King, W. R. (1984). Editor’s comment: Decision support systems, artificial intelligence, and expert systems. MIS Quarterly, 8(3), iv–v. Knight, W. (2018). Google just gave control over data center cooling to an AI. Retrieved September 5, 2020, from https://www.technologyreview.com/2018/08/17/140987/google-just-gavecontrol-over-data-center-cooling-to-an-ai/ Lazic, N., Lu, T., Boutilier, C., Ryu, M. K., Wong, E. J., Roy, B., & Imwalle, G. (2018). Data center cooling using model-predictive control. Advances in Neural Information Processing Systems. Montreal, Canada. Liebman, E., Saar-Tsechansky, M., & Stone, P. (2019). The right music at the right time: Adaptive personalized playlists based on sequence modeling. MIS Quarterly, 43(3). Mnih, V., Kavukcuoglu, K., Silver, D., Rusu, A. A., Veness, J., Bellemare, M. G., … Ostrovski, G. (2015). Human-level control through deep reinforcement learning. Nature, 518(7540), 529. Nascimento, A. M., da Cunha, M. A. V. C., de Souza Meirelles, F., Scornavacca Jr, E., & de Melo, V. V. (2018). A literature analysis of research on artificial intelligence in management information system (MIS). AMCIS. Nevmyvaka, Y., Feng, Y., & Kearns, M. (2006). Reinforcement learning for optimized trade execution. Proceedings of the 23rd International Conference on Machine Learning, 673–680. Pittsburgh, USA. Osiński, B., Jakubowski, A., Zięcina, P., Miłoś, P., Galias, C., Homoceanu, S., & Michalewski, H. (2020). Simulation-based reinforcement learning for real-world autonomous driving. 2020 IEEE International Conference on Robotics and Automation (ICRA), 6411–6418. Paris, France. QuantMinds365. (2018). The Latest in LOXM and why we shouldn’t be using single stock algos. Retrieved July 3, 2020, from https://informaconnect.com/the-latest-in-loxm-and-why-weshouldnt-be-using-single-stock-algos/ Shmueli, G., & Koppius, O. R. (2011). Predictive analytics in information systems research. MIS Quarterly, 553–572. Silver, D., Hubert, T., Schrittwieser, J., & Hassabis, D. (2018). AlphaZero: Shedding new light on chess, shogi, and Go. Retrieved September 18, 2020, from https://deepmind.com/blog/article/ alphazero-shedding-new-light-grand-games-chess-shogi-and-go Silver, D., Schrittwieser, J., Simonyan, K., Antonoglou, I., Huang, A., Guez, A., … Bolton, A. (2017). Mastering the game of go without human knowledge. Nature, 550(7676), 354–359. Sutton, R. S., & Barto, A. G. (2018). Reinforcement learning: An introduction (2nd ed.). Cambridge: MIT Press. Terekhova, M. (2017). JPMorgan takes AI use to the next level. Retrieved August 19, 2020, from https://www.businessinsider.com/jpmorgan-takes-ai-use-to-the-next-level-20178?r=US&IR=T Vinyals, O., Babuschkin, I., Czarnecki, W. M., Mathieu, M., Dudzik, A., Chung, J., … Georgiev, P. (2019). Grandmaster level in StarCraft II using multi-agent reinforcement learning. Nature, 575(7782), 350–354. Vyetrenko, S., Byrd, D., Petosa, N., Mahfouz, M., Dervovic, D., Veloso, M., & Balch, T. H. (2019). Get real: Realism metrics for robust limit order book market simulations. ArXiv:1912.04941. Vyetrenko, S., & Xu, S. (2019). Risk-sensitive compact decision trees for autonomous execution in presence of simulated market response. ArXiv Preprint ArXiv:1906.02312 282 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE ONLINE PROCTORING: ADDING HUMAN VALUES TO THE EQUATION MARLIES VAN STEENBERGEN & IRENE VAN DER SPOEL HU University of Applied Sciences Utrecht, Research Centre for Learning and Innovation, Utrecht, The Netherlands; e-mail: marlies.vansteenbergen@hu.nl, irene.vanderspoel@hu.nl Abstract The COVID-19 pandemic led to an accelerated implementation of digital solutions, such as online proctoring. In this paper we discuss how the use of an ethical matrix may influence the way in which digital solutions are applied. To initiate an ethical discussion, we conducted an online workshop with educators, examiners, controllers, and students to identify risks and opportunities of online proctoring for various stakeholders. We used the Ethical Matrix to structure the meeting. We compared the outcome of the workshop with the outcomes of a proctoring software pilot by examiners. We found that the two approaches led to complementary implementation criteria. The ethical session was less focused on making things work and more on transparency about conditions, processes, and rights. The ethical session also concentrated more on the values of all involved rather than on fraud detection effectiveness. DOI https://doi.org/10.18690/978-961-286-485-9.21 ISBN 978-961-286-485-9 Keywords: ethical matrix, digital ethics, value sensitive design, digital implementation, human values 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 284 1 Introduction The COVID-19 pandemic has accelerated the already existing trend of increased digitalization in government, commerce, and education. Studies show, for instance, that within education the use of technology enhanced learning has jumped forward in 2020 (van der Spoel et al., 2020). Educational institutions feel pressed to introduce digital solutions such as online proctoring. Despite concerns regarding human values such as privacy, distributive justice, autonomy, well-being, reputation, and reliability, the pressure for fast action may be so strong that it carries with it the risk of unintended negative consequences or backfiring (Stibe & Cugelman, 2016) and ethical blindness (Palazzo et al., 2013). To mitigate this risk, it is important to integrate explicit ethical discussion in the design and implementation process (Van den Hoven, 2017). One tool to support this, is the ethical matrix (Mepham, 2000; van der Stappen & van Steenbergen, 2020). The ethical matrix is a tool that stimulates a closer look at potential risks and opportunities of digital innovations. At the start of the first corona lockdown in March 2020, Dutch institutes of higher education were pressured to find alternative ways of taking exams. Having entire classes sit an exam in large halls under surveillance of a human proctor was no longer an option. Many courses turned to alternative ways of examination, such as having students write essays. But for some courses, the only viable option turned out to be taking the exam online, with the students sitting the exam from their homes, using their own devices. To prevent fraud during the exam, many institutions turned to online proctoring software. This involves recording the sitting and analysing the recordings afterwards for deviations that might indicate irregular behaviour. The use of this type of software immediately raised questions about privacy and potential unjust accusations. But other human values might be impacted as well. In this paper we address the following research question: How does the use of the ethical matrix influence the formulation of implementation criteria for proctoring software? To answer this question, we conducted a case study concerning the implementation of online proctoring software to enable online examination. We carried out a pilot test with teachers evaluating the proctoring software in parallel with conducting a workshop with various stakeholders in which we applied the ethical matrix to the case of online proctoring software. From both the pilot and the workshop we collected implementation criteria, which we then compared. M. van Steenbergen & I. van der Spoel: Online Proctoring: Adding Human Values to the Equation 285 After providing a theoretical background in the next section, we describe the research method we applied in this study in section 3. In section 4 we present and discuss our results, followed by conclusions in section 5. 2 Theoretical Background To integrate ethical consideration in the process of design and implementation of digital solutions, we combine the Value Sensitive Design approach (Friedman, Kahn & Borning 2006; Friedman & Hendry, 2019) with the ethical matrix (Mepham, 2000; Mepham et al., 2006; van der Stappen & van Steenbergen, 2020). 2.1 Value Sensitive Design Value Sensitive Design (VSD) originates from the nineties of the last century (Friedman & Hendry, 2019). It is “a theoretically grounded approach to the design of technology that accounts for human values in a principled and comprehensive manner throughout the design process” (Friedman, Kahn & Borning, 2006, p. 349). Human value is defined as “what is important to people in their lives, with a focus on ethics and morality (Friedman & Hendry, 2019, p. 4). In VSD not only the values of the actual users of a technological artefact are considered, but also the values of parties that may indirectly be impacted by the artefact. For example, bystanders, future generations, or individuals who cannot or will not use a service. The values of these stakeholders, as well as potential tensions between these values, are investigated from a conceptual, empirical, and technical perspective. At the conceptual level, the relevant stakeholders and values are identified and defined, based on existing literature and knowledge. At the empirical level, the actual perception of these values by the various types of stakeholders is studied by employing methods such as interviews, focus groups or experiments, leading to further elaboration of the values into norms. At the technical level, the values and norms are translated into technical design or implementation criteria or requirements. The three perspectives are iteratively employed. Over the years VSD has been applied to various domains, including the design of browsers (Friedman, Howe & Felten (2002), wind turbines and wind parks (Oosterlaken, 2015) and AI systems (Umbrello & van de Poel, 2021). 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 286 In their overview of 20 years of VSD, Friedman & Hendry (2019) discuss 17 instruments and techniques that have been used over the years by various VSD projects. These techniques are either unique to VSD or existing techniques that were adapted to use in VSD. Friedman & Hendry indicate that the list is not exhaustive and that new or newly adapted techniques and instruments are likely to be added over time. They provide, among others, as heuristics for the VSD research and design process to seek an iterative and integrative approach during the entire design process, to use a variety of empirical values-elicitation methods and to continue to elicit stakeholder values throughout the design process as well as apply a value sensitive evaluation process through the deployment phase (Friedman & Hendry, 2019). The ethical matrix as used in this study is an existing instrument adapted to the design and implementation of digital solutions, that can span the entire design, implementation, and deployment process (van der Stappen & van Steenbergen, 2020). 2.2 Ethical matrix The ethical matrix originates from agriculture and was developed to support rational ethical evaluation of biotechnological innovations in agriculture and food production (Mepham, 2000; Mepham et al., 2006). It was developed to support nonethicists in discussing the ethical implications of biotechnical innovations. In the rows of the original matrix the relevant stakeholder groups in biotechnology are distinguished (producers, consumers, treated organisms and biota). The columns distinguish the three fundamental ethical principles of autonomy (deontology), fairness (Rawls) and well-being (utilitarianism). When a biotechnical innovation is under consideration, the ethical matrix is used to discuss the impact of the innovation regarding each of the principles on each of the stakeholders. This impact is captured in the cells of the matrix. Figure 1 presents the original ethical matrix. The ethical matrix is developed for innovation in the food industry. Since its introduction it has been applied and adapted for various other fields (Vinnari, Vinnari & Kupsala, 2017; Schroeder & Palmer, 2003; (Kaiser, Millar, Thorstensen, & Tomkins, 2007; Kermisch & Depaus, 2018; Chatfield, 2018), among which digitalization in education (van der Stappen & van Steenbergen, 2020). M. van Steenbergen & I. van der Spoel: Online Proctoring: Adding Human Values to the Equation Respect for Producers Consumers Treated organisms Biota 287 Wellbeing Satisfactory income and working conditions Safety and acceptability Welfare Autonomy Managerial freedom Fairness Fair trade laws Choice Affordability Behavioural freedom Intrinsic value Conservation Biodiversity Sustainability Figure 1: A generic ethical matrix example (Mepham et al., 2006) In our study we use the adapted version of the ethical matrix as described in van der Stappen & van Steenbergen (2020). In this adaptation the stakeholders are the direct and indirect stakeholders that are identified in the conceptual perspective of VSD. The ethical principles of the original are replaced by the values as conceptualized in VSD (fig.2). In the cells the potential positive and negative impact of the digital solution on the values of the stakeholders is recorded. <Stakeholder> <Stakeholder> … <Value> <Impact> <Value> … Figure 2: VSD-adapted ethical matrix for digital innovation (van der Stappen & van Steenbergen, 2020) This version of the ethical matrix can be used to structure and capture a discussion among stakeholders about the potential positive and negative impacts of an intended digital innovation. Examples of its use in this manner are the design of an App supporting students performing preventive health checks (van der Stappen & van Steenbergen, 2020; van Steenbergen et al., 2019) and the design of an App supporting internship coaching to students (van der Stappen & van Steenbergen, 2020). 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 288 3 Research Method To investigate whether the use of the ethical matrix contributes to more value-driven implementation decisions, we conducted a case study at an institution of higher education. The case study concerned the implementation of online proctoring software to enable online examination. The proctoring software concerned makes recordings of the exam sitting of students at home through a webcam and by recording keystrokes. Before starting the exam, the student can be asked to turn her camera around to show the room in which she is taking the exam. During the exam, the software records the students’ screens, as well as the students themselves. The images and recordings of the sitting are analysed by an AI algorithm. Any divergent behaviour is reported for further inspection by the examiner. For this to work, the students must install a specific web browser as well as an online proctoring plug-in. Before implementing the selected online proctoring software, a pilot was conducted with 24 participants (20 teachers, 2 IT professionals, 2 members of the exam committee) who conducted an exam using the proctoring software. The aim of the pilot was to test the usability and effectiveness of the software. Each of the participants answered 12 questions. These included an overall grade for the software, any problems experienced by the participants and the degree of usability and effectiveness the participants attributed to the software. The results of the pilot were translated into implementation criteria which were categorized into requirements, advice, and considerations. To initiate an ethical discussion about the use of online proctoring and to create awareness about potential undesired consequences, an online workshop was conducted with 10 participants (1 teacher, 1 member of the exam committee, 2 IT professionals, 1 education logistics employee, 1 Digital Learning Environment manager, 2 privacy officers, 2 students). The workshop was led by one of the authors. The aim of the workshop was to identify risks and opportunities of online proctoring for various stakeholders. The ethical matrix was used to structure the discussion. The workshop started with an ethical matrix that already contained the main stakeholders and values. These were identified from literature and earlier discussions with experts (conceptual perspective of VSD). As starting point for the stakeholders, we identified the primary people involved in the processes of M. van Steenbergen & I. van der Spoel: Online Proctoring: Adding Human Values to the Equation 289 preparing, conducting, and evaluating examinations, both on site (as done before the pandemic) and online using the online proctoring software. The values were selected from lists of values relevant to digitalization (Friedman, Kahn & Borning, 2006; Royakkers et al., 2018), which were compared to views expressed in online posts and publications about the use of online proctoring. The values thus extracted were discussed with IT experts, a teacher, and a student from a different institute of higher education. In the workshop the stakeholders and values identified were validated and the potential impact of the online proctoring software on the identified values for the identified stakeholders was discussed. This was done via identifying potential harms and benefits of using the proctoring software. After the workshop, the results were laid down in a report which was validated by the participants. After validation by the participants, the authors translated the results into implementation criteria. These criteria, too, were categorized into requirements, advice, and considerations. The implementation criteria of both the pilot and the workshop were combined into one list of 39 criteria. From the list four types of criteria emerged: criteria concerned with facilitation (4), instruction and procedures (22), fraud and reputation (10) and logistics (3). To analyse the contribution of the ethical matrix, we compared the criteria that resulted from the workshop with the criteria that resulted from the pilot. 4 Results The average grade given by the pilot participants to the proctoring software was a 7. Problems reported concerned mainly technical problems with installing the required browser or plug-in. Most of the participants concluded that use of the software would be feasible, if necessary, though a few participants doubted its usefulness to detect all fraud. One participant expressed concerns about privacy and other ethical considerations. Based on the pilot 17 implementation criteria were formulated. In the ethical workshop we started with a matrix containing the stakeholders student, examiner, surveillant, educational institute, programme manager and IT department and the values equality, well-being, reputation, autonomy, privacy, sustainability, and trustworthiness. In the workshop the stakeholder of housemate was added, while 290 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE the value of sustainability did not generate response from the participants and was subsequently removed from the matrix. Table 1 contains descriptions of the values as well as examples of impact on one type of stakeholder, the student. In a similar manner impacts on the other stakeholders were formulated. Table 1: Values impacted by online proctoring software Value Description Equality Equal opportunity to successfully complete the exam Well-being Material and immaterial contentment Reputation Autonomy How one is regarded by others The degree to which persons can make their own choices in line with their being Privacy The right to keep certain parts of ones live (such as ideas, data, or personal circumstances) to oneself The value of the exam result, the reliability of the proctoring Trustworthiness Potential impact on student (examples) Differences in housing, physical disabilities, differences in available internet connection or hardware. Unease or stress from being observed and recorded, worries about identification requirements Unjust accusation of fraud Uncertainty about consequences of refusing online proctoring, mandatory installation of specific software Exposure of personal living sphere, risk of data breach Fear of exam result being considered less trustworthy by outside world, lack of trust in fraud detection process Based on the workshop, 25 implementation criteria were formulated to mitigate the potential negative impacts. We divided the criteria from both sources into three categories: requirements, advice, and considerations. Requirements are criteria that are considered hard prerequisites for implementation. They are not negotiable. Advice includes criteria that are strongly recommended, but not mandatory to proceeding. Considerations M. van Steenbergen & I. van der Spoel: Online Proctoring: Adding Human Values to the Equation 291 are criteria that are considered beneficial but are left to the implementation project to decide on. Examples of each category, one originating from the ethical matrix workshop and one originating from the pilot can be found in Table 2. Table 2: Examples of implementation criteria Type Requirement Requirement Advice Advice Consideration Consideration Criterium Students are given explicit and clear instructions for installing all required software Students without suitable hardware (laptop) are provided with a laptop by the institute Have students check all equipment beforehand Think about how to support examiners who also need to act as surveillant, because of an expected increase in workload Concerns are about the privacy aspects of the mandatory browser The reputation of students may be damaged if they are unjustly accused of fraud and records of the accusation are kept. Source Pilot Ethical matrix Pilot Ethical matrix Pilot Ethical matrix We categorized the criteria into four categories: criteria concerned with facilitation, with instruction and procedures, with fraud and reputation, and with logistics. Table 3 shows the distribution of criteria from the two sources over the categories. Table 3: Distribution of criteria over categories Category Facilitation Instruction and procedures Fraud and reputation Logistics Number of criteria from pilot 12 4 2 Number of criteria from workshop 4 12 7 2 A total of 43 implementation criteria were derived from the pilot and workshop together, with an overlap of 4 criteria that emerged from both the pilot and the workshop. Leaving 39 distinct criteria. 292 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Analysis of the two sets of criteria reveals a clear difference in focus between the pilot and the workshop. As expected, the criteria from the pilot were more functionoriented, whereas the criteria from the workshop were more value-oriented. Thus, only the workshop led to criteria regarding the facilitation of students who do not have access to the required hardware or to a suitable space to take the exam (related to the value of equality) and the facilitation of examiners who experience a sudden increase of workload because of the application of online proctoring software (related to the value of well-being). As for the category of instruction and protocol we found that the criteria from the pilot are focused on providing clear instructions to both students and employees regarding all phases of the examination process, ranging from timely preparation and testing of the technology beforehand to sitting the exam as well as the careful closure of the sitting. The criteria from the ethical workshop are focused on augmenting the protocol with protective measures for students, such as safe online identification, informed consent, right of inspection, dealing with physical disabilities and technical incidents during the exam sitting (related to the values of well-being and privacy). In addition, the workshop led to criteria concerning the long-term effects and feasibility of the online proctoring solution (related to the value of autonomy). In the category of fraud and reputation, the criteria from the pilot dealt with the fraud analysis effectiveness. The criteria from the workshop dealt with the risk to the reputation of both students (incorrect signalling by the algorithm of potential fraud) and institute (mistakes in the process, reduced perceived value of exam result, privacy breach). Finally, in the category of logistics, the pilot led to criteria concerning the suitability of online proctoring software for various types of exam, whereas the workshop focused on the feasibility of the entire process of online proctoring (value of wellbeing). M. van Steenbergen & I. van der Spoel: Online Proctoring: Adding Human Values to the Equation 5 293 Conclusion In this study we investigated whether the use of the ethical matrix as adapted by Van der Stappen & van Steenbergen (2020) enriched the outcomes of a functional pilot concerning the formulation of implementation criteria of online proctoring software. We expected that the explicit focus of the matrix on the values of various stakeholders would generate additional criteria. The analysis of the two lists of criteria generated from the pilot on the one hand and the workshop using the ethical matrix on the other hand, confirmed that the two approaches lead to different types of criteria. We conclude that the pilot and the ethical session are complementary. The pilot led to implications focused on function, whereas the ethical session provided insight into value-oriented requirements. We believe that in educational institutes value and function are equally important. By allocating a workshop to formulating ethical requirements and considerations early in the process, the importance of both function and values can be considered during the implementation. The ethical matrix appears to be a very useful instrument in facilitating and structuring discussions on values by non-ethicists such as educators and students. Our study concerns only one case which of course limits its potential for generalization. We believe, however, that the results are promising. Increased application of the ethical matrix in a diversity of contexts will hopefully lead to more comparative analyses in the vein of our study. Besides providing increasing insight in the effects of applying the ethical matrix, we are hopeful that it will also contribute to implementations that are more sensitive to the values of all stakeholders concerned. We intend to study how the ethical matrix can also be used to test this, by applying it again after having conducted online proctoring for some time, as proposed in Van der Stappen & Van Steenbergen (2020). We believe that the use of the ethical matrix might add the dimension of impact to the widely accepted dimensions of functional and non-functional requirements in digital application. 294 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Acknowledgements We would like to thank the participants in both the pilot and the workshop for their contribution to this study. References Chatfield, K. (2018). An Ethical Matrix for Traditional and Complementary Medicine. https://doi.org/10.1007/978-3-030-05300-0_3 Friedman, B., & Hendry, D. G. (2019). Value Sensitive Design: Shaping Technology with Moral Imagination. The MIT Press. Friedman, B., Howe, D. C., & Felten, E. (2002, January). Informed consent in the Mozilla browser: Implementing value-sensitive design. In Proceedings of the 35th annual hawaii international conference on system sciences (pp. 10-pp). IEEE. Friedman, B., Kahn, P. H., & Borning, A. (2006). Value Sensitive Design and Information Systems. In D. F. Galletta & P. Zhang (Eds.), Human-computer interaction and management information systems: Foundations (pp. 348–372). https://doi.org/10.1002/9780470281819.ch4 Mepham, B. (2000). A framework for the ethical analysis of novel foods: The ethical matrix. Journal of Agricultural and Environmental Ethics, 12(2), 165–176. https://doi.org/10.1023/A:1009542714497 Mepham, B., Kaiser, M., Thorstensen, E., Tomkins, S., & Millar, K. (2006). Ethical Matrix Manual. Kaiser, M., Millar, K., Thorstensen, E., & Tomkins, S. (2007). Developing the Ethical Matrix as a decision support framework: GM fish as a case study. Journal of Agricultural and Environmental Ethics, 20, 65–80. https://doi.org/10.1007/s10806-006-9023-8 Kermisch, C., & Depaus, C. (2018). The Strength of Ethical Matrixes as a Tool for Normative Analysis Related to Technological Choices: The Case of Geological Disposal for Radioactive Waste. Science and Engineering Ethics, 24(1), 29–48. https://doi.org/10.1007/s11948-017-9882-6 Oosterlaken, I. (2015). Applying value sensitive design (VSD) to wind turbines and wind parks: An exploration. Science and engineering ethics, 21(2), 359-379. Royakkers, L., Timmer, J., Kool, L., & van Est, R. (2018). Societal and ethical issues of digitization. Ethics and Information Technology, 20(2), 127-142. Schroeder, D., & Palmer, C. (2003). Technology assessment and the “ethical matrix.” Poiesis & Praxis, 1(4), 295–307. https://doi.org/10.1007/s10202-003-0027-4 Stibe, A., & Cugelman, B. (2016, April). Persuasive backfiring: When behavior change interventions trigger unintended negative outcomes. In International conference on persuasive technology (pp. 65-77). Springer, Cham. Umbrello, S., & van de Poel, I. (2021). Mapping value sensitive design onto AI for social good principles. AI and Ethics, 1-14. Van den Hoven, J. (2017). Ethics for the digital age: Where are the moral specs? In Informatics in the Future, pages 65–76. Springer International Publishing, Cham. Van der Spoel, I., Noroozi, O., Schuurink, E., & van Ginkel, S. (2020). Teachers’ online teaching expectations and experiences during the Covid19-pandemic in the Netherlands. European journal of teacher education, 43(4), 623-638. Van der Stappen, E., & van Steenbergen, M. (2020). The Ethical Matrix in Digital Innovation Projects in Higher Education. Vinnari, M., Vinnari, E., & Kupsala, S. (2017). Sustainability Matrix: Interest Groups and Ethical Theories as the Basis of Decision-Making. Journal of Agricultural and Environmental Ethics, 30(3), 349–366. https://doi.org/10.1007/s10806-017-9670-y HEALTH INFORMATION LITERACY: THE SAVING GRACE DURING TRAUMATIC TIMES MAEDEH GHORBANIAN ZOLBIN, KHADIJAH KAINAT & SHAHROKH NIKOU Åbo Akademi University, Faculty of Social Sciences, Business and Economics, Turku, Finland; e-mail: maedeh.ghorbanianzolbin@abo.fi, khadijah.kainat@abo.fi, shahrokh.nikou@abo.fi Abstract When it comes to engaging with health information in their daily lives, people face different challenges. In the context of COVID-19, the aim of this study is to determine whether health information literacy can assist people in making informed health-related decisions. An empirical study was conducted to investigate such an effect. Building on a dataset composed of 155 respondents, the research model was examined through structural equation modelling. The results showed that health information literacy – as an individual ability – not only influences health decision making but also has a direct impact on the awareness of the challenges imposed by the current pandemic situation. In addition, the results show that too much information leads to information fatigue, and consequently negatively impacts decision making. The findings of this paper show that the concept of health information literacy should be understood and developed separately from the health literacy concept. Theoretical contributions and practical implications are discussed. DOI https://doi.org/10.18690/978-961-286-485-9.22 ISBN 978-961-286-485-9 Keywords: COVID-19 awareness, health information literacy, information fatigue, information overload, patient decision-making 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 296 1 Introduction Being abreast of health and engagement in the health-related decision-making process is highly expected in the digital age and in digital health systems (Brabers et al., 2017). Some reasons – such as noticeable changes in the healthcare domain, a revolution in information and communication technologies (ICTs), the rapid distribution of health information, the worldwide expansion of the internet, and the availability of a tremendous amount of health-related information – have led to a higher level of patient confidence in managing their own health (Cullen, 2005; Weinhold & Gastaldi, 2015). To increase the quality and safety of the healthcare systems, the role of patient decision making, as a crux of patient-centred care, seems very critical (Godolphin, 2009). As opined by Seymour (2018), patient involvement in decision making enhances the attainment of favourable health outcomes (Seymour, 2018). However, this is not possible if patients lack an understanding of healthcare practices and issues. When patients lack knowledge and understanding, it becomes difficult for them to make appropriate health decisions independently, since they have nothing to offer (Rodríguez et al., 2013). This emphasises the significance of health information literacy (hereinafter HIL) skills, which enable individuals to enhance their understanding of healthcare issues. Individuals need to be able to understand healthcare processes, needs, and requirements in order to make informed health decisions (Cui & Chang, 2020). Additionally, the COVID-19 pandemic is exposing dysfunction and fragility in healthcare services. As such, it is critical to have the ability and required skills to find, evaluate, and use health-related information from the internet in order to make independent health-related decisions. In the case of the COVID-19 pandemic situation and in order to control the consequences, it is vital for individuals to develop a solid foundation of information and knowledge about the situation (Al-Dossary et al., 2020). Additionally, in the past, rational decisions were made based on all the available information. As such, one of the most critical challenges involved in making a decision was a lack of access to adequate information, while today, there is often far more information available than is required. With the growth in information technology and the internet, it is not surprising that patients now have access to an unlimited amount of health information. However, this overload of information adversely affects the process of independent decision making (Buchanan & Kock, 2001). The issue of information overload in the context of health has become exacerbated, owing to the expanding availability of relevant information, especially through online sources (Khaleel et al., M. Ghorbanian Zolbin, K. Kainat & S. Nikou: Health Information Literacy: The Saving Grace During Traumatic Times 297 2020). Once patients become overloaded from processing health-related content on the internet, they are likely to feel fatigued (Cao & Sun, 2018), which negatively affects their decision-making process. It seems that to make appropriate health decisions and to be able to take care of themselves within the digital health environment, patients need to have special skills and abilities, such as HIL (Krist et al., 2017). All in all, this study seeks to investigate how people’s health-related decision making, as a consequence of the global pandemic imposed by COVID-19, is influenced by their HIL skills and their awareness of COVID-19–related issues. The research question guiding this study is, “To what extent do people's HIL skills impact their healthrelated decision making, and what is the role of information overload and information fatigue in the process of making appropriate decisions?”. 2 Literature Review and Hypothesis Developments 2.1 Health Information Literacy and Patient Decision Making The combination of health literacy and information literacy leads to a new concept known as health information literacy. HIL refers to “the set of abilities needed to recognise a health information need, identify information sources and use them to retrieve relevant information, assess the quality of the information and its applicability to a specific situation, analyse, understand, and use the information to make appropriate health decisions” (Shipman, 2009, p. 294). HIL is very important for people since it helps them to understand how well they can take care of themselves and make decisions regarding issues concerning their health (ErikssonBacka et al., 2012). HIL skills may become increasingly important when the internet is the main source of finding information. The authors highlight the role of HIL skills in making appropriate health decisions. It is acknowledged that informationliterate people are able to make appropriate decisions regarding issues concerning their health (Cui & Chang, 2020). Additionally, Krist et al. (2017) highlighted the positive role of being information literate in making independent health decisions; therefore, we propose the following: 298 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE H1: Health information literacy has a positive effect on patient decision making 2.2 COVID-19 Awareness and Health Information Literacy As pointed out by Shehata (2020), dealing with COVID-19 requires HIL skills. In fact, when people are more health information literate, they can find and acquire more information and knowledge about COVID-19. The higher the level of HIL skills, the easier it is to gain awareness in the context of coronavirus. In other words, lack of HIL skills leads to a lesser awareness of COVID-19–related symptoms. The main reason is that such individuals are not able to find relevant information from reliable sources, such as reliable medical webpages (McCaffery et al., 2020). Consequently, a better grasp of the existing situation leads to better health decision making; hence, we propose the following: H2: Health information literacy has a positive effect on COVID-19 awareness H3: COVID-19 awareness has a positive effect on patient decision making 2.3 Information Overload and Health Information Literacy In the process of decision making, an ever-increasing amount of information is one of the main challenges (Falschlunger et al., 2016), especially when it comes to health information. The constant increase in the amount of information makes it difficult to organise and find high-quality information effectively. According to Ruff (2002), “Once capacity is surpassed, additional information becomes noise and results in a decrease in information processing and decision quality. Having too much information is the same as not having enough”. Information overload refers to too much data, which is received too fast for a person of average cognitive ability to absorb and process (Zhang et al., 2020). This concept is defined by Wilson (2001, p. 113) as “a perception on the part of the individual (or observers of that person) that the flow of information associated with work tasks is greater than can be managed effectively and a perception that overload in this sense creates a degree of stress for which his or her coping strategies are ineffective”. Therefore, people need special skills, such as HIL skills, to deal with massive amounts of information (Kurelović et al., 2016). Jiang and Beaudoin (2016) emphasised the importance of HIL skills in coping with information overload. They argued that health information literate people are able to combat overload. These studies also highlighted that individual M. Ghorbanian Zolbin, K. Kainat & S. Nikou: Health Information Literacy: The Saving Grace During Traumatic Times 299 who are not adroit at dealing with large amounts of information may experience overload. The higher the level of HIL skills in an individual, the better she or he can cope with information overload; hence, we propose the following: H4: Health information literacy has a negative effect on information overload 2.4 Information Fatigue and Information Overload Information fatigue is defined as the tendency for information users to back away from seeking more information when they become overwhelmed with too many pieces of content, too many contacts, too many information sources (such as websites), and too much time spent keeping up with these connections (Bright et al., 2015). Fatigue is more than feeling tired and drowsy. Thomas (1998) stated that when patients are inundated with a massive amount of health information, they may make more mistakes and misunderstand communication. In fact, an overwhelming amount of information leads to anxiety, exhaustion, and other symptoms of information fatigue. Once patients become overloaded from processing too much health-related content on the internet, they are likely to feel fatigued (Cao & Sun, 2018); hence, we propose the following: H5: Information overload has a positive effect on information fatigue 2.5 Information Fatigue and Patient Decision Making Prior studies have indicated that in the context of finding health-related information, information overload results in information fatigue, which has a diverse effect on patient decision making (Cao & Sun, 2018), since exhausted individuals will not be able to focus well and make informed decisions. Human behaviours can be altered owing to the exhaustion that results from overload. People can make hasty decisions or shut down when they have information fatigue, or their ability to make informed decisions can ultimately be depleted. As such, this may negatively impact their health-making decisions; hence, we propose: H6: Information fatigue has a negative effect on patient decision making 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 300 2.6 Patient Decision Making The growing number of studies that seek to identify effective factors relating to patients’ decision-making abilities indicated that this topic is of interest to professionals and scholars in various research fields (Brabers et al., 2017). Patients’ ability to make health decisions results in various positive outcomes, such as improved health outcomes, mortality reductions, improved satisfaction with the care experience, and reduced costs. In other words, the active engagement of patients in the process of making health decisions fosters their health and well-being and makes it possible for patients to live longer (Krist et al., 2017). The core dimension of a quality modern health service is patient-centred care. Active participation in the process of making health decisions demands well-informed patients. They should be able to access up-to-date information about their care, and the potential outcomes of their treatment. Additionally, a layer of vigilance and protection against errors can be created by making informed decisions (Sketcher-Baker, 2017). Patient decision making can be affected by various factors, and this study aims to focus on some of these. In summary, we argue that patient decision making is impacted not only by traditional social media factors such as information overload and information fatigue but also by individual-level HIL and contextual (e.g. COVID-19 awareness) related factors that equally impact the health-related decision–making process (Figure 1). Figure 1: Proposed Conceptual Model M. Ghorbanian Zolbin, K. Kainat & S. Nikou: Health Information Literacy: The Saving Grace During Traumatic Times 3 Research Methodology 3.1 Instrument and Data Collection 301 All items for measuring constructs were derived from previously validated measures, and if needed, some changes were made to fit the study context. Items for measuring COVID-19 awareness (5 items) were derived from Alea et al. (2020, p. 134-136) and McCaffery et al. (2020). Items for measuring information overload (12 items) and information fatigue (8 items) were derived from Whelan et al. (2020) and Norman and Skinner (2006), respectively. Items for measuring HIL (7 items) were derived from Norman and Skinner (2006). Finally, we used 5 items from Seo et al. (2016) to measure patient decision making. We used an online survey to collect data during the time of the COVID-19 pandemic: March 2021. We sent more than 230 invitations, using different channels, such as authors’ personal networks and social media platforms. In total, we received 155 complete responses. 4 Results 4.1 Descriptive Results The respondents’ ages fell within the ranges of 18–25 years (12.3%), 26–35 years (47.7%), 36–45 years (20.6%), 46–55 years (18.1%), and over 55 years (1.3%). The sample comprised 78 females, 67 males, and 10 subjects who chose not to reveal their gender. The educational level of the respondents was as follows: high school diploma (n = 6), bachelor’s degree (n = 32), master’s degree (n = 85), and PhD degree (n = 29), and 3 indicated other educational attainments. With regard to the current occupational status of the respondents, most were students (n = 69), 12 respondents were employed, 13 were non-employed, 54 were self-employed, and 7 held some other occupation as their occupation. In the sample, there were 64 Finnish and 91 non-Finnish respondents. Moreover, 144 respondents lived in Finland, and 11 lived in another country. When we asked the respondents to indicate the social networking sites (SNSs) they used to access health-related information, they reported the following: the use of Facebook was mentioned by 91, Instagram by 70, Twitter by 41, and Telegram by 39 respondents, whereas the least-used SNSs were Snapchat (n = 11) and TikTok (n = 12). We also asked the participants to indicate how much time they spend per day searching and sharing health-related information on SNSs. They reported (less than 30 minutes, n = 73), (from 30 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 302 minutes to one hour, n = 42), (from one to two hours, n = 19), and (more than two hours, n = 9), and interestingly, 12 respondents indicated that they do not use SNSs for health-related information. 4.2 Measurement and Conceptual Results PLS-SEM (partial least squares structural equation modelling) was used to investigate path relationships in the proposed conceptual model. The results showed that many items had sufficient factor loadings above the threshold value of 0.70. In total, we used 37 items to measure the five constructs and retained 27 items for further analysis. All internal reliability and validity assessments, i.e. Cronbach’s alpha (α), and composite reliability (CR), for all constructs were in the range of the recommended values of 0.70 and 0.70, respectively (Hair et al., 2019) (see Table 1). The highest CR value was for information fatigue (0.89) and the lowest was for patient decision making (0.82). Also, the highest value for Cronbach’s alpha (α) was for information fatigue (0.90), and the lowest value was for patient decision making (0.87). As shown in Table 2, all the average value extracted (AVE) values were above the recommended threshold of 0.50 (Hair et al., 2019), such that the highest was for patient decision making (0.80) and the lowest was for HIL (0.68). Table 1: Descriptive Statistics Construct COVID_19 awareness Patient decision making Item COV_A 1 COV_A 2 COV_A 3 COV_A 4 COV_A 5 DECM3 DECM4 DECM5 HIL1 Loading s 0.87 0.86 0.87 0.86 0.88 0.88 0.90 0.89 0.81 Mea n 4.63 4.48 4.36 4.34 4.48 2.93 2.81 1.92 3.46 Std . CR AV E 0.89 0.85 0.75 0.87 0.82 0.80 0.88 0.87 0.68 (α) 0.68 0.79 0.86 0.96 0.87 1.36 1.42 1.30 1.31 M. Ghorbanian Zolbin, K. Kainat & S. Nikou: Health Information Literacy: The Saving Grace During Traumatic Times Health information literacy Information fatigue Information overload 4.3 HIL2 HIL3 HIL5 HIL6 HIL7 INFA2 INFA4 INFA5 INFA6 INFA7 INFA8 INOV1 INOV12 INOV2 INOV3 INOV4 INOV5 INOV9 0.86 0.84 0.83 0.74 0.87 0.83 0.86 0.88 0.92 0.92 0.93 0.91 0.77 0.91 0.88 0.91 0.89 0.73 3.32 3.39 3.01 3.36 3.39 3.29 3.12 2.95 3.06 3.06 3.01 3.06 2.94 3.02 3.03 3.11 2.97 2.91 303 1.29 1.25 1.27 1.28 1.18 1.30 1.29 1.36 1.33 1.30 1.28 1.21 1.26 1.30 1.32 1.36 1.33 1.21 0.90 0.89 0.79 0.84 0.85 0.73 Discriminant Validity To establish the discriminant validity, we examined the AVE scores, and all AVE values were lower than the shared variance for all model constructs; therefore, the discriminant validity was established in this research (Fornell & Larcker, 1981). Table 2: Discriminant validity (Fornell and Larcker criterion) Constructs COVID 19 challenges Health information literacy Information fatigue Information overload Patient decision making 4.4 CAWA 0.87 0.32 -0.01 -0.05 0.15 HIL 0.83 -0.20 -0.18 0.53 INFA INOV PDM 0.89 0.57 -0.27 0.85 -0.22 0.89 Structural Results The structural results showed that the independent variable, i.e. patient decision making, has been explained by a variance of 38%. The predictor variables, i.e. information fatigue and COVID-19 awareness, have been explained by variance of 304 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 36% and 12%, respectively. The SEM results showed that HIL had a direct and strong positive effect (β = 0.57; t = 6.001; p = 0.001) on patient decision making; thus, H1 was accepted in the model. The results also provided theoretical support for H2, where it was expected that HIL positively affects COVID-19 awareness. The SEM results showed that this path was significant (β = 0.35; t = 4.211; p = 0.001). Moreover, the results showed that HIL had a significant and – as we expected – negative impact on information overload (β = -0.19; t = 2.039; p = 0.05). This indicates that the respondents with higher HIL are more capable of distinguishing between true and fake information; thus, they are less impacted by indecisiveness in regard to health-related information overload. Hence, H4 was supported in the model. However, the results did not provide theoretical support for H3, where we postulated that COVID-19 awareness affects patient decision making. The SEM results showed that, as we predicted, information overload had a positive and significant effect (β = 0.60; t = 9.144; p = 0.001) on information fatigue, thus providing theoretical support to accept H5. Similarly, the SEM results showed information fatigue (β = -0.17; t = 2.006; p = 0.05) had a significant influence on patient decision making, but the effect, as expected, was negative. Thus, H6 was supported by the model. Figure 2: Structural model results. Note: *p < 0.05. **p < 0.01. ***p < .001 5 Discussions and Conclusion This study focuses on the relationship between health information literacy and patient decision making in the context of the COVID-19 pandemic, examining how patient utilises digital health services. The COVID-19 pandemic has severely limited patients’ access to health information, as the traditional methods used to acquire information – like face-to-face visits with healthcare providers – are no longer an M. Ghorbanian Zolbin, K. Kainat & S. Nikou: Health Information Literacy: The Saving Grace During Traumatic Times 305 option. Therefore, digital health services and digital health service platforms seem far more suitable (Gálvez et al., 2020). However, using these kinds of digital services to find the required information demands special skills. As highlighted by Seo et al. (2016), essential skills – such as the ability to seek, find, evaluate, and use health information from digital platforms – may affect patients’ decision-making preferences. The results of this study are consistent with Seo et al.’s (2016) findings. In the present research we show that individuals with higher HIL skills may have a considerable advantage when seeking health information from digital sources, and may therefore be able to make more informed health decisions, when faced with the limitations (e.g. having face-to-face interactions with doctors) imposed by COVID19 restrictions. In addition, the results reveal that a higher level of HIL skill leads to an improvement in individuals’ consciousness regarding COVID-19. HIL skills augment people's knowledge regarding the seriousness of the epidemic and the dangers it poses, along with possible preventive strategies. Since most scientific and reliable information regarding COVID-19 is uploaded to digital platforms, we argue that to take advantage of the available information, HIL is the saving grace during this traumatic time. However, such pure knowledge and skills do not in themselves lead to the ability to make an independent and appropriate health decision during challenging times such as the COVID-19 pandemic, as these kinds of decisions demand a higher level of medical and pharmaceutical knowledge. In addition, digital health platforms may act like a double-edged sword. While these platforms provide individuals with noteworthy health information, the huge amount of supplied health information can lead to health information overload. The results of this research show that patients’ decision making can be retrogressed by the exhaustion that results from being overloaded with information from online channels. These results are consistent with those obtained by Cao and Sun (2018). Based on our own findings, HIL skills empower people to control their uptake of the available information and to cope with the overload of health information. This means that higher HIL skills lead to a lesser overload of health information. This result is consistent with the results obtained by Jiang and Beaudoin (2016). This study provides some practical implications. too. For example, a patient’s decision-making ability – when viewed in the light of high HIL skills – reduces the burden on the healthcare providers and shares the risk of decision making between patients and healthcare professionals. Additionally, the ability to make informed health decisions reduces the time patients 306 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE spend accessing physical health services, such as emergency rooms, which benefits both governments and patients. So, empowering individuals with HIL skills is an acceptable solution to facilitate an informed decision-making process in regard to digital health systems. This paper has some limitations. The findings may not be applicable in another context, as we studied decision making in the context of healthrelated issues during the COVID-19 pandemic. Thus, we cannot claim that the results can be generalised to other contexts. In addition, this study does not consider age or education distribution in its multi-group analysis. Moreover, we conceptualised that fatigue, as a result of information overload, negatively impacts health-related decision making, while recognising that other variable, such as individual characteristics or peer pressure, can also affect fatigue. References: Al-Dossary, R., Alamri, M., Albaqawi, H., Al Hosis, K., Aljeldah, M., Aljohan, M., Almadani, N., Alrasheadi, B., Falatah, R., & Almazan, J. (2020). Awareness, Attitudes, Prevention, and Perceptions of COVID-19 Outbreak among Nurses in Saudi Arabia. International Journal of Environmental Research and Public Health, 17(21), 8269. Alea, L. A., Fabrea, M. F., Roldan, R. D. A., & Farooqi, A. Z. (2020). Teachers’ Covid-19 Awareness, Distance Learning Education Experiences and Perceptions towards Institutional Readiness and Challenges. International Journal of Learning, Teaching and Educational Research, 19 (6), 127-144. Brabers, A. E., Rademakers, J. J., Groenewegen, P. P., Van Dijk, L., & De Jong, J. D. (2017). What role does health literacy play in patients' involvement in medical decision-making? PLOSONE, 12 (3). Bright, L. F., Kleiser, S. B., & Grau, S. L. (2015). Too much Facebook? An exploratory examination of social media fatigue, Computers in Human Behaviour, 44, 148-155. Buchanan, J., & Kock, N. (2001). Information overload: A decision making perspective. In Multiple criteria decisions making in the new millennium (pp. 49-58). Springer, Berlin, Heidelberg. Cao, X., & Sun, J. (2018). Exploring the effect of overload on the discontinuous intention of social media users: An S-O-R perspective. Computers in Human Behaviour, 81, 10–18. Cui, X., & Chang, C. T. (2020). Distribution Dynamics, Regional Differences, and Convergence of Elderly Health Levels in China. Sustainability, 12 (6), 2288. Cullen, R. (2005). Empowering patients through health information literacy training. Library Review, 54 (4), 231- 244. Eriksson-Backa, K., Ek, S., Niemelä, R., & Huotari, M.-L. (2012). Health information literacy in everyday life: A study of Finns aged 65–79 years. Health Informatics Journal, 18(2), 83–94. Falschlunger, L., Lehner, O., & Treiblmaier, H. (2016). InfoVis: The Impact of Information Overload on Decision Making Outcome in High Complexity Settings. SIGHCI 2016 Proceedings. 3. Fornell, C. G., & Larcker. D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50. Gálvez, A., Romero, B., Trigo, S., & Serrano, M. (2020). Older people, dependency, and vulnerability in the coronavirus pandemic: emergence of social and health integration. Enfermería Clinica, 31, S18-S23. DOI: 10.1016/j.enfcli.2020.05.004. Godolphin, W. (2009). Shared Decision-Making. Healthcare Quarterly, 12(Spec No Patient), e186e190. doi:10.12927/hcq.2009.20947. M. Ghorbanian Zolbin, K. Kainat & S. Nikou: Health Information Literacy: The Saving Grace During Traumatic Times 307 Hair, J. F., Risher, J. J., Sarstedt, M., & Ringle. C. M. (2019). When to use and how to report the results of PLS-SEM. European Business Review, 31(1), 2-24. Jiang, S., & Beaudoin, C. E. (2016). Health literacy and the internet: An exploratory study on the 2013 HINTS survey. Computers in Human Behaviour, 58, 240–248. Khaleel, I., Wimmer, B. C., Peterson, G. M., Zaidi, S. T. R., Roehrer, E., Cummings, E., & Lee, K. (2020). Health information overload among health consumers: A scoping review. Patient Education and Counselling, 103(1), 15-32. Krist, A. H., Tong, S. T., Aycock, R. A., & Longo, D. R. (2017). Engaging patients in decision-making and behaviour change to promote prevention. Information Services & Use, 37 (2), 105-122. Kurelović, E. K., Tomljanović, J., & Davidović, V. (2016). Information overload, information literacy and use of technology by students. International Journal of Educational and Pedagogical Sciences, 10(3), 917-921. McCaffery, K. J., Dodd, R. H., Cvejic, E., Ayre, J., Batcup, C., Isautier, J. M. J., Copp, T., Bonner, C., Pickles, K., Nickel, B., Dakin, T., Cornell, S., & Wolf, M. S. (2020). Health literacy and disparities in COVID-19–related knowledge, attitudes, beliefs, and behaviours in Australia. Public Health Research & Practice, 30 (4): e30342012. Norman, C. D., & Skinner, H. A. (2006). eHEALS: the eHealth literacy scale. Journal of medical Internet research, 8(4), e27. Rodríguez, V., Andrade, A. D., García-Retamero, R., Anam, R., Rodríguez, R., Lisigurski, M., Shari, J., & Ruiz, J. G. (2013). Health Literacy, Numeracy, and Graphical Literacy Among Veterans in Primary Care and Their Effect on Shared Decision Making and Trust in Physicians. Journal of Health Communication, 18(sup1), 273–289. Ruff, J. (2002). Information Overload: Causes, Symptoms and Solutions. (pp. 1-13). Harvard Graduate School of Education’s Learning Innovations Laboratory (LILA). Seo, J., Goodman, M. S., Politi, M., Blanchard, M., & Kaphingst, K. A. (2016). Effect of Health Literacy on Decision-Making Preferences among Medically Underserved Patients. Medical Decision Making, 36(4), 550–556. Seymour, J. (2018). The Impact of Public Health Awareness Campaigns on the Awareness and Quality of Palliative Care. Journal of Palliative Medicine, 21, S30-S36. Shehata, A. (2020). Health Information behaviour during COVID-19 outbreak among Egyptian library and information science undergraduate students. Information Development, 026666692097618. doi:10.1177/0266666920976181. Shipman, J. P., Kurtz-Rossi, S., & Funk, C. J. (2009). The Health Information Literacy Research Project. Journal of Medical Library Association, 97 (4), 293–301. Sketcher-Baker, K. (2017). Guide to Informed Decision-making in Health Care. Second edition, Australia. From: https://www.health.qld.gov.au/__data/assets/pdf_file/0019/143074/icguide.pdf. Thomas, S. P. (1998). Editorial: Information Fatigue Syndrome - Is there an Epidemic? Issues in Mental Health Nursing, 19 (6), 523–524. Weinhold, I., & Gastaldi, L. (2015). From shared decision making to patient engagement in health care processes: The role of digital technologies. In Challenges and opportunities in health care management (pp. 185-196). Springer, Cham. Whelan, E., Islam, N., & Brooks, S. (2020). Is boredom proneness related to social media overload and fatigue? A stress–strain–outcome approach. Emerald Insight, 30 (3), 869-887. Wilson, T. D. (2001). Information overload: implications for healthcare services. Health Informatics Journal, 7 (2), 112-117. Zhang, X., Ding, X., & Ma, L. (2020). The influences of information overload and social overload on intention to switch in social media. Behaviour & Information Technology, 1–14 308 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE CREATING A TAXONOMY OF BUSINESS MODELS FOR DATA MARKETPLACES MONTIJN VAN DE VEN,1 ANTRAGAMA EWA ABBAS,2 ZENLIN KWEE2 & MARK DE REUVER2 1 Eindhoven University of Technology, Department of Industrial Engineering and Innovation Sciences, The Netherlands; e-mail: m.r.v.d.ven@tue.nl 2 Delft University of Technology, Faculty of Technology, Policy and Management, The Netherlands; e-mail: a.e.abbas@tudelft.nl, z.roosenboom-kwee@tudelft.nl, g.a.dereuver@tudelft.nl Abstract Data marketplaces can fulfil a key role in realizing the data economy by enabling the commercial trading of data between organizations. Although data marketplace research is a quickly evolving domain, there is a lack of understanding about data marketplace business models. As data marketplaces are vastly different, a taxonomy of data marketplace business models is developed in this study. A standard taxonomy development method is followed to develop the taxonomy. The final taxonomy comprises of 4 meta-dimensions, 17 business model dimensions and 59 business model characteristics. The taxonomy can be used to classify data marketplace business models and sheds light on how data marketplaces are a unique type of digital platforms. The results of this research provide a basis for theorizing in this rapidly evolving domain that is quickly becoming important. DOI https://doi.org/10.18690/978-961-286-485-9.23 ISBN 978-961-286-485-9 Keywords: data marketplace, business model, data trading, taxonomy, dimensions 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 310 1 Introduction As an organization may not always possess the required data to carry out or improve their processes and services, they may wish to purchase these data from other organizations. A data marketplace can enable data purchase by providing a digital platform through which individuals and organizations can exchange data (Stahl et al., 2016; Schomm et al., 2013). In contrast to most other platforms, where data is utilized to improve services or manage customer relationships, on data marketplaces data is actually the product itself (Spiekermann et al., 2018). Despite the potential benefits of data marketplaces, in practice, very little data is shared or traded via these platforms (Koutroumpis et al., 2020). In general, little research has been conducted on data marketplaces (Thomas & Leiponen, 2016) and data marketplace business models in particular (Fruhwirth et al., 2020; Spiekermann, 2019). As a foundation for research on a novel and diverse phenomenon, a first step is developing a taxonomy, because it can be used to classify data marketplace business models (Lambert, 2015). Two taxonomies of data marketplace business models are currently available in the literature, i.e. those proposed by Fruhwirth et al. (2020) and Spiekermann (2019) respectively. The existing taxonomies (Fruhwirth et al., 2020; Spiekermann, 2019), however, overlook two main areas which this study aims to address. Firstly, the two studies mostly focus on the classification of multilateral data marketplaces, while in practice data trading often happens via bilaterally negotiated contracts (Koutroumpis et al., 2017). Secondly, the studies view data marketplace business models from a single firm perspective. However, data marketplaces take part in a network of stakeholders involving data analysts, application vendors, algorithm developers, data providers, consultants, licensing entities, and platform providers (Muschalle et al., 2012; Thomas & Leiponen, 2016). To address the above two under-researched areas, this study develops a taxonomy from a multi-stakeholder perspective on business models. We define a business model as the way a network of stakeholders creates and captures value (Bouwman et al., 2008). This multi-stakeholder perspective allows us to understand the business model for the data ecosystem as a whole. Moreover, we define a data marketplace as a digital system where data is traded as an economic good, that connects data M. van de Ven, A. E. Abbas, Z. Kwee & M. de Reuver: Creating a Taxonomy of Business Models for Data Marketplaces 311 buyers and data sellers, and facilitates data exchange and financial transactions (Koutroumpis et al., 2020; Stahl et al., 2016). In this way, the term data marketplace is broadly interpreted, to go beyond the already studied multilateral data marketplaces. The remainder of this paper is structured as follows: in Section 2, the taxonomy development process is described. Subsequently, Section 3 presents the developed taxonomy on the basis of the identified business model dimensions. Lastly, Section 4 provides a conclusion of the research and discusses the scientific contribution, practical relevance and limitations of this study. 2 Taxonomy development process To develop the taxonomy, we follow the taxonomy development method by Nickerson et al (2013). Meta-characteristics of the taxonomy are defined first. Next, the thirteen ending conditions suggested by Nickerson et al. (2013) were employed. After that, multiple iterations are conducted to refine the taxonomy. 2.1 Meta-characteristics Meta-characteristics function as overarching characteristics of the object of interest (Nickerson et al., 2013). We use the four business model domains of the STOF ontology (i.e. Service, Technology, Organization and Finance domains as in Bouwman et al. (2008)) as the meta-characteristics of the taxonomy, as the STOF approach takes service as a unit of analysis and employs a multi-stakeholder perspective on business models (Bouwman et al., 2008). This perspective is wellsuited for data marketplaces because a network of business actors are involved in and around data marketplaces (Muschalle et al., 2012; Thomas & Leiponen, 2016). 2.2 Literature search We collected dimensions and characteristics from existing literature. A literature search was conducted to discover existing knowledge about the object of interest (Webster & Watson, 2002). Google Scholar was consulted to find relevant academic sources, using the search string “Data marketplaces” AND (“Business models” OR “Digital platform” OR “Digital marketplace” OR “Data trading” OR “Data 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 312 economy”). This string resulted in a total of 359 articles. The articles were scanned based on their title, abstract and relevance, which resulted in a preliminary selection of 17 articles. After making this pre-selection of articles, the full text of the articles was read, which resulted in the exclusion of seven articles that did not explicitly discuss dimensions or characteristics of data marketplace business models. Based on cross-reference of the selected articles, we added four additional articles that presented topic-relevant business model taxonomies to the list. The literature review resulted in a final set of 14 articles as presented in Table 1. Table 1: Overview of classifications relevant to data marketplace business models Author(s) (Year) Schomm et al. (2013) Stahl et al. (2014a) Stahl et al. (2014b) Type Dimensions of data providers and data marketplaces Stahl et al. (2017) Stahl et al. (2016) Classification of electronic marketplaces Koutroumpis et al. (2017) Market designs for data marketplaces Muschalle et al. (2012) Pricing models for data marketplaces Fricker and Maksimov (2017) Spiekermann (2019) Taxonomy of data marketplace business models Fruhwirth et al. (2020) Bock and Wiener (2017) Taxonomy of digital business models Täuscher (2016) Taxonomy of marketplace business models Täuscher and Laudien (2018) Hartmann et al. (2014) Taxonomy of data-driven business models 2.3 Citations (dated 14 April 2020) 73 14 16 12 30 19 74 8 9 1 22 6 153 131 Selection of empirical cases To account for the practical relevance of the taxonomy, we conducted desk research between May and July 2020 to build a database of empirical cases of data marketplaces. Sixty-five websites of data marketplaces that were mentioned in existing studies of data marketplaces were included in the database (Carnelley et al., M. van de Ven, A. E. Abbas, Z. Kwee & M. de Reuver: Creating a Taxonomy of Business Models for Data Marketplaces 313 2016; Koutroumpis et al., 2020, 2017; Prlja, 2019; Spiekermann, 2019; Stahl et al., 2016). The data discovery platform datarade.ai, a website that provides an overview of over 1,800 data providers and 200 data platforms, was consulted. In total, the search in the repository of datarade.ai resulted in the discovery of an additional set of 187 data marketplaces. To complement the database with cases that were not considered in the existing studies or part of the datarade.ai database, we used the search engine Google to further conduct a desk research. The keywords “data marketplace”, “data market” and “data trading platform” were applied during the search. From this search, fifteen data marketplaces were added to the database. Four criteria were applied to the companies that resulted from the desk research to ensure the relevance of the empirical cases. Firstly, data marketplaces that turned out to be shut down, after inspecting the website, were excluded from the database. Secondly, the companies that did not fit this study's definition of a data marketplace were excluded. This implied that data marketplaces that only provided open data, such as governmental organizations and NGOs, were excluded as these platforms adopt non-commercial business models (Carnelley et al., 2016). Thirdly, data marketplaces that did not have an English version of their website were excluded. Lastly, data marketplaces that were still in the construction phase were excluded. The application of these four criteria to the cases led to the exclusion of 89 cases. Therefore, the final database consisted of 178 cases of data marketplaces. To analyse the business models of existing data marketplaces, a sample was taken from the database of cases. The empiricist philosophy of classification prescribes to build a taxonomy based on the consideration of many characteristics (Lambert, 2015). Therefore, the cases of data marketplaces in the database were first segmented into groups based on the similarity of their characteristics. The website of datarade.ai categorized data marketplaces based on the type of data traded on the platform. This variable was selected as the leading sampling variable to explore the variation between cases in the database. Based on the available information on datarade.ai and an inspection of the case's website, 138 cases could be labelled by type of data traded on the platform. The remaining 40 cases in the database were labelled based on the classification of the cases in the existing studies (Fruhwirth et al., 2020; Spiekermann, 2019) and through the manual inspection of the companies’ website. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 314 The segmentation of data marketplaces by type of data traded on the platform reveals that some segments of data marketplaces in the database were overrepresented. This was especially the case for audience data marketplaces, that constituted over 60% of the cases (N=112). Audience data is combined data about a certain target group of customers, which is much sought after by marketeers. To compensate for the overrepresentation, instead of random sampling, a disproportionate stratified sample of N=40 cases was taken from the database (Daniels, 2011). The final sample of 40 data marketplaces consisted of ten data marketplaces on which any type of data is traded (25% of the sample), four financial and alternative data marketplaces (10%), nine audience data marketplaces (22.5%), six sensor and mobility data marketplaces (15%), four geo data marketplaces (10%) and seven health and personal data marketplaces (17.5%) (available here: https://doi.org/10.4121/14679564.v1). 2.4 Design iterations Our design phase started with a conceptual-to-empirical approach (Nickerson et al., 2013). In these design iterations, the concepts derived from the literature were compared to the sample of empirical cases. Information on the business models of the cases was collected from publicly available sources such as company websites and news articles. The discovered information fragments were coded using the dimensions and characteristics from the literature review as a guideline (See Table 2). After each case, newly identified characteristics were added to the dimensions of the taxonomy. After two conceptual-to-empirical design iterations, two empiricalto-conceptual iterations were conducted, which resulted in the addition of two dimensions to the taxonomy: enterprise data marketplace and data processing and analytics tools. After every design iteration, the ending conditions were checked. After two conceptual-to-empirical iterations and two empirical-to-conceptual iterations, both the objective and subjective ending conditions were met. Finally, to test the usefulness of the taxonomy, three mini-case studies were conducted on empirical cases of data marketplaces that were not part of the sample, i.e. Wibson, QueXopa and Advaneo respectively. The taxonomy was found to be useful, as the business models of the cases could be classified based on public information about the cases. M. van de Ven, A. E. Abbas, Z. Kwee & M. de Reuver: Creating a Taxonomy of Business Models for Data Marketplaces 315 Table 2: Coding examples for the value proposition dimension Characteristic Easy data access and/or tooling Case Open:Factset Marketplace Knoema DAWEX Secure data sharing Snowflake Amazon DSP High quality and unique data 3 Datax Quote “FactSet creates data and technology solutions for investment professionals around the world, providing instant access to financial data and analytics that investors use to make crucial decisions.” “Knoema is a cloud-based data technology platform that makes data accessible and delivers intelligent data tools to enable data access and discovery.“ “With Dawex Global Data Marketplace providers can highlight the value of their data while retaining full control over the distribution and configuration of usage rights.” “Unlike other data marketplaces, Snowflake Data Marketplace leverages Snowflake's Secure Data Sharing technology, which means no data transfer and no need to squeeze data through APIs or use cloud storage.” “Use exclusive Amazon audiences to reach your ideal audience on and off Amazon.” “Quality business data for better sales leads – Any campaign is only as good as the data it’s built on – so make sure yours is the best. Taxonomy of Data Marketplace Business Models The final taxonomy consists of 4 meta-dimensions, 17 dimensions and 59 characteristics and is presented in Table 3. In the following sections, the data marketplace business model dimensions are discussed per meta-dimension (STOF). Table 3: Taxonomy of data marketplace business models Service domain Dimension Value proposition Enterprise data marketplace Characteristics Easy data access and/or tooling Yes Secure data sharing High quality and unique data No All services in a single platform 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 316 Data processing and analytics tools Marketplace participants Finance domain Organizatio n domain Technology domain Industry domain Yes No B2B Any data Geo data Geographic scope Global Time frame Static Platform architecture C2B Financial & Alternative data Any Health & Sensor & Audience Personal Mobility data data data Regional Up-to-date Local (Near) real-time Centralized Multiple Decentralized Data access API Download Specialized software Multiple options Data source Selfgenerated Customer provided data Acquired data Multiple sources Matching mechanism One-to-one One-to-many Many-to-one Many-toMany Platform sponsor Private Revenue model Commissions Subscriptions Pricing model Freemium Pay-per-use Flat fee tariff Package based pricing Multiple Price discovery Set by buyers Negotiation Set by marketplace provider Set by external sellers Consortium Independent Usage fees Asset sales Smart contract Yes No Payment currency Fiat money Cryptocurrency M. van de Ven, A. E. Abbas, Z. Kwee & M. de Reuver: Creating a Taxonomy of Business Models for Data Marketplaces 3.1 317 Service domain The value proposition is a statement that indicates the proposed value that an enterprise intends to deliver to the customer (Bouwman et al., 2008). It often describes how customers can benefit from using the service and how the enterprise aims to set itself apart from the competition. Some data marketplaces offer an enterprise data marketplace as an additional service. An enterprise data marketplace functions as a private data marketplace that enables organizations to share data within the company or with external partners, such as suppliers and customers, that are invited by the focal organization. The data processing and analytics tools characteristic indicates whether a data marketplace offers additional tooling on top of the data, to perform analytics activities on proprietary data or data bought via the platform. The marketplace participants dimension describes the type of participants that are allowed to register and exchange data on the marketplace. While most data marketplaces allow the exchange of any type of data on their marketplace, some data marketplaces focus their data offering towards a specific industry domain. The geographic scope describes the regions in which the data marketplace is operating and available to users (Täuscher & Laudien, 2018; Täuscher, 2016). The time frame dimension describes whether or not the data needs frequent updates to maintain the relevancy of the data (Schomm et al., 2013). 3.2 Technology domain Data marketplaces may adopt two types of platform architectures: centralized or decentralized (Koutroumpis et al., 2017). In the centralized approach, data providers offer their data products via a predefined centralized location on the platform, such as a cloud repository. In decentralized platforms, the data products remain at the data provider and the data is traded using distributed ledger technologies such as blockchain. Platform providers may provide access to the data in a number of different ways (Schomm et al, 2013). The data source dimension describes the origin where the data was gathered or collected by the data marketplace platform (Hartmann et al., 2014). 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 318 3.3 Organization domain The matching mechanism determines the number of parties on each side of the platform (Koutroumpis et al., 2017). Besides multilateral data marketplaces, three more types of data marketplaces exist: bilateral data marketplaces (one-to-one matching), dispersal data marketplaces (one-to-many matching), and harvest data marketplaces (many-to-one matching). The platform sponsor can be a private individual or a group, a consortium of buyers or sellers, or an individual or a group that is independent of other market players (Stahl et al., 2017, 2016). 3.4 Finance domain The revenue dimension describes the main source of revenue for a data marketplace (Spiekermann, 2019; Täuscher & Laudien, 2018; Täuscher, 2016). The pricing model specifies how the final price for the data good or service is composed (Fruhwirth et al., 2020; Schomm et al., 2013; Spiekermann, 2019; Täuscher & Laudien, 2018; Täuscher, 2016). A price discovery function allows buyers and sellers on the marketplace to determine a transaction price which they both agree on (Bakos, 1998). Data marketplaces may implement smart contracts to enhance transparency and to enforce trust among marketplace participants (Fruhwirth et al., 2020). The payment currency dimension explicates which currencies are accepted for the payments made by marketplace participants (Fruhwirth et al., 2020). 4 Discussion and Conclusion The developed taxonomy of data marketplace business model has two key scientific contributions. First, the results of the study contribute to the scarce knowledge about data marketplaces and their respective business models (Thomas & Leiponen, 2016). This study adopts a multi-stakeholder perspective on data marketplace business models by emphasizing the roles in the data ecosystem. The taxonomy provides an overview of contemporary knowledge about data marketplace business models and exposes new business model alterations that have emerged in practice. A second contribution made by this study is related to the interpretation of a data marketplace. Existing taxonomies (Fruhwirth et al., 2020; Spiekermann, 2019) focus on studying one type of data marketplaces: multilateral data marketplaces (Koutroumpis et al., 2017). In our study, data marketplaces are more broadly M. van de Ven, A. E. Abbas, Z. Kwee & M. de Reuver: Creating a Taxonomy of Business Models for Data Marketplaces 319 interpreted as digital systems for trading data as an economic good, that connect buyers and sellers, and facilitate data exchange and financial transactions. This allows us to identify additional business model dimensions, which are not part of existing taxonomies: enterprise data marketplace, data processing and analytics tools, geographic scope, matching mechanism and platform sponsor. By eliciting how data marketplace business models differ, we provide a basis for fine-grained theory development, which is often lacking in platform studies (De Reuver et al., 2018). The developed taxonomy can guide decision-makers who are exploring the options of setting up a data marketplace or to join an existing data marketplace. An improved understanding about data marketplace business models may help to achieve commercialization, that will make data more accessible and exploitable to individuals, businesses and authorities. Although we took a systematic approach, subjectivity in assessing the cases may pose a limitation. We dealt with this by conducting multiple iterations and reinterpretations of the data. Further, not all data marketplace companies disclose sufficient information about all of their business model characteristics. Therefore, not all empirical cases could be classified into all of the conceptually derived dimensions. This was especially the case for financially related dimensions such as revenue partners and cost categories (Täuscher & Laudien, 2018). Lastly, as in any taxonomy development study, our study is limited to the current set of phenomena that exist in practice. Hence, future research may update our taxonomy in light of fundamentally new data marketplace types. Data marketplaces pose a foundation for the data economy: they enable firms to access external data to drive their business and to profit from selling their own data. The EU is investing heavily in data marketplaces in the years to come (European Commission, 2020). At the same time, ambiguity pertains over what constitutes a viable data marketplace business model. Our taxonomy takes a broad and multistakeholder perspective to data marketplaces, going beyond the single-firm multilateral perspective of extant taxonomies. We argue that such a broad conceptual basis is needed to advance scholarly understanding of ecosystems in the data economy and to unlock the potential of trading data for a functioning data economy. 320 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Acknowledgments The research leading to these results has received funding from the European Union’s Horizon 2020 Program, under grant agreement 871481 – Trusted Secure Data Sharing Space (TRUSTS). References Bakos, Y. (1998). The emerging role of electronic marketplaces on the Internet. Communications of the ACM, 41(8), 35-42. Bock, M., & Wiener, M. (2017). Towards a Taxonomy of Digital Business Models-Conceptual Dimensions and Empirical Illustrations. In ICIS. Bouwman, H., de Vos, H., & Haaker, T. (Eds.). (2008). Mobile service innovation and business models. Springer Science & Business Media. Carnelley, P., Schwenk, H., Cattaneo, G., Micheletti, G., & Osimo, D. (2013). Europe’s data marketplaces—current status and future perspectives,’. European Data Market SMART, 63. Daniel, J. (2011). Sampling essentials: Practical guidelines for making sampling choices. Sage Publications. de Reuver, M., Sørensen, C., & Basole, R. C. (2018). The digital platform: a research agenda. Journal of Information Technology, 33(2), 124-135. European Commission. (2020). A European Strategy for Data [Press release]. Retrieved from https://eur-lex.europa.eu/legalcontent/EN/TXT/PDF/?uri=CELEX:52020DC0066&from=EN Fricker, S. A., & Maksimov, Y. V. (2017). Pricing of data products in data marketplaces. In International Conference of Software Business (pp. 49-66). Springer, Cham. Fruhwirth, M., Rachinger, M., & Prlja, E. (2020). Discovering Business Models of Data Marketplaces. In Proceedings of the 53rd Hawaii International Conference on System Sciences. Hartmann, P. M., Zaki, M., Feldmann, N., & Neely, A. (2014). Big data for big business? A taxonomy of data-driven business models used by start-up firms. Cambridge Service Alliance, 1-29. Koutroumpis, P., Leiponen, A., & Thomas, L. D. (2017). The (unfulfilled) potential of data marketplaces (No. 53). ETLA Working Papers. Koutroumpis, P., Leiponen, A., & Thomas, L. D. (2020). Markets for data. Industrial and Corporate Change, 29(3), 645-660. Lambert, S. (2015). The importance of classification to business model research. Journal of Business Models, 3(1). Muschalle, A., Stahl, F., Löser, A., & Vossen, G. (2012). Pricing approaches for data markets. In International workshop on business intelligence for the real-time enterprise (pp. 129-144). Springer, Berlin, Heidelberg. Nickerson, R. C., Varshney, U., & Muntermann, J. (2013). A method for taxonomy development and its application in information systems. European Journal of Information Systems, 22(3), 336359. Prlja, E. (2019). Discovering Business Models of Data Marketplaces [Master’s thesis]. Graz University of Technology, Graz, Austria. Schomm, F., Stahl, F., & Vossen, G. (2013). Marketplaces for data: an initial survey. ACM SIGMOD Record, 42(1), 15-26. Spiekermann, M., Tebernum, D., Wenzel, S., & Otto, B. (2018). A metadata model for data goods. In Multikonferenz Wirtschaftsinformatik (Vol. 2018, pp. 326-337). Spiekermann, M. (2019). Data marketplaces: Trends and monetisation of data goods. Intereconomics, 54(4), 208-216. Stahl, F., Schomm, F., & Vossen, G. (2014a). Data Marketplaces: An Emerging Species. In DB&IS (pp. 145-158). M. van de Ven, A. E. Abbas, Z. Kwee & M. de Reuver: Creating a Taxonomy of Business Models for Data Marketplaces 321 Stahl, F., Schomm, F., & Vossen, G. (2014b). The data marketplace survey revisited (No. 18). ERCIS Working Paper. Stahl, F., Schomm, F., Vossen, G., & Vomfell, L. (2016). A classification framework for data marketplaces. Vietnam Journal of Computer Science, 3(3), 137-143. Stahl, F., Schomm, F., Vomfell, L., & Vossen, G. (2017). Marketplaces for Digital Data: Quo Vadis?. Computer and Information Science, 10(4). Täuscher, K. (2016). Business models in the digital economy: an empirical study of digital marketplaces. Fraunhofer MOEZ. Fraunhofer Center for International Management and Knowledge Economy, Städtisches Kaufhaus Leipzig, Neumarkt, 9-19. Täuscher, K., & Laudien, S. M. (2018). Understanding platform business models: A mixed methods study of marketplaces. European Management Journal, 36(3), 319-329. Thomas, L. D., & Leiponen, A. (2016). Big data commercialization. IEEE Engineering Management Review, 44(2), 74-90. Webster, J., & Watson, R. T. (2002). Analyzing the past to prepare for the future: Writing a literature review. MIS quarterly, xiii-xxiii 322 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE BARRIERS TO RESPONSIBLE CONSUMPTION IN E-COMMERCE: EVIDENCE FROM FASHION SHOPPERS TIINA KEMPPAINEN,1,2 LAURI FRANK,2 MARKUS MAKKONEN2 & OONA-IINA HYVÖNEN2 1 University of Jyvaskyla, School of Business and Economic, Finland; e-mail: tikemppa@jyu.fi 2 University of Jyvaskyla, Faculty of Information Technology, Finland; e-mail: tiina.kemppainen@hotmail.com, lauri.frank@jyu.fi, markus.v.makkonen@jyu.fi, hyvonen.oona@gmail.com Abstract This qualitative study investigates the barriers to responsible consumption in e-commerce from the online shoppers’ viewpoint. The purpose of the study is to increase our understanding of what prevents young adults from making responsible purchases in online stores in the context of fashion retail. The data were collected by interviewing ten Finnish fashion shoppers aged 23-27 years. The findings show that responsible consumption is perceived as complex and challenging. The study identified barriers related to online stores and consumers themselves. Online store implementation (product availability, information and transparency, and pricing) is vital in facilitating online shoppers’ responsible purchasing decisions. However, consumers’ personal consumption patterns and habits, and problems related to time use and responsibility assessment, can also be constraints on responsible consumption. Future studies are encouraged to investigate how online solutions, such as user interfaces, online tools, and apps, could better assist consumers in overcoming the identified barriers. DOI https://doi.org/10.18690/978-961-286-485-9.24 ISBN 978-961-286-485-9 Keywords: e-commerce, responsible consumption, online shopping, fashion retail, qualitative study 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 324 1 Introduction The popularity of online shopping has grown tremendously with the spread of information and communications technologies (ICTs). The popularity of ecommerce is explained by its ease, availability, and breadth of selection. However, while e-commerce provides multiple benefits for today’s consumers, from an ecological perspective it has also contributed to negative changes in consumption habits and purchasing behavior (Abukhader & Jonson 2004). The efficiency and affordability of online shopping have led to more shopping being done without real need. Many online stores offer consumers free shipping and returns, as well as an extended payment period, which has resulted in products being easily ordered and inappropriate products being returned. Other environmental challenges posed by ecommerce relate to individual deliveries and small one-off purchases as well as packaging materials. Simultaneously, the state of the planet and overconsumption have become significant issues, and consumers are becoming more environmentally conscious (Demarque et al. 2015). The negative repercussions of e-commerce have become important topics of discussion in business and academia. This qualitative study investigates the barriers to responsible consumption in ecommerce from the online shoppers’ viewpoint. The study aims to increase our understanding of what prevents young adults (aged 23-27) from making responsible purchases in online stores in the context of fashion retail. Previous research has suggested that there is no significant difference in terms of consumers’ purchasing decision process between online and brick-and-mortar stores (Katawetawaraks & Wang 2011). In addition, most studies approach responsible consumption at a general level without shopping channel (online/offline) specification. Despite a bulk of papers investigating responsible consumption from different perspectives, a specific understanding of online environments is missing. Therefore, as the importance of online shopping grows continuously, there is a need for studies that focus on responsible consumption in online channels. Furthermore, previous research has shown that consumers’ attitudes towards responsibility and their behavior can be contradictory: responsibility is valued, but consumers do not necessarily behave responsibly (Belk, Devinney & Eckhardt 2005; Carrington, Neville & Whitwell 2014). Investigations on the barriers to responsible consumption help to better understand why this is the case. The findings of this study are also T. Kemppainen, L. Frank,M. Makkonen & O.-I. Hyvönen: Barriers to Responsible Consumption in e-Commerce: Evidence from Fashion Shoppers 325 useful in designing online store user interfaces that support consumers’ responsible purchasing behavior. This paper discusses the previous studies on responsible consumption in the ecommerce context in Section 2 below. Section 3 discusses the data collection and analysis, and Section 4 presents the findings of the empirical study. Section 5 discusses the contributions and managerial implications of this study and gives some suggestions for future research. 2 Theoretical background: responsible consumption and e-commerce Responsible and sustainable consumption have become common research topics in the 21st century. The concepts are intrinsically linked, as sustainability can be seen as an objective pursued through responsible action. The study fields have become deeply blurred and similar issues are discussed within both fields (Bansal & Song 2017). The core idea of responsible consumption is to reduce the impact of goods or services on the environment by various eco-friendly activities. In line with Ulusoy (2016), this study defines responsible consumption as consumption that has a less negative impact on the environment than consumption that does not take into account the foundations of sustainable development. Extant studies on responsible consumption do not usually distinguish between different service channels; hence responsible consumption in e-commerce channels has not received special attention. However, factors affecting responsible consumption and other responsible behavior have been widely explored. These studies have highlighted situational factors. According to Stern et al. (1995), favorable situational factors increase and encourage green consumption. One can assume that the situational factors affecting responsible purchase behavior, in particular, can be very different in online and offline environments. In addition, the impact of demographic and psychographic factors on consumer responsibility have been addressed. Straughan and Roberts (1999) highlight the psychographic factors: environmental awareness, opinions, and attitudes influence responsible purchasing intentions. According to previous research, factors that encourage responsible consumption include, for instance; knowledge (Young et al. 2010; Joshi & Rahman 2016), a positive attitude towards responsibility (Straughan & Roberts 1999; Demarque et al. 2015; Kumar, Manrai & Manrai 2017), marketing and campaigns, 326 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE and brand image (Joshi & Rahman 2016). Consumer sentiment, especially environmental concerns, has a positive and direct impact on responsible goals and behavior (Straughan & Roberts 1999). Identified barriers to responsible consumption include, for instance, high prices (Peattie 2010; Joshi & Rahman 2016), lack of information (Demarque et al. 2015), and awareness (Luthra, Govindan & Mangla 2017), poor product availability and quality (Joshi & Rahman 2016), and lack of policy support (Blok et al. 2015). The fashion industry is often emphasized in the debate on responsibility because its enormous environmental challenges are increasingly being recognized. The fashion industry has been associated with significant negative social and ecological impacts, such as employee exploitation, excessive use of renewable materials, and waste generation (Wang et al. 2019). In addition, fashion retail is also an important segment of e-commerce: its share of online shopping is significant. For example, in 2017, 50% of Finnish consumers bought clothes and accessories online, and the number is expected to grow every year (Paytrail 2018). Online shopping for clothing and shoes in particular is a burden on the environment due to high return rates (Chen & Chai 2010; Demarque et al. 2015). For these reasons, the empirical part of this study focuses on fashion retail: the online shopping for clothing, accessories, and footwear. 3 Data collection and analysis As the purpose of this study was to identify and better understand the barriers to responsible consumption from the consumer viewpoint, a qualitative research approach was chosen. Young adults aged 23 to 27 were selected as the target group for the study because they are characterized by traits associated with the Generation Z. Those born around the mid-1990s were born into the digital world with internet and electronics. They are typically experienced online shoppers and are often aware of responsibility-related themes. Dabija et al. (2019) note that applying green strategies and sustainable principles in business activities is vital when trying to appeal to the Generation Z consumers. T. Kemppainen, L. Frank,M. Makkonen & O.-I. Hyvönen: Barriers to Responsible Consumption in e-Commerce: Evidence from Fashion Shoppers 327 The data collection was carried out with semi-structured interviews in 2020. The number of interviewees was determined on the basis of the saturation of the material obtained from the interviews: interviews were conducted until they no longer produced new information relevant to the study. Ten people, four males and six females (referred to as participants 1-10: P1-P10) were interviewed (for details, see Appendix 1). The interviews were conducted via the Google Meet video call service with an average duration of 39 minutes. The participants were asked to describe their e-commerce shopping and responsible consumption behaviors regarding fashion wear. The discussed themes included, for instance: how participants define responsibility in consumption, how responsibility guides them as consumers and influences their purchase behavior in online stores, and what are the problems or benefits of online shopping in terms of responsible consumption. The exact form or order of the questions was not defined in advance, which provided an opportunity for additional questions and discussion. All interviews were recorded and transcribed. The data was processed by inductive coding (Thomas 2003). The findings emerged from the analysis of the transcribed data. All the mentioned barriers to responsible consumption were first collected from the material, after which they were classified into groups according to their content. Finally, as the result of several classification rounds, the identified barriers were formed into two main groups, including online store characteristics, and personal characteristics and resources. The findings are discussed more closely in the next section. 4 Findings The findings show that responsible consumption is often perceived as complex and challenging. It is hampered both by the information and products offered by online stores and by consumers’ own personal characteristics and resources. The data analysis revealed three barriers related to the online stores (poor availability, lack of information and transparency, and high prices) and three personal barriers (poor knowledge and challenges in responsibility assessment, existing consumption habits, and lack of time) to responsible consumption in e-commerce. These often intertwined barriers are discussed here below. 328 4.1 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Online store characteristics Poor availability was one of the main factors influencing the participants’ responsible purchasing decisions. According to the interviewees, the supply of responsible products is still weak, and some manufacturers do not offer responsible products at all. It was concluded that when a need for a particular product type arises, there are only a few responsibly produced options available. If one desires a specific brand, there might not be any responsible alternatives. “Supply. Because if you want something specific, there may not be responsible alternatives.” – Male, 23 (P4) However, online stores were seen as a better option in terms of supply than brickand-mortar stores. The online product range is more extensive. Particularly specialty stores (that only sell products that are produced responsibly) make it easier to browse products from different manufacturers. Many ecofriendly brands have also focused their sales online, making products unavailable offline. With the growth and spread of e-commerce, the selection and availability of responsible brands have increased significantly. Lack of information and transparency. The interviewees were aware of the environmental burden caused by consumption. Better awareness had led them to consider more of their purchases, and many admitted that they had begun to pay more attention to the backgrounds of products with increased awareness. However, obtaining information was not considered easy. The lack of information and transparency of company operations was repeated in the interviewees’ reports. “I hope it would not be left to the online store user—that we have to play a detective and look for information. Backgrounds should be very openly presented in the online store.” – Female, 25 (P9) Although production transparency has been increased, and companies’ sustainability efforts and goals have been communicated more openly, it was unclear to the participants how the companies’ operations (e.g., production) have actually changed: whether companies are behaving more responsibly than in the past. In particular, T. Kemppainen, L. Frank,M. Makkonen & O.-I. Hyvönen: Barriers to Responsible Consumption in e-Commerce: Evidence from Fashion Shoppers 329 the different eco-certificates and the increased openness of fast fashion chains made the participants suspicious. “I don’t think it has changed very much from the past, although transparency and awareness are now much increased and promoted. Those are just trendy words.” – Female, 25 (P9) Instead of certificates and superficial information, interviewees looked for concrete examples and explanations. “I think those certifications might be a bit out there at the moment. If the production methods and chains are clearly explained, it is much better than a single certificate.” – Male, 27 (P6) “I’d be interested to know more about it than just that ‘this charge will offset the carbon footprint’. It would be nice to know exactly what you pay extra for and whether it truly makes a big difference.” – Female, 25 (P2) However, information retrieval and comparison were found to be easier and more trustworthy in online than offline environments. In the online environment, information about product backgrounds and producers’ practices can also be obtained from different external sources. High prices. The importance of price was apparent for the participants’ willingness to make a responsible purchasing decision—many considered high price to be a considerable barrier to responsible or more responsible consumption. “Many times, if there is a product in which all the material and workmanship is Finnish, then the price is often so much higher that it may not be possible to buy such a product.” – Female, 26 (P5) The interviewees emphasized the importance of brand image and value-for-money when considering the price. The products of responsible brands were perceived to be more expensive yet of better quality than fast-fashion chains’ responsible options. Purchasing responsible fast fashion at a cheaper price did not seem sensible in the long run. 330 4.2 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Personal characteristics and resources Poor knowledge and challenges in responsibility assessment were identified as important obstacles to responsible consumption. When consumers are unaware of the effect of their purchases, they also do not feel guilty about their irresponsible purchasing decisions. “I think it’s just that people don’t necessarily know or think about these issues that much.” – Female, 26 (P5) The assessment of the environmental impact was considered a challenging task. Whereas looking for information about products and companies and their background can be difficult, the fact that a consumer must also evaluate the information and assess its reliability adds to the burden. Existing consumption habits. The individual’s current consumption habits were also identified as a barrier to responsible consumption. The phenomenon of responsible shopping was considered rather new and many of the interviewees had only recently woken up to consider their consumption habits. Responsibility is a whole new thing. Probably many are used to shopping, and not thinking about the effects at all. I haven’t always thought about it as I do now.” – Female, 26 (P10) Moreover, responsibility and the disadvantages caused by consumption are not always the main things in mind when shopping. The interviewees admitted that their hedonism restricts responsible purchasing decisions. While responsibility is considered important, it can be easily forgotten in a purchase situation. “When I don’t need or want anything, I start to think that ‘yes, we should have more solidarity with each other and reduce consumption’. But as soon as you need something, such ideas disappear. Your greed and desire for pleasure are obstacles.” – Female, 25 (P9) T. Kemppainen, L. Frank,M. Makkonen & O.-I. Hyvönen: Barriers to Responsible Consumption in e-Commerce: Evidence from Fashion Shoppers 331 When compared to brick-and-mortar stores, online stores were seen as a more irresponsible shopping channel. This was explained by people’s consumption habits in online shopping environments. “I find it [e-commerce] less environmentally friendly. Just because of the way people behave in online shopping: they order a lot and then return.” – Female, 23 (P1) The interviewees concluded that it is easier to make impulsive and unplanned purchases in an e-commerce environment because online stores create various incentives for the consumer (e.g., free shipping) to increase the total amount of purchases. Many of the interviewees concluded that they tend to buy less at once in brick-and-mortar stores. Moreover, the responsibility of consumption in general became an essential theme in the interviews, as some of the interviewees considered consumption irresponsible regardless of the channel. “It’s complicated. If you want to be truly responsible, then you don’t buy anything; that’s the most responsible activity of all.” – Male, 27 (P6) However, completely stopping or significantly reducing consumption was perceived as challenging, as it would require making significant changes in one’s everyday life. Lack of time. Finally, urgency and lack of time were considered noteworthy barriers to responsible consumption, which was seen as time-consuming. While it was deemed important, the participants explained that they might not behave in a responsible manner because they do not have the time to look for information about products, or to look for a responsible alternative for a certain product. Aspirations to responsibility are not always reflected in actions, as the following quote shows. “I do think about these [ecological] issues. But actions may be different, you don’t always behave as you would like to.” – Female, 23 (P1) It was pointed out that it may take a lot of time to clarify the background of the products, even if there is some information provided in the online store. In the context of online shopping, the customer also needs to consider the total time taken by the process, including the time required for the order to arrive. 332 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE “Getting acquainted takes a lot of time, and then time just runs out. You go: ‘I can’t do this anymore’.” – Male, 27 (P6) Online shopping was generally perceived as easy and effortless. Responsible consumption in online channels, on the other hand, was perceived to be complex, as it often requires awareness and the willingness to search for information. 5 Discussion: conclusions and suggestions for future research This study investigated the barriers to responsible consumption in e-commerce from young adults’ viewpoint in the context of fashion retail. The findings show that while the online store implementation (including product availability, pricing, and information related to responsibility) is essential in facilitating responsible purchasing decisions, consumers’ personal consumption patterns and habits, as well as everyday challenges, also play a vital role in responsible consumption. While responsibility is considered necessary, responsible purchase decisions are often considered to require time and effort. Incorporating responsibility into existing consumption habits can be challenging, and it is easy to ignore and forget, especially in urgent purchase decisions. Overall, the findings of this study are in line with previous studies not focused on ecommerce. They demonstrate that responsible consumption is of interest to many, but there is a gap between ideals and responsible actions (Belk, Devinney & Eckhardt 2005; Carrington, Neville & Whitwell 2014). Responsibility is easily avoided due to its complications related to the pricing and product availability (Chen & Chai, 2010). The findings suggest that pricing of responsible products can be a challenging task from an online store’s perspective. Even though high prices are considered purchase barriers, overly low prices, in contrast, can be perceived as suspicious, signaling that everything is not truly done responsibly in the production chain. Many of the identified barriers are linked to information, knowledge, and understanding related to responsibility (e.g., Young et al. 2010; Demarque et al. 2015; Joshi & Rahman 2016). Although responsibility-related information has increased in online stores, background information regarding products and company operations is still considered limited. Furthermore, shops and manufacturers communicate their responsibility measures in very different ways, making the responsibility assessment T. Kemppainen, L. Frank,M. Makkonen & O.-I. Hyvönen: Barriers to Responsible Consumption in e-Commerce: Evidence from Fashion Shoppers 333 difficult. Comparing the different options, including companies, their eco-labels and eco-actions, and products, is a challenge for consumers. The findings suggest that consumers need common standards and more concrete and easy-to-understand measures and indicators to support their responsible purchasing decisions in online environments. In general, solutions that make responsible shopping more straightforward and less time-consuming are needed. There is a need for studies and solutions that consider how product backgrounds, material choices, and manufacturing information, for instance, can be better informed and communicated to consumers. Future studies should investigate how user interfaces, online tools, and apps could help consumers in their responsibility assessments. Studies on other contexts and different consumer groups are also welcomed in order to better understand whether similar barriers exist within different retail categories or consumer groups, for example younger and older consumers. Finally, although this study identified barriers to responsible consumption with ecommerce, similar problems exist with brick-and-mortar stores. Hence, when considering the obstacles, online stores can have many competitive advantages over offline stores. Even though the availability of products and responsibility-related information were characterized as deficient in online stores, online stores typically offer more options for responsible consumption. In addition, information retrieval and product comparisons are often easier online. Hence, as the importance of responsible consumption and online shopping will grow continuously in the future, this should create opportunities for new online businesses that are either fully specialized in selling responsible products or acknowledge the foundations of sustainable development in their services. It also provides excellent opportunities for online solutions and systems that educate and assist both consumers and businesses in their pursuit of responsible consumption in all kinds of services. References Abukhader, S. M. & Jonson, G. (2004). E-commerce and the environment: A gateway to the renewal of greening supply chains. International Journal of Technology Management, 28 (2), 274-288. Bansal, P. & Song, H. (2017). Similar but not the same: Differentiating corporate sustainability from corporate responsibility. Academy of Management Annals, 11 (1), 105-149. 334 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Belk, R., Devinney, T. & Eckhardt, G. (2005). Consumer ethics across cultures. Consumption Markets & Culture, 8 (3), 275-289. Blok, V., Long, T. B., Gaziulusoy, A. I., Ciliz, N., Lozano, R., et al. (2015). From best practices to bridges for a more sustainable future: Advances and challenges in the transition to global sustainable production and consumption: Introduction to the ERSCP stream of the Special volume. Journal of Cleaner Production, 108, 19-30. Carrington, M. J., Neville, B. A. & Whitwell, G. J. (2014). Lost in translation: Exploring the ethical consumer intention–behavior gap. Journal of Business Research, 67 (1), 2759-2767. Chen, T. B. & Chai, L. T. (2010). Attitude towards the environment and green products: Consumers’ perspective. Management Science and Engineering, 4 (2), 27-39. Dabija, D., Bejan, B. M. & Dinu, V. (2019). How Sustainability oriented is generation Z in retail? A literature review. Transformations in Business & Economics, 18 (2), 140. Demarque, C., Charalambides, L., Hilton, D. J. & Waroquier, L. (2015). Nudging sustainable consumption: The use of descriptive norms to promote a minority behavior in a realistic online shopping environment. Journal of Environmental Psychology, 43, 166-174. Joshi, Y. & Rahman, Z. (2016). Predictors of young consumer’s green purchase behaviour. Management of Environmental Quality: An International Journal, 27 (4), 452-472. Katawetawaraks, C. & Wang, C. (2011). Online shopper behavior: Influences of online shopping decision. Asian Journal of Business Research, 1 (2), 66-74. Kumar, B., Manrai, A. K. & Manrai, L. A. (2017). Purchasing behaviour for environmentally sustainable products: A conceptual framework and empirical study. Journal of Retailing and Consumer Services, 34, 1-9. Luthra, S., Govindan, K. & Mangla, S. K. (2017). Structural model for sustainable consumption and production adoption—A grey-DEMATEL based approach. Resources, Conservation and Recycling, 125, 198-207. Paytrail 2018. Finnish E-commerce Report 2017. Available in: https://www.paytrail.com/en/report/finnish-ecommerce-2017?hsCtaTracking=ffa39c05b328-4556-b789-303ad39fce14%7C678c1de2-64db-4c7c-a221-0ea4530e6cc6. Peattie, K. (2010). Green consumption: behavior and norms. Annual Review of Environment and Resources, 35, 195-228. Stern, P. C., Dietz, T. & Guagnano, G. A. (1995). The new ecological paradigm in social-psychological context. Environment and Behavior, 27 (6), 723-743. Straughan, R. D. & Roberts, J. A. (1999). Environmental segmentation alternatives: a look at green consumer behavior in the new millennium. Journal of Consumer Marketing, 16 (6), 558-575. Thomas, D. R. (2003). A general inductive approach for qualitative data analysis. School of Population Health, University of Auckland. Ulusoy, E. (2016). Experiential responsible consumption. Journal of Business Research, 69 (1), 284297. Wang, H., Liu, H., Kim, S. J. & Kim, K. H. (2019). Sustainable fashion index model and its implication. Journal of Business Research, 99, 430-437. Young, W., Hwang, K., McDonald, S. & Oates, C. J. (2010). Sustainable consumption: green consumer behaviour when purchasing products. Sustainable Development, 18 (1), 20-31 T. Kemppainen, L. Frank,M. Makkonen & O.-I. Hyvönen: Barriers to Responsible Consumption in e-Commerce: Evidence from Fashion Shoppers 335 Appendix 1: List of participants P1 P2 P3 P4 P5 P6 P7 P8 P9 P10 Age 23 25 25 23 26 27 25 25 25 26 Sex Female Female Male Male Female Male Male Female Female Female Position Student & part-time employee Student Student & full-time employee Student Student & full-time employee Student & full-time employee Student & part-time employee Student & part-time employee Full-time employee Student & full-time employee Interview length (min) 42 37 45 34 37 42 38 35 40 37 336 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE USER INFORMATION SATISFACTION AMONG FEMALE REFUGEES AND IMMIGRANTS AS ASSESSED BY THE LEVEL OF INFORMATION LITERACY ON SOCIAL MEDIA KHADIJAH KAINAT, MAEDEH GHORBANIAN ZOLBIN, GUNILLA WIDÉN & SHAHROKH NIKOU Åbo Akademi University, Faculty of Social Sciences, Business and Economics, Turku, Finland; e-mail: khadijah.kainat@abo.fi, maedeh.ghorbanianzolbin@abo.fi, gunilla.widen@abo.fi, shahrokh.nikou@abo.fi Abstract Female refugees and immigrants face various challenges in accessing, using, and sharing information during their integration process. In the context of COVID-19, this study aims to identify the user information satisfaction of female refugees and immigrants living in Finland and Sweden. Using a dataset comprising 232 respondents, the research model was examined through structural equation modelling. The results show that information overload in social media streams has an impact on information fatigue and consequently on the information avoidance behaviour of the target group. The results also show that information literacy helps to avoid social media information overload, in addition to its direct effect on user information satisfaction. Being familiar with the perceived COVID-19 challenges also positively impacts user information satisfaction. In view of the fact that European countries are receiving an everincreasing number of refugees and immigrants, the findings of this study provide both theoretical and practical contributions. DOI https://doi.org/10.18690/978-961-286-485-9.25 ISBN 978-961-286-485-9 Keywords: COVID-19, information avoidance, information fatigue, information literacy, information satisfaction, integration, female refugees, social media 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 338 1 Introduction When entering a new country, refugees and immigrants face various integration challenges such as socio-cultural barriers, lack of language skills, health and psychological problems, employment problems, and family issues (Bronstein, 2019). They also face multiple information challenges in accessing, sharing, and using the information, in addition to challenges such as information overload (hereinafter IO), lack of information, misinformation, culturally nuanced information due to the language barrier, lack of literacy skills, lack of social networks, socio-cultural differences, and personal preferences, which are essential for managing everyday information needs in a host country (Lloyd et al., 2013). As such, it can be argued that information is vital for successful integration. Some authors, such as Swar et al. (2017), have stated that social media IO occurs when seekers have more information than can be assimilated, or in other words, the ability of information seekers to process and handle the information is insufficient to successfully cope with the amount of information they receive. The increasing use of social media platforms (e.g. Facebook, Instagram, Twitter) has fed people with excessive information content in the form of messages, tweets, wall posts, and constant status updates on a daily basis (Bright et al., 2015). This is resulting in people quitting or reducing the use of social media to avoid excessive information, which is known as social media information fatigue (hereinafter IF) (Cao & Sun, 2018). Moreover, social media fatigue, caused by IO, can be linked to the inherent problems associated with information avoidance (hereinafter IA) by social media users. It can be difficult for people to check each message on social media; they may skim or skip irrelevant information or even avoid some information (Guo et al., 2020). Mostly, people are seeking information that is in line with their interests, needs, or existing attitudes, and they avoid the information if these are not in accordance with their point of view – whether this is done consciously or unconsciously (Narayan et al., 2011). Moreover, a less-studied concept in the context of refugees and immigrants is information literacy (hereinafter IL), which has been proven to influence user satisfaction. Some authors, such as Aljanabi and Hadban (2018), have asserted that mastering certain skills and acquiring a robust IL level give individuals a sense of pleasure and confidence which, in turn, can foster their satisfaction. In the context of the COVID-19 pandemic, this paper aims to focus on information seeking in female refugees and immigrants to (i) investigate how such individuals react to information challenges, and (ii) examine their level of information satisfaction. Khan and Eskola (2020) highlighted female refugees and immigrants in particular face unique information challenges during the integration process and need special K. Kainat, M. Ghorbanian Zolbin, G. Widén & S. Nikou: User Information Satisfaction Among Female Refugees and Immigrants as Assessed by the Level of Information Literacy on Social Media 339 attention to fully understand their information practices and the inherent problems, along with the strategies they use to overcome these challenges. In earlier literature (e.g. Liebig & Tronstad, 2018), female refugees and immigrants are often overlooked or studied in combination with their male counterparts. Thus, this study takes the liberty of explicitly focusing on female refugees and immigrants, in order to analyse their user information satisfaction. More importantly, in light of the pandemic brought about by the spread of COVID-19, this study aims to investigate how the current situation impacts the user information satisfaction of this target group. The COVID-19–related challenges in this paper refer to, for example, searching for information to manage stress from day to day when quarantined at home. The question guiding this study is, “What factors influence the user information satisfaction of female refugees and immigrants, and what roles do information literacy and the perception of COVID-19–related challenges play in this context?” 2 Literature Review and Hypotheses Developments The research extends the (C–A–C) framework (Hilgard, 1980), which includes three components of the mind or consciousness: cognition–affect–conation. According to Huitt (1999), cognition refers to the process of knowing and understanding, and affect refers to the emotional interpretation of perception, information, or knowledge. The effect can be used to address questions such as, “How do I feel about this knowledge or information?”. With conation, questions such as “Why is this information important?” can be asked, and it refers to the intentional and personal motivation of behaviour. In the following sections, we discuss this in more detail. 2.1 Social Media Information Overload In the literature, with the specific focus of understanding the experiences of refugees and immigrants, there is little research related to the information challenges faced by this group. It is important to understand the challenges refugees and immigrants face in accessing, using, and sharing the information to provide them with better integration services and facilities when faced with living in a new country (Quike, 2011). Among the many challenges – such as socio-cultural and linguistic barriers to information, lack of information, and misinformation – information overload is one of the main challenges faced by this group and has the potential to affect their settlement experiences in a new country. Some researchers use IO to indicate the 340 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE possibility of being bombarded with a large amount of unwanted information, some of which may be relevant (Zhang et al., 2016). The IO situation can lead to undesirable consequences such as stress and anxiety (Guo et al. 2020), may weaken the decision quality (Eppler & Mengid, 2004), and may cause the individual concerned to withdraw from the tasks at hand (Cao & Yu, 2019). Social media is one of the main sources of IO. People seek, use, and share different types of information on social media every day. Information overload is defined as the tendency of people to withdraw from social media use when they become overwhelmed with too much content, too many sites, too many friends and contacts, and too much time spent keeping up with these connections (Yu et al., 2018). People cut down on their use of social media for a variety of reasons, such as lack of interest, energy, time, and knowledge, privacy concerns, anxiety, personal reasons, and fear of academic failure (Turan, 2013), but IO remains one of the main reasons for quitting or withdrawing from social media (Cao & Yu, 2019). Moreover, Dai et al. (2020) showed that IO leads to social media fatigue; hence: H1: Social media IO has a significant effect on the social media IF experienced by female refugees and immigrants 2.2 Social Media Information Fatigue Researchers have found that social media fatigue is an important driver of individuals’ decisions to quit social networking platforms (Ravindran et al., 2014). When people tire of spending too much time and energy on social media, they may practise IA behaviours to escape from the negative emotions and fatigue. Dia et al. (2020) found positive relationship between social media fatigue and IA; hence: H2: Social media IF has a significant effect on the social media IO of female refugees and immigrants 2.3 Social Media Information Avoidance Information avoidance refers to human behaviour in which users ignore some information intentionally in order to save their time and energy or reduce stress (Dia et al., 2020). Information overload is linked to IA in different aspects such as when people actively ignore information because of external pressures of fears and uncertainty. Savolainen (2007) defined IA as when people avoid unnecessary or K. Kainat, M. Ghorbanian Zolbin, G. Widén & S. Nikou: User Information Satisfaction Among Female Refugees and Immigrants as Assessed by the Level of Information Literacy on Social Media 341 negative information by filtering it and withdrawing from it in their everyday life. Similarly, Fisher et al. (2005) asserted that certain coping behaviours – i.e. monitoring (actively seeking solutions to one’s problems) and blunting (avoidance of threatening information) – are essential aspects of information behaviour. It makes sense that when people feel less stressed, they feel more satisfied with the information. As such, it can be argued that an individual’s ability to avoid irrelevant and unwanted information is directly linked to their user information satisfaction; hence: H3: Social media IA has a significant effect on the user information satisfaction of female refugees and immigrants 2.4 Information Literacy Information literacy is a required skill for evaluating the information retrieved and shared via social media (Pinto et al., 2020). It is a useful way of ensuring the effective use of information accessible through social media, considering the excessive amount of information available and the potential risks that it carries on the internet. Information literacy is linked to IA. For example, McCloud et al. (2013) identified that if an individual is having difficulties in finding information or comprehending information, he/she is more likely to avoid information. In another study (Karim et al., 2019), it was revealed that higher education and higher IL self-efficacy can reduce the propensity for IA. However, IL is crucial for understanding the user information satisfaction among refugees and immigrants in a social media context. IL skills relating to the use of digital and social media resources help refugees and immigrants to overcome the inherent obstacles in order to satisfy their everyday information needs and to better integrate into the host society (Martzoukou & Burnett, 2018). The need for social media IL during the current pandemic is even more crucial – so as to avoid fake news, myths, and rumours about COVID-19, to make sense of the right information, to identify the most relevant information, and to use the information in the right way (Fujii et al., 2020). Previous studies lack an understanding of the variations in IL that exist among refugees and immigrants within a social media context and how IL impacts IA; hence, we propose: H4: Information literacy has a significant effect on social media IA, such that the higher the level of literacy in a female refugee or immigrant is, the higher the likelihood she will be able to deal with unwanted and irrelevant information 342 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE H5: Information literacy has a significant effect on the user information satisfaction, such that the more literate a female refugee or immigrant is, the more likely she will be satisfied with the use of information 2.5 Perceived COVID-19 Challenges The literature on COVID-19–related factors – and how this affects people's level of user information satisfaction – is scarce. This is even more evident in the context of refugees and immigrants. Alea et al. (2020) explored the impact of perceived COVID-19 challenges in the higher education context and examined how an awareness of the challenges improves the learning experience. In this study, we aim to investigate how the challenges associated with the COVID-19 pandemic situation impact the level of user information satisfaction among female refugees and immigrants. We argue that the more familiar this target group is with the challenges of the situation, the more they will be able to control the information they receive from different sources and consequently the more satisfied they will be with the information obtained. Hence, we propose the following: H6: Perceived COVID-19 challenges have a significant effect on the level of user information satisfaction among female refugees and immigrants 2.6 User Information Satisfaction From a refugee and immigrant perspective, social media and ICT have normally been at the forefront of improvements in key factors concerning well-being, such as reducing isolation and stress, increasing social networking, improving feelings of agency, and establishing oneself in a new country (Udwan et al., 2020). However, refugees and immigrants are also exposed to some negative impacts of social media use, such as risky sexual behaviour, cyberbullying, and feelings of envy about others’ lives (Anderson et al., 2020). In one study of Syrian refugees in the Netherlands (Udwan et al., 2020), the two sides of social media are presented – where it provides connectivity with family and friends on the one hand, and yet has an emotionally draining effect on the other (Udwan et al., 2020). The authors found that the use of social media impacts people differently and that individuals with a refugee and immigrant background hold different views on social media use and level of user satisfaction. Few studies have shown that users of social media adopt the IA strategy to deal with information overload (e.g. Lee et al., 2017; Sasaki et al., 2016). Lee et al. K. Kainat, M. Ghorbanian Zolbin, G. Widén & S. Nikou: User Information Satisfaction Among Female Refugees and Immigrants as Assessed by the Level of Information Literacy on Social Media 343 (2017) suggested that when individuals are highly overloaded with news information from social media, they are likely to access only certain selective news sources. Further, Sasaki et al. (2016) found that when Twitter users face the challenge of IO, they avoid viewing all received tweets rather than reduce their number of friends to reduce the total number of received tweets. User information satisfaction decreases if people are overloaded with unwanted information or less relevant information, but the ability to cope with IF – and consequently to have an appropriate IA strategy in place to cope with IO – may lead to enhanced satisfaction because people then limit their information to only matter that is relevant and wanted. In summary, we argue that user information satisfaction among those with a refugee or immigrant background is not only impacted by traditional social media factors but also by individual-level (information literacy) and contextual (COVID-19) related factors which equally impact their level of information satisfaction (see Figure 1). Figure 1: Proposed Conceptual Model 3 Research Methodology 3.1 Instrument and Data Collection The items used to measure the constructs were all derived from previously validated measures, and if needed, were modified slightly to fit the study context. Alea et al.’s (2020, p. 134-136) items were used to measure COVID-19 challenges (3 items). Information overload (12 items), IF (8 items), and IA (7 items) were derived from Whelan et al. (2020), Bright et al. (2015), Dai et al. (2020), and Shin and Lin (2016), respectively. Items for information literacy (6 items) and user information satisfaction (5 items) were derived from Pinto et al. (2020) and Roberts (1999). We used an English language online survey to collect data between February and March, 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 344 2021. We sent more than 200 personal invitations, in addition to posting the survey link using different channels, such as authors’ personal networks and social media platforms. We received 336 complete responses in total. As the main focus was on females with either a refugee or immigrant background living in Finland or Sweden, the final dataset consisted of 232 respondents who matched this criterion. 4 Results 4.1 Descriptive Results The respondents’ ages fell within the ranges of 18–25 years (10%), 26–35 years (56%), 36–45 years (30%), and 46–55 years (4%). The sample, as mentioned, consisted of 232 female respondents, who lived either in Finland (n = 73) or in Sweden (n = 159). Of the 232 respondents, 151 (65%) were immigrants and 81 (35%) were refugees. With regard to the current occupational status of the respondents, most were students (n = 124), followed by 48 respondents who indicated they were employed. Additionally, 42 respondents were non-employed, and 14 were self-employed. When we asked the respondents to indicate the social networking sites (SNSs) they used to access information, we found interesting results. The use of Facebook was mentioned by 210 respondents, and Instagram by 203 respondents. The least-used SNSs were Twitter (n = 58), TikTok (n = 57), Telegram (n = 16), and Snapchat (n = 62). We also asked the respondents to indicate how long they spend per day searching for and sharing information on SNSs. The findings were as follows: less than 30 minutes = 10 respondents; between 30 minutes and one hour = 72 respondents; between one and two hours = 89 respondents; and more than two hours = 61 respondents. Table 1: Descriptive Statistics Construct Perception of COVID- 19 challenges Social media information fatigue Item COV_CH1 COV_CH2 COV_CH3 Info-Fat2 Info-Fat3 Info-Fat4 Info-Fat5 Info-Fat6 Loadings 0.89 0.84 0.76 0.79 0.73 0.81 0.82 0.89 (α) CR AVE 0.79 0.86 0.69 0.92 0.94 0.68 K. Kainat, M. Ghorbanian Zolbin, G. Widén & S. Nikou: User Information Satisfaction Among Female Refugees and Immigrants as Assessed by the Level of Information Literacy on Social Media Information literacy Social media information avoidance Social media information overload User information satisfaction Info-Fat7 Info-Fat8 IL1 IL2 IL3 IL4 IL5 IL6 Inf_AV2 Inf_AV3 Inf_AV4 Inf_AV5 Inf_AV6 Inf_AV7 Inf_OV10 Inf_OV12 Inf_OV2 Inf_OV3 Inf_OV4 Inf_OV5 Inf_OV6 Inf_OV7 Inf_OV8 Inf_OV9 Info-SAT1 Info-SAT2 Info-SAT3 Info-SAT4 Info-SAT5 0.88 0.85 0.81 0.87 0.81 0.83 0.89 0.82 0.79 0.83 0.83 0.84 0.83 0.73 0.83 0.77 0.81 0.76 0.79 0.82 0.71 0.81 0.84 0.87 0.77 0.81 0.81 0.71 0.71 345 0.92 0.94 0.71 0.89 0.92 0.65 0.94 0.95 0.64 0.82 0.87 0.58 The results showed that all factor loadings (except for 5 items) were above the threshold value of 0.70. In total, we used 41 items to measure the six constructs and retained 37 items for further analysis. All internal reliability and validity assessments, i.e. Cronbach’s alpha (α), and composite reliability (CR), for all constructs were in the range of the recommended values of 0.70 and 0.70, respectively (Hair et al., 2019). The highest and the lowest CR values were for social media IO (0.95) and for perceived COVID-19 challenges (0.86). Also, the highest Cronbach’s alpha (α) value was for social media IO (0.94), and the lowest value was for perceived COVID-19 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 346 challenges (0.79) (see Table 1). To examine whether all measures within each construct were theoretically related to one another as predicted, the convergent validity was assessed using the average variance extracted (AVE) values. As shown in Table 2, all the AVE values were above the recommended threshold of 0.50. Regarding the AVE values, the highest was for IL (0.71) and the lowest was for user information satisfaction (0.58). To establish the discriminant validity, the Fornell– Larcker criterion was used. We examined the AVE scores, and all AVE values were found to be lower than the shared variance for all model constructs; in this way, the discriminant validity was established (Fornell & Larcker, 1981). Table 2: Discriminant validity (Fornell and Larcker criterion) Constructs Perception of COVID-19 challenges Social media information avoidance Information literacy Social media information overload User information satisfaction Social media information fatigue PCCH SMIA IL SMIO UIS SMF 0.83 0.15 0.12 0.81 0.43 0.84 0.42 0.23 0.29 0.36 0.21 0.47 0.81 0.48 0.76 0.28 0.51 0.21 0.69 0.38 0.82 PLS-SEM (partial least squares structural equation modelling) was used to evaluate and examine the path relationships in the model. The structural results showed that the independent variable, i.e. information use satisfaction has been explained by variance of 35%. The predictor variables, i.e. social media IF and social media IA, have been explained by variance of 47% and 37%, respectively. The SEM results showed that, as we predicted, social media IO had a positive and significant effect (β = .69; t = 14.697; p = .001) on social media IF, thus providing theoretical support to accept H1. Similarly, social media IF (β = .44; t = 7.491; p = .001) positively affected social media IA; thus, H2 was supported. Socia media IA significantly affected (β = .18; t = 2.977; p = .005) user information satisfaction, hence supporting H3 in the model. The analysis revealed interesting results when the path relationships from IL to IA and user information satisfaction were assessed. The path from IL to IA was positive (β = .69; t = 14.697; p = .001), hence supporting H4 in the model. K. Kainat, M. Ghorbanian Zolbin, G. Widén & S. Nikou: User Information Satisfaction Among Female Refugees and Immigrants as Assessed by the Level of Information Literacy on Social Media 347 The direct path between IL to user information satisfaction was also significant (β = .38; t = 6.001; p = .001), indicating that the level of IL of the respondents plays a major role in their information satisfaction. Therefore, H5 was supported by the model. Finally, as we proposed and predicted, the respondent’s perception towards COVID-19 challenges had a direct and positive effect (β = .15; t = 2.759; p = .005) on user information satisfaction, hence supporting H6 in the model. Figure 2: Structural model results. Notes: *p < .01. **p < .005. ***p < .001 5 Discussions and Conclusion The research model proposed in this research extends the (C–A–C) framework (Hilgard, 1980). The novelty of our proposed research model lies in the integration of the additional contextual construct, i.e. the perceived COVID-19 challenges, and the individual-level construct, i.e. literacy skills. To the best of our knowledge, these two variables have never been used to assess the user information satisfaction of females with a refugee or immigrant background. The results confirmed the effect of traditional constructs associated with social media use, such as IO to IF (Kim & Park, 2015) and IF to IA (Lee et al., 2017), and consequently IO to user information satisfaction (Dai et al., 2020). More importantly, the situational and contextual factors such as the perception of challenges associated with COVID-19 and the IL skills of the respondents were found to impact the level of user information satisfaction. As such, we contribute to the literature by showing that females with a refugee or immigrant background living in Finland and Sweden, while using different social media platforms and networking sites excessively to obtain and share information, nevertheless use information avoidance as a possible strategy for coping with information overload during the COVID-19 pandemic. This paper provides some practical implications too. For example, all respondents who participated in this research were female, living in Finland or Sweden, and with either 348 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE a refugee or immigrant background. As such, the findings might be applicable to policymakers to assist them in developing strategies for information management and information access in society. In addition, we showed that IF will likely result in IO behaviour among individuals (more specifically, females with the social status of being refugees or immigrants) who experience negative or unpleasant emotions when interacting with a huge amount of information. It is important that the providers of information in the social media platforms implement measures that could prevent users from experiencing negative satisfaction. However, this paper has some limitations. For example, we cannot claim that the results can be generalised, and our findings are applicable only to the context of this research. Moreover, we cannot solidly confirm the residency of the participants, as the responses were collected via an online and self-reported survey. Moreover, we cannot confirm if respondents clearly understood that their reported time on the internet was solely linked to reporting information retrieval activities. References Alea, L. A., Fabrea, M. F., Roldan, R. D. A., & Farooqi, A. Z. (2020). Teachers’ Covid-19 Awareness, Distance Learning Education Experiences and Perceptions towards Institutional Readiness and Challenges. International Journal of Learning, Teaching and Educational Research, 19 (6), 127-144. Aljanabi, A. R. A., & AL-Hadban, W. K. H. M. (2018). Information literacy and learners’ satisfaction: The mediating role of social networking technology usage. Information and Learning Sciences, 119(11), 618-634. Anderson, S., & Marguerite, D. (2020). Refugees and social media in a digital society. The Journal of Community Informatics, 16, 26-44. Bright, L. F., Kleiser, S. B., Grau, S. L. (2015). Too much Facebook? An exploratory examination of social media fatigue. Computers in Human Behaviour, 44, 148-155. Bronstein, J. (2019). Reframing integration information marginalization and information resistance among migrant workers. Journal of Documentation, 76(1), 27-48. Cao, X., & Sun, J. (2018). Exploring the effect of overload on the discontinuous intention of social media users: An S-O-R perspective. Computers in Human Behaviour, 81, 10–18. Cao, X., & Yu, L. (2019). Exploring the influence of excessive social media use at work: A threedimension usage perspective. International Journal of Information Management, 46, 83–92. Dai, B., Ali, A., & Wang, H. (2020). Exploring information avoidance intention of social media users: a cognition–affect–conation perspective. Internet Research, 30(5), 1455-1478. Eppler, M. J., & Mengis, J. (2004). The concept of information overload: A review of literature. The Information Society: An International Journal, 20, 325-344. Fisher, K.E., Erdelez, S. & McKechnie, L. eds. (2005). Theories of information behaviour. Information Today, Inc. Fornell, C. G., and D. F. Larcker. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research 18(1), 39–50. Fujii, M. S., Hüttmann, J., Kutscher, N., & Friedrichs-Liesenkötter, H. (2020). Participation?! Educational Challenges for Young Refugees in Times of the COVID-19 Pandemic. Media Education, 11(2), 37-47. K. Kainat, M. Ghorbanian Zolbin, G. Widén & S. Nikou: User Information Satisfaction Among Female Refugees and Immigrants as Assessed by the Level of Information Literacy on Social Media 349 Guo, Y., Lu, Z., Kuang, H., & Wang, C. (2020). Information avoidance behaviour on social network sites: Information irrelevance, overload, and the moderating role of time pressure. International Journal of Information Management, 102067. Hair, J. F., Risher, J. J., Sarstedt, M., & Ringle. C. M. (2019). When to use and how to report the results of PLS-SEM. European Business Review, 31(1), 2-24. Hilgard, E. R. (1980). The trilogy of mind: cognition, affection, and conation. Journal of the History of the Behavioural Sciences, 16(2), 107-117. Huitt, W. (1999). Conation as an important factor of mind. Educational Psychology Interactive. Available at: http://www.edpsycinteractive.org/topics/conation/conation.html. (Accessed 18 May 2021). Karim, M., Widén, G., & Heinström, J. (2019). Influence of demographics and information literacy self-efficacy on information avoidance propensity among youth. In Proceedings of CoLIS, the Tenth International Conference on Conceptions of Library and Information Science, Ljubljana, Slovenia, June 16-19, 2019. Khan, K.S., & Eskola, E. (2020). The cultural landscape of women refugees in Sweden - a road to information and integration. In Proceedings of ISIC, the Information Behaviour Conference, Pretoria, South Africa. Information Research, 25(4). Kim, S., & Park, H. (2015). Empirical study on antecedents and consequences of users’ fatigue on SNS and the moderating effect of habit. Journal of Information Technology Services, 14(4), 137157. Lee, S. K., Lindsey, N. J., & Kim, S. K. (2017). The effects of news consumption via social media and news information overload on perceptions of journalistic norms and practices. Computers in Human Behaviour, 75, 254-263. Liebig, T. and Tronstad, K. R. (2018). Triple Disadvantage? A first overview of the integration of refugee women,” OECD Social, Employment and Migration Working Papers, 216, OECD Publishing, Paris. Lloyd, A., Mary, A. K., Kim, M. T., & Asim Q. (2013). Connecting with New Information Landscapes: Information Literacy Practices of Refugees. Journal of Documentation, 69 (1), 121– 144. Martzoukou, K. and Burnett, S., (2018). Exploring the everyday life information needs and the sociocultural adaptation barriers of Syrian refugees in Scotland. Journal of Documentation, 74 (5), 1104 -1132. McCloud, R. F., Jung, M., Gray, S. W., & Viswanath, K. (2013). Class, race and ethnicity and information avoidance among cancer survivors. British Journal of Cancer, 108(10), 1949. Narayan, B., Case, D. O., & Edwards, S. L. (2011). The role of information avoidance in everyday-life information behaviours. Proceedings of the American Society for Information Science and Technology, 48(1), 1–9. Pinto, M., Caballero, D., Sales, D., & Fernández-Pascual, R. (2020). MOBILE-APPS questionnaire: Developing and validating a scale to measure the attitudes and perceptions of undergraduate students on mobile information literacy. Journal of Librarianship and Information Science, 52 (4), 1063-1072. Ravindran, T., Yeow Kuan, A. C., & Hoe Lian, D. G. (2014). Antecedents and effects of social network fatigue. Journal of the Association for Information Science and Technology, 65(11), 2306– 2320. Roberts, E. S. (1999). In defence of the survey method: An illustration from a study of user information satisfaction. Accounting & Finance, 39 (1), 53-77. Sasaki, Y., Kawai, D., & Kitamura, S. (2016). Unfriend or ignore tweets? a time series analysis on Japanese twitter users suffering from information overload. Computers in Human Behaviour, 64, 914-922. Savolainen, R. (2007). Filtering and withdrawing strategies for coping with information overload in everyday contexts. Journal of Information Science, 33 (5), 611-621. 350 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Shin, W., & Lin, T. T. C. (2016). Who avoids location-based advertising and why? Investigating the relationship between user perceptions and advertising avoidance. Computers in Human Behaviour, 63, 444-452. Swar, B., Hameed, T., & Reychav, I. (2017). Information overload, psychological ill-being, and behavioural intention to continue online healthcare information search. Computers in Human Behaviour, 70, 416-425. Turan, Z., Tinmaz, H., & Goktas, Y. (2013). The Reasons for Non-Use of Social Networking Websites by University Students. Comunicar, 21(41), 137–145. Udwan, G., Leurs, K., & Alencar, A. (2020). Digital resilience tactics of Syrian refugees in the Netherlands: Social media for social support, health, and identity. Social Media + Society, 6(2), 2056305120915587. Whelan, E., Islam, N., Brooks, S. (2020). Is boredom proneness related to social media overload and fatigue? A stress–strain–outcome approach. Emerald Insight, 30 (3), 869-887. Yu, L., Cao, X., Liu, Z., & Wang, J. (2018). Excessive Social Media Use at Work Exploring the Effects of Social Media Overload on Job Performance. Information Technology & People, 31 (6): 1091–1112. Zhang, S., Zhao, L., Lu, Y., & Yang, J. (2016). Do you get tired of socializing? An empirical explanation of discontinuous usage behaviour in social network services. Information & Management, 53(7), 904–914 EVALUATING AN IMPLEMENTATION PROTOCOL FOR DIGITIZATION AND DEVICES IN OPERATING ROOMS: A CASE STUDY NAVIN SEWBERATH MISSER,1 JORIS JASPERS,2 BAS VAN ZAANE2, HEIN GOOSZEN3 & JOHAN VERSENDAAL1 1 HU University of Applied Sciences Utrecht, University Medical Center Utrecht, Utrecht, The Netherlands; e-mail: Navin.SewberathMisser@hu.nl, Johan.Versendaal@hu.nl 2 University Medical Center Utrecht, Utrecht, The Netherlands; e-mail: J.Jaspers@umcutrecht.nl, B.vanZaane@umcutrecht.nl 3 Radboud University Medical Center, Nijmegen, The Netherlands; e-mail: Hein.Goozen67@gmail.com Abstract Digitization of activities in hospitals receives more attention, due to Covid-19 related regulations. The use of ehealth to support patient care is increasing and efficient ways to implement digitization of processes and other technological equipment are needed. We constructed a protocol for implementation and in this study, we evaluate this protocol based on a case to implement a device in the OR. We used various data sources to evaluate this protocol: semi-structured interviews, questionnaires, and project documents. Based on these findings, this protocol, including identified implementation activities and implementation instructions can be used for implementations of other devices. Implementation activities include setting up a project plan, organizational and technological preparation, maintenance, and training. In future research, these activities and instructions need to be evaluated in more complex projects and a flexible tool needs to be developed to select relevant activities and instructions for implementations of information systems or devices. DOI https://doi.org/10.18690/978-961-286-485-9.26 ISBN 978-961-286-485-9 Keywords: implementation, operating room, implementation activity, implementation factor, digitization, medical equipment, medical innovation, change management 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 352 1 Introduction Digitizing health care activities within hospitals to support hospital and patient care have been of increasing interest due to the Covid-19 pandemic and related regulations. The Covid-19 pandemic shows the need for rapid implementation of digitized processes, information systems or devices in hospitals (Meyer et al., 2020; Rodriguez Socarrás et al., 2020). Digitizing activities or processes generally require well-planned development activities and implementation of digitized processes require well-prepared implementation activities in order to reach identified goals and to improve adoption among users (Fennelly et al., 2020). Edmondson (2001) describes the implementation of technological equipment as the integration of new technologies in day-to-day activities in an organization (Edmondson, Bohmer and Pisano, 2001). Technological equipment includes technological devices and (medical) information systems. To support implementation of technological devices and digitization in hospitals, such as telehealth, electronic health records, management information systems, we constructed a protocol for implementation with a focus on the Operating Room department (OR) in hospitals (Dutch Hospital Association, 2016). This protocol consists of implementation factors, implementation activities, and implementation instructions (Sewberath Misser et al., 2020). These factors, activities and instructions are based on a systematic literature review and a survey completed by scrub nurses and circulating nurses (Sewberath Misser, Jaspers, et al., 2018; Sewberath Misser, Zaane, et al., 2018). The purpose of this study is to evaluate and refine this protocol for implementation and the research question for this study described as:  To which extent is our protocol for implementation ready for use in practice, based on real life case studies? To address this question, we describe the method and research instruments in the second section of this article. In the third section, we introduce a case and in section four, we evaluate our protocol for implementation based on implementation experiences and results. Finally, we will draw conclusions and describe possibilities for future research. N. Sewberath Misser, J. Jaspers, B. van Zaane, H. Gooszen & J. Versendaal: Evaluating an Implementation Protocol for Digitization and Devices in Operating Rooms: a Case Study 2 353 Method In previous studies, we used focus groups with experts to evaluate this protocol for implementation. In this study, we address the research question by focusing on the evaluation of this protocol for implementation in actual projects. This study consisted of three stages: 1) setting up a study procedure, 2) data gathering, 3) data processing, and analysis. 2.1 Setting up a study procedure We set up a study procedure consisting of sections regarding general information, procedures, research instruments and data analysis guidelines (Maimbo and Pervan, 2005; Yin, 2018). We selected a project for use of the protocol for implementation based on scope, implementation period and feasibility. Projects or cases entailed the implementation of a new device or digitization of a process in the OR, with a limited number of stakeholders during implementation. These cases needed to be implemented between March and April 2020. The selected case for this research involved using the protocol for a pilot study to introduce an exoskeleton for surgical supporting staff. A project leader was assigned to implement an exoskeleton in the OR for selected surgeries. The timeframe for data collection and reporting was extended up until December 2020. 2.2 Data gathering In our study procedure, we considered and selected different instruments to gather data and to ensure quality and rigor: semi-structured interviews, questionnaires, and project documents. 1. Interview with a project leader. In a semi-structured interview, we focused on clearness, completeness, and ease of use of included factors, activities and instructions for implementation. The interview was digitally conducted with MS Teams due to Covid-19 measures. 2. Questionnaires. We composed questionnaires based on the technology assessment model, in which we focus on the intended use, perceived ease of use, and perceived usefulness. These questions could be scored on a lickert 5-points 354 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE scale and participants were able to add comments to clarify their responses (Heijden, 2004; Wu and Wang, 2005; Gagnon et al., 2012; Tantiponganant and Laksitamas, 2014). We developed two sets of questionnaires respectively for project leaders and users. In the questionnaire for project leaders, we focused on the use of the implementation protocol and the questionnaire for users had a focus on the implemented tool. 3. Project documents. Project documents created during and after completion of the project relating to the implementation of the device were used as data source. 2.3 Data processing and analysis Collected questionnaires were processed in MS Excel and the interview with the project leader was video recorded and transcribed in MS Word. This interview was conducted in the Dutch language. Evaluation results based on this case are described according to the structure of the protocol for implementation. Following the analysis of these results, suggestions for refinement for the protocol for implementation are provided. 3 Case: implementation study of the Leavo Exoskeleton An exoskeleton is a wearable, mechanical external structure that enhances or supports the power of a person. Exoskeletons can be either 'active' or 'passive'. Active exoskeletons enhance human power with use of for example electric motors, hydraulic actuators or other types of power. A passive exoskeleton is a mechanical structure using materials such as springs, belts or dampers to support a posture or a motion (Looze de et al., 2016). The Leavo exoskeleton (see figure 1) can be classified as a passive exoskeleton, which supports chest and back. This wearable relieves back and spine muscles and which should reduce back pain and increase durability of people who frequently carry heavy items or keep static positions (Koopman et al., 2019). N. Sewberath Misser, J. Jaspers, B. van Zaane, H. Gooszen & J. Versendaal: Evaluating an Implementation Protocol for Digitization and Devices in Operating Rooms: a Case Study 355 Figure 1: Leavo exoskeleton Legend: A Suspender ; B Hip pads ; C Hip belt; D Smart joint ; E Leg structure; F Chest pad; G Torso structure; H Label ; I Buck belt; J Leg pad; ; Z Hip assembly Source: http://www.Leavo.nl In the OR, scrub nurses and circulating nurses prepare surgeries by setting up surgical instruments prior to surgeries. These instruments are stored in metal instrument baskets, which vary in weight. Depending on the surgical discipline, it often occurs that scrub nurses keep static positions during a surgical procedure. For the purpose of this study, the hospital (client) acquired four exoskeletons for use by scrub and circulating nurses in the OR and the client defined the data collection period. The novelty of this study is that this exoskeleton was used for the first time in an OR-setting. The client and the human resources department (HR) recruited and assigned a project leader. The first author informed the project leader via e-mail about the study procedure, the protocol for implementation, and the data gathering process. In a briefing session, the implementation protocol was explained, as well as the study procedure. As part of this study, the project leader used the protocol for implementation of the device, to complete the questionnaire for project leaders, and to distribute and collect questionnaires for users. Together with the HR-department, the project leader recruited four users for this device. For the purpose of our study, we interviewed the project leader after completion of the implementation. The project leader completed a questionnaire and users of the exoskeleton completed two out of four distributed questionnaires. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 356 4 Evaluation results The protocol for implementation consists of five factors for implementation, with related implementation activities and instructions for implementation. The factors for implementation are: 1.) setting up a plan, 2.) organizational preparation, 3.) technological preparation, 4.) maintenance, and 5.) training and evaluation. In the next paragraphs, we describe evaluation results regarding of the use of this protocol based on the introduction of an exoskeleton. 4.1 Evaluating implementation factor: set up project plan The first factor for implementation refers to setting up a project plan. The interview with the recruited project leader shows that implementation activities such as 1.1 identifying strategic and tactical topics, and 1.2 identify performance, were determined in previous stages of the implementation project. The activities 1.3 identifying stakeholders and 1.4 identifying risks evolved during the implementation process, as the number of stakeholders increased as the project progressed. Identified stakeholders were client, HR, researchers, users of the device. During the interview, the project leader stated that these activities and instructions were clearly described, complete, and ready for use. In table 1, implementation activities for the first implementation factor are described. Table 1: Factor 1: set up a project plan and related activities Id 1.1 1.2 1.3 1.4 1.5 4.2 Description of activities Identify strategic and tactical topics Identify performance Identify stakeholders Identify Risks Identify activities for implementation Evaluating implementation factor: organizational preparation The project leader was responsible for the organizational preparation related to the introduction of this device. Together with stakeholders (client, HR and OR-team), three types of surgeries were selected to use this exoskeleton: vascular surgery, orthopedic surgery and cardiothoracic surgery. These surgeries were selected based N. Sewberath Misser, J. Jaspers, B. van Zaane, H. Gooszen & J. Versendaal: Evaluating an Implementation Protocol for Digitization and Devices in Operating Rooms: a Case Study 357 on the duration of surgeries, positioning of the scrub nurse during surgeries and usage of instruments. The project leader assembled an implementation team (see table 2, activity 2.1) by recruiting four scrub nurses to use an exoskeleton prior to and during surgeries. The project leader was able to foster team familiarity (activity 2.2), as she provided instructions how to use the device and as she responded to users’ queries. After the introduction of the device, scrub nurses were able to identify the affected activities (activity 2.3) caused by the new device, such as preparatory activities to assemble and to wear the device. According to the project leader, existing checklists or procedures completed by scrub nurses or circulating nurses were not updated (activity 2.4). She stated that simulations or sessions to practice (activity 2.5) were scheduled to identify the performance of the device and to assess whether the project goals could be met. In the interview, the project leader expected a gradual increase in adoption of the device. She expected an increased use of the device, as the intention of this device was to provide support during lifting and static positions. In contrast to her expectation, her encouragement and guidance was needed to convince users to use the device. This encouragement was needed due to some technical difficulties and extra work (activities 2.6, 2.7 and 2.8). After completion of the project, scrub nurses completed questionnaires and they confirmed that the project leader was responsive and available for questions and guidance. This evaluation shows that identified activities and instructions, related to the implementation factor organizational preparation, are ready to be used in practice. Table 2: Factor 2: Organizational preparation and related activities Id 2.1 2.2 2.3 2.4 2.5 Description of activities Assemble a multidisciplinary implementation team Foster team familiarity Identify affected activities and/or processes Update checklists Perform simulations 2.6 2.7 2.8 Identify and deploy activities to increase employees’ engagement Identify and deploy activities to increase employees’ adoption Communicate with stakeholders 358 4.3 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Evaluating implementation factor: technological preparation The third implementation factor, related activities, and instructions involve the technological preparation of the device and its environment. To prepare the device for use, the manufacturer of the exoskeleton tailored and adjusted each device to each users’ body type (activity 3.1 in table 3). Ergonomic aspects for use were considered, according to the project leader (3.2) as the device supported static positions and heavy lifting (see figure 1). With reference to the information systems (IT) environment, no interfaces were needed and no electronic data was generated, as the exoskeleton is classified as a mechanical device (activities 3.3 and 3.5). As the project progressed, integration of the device in the existing working environment (activity 3.4) was increasingly relevant after introduction. During the course of the project, various troubleshooting challenges occurred: when lead aprons were used during surgeries to reduce effects of x-rays, the exoskeletons were difficult to adjust and wear. In simulations and during execution of regular activities, users had trouble with rotating movements when wearing the device (activity 3.6). Table 3: Factor 3: Technological preparation and related activities Id 3.1 3.2 3.3 3.4 3.5 3.6 4.4 Description of activities Prepare equipment Consider ergonomic aspects Prepare interfaces with other information systems Integrate device within existing environment Manage generated data Interpret screens and troubleshooting Evaluating implementation factor: maintenance As part of the implementation protocol, an activity setting up a maintenance plan (activity 4.1 in table 4) is included. In the interview, the project leader stated that she did not set up a maintenance plan for the exoskeleton. She addressed safety issues regarding use of the device during instructions. Updates of safety regulations were not addressed in this stage of the project. N. Sewberath Misser, J. Jaspers, B. van Zaane, H. Gooszen & J. Versendaal: Evaluating an Implementation Protocol for Digitization and Devices in Operating Rooms: a Case Study 359 Table 4:Factor 4: Maintenance and related activities Id 4.1 4.2 4.5 Description of activities Set up maintenance plan Update safety (regulations) Evaluating implementation factor: training The final factor in the protocol for implementation refers to training activities (activity 5.1 in table 5), assessing skills (activity 5.2) and evaluating experiences (activity 5.3). Scrub nurses were trained to assemble, use, and disassemble the device. According to the project leader, attention and supervision was needed to adjust the exoskeleton properly, for optimal use of the device during observed surgeries. Reports regarding the use and functionality of the exoskeleton were gathered and reported to the client and the manufacturer. These reports mainly referred to the intended use of the device. Two scrub nurses completed a questionnaire to reflect on the implementation of the device. Table 5. Factor 5: Training and evaluation, and related activities Id 5.1 5.2 5.3 4.6 Description of activities Train involved staff Assess Skills Evaluate experiences Evaluation of the protocol: perceived ease of use and perceived usefulness The questionnaire for project leaders focused on the perceived ease of use and perceived usefulness of the protocol for implementation. The project leader stated in a completed questionnaire that activities and instructions were clearly structured, clearly described, and ready for use. In the interview, the project leader suggested a more user-friendly layout for this protocol in general, because the appearance and structure of the used protocol had a scientific lay out. She proposed to omit referrals to scientific literature and proposed to simplify some sentences to improve userfriendliness. The project leader stated that different factors and activities were helpful to prepare and to introduce this new device. She also found that the protocol provides flexibility to adjust to this project or other implementation projects, by 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 360 choosing relevant activities and implementation instructions. With reference to usefulness of activities and related instructions, the project leader agrees fully with the statement that the use of a protocol can improve efficiency and increase adoption of new devices with users. Users indicated in completed questionnaires that they were not informed of the use of an implementation protocol. One user, with more than 20 years of experience as a scrub nurse, stated that the introduction of this device was performed better than previous implementations. This scrub nurse indicated that this implementation performance was caused by the project leaders’ involvement, as she was available for questions and instructions. 5 Discussion In hospital environments, specifically in OR's, surgeons and other involved staff such as scrub nurses and circulating nurses use information systems and technological devices to support or execute surgeries. However, possibilities for digitization of supporting activities remain a topic of interest and research continues (Fennelly et al., 2020; Rodriguez Socarrás et al., 2020; Scott et al., 2020; Beiser et al., 2021). The focus of this study was to evaluate an implementation protocol with a case to introduce an exoskeleton for use by scrub and circulating nurses. With reference to the first implementation factor 'set up a project plan' and activities, evaluation results show that the implementation stage of a project is preceded by several other project activities and project stages. Activities such as identifying strategic topics, performance and stakeholders (activities 1.1 – 1.3) were addressed in previous stages of the project and prior to implementation. Examples of stakeholders are project leader, client, and human resources. Based on these evaluation results, we propose a change in the descriptions of included activities. In the implementation stage of the project, focus should be on topics and performance criteria related to the implementation of the device. Regarding the second factor 'organizational preparation', various activities were deployed to recruit users. In practice, many potential users refused to participate, possibly caused by social pressure, fear of wearing a shield, or fear for an uncomfortable fit. Activities related to the third factor 'technological preparation' were addressed, with focus on the activities preparing equipment, considering ergonomic aspects and integration within the existing environment. The last factor for implementation, training, was operationalized by providing instructions and simulations. Training plans and assessment plans were not developed for this device. Based on these evaluation N. Sewberath Misser, J. Jaspers, B. van Zaane, H. Gooszen & J. Versendaal: Evaluating an Implementation Protocol for Digitization and Devices in Operating Rooms: a Case Study 361 results of this protocol, we consider two findings: 1.) implementation activities are sorted per factor and 2.) functionality and user-friendly design of a tool affect implementation success and adoption. Finding 1: implementation activities are sorted per factor. In the current protocol for implementation, activities and instructions are grouped according to theme or implementation factor. Results show that many activities are not performed sequentially and some executed activities need adjustment during the implementation process. For example, preparation activities involving technology, organization, and training are interconnected: when the manufacturer tailored the exoskeletons to the user’s body type, users were instructed and users practiced with the device. Activities may need adjustment during the implementation process for example changes in stakeholders, implementation team, and communication activities. Finding 2: functionality and user-friendly design affect implementation success and adoption. Implementation of a device in an organization requires effort from involved stakeholders and users. Following the technology assessment model, we argue that functionality and user-friendly design should address a specific need of users within an organization. Considering these aspects during the development process of the tool, will affect adoption and implementation success (Gagnon et al., 2012). Based on the results of this case, a proven technology or device from a specific sector might not be transferrable to another sector or context due to situational factors or other environmental aspects. 6 Conclusions, limitations and future research In this study, we addressed the question to which extent a protocol for implementation was ready for use in practice. Therefore, we evaluated this protocol by using this protocol in a small-scale project to implement an exoskeleton in OR's. We conclude that implementation activities and implementation instructions included in this protocol are useful, complete, and ready for use in more complex projects. Refinement of this protocol can be achieved by clarifying instructions and 362 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE removing scientific references. Although this study was carefully prepared and executed, several limitations can be identified. The intention was to evaluate this protocol with a case to digitize pathology inquiries at the hospital laboratory. This project was discontinued due to Covid-19 measures and priorities. We argue, that included activities in our protocol for implementation are relevant and similar for the digitizing activities in hospitals. In previous studies, we identified and relevant implementation activities and instructions. We based these activities and instructions on a literature research and questionnaire, in which we included implementations of information systems, electronic healthcare records and digitized processes in hospitals (Rivkin, 2009; Ehrenfeld and Rehman, 2011). Although results and findings to this case study are based on a small case and cross case analysis was not possible, we assured data quality and rigor by using various sources of data as triangulation measures. Data collection was only conducted and analyzed after the device was implemented and after the protocol had been used according to the study procedure. In future research, this implementation protocol needs to be evaluated in other projects with increased complexity. Other future research should include refinement of this protocol based on the first finding, in particular, the development of a tool to select and sort implementation activities and instructions based on user preference and tailored to context. References Beiser, M. et al. (2021) ‘Electronic Health Record Usage Patterns: Assessing Telemedicine’s Impact on the Provider Experience During the COVID-19 Pandemic’, Telemedicine and e-Health, 00(00), p. tmj.2020.0490. doi: 10.1089/tmj.2020.0490. Dutch Hospital Association (2016) Convenant Veilige toepassing van medische technologie in de medisch specialistische zorg. Bilthoven: Barnyard Creative Powerhouse. Available at: http://www.nfu.nl/img/pdf/16.11163_NVZ-NFU_ea_Convent_Medische_Technologie__definitieve_versie_2016.pdf. Edmondson, A. C., Bohmer, R. M. and Pisano, G. P. (2001) ‘Disrupted Routines: Team Learning and New Technology Implementation in Hospitals’, Administrative Science Quarterly, 46(4), p. 685. doi: 10.2307/3094828. Ehrenfeld, J. M. and Rehman, M. A. (2011) ‘Anesthesia information management systems: a review of functionality and installation considerations.’, Journal of clinical monitoring and computing. Netherlands, 25(1), pp. 71–79. doi: 10.1007/s10877-010-9256-y. Fennelly, O. et al. (2020) ‘Successfully implementing a national electronic health record: a rapid umbrella review’, International Journal of Medical Informatics. Elsevier B.V., 144(September), p. 104281. doi: 10.1016/j.ijmedinf.2020.104281. Gagnon, M. P. et al. (2012) ‘Using a modified technology acceptance model to evaluate healthcare professionals’ adoption of a new telemonitoring system’, Telemedicine and e-Health, 18(1), pp. 54–59. doi: 10.1089/tmj.2011.0066. N. Sewberath Misser, J. Jaspers, B. van Zaane, H. Gooszen & J. Versendaal: Evaluating an Implementation Protocol for Digitization and Devices in Operating Rooms: a Case Study 363 Heijden, H. van der (2004) ‘User Acceptance of Hedonic Systems’, MIS Quarterly, 28(4), pp. 695–704. Koopman, A. S. et al. (2019) ‘Effects of a passive exoskeleton on the mechanical loading of the low back in static holding tasks’, Journal of Biomechanics, 83(3), pp. 97–103. doi: 10.1016/j.jbiomech.2018.11.033. Looze de, M. P. et al. (2016) ‘Exoskeletons for industrial application and their potential effects on physical work load’, Ergonomics, 59(5), pp. 671–681. doi: 10.1080/00140139.2015.1081988. Maimbo, H. and Pervan, G. (2005) ‘Designing a Case Study Protocol for application in IS research’, 9th Pacific Asia Conference on Information Systems: I.T. and Value Creation, PACIS 2005, pp. 1281–1292. Meyer, B. C. et al. (2020) ‘Medical Undistancing Through Telemedicine: A Model Enabling Rapid Telemedicine Deployment in an Academic Health Center During the COVID-19 Pandemic’, Telemedicine and e-Health, 00(00), pp. 1–10. doi: 10.1089/tmj.2020.0327. Rivkin, G. (2009) ‘Challenges of Technology Integration and Computer-Assisted Surgery’, The Journal of Bone and Joint Surgery (American). United States, 91(Supplement_1), p. 13. doi: 10.2106/JBJS.H.01410. Rodriguez Socarrás, M. et al. (2020) ‘Telemedicine and Smart Working: Recommendations of the European Association of Urology’, European Urology, 78(6), pp. 812–819. doi: 10.1016/j.eururo.2020.06.031. Scott, B. K. et al. (2020) ‘Advanced digital health technologies for COVID-19 and future emergencies’, Telemedicine and e-Health, 26(10), pp. 1226–1233. doi: 10.1089/tmj.2020.0140. Sewberath Misser, N., Zaane, B. Van, et al. (2018) ‘Implementing Medical Technological Equipment in the OR : Factors for Successful Implementations’, Journal of healthcare engineering, 2018. doi: https://doi.org/10.1155/2018/8502187. Sewberath Misser, N., Jaspers, J., et al. (2018) ‘Transforming operating rooms: factors for successful implementations of new medical equipment’, Digital Transformation – Meeting the challenges, (June), pp. 279–289. doi: 10.18690/978-961-286-170-4.18. Sewberath Misser, N. et al. (2020) ‘A protocol for the implementation of new technology in a highly complex hospital environment: the operating room’, International Journal of Networking and Virtual Organisations, 22(2), p. 199. doi: 10.1504/IJNVO.2020.105543. Tantiponganant, P. and Laksitamas, P. (2014) ‘An analysis of the technology acceptance model in understanding students’ behavioral intention to use university’s social media’, Proceedings 2014 IIAI 3rd International Conference on Advanced Applied Informatics, IIAI-AAI 2014, 12, pp. 8–12. doi: 10.1109/IIAI-AAI.2014.14. Wu, J. H. and Wang, S. C. (2005) ‘What drives mobile commerce? An empirical evaluation of the revised technology acceptance model’, Information and Management, 42(5), pp. 719–729. doi: 10.1016/j.im.2004.07.001. Yin, R. (2018) Case Study Research and Applications Design and Methods. 6th edn. Sage Publications Limited 364 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE WHO ELSE DO YOU NEED FOR A DATADRIVEN BUSINESS MODEL? EXPLORING ROLES AND EXCHANGED VALUES FLORIAN LESKI,1 MICHAEL FRUHWIRTH2 & VIKTORIA PAMMER-SCHINDLER1 1 Graz University of Technology, Graz, Austria, e-mail: florian.leski@student.tugraz.at, viktoria.pammer-schindler@tugraz.at 2 Know-Center GmbH, Graz, Austria, e-mail: mfruhwirth@know-center.at Abstract The increasing volume of available data and the advances in analytics and artificial intelligence hold the potential for new business models also in offline-established organizations. To successfully implement a data-driven business model, it is crucial to understand the environment and the roles that need to be fulfilled by actors in the business model. This partner perspective is overlooked by current research on datadriven business models. In this paper, we present a structured literature review in which we identified 33 relevant publications. Based on this literature, we developed a framework consisting of eight roles and two attributes that can be assigned to actors as well as three classes of exchanged values between actors. Finally, we evaluated our framework through three cases from one automotive company collected via interviews in which we applied the framework to analyze data-driven business models for which our interviewees are responsible. DOI https://doi.org/10.18690/978-961-286-485-9.27 ISBN 978-961-286-485-9 Keywords: data-driven business models, ecosystem, framework, key partners, literature review 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 366 1 Introduction The increasing volume of available data and the advances in analytics and artificial intelligence hold the potential for competitive advantage, business growth, and new business models. Thus, also offline-established organizations are seeking new socalled data-driven business models (DDBMs). This innovation and transformation process is often challenging, as it requires new skills and capabilities (e.g., data science or IT infrastructure), deep relationships, and partner information ecosystems (Schüritz et al., 2017). These interdependencies and the complexity of the ecosystem increase the risk in business model innovation (Dellermann et al., 2017). In general, tools and methods support the process of business model innovation. Still, there is a limited amount of tool support that explicitly focuses on data utilization and mainly supports idea generation (Fruhwirth, Ropposch, PammerSchindler, 2020). Furthermore, to successfully implement DDBMs, it is crucial to understand the environment and involved stakeholders, as companies will collaborate more and increase their dependencies (Hunke et al., 2017). Typically, traditional firms rely on new external partners for their DDBM, such as a cloud- or data provider. Thus, it is important to know the roles that need to be fulfilled by actors in the own business model. Business model representations with a transactional focus are useful to understand, develop, and model business models (Fruhwirth et al., 2021; Täuscher and Abdelkafi, 2017). There, types of actors and exchanged values support modeling a business model (Terrenghi et al., 2018). Despite this, existing research on DDBMs mostly overlooks the partner and ecosystem perspective. Accordingly, we ask the following research question: What roles do exist in a data-driven business model, and how can the exchanged values be categorized? To answer this research question, we conducted a structured literature review and derived a framework with a set of eight roles and two attributes that can be assigned to actors as well as three classes of exchanged values. The framework was evaluated by applying it to three use cases from one company in the automotive industry. F. Leski, M. Fruhwirth & V. Pammer-Schindler: Who Else do You Need for a Data-Driven Business Model? Exploring Roles and Exchanged Values 2 367 Background Data-driven business models are digital business models with a conceptual focus on value creation with data (Guggenberger et al., 2020). DDBMs rely on data as a key resource and apply data analytics techniques as key activities to discover insights from data and that are transformed into a data-based value proposition that supports customers in their decision-making process (Hartmann et al., 2016; Kühne and Böhmann, 2019; Schüritz et al., 2019). Other researchers denote such models as »data-infused business models« (Schüritz and Satzger, 2016) or »data-driven services« (Azkan et al., 2020). Data-driven services could be either offered as standalone or as an add-on to existing products or services (Breitfuß et al., 2019; Wixom and Ross, 2017). Existing conceptualization and classification approaches of DDBMs have a company-centric focus, studying the value creation process with types of data sources and key activities related to data and analytics (e.g., Hartmann et al., 2016), the value proposition (e.g., Fruhwirth, Breitfuß, Pammer-Schindler, 2020) or the value delivery with service flows or platform types (e.g., Azkan et al., 2020). Studying and developing DDBMs also involves the ecosystem perspective with involved roles and actors (Hunke et al., 2017). Little attention has been paid to that in contemporary research on DDBMs. A business model can be understood as »an architecture of the product, service and information flows, including a description of the various business actors and their roles; a description of the potential benefits for the various business actors; a description of the sources of revenues« (Timmers, 1998, p. 4). These actors are economic independent entities and »exchange value objects, which are services, products, money, or even consumer experiences. A value object is valuable to one or more actors.« (Gordijn and Akkermans, 2001, p. 13). A business model also can be seen as a set of activities, performed by the focal organization itself, by its customers, suppliers, and/or partners (Zott and Amit, 2010). Thus, every actor has one or more roles, that describe an actor’s activities, functions, or contributions in the business model (Terrenghi et al., 2018). This understanding of business models takes a network-centric and transactional view, focusing on value exchange among actors. Similar concepts in that regard have been established, such as the »value network« (Allee, 2008), or the »business ecosystem« (Jacobides et al., 2018). 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 368 3 Methodology Aiming to identify types of actors and classes of exchanged values in DDBMs, we conducted a structured literature review and adopted an inductive category formation approach to analyze and synthesize the literature. Finally, we evaluated our framework in three cases from one automotive company. We based our search and selection process on the guidelines and recommendations of Vom Brocke et al. (2009) and Webster and Watson (2002). We started with a database search as summarized in Table 1. Our search strings were informed by previous literature denoted in the background section. We searched separately for papers dealing with actors and exchanged values in ecosystems. By applying the stated logical search terms in the respective databases1, 2513 articles were found; 917 for actors, 1496 regarding exchanged values. Science Direct Scopus Web of Science ACM AND IEEE Xplore ("digital" OR "datadriven" OR "datainfused" OR "databased") AND ("business model" OR "service") (role" OR "actor" OR "partner") ("network" OR "ecosystem" OR "value chain") AISel Table 1: Summary of the Database Search Results 300 22 230 162 118 85 281 214 258 306 193 244 Further, we applied a three-step selection process: First, we selected 119 relevant articles based on their titles. Second, we scanned the abstracts of these selected papers for relevance, limiting them to 62 articles. Third, we read the full text of the remaining papers and made a final selection of 26 articles that are relevant for our Search strings were applied to title, abstract, keywords and/or full text depending on the database to retrieve a manageable number of articles per query. A detailed description can be provided by the authors upon request. 1 F. Leski, M. Fruhwirth & V. Pammer-Schindler: Who Else do You Need for a Data-Driven Business Model? Exploring Roles and Exchanged Values 369 research. We also conducted a forward and backward search (Webster and Watson, 2002), leading to an additional set of 11 publications. Therefore, we arrived at a final sample of 38 articles (17 for actors, and 21 for exchanged values), whereas five articles were present in both categories, resulting in 33 articles2 without overlaps. After the search and selection process, we analyzed and synthesized the selected literature following an inductive category formation approach (Mayring, 2015). We examined the papers' content aiming to define distinct roles for actors and classes of exchanged values present in DDBMs. Initially, we specified that the level of abstraction of the resulting classes must be generic so that they can be applied to a broad spectrum of industries. We analyzed the material focusing on the results, findings, conclusions, figures, and tables and summarized the essential parts of the material for both actors and exchanged values. Subsequently, we synthesized this interim outcome to a generic set of categories, consisting of ten roles and two attributes that can be assigned to actors as well as three classes of exchanged values. After the evaluation, two roles were dropped or merged with other roles. We evaluated and refined our framework in three use cases from the automotive industry. Therefore, we conducted three semi-structured interviews with managers from one automotive company (as shown in Table 2), each responsible for developing a business model for a data-driven innovation. We selected only cases where a data-driven service was provided to external B2B customers. To ensure the confidentiality of the company, interviewees, and use cases, all names and specific information were anonymized. In the beginning, we introduced the framework of roles and classes of exchanged values. The interviewees were then asked to apply the framework in the context of their use cases, in terms of involved actors as well as exchanged values. The outcome of each interview was a visual network-based representation of the business model. Further, we asked how understandable, useful and comprehensive the framework is and if some roles were missing or unnecessary. The full list of identified articles was omitted in this paper due to space restrictions and can be provided by the authors upon request. 2 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 370 Table 2: Overview of interviews Position Product Manager Product Manager Project Manager A B C 4 Use Case Service in the field of autonomous driving Providing end-customer insights as a service Fleet monitoring service for electric vehicles Duration 45 min 30 min 45 min Results In the following, we present our framework, as shown in Figure 1, by introducing eight roles and two attributes that can be assigned to an actor and follow with three classes of values that are exchanged between actors. Note that we describe here only the final framework after performing the initial evaluation described later in Section 5 due to space limitations. Exchanged values Actors Roles • • • • • • • • Attributes Service provider • Active or passive integration Customer • Internal or external Data provider scope Technology provider Physical product provider Financier Research organization Standardization body Money flows Intangible non-financial flows Tangible nonfinancial flows • Service and digital offering • Data • Information • Knowledge • Models and configurations Figure 1: Classification of actors and exchanged values in data-driven business models. 4.1 Roles of Actors in Data-Driven Business Models We have identified eight different roles that can be assigned to an actor in a DDBM:  A service provider is an actor who utilizes data as a resource to create or co-create value for other actors (Immonen et al., 2014; Kaiser et al., 2019; Schüritz et al., 2019), for instance, by adding data-driven services to a physical product (Terrenghi et al., 2018). F. Leski, M. Fruhwirth & V. Pammer-Schindler: Who Else do You Need for a Data-Driven Business Model? Exploring Roles and Exchanged Values        4.2 371 A customer is a recipient of the offering who also has a need. The customer initiates the value generation process triggered by his needs (Terrenghi et al., 2018), can actively participate in the value (co-)creation (Cova and Salle, 2008), or act just as a passive receiver. A customer creates real value via utilizing the potential value of the data-driven service offered by the service provider (Schüritz et al., 2019). A data provider is an actor who collects and aggregates data from public or private sources, performs the necessary preprocessing steps, and provides it to other actors who request data (Curry, 2016). This includes for instance collecting data about the conditions of a physical object in a cyberphysical system (Terrenghi et al., 2018). A technology provider is an actor who provides the necessary technical infrastructure, platforms, and tools to the business model owner, such as data management solutions or cloud technology (e.g., Curry, 2016; Immonen et al., 2014) A physical product provider is an actor who manufactures and sells a physical core product equipped with data-collecting devices, such as sensors, that should be enriched with a data-driven service (Kaiser et al., 2019; Papert and Pflaum, 2017; Terrenghi et al., 2018). A financier is a provider of financial resources for the business model innovation, such as a pre-financing investor, an incubator, or a venture capitalist (Curry, 2016; Papert and Pflaum, 2017). A research organization, such as a university, a research partner, or an internal research and development department, is an actor that engages with other actors in the business model to support the value generation process (Kindström et al., 2015; Schymanietz and Jonas, 2020). A standardization body is responsible for introducing common standards and controlling the economy legally addressing topics such as transparency or data privacy in the ecosystem (Curry, 2016; Terrenghi et al., 2018). Actor Attributes We further found two attributes that can be assigned to each actor describing their interaction in the business model: the level of integration into the business model (i.e., active or passive) and the scope (i.e., internal or external). 372 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE The integration of an actor into the business model can be either active or passive. An actively integrated actor can benefit from working with other actors in the business model (Zolnowski et al., 2016). Turetken et al. (2019) distinguish between core partners that are actively engaged in the value creation process; and enriching partners. The focal organization is overseeing the business model and takes an active role. Also, a customer can play an active role in the value co-creation process of a data-driven service (Schüritz et al., 2019) or stay passive by just receiving an offering. The scope describes the internal or external relation relative to the focal business model that is currently analyzed. A service ecosystem consists of internal and external roles (Sklyar et al., 2019). All actors that are clustered within the same organizational unit of the focal business model are considered as internal. The business model owner cannot run the business by himself alone and therefore is usually supported by external and internal actors (Schymanietz and Jonas, 2020). For instance, a DDBM can rely on internal data sources, external data sources, or both (Hartmann et al., 2016), thus involves also external data providers. 4.3 Exchanged Values between Actors Actors are exchanging values in a DDBM, that we clustered into three classes: money flows, intangible non-financial flows, and tangible non-financial flows. Money flow summarizes all exchanged values of financial nature. Money serves as an enabler for negotiation and trading activities between economic actors (Allee, 2008). Flows of money can occur in different forms, denoted as revenue models, such as subscription fees or a pay-per-use model (Terrenghi et al., 2018). The choice of one model is influenced by several factors, such as capabilities and the characteristic of the service (Enders et al., 2019). The class of intangible non-financial flow summarizes all exchanged values between actors that are non-monetary and intangible meaning that it »cannot be seen, felt, tasted or touched« (Chowdhury and Åkesson, 2011, p. 4). Such values are denoted in general as services (e.g., Immonen et al., 2014; Täuscher and Laudien, 2017) and digital offerings (Sklyar et al., 2019; Täuscher and Laudien, 2017). On a more granular level, flows can be divided into data (e.g., Engelbrecht et al., 2016; Terrenghi et al., 2018), information (e.g., Curry, 2016; Schüritz et al., 2019), F. Leski, M. Fruhwirth & V. Pammer-Schindler: Who Else do You Need for a Data-Driven Business Model? Exploring Roles and Exchanged Values 373 knowledge (e.g., Brownlow et al., 2015; Schüritz et al., 2019), and models or configuration of models (Hirt and Kühl, 2018). The category tangible non-financial flow summarizes all exchanged values between actors that are non-monetary and tangible, such as physical products, raw materials, or other physical resources (e.g., Allee, 2008; Täuscher and Laudien, 2017). DDBMs can also rely on hardware as a key resource, such as measurement instruments, data transmission devices, or data-generating products. 5 Evaluation and Discussion of Results in three Cases We evaluated the initial framework from the literature synthesis in three cases, collected via interviews with managers from one automotive company. We structured our insights along with the findings from the cases and the interviewees’ feedback regarding the completeness, discriminability, and understandability of the individual elements as well as the usefulness of the overall framework. The framework was sufficient to describe and analyze the cases: all roles, attributes, and values of the framework appeared in the cases and no additional ones that were not included in the framework emerged through the data collection process. When analyzing the content of our cases, we found that in two of three cases, one actor in the business model fulfilled both roles of the customer as well as a data provider, because the business model was relying on data provided by the customer. Further, the business models relied on partners with the role of a technology provider (e.g., providing a platform for data analysis), as well as a physical product provider (e.g., providing measurement hardware for data acquisition as well as devices for storage and transmission). Also, the attribute scope has been helpful in distinguishing between roles that are fulfilled internally and by external partners in the business model. Regarding the completeness of the framework, one interviewee mentioned that it is »quite comprehensive, I can't think of an actor that is missing« (Interviewee A). Interviewee C mentioned that he missed the role of the user, as in B2B context, the user and buying customer are often separate actors within one organization. Regarding the definition of roles, we found that the initial roles of »data supplier« and »data collector« were difficult to distinguish, as one interviewee mentioned: »the differentiation between the collector and supplier is diffuse for me, it might make more sense for other use cases« (Interviewee A). Therefore, we decided to merge both under a new role 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 374 »data provider«. Similarly, distinguishing the initial roles of »resource integrator«, »service provider« and »technology provider« was challenging. We decided to drop the role of »resource integrator« and refined the definition of a technology provider, in the sense that a technology provider only offers the resource without supporting the application of it compared to a service provider. Further, the interviewees found it beneficial to have a more nuanced level of integration. We found that it is necessary to elaborate a more granular differentiation of exchanged intangible values, for instance what distinct type of exchanged data in a DDBM is essential. Regarding the usefulness of the framework, it could help to understand complex environments by illustrating all involved actors as a whole. Interviewee B for instance, mentioned that a visual representation with this framework could be beneficial in complex and multi-layered business models and »where there are no flows on both sides, it is critical because only one actor can benefit from the setting« (Interviewee B). 6 Conclusion In this research, we developed a framework with roles and attributes that can be assigned to actors and classes of values exchanged between actors in DDBMs. We contribute to the body of knowledge by shedding first lights on the partner perspective in DDBMs, which was overlooked by previous research. We extend the existing research of Hunke et al. (2020) on the orchestration of key activities in datadriven services, by a nuanced reflection of the partner perspective. Further, our framework extends a network-based representation for DDBMs from Fruhwirth et al. (2021) by providing a template for identifying and then visualizing relevant actors and value flows. Additionally, we extend existing research on flow-based business model representations (e.g., Gordijn and Akkermans, 2001) by introducing new attributes for actors as well as data as a central type of value flows. Note as a limitation, that we found few publications that had a specific focus on data due to the topic’s novelty. Further, we might have missed some literature due to the difference in the denomination of the concept of DDBMs that our search strings might not cover. Another limitation is the sparse evaluation of the results only via three experts of one company in one particular industry. To further improve our framework, it should be applied to an additional number of cases from multiple industries to make our results more generalizable. Also, a detailed investigation of F. Leski, M. Fruhwirth & V. Pammer-Schindler: Who Else do You Need for a Data-Driven Business Model? Exploring Roles and Exchanged Values 375 data-related value exchanges and the roles of service and technology providers seems like a fruitful direction for further research. Further, the framework could be instantiated in a tool with visual representations of the actors and values to design and communicate DDBMs. References Allee, V. (2008) ‘Value network analysis and value conversion of tangible and intangible assets’, Journal of Intellectual Capital, vol. 9, no. 1, pp. 5–24. Azkan, C., Iggena, L., Gür, I., Möller, F. and Otto, B. (2020) ‘A Taxonomy for Data-Driven Services in Manufacturing Industries’, PACIS 2020 Proceedings. Breitfuß, G., Fruhwirth, M., Pammer-Schindler, V., Stern, H. and Dennerlein, S. (2019) ‘The DataDriven Business Value Matrix: A Classification Scheme for Data-Driven Business Models’, 32nd Bled eConference Humanizing Technology for a Sustainable Society, pp. 803–820. Brownlow, J., Zaki, M., Neely, A. and Urmetzer, F. (2015) Data and Analytics - Data-Driven Business Models: A Blueprint for Innovation [Online], Cambridge Service Alliance. Available at http://cambridgeservicealliance.eng.cam.ac.uk/resources/Downloads/Monthly%20Papers/2 015FebruaryPaperTheDDBMInnovationBlueprint.pdf (Accessed 19 July 2017). Chowdhury, S. and Åkesson, M. (2011) ‘A proposed conceptual framework for identifying the logic of digital services’, PACIS 2011 Proceedings. Cova, B. and Salle, R. (2008) ‘Marketing solutions in accordance with the S-D logic: Co-creating value with customer network actors’, Industrial Marketing Management, vol. 37, no. 3, pp. 270–277. Curry, E. (2016) ‘The Big Data Value Chain: Definitions, Concepts and Theoretical Approaches’, in Cavanillas, J. M., Curry, E. and Wahlster, W. (eds) New horizons for a data-driven economy: A roadmap for usage and exploitation of big data in Europe, Switzerland, SpringerOpen, pp. 29–38. Dellermann, D., Fliaster, A. and Kolloch, M. (2017) ‘Innovation risk in digital business models: the German energy sector’, Journal of Business Strategy, vol. 38, no. 5, pp. 35–43. Enders, T., Schüritz, R. and Frey, W. (2019) ‘Capturing Value from Data: Exploring Factors Influencing Revenue Model Design for Data-Driven Services’, WI 2019 Proceedings, pp. 1738–1752. Engelbrecht, A., Gerlach, J. and Widjaja, T. (2016) ‘Understanding the anatomy of data driven business models - towards an empirical taxonomy’, ECIS 2016 Proceedings. Fruhwirth, M., Breitfuß, G. and Pammer-Schindler, V. (2020) ‘The Data Product Canvas: A Visual Collaborative Tool for Designing Data-Driven Business Models’, 33rd Bled eConference Enabling Technology for a Sustainable Society. Online, June 28-29 2020, pp. 515–528. Fruhwirth, M., Pammer-Schindler, V. and Thalmann, S. (2021) ‘A Network-based Tool for Identifying Knowledge Risks in Data-Driven Business Models’, Proceedings of the 54th Annual Hawaii International Conference on System Sciences, pp. 5218–5227. Fruhwirth, M., Ropposch, C. and Pammer-Schindler, V. (2020) ‘Supporting Data-Driven Business Model Innovations: A structured literature review on tools and methods’, Journal of Business Models, vol. 8, no. 1, 7-25. Gordijn, J. and Akkermans, H. (2001) ‘Designing and evaluating e-business models’, IEEE Intelligent Systems, vol. 16, no. 4, pp. 11–17. Guggenberger, M. T., Möller, F., Boualouch, K. and Otto, B. (2020) ‘Towards a Unifying Understanding of Digital Business Models’, PACIS 2020 Proceedings. Hartmann, P. M., Zaki, M., Feldmann, N. and Neely, A. (2016) ‘Capturing value from big data – a taxonomy of data-driven business models used by start-up firms’, International Journal of Operations & Production Management, vol. 36, no. 10, pp. 1382–1406. 376 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Hirt, R. and Kühl, N. (2018) ‘Cognition in the Era of Smart Service Systems: Inter-organizational Analytics through Meta and Transfer Learning’, ICIS 2018 Proceedings. Hunke, F., Seebacher, S., Schüritz, R. and Illi, A. (2017) ‘Towards a Process Model for Data-Driven Business Model Innovation’, 19th IEEE Conference on Business Informatics, pp. 150–157. Hunke, F., Seebacher, S. and Thomsen, H. (2020) ‘Please Tell Me What to Do – Towards a Guided Orchestration of Key Activities in Data-Rich Service Systems’, DESRIST 2020 Proceedings. Immonen, A., Palviainen, M. and Ovaska, E. (2014) ‘Requirements of an Open Data Based Business Ecosystem’, IEEE Access, vol. 2, pp. 88–103. Jacobides, M. G., Cennamo, C. and Gawer, A. (2018) ‘Towards a theory of ecosystems’, Strategic Management Journal, vol. 39, no. 8, pp. 2255–2276. Kaiser, C., Stocker, A. and Fellmann, M. (2019) ‘Understanding Data-driven Service Ecosystems in the Automotive Domain’, AMCIS 2019 Proceedings. Kindström, D., Kowalkowski, C. and Alejandro, T. B. (2015) ‘Adding services to product-based portfolios’, Journal of Service Management, vol. 26, no. 3, pp. 372–393. Kühne, B. and Böhmann, T. (2019) ‘Data-Driven Business Models: Building the Bridge Between Data and Value’, ECIS 2019 Proceedings. Mayring, P. (2015) Qualitative Inhaltsanalyse: Grundlagen und Techniken, 12th edn, Weinheim, Beltz. Papert, M. and Pflaum, A. (2017) ‘Development of an Ecosystem Model for the Realization of Internet of Things (IoT) Services in Supply Chain Management’, Electronic Markets, vol. 27, no. 2, pp. 175–189. Schüritz, R., Farrell, K., Wixom, B. H. and Satzger, G. (2019) ‘Value Co-Creation in Data-Driven Services: Towards a Deeper Understanding of the Joint Sphere’, ICIS 2019 Proceedings. Schüritz, R. and Satzger, G. (2016) ‘Patterns of Data-Infused Business Model Innovation’, IEEE 18th Conference on Business Informatics, pp. 133–142. Schüritz, R., Seebacher, S., Satzger, G. and Schwarz, L. (2017) ‘Datatization as the Next Frontier of Servitization: Understanding the Challenges for Transforming Organizations’, ICIS 2017 Proceedings. Schymanietz, M. and Jonas, J. M. (2020) ‘The Roles of Individual Actors in Data-Driven Service Innovation – A Dynamic Capabilities Perspective to Explore its Microfoundations’, Proceedings of the 53rd Annual Hawaii International Conference on System Sciences (HICSS 2020), pp. 1135–1144. Sklyar, A., Kowalkowski, C., Tronvoll, B. and Sörhammar, D. (2019) ‘Organizing for digital servitization: A service ecosystem perspective’, Journal of Business Research, vol. 104, pp. 450– 460. Täuscher, K. and Abdelkafi, N. (2017) ‘Visual tools for business model innovation: Recommendations from a cognitive perspective’, Creativity and Innovation Management, vol. 26, no. 2, pp. 160– 174. Täuscher, K. and Laudien, S. M. (2017) ‘Uncovering the Nature of Platform-based Business Models: An Empirical Taxonomy’, Proceedings of the 50th Hawaii International Conference on System Sciences. Terrenghi, N., Schwarz, J. and Legner, C. (2018) ‘Towards Design Elements to Represent Business Models for Cyber Physical Systems’, ECIS 2018 Proceedings. Timmers, P. (1998) ‘Business Models for Electronic Markets’, Electronic Markets, vol. 8, no. 2, pp. 3– 8. Turetken, O., Grefen, P., Gilsing, R. and Adali, O. E. (2019) ‘Service-Dominant Business Model Design for Digital Innovation in Smart Mobility’, Business & Information Systems Engineering, vol. 61, no. 1, pp. 9–29. Vom Brocke, J., Simons, A., Niehaves, B., Niehaves, B., Reimer, K., Plattfaut, R. and Cleven, A. (2009) ‘Reconstructing the Giant: On the Importance of Rigour in documenting the Literature Search Process’, ECIS 2009 Proceedings. Webster, J. and Watson, R. T. (2002) ‘Analyzing the past to prepare for the future: Writing a literature review’, Management Information Systems Quarterly, vol. 26, no. 2, pp. 13–23. F. Leski, M. Fruhwirth & V. Pammer-Schindler: Who Else do You Need for a Data-Driven Business Model? Exploring Roles and Exchanged Values 377 Wixom, B. H. and Ross, J. W. (2017) ‘How to Monetize Your Data’, MIT Sloan Management Review, vol. 58, no. 3, pp. 10–13. Zolnowski, A., Towe, C. and Gudat, J. (2016) ‘Business Model Transformation Patterns of DataDriven Innovations’, ECIS 2016 Proceedings. Zott, C. and Amit, R. (2010) ‘Business Model Design: An Activity System Perspective’, Long Range Planning, vol. 43, 2-3, pp. 216–226 378 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE ICT-DRIVEN BUSINESS MODEL INNOVATION IN SMES: THE ROLE OF ORGANIZATIONAL CAPABILITIES, FIRM SIZE AND AGE MOHAMMAD-ALI LATIFI, HARRY BOUWMAN & SHAHROKH NIKOU Delft University of Technology, Faculty of Technology, Policy, and Management, South Holland, The Netherlands, e-mail: s.m.a.latifirostami@tudelft.nl Abstract Research has shown that business model innovation (BMI) can create competitive advantages and enhance firm performance. However, many small and medium-sized enterprises (SMEs) fail to supreme their performance. BMI can create unexpected consequences for businesses and their ecosystem. Therefore, knowing how and under what circumstances BMI affects a firm’s performance is a primary concern for managers/owners of SMEs. Using data from 460 European SMEs, this paper aims to examine three paths through which ICT-driven BMI can impact firm’s performance. Introducing organisational capabilities as a mediator, this study has extended prior literature on BMI by showing that organisational capabilities are as strong as other existing mediators of revenue and efficiency growth regarding improving the firm’s performance. The findings provide guidelines for practitioners to execute informed-decisions about the implementation of BMI based on their firm’s strategies and the available capabilities while considering contingent factors of firm size and age. DOI https://doi.org/10.18690/978-961-286-485-9.28 ISBN 978-961-286-485-9 Keywords: business model innovation, digital transformation, firm performance, mediating factors, organizational capabilities, SME 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 380 1 Introduction Performance improvement is at the heart of any firm, and according to scholars (Hartmann et al., 2013; Karimi and Walter, 2016) BMI positively contributes to firm performance. Some classic examples of innovation in BMs and their association with the firm’s performance are Dell, Wal-Mart, Uber, and Southwest. All these companies developed a novel BM by either introducing or reorganising key components of their BM. The changes to core components or to the architecture of a firm’s BM (Nair et al., 2013), in comparison to innovations in product, service, and process, have been associated with high risk and uncertainty (Chesbrough, 2010; Waldner et al., 2015). So, if not handled properly, a well-formulated BM may fail to lead to improved performance (Chesbrough, 2010; Knab and Rohrbeck, 2014). Christensen et al. (2016) revealed that more than 60% of BMI efforts did not deliver the expected performance. So BMI can have both positive and negative outcomes. Hence, knowing how and when to innovate a BM is a serious challenge for managers/owners of firms (Hartmann et al., 2013). In this paper, we focus on ‘how’ firms exploit or modify their BMs to improve their overall performance. Therefore, we have two objectives: (a) to develop and examine a conceptual framework that illustrates the complex mechanisms through which implementation of strategic BMI decisions related to a focus on efficiency or growth, as well as organizational capabilities, influences a firm’s overall performance, and (b) to explore whether specific characteristics of the firm (i.e., size, age) have a different impact on performance. We contribute to the BM literature in three ways. First, by examining the proposed model using empirical data, we contribute to both the practical knowledge and theoretical enrichment. Second, by considering the mediating effect of organizational capabilities, this research attempts to understand how managers can ensure that BMI provides more benefits to their firms in terms of performance. Third, by focusing specifically on SMEs, we contribute to the body of knowledge on BMI in relation to SMEs. M.-Ali Latifi, H. Bouwman & S. Nikou: ICT-Driven Business Model Innovation in SMEs: The Role of Organizational Capabilities, Firm Size and Age 381 This paper is structured as follows. First, a systematic literature review on mediating factors between BMI and performance is presented. The research method is then described. Next, the research results are presented. The paper ends with some conclusions, a discussion of limitations and suggestions for future research. 2 Literature Review and Hypotheses Development A business model, which uses as a tool to communicate and implement strategic choices, is seen as a realized expression of strategy and articulates how available resources can be used more effectively, how costs can be managed and reduced, and how new sources of revenues can be leveraged (Chesbrough, 2007). Although a significant number of companies have gained advantages from BMI, there are many more that have performed extremely poorly, failed to meet their objectives or even exited business. To explore the causal mechanism, our in-depth analysis of 37 articles resulted in 12 distinct mediating factors through which the BMI indirectly influences a firm’s overall performance. Analysing the factors, we found that some mediators mainly were related to generating revenue by increasing the firm's sales, by a combination of exploring new markets, new customers and new value propositions, and by new ways of service, product and price bundling; we, therefore, called them ‘Revenue growth.’ Other mediators focus on efficiency – that is, by introducing new ways to minimise cost, increasing productivity, or reducing time to market – are referred to as ‘Efficiency growth.’ The last two foci, were related but not identical to the design of efficiency- and novelty-oriented BMs as highlighted in BMI literature (Heikkila et al., 2018; Zott and Amit, 2008). However, we identified some more generic mediators that do not belong to mediators related to revenue or efficiency growth groups, e.g., organisational learning, opportunity recognition, organizational culture; these mediators enable companies to increase their revenue and efficiency. We called this group of concepts ‘Organisational capabilities’, which is vital to long-term performance of business, since a culture of openness and knowledge sharing reinforce a high level of cooperation within the firm and its associated network and contribute to a firm’s readiness to change, and in particular to its ability to survive in the longer term, rather than merely achieving short-term growth (Latifi et al., 2021). 382 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Scholars and practitioners agree that the BM is vital to, for example, the success of organisations, and especially to those that wish to grow (Teece, 2010), to gain competitive advantage, to enhance long-term performance (Bock et al., 2012) and as a new source of innovation (Zott, 2011). However, recent studies have produced inconclusive results when testing the strength of the relationship between BMI and firms’ performance in different regions and industries. We, therefore, to examine whether BMI impacts the performance of SMEs in the European context, propose the following hypothesis: H1: If an SME engages in BMI, its overall performance will improve. Heikkilä et al. (2018) stress that BMI influences firm performance occurs when there is a strategic focus on efficiency. Their findings confirm the research by Zott and Amit (2007) on the impact of efficiency-centred BM design on a firm’s overall performance. BMI can take ICT ventures to complete their transactions efficiently, by reducing transaction costs within the firm and with its outsiders (Ladib and Lakhal, 2015). According to Chesbrough (2007), BMI leverages performance not only by reducing production costs but also by utilising available resources more effectively. Gronum et al. (2016) and Wei et al. (2017) also found that BM designs that focus on efficiency enhance a firm’s performance by reducing inventory costs – thus benefitting both customers and suppliers – and decreasing marketing, sales, and other communication expenditures. In light of this, we propose the next hypothesis: H2: Efficiency growth mediates the relation between BMI and an SME overall performance However, the focus can also be on implementing a growth strategy by attracting new customers and expanding the firm’s markets (Heikkilä et al., 2018). Some scholars argue that BMI, through the creation of new value propositions (Teece, 2010; Wei et al., 2017) or opportunity recognition (Guo et al., 2017) can attract new customers by exploring a market niche not addressed by competitors (Zott and Amit, 2007). These could occur via new ways of market penetration or new ways of market development. Moreover, BMI by combining existing and new channels in a smart way can create new value (Ladib and Lakhal, 2015). Based on this review, we propose the following hypothesis: M.-Ali Latifi, H. Bouwman & S. Nikou: ICT-Driven Business Model Innovation in SMEs: The Role of Organizational Capabilities, Firm Size and Age 383 H3: Revenue growth mediates the relation between BMI and an SME’s overall performance The capacity to innovate is seen as one of the key factors that improve business performance (Burns and Stalker, 1966). An organisation’s culture –norms, values, and beliefs as expressed within the organisation – can boost behaviour that is ultimately related to business performance (Hult et al., 2004). A culture that supports the implementation of a strategic attempt and encouraged by the enthusiastic support of all employees is not easy to imitate and can lead to a sustainable competitive advantage (Anning-Dorson, 2017). A large number of studies found a significant relationship between firm innovativeness and performance in different types of organisations (Rubera and Kirca, 2012). Hult et al. (2004) concluded that innovativeness appeared to be a key mediator in their empirical research. The role of opportunity-sensing and seeking behaviour in BMI has also been emphasised in several studies (Chesbrough, 2010). Several studies investigated the direct effects of corporate entrepreneurship on performance (George and Bock, 2011). However, BMI as a mediator of the relationship between corporate entrepreneurship and a firm’s performance was also considered by Karimi and Walter (2016). So the concepts might have a direct or a mediating effect, here we consider entrepreneurship as belonging to this group of meditators. We, therefore, propose to consider organisational capability, as discussed for innovativeness, opportunity recognition, and culture, as an alternative group of mediating factor: H4: Organisational capabilities mediate the relation between BMI and an SME’s overall performance. A summary of the identified mediating factors that indirectly affect the relationship between BMI and a firm’s overall performance is presented in the Appendix. Figure 1 illustrates the proposed conceptual research model, which is based on the literature review. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 384 Figure 1: Research conceptual model: BMI mechanism to boost firms’ performance 3 Research Method An extensive literature review in the domains of entrepreneurship, innovation management, and BMs was conducted to assemble a comprehensive list of reliable measures. The research constructs were measured by using existing items in the literature. Since firm size and firm age could impact the relationship between BMI and firm’s overall performance (Hartmann et al., 2013; Zott and Amit, 2007), it is appropriate to account for their impact on the path relationships identified in Fig.1. 3.1 Survey administration, sample and data collection This study's population are European SMEs in any industry engaged in business model innovation in the previous 24 months and used ICT to enable their product and service offering. The sample was based on Dun and Bradstreet’s database. Firms were randomly selected from this sample frame an established quotas for microenterprises, small and medium-sized enterprises resulting in a final distribution of 36%, 32%, and 31%, respectively. Data was collected by a professional research agency that uses native speakers and computer-aided telephone interviewing. The final dataset contains 460 SMEs in 17 different industries in 13 European countries engaged in BMI. The questionnaire was based on the previously mentioned scales and was pretested in each of the 13 countries by reading aloud to managers and academics to improve the clarity of the questions and to prevent any potential ambiguous expressions. M.-Ali Latifi, H. Bouwman & S. Nikou: ICT-Driven Business Model Innovation in SMEs: The Role of Organizational Capabilities, Firm Size and Age 4 385 Data analysis All constructs fulfill the requirement for Cronbach’s alpha, i.e., 0.70 or higher (Hair et al.,2014) and for composite reliability (CR) (0.70 or higher) (Table 1). Convergent validity is represented by average variance extracted (AVE), which is recommended to be at least 0.50 (Hair et al., 2011). (Table 2). Discriminant validity guarantees the uniqueness of a measuring construct and indicates that the phenomenon of interest is not captured in other measures (latent variables) within the research model (Hair et al., 2010). For assessing discriminant validity, an alternative criterion is HTMT. An HTMT value close to 1 indicates a lack of discriminant validity. The HTMT values are lower than 0.85. We, therefore, conclude that discriminant validity is not an issue. 5 Results To test the hypotheses, we employed structural equation modelling (SEM) using SmartPLS v.3 software. The mediation analyses with regard to three variables, namely efficiency growth, revenue growth, and the organisational capability, were also computed. Additionally, a multi-group analysis was conducted to evaluate the role of control variables (i.e., firm size and age). In the path model analysis, the firms’ overall performance is explained by a variance of 30%, and the three mediators – namely efficiency growth, organisational capabilities, and revenue growth – are explained by a variance of 24%, 27%, and 37%, respectively, in the model. Consistent with our expectations, the direct path 386 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Table 1: Descriptive statistics, convergent validity, consistency and reliability of items M.-Ali Latifi, H. Bouwman & S. Nikou: ICT-Driven Business Model Innovation in SMEs: The Role of Organizational Capabilities, Firm Size and Age 387 between BMI and the firm’s overall performance is significant (in the absence of mediators); thus, H1 is supported by the model (β = 0.41, t = 10.52, p < 0.001). However, this direct path between BMI and the firm’s overall performance is not significant when the three mediators are included in the analysis. As shown in Figure 2, all six paths from BMI to efficiency growth, revenue growth, and organisational capabilities, and from these mediators to the firm’s overall performance, are statistically significant (p < 0.001). Figure 2: Structural model results (Significance levels: *** p < 0.001, and NS means not significant) Mediation analysis showed a significant direct relationship between BMI and the firm’s overall performance. Therefore H1 was supported confirming that the independent variable (BMI) is a significant predictor of the dependent variable (firm’s overall performance). Satisfying this condition provides the ground to test the mediation relationship between BMI and the firm’s overall performance. Based on the SEM results, when the mediators are included in the analysis, the direct path between BMI and overall firm performance is not significant (see Figure 2). Moreover, as we hypothesized, the mediation test results show that the path between BMI and the firm’s overall performance is fully mediated by three variables (i.e., efficiency growth, revenue growth, and organisational capabilities) in our proposed model. The individual effects of each mediator can be seen in Table 2; thus hypotheses H2, H3, and H4 are supported by the model. 388 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE When considering the size of firms, in our multi-group analysis, we found a significant direct relationship between BMI and overall performance for different sizes. Table 3 shows that the mediation effect of efficiency growth is significant only for micro-sized firms, and revenue growth mediates the relationship between BMI and the overall performance of both small and medium-sized firms. However, firm Table 2: The mediation results between BMI and a firm’s overall performance size has no significant effect on the mediation of organisational capabilities; therefore, organisational capabilities mediate between BMI and performance in firms of all sizes. Table 3: The effect of firm size on mediation relationships Considering firm age as a moderator, none of the three factors mediate the relationship between BMI and the firm’s overall performance in newly-established firms. While efficiency and revenue growth mediate the path between BMI and firm’s overall performance for young and well-established firms, the organizational capabilities mediate this relationship solely in well-established firms (Table 4). M.-Ali Latifi, H. Bouwman & S. Nikou: ICT-Driven Business Model Innovation in SMEs: The Role of Organizational Capabilities, Firm Size and Age 389 Table 4: The effect of firm age on mediation relationship 6 Conclusion This study proposes a model that would enable researchers and practitioners to understand causal mechanisms through which business model innovation (BMI) influences firm performance, specifically when SMEs which use digital technologies are concerned. Our findings contribute to the literature and confirm that ‘efficiency growth,’ ‘revenue growth,’ and ‘organisational capabilities’ are relevant mediators for SMEs that engage in BMI to increase firm’s overall performance. We contribute to the literature by considering organisational capabilities as a mediator between BMI and firms’ overall performance. The research findings also enhance our understanding by demonstrating the importance of firm size and age as moderators between BMI and SME performance. However, we did not find any significant difference in the influence of the contingency factors of firm size and firm age on the direct relationship between BMI and firms’ performance; the results showed that well-established firms achieve better performance through developing organisational capabilities by doing BMI. Moreover, efficiency improvement is not the primary goal of newly-established firms (start-ups) that implement BMI to improve performance, although it is for young (scale-up) and well-established firms. Although various organisational capabilities exist, we investigated only the entrepreneurial orientation, innovativeness, and organisational culture. However, other capabilities that might mediate the relation between BMI and performance – for example, employees’ training and leadership style – are worth further investigation. Furthermore, the focus of the present study was on exploring mediation factors, and only a limited number of contingency factors (i.e., firm size and firm age) were taken into consideration. In particular, we did not take into account the industry characteristics or the BMI implementation skills within firms, for instance, employees' knowledge and skills, management support and the use of 390 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE BMI tooling (Latifi and Bouwman, 2018). This could be an interesting avenue for further research. Our results have implications both for the academic literature on BMI and for practitioner discussions. First, by considering mediating effects, the model elucidates how managers can ensure that BMI brings more benefits to their firms in terms of performance. Second, by examining the proposed model using empirical data from 17 different industries in 13 European countries, we could add practical knowledge along with theoretical enrichment. Third, by focusing specifically on SMEs, we contribute to SMEs’ knowledge of BMI. Fourth, by taking into account the influence of firm size and age on the relationship between BMI and the performance of firms, we provide insight that the owners/managers of firms need to carefully assess their specific situation in order to take appropriate measures to improve the effect of BMI on performance and to choose a focus on growth or efficiency to exploit all benefits of BMI efforts fully. Moreover, managers need to be aware of the organizational capabilities related to BM Innovation. This also clarifies that generic advice of consultants or training programs on BMI needs to take differences in foci as well as capabilities, age, and size into account. More tailored programs are advisable. This study also has some limitations that should be considered when interpreting the findings. First of all, although cross-sectional data are used extensively in business and management research, such data represent a single point in time and hardly allows the cause and effect or the impact of changes over time to be determined. Second, although the respondents – mainly the firms’ top managers/owners – possessed a high degree of relevant knowledge, all of the measures were self-reported using a self-assessed scale, which may represent a potential source of common method bias. Future research should collect objective measurements to eliminate common method bias. While the business world is constantly changing in terms of technology, regulations and customer’s needs, we believe that these results advance BMI research by opening the black box of the causal relationship between BMI and a firm’s overall performance to better understand the BMI phenomenon, how it works and how we can gain the greatest benefit from it. We hope that our work leads to improved managerial practices and helps future research to probe more deeply into these constructs in small and medium-sized firms. M.-Ali Latifi, H. Bouwman & S. Nikou: ICT-Driven Business Model Innovation in SMEs: The Role of Organizational Capabilities, Firm Size and Age 391 References Anning-Dorson, T., 2017. Moderation-mediation effect of market demand and organisation culture on innovation and performance relationship, Marketing Intelligence & Planning, 35, 222–242. Bock, A.J., Opsahl, T., George, G., Gann, D.M., 2012. The Effects of Culture and Structure on Strategic Flexibility during Business Model Innovation. Journal of Management Studies, 49, 279–305. Burns, T. and Stalker, G.M. (1966) The Management of Innovation. London: Tavistock. Chesbrough, H., 2010. Business model innovation: Opportunities and barriers. Long Range Planning, 43, 354– Chesbrough, H., 2007. Business model innovation: it’s not just about technology anymore. Strategy & Leadership, 35, 12–17. doi:10.1108/10878570710833714 Christensen, C.M., Bartman, T., Van Bever, D., 2016. The hard truth about business model innovation. MIT Sloan Management Review, 58. Foss, N.J., Saebi, T., 2017. Fifteen Years of Research on Business Model Innovation: How Far Have We Come, and Where Should We Go? Journal of Management, 43 (1), 220-227. Gronum, S., Steen, J., Verreynne, M. L., 2016. Business model design and innovation: Unlocking the performance benefits of innovation. Australian Journal of Management, 41, 585–605. Guo, H., Tang, J., Su, Z., Katz, J.A., 2017. Opportunity recognition and SME performance: the mediating effect of business model innovation. R&D Management 47, 431–442. doi:10.1111/radm.12219 Hair, J.F., Black, W.C., Babin, B.J., Anderson, R.E., 2010. Multivariate Data Analysis, Prentice-Hall. Hair, J.F., Ringle, C.M., Sarstedt, M., 2011. PLS-SEM: indeed, a silver bullet. Journal of Marketing Theory and Practice, 19 (2), 139-151. Hair, J.F., Sarstedt, M., Kuppelwieser, V., Hopkins, L., 2014. Partial Least Squares Structural Equation Modeling (PLS-SEM): An Emerging Tool for Business Research. European Business Review 26, 106-121. Hartmann, M., Oriani, R., Bateman, H., 2013. The Performance Effect of Business Model Innovation: An Empirical Analysis of Pension Funds. 35th DRUID Celebration Conference, Barcelona, Spain. Heikkilä, M., Bouwman, H., Heikkilä, J., 2018. From strategic goals to business model innovation paths: an exploratory study. Journal of Small Business and Enterprise Development, 25, 107–128. Hu, B. (2014). Linking business models with technological innovation performance through organizational learning. European Management Journal, 32, 587–595. doi:10.1016/j.emj.2013.10.009 Hult, G.T.M., Hurley, R., Knight, G.A., 2004. Innovativeness: Its antecedents and impact on business performance. Industrial Marketing Management, 33, 429–438. doi:10.1016/j.indmarman.2003.08.015 Karimi, J., Walter, Z., 2016. Corporate Entrepreneurship, Disruptive Business Model Innovation Adoption, and Its Performance: The Case of the Newspaper Industry. Long Range Planning 49, 342–360. Knab, S., Rohrbeck, R., 2014. Why intended business model innovation fails to deliver, Proceedings of the R&D Management Conference, Stuttgart, Germany. Kumar Pati, R., Nandakumar, M.K., Ghobadian, A., Ireland, R.D., Regan, N.O., 2018. Business model design performance relationship under external and internal contingencies: Evidence from SMEs in an emerging economy. Long Range Planning, 51 (5). doi:10.1016/j.lrp.2018.01.001 Ladib, N., Lakhal, L., 2015. Alignment between business model and business strategy and contribution to the performance. Journal of High Technology Management Research, 26, 168–176. Latifi, M-A, Nikou, S., Bouwman, H., 2021. Business model innovation and firm performance: Exploring causal mechanisms in SMEs, Technovation, Volume 107. 10.1016/j.technovation.2021.102274. 392 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Latifi, M-A., Bouwman, H., 2018. Business Model Innovation and Firm Performance: The Role of Mediation and Moderation Factors. 31st Bled eConference, June 17 – 20, Bled, Slovenia Liu, Y., Han, Z., 2013. The Empirical Study of Relationship between Business Model and Enterprise Performance. Advanced Materials Research, 850–851, 1078–1081. Majumdar, S.K., 1997. The Impact of Size and Age on Firm-Level Performance. Review of Industrial Organization, 12, 231–241 Marshall, A., 1920. Principles of Economics, 8th Edition. London: Macmillan. Nair, S., Paulose, H., Palacios, M., Tafur, J., 2013. Service orientation: effectuating business model innovation. The Service Industries Journal 33, 958–975. doi:10.1080/02642069.2013.746670 Pucci, T., Nosi, C., Zanni, L., 2017. Firm capabilities, business model design and performance of SMEs. Journal of Small Business and Enterprise Development, 24, 222–241. doi:10.1108/JSBED-092016-0138 Rubera, G., Kirca, A.H., 2012. Firm Innovativeness and Its Performance Outcomes: A Meta-Analytic Review and Theoretical Integration. Journal of Marketing 76, 130–147. doi:10.1509/jm.10.0494 Teece, D.J., 2010. Business models, business strategy and innovation. Long Range Planning 43, 172– 194. Velu, C., 2015. Business model innovation and third-party alliance on the survival of new firms. Technovation 35, 1–11. doi:10.1016/j.technovation.2014.09.007 Waldner, F., Poetz, M.K., Grimpe, C., Eurich, M., 2015. Industry Structure and Business Model Innovation Antecedents and consequences of business model innovation: at DRUID15 conference, Rome, Italy. Wei, Z., Song, X., Wang, D., 2017. Manufacturing flexibility, business model design, and firm performance. International Journal of Production Economics 193, 87–97. doi:10.1016/j.ijpe.2017.07.004 Zott, C., Amit, R., 2008. The fit between product market strategy and business model: implications for firm performance. Strategic Management Journal 29(1), 1–26. doi:10.1002/smj.642 Zott, C., Amit, R., 2007. Business model design and the performance of entrepreneurial firms. Organization Science 18(2), 181-199. doi:10.1287/orsc.1060.0232 DECEPTIVE DESIGN: COOKIE CONSENT AND MANIPULATIVE PATTERNS THOMAS MEJTOFT, ERIK FRÄNGSMYR, ULRIK SÖDERSTRÖM & OLE NORBERG Umeå University, Digital Media Lab, Sweden; e-mail: thomas.mejtoft@umu.se, erik.frangsmyr@gmail.com, ulrik.soderstrom@umu.se, ole.norberg@umu.se Abstract As a larger proportion of our lives moves onto the web, so does important and valuable information. This has led to an increase in different kinds of manipulative patterns (dark patterns) in web design with the sole purpose of being deceptive and tricking users. This paper discusses the comprehensive suite of deceptive design patterns on Internet services where the users are expected to comply with the use of cookies. This was done by analyzing 50 different home cooking recipe websites, regarding their appliance to GDPR and how they use different dark patterns in their design. Even though legislation tries to move the choices from the website to the user, it is clear that by using deceptive design patterns it is possible to “bypass” the legislation and trick the user into making a favorable choice for the owners behind the website. The results show that out of the websites that were GDPR approved, a majority still use two types of deceptive design patterns - misdirection and sneak into basket. DOI https://doi.org/10.18690/978-961-286-485-9.29 ISBN 978-961-286-485-9 Keywords: deceptive design, dark patterns, cookie consent, GDPR 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 394 1 Introduction Since the very first web page, there has been constant changes to the design to create usable designs that increases the user experience. New guidelines have gradually evolved to enable great designs for various digital devices (Nielsen, 2018; Shneiderman, 2009). This constant perfection has made the vast majority of web sites intuitive and easy to use for most users. However, as the field of user experience on the web has gradually evolved during the last 25 years, so have underhanded tactics colloquially known as dark patterns or deceptive designs (Brignull, 2011). These features of design are just as carefully crafted but with another purpose than to lead the user in the right direction. Hence, a dark pattern is “a user interface carefully crafted to trick users into doing things they might not otherwise do, such as buying insurance with their purchase or signing up for recurring bills” (Brignull, 2013). Unlike concepts like e.g. digital nudging, which is about creating solutions that help the user to make the choices in their best interest by altering the choice environment (Thaler & Sunstein, 2008; Mejtoft et al., 2019), deceptive design is about manipulating a user into doing something that is not in the user’s best interest but in the interest of the owner of the website. As people spend an increasing proportion of their lives on the web and the selfdisclosure increase with more user generated content (Blackshaw & Nazzaro, 2006) and the use of e.g. social media (Kaplan & Haenlein, 2010), the need for digital integrity and privacy becomes important issues. This has become even more important during the Covid-19 pandemic, when an increasing part of our leisure and work time is spent online. Integrity is a “personal choice” (Killinger, 2010) and privacy is the “right to be let alone” (Warren & Brandeis, 1890). All this collection of data can e.g. be done by a company with, or without, consent or totally voluntarily by the users, so called personal informatics (Wilson, 2012). One important difference between the old analogue systems with notes and the current digital systems is the much higher traceability and foreverness of digital information and the opportunities to manipulate users using this information to alter systems (Kramer, Guillory & Hancock, 2014). This has led to an increase in different types of manipulative patterns in web design with the sole purpose to be deceptive and trick the users. A common way of creating deceptive design patterns and purposely tricking the user into making non-favorable decisions when collecting and using user data is to use cookies. Recently, there have been legal initiatives to try to strengthen the consumers T. Mejtoft, E. Frängsmyr, U. Söderström & O. Norberg: Deceptive Design: Cookie Consent and Manipulative Patterns 395 rights within this area e.g. the General Data Protection Regulation (GDPR) (European Commission, n.d.). The objective of this paper is to discuss and analyze different deceptive web design patterns where users are expected to comply with the use of cookies. To achieve the objective the following research questions will be discussed: (1) What are the most commonly used deceptive design patterns and the effect of those? (2) How can users avoid involuntary sharing of personal data? 2 Background and Theory The main idea behind web design and the guidelines (Nielsen, 2018; Shneiderman, 2009) for creating accessible and usable websites is to create an honest design. This is also one of the ten principles of good design stated by Dieter Rams in the 1970s “Good Design is honest: It does not make a product more innovative, powerful or valuable than it really is. It does not attempt to manipulate the consumer with promises that cannot be kept” (Rams, n.d.). However, deception is pretty much the opposite. Deception can be described as the act of “hiding the truth” and in the realm of business this means “dishonest or illegal methods that are used to get something, or to make people believe that something is true when it is not” (Cambridge dictionary, n.d.). This can be used to describe design choices that have the users unconsciously share information which they normally would not do (D’Onfro, 2015). The term Dark Patterns was coined in the aftermath of the boom of e-commerce websites that in order to generate sales and traffic were designed using deceiving user interfaces to manipulate users in different ways (Jaiswal, 2018). In a broader aspect, Dark Patterns use developers’ and designers’ knowledge of human psychology (Gray et al., 2018) and UX design to theoretically flip “honest” design into “evil” (Valjak, 2018). The design patterns in Table 1, describes some of the psychological effects, inflicted among the users, that the designers want to build on. Persuasive design is a practice where the idea is to purposely influence the users’ behaviors through the characteristics of a service. This can be done by designing for a behavior as a product of motivation, ability and triggers (Fogg, 2009). Consequently, many game 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 396 mechanics used to enhance activities through gamification (Robson, 2015; Zichermann & Cunningham, 2011) touch upon the problem and similar patterns as deceptive design. There are usually two sides - the same mechanics that can be used to enhance motivation to make users do good (Papworth & Mejtoft, 2015), can also be used to cause harm to the users in different ways. Table 1: Description of common Dark Patterns (Brignull & Darlo, 2019) Dark pattern Misdirection Sneak into Basket Trick Questions Bait and Switch Confirmshaming 2.1 Description The design purposefully focuses the attention on one thing to distract the attention away from another. The user attempt to purchase something, but somewhere in the purchasing journey, the site sneaks an additional item into your basket, often using an opt-out radio button or checkbox on a prior page. While filling in a form the users respond to a question that tricks the user into giving a non-intended answer. When glanced upon quickly, the question appears to ask one thing, but when reading carefully it actually asks another thing. The users set out to do one thing, but a different, undesirable thing happens instead. Guilting users to “opt in” by making them feel bad for saying no. GDPR approved The General Data Protection Regulation (GDPR) (European Commission, n.d.) is a regulation on privacy and data protection within the European Union (EU). The regulation applies to all companies that collect or use data of citizens that reside within the EU and the EEA, regardless of the location of the company. Since May 2018, when GDPR was put into action, Internet services who utilize cookies (Koch, n.d.) to collect user data are obligated to inform the user of e.g. what type of data is collected and how the service is using the data. To comply with the GDPR, Internet services appear to do the following (Dabrowski et al, 2019; Koch, n.d.): (1) services refrain from using persistent cookies at all, (2) EU users are banned from using the specific service, and (3) a service asks for explicit user consent and only then sets the cookies, leaving the site usable without consent. If consent is asked for, there is frequently a banner spanning over a service’s pages asking for consent. The latter T. Mejtoft, E. Frängsmyr, U. Söderström & O. Norberg: Deceptive Design: Cookie Consent and Manipulative Patterns 397 alternative sites tend to use deceptive design patterns to have the user consent to cookies by applying different types of Dark Patterns. To be able to define if the usage of cookies is according to the regulations, GDPR.EU (European Commission, n.d.) has a general explanation of what cookies are and how they should be implemented according to the GDPR (Koch, n.d.). There are four different types of cookies purposed - Strictly necessary cookies, Preferences cookies, Statistics cookies, and Marketing cookies. In this paper the focus is on the Strictly necessary cookies, as Strictly necessary cookies are the cookies that are essential for the user to be able to use the website and its features in an intended fashion. Other types of cookies are those which must be confirmed by the user or those that the user need to be informed about according to the GDPR. According to EU requirements, cookies on a website must comply with the following: (1) Have the users’ consent before any cookies are in use, except strictly necessary cookies, (2) Provide the necessary information about the cookie and its collection of data before the consent, (3) Save the consent information from the user, (4) Provide the user of accessing the service even if they do not allow the use of certain cookies, and (5) Provide an easy way for the user to change their consent or cookie settings. 3 Method A comprehensive analysis of 50 different home cooking recipe websites was done by first distinguishing how many websites were GDPR approved. Then out of the approved websites, an extended evaluation of the design was made to discern any types of deceptive designs. From these designs, an A/B test was created consisting of two websites (Test A and B) combined with a survey, to then be evaluated. 3.1 Website analysis Using Alexa (2019) Top 500 Ranking, the top 50 websites on the list were analyzed by comparing each website’s approach to using cookies to the definition of a correct usage according to GDPR.EU (European Commission, n.d.; Koch, n.d.). To see if the websites are using cookies correct each website was launched into Google Chrome Incognito mode, where the website was inspected with Developer tools > 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 398 Application > Cookies. In this mode all active cookies appeared, which could be categorized between Strictly necessary cookies or others. After distinguishing which websites were GDPR approved, these websites were evaluated to determine if, and what type of, deceptive designs were being used. Brignull and Darlo’s (2019) Types of Dark Patterns were used as a reference to find the most commonly used deceptive design patterns. 3.2 Testing and survey An A/B-test was conducted with two websites created, to be able to compare two different cookie prompt approaches. Test A included a website with a cookie prompt made by using the most common Dark Patterns found from the Website analysis, and Test B’s cookie prompt was made without Dark Patterns. The two different websites had three possible surveys, where all surveys had the same content and questions. The only thing differentiating the tests was the fact that if a participant Accepted or Declined the cookie prompt they would come to the corresponding survey. If the participant remained undecided, they stayed on the current survey (Figure 1). Figure 1: Flowchart showing how participants decision on accepting, declining or remaining undecided affected which survey was shown Test A (small banner cookie prompt): The Test A cookie prompt (Figure 2a) was inspired by two defining Dark Pattern Methods - Sneak in the Basket and Misdirection. The prompt was small to not distract the user from the website content too much. The text on the prompt stated: “This site uses cookies to provide you with a great user T. Mejtoft, E. Frängsmyr, U. Söderström & O. Norberg: Deceptive Design: Cookie Consent and Manipulative Patterns 399 experience. By using this site, you accept our use of cookies.”, which corresponded to the Sneak in the Basket method, as it informed the user that if a decision is not actively made, the user automatically accepted the cookies when using the site. Note that there were no other cookies used on the website than the strictly necessary ones, to be able to know if the participants Accepted or Declined the cookie prompt. The Accept button was green and bright, while the Decline button was gray an unattractive, which corresponded to Misdirection. The text even had a hidden link under “Use of Cookies”, where it would explain what types of cookies were being used. This was purposely hidden to not draw attention away from a big green button. (a) Screenshot of Test A. The user is shown a small banner cookie prompt. (b) Screenshot of Test B. The user is shown a full screen cookie prompt. Figure 2: Screenshot of (a) Test A and (b) Test B Test B (full screen cookie prompt): The cookie prompt created for Test B was much clearer and more informative than Test A (Figure 2b). The text was more informative and showed the option to go to “Use of Cookies” more distinctly. The option to Decline or Accept cookies was made less hierarchically than in Test A by having the buttons the same color and they explained what each button was meant to do, either to decline cookies or to allow cookies. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 400 3.3 Participants In total 40 respondents took part of the study, 20 respondents did Test A and 20 respondents did Test B. All participating respondents were from Sweden and was between the age of 20 and 65 years, where a majority were students between the age of 20-25 years. The research study was carried out during 2019. The tests were conducted online and a link to the corresponding test website was sent to each participant, where they could participate in the test and fill out the survey as they perceived it. 4 Results and discussion Out of the 50 home cooking websites analyzed, less than half, 22 websites, turned out to comply to the GDPR. The other 28 websites either did not give a choice of complying with the cookies, or they asked the question for user compliance after the fact that they already ran all the cookies. Even if the usage of cookies was declined, the cookies were already in use and, consequently, the compliance did not matter. Hence, these websites did not meet the requirements of the GDPR legislation. Since the websites were chosen from the top of the Alexa Top 500 ranking, the websites in this test are very popular websites. Noteworthy is that still over half of 50 most common websites did not comply to the legislation. Out of the 22 GDPR approved home cooking websites, 7 websites had no dark patterns and 15 websites had some kind of dark pattern in their design. From the websites analyzed there were two clear Dark Patterns used – misdirection and sneak into basket. Misdirection methods were used in such way that the design purposefully focused the attention to accept all cookies by having the user focus on the biggest green button that says “Accept recommended setting” to distract the attention from reading more about the other cookies used. Out of the 22 GDPR approved websites analyzed, 4 websites had “misdirection” patterns. Sneak into Basket methods were used in such a way that the user was prompted to comply with the website only uses the Necessary Cookies (Koch, n.d.) but it also adds third-party cookies without full consent from the user, which then manually T. Mejtoft, E. Frängsmyr, U. Söderström & O. Norberg: Deceptive Design: Cookie Consent and Manipulative Patterns 401 have to be removed through the use of an opt-out radio button or checkbox on a prior page. Out of the 22 GDPR approved websites analyzed, 11 websites had a “sneak into basket” design. The task to present a how-to guide on how to avoid involuntary sharing of data is a seemingly hard task. One could think it would be as simple as being careful of not accepting the Privacy Policies or specifically the Use of Cookies. Maybe to go to the settings of every site and uncheck any unwanted cookie, or do so the first time launching a site. But to give this as convincing advice would give the false impression of having the control of what is being shared and not. Sadly, this is not the case, which can be seen from the results of the website analyses. 4.1 Cookie consent test The cookie consent test was done on the two mock-up websites created to simulate the two dark patterns identified in the website analysis described above. The results from the survey show that all participants answered that they did not read the Use of Cookies page. One of the participants even expressed their concern about this issue by commenting this in the survey: “I usually get super annoyed when these prompts appear... I always click ‘accept’ because I have this weird fear that I won’t be able to enter if I don’t accept the cookies. I want to click ‘decline’, but for some reason I always accept.” In Test A, where the users were shown the small banner cookie prompt a majority (60%) made no decision on either accepting or declining the cookies. In Test B, with full screen cookie prompt, all participants made a decision, and a majority (80%) accepted the use of cookies. The full screen cookie prompt, however, made it more or less necessary to make a decision to remove the prompt and either continue to the website or go back. Sure, as a user, it is a good thing to feel like you are in control. But if you do not trust the website, does it really matter? Is it really necessary for websites to use Dark Patterns? The results show that in Test A, a clear majority are not making an active choice of whether they want to accept or decline the cookie. However, when asked “Did you notice the cookie prompt on this site?” both tests resulted in similar answers, where the majority did notice the cookie prompt. However, almost non (in both cases) did read the read the “Use of 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 402 Cookies” page. Hence, even though many of the participants made a active choice to accept the cookies, how free is the choice when focus is not on the cookie consent but to consume actually information on the website. It is hard to believe that the users would not care about the privacy, but still no not take time to read through how personal data is used. The symbiosis of the commercial companies’ collection of data for customization as well as the privacy and choice of the users have been discussed by e.g. Appelgren, Leckner and Mejtoft (2014). 5 Concluding discussion Legislation has become more important for users to avoid involuntarily sharing of personal data. EUs GDPR is one of the more common legislations in recent years. However, looking at the Alexa Top 500 popular websites, only about half of the top websites complied with the legislation. Other ways of getting a user to share data is by designing to deceive the users to, in different ways, give away data. However, to avoid involuntary sharing of personal data it does not matter if deceptive design patterns are avoided or not if the website is not abiding by the regulations. While deceptive design has a purpose to create deceiving design based on the general design principles to make e.g. intuitive choices, it is important that honest design makes us think. Even though legislation tries to move the choices from the website to the user, it is clear that by using deceptive design patterns it is possible to somehow “bypass” the legislation. This is done by purposely designing for moving the users from the reflective situation that the cookie consent should be to an automatic behavior (Hansen & Jespersen, 2013). The most common ways to deceive the users to give away more information than needed, is the patterns misdirection and sneak into basket. Both of these either trick you into accepting all cookies or show you options but add cookies that are not necessary for function. One way of dealing with the automatic behavior that cookie consent has become is to purposely introduce more intentional friction into the design that encourage a reflective behavior. Consequently, it is possible to focus on the important elements at hand and make users do reflective choices (Mejtoft, Hale, & Söderström, 2019; Hansen & Jespersen, 2015; Kahneman, 2008). T. Mejtoft, E. Frängsmyr, U. Söderström & O. Norberg: Deceptive Design: Cookie Consent and Manipulative Patterns 403 Even if websites ask for user compliance there is no way of knowing how they will be using the data without reading the Privacy Policy or Use of cookie page. If the website in question seems to follow the GDPR, the key to limiting sharing of involuntary personal data seems to be (in incremental order); 1) not trusting any websites, 2) become familiar with Developer Tools or Cookie managements for the preferred web browser and 3) make sure to look out for Dark Patterns in the design. References Appelgren, E., Leckner, S., & Mejtoft, T. (2014). The media consumers’ conscious and unconscious choices – a key to understanding the news media consumption of tomorrow. In S. Zlitni, F. Liénard, D. Dula & C. Crumiére (Eds.), Communication électronique, cultures et identités (pp. 521-528). Editions Klog. Blackshaw, P., & Nazzaro, M. (2006). Consumer-Generated Media (CGM) 101 (2nd ed.). Technical Report. Nielsen BuzzMetrics. Retrieved December 2, 2020, from http://www.nielsenonline.com/downloads/us/buzz/nbzm_wp_CGM101.pdf Brignull, H. (2011, November 1). Dark Patterns: Deception vs. Honesty in UI Design. A List Apart 338. Retrieved January 2, 2021, from https://alistapart.com/article/dark-patterns-deceptionvs-honesty-in-ui-design/ Brignull, H. (2013, August 29). Dark Patterns: inside the interfaces designed to trick you. The Verge. Retrieved June 2, 2020, from https://www.theverge.com/2013/8/29/4640308/darkpatterns-inside-the-interfaces-designed-to-trick-you Brignull, H., & Darlo, A. (2019). Types of dark patterns. Retrieved April 2, 2021, from https://www.darkpatterns.org/types-of-dark-pattern European Commission. (n.d.). Data protection in the EU. Retrieved April 1, 2021, from https://ec.europa.eu/info/law/law-topic/data-protection/data-protection-eu_en Dabrowski, A., Merzdovnik, G., Ullrich, J., Sendera, G., & Weippl, E. (2019). Measuring Cookies and Web Privacy in a Post-GDPR World. In D. Choffnes and M. Barcellos (Eds.), Passive and Active Measurement (pp. 258–270). Springer. Cambridge Dictionary. (n.d.). Deception. Retrieved February 7, 2020, from https://dictionary.cambridge.org/dictionary/english/deception D’Onfro, J. (2015, October 3). LinkedIn might have to pay you money for spamming your email contacts. Business Insider. Retrieved June 1, 2020, from https://www.businessinsider.com/ linkedin-settles-class-action-lawsuit-2015-10 Fogg, B. J. (2009). A Behavior Model for Persuasive Design. In Proceedings of the 4th International Conference on Persuasive Technology (Persuasive ’09), Article 40. ACM. Gray, C. M., Kou, Y., Battles, B., Hoggatt, J., & Toombs, A. L. (2018). The Dark (Patterns) Side of UX Design. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI ’18), Paper 534. ACM. Hansen, P. G., & Jespersen, A. M. (2013). Nudge and the Manipulation of Choice. European Journal of Risk Regulation 4(1), 3–28. Alexa Internet. (2019). The top 500 sites on the web. Retrieved March 23, 2019, from https://www.alexa.com/topsites/category/Top/Home/Cooking. Jaiswal, A. (2018, April 16). Dark patterns in UX. UX Collective. Retrieved June 4, 2020, from https://uxdesign.cc/dark-patterns-in-ux-design-7009a83b233c Kahneman, D. (2008). Thinking, fast and slow. Farrar, Straus and Giroux. Kaplan, A. M., & Haenlein, M. (2010). Users of the world, unite!. Business Horizons 53(1), 59–68. 404 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Killinger, B. (2010). Integrity: Doing the Right Thing for the Right Reason (2 ed.). McGill-Queen’s University Press. Koch, R. (n.d.). Cookies, the GDPR, and the ePrivacy Directive. Retrieved June 25, 2020, from https://gdpr.eu/cookies/ Kramer, A. D. I., Guillory, J. E., & Hancock, J. T. (2014). Experimental evidence of massive-scale emotional contagion through social networks. Proceedings of the National Academy of Sciences 111(24), 8788–8790. Mejtoft, T., Hale, S., & Söderström, U. (2019). Design Friction: How intentionally added friction affect users level of satisfaction. In Proceedings of the 31st European Conference on Cognitive Ergonomics (pp. 41-44). New York, NY: ACM. Mejtoft, T., Ristiniemi, C., Söderström, U., & Mårell-Olsson, E. (2019). User experience design and digital nudging in a decision making process. In 32nd Bled eConference Proceedings (pp. 427442). University of Maribor Press. Nielsen, J. (2018). 10 Usability Heuristics for User Interface Design. Nielsen Norman Group. Retrieved June 6, 2020, from https://www.nngroup.com/articles/ten-usability-heuristics/ Papworth, S., & Mejtoft, T. (2015). Using game mechanics for motivational design in products and services. In 2015 ANZMAC Conference proceedings, 1047 – 1054. Rams, D. (n.d.). The power of good design. Retrieved June 2, 2020, from https://www.vitsoe.com/us/about/good-design Robson, K., Plangger, K., Kietzmann, J. H., McCarthy, I., & Pitt, L. (2015). Is it all a game? Understanding the principles of gamification. Business Horizons 58(4), 411-420. Shneiderman, B., Plaisant, C., Cohen, M., & Jacobs S. (2009). Designing the User Interface: Strategies for Effective Human-Computer Interaction (5th ed.). Addison-Wesley Publishing Company. Thaler, R. H., & Sunstein, C. R. (2008). Nudge: Improving decisions about health, wealth and happiness. Penguin Putnam Inc. Valjak, A. (2018, April 16). Dark patterns in UX. Retrieved June 1, 2020, from https://infinum.com/the-capsizedeight/dark-patterns-designs-that-pull-evil-tricks-on-ourbrains Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 4(5), 193-220. Wilson, H. J. (2012). You, By the Numbers. Harvard Business Review, 90(9), 119 – 122. Zichermann, G., & Cunningham, C. (2011). Gamification by Design. O’Reilly Media DESIGNING CALL TO ACTION: USERS’ PERCEPTION OF DIFFERENT CHARACTERISTICS THOMAS MEJTOFT,1 JONATHAN HEDLUND,1 HELEN CRIPPS,2 ULRIK SÖDERSTRÖM1 & OLE NORBERG1 1 Umeå University, Digital Media Lab, Sweden; e-mail: thomas.mejtoft@umu.se, jonathan.hedlund.371@gmail.com, ulrik.soderstrom@umu.se, ole.norberg@umu.se 2 Edith Cowan University, School of Business and Law, Perth, Australia; e-mail: h.cripps@ecu.edu.au Abstract This paper aims to provide guidance when designing a call to action in a digital system with the purpose to create an intended feeling and user engagement. The paper is based on a test of four different simple call to action constructions. The users clearly prefer constructions that have a high explainability and feels intuitive. Hence, the design should have a high level of transparency and show the user straight away what it demands from the user and what the result of the action is. Furthermore, the design should have a high usability to make it clear how to use the call to action. DOI https://doi.org/10.18690/978-961-286-485-9.30 ISBN 978-961-286-485-9 Keywords: call to action, customer engagement, click-through rate, user experience design, customer relationship management 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 406 1 Introduction Measuring and maximizing customer profitability is becoming more and more important in a constantly evolving landscape of customer engagement (Jorge, Pons, Rius, Vintro฀, Mateo, & Vilaplana, 2020; Gao & Javier, 2020; Pereira, de Fa฀tima Salgueiro & Rita, 2017). Companies are constantly looking to improve their customer relationship management (CRM) strategies (Kumar, 2013; North & Ficorilli, 2017). Measuring the click-through rate (CTR) for example gives a fair representation of how engaged the customers are with their website (Rashid, 2017; Liu, Chen, Chou, & Lee, 2018). A call to action (CTA) is a marketing tool to prompt an immediate response or encouragement, is a crucial part for many websites (Horner, 2012; Steinberg, 2005). They can be the deciding factor between whether a user takes the action the company wants to induce (Chen, Yeh & Chang, 2020). Companies can use a call to action to create customer profitability that is easy to measure and analyze. Technically, a call to action is divided into several parts – getting attention, making it possible for the user to take action and make the user take the appropriate action from the user perspective. Call to actions can take many forms and might be designed in many different ways, some are buttons to direct the user to another page while some are small input forms to gather data from the user directly in the CTA component. Some examples of CTAs commonly used in marketing are components to encourage sign ups, subscription, and an option to learn more about a specific product or service (Chen, Yeh & Chang, 2020). There are many things that determine the effectiveness of a call to action on a website. The placement has an impact since the call to action must be found (Hernandez & Resnik, 2013), affordance-based cues (Norman, 2013) and skeuomorphs (Basalla, 1988) enabling the user to know how to engage with a call to action as well at the actual design of the call to action to induce a certain sense of feeling among the audience. This paper will focus on different strategies of designing the call to action to create the intended feeling and user engagement. The objective of this short paper is to analyze how users interpret different designs of a call to action. The aim is to provide guidance to designers and managers that intend to design call to action on websites. T. Mejtoft, J. Hedlund, H. Cripps, U. Söderström & O. Norberg: Designing Call to Action: Users’ Perception of Different Characteristics 2 407 Theory and background Customer engagement advocates developing a portfolio of customers and nurturing this relationship (Gao & Javier, 2020; Imhof & Klaus, 2020). With this approach companies focus on how many products they can sell to a customer. How they can highlight the product benefit that aligns with customer need (Markey, 2020). Which customer segment they should focus on and what strategies should they use to develop their relationship (Schwartz, Bradlow & Fader, 2017; Jorge, Pons, Rius, Vintro฀ Carla, Mateo & Vilaplana, 2020). An important part of customer engagement is the management of profitable and unprofitable customers (Kumar, 2013; Imhof & Klaus, 2020). Click-through rate (CTR) is used to estimate the probability of users clicking on an advertisement or product displayed to them. CTR prediction is a key technique in internet advertising. Online advertising will play an increasingly important role in the future economy. Therefore, advertising CTRs is going to be the most important factor in developing the future of advertising. Accurately estimating the CTR of an advertisement has a crucial impact on the revenue for businesses (Jiang, Xu, Xu & Xie, 2021). 2.1 Call to actions From a marketing perspective, a call to action has the aim to get the audience to perform a certain task immediately (Eisenberg & Eisenberg, 2006). It is a “call” to take an “action” that the sender of the message wants to induce. Strongly connected to the definition within marketing, in terms of web design, call to action is a term for “elements in a web page that solicit an action from the user” (Gube, 2009). Hence, a CTA is typically a part of the website or application that drives the reader to click through to engage further with a brand. A call to action is often created to drive the user to produce some type of immediate, measurable result (Chen, Yeh & Chang, 2020). Some examples of a CTA can involve a request to receive more information about a product or service. According to Chen, Yeh and Chang (2020) some of the more popular manifestations of a CTA on websites are- (1) a link to a web page with additional and further information (e.g. ‘Learn more’), (2) a request for the user to take action after browsing the web (e.g. ‘Contact us’), and (3) the use of buttons that, when clicked, perform an action (e.g. ‘Show now’). A CTA can vary in the amount of user 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 408 engagement, some CTA contains a button while some also contain an input field for the user to fill. (a) Signup CTA. (b) Newsletter CTA. (c) CTA to direct users to more info. (d) Sign up to a premium service CTA. Figure 1: Examples of different manifestations of how a CTA can be designed and used (screenshots by authors) In Figure 1, some examples of different manifestations of how a CTA can be used to prompt the user to take an action are illustrated. The first example is from a notetaking application with a prompt to get the user to sign up for their service (Figure 1a). The CTA contains a short description of the service they are offering, two input fields, one for email and one for the password, and a button that creates the account. The second example is an example of a newsletter CTA (Figure 1b). The CTA contains a description of what the newsletter will do for the user. An input field for your email and a button to subscribe the user to the newsletter. The third example is from a drink producer with a CTA to prompt the user to find out more about their products (Figure 1c). The CTA contains a title and two buttons that direct the user to different pages, one to “Find out more” and one to “View products”. The fourth example is a CTA from a music streaming service (Figure 1d). The purpose of the CTA is to prompt the user to sign up for their premium service. The CTA contains a description of their offer and two buttons to direct the user. T. Mejtoft, J. Hedlund, H. Cripps, U. Söderström & O. Norberg: Designing Call to Action: Users’ Perception of Different Characteristics 2.2 409 Designing for effective call to action There are several aspects that affect the effectiveness of a call to action within web design. The most prominent ones are based on the different steps that the user goes through when encounter a call to action – (1) noticing the call to action, (2) taking action, and (3) believing that the right action was taken. Attraction of attention is related to several issues both regarding the actual design and wording of the call to action (Bashinsky, 2016) but also the placement of the call to action. Previous research has identified how users scan through a website to find placement for important information (e.g. Hernandez & Resnik, 2013). Regarding the possibility to make the user take action it is needed that that the user understands that an action is possible from a technical perspective. This is related to two issues - the affordancebased cues in the actual design (e.g. understanding that a button can be clicked) and the usability of the system (e.g. using the call to action is intuitive). Affordances (Gibson, 1977; Norman, 2013) define what actions are possible when facing an object. Hence, in digital systems affordances provide strong clues to how something is going to be used, often based on connection to the non-digital world, so-called skeuomorph (Basala, 1988). A skeuomorph is a design element that has no necessary meaning in the new setting but was essential in the old setting (e.g. the raised button with, consequently, a shadow). These affordance-based ques are important from an interaction design perspective to provide the users with information about how to use certain features (Kaptelinin, 2014) and, consequently, pushing for a call to action. Creating high usability (Nielsen, 1994) and frictionless design is often in focus and make it intuitive for the user to navigate through a design and make choices. However, the frictionless design might decrease the possibility to make reflective choices due to the higher speed of navigation. It is therefore important that the design a high explainability. An explainable design is easy for the user to understand the effect when a certain task is taken, and it create a design that is in line with the ideas of Dieter Rams (n.d.) – Good design is honest and “does not attempt to manipulate the consumer with promises that cannot be kept”. Design friction has been discussed during latter years due to its ability to make the user reflect on choices and, hence make the user take action the user intended to take (Mejtoft, Hale & Söderström, 2019). 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 410 3 Method The aim of this study is to determine how users interpret different designs of a call to action. The study presents different construction of a CTA to see which construction the users prefer and how the design is interpreted by the users. Four different constructions of a CTA with the purpose to get the participant to sign up for a newsletter were presented to the participant. Followed by a short survey where the participant could choose which CTA they preferred and why. The tests were conducted during fall 2020. The test was conducted on 32 participants with an even distribution between male and female participants. 3.1 The different call to actions designs As previously mentioned, four calls to action were constructed to be used in the study. The purpose of the CTA is to get the participant to sign up for a newsletter. The CTA contains a header, a description, a text field, and or a button for the participant to interact with. The CTAs differed in the level of user engagement presented in the initial component, as well as swapping the headers to be either informative or appealing. Two constructions gave the participant a text field to fill out their email as well as a button to complete the action. The other two constructions gave the participant a button to press to start the process of signing up to the newsletter. The header and description were also swapped to determine if the participant wanted the CTA to be more appealing or informative. The header was either “Sign up to our newsletter” to be informative or “With our tips you will become a better manager” to be appealing for the participant. The description of the CTA was dependent on the header, if the header was “Sign up to our newsletter” then the description was “With our tips you will become a better manager” and vice versa. The four CTAs used in the study (Figure 2) had the following characteristics – (a) the header is informative and the description is appealing while also having a higher initial user engagement with a text field and button, (b) the header is informative and the description is appealing while also having a lower initial user engagement with only a button, (c) the header is appealing and the description is informative while also having a higher initial user engagement with a text field and button, and (d) the T. Mejtoft, J. Hedlund, H. Cripps, U. Söderström & O. Norberg: Designing Call to Action: Users’ Perception of Different Characteristics 411 header is informative and the description is appealing while also having a lower initial user engagement with only a button. To remove the effect of e.g. skeuomorphs (Kaptelinin, 2014), typography and font size were consistent (Koníček & Světlík, 2020). These things that could affect the CTA was omitted in the study. Figure 2: The four CTAs used in the study 3.2 Setup Due to restrictions, the test was performed online. However, it is the authors strong belief that the validity or reliability of the results are not affected by the online test environment. An online test environment creates a realistic environment for this test. The participant was sent a link to a webpage where the participant would first read a short description of what the test was going to be used for, as well as an assurance that their personal information would not and could not be connected to their result. The participant would then be presented with the CTA used in this study in the same order they are presented in this paper. After the participant decided which CTA they preferred they would fill out a questionnaire regarding their preferred choice. Some basic demographics were gathered and analyzed without any significant differences being found. 4 Results and discussion The effectiveness of a CTA is an important field to study, both from a marketing perspective and a design perspective. Focusing on developing strategies to enhance companies’ customer relationship management (CRM) is crucial for success in an everchanging business landscape. Measuring and maximizing profitability of online 412 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE assets is becoming increasingly important. One way to increase profitability is by improving one’s use of CTA. For user experience designers monitoring the clickthrough rate can be a great way to evaluate how well a website is fulfilling its purpose. The results from the questions about which CTA the participant prefers are shown in Figure 3. Most participant preferred design A and design C and there were no major differences between male and female participants. Both Design A and Design C wanted the participant to fill in their email right away and had an upfront higher user engagement than Design B and Design D. For a CTA with few inputs, e.g. signing up for a newsletter, the user seems to prefer being able to see directly what they need to fill out to complete the action. Figure 3: Number of votes each CTA received in the study Of the 34 participants 24 out of the 32 were cited motivations for their choice of CTA. The motivations were analyzed and categorized based on the reasons for making a certain choice. Patterns were found and five different reasons based on design, usability and marketing theories and reasoning, emerged from the answers. The reasons were classified as intuitive and frictionless, High explainablity and honest, Aesthetic and appealing, attention-grabbing and design friction. In Figure 4 the total number of mentions for each of these reasons are plotted for the different designs. T. Mejtoft, J. Hedlund, H. Cripps, U. Söderström & O. Norberg: Designing Call to Action: Users’ Perception of Different Characteristics 413 Reasons for chosing a design 8 7 6 5 4 3 2 1 0 A Intuitive B High explainability/Honest C Aesthetic/Appealing Attention-grabbing D Design Friction Figure 4: Reasons mentioned for choosing a specific design (one participant could mention several reasons) Since very few respondents preferred Design B and Design D there were few comments mentioned. However, there were comments mentioned for not choosing Design B and Design D e.g.: “Design B and D require me to click on and then I do not know what will happen after that” and “unclear what happens if I click ‘SIGN UP’ on B and D, a box will appear where I enter an email or have my email via a cookie, etc.”. Thematically, these comments were in line with the user getting a feeling of the website wanting to trick the user into doing something that is not in the users’ best interest, so-called deceptive design or dark patterns (Brignull, 2011). Design A was the second most preferred by the participants and was high regarding the factors of intuitiveness and high explainability/honest. Regarding intuitive, respondents stated e.g. that “a clear title that describes the purpose and functionality, and when I see that I only have to enter in one field makes it feels frictionless. Nothing is hidden or feels indistinct that would otherwise make me hesitate”, “it felt like the easiest way to sign up”, “Easy to Sign Up without having to click on to another page to enter your email” and “Simplest and clearest”. Regarding having a high explainability and a feeling of being honest in the design the respondents stated that “if the email field is above the button, you also know what it will mean if you press the button”, “shows that they only need my email and nothing more”, “prefer text fields for emails as I do not know how the others will then get hold of my email, a new page opens?” and “just need to fill in the email so it’s clear, nothing uncertain. With only a button and no input field, you would be taken to a new page, and you do not know what more you may need to do”. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 414 Design C was the most preferred design being high regarding the factors intuitive, high explainability/honest and attention-grabbing. Regarding intuitive, the respondents stated that it is “nice to avoid through to another page”, “easy to get the newsletters with as few clicks as possible” and “nice to fill in the email immediately so you avoid another step”. The reasons for high explainability were mainly due to reasons like: “I think it’s nice that it clearly says why I should sign up first”, “like the fact that I get everything at once. That I have to enter everything and then click ’sign up’” and “that it is email contact and I get a direct answer to what it can give me”. The respondents also believed that this design attracted attention since e.g. “attractive title, not with the main goal of getting people to sign up, “it attracts more attention” and “you have to attract people to get them to sign up for newsletters, by offering something they do not get somewhere else”. One recurring opinion on whether or not to have the input field was that the participants preferred to be provided with everything at once, making the interaction more frictionless. With only a button and no input field, some of the participants wrote that they felt unease with not knowing where the button would take them or if a modal would pop up or they would get directed to a new page. Some participants preferred the informative title and being able to see right away that it was a newsletter they were asked to sign up for while others felt that a more appealing title was attracting more of their attention. On the other hand, there are no clear results on whether or not the participant had a preference for the title of the CTA to be more appealing (Design C) or informative (Design A) since they both was equally preferred. A few possible errors could have affected the outcome of this study. One of them being the choice of the appealing title used in this study. All of the participants were presented with the CTA in the same order presented in this paper, which could have an impact on their choice. A study where the different CTA are presented in random order would remove this error. 5 Conclusions There is a wide range of call to actions found online. This study investigates two different characteristics and the impact of these regarding the reactions of the users’ and how they want to engage with the call to action. The results indicate positive attitudes towards the design features such as intuitive and high explainability/honest are important for the users’ willingness to engage with a call to action. Clearly T. Mejtoft, J. Hedlund, H. Cripps, U. Söderström & O. Norberg: Designing Call to Action: Users’ Perception of Different Characteristics 415 showing the user what to expect is important when designing for a high click through rate. Hence, the study shows that moving the user engagement upfront is better for enabling users to trust the design. This makes the call to action more transparent by showing the user right away what they need to fill out to complete the action. Acknowledgements The authors would like to acknowledge the students at the MSc program in Interaction Technology and Design at Umeå university for their support in this research study. References Basalla, G. (1988). The evolution of technology. Cambridge, UK: Cambridge University Press. Bashinsky, A. (2016, January 13). 6 Easy Ways to Incorporate Emotional Appeals Into Your Website's Call to Actions. Entrepreneur. Retrieved December 13, 2020 from https://www.entrepreneur.com/article/253284. Brignull, H. (2011, November 1). Dark Patterns: Deception vs. Honesty in UI Design. A List Apart 338. Retrieved March 2, 2021, from https://alistapart.com/article/dark-patterns-deceptionvshonesty-in-ui-design/. Chen, T.-Y., Yeh, T.-L., & Chang, C.-I. (2020). How different advertising formats and calls to action on videos affect advertising recognition and consequent behaviours. The Service Industries Journal, 40(5-6), 358–379. Eisenberg, B, & Eisenberg, J. (2006). Call to Action: Secret Formulas to Improve Online Results. Nashville, TN: Nelson Business. Gibson, J. J. (1977). The theory of affordances. In R. E. Shaw & J. Bransford (Eds.), Perceiving, Acting, and Knowing: Towards an Ecological Psychology (pp. 67-82). Hillsdale, NJ: Lawrence Erlbaum Associates. Gao, L., & Javier, S. F. (2020). Customer equity drivers, customer experience quality, and customer profitability in banking services: the moderating role of social influence. Journal of Service Research, 23(2), 174–193. Gube, J. (2009, October 13). Call to Action Buttons: Examples and Best Practices. Smashing Magazine. Retrieved January 30, 2021, from https://www.smashingmagazine.com/2009/10/call-toaction-buttons-examples-and-best-practices/. Hernandez, A., & Resnik, M. L. (2013). Placement of Call to Action Buttons for Higher Website Conversion and Acquisition: An Eye Tracking Study. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 57(1), 1042-1046. Horner, T. (2012, April 30). Writing a Better Call to Action. Marketing Professors. Retrieved December 13, 2020 from http://www.marketingprofs.com/articles/2012/7772/writing-a-better-call-toaction. Imhof, G., & Klaus, P. (2020). The dawn of traditional cx metrics? examining satisfaction, exq, and war. International Journal of Market Research, 62(6), 673–68. Jiang, D., Xu, R., Xu, X., & Xie, Y. (2021). Multi-view feature transfer for click-through rate prediction. Information Sciences, 546, 961–976. Jorge, O., Pons, A., Rius, J., Vintro฀ C., Mateo, J., & Vilaplana, J. (2020). Increasing online shop revenues with web scraping: a case study for the wine sector. British Food Journal, 122(11), 3383-3401. 416 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Kaptelinin, V. (2014). Affordances. In The Encyclopedia of Human-Computer Interaction (2nd Ed.) (Chapter 44). Interaction Design Foundation. Retrieved May 18, 2021 from interactiondesign.org/literature/book/the-encyclopedia-of-human-computer-interaction-2nded/affordances Koníček, I., & Světlík, J. (2020). Some principles for the design of successful and appealing websites. European Journal of Media, Art and Photography, 8(1), 106-116. Kumar, V. (2013). Profitable customer engagement: Concept, metrics and strategies. SAGE. Liu, D.-R., Chen, K.-Y., Chou, Y.-C., & Lee, J.-H. (2018). Online recommendations based on dynamic adjustment of recommendation lists. Knowledge-Based Systems, 161, 375–389. Markey, R. (2020). Are you undervaluing your customers? Harvard Business Review, 98(1), 42–42. Mejtoft, T., Hale, S., & Söderström, U. (2019). Design Friction: How intentionally added friction affect users level of satisfaction. In M. Mulvenna & R. Bond (Eds.), Proceedings of the 31st European Conference on Cognitive Ergonomics (pp. 41-44). New York, NY: ACM. Nielsen, J. (1994). Enhancing the explanatory power of usability heuristics. CHI '94: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 152-158. Nielsen, J. (2012). Usability 101: Introduction to Usability. Nielsen Norman Group. Retrieved January 12, 2021, from https://www.nngroup.com/articles/usability-101-introduction-to-usability/ Norman, D. (2013). The design of everyday things: Revised and expanded edition. New York, NY: Basic Books. North, M., & Ficorilli, M. (2017). Click me: an examination of the impact size, color, and design has on banner advertisements generating clicks. Journal of Financial Services Marketing, 22(3), 99– 108. Pereira, H. G., de Fa฀tima Salgueiro, M., & Rita, P. (2017). Online determinants of e-customer satisfaction: application to website purchases in tourism. Service Business, 11(2), 375–403. Rams, D. (n.d.). The power of good design. Retrieved January 23, 2021, from https://www.vitsoe.com/gb/about/good-design Rashid, U. (2017). A framework to explore results in multiple media information aggregated search. Multimedia Tools and Applications, 76(24), 25787–25826. Schwartz, E. M., Bradlow, E. T., & Fader, P. S. (2017). Customer acquisition via display advertising using multi-armed bandit experiments. Marketing Science, 36(4), 500–522. Steinberg, B. (2005, March 22), 'Call to Action' Ads Give Clients Results They Can Measure. Wall Street Journal. Retrieved November 13, 2020 from https://www.wsj.com/articles/SB111145597859585890 FORMING SUSTAINABLE PHYSICAL ACTIVITY PROGRAMS AMONG YOUNG ELDERLY - A COMBINED ELM & UTAUT APPROACH CHRISTER CARLSSON,1 PIRKKO WALDEN,1 TUOMAS KARI,1,2 MARKUS MAKKONEN1,2 & LAURI FRANK2 1 Institute for Advanced Management Systems Research, Turku, Finland; e-mail: christer.carlsson@abo.fi, pirkko.walden@abo.fi, tuomas.t.kari@jyu.fi, markus.v.makkonen@jyu.fi 2 University of Jyvaskyla, Faculty of Information Technology, Jyvaskyla, Finland; e-mail: lauri.frank@jyu.fi Abstract There is consensus in health studies that regular physical activities of sufficient intensity and duration contribute to better health both in the short and long term. In an ongoing research program, we focus on getting the young elderly, the 60-75 years age group, to adopt and include physical activities as part of their daily routines. One reason for addressing young elderly is large numbers – in Finland health care costs for the elderly was 3.7 B€ in 2019 and will increase dramatically if the young elderly group is in bad shape when they reach the 75+ age group. We are finding out that systematic physical activities can serve as preventive health care for the young elderly. We are also learning that digital services can be instrumental for building sustainable physical activity programs. DOI https://doi.org/10.18690/978-961-286-485-9.31 ISBN 978-961-286-485-9 Keywords: physical activity programs, digital service support, UTAUT, ELM, young elderly 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 418 1 Introduction There is a consensus (Bangsbo et al (2019)) that regular and systematic physical activities (PA) can serve as preventive health care (Jonasson (2017)). In the following we will refer to a set of systematic PA as a PA program, if the physical activities are carried out over a period of time and to reach some goal, The Copenhagen Consensus statement of 2019 (Bangsbo et al (2019)): (i) “being physically active is a key factor in maintaining health …” (ii) “physically active older adults, compared with older inactive adults, show benefits in terms of physical and cognitive function …” (iii) “physical inactivity in older adults is associated with a trajectory towards disease and increased risk of premature all-cause mortality …”. Health recommendations agree on that PA at moderate intensity for at least 150 minutes per week will have health effects (Wallen et al (2014)). This standard applies to healthy adults; in practice there will be differences in the actual PA programs; the differences are in terms of female/male, age groups, level and history of PA capability, physical requirements for everyday activities, and to meet individual longand short-term objectives. The Copenhagen Consensus also finds that less than 150 minutes could be sufficient for older adults (Bangsbo et al (2019)). Further study will, no doubt, show that a good variety of PA programs will give individually sufficient health effects. Our focus is the young elderly – the 60-75 years age group – and we want to work out sustainable PA programs that could give preventive health effects for this group. We immediately found common ground with the pensioners’ associations that have developed PA programs for their members. There was, however, a feeling among active pensioners that these activities (i) are not intensive enough, (ii) are not of sufficient duration, and (iii) are not regular enough to be sustainable habits; in short, they did not meet the perceived standards for preventive health care (Reyes-Mercado (2018), Hukkanen et al (2018)). The associations found that our proposed program – called DigitalWells (DW) – could be useful for them and agreed to work with us; they stated as a requirement that we also include the 75+ age group, who regard themselves as modern time young elderly. C. Carlsson, P. Walden, T. Kari, M. Makkonen &L. Frank: Forming Sustainable Physical Activity Programs Among Young Elderly - A Combined ELM & UTAUT Approach 419 DW is designed as an interactive research and development program aimed at building sustainable PA programs for young elderly. There are a few central elements that define the program (cf. Carlsson and Walden (2018, 2019)); first, we use a synthesis of existing research results to develop PA programs for groups of young elderly; second, experience collected from field studies is used to validate and verify the theory constructs; third, we aim for PA programs which as such will give the participants short- and long-term health effects; fourth, the PA programs should be sustainable, i.e. the participants should stay with them for extended periods of time (months and years, more than weeks); fifth, we design and implement digital services to guide and support users to stay with and be active with their PA programs. The participants are all volunteers, at the moment (May 2021) about 750 participants in 30 groups, they come from the local associations of three pensioners’ federations which have more than 230 000 members. DW works out contrasts between the users’ own perceptions of their physical activities, intentions to spend (more) time with their PA programs and the time they have actually spent. The users are anonymous and identified only with individual 8digit pseudonyms in both the surveys that cover perceptions and intentions, in the DW-app 2.5 (cf. section 2) and in the secure data cloud. This makes it possible to trace their activities and to test and validate theory frameworks for the adoption of PA programs. With the user groups and the digital service tools developed in DW (cf. Kari et al (2020a, 2020b); Makkonen et al (2020a, 2020b)), we aim to tackle the following research questions:  What drivers could get young elderly users to adopt and use PA programs?  What factors or drivers could help support and sustain the adoption of PA programs? 420 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE The DW research program is running for several years and is ongoing; in this paper we formulate some initial, partial answers to the research questions, - i.e. in short, how to get young elderly to become users of PA programs and to stay with them. In section 2, we will introduce the context and present the support tools we use for the young elderly users; in section 3 we work through the conceptual frameworks of ELM and UTAUT (introduced in detail in the section); section 4 offers answers to the research questions and adds details from previous research to the framework to offer roadmaps for further research. 2 Context and Tools for Young Elderly Physical activity among Finnish adults is way too low. The 2010-2017 studies in the health and wellness of adults in Finland (THL, 2019a) shows that in the age group of 30-54 years, only 30% spent several hours per week at regular physical activities; in the 55-74 age group, it decreases to 15%; in the 75+ age group only 7% are regularly physically active. Moreover, the recent FinHealth2017 study (THL, 2019b) found that only 39% of men and 34% of women reach recommended levels of PA to get health effects. The FinHealth2017 study builds on a representative sample of the Finnish population. Physical wellness comes from physical exercise to build stamina, muscle strength, and balance, and to ward off age-related serious illness. Sustained physical exercise helps to meet everyday requirements of life. Studies (Jonasson, 2017; Wallén et al., 2014) show that systematic PA contributes to good quality of life in senior years. The DW research program aims to meet the recommendations of Bangsbo et al (2019), Hukkanen et al (2018), Jonasson (2017) and Wallén et al (2014). In the following, we will work through some details. DW has found (cf. Kari et al (2020a), (2020b), Makkonen et al (2020a, 2020b)) that typical PA forms for young elderly include walking, yard work, Nordic walking, cycling, cross-country skiing, golf, gym training, swimming and home gymnastics. The FinHealth2017 (THL, 2019b) study found that popular forms of PA mostly were the same; the study looks at physical activity during leisure time and registers C. Carlsson, P. Walden, T. Kari, M. Makkonen &L. Frank: Forming Sustainable Physical Activity Programs Among Young Elderly - A Combined ELM & UTAUT Approach 421 activities that are carried out several times per week. What is interesting, there is no dramatic decrease in PA when moving to the older age group. The FinHealth2017 study (THL, 2019b) offers a couple of challenges for the young elderly age group: (i) the proportion of young elderly that carries out PA according to health recommendations should be much higher; (ii) PA carried out several times per week should be of sufficient intensity and duration. Over time, when PA programs developed in the DW research program have been adopted and taken into use, young elderly will start meeting the FinHelath2017 recommendations. The DW actually works out a list of proposed PA forms that will give sufficient PA intensity and duration ; some details on how this was worked out in the next few steps. The 2011 Compendium of Physical Activity (CPA) (Ainsworth et al., 2011) offers advice and guidelines for the design of PA programs that will start giving health effects. CPA quantifies the energy cost of 821 specific activities in terms of the metabolic equivalent of task (MET) (cf. fig.1). This offers support for dealing with both challenges (i) and (ii). METs show the energy cost (effort) of a PA relative to sitting (Ainsworth et al., 2011). It is measured with groups in actual exercises and in lab experiments, which makes it verifiable and useful for goal setting, for registration of activities and for follow-up of PAs. In the DW we adopted the CPA guidelines as a baseline for the PA programs (cf. fig.1). We work with 35 different activities that can be included in a PA program; we replaced the CPA MET levels with more “activity-describing” labels: low = light; medium = moderate; high = vigorous. 422 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Figure 1: List (subset) of physical activities, including CPA MET values The names of the activities are standardized in English, Finnish and Swedish. The list of 35 activities is now a tool and a guide to find systematic and practical ways to build health-effective PA programs for young elderly. The health recommendations (THL, 2019a; Bangsbo et al., 2019) correspond to roughly 650 MET-minutes per week, which is a minimum to give short- and long-term health effects. A DW participant will simply work down the list and compose his/her weekly PA program for sufficient health effects. In the DW we opted for composing and running weekly PA programs and the registration of the actual activities with digital support. For this purpose, we developed an application (cf.fig.2) for smart mobile phones (Android, iOS), now called the DW-app (2.5), which is still being developed with new and more advanced features. C. Carlsson, P. Walden, T. Kari, M. Makkonen &L. Frank: Forming Sustainable Physical Activity Programs Among Young Elderly - A Combined ELM & UTAUT Approach 423 Figure 2: Logging and reporting of activities The logging of activities on the smart phone is done in the left part of the screen (cf. fig.2): (i) the user selects the activity (walking), (ii) the intensity (light), (iii) the date from the calendar, (iv) the duration (hours, minutes) after which the app (v) calculates and shows the effect of the activity (MET-min, kcal). The results of the activity are used to update a secure database where the user is registered with an individual 8-digit pseudonym. The data is used to produce reports on the smart phone for the user (the middle part): (i) the type of report is specified (weekly), then (ii) the reported week (38/2020), and (iii) the wanted report is shown (MET-minutes per week) and (iv) further specified (MET-minutes per day). Further graphical reports are shown in the right side that specify (for instance) MET-minutes per activity and Minutes per intensity. A growing number of users have opted to get even more automated and use sports trackers and smart watches to collect and register their activities; the DW-app 2.5 now collects data from these devices, up-dates the secure database and produces the reports for the user on his/her smartphone. There are quite a few research reports published on the use of the DW program and the DW-app 2.5 (cf. Carlsson et al (2020), Kari et al (2020b), Makkonen et al (2020b), Kettunen et al (2020)); here it suffices to give a snapshot of user comments selected 424 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE from 265 respondents that have participated in the program for about 12 months (cf. Table 1). The comments have been selected with an aim to find both positive and negative experiences, but they also give a glimpse of the attitudes to exercise that can be found among the participants. The key to the quotes (translated from Finnish and Swedish) is: [participant #] M or F/age/BMI. Table 1: Participant reactions to the WFR after about 12 months The distance should be measured, in km or number of steps … there should be more measures for physical work [24] M/71/26.40 Summertime changes habits, we spend time at the summer cottage with no regular walking tours; fall is a better time for exercise [49] F/69/22.04 I regularly spend time with exercise; thus, the WFR has not changed my exercise routines [64] F/71/26.40 I spend as much time with exercise as feel good (quite much) [65] M/74/25.86 This program does not motivate to exercise as such; it is too simple and cumbersome; I am in favour of technology that automatically registers exercise and other activities; MET points are not calibrated to active exercise nor to health exercise [72] F/70/23.73 I left the WFR in mid-summer because my motivation was not sufficient to go on by myself [covid-19 restrictions closed group activities]; technology by itself is not enough as a motivation [75] F/68/33.25 Our WFR group was closed because of the covid-19 restrictions; all the indoor group events that I was attending every week were closed; I had to switch to walking and Nordic walking, which I increased quite a lot (to several times per day); now fall is coming but it seems as if the restrictions will continue [78] F/65/30.48 I follow up on my own exercise more than before and I have also been checking my results both from the tracker and from the [app on the] phone [83] M/71/26.01 I am not yet familiar with the WFR; I need to get guidance in person; I does not want to spend time to find out the functions for myself from the Internet [112] F/81/21.09 I increased exercise after I retired, because now I have more time for it; WFR and the need to reduce weight have increased exercise; yet I have not decided on any goals [120] M/63/34.48 [WFR] has improved the follow up of different forms of exercise [128] M/75/35.98 This [WFR] is good for people that have not been active on exercise; for me personally there is not much effect [134] F/66/23.59 The application has made me surer that my exercise activities are quite sufficient without any programs; I easily get 10 000 steps every day in my daily routine tasks [141] F/67/23.38 C. Carlsson, P. Walden, T. Kari, M. Makkonen &L. Frank: Forming Sustainable Physical Activity Programs Among Young Elderly - A Combined ELM & UTAUT Approach 425 Before the covid-19 restrictions I worked out in gym programs 3 times/week and spent 3 times/week in water aerobics or aqua-jogging; now everything is closed which reduced my exercises to yoga and qigong once a week [164] F/71/27.83 A very good program that makes me follow my own activity program much better [174] M/66/28.78 For myself, joining the program did not “force” me to increase exercise [180] M/70/25.51 The DW-app 2.5 is a digital service, and we know something about digital services. Drivers for the adoption of digital services have been identified and studied with a basis in the UTAUT2 model. They include (Yuan et al., 2015):        performance expectancy (“degree to which the use of a technology will help users to perform chosen activities”) effort expectancy (“degree of ease in the use of a technology”) social influence (“perception that important others support the use of technology”) facilitating conditions (“factors that facilitate or impede adoption of technology”) hedonic motivation (“fun or pleasure with using a technology”) price value (“trade-off between perceived benefits of and monetary cost for using a technology”) habit (“perception of automatically engaging in a certain behaviour”). Thus, we can find drivers that could make participants adopt and use the DW-app 2.5, but will that be sufficient to make them adopt and use a PA program? Then sustain the use of the adopted PA program. We will try out the proposal that UTAUT2 will not be sufficient as a conceptual framework for the adoption and use of PA programs; cf. Table 1 [“This program does not motivate to exercise as such; it is too simple and cumbersome” or “I spend as much time with exercise as feel good (quite much)”]. We propose to use the Elaboration Likelihood Model (ELM) to find drivers for the adoption and use of PA programs. 426 3 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE ELM and UTAUT and Variations The ELM was introduced by Petty et al (1995), (i) to work out influence processes and their impacts on human perceptions and behaviour, and (ii) to explain why a given influence process may have varying outcomes across different users in each context. This is promising for our aim to find drivers that could get the DW program adopted for sustained use among young elderly. Bhattacherjee and Sandford (2006) use the ELM as a theory framework to describe and explain IT usage intention. They state, following the Diffusion of Innovation theory (Rogers (1995)), that the acceptance of IT is fundamentally a problem of social influence. The ELM offers instruments for systematic studies of alternative influence processes and their effects, and the impact of moderating factors. Bhattacherjee and Sandford (2006) make a distinction between argument quality as the key influence process and peripheral cues as moderating factors. They work out perceived usefulness as driven by argument quality to influence the intention to use IT (the perceived usefulness is one of the drivers in the TAM framework (Davis (1989)). They add source credibility and attitude as additional influences on perceptions of perceived usefulness. Finally, job relevance and user experience, are peripheral cues and moderating factors. The key influence processes are surprisingly similar to the social influence processes we assume to describe and explain intentions for a sustained use of PA programs (cf. fig.3). The main influences come from perceived usefulness (“to get more good years”), which in turn is influenced by argument quality and source credibility (cf. the Copenhagen Consensus and verifiable medical research results); argument quality is at least partly influenced by source credibility; in some cases, argument quality can help decide source credibility. C. Carlsson, P. Walden, T. Kari, M. Makkonen &L. Frank: Forming Sustainable Physical Activity Programs Among Young Elderly - A Combined ELM & UTAUT Approach 427 Figure 3: The ELM applied to the sustained use of PA programs In the ELM framework, perceived usefulness influences attitudes, and we can find support for a proposed influence on attitudes to PA programs (typical comments from young elderly, cf. Table 1: “A very good program that makes me follow my own activity program much better” versus “I left the DW in mid-summer because my motivation was not sufficient to go on by myself; technology by itself is not enough as a motivation”). Attitudes to PA programs influence the perceptions of usefulness. We also propose a couple of moderating effects (peripheral clues) that influence attitudes to PA programs: (i) user PA history – (cf. Kettunen et al (2019)) typically identifies (i.1) regular PA users who have been active for multiple years (even decades); (i.2) sporadic PA users in on-off mode for multiple years; (i.3) inactive PA users with on-off intentions to get active; (ii) PA relevance –typically lists different goals for being active with PA programs (Linke et al (2011)), (ii.1) to lose weight and get in (much) better shape; (ii.2) to stay in sufficient shape to be independent and able to carry out all daily tasks; (ii.3) to enjoy life and (social) pleasures of pensioners (with no stress for spending time on PA); (ii.4) a multitude of other goal variations. The ELM framework will show the drivers that get users to adopt and use PA programs (and then – always/most of the time/sometimes/seldom - to stay with the programs). There are challenges to get the users to stay with their PA programs. Linke et al (2011) cite statistics that up to 50% of people who start an exercise program drop out within 6 months; Stiggelbout et al (2005) show a dropout incidence of 0.15 per 6 months in a large 12 month program for seniors with more 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 428 than 2000 participants; Rossi et al (2018) studied the participants in a 10-year supervised physical exercise program for older adults and found that the main reasons for dropout were lack of time, disease and need to care for family members. In section 2 we worked out the DW-app 2.5 as a digital service and noted that conceptual drivers for the adoption and use of digital services build on the Unified Theory of Acceptance and Use of Technology (UTAUT2) framework (cf. Venkatesh et al (2016)) that identifies seven drivers. We will use {DS} to denote a set of digital services that (following Venkatesh et al (2016)) will be specified by the context in which they are used. The UTAUT2 framework will show the drivers that get users to adopt and use {DS} – which will then assist and support the sustained use of PA programs ({DS} includes DW-app 2.5 as an artefact). We propose to combine the UTAUT2 with the ELM to work out how {DS} could contribute to the sustained use of PA programs when users are already using a program or have decided to start to use one. If we assume that {DS} will contribute to a sustained use of PA programs we will only need three of the UTAUT2 drivers to trace the impact (ELM will cover the rest of the drivers, cf. fig.3): (i) perceived usefulness (≈ performance expectancy (PE)); (ii) perceived ease of use (≈ effort expectancy (EE)); and (iii) behavioural intention (≈ behavioural intention (BI)). The drivers are collected and described as perceived by the users (Davis (1989), Venkatesh et al (2012)). If we apply this to the {DS} we get the following constructs (cf. Table 2). Table 2: Some selected UTAUT2 drivers for sustainable PA programs       (PE1) I find {DS} useful in achieving my daily PA goals (PE2) Using {DS} helps me achieve my PA goals more quickly (PE3) Using {DS} increases my efficiency in achieving my PA goals (EE1) Learning how to use {DS} to achieve my PA goals is easy for me (EE2) I find using {DS} to achieve my PA goals easy (EE3) It is easy for me to become skilful at using {DS} to achieve my PA goals C. Carlsson, P. Walden, T. Kari, M. Makkonen &L. Frank: Forming Sustainable Physical Activity Programs Among Young Elderly - A Combined ELM & UTAUT Approach   (BI1) I intend to continue using {DS} to achieve my PA goals (BI2) I will always try to use {DS} to achieve my PA goals  (BI3) I plan to use {DS} regularly to achieve my PA goals 429 Perceived usefulness now appears in both the ELM and the UTAUT2 frameworks. In the ELM framework we have the perceived usefulness of PA programs and work this out from attitudes to systematic PA, and the relevance and history of PA (for a user), which then shows what {DS} features and functions would be helpful to gain sustained use of PA programs. In the UTAUT2 framework we work out what {DS} will be useful and easy to use for sustained use of PA programs. There may be facilitating conditions for the adoption and use of the {DS}; in the UTAUT2 framework we typically find digital experience, self-efficacy, and trust (cf. Venkatesh et al (2016)). If we combine the ELM and UTAUT2 we get the following framework (cf. fig.4) that will show the conceptual drivers that describe and (partly) explain the sustained use of PA programs. This type of combination of conceptual frameworks was used in (e.g.) Brown et al (2010) and Lallmahomed et al (2013). Figure 4: Combined ELM & UTAUT2 model 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 430 The framework has later been augmented with the Motives for Physical Activity Measures to add to the Argument Quality. 4 Preliminary Conclusion and Discussion In section 1 we set out to tackle two research questions:   What drivers could get young elderly users to adopt and use PA programs? Perceived usefulness & attitudes to PA programs combined with argument quality & source credibility (on the health effects of systematic PA) supported with user PA relevance and PA history will be drivers for the use of PA programs. What factors or drivers could help support and sustain the adoption of PA programs? Behavioural intention to use {DS} & use of {DS} in PA programs, which are supported by perceived usefulness & perceived ease of use with further support by facilitating conditions will be drivers to sustain the adoption and use of PA programs. We realize that these answers are preliminary. Further studies are needed with the combined ELM & UTAUT2 model to find out what drivers are necessary for the sustained use of PA programs, and then what subset of drivers are sufficient to get sustained use of PA programs. We have seen in the DW research program (cf. Carlsson et al (2020)) that the {DS} will have an important (or even key) role for the sustained use of PA programs among the young elderly, but we have also seen that they will probably not be sufficient. Systematic empirical experiments and studies will give the answers. We can use the UTAUT2 framework to enhance the proposed combined ELM & UTAUT2 model (cf. fig.5). There are endogenous motivations (cf. Venkatesh et al (2016)) that fit with argument quality and source credibility for sustained adoption of PA programs. There is the objective “to get more good years”. There are facts, news, and media discussions about the effects of PA on health and the chance to avoid serious illness in senior years (Linke et al (2011)). Young elderly has short-term goals to continue with their everyday routines and longer-term goals for plans on activities that require good or better physical shape (Stiggelbout et al (2005)). C. Carlsson, P. Walden, T. Kari, M. Makkonen &L. Frank: Forming Sustainable Physical Activity Programs Among Young Elderly - A Combined ELM & UTAUT Approach 431 There are exogenous motivations (cf. Venkatesh et al (2016)) that support PA relevance in ELM; these include physicians’ health recommendations for PA programs (Hukkanen et al (2018)). Potential public policy decisions on reduction in elderly care are dark drivers - “better stay in shape, care may not be available when we need it”. Social influence (cf. Venkatesh et al (2016)) is an exogenous factor for PA programs that supports attitudes to PA programs in ELM. The strongest influence, reasonably enough, comes from family and loved ones that want to contribute to the “more good years”. Aims for wellness & quality of life (cf. Venkatesh et al (2016)) also support attitudes to PA programs in ELM. We found first validations of the constructs through empirical studies with young elderly in the DW research program (cf. Carlsson et al (2020b); Kari et al (2020a), (2020b); Makkonen et al (2020a), (2020b)) We have applied both cross-sectional (cf. Kari et al (2020a)) and longitudinal (cf. Makkonen et al (2020b)) studies of the actual use of PA programs (which fit the ELM mode), and the expected continued use of PA programs (in the UTAUT mode). The early results are interesting and growing sets of empirical data are collected in longitudinal test programs as the DW program progresses. References Ainsworth, B.E. et al. (2011). 2011 Compendium of Physical Activities, 0195-9131/11/4308-1575/0, Medicine & Science in Sports & Exercise, DOI: 10.1249/MSS.0b013e31821ece12 Bangsbo, J. et al. (2019). Copenhagen Consensus statement 2019: physical activity and ageing, Br J Sports Med 2019;0:1–3. doi:10.1136/bjsports-2018-100451The 2011 Compendium of Physical Activity Bhattacherjee, A., Sanford, C. (2006). Influence Processes for Information Technology Acceptance: An Elaboration Likelihood Model, MIS Quarterly, Vol.30, No.4, 805-825 Brown, S. A., Dennis, A. R., & Venkatesh, V. (2010). Predicting collaboration technology use: Integrating technology adoption and collaboration research. Journal of Management Information Systems, 27(2), 9-53. Carlsson, C., Walden P. (2018). Digital Wellness Services: Key to Better Quality of Life for Young Elderly, Andreja Pucihar et al. (editors), Proceedings of the 31st Bled eConference, Bled 2018, pp 248-261. 432 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Carlsson, C., Walden, P. (2019). Digital Support to Guide Physical Activity – Augmented Daily Routines for Young Elderly, Andreja Pucihar et al. (editors), Proceedings of the 32nd Bled eConference, Maribor 2019, pp 783-802. Carlsson, C., Walden, P., Kari, T., Makkonen, M., and Frank, L. (2020a): Sustainable Physical Activity Programs for Young Elderly – A Fuzzy AHP Approach. A. Pucihar et al (eds.) Proceedings of the 33rd Bled eConference, 29.6.2020. Carlsson, C., Kari, T., Makkonen, M., Frank, L. and Walden, P. (2020b): Sustained Adoption of Systematic Physical Activity Programs for Young Elderly – A Developed UTAUT Approach. A. Pucihar et al (eds.) Proceedings of the 33rd Bled eConference, 29.6.2020. Davis, F.D. (1989): Perceived usefulness, perceived ease of use and user acceptance of information technology, MIS Quarterly 13(3), 319-339 Hukkanen, H., Husu, P., Sievänen, H., Tokola, K., Vähä-Ypyä, H., Valkeinen, H., Mäki-Opas, T., Suni, J.H., Vasankari, T. (2018). Aerobic physical activity assessed with accelerometer, diary, questionnaire, and interview in a Finnish -population sample, Scandinavian Journal of Medical Science in Sports, 2018;28:2196–2206, https://doi.org/10.1111/sms.13244 Jonasson, L. (2017). Aerobic Fitness and Healthy Brain Aging. Cognition, Brain Structure, and Dopamine, Doctoral Dissertation, Umeå University Järveläinen J., Sell A. and Walden P., (2020). The Impact of IT Mindfulness on Complex Task Performance, Proceedings of the HICSS-54 Conference, pp 1232-1241 Kari, T., Rinne, P. (2018). Influence of digital coaching on physical activity: motivation and behaviour of physically inactive individuals. In Proceedings of the 31st Bled eConference “Digital Transformation – Meeting the Challenges”, pp. 127-145. University of Maribor Press, Bled, Slovenia. Kari, T., Makkonen, M., Frank, L., Carlsson, J. and Sell, A. (2020a): The Effects of Using a Mobile Wellness Application on Physical Activity Levels: A Four-Month Follow-Up Study Among Aged People. A. Pucihar et al (eds.) Proceedings of the 33rd Bled eConference, 29.6.2020. Kari, T., Sell, A., Makkonen, M., Wallin, S., Walden, P., Carlsson, C., Frank, L., Carlsson, J. (2020): Implementing a Digital Wellness Application into Use – Challenges and Solutions among Aged People. Proceedings of the ITAP 2020, 6th International Conference on Human Aspects of IT for the Aged Population. 19-24 July 2020, Copenhagen, Denmark Kari T., Makkonen M., Carlsson J. and Frank L. (2020b). Using a Physical Activity Application to Promote Physical Activity Levels Among Aged People: A Follow-Up Study. Proceedings of the HICSS-54 Conference, pp 1242-1251 Kettunen, E., Kari, T. Makkonen, M., Frank, L. and Critchley, W. (2020): Young Elderly and Digital Coaching: A Quantitative Intervention Study on Exercise Self-efficacy. A. Pucihar et al (eds.) Proceedings of the 33rd Bled eConference, 29.6.2020. Kettunen E.K., (2020). Using a Digital Coach to Promote Physical Activity to University Students with Low Levels of Physical Activity: A Qualitative Intervention Study. Proceedings of the HICSS54 Conference, pp 1252-1261 Kettunen, E., Makkonen, M., Kari, T., & Critchley, W. (2019). Using Sport and Wellness Technology to Promote Physical Activity: An Intervention Study among Teenagers. Proceedings of the 52nd Hawaii International Conference on System Sciences (HICSS). 8.-11.1.2019, Grand Wailea, Maui. University of Hawai'i at Manoa. (pp. 1341-1350). Kettunen, E., Critchley, W., & Kari, T. (2019). Can Digital Coaching Boost Your Performance? A Qualitative Study among Physically Active People. Proceedings of the 52nd Hawaii International Conference on System Sciences (HICSS). 8.-11.1.2019, Grand Wailea, Maui. University of Hawai'i at Manoa. (pp. 1331-1340). Lallmahomed, M. Z. I., Ab Rahim, N. Z., Ibrahim, R., & Rahman, A. A. (2013). Predicting different conceptualizations of system use: Acceptance in hedonic volitional context (Facebook). Computers in Human Behavior, 29(6), 2776-2787 Linke, S.E., Gallo, L.C. and Norman, G.J. (2011), Attrition and Adherence Rates of Sustained vs. Intermittent Exercise Interventions. Ann Behav Med, 42(2), 197-209 C. Carlsson, P. Walden, T. Kari, M. Makkonen &L. Frank: Forming Sustainable Physical Activity Programs Among Young Elderly - A Combined ELM & UTAUT Approach 433 Makkonen, M., Kari, T. and Frank, L. (2020a): Applying UTAUT2 to Explain the Use of Physical Activity Logger Applications Among Young Elderly. A. Pucihar et al (eds.) Proceedings of the 33rd Bled eConference, 29.6.2020. Makkonen M., Kari T. and Frank L., (2020b). Changes in the Use Intention of Digital Wellness Technologies and Its Antecedents Over Time: The Use of Physical Activity Logger Applications Among Young Elderly in Finland. Proceedings of the HICSS-54 Conference, pp 1262-1271 Petty, R.E., Cacioppo, J.T. (1986). Communication and Persuasion: Central and Peripheral Routes to Attitude Change. Springer-Verlag, New York Reyes-Mercado P. Adoption of fitness wearables. Insights from partial least squares and qualitative comparative analysis, Journal of Systems and Information Technology, Vol. 20 No. 1, 2018, pp. 103-127 Rogers, E.M. (1995). Diffusion of Innovations, Free Press, New York Rossi, P.G., Carnaz, L., Bertollo, W.L., de Medeiros Takahasi, A.C. (2018). Causes of drop out from a physical exercise super-vised program specific to older adults, Fisioter Mov., 31, 1-11 Sell, A., Mezei, J. & Walden, P. (2020). Digital Coaching: A study on potential motivators. Proceedings of the 53rd Hawaii Conference on System Sciences (HICSS-53). Stiggelbout, M., Hopman-Rock, M., Tak, E., Lechner, L. and van Mechelen. W. (2005). Droput from exercise programs for seniors: a prospective cohort study, Journal of Aging and Physical Activity, 13, 409-421 THL – Finnish Institute for Health and Welfare. 2019a. Aikuisten terveys-, hyvinvointi- ja palvelututkimus, ATH 2010-2017. THL – Finnish Institute for Health and Welfare. 2019b. National FinHealth Study. Wallén, M. B., Ståhle, A., Hagströmer, M., Franzén, E. & Roaldsen, K. S. (2014), Motionsvanor och erfarenheter av motion hos äldre vuxna, Karolinska Institutet, Stockholm, March 2014 Venkatesh, V., Brown, S. A., Maruping, L. M., Bala, H. (2008). Predicting different conceptualizations of system use: The competing roles of behavioral intention, facilitating conditions, and behavioral expectation. MIS Quarterly, 32(3), 483-502. Venkatesh, V., Thong, J. Y. L., & Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly, 36(1), 157-178. Venkatesh, V., Thong, J. Y. L., & Xu, X. (2016). Unified Theory of Acceptance and Use of Technology: A synthesis and the Road Ahead. JAIS, Vol 17, Issue 5, 328-376 Yuan, S., Ma, W., Kanthawala, S., Peng, W. (2015). Keep Using My Health Apps: Discover Users’ Perception of health and Fitness Apps with the UTAUT2 Model, Telemedicine and e-Health, Vol.21, No.9, 7335-741 434 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE SEGMENTATION OF THE YOUNG ELDERLY BASED ON TECHNOLOGY READINESS ANNA SELL1 & PIRKKO WALDEN2 1 Åbo Akademi University, Faculty of Social Sciences, Business and Economics, Åbo, Finland; e-mail: anna.sell@abo.fi 2 Institute for Advanced Management Systems Research and Åbo Akademi University, Åbo, Finland; e-mail: pirkko.walden@abo.fi Abstract We examine the young elderly’s technology readiness in order to understand the propensity to adopt and use technology for personal use. We use the Technology Readiness Index 2.0 as segmentation basis to segment a sample of mainly young elderly individuals. Our aim is to find meaningful segments within this demographic group regarding their technology readiness, and to contrast the segments with previous research. Our findings based on 538 retirees revealed a similar segmentation profile as found within working-age populations, and a surprisingly different profile than previous research with a mature target group. We identified five distinct segments portraying the young elderly as diverse technology users, ranging from ‘pioneers’ to ‘hesitators’. The findings give arise to discussion regarding the impact of age on the technology readiness of individuals and the importance of age as a predictor of technology use. We propose that commonly held views on age as an inhibitor of technology use are becoming outdated as the diffusion of technology reaches a certain level of maturity in a market. DOI https://doi.org/10.18690/978-961-286-485-9.32 ISBN 978-961-286-485-9 Keywords: young elderly, technology readiness, technology readiness index, digital technology, physical activity, market segmentation, technology segmentation, lifestyle segmentation, attitude segmentation 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 436 1 Introduction It is often claimed that elderly people are technology averse and that a project is doomed if it introduces digital services for this group of consumers. It is not unusual that elderly people think that they are too old to use digital technology. Studies have shown (Czaja and Lee, 2007, Villarejo et al. 2019) that there are indeed those elderly who can be portrayed as technophobic i.e., who fear, dislike, or avoid technology. Studies have also shown the opposite. For example, Neves (2012) found that the elderly do not think that they are too old for digital technology nor do they see themselves as technophobic. Several studies have also shown that the elderly are willing as well as competent to use digital technology (Czaja and Lee, 2006, 2007, Sell et al. 2011, 2017). Research on elderly people’s use of technology has focused on adoption behavior, e.g., Deng et al. (2014), attitudes towards technology, e.g., Mitzner et al. (2010), evaluations of wellness-supporting applications or devices e.g., Scandurra and Sjölinder (2013), and Mercer et al. (2016). Several studies have investigated how mobile technologies can be employed to support the care of individuals with dementia-related diseases. The technology user in such studies is either the caregiver (Maiden et al. 2013; Zachos 2013) or the patient herself (Upton et al. 2011; Yamagata et al. 2013). The technology is utilized to e.g., aid communication, support reminiscence/recall and provide stimulation. These studies and mobile technologies are not as such applicable to the cognitively healthy and independent young elderly. As technology users, a digital divide seems to exist between younger and older adults, visible in lower usage of and experience with technology in general, as well as computers and the Internet (Czaja et al. 2006, sample aged 60-91 years, and König et al. 2018, sample aged 50+). The divide widens when combined with a lower education level, i.e., older adults with a lower education level are less likely to use different technologies (Czaja et al. 2006; Vroman et al. 2015; König et al. 2018). On the other hand, it has been suggested that digital technology can protect older adults from the digital divide (Hill et al. 2015). When examining initial adoption decisions, it has been found that subjective norm and perceived behavioral control are more important for older adults than younger (Morris and Venkatesh 2000); subjective norm loses its significance with prolonged usage as domestication occurs. Heart and Kalderon (2013) followed up on the study A. Sell & P. Walden: Segmentation of the Young Elderly Based on Technology Readiness 437 by Morris and Venkatesh (2000) thirteen years later (sample aged 60-90+), finding that the health status of the elderly person is a strong moderating factor regarding technology use; healthy older people are much more likely to be technology users. Nevertheless, age was still found to be a barrier to ICT use by Heart and Kalderon (2013) and based on their findings the authors concluded that older adults are not yet ready to adopt health-related ICTs. Other studies have identified facilitating conditions to be of special importance for older adults’ decisions to adopt technology, such as Barnard et al. (2013) (samples aged 58-78 and over 65, mean age 68) and Nägle and Schmidt (2012) (sample aged 50-90). Marital status has also been found to be of importance; those living alone (and/or single, widowed, divorced etc.) are less likely to adopt technology. Finally, a positive and optimistic disposition is related to a higher likeliness to adopt technology (Vroman et al. 2015). In summary, research indicates that younger age, better health, higher education and not living alone are features associated with a higher likeliness to adopt and use technology. Some of these factors, i.e., age and education are also related to technology readiness (Blut and Wang 2020). DigitalWells is an ongoing interactive research and development program with the aim to build sustainable systematic technology-supported physical activity (PA) programs for young elderly. The focus on the young elderly is a new approach for digital services, a market for which there has been little interest to develop digital value services (Bouwman et al. 2014, Carlsson and Walden 2012). The PA programs are based on self-tracking, meaning that the participants use an application on their mobile phone to log and keep track on their physical activities. It is also possible to use wearables that automatically collect the physical activities which can be synchronized to the mobile app, i.e., no manual keying is needed. In this study we concentrate on how well prepared the young elderly are to accept and use technology in the DigitalWells program. This is carried out by using the technology readiness index (TRI) 2.0 by Parasuraman and Colby (2015) with the aim to find out technology-related beliefs. These beliefs are not easy to change within a short time frame which make them especially suitable to study. Thus, our aim is to find meaningful segments within this demographic group with regard to their technology readiness, and to contrast the segments found in this age group with the segments found by Parasuraman and Colby (2015) in a sample 438 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE representing ages 18-65+. We assume that the young elderly differ in their technology readiness, and, if so, then it is most essential to understand the needed support of the participants in the PA-program in order for them to feel comfortable with the digital technology. 2 Technology Readiness Index 2.0 Technology readiness is defined based on Parasuraman’s seminal work (2000 p. 308) as “people’s propensity to embrace and use new technologies for accomplishing goals in home life and work”. Following Parasuraman’s study we recognize that there are both positive and negative feelings that describe the domain of technology readiness. The positive feelings push people towards technologies whereas the negative may have the opposite direction, i.e., holding them back (Parasuraman 2000). These feelings Parasuraman (2000) sees as mental motivators and inhibitors that collectively determine a person’s predisposition to use new technologies. The mental motivators can be categorized into two dimensions, optimism and innovativeness and the mental inhibitors as well into two dimensions, discomfort and insecurity. The dimensions are defined in the following way: Optimism is defined as "a positive view of technology and a belief that it [technology] offers people increased control, flexibility, and efficiency in their lives" (Parasuraman & Colby, 2001, p. 34). It generally portrays positive feelings about technology. Innovativeness is defined as "a tendency to be a technology pioneer and thought leader" (Parasuraman & Colby 2001, p. 36). This dimension generally measures to what degree individuals perceive themselves as being at the forefront of technology adoption. Discomfort is defined as "a perceived lack of control over technology and a feeling of being overwhelmed by it" (Parasuraman & Colby 2001, p. 41). This dimension generally measures the fear and concerns people experience when confronted with technology. Insecurity is defined as a "distrust of technology and skepticism about its ability to work properly" (Parasuraman & Colby, 2001, p. 44). This dimension focuses on concerns people may have in face of technology-based transactions. Optimism and innovativeness are drivers of technology readiness. A high score on these dimensions will increase overall technology readiness. Discomfort and insecurity, on the other hand, are inhibitors of technology readiness. Therefore, a high score on discomfort and insecurity dimensions will reduce overall technology readiness (Parasuraman, 2000). A. Sell & P. Walden: Segmentation of the Young Elderly Based on Technology Readiness 439 Parasuraman and Colby (2001) emphasize that the four dimensions are fairly independent, indicating that each of them make a unique contribution to an individual's technology readiness. An individual can for example score high on motivations simultaneously mitigated by strong inhibitions which would be considered as a “paradoxical state” (Parasuraman and Colby, 2001 p. 61). 3 Segmentation studies based on technology readiness It is suggested that using attitudes and lifestyles as segmentation bases can be useful when segmenting technology users (Sell and Walden 2012, Sell et al. 2014). Technology readiness represents an individual’s technology-related beliefs, and it has been used as a basis for segmentation in several research projects. Parasuraman and Colby (2001) originally found five segments which they named explorers (high motivation, low inhibition), pioneers (high motivation, high inhibition), skeptics (low motivation, low inhibition), paranoids (moderate motivation, high inhibition) and laggards (low motivation, high inhibition). Using another method (latent class analysis) and a streamlined 16-item scale for segmenting the consumers Parasuraman and Colby (2015) again found a five-cluster solution being the best and similar to the prior TR-based segmentation (2001). The segments were labeled and described as follows: (i) skeptics, a detached view of technology, with less extreme positive and negative beliefs; (ii) explorers, a high degree of motivation and low degree of resistance; (iii) avoiders, a high degree of resistance and a low degree of motivation; (iv) pioneers, both strong positive and negative views about technology; and (v) hesitators, a low degree of innovativeness (Parasuraman and Colby 2015, p.71). Tsikriktsis (2004) replicated and extended the taxonomy proposed in 2001 by Parasuraman and Colby. He found that there are both similarities and differences between the two segmentation studies. Four segments had a good match but the fifth segment – paranoids – could not be identified in his study. Victorino et al. (2009) explored the use of a ten-item abbreviated version of TRI (Parasuraman and Colby 2001) for hotel customer segmentation and found that it was a reliable method for segmenting customers. A three-cluster solution came out as the best. The segments they found were similar to the explorers/pioneers, paranoids, and laggards. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 440 One of the few studies researching the TRI-profile of mature consumers is by Rose and Fogarty (2010). They use the abbreviated technology readiness scale by Parasuraman and Colby (2001) in order to segment Australian consumers over 50 years of age. They found support for the original five segments by Parasuraman and Colby (2001). Mature consumers in their study were more likely to belong to the skeptic and laggard segments (34% and 23% respectively), and less likely to belong to the explorer and pioneer segments (16% and 13%) than the general population sample their results were contrasted to (22% skeptics, 17% laggards, 19% explorers and 26% pioneers). Demographic analysis of segments revealed that older, female, and less educated individuals were more likely to be in the laggard segment, mirroring previous research (Czaja et al 2006, König et al 2018). Kim et al. (2018) used the TRI 2.0 to segment users of sports wearables and found three distinct groups of users, explorers, laggards and pioneers. The method they used was a two-stage cluster analysis in contrast to latent class analysis which was used by Parasuraman and Colby (2015). In a recent article Wiese and Humbani (2020) applied TRI 2.0 for segmenting the mobile payment market in South Africa. They found four segments of which three shared similarities with pioneers, paranoids and explorers and the fourth - hesitant-skeptics - had no similarities with the original ones. Ramirez-Correa et al. (2020) validated the TRI 2.0 in Chile and used LCA for segmentation. They found that four segments are similar compared to the study by Parasuraman and Colby (2015) whereas the segment of skeptics is different. There are also differences in the size of the segments as hesitators and pioneers together count for more than 80% of the Chilean sample. All the above-mentioned studies have both similarities and differences. They are targeting different countries with different technology adoption stages and different contexts that most probably explain some of the variation in the outcomes. 4 The study Our study is carried out in Finland which repeatedly has been named as one of the most technologically advanced countries in the world. Further, according to the European Commission (2020), Finland is leading the EU in digital competence and use of internet services amongst its population. We are targeting a group of people which we call the young elderly, 60 to 75 years of age. There are few studies that A. Sell & P. Walden: Segmentation of the Young Elderly Based on Technology Readiness 441 focus on technology readiness amongst elderly or young elderly and technology readiness-based segmentation, thus our study is to our knowledge one of the first of its kind. Our study is divided into several waves, depending on when the participants joined the DigitalWells research program. In the first wave which we report here are 575 participants who joined the program in 2019-2020. All participants are retired, they are members of a local retiree's association, they have volunteered to be in the program and a prerequisite is that they have a smart phone, i.e., they need to have a mobile internet connection in order to be able to participate in the program. When we first start working with the participants, we do not require that they have deep knowledge in digital technology as we give them hands-on guidance. However, it is vital for the program to measure their readiness for technology and for that purpose we used the Technology Readiness Index 2.0 by Parasuraman and Colby (2015). The TRI 2.0 questions were translated to Finnish and Swedish by a team of researchers and then translated back to English by another team of researchers. We aim at having the participant feel confident about and comfortable with the digital technology used in the project. As pointed out by Parasuraman and Colby (2015, p. 61) technology readiness is “…an individual-level characteristic that does not vary in the short term…” and another notable aspect is that it does not change suddenly in response to a stimulus. Several researchers have also found that higher technology readiness levels are correlated with higher adoption rates of cutting-edge technologies, more intense use of technology, and greater perceived ease in doing so (Kuo 2011, Fisk et al. 2011, Massey et al. 2007) which would all contribute to the success of the DigitalWells program. The demographics of the participants are as follows. 62% of the participants are women and the mean age of the participants is 68,2 years (range 48-831), median value being 68 years (n=528). The great majority of the participants (68,5%) are married, 10,1% are divorced, 8,2% are widowed, 9,7% are common-law married and the remaining 3% are single. Many of the participants (67,2%) live in a small city (less than 20.000 inhabitants) or in a rural area. The mother tongue of the participants is Finnish 82% or Swedish 18%. Roughly one-fourth of the respondents 1 In our sample, a few of the respondents were younger or older than the young elderly age range of 60-75. However, all respondents are retirees and belong to a retired persons’ association. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 442 (25,3%) have a university degree or a degree from university of applied sciences, but there are a lot of missing values concerning education (n=226). At the onset, we had 575 observations. After cleaning out respondents who (i) had no answers on one of the four TRI dimensions, (ii) had only answered eight or less of the TRI statements, or (iii) only had one answer on one or more of the TRI dimensions, we ended up with 538 usable observations. Remaining missing values were replaced with mean value for the sample. 5 Results We calculated the Technology Readiness Index and its components following Parasuraman and Colby (2015), table 1 below. For comparison, we include the mean values for the TRI components in the Parasuraman and Colby study (P&C in table 1). The scale ranges from strongly agree 5.0 to strongly disagree 1.0. The overall technology readiness index mean score is 3.01, close to the scale’s midpoint 3.0. The participants are generally optimistic (OPT) about technology, mean score being 3.42. Innovativeness (INN) score is below midpoint. The participants are on discomfort (DISC) below the midpoint and insecurity (INSEC) above the midpoint. Distribution of the scores is near-normal, as skewness values are all between -0,5 and 0,5 and kurtosis values between -1 and 1. As expected, correlation between motivating factors (optimism and innovativeness) is positive and correlation between inhibiting factors (discomfort and insecurity) is also positive. Correlations for motivator-inhibitor combinations are negative. Table 1: Summary statistics for Technology Readiness Index 2.0 and its components Components OPT INN DISC INSEC Overall TR score Mean values Current P&C study 3,42 3,75 2,89 3,02 2,88 3,09 3,41 3,58 3,01 3,02 Correlation coefficients SD Skewness Kurtosis OPT INN DISC INS 0,80 0,94 0,85 0,91 -0,41 0,05 -0,03 -0,37 -0,06 -0,76 -0,64 -0,25 1,00 0,53 -0,39 -0,36 1,00 -0,45 -0,31 1,00 0,53 1,00 0,66 0,10 -0,42 0,74 0,77 -0,78 -0,73 A. Sell & P. Walden: Segmentation of the Young Elderly Based on Technology Readiness 443 We employed exploratory factor analysis with Varimax rotation to examine whether the factor structure of the original four TRI dimensions can be found in this dataset. We utilized principal axis factoring with Varimax rotation requesting a four-factor solution. After examining initial factor loadings, we decided to remove one of the variables on the Insecurity scale (INSEC4) from further analysis, as it did not load correctly on the Insecurity dimension and its communality was below 0.5. Our subsequent factor analysis (without the INSEC4 item) explains 59.2% of the variance. The eigenvalues of the first three factors surpass 1, the eigenvalue of the fourth one being 0.93. Examining a scree plot confirmed the suitability of a fourfactor solution. Also, each of the four factors explains a significant part of the variance: 16.7%, 16.1%, 14.1% and 12.2% respectively. The Kaiser-Meyer-Olkin measure of sampling adequacy was 0.891 and Bartlett’s test was significant (x 2(105) = 2324.0, p < 0.000). The four-factor solution aligned well with the four technology readiness dimensions, with only one item (DISC2) with a standardized factor loading just below 0.5 at 0.475. Remaining items loaded from 0.584 to 0.771. There is one significant crossloading, with INN4 cross-loading on the Optimism dimension. The same crossloading is reported by Parasuraman & Colby (2015) in their validation of the TRI 2.0 scale. Factor loadings and Cronbach’s  for each of the sub-scales can be seen in table 2. Table 2: Factor loadings and reliability analysis OPT 1 OPT 2 OPT 3 OPT 4 INN 1 INN 2 INN 3 INN 4 DISC 1 DISC 2 DISC 3 DISC 4 INSEC 1 INSEC 2 INSEC 3 a. Factor 1 .771 .598 .715 .741 .426 Factor 2 Factor 3 Factor 4 Cronbach's a .756 .763 .699 .749 .596 .770 .727 .475 .584 .702 .708 .767 .710 .769 For reliability analysis, discomfort and insecurity statements were reverse-coded. .725 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 444 At the following stage, K-means cluster analysis in SPSS 24 was used to create a fivecluster solution. The five resulting segments were analyzed and found to be similar to the five segments found by Parasuraman and Colby (2015) in a sample of 878 respondents with a median age of 51 years and ranging from 18 to 65+ (exact upper range not reported). Hence, we have named the clusters with the same monikers as Parasuraman and Colby. A description of the segments can be found in chapter 3. In the following we present the segments and highlight similarities and differences to those presented by Parasuraman and Colby (2015). In table 3, the segments are described through the mean values of each segment for the four technology readiness dimensions, as well as the TR score for each segment, the size of the segment and the rank of the segment based on the TR score (TR scores were calculated according to Parasuraman and Colby 2015). TR score, percentage per cluster and rank is provided also for the Parasuraman and Colby (2015) sample for the sake of comparison. Table 3: Mean values, TR scores, size and rank Parasuraman and Colby (2015) Clusters OPT INN DISC INSEC N TR SCORE Pioneers 3,75 3,37 3,12 3,63 137 3,09 Skeptics 3,16 2,49 2,35 2,77 83 3,13 Hesitators 3,04 1,78 3,53 3,88 117 2,35 Avoiders 2,59 2,54 3,49 4,27 80 2,34 Explorers 4,16 3,94 1,92 2,57 121 3,90 % 25 % 15 % 22 % 15 % 22 % RANK TR SCORE % Rank 3 3,05 16 % 3 2 3,06 38 % 2 4 2,74 13 % 4 5 2,13 16 % 5 1 3,92 18 % 1 In our sample, the Pioneers is the largest segment, comprising 25% of the total respondents, compared to 16% in the Parasuraman and Colby (P&C) study. In P&C, Skeptics are the largest segment with 38% of total respondents, whereas in our study, only 15% of respondents fall into the Skeptics segment. Both Avoiders and Explorers are similarly sized segments in the two studies, but a clearly larger proportion of our respondents fall into the Hesitators segment (22%) than in the P&C study (13%). When looking at the ranking of the segments, based on the mean TR scores, the two A. Sell & P. Walden: Segmentation of the Young Elderly Based on Technology Readiness 445 studies exhibit the same ranking, with Explorers showing the highest mean TR score and the Avoiders the lowest. Interestingly, the mean TR scores are higher for the Pioneers, Skeptics and Avoiders in our study, higher for Hesitators in P&C, and roughly the same in both studies for Explorers. MEAN SCORE ON DIMENSION When looking at the segments through the lens of the four technology readiness dimensions, some interesting observations can be made. We visualize the segments from our study in figure 1. The Pioneer, Skeptic and Explorer segments present similar profiles in our study and in that by P&C. The profiles for Pioneers and Skeptics are very similar on all dimensions, but the scores are lower for the Skeptics in our study. The Hesitators, characterized by their low level of innovativeness, present a distinctly higher level of optimism in the P&C study than in our study. The Avoiders show a markedly lower level of innovativeness in the P&C study than in our study. Pioneers Skeptics Avoiders Explorers Hesitators 5.00 4.00 3.00 2.00 1.00 0.00 OPT INN DISC INSEC Figure 1: Mean values for technology readiness dimensions per segment in current study (n=538) In table 4 we outline the demographic characteristics of the five TRI-based segments derived from our data. Age is excluded, as there were only negligible differences in age between the segments. Due to missing data, it was not possible to analyze the segments according to their level of education. We notice that the biggest segments are Pioneers, Explorers and Hesitators. Contrasted to the age division in the entire sample (68% female), we can see that women are underrepresented in the Pioneer and Explorer segments. Pioneers and Explorers as segments are also characterized by 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 446 a proportionally high proportion of city-dwellers. In the Skeptics we find a relatively high proportion of women and a somewhat high proportion of persons who belong to the Swedish-speaking minority. Hesitators are predominantly female and have a higher percentage of individuals living alone. Table 4: Demographic characteristics of the segments 6 Female (%) Living alone (%) Large or medium city (%) Swedish minority (%) Pioneers (137) Skeptics (83) 55,6 20,9 38,8 14,6 69,9 17,5 29,6 22,9 Hesitators (117) 70,1 28,7 30,2 14,5 Avoiders (80) 65,4 23,4 28,6 18,8 Explorers (121) 52,5 22,2 33,3 21,5 Discussion and conclusions The aim of this study was to find meaningful segments within the young elderly cohort with regard to their technology readiness, and to contrast the segments found in this age group with the segments found by Parasuraman and Colby (2015) in a sample representing ages 18-65+. We underline the fact that Parasuraman and Colby collected their data in year 2012 whereas our data is collected in 2019-2020. In this study we used the 16-item scale and could validate the presence of all four technology readiness dimensions in the dataset. We successfully identified five segments similar to the segments found by Parasuraman and Colby. This is noteworthy as our data covers the young elderly cohort; thus, this supports the allegation that the mature consumer market is not homogeneous and suggests that the mature technology consumers are similar to working age technology consumers regarding their technology readiness. However, the size of the segments differs. The Pioneers is the biggest segment in our study compared to the Skeptics in the Parasuraman and Colby study. The smallest group found by Parasuraman and Colby was the Hesitators, whereas the proportion of Hesitators in our material was higher. Previous research suggests that the level of innovativeness in information technology is overall lower for mature women, which might explain this finding. A plausible explanation for the higher proportion of Pioneers in our study could be A. Sell & P. Walden: Segmentation of the Young Elderly Based on Technology Readiness 447 derived from the fact that Finns are frequent users of the internet. In year 2020, the proportion of internet users in the 16-89 years age group was 92% and of those 82% used the internet several times per day. The proportion of internet users among those aged 65-74 is 88% and of those 62% use the internet several times per day (Statistics Finland 2020). The ranking of the segments was the same in both studies. When looking at the segment profiles, the Pioneer, Skeptic and Explorer segments are very similar. The Hesitators in both studies show a low level of innovativeness, but in our study also a markedly lower level of optimism. Conversely, the Avoiders in our study exhibit a higher level of innovativeness than in the Parasuraman and Colby (2015) study. Overall, the segments are surprisingly similar in the two studies; we would have expected the segments in the young elderly sample to show at least partially different profiles. Apart from comparing our findings to Parasuraman and Colby (2015), we also contrast the results with a study by Rose and Fogarty (2010) as their study was specifically focused on mature consumers in Australia and also utilized a TRI-based segmentation. We observe some similarities and differences. Both studies found a five-segment solution, but the segments differ content wise and in size. Mature Australian consumers are contrary to our findings less likely to be explorers or pioneers (29,5%) but adopters at late growth or decline stage (57.7%). Skeptics and Laggards (equals to Avoiders) are the biggest segments in the Australian study and the smallest in our study. The results from these two studies on mature technology consumers differ significantly which warrants discussion. A partial explanation can be the differences in the technology development/infrastructure, as the 'second generation' mobile phone systems were introduced in 1990s and achieved early on a high penetration rate in the Finnish working age population, meaning that the Finnish young elderly in our study were technology users long before turning 60 years old. Also, the Australian study was done more than a decade ago; the mature technology consumer market changes rapidly as the proportion of technologically experienced individuals entering retirement constantly rises. Rose and Fogarty found that the Explorers and Pioneers are younger whereas the Laggards are older. This is a notable difference as age did not describe the segments we found. We propose that the importance of age as a predictor of technology use gradually loses its significance as the diffusion of technology reaches a certain level of maturity in a market. 448 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE The findings from our study support the four technology readiness dimensions and the five-segment solution. It provides interesting profiles of young elderly and a unique knowledge of this age group’s technology beliefs in the different segments. Note. The Technology Readiness Index 2.0 survey research scale is copyrighted by A. Parasuraman and Rockbridge Associates, Inc., 1999, and is used with written permission. TRI items from Parasuraman (2015) were translated into Finnish and Swedish. References Barnard Y, Bradley MD, Hogdson F, Lloyd AD (2013). Learning to use new technologies by older adults: Perceived difficulties, experimentation behaviour and usability. Computers in Human Behavior 29(4), 1715-1724. Blut, M., Wang, C. (2020). Technology readiness: a meta-analysis of conceptualizations of the construct and its impact on technology usage. Journal of the Academy of Marketing Science, 48, 649– 669. Bouwman, H., Carlsson, C., de Reuver, M., Hampe, F. and Walden, P. (2014). Mobile R&D Prototypes – What is Hampering Market Implementation. International Journal of Innovation and Technology Management, 11(1). Carlsson, C. and Walden, P. (2012). From MCOM Visions to Mobile Value Services. Roger Clarke, Andreja Puchar and Joze Gricar (eds.), The First 25 Years of the Bled eConference, University of Maribor, Bled, 69-91. Czaja, S.J., Charness, N., Fisk, A.D., Hertzog, C., Nair, S.N., Rogers, W.A. and J. Sharit, (2006). Factors Predicting the Use of Technology: Findings From the Center for Research and Education on Aging and Technology Enhancement (CREATE). Psychology and Aging, 21:2, 333-352. Czaja S. and Lee, C.C. (2007). The impact of aging on access to technology. Universal Access in the Information Society (UAIS), 5(4), 341-349. Deng, Z., Mo, X. and S. Liu (2014). Comparison of the middle-aged and older users’ adoption of mobile health services in China. International Journal of Medical Informatics, 83, 210-224. European Commission (2020). Digital Economy and Society Index (DESI) 2020. https://ec.europa.eu/digital-single-market/en/digital-economy-and-society-index-desi Fisk, R. P., Patricio, L., Lin, J. S. C., & Chang, H. C. (2011). The role of technology readiness in self‐ service technology acceptance. Managing Service Quality: An International Journal, 21(4), 424444. Heart, T., and E. Kalderon (2013). Older adults: Are they ready to adopt health-related ICT? International Journal of Medical Informatics, 82(11), e209-e231. Hill, R., L.R. Betts, and S.E. Gardner (2015). Older adults’ experiences and perceptions of digital technology: (Dis)empowerment, wellbeing, and inclusion. Computers in Human Behavior, 48, 415-423. Kim, T., Chiu, W., & Chow, K. (2019). Sport technology consumers: segmenting users of sports wearable devices based on technology readiness. Sport, Business and Management, 9(2), 134145. Kim, M. J., Lee, C. K., & Preis, M. W. (2020). The impact of innovation and gratification on authentic experience, subjective well-being, and behavioral intention in tourism virtual reality: The moderating role of technology readiness. Telematics and Informatics, 49, 101349. Kuo, T. H. (2011). The antecedents of customer relationship in e-banking industry. Journal of Computer Information Systems, 51(3), 57-66. A. Sell & P. Walden: Segmentation of the Young Elderly Based on Technology Readiness 449 König, R., Seifert, A., & Doh, M. (2018). Internet use among older Europeans: an analysis based on SHARE data. Universal Access in the Information Society, 17(3), 621-633. Maiden, N., D'Souza, S., Jones, S., Müller, L., Pannese, L., Pitts, K., ... & Zachos, K. (2013). Computing technologies for reflective, creative care of people with dementia. Communications of the ACM, 56(11), 60-67. Massey, A. P., Khatri, V., & Montoya-Weiss, M. M. (2007). Usability of online services: The role of technology readiness and context. Decision Sciences, 38(2), 277-308. Mercer, K., Giangregorio, L., Schneider, E., Chilana, P., Li, M. and Grindrod, K. (2016). Acceptance of commercially available wearable activity trackers among adults aged over 50 and with chronic illness: a mixed-methods evaluation. JMIR mHealth and uHealth, 4(1). Mitzner, T. L., Boron, J. B., Fausset, C. B., Adams, A. E., Charness, N., Czaja, S. J., ... & Sharit, J. (2010). Older adults talk technology: Technology usage and attitudes. Computers in Human Behavior, 26(6), 1710-1721. Morris, M. G., & Venkatesh, V. (2000). Age differences in technology adoption decisions: Implications for a changing work force. Personnel psychology, 53(2), 375-403. Neves, B. B., & Amaro, F. (2012). Too old for technology? How the elderly of Lisbon use and perceive ICT. The Journal of Community Informatics, 8(1), 1-12. Nägle, S., & Schmidt, L. (2012). Computer acceptance of older adults. Work, 41(Supplement 1), 35413548. Parasuraman, A. (2000). Technology Readiness Index (Tri): A Multiple-Item Scale to Measure Readiness to Embrace New Technologies. Journal of Service Research, 2(4), 307–320. Parasuraman, A. and C.L. Colby (2001). Techno-ready marketing: How and why your customers adopt technology. New York: Free Press. Parasuraman, A., & Colby, C. L. (2015). An updated and streamlined technology readiness index: TRI 2.0. Journal of service research, 18(1), 59-74. Ramírez-Correa, P., Grandón, E. E., & Rondán-Cataluña, F. J. (2020). Users segmentation based on the Technological Readiness Adoption Index in emerging countries: The case of Chile. Technological Forecasting and Social Change, 155, 120035. Rose, J., & Fogarty, G. J. (2010). Technology readiness and segmentation profile of mature consumers. In Proceedings of the 4th Biennial Conference of the Academy of World Business, Marketing and Management Development, 4(1), 57-65. Scandurra, I., & Sjölinder, M. (2013). Participatory design with seniors: Design of future services and iterative refinements of interactive eHealth services for old citizens. Medicine 2.0, 2(2). Sell A., Walden P. and Carlsson C. (2011). Segmentation Matters – An Exploratory Study of Mobile Service Users. International Journal of Systems and Service-Oriented Engineering, 2(3), 1-17. Sell A. and Walden P. (2012). Segmentation bases in the mobile services market: Attitudes in, demographics out. The Forty-Fifth Annual Hawaii International Conference on System Sciences, IEEE Computer Society Press, Los Alamitos. Sell A., Mezei J. and Walden P. (2014). An attitude-based latent class segmentation analysis of mobile phone users. Telematics & Informatics, 31(2), 209-219. Sell, A., Walden, C. and Walden P., (2017). My Wellness as a Mobile App. Identifying Wellness Types among the Young Elderly. The Fiftieth Annual Hawaii International Conference on System Sciences. IEEE Computer Society Press, Los Alamitos. Statistics Finland (2021). Use of information and communication technology by individuals. https://www.stat.fi/til/sutivi/index_en.html Tsikriktsis, N. (2004). A technology readiness-based taxonomy of customers: A replication and extension. Journal of Service Research, 7(1), 42-52. Upton, D., Upton, P., Jones, T., Jutlla, K., Brooker, D. and Grove, H. (2011). Evaluation of the impact of touch screen technology on people with dementia and their careers within care home settings. UK: University of Worcester Victorino, L., Karniouchina, E., & Verma, R. (2009). Exploring the use of the abbreviated technology readiness index for hotel customer segmentation. Cornell Hospitality Quarterly, 50(3), 342359. 450 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Villarejo Ramos, Á. F., Peral Peral, B., & Arenas Gaitán, J. (2019). Latent segmentation of older adults in the use of social networks and e-banking services. Information Research, 24(4). Vroman, K. G., Arthanat, S., & Lysack, C. (2015). “Who over 65 is online?” Older adults’ dispositions toward information communication technology. Computers in Human Behavior, 43, 156-166. Wiese, M., & Humbani, M. (2020). Exploring technology readiness for mobile payment app users. The International Review of Retail, Distribution and Consumer Research, 30(2), 123-142. Yamagata, C., Coppola, J. F., Kowtko, M., & Joyce, S. (2013). Mobile app development and usability research to help dementia and Alzheimer patients. In 2013 IEEE Long Island Systems, Applications and Technology Conference (LISAT), 1-6. Zachos, K., Maiden, N., Pitts, K., Jones, S., Turner, I., Rose, M., ... & MacManus, J. (2013). A software app to support creativity in dementia care. In Proceedings of the 9th ACM Conference on Creativity & Cognition THE SHAPE OF BOTTOM-UP URBANISM PARTICIPATORY PLATFORMS: A CONCEPTUALISATION AND EMPIRICAL STUDY PASCAL ABEL,1 DENNIS MIETHER,1 FLORIAN PLÖTZKY2 & SUSANNE ROBRA-BISSANTZ1 1 Technische Universität Braunschweig, Chair of Information Management, Braunschweig, Germany; e-mail: p.abel@tu-braunschweig.de, d.miether@tu-braunschweig.de, s.robra-bissantz@tu-braunschweig.de 2 Technische Universität Braunschweig, Institute for Information Systems, Braunschweig, Germany; e-mail: ploetzky@ifis.cs.tu-bs.de Abstract Citizens around the world are changing their urban environment through bottom-up projects. They are increasingly using digital platforms to come together. From the perspective of smart city research, this form of participation and interaction with city administrations has not yet been researched and defined. In our study we suggest a conceptualisation of bottomup urbanism participatory platforms and analysed 143 platforms. We identified 23 platforms as our study sample. They vary in their focus from implementation to funding or discussion. Therefor we found a broad range of participation mechanisms. A wide range of employment or voluntary work of staff members was shown. A heterogeneous picture also emerged regarding other characteristics (e.g. funding size, users or number of projects). One thing they have in common is their good cooperation with cities and regional actors. DOI https://doi.org/10.18690/978-961-286-485-9.33 ISBN 978-961-286-485-9 Keywords: participatory platforms, bottom-up urbanism, smart city, self-governance, public discourse 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 452 1 Introduction In the notion of smart city initiatives local governments have an increasing interest in more citizen-centric approaches for future cities (Cardullo & Kitchin, 2019). They form “smart”, new ways to tackle the challenges of the future. Those lay within the facets of economy, people, governance, mobility, environment and living (Lombardi, Giordano, Farouh, & Yousef, 2012). In order to adapt, local governments evolve with a growing importance for new governance strategies where the cities reflect their processes and role understanding. Gil-Garcia et al. (2020) address how governments of smart cities interact with their citizens and identify the dimensions of information availability, transparency, participation, collaboration and information technologies. Through participation the local governments perspective changes as does the citizens perspective. In Foth's (2017) Cities 4.0 concept the governments change from administrator to collaborator and citizens from residents to co-creators. From this point of view we see a collaborative approach with both partners meeting in a new “middle”. It is a shift from designing for the citizens to giving them the right to change or even reinvent their urban environment. Under the umbrella term of bottom-up urbanism citizens revive an unused building into a community cinema, organize street festivals or transform a fridge into a booksharing shelve. Those and other activities are carried out by citizens from Detroit to Paris and from Christchurch to Vienna. Those initiatives are seen as a driver for urban innovation (Caragliu, Del Bo, & Nijkamp, 2011) by building an experimental environment (Anttiroiko, 2016). In this environment the cities can adapt through the actions of citizens in response of ongoing changes in society (Silva, 2016). Since bottom-up urbanism is seen as an alternative to the top-down approach of planned environments (de Waal & de Lange, 2019) the role of city planners is changing: where planners previously developed projects for urban space, now the development of digital platforms for the engagement of the citizens is becoming a central task (Ertiö & Bhagwatwar, 2017). Those platforms differ in their functionalities (e.g. post ideas, discuss topics) and offer a broad range of participation levels (Falco & Kleinhans, 2018). Senbel & Church (2011) proposed a broadly used concept to distinguish participation levels on digital platforms. P. Abel, D. Miether, F. Plötzky & S. Robra-Bissantz: The Shape of Bottom-Up Urbanism Participatory Platforms: A Conceptualisation and Empirical Study 453 Participation on the lowest level in this regard can be seen as simply being provided with information. The middle layers of the model by Senbel & Church (2011) allow citizens to participate by contribution of ideas and by getting inspiration for instance by using polls or inviting citizens directly for their opinions on a certain issue. The higher levels finally allow citizens to join the planning and design process along with the possibility of creating their own neighbourhood plans. However, the model misses citizen control (highest level) as proposed by Arnstein (1969), which is described as self-governance in smart city research (Zhilin, Klievink, & de Jong, 2019). The lower, middle and higher level had been broadly researched (Desouza & Bhagwatwar, 2014; Ertiö & Bhagwatwar, 2017; Falco & Kleinhans, 2018; Gün, Demir, & Pak, 2019) but the implementation of platforms supporting higher levels of participation did not fulfil the users needs yet, as reported by empirical studies (Gün, Demir, & Pak, 2019). Mostly because the engaging mechanisms have not yet developed (Ertiö, 2015) and practitioners often fail to further improve and provide the funding for their platforms (Abel, Stuwe, & Robra-Bissantz, 2019). That leads us to the demand to further investigate and understand platforms of the highest level of participation with a focus on platforms supporting citizen projects. Researchers distinguish the importance of self-governance as a part of the broad concept of smart cities (Zhilin et al., 2019), which will be discussed in section 2.1 in detail. However, there is a lack of concrete concepts regarding self-governance in this context and the differentiation towards other concepts remains unclear (Rauws, 2016). That causes planners and cities to undervalue self-governance. The outcome of this study focuses on the research question: How are bottom-up urbanism participatory platforms conceptualized? In part A of this paper we derive a definition of bottom-up urbanism participatory platforms. Which, in part B, is evaluated in the field by analyzing 143 platforms. We then provide a detailed view on 26 platforms identified as bottom-up urbanism participatory platforms. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 454 2 Conceptualisation The percentage of people living in cities is growing and growing (Statista, 2020). Hence it is necessary to think about the future of cities which should be built to fulfill citizens needs and enable them to participate in their environment. In smart city concepts Gil-Garcia et al. (2020) identified interaction dimensions and Nam & Pardo (2011) offer three main components that seem to be at the core of it: technology factors, human factors and institutional factors. The connection and interplay of those factors is where investment into smart cities enhances quality of life and provides sustainable growth (Caragliu et al., 2011). Zhilin et al. (2019) sees smart cities as an onion where the layers are connected and build apon each other. In our conceptualisation of bottom-up urbanism participatory platforms we are going to describe those layers in the following sections and bring them together in form of a definition in the last section (2.5). 2.1 Future cities and the public discourse Future cities are often discussed as smart cities in the public and academic discourse. Oftentimes the definition is limited to technical solutionism like the smart city being a collection of services and the consumption of internet technologies (Walser & Haller, 2016). This focus is also described as the “Control Room” vision of a smart city where the focus of a city is laid on central optimization and the city as a service (de Waal & Dignum, 2017). However, the result of this de-subjectivism of citizens most likely leads to less participation because the only role for citizens is to be data provider for companies selling technology-centered smart city solutions (Keymolen & Voorwinden, 2020). De Waal & Dignum (2017) also envision “Smart Citizens”. The latter being a counter-argument regarding the Control Room vision described before. In it, citizens and civic organizations use digital technologies to mobilize themself, act together and claim self-governance (de Waal & Dignum, 2017). Additionally, the municipality uses digital technologies to optimize their citizen centered processes but is still the main regulator in the city. On the one hand we have citizen engagement (e.g. bottom-up urbanism) and on the other hand the municipality setting the legislative frame. P. Abel, D. Miether, F. Plötzky & S. Robra-Bissantz: The Shape of Bottom-Up Urbanism Participatory Platforms: A Conceptualisation and Empirical Study 455 The concept of smart cities differs from concrete to vague ideas and can be better understood as “urban imaginaries” with a set of ”visions, hopes, and fears – rational or irrational, fact based or emotionally appealing” (de Waal, 2011). Rather than having a clear agenda to reach a specific “what”, smart cities evolve as “working arrangements” (Cowley, Joss, & Dayot, 2018) with multiple processes that need to be under constant evaluation and adapted if needed. A smart city is better seen as discourse with constant change that “may become the new ‘normal’” and lead to “new rules and routines, in laws, in new business models, in new roles for actors, and even in newly shared values” (Hajer, 2016). However, this requires the realization of concrete projects rather than vague discussions of possibilities (Schinkel, Jain, & Schröder, 2014). In this regard, citizens all over the world already find new ways to take part in the discourse and prototype their understating of future by changing their surroundings. 2.2 Participation: When citizens really take their part With Arnstein's (1969) Ladder of Participation a formulation to more power in urban planning for citizens began. She imagined a society that is more equal and saw the path to success by participating and transfering power to the citizens (Cardullo & Kitchin, 2019). At the same time Lefebvre (1968) criticized the development of cities with capitalism interests under control of the government and proclaimed the “right to the city” as a self-determined space for citizens. In the notion of smart cities the self-determined space shifted towards the question of governance or who has to decide? Decision-making is traditionally lying in the hand of public actors but it is debated how a policy process is organised and how non-governmental actors such as citizens are involved. Kooiman (2003) structures governance modes in hierarchical governance, selfgovernance and co-governance. The mode self-governance sets the nongovernmental actors in the center and the government to the side. It can be divided in terms of actors, powers and rules (Arnouts, van der Zouwen, & Arts, 2012). 456 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE The Actors are citizens that actively participate to achieve a common goal, have the power in decision making and the form of internal coordination they choose (Zhilin et al., 2019). They operate in a high degree of freedom but are guided by rules of their own and by the government. Acting within this mode of self-governance the individual intentions are transformed into a collective intent (Rauws, 2016). This transformation can be better seen as an ongoing process than a status quo. As the actors question and transform the urban environment the shape of the governance system itself is always questioned and iterated by non-governmental actors and the government. Where Zhilin et al. (2019) sees self-governance as a top-down approach where the government empowers citizens, we argue that self-governance can as well arise from the bottom-up as a demand of the right to the city. It is emerging as an interplay from top-down and bottom-up approaches where both sides reimage their rules and roles on their way to a more equal future city. 2.3 Acting on the streets from the bottom-up towards big change In recent years bottom-up urbanism became the umbrella term (Douglas, 2019) for several views of the transformation of the public space by citizens (Fabian & Samson, 2016). The focus of “bottom-up” represents the origin of the initiatives within the citizenry and the mode of self-governance of the actors (Kickert & Arefi, 2019). The activities of citizens to transform the public space symbolise the difference between the city as a planned environment and as a lived place (Crawford, 2008). Citizens aim to solve unadressed problems (Finn, 2014) in a way of incremental improvements at smaller scale (Talen, 2015). In a do-it-yourself (DIY) manner they build projects and are seen as amateur designers which delimits their actions from planned urbanism (Iveson, 2013). The outcome of those projects are very different and we find no project like another. They inhabit several perspectives and vary in their goals (Kickert & Arefi, 2019). That offers a contribution to the public discourse and planning processes. Since bottom-up urbanism is “a radical repositioning of the designer, a shifting of power P. Abel, D. Miether, F. Plötzky & S. Robra-Bissantz: The Shape of Bottom-Up Urbanism Participatory Platforms: A Conceptualisation and Empirical Study 457 from the professional expert to the ordinary person” (Crawford, 2008) there are opportunities for planners to learn from citizen’s projects. This contribution is inhabitant in the perspective of Tactical Urbanism with its mantra “short-term action for long-term change” (Lydon & Garcia, 2015). It is seen as a way to provide new insights of citizens through their activities and clarify the meanings by providing physical evidence (Silva, 2016). Even though their concrete projects are often of temporary nature. But like the transformation of parking lots with immediate results and the scope towards bigger change, it is the mentality to prototype an object which is transformed and tested while used to become a symbol for a future vision. A vision not of a concrete spatial situation but an opening for like-minded ideas. 2.4 Urban participation on participatory platforms As shown before we have a good understanding of the governance mode and the activities of bottom-up urbanism. There has been serveral studies that show the usage of technology in participatory processes (Desouza & Bhagwatwar, 2014; Ertiö & Bhagwatwar, 2017; Falco & Kleinhans, 2018; Gün et al., 2019; Senbel & Church, 2011). But there has been no focus on the self-governance level on participatory platforms. In their work Desouza & Bhagwatwar (2014) studied 38 platforms of the biggest cities in the U.S. to reveal different archetypes in the lower (consultation, placatation) and higher level (partnership) of Arnstein’s Ladder. Gün et al. (2019) analysed 25 platforms with only three platforms in the highest level of participation (e.g. self-goverance). Falco & Kleinhans (2018) provide a broad overview with 113 platforms and find 11 self- goverance platforms but not all of them in a public interest context. All of those empirical studies show a current status of all levels of participation on technology-enabled platforms and help to shape the understanding of the differences between the levels but did not specify the level of self-governance. This broad field in the full range of participation levels is more and more getting into the focus of researchers. And so are the definitions of participatory platforms in general: There are different types in the manner of levels of participation and the intensity of the actors’ involvement (Falco & Kleinhans, 2018). Those actors are all individuals and organizations who interact with the city, e.g the residents, activists, public agencies, non-governmental organizations, businesses (Desouza & Bhagwatwar, 2014). A participatory platform has specific goals within its purpose and offers a range of attractors or functionalities to enable participation (e.g. information distribution, group organisation or idea voting) or data collection (e.g. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 458 tracking apps). Those come in different mediums that differ in online and offline (Desouza & Bhagwatwar, 2014). 2.5 Definition As shown in the sections before there are several views that led us to the concept of bottom-up urbanism platforms. To describe it with the onion metaphor of Zhilin et al. (2019) we believe that the layers of our concepts are interweaved into each other. With a closer look and the perspective of Nam & Pardo (2011) and the dimensions of Gil-Garcia et al. (2020) we see all components addressed. The technology factor (or information technology) in form of a participatory platform is working as an enabler of participation, offers information availabilty and shows progress in a transparent manner and acts as a supportive structure for the other components. The human factors are covered in our concept through the focus on the citizens as the actors (from the bottom-up and DIY) and the transfer of power towards them or annexation of rights by them (self-governance) which is directly linked to the institutional factors as well. And we see contribution to the discourse of future cities, first, provided by the platform as a new governance system in constant development and, second, by the outcome in form of projects. Within the institutional factors our concept should be seen as a collaborative approach of cities and citizens. To merge the sections before we offer the following definition: Bottom-up Urbanism platforms focus on providing power to the actors of cities. They are specific playgrounds of self-governance guided by rules where citizens propose, develop and implement their projects. The citizens and civic organizations build urban interventions as small scale and short-term solutions to address specific problems. This offers a tangible contribution to the ongoing discourse of future cities and a new mode how we want to shape the future of our cities. The main components of these platforms are online mechanisms providing participation through different levels (e.g. start a project, crowdfunding) to involve a broader part of the citizenry and offline components (e.g. workshops, local funding) to complement and enhance digital mechanisms. P. Abel, D. Miether, F. Plötzky & S. Robra-Bissantz: The Shape of Bottom-Up Urbanism Participatory Platforms: A Conceptualisation and Empirical Study 3 459 Methodology & study design This study is divided into two parts. Part A, is dedicated to the question how a coherent conceptual definition can be developed from previous research contributions. Based on a systematic literature review, the described conceptualizations were realized by integrating different concepts and approaches. Part B, includes the construction of a database of existing participation platforms, the development of a qualitative research design, as well as their subsequent evaluation and selection. Several different steps were performed in Part B. Step 1 includes a second systematic literature review, a questioning of experts and a detailed internet research, which identified a total of 143 established participation platforms. In step 2, the focus was to identify participation platforms that provide their users with the highest level of participation, the analysis was assessed by two independent raters. Using the conceptualization and the information publicly available on the platforms, the following questions had to be answered positive: Does the platform provide functions that enable citizens to create their own projects for the public space? Does the platform empower citizens to implement these projects? Were most of the projects realized by the citizens themselves? Only the platforms that met these criteria were included in the further analysis, which reduced the sample to 26 participation platforms. Table 1: Sample table Platform name Co-citoyens Hannover machen Place2help Rabryka* Spacehive Voorjebuurt* Ecocrowd Ioby Patronicity* Schützenplatz Sagerdersamler Wechange Gapfiller Moveforhunger Platzprojekt* Sandkasten* Urbaneoasen Yooweedoo* Source: own elaboration; *completed the questionnaire Gut für Nürnberg Open Berlin Raumpioniere* Startnext Urbangreenewcastel 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 460 In step 3, the relevant characteristics of the participation platforms have been defined. In consideration of the existing variability, we selected only those categories, which reflect the most widespread similarities and differences (e.g. number of active users or focus of participation). The data was collected primarily from the main websites of the platforms, and less frequently from secondary sources (e.g. Internet archive – “wayback machine”). If important platform components have changed over time, the current information was used and earlier changes were not taken into account. Platforms not active anymore were not taken into account and reduced the study sample to 23 platforms which are listed in Table 1. In step 4, a questionnaire was sent to the platform operators. A total of seven platforms completed the questionnaire, which corresponds to an average response rate of 33%. Two platform operators rejected a participation and 12 didn’t response to our request. In addition to our previously data collection, the questionnaire included a query of non-free-access information related to organizational structure (e.g. funding, personnel). The analysis of this data was performed purely descriptively to gain an initial impression of the characteristics of existing participation platforms. 4 Results The results are divided into two parts. The first section (A) presents the integrated results of the descriptive analysis of studied participation platforms. The second section (B) reports the results of the qualitative questionnaire survey. First, it is important to describe relevant distinguishing dimensions for the analysed platforms (𝑛 = 23). As a recent phenomenon, the digital participation platforms within this sample were founded between 2009 and 2019. In fact, 𝑛 = 2 (8.70%) platforms (Open Berlin, 2017; Place2help, 2020) are not active or going to be terminated. In addition, 𝑛 = 2 (8.70%) platforms (Urbaneoasen, 2020; Gapfiller, 2019) were conceptually transformed into non-participatory platforms. The average duration of activity (cut-off date: 12/31/2020) comes to 𝑀 = 6.74 (𝑆𝐷 = 3.55) years. P. Abel, D. Miether, F. Plötzky & S. Robra-Bissantz: The Shape of Bottom-Up Urbanism Participatory Platforms: A Conceptualisation and Empirical Study 461 An important component of any digital participation platform is the number of participation options, referred in the following as participation mechanisms. One can distinguish between 9 various mechanisms, depending on the depth of participation: Information, Like, Follow, Comment, Share, Crowdfunding, (Offline) Participation/Assistance, Join and Start Own Project. On average, platforms provided multiple mechanisms to their users (𝑀 = 5.17, 𝑆𝐷 = 1.99). Considering the participation focus, three relevant main priorities could be identified. Thus, 8 platforms focused on the implementation of projects (37.78%), 4 platforms focused on discussion (17.39%) and 11 platforms focused on funding (47.83%). In terms of projects, an average of 𝑀 = 137.13 (𝑀𝑑𝑛 = 37.00) were initiated per year, although the number varied widely (𝑆𝐷 = 231.01, 𝐼𝑄𝑅 = 134). A total of 16 platforms (69.57%) support their users through professional support services (e.g., coaching; [self-] learning). The degree of networking varies within the sample (𝑛 = 22), averaging 𝑀 = 29.86 (𝑆𝐷 = 30.57) network partners. One platform (𝑛 = 1) was excluded from the network analysis due to lack of available data. Second, to make the results more precise, data collection was carried out in the form of a self-developed questionnaire. A total of 𝑛 = 21 platforms were surveyed, with a response rate of 33.33% (𝑛 = 7). Individual data points were missing. The exact sample size was reported in such cases. The questionnaire was rated (𝑛 = 6) on a scale of 1 ("Very poor") to 10 ("Very good") as good (𝑀 = 7.33, 𝑆𝐷 = .82). In the following, superordinate characteristics are presented first. Secondly, the qualitative results are reported separately by platform. The participation platforms have an average of 𝑀 = 4.57 (𝑆𝐷 = 3.82) employees and 𝑀 = 20.92 (𝑆𝐷 = 39.47) other persons, e.g., voluntaries (𝑛 = 6). On average, 𝑀 = 631 (𝑀𝑑𝑛 = 489) projects were launched. The number of projects varied widely (𝑆𝐷 = 682; 𝐼𝑄𝑅 = 863). An average of 𝑀 = 544 (𝑀𝑑𝑛 = 228) were successfully implemented (𝑆𝐷 = 679; 𝐼𝑄𝑅 = 776). Regarding the analyses of all projects, the Rabryka platform indicated only a reference frame of the calendar year 2019. The number of makers (𝑀 = 903, 𝑀𝑑𝑛 = 400) varied widely (𝑆𝐷 = 987, 𝐼𝑄𝑅 = 1730). The average number of network partners is 𝑀= 48 (𝑆𝐷 = 39). On a scale of 1 ("Very poor") to 10 ("Very good"), the willingness of public partners to cooperate (𝑀 = 7.86, 𝑆𝐷 = 1.95) as well as the 462 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE collaboration with regional actors (𝑛 = 6, 𝑀 = 8.00, 𝑆𝐷 = 2.10) were rated as high. 5 Discussion and Conclusion Our main contribution is the comprehensive conceptualization through the integration of existing research to promote the understanding of the functioning of bottom-up urbanism participatory platforms. In addition, an adequate description of the population is given. That leads to a fundation for future research and the identification of relevant topics for the practical domain. With regard to the population, the heterogeneity of the digital participation platforms was particularly evident. Above all, this made it difficult to compare the platforms. For example, the number of projects in the sense of “food donation campaign” from Moveforhunger can only be compared with difficulty with the “installation of containers” for initiatives from the Platzprojekt. In the future, fundamental conceptual differences within the platforms should lead to the distinction between different subpopulations. In our study, we examined platforms that were well funded and were able to retain several employees. But also platforms that have given up or turned away from a participatory concept. Platforms which offer crowdfunding seem to have a more solid business model but there are no clear indications to break it down to that point. We found innovative participation approaches e.g. the combination of crowdfunding for citizens and institutional funding as match funding from Patronicity or a mixed campaign to provide funds, helping hands, expert knowledge and material donations from Raumpioniere. Future research should not only examine the view of the platforms and their founders but also the citizens themselves, the city government and other stakeholders to provide implications for business models and for platform design. A further point is the question of which participation mechanisms in practice exert the most influence on the participation experienced. It is also important to question whether more participation mechanisms automatically mean a positive effect. In the broader context of smart cities we shed light on a practical phenomenon that offers the foundation for further discussions and could be an inspiration to take the P. Abel, D. Miether, F. Plötzky & S. Robra-Bissantz: The Shape of Bottom-Up Urbanism Participatory Platforms: A Conceptualisation and Empirical Study 463 discourse on a more concrete level. We believe that our conceptualization should be communicated into the practical domain of platform providers to help them get a better understanding of their role within the field of participatory platforms. References Abel, P., Stuwe, C., & Robra-Bissantz, S. (2019). A.1 Design Claims für Community-Plattformen im Kontext des bottom-up Urbanism. Communities in New Media: Researching the Digital Transformation in Science, Business, Education and Public Administration - Proceedings of 22nd Conference GeNeMe, 1–11. Anttiroiko, A.-V. (2016). City-as-a-Platform: The Rise of Participatory Innovation Platforms in Finnish Cities. Sustainability, 8(9), 922. https://doi.org/10.3390/su8090922 Arnouts, R., van der Zouwen, M., & Arts, B. (2012). Analysing governance modes and shifts — Governance arrangements in Dutch nature policy. Forest Policy and Economics, 16, 43–50. https://doi.org/10.1016/j.forpol.2011.04.001 Arnstein, S. R. (1969). Journal of the American Planning Association A Ladder Of Citizen Participation. Journal of American Institute of Planners, 35(4), 216–224. https://doi.org/10.1080/01944366908977225 Caragliu, A., Del Bo, C., & Nijkamp, P. (2011). Smart Cities in Europe. Journal of Urban Technology, 18(2), 65–82. https://doi.org/10.1080/10630732.2011.601117 Cardullo, P., & Kitchin, R. (2019). Being a ‘citizen’ in the smart city: up and down the scaffold of smart citizen participation in Dublin, Ireland. GeoJournal, 84(1), 1–13. https://doi.org/10.1007/s10708-018-9845-8 Cowley, R., Joss, S., & Dayot, Y. (2018). The smart city and its publics: insights from across six UK cities. Urban Research & Practice, 11(1), 53–77. https://doi.org/10.1080/17535069.2017.1293150 Crawford, M. (2008). The current state of everyday urbanism. Everyday Urbanism: Expanded Edition, 12–15. de Waal, M. (2011). The ideas and ideals in urban media. In M. Foth, L. Forlano, C. Satchell, & M. Gibbs (Eds.), From Social Butterfly to Engaged Citizen: Urban Informatics, Social Media, Ubiquitous Computing, and Mobile Technology to Support Citizen Engagement (pp. 5–20). Cambridge, Massachusetts: MIT Press. de Waal, M., & de Lange, M. (2019). Introduction—The Hacker, the City and Their Institutions: From Grassroots Urbanism to Systemic Change. In The Hackable City (pp. 1–22). Singapore: Springer Singapore. https://doi.org/10.1007/978-981-13-2694-3_1 de Waal, M., & Dignum, M. (2017). The citizen in the smart city. How the smart city could transform citizenship. It - Information Technology, 59(6). https://doi.org/10.1515/itit-2017-0012 Desouza, K. C., & Bhagwatwar, A. (2014). Technology-Enabled Participatory Platforms for Civic Engagement: The Case of U.S. Cities. Journal of Urban Technology, 21(4), 25–50. https://doi.org/10.1080/10630732.2014.954898 Douglas, G. C. C. (2019). Privilege and Participation: On the Implications and Social Contradictions of Bottom-Up Urbanisms. In The Palgrave Handbook of Bottom-Up Urbanism (pp. 305– 321). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-901312_19 Ertiö, T.-P. (2015). Participatory Apps for Urban Planning—Space for Improvement. Planning Practice & Research, 30(3), 303–321. https://doi.org/10.1080/02697459.2015.1052942 Ertiö, T.-P., & Bhagwatwar, A. (2017). Citizens as planners: Harnessing information and values from the bottom-up. International Journal of Information Management, 37(3), 111–113. https://doi.org/10.1016/j.ijinfomgt.2017.01.001 464 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Fabian, L., & Samson, K. (2016). Claiming participation – a comparative analysis of DIY urbanism in Denmark. Journal of Urbanism: International Research on Placemaking and Urban Sustainability, 9(2), 166–184. https://doi.org/10.1080/17549175.2015.1056207 Falco, E., & Kleinhans, R. (2018). Beyond technology: Identifying local government challenges for using digital platforms for citizen engagement. International Journal of Information Management, 40, 17–20. https://doi.org/10.1016/j.ijinfomgt.2018.01.007 Finn, D. (2014). DIY urbanism: implications for cities. Journal of Urbanism: International Research on Placemaking and Urban Sustainability, 7(4), 381–398. https://doi.org/10.1080/17549175.2014.891149 Foth, M. (2017). Participation, Co-Creation, and Public Space. The Journal of Public Space, 2(4), 21. https://doi.org/10.5204/jps.v2i4.139 Gil-Garcia, J. R., Gasco-Hernandez, M., & Pardo, T. A. (2020). Beyond Transparency, Participation, and Collaboration? A Reflection on the Dimensions of Open Government. Public Performance & Management Review, 43(3), 483–502. https://doi.org/10.1080/15309576.2020.1734726 Gün, A., Demir, Y., & Pak, B. (2019). Urban design empowerment through ICT-based platforms in Europe. International Journal of Urban Sciences, 1–27. https://doi.org/10.1080/12265934.2019.1604250 Hajer, M. A. (2016). On being smart about cities: Seven considerations for a new urban planning and design. In A. Allen, A. Lampis, & M. Swilling (Eds.), Untamed Urbanisms (pp. 50–63). London: Routledge. Iveson, K. (2013). Cities within the City: Do-It-Yourself Urbanism and the Right to the City. International Journal of Urban and Regional Research, 37(3), 941–956. https://doi.org/10.1111/1468-2427.12053 Keymolen, E., & Voorwinden, A. (2020). Can we negotiate? Trust and the rule of law in the smart city paradigm. International Review of Law, Computers & Technology, 34(3), 233–253. https://doi.org/10.1080/13600869.2019.1588844 Kickert, C., & Arefi, M. (2019). Introduction. In M. Arefi & C. Kickert (Eds.), The Palgrave Handbook of Bottom-Up Urbanism (pp. 1–10). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-90131-2_1 Kooiman, J. (2003). Governing as Governance. London: Sage. Lefebvre, H. (1968). The Right to the City. In E. Kofman & E. Lebas (1996) (Hg.) Writings on cities (pp. 63–181). Cambridge: Blackwell. Lombardi, P., Giordano, S., Farouh, H., & Yousef, W. (2012). Modelling the smart city performance. Innovation: The European Journal of Social Science Research, 25(2), 137–149. https://doi.org/10.1080/13511610.2012.660325 Lydon, M., & Garcia, A. (2015). Tactical Urbanism. Tactical Urbanism. Washington, DC: Island Press/Center for Resource Economics. https://doi.org/10.5822/978-1-61091-567-0 Nam, T., & Pardo, T. A. (2011). Conceptualizing smart city with dimensions of technology, people, and institutions. In Proceedings of the 12th Annual International Digital Government Research Conference on Digital Government Innovation in Challenging Times - dg.o ’11 (p. 282). New York, New York, USA: ACM Press. https://doi.org/10.1145/2037556.2037602 Rauws, W. (2016). Civic initiatives in urban development: self-governance versus self-organisation in planning practice. Town Planning Review, 87(3), 339–361. https://doi.org/10.3828/tpr.2016.23 Schinkel, U., Jain, A., & Schröder, S. (2014). Local Action and Participation. Berlin: Jovis. Senbel, M., & Church, S. P. (2011). Design Empowerment. Journal of Planning Education and Research, 31(4), 423–437. https://doi.org/10.1177/0739456X11417830 Silva, P. (2016). Tactical urbanism: Towards an evolutionary cities’ approach? Environment and Planning B: Planning and Design, 43(6), 1040–1051. https://doi.org/10.1177/0265813516657340 P. Abel, D. Miether, F. Plötzky & S. Robra-Bissantz: The Shape of Bottom-Up Urbanism Participatory Platforms: A Conceptualisation and Empirical Study 465 Statista. (2020). Proportion of population in cities worldwide from 1985 to 2050. Retrieved March 19, 2021, from https://www.statista.com/statistics/264651/proportion-of-population-in-citiesworldwide/ Talen, E. (2015). Do-it-Yourself Urbanism. Journal of Planning History, 14(2), 135–148. https://doi.org/10.1177/1538513214549325 Walser, K., & Haller, S. (2016). Smart Governance in Smart Cities (pp. 19–46). https://doi.org/10.1007/978-3-658-15617-6_2 Zhilin, S., Klievink, B., & de Jong, M. (2019). Community Self-Governance in the Smart City: Towards a Typology (pp. 81–97). https://doi.org/10.1007/978-3-319-89474-4_5 466 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE SOFT SKILLS OF THE CHIEF INFORMATION SECURITY OFFICER JEROEN M.J. VAN YPEREN HAGEDOORN,1 RICHARD SMIT,2 PATRIC VERSTEEG1 & PASCAL RAVESTEIJN1 1 HU University of Applied Sciences, Utrecht, Netherlands; e-mail: jmj.van.yperen@kpnmail.nl, Info@vsec.nl, pascal.ravesteijn@hu.nl 2 Amsterdam University of Applied Sciences, Amsterdam, Netherlands; e-mail: r.smit@hva.nl Abstract This study addresses the role of a Dutch chief information security officer (CISO) and the soft skills required in this leadership role. The overview of soft skills is the outcome of the CISO perspectives in a Delphi study combined with an analysis of soft skills mentioned in job ads. A comparison with an earlier US-based study revealed that soft skills are ranked differently by Dutch CISOs. Moreover, we found that soft skills are not clearly described in job ads – none of these ads had explicitly listed soft skills. The present study demonstrates that CISOs with soft skills are in demand. The development of soft skills starts at a young age through various social activities and is also the result of self-actuation. The practical implications of this study are that it offers insights into the soft skills required for the role and discusses best-fitting leadership styles and ways in which organisations should include soft skills in recruitment. DOI https://doi.org/10.18690/978-961-286-485-9.34 ISBN 978-961-286-485-9 Keywords: CISO, soft skills, leadership, self actuation, job ads, recruitment, business need 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 468 1 Introduction IT systems or IT-powered solutions are prolific nowadays. Organisations use IT systems to support the information flows in their business processes, and IT is the primary process in digitally enabled companies (The Open University, 2019). The threat of misuse or abuse of IT systems causes high risks to organisations, and the need to protect IT systems and the information they contain has therefore increased significantly (ENISA, 2019). A chief information security officer (CISO) is responsible for an organisation’s information security programme (IGguru , 2019). The CISO manifesto defines a CISO as ‘a senior-level executive who has the responsibility to establish and maintain the organisation’s security program’ (Hayslip, 2019), and according to Death (2019), the right combination of hard and soft skills is the key to being a successful CISO. Searching for the keywords ‘CISO’ and ‘soft skills’ in academic libraries at the HU University of Applied Sciences Utrecht, the University of Amsterdam and the Amsterdam University of Applied Sciences returned a single book: CISO Soft Skills by Collette, Gentile and Gentile (2008). This observation aligns with our problem statement that there is little to no academic research on the topic of CISOs, leadership and soft skills. Our research answers the following main research question: What soft skills positively influence the CISO leadership position in Dutch organisations with more than 500 employees? 2 Soft skills for leaders Putrus (2019, p. 29) has found that the role of the CISO shifts from a technical implementer of security hardware and software to a more business-focused executive or leader. Multiple books are available both on CISO leadership, for example Essential principles for success (Fitzgerald & Krausse, 2007) and The CISO handbook (Gentile & Ron Collette, 2016), and on the CISO leadership role, risk management and CISO positions. However, here is little to no relevant academic literature that describes soft skills in relation to CISOs and their leadership position. J. M.J. van Yperen Hagedoorn, R. Smit, P. Versteeg & P. Ravesteijn: Soft Skills of The Chief Information Security Officer 469 Our literature review revealed a broad academic view on soft skills. Defining the term ‘soft skills’ is complicated and influenced by multiple factors (Chimatti, 2016), and Matteson et al. (2016) state that soft skills are often a catch-all category for nontechnical skills. Technical skills are the skills required to perform a job, and soft skills are for interpersonal relations. Moreover, interactions with people (via parents, school, sports and other activities) fuel the learning process for developing soft skills. Van Laar et al. (2017) describe a conceptual framework of 21st-century skills (learning skills, digital skills and life skills), as they suggest that employees’ skills extend beyond their professional knowledge. Solely learning hard skills or gaining only professional knowledge is not sufficient for the ideal profile of the modern employee; the addition of soft skills to the skill set is emphasised by Cano et al. (2013). Their conclusion is that on one’s career journey, the development of soft skills should occur in parallel to the development of the necessary hard skills. Furthermore, the development of professional IT skills is essential, and the development of personal skills will be even more significant. Our research into soft skills in general yielded results of Weber et al, (2011); Zhang (2012) and Mar (2016). Part of the research question of this study pertains to the soft skills that positively influence the CISO leadership position. Therefore, the soft skills identified by Robles (2012, p. 455) were chosen as a foundation, as they are aimed at business leaders. Robles’ list of 10 most relevant soft skills is presented below and was confirmed by our response group. No additional soft skills were introduced by the response group. The 10 most relevant soft skills, according to Robles (2012, p. 445), are as follows:      Integrity Communication Courtesy Responsibility Interpersonal skills    Professionalism Positive attitude Teamwork skills 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 470   3 Flexibility Work ethic Methodology used and research undertaken The goal of this research is to determine the soft skills that CISOs need to be able to attain a leadership role. For this, we used a multisource research approach (Zohrabi, 2013, p. 259) consisting of a literature review, an analysis of CISO job offers published on Dutch recruitment websites and a Delphi study with CISOs (Figure 1). Research CISO Soft skill perspective Research design In-depth literature review Delphi study Analysis of Delphi study results Gap Analysis Delphi outcome & Job profiles Metadata analysis Report and individual presentation findings Job offers via websites Figure 2: Consolidated research process 3.1 Job offer analysis In 2020, over the course of 5 months, eight different Dutch recruitment websites were scanned for publicly published CISO job ads. The collected job offers were the input for a quantitative content analysis (Bryman & Bell, 2015, pp. 558-559) via text coding, as described in Section 4.1. The goal was to understand the demand side of job descriptions, and these insights were used as input in the Delphi study. 3.2 Delphi study A Delphi study was conducted in the summer of 2020 to determine the soft skills from the CISO perspective. The Delphi method is an approach to capture existing knowledge and pinpoint areas of agreement or disagreement within a group of experts (Iqbal & Pipon-Young, 2009, p. 600). The target for the response group was set at 15 participants, which is a sufficient size, according to Okoli and Pwalowski (2004, p. 18). J. M.J. van Yperen Hagedoorn, R. Smit, P. Versteeg & P. Ravesteijn: Soft Skills of The Chief Information Security Officer 3.2.1 471 Composition of the CISO response group and Delphi design choices The participants in Round 1 comprised 24 out of 31 invitees who met the criteria (CISOs in a Dutch organisation with 500 or more employees), and 23 CISOs took part in Round 2. The CISO response group works in eight different categories of organisations, such as education, information and communications, and human health, and the majority of the participants have an IT technology background. The key Delphi study design decisions are presented in Table 1. Table 1: Taxonomy of Delphi design choices Criteria Number of rounds Consensus in the Delphi study Consensus count in the Delphi study Mode of operation Anonymity Locality Media Validation of survey questions Choices for Delphi study Two rounds Reason: Round 1 was to capture the expert field input, and Round 2 was to reach consensus from the respondent group (Hasson, Keeney, & McKenna, 2000) Consensus was reached when 70% or more of the respondents agreed on statements in Round 1 or when they agreed on the majority of their feedback in Round 2, based on The Delphi Technique: Making Sense of Consensus, Hsu and Sandford (2007). The use of combined consensus is based on Börger (2012, p. 157), who stated that respondents using Likert scales tend to answer moderately and avoid extreme answers. Therefore, both positive answers (agree and strongly agree) were combined into one positive answer. A similar structure was used on the negative answers (disagree and strongly disagree). Remote survey Reason: difficulty in planning the availability of CISOs to participate in a group debate during the pandemic of 2020. Anonymous Reason: no need for personally identifiable information or opinions during analysis of data. In the Netherlands, Dutch organisations with more than 500 employees are considered to be an enterprise and are expected to have a mature security organisation led by a CISO. Electronic survey Reason: ease of processing for participants and researchers. Survey questions were validated by Gordon B Willis’ (1999) Question Appraisal System (QAS-99) and with two test rounds. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 472 Criteria Socially desirable answers 4 Choices for Delphi study Reason: QAS-99 provides a questionnaire preparation checklist, and field testing individual rounds prevents unclear questions and research bias. The questions were structured based on a five-scale Likert question with the neutral answer in Position 3. With this construct, positive answers were in Positions 1 and 2, while negative answers were in Positions 4 and 5. Using this structure, we included both the socially desirable and the extreme answers of respondents (Börger, 2012, p. 157). Results and interpretation This section describes the three key areas of our research results. These are the outcome of the job ads analysis, the identified soft skills from a CISO perspective based on the Delphi study and the findings of the combined meta-analysis. 4.1 CISO job ads – a qualitative data analysis In total, 77 CISO job ads were analysed to gain insights into the soft skills that Dutch organisations demand from the CISO role. Most of the advertisements clearly described the desired hard skills in bulleted lists. However, the descriptions of soft skills in the job ads were less clear. In the 77 analysed ads, the need for soft skills was mostly formulated in descriptive sentences and not explicitly listed. Writing and communicating appeared most frequently when analysing the job ads, for example ‘Excellent written & spoken English essential. Multiple languages preferred’ (ING, 2019). Text analysis provides information on the frequency of quotations, or text elements, that align with a label (groundedness of codes). In the data analysis, labelling was applied using the soft skills identified by Robles (2012), with the addition of ‘leadership’. Leadership was added because this study researches the influence of soft skills on the CISO leadership position, and the adopted soft skills list does not include leadership. Our analysis of the demand for soft skills in job ads revealed that communication is the top soft skill based on the groundedness of codes, as illustrated in Figure . J. M.J. van Yperen Hagedoorn, R. Smit, P. Versteeg & P. Ravesteijn: Soft Skills of The Chief Information Security Officer 473 Figure 2: Groundedness of soft skills in job ads 4.2 Outcome of the Delphi study – CISOs All of the CISOs in the response group (N = 24) are familiar with soft skills (12.5% extremely familiar, 66.7% very familiar) and the concept of leadership style skills (50% very familiar, 50% moderately familiar). The CISO response group, however, values the relevance of soft skills and rated the use of variations of soft skills in different organisations and with different audiences as highly relevant. Based on the soft skills identified by Robles (2012), the participants agreed (strongly agree / agree, range of means: 1.43–1.78, N = 23) that soft skills are relevant for a CISO. Although the Dutch CISOs recognised those soft skills, they had a different view on their order of importance. They agreed on the ranking, based on Round 1, with a 73.9% consensus in Round 2 (N = 23). Table displays the soft skills’ rankings. Table 2: Soft skills confirmation – CISO response group Rank 1. 2. 3. Soft skill Communication Leadership style Integrity Ranking by Robles (2012) 2 1 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 474 Rank Soft skill Ranking by Robles (2012) 4. Interpersonal skills 5 5. Professionalism 6 6. Work ethic 10 7. Responsibility 4 8. Teamwork skills 8 9. Positive attitude 7 10. Flexibility 9 11. Courtesy 3 Note that the soft skill ‘leadership’ is not included in Robles’ (2012) overview. Regarding leadership style, there was consensus among the CISO response group: Round 2 revealed that 78.3% (N = 23) strongly agreed and agreed on the question, ‘do you agree with the consensus of the responders that the combination of transactional and transformational leadership is the most relevant leadership style a CISO must have?’. The transactional and transformational leadership style is based on research by Gurl et al. (2019), who relate three different leadership styles (management, transactional and transformational leadership) to users’ compliance intentions. The questions regarding leadership position, leadership style and the effect of softs skills on leadership (presented in Appendix A) were valued as highly relevant in the response group. The mean – ranging from 1.57 to 1.96 (N = 23) depending on the question – suggests that the respondents agree that the effect of soft skills is relevant for a CISO leadership position. The CISOs in our study reached a high level of consensus (+70%, N = 23) on the relevance of soft skills in the recruiting phase. They have found that these skills are a priority in selecting the best-fitting CISO and must be described in CISO-related job ads. The data set of the Delphi CISO response group was analysed for correlation using Spearman’s rank correlation coefficient, where d = the difference between ranks and n = the amount of data points: (𝜌𝑠 = 1 − 6 ∑ 𝑑𝑖2 𝑛(𝑛2−1) ). J. M.J. van Yperen Hagedoorn, R. Smit, P. Versteeg & P. Ravesteijn: Soft Skills of The Chief Information Security Officer 475 This non-parametric measure of statistical dependence between the rankings of two variables is optimal for the ordinal data set of the CISO Round 2 responses (Baarda & Dijkum, 2014, p. 121). We now discuss the two most significant, positive correlations. The correlation between the relevance of CISO softs skills and CISO leadership skills is significantly positive, as shown in Appendix B. The respondents have found that a CISO applying soft skills has a better leadership position (r = 0.721, p < 0.001). The relevance is in soft skills in general for a CISO and in applying a different set of soft skills depending on the audience. Soft skills also contribute to various leadership styles in different circumstances. With a score of 0.527 on Spearman’s rho, the second significant, positive correlation is between soft skills’ contribution to various leadership styles in different circumstances and the prioritisation of soft skills in recruitment. Here, the CISOs emphasised the importance of the effect that soft skills have on the leadership position, and they value the focus of soft skills in the recruitment phase. 5 Discussion and conclusion To answer our main research question – What soft skills positively influence the chief information security officer leadership position in Dutch organisations with more than 500 employees? – we list the relevant soft skills below. The ranking is based on both the CISO response group and the ranking from the collected job ads (both weighted equally): 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. Communication Leadership – not included in Robles’ (2012) overview Interpersonal skills Professionalism Integrity Work ethic Responsibility Teamwork skills Positive attitude Flexibility Courtesy 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 476 This list is the outcome of the research. It is our conclusion that a CISO leadership position can be improved with these soft skills. 5.1 Practical implications The primary goal of this study is to contribute to academic evidence regarding the soft skills that positively influence the CISO leadership position. We found that CISO job descriptions should contain clearer details regarding the necessary soft skills, taking into account the leadership style for a specific organisation. Better descriptions can improve the selection process, which in turn can improve alignment between the tasks and responsibilities of a CISO and the demand from business. In addition, based on the outcome that soft skills are highly relevant, education curricula and frameworks for personal development should focus on those muchneeded skills. Lavasseur (2013) demonstrated that hard skills are developed through education and training, whereas soft skills are acquired through self-actuation; therefore, CISO-related curricula should include a focus on self-actuation. From the analysis of the Delphi study, we found that soft skills should be a topic when recruiting a CISO. The practical implication is that an assessment of soft skills should be part of the recruitment process and balanced with the desired hard skills. Combining the outcome of the job ads analysis and the experts’ input that soft skills should be a priority in recruitment, the conclusion is that soft skills are not clearly listed in job ads. If soft skills are clearly articulated in job descriptions, then the recruitment of the most suitable candidate as well as the development of current CISOs’ soft skills will be positively influenced. Furthermore, CISOs should be selfactuated for soft-skill development (Levasseur, 2013). References B.Willis, G., & Lessler, J. T. (1999). Question Appraisal System QAS-99. Researchgate, 1-86. Baarda, B., & Dijkum, C. v. (2014). Statistiek met SPSS. Groningen: Noordhof Uitgevers bv. Börger, T. (2012). Social desirablility and environmental valuation. Frankfurt am Main: Peter Lang. Bryman, A., & Bell, E. (2015). Business Research Methods. New York: Oxford University Press. Cano, C., Fernández-Sanz, L., & Misra, S. (2013, January - March). Featuring CIO: Roles, Skills and Soft Skills. International Journal of Human Capital and Information Technology Professionals, pp. 22-33. J. M.J. van Yperen Hagedoorn, R. Smit, P. Versteeg & P. Ravesteijn: Soft Skills of The Chief Information Security Officer 477 Chimatti, B. (2016). Definition, development, assessment of soft skills and their role for the quality of organizations and enterprises. International Journal for Quality Research v10 n1, 97-130. Collette, R., Gentile, M., & Gentile, S. (2008). CISO Soft Skills. New York: Auerbach Publications. Death, D. (2019, February 18). Security Current Resources. Retrieved from Security Current: https://securitycurrent.com/must-have-skills-for-cisos-a-cisos-connect-report/ ENISA. (2019, January 28). ENISA Publications. Retrieved from ENISA: https://www.enisa.europa.eu/publications/enisa-threat-landscape-report-2018 Fitzgerald, T., & Krausse, M. (2007). CISO Leadership: essential principles for success. New York: Auerback Publications. Gentile, M., & Ron Collette, T. D. (2016). The CISO Handbook. New York: CRC Press. Guhr, N., Lebek, B., & Breitner, M. H. (2019, March). The impact of leadership on employees' intended information security behaviour: An examination of the full‐range leadership theory. Information Systems Journal, pp. 340-362. Hasson, F., Keeney, S., & McKenna, H. (2000). Research guidelines for the Delphi survey technique. Journal of advanced nursing, 1008-1015. Hayslip, G. (2019, May 5). CISO Manifesto: Recruiting CISOs not Unicorns. Retrieved from Peerlyst: https://www.peerlyst.com/posts/ciso-manifesto-recruiting-cisos-not-unicorns-gary-hayslipcissp-cisa-criscccsk?utm_source=peerlyst_perspective&utm_medium=email&utm_content=peerlyst_post& utm_campaign=top_posts_on_peerlyst_this_week_05142019 Hsu, C.-C., & Sandford, B. A. (2007). The Delphi Technique: Making Sense Of Consensus. Practical Assessment, Research & Evaluation, 1-8. IGguru . (2019, March 12). IGguru News. Retrieved from IGguru Information Governance News & Community: https://igguru.net/2019/03/12/ciso-the-c-level-executive-missing-from-your-board/ ING. (2019, 04 28). Indeed. Retrieved from Indeed: indeed.nl Iqbal, S., & Pipon-Young, L. (2009, July). The Delphi method. The Psychologist, pp. 598-601. Levasseur, R. E. (2013). People Skills: Developing Soft Skills— A Change Management Perspective. Interfaces, 566-571. Mar, A. (2016, July 7). 87 Soft Skills (The Big List). Retrieved from Simplicable: https://training.simplicable.com/training/new/87-soft-skills Matteson, M. L., Anderson, L., & Boyden, C. (2016). “Soft Skills”: A Phrase in Search of Meaning. portal: Libraries and the Academy, 16(1), 71-88. Okoli, C., & Pawlowski, S. D. (2004). The Delphi method as a research tool: An example, design considerations and applications. Information & Management, 15-29. Putrus, R. (2019). The role of the CISO and the digital security landscape. ISACA Journal, 2, 22-29. Robles, M. M. (2012). Executive perceptions of the top 10 soft skills needed in today's workplace. Business Communication Quarterly, 453-465. The Open University. (2019, 05 18). Information technology: A new era? Retrieved from OpenLearn: https://www.open.edu/openlearn/people-politics-law/politics-policypeople/sociology/information-technology-new-era/content-section-0?activetab=description-tab Van Laar, E., van Deursen, A. J., van Dijk, J. A., & de Haan, J. (2017). The relation between 21stcentury skills and digital skills: A systematic literature review. Elsevier Computers in Human Behavior, pp. 577-588. Weber, M. R., Crawford, A., Rivera Jr., D., & Finley, D. A. (2011). Using Delphi Panels to Assess Soft Skill Competencies in Entry Level Managers. Journal of Tourism Insights, 1(1), 98-106. Zhang, A. (2012). Peer Assessment of Soft Skills and Hard Skills. Journal of Information Technology Education: Research, 11, 155-168. Zohrabi, M. (2013, Februari). Mixed Method Research: Instruments, Validity, Reliability and Reporting Findings . Theory and Practice in Language Studies, pp. 254-262. 478 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Appendix A The questions regarding leadership position, leadership style and the effect of softs skills on leadership as part of the first Delphi round are presented below. Leadership style and effect A CISO has a leadership position. These questions are to get an insight in the leadership style and position of the CISO. Q19. Leadership styles Answer options: Are you familiar with variations in leadership styles? Extremely Very Moderately Slightly Not at all Do not know Q20. Which type of leadership style should a CISO Answer option: have? Select best fit leadership Leadership by management position (leadership style style. based on a hierarchy position); Transactional leadership (leadership style based on rewards and controls in exchange for achieving previously defined governance goals); Transformational leadership (leadership style based on lead by good example and motivate followers to identify with them); Combination of Transactional and Transformational leadership; Other (please specify): Q21. Do you agree with the following statements on CISO leadership and soft skills. The CISO will function at her/his best when they have a leadership position. The CISO should be able to demonstrate specific leadership styles in various situations. The CISO has a better leadership experience with soft skills. The CISO should be able to demonstrate specific soft skills in various situations. Answer options: Extremely Very Moderately Slightly Not at all Do not know J. M.J. van Yperen Hagedoorn, R. Smit, P. Versteeg & P. Ravesteijn: Soft Skills of The Chief Information Security Officer 479 Appendix B: Table displaying Spearman’s correlation coefficient – CISO response group Survey questions (top row / left column) RelevanceCIS O_SK (Q4.1–Q4.5) Q10.1. Do you agree with the responders’ consensus of very relevant on the question: ‘the CISO will function at her/his best when they have a leadership position?’ LeadershipCIS O_SK (Q10.2–Q10.4) Q6.1. Do you agree with the ranking? Q9.1. Do you agree with the consensus of the responders that the combination of transactional and transformation al leadership is the most relevant leadership style a CISO must have? Q11.1. Do you agree with the responders’ consensus of Spearman’s correlation coefficient – CISO response group Relevance Q10.1. Leadership Q6.1. Q9.1. Q11.1. CISO_SK CISO_SK Q11.2. Q12.1. 1.000 -0.013 0.954 0.721** 0.000 0.198 0.365 0.219 0.315 0.269 0.214 -0.202 0.355 -0.020 0.929 -0.013 0.954 1.000 0.050 0.819 0.251 0.248 0.092 0.678 -0.138 0.530 -0.073 0.741 -0.364 0.088 0.721** 0.000 0.050 0.819 1.000 0.173 0.430 0.268 0.217 0.527** 0.010 0.029 0.896 0.196 0.371 0.198 0.365 0.251 0.248 0.173 0.430 1.000 0.039 0.861 -0.168 0.442 -0.198 0.365 0.047 0.833 0.219 0.315 0.092 0.678 0.268 0.217 0.039 0.861 1.000 0.128 0.561 -0.318 0.139 -0.315 0.143 0.269 -0.138 0.527** 0.128 1.000 0.103 0.500* 0.214 0.530 0.010 0.168 0.442 0.640 0.015 0.561 480 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE very relevant on the question: ‘do soft skills have priority in selecting the best fit CISO?’ Q11.2. Do you -0.202 -0.073 0.029 0.103 1.000 0.155 agree with the 0.198 0.318 responders’ 0.355 0.741 0.896 0.365 0.139 0.640 0.479 consensus of very relevant on the question: ‘is it relevant that the CISO job ad describes the soft skills needed?’ Q12.1. Do you -0.020 -0.364 0.196 0.047 0.500* 0.155 1.000 agree with the 0.315 responders’ 0.929 0.088 0.371 0.833 0.143 0.015 0.479 consensus that it is better to select the candidate with best-developed soft skills, but trainable for hard skills? **. Correlation is significant at the 0.01 level (2c. Listwise N = 23 tailed). *. Correlation is significant at the 0.05 level (2-tailed). Legend: Significa Moderate Moderate Mediocre Significance 2nt significant significant significant negative tailed. positive positive negative correlation correlatio correlation correlation n The correlation scoring on Spearman’s rho is based on the following ratio: o 0.4 and above: Significant positive correlation (negative is the opposite scale of the positive scoring) o 0.3–0.4: Moderate significant positive correlation (negative is the opposite scale of the positive scoring) o 0.2–0.3: Mediocre significant positive correlation (negative is the opposite scale of the positive scoring) o 0.2 and below: Irrelevant positive correlation (negative is the opposite scale of the positive scoring) QUANTUM COMPUTER RESISTANT CRYPTOGRAPHIC METHODS AND THEIR SUITABILITY FOR LONG-TERM PRESERVATION OF EVIDENTIAL VALUE THIEL CHRISTIAN1 & THIEL CHRISTOPH2 1 OST Ostschweizer Fachhochschule, School of Management, Rosenbergstrasse 59, Postfach, 9001 St.Gallen, Switzerland; e-mail: christian.thiel@ost.ch 2 FH Bielefeld University of Applied Sciences, Faculty of Minden Campus, 32427 Minden, Germany; e-mail: christoph.thiel@fh-bielefeld.de Abstract In the areas of electronic identification and electronic trust services, the Regulation No. 910/2014 of the European Parliament and of the Council on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC (eIDAS) creates uniform regulations for electronic signatures, seals, time stamps, registered mail and website certificates in the European single market. All developments that affect the security of signature procedures have an impact. In this study, we consider the candidates for quantum computer-resistant asymmetric cryptographic (PQC) methods currently under investigation in international research and standardization and evaluate their suitability for PKI systems with a focus on long-term preservation of evidential value, as is the case in particular with eIDAS-compliant signature solutions. Based on an evaluation system proposed by us - an adaptation of the system from [2] we compare the application requirements with the properties of the candidates and recommend suitable methods. DOI https://doi.org/10.18690/978-961-286-485-9.35 ISBN 978-961-286-485-9 Keywords: post-quantum cryptography, feasibility study, eIDAS-compliant signature solutions, use cases 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 482 1 Introduction This study focuses on quantum computer-resistant crypto methods, also called postquantum cryptography (PQC) after J.D. Bernstein (in particular in asymmetric methods). It is not comprehensive and does not list every quantum computerresistant asymmetric method ever proposed. Instead, it lists a representative sample (as of End 2020) of cryptographic techniques that are being discussed in academia, are supported by currently active research teams, may be viable for real-world applications, and are therefore suitable candidates for consideration by various standardization organizations for standardization. Beyond NIST's PQC standardization, we also consider extensions of classical algorithms as well as quantum-assisted algorithms (i.e., the use of quantum technology to augment classical systems, see also [10]) with respect to the possibility of providing sufficient quantum computing resistance. 2 Overview of the procedures In this study, we define PQC methods as cryptographic methods (in particular asymmetric cryptographic methods) which, according to the current state of research, can possibly provide sufficient security against attacks that use the capabilities and properties of quantum computers, i.e. are "quantum computer resistant". In this context, the procedures themselves do not use any support from quantum computers for preparation and execution. The underlying principle of continuing to use the previously employed public-key methods such as RSA and ECDSA (Elliptic Curve Digital Signature Algorithm) with significantly larger keys than is currently customary in the post-quantum era is obvious at first glance. On the one hand, the approach of increasing the key sizes of RSA and ECDSA to cope with ever-improving cryptanalysis and newly discovered attacks is already a tradition (see, e.g., evolution of NIST's SP 800-57 Part 1[11]). In the context of quantum computers, this principle would very quickly lead to large and unwieldy key sizes that corresponding keys might not be usable in practice: T. Christian & T. Christoph: Quantum Computer Resistant Cryptographic Methods and Their Suitability for Long-Term Preservation of Evidential Value 483 Quantum computers are based on the concept of qubits (quantum bit), where each qubit exists simultaneously as a superposition (superposition or also called coherence) of the states 1 and 0 and all those in between. The number of qubits needed on a quantum computer to break RSA1 is estimated to be 2n+3 [12] and 2n+2 [13], which means that a quantum computer with about 4,000 qubits is needed to break an RSA-2048 signature (further algorithm optimizations are expected, so the actual number of qubits needed is expected to be lower). Shor's QFT algorithm can also be adapted to solve the discrete logarithm problem. The number of qubits to break ECDSA is "approximately" 6n [6]. This means that a quantum computer with about 1,500 qubits can break an ECC-P256 signature. Following the assumption of Neven's law [14] (the quantum equivalent of Moore's law), one can estimate that the computational power of quantum computers increases at a "double exponential rate" compared to classical computers. If we start with 100 qubits in a given year and double the qubits every 18 months, 9 years later we will probably have computers with over 6000 qubits and in 32 years we will be able to break a 1-million-bit RSA key. Post-qubit RSA (i.e., RSA with such large key lengths) was studied by Bernstein [15], who showed the technical feasibility of implementing a terabit key using 231 4096-bit primes as factors. At these key sizes, each RSA operation amounted to tens or hundreds of hours. In practice, such a system can thus probably be ruled out. It should be noted, incidentally, that postquantum RSA was in Round 1 of the NIST PQC competition but was not selected for Round 2. Currently, it is unclear how many qubits the most powerful quantum computers have at the time of writing. The company IQM FINLAND OY is to build a quantum computer which is to have 50-qubits by the end of the third phase in 2024 ([36]). Google LLC, IBM, and others have developed machines with about 50 or more high-quality qubits (see [34], [35]). IBM is planning (even faster than Neven's law would suggest) more quantum computers with 127 qubits in 2021, 433 qubits in 2022, and over 1000 qubits in 2023 [35]. 1 i.e. breaking any private key 484 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE If IBM's development speed remains the same, we could expect the abovementioned 6000 qubits to be reached around 2026 to 2027. Even with somewhat slower developments, one must assume that this will be the case from the year 2030. Although attacks against symmetric cryptosystems using quantum computers and algorithms by Grover or Simon (see [3] and [4]) are more effective than attacks using conventional computers, it is currently assumed that doubling the effective key length cancels out this advantage of quantum computers. Thus, for example, AES256 would be about as secure against a quantum computer as AES128 is against conventional computers. Assuming the availability of sufficiently powerful quantum computers in the near future, it is obvious to use them not only as a tool to attack classical crypto methods, but also to investigate how quantum computer-resistant crypto methods could be realized with their help. The use of quantum computers to perform certain cryptographic operations is called quantum cryptography. Corresponding operations typically exploit the quantum properties of superposition, interference, and entanglement, which are not reproducible by classical computers. Quantumenhanced security [17] is then understood to be the extension of classical nonquantum systems that make use of or are augmented by quantum technology to improve their ability to secure their data and transactions against adversaries that may be fully quantum capable. While quantum key distribution (QKD) (see [18], [19]) is often equated with (general) quantum cryptography, QKD is based on the Vernam one-time pad and is therefore more suitable only for key exchange and encryption. Quantum researchers have introduced several quantum digital signature schemes (see [20] - [22]), but since they typically refer to QKD, they would be better referred to as data authentication schemes. As of this writing, we are unable to identify any quantum digital signature schemes in the literature that actually have the necessary constructs of a digital signature scheme and are EUF-CMA secure (existentially unforgeable under chosen message attack), let alone post-quantum secure. Based on the above considerations classic cryptographic methods such as RSA and ECDSA with very large keys are ruled out (in the medium term) and can at best be used for a short transition phase (i.e., for the next 9 years at most). Signatures generally have a rather short lifetime and in principle only need to be secure up to T. Christian & T. Christoph: Quantum Computer Resistant Cryptographic Methods and Their Suitability for Long-Term Preservation of Evidential Value 485 the time of their verification. If a signature procedure can be broken by a quantum computer in the future, today's signature certificates will probably already have expired. Only in the case of very long validity periods for signature keys should caution already be exercised. According to the current state of research, quantumenhanced processes do not (yet) play a role specifically for electronic signatures. In the medium and long term, therefore, the focus should be on PQC processes. 3 Parameterized evaluation of PQC methods and applications The objective of this study is not to replicate NIST's research in the NIST PQC competition (see [23], [24])., but to build on it and make it more concrete in order to find a basis for assessing the concrete practical applicability of a procedure in building blocks of e-business applications. In doing so, we extend the evaluation scheme from [2]. We define the three value ranges Small (S), Medium (M), and Large (L) for different parameters of the procedures, respectively. Specifically, we consider the following parameters.  Key Generation Resources (KeyGen() Resources)   Key sizes of the public and private keys Key Lifetime: Certain signature processes only allow the private signature key to be used for a limited number of signature creations. We record this using the "key lifetime". Resources for signature creation (Sign() resources) or encryption (Crypt() resources). Size of a signature (Signature Size) or size of a ciphertext (Cipher Size) Time for the creation of a signature (Signature Time) or the creation of a ciphertext (Crypt Time) Resources for signature verification (Ver() resources) or decryption (Decrypt() resources).     The parameters are categorized as follows in table 2 (assuming a single core of a current Intel I7 processor for mobile devices running at 3.2 Ghz, as in [2] and [25]): 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 486 Table 2: Parameters and their categories for evaluating the practical usability of PQC methods in applications KeyGen() Resources Sign() Resources Crypt() Resources Ver() Resources Decrypt() Resources Key Size Signature Size Cipher Size Key Lifetime Signature Time Crypt Time Small (Optimal) can be executed on a chip card. (< 3M cycles) Medium executable on a terminal/mobile phone (< 30 M cycles) Large Requires operation on a powerful laptop (> 30 M cycles) < 2Kbits (e.g. ECC-P256) < 2Kbytes (e.g. RSA-8192) > 2Kbytes < 1000 signatures per key < 1ms per signature < 1ms per encryption < 10000000 signatures per key < 100ms per signature < 100ms per encryption unlimited > 100ms per signature > 100ms per encryption In order to evaluate the suitability of different PQC methods for concrete applications, we first look at the applications from the ETSI (see [26]) and now use the parameters described above as the requirements of the applications for a PQC procedure to be deployed (the parameters are therefore no longer descriptive in nature but have a requirement character). Of course, there are other use cases for asymmetric (signature) procedures, but the selection considered covers common scenarios from the areas of finance (for business), infrastructure (for people and devices), cloud & Internet (for business-to-business, business-to-consumer, peer-topeer, and Internet-of-Things interactions), and enterprise (for companies). Based on [2] and [26], the following picture emerges in Table 3. T. Christian & T. Christoph: Quantum Computer Resistant Cryptographic Methods and Their Suitability for Long-Term Preservation of Evidential Value 487 Table 3: Parameter evaluation of typical use cases of asymmetric signature solutions KeyGen() Resource 3SKey EMVSDA EMVDDA CA Key 2 ICAO 9303 GSM eSIM TLS server TLS client Bitcoin M FIDO 3 USB signature token 4 PGP/ SMIME PAdES / AES 5 QES 6 Code Sign 4 S L Private Public Key Sign() Signature Signature Ver() Key Key Lifetime Resource Size Time Resource Size Size M M M S M M L L S L L S L M S S S M S S S M L L M M L L L M L L S S L S L M L S M S S M M S L L L L L L S M M L L L M L M L L L L M M M M L M L L M M L M L M L L M M L M L M L L L M L M M L L M L L M M M S L M L M L M M S L M L M L M M Status of standardization To facilitate the development of new quantum computer-resistant and practical methods, the National Institute of Standards and Technology (NIST) initiated a standardization process in 2016 (see [7]). After an evaluation and selection process based on public feedback and internal review by NIST, those methods were identified to move to the third round of review as finalists [16]: The encryption and key agreement/transmission methods are Classic McEliece [30], CRYSTALS- 2 Simplified consideration for qualified trust service providers 3 We consider FIDO and other tokens with comparable computational power and memory for strong authentication Here we consider signature tokens that are more powerful than common smart cards. 5 advanced electronic signatures when using a document server with HSM to sign documents 6 qualified electronic signatures when using a signature creation device such as a smart card or USB token 4 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 488 KYBER [31]], NTRU [32], [33] and SABER [25]. The finalists for digital signatures are CRYSTALS-DILITHIUM [27], FALCON [28] and Rainbow [29]. A special feature are so-called stateful hash-based signatures, a special class of signature schemes with certain restrictions, from which currently XMSS (eXtended Merkle Signature Scheme) [8] and LMS (Leighton-Micali Signatures) [9] are in the process of standardization at the Internet Engineering Task Force (IETF) and at NIST, so that standards can be expected earlier than in the above-mentioned PQC process at NIST. The use cases mentioned are code signing and issuing PKI root certificates from certification authorities. The standardization organizations ETSI and ISO are also involved in PQC standardization with their own working groups. At present, however, it looks as if ETSI and ISO will rely on NIST for the initial selection of procedures. At the moment it seems rather unlikely that other fundamentally new procedures not yet considered by NIST will emerge as part of the (international) standardization effort. In this study, we therefore restrict ourselves to the above mentioned candidates and go on to investigate their suitability for e-business applications. 5 Evaluation of the procedures We apply the parameter description introduced in Section 3 to the procedures listed above. According to [2], we obtain the following parameter profiles for the current favorites of the NIST and IETF standardization of PQC signature methods in Table 4: Table 4: Parameter profiles for PQC signature methods KeyGen() resource Private Key Size Public Key Size Key Lifetime Sign() resource Signature Size Signature Time Ver() Resources CRYSTALSDILITHIUM S L M L M M S S FALCON Rainbow XMSS LMS M M M L S S S S L L L L S S S S L S M M M M M S L S S M S M S S T. Christian & T. Christoph: Quantum Computer Resistant Cryptographic Methods and Their Suitability for Long-Term Preservation of Evidential Value 489 For encryption methods and key exchange or key transport (KEM) methods, we combine the results from [38, Table 3] with the evaluation method from [2] and obtain the following parameter profiles for the current favorites of NIST's standardization in Table 5: Table 5: Parameter profiles for PQC encryption methods and key exchange/key transport methods KeyGen() resource Private Key Size Public Key Size Crypt() resource Cipher Size Crypt Time Decrypt() resources Classic McEliece S L M M M S S CRYSTAL-KYBER NTRU SABER L S S S S S S L L L S S S S L S M M M M S If we contrast the parameterization of the procedures with the parameterization of the applications from Table 3, we can derive an evaluation scheme as in [2] based on a point assignment for the suitability of the procedures for the respective application. The basis of scoring is as follows: If the procedure provides a score for a single parameter that is equal to or better than what the application provides, then the score remains unchanged. If the procedure for a parameter is worse by a range (e.g. M instead of S) than what the application allows, then 1 is subtracted from the score for each such parameter7. If there is a parameter for which the procedure is two ranges worse (e.g., L instead of S) than what the application allows, then we consider the procedure to be not fit (NF = not fit). For quantitative purposes, we assign a score of -100 for each NF. Then the individual ratings of the parameters are summed up. The most suitable procedures can now be found for each application. A score of zero means that no changes are required and the process can most likely be used for the application. A negative score means that the procedure is not completely suitable, but that optimizations for the procedure may need to be found. After zero, the algorithm with the highest score (i.e., with the lowest negative score) For each individual parameter, the context determines whether a larger or smaller value is better. For example, a larger memory requirement is worse, but a longer lifetime of a key may be better. 7 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 490 is the next most suitable, as it requires the least number of changes to be used by the application. Table 6: Selection of suitable processes per application 3SKey EMV-SDA EMV DDA CA Key ICAO 9303 GSM eSIM TLS server TLS Client Bitcoin FIDO USB signature PGP token PDF-AES 8 PDF QES 9 Code sign Points CRYSTALSDILITHIUM -2 -2 NF 0 -2 NF 0 0 0 0 0 0 0 -2 0 -208 FALCON Rainbow XMSS LMS -1 -1 -3 0 -1 -1 0 0 0 0 0 0 0 -1 0 -8 NF NF NF -1 NF NF 0 -1 -1 -1 -1 -1 -1 NF 0 -606 NF -2 NF 0 -2 -1 -2 -2 -2 -1 -1 -2 -1 NF 0 -315 NF -2 NF 0 -1 0 -1 -2 -2 -1 -1 -2 -1 NF 0 -312 As a result no PQC method currently considered is suitable for all mentioned use cases in Table 3 (in particular for replacing RSA and EC in all use cases). For various use cases, such as for root CA keys, for code signing or for applications where signature creation and verification are performed on a powerful PC, the PQC procedures currently considered in the NIST standardization can be used. This also applies, with minor restrictions, to the use of tokens that are more powerful than "usual" smart cards such as signature cards. However, it becomes critical if the procedure is to be executed on hardware with limited computing power, such as a smart card. Thus, there are at least approaches for a first solution in the eIDAS context if not a completely satisfactory answer to the upcoming developments. 8 9 when using a document server with HSM for signing documents when using a signature creation device such as a smartcard or USB token T. Christian & T. Christoph: Quantum Computer Resistant Cryptographic Methods and Their Suitability for Long-Term Preservation of Evidential Value 6 491 Recommendations Post-quantum cryptography will become the standard in the long term [1]. Consideration should be given at an early stage, as part of a measured risk management process, as to whether and when a switch to quantum computing resistant methods should be made (depending on the application) [1]. Especially in connection with signatures with a medium validity period of the certificates (3-5 years), there is no need to rush. For cryptographic applications that process information with long secrecy periods and high protection requirements, however, there may already be a need for action now [1]. The danger here is that messages for key negotiation and the data encrypted with the negotiated keys are collected in advance and decrypted in the future with the aid of a quantum computer ("store now, decrypt later"). Caution is also required with very long validity periods for signature keys. It is therefore already necessary to discuss how a migration to postquantum cryptography to a Fully Quantum Safe Cryptographic State (FQSCS) for e-business applications can be initiated today. References Migration zu Post-Quanten-Kryptografie, Handlungsempfehlungen des BSI, August 2020 Teik Guan Tan und Jianying Zhou, “A Survey of Digital Signing in the Post Quantum Era”, Cryptology ePrint Archive, Report 2019/1374, 2019, https://eprint.iacr.org/2019/1374 L. K. Grover, “Quantum mechanics helps in searching for a needle in a haystack,” Physical review letters, vol. 79, no. 2, p. 325, 1997. Simon, D.R. (1994), “On the power of quantum computation”, Foundations of Computer Science, 1994 Proceedings., 35th Annual Symposium on: 116–123, retrieved 2011-06-06 D. J. Bernstein, “Comparing proofs of security for lattice-based encryption”, Second PQC Standardization Conference, Cryptol. ePrint Arch., 2019, https://eprint.iacr.org/2019/691 Announcing Request for Nominations for Public-Key Post-Quantum Cryptographic Algorithms”, 81 Federal Register 92787 (December 20, 2016), pp. 92787 92788. https://federalregister.gov/d/2016-30615 A. Hülsing, D. Butin, S. Gazdag, J. Rijneveld, and A. Mohaisen, “XMSS: eXtended Merkle signature scheme,” Available Online: https://tools.ietf.org/html/rfc8391, 2018 [last accessed: September 2020]. F. T. Leighton and S. Micali, “Large provably fast and secure digital signature schemes based on secure hash functions,” 1995, uS Patent 5,432,852. P. Wallden and E. Kashefi, “Cyber security in the quantum era”, Commun. ACM, vol. 62, no. 4, p. 120, 2019. E. Barker, “SP 800-57 part 1 rev. 4 recommendation for key management part 1: General,” NIST special publication, vol. 800, p. 57, 2016. Y. Takahashi and N. Kunihiro, “A quantum circuit for shor’s factoring algorithm using 2n+2 qubits,” Quantum Information & Computation, vol. 6, no. 2, pp. 184–192, 2006. 492 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE S. Beauregard, “Circuit for shor’s algorithm using 2n+3 qubits,” arXiv preprint quant-ph/0205095, 2002. K. Hartnett, “A new law to describe quantum computing’s rise?” Available Online: https://www.quantamagazine.org/does-nevens-lawdescribe-quantum-computingsrise-20190618/, 2019 [last accessed: September 2020]. D. J. Bernstein, N. Heninger, P. Lou, and L. Valenta, “Post-quantum RSA,” in International Workshop on Post-Quantum Cryptography. Springer, 2017, pp. 311–329. Moody, D. , Alagic, G. , Apon, D. , Cooper, D. , Dang, Q. , Kelsey, J. , Liu, Y. , Miller, C. , Peralta, R. , Perlner, R. , Robinson, A. , Smith-Tone, D. and Alperin-Sheriff, J. (2020), Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process, NISTIR, National Institute of Standards and Technology, Gaithersburg, MD, [online], https://doi.org/10.6028/NIST.IR.8309 P. Wallden and E. Kashefi, “Cyber security in the quantum era”, Commun. ACM, vol. 62, no. 4, p. 120, 2019. C. H. Bennett and G. Brassard, “Quantum cryptography: public key distribution and coin tossing,” Theor. Comput. Sci., vol. 560, no. 12, pp. 7–11, 2014. A. K. Ekert, “Quantum cryptography based on bell’s theorem”, Physical review letters, vol. 67, no. 6, p. 661, 1991. D. Gottesman and I. Chuang, “Quantum digital signatures,” arXiv preprint quant-ph/0105032, 2001. M.-Q. Wang, X. Wang, and T. Zhan, “An efficient quantum digital signature for classical messages,” Quantum Information Processing, vol. 17, no. 10, p. 275, 2018. W. Li, R. Shi, and Y. Guo, “Blind quantum signature with blind quantum computation,” International Journal of Theoretical Physics, vol. 56, no. 4, pp. 1108–1115, 2017. NIST, “Submission Requirements and Evaluation Criteria for the Post-Quantum Cryptography Standardization Process,” Available Online: https://csrc.nist.gov/CSRC/media/Projects/PostQuantum- Cryptography/documents/call-for-proposals-final-dec-2016.pdf, 2016 [last accessed: September 2020]. “Post-Quantum Cryptography Round 2 Submissions,” Available Online: https://csrc.nist.gov/Projects/Post-Quantum- Cryptography/Round-2-Submissions, 2019 [last accessed: September 2020]. “Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM”, Available Online: https://eprint.iacr.org/2018/230.pdf, 2018 [last accessed: September 2020]. ETSI, “Quantum safe cryptography; case studies and deployment scenarios etsi gr qsc 003 v1.1.1,” Available Online: https://www.etsi.org/deliver/etsi gr/QSC/001 099/003/01.01.01 60/ gr QSC003v010101p.pdf, 2017 [last accessed: September 2020]. Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schwabe, P., Seiler, G., and D. Stehle, “Crystalsdilithium: A lattice-based digital signature scheme”, IACR Cryptology ePrint Archive , 2017, https://eprint.iacr.org/2017/633 Fouque, P-A., Hoffstein, J., Kirchner, P., Lyubashevsky, V., Pornin, T., Prest, T., Ricosset, T., Seiler, G., Whyte, W., and Z. Zhang, “Falcon: Fast-Fourier lattice- based compact signatures over NTRU”, IACR Cryptology ePrint Archive , 2018, https://falcon-sign.info/ Ding, J. and D. Schmidt, “Rainbow, a New Multivariable Polynomial Signature Scheme”, 2005, https://link.springer.com/chapter/10.1007/11496137_12 McEliece R (1978) A public-key cryptosystem based on algebraic coding theory. The Deep Space Network Progress Report, DSN PR 42-44. NASA. Available at https://tmo.jpl.nasa.gov/progress_report2/42-44/44N.PDF CRYSTALS-Kyber (version 2.0) – Submission to round 2 of the NIST post-quantum project. Roberto Avanzi, Joppe Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, and Damien Stehlé. Specification document ,2019, Available at https://pq-crystals.org/kyber/data/kyber-specification-round2.pdf [last accessed: September 2020]. T. Christian & T. Christoph: Quantum Computer Resistant Cryptographic Methods and Their Suitability for Long-Term Preservation of Evidential Value 493 Institute of Electrical and Electronics Engineers (2009) IEEE Standard 1363.1-2008 - Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices (IEEE, Piscataway, New Jersey, United States). https://doi.org/10.1109/IEEESTD.2009.4800404 American National Standards Institute (2010) ANSI X9.98-2010 -Lattice-Based Polynomial Public Key Establishment Algorithm for the Financial Services Industry (ANSI, New York City, United States). Available at https://webstore.ansi.org/standards/ascx9/ansix9982010r2017 Arute, F., Arya, K., Babbush, R. et al.: Quantum supremacy using a programmable superconducting processor. Nature 574, 505–510 (2019). https://doi.org/10.1038/s41586-019-1666-5 Gambetta, J.: „IBM’s Roadmap For Scaling Quantum Technolog, IBM Research“, IBM Research Blog, September 15, 2020, https://www.ibm.com/blogs/research/2020/09/ibm-quantum roadmap/, [last accessed: November 2020]. Finland selects IQM to build its first quantum computer; to deliver a 50-qubit machine by 2024., November 2020,https://www.meetiqm.com/articles/press-releases/finland-selects-iqm-tobuild-its-first-quantum-computer-to-deliver-a-50-qubit-machine-by-2024, [last accessed: November 2020]. 494 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE SMART SERVICES FOR ENERGY COMMUNITIES: INSIGHTS ON OPTIONS AND PRIORITIES FROM A MULTICRITERIA MAPPING STUDY IN GERMANY JULIO VIANA,1 RAINER ALT2 & OLAF REINHOLD1 1 Social CRM Research Center/Leipzig, Germany; e-mail: julio.viana@scrc-leipzig.de, olaf.reinhold@scrc-leipzig.de 2 Leipzig University, Information Systems Institute/Leipzig, Germany; e-mail: rainer.alt@uni-leipzig.de Abstract Energy Communities are finding their way into the local energy systems as new regulations surge. However, they often lack resources due to their limited size, and depend heavily on subsidies for providing competitive offerings. In parallel, new technologies support the development of smart services for the energy market and provide chances for increasing the competitiveness of energy communities. This paper utilizes the multi-criteria mapping (MCM) method to discuss with stakeholders from energy communities in Germany the relevance and priorities for realizing specific smart services. A general ranking, as well as four perspective-based rankings, are analyzed by discussing contrasts and uncertainties. The results provide relevant insights on potentials from each service and a basis for the design of new information systems and architectures for energy communities. DOI https://doi.org/10.18690/978-961-286-485-9.36 ISBN 978-961-286-485-9 Keywords: smart energy communities, multi-criteria mapping, technology analysis, smart energy services, service ranking 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 496 1 Introduction New regulations are setting ways for further development of the energy market worldwide (Spence 2019; Vasily Kupriyanovsky et al. 2019). In Germany, the energy industry is strongly regulated and generates a positive economic impact after the German Renewable Energy Sources Act (EEG), increasing investments and employment (Hillebrand et al. 2006), as well as serving as a model for legislation in other countries (Lehr et al. 2008). Consequently, projects on the demand side emerged (Palensky and Dietrich 2011) and new concepts, such as Smart Energy Communities (SECs), found their way into the regulatory systems. SECs consist of a group of households with different forms of electric loads and technologies integrated into a control system, which actively manages generation and demand in the community (Fazeli et al. 2011). Recently, citizens started to engage in local energy systems due to community identity, social norms, trust and environmental concern (Kalkbrenner and Roosen 2016; Fazeli et al. 2011; Massey et al. 2018). In parallel, technological advancements pave the way for ‘smart’ energy services (SES) (Mathiesen et al. 2015; van Dinther et al. 2021) using a smart grid architecture based on ‘prosumers’ - users that consume and produce energy (Grijalva and Tariq 2011). Services are smart when based on hard field intelligence, and are processing a large amount of data and giving decision-makers more visibility into their business (Allmendinger and Lombreglia 2005), using interconnected Information Systems (IS) for data acquisition, algorithms, data reports and interfaces for visualization and configuration (Palensky and Dietrich 2011; Beverungen et al. 2019). While some studies discuss energy communities with a focus on choosing the type of renewable energies (Karunathilake et al. 2019), their ecosystems (Vernay and Sebi 2020) or social innovation aspects (Caramizaru and Uihlein 2020), current literature on SECs focuses on specific services and processes, such as big data analysis (Zhou et al. 2016), smart meters (Anda and Temmen 2014), peer-to-peers interconnected smart homes (Steinheimer et al. 2012) and smart Internet of Things (IoT) (Giordano et al. 2020). New business models based on SESs, including peer-to-peer (P2P) marketplaces, microgrids or virtual power plants derive from energy generated intelligently and optimized to balance with its demand (Paukstadt and Becker 2019). Such models use smart systems, providing a more holistic approach rather than focusing on specific services or only on smart grids (Lund et al. 2017). J. Viana, R. Alt & O. Reinhold: Smart Services for Energy Communities: Insights on Options and Priorities from a Multicriteria Mapping Study in Germany 497 SECs benefit from SES as they secure reliability, enhance market service, minimize environmental impact, reduce costs and improve the use of renewable energy (Wang et al. 2015), following the development goals from United Nations (Leal Filho et al. 2021). These local networks have limited resources to invest in many technologies as they count mainly on investments from citizens in the region (Dóci et al. 2015). No study has provided yet an overview of SES, highlighting their potentials and drawbacks, facilitating their prioritization by SECs. This paper addresses this gap by discussing smart options according to their potential of contribution to improve services and processes within SECs. The study answers the following research questions:   What are the options and priorities for smart services applied to SECs in Germany? What challenges and opportunities for SECs and IS solutions derive from these options? Figure 1 depicts the research agenda and expected outcomes. After an expert group defined the options of smart services and four necessary perspectives to assess them, stakeholders were selected according to these perspectives. The options were then assessed (ranking) and discussed (appraisal) during guided interviews. This assessment contributes to the prioritization of smart services and provides an analysis of current uncertainties and potentials in the energy market for smart communities. Figure 1: Research Agenda 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 498 The remainder of the paper is structured as follows: Chapter 2 explains the methodology and its steps to assess smart options. Chapter 3 discusses the results derived from the analysis, while Chapter 4 provides the main conclusions and contributions for SECs and IS design, as well as insights on further research. 2 Methodology Researchers, industry and policymakers have assessed risk related to decisions and technologies (Waterstone 1992), fostering studies of their risk perception (Slovic 1987). Adopting technologies require investments and these assessments provide positive and negative aspects of the evaluated objects, reducing risks. Different methods to assess and appraise risk have been developed (Covello and Merkhofer 1993; Horvath and Zuckerman 1993), especially related to technology (Lefley 1997; Stirling 2008). Methods, such as RT Delphi (Gordon and Pease 2006) or costeffective models (Hubbard 2014), have been applied to the prioritization of technologies. However, these methods fall short when assessing the uncertainties of new technological developments. In this sense, the Multicriteria Mapping Method (MCM) provides an extensive view of potential options. MCM provides a structured analysis of uncertainties applied to various domains (Stirling and Mayer 2001; Hansen 2010; Shankar et al. 2002). This analysis is based on insights and information from stakeholders of a given industry (Shankar et al. 2002; Donaldson and Preston 1995; Carpenter et al. 2003). Researchers using MCM refer to these stakeholders to provide an analysis with different views and perspectives on the same subject taking into consideration these uncertainties (Hansen 2010; Shankar et al. 2002; McDowall and Eames 2007). This study used pre-structured options introduced and assessed numerically. Prestructured surveys are applied to study diversity, defining the objects of analysis beforehand (Jansen 2010). This descriptive analysis aims to prioritize existing options empirically within certain stakeholder groups. A survey is qualitative if it does not count the frequencies of categories, but searches for empirical diversity in the analyzed objects, even if these results are expressed in numbers (Jansen 2010). MCM combines a numeric assessment to rank the options and visualize uncertainty, but focuses on discussions why some options are considered more relevant. J. Viana, R. Alt & O. Reinhold: Smart Services for Energy Communities: Insights on Options and Priorities from a Multicriteria Mapping Study in Germany 499 The analysis of this paper follows the steps suggested by Coburn (2016) (see Figure 2 ). MCM provides an online platform1 to guide the interview process and support researchers in setting up the interview environment, allowing stakeholders to understand the pre-defined options and move along the research steps. A prior preparation phase took place to define these options and the stakeholder groups by inviting experts in the field to discuss and define the options for SECs. Figure 2: Research Steps from MCM Source: Stirling and Mayer (2000) 2.1 Selection of Stakeholders (Perspectives) and Smart Options Ten experts related to the energy market and IS field discussed and developed a list of smart options that affect SEC performance, as a list of smart services for SECs was not found in the existing literature. The expert group included leaders and representatives from energy (three) and IS-related (three) research institutes, energy communities (two), and software companies (two). They defined the smart options based on their expertise, focusing on services that can be improved using current technologies (see Table 1) and the stakeholder groups (see Table 2) to combine different perspectives on the topic. There was no overlap between the experts and the stakeholders. The options below are coded in three-letter acronyms for later visualization and discussions. 1 Multicriteria Mapping - https://www.multicriteriamapping.com/ 500 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Table 1: Options and Descriptions for Smart Services Option Applications based on Measured Data (AMD) Peer-to-peer Trade (P2P) Selection of Energy Mix (SEM) Proof of Origin (POO) Consumption and Production Optimization (CPO) Virtual Power Plants (VPP) New Tariffs (NTA) Investment Opportunities (IOP) Description (D) and Contribution (C) to SECs (D) User behavior information and usage anomaly ground the development of various applications, such as gamification (power savings comparison), individual billing per device, etc. (C) Provision of data visualization to show consumers their exact power consumption and provide forecasts. (D) Private individuals, small businesses and producing companies trade electricity. Consumers, producers and storage facilities are networked to communities and trade locally generated electricity with each other. (C) Development of trading platforms. (D) Different systems are combined and the consumption profile transparently connected with generation capacities. This improves the location planning of companies as they could define it based on preferences in the energy mix from local producers. (C) Consumers select their energy mix systematically. (D) Electricity is transformed from a commodity to an emotional product by proving when and where it comes from. (C) Information regarding less-burdened networks is provided and improves the local matching of supply and demand. (D) Consumption and production could be as close as possible to local communities. IS could support the timetable optimization from flexible producers, consumers and energy storages based on very accurate forecasts and equipment management. (C) Timetable optimization from flexible producers, consumers and energy storages based on accurate forecasts and equipment management. (D) SECs aggregate their flexibility to market their surpluses directly. (C) Development of a virtual power plant. (D) New flexible tariffs (dynamic fares) are adapted and provided to users (prosumers and flexible consumers). (C) Development of an incentive system to relieve the local power grid and balance the community's residual load, increasing the local matching of production and consumption. (D) People living on low-invested land and in rented houses/flats could participate financially and generate returns through investments. (C) Investments from users are part of the electricity costs. Consumers gradually buy shares of a production plant and participate in the revenue, while SECs invest in production and storage as needed. According to the reality of energy communities in Germany, the expert group selected four perspectives (stakeholder groups) and indicated several stakeholders to take part in an interview session, which lasted between 60 and 90 minutes. In total, 15 stakeholders participated in the study. J. Viana, R. Alt & O. Reinhold: Smart Services for Energy Communities: Insights on Options and Priorities from a Multicriteria Mapping Study in Germany 501 Table 2: Group of Stakeholders (Perspectives) Perspectives / Stakeholders Energy Cooperatives Municipal Utilities as Energy Suppliers Energy Providers with New Disruptive Business Models Technology/Software Total 2.2 Participants 5 5 3 2 15 Assigning Scores and Weights based on Criteria During the interviews, participants were encouraged to create up to three criteria and assess each option according to them. This allows a degree of freedom for stakeholders to indicate the aspects that are important to them when assessing the given options, as the group consists of different expertise. The criteria were grouped into five topics: (1) perspective from consumers (costs and acceptance), (2) external factors (feasibility, regulatory requirements), (3) level of innovation, (4) economical and (5) ecological aspects. Subsequently, participants assigned a pessimistic and an optimistic score to each option on a scale from zero to 100, and weighted each criterion to improve the analysis of uncertainty. Pessimistic Score Uncertainty (Medium) Optimistic Score Rank Extrema Figure 3: Chart Analysis This assessment produced a chart and Figure 3 depicts how it displays the results. Options can rank high or low and the difference between the optimistic and pessimistic scores reflects the level of uncertainty. For that, the medium of the scores was considered. The highest and lowest scores are reflected in the extrema line. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 502 3 Results The general chart provides an overview of how all options are ranking considering their medium values. Stakeholders ranked higher the option Applications based on measured data (AMD), while they were more pessimistic regarding the selection of energy mix (SEM). P2P Trade has a higher level of uncertainty, indicating disagreements among them regarding the developments of such a trading scheme. AMD CPO IOP VPP NTA P2P POO SEM Figure 4: General Ranking of Options (n=15) Despite the indications of this first chart, a view according to the perspectives highlights the differences in stakeholder groups (see Figure 5). For example, technology-related stakeholders are less optimistic about the optimization of consumption and production (CPO) than the other groups. Additionally, Municipal Utilities are more positive about the option of Virtual Power Plants (VPP). J. Viana, R. Alt & O. Reinhold: Smart Services for Energy Communities: Insights on Options and Priorities from a Multicriteria Mapping Study in Germany 503 Figure 5: Ranking of Perspectives: Stakeholder Groups. The observed high level of uncertainty derives from the optimistic and pessimistic scores, assigned and justified by the stakeholders. Besides the numerical assessment, the reasons for the given scores were discussed, as shown in the table below. Table 3: Optimistic and Pessimistic Views on the Options Opt. AMD Optimistic View - Smart meters produce data for the predictive models of consumption to provide an appropriate supply. - The option provides consumption indication for users. IOP - Participation from citizens increase acceptance and accelerate the energy transition. Pessimistic View - Data transfer between gateway and terminals is not yet standardized. - Different interfaces make access nondiscriminatory and only companies with the same technology can act as the provider. - Data protection concerns limit the analysis of measured data - New regulation concerning direct transactions in the market brings concerns that no return on equity investments would payout. 504 SEM POO NTA CPO P2P VPP 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE - SECs must receive support from local stakeholders. - Most customers find it sufficient to obtain green electricity via certificates. - Consumers have emotional attachments to producers and types of energy production. - Green electricity certificates are rather opaque and guarantees of origin need to become more accurate. - Most customers are sensitive to price and do not understand the issue. - Uncertainty whether incentive - Relocation of power consumption is difficult for systems with variable prices lead to many consumers in private and commercial areas. a behavioral adjustment. - Electricity would continue to be consumed when needed, without short-term price elasticity. - A necessary reform of network charges might not take place soon. - Seen as the main reason for - It is necessary to define what to connect and starting a community. record. - Balancing generation and - Privacy issues can hinder the implementation. consumption done at a regional - Dependent on the application based on measured level. data (AMD) and smart meters. - Considered the future of the - Current market is too complex and not transparent. energy market. However, it requires - A community could be reached through a pooling a regionalization of trade and of actors and, therefore, be organized in a common marketplaces. control group without real P2P trading. - A community in a control group is already working today, so true innovation could surge from the emersion of a genuine regional marketplace. - For a community, the offering of - There is a lack of a clear framework to market it flexibility is interesting. locally. - The option is reasonable from the - The individual producer or consumption lacks expertise. physical point of view and logical for the network. - Relevant option for the future, but the technical feasibility is very difficult in contrast with the benefits. - Strongly related to P2P trading as the origin is clear in such transactions. The indication of pessimistic and optimistic aspects also included challenges and potential applications for the options. New challenges concern AMD, such as local injection peaks or high withdrawal peaks due to e-mobility. Nevertheless, smart meters help to predict such consumption. According to stakeholders, the benefit of cooperative electricity could surge through "add-ons" after refinement of the electricity product. Modular product architecture supports the development of interchangeable options (Dahmus et al. 2001). However, technology-related stakeholders are less optimistic because of the lack of standardization. In addition, data protection could hinder such analysis, which goes in line with recent dataprotection concerns regarding the deployment of smart meters (Erkin et al. 2013). Regarding IOP, the participation from citizens is relevant, but requires support from local stakeholders, municipal utilities, investment banks, government, etc. New J. Viana, R. Alt & O. Reinhold: Smart Services for Energy Communities: Insights on Options and Priorities from a Multicriteria Mapping Study in Germany 505 energy providers are concerned with return on investments due to new regulations of the direct market. This affects the uncertainty of this option, despite the relevance of citizen participation to finance renewable energy in Germany (Yildiz 2014). SEM ranks low as stakeholders believe customers are satisfied with current certificates for green electricity. Its technical feasibility is difficult, and consumers are, sometimes, emotionally attached to certain types of electricity. Despite the willingness of energy cooperatives to source their electricity from renewable energies, if that incurs higher electricity costs, these would have to be justified. In this line, POO performed differently in the stakeholder groups as they differ in the level of concern from consumers regarding energy origin. However, energy consumers, when asked to make an active choice between a green and a standard energy provider, choose mostly a green program (Hedlin and Sunstein 2016). Concerning NTA, participants differed on its impact on behavioral adjustment. Many interviewees claimed electricity would continue to be consumed when needed, diminishing the chances for short-term price elasticity. Nevertheless, they claim CPO is necessary to start an SEC. Efforts should focus on balancing generation and consumption as much as possible at a regional level and should also be networkoptimized. New energy providers claim installations should be built where the consumption is located, defining what to connect and record. Energy cooperatives indicated the motivation from their members not only economically, but also intrinsically or ideationally towards P2P. However, stakeholders from the municipal utility group are uncertain about the need for such trading as a community in an existing control group might be sufficient and this implementation can be costly. ICT and control systems are necessary to enable P2P energy trading in local energy markets (Zhang et al. 2017). Participants agree that a market possibility is necessary for communities to act as a VPP. As renewables become more prevalent, the need for local governance increase. Representants from municipal utilities were more optimistic about this option and claimed that, even though the market is not ready yet, the shift to the end consumer’s perspective is shaping the energy transition. From the technological aspect, some 506 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE studies developed algorithms able to aggregate the capacity of different energy resources (Pudjianto et al. 2007; Ruiz et al. 2009; Pandžić et al. 2013). The views on the options support SECs to decide on the adoption of smart services, defining priorities and investments based on specific needs and market reality. The next chapter presents the implications for research and practice. 4. Conclusions and Implications for Research and Practice Stakeholders examined technology-based options that influence processes within SECs in Germany through the MCM method. Eight options were developed by an expert group and stakeholders assessed them, indicating priorities. Participants indicated AMD as a high priority for SECs once it also grounds the development of further smart options based on the application of smart meters. The indication and prioritization of smart services answer the first research question, contributing to future solutions for digital ecosystems platforms in the energy industry. Furthermore, stakeholders discussed optimistic and pessimistic aspects for each option, answering the second research question regarding challenges and opportunities. In addition, they indicated that regulatory challenges, data privacy, and the cost-benefit of available technologies are able to hinder the application or reduce the relevance of some options for German SECs. The predominance of positive aspects around applications based on smart meter data indicates a potential for research on data generated in SECs as a way to determine optimization practices and balance between energy production and consumption. Stakeholders pointed out that energy communities need to integrate processes and dispersed data to a high degree, as well as to integrate and coordinate different actors in a cross-organizational environment. Although smart meters are not yet widely used, most options benefit directly from their availability. Taking into account the current resource limitation of the energy communities in Germany, either service platforms for several communities or decentralized architectures seem necessary for realizing SECs. Stakeholders shared their opinion on technological developments, the behavior of electricity consumers and current regulations, supporting SECs in J. Viana, R. Alt & O. Reinhold: Smart Services for Energy Communities: Insights on Options and Priorities from a Multicriteria Mapping Study in Germany 507 their strategic planning and providing directions on technological demands for smart services in this industry. SECs benefit from the development and improvement of smart services based on recent IS technologies and the indication and assessment of SES are able to guide IS designers to prioritize their offerings in the field. However, systems should be designed to allow the future aggregation of new functionalities into a complete service system (Lund et al. 2017). That requires an integration of information systems across different organizations. Furthermore, new systems could assume functionalities that are typically performed by intermediaries, co-evolving towards decentralized solutions matching buyers and sellers (Alt 2018) or, in the case of SECs, matching the prosumers. Adopting innovative technologies, such as Blockchain, can support cooperative principles in marketplaces (Kollmann et al. 2020) and foster this change towards decentralized systems. IS solutions should address the challenges and potentials of technology implementation to support SECs in the optimization of the community. SECs can benefit from the development and improvement of smart services based on recent IS technologies. Among the various contributions, systems can (1) support to predict demands, manage supply and ground investments; (2) draw relevant analysis based on the data; (3) support the emission of certificates regarding the energy, allowing a selection of energy mix; (4) support relieving the power grid and balancing residual load; (5) support the matching of supply and demand, optimizing production; (6) provide and manage incentives through new tariffs, according to usage; (7) support the virtual trade of generated energy; (8) support smart contracts and peer-to-peer trading. Furthermore, public policies could support the implementation of such technologies applied to the energy market, influencing how SECs will adapt to the recent regulatory changes. Although the results of the MCM provide indications, conclusions about stakeholders’ preferences should be made with caution due to the small number of interviewees. This also affected the balance between the groups, as the total of 508 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE stakeholders per perspective is not equal. The inclusion of large energy companies could improve the assessment due to the risk SECs might represent to their business. Researchers can use these results and methodology to investigate further the options of smart services and to identify possible demands for new integrated information systems in the energy market. Moreover, further research could use MCM to provide a deeper analysis of the source of uncertainty for each stakeholder group and weighting justifications. As some of the options for smart services are already available, market-related information for these options could be explored in addition to the analysis of this paper. Although the paper focuses on the current scenario of German SECs, communities in other regions can benefit from the analysis. Acknowledgement The authors gratefully acknowledge the financial support of this research by the German Federal Ministry for Economic Affairs and Energy within the project SMECS (01MD18013F) and the Sächsische Aufbaubank and European Union within the EFRE project SEES (100385415). References Allmendinger, G., Lombreglia, R., 2005. Four Strategies for the Age of Smart Services. https://hbr.org/2005/10/four-strategies-for-the-age-of-smart-services. Alt, R., 2018. Electronic Markets and current general research. Electronic Markets 28 (2): 123–128. 10.1007/s12525-018-0299-0. Anda, M., Temmen, J., 2014. Smart metering for residential energy efficiency: The use of community based social marketing for behavioural change and smart grid introduction. Renewable Energy 67: 119–127. 10.1016/j.renene.2013.11.020. Beverungen, D., Müller, O., Matzner, M., Mendling, J., vom Brocke, J., 2019. Conceptualizing smart service systems. Electronic Markets 29 (1): 7–18. 10.1007/s12525-017-0270-5. Caramizaru, A., Uihlein, A., 2020. Energy communities: an overview of energy and social innovation: European Commission. Carpenter, M. A., Pollock, T. G., Leary, M. M., 2003. Testing a model of reasoned risk-taking: governance, the experience of principals and agents, and global strategy in high-technology IPO firms. Strategic Management Journal 24 (9): 803–820. 10.1002/smj.338. Coburn, J., 2016. Multicriteria Mapping Manual - Version 2.0. SSRN Electronic Journal. 10.2139/ssrn.2873524. Covello, V. T., Merkhofer, M. W., 1993. Risk Assessment Methods: Approaches for Assessing Health and Environmental Risks. Boston, MA: Springer. Dahmus, J. B., Gonzalez-Zugasti, J. P., Otto, K. N., 2001. Modular product architecture. Design Studies 22 (5): 409–424. 10.1016/S0142-694X(01)00004-7. Dóci, G., Vasileiadou, E., Petersen, A. C., 2015. Exploring the transition potential of renewable energy communities. Futures 66: 85–95. 10.1016/j.futures.2015.01.002. J. Viana, R. Alt & O. Reinhold: Smart Services for Energy Communities: Insights on Options and Priorities from a Multicriteria Mapping Study in Germany 509 Donaldson, T., Preston, L. E., 1995. The Stakeholder Theory of the Corporation: Concepts, Evidence, and Implications. The Academy of Management Review 20 (1): 65. 10.2307/258887. Erkin, Z., Troncoso-pastoriza, J. R., Lagendijk, R. L., Perez-Gonzalez, F., 2013. Privacy-preserving data aggregation in smart metering systems: an overview. IEEE Signal Processing Magazine 30 (2): 75–86. 10.1109/MSP.2012.2228343. Fazeli, A., Christopher, E., Johnson, C., Gillott, M., Sumner, M., 2011. Investigating the effects of dynamic demand side management within intelligent Smart Energy communities of future decentralized power system. In: 2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies, 1–8: IEEE. Giordano, A., Mastroianni, C., Scarcello, L., 2020. Optimization Model for IoT-Aware Energy Exchange in Energy Communities for Residential Users. Electronics 9 (6): 1003. 10.3390/electronics9061003. Gordon, T., Pease, A., 2006. RT Delphi: An efficient, “round-less” almost real time Delphi method ☆. undefined. Grijalva, S., Tariq, M. U., 2011. Prosumer-based smart grid architecture enables a flat, sustainable electricity industry. In: 2011 IEEE PES Innovative Smart Grid Technologies, 1–6. Piscataway: IEEE. Hansen, S. F., 2010. Multicriteria mapping of stakeholder preferences in regulating nanotechnology. Journal of nanoparticle research an interdisciplinary forum for nanoscale science and technology 12 (6): 1959–1970. 10.1007/s11051-010-0006-3. Hedlin, S., Sunstein, C. R., 2016. Does active choosing promote green energy use: Experimental evidence. Ecology Law Quarterly 43 (1): 107–142. Hillebrand, B., Buttermann, H. G., Behringer, J. M., Bleuel, M., 2006. The expansion of renewable energies and employment effects in Germany. Energy Policy 34 (18): 3484–3494. 10.1016/j.enpol.2005.06.017. Horvath, P., Zuckerman, M., 1993. Sensation seeking, risk appraisal, and risky behavior. Personality and Individual Differences 14 (1): 41–52. 10.1016/0191-8869(93)90173-Z. Hubbard, D. W., 2014. How to Measure Anything: Finding the Value of Intangibles in Business. Hoboken: Wiley. Jansen, H., 2010. The Logic of Qualitative Survey Research and its Position in the Field of Social Research Methods. Forum Qualitative Sozialforschung / Forum: Qualitative Social Research, Vol 11, No 2 (2010): Visualising Migration and Social Division: Insights From Social Sciences and the Visual Arts / Forum Qualitative Sozialforschung / Forum: Qualitative Social Research, Vol 11, No 2 (2010): Visualising Migration and Social Division: Insights From Social Sciences and the Visual Arts. 10.17169/FQS-11.2.1450. Kalkbrenner, B. J., Roosen, J., 2016. Citizens’ willingness to participate in local renewable energy projects: The role of community and trust in Germany. Energy Research & Social Science 13: 60–70. 10.1016/j.erss.2015.12.006. Karunathilake, H., Hewage, K., Mérida, W., Sadiq, R., 2019. Renewable energy selection for net-zero energy communities: Life cycle based decision making under uncertainty. Renewable Energy 130: 558–573. 10.1016/j.renene.2018.06.086. Kollmann, T., Hensellek, S., Cruppe, K. de, Sirges, A., 2020. Toward a renaissance of cooperatives fostered by Blockchain on electronic marketplaces: a theory-driven case study approach. Electronic Markets 30 (2): 273–284. 10.1007/s12525-019-00369-4. Leal Filho, W., Azul, A. M., Brandli, L., Lange Salvia, A., Wall, T., 2021. Affordable and Clean Energy. Cham: Springer International Publishing; Imprint: Springer. Lefley, F., 1997. Approaches to risk and uncertainty in the appraisal of new technology capital projects. International Journal of Production Economics 53 (1): 21–33. 10.1016/S0925-5273(97)001060. Lehr, U., Nitsch, J., Kratzat, M., Lutz, C., Edler, D., 2008. Renewable energy and employment in Germany. Energy Policy 36 (1): 108–117. 10.1016/j.enpol.2007.09.004. 510 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Lund, H., Østergaard, P. A., Connolly, D., Mathiesen, B. V., 2017. Smart energy and smart energy systems. Energy 137: 556–565. 10.1016/j.energy.2017.05.123. Massey, B., Verma, P., Khadem, S., 2018. Citizen Engagement as a Business Model for Smart Energy Communities. In: 2018 5th International Symposium on Environment-Friendly Energies and Applications (EFEA), 1–6: IEEE. Mathiesen, B. V., Lund, H., d. Connolly, Wenzel, H., Østergaard, P. A., Möller, B., Nielsen, S., Ridjan, I., Karnøe, P., Sperling, K., Hvelplund, F. K., 2015. Smart Energy Systems for coherent 100% renewable energy and transport solutions. Applied Energy 145: 139–154. 10.1016/j.apenergy.2015.01.075. McDowall, W., Eames, M., 2007. Towards a sustainable hydrogen economy: A multi-criteria sustainability appraisal of competing hydrogen futures. International Journal of Hydrogen Energy 32 (18): 4611–4626. 10.1016/j.ijhydene.2007.06.020. Palensky, P., Dietrich, D., 2011. Demand Side Management: Demand Response, Intelligent Energy Systems, and Smart Loads. IEEE Transactions on Industrial Informatics 7 (3): 381–388. 10.1109/TII.2011.2158841. Pandžić, H., Morales, J. M., Conejo, A. J., Kuzle, I., 2013. Offering model for a virtual power plant based on stochastic programming. Applied Energy 105: 282–292. 10.1016/j.apenergy.2012.12.077. Paukstadt, U., Becker, J., 2019. Uncovering the business value of the internet of things in the energy domain – a review of smart energy business models. Electronic Markets: 1–16. 10.1007/s12525-019-00381-8. Pudjianto, D., Ramsay, C., Strbac, G., 2007. Virtual power plant and system integration of distributed energy resources. IET Renewable Power Generation 1 (1): 10. 10.1049/iet-rpg:20060023. Ruiz, N., Cobelo, I., Oyarzabal, J., 2009. A Direct Load Control Model for Virtual Power Plant Management. IEEE Transactions on Power Systems 24 (2): 959–966. 10.1109/TPWRS.2009.2016607. Shankar, V., Urban, G. L., Sultan, F., 2002. Online trust: a stakeholder perspective, concepts, implications, and future directions. The Journal of Strategic Information Systems 11 (3-4): 325– 344. 10.1016/S0963-8687(02)00022-7. Slovic, P., 1987. Perception of risk. Science 236 (4799): 280–285. 10.1126/science.3563507. Spence, D. B., 2019. Regulation and the New Politics of (Energy) Market Entry. Notre Dame Law Review 95: 327. Steinheimer, M., Trick, U., Ruhrig, P., 2012. Energy communities in Smart Markets for optimisation of peer-to-peer interconnected Smart Homes. In: 2012 8th International Symposium on Communication Systems, Network & Digital Signal Processing (CSNDSP 2012): Poznan, Poland, 18 - 20 July 2012, 1–6. Piscataway, NJ: IEEE. Stirling, A., 2008. “Opening Up” and “Closing Down”. Science, Technology, & Human Values 33 (2): 262–294. 10.1177/0162243907311265. Stirling, A., Mayer, S., 2000. A Precautionary Approach to Technology Appraisal? - A multi-criteria mapping of genetic modification in UK agriculture. Journal of Technology Assessment in Theory and Practice 3 (9. Jahrgang): 39–51. Stirling, A., Mayer, S., 2001. A Novel Approach to the Appraisal of Technological Risk: A Multicriteria Mapping Study of a Genetically Modified Crop. Environment and Planning C: Government and Policy 19 (4): 529–555. 10.1068/c8s. van Dinther, C., Flath, C. M., Gaerttner, J., Huber, J., Mengelkamp, E., Schuller, A., Staudt, P., Weidlich, A., 2021. Engineering Energy Markets: The Past, the Present, and the Future. In: Gimpel, H., Krämer, J., Neumann, D., Pfeiffer, J., Seifert, S., Teubner, T. Market Engineering: Insights from Two Decades of Research on Markets and Information, 113–134. Cham: Springer International Publishing; Imprint: Springer. Vasily Kupriyanovsky, Alexey Konev, Oleg Grinko, Oleg Pokusaev, Dmitry Namiot, 2019. On the way to the energy Internet: new regulations, business models, economic and technical background. International Journal of Open Information Technologies 7 (3): 60–70. J. Viana, R. Alt & O. Reinhold: Smart Services for Energy Communities: Insights on Options and Priorities from a Multicriteria Mapping Study in Germany 511 Vernay, A.-L., Sebi, C., 2020. Energy communities and their ecosystems: A comparison of France and the Netherlands. Technological Forecasting and Social Change 158: 120123. 10.1016/j.techfore.2020.120123. Wang, H., Abdollahi, E., Lahdelma, R., Jiao, W., Zhou, Z., 2015. Modelling and optimization of the smart hybrid renewable energy for communities (SHREC). Renewable Energy 84: 114–123. 10.1016/j.renene.2015.05.036. Waterstone, M., 1992. Risk and Society: The Interaction of Science, Technology and Public Policy. Dordrecht: Springer. Yildiz, Ö., 2014. Financing renewable energy infrastructures via financial citizen participation – The case of Germany. Renewable Energy 68: 677–685. 10.1016/j.renene.2014.02.038. Zhang, C., Wu, J., Long, C., Cheng, M., 2017. Review of Existing Peer-to-Peer Energy Trading Projects. Energy Procedia 105: 2563–2568. 10.1016/j.egypro.2017.03.737. Zhou, K., Fu, C., Yang, S., 2016. Big data driven smart energy management: From big data to big insights. Renewable and Sustainable Energy Reviews 56: 215–225. 10.1016/j.rser.2015.11.050 512 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE SOCIAL ROBOTS IN ELDERLY HEALTHCARE: A BURDEN OR A GIFT? STEFAN VAN DEN EIJKEL, 2 DORIEN FOPPEN-DE GRAAF, 2 ROBBERT SCHUURMANS, 2 STEFAN VAN GENDEREN, 2 KOEN SMIT1 & SAM LEEWIS1 1 HU University of Applied Sciences Utrecht, Institute for ICT, Digital Ethics, Utrecht, Netherland; e-mail: koen.smit@hu.nl, sam.leewis@hu.nl 2 HU University of Applied Sciences Utrecht, Institute for ICT, Utrecht, Netherland; e-mail: name.surname@student.hu.nl Abstract The healthcare sector is currently under enormous pressure and the COVID-19 pandemic does not improve this situation. The quality of healthcare will be negatively impacted when this pressure continues in the longer term. In 2050 it is expected that a total of 2.1 billion people will be aged 60+ years old. To overcome the increasing demand for healthcare by this age group, various studies are being conducted into various technological solutions, such as social robots. In this study, the Alpha Mini social robot was used in an experiment to research which tasks a social robot could assist with, to reduce the work pressure of healthcare professionals and to help the elderly live longer at their own homes. The experiment was carried out using interviews with healthcare professionals and informal caregivers about the demonstrated Alpha Mini. In addition to the experiment and interviews a survey was sent out to 237 healthcare organizations in the Netherlands to identify the 1) work pressure, 2) daily tasks, 3) social robot experiences, and 4) the features a social robot should have to gather requirements. The experiment failed due to work pressure at the healthcare organization. The survey resulted in 181 respondents. The results suggest that tasks such as reminders, setting alarms and physiotherapy have a great potential to help the healthcare professional in reducing their work pressure and tasks, and the elderly to be able to stay living longer at their own home. DOI https://doi.org/10.18690/978-961-286-485-9.37 ISBN 978-961-286-485-9 Keywords: social robot, elderly healthcare, healthcare professionals, requirements 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 514 1 Introduction A serious deficiency in the number of healthcare professionals is becoming a worldwide issue and the current COVID-19 pandemic does not improve this situation (Greenberg et al., 2020; Henkel et al., 2020; World Health Organization, 2020). The healthcare sector is under enormous pressure, and if it endures, it will badly impact the quality of healthcare worldwide (World Health Organization, 2020). The forecast is that in 2030 there will be 1,4 billion elderly people of 60+ years old worldwide and in 2050 this number will increase by approximately 66% to 2,1 billion elderly people of 60+ years old (World Health Organization, 2020). The Netherlands is among the top countries (along with e.g. Switzerland, Germany, France, Austria, Finland, Norway) of Europe in terms of the quality of healthcare rated in a yearly report published since 2005 (Arne Björnberg & Ann Yung Phang, 2019). In line with the global growth of the number of elderly people, the ageing population of the Netherlands also continues to increase (NOS, 2020), which is why it is expected that in 2041 there will be 4.7 million people over the age of 65 compared to the current 3.2 million in 2021. This increase in the coming 20 years will only cause extra demand for healthcare in the Netherlands (Schumacher, 2017), raising the total healthcare costs to 19-31% of the annually gross domestic product (GDP) of the Netherlands (Albert van der Horst et al., 2011). In comparison and for illustrative purposes 31% of the GDP of the Netherlands is the entire GDP of Hungary (The World Bank Group, 2021). To overcome the increasing problem of demand in healthcare, studies are being conducted into various technological solutions such as a smart pill dispenser (Medido, 2021), sensors (Joshi et al., 2014), smartwatch (Vivago, 2021), social robot (Hoorn, 2017), and home automation (Harmo et al., 2005) to help elderly live longer at home. Previous studies have shown that social robots can have a great potential to assist in addressing the current issues in healthcare (Abdi et al., 2018) (Bemelmans et al., 2012), (Kachouie et al., 2014) (Broadbent et al., 2009) (Breazeal, 2011) (Phu & Garbrah, 2020). With the social robot, care could be performed more efficiently and effectively by healthcare professionals (Forlizzi et al., 2004). The social robot could help ensure that elderly persons in healthcare continue to receive good care, adding the possibility for elderly persons to live longer at home (Forlizzi et al., 2004). S. van den Eijkel, D. Foppen-de Graaf, R. Schuurmans, S. van Genderen, K. Smit & S. Leewis: Social Robots in Elderly Healthcare: A Burden or a Gift? 515 A social robot is a robot that, through the usage of various technologies, such as speech recognition, face recognition, and emotion recognition, can perform nonphysical tasks like providing reminders, providing information like the news or the weather and stimulate physical activity (Joshi et al., 2014). Research shows that a daily structure is very important for elderly people because it provides a sense of tranquillity (Góngora Alonso et al., 2019). It has been demonstrated that social robots were able to assist elderly persons with their daily structure (Góngora Alonso et al., 2018). More specifically, in elderly care, the social robot can assist in tasks such as reminding of medicine usage, act as an alarm, connecting with family and friends, and help with the maintenance of physical activity (Forlizzi et al., 2004). In this study, a social robot is defined as a humanoid robot (Duffy, 2003) in the role of an assistant in healthcare. The social robot is not meant to replace the healthcare professionals, but to assist them with their daily tasks (Góngora Alonso et al., 2019; Robinson et al., 2014). With the assistance of social robots, healthcare professionals will have more time for other tasks (e.g. that focus on safety and hygiene and medication adherence) (Robinson et al., 2014). The goal of this research is to identify which tasks a social robot can assist with and how the social robot could accomplish that, in providing care for elderly persons in healthcare at home, helping healthcare professionals to work more efficiently and help elderly persons to live longer at home. To achieve this goal, an answer is needed to the following research question: ‘How can a social robot help provide care more effectively, so that healthcare professionals can spend more time on tasks that they would like to perform, but now do not have enough time for and help the elderly to be able to live longer at home?’. This was done by conducting expert interviews and a survey. The paper is structured as follows: in the Background and Related work, previous research on social robots and elderly care related healthcare will be discussed. Next, in the Research Method section, the used methods will be detailed used to provide an answer to the posed research question. This is followed by the Data Collection and Analysis section where the qualitative and quantitative data and analysis are elaborated. Then, in the Results section, the findings of this research will be presented, which are followed by the Discussion section, the Conclusion section, and lastly, directions for Future Research are presented. 516 2 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Background and Related work Social robots are becoming more popular among researchers and in practice (Campa & Campa, 2016; Share & Pender, 2018). Various applications of social robots exist in healthcare (Share & Pender, 2018), education (Belpaeme et al., 2018), and hospitality (de Kervenoael et al., 2020). An example of a social robot that has been used in home healthcare observations (Bouwhuis, 2016), is the Tessa Robot (Tinyrobot, 2015). This social robot is designed as a flowerpot. Due to its design, it is small, practical, and affordable. The eyes consist of led lights which it uses as facial expressions. The Tessa Robot can play music, provide reminders, can tell the weather forecast and can ask the user questions. However, the response is limited to “yes” and “no” (Tinyrobot, 2015). Another social robot, the NAO robot, is often used in groups, where talks and exercises are done with the social robot (SoftBank Robotics, 2020). Its design focusses heavily on human interaction through the use of camera’s, microphones, speech recognition, and touch sensors. It has the ability to walk, sit, and move its arms and head. There is also the Alpha Mini, which is the same size as the Tessa Robot, but has abilities like walking and moves its arms like the NAO (UB Tech, 2021). The Alpha Mini robot has been released just for a little over a year now (2020), so not a lot of research is conducted with this robot. Therefore, in this study, the Alpha Mini robot will be used. The Alpha Mini is more humanized and has more movement abilities which differentiates it from the Tessa robot. While one could argue that other social robots do exist in practice (e.g., Pepper, Sophia, Asimo), the social robots described in this paper are more suitable for home care by healthcare workers due to their size, practicality and (deployment) costs for both elderly people as well as healthcare organizations. 2.1 Acceptance & Adoption of Social Robots One of the reasons that social robots have not been widely adopted is that users are not involved during development, causing their requirements and wishes not being accounted for (Turja et al., 2018). Another reason is that a lot of users have never had any or low experience with social robots (Turja et al., 2018). Studies (Flandorfer, 2012; Frennert & Östlund, 2014) show that people with experience with social robots are more positive towards the idea of using them. S. van den Eijkel, D. Foppen-de Graaf, R. Schuurmans, S. van Genderen, K. Smit & S. Leewis: Social Robots in Elderly Healthcare: A Burden or a Gift? 2.2 517 Elderly People and Social Robots The elderly are influenced by the usage of new technology by people in their near vicinity, such as healthcare professionals, family members and friends (Tempels, 2016). Elderly blame themselves if they have issues using new technology and do not want to be a strain to their near vicinity (Tempels, 2016). This behaviour represents an important factor in the adoption of new technology by elderly people. However, this is not the only factor that influences the adoption of the elderly. In total, there are 13 factors to decide if the elderly are positive or negative towards new technology such as the social robot (Tempels, 2016). The 13 factors are as followes: The positive factors are 1) independence, 2) daily life, 3) trust, 4) safety, 5) benefits, 6) ease of use, and 7) observed features. The negative factors are 8) knowledge, 9) privacy, 10) fear, 11) relations, 12) practical doubts, and 13) health and demographic factors. Other research confirm Tempels’ findings (Tempels, 2016) for social robots (Alaiad & Zhou, 2014; Robillard et al., 2018). These contributions show that elderly people can be motivated to use new technology if people in their near vicinity assist and motivate them in using and trying it (Tempels, 2016). In general, all these aspects raise the importance of including all stakeholders during the design process and elderly people gaining more experience with social robots by using them with the assistance of others close to them. 3 Research Method For this research, a mixed-method approach is utilized containing qualitative data (Hennink et al., 2020) and quantitative data (Sofaer, 2002). The Mixed-method approach integrates the data during data collection, analysis, or discussion and allows for the creation of a more holistic view of the problem space. 3.1 Experiment and Interviews Before the start of each experiment, a semi-structured interview (Qu & Dumay, 2011) was held with a healthcare professional and informal caregivers, in order to gather their opinion on social robots in healthcare. This was used to define a baseline for comparison against the final interview at the end of each experiment. After each demonstration, a second semi-structured (Qu & Dumay, 2011) interview was held with the same interviewee, in order to identify potential benefits and limitations 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 518 concerning the usage of the Alpha Mini robot. All interviews utilized an interview protocol and were recorded with the informed consent of the interviewees. The interviews were transcribed and coded in order to identify the possible benefits and limitations of the utilization of a social robot in healthcare. For each interview, two coders coded the transcribed interview separately. Next, the two coders compared and discussed the coding results and combined them into one final version. For the demonstration, healthcare professionals were asked to send a daily structure for each elderly person. The daily structure for each elderly person contains timestaps and actions. An example of a daily structure can be found here. The daily structure was programmed on the robotsindezorg.nl (Interactive Robotics, 2021) platform for each individual elderly person. To demonstrate the Alpha Mini, it was installed at the home of the selected elderly person through a supplier of the Alpha Mini robot. The Alpha Mini robot was used in the home of the elderly person for a period of seven weeks with the assistance of healthcare professionals and informal care givers. During this timeframe, the Alpha Mini robot tried to assist the elderly persons retaining their daily structure trough reminders and personal additions, such as a hairdresser appointment and family visitations. 3.2 Survey A survey was created and validated, based on the current body of knowledge as well as input from a healthcare professional that was not involved in the social robot experiment, conducted trough a separate interview to identify elderly care characteristics and the usage of social robots. These characteristics included 1) work limitations, 2) work pressure, 3) daily tasks, 4) past experiences with social robots, 5) embodiment preferences of the social robots, and 6) their view on the usage of social robots in healthcare. The survey contained a total of 25 questions divided in six sections: 1) introduction, 2) general questions, 3) tasks, 4) social robot characteristics, 5) social robot and reminders, and 6) social robot appearance. After validation and verification by the healthcare professional, the survey was sent via email to healthcare organizations specialized in elderly care for expert sampling. The reason that expert sampling is chosen for this survey, is because it has a better way of constructing the views of experts in elderly healthcare (Etikan, 2017). S. van den Eijkel, D. Foppen-de Graaf, R. Schuurmans, S. van Genderen, K. Smit & S. Leewis: Social Robots in Elderly Healthcare: A Burden or a Gift? 4 519 Data Collection and Analysis The data collection for this study occurred over a period of three months, between November 2020 till January 2021. The implementation of the Alpha Mini robots was planned for November 2020. The interviews were held from the first weeks in November 2020. The survey was published from December 2020 till January 2021. 4.1 Demonstration of the Alpha Mini Robots and Interviews In order to demonstrate the Alpha Mini robot, a request of participation was sent to healthcare organizations that were in direct contact with the supplier of the Alpha Mini robot. If a healthcare professional was interested and the elderly person gave their approval, a request was submitted for the implementation of the Alpha Mini robot. Out of the five requested implementations, only one was successful. The main issues that caused unsuccessful implementations were caused due to misplacement, deterioration of the elderly persons’ health, and misuse at the side of the elderly person. Due to this, the results of the experiment are deemed invalid and not taken into account in the results of this study. However, for transparency reasons, this activity is described in the paper. 4.2 Survey Based on the input of healthcare professionals, a list of healthcare organizations (n = 237) specialized in elderly care, nursing homes and elderly home care in the Netherlands was formed. Additionally, the researchers utilized their network to distribute the survey to healthcare organizations such as mentioned earlier in this paper. The data analysis of the survey data was conducted using SPSS v27. 5 Results In this section, the results from the data collection and analysis are presented and will be further discussed. The results will be divided into four sub-sections: tasks, work pressure, elderly people, and social robot requirements. In total, a total of 181 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 520 participants submitted the survey out of which 12 were excluded because they were not healthcare professionals, resulting in 169 valid responses 5.1 Tasks The category ‘Tasks’ covers the tasks healthcare professionals could not perform due to lack of time. This also included the tasks the social robot could assist with. The top five tasks that are not performed due to lack of time are (as shown in figure 1): 1) making conversation, 2) listening to music, 3) physiotherapy, 4) helping elderly persons with reminders, and 5) extra tasks (calling the general practitioner or the pharmacy). When asked in the survey, which tasks the robot could assist with, the top five most given answers were: listening to music, making conversation, providing reminders, physiotherapy and preparing medication, as shown in figure 2. Figure 1: Top 5 tasks that are not performed when there is not enough time left Figure 2: Five most given answers where the robot could assist with S. van den Eijkel, D. Foppen-de Graaf, R. Schuurmans, S. van Genderen, K. Smit & S. Leewis: Social Robots in Elderly Healthcare: A Burden or a Gift? 5.2 521 Work pressure The category ‘Work pressure’ covers the work pressure experienced by healthcare professionals or informal caregivers. The majority (n = 154) of the healthcare professionals indicated that they experience work pressure. In the survey, the following question was posed, “Do you think a social robot can assist you with certain tasks?”. The majority (n = 134) indicated that a social robot could help reducing work pressure. 5.3 Elderly people The category ‘Elderly people’ covers whether the usage of reminders could help the elderly live longer at home and what other functions a social robot could help the elderly to live longer at home. In the survey, the majority (n = 148) of the healthcare professionals indicated that a social robot could assist the elderly with reminders, as shown in figure 3. Figure 3: Features that could help elderly people stay home longer 5.4 Social robot requirements The category ‘Social robot requirements’ covers the requirements of a social robot from the perspective of the healthcare professionals, as it is important for the social robot to be accepted by the users (Tempels, 2016). The answers from the healthcare workers on the questions about certain requirements and embodiment features of a 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 522 social robot are: if the eyes of a social robot mimic human-like behaviour (blinking, look at the elderly person and winking) would scare the elderly person (Yes n = 21, No n = 149), if the social robot should move its torso and arms when speaking (Yes n = 142, No n = 27), what type of voice a social robot should have (Male n = 7, Female n = 133, Sexless n = 29), and if a notification sound should be played before a reminder (Yes n = 126, No n = 43). 6 Discussion The interviews, experiments and survey results revealed a number of interesting findings for implementation of social robots in elderly healthcare. These concerns, for example, the acceptance of the social robot among the elderly and healthcare workers, but also about the tasks that a robot could assist with. These topics will be discussed in more detail below. 6.1 Tasks and work pressure It is considered worrisome that, sometimes, certain tasks such as washing elderly people or physiotherapy are not performed due to a lack of time. The majority (n = 154) of the healthcare professionals already indicate that they experience work pressure. The research showed that the social robot can reduce workload in the daily structure, such as reducing work pressure, assist with their daily tasks, and further improve the healthcare system. Healthcare professionals indicated that the social robot has the potential to assist them in tasks like listening to music, conversating, reminders, and physiotherapy. This supports Forlizzi's study, which indicates that a social robot can support the care worker in providing care (Forlizzi et al., 2004). Interestingly, these are also most of the tasks that are not performed when there is a lack of time. 6.2 Elderly people Implementing the Alpha Mini robot could lead to elderly people live longer at home trough features such as reminders, alarms, and ensuring the safety of the user. Healthcare professionals indicated that there is currently no way to check if an elderly person took their medicine. The healthcare professional also indicated that it is important that the healthcare professional or informal caregiver and the elderly person are prepared for the implementation of a social robot to further improve the S. van den Eijkel, D. Foppen-de Graaf, R. Schuurmans, S. van Genderen, K. Smit & S. Leewis: Social Robots in Elderly Healthcare: A Burden or a Gift? 523 success of such implementations at the home of the elderly person. This proves the findings of Tempels that people in the near vincinity of elderly people strongly impact the success of an implementation of new technology (Tempels, 2016). 6.3 Social robot requirements The findings of Turja indicated that it’s important for stakeholders to be involved in the development of a social robot to improve adaption of social robots in the healthcare sector (Turja et al., 2018). Our findings showed that healthcare professionals have several requirements for social robots in elderly healthcare. The vast majority (n = 134) of healthcare professionals indicated that the social robot could assist elderly people with their daily structure through reminders. Furthermore, the healthcare professionals prefer (n = 133) a social robot with a female voice and that the social robot should first play a notification sound before telling a reminder (n = 126). Other features such as the eyes, ability to move its torso/arms while talking answers were divided between the healthcare professionals. Some (n = 21) did find that, for example, the eyes would be scary for an elderly person but the common idea was that it greatly depends on the individual if it is perceived as scary. Adding the possibility to change or disable certain features, for example, the eyes on an individual basis would be a feature to prevent this issue and to make it more compatible for a specific elderly person. 7 Conclusion In this research, we aim to answer the following research question: ‘How can a social robot help provide care more effectively, so that healthcare professionals can spend more time on tasks that they would like to perform, but now do not have enough time for and help the elderly to be able to live longer at home?’ In order to do so, the goal of this research is to identify which tasks a social robot can assist with and how the social robot could accomplish that, in providing care for elderly persons in healthcare at home, helping healthcare professionals to work more efficiently and help elderly persons to live longer at home. Trough the survey data we identified that there is a big potential for the use of social robots in elderly healthcare, especially in its use for assistance in retaining their daily structure trough providing reminders. It seems that the reminders have great potential to help healthcare professionals reducing their work pressure and tasks. Also, it seems that the elderly will be able to 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 524 live longer at home, but the data collected does not provide a definitive answer to this. However, the data does show how a social robot could assist healthcare professionals and identifies which requirements should be taken into account for the further development of the Alpha Mini robot. 7.1 Limitations This research has multiple limitations. The first limitation was caused by Covid-19 restrictions like restricted access to the elderly and impacted the implementation of social robots at the homes of elderly persons. Therefore, the researchers couldn't install, demonstrate and observe the social robot in combination with the elderly, so it had to be outsourced to the supplier of the Alpha Mini robot. This meant that the observation data was all second-hand data gathered through intermediaries. This is a threat to validity and reliability, which resulted in omitting the data from the results and the conclusions in this paper and study. The second limitation was also caused by Covid-19 restrictions. A lot of nursing homes and healthcare professionals did not have sufficient time for the experiment, causing the social robot implementations to be cancelled. The third limitation is related to the survey design, which caused the researchers to not be able to do certain analyses required to prove the trustworthiness and the significance of the results, therefore we solely discuss the descriptive data of the survey in this paper. However, the literature (Moharana et al., 2019; Turja et al., 2018) suggests that there needs to be more attention towards the requirements for healthcare professionals while designing a social robot, which this research still has contributed to and our results provide sufficient insights into. Although it seems that the use of a social robot has potential in elderly healthcare, there is still plenty of research left to conduct. 7.2 Future research Future research should focus on observations with social robots for reminders and assisting elderly people with their daily structure, which was intended in this study. In future research, elderly people need to be involved in the design process of the social robot, because the elderly are the user of the social robot, next to healthcare workers. This should be directly observed in future research to get more reliable results on the efficacy of a social robot in this context. Future research should also focus on creating architectures based on requirement categories so that a framework S. van den Eijkel, D. Foppen-de Graaf, R. Schuurmans, S. van Genderen, K. Smit & S. Leewis: Social Robots in Elderly Healthcare: A Burden or a Gift? 525 can be created. Such a reference framework could then be utilized to address requirements in different situations, making knowledge on requirements for utilizing social robots situationally applicable. References Abdi, J., Al-Hindawi, A., Ng, T., & Vizcaychipi, M. P. (2018). Scoping review on the use of socially assistive robot technology in elderly care. BMJ Open, 8(2). https://doi.org/10.1136/bmjopen2017-018815 Alaiad, A., & Zhou, L. (2014). The determinants of home healthcare robots adoption: An empirical investigation. International Journal of Medical Informatics, 83(11), 825–840. Albert van der Horst, Frank van Erp, & Jasper de Jong. (2011). Trends in gezondheid en zorg. Centraal Planbureau. Arne Björnberg, & Ann Yung Phang, RN, B.A. (2019). Euro health consumer index 2018. Health Consumer Powerhouse. Belpaeme, T., Kennedy, J., Ramachandran, A., Scassellati, B., & Tanaka, F. (2018). Social robots for education: A review. In Science Robotics (Vol. 3, Issue 21, p. eaat5954). Bemelmans, R., Gelderblom, G. J., Jonker, P., & de Witte, L. (2012). Socially Assistive Robots in Elderly Care: A Systematic Review into Effects and Effectiveness. Journal of the American Medical Directors Association, 13(2), 114–120.e1. https://doi.org/10.1016/j.jamda.2010.10.002 Bouwhuis, D. G. (2016). Current use and possibilities of robots in care. Gerontechnology, 15(4). 0 Boynton, P. M., & Greenhalgh, T. (2004). Hands-on guide to questionnaire research: Selecting, designing, and developing your questionnaire. In British Medical Journal (Vol. 328, Issue 7451, pp. 1312–1315). https://doi.org/10.1136/bmj.328.7451.1312 Breazeal, C. (2011). Social robots for health applications. Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS, 5368–5371. Broadbent, E., Stafford, R., & MacDonald, B. (2009). Acceptance of healthcare robots for the older population: Review and future directions. International Journal of Social Robotics, 1(4), 319– 330. Bryant, A., & Charmaz, K. (2012). The SAGE Handbook of Grounded Theory. In The SAGE Handbook of Grounded Theory. SAGE Publications Ltd. https://doi.org/10.4135/9781848607941 Campa, R., & Campa, R. (2016). The rise of social robots : a review of the recent literature. Journal of Evolution and Technology, 26(1). de Kervenoael, R., Hasan, R., Schwob, A., & Goh, E. (2020). Leveraging human-robot interaction in hospitality services: Incorporating the role of perceived value, empathy, and information sharing into visitors’ intentions to use social robots. Tourism Management, 78, 104042. Duffy, B. R. (2003). Anthropomorphism and the social robot. Robotics and Autonomous Systems, 42(3–4), 177–190. https://doi.org/10.1016/S0921-8890(02)00374-3 Eijkel, S. van den. (2021). OSF | Social robots in elderly healthcare: a burden or a gift? https://osf.io/65zua/?view_only=795dc300c6ab472db0a98c5011f9b850 Etikan, I. (2017). Sampling and Sampling Methods. Biometrics & Biostatistics International Journal, 5(6). Field, A. (2013). Andy Field - Discovering Statistics Using IBM SPSS Statistics. In Lavoisier.Fr (5e ed., pp. 1–816). SAGE Publications Ltd. Flandorfer, P. (2012). Population Ageing and Socially Assistive Robots for Elderly Persons: The Importance of Sociodemographic Factors for User Acceptance. International Journal of Population Research, 2012, 1–13. https://doi.org/10.1155/2012/829835 Forlizzi, J., DiSalvo, C., & Gemperle, F. (2004). Assistive robotics and an ecology of elders living independently in their homes. Human-Computer Interaction, 19(1–2), 25–59. 526 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Frennert, S., & Östlund, B. (2014). Review: Seven Matters of Concern of Social Robots and Older People. International Journal of Social Robotics, 6(2), 299–310. Góngora Alonso, S., Hamrioui, S., De La Torre Díez, I., Motta Cruz, E., López-Coronado, M., & Franco, M. (2019). Social Robots for People with Aging and Dementia: A Systematic Review of Literature. In Telemedicine and e-Health (Vol. 25, Issue 7, pp. 533–540). Greenberg, N. E., Wallick, A., & Brown, L. M. (2020). Impact of COVID-19 Pandemic Restrictions on Community-Dwelling Caregivers and Persons With Dementia. Psychological Trauma: Theory, Research, Practice, and Policy. https://doi.org/10.1037/tra0000793 Harmo, P., Taipalus, T., Knuuttila, J., Vallet, J., & Halme, A. (2005). Needs and solutions - Home automation and service robots for the elderly and disabled. https://doi.org/10.1109/IROS.2005.1545387 Henkel, A. P., Čaić, M., Blaurock, M., & Okan, M. (2020). Robotic transformative service research: deploying social robots for consumer well-being during COVID-19 and beyond. Journal of Service Management, 31(6), 1131–1148. https://doi.org/10.1108/JOSM-05-2020-0145 Hennink, M., Hutter, I., & Bailey, A. (2020). Qualitative Research Methods (A. Owens (Ed.); 2nd ed.). SAGE Publications Ltd. Hoorn, J. (2017). De wereld heeft zorgrobots nodig. In Wetenschappelijk Bureau GroenLinks. https://wetenschappelijkbureaugroenlinks.nl/artikel/de-wereld-heeft-zorgrobots-nodig Huq Khandkar, S. (2009). Open Coding. Interactive Robotics. (2021). Innovatieve en interactieve robots in het onderwijs en de zorg. https://www.interactive-robotics.com/ Joshi, G. P., Acharya, S., Kim, C. S., Kim, B. S., & Kim, S. W. (2014). Smart Solutions in Elderly Care Facilities with RFID System and Its Integration with Wireless Sensor Networks. International Journal of Distributed Sensor Networks, 2014(8), 713946. https://doi.org/10.1155/2014/713946 Kachouie, R., Sedighadeli, S., Khosla, R., & Chu, M. T. (2014). Socially Assistive Robots in Elderly Care: A Mixed-Method Systematic Literature Review. International Journal of HumanComputer Interaction, 30(5), 369–393. https://doi.org/10.1080/10447318.2013.873278 Medido. (2021). Medido. https://medido.com Moharana, S., Panduro, A. E., Lee, H. R., & Riek, L. D. (2019). Robots for Joy, Robots for Sorrow: Community Based Robot Design for Dementia Caregivers. ACM/IEEE International Conference on Human-Robot Interaction, 2019-March, 458–467. https://doi.org/10.1109/HRI.2019.8673206 NOS. (2020, September). SER slaat alarm: groot personeelstekort in de zorg. https://nos.nl/l/2337769 Phu, U., & Garbrah, W. (2020). The Impact of Artificial Intelligence on Healthcare for Elderly A Literature Review The Impact of Artificial Intelligence on Healthcare for Elderly A Literature Review Degree programme in Nursing. http://www.theseus.fi/handle/10024/343950 Qu, S. Q., & Dumay, J. (2011). The qualitative research interview. In Qualitative Research in Accounting and Management (Vol. 8, Issue 3, pp. 238–264). https://doi.org/10.1108/11766091111162070 Robillard, J. M., Cleland, I., Hoey, J., & Nugent, C. (2018). Ethical adoption: A new imperative in the development of technology for dementia. Alzheimer’s and Dementia, 14(9), 1104–1113. Robinson, H., MacDonald, B., & Broadbent, E. (2014). The Role of Healthcare Robots for Older People at Home: A Review. International Journal of Social Robotics, 6(4), 575–591. Schumacher, J. (2017, September). Cijfers: vergrijzing en toenemende zorg | Kennisplein Zorg voor Beter. 22-05. https://www.zorgvoorbeter.nl/veranderingen-langdurige-zorg/cijfers vergrijzing Share, P., & Pender, J. (2018). Preparing for a Robot Future? Social Professions, Social Robotics and the Challenges Ahead. Irish Journal of Applied Social Studies, 18(1), 4. https://doi.org/10.21427/D7472M Sofaer, S. (2002). Qualitative research methods. International Journal for Quality in Health Care, 14(4), 329–336. https://doi.org/10.1093/intqhc/14.4.329 S. van den Eijkel, D. Foppen-de Graaf, R. Schuurmans, S. van Genderen, K. Smit & S. Leewis: Social Robots in Elderly Healthcare: A Burden or a Gift? 527 SoftBank Robotics. (2020). Pepper and NAO in the service of the Healthcare sector. https://www.softbankrobotics.com/emea/en/industries/healthcare Tempels, J. (2016). De beleving van technologie door ouderen bij hun gezondheidszorg en de rol van hun omgeving [Universiteit Gent]. https://lib.ugent.be/fulltxt/RUG01/002/350/335/RUG01-002350335_2017_0001_AC.pdf The World Bank Group. (2021). GDP per capita (current US$) - Netherlands | Data. https://data.worldbank.org/indicator/NY.GDP.PCAP.CD?locations=NL Tinyrobot. (2015). Tessa ondersteunt zelfregie, zelfstandig wonen en biedt zorg. Turja, T., Van Aerschot, L., Särkikoski, T., & Oksanen, A. (2018). Finnish healthcare professionals’ attitudes towards robots: Reflections on a population sample. Nursing Open, 5(3), 300–309. UB Tech. (2021). Alpha Mini. https://www.ubtrobot.com/products/alpha-mini?ls=en Vivago. (2021). Vivago. ZorgHorloge. http://zorghorloge.nl/ World Health Organization, W. (2020). Environments Decade of Healthy Ageing. World Health Organisation. https://www.who.int/docs/default-source/decade-of-healthy-ageing/full decade-proposal/decade-proposal-fulldraft-en.pdf?sfvrsn=8ad3385d_6 528 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE HELLO, IS SOMEONE THERE? A CASE STUDY FOR USING A SOCIAL ROBOT IN DEMENTIA CARE KOEN SMIT,1 MATTHIJS SMAKMAN,1 SIL BAKKER,2 JURGEN BLOKHUIS,2 GUIDO EVERTZEN2 & LARS POLMAN2 1 HU University of Applied Sciences Utrecht, Digital Ethics, the Netherlands; e-mail: koen.smit@hu.nl, matthijs.smakman@hu.nl 2 HU University of Applied Sciences Utrecht, the Netherlands; e-mail: sil.bakker@student.hu.nl, jurgen.blokhuis@student.hu.nl, guido.evertzen@student.hu.nl, lars.polman@student.hu.nl Abstract Social Robotics is becoming more relevant for the healthcare sector as an increasing amount of research and development is invested by researchers and practice. One research area where additional research would help the acceptation and adoption of social robots is intramural care where people with dementia live. The current body of knowledge on this topic can be described as nascent. In this study, we add to the body of knowledge regarding the design and enactment of social robots like the one used in this study, the Tessa robot, with the goal to improve acceptation and adoption of social robots in dementia care. To do so, we conducted a case study at a healthcare organization, featuring semi-structured interviews, observations and talking mats. During this case study, an experiment was carried out in which a Tessa robot was used in intramural care with three clients suffering from dementia. The most important finding of this study is that for the robot to be accepted and effective it must be implemented properly in the existing healthcare processes, otherwise it might serve as a companion, but will not relieve the workload of healthcare workers. DOI https://doi.org/10.18690/978-961-286-485-9.38 ISBN 978-961-286-485-9 Keywords: social robot, dementia, case study, intramural care, tessa 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 530 1 Introduction The overall life expectancy in the world is increasing steadily for the last decades (Roser, Ortiz-Ospina, & Ritchie, 2019). For example, since the 1950s, average life expectancy in The Netherlands has increased by 10 years from 71 to 81 years (van der Aalst, 2019), which is similar to other western countries. An aging population introduces new social challenges related to physical and mental issues, one of these issues is dementia. The estimated number of people with dementia worldwide is ~ 46.8 million people. Every 3.2 seconds someone is diagnosed with dementia (Bouwhuis, 2016). It is estimated that this number will double every 20 years and by 2030 there will be ~ 75 million people living with dementia worldwide (DomínguezRué & Nierling, 2016). At the time of writing this paper there is no medicine available that completely supresses or eliminates dementia symptoms nor does a cure exist. However, there are forms of treatments that can partially suppress the symptoms and thus improve the quality of life of a client. An example of this is Animal Assisted Therapy (AAT), in which animals are used in therapy sessions (Downes, Dean, & Bath‐Hextall, 2013). Research indicates that, in some countries, there are not enough health-care workers (HW’s) available. Which, in turn, could result in a decline in the quality of care for people with dementia (Domínguez-Rué & Nierling, 2016). Due to the shortage, a majority of HW’s ( ~60%), has to work extra shifts, often with fewer people (van der Aalst, 2019). The number of on-call workers is also increasing due to these shortages. More than two thirds of the on-call workers indicate that the workload has increased in the past year. This puts the quality of care under pressure, and it affects the mental and physical well-being of HW’s. Already 71% of HW’s indicate experiencing more stress (van der Aalst, 2019). Social robots could support HW’s and potentially aid people with dementia. In this paper, the definition of a social robot is used: "a physically embodied robot that communicates autonomously with humans and other autonomous physical robots in a way that is conducive to its own goals and those of its environment" (Duffy, 2003). In the situation of an aging population and shortages in health care workforce, social robots can attribute to the well-being of the aging population suffering from dementia (from here on referred to as: clients) by supporting and taking over certain tasks from HW’s. Social robots can be used, for example, for monitoring clients and for the use of therapy K. Smit, M. Smakman, S. Bakker, J. Blokhuis, G. Evertzen &L. Polman: Hello, is Someone There? A Case Study for Using a Social Robot in Dementia Care 531 (Valentí Soler et al., 2015a). The sensors of social robots can respond to changes in the environment (movements, sound), allowing them to interact with clients. Potential advantages that complement HW’s are, for example, that robots can work longer and take up less space and need less care (Valentí Soler et al., 2015a). The Dutch government made funds available to improve the quality of care in nursing homes, with funds rising to a structural amount of € 2.1 billion per year in 2021 (van der Aalst, 2019). Part of this budget is spent on home automation, which includes social robots. This financial stimulus led to multiple nursing homes in the Netherlands that started experimenting with social robots in their healthcare processes. One of these social robots is called Tessa, a flowerpot like robot (Robotzorg, 2021). The Tessa robot is a social robot that talks and is designed to support the daily structure of people with a cognitive disability and to provide suggestions for certain activities to them (Robotzorg, 2021). In the light of the aforementioned social challenges, Tessa could assist and take over care tasks from HW’s, thereby reducing current high workload’s, and improving the quality of care. Although social robots hold great potential, there are still challenges regarding the acceptance and effectiveness of social robots in dementia care. Therefore, this exploratory study aims to answer the following research question: ‘How can the acceptance and effectiveness of the Tessa robot for both HW’s and clients with dementia be improved?’ This paper is structured as follows. In the next section the background and related work are discussed. Then, in section three, the utilized research methods are detailed. In section four, the data analysis is explained. This is followed by the results in section five. The paper is concluded by presenting the discussion in section six, which is followed by the conclusions in section seven. Finally, future directions for future research are presented in section eight. 2 Background and Related Work In this section, we further ground the potential of social robots in the context of HW’s that care for elderly people with dementia. Acceptance and involvement of stakeholders is one of the key aspects when responsibly designing and implanting technology (Friedman, Kahn, Borning, & Huldtgren, 2013). Earlier research has 532 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE shown that usefulness, adaptability, enjoyment, sociability, companionship, and perceived behavioural control are important variables in social robotic acceptance (de Graaf & Ben Allouch, 2013). Furthermore, to determine whether and how social robots actually meets real-world needs, it is important to study these robots in ecologically valid settings (de Graaf, Somaya, & van Dijk, 2016). In general, people have positive attitudes towards social robots and are willing to interact with them, according to a large, standardized study with a combined sample of over 13,000 participants (Naneva, Sarda Gou, Webb, & Prescott, 2020). Research in elderly care reveals that the attitudes of elderly towards social robots are more often positive than negative (Savela, Turja, & Oksanen, 2018), the same holds for people with dementia (Whelan et al., 2018). These findings are promising for our study as we aim to experiment with social robots in the natural environment, whereby the perspective of stakeholders is important for the successful implementation of this new technology. 2.1 The needs of clients suffering from dementia The physical needs of people with dementia are more often met than the emotional needs (Miguel et al., 2016), (Visser & Vandemeulebroucke, 2018). Personal contact with care workers or family has a positive effect on people with dementia, it reduces the chance of loneliness and depression (Miguel et al., 2016). Other studies show that, by increasing the daily structure and amount of personal contact, dementia symptoms are less likely to develop further (van Beek, Frijters, Wagner, Groenewegen, & Ribbe, 2011), (Mordoch, Osterreicher, Guse, Roger, & Thompson, 2013). With these contributions, we would like to bring attention to the influence of dementia associated motivational and emotional disorders on the positive affective state that interactions with social robots are able to prompt. Social robots could utilize existing methods that support these issues such as exercises, images, and sound (Qwiek, 2021). 2.2 The needs and acceptance of (in)formal HW’s The (technological) support that is most used in dementia care is often limited to a mobile or desktop interface (Alnanih & Ormandjieva, 2016). The main focus of these tools is to help entertain and keep people with dementia active. However, there are few supportive solutions that relieve the (in)formal HW’s (Tyack & Camic, 2017), K. Smit, M. Smakman, S. Bakker, J. Blokhuis, G. Evertzen &L. Polman: Hello, is Someone There? A Case Study for Using a Social Robot in Dementia Care 533 (Cheng, 2017). Until now, social robots have not been used extensively in healthcare (Turja, Van Aerschot, Särkikoski, & Oksanen, 2018). For robots to be accepted and used, it is essential that HW’s are included in the design process of the social robots (Góngora Alonso et al., 2019a), (Moharana, Panduro, Lee, & Riek, 2019), (Robillard, Cleland, Hoey, & Nugent, 2018). Compared to elderly people investigated in different studies, HW’s are generally less positive about using social robots in their context, however, after exposing HW’s to a social robot, positive attitude towards a social robot seems to be higher (Savela et al., 2018). Although, not all HW’s have a positive attitude regarding social robots; the acceptance of robots in healthcare seems to be strongly linked to the HW’s moral considerations (van Kemenade, Hoorn, & Konijn, 2018). In the context of this research, social robots are studied to relieve HW’s from repetitive tasks such as reminding clients with regards to, e.g., exercises, food or drink moments, and social activities, which matches the work of (Góngora Alonso et al., 2019; Valentí Soler et al., 2015). This also stems from the fact that healthcare organizations are not seeking to replace HW’s by social robots, but to lower work pressure for them (Valentí Soler et al., 2015). 2.3 Social Robot: Tessa Previous studied related to the Tessa robot in a dementia care context have been conducted. In 2019, (Casaccia et al., 2019) set up an eWare platform for the Tessa robot based on qualitative and quantitative data collection from dementia clients, (in)formal HW’s and healthcare managers. The functionalities of the Tessa robot seem to meet the needs of HW’s and people with dementia (Casaccia et al., 2019), (Miguel et al., 2016), (Johnson et al., 2020). For example, a recurring theme is daily structure, something that all stakeholders and dementia clients in particular benefit from (van Beek et al., 2011), (Mordoch et al., 2013), (Miguel et al., 2016). Scientific research has yet to be conducted into the effectiveness of the Tessa robot. As mentioned in the previous section, the increase in the number of people with dementia (caused by aging) will not decrease (Domínguez-Rué & Nierling, 2016), which means that research on technological support, such as the Tessa robot, is necessary. Effectiveness of Tessa will be measured by taking into account both the 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 534 interaction between the robot and the client, and the reduction of workload for HW’s. 3 Research Method The research field of social robotics related to the application of social robots in nursing homes is relatively nascent; either relatively small qualitative samples are analysed, or large meta-level reviews are conducted (Savela et al., 2018; Whelan et al., 2018). When a research field is nascent, new constructs still need to be identified and relations between these constructs should be established (Edmondson & Mcmanus, 2007), which is often characterized by exploratory (qualitative) research. To achieve this, a case study at a nursing home was executed. Case study research is a technique that can be used to explore a broad scope of complex issues, particularly when human behaviour and social interactions are of importance (Pervan & Maimbo, 2005). This study comprised a holistic case study approach (Runeson & Höst, 2008), focusses on the context of nursing homes for people with dementia (permanent and closed care facility). This way, the intervention (Tessa) can be evaluated in the natural context for which it is designed. Also, when the boundaries between the intervention (Tessa) and the context are not clearly evident, multiple sources of empirical evidence are used (Pervan & Maimbo, 2005), which is taken into account in our case study approach. The people with dementia in our case study, gave consent to participate in this research themselves, as well as via their responsible healthcare worker and their direct family members. In this cases study we will focus on both the people with dementia (clients) as well as the HW’s related to these clients in combination with the Tessa robot. During this case-study, data was collected using three different methods: 1) semi-structured interviews, 2) naturalistic observations, and 3) Talking Mats. All data was collected in The Netherlands between August 2020 and December 2020. 3.1 Case Study This case study was conducted in close cooperation with a large healthcare organization in the Netherlands that operates multiple facilities for different types of healthcare with a total of 777 FTE’s, which was based on convenience sampling. The clients that participated on our study were selected and approached by the K. Smit, M. Smakman, S. Bakker, J. Blokhuis, G. Evertzen &L. Polman: Hello, is Someone There? A Case Study for Using a Social Robot in Dementia Care 535 healthcare organisation. To study the social robot and its users in the most natural context, each client was provided a Tessa robot in their living room for twelve days. 3.2 Semi-structured interviews The first method of data collection in this case study are semi-structured interviews, which allow the research team to gather qualitative data during two phases. The first phase is utilized to elicitate requirements from HW’s regarding the workings of the Tessa robot. The second phase is utilized to gather data on the acceptance and the effectiveness of the Tessa robot. During the course of eight weeks, four digital and seven physical interviews were conducted with HW’s, which were selected in cooperation with the management of the organization, taking into account that the HW’s are connected to the selected clients in the experiment and known each other. The goals of the interviews with HW’s were to learn about the various daily activities and the needs of both the HW’s and the clients. Whilst conducting the interview an interview protocol was utilized, which increases repeatability and comparability of the results (Castillo-Montoya, 2016). Also, different protocols were used before and after the experiment. The protocol's themes and corresponding questions focused on: 1) current experience with social robots, 2) perceived value of social robots, 3) added value of Tessa in the context of the HW, 4) involving clients and HW's in the development proces, 5) pro's and con's of Tessa after the experiment, 6) preceived value for the client, and 7) experienced values for HW's. The questions were openended, allowing for discussion and relevant deviation when deemed nessesary by the researchers. The interviews have been audio recorded and transcribed after the interview, for which all participants provided verbal consent. The average length of the interviews was 28 minutes, the longest being 44 minutes and shortest being 8 minutes. 3.3 Observations The second method of data collection in this case-study are naturalistic observations. The goal of these observations was perceiving and recording the effects that the Tessa robot had on the clients. One observation has been conducted per client. To ensure reliability, it was made sure that all clients had been using the Tessa robot during a timeframe of equal length (twelve days). Each observation was held on the Monday of the second week of use, after seven days of usage, where two observers independently filled in the protocol. All three duo’s of researchers were different as 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 536 well to mitigate potential bias. Every client had a daily schedule with activities that take place on each day. This schedule was manually programmed onto each Tessarobot by the research team, based on the schedule received by the responsible HW. Programming the robot was performed using mytinybo.io, which is a platform used to synchronize commands with the robot, via Wi-Fi. Based on this, it would announce these activities at predetermined times, during the experiment. The announcements start at 8AM and end at 10PM, with at least one announcement every hour. The observations were organized during 10AM and 2:30PM. During the observations, a predetermined observation protocol was used. The protocol was created using the Interactive Behaviour Codification System (Andrés, Pardo, Díaz, & Angulo, 2015). This system is used for grading the interactive behaviour between humans and robots, which makes it very suitable for the observations as part of this case study. The form consists of eight distinct categories (perceived emotions, proxemics, gaze, etc.), which are then each divided in sub-categories (such as joy, focused gaze, etc.). For each observation moment, two research team members individually filled in the protocol, to improve reliability. 3.4 Talking Mats Talking Mats is a technique which helps people with cognitive disabilities communicate during interview sessions (Murphy, Gray, Cox, & Joseph Rowntree Foundation, 2007). This method is easy to prepare, suitable to be conducted during the covid-19 pandemic and meets the criteria for better communication for the clients. Talking Mats consists of three kinds of cards: 1. Subject – what the conversation is about and what the options are paired to. In this case: the Tessa robot. 2. Options – in this case, the announcements, which Tessa made to the clients. A total of eight images have been made and used, one for each type of announcement. 3. Scale – the clients were able to communicate their opinion of the different options by pairing the cards with the respective grades, which reflect their emotions and feelings about a subject: negative, neutral or positive. K. Smit, M. Smakman, S. Bakker, J. Blokhuis, G. Evertzen &L. Polman: Hello, is Someone There? A Case Study for Using a Social Robot in Dementia Care 537 The cards with the different options were then presented to the client. The session was conducted in cooperation with a HW, who was experienced in communicating with the clients. Due to covid-19 restrictions, the cards were not placed by the client themselves since this would cause unnecessary physical contact. After a card was placed at one of the three gradings, a picture was taken to capture the results. This was repeated for each subject. 4 Data Analysis All interviews were recorded, transcribed and coded independently by three researchers. This process was conducted redundantly to eliminate coding bias as well as to improve the validity of the results (Armstrong, Gosling, Weinman, & Marteau, 1997). Coding was performed in AtlasTI. To analyse the transcriptions, the Toulmin’s framework was utilized (Toulmin, 2003), which consists of three elements: 1) Claims, 2) Grounds, and 3) Warrants. Finally, all codes were merged, and an assessment of the intercoder-agreement was made. Where no agreement was initially reached, the coders partook in a session where the codes were discussed, and consensus was reached, also described by Campbell as a "negotiated agreement" (Campbell, Quincy, Osserman, & Pedersen, 2013). To study the interaction between the client and the Tessa robot, an observationprotocol (Andrés et al., 2015) was used. The protocol utilizes the following variables that are recorded by each observant; 1) type of instruction, 2) emotions, 3) proxemics, 4) gaze, 5) communication, 6) facial expression, 7) body gestures, and 8) interaction with the robot. The data resulting from the observations was different than expected, because clients often were not in the room when the robot made an announcement. Therefore, in addition to the interaction with the robot, the presence of the client when the robot made an announcement was measured in percentages and included as well. This created a new angle to be explored during the interviews with HW’s after the experiment. The recorded responses of the clients resulting from the Talking Mats method were compared. This allowed for a comparison of clients’ views. The views served as additional input for the interview protocol used for the interviews that were held after the experiment with HW’s. The questions discussed as subjects during the 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 538 talking mats sessions with the clients were based on the full range of preprogrammed announcements executed by Tessa during the experiment, which in turn were based on the personal day-to-day programmes. 5 Results In the following sections we will present the results of each technique utilized seperatly. 5.1 Semi-structured interviews (before the experiment) This sub-section focuses on the interviews before the experiment. Of the 1062 total codes, the coders independently reached an agreement of 871 eligible codes. Which means an initial percentage match of 82.02%. In the observer agreement model of Landis and Koch (Landis & Koch, 1977) this falls into the “Almost Perfect” category, making the coding process reliable. Prior to the experiment, separate interviews were held with five HW’s working at the healthcare organisation. Additionally, an interview was held with a HW that had over two years of working experience with the Tessa in extramural dementia care. The knowledge gained from these interviews has been translated into functional requirements for the experiment and Tessa robot. Below we present the predominant requirements mentioned in the data. Input requirements:    (In)formal HW’s must be involved in the set-up of the robot because a personalized Tessa gets more response from the client compared to a standard Tessa; The physical and mental condition of the client must be good enough that he or she can hear and understand the Tessa properly. Formal HW’s must be included in the selection process to derive suitable clients for the experiment; Formal and informal HW’s must be instructed in the form of a training and / or by providing a manual. This enables HW’s to become properly prepared and self-reliant regarding how to handle the Tessa; K. Smit, M. Smakman, S. Bakker, J. Blokhuis, G. Evertzen &L. Polman: Hello, is Someone There? A Case Study for Using a Social Robot in Dementia Care  5.2 539 Other minor requirements that detail the day-programme of a particular client. For example, one of three clients required announcements to smoke, while another client required announcements about coming for lunch as the client usually forgets that particular moment. Observations In total, three researchers made observations during four and a half hours in the living room of the client. This method aimed at measuring the effectiveness of the Tessa robot by observing the response of the client. The Tessa robot succeeded in provoking a reaction out of one of the three clients. This was concluded because one of the clients responded twice to an announcement given by the robot. In an average of 88% of the announcements intended to relieve the HW’s, the HW’s themselves had already verbally given an announcement to the client before Tessa's announcement had triggered. As a result, both the client and the HW were regularly not in the room when Tessa made an announcement. On average, the clients were only present during roughly half of the announcement made by Tessa. Furthermore, only client 1 reacted 2 out of 6 times, in a neutral sense. The results of this process are presented in Table 1. Table 1: Observation results Client 1 2 3 Total Present 6 (no reaction) 5 (no reaction) 2 (2 reactions) 50% Absent 5 2 6 50% Attendance % 55% 71.4% 25% In the cases where the clients were present at the announcements, two of the three clients did not give a verbal response to the announcements from the Tessa robot. One type of announcement required verbal confirmation (the request for music) from the clients before the Tessa could proceed with the action. When the client gave an answer, the robot's microphone activated too late, which happened twice in the situation of client 3. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 540 5.3 Talking Mats The talking mats resulted to be effective in measuring the opinion of the clients; the research team managed to address all topics and gather a value for each of them. The results of the Talking Mats were as follows: 5.6% of the questions were answered with a negative value. The remainder of values registered consist of 47.2% neutral responses and 47.2%positive responses. Figure 1 shows the results per client. The horizontal axis represents the subject of the Tessa activity. Not all clients smoked cigarettes. Not everyone had to set the table either, so the number of questions per client differed by a maximum of two (minimum 11, maximum 13 questions). Client 1 had no further comments during the Talking Mats interview, she did not want to part ways with Tessa after the experiment. The HW told her she will receive a new robot one week after the experiment was completed. She told us client 1 was glad to have the robot back. Client 2 indicated twice that he views the Tessa robot the same as the HW’s. He also said that he will miss the music when Tessa is gone. This was later discussed with his HW, which indicated that she had never heard him respond to Tessa and music has never been played by the robot. All negative results were posed by client 3. During the talking mats session, this client indicated that 1) he thinks Tessa is too noisy and 2) he thinks Tessa, in general, is nonsense. In some cases, the client experienced the robot as disturbing because he was busy with something else. The HW indicated that the client does not allow himself to be commanded by a speech robot and that this is probably the cause of the negative values. The client indicated that he does what he wants and does not have to listen to the Tessa robot. The client did indicate that he understands the purpose and good intentions of the Tessa. K. Smit, M. Smakman, S. Bakker, J. Blokhuis, G. Evertzen &L. Polman: Hello, is Someone There? A Case Study for Using a Social Robot in Dementia Care 541 Negative Neutral Positive Talking Mats - Results Client 1 Client 2 Client 3 Figure 1: Talking mats results per subject 5.4 Semi-structured interviews (after the experiment) After the experiment, interviews were held with seven HW’s who worked with the Tessa robot, being three digital and four physical interviews. This led to additional requirements with regards to the context the Tessa is used in. Due to space constraints, not all requirements could be listed. Below we present the predominant requirements mentioned in the data. Validation requirements:    Involving HW’s: Understanding the physical and mental health of clients is not only important. It is also important for creating support. One of the HW’s had doubts beforehand about the usefulness of the robot. After seeing and experiencing the robot in use, she understood its purpose and was willing to use it. The HW’s’ trust in the Tessa robot: HW’s continue to check on the clients whether they actually go to the living room, after the Tessa gives instructions to do this. In fact, HW’s often already instructed clients from the room before the robot can give the instruction. The Tessa robot is not enough for every client to be stimulated, especially those who suffer from a more advanced stage of dementia. For example, 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 542 some clients need physical support in order to follow up on an instruction, which they do not always have access to. 6 Discussion This study and its results could be influenced by several limitations. The first limitation concerns the influence of the HW’s, which had often already reminded the client to get lunch or had already given a cigarette before Tessa provided an announcement. The HW’s thereby limited the possibility for the Tessa robot to support the clients. As a result, it can be concluded that the Tessa robot must be implemented properly in the existing healthcare processes in order to determine its effectiveness. This meant that the effect of the announcements from Tessa could not always be measured properly. This could affect the overall validity of the measured effect Tessa might have had in this context. The results of the observations were different than expected but contributed to one of the most important findings of the study: the implementation of the Tessa robot in the existing healthcare processes in which HW’s are an essential stakeholder is necessary to be able to use the Tessa effectively. A second limitation concerns the clinical situation of the clients. Tessa’s supplier indicated that it is important that Tessa’s users have a good short-term memory and good hearing. The clients who participated in this experiment were at an advanced stage of dementia. As a result, one could argue that the clients with a similar clinical situation are not part of the target group for the Tessa robot. This was discussed with the HW’s, that indicate that there are also clients who are in a less advanced stage of dementia. This limitation grounds further research using clients with a different clinical situation. A third limitation concerns the size of the experiment. Three clients participated in this experiment. While one could argue that the qualitative explorartory approach allows for such sample size, the outcome of the current approach are difficult to generalize outside of this specific context. K. Smit, M. Smakman, S. Bakker, J. Blokhuis, G. Evertzen &L. Polman: Hello, is Someone There? A Case Study for Using a Social Robot in Dementia Care 7 543 Conclusion The goal of this research was to identify how the acceptance and effectiveness of the Tessa robot could be improved. To achieve this, the following research question was answered, ‘How can the acceptance and effectiveness of the Tessa robot for both HW’s and people with dementia be improved?’ Our study shows that both acceptance and effectiveness are influenced by the HW’s and the clients. Several interviews revealed prejudices of HW’s about the use of (social) robots. By making both HW’s and clients more aware of the robot, not only the acceptance but possibly also its effectiveness of the robot could increase. This could potentially best be achieved by means of a learning program for the HW’s. The HW’s could attend a kick-off session and a simple, visual manual, that helps them to understand Tessa’s purpose and functionalities. It is presumed that the effectiveness increases because the HW’s can take the announcements into account and thus know when and how to rely on Tessa. Additionally, the findings show that, to increase the use of the Tessa, a hardware and software update is needed, e.g. improvement of the microphone capabilities as well as the addition of more interaction capabilities on top of the current response options. The functionalities currently are limited, with the consequence that for the target group described in this paper the robot could be effective as a companion, without achieving the goal of relieving announcement tasks of HW’s. Furthermore, it can be concluded that the stage of dementia has a great impact on the experience with Tessa. For clients in an intramural care unit, the disease is often more advanced than for people in home care (often extramural). This has an effect on how people respond to Tessa's announcements. The robot failed to respond to a majority of answers from the participants. Most importantly, for the robot to be accepted and effective, it must be implemented properly in the existing healthcare processes, otherwise it might serve as a companion, but will not relieve the workload of healthcare workers. 8 Future Research The findings provide multiple opportunities for future research. The first opportunity is to investigate how to increase the trust of HW’s in social robots. Those results might allow social robots to be used more effectively in healthcare. The second opportunity is to investigate the Tessa in home care (extramural). Clients 544 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE who receive home care are often classified in a lesser advanced stage of dementia and are therefore more independent. Another opportunity emerged from the interviews and observations, where HW’s believe that the robot needs a humanoid shape that can stimulate the clients better (e.g., arms and legs). Future research could therefore focus on whether the Tessa robot can be modified or whether another robot is more suitable for activating people with dementia. The last opportunity for future research is the speech recognition of the Tessa robot. As indicated earlier, Tessa is now limited in its communication by its constrained interpretation abilities. The Tessa can only understand "yes" or "no" when a music moment has been scheduled. It would be interesting to see whether a robot with speech recognition stimulates clients more, as they get a response to the things they say to Tessa. Moreover, during the observations, it happened several times that the clients already answered before the microphone of the robot was turned on. Such delayed interactions significantly hampered the effectiveness of Tessa. Future research should focus on improving the speech recognition so that the microphone is switched on, taking into account the privacy and safety aspects of the client. Acknowledgements We would like to thank Jochem Ooijevaar for his support during this study. Furthermore, we would like to thank the healthcare workers and clients that participated in this study. References Alnanih, R., & Ormandjieva, O. (2016). Mapping HCI Principles to Design Quality of Mobile User Interfaces in Healthcare Applications. Procedia Computer Science, 94, 75–82. https://doi.org/10.1016/j.procs.2016.08.014 Andrés, A., Pardo, D. E., Díaz, M., & Angulo, C. (2015). New instrumentation for human robot interaction assessment based on observational methods. Journal of Ambient Intelligence and Smart Environments, 7(4), 397–413. https://doi.org/10.3233/AIS-150331 Armstrong, D., Gosling, A., Weinman, J., & Marteau, T. (1997). The Place of Inter-Rater Reliability in Qualitative Research: An Empirical Study. Sociology, 31(3), 597–606. Bouwhuis, D. G. (2016). Current use and possibilities of robots in care. Gerontechnology, 15(4), 198– 208. Campbell, J. L., Quincy, C., Osserman, J., & Pedersen, O. K. (2013). Coding In-depth Semistructured Interviews: Problems of Unitization and Intercoder Reliability and Agreement. Sociological Methods & Research, 42(3), 294–320. Casaccia, S., Revel, G. M., Scalise, L., Bevilacqua, R., Rossi, L., Paauwe, R. A., … Nap, H. H. (2019). Social Robot and Sensor Network in Support of Activity of Daily Living for People with Dementia. In R. Brankaert & W. IJsselsteijn (Eds.), Dementia Lab 2019. Making Design Work: Engaging with Dementia in Context (Vol. 1117, pp. 128–135). Cham: Springer. K. Smit, M. Smakman, S. Bakker, J. Blokhuis, G. Evertzen &L. Polman: Hello, is Someone There? A Case Study for Using a Social Robot in Dementia Care 545 Castillo-Montoya, M. (2016). Preparing for Interview Research: The Interview Protocol Refinement Framework. The Qualitative Report, 21(5), 811–831. Cheng, S.-T. (2017). Dementia Caregiver Burden: a Research Update and Critical Analysis. Current Psychiatry Reports, 19(9), 64. https://doi.org/10.1007/s11920-017-0818-2 de Graaf, M. M. A., & Ben Allouch, S. (2013). Exploring influencing variables for the acceptance of social robots. Robotics and Autonomous Systems, 61(12), 1476–1486. de Graaf, M., Somaya, B. A., & van Dijk, J. (2016). Long-Term Acceptance of Social Robots in Domestic Environments: Insights from a User’s Perspective. In AAAI Spring Symposia. Domínguez-Rué, E., & Nierling, L. (Eds.). (2016). Ageing and technology: perspectives from the social sciences. Bielefeld: Transcript. Downes, M. J., Dean, R., & Bath‐Hextall, F. J. (2013). Animal‐assisted therapy for people with serious mental illness. Cochrane Database of Systematic Reviews, (12). Duffy, B. R. (2003). Anthropomorphism and the social robot. Robotics and Autonomous Systems, 42(3), 177–190. https://doi.org/10.1016/S0921-8890(02)00374-3 Edmondson, A. C., & Mcmanus, S. E. (2007). Methodological Fit in Management Field Research. Proceedings of the Academy of Management, 32(4), 1155–1179. Friedman, B., Kahn, P. H., Borning, A., & Huldtgren, A. (2013). Value Sensitive Design and Information Systems. In The handbook of information and computer ethics (pp. 55–95). Góngora Alonso, S., Hamrioui, S., de la Torre Díez, I., Motta Cruz, E., López-Coronado, M., & Franco, M. (2019a). Social Robots for People with Aging and Dementia: A Systematic Review of Literature. Telemedicine and E-Health, 25(7), 533–540. Góngora Alonso, S., Hamrioui, S., de la Torre Díez, I., Motta Cruz, E., López-Coronado, M., & Franco, M. (2019b). Social Robots for People with Aging and Dementia: A Systematic Review of Literature. Telemedicine and E-Health, 25(7), 533–540. https://doi.org/10.1089/tmj.2018.0051 Johnson, M. J., Johnson, M. A., Sefcik, J. S., Cacchione, P. Z., Mucchiani, C., Lau, T., & Yim, M. (2020). Task and Design Requirements for an Affordable Mobile Service Robot for Elder Care in an All-Inclusive Care for Elders Assisted-Living Setting. International Journal of Social Robotics, 12(5), 989–1008. https://doi.org/10.1007/s12369-017-0436-5 Landis, J. R., & Koch, G. G. (1977). The Measurement of Observer Agreement for Categorical Data. Biometrics, 33(1), 159. https://doi.org/10.2307/2529310 Miguel, S., Alvira, M., Farré, M., Risco, E., Cabrera, E., & Zabalegui, A. (2016). Quality of life and associated factors in older people with dementia living in long-term institutional care and home care. European Geriatric Medicine, 7(4), 346–351. https://doi.org/10.1016/j.eurger.2016.01.012 Moharana, S., Panduro, A. E., Lee, H. R., & Riek, L. D. (2019). Robots for Joy, Robots for Sorrow: Community Based Robot Design for Dementia Caregivers. In 2019 14th ACM/IEEE International Conference on Human-Robot Interaction (HRI) (pp. 458–467). Daegu, Korea (South): IEEE. https://doi.org/10.1109/HRI.2019.8673206 Mordoch, E., Osterreicher, A., Guse, L., Roger, K., & Thompson, G. (2013). Use of social commitment robots in the care of elderly people with dementia: A literature review. Maturitas, 74(1), 14–20. Murphy, J., Gray, C. M., Cox, S., & Joseph Rowntree Foundation. (2007). Communication and dementia: how Talking Mats can help people with dementia to express themselves. York: Joseph Rowntree Foundation. Naneva, S., Sarda Gou, M., Webb, T. L., & Prescott, T. J. (2020). A Systematic Review of Attitudes, Anxiety, Acceptance, and Trust Towards Social Robots. International Journal of Social Robotics, 12(6), 1179–1201. https://doi.org/10.1007/s12369-020-00659-4 Pervan, G., & Maimbo, M. (2005). Designing a case study protocol for application in IS research. In Proceedings of the Ninth Pacific Asia Conference on Information Systems (pp. 1281–1292). PACIS. Qwiek. (2021). Belevingsgerichte zorg met zorgondersteuning. Retrieved March 23, 2021, from https://www.qwiek.eu/up 546 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Robillard, J. M., Cleland, I., Hoey, J., & Nugent, C. (2018). Ethical adoption: A new imperative in the development of technology for dementia. Alzheimer’s & Dementia, 14(9), 1104–1113. Robotzorg. (2021). Tessa, sociale robot. Retrieved March 23, 2021, from https://www.robotzorg.nl/product/tessa-sociale-robot/ Roser, M., Ortiz-Ospina, E., & Ritchie, H. (2019). Life Expectancy. Retrieved from https://ourworldindata.org/life-expectancy# Runeson, P., & Höst, M. (2008). Guidelines for conducting and reporting case study research in software engineering. Empirical Software Engineering, 14(2), 131. Savela, N., Turja, T., & Oksanen, A. (2018). Social Acceptance of Robots in Different Occupational Fields: A Systematic Literature Review. International Journal of Social Robotics, 10(4), 493– 502. Toulmin, S. E. (2003). The Uses of Argument. The Press Syndicate of the University of Cambridge. Turja, T., Van Aerschot, L., Särkikoski, T., & Oksanen, A. (2018). Finnish healthcare professionals’ attitudes towards robots: Reflections on a population sample. Nursing Open, 5(3), 300–309. Tyack, C., & Camic, P. M. (2017). Touchscreen interventions and the well-being of people with dementia and caregivers: a systematic review. International Psychogeriatrics, 29(8), 1261–1280. Valentí Soler, M., Agüera-Ortiz, L., Olazarán Rodríguez, J., Mendoza Rebolledo, C., Pérez Muñoz, A., Rodríguez Pérez, I., … Martínez Martín, P. (2015a). Social robots in advanced dementia. Frontiers in Aging Neuroscience, 7. https://doi.org/10.3389/fnagi.2015.00133 Valentí Soler, M., Agüera-Ortiz, L., Olazarán Rodríguez, J., Mendoza Rebolledo, C., Pérez Muñoz, A., Rodríguez Pérez, I., … Martínez Martín, P. (2015b). Social robots in advanced dementia. Frontiers in Aging Neuroscience, 7(133). https://doi.org/10.3389/fnagi.2015.00133 van Beek, A. P. A., Frijters, D. H. M., Wagner, C., Groenewegen, P. P., & Ribbe, M. W. (2011). Social engagement and depressive symptoms of elderly residents with dementia: a cross-sectional study of 37 long-term care units. International Psychogeriatrics, 23(4), 625–633. van der Aalst, M. (2019). Factsheet Zorg. UWV Afdeling Arbeidsmarktinformatie en –advies. Retrieved from https://www.uwv.nl/overuwv/kennis-cijfers-en onderzoek/arbeidsmarktinformatie/factsheet-zorg-2019.aspx van Kemenade, M., Hoorn, J., & Konijn, E. (2018). Healthcare Students’ Ethical Considerations of Care Robots in The Netherlands. Applied Sciences, 8(10), 1712. Visser, G., & Vandemeulebroucke, T. (2018). Sociale robots voor thuiswonende mensen met dementie: plezier of bittere noodzaak? Geron, 20(4), 60–63. https://doi.org/10.1007/s40718-018-0179x Whelan, S., Murphy, K., Barrett, E., Krusche, C., Santorelli, A., & Casey, D. (2018). Factors Affecting the Acceptability of Social Robots by Older Adults Including People with Dementia or Cognitive Impairment: A Literature Review. International Journal of Social Robotics, 10(5), 643–668. A FOLLOW-UP ON THE CHANGES IN THE USE INTENTION OF DIGITAL WELLNESS TECHNOLOGIES AND ITS ANTECEDENTS OVER TIME: THE USE OF PHYSICAL ACTIVITY LOGGER APPLICATIONS AMONG YOUNG ELDERLY IN FINLAND MARKUS MAKKONEN,1,2 TUOMAS KARI1,2 & LAURI FRANK3 1 Institute for Advanced Management Systems Research, Turku, Finland; e-mail: markus.v.makkonen@jyu.fi, tuomas.t.kari@jyu.fi 2 University of Jyvaskyla, Jyvaskyla, Finland; e-mail: markus.v.makkonen@jyu.fi, tuomas.t.kari@jyu.fi 3 University of Jyvaskyla, Faculty of Information Technology, Jyvaskyla, Finland; e-mail: lauri.frank@jyu.fi Abstract This study aims to further promote the understanding of the antecedents of the acceptance and use of digital wellness technologies among elderly people through a follow-up to our two prior studies, one which examines the potential longer-term temporal changes in the use intention of digital wellness technologies and its antecedents in the case of the young elderly segment and physical activity logger applications. We base this examination theoretically on UTAUT2 and empirically on survey data that is collected from 92 Finnish young elderly users of a physical activity logger application in three subsequent time points and analysed with partial least squares structural equation modelling (PLS-SEM). We find that the initial strong decline in the scores of the antecedent constructs and use intention becomes weaker as the construct scores stabilise over time, whereas especially the effects of performance expectancy and effort expectancy on use intention remain relatively unstable. DOI https://doi.org/10.18690/978-961-286-485-9.39 ISBN 978-961-286-485-9 Keywords: digital wellness technologies, physical activity logger applications, young elderly, follow-up, UTAUT2, partial least squares 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 548 1 Introduction Physical inactivity has become an increasingly prevalent problem among elderly people (Sun, Norman & While, 2013), thus raising a call for new and innovative ways to promote their levels of physical activity. One potential way to do this are different types of digital wellness technologies, such as smartphone and smartwatch applications, which have been found very promising in terms of promoting the levels of physical activity not only among young but also among elderly people (e.g., McGarrigle & Todd, 2020). In addition to elderly people in general, their potential has been highlighted especially in the more specific segment of young elderly, which consists of people aged approximately 60–75 years (e.g., Carlsson & Walden, 2016). However, there is a lack of prior studies that have examined the antecedents of the acceptance and use of digital wellness technologies among elderly people, particularly from a longitudinal perspective of how their use evolves after the initial acceptance. These kinds of longitudinal studies can be considered highly important in the context of digital wellness technologies because, as it is suggested in theories like the lived informatics model of personal informatics (Epstein, Ping, Fogarty & Munson, 2015), the use of these technologies, especially those aimed at self-tracking, is often characterised by “lapses” in their use. This suggests that the intention to use the technologies and its antecedents do not remain constant but change over time. However, in prior information systems (IS) literature, such temporal changes have not been studied from the perspective of technology acceptance and use. The objective of this study is to address this gap in prior research by studying how the use intention of digital wellness technologies and its antecedents among elderly people potentially change over time. We examine this research question in the case of the young elderly segment and one common type of digital wellness technology: physical activity logger applications. By physical activity logger applications, we refer to mobile applications that enable users to keep track of their physical activities in everyday life as well as view different types of reports about them. As the theoretical foundation for conceptualising the antecedents of the intention to use physical activity logger applications and formulating the research model for examining the potential temporal changes in use intention and its antecedents, we use UTAUT2 by Venkatesh, Thong, and Xu (2012), which is one of the most comprehensive and established IS theories for explaining technology acceptance and use in consumer contexts, such as the one of this study. In turn, as the empirical data for the M. Makkonen, T. Kari & L. Frank: A Follow-Up on the Changes in the Use Intention of Digital Wellness Technologies and Its Antecedents Over Time: The Use of Physical Activity Logger Applications Among Young Elderly in Finland 549 examination, we use survey data that is collected from 92 Finnish young elderly users of a physical activity logger application in three subsequent time points and analysed with partial least squares structural equation modelling (PLS-SEM). The study was conducted as part of our broader DigitalWells research program, which focuses on young elderly in Finland and in which the participants are provided for free both a physical activity logger application to keep track of their daily physical activities as well as the training and support for setting up and using it. The study is a follow-up to our two prior studies (Makkonen, Kari & Frank, 2020, 2021), in which we initially proposed and tested our research model for explaining the acceptance and use of digital wellness technologies in the case of young elderly and physical activity logger applications as well as examined the potential changes in use intention and its antecedents between about four months and about 12 months of use. Here, this time span is extended to about 18 months, thus enabling the examination of even longer-term changes. After this introductory section, we describe in more detail the research model and the research methodology of the study in Sections 2 and 3. This is followed by reporting of the research results in Section 4. The results are discussed in more detail in Section 5 before concluding the paper with a brief discussion about the limitations of the study and some potential paths of future research in Section 6. 2 Research Model As already mentioned above, the research model of the study is based on UTAUT2 by Venkatesh et al. (2012), which is an extension of the unified theory of acceptance and use of technology (UTAUT) by Venkatesh, Morris, Davis, and Davis (2003) from organisational to consumer contexts. UTAUT2 has been applied to explain technology acceptance and use in numerous IS contexts, including also the context of mobile health and fitness applications and devices (e.g., Yuan, Ma, Kanthawala & Peng, 2015; Duarte & Pinho, 2019; Talukder, Chiong, Bao & Malik, 2019; Dhiman, Arora, Dogra & Gupta, 2020; Beh, Ganesan, Iranmanesh & Foroughi, 2021) and the context of elderly users (e.g., Macedo, 2017). However, none of these prior studies have combined the two contexts by examining, for example, the acceptance and use of physical activity logger applications among young elderly, as it is done in this study. In UTAUT2, the behavioural intention (BI) to use a particular technology is 550 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE hypothesised to be positively affected by seven antecedents (Venkatesh et al., 2012): performance expectancy (PE – i.e., the degree to which using a technology will provide benefits to consumers in performing certain activities), effort expectancy (EE – i.e., the degree of ease associated with consumers’ use of technology), social influence (SI – i.e., the extent to which consumers perceive that important others believe they should use a particular technology), facilitating conditions (FC – i.e., consumers’ perceptions of the resources and support available to perform a behaviour), hedonic motivation (HM – i.e., the fun or pleasure derived from using a technology), price value (PV – i.e., the consumers’ cognitive trade-off between the perceived benefits of the technology and the monetary cost for using it), and habit (HT – i.e., the extent to which people tend to perform behaviours automatically because of learning). In addition, UTAUT2 hypothesises three moderators for the effects of these seven antecedents on use intention: age, gender, and experience. However, due to the limited sample size of this study, these moderators are omitted from the research model. In addition, we omit two of the seven antecedents: facilitating conditions and price value. These were considered irrelevant in the present study because the application was free for all the participants and they all had the same resource requirements for taking part in the research program (e.g., owning a smartphone on which the application can be installed) as well as were given the same training and support for setting up and using the application, thus assumably resulting in very low variance in their perceptions of these issues. Finally, as in many studies on technology acceptance and use, the research model also concentrates on explaining only use intention and not actual use behaviour (UB). The final research model of the study, with the omitted constructs and effects presented as dashed, is illustrated in Figure 1. M. Makkonen, T. Kari & L. Frank: A Follow-Up on the Changes in the Use Intention of Digital Wellness Technologies and Its Antecedents Over Time: The Use of Physical Activity Logger Applications Among Young Elderly in Finland 551 Figure 1: Research model (the dashed constructs and effects are omitted in this study) 3 Methodology The data for the study was collected from the participants of our research program in three subsequent surveys. These were conducted in autumn 2019 after about four months of using the application, in summer 2020 after about 12 months of using the application, and in winter 2021 after about 18 months of using the application. In the remainder of this paper, these three time points, respectively, are referred to as T1, T2, and T3. The first survey was administered as a pen-and-paper survey in face-to-face group meetings with the participants, whereas the second and third survey were both administered as online surveys due to the ongoing COVID-19 pandemic. Because Finland has two official languages, the participants had the option to respond to the surveys in either Finnish or Swedish. In the surveys, each construct of the research model was measured reflectively by three indicators. All the indicators were adapted from the study by Venkatesh et al. (2012) and their wordings in English are reported in Table 1. The measurement scale was a sevenpoint Likert scale ranging from one (strongly disagree) to seven (strongly agree). Because we wanted to avoid forced responses, the participants also had the option not to respond to a particular item, which resulted in a missing value. 552 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Table 1: Indicator wordings Indicator PE1 PE2 PE3 EE1 EE2 EE3 SI1 SI2 SI3 HM1 HM2 HM3 HT1 HT2 HT3 BI1 BI2 BI3 Wording I find the app useful in achieving my daily exercise goals. Using the app helps me achieve my exercise goals more quickly. Using the app increases my efficiency in achieving my exercise goals. Learning how to use the app to achieve my exercise goals is easy for me. I find using the app to achieve my exercise goals easy. It is easy for me to become skilful at using the app to achieve my exercise goals. People who are important to me think that I should use the app to achieve my exercise goals. People who influence my behaviour think that I should use the app to achieve my exercise goals. People whose opinions I value prefer that I use the app to achieve my exercise goals. Using the app to achieve my exercise goals is fun. Using the app to achieve my exercise goals is enjoyable. Using the app to achieve my exercise goals is entertaining. The use of the app to achieve my exercise goals has become a habit for me. I am addicted to using the app to achieve my exercise goals. I must use the app to achieve my exercise goals. I intend to continue using the app to achieve my exercise goals. I will always try to use the app to achieve my exercise goals. I plan to use the app regularly to achieve my exercise goals. Due to the limited sample size of this study, the collected data was analysed with variance-based structural equation modelling (VB-SEM), more specifically partial least squares structural equation modelling (PLS-SEM). As a statistical software for PLS-SEM, we used SmartPLS 3.3.3 by Ringle, Wende, and Becker (2015). We also followed carefully the previously published guidelines for conducting PLS-SEM in IS research given by Hair, Hollingsworth, Randolph, and Chong (2017). For example, in accordance with the given guidelines, we used mode A as the indicator weighting mode of the constructs, path weighting as the weighting scheme, +1 as the initial weights, and < 10-7 as the stop criterion in model estimation, whereas the statistical significance of the model estimates was tested by using bootstrapping with 5,000 subsamples. As the threshold for statistical significance, we used p < 0.05. The potential missing values were handled by using mean replacement. M. Makkonen, T. Kari & L. Frank: A Follow-Up on the Changes in the Use Intention of Digital Wellness Technologies and Its Antecedents Over Time: The Use of Physical Activity Logger Applications Among Young Elderly in Finland 553 The estimated model consisted of three submodels, which were otherwise identical and formulated based on the research model illustrated in Figure 1, but which were estimated by using the data collected at T1, T2, and T3, respectively. The three submodels were also connected by so-called carry-over effects (cf. Roemer, 2016), which were used to examine how the scores of a specific construct at a previous time point (i.e., T1 or T2) affect the scores of that same construct at a subsequent time point (i.e., T2 or T3). After estimating the model and evaluating the reliability and validity of its three submodels at both construct and indicator levels, the potential changes in the estimated construct scores and effect sizes from T1 to T2 and from T2 to T3 were examined. This examination followed the procedure proposed by Roemer (2016) for evolution models with panel data (also referred to as model type A.1 in her paper). First, the statistical significance of the changes in the means of the estimated unstandardised construct scores from T1 to T2 and from T2 to T3 were tested by using the parametric Student’s paired samples t-test. Its results were additionally confirmed by using the nonparametric Wilcoxon (1945) signed-rank test if the compared means were not found to be normally distributed as suggested by the Shapiro-Wilk (1965) test. Second, the estimated size of each effect at a previous time point (i.e., T1 or T2) was compared against the 95% biascorrected and accelerated (BCa) confidence interval (cf. Hair, Hult, Ringle & Sarstedt, 2017) of the estimated size of that same effect at a subsequent time point (i.e., T2 or T3). If the estimate at the previous time point did not fall within the confidence interval of the estimate at the subsequent time point, then the change in the effect size could be considered statistically significant. 4 Results In total, 115 participants provided valid responses to the survey at T1, of which 99 participants did so also at T2 (a drop-out rate of 13.9%), and of which 92 participants did so also at T3 (a drop-out rate of 7.1%). The descriptive statistics of these three samples in terms of the gender, age, and response language of the participants as well as a subjective assessment of their level of physical activity are reported in Table 2. As can be seen, the drop-outs did not result in any considerable changes in the sample profiles. As the sample for this particular study, we used the last-mentioned sample of 92 participants who had provided valid responses to the survey at all the three time points. Of them, about two-thirds were women and over nine out of ten 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 554 assessed their level of physical activity as moderate or higher. Their age ranged from 49 to 79 years, with a mean of 69.1 years and a standard deviation of 4.7 years. Although some of the participants were slightly younger or older than our target young elderly segment consisting of people aged approximately 60–75 years, we decided not to omit these people from the study due to our limited sample size. Table 2: Sample statistics Gender Man Woman Age Under 60 years 60–64 years 65–69 years 70–74 years 75 years or over Language Finnish Swedish Level of physical activity Very high High Moderate Low Very low Totally passive 4.1 T1 (N = 115) N % T2 (N = 99) N % T3 (N = 92) N % 43 72 37.4 62.6 34 65 34.3 65.7 32 60 34.8 65.2 3 11 44 39 18 2.6 9.6 38.3 33.9 15.7 2 10 39 35 13 2.0 10.1 39.4 35.4 13.1 2 8 38 32 12 2.2 8.7 41.3 34.8 13.0 69 46 60.0 40.0 63 36 63.6 36.4 60 32 65.2 34.8 1 18 84 4 8 0 0.9 15.7 73.0 3.5 7.0 0.0 1 16 73 3 6 0 1.0 16.2 73.7 3.0 6.1 0.0 1 15 68 3 5 0 1.1 16.3 73.9 3.3 5.4 0.0 Model Estimation The estimation results of the three submodels in terms of the standardised size and statistical significance of the effects of the antecedent constructs on use intention at T1, T2, and T3 are reported in Table 3. As the reported values show, at all the three time points, the effects of hedonic motivation and habit were found to be positive and statistically significant, whereas the effect of social influence was found to be statistically not significant. In contrast, performance expectancy was found to have a positive and statistically significant effect at T1 and T3, but a statistically not significant effect at T2, whereas effort expectancy was found to have a positive and statistically significant effect at T2, but a statistically not significant effect at T1 and M. Makkonen, T. Kari & L. Frank: A Follow-Up on the Changes in the Use Intention of Digital Wellness Technologies and Its Antecedents Over Time: The Use of Physical Activity Logger Applications Among Young Elderly in Finland 555 T3. In terms of explanatory power, the proportion of explained variance (R2) in use intention was 72.7% at T1, 77.3% at T2 and 83.2% at T3. Table 3: Effects on use intention (*** = p < 0.001, ** = p < 0.01, * = p < 0.05) PE → BI EE → BI SI → BI HM → BI HT → BI T1 T2 Size 95% CI Size 95% CI Size 0.348** [0.140, 0.567] 0.091 [-0.129, 0.324] 0.337** 0.064 [-0.092, 0.225] 0.324*** [0.177, 0.493] 0.077 0.025 [-0.109, 0.146] 0.091 [-0.041, 0.207] -0.047 0.247** [0.069, 0.420] 0.243** [0.085, 0.399] 0.267* 0.308** [0.102, 0.509] 0.272* [0.069, 0.497] 0.227** T3 95% CI [0.143, 0.565] [-0.083, 0.278] [-0.202, 0.078] [0.019, 0.519] [0.060, 0.382] Table 4: Carry-over effects (*** = p < 0.001, ** = p < 0.01, * = p < 0.05) PE → PE EE → EE SI → SI HM → HM HT → HT BI → BI Size 0.453*** 0.295* 0.534*** 0.466*** 0.466*** 0.107* T1 → T2 R2 by T1 at T2 0.205 0.087 0.285 0.217 0.217 0.045 Size 0.707*** 0.624*** 0.600*** 0.801*** 0.763*** 0.146 T2 → T3 R2 by T2 at T3 0.500 0.389 0.360 0.641 0.582 0.110 In turn, Table 4 reports the standardised size and statistical significance of the carryover effects between the constructs of the three submodels as well as the proportion of explained variance (R2) in the scores of a specific construct at a subsequent time point by the scores of that same construct at a previous time point. As the reported values show, all the carry-over effects except for the one concerning use intention between T2 and T3 were found to be statistically significant. All the carry-over effects also seemed to be considerably stronger between T2 and T3 in comparison to T1 and T2, meaning that the construct scores provided by the participants became more stable over time. The only slight exceptions to this were the carry-over effects concerning social influence and use intention, which remained approximately equally strong between T1 and T2 as well as T2 and T3. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 556 4.2 Construct Reliability and Validity Table 5: Construct statistics PE EE SI HM HT BI T1 T2 T3 T1 T2 T3 T1 T2 T3 T1 T2 T3 T1 T2 T3 T1 T2 T3 CR 0.908 0.898 0.904 0.876 0.879 0.940 0.930 0.861 0.902 0.932 0.903 0.949 0.815 0.875 0.870 0.891 0.913 0.895 AVE 0.766 0.746 0.759 0.703 0.707 0.840 0.816 0.675 0.754 0.820 0.756 0.860 0.597 0.700 0.691 0.733 0.777 0.741 PE 0.875 0.864 0.871 0.464 0.586 0.572 0.485 0.513 0.635 0.677 0.742 0.830 0.698 0.754 0.793 0.772 0.759 0.850 EE SI HM HT BI 0.838 0.841 0.917 0.297 0.452 0.369 0.472 0.520 0.674 0.474 0.529 0.564 0.495 0.706 0.653 0.903 0.822 0.868 0.533 0.391 0.595 0.478 0.484 0.510 0.491 0.538 0.522 0.906 0.869 0.927 0.667 0.642 0.729 0.732 0.727 0.843 0.773 0.837 0.831 0.758 0.755 0.810 0.856 0.881 0.861 Construct reliabilities were evaluated by examining the composite reliability (CR) of each construct (Fornell & Larcker, 1981), which is commonly expected to be greater than or equal to 0.7 (Nunnally & Bernstein, 1994). The CR of each construct at T1, T2, and T3 is reported in the first column of Table 5, showing that all the constructs at all the three time points clearly met this criterion. In turn, construct validities were evaluated by examining the convergent and discriminant validities of the constructs by using two criteria based on the average variance extracted (AVE) of each construct (Fornell & Larcker, 1981). In order to exhibit satisfactory convergent validity, the first criterion requires that each construct should have an AVE of at least 0.5. The AVE of each construct at T1, T2, and T3 is reported in the second column of Table 5, showing that all the constructs at all the three time points met also this criterion. In turn, in order to exhibit satisfactory discriminant validity, the second criterion requires that each construct should have a square root of AVE greater than or equal to its absolute correlation with the other model constructs. The square root of AVE of each construct at T1, T2, and T3 (on-diagonal cells) and the correlations between the constructs at T1, T2, and T3 (off-diagonal cells) are M. Makkonen, T. Kari & L. Frank: A Follow-Up on the Changes in the Use Intention of Digital Wellness Technologies and Its Antecedents Over Time: The Use of Physical Activity Logger Applications Among Young Elderly in Finland 557 reported in the remaining columns of Table 5, showing that also this criterion was met by all the constructs at all the three time points. 4.3 Indicator Reliability and Validity Table 6: Indicator statistics (*** = all loadings have p < 0.001) PE1 PE2 PE3 EE1 EE2 EE3 SI1 SI2 SI3 HM1 HM2 HM3 HT1 HT2 HT3 BI1 BI2 BI3 Mean 5.682 5.284 5.216 6.330 6.143 5.747 4.264 4.603 5.219 5.739 5.906 5.141 6.135 4.241 5.136 5.869 5.595 5.841 T1 SD NA 1.474 4.3% 1.494 12.0% 1.572 4.3% 1.155 1.1% 1.179 1.1% 1.495 1.1% 2.130 21.7% 2.110 26.1% 1.797 20.7% 1.255 4.3% 1.076 7.6% 1.536 7.6% 1.333 3.3% 1.935 9.8% 1.717 4.3% 1.495 8.7% 1.262 8.7% 1.437 4.3% λ*** 0.863 0.892 0.870 0.832 0.882 0.799 0.916 0.925 0.868 0.932 0.894 0.891 0.758 0.712 0.842 0.858 0.808 0.899 Mean 5.473 4.722 4.945 5.811 5.934 5.167 4.090 3.939 4.538 5.352 5.270 4.571 5.833 3.956 4.615 5.831 4.822 5.523 T2 SD NA 1.515 1.1% 1.696 2.2% 1.656 1.1% 1.564 2.2% 1.315 1.1% 1.691 2.2% 1.949 15.2% 1.990 10.9% 1.855 13.0% 1.456 1.1% 1.643 3.3% 1.634 1.1% 1.448 2.2% 1.914 1.1% 1.855 1.1% 1.487 3.3% 1.680 2.2% 1.470 4.3% λ*** 0.855 0.833 0.902 0.851 0.809 0.862 0.860 0.770 0.832 0.859 0.894 0.854 0.841 0.839 0.831 0.904 0.873 0.867 Mean 5.045 4.943 4.878 5.978 5.826 5.477 3.975 3.695 4.679 5.011 5.185 4.611 5.231 3.899 4.333 5.639 4.890 5.379 T3 SD NA 1.685 3.3% 1.564 4.3% 1.648 2.2% 1.382 1.1% 1.573 0.0% 1.576 4.3% 2.124 14.1% 2.141 10.9% 2.042 15.2% 1.742 1.1% 1.630 0.0% 1.733 2.2% 1.820 1.1% 1.995 3.3% 1.818 2.2% 1.551 9.8% 1.722 1.1% 1.713 5.4% λ*** 0.896 0.824 0.892 0.934 0.938 0.876 0.903 0.880 0.820 0.945 0.903 0.934 0.840 0.819 0.834 0.841 0.864 0.877 Indicator reliabilities and validities were evaluated by using the standardised loading (λ) of each indicator, which are reported at T1, T2, and T3 in Table 6 together with the mean and standard deviation (SD) of the indicator scores as well as the percentage of missing values (NA). In the typical case where each indicator loads on only one construct, its standardised loading is commonly expected to be statistically significant and greater than or equal to 0.707 (Fornell & Larcker, 1981). As the reported values show, all the indicators at all the three time points met this criterion. 558 4.4 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Changes in Construct Scores Table 7: Construct scores and the changes in construct scores PE EE SI HM HT BI T1 T2 T3 ΔT1→T2 ΔT2→T3 Mean SD Mean SD Mean SD Mean SD Mean SD 5.396 1.279 5.077 1.387 4.957 1.405 -0.320 1.398 -0.120 1.069 6.082 1.056 5.670 1.260 5.770 1.367 -0.412 1.385 0.101 1.143 4.726 1.584 4.219 1.475 4.120 1.698 -0.507 1.479 -0.099 1.434 5.634 1.111 5.077 1.356 4.931 1.570 -0.557 1.292 -0.146 0.946 5.265 1.229 4.925 1.417 4.531 1.538 -0.340 1.378 -0.394 1.025 5.754 1.141 5.411 1.336 5.317 1.389 -0.343 1.346 -0.094 0.961 Table 8: Testing of the changes in construct scores PE EE SI HM HT BI ΔT1→T2 Student’s t-test Wilcoxon test t df p z p -2.192 91 0.031 -1.429 0.153 -2.854 91 0.005 -2.746 0.006 -3.287 91 0.001 -3.754 < 0.001 -4.132 91 < 0.001 -4.188 < 0.001 -2.366 91 0.020 -2.481 0.013 -2.446 91 0.016 -2.924 0.003 ΔT2→T3 Student’s t-test Wilcoxon test t df p z p -1.078 91 0.284 -1.150 0.250 0.844 91 0.401 -1.215 0.224 -0.661 91 0.510 -0.289 0.773 -1.479 91 0.143 -1.335 0.182 -3.684 91 < 0.001 -3.559 < 0.001 -0.940 91 0.350 -0.537 0.591 In terms of the changes in construct scores, Table 7 reports the means and standard deviations (SD) of the estimated unstandardised construct scores at T1, T2, and T3 as well as the means and standard deviations (SD) of the changes in them from T1 to T2 and from T2 to T3. As can be seen, the participants had relatively high scores in the case of all the constructs at all the three time points, but the scores seemed to decline over time, more drastically from T1 to T2 and less drastically from T2 to T3. The statistical significance of these changes was tested by using both parametric and nonparametric testing because most of the compared construct mean scores were not found to be normally distributed. The results of these tests are reported in Table 8, showing that from T1 to T2, the changes in the construct mean scores were found to be statistically significant in the case of all the antecedent constructs except potentially for performance expectancy, in the case of which the statistical significance of the change suggested by parametric testing could not be confirmed M. Makkonen, T. Kari & L. Frank: A Follow-Up on the Changes in the Use Intention of Digital Wellness Technologies and Its Antecedents Over Time: The Use of Physical Activity Logger Applications Among Young Elderly in Finland 559 by nonparametric testing. In contrast, from T2 to T3, the changes in the construct mean scores were found to be statistically significant only in the case of habit. 4.5 Changes in Effect Sizes In terms of the changes in effect sizes, Table 3 additionally reports the 95% confidence interval (CI) of the estimated size of each effect at T1, T2, and T3. As can be seen, the estimated size of the effects of performance expectancy and effort expectancy at T1 and T2, respectively, did not fall within the 95% CI of the estimated size of the same effects at T2 and T3, respectively, thus suggesting that the changes in the size of these effects from T1 to T2 and from T2 to T3 were statistically significant. More specifically, the effect of performance expectancy seemed to become weaker from T1 to T2 and stronger from T2 to T3, whereas the effect of effort expectancy seemed to become stronger from T1 to T2 and weaker from T2 to T3. In addition, the estimated size of the effect of social influence at T2 did not fall within the 95% CI of the estimated size of the same effect at T3, but this effect remained statistically not significant at both these two time points. 5 Discussion and Conclusions In this study, we examined the potential longer-term temporal changes in the use intention of digital wellness technologies and its antecedents in the case of the young elderly segment and physical activity logger applications. In comparison to our two prior studies (Makkonen et al., 2020, 2021), we made three main findings. First, we found that our research model continued to perform very well in explaining use intention also after about 18 months of using the application by being able to explain about 83% of its variance at T3 as well as having acceptable reliability and validity at both construct and indicator levels. Thus, it seems to be well suited also for longitudinal study settings in which the time span extends well beyond one year. Second, we found that the strong decline in the scores of the antecedent constructs and use intention from T1 to T2 became weaker in the case of most of the constructs from T2 to T3, which was also supported by the finding concerning the stabilisation of the construct scores over time. The only exception to this was habit, the scores of which continued to decline about as strongly between T2 and T3 as between T1 and T2, although its scores also became more stable over time. This initially strong but then increasingly weaker decline in the construct scores is most likely explained 560 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE by a novelty effect that causes a particular digital wellness technology to be first perceived very favourably by its potential users but these perceptions to converge towards realism as the use progresses, first more quickly, as also the hype concerning the technology is higher, but then more slowly. Third, we found that the effects of social influence, hedonic motivation, and habit on use intention continued to remain very stable between T2 and T3, as they did also between T1 and T2, whereas more instability could be observed in the effects of performance expectancy and effort expectancy. That is, whereas the effect of performance expectancy become weaker and the effect of effort expectancy stronger from T1 to T2, these changes were now reversed, with the effect of performance expectancy once again becoming stronger and the effect of effort expectancy weaker. What is actually causing this instability, as well as whether it is driven more by internal changes in the users themselves or external changes in their environment, requires more in-depth examinations. However, all in all, the aforementioned temporal changes in both the effects of the antecedent constructs on use intention and the scores of the antecedent constructs themselves would seem to provide some much-needed theoretical explanations for the “lapses” in the use of personal informatics or self-tracking technologies, such as physical activity logger applications, which have been suggested in theories like the lived informatics model of personal informatics (Epstein et al., 2015). In turn, from a more practical perspective, the findings of the study highlight the need for the providers of various digital wellness technology products and services to actively adapt their offerings to the aforementioned temporal changes as well as to continuously promote the novelty of their offerings through approaches like gamification (e.g., Kari, Piippo, Frank, Makkonen & Moilanen, 2016) and exergaming (e.g., Kari, 2014; Kari & Makkonen, 2014) in order to prevent the perceptions of the users from becoming less favourable as the initial novelty effect fades out. 6 Limitations and Future Research Like our two prior studies, this study can be considered to have three main limitations. First, the study focused on the specific case of physical activity logger applications and the Finnish young elderly segment, which is why future studies are called for to examine the generalisability of its findings to other types of digital wellness technologies and to the elderly population in general. Second, the research setting of the study does not fully correspond to the real-life market environment in M. Makkonen, T. Kari & L. Frank: A Follow-Up on the Changes in the Use Intention of Digital Wellness Technologies and Its Antecedents Over Time: The Use of Physical Activity Logger Applications Among Young Elderly in Finland 561 which consumers make decisions on technology acceptance and use. For example, the participants were provided for free both the application as well as the training and support for setting up and using it, without which factors like facilitating conditions and price value may also have played an important role as antecedents of use intention. Third, there were some participants who left the research program already before T1 or between T1 and T2 or T2 and T3, and, thus, had to be omitted from the study. Some of them may have been individuals who would have reported very low scores in terms of use intention and its antecedents and whose omission, consequently, may have introduced some bias in the data. In future studies, we aim to address these aforementioned limitations and to augment the preliminary results of this study by refining our research model as well as collecting data from more participants and over a longer period of time as our research program progresses. References Beh, P. K., Ganesan, Y., Iranmanesh, M., & Foroughi, B. (2021). Using smartwatches for fitness and health monitoring: The UTAUT2 combined with threat appraisal as moderators. Behaviour & Information Technology, 40(3), 282–299. doi:10.1080/0144929X.2019.1685597 Carlsson, C., & Walden, P. (2016). Digital wellness services for young elderly – A missed opportunity for mobile services. Journal of Theoretical and Applied Electronic Commerce Research, 11(3), 20–34. doi:10.4067/S0718-18762016000300003 Dhiman, N., Arora, N., Dogra, N., & Gupta, A. (2020). Consumer adoption of smartphone fitness apps: An extended UTAUT2 perspective. Journal of Indian Business Research, 12(3), 363– 388. doi:10.1108/JIBR-05-2018-0158 Duarte, P., & Pinho, J. C. (2019). A mixed methods UTAUT2-based approach to assess mobile health adoption. Journal of Business Research, 102, 140–150. doi:10.1016/j.jbusres.2019.05.022 Epstein, D. A., Ping, A., Fogarty, J., & Munson, S. A. (2015). A lived informatics model of personal informatics. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (pp. 731–742). New York, NY: ACM. doi:10.1145/2750858.2804250 Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50. doi:10.2307/3151312 Hair, J., Hollingsworth, C. L., Randolph, A. B., & Chong, A. Y. L. (2017). An updated and expanded assessment of PLS-SEM in information systems research. Industrial Management & Data Systems, 117(3), 442–458. doi:10.1108/IMDS-04-2016-0130 Hair, J. F., Jr., Hult, G. T. M., Ringle, C. M., & Sarstedt, M. (2017). A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM) (2nd ed.). Thousand Oaks, CA: Sage. Kari, T. (2014). Can exergaming promote physical fitness and physical activity: A systematic review of systematic reviews. International Journal of Gaming and Computer-Mediated Simulations, 6(4), 59–77. doi:10.4018/ijgcms.2014100105 Kari, T., & Makkonen, M. (2014). Explaining the usage intentions of exergames. In B. Tan, E. Karahanna & A. Srinivasan (Eds.), Proceedings of the 35th International Conference on Information Systems. Atlanta, GA: Association for Information Systems. Kari, T., Piippo, J., Frank, L., Makkonen, M., & Moilanen, P. (2016). To gamify or not to gamify? Gamification in exercise applications and its role in impacting exercise motivation. In J. 562 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Versendaal, C. Kittl, A. Pucihar & M. Kljajić Borštnar (Eds.), Proceedings of the 29th Bled eConference (pp. 393–405). Kranj, Slovenia: Moderna organizacija. Macedo, I. M. (2017). Predicting the acceptance and use of information and communication technology by older adults: An empirical examination of the revised UTAUT2. Computers in Human Behavior, 75, 935–948. doi:10.1016/j.chb.2017.06.013 Makkonen, M., Kari, T., & Frank, L. (2020). Applying UTAUT2 to explain the use of physical activity logger applications among young elderly. In A. Pucihar, M. Kljajić Borštnar, R. Bons, H. Cripps, A. Sheombar & D. Vidmar (Eds.), Proceedings of the 33rd Bled eConference (pp. 567– 582). Maribor, Slovenia: University of Maribor Press. Makkonen, M., Kari, T., & Frank, L. (2021). Changes in the use intention of digital wellness technologies and its antecedents over time: The use of physical activity logger applications among young elderly in Finland. In Proceedings of the 54th Hawaii International Conference on System Sciences (pp. 1202–1211). Honolulu, HI: University of Hawai’i at Mānoa. doi:10.24251/HICSS.2021.147 McGarrigle, L., & Todd, C. (2020). Promotion of physical activity in older people using mHealth and eHealth technologies: Rapid review of reviews. Journal of Medical Internet Research, 22(12), article e22201. doi:10.2196/22201 Nunnally, J. C., & Bernstein, I. H. (1994). Psychometric Theory (3rd ed.). New York, NY: McGrawHill. Ringle, C. M., Wende, S., & Becker, J.-M. (2015). SmartPLS 3. Bönningstedt, Germany: SmartPLS GmbH. Retrieved from https://www.smartpls.com Roemer, E. (2016). A tutorial on the use of PLS path modeling in longitudinal studies. Industrial Management & Data Systems, 116(9), 1901–1921. doi:10.1108/IMDS-07-2015-0317 Shapiro, S. S., & Wilk, M. B. (1965). An analysis of variance test for normality (complete samples). Biometrika, 52(3–4), 591–611. doi:10.2307/2333709 Sun, F., Norman, I. J., & While, A. E. (2013). Physical activity in older people: A systematic review. BMC Public Health, 13, article 449. doi:10.1186/1471-2458-13-449 Talukder, M. S., Chiong, R., Bao, Y., & Malik, B. H. (2019). Acceptance and use predictors of fitness wearable technology and intention to recommend: An empirical study. Industrial Management & Data Systems, 119(1), 170–188. doi:10.1108/IMDS-01-2018-0009 Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478. doi:10.2307/30036540 Venkatesh, V., Thong, J. Y. L., & Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly, 36(1), 157–178. doi:10.2307/41410412 Wilcoxon, F. (1945). Individual comparisons by ranking methods. Biometrics Bulletin, 1(6), 80–83. doi:10.2307/3001968 Yuan, S., Ma, W., Kanthawala, S., & Peng, W. (2015). Keep using my health apps: Discover users’ perception of health and fitness apps with the UTAUT2 model. Telemedicine and e-Health, 21(9), 735–741. doi:10.1089/tmj.2014.0148 THE EFFECTS OF CONSUMER DEMOGRAPHICS AND PAYMENT METHOD PREFERENCE ON PRODUCT RETURN FREQUENCY AND REASONS IN ONLINE SHOPPING MARKUS MAKKONEN,1 LAURI FRANK1 & TIINA KEMPPAINEN2 1 University of Jyvaskyla, Faculty of Information Technology, Jyvaskyla, Finland; e-mail: markus.v.makkonen@jyu.fi, lauri.frank@jyu.fi 2 University of Jyvaskyla, School of Business and Economics, Jyvaskyla, Finland; e-mail: tiina.j.kemppainen@jyu.fi Abstract In online shopping, product returns are very common. In order to reduce them, one must first understand who are making them and why are they being made. In this study, we aim to address these questions by examining product return behaviour from a consumer-centric rather than the more traditional product-centric, retailer-centric, and order-centric perspectives. More specifically, we focus on the effects of four demographic characteristics of consumers (i.e., gender, age, education, and income) as well as their payment method preference on their product return frequency and product return reasons. As the data, we use the responses from 560 Finnish online consumers, which were collected with an online survey and are analysed both quantitatively and qualitatively. We find gender, age, payment method preference, and average online shopping frequency to affect average product return frequency, whereas product return reasons were found to be affected by only gender and average product return frequency. DOI https://doi.org/10.18690/978-961-286-485-9.40 ISBN 978-961-286-485-9 Keywords: product return frequency, product return reasons, online shopping, demographics, payment method preference, logistic regression 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 564 1 Introduction In online shopping, returning a purchased product back to its seller is very common (Ofek, Katona & Sarvary, 2011). The product return rates in online shopping are about three times as high as in traditional brick-and-mortar shopping, and by 2022, about 13 billion products with a total worth of $573 billion have been forecasted to be returned annually in the United States alone (Deloitte, 2019). These high numbers can be considered problematic for both businesses and society at large. From a business perspective, product returns result in not only loss in sales but typically also in additional costs related to reverse logistics, return handling, and potentially throwing away the returned products if they cannot be resold (Ofek et al., 2011). In turn, from a social perspective, shipping products back and forth between sellers and buyers is far from being environmentally friendly or in line with the principles of sustainable electronic commerce (Oláh et al., 2019). Therefore, it makes sense to both business and society at large to aim at reducing product returns. However, to be able to do this, two fundamental questions must first be asked and answered: who are making the product returns and why are they being made? In prior research, these questions have traditionally been approached from a very product-centric, retailer-centric, or order-centric perspective, whereas the studies adopting a more consumer-centric perspective have been rare (cf. Section 2). In this study, our objective is to address this gap in prior research by examining exploratively (without any a priori hypotheses) the effects of four demographic characteristics of consumers (i.e., gender, age, education, and income) as well as their payment method preference (i.e., how do they typically prefer to pay when shopping online) on their product return frequency (i.e., how often do they make product returns) and product return reasons (i.e., why do they make product returns). As the data for this, we use the responses from 560 Finnish online consumers, which were collected with an online survey in 2019 and are analysed quantitatively by using ordinal and binomial logistic regression as well as qualitatively by using content analysis. After this introductory section, we will briefly discuss the theoretical foundation of the study in Section 2. This is followed by reporting of the research methodology and the research results in Sections 3 and 4. The results are discussed in more detail in Section 5 before concluding the paper with a brief discussion about the limitations of the study and some potential paths of future research in Section 6. M. Makkonen, L. Frank & T. Kemppainen: The Effects of Consumer Demographics and Payment Method Preference on Product Return Frequency and Reasons in Online Shopping 2 565 Theoretical Foundation As already mentioned above, most of the prior studies on the antecedents of product return behaviour in the context of online shopping have focused on a very productcentric, retailer-centric, or order-centric perspective by examining how product return behaviour is affected by the factors related to the ordered product, the retailer from whom it is ordered, or the particular order transaction. Some examples of these factors are inventory availability, order delivery reliability, and expected order delivery timeliness (Rao, Rabinovich & Raju, 2014), assortment size and order size (Yan & Cao, 2017), retailer reputation (Walsh, Albrecht, Kunz & Hofacker, 2016), shipping and return fees (Lantz & Hjort, 2013; Lepthien & Clement, 2019; Shehu, Papies & Neslin, 2020), product reviews (Minnema, Bijmolt, Gensler & Wiesel, 2016; Sahoo, Dellarocas & Srinivasan, 2018; Wang, Ramachandran & Sheng, 2021), as well as package opening process (Zhou, Hinz & Benlian, 2018). In contrast, far fewer studies have adopted a more consumer-centric perspective by focusing on the characteristics of the consumers who are ordering the products. Of them, in this study, we will focus on four demographic characteristics (i.e., gender, age, education, and income) as well as payment method preference. Our reason for selecting gender, age, education, and income as explanatory variables is based on the fact that although the effects of demographic characteristics on online shopping adoption have been examined in numerous prior studies (cf. Cheung, Zhu, Kwong, Chan & Limayem, 2003; Chang, Cheung & Lai, 2005; Cheung, Chan & Limayem, 2005; Zhou, Dai & Zhang, 2007), with the main focus being on the same four variables that we are focusing in this study (i.e., gender, age, education, and income), we are not aware of any prior studies that would have examined their effects on product return behaviour, although similar effects can be assumed to exist also in this context. In turn, our reason for selecting payment method preference as an explanatory variable is based on the fact that although we are not aware of any prior studies that would have examined the effects of payment method preference on product return behaviour, Yan and Cao (2017) have argued that the payment method used in a particular order (which once again is an order-centric rather than a consumer-centric factor) does affect product return behaviour. They also found support for this argument by observing that paying an order with a credit card results in a higher product return rate. Thus, rather than the payment method used in a 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 566 particular order, also payment method preference more generally can be assumed to have similar effects. 3 Methodology The data for this study was collected in an online survey between February and March 2019. The respondents were recruited mainly by sharing the survey link through the internal communication channels of our university. In addition, because the respondents who completed the survey were able to take part in a price draw of ten cinema tickets, the survey link was posted to six websites promoting online competitions. The survey questionnaire was in Finnish and consisted of multiple items related to the demographics, personality, values, and online shopping behaviour of the respondents. This study utilises the responses to eight of those items. The first four items measured the gender, age, education, and income (as yearly personal taxable income) of the respondents. The fifth item measured payment method preference by using a closed-ended question with five answer options: a bank payment (a direct payment from a bank account), a card payment (a payment with either a bank or credit card), PayPal or MobilePay (the two most popular online payment services in Finland at the time, which charge the payment from one’s linked bank account, bank card, or credit card), invoice (in one or multiple instalments), and cash on delivery (a payment when the order is delivered). In addition, the respondents had the option to state any other payment method if needed, but nobody used this option. The sixth and seventh items measured average online shopping frequency and average product return frequency by using closedended questions. The eighth and final item measured the most typical reasons for making product returns by using an open-ended question in which the respondents could state one or multiple reasons. The collected data was analysed in three phases. In phase one, we used cumulative odds ordinal logistic regression to examine the effects of gender, age, education, income, and payment method preference on average product return frequency by using average online shopping frequency as a control variable. In phase two, we analysed the most typical reasons for making product returns by using content analysis in which we read each response, identified the reasons in them, and then tried to group them into more general categories based on common themes. In phase three, we used binomial logistic regression to examine the effects of gender, M. Makkonen, L. Frank & T. Kemppainen: The Effects of Consumer Demographics and Payment Method Preference on Product Return Frequency and Reasons in Online Shopping 567 age, education, income, and payment method preference on stating a specific reason for making a product return by using average online shopping frequency and average product return frequency as control variables. As the statistical software for conducting the logistic regression analyses, we used IBM SPSS Statistics 27. 4 Results Table 1: Sample statistics Gender Man Woman Age Under 30 years 30–49 years 50 years or over Education Lower than tertiary education Tertiary education or higher Yearly personal taxable income Less than 15,000 € 15,000–29,999 € 30,000 € or more Do not want to disclose Payment method preference Bank payment Card payment PayPal or MobilePay Invoice Cash on delivery Average online shopping frequency Yearly or less frequently Monthly Weekly Average product return frequency Less frequently than yearly Yearly Monthly N = 560 N % N = 462 N % N = 302 N % 169 391 30.2 69.8 140 322 30.3 69.7 79 223 26.2 73.8 262 201 97 46.8 35.9 17.3 230 156 76 49.8 33.8 16.5 149 113 40 49.3 37.4 13.2 222 338 39.6 60.4 185 277 40.0 60.0 109 193 36.1 63.9 223 102 145 90 39.8 18.2 25.9 16.1 216 101 145 – 46.8 21.9 31.4 – 130 67 105 – 43.0 22.2 34.8 – 275 96 106 74 9 49.1 17.1 18.9 13.2 1.6 227 83 94 58 – 49.1 18.0 20.3 12.6 – 138 54 67 43 – 45.7 17.9 22.2 14.2 – 136 361 63 24.3 64.5 11.3 109 299 54 23.6 64.7 11.7 59 205 38 19.5 67.9 12.6 338 167 55 60.4 29.8 9.8 277 140 45 60.0 30.3 9.7 143 122 37 47.4 40.4 12.3 In total, we received 580 responses to our survey. However, of them, we had to drop 20 responses due to missing or invalid data, thus resulting in a sample size of 560 responses to be used in this study. The descriptive statistics of this sample in terms 568 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE of gender, age, education, income, payment method preference, average online shopping frequency, and average product return frequency are reported in Table 1. In addition, for the analyses of phase one, we had to drop an additional 98 respondents who had not wanted to disclose their income or had preferred cash on delivery as a payment method, which was too small a category, thus resulting in a sample size of 462 respondents. In turn, for the analyses of phases two and three, we had to drop an additional 160 respondents who had not stated any reasons for making product returns, thus resulting in a sample size of 302 respondents. As can be seen from Table 1, these drops did not considerably change the sample profile. 4.1 Effects on Product Return Frequency Before examining more closely the effects on product return frequency, we first checked the non-multicollinearity and proportional odds assumptions of cumulative odds ordinal logistic regression. The non-multicollinearity assumption was checked by using the variance inflation factor (VIF) values from basic multiple linear regression. These were all below two, thus suggesting no multicollinearity (Hair, Black, Babin & Anderson, 2018). In turn, the proportional odds assumption was checked by comparing the fit of a model with the proportional odds constrain to a model without the proportional odds constrain with a likelihood-ratio test. Its result (χ2(10) = 17.417, p = 0.066) supported the proportional odds assumption. The estimated effects are reported in Table 2. All in all, the model was able to explain from 9.6% to 19.0% (McFadden (1973) R2 = 0.096, Cox-Snell (1989) R2 = 0.158, Nagelkerke (1991) R2 = 0.190) of the variance in average product return frequency, fitted the data better than the baseline model with no explanatory variables (as suggested by the likelihood-ratio test), and had an overall good fit with the data (as suggested by the deviance goodness-of-fit test). The statistical significance of the effects was tested with the Wald (1943) χ2 test, whereas the effect sizes are reported as odds ratios (OR) and their 95% confidence intervals (CI). For categorical variables, the effects are reported for a specific category in comparison to a reference category (in parenthesis). Additionally, if a variable has more than two categories, the result of an omnibus test is reported (on the same row as the name of the variable). As can be seen, gender, age, payment method preference, and average online shopping frequency were all found to have a statistically significant effect on average product return frequency, whereas the effects of education and income were M. Makkonen, L. Frank & T. Kemppainen: The Effects of Consumer Demographics and Payment Method Preference on Product Return Frequency and Reasons in Online Shopping 569 found to be statistically not significant. More specifically, women had 2.134 times greater odds than men of being more frequent returners, whereas the odds of being a more frequent returner decreased with age by an odds ratio of 0.975 per year. In terms of payment method preference, those who preferred paying by invoice had 2.999 times greater odds of being more frequent returners than those who preferred bank payments. Finally, as expected, in terms of average online shopping frequency, more frequent shoppers also seemed to be more frequent returners. That is, those who shopped monthly had 3.743 times greater odds of being more frequent returners than those who shopped yearly or less frequently, whereas those who shopped weekly had 5.932 times greater odds of being more frequent returners than those who shopped yearly or less frequently. Table 2: Effects on average product return frequency Wald χ2 Odds ratio df p OR 95% CI – – – – – 10.972 1 < 0.001 2.134 [1.363, 3.341] 7.033 1 0.008 0.975 [0.957, 0.993] – – – – – χ2 Gender Woman (vs. man) Age Education Tertiary or higher (vs. lower than tertiary) Yearly personal taxable income 15,000–29,999 € (vs. less than 15,000 €) 30,000 € or more (vs. less than 15,000 €) Payment method preference Card payment (vs. bank payment) PayPal or MobilePay (vs. bank payment) Invoice (vs. bank payment) Average online shopping frequency Monthly (vs. yearly or less frequently) Weekly (vs. yearly or less frequently) 1.917 1 0.166 1.365 [0.879, 2.120] 2.778 2 0.249 2.070 1 0.150 1.477 [0.868, 2.513] 2.033 1 0.154 1.485 [0.862, 2.557] 13.579 0.911 3 1 0.004 0.340 – – 1.303 [0.756, 2.246] 2.339 1 0.126 1.487 [0.894, 2.474] 13.179 23.559 19.462 1 2 1 19.913 1 – < 0.001 2.999 [1.657, 5.425] < 0.001 – – < 0.001 3.743 [2.082, 6.728] [2.714, < 0.001 5.932 12.967] Likelihood-ratio χ2(10) = 79.527, p < 0.001, deviance goodness-of-fit χ2(760) = 618.853, p = 0.814 McFadden R2 = 0.096, Cox-Snell R2 = 0.158, Nagelkerke R2 = 0.190 4.2 Product Return Reasons – 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 570 When analysing the stated reasons for typically making product returns, we were able to identify four main reasons. These are listed and described in more detail below. The list also includes the number and the proportion of the 302 respondents who stated a specific reason. Note that one respondent could state multiple reasons.      4.3 Wrong size or bad fit (stated by 193 or 63.9%): The most frequently stated reason was the wrong size or bad fit of the ordered product. This typically concerned products that are worn, such as clothes or shoes. Mismatch with product information (stated by 71 or 23.5%): The second most frequently stated reason was the mismatch of the ordered product with the product information provided by the retailer. For example, the product did not match the product description or product pictures in terms of colour, material, and quality, had some other deviances, or was an entirely wrong product. Faulty or damaged product (stated by 70 or 23.2%): The third most frequently stated reason was that the ordered product was faulty or damaged during delivery. In other words, there was some extreme quality issue in the product, which went well beyond the product not merely matching the product information. Mismatch with needs, wants, or expectations (stated by 58 or 19.2%): The most infrequently stated reason was the mismatch of the ordered product with one’s needs, wants, or expectations. In other words, there was no obvious mismatch with the product information or other issues in the product, but one just did not like it, found it useless, or experienced buyer’s remorse. Other reasons (stated by 6 or 2.0%): Finally, there were also a few respondents who stated some other reasons, such as suspicion of fraud, ordering the product just to meet some order limit, or returning the product just to spend time. Effects on Product Return Reasons Before examining more closely the effects on product return reasons, we once again first checked the non-multicollinearity assumption of binomial logistic regression by using the VIF values from basic multiple linear regression. These were all below two, thus suggesting no multicollinearity (Hair et al., 2018). When examining the M. Makkonen, L. Frank & T. Kemppainen: The Effects of Consumer Demographics and Payment Method Preference on Product Return Frequency and Reasons in Online Shopping 571 estimated effects, only two of them were found to be statistically significant. First, gender was found to have a statistically significant effect on stating wrong size or bad fit as a reason (χ2(1) = 21.573, p < 0.001) as well as stating a faulty or damaged product as a reason (χ2(1) = 29.228, p < 0.001), whereas average product return frequency was found to have a statistically significant effect on stating a faulty or damaged product as a reason (χ2(2) = 21.872, p < 0.001) as well as stating a mismatch with needs, wants, or expectations as a reason (χ2(2) = 18.285, p < 0.001). More specifically, women had 3.939 times greater odds than men of stating wrong size or bad fit as a reason, whereas men had 6.173 times greater odds than women of stating a faulty or damaged product as a reason. In turn, those who returned less frequently than yearly had 4.202 times greater odds than those who returned yearly and 12.987 times greater odds than those who returned monthly of stating a faulty or damaged product as a reason. In contrast, those who returned yearly had 2.086 times greater odds than those who returned less frequently than yearly of stating a mismatch with needs, wants, or expectations as a reason, whereas those who returned monthly had 8.034 times greater odds than those who returned less frequently than yearly of stating a mismatch with needs, wants, or expectations as a reason. 5 Discussion and Conclusions In this study, we examined the effects of gender, age, education, income, and payment method preference on product return frequency and product return reasons. In terms of the effects on product return frequency, we found women to have greater odds than men of being more frequent returners and the odds of being a more frequent returner to also decrease with age. In addition, those who preferred paying by invoice were found to have greater odds of being more frequent returners than those who preferred a bank payment. Of these, the finding concerning the effect of payment method preference is largely in line with the study by Yan and Cao (2017), who found that paying an order with a credit card results in a higher product return rate. They explain this finding with the “buy-now-pay-later” mentality associated with credit cards, which is likely to result in more impulsive consumption behaviour and lower the threshold of making a product return because no exchange of money has yet occurred. A similar mentality is likely to also explain why preferring to pay by invoice results in a higher product return rate. In turn, the findings concerning the effects of gender and age are most likely explained by the different 572 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE online shopping habits of men versus women and younger versus older consumers. For example, women and younger consumers may be more likely to order products with higher return rates, such as clothes and shoes (Deloitte, 2019), whereas men and older consumers may be more likely to order products with lower return rates, such as consumer electronics (Deloitte, 2019). In addition, women may be more likely than men to order products for not just themselves but also others in their family, such as their children. In terms of age, there may also exist a generational gap. That is, older consumers, who are typically less experienced in shopping online, may make product returns more conservatively, resorting to them only when there is something severely wrong with the ordered product. In contrast, younger consumers, who are typically more experienced in shopping online, may make product returns more liberally, sometimes returning the ordered product even when there is actually nothing wrong with it. Or they may even practice bracketing, which means ordering multiple similar products with the intention of keeping only some of them and returning the rest. There were 12 respondents in our sample who explicitly mentioned doing this, and most of them were young consumers in their 20s. In terms of the effects on product return reasons, we first identified four reasons why consumers typically make product returns: (1) wrong size or bad fit, (2) a mismatch with product information, (3) a faulty or damaged product, and (4) a mismatch with needs, wants, or expectations. These are largely in line with the reasons that have been identified in prior studies. For example, a study by Deloitte (2019) found the top five reasons to be (1) a too small or large size, (2) changing one’s mind, (3) style not as expected, (4) not as described, and (5) a defective product. After this, we examined the effects on stating each of the four reasons, finding that women had greater odds than men of stating wrong size or bad fit as a reason, whereas men had greater odds than women of stating a faulty or damaged product as a reason. In addition, we also found that those who made product returns more frequently had greater odds of stating a mismatch with needs, wants, or preferences as a reason, whereas those who made product returns less frequently had greater odds of stating a faulty or damaged product as a reason. One explanation for the finding concerning the gender effect may be the fact that women more often shop online for products like clothes and shoes, in which wrong size or bad fit is likely to be an issue, whereas men more often shop online for products like consumer electronics, which are more prone to faults and more likely damaged during delivery. In turn, one explanation for the findings concerning the effects of M. Makkonen, L. Frank & T. Kemppainen: The Effects of Consumer Demographics and Payment Method Preference on Product Return Frequency and Reasons in Online Shopping 573 product return frequency may be the fact that if one has the tendency of making returns very rarely, then the reasons for those rare returns are likely to relate to some severe issue in the ordered product, such as it being faulty or damaged during delivery. In contrast, if one has the tendency of making returns relatively often, then it becomes less likely that the reasons for them only relate to actual issues in the product and more likely that they relate to things like the mismatch of the product with one’s needs, wants, or expectations. From a theoretical perspective, the main contribution of the study is the finding that consumer-centric factors like gender, age, and payment method preference – in addition to the product-centric, retailer-centric, and order-centric factors that have been more traditionally examined in prior research – can act as antecedents of product return behaviour by being able to explain a considerable amount of the variance in both product return frequency and product return reasons. In turn, from a practical perspective, the main contribution of the study is the implication that if the aforementioned factors indeed affect product return frequency and product return reasons, then online retailers can try to utilise these factors and effects in lowering their product return rates. For example, as those who prefer to pay by invoice were found to have greater odds of making product returns more frequently, some retailers may see it preferable not to offer invoicing as a payment method. Similarly, some retailers may see it preferable to target only the gender and age segments in which the product return frequencies are known to be relatively low. 6 Limitations and Future Research This study can be seen to have three main limitations. First, because we focused only on Finnish online consumers, we cannot make claims on the generalisability of our findings to other countries. Second, because our sample was not entirely representative of the Finnish online consumer population especially in terms of gender and age, we also cannot make claims on how common or rare the identified product return reasons actually are. For example, wrong size or bad fit may have been found to be the most common reason simply because of the gender and age biases in our sample. However, we do not see these biases affecting our other findings concerning the effects on product return frequency and product return reasons because, by examining the effects simultaneously in one model, we 574 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE essentially controlled the effects of the other variables when examining the effect of a specific variable. Third, because most of the identified product return reasons are related to the root cause of there being something wrong with the ordered product, there is some conceptual overlap between them. However, we still consider them to give a good overview of the motivational aspects for why consumers make product returns. In future research, some interesting and important paths to follow would be to examine more closely the underlying mechanisms that cause the effects that we observed in this study as well as how the ongoing COVID-19 pandemic has potentially affected our findings. References Chang, M. K., Cheung, W., & Lai, V. S. (2005). Literature derived reference models for the adoption of online shopping. Information & Management, 42(4), 543–559. doi:10.1016/j.im.2004.02.006 Cheung, C. M. K., Chan, G. W. W., & Limayem, M. (2005). A critical review of online consumer behavior: Empirical research. Journal of Electronic Commerce in Organizations, 3(4), 1–19. doi:10.4018/jeco.2005100101 Cheung, C. M. K., Zhu, L., Kwong, T., Chan, G. W. W., & Limayem, M. (2003). Online consumer behavior: A review and agenda for future research. In R. T. Wigand, Y.-H. Tan, J. Gričar, A. Pucihar & T. Lunar (Eds.), Proceedings of the 16th Bled eCommerce Conference (pp. 194– 218). Kranj, Slovenia: Moderna organizacija. Cox, D. R., & Snell, E. J. (1989). Analysis of Binary Data (2nd ed). Boca Raton, FL: Chapman & Hall. Deloitte (2019). Bringing it back: Retailers need a synchronized reverse logistics strategy. Retrieved from https://www2.deloitte.com/content/dam/Deloitte/us/Documents/process-and operations/us-bringing-it-back.pdf Hair, J. F., Jr., Black, W. C., Babin, B. J., & Anderson, R. E. (2018). Multivariate Data Analysis (8th ed.). Andover, United Kingdom: Cengage. Lantz, B., & Hjort, K. (2013). Real e-customer behavioural responses to free delivery and free returns. Electronic Commerce Research, 13(2), 183–198. doi:10.1007/s10660-013-9125-0 Lepthien, A., & Clement, M. (2019). Shipping fee schedules and return behavior. Marketing Letters, 30(2), 151–165. doi:10.1007/s11002-019-09486-8 McFadden, D. (1973). Conditional logit analysis of qualitative choice behavior. In P. Zarembka (Ed.), Frontiers in Econometrics (pp. 105–142). New York, NY: Academic Press. Minnema, A., Bijmolt, T. H. A., Gensler, S., & Wiesel, T. (2016). To keep or not to keep: Effects of online customer reviews on product returns. Journal of Retailing, 92(3), 253–267. doi:10.1016/ j.jretai.2016.03.001 Nagelkerke, N. J. D. (1991). A note on a general definition of the coefficient of determination. Biometrika, 78(3), 691–692. doi:10.1093/biomet/78.3.691 Ofek, E., Katona, Z., & Sarvary, M. (2011). “Bricks and clicks”: The impact of product returns on the strategies of multichannel retailers. Marketing Science, 30(1), 42–60. doi:10.1287/mksc.1100.0588 Oláh, J., Kitukutha, N., Haddad, H., Pakurár, M., Máté, D., & Popp, J. (2019). Achieving sustainable e-commerce in environmental, social and economic dimensions by taking possible trade-offs. Sustainability, 11(1), article 89. doi:10.3390/su11010089 M. Makkonen, L. Frank & T. Kemppainen: The Effects of Consumer Demographics and Payment Method Preference on Product Return Frequency and Reasons in Online Shopping 575 Rao, S., Rabinovich, E., & Raju, D. (2014). The role of physical distribution services as determinants of product returns in Internet retailing. Journal of Operations Management, 32(6), 295–312. doi:10.1016/j.jom.2014.06.005 Sahoo, N., Dellarocas, C., & Srinivasan, S. (2018). The impact of online product reviews on product returns. Information Systems Research, 29(3), 723–738. doi:10.1287/isre.2017.0736 Shehu, E., Papies, D., & Neslin, S. A. (2020). Free shipping promotions and product returns. Journal of Marketing Research, 57(4), 640–658. doi:10.1177/0022243720921812 Wald, A. (1943). Tests of statistical hypotheses concerning several parameters when the number of observations is large. Transactions of the American Mathematical Society, 54(3), 426–482. doi:10.2307/1990256 Walsh, G., Albrecht, A. K., Kunz, W., & Hofacker, C. F. (2016). Relationship between online retailers’ reputation and product returns. British Journal of Management, 27(1), 3–20. doi:10.1111/1467-8551.12120 Wang, Y., Ramachandran, V., & Sheng, O. R. L. (2021). Do fit opinions matter? The impact of fit context on online product returns. Information Systems Research, 32(1), 268–289. doi:10.1287/isre.2020.0965 Yan, R., & Cao, Z. (2017). Product returns, asymmetric information, and firm performance. International Journal of Production Economics, 185, 211–222. doi:10.1016/j.ijpe.2017.01.001 Zhou, L., Dai, L., & Zhang, D. (2007). Online shopping acceptance model – A critical survey of consumer factors in online shopping. Journal of Electronic Commerce Research, 8(1), 41–62. Zhou, W., Hinz, O., & Benlian, A. (2018). The impact of the package opening process on product returns. Business Research, 11(2), 279–308. doi:10.1007/s40685-017-0055-x 576 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE COPYRIGHT ENFORCEMENT IN THE DUTCH DIGITAL MUSIC INDUSTRY NERKO HADŽIARAPOVIĆ, MARLIES VAN STEENBERGEN & PASCAL RAVESTEIJN HU University of Applied Science, Utrecht, The Netherlands; e-mail: Nerko.Hadziarapovic@hu.nl, marlies.vansteenbergen@hu.nl, Pascal.Ravesteijn@hu.nl Abstract There is a lack of interest and empirical analysis in the existing literature on composers’ relations with their publishers and the role of Collective Management Organizations (CMOs) within the system of music copyright. The purpose of this paper is to explore and understand the influence of digitization within the music industry on the copyright enforcement in the Netherlands and on rights holders and the CMOs. Also to explore and understand how their mutual relationships are affected by digitization of the music industry. A qualitative analysis was done by reviewing scientific literature, performing a documents analysis and doing open interviews. In the existing economics of copyright literature, the main focus is set on transaction costs, efficiency and welfare topics. The findings can be used to understand and model how rights holders and CMOs cope with the digitization and contribute to the policy makers and economic actor’s discussion about future improvement of the copyright enforcement system. DOI https://doi.org/10.18690/978-961-286-485-9.41 ISBN 978-961-286-485-9 Keywords: music copyright, system and implementation, CMO’s, publishing, music industry, digitization 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 578 1 Introduction The advent of technologies, such as music streaming, poses a significant challenge to repertoire management and has led to failures regarding the compensation of rights holders in the music industry (Handke, 2010). According to Silver (2013) and Towse (2017) copyright law is becoming more complex in the attempt to keep up with each technological advance, especially where consumers and markets are in the lead. The impact of technological innovation on the music industry has stimulated research in economics of copyright and sparked the interest of policy makers (Belleflamme, 2016). The music industry is considered a forerunner in technological change and there are many lessons that can be learned from the music industry for the benefit of the entire Creative Industry (Lyons, Sun, Collopy, Curran & Ohagan, 2019). However, the focus of the economic copyright analysis has been on broader structures, leaving a need for structured knowledge building on the economic rationales and consequences at a micro level (The Allan Consulting Group, 2003). Bargfredde & Panay’s (2015) make clear that one of the problems on micro level is that a significant part of the copyright fees are improperly distributed by the Collecting Management Organizations (CMOs)1. The unjust distribution of copyright money harms creators, is costly to the economy and has a negative impact on our society (Mahoney, 2015). Recent discussions (Department for Digital, Culture, Media & Sport, 2017; Music Business Worldwide, 2018) on rates paid by Big Tech companies, such as Spotify, Apple, Amazon, Google and Facebook, to the Collective Management Organizations (CMOs) suggest that issues such as accountability and transparency regarding music use have not been completely resolved. For example, the CMOs collect the money but do not receive the usage data and thus cannot distribute the money to the rightful rights holders. While music is increasingly being consumed through digital channels (Williamson & Cloonan, 2012; Wikström, 2013; Samuel, 2014; Ingham, 2015) the number of empirical studies, particularly in the field of music copyright, is limited (Schlesinger & Waelde, 2012; Williamson & Cloonan, 2012; Phillips & Street, 2015; Towse, 2017), especially for the research on the impact of digitization on the rights holders of popular music. Hitherto, there are little empirical studies available that involve rights holders and their mutual formal Collective management organizations, such as collecting societies, typically represent groups of copyright and related rights owners, such as authors, composers, publishers, writers, photographers, musicians and performers. 1 N. Hadžiarapović, M. van Steenbergen & P. Ravesteijn: Copyright Enforcement in the Dutch Digital Music Industry 579 and informal relationships. This research aims to fill that gap. Hence, the objective of this paper is twofold, first to explore and understand the influence of digitization within the music industry on the copyright enforcement in the Netherlands and on rights holders and the CMOs. Also to explore and understand how their mutual relationships are affected by digitization of the music industry. Within the scope of this research, which focuses on the Netherlands, rights holders refer to music composers, lyricists and music publishers of popular music. CMOs in the Dutch context refers only to Buma/Stemra, the Dutch CMO appointed by the Dutch Government to collect the money for use of music and distribute the collected money to the rights holders. Buma/Stemra also has the responsibility to negotiate the tariffs for the use of music with different parties (users of music). 2 Theoretical Foundation The economics of copyright literature beholds copyright as a theoretical economic stage where all the players are homogenous and rational. Also a stage where enforcement of copyright is perfect and where the relationships between practitioners are well defined and rational (Atkinson, 2012; Handke, 2012; Towse, 2017). Copyright research can be examined from multiple perspectives and includes law, technology, philosophy and economics (Handke, 2010; Wu, 2018; Lyons et al., 2019). Since much of copyright policy is about economics, it is important to understand the differences among different economic perspectives (Atkinson, 2012). Atkinson (2012) and Handke (2012) summarized key results in the empirical literature on copyright, put them into context and highlighted noteworthy gaps and contradictions in the literature. According to Atkinson (2012) the focus on transaction costs, efficiency and society welfare topics revolves around three ‘classic’ economic doctrines: conservative neoclassical; liberal neoclassical and neoKeynesian. In the recent two decades a new economic doctrine has emerged, Innovation Economics, also referred to as neo-Schumpeterian or evolutionary economics. Innovation economics postulates that innovation (the development and adoption of new products, processes, and/or business models) drives growth (Atkinson, 2012). For studies of technological change in existing markets the neoSchumpeterian or evolutionary economic literature provides a coherent and evidence-based foundation (Handtke, 2010). Technological change causes the spread of new products and production processes. Disruptive innovation is an 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 580 innovation that creates a new market and value network and thereby ultimately disrupts existing markets and value network (Ab Rahman et al., 2017). The products or services perceived as disruptive innovations tend to skip stages in the traditional product design and development process to quickly gain market traction and competitive advantage (Reyes-Mercado & Rajagopal, 2017). The actors are generally perceived as being different, for example with regard to their access to information, their ability to handle information, their capital and knowledge base (asymmetric information) or their routines (Nelson & Winter, 1982; Lipsey et al., 2005). These differences also apply to institutions designed to remain stable over time (Lundvall & Archibugi, 2001), but as the speed of technological change varies and is not always predictable, formal and informal institutions, technology and markets are 'out of sync'. The music industry has rapidly digitized over the past 20 years. Legislation, institutions and CMOs are lagging behind these developments as there is a nonsynchronous situation within the music industry (Lyons et al., 2019). Mostly national institutions (such as CMOs) deal with international ‘Big Tech‘-organizations from a skewed balance of power position. This is caused by the information asymmetry as Big Tech companies do not share available data with the CMOs and therefore have a much stronger negotiating position vis-à-vis CMOs and rights holders (Spoerri, 2019). Furthermore, the CMOs are not equipped to deal with the large amounts of data and the systems to convert this data into reliable information (Roberts, 2021). There is little empirical analysis on composers’ relations with their publishers (contracting) (Towse, 2017) and the role of CMOs within the system of music copyright (Philips & Street, 20015; Watt, 2015), for example how the collected copyright revenue has been distributed amongst creators and other intermediaries (Towse, 2006). 3 Methodology We believe that a better understanding of the phenomenon of digitization of music industry would allow the stakeholders to proceed from a more informed perspective in terms of designing, implementing and applying the future copyright enforcement system. N. Hadžiarapović, M. van Steenbergen & P. Ravesteijn: Copyright Enforcement in the Dutch Digital Music Industry 581 Qualitative research is grounded in an essentially constructivist philosophical position and its intent is to examine a social situation or interaction by allowing, us, the researchers, to enter the world of others and attempt to achieve a holistic understanding (Bogdan & Biklen, 2007; Locke et al., 2013; Maxwell, 2012; Merriam et al., 2015). In our view, considering the complex nature of the economics of copyright and the different economic doctrines outlined in section two, these grounds of qualitative research fit well with this study because its objective is to achieve a holistic and better understanding about the contemporary effects of digitization on copyright enforcement but also on the interactions between the stakeholders. In order to select the sample for this study, a purposeful sampling procedure was used. Since one of us has been working in the Dutch music industry for over two decades, we started within our own network of possible participants. Also, a snowball sampling strategy was employed (Patton, 2015). The participants were selected using the following selection criteria: 1) composers and lyricists have had at least five songs released in the last 4 years, 2) they are registered members of Buma/Stemra and 3) either own their own publishing company or are represented by an official registered publisher in The Netherlands or elsewhere. Criteria in selecting publishers are that 1) they have a relevant repertoire of professional authors they represent, 2) they are professionally active in the copyright music industry for at least ten years. Finally, regarding CMO, the individual participants should have a management position within their organization with at least 5 years of relevant working experience. The delimiting time frames of 4, 10 and 5 years were decided to insure adequate working experience in the music industry. The research sample consists of six individuals included: two composer/lyricist with a broad repertoire of internationally successful songs who now own their own publishing companies (first one Grand Mono and the second one The Unexpected); a formal member of the Council of Rights Owners of Buma/Stemra (The Dutch CMO); the Dutch CEO of one of the biggest Global Independent Publishing companies (wishes to stay anonymous), a Buma/Stemra manager responsible for Business Development and a lobbyist of Buma/Stemra who operates on national and EU-level. The following steps were used to carry out this research: 1) available literature and peer reviewed articles were searched, selected and analyzed, 2) collection and analysis of copyright-related documents (e.g. law and regulations) and 3) interviews with 582 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE participants. In relation to step 1, ongoing and selective review of literature was conducted. The main focus of the review was to acquire knowledge and gain understanding of the legal framework of copyright law, what the economics of copyrights are, how the enforcement system of copyright is designed and implemented and who the key stakeholders are within this system. In step 2 the associated activities were to name, collect, categorize and systematically analyze the relevant and available documents regarding the enforcement of copyright in The Netherlands. The collected documents were categorized in public and non-public documents. Besides literature this concerns at least the following documents: "income statements" from CMOs to rights holders; annual reports of CMOs (all public); the reports of the Supervisory Board for Collective Management Organizations for Copyright and Related Rights and available agreements (contracts) between publishers and composers and lyricists (non-public). Also, copyright law documents were considered. Although the legal framework of copyright lays outside the scope of this research, it can still provide important insights in the rationale and justification of copyright law from the legal perspective. The main focus of the document analysis was to gain a deeper understanding of the enforcement system of copyright law on meso and micro economical level. In step 3 six in-depth open interviews were conducted with participants who work in the Dutch copyright industry. This was the primary data collection method in this research because of its potential to elicit thick descriptions and enable us to search for additional information. A major benefit of individual in-depth interviews is that it also offers the potential to capture a person’s perspective of an event or experience (Marshall & Rossman, 2014). In the case of this research our reason for choosing this method was that it is a good way to generate data through interaction with people and capture the meaning of their experience in their own words (Bloomberg & Volpe, 2019). Regarding the process of the interviews, we send emails and/or LinkedIn direct messages to prospective participants describing the purpose of the research with a request for a convenient date and time for an online interview. The interviews were conducted between December 2020 and February 2021. All the interviews were audio recorded and afterwards manually transcribed verbatim and with full permission of the participants. The interviews lasted between 45 minutes and 2.5 hours and covered different themes depending on the role and interests of the participants. Appendix 1 provides an overview of theme’s and questions asked dependent on the type of interviewee. At the end of each interview the participants were asked if they could recommend a next potential participant. The data analysis N. Hadžiarapović, M. van Steenbergen & P. Ravesteijn: Copyright Enforcement in the Dutch Digital Music Industry 583 and data collection activities were done simultaneously in order to avoid the risk of repetitious, unfocused and overwhelming data (Merriam et al., 2015). The documents and transcripts were first coded with open coding for identifying and naming the data and developing major categories of information (Bloomberg & Volpe, 2019). In the next phase the categories were connected and we searched for relationships among them (Birks & Mills, 2015; Corbin & Strauss, 2014; Holton & Walsh, 2016), where we compared threads and patterns within categories. In the last phase of the synthesizing process, we situated the current work to prior research and compered and contrasted it with issues found in the broader literature (Bloomberg & Volpe, 2019). Credibility, dependability and confirmability of the research are ensured by triangulating sources (Patton, 2015) and member checks (Bloomberg & Volpe, 2019); transferability by purposeful sampling and thick descriptions (Gay et al., 2019; Merriam et al., 2015; Patton, 2015). For this process Atlas.ti software is used. Although generalizability was not a goal of this study, through detailed description of the background and context, this study could be assessed for its applicability in other similar contexts. The findings are discussed below in section 4 of this article. 4 Findings The major findings of this research are: 1. The literature study and document analyses contributed to the understanding on the practical application of the enforcement of copyright in The Netherlands; 2. All the participants indicated that the digitization affected the mutual relationships amongst creators, creators and publishers (rights holders) and CMOs. The relationships are now more complex and dynamic which results in different types of possible contracts between creators and publishers; 3. All participants acknowledged the effects of digitization on music copyright, complexity of contemporary system and existence of the ‘old’ legacy software used for the enforcement of copyright in The Netherlands; 4. All participants indicated that digitization of the music industry contributed to the existence of black boxes in the copyright processes and expressed the need for an appropriate solution; 584 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Figure 1: The black Box of the Music Copyright Based on the document analysis the enforcement system of music copyright in the Netherlands is modeled (figure 1), including the stakeholders (players), their mandates and their relationships as formally described. According to literature and the analyzed documents, the ‘users of music’ pay for the use of music by annual or monthly contribution to the CMOs. The Dutch CMO, Buma/Stemra, is appointed by the Dutch Government to collect money from users of music and distribute the collected money to the rights holders. Buma/Stemra is also responsible for and given the mandate to negotiate the tariffs for use of music with different parties. The rights holders in the Netherlands are the composers, lyricists and the music publishers. The split of the copyright is divided equally by those three, each owns 33,33% of the copyright. In case of a composition without lyrics, this split is equal to 50%. The publishers are, depending on the signed agreements with the creators of music, responsible for the exploitation and administration of created musical works. There are different kinds of agreements between publishers and creators and the publishing share of 33,33% can (partly) flow back to the creators, depending on the type of contract (see table 1). When a musical work is created, the role of the creators is to N. Hadžiarapović, M. van Steenbergen & P. Ravesteijn: Copyright Enforcement in the Dutch Digital Music Industry 585 register their work with the CMO, in order to receive the revenue they are entitled to for the use of their work. Buma/Stemra is responsible for collection and distribution of performance rights and of mechanical reproductions rights. The latter is only relevant when a song or a composition is recorded by performers or artists and released (distributed) by, for example, a record label and reproduced on content carriers or digitally on for example Spotify or comparable online services. Registering a composition or lyrics for the rights holders is not experienced as convenient. As one of the interviewees stated: "Imagine you write a song, you don't have a recording and someone else is performing it. What then happens is that you have to trust that there is always someone sitting there who writes down the title and the authors neatly and that that is copied well at Buma/Stemra, so that will be a bit of manual work. Nowadays there is also a lot of automation in it, but there is more margin of error in it." [Participant 1] All the participants indicated that the mutual relationships amongst creators, creators and publishers (rights holders) and rights holders and CMOs are affected by digitization of the music and that these relationships are complex and dynamic. This results in different sort of agreements between creators and publishers. According to the participant who now owns his own publishing company: “I worked with a publisher. I worked with them from 2013 to 2018. I felt that they were not doing enough and that they were not active enough with my music to justify getting such a share in my music.” [Participant 5] Based on the interviews we found that there are four possible contracts (table 1) between the creators of music (composers and lyricists) and publishers. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 586 Table 1: Different contract types between creators and Publishers Song / Title Agreement This type of music publishing contract is an agreement between the writer and the music publisher in which the writer grants certain rights to a publisher for one or more songs. In a single song publishing contracts, the writer is sometimes paid a one-time recoupable advance. Exclusive Songwriter Agreement ("ESWA”) Under the ESWA or "staff writer" contract, the songwriter generally grants all of the publishers share of the income to the music publisher. The writers’ services are exclusive to the music publishers for a specified period of time. Thus, any compositions written within that period belong to the music publisher. These publishing contracts are usually offered to writers with some degree of commercial success. Copublishing Agreement ("Co-pub”) Administrati on Agreement ("Admin / Sub Publishing”): Under this deal, the songwriter and the music publisher are "co-owners" of the copyrights in the musical compositions. The writer becomes the "co-publisher" (i.e. co-owner) with the music publisher, based on an agreed split of the royalties (or kickback). Under this music publishing contract, the music publisher simply administers the copyrights for another publisher/copyright owner2. Under this coveted arrangement, ownership of the copyright is usually not transferred to the administrator. Instead, the music publisher usually gets 10-20% of the gross royalties received from administering the songs for a certain period of time and for a certain territory. All participants acknowledged the effects of digitization on music copyright, complexity of the current system and existence of ‘old’ legacy software used for the enforcement of copyright in The Netherlands. During the times that music publishing was only based on exploitation of sheet music, the implementation of the system was uncluttered and relatively controllable. The contemporary and digitized music industry of today has become much more complex and intricate and there are now many more stakeholders in the music “ecosystem” than ever before. "Enforcement and legislation lag behind technological developments, so once a law has been passed, after three years or so, the technology has already been developed in such a way that you can actually start working on a new law right away." [Participant 5] Publishers can only register their part of the copyright with the CMO, which has an maximum of 33,33% and cannot legally register the other two parts (composition and lyrics). 2 N. Hadžiarapović, M. van Steenbergen & P. Ravesteijn: Copyright Enforcement in the Dutch Digital Music Industry 587 It has become almost impossible for the CMOs to collect and process all of the available data in order to collect and distribute the copyright money in the most fair and just way (figure 1). According to an interviewee who is both a composer and publisher: “Buma / Stemra has to deal with hundreds of thousands of parties. That can often go wrong so in itself that is inherent to the system and there is nothing wrong with that. If your song is played on many thousands of TV and internet channels you cannot expect that everything will go smoothly. For authors, if you want to get what you are entitled to, you have to be on top of it.” [Participant 1] And according to the interviewed manager of the Dutch CMO Buma/Stemra, there are more problems: “We are still working with what is then called a monolithic system, so one large system that contains everything and that will at some point have reached the end of its life. Then you have to look for something new and a project has now started, which will of course take a few years before it is finished and rolled out, a new IT environment is developed and rolled out.”[Participant 2] The Netherlands is a relatively ‘small player’ compared to countries like Japan, USA, Germany, UK and France. Collecting and analyzing music using data from these countries (and many others) is almost impossible and very complicated. “Of course we live in a digital age but a lot of that software is written by people so there are a lot of mistakes in it. That's just year after year, you know how it works, uh, IT is terribly difficult to get right year after year, patch after patch. Such a software system does not always improve…” [Participant 1] And according to the interviewed international publisher: The fact is that you do not know what happens to your copyright and that the person who uses your copyright is actually not in breach at all. [Participant 3] Another phenomenon of the music copyright industry has been discussed frequently in the recent global media: the black box of copyright (figure 1) (Bargfredde & Panay, 2015; Music Business Worldwide, 2018). All the participants indicated the effects of 588 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE digitization on existence of such black box of copyright and expressed the need for an appropriate solution. The black box is an ‘umbrella’ term used with different meanings. The most used definition is that these are unclaimed royalties collected by the CMOs. Basically, CMOs have collected the money but do not know who to give the collected money to. The reasons for the existence of such black boxes vary; from makers and publishers not registering their work, to labels releasing and reproducing the songs digitally without reporting the rightful owners and to unmatched databases or music users not correctly reporting the use of music (Music Business Worldwide, 2018). Also the digital data exchange between CMOs in different countries is a major reason for their existence. In words of the board member of Buma/Stemra: “The black box within the copyright world means the following: money comes in and it is not clear how it is distributed. The black box is actually more of a collective name for various problems within the music copyright industry.” [Participant 4] “That black box is of course glued to everything they don't see…” [Participant 2] 5 Discussion, Conclusions and Recommendations The purpose of this study was to explore the influence of digitization within the music industry on the copyright enforcement in the Netherlands and on creators of music, their publishers and the CMOs. Also to explore how their mutual relationships are affected by digitization. Following is the discussion of the findings and the conclusions drawn from this research. 5.1 The practical application of the enforcement of copyright in The Netherlands and the effects of digitization on music copyright The first major finding of this research is that the design of the copyright enforcement system is well documented, transparent and institutionalized in the Dutch and European legal framework. The mandates and responsibilities are well defined and experienced as such by all the participants. However, there is a difference between the design of the system ‘on paper’ and practical application of the system. A conclusion to be drawn from this finding is that the designed system and the legal framework are rigid and not agile to adjust to the fast exogenous innovation. The digitization of the music industry started a tsunami of Big Data and N. Hadžiarapović, M. van Steenbergen & P. Ravesteijn: Copyright Enforcement in the Dutch Digital Music Industry 589 the key actors of the copyright enforcement, the CMOs, with the mandate to collect and distribute money from user to the rights holders are not ready to cope with the fast changing environment, are not equipped with the right software tools and their bargaining power towards the ‘Big Tech’ companies and the new major users of music, like Spotify, has diminished due to asymmetrical information. A further conclusion that can be drawn is that, although the justification of copyright in a broader sense is well-argued by scholars and policy makers, the implementation and the policy are not perfectly aligned, as one would expect from the findings in the literature covering the economics of copyright. 5.2 The mutual relationships are affected by the digitization The second major finding is that all the participants have emphasized the existence of rather complex relationships between creators (composers and lyricist) and their publishers. For the legislation, the rights holders, creators and publishers, are homogeneous and enjoy the same rights. However, these two groups have different interests and their views on the distribution of income differ: “Artist versus the businessmen”. In practice, these different views have led to the emergence of different forms of collaborations and different types of contracts between the two. One example is that on one hit song, there are sometimes more than 10 creators and more than 10 (sub)publishers involved, thus many contracts and splits between all parties involved exist. A related conclusion is that the digitization of the music industry enlarged the gap between the enforcement of copyright and the legal framework. 5.3 The existence of the black box of copyright The last finding of this study are the effects of digitization of the music industry on the black box of copyright. All the participants were aware of the existence of the black box and indicated that it is a term used for not one, but many problems of the copyright enforcement. The overarching view of the participants is that the black box is an “umbrella term” used to describe the inability of the CMOs to distribute the collected funds to the correct rights holders. As stated before, the reasons for its existence vary, from outdated legacy software to data exchange problems between countries and the big tech companies withholding the data about the use of music 590 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE but also the efficiency reasons related to the transaction costs of the distribution to the somewhat smaller rights holders. One of the limitations of this study is potential bias and subjectivity regarding one of the researchers own participation as a professional in the Dutch music industry and his personal experience with the enforcement of copyright in The Netherlands. The second limitation is that the research sample was restricted to six individuals, which could limit the knowledge produced by this study to be applied in other countries and similar contexts. We took the following measures once the possible limitations were recognized. First, a broad literature review and document analysis were inducted in order to recognize the research agenda and state the assumptions prior to the interviews. Secondly, the collection of data, analysis and findings were reviewed by faculty colleagues and advisors of this research. Although generalizability was not a goal of this study, through detailed description of the background and context, this study could be assessed for its applicability in other similar context. Based on this research we find that further research should be conducted to gain more understanding about the current system of copyright enforcement and its complexities. As the number of participants to this research is limited, interviewing a larger number of active composers, lyricists, publishers, CMO-representatives and others involved, would contribute to the following objectives: 1) create more insights, 2) assess the extent to which the same or comparable findings can be found but also to uncover the similarities and differences in perspectives of the participants based on their role and position, 3) understand and model how creators, publishers and CMOs cope with the exogenous technological innovation in the music industry and 4) contribute to the policy makers and economic actors discussion about future improvement of the copyright enforcement system. References Ab Rahman, A., Hamid, U. Z. A., & Chin, T. A. (2017). Emerging technologies with disruptive effects: A review. Perintis E-Journal, 7(2), 111-128. Atkinson, R. D. (2012). Copyright policy and economic doctrines. Information Technology and Innovation Foundation (ITIF). Retrieved from https://itif. org/publications/2012/11/26/copyright-policy-and-economic-doctrines. Bargfredde, A., & Panay, P. (2015). Fair music: Transparency and payment flows in the music industry. Boston, Massachusets: BERKLEE ICE. Retrieved from N. Hadžiarapović, M. van Steenbergen & P. Ravesteijn: Copyright Enforcement in the Dutch Digital Music Industry 591 https://www.berklee.edu/sites/default/files/Fair%20Music%20%20Transparency%20and%20Payment%20Flows%20in%20the%20Music%20Industry.pdf Belleflamme, P. (2016). The economics of digital goods: A progress report. Review of Economic Research on Copyright Issues, 13(2), 1-24. Birks, M., & Mills, J. (2015). Grounded theory: A practical guide. Sage. Bloomberg, L. D., & Volpe, M. (2019). Completing Your Qualitative Dissertation (Fourth Edi). Bogdan, R. C., & Biklen, S. K. (2007). Research for education: An introduction to theories and methods. (5th edition). Boston, MA: Pearson Education Corbin, J., & Strauss, A. (2014). Basics of qualitative research: Techniques and procedures for developing grounded theory. Sage publications. Department for Digital, Culture, Media & Sport. (2017). Independent review of the creative industries. London: GOV.uk. Retrieved from https://www.gov.uk/government/publications/independent-review-of-the-creativeindustries Handke, C. W. (2010) The creative destruction of copyright: Innovation in the record industry and digital copying, EUR –Faculty of History and Arts, Retrieved from https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1630343 Handke, C. (2012). A Taxonomy of Empirical Research on Copyright-How Do We Inform Policy?. Review of Economic Research on Copyright Issues, 9(1), 47-92. Holton, J. A., & Walsh, I. (2016). Classic grounded theory: Applications with qualitative and quantitative data. Sage Publications. Ingham, T. (2015). Global record industry income drops below $15 bn for first time in decades. Music Business Worldwide, Lipsey, R. G., Carlaw, K. I., & Bekar, C. T. (2005). Economic transformations: General purpose technologies and long-term economic growth OUP Oxford. Locke, L. F., Spirduso, W. W., & Silverman, S. J. (2013). Proposals that work: A guide for planning dissertations and grant proposals. Sage Publications. Lundvall, B., & Archibugi, D. (2001). The globalizing learning economy Oxford University Press New York Lyons, F., Sun, H., Collopy, D., Curran, K., & Ohagan, P. (2019). The music data dilemma: Issues facing the music industry in improving data management: Music 2025. Retrieved from SSRN Electronic Journal, doi:10.2139/ssrn.3437670 Mahoney, L. (2015). Why equality and fairness matters . Retrieved from https://cubegroup.com.au/why-equality-and-fairness-matters/ Marshall, C., & Rossman, G. B. (2014). Designing qualitative research. Sage publications. Maxwell, J. A. (2012). Qualitative research design: An interactive approach (Vol. 41). Sage publications. Merriam, S. B., & Tisdell, E. J. (2015). Qualitative research: A guide to design and implementation. John Wiley & Sons. Music Business Worldwide. (2018). How the global music copyright business grew by $1.5bn in 2016 (and why that’s amazing news today). Retrieved from https://www.musicbusinessworldwide.com/how-the-global-music-copyright-business-grewby-1-5bn-in-2016/ Nelson, R. R., & Winter, S. G. (1982). An evolutionary theory of economic change. Belknap, Patton, M. Q. (1999). Enhancing the quality and credibility of qualitative analysis. Health Services Research, 34(5 Pt 2), 1189. Patton, M. Q. (2015). Qualitative research & evaluation methods: Integrating theory and practice. Phillips, T., & Street, J. (2015). Copyright and musicians at the digital margins. Media, Culture & Society, 37(3), 342-358. Reyes-Mercado, P., & Rajagopal. (2017). Dynamics of disruptive innovations in outperforming global brands: A study in Mexico. International Journal of Business Excellence, 11(1), 1-1 Roberts Dave. (2021, March 10). ‘streaming data files are getting bigger and bigger – they are not manageable manually anymore.’. Music Business Worldwide, Retrieved 592 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE from https://www.musicbusinessworldwide.com/streaming-data-files-are-getting-biggerand-bigger-they-are-not-manageable-manually-anymore/ Samuel, M. (2014). Winds of change. Journey of UK music from the old world to the new world. Review of Economic Research on Copyright Issues, 11(2), 27-59. Schlesinger, P., & Waelde, C. (2012). Copyright and cultural work: An exploration. Innovation: The European Journal of Social Science Research, 25(1), 11-28. Silver, J. (2013). Digital Medieval, Xtorical Publications Media. Available from Amazon. Spoerri, T. (2019). On upload-filters and other competitive advantages for Big Tech Companies under Article 17 of the directive on copyright in the digital single market. J. Intell. Prop. Info. Tech. & Elec. Com. L., 10, 173. The Allen Consulting Group. (2003). Economic perspectives on copyright law. Centre for Copyright Studies Ltd. Retrieved from https://static-copyright-com au.s3.amazonaws.com/uploads/2015/08/CentreCopyrightStudies_AllenGroupEconomicPerspectivesonCopyrightLaw.pdf Towse, R. (2006). Copyright and artists: a view from cultural economics. Journal of economic surveys, 20(4), 567-585. Towse, R. (2017). Economics of music publishing: copyright and the market. Journal of Cultural Economics, 41(4), 403-420. Watt, R. (2015). The efficiencies of aggregation: an economic theory perspective on collective management of copyright. Review of Economic Research on Copyright Issues, 12(1), 2. Wikström, P. (2013). The music industry (2nd Ed.). Cambridge: Polity Press. Williamson, J., & Cloonan, M. (2012). Contextualizing the contemporary recording industry. The international recording industries (pp. 29-48) Routledge. Wu, Z. (2018). No title. A Legal Framework for Global Joint Copyright Management in Musical Works: Based on Rawls's Theory of Justice N. Hadžiarapović, M. van Steenbergen & P. Ravesteijn: Copyright Enforcement in the Dutch Digital Music Industry 593 Appendix 1: Discussion Topics Interviews Composer/lyricist Discussion topics Theme: the - How is the copyright system set up in the practical application of Netherlands? - How is the distribution the of music rights enforcement organized in the of copyright Netherlands? in The - How do systems for registering works at Netherlands Buma/Stemra work? - Which meta data is required to register a work at Buma/Stemra? - How does CMO distribute the collected funds? - To what extent are the creators aware of their rights and obligations with regard to copyright enforcement? Participants Role Publisher Discussion topics - How is the copyright system set up in the Netherlands? - How is the distribution of music rights organized in the Netherlands? - What is publishing and what roles does a publisher fulfill? - Which meta data is required to register a work at Buma/Stemra? - How does CMO distribute the collected funds? - To what extent are the creators aware of their rights and obligations with regard to copyright enforcement? Theme: - What contracts are - What contracts possible between are possible relationships creators and publishers? between creators amongst and publishers? Why do you have a creators, publisher or why do you - How does CMO creators and not have a publisher? know where the publishers money should go? CMO Discussion topics - How is the copyright system set up in the Netherlands? - How is the distribution of music rights organized in the Netherlands? - How do systems for registering works at Buma/ Stemra work? - Which meta data is required to register a work at Buma/Stemra? - What is the role of CMO? - Which parties are the music users? - How does CMO distribute the collected funds? - How does CMO know where the money should go? - To what extent are the creators aware of their rights and obligations with regard to copyright enforcement? 594 (rights holders) and CMOs Theme: the effects of digitization on music copyright 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE - Do all makers have the same interests or are there differences amongst them? - How do rapid changes affect relationships between creators and publishers? - What about software systems at CMO? - What is the influence of technology on the copyright system? - To what extent are the users involved by Buma/Stemra, for example, in the development of such a registration portal? Theme: Black - To what extent is Buma/Stemra doing box well? - What can they do better? - What is the role of CMO? - To what extent is the copyright system transparent? - How do rapid changes affect relationships between creators and publishers? - What about software systems at CMO? - What about alignment between EU legislation and technological developments? - What is the influence of technology on the copyright system? - To what extent are the users involved by Buma/Stemra, for example, in the development of such a registration portal? - To what extent is Buma/Stemra doing well? - What can they do better? - What is the role of CMO? - To what extent is the copyright - What about software systems at CMO? - How is the interconnectivity between different IT systems arranged? - How does CMO collect money from music users? - What about alignment between EU legislation and technological developments? - What is the influence of technology on the copyright system? - To what extent are the users involved by Buma/Stemra, for example, in the development of such a registration portal? - To what extent is the copyright system transparent? - Do things ever go wrong with regard to the collection and / or distribution of funds by CMO? - What is the copyright black box? N. Hadžiarapović, M. van Steenbergen & P. Ravesteijn: Copyright Enforcement in the Dutch Digital Music Industry - Do things ever go wrong with regard to the collection and / or distribution of funds by CMO? - What is the copyright black box? 595 system transparent? - Do things ever go wrong with regard to the collection and / or distribution of funds by CMO? - What is the copyright black box? 596 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE INFORMATION REQUIREMENT IN THE TRANSITION TOWARDS A CIRCULAR FASHION INDUSTRY MARJA EXALTO-SIJBRANDS & PASCAL RAVESTEIJN HU University of applied sciences, Utrecht, Research Center of Digital Business and Media, The Netherlands; e-mail: marja.exalto-sijbrands@hu.nl, pascal.ravesteijn@hu.nl Abstract Management of fashion (related) companies need to become convinced that circularity delivers positive financial results and incentives. This research aims to provide the first information requirement insights needed to enable the transition to a circular fashion industry. Due to easy access and abundant information ‘Jeans’ were selected as example item. Using the Design Science research approach the required information within in a closed loop supply chain (CLSC) in fashion was derived. Semi-structured interviews validated the CLSC information requirements derived from literature. Next, observations and additional literature findings supported the interview results. The outcomes show that information to support integration and collaboration of both: supply and recycle chain is necessary. Independently operating recycle organizations miss ‘central loop management’, ‘information integration’ and ‘a chain-common objective’ to successfully adopt circularity. The main bottlenecks found in relation to circularity are: ‘overlooking the customer as stakeholder’ and ‘a lack of chain integration’, this applies not only to jeans items. Therefore, the indicative study outcomes contribute to the body of knowledge of circular fashion value chain information requirements in general. DOI https://doi.org/10.18690/978-961-286-485-9.42 ISBN 978-961-286-485-9 Keywords: circular industry, recycling, fashion, R-ladder, circular business model 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 598 1 Introduction The international fashion industry flourishes on large volumes of newly produced garments. With the expected growth in global population and average global wealth, the volume of discarded apparel is predicted to grow progressively. This, combined with fast fashion as business model will within 25 years lead to scarcity of clothing fibres. Therefore, the need grows for the fashion industry to addapt circularity (Ellen MacArthur Foundation (hence EMF), 2017). The business model of fast fashion stimulates unreasonably cheap and poorly produced items and blocks achieving affordable sustainable clothing for all global citizens in 2050 and beyond (Wicker, 2016). Sustainable development is often related to environmental improvements (Seuring, S., Müller, M., 2008), which in the fashion industry is adopted as: supplier’s management limitation strategy, performance and/or image risk strategy (Seuring, S., Müller, M., 2008). These improvements are labelled as green washing and mask eagerness for short-term revenues, regardless its’ effect (EMF, 2017). In 2016 this ‘take-make-dispose-of’ fashion business model delivered around 1.2 billion tons of greenhouse gasses; health threatening fertilizers and colouring chemicals; half a million ton of micro plastics in our oceans; and child labour practices (EMF, 2017). With the expectation of the indirect effects such as drought, heavy rains, and longer growing times, the future global production of new fibres is under pressure. When new fibre production falls short the need for reborn fibres will emerge. Also a growing market for second-hand items is expected (from 1% of the total fashion sales currently, up to 10% in 2030). Since 2000 the first fashion entrepreneurs focused on circularity via innovative solutions of mechanical and chemical ‘fiberization’ of fashion items into reborn fibres. Unfortunately, not enough of these renewed fibres end up as new fashion items. Where the majority of Brands and Retailers in the Netherlands state that the perception of consumers repels from wearing reused fibres (MODINT, 2019), research from Morgen and Birtwistle (2009) and WRAP (2017) both show that consumer behaviour is able to adopt sustainability. Furthermore, currently the price for reborn fibres cannot compete with newly produced ones. The integrated supply chain (SC) with its strong price negotiation results in prices for new fibres that lay far below their true cost (BCI, 2018). Therefore, reborn fibres are less attractive as raw material. Promotion of Green Logistics and Circular Economy (CE) at education and entrepreneurs is of key importance (Seroka-Stolka, O., Ociepa- M. Exalto-Sijbrands & P. Ravesteijn: Information Requirement in the Transition Towards a Circular Fashion Industry 599 Kubicka, A., 2019). Unfortunately, insights miss in how a closed loop fashion supply chain becomes an attractive and profitable business model. Therefore, the Dutch Industry Association for Re-winning textile fibres (VHT) aims to (1) reduce textile waste and (2) increase the potential of fibre reusability. They understand that the reusability capacity of fibres (in number and quality) requires measurements and a financial leverage of the circularity business case. In this lies the motivation for this research: delivering ‘information requirements’ within the circular fashion business model from fashion items to fibres as first step towards profitable circular fashion business cases. 2 Theoretical background For the literature review the university’s search engine HUGO and Google scholar were used with keywords related to linear supply chain fashion successes. The included standard terms were ‘fashion’ or ‘textiles’, and 'supply' or 'recycle chain'. These were combined with more specific terms such as: 'circular(ity)', ‘performance indicators’ and ‘information management’. Compared to thousands of hits with the standard terms, the results of combinations with specific terms were limited. The most recent and best fitting articles (within the context of logistics) were selected. Prior to defining the key terms to this study, the research team discussed the relevance of each term based on an analysis on its value chain importance. Below we elaborate on the most important concepts related to this study. Circular Economy A circular economy regenerates its resources and commodities in order to utilize, maintain and recover products, their components and raw materials. The aim is to keep all products, components and materials at the highest value possible. EMF (2018) states that this viewpoint is needed in order to let commercial and noncommercial organizations adopt circularity across their supply chains, delivering new and different jobs and sustainability. Ashby (2018) sees the core of CE in recovering value from tangible commodities to narrow the definition of closed-loop to reuse and restoration. Battini, et al see (2017) ‘Circularity’ of an industry as option to reduce the environmental impact of the whole supply chain. In this research we combined the above into the following definition of CE: an economy where companies close the supply chain as a loop with the aim to keep all products, components and materials at the 600 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE highest value possible and to recover value from tangible commodities, extending job opportunities with new and different ones whilst delivering sustainability. Closed Loop Supply Chain As the definition substantiates, CE is connected to closed-loop supply chains (CLSC). CLSC maximizes value creation over the entire product life-cycle, starting at product design (McDonough and Braungart, 2002; EMF, 2013). It requires a control and operation system that also includes a dynamic recovery of the values used. This makes returns retrieved over the product life-time indispensable (Van Wassenhove and Guide, 2009). Where companies move from sustainability towards circularity, sustainable production systems increasingly become based on resource reuse and remanufacturing (Svensson, 2007; Angelis-Dimakis et al., 2016). Recycle Chain The first ‘design for reuse’ requirements were presented in regards to electronics (McDonough and Braungart, 2002). Accordingly, recycling became a Reverse Supply Chain (RSC) with a waste challenge perspective. RSC of electrical products followed a true ‘reverse flow’, returning the item to its manufacturer. This product return flow required additional logistics and performance measurement solutions that compared to those of the SC. Management information requirements were extended with a different kind of business economics combined with environmental metrics (Ahi, et al. 2015). However, recycled products do not necessarily follow a ‘reverse’ route. Recycling as such has developed as an autonomous operational activity that helps to limit waste and the product footprint. Accordingly, recycling should be recognized as a SC Comparable Activity that is also linear in behaviour. With the expectation that the Recycle Chain (RC) requires SC-comparable performance measurements, this study recognizes ‘Recycling’ as activity within the RC, that requires SC comparable integration based on process information. The R-Ladder Recycling has been acknowledged for its different product-life-stages presented as steps on a ladder (Netherlands Environmental Assessment Agency, 2019). The purpose of each step depends on the particular product-life-stage and product M. Exalto-Sijbrands & P. Ravesteijn: Information Requirement in the Transition Towards a Circular Fashion Industry 601 characteristics. Each step is expressed with an ‘R’: Refuse, Rethink, Reduce, Reuse, Repair, Refurbish, Remanufacture, Repurpose, Recycle, and Recover. Each Rladder step presents a different strategy towards the materials a product is made of. The strategy of the last step ‘Recover’ presents the recovery of all energy used during production of the initial product. Circular fashion industry ‘Circular fashion’ is defined as: “Clothes, shoes or accessories that are designed, sourced, produced and provided with the intention to be used and to be circulated responsibly and effectively in society for as long as possible in their most valuable form, and hereafter return safely to the biosphere when no longer of human use” (Muthu, 2019). This definition is adopted because of the sustainability principles included, which form the bases of the information requirements this study searches for, being e.g. usage of biodegradable materials, toxic chemicals and pesticides, volume of re-used sustainable materials, and product quality (EMF, 2015). Supply chain integration information Logistics information and planning technologies are indispensable for SC integration, and SC process improvements subsequently result in higher business performance for chain partners (Rai et al., 2006). An integrated SC should be able to quickly react to market changes (Zailani & Rajagopal, 2005). Leuschner et al. (2013) stated the importance of information as part of supply chain integration. Furthermore, SC Integration improves financial performance when supported by top management (Zhao, Feng, Wang, 2015). Whereas SC integration is well known, RC integration is undescribed and integration between the SC and RC in order to create a CLSC is almost non-existent regardless the fact that a true CLSC requires sharing of information to support the total circular system. Therefore, it seems that the transition towards a circular fashion industry misses the holistic role of logistics. Key terms commonality This literature review emphasis that: successful circularity for fashion requires an attractive circular business model that concentrates on minimizing waste, resource extraction and environmental impact whilst keeping focus on economic growth potential (EMF, 2015; 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 602 McKinsey & Company 2014; Morgan, and Birtwistle, 2015) by adopting logistics integration principles known from the supply chain domain and that goes beyond money (Jonker, 2014). 3 Methodology This research studies the life-cycle of Jeans, entailing: being bought and worn; reused through second hand sales; recycled into a set of fibres to produce a new Jeansitem and the subsequent product life-cycle. Fibres missing the required quality level for reuse, end up at the R-ladder step of ‘Recover’. To limit complexity, this research omits the R-ladder steps: Repair, Refurbish, Remanufacture, and Repurpose. 3.1 Research question Based on interviews with VHT and insights from the literature review the research question adopted is: What information is required to create an integrated Closed Loop Jeans (Fashion) Supply Chain? This descriptive and evaluating research delivers insight in information required to determine a Jeans CLSC business proposition. The theoretical perspective is checked in practice at three Jeans companies, fashion retailers, and additional companies such as three recyclers. Within these organizations the supply and recycle processes and supporting systems are studied. 3.2 Sub-questions and approach The research was performed by answering four sub-questions. 1. What is the current (circular) closed loop supply chain for Jeans within the fashion industry? A circular supply chain fashion model by Wageningen University Research (2019) formed the bases to develop a circular fashion process model. Next, at two different conferences: “Logistics in the Circular Economy” and “Fashion and Design for Sustainability” we selected at random fashion professionals for participation in our research. They were asked to perform reliability and validation checks. This resulted into the concept Generic Circular Fashion Textiles Loop, which was discussed with VHT. Twenty M. Exalto-Sijbrands & P. Ravesteijn: Information Requirement in the Transition Towards a Circular Fashion Industry 603 three companies who are involved in some manner with the fashion loop participated in a research project presentation in which the concept CLSC was discussed. During this research presentation (January 15th 2020) all twenty three professionals present approved the circular fashion model. With input from Jeans brands (desk research and interviews) the Jeans Closed Loop Supply Chain (Jeans-CLSC) was derived. 2. What information is currently used per echelon to support jeans-item circularity? Through desk research the logistics viewpoint was added to the basic JeansCLSC. This resulted in finding the required information drivers to enable circular chain control. To understand what information stimulates the business and the circular economy, four organisations (Jeans, Fashion retailer, Recycler and Branch organisation) were interviewed. Two researchers validated the findings that formed the ‘IST’ Jeans-CLSC. 3. What information creates a state-of-the art circular Business model for jeans? Desk research was performed on information requirements from documents of an existing state-of-the-art full CLSC Jeans brand. Additional, high performing circular loops within recycling such as paper, glass, plastic and disposal fee obliged equipment were studied to determine bestpractices. Next, the defined State-of-The-Art Circular Jeans fashion Business model was discussed as a potential SOLL-situation with the circular Jeans manufacturer. 4. What adoption is needed to extend the current Jeans fashion business into a circular one? The difference between the ‘IST’ and ‘SOLL’ models was analysed with focus on business and circular economy (including sustainability) drivers and the information objects needed. 3.3 Design Science Research Because insights in information requirements was the main goal, the research followed the Design Science Research approach by Hevner et al. (2004). Exploring the jeans supply and recycle chains and the relationship between these in regards to information requirements is the first step in Hevner’s model, part of the ‘Problem’s Environment’. Determining information requirements to achieve a circular business model is done using the ‘Existing Knowledge Base” of the SC (Hevner’s model second step and theory based). Mapping the problem’s environment with the existing knowledge base results in ‘Designing a conceptual solution’ (third step). The 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 604 designed solution needs testing prior to the real ‘Solution Design’. This last step of Hevner’s model is left for a next research project. 4 Results The Jeans-CSCL and the related information requirements are presented below. 4.1 Circular Jeans Fashion The described Jeans-CLSC (see Figure 1) compares to the generic CLSC processes, echelon types and order (see sub-question 1). Three circular loops are recognized: 1) the fibre recycle loop; 2) the B2C second hand market recycle loop; 3) the C2C loop where consumers sell to consumers. The large fibre recycle loop shows 13 echelons. The differences between Jeans-CLSC and general fashion-CLSC are found within the content of the processes. For example, due to the heterogeneous fibre mix used in most general fashion-items Step 6. – quality selection, is far more complex at fashion-CLSC than at Jeans. The circular loops described, show the most important transition points in achieving a true circular industry: 1) Consumer is currently excluded as CLSC stakeholder; 2) Value proposition between the SC (left) and RC (right) parts of the loop misses; 3) Fibre management misses (high value sorted fibres result into low value products loosing good fibres to non-fashion loops); 4) Circular pricing optimization misses. Reborn fibres should be able to compete with newly produced fashion fibres, which currently is impossible due to missing true price and true cost from sustainability factors. M. Exalto-Sijbrands & P. Ravesteijn: Information Requirement in the Transition Towards a Circular Fashion Industry 605 Figure 1: Circular Jeans Fashion 4.2 CLSC Information Based on desk research of the typical current fashion SC and RC, the information requirements found and confirmed by the companies participating in this study are: Customer demand (orders in numbers and volumes); SC integration information on demand, supply and performance to prevent inventory risks; Cost reduction factors resulting from integrated planning (e.g. on transport, warehousing and distribution); Image building result information on communication about adoption of bio and green aspects; and Sustainability performance indicators. Remarkable is that specific circularity information factors are uncommon. Desk research and the five interviews at RC-companies show that these companies perform a single or limited number of echelon activities of the total RC. The need for integration within the linear RC has not yet been acknowledged, although this would result in comparable advantages as recognized for the integrated linear SC. Research revealed that high quality reborn fibres are downgraded to low-end 606 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE product markets (e.g. isolation materials, or cushion filings), where utilization as raw new yarn material was an option (Frankenhuis, 2019). Here circular economy is restricted to an open loop and the reborn fibres extend their product life outside the fashion industry. Companies within the RC operating autonomously limit their options to optimise their performance within a linear optimised RC as well as their paths for a transition to circularity (CLSC). This result leads to the hypothesis that the RC will also optimise the individual company performance by adopting integration as the SC has proven. Like the SC this requires information sharing. Without integration the RC companies are unable to reach a higher level of performance and thereby also influences the option for the fashion industry to become circular. 4.3 Finding state-of-the-art integration Two circular jeans manufacturers (using 40% reborn fibres) acknowledged that only centrally orchestrated CLSCs successfully integrate the SC and the RC. Two generic fashion brands selling Circular Jeans (using 20% reborn fibres) underwrite this approach (Koppert, 2017). Therefore, integration of processes as common practise is required in both SC and RC as well as between these two chains. Their circular business model is based on: sales, information on sustainability, and adopting more manufacturing transparency at item level (Olugu, et al. 2010). Also, sustainable fibre information is required and volume and quality measurements based on items and fibres need to be shared for transparency within the circular value chain. Next, the collector’s decision to enable an attractive circular business model should be based on an Economic and Sustainability trade off (ESTO). This helps to appoint the collected item to the small recycle loop (second hand) or the large one (recycle into reborn fibre), as shown in figure 1. Which choice after collection is advised, depends on insight in fibre quality, actual costs, footprint calculations and sustainability cost effects. This is a complex trade-off. Besides quality information at item selection, fibre adoption at yarn production also requires quality insights. For this, batch quality registration at ‘fiberization’ is required. Although it is expected that the number of times a fibre can be reused, lies between four to six times actual system tracking to deliver this information misses. M. Exalto-Sijbrands & P. Ravesteijn: Information Requirement in the Transition Towards a Circular Fashion Industry 4.4 607 Transition towards circular Jeans business Transition of the Jeans SC into a Jeans CLSC requires adoption of the RC activities and integration of all loop echelons including the customer as loop partner. Available information must stimulate the customer to return its item into the loop. In practise collection of Jeans is done through the Jeans shops or via generic fashion item collection within multiple channels across different type of organisations. Research at two sustainable Jeans shops showed a significant loss of their annual item returns in spite of rewarding systems and lease constructions to stimulate consumers’ return behaviour. This makes the item-offering process by the customer more important to consider rather than the collection process effectiveness and efficiency of the collector. With the loop of Figure 1 as reference the information required to achieve a circular business model is presented in Table 1. Table 1: transition purpose and information objects Purpose Total transparency in Jeans sustainability for customers on item level (from harvesting cotton to fibre recycling energy used). Total transparency in CLSC Sustainability image information per echelon USP to transform the consumer into a stakeholder Branding ‘awareness’ Information object  Denim cotton fibre mixing norm in volumes and types (batch wise information);  Sustainability performance on Denim yarn, Denim, and item production and specifics on e.g. labour and colouring processes (SER, 2016; EO, 2019);  Identification tracking information;  Company information of all stakeholders involved (name, website, location);  Full production information (production date, location, factory, material, labour used, quality check, human resources, etc.);  All cost and risk information of the integrated chain;  Footprint (all negative effects on nature, plus restauration);  Positive effects on nature;  Labour conditions  Fibre information including fibre history details;  Return rate Jeans at point of collection ;  Item history;  Measurement of ‘honest production’ 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 608 Decision information recycle loop (small or long loop) Sustainability guarantee at item collection Increase of Consumer reuse rate       Earth preservation guarantee (rate) Item quality norm; Fibre quality norm; Footprint; Nature and labour effect measurements Intake quality measures: ‘dry’, ‘clean’, and ‘reusable’  Pre-selection business information on volumes, quantity, price and cost information as basic information; Re-use norm set by sales in volume, quantity, price and cost; All item information travels with the item creating item history;  Item attractiveness 5  Conclusions, Recommendations, Limitations This study shows that the acquisition process of materials in a CLSC forms a risk under uncertain quantity and quality of recycled products. Such uncertainties are revealed in the RC and subsequently effect the entire CLSC. These risks emphasize the importance of sharing fibre and item quality and quantity information. Currently ‘Circularization’ depends on the collector’s decision how to collect and whether to appoint a collected item to the reuse or recycle loop, whilst this fundamental decision should be based on fibre quality information and should be in line with fibre demand information from the SC. Next, the business of mixing reborn with new fibres must become more attractive and transparent to the consumer. Mixing fibres at yarn production will only develop when the fibre market adopts a normal supply and demand system on true pricing. This means adopting a mechanism where farmers with transparent sustainable cotton production sell against fair prices, and where reborn fibres offer the fashion manufacturer a cost reduction. Due to fair cost sharing, only the integration between SC and RC supports this development. For circularity the major challenge lies in attracting the autonomously operating companies of the RC to become performance oriented across the entire SC. An orchestrated (jeans) loop fails without integrated RC. Therefore, a Circular Business model becomes economically attractive when performance integration supports the pie growing and pie sharing capability of all stakeholders involved, including the customer. Also, the value flow needs to become circular, and the transition must be case focused rather than generic. M. Exalto-Sijbrands & P. Ravesteijn: Information Requirement in the Transition Towards a Circular Fashion Industry 609 As with any study this research has limitations. First of all, the study focused on one type of fashion item (Jeans) which oversimplifies the challenges faced in the entire industry. Furthermore, a limited amount of organizations participated in this research and these could be considered front runners thereby providing a specific perspective. Finally, the main limitation to the outcome of this study is that it's outcome is a conceptual solution that still requires testing and follow up research. Acknowledgements The students Frank Donga, Guido de Bruin and Marc Visser supported the research significantly through their project activities in the minor Business Information Management. References Ahi, P. and Searcy, C. (2015). An analysis of metrics used to measure performance in green and sustainable supply chains. Journal of Cleaner Production. Vol 85, p.360-377. Angelis-Dimakis, A., Alexandratou, A., Balzarini, A., (2016). Value chain upgrading in a textile dyeing industry. J. Clean. Prod., Vol.138, p.237-247 Ashby, A. (2018). Developing Closed Loop Supply Chains for Environmental sustainability: Insights from a UK clothing case study. Emerald, Journal of Manufacturing Technology Management. http://hdl.handle.net/10026.1/10898 Battini, D., Bogataj, M., Choudhary, A. (2017) Closed Loop Supply Chain (CLSC): Economics, Modelling, Management and Control. International Journal Production Economics. Vol.183 p.319–321 Retrieved 18-05-2020 via journal homepage: www.elsevier.com Braungart, M., McDonough, W., Bollinger, A. (2007). Journal of Cleaner Production Vol. 15 p.13371348 BCI. (2018). Better Cotton Initiative. Retrieved from http://stories.bettercotton.com/2018AnnualReport/index.html Ellen MacArthur Foundation (EMF). (2018). Circular economy. Retrieved from www.ellenmacarthurfoundation.org/circular-economy Ellen MacArthur Foundation (EMF). (2017). A new textiles economy: Redesiging fashion's future. Retrieved from http://www.ellenmacarthurfoundation.org/publications Ellen McArthur Foundation (EMF). (2013). Towards the circular economy. Ellen MacArthur Foundation. Retrieved from https://www.ellenmacarthurfoundation.org/assets/downloads/publications/EllenMacArthur-Foundation-Towards-the-Circular-Economy-vol.1.pdf Hevner, A. R., March, S. T., Park, J., & Ram, S. (2004). Design science in information systems research. MIS quarterly, 75-105. Jia, F., Yin, S. Chen, L., Chen, X. (2020). The circular economy in the textile and apparel industry: A systematic literature review. Journal of Cleaner Production Vol. 259 p.120728 Jonker, J. (2014). Nieuwe Business Modellen. Retrieved from https://www.nieuwebusinessmodellen.nl Koppert, P., Brouw, H. o., & Adel, E. v. (2017). Roadmap Circulair Textiel. Leuschner, R., Rogers, D.S., Charvet, F.F., (2013). A Meta-Analysis of Supply Chain Integration and Firm Performance. Journal of Supply Chain Management. Vol.49, No.2, p.34-57 McDonough, W. and Braungart, M. (2002). Cradle to cradle: remaking the way we make things. North Point Press. McKinsey & Company. (2016). Style that’s sustainable: A new fastfashion. 610 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE MODINT. (2019). Dossier MVO – Circulairiteit. Retrieved from https://modint.nl/dossier-imvo/ Morgan, L., & Birtwistle, G., (2009). An investigation of young fashion consumers disposal habits. International Journal of Consumer Studies. Vol. 33, p.190–198 Muthu, S.S., (2019). Circular Economy in Textiles and Apparel : Processing, Manufacturing, and Design. Elsevier Hongkong, e-book Netherlands Environmental Assessment Agency. (2019). Circulaire economie in kaart. Den Haag: PBL Planbureau voor de Leefomgeving. Olugu, E.U., Wong, K.Y., Shaharoun, A.M. (2010). A Comprehensive Approach in Assessing the Performance of an Automobile Closed-Loop Supply Chain. Sustainability. Vol. 2, p.871-889 Retrieved via doi:10.3390/su2040871 Rai, A., Patnayakuni, R., Seth, N., (2006). Firm performance impacts of digitally enabled supply chain integration capabilities. MIS Q. 30 (2), 225–246. Seroka-Stolka,O., Ociepa-Kubicka, A. (2019). Green logistics and circular economy. Transportation Research Procedia. Elsevier B.V. Vol. 39 p.471–479 Seuring, S., Müller, M. (2008). From a literature review to a conceptual framework for sustainable supply chain management. Journal of Cleaner Production Vol. 16, p.1699–1710 Svensson, G. (2007). Aspects of sustainable SCM (SSCM): conceptual framework and empirical example. SCM: Int. J., Vol.12, Iss.4, p.262-266 Van Wassenhove, L.N. and Guide, . (2009). The Evolution of Closed-Loop Supply Chain Research. Operations Research. Vol. 57, No. 1, pp. 10–18 Wicker, A. (2016, september 1). Fast fashion is creating an environmental crisis. Newsweek. WRAP. (2017). Clothing durability report. Zailani, S., & Rajagopal, P., (2005) Supply chain integration and performance: US versus East Asian companies. Emerald Insights - Supply chain integration and performance. Retrieved from DOI: https://doi-org.hu.idm.oclc.org/10.1108/JIMA-11-2015-0082. RESPONSIBLE AI AND POWER: INVESTIGATING THE SYSTEM LEVEL BUREAUCRAT IN THE LEGAL PLANNING PROCESS ROB PETERS,1 KOEN SMIT2 & JOHAN VERSENDAAL2 1 Province of Utrecht, the Netherlands; e-mail: rob.peters@provincie-utrecht.nu University of Applied Sciences Utrecht, Digital Ethics, the Netherlands; e -mail: koen.smit@hu.nl, johan.versendaal@hu.nl 2 HU Abstract Numerous statements and pamphlets indicate that governments should increase the transparency of ICTimplementations and algorithms in eGovernment services and should encourage democratic control. This paper presents research among civil servants, suppliers and experts who play a role in the automation of spatial policymaking and planning (e.g. environment, building, sound and CO2 regulation, mobility). The case is a major digitalisation programme of that spatial planning in the Netherlands. In this digital transition, the research assumption is that public and political values such as transparency, legitimacy and (perceived) fairness are difficult to validate in the practice of the design process; policy makers tend to lose sight of the algorithms and decision trees designed during the ICT -implementation of eGovernment services. This situation would implicate a power shift towards the system level bureaucrat. i.e., the digitized execution of laws and regulations, thereby threatening democratic control. This also sets the stage for anxiety towards ICT projects and digital bureaucracies. We have investigated perceptions about ‘validation dark spots’ in the design process of the national planning platform that create unintended shifts in decision power in the context of the legal planning process. To identify these validation dark spots, 22 stakeholders were interviewed. The results partially confirm the assumption. Based on the collected data, nine validation dark spots are identified that require more attention and research. DOI https://doi.org/10.18690/978-961-286-485-9.43 ISBN 978-961-286-485-9 Keywords: system level bureaucrat, street level bureaucrat, algorithms, business rules management, validation 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 612 1 Introduction The danger of unattainable algorithms in eGovernment services has been highlighted by popular and scientific heralds alike (Kool, Timmer, Royakkers, & Est, 2017; van den Hoven, Miller, & Pogge, 2017; Vereniging van Nederlandse Gemeenten, 2019). For example, the UK-based TV show Little Britain portrayed the citizen as a powerless victim of digitalised procedures already in 2004 with a series titled “computer says no”. For this research, we focus on the Dutch situation in which the problem domain seems well recognisable. The Raad van State, the highest Dutch National advisory council has been addressing the problem of ‘dehumanization’ of government services in many reports, e.g. (van den Hoven et al., 2017). This growing anxiety with what computers can do to us in a bureaucracy grown beyond our control sparked a wave of pamphlets on digital ethics, computer ethics and general principles for government services (European Commission, 2019, 2020; gemeente Eindhoven, 2019; van den Hoven et al., 2017). The Dutch National society of municipalities and cities, the ‘Vereniging van Nederlandse Gemeenten’ (VNG) announced the agreement on digital principles and values (Vereniging van Nederlandse Gemeenten, 2019). The Dutch National Digital agenda 2020 included a whole chapter on ethical values and principles for digitalisation (Digitaleoverheid, 2020). The European Commission recently published a “white paper on Artificial intelligence and administrations” that lists several requirements (European Commission, 2020). This pamphlet promotes the use of AI in administrations, but points at issues of trust at the same time. Yet, there still seems to be a gap between such general ethical ideas on digital public values and the operationalisation in current government processes. The Dutch Government Review board recently published a report including an auditing framework for algorithms that at least provides an ‘auditing framework for algorithms’ (Algemene Rekenkamer, 2021). We also observe, from the practitioner’s side, that vendors claim transparency and open standards in their offerings without much substance, so one needs to dig deeper to determine the fairness of algorithms. From a scientific perspective, the landscape seems partly covered. There is a body of knowledge in Business Rules Management (BRM) that is already touching on eGovernment services (Schlosser, et.al 2014). There has been twenty years of research on AI and Law addressing the automation of legal bureaucracies, see for R. Peters, K. Smit & J. Versendaal: Responsible AI and Power: Investigating the System Level Bureaucrat in the Legal Planning Process 613 example the Jurix, ICAIL, and IFIP conferences that started in the eighties. A growing population of researchers addresses the field of digital ethics (van den Hoven et al., 2017), (Vetzo, Gerards, & Nehmelman, 2018), and (van Engers & de Vries, 2019). Janssen et al., (2020) recently argued for a distinction between rulebased AI algorithms and Machine Learning-based algorithms in government applications, because of the demands on transparency. His focus was on the nature of the AI. Machine learning could be used to improve the design of the rule-based systems, however (Janssen et al., 2020). We stated earlier that there is a gap between high level ethical norms regarding transparency, fairness, discrimination regarding algorithms and the applicability of these norms in practice by civil servants. The theory according to Lipsky (1980) and Bovens & Zouridis (2002) states that the power of the system level bureaucrat will increase because of the instalment of algorithms in digital systems or platforms that automate the decision space of the street level civil servant, the street level bureaucrat. On the one hand, we adhere to the definition of Lipsky (1980) of a street level bureaucrat: “a public employee that deals directly with citizens in the course of their jobs, and who have substantial discreation in the execution of their work.” On the other hand, we adhere to the definition of Zouridis, van Eck & Bovens (2020) of a system level bureaucracy/bureaucrat: “the discretionary powers of the street-level professionals have been disciplined by digital systems, and the locus of administrative discretion has shifted to those responsible for programming the decision-making process and translating the legislation into software”. The transition of street level bureaucracy towards system level bureaucracy complicates the execution of legislation, because a translation has to be done in order to implement the legislation in the information systems replacing the system level bureaucrats. This translation offers room for a power shift towards the information systems as well as that such a translation and its output need to be validated thoroughly. If the latter fails, organizations could face severe consequences, such as lawsuits, high fines, negative publicity as well as political outfall (Smit, Versendaal, & Zoet, 2017; Smit, Zoet, & Berkhout, 2017). We, therefore, investigate the potential ‘validation dark spots’ in the design process where legislation is translated into information systems. With validation dark spots we mean those areas in the design process where participants of that design process identify potential unintended shifts in power between these two levels, i.e., street-level bureaucracy versus system level bureaucracy. Bajec & Krisper (2005) describe BRM research as follows: “we presume that the ultimate goal of business rules research is to find a way and facilities that support automatic propagation of changes to business policies, respectively the business environment, to information 614 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE systems used within organizations. The term validation is used to describe the integrity of the translation of law and regulations as well as internal business policies into information systems. Formally, it is referred to as the ’verification’ and ‘validation’ capabilities (Smit & Zoet, 2018a; Zoet & Versendaal, 2013). Smit, Zoet, and Berkhout (2017) applied verification and validation capabilities on governmental legislation in search of levels of compliance of the actors involved. They came up with 28 verification capabilities (Smit, Zoet, et al., 2017). Other, similar studies and results, which focused on the identification and classification of verification capabilities for BRM are detailed in the work of (Corea, 2021). However, such research has only been partially conducted with regards to the validation capability. Therefore, we specifically seek validation dark spots in this study where the translation process from political/legal norms and values into information systems affect the position of the street level bureaucrat. An adequate case is found in the Dutch Omgevingswet, which is further detailed in the following sections. To investigate this case in search for validation dark spots, the following research question is addressed in this paper: ‘What are the validation dark spots in the decision power shift from street-level bureaucracy towards system-level bureaucracy caused by digitization in the context of the Dutch Omgevingswet?’ 2 Background and Related Work Within our object of study, we aim at the area of services where government affects the life events of citizens by means of permits and urban design decisions. A life event is defined as a “A social experience or change with a specific onset and course that has a psychological impact on the individual.” Examples are starting a new business, parental divorce, house relocation or school changes (Goodyer, 1991). The business rulebased algorithms are used to balance interests concerning economy, safety, mobility, housing, and ecology. Broad policy intentions are set in regulations and those are translated into an information system that deals with permit information and permit processes. The planner provides contextual information for the citizen when this person is asking for a permit to build or develop an object in the region. This information addresses both the permit requirements, the situational context and the process. The citizen will start providing relevant information digitally (forms) in a permit process. The translation of policy intentions to regulations that are in turn being translated into information systems is not without problems (Smit, Versendaal, et al., 2017; Smit & Zoet, 2018a, 2018b; Smit, Zoet, & Versendaal, 2018). The R. Peters, K. Smit & J. Versendaal: Responsible AI and Power: Investigating the System Level Bureaucrat in the Legal Planning Process 615 traditional policy maker offered policy goals up for decision making on the political platform and the resulting consensus was used and translated into juridical articles and norms. These norms were then interpreted, assessed, and adapted to the current situation by the street level bureaucrat for each individual case in a paper or email procedure. The system level bureaucrat, on the other hand, regards the current state of the data itself, as aggregated in a spatial data infrastructure, and applies business rules and standards in digital services to achieve the consensus policy goals and adapts the outcome of case decisions to the dynamic status of the data for each individual case. The assessment process is increasingly being automated by standard business rules in the balancing algorithms (Zouridis et al., 2020). This would be fine if all the translation steps were verifiable and could be validated by policy makers. To investigate this phenomenon, we want to determine to what extent and on which aspects decision power is being transferred from the street level civil servants towards the system designers when spatial planning legislation is being translated into information systems and algorithms. To do so, we need to define what decisionpower in the context of spatial planning comprises. 2.1 Definitions of (decision) power in spatial planning Bovens and Zouridis (2002) define the ‘street level bureaucrat’ as the executionary arm of government. The terms used for the level of freedom of the street level bureaucrat is the discretionary power to apply regulations on specific cases with autonomous space for interpretation. The European legislative level may set the framework for Natura2000 biodiversity, for example, and the Provinces may set the protected contours of that biosphere, but the individual street level civil servant decides on the legitimacy of the compensation actions offered against a building permit in that area. The Omgevingswet programme (Koninkrijksrelaties, 2018) was introduced in politics and towards citizens as a simplification of the environmental legal arena to decrease complexity and increase user friendliness. Twenty-two regulations regarding, for example, soil, air quality, Natura2000, biodiversity, and water quality would be reduced to one all-encompassing legal structure as was applied in New Zealand. The digital platform Omgevingswet would take over some of that executionary role by introducing forms and decision trees based on business rules that guide the citizen through permit processes and pre-calculated levels of compensation required. The level of freedom of the street level bureaucrat in our 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 616 example of compensation for a building permit would be replaced by the team that designs the forms and the business rules behind them. Discretionary power can be based on two different sources: 1) The translation from general rules as set at a higher level of jurisdiction into the specific application of a case of that rule, and 2) the semantic room for interpretation. Together these add up to the effective decision power that is left after digitalisation of the process. The distinction between these two is not always straightforward and the legislator is not precise enough in its instructions (Peters, 2016; Teuben, 2004). It is also clear that when the business rules driving the relevant forms for obtaining the permit are translated into information systems, the translation is carried out by other specialists than the civil servants who represent the government agency. 3 Research Method Bovens and Zouridis (2002) define the system engineer as a central role in the information system design process, but the question is what this role actually represents. In the case of the Omgevingswet digital platform, there are system engineers, legal knowledge engineers, legal planning experts, business rule specialists, domain specialists, programme managers, umbrella organisations of cities and regions, consultants and supplier-side developers who all have influence in the design process. The introduction of the Omgevingswet digital platform is chosen as the case for this explorative research because it represents more than just another case. Unlike many other studies about BRM in social security, immigration services, or tax returns, this platform will digitalise the main government service process of all Dutch cities. It is therefore a true situation of ‘street level bureaucrats’ and much less controllable by a small group of super experts hired by, for example, the National Tax office in a centralized approach. This legal planning platform is complex and thousands of civil servants, lawyers, developers, consultants, and project managers have been involved. The Platform is to be launched, after two failed deadlines, in 2021 when all 350 Dutch cities will have to transfer permit procedures to this digital platform. To identify the relevant validation dark spots in the context of the development of the Omgevingswet digital platform, we interviewed 22 representatives from various stakeholder groups. The interviews took place between January 2020 and February 2021. The first eleven interviews were carried out online due to COVID-19 R. Peters, K. Smit & J. Versendaal: Responsible AI and Power: Investigating the System Level Bureaucrat in the Legal Planning Process 617 restrictions. The respondents were all given the same description of the ‘system level bureaucracy’ based on Lipsky (1980) and van Bovens and Zouridis (2002) in advance. The first eleven interviews were conducted using a semi-structured approach. This works best when discussing certain topics while maintaining proper space for participants to digress on similar relevant topics or arguments (Pervan & Maimbo, 2005). This approach is in line with the explorative nature of this study. All interviewees have experience with the design process of the Omgevingswet digital platform. In total, three IT experts, three policy advisors, two BRM system suppliers, two GIS system suppliers, and one BRM scientist were interviewed. An interview protocol was standardized and utilized across the eleven semi-structured interviews, featuring 5 themes being: 1) role of the system designer, 2) room for interpretation of policies in the design process by the system designer, 3) room for decision power to make changes to the design of the policies that must be implemented in order to digitize them, 4) measures to control the quality of the system design (validation), and 5) the Omgevingswet. Each theme featured multiple questions to guide the interview and enable comparability of the results across all interviews to get a holistic view of the phenomenon of validation dark spots. In total, the protocol featured twenty-six questions. Additionally, the focus of the interview was scoped towards the Omgevingswet digital platform creation process over the last three years. The interviews were transcribed and thematically coded by one researcher and reviewed by another researcher. Furthermore, 11 non-structured open-ended interviews were conducted a few months after the first 11 interviews to gather more contextual information about the Omgevingswet platform, which were also conducted online. These interviews were only guided by the concept of the Dutch Omgevingswet and the Omgevingswet platform in development. In total, four National programme managers, two platform architects, one regional project manager, one expert on water management policies, one legal expert, one GIS expert and one BRM-system supplier were interviewed using this technique. The interviewees for the latter 11 interviews were selected based on their involvement from different perspectives as well as that they did not yet participate in the first round of 11 interviews. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 618 4 Research Findings: the Validation Dark Spots Based on the interview data and thematic coding, nine validation dark spots could be identified. These are further detailed in the subsections below. 4.1 The perception of power shifts We first needed to establish whether the interviewees indeed perceive and recognize the coming of a system level bureaucracy as described by Lipsky (1980) and Bovens & Zouridis (2002). Most of the respondents agreed that a larger part of the environmental law shall transform towards a system that resembles a system level bureaucracy because of the characteristics as described by Bovens and Zouridis (2002). However, there appears to be a difference in opinions between the more technical oriented designers and the policy designers with respect to the effect of that transformation. The policy designers seem to think that the decision process will be automated entirely, including the balancing and prioritization of variables. The technically oriented designers think that the processes around permits are being digitalised without touching on the balancing and prioritising itself. During the intake of a case, the initiator of the permit request is confronted with a decision tree of choices and variables that then feed a workflow of steps along relevant authorities and governmental experts. The case is then processed by these experts, depending on its complexity. The confusion about the level of automation of the decision has several origins:  The design of the decision tree is not without choices that affect the decision itself;  The technical people are more aware of the limitations of the technology whilst the non-technical interviewees experience a ‘feeling of being taken over’ by the technology; The case-handling is supported by templates created by central government. Smaller cities copy these templates due to a lack of financial and knowledge resources. By doing so, these smaller organizations standardize their decisions unintentionally, which in turn shifts more influence towards system level bureaucrats designing the templates. The technically oriented system designers tend to make a distinction between simple and repetitive cases that could be automated and complex and more unique cases for which human intervention will always be required. They see the value of   R. Peters, K. Smit & J. Versendaal: Responsible AI and Power: Investigating the System Level Bureaucrat in the Legal Planning Process 619 automation on top of digitalisation for reasons of efficiency. Policy experts do not always see where automation may be applicable to save resources. Upcoming paragraphs describe and discuss the identified dark spots. 4.2 The mapping problem between the case and the platform characteristics The first validation dark spot concerns the mapping between the use case and balancing rulings. The policy making respondents voiced their concerns about the ability of the platform to map ‘their’ reality into the correct and relevant decision trees. The ‘permit checker module’ of the platform that enables initiators to test if the activity can be performed free of permit restrictions, is a good example of this phenomenon. Legal experts take the position that once the computer says ‘‘no’, you do not require a permit based on the decision tree, norms and values’, the initiator is now allowed to proceed, even when the decision (or decision tree) was based on faulty assumptions or the wrong application of norms. This means that the capturing of the relevant data through fill-in forms beforehand (knowledge acquisition and elicitation in terms of BRM) is vital in the eyes of legal experts in order to maintain constitutional and legitimate. 4.3 Contextual information and complexity The second validation dark spot concerns the mapping between the activity, its consequences for the environment, the specific context of circumstances and the relevant algorithms in the forms. As it turns out, the more complex the case is, the more the relevancy of contextual information and contextual factual data has to be taken into account. This sounds logical, but it puts a strain on the ability of predesigned forms and reference regulation models to capture the relevant contextual information in the appropriate manner. The desired separation between a platform that facilitates the exchange of case related information by using information capturing forms and the street level bureaucrat handling the case and making decisions based on the fair balancing of the desired environmental values gets blurred. This is because it becomes increasingly hard to separate the context from the balancing act. As a consequence, the design of the facilitating platform preincludes more elements of decisions and balancing at system level if it is to handle more complex cases, thereby shifting power towards the system bureaucrat. This 620 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE finding is confirmed by Smit et al., (2018a; 2018) where he described the elicitation process in BRM research. 4.4 Validation of standardization The third validation dark spot as mentioned by the respondents concerns the influence of standardisation. There is a structural tension between governments trying to maintain open standards and commercial suppliers that require a timespan for profit. Larger organizations have a legacy of already installed systems and dislike quick versioning of standards. Innovative, and often smaller, organizations tend to adapt new sophisticated standards faster. The design of software that is capable of handling geospatial and textual objects around spatial planning is relatively new and the standards that can handle the level of detail are rapidly evolving and changing. This is not unusual as a pattern in digitalisation, but it is relatively new to the domain of business rules and norms in legal planning systems. We observed a heated debate around the semantic standard for activities and announcements in the environment (STAM) (Interprovinciaal Overleg, 2020), the template for official governmental publications (STOP) (Interprovinciaal Overleg, 2020), and template for environmental planning documents (TPOD) (Interprovinciaal Overleg, 2020) in The Netherlands. One of the issues concerned the notion of standardisation of the annotation field related to a permit for an activity regarding an object. Some parties in the debate defended the position that the annotation of the decision ground should always be retrievable afterwards, thereby requiring further standardisation, while others argued that the annotation is exactly the level of freedom and decision power that should be left with the street level bureaucrat without any restrictions due to standardisation. Another interesting part of the standardisation concerns the business rules themselves, standardized in the standard for business rules applications in environmental planning (STTR) (Interprovinciaal Overleg, 2020). Some respondents complained that the intended reduction of environmental regulations was in fact replaced by an increase of business rules, which are used to determine the exact nature of the case and the exact values and norms that would apply on that case. Unfortunately, the design of the business rules as part of the algorithm is often done later in time, after the city has written its environmental policy for that election period. The design of these business rules in sequence after the national laws and regional or city policies are created often creates a translation problem. The technical modellers are often confronted with ambiguities and R. Peters, K. Smit & J. Versendaal: Responsible AI and Power: Investigating the System Level Bureaucrat in the Legal Planning Process 621 semantic problems and require assistance from the lawyers and domain specialists to avoid faulty interpretations. The technical designers would strongly advise to include their modelling expertise earlier at the design of the policies, especially when these are written in texts. All respondents confirmed that the standardisation discussion was very technical and very dynamic and required effort to follow, especially for non-experts. 4.5 Understanding Between lawyers and programmers The fourth validation dark spot identified by the respondents concerns the difference in reference frameworks between the text-oriented legal experts and the object-oriented spatial GIS experts. Earlier research in business rules and AI & Law hinted at misunderstandings between the culture of law and the culture of ICT (Boer, van Engers, Peters, & Winkels, 2007). This notion could have effects on the validation process and power shifts. Two contributions in the body of knowledge came to the same conclusion about this gap from completely different perspectives, see: “In addition to challenge 2B, the current value of the ability to validate the cohesion between business decisions and business logic by legal subject-matter experts is low (Smit et al., 2018) and the work of (Boer et al., 2007). The problem was again confirmed in this research by both the key suppliers of BRM software for the Omgevingswet platform and the national programme manager of the entire platform, for example, one of the interviewees stated: “the legal guys do not understand the notion of an object infrastructure”. It was also observed that, for example, legal experts tend to judge each case in its own right, whereas IT specialist are trained to think and act in the paradigm of platforms, object classes, attribute values of those classes and exceptions. The respondents were very concerned for the future viability of the Omgevingswet platform because of the separation of the two ‘tribes’ (legal versus IT-oriented professionals) in the National programme. Legal professionals come from the old text-based legislation publication process and the notion of the GIS platform version control for all legal values is very hard to explain to them. Every object has attribute values for that particular day and the next day they can and will change, much unlike a published law in the early days. This, potentially dangerous, validation gap was also confirmed by the National Council for the Digital agenda of provinces (Interprovinciaal Overleg, 2020). Based on this, a programme with the goal to establish an open public registry and more knowledge sharing about business rules was initiated as a result. 622 4.6 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE ‘Rich’ policy or policy contours only The fifth validation dark spot concerns the level of detail of policy making. Some interviewees argued for environmental planning in a very broad sense, setting the contours for norms and values, but leaving much space open for local and use-case based discussions. The idea is that there should be more room for manoeuvring for flexible solutions, e.g., such as windmill not in my backyard-situations and problems. Others argue for a ‘rich’ environmental planning, with more strict and more detailed norms to protect scarce green space and maintaining an absolute minimum biodiversity. The provincial environmental policy act is therefore different for each of the 12 Dutch provinces and reflects the political debate in each region. The outcome has a differentiating effect for the shifts in power and the need for validation in each province. The richer and stricter the act, the more mapping effort and the more validation effort is required. 4.7 Technical platform neutrality The sixth validation dark spot concerns the neutrality of the (technical) platform in being only a carrier of environmental policy decisions versus the extent to which elements out of the domain policies such as norms and values are mixed with the standardisation of the business rules in the knowledge acquisition forms. As explained earlier, the translation of legal texts into digital algorithms is not yet without problems. Some interviewees make a clear distinction between templates of fill-in forms, model-regulations, and ‘clean’ business rules. Others do not. The arguments against mixing these levels of preparation or automation are transparency and scalability and the autonomy of cities to carry out their own policies. Nationally provided templates and reference model regulations should help civil servants in cities to run their own implementation of their own policies. However, the domain knowledge with environmental norms and values and the business rules tend to get mixed up. 4.8 The issue of knowledge resources The seventh validation dark spot concerns the scarcity of knowledge in combination with that of human resources. We apply cameras to reduce the amount of police officers required to measure compliance to speed limits, but the business rules applied there are relatively simple. In spatial planning there are many variables and R. Peters, K. Smit & J. Versendaal: Responsible AI and Power: Investigating the System Level Bureaucrat in the Legal Planning Process 623 issues, and it requires both domain knowledge and ICT knowledge when legislation is mapped into systems, these competencies are also required when the systems are being used operationally. Digitalisation is often introduced to increase efficiency, and the introduction of information systems always includes the influence of system designers into the process. But the effect in legislative and enforcement processes is yet little understood. Bovens et al., (2018) states that even simple design decisions, such as inspection method and inspection timing and placing could already be defined as a form of discretionary power. The interviewees, from the supplier side, explicitly stated that Dutch cities often hired their skills, because they simply could not afford to have this level expertise in-house. 4.9 The outsourcing of knowledge The eight validation dark spot concerns an issue stated by the interviewees, that is related to the knowledge scarcity as described earlier. It is about the fact that, for the last twenty years, the cities in the Netherlands have increasingly outsourced their knowledge in spatial and environmental planning to commercial organizations. This is a known problem and questions are raised by city councils about the democratic control already. The introduction of digital algorithms in the spatial planning process is increasing this anxiety of the actors in the field. 4.10 Timing and dynamics of release management The ninth validation dark spot concerns the timing of legal ‘releases’ of the Omgevingswet platform. Interviewees have argued that many components are still in the early development stage and should not be released to the public yet. Many external reports have declared the platform as too complex and argued for downscaling ambition and complexity. The National government is accused of clumsiness and fragmentation and overambition. Others argue that one must start somewhere, and that this platform is just the first of many such operations in eGovernment. It is unclear what influence this dynamic release debate has on the power and validation discussion, but it should be mentioned as an important ‘background noise’ affecting all variables in some way. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 624 5 Conclusion The overall conclusion of the investigation has been that there is a noticeable shift of power in view of the interviewees. But, in this arena of spatial planning at least, it is less clearly cut and more complex than could be expected. There is a strong notion to maintain platform neutrality and maintaining autonomy at the level of the city planners, who are the main street level bureaucrats in our case. The shift of power is often indeed caused by unintended side-effects, such as ambiguity of legal texts, scarcity of knowledge, mapping problems of contextual data and case knowledge acquisition/elicitation. The issue of standardisation between the rule of law and the business rules behind the balancing algorithms is of special research interest since it seems that it is here where system level decision power resides the most. Interviewees acknowledged that it takes great effort for non-experts to maintain an overview of the consequences of the design decisions made about the service platform at that level of abstraction. The power shift seems to increase if the automation is applied on cases that are more complex. Further research is supported by the National council of provinces, who acknowledge the gap between the culture of text orientation and the culture of object orientation and the risk for ethical values and norms regarding digitalisation. We aim for a validation framework that is understandable by policymakers and regional politicians. To do so, bridging BRM research and eGovernment research seems productive. 6 Discussion and Future Research Directions Based on this study and the resulting conclusions we can identify points for discussion and point out future research directions. The sample size of 22 interviewees representing different groups of stakeholders is rather small, therefore we argue that future research should incorporate a larger sample size as well as research methods to do so in order to be able to generalize the findings from this study towards other similar digitalization projects. Overall, future research should provide more factual and objective means of measuring the influence of digitalization of intelligence in administrative eGovernment processes because we see this is a growing practice. The Dutch board of regional councilors have agreed on the notion that the gap between the culture of Law and the culture of objectbased platform design should be bridged. This notion would justify future research on similarities between legislation and business rules. In addition, the validation capabilities and the dark spots should provide criteria for a more objective validation R. Peters, K. Smit & J. Versendaal: Responsible AI and Power: Investigating the System Level Bureaucrat in the Legal Planning Process 625 framework that should be in place at the start of the implementation of the Omgevingswet platform. It is interesting to observe that the digital ethics and algorithms discussion is now evolving from a GIS platform validation problem towards a Digital twin validation. These parallels are opening new grounds for investigation in future studies. Lastly, another question is what will happen to the client or citizen of these services when they are faced with the computer as substitute for a desk. We have investigated the ‘supplier side’, but this research did not involve the effect on the client side as well, which should be taken into account in future research. Acknowledgements We owe special thanks to Luc de Horde, Carolien Idema and Anton Hoogendorst (Province of Utrecht), Jolanka vd Perk (Province of Flevoland), Ruark Kroon and Wimfred Grashoff (VNG), Kees van Kesteren (Tercera) and Rob van de Plassche (Berkeley Bridge). References Algemene Rekenkamer. (2021). Aandacht voor algoritmes. Den Haag. Retrieved from https://www.rekenkamer.nl/binaries/rekenkamer/documenten/rapporten/2021/01/26/aan dacht-voor-algoritmes/Aandacht+voor+algoritmes.pdf Bajec, M., & Krisper, M. (2005). A methodology and tool support for managing business rules in organisations. Information Systems, 30(6), 423–443. https://doi.org/10.1016/j.is.2004.05.003 Boer, A., van Engers, T., Peters, R., & Winkels, R. (2007). Separating law from Geography in GISbased eGovernment services. Artificial Intelligence and Law, 15(1), 49–76. https://doi.org/10.1007/s10506-007-9042-4 Bovens, M. A. P., Zouridis, S., & Van Eck, M. (2018). Algoritmische rechtstoepassing in de democratische rechtsstaat. Nederlands Juristenblad, 93(40), 3008–3017. Bovens, M., & Zouridis, S. (2002). From Street‐Level to System‐Level Bureaucracies: How Information and Communication Technology is Transforming Administrative Discretion and Constitutional Control. Public Administration Review, 62(2), 174–184. https://doi.org/10.1111/0033-3352.00168 Corea, C. (2021). Handling Inconsistency in Business Rule Bases. Universitat Koblenz-Landau. Digitaleoverheid. (2020). NL DIGIbeter 2020: Agenda Digitale Overheid. Retrieved from https://www.digitaleoverheid.nl/wp-content/uploads/sites/8/2020/07/nl-digibeter2020.pdf European Commission. (2019). Ethics guidelines for trustworthy AI. Brussels. Retrieved from https://ec.europa.eu/digital-single-market/en/news/ethics-guidelines-trustworthy-ai European Commission. (2020). On Artificial Intelligence - A European approach to excellence and trust. Brussels. Retrieved from https://ec.europa.eu/info/sites/info/files/commission-whitepaper-artificial-intelligence-feb2020_en.pdf 626 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE gemeente Eindhoven. (2019). Digitalisering van de stad. Eindhoven. Retrieved from https://eindhoven.parlaeus.nl/user/bdocument/action=showannex/gdb=687/Bijlage_1__Nota_Digitalisering_van_de_stad.pdf Goodyer, I. (1991). Life events, development and childhood psychopathology. Chichester: Wiley. Interprovinciaal Overleg. (2020). Verslag 6e Bestuurlijke Kopgroep Digitalisering. Janssen, M., Hartog, M., Matheus, R., Yi Ding, A., & Kuk, G. (2020). Will Algorithms Blind People? The Effect of Explainable AI and Decision-Makers’ Experience on AI-supported DecisionMaking in Government. Social Science Computer Review, 089443932098011. https://doi.org/10.1177/0894439320980118 Koninkrijksrelaties, M. van B. Z. en. (2018). Waarom een stelselherziening? Retrieved March 25, 2021, from https://www.omgevingswetportaal.nl/wet-en-regelgeving/waarom-een stelselherziening Kool, L., Timmer, J., Royakkers, L., & Est, R. (2017). Opwaarderen: Borgen van publieke waarden in de digitale samenleving. Den Haag. Retrieved from https://www.rathenau.nl/sites/default/files/2018-02/Opwaarderen_FINAL.pdf Lipsky, M. (1980). Street-level bureaucracy: dilemmas of the individual in public services. New York: Russell Sage Foundation. Pervan, G., & Maimbo, M. (2005). Designing a case study protocol for application in {IS} research. In Proceedings of the {Ninth} {Pacific} {Asia} {Conference} on {Information} {Systems} (pp. 1281–1292). PACIS. Peters, R. M. (2016). The Law, the Map and the Citizen: Designing a legal service infrastructure where rules make sense again. Universiteit van Amsterdam. Smit, K., Versendaal, J., & Zoet, M. (2017). Identifying Challenges in BRM Implementations Regarding the Verification and Validation Capabilities at Governmental Institutions. In PACIS 2017 Proceedings. Langkawi, Malaysia: Association for Information Systems (AISeL). Smit, K., & Zoet, M. (2018a). An Organizational Capability and Resource Based Perspective on Business Rules Management. In Proceedings of the International Conference On Information Systems (ICIS) (pp. 1–17). San Fransisco: AIS Electronic Library (AISeL). Smit, K., & Zoet, M. (2018b). Identifying Challenges in Business Rules Management Implementations Regarding the Governance Capability at Governmental Institutions. In Proceedings of the 51st Hawaii International Conference on System Sciences (pp. 2383–2392). Waikoloa (HI), United States: IEEE. Smit, K., Zoet, M., & Berkhout, M. (2017). Verification capabilities for business rules management in the Dutch governmental context. In International Conference on Research and Innovation in Information Systems, ICRIIS. https://doi.org/10.1109/ICRIIS.2017.8002499 Smit, K., Zoet, M., & Versendaal, J. (2018). Challenges in the Implementation of the Elicitation, Design and Specification BRM capabilities. Journal of Information Technology Theory and Application (JITTA), 18(4). Teuben, K. (2004). Rechtersregelingen in het burgerlijk (proces)recht. Alphen aan de Rijn: Wolters Kluwer. van den Hoven, J., Miller, S., & Pogge, T. (2017). Designing in Ethics. (J. van den Hoven, S. Miller, & T. Pogge, Eds.). Cambridge University Press. https://doi.org/10.1017/9780511844317 van Engers, T. M., & de Vries, D. M. (2019). Governmental Transparency in the Era of Artificial Intelligence. In JURIX (pp. 33–42). R. Peters, K. Smit & J. Versendaal: Responsible AI and Power: Investigating the System Level Bureaucrat in the Legal Planning Process 627 Vereniging van Nederlandse Gemeenten. (2019). Principes voor de digitale samenleving. Den Haag. Retrieved from https://vng.nl/sites/default/files/2019-11/09a-bijlage-principes-voor-de digitale-samenleving.pdf Vetzo, M., Gerards, J., & Nehmelman, R. (2018). Algoritms en grondrechten. Den Haag: Boom Juridisch. Retrieved from https://www.rijksoverheid.nl/binaries/rijksoverheid/documenten/rapporten/2018/03/01/a lgoritmes-en-grondrechten/Algoritmes+en+grondrechten+opgemaakte+versie.pdf Zoet, M., & Versendaal, J. (2013). Business Rules Management Solutions Problem Space: Situational Factors. In Proceedings of the 2013 Pacific Asia Conference on Information Systems (paper 247). Jeju: AIS. Zouridis, S., Van Eck, M., & Bovens, M. (2020). Automated discretion. In Discretion and the quest for controlled freedom (pp. 313–329). Cham: Palgrave Macmillan. 628 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE ADAPTING TO THE ENFORCED REMOTE WORK IN THE COVID 19 PANDEMIC LIANA RAZMERITA,1 ARMIN PEROZNEJAD,1 NIKI PANTELLI2 & DAN KÄRREMAN1,2 1 Copenhagen Business School, Denmark; e-mail: lra.msc@cbs.dk, Armin.Peroznejad@gmail.com, dk.msc@cbs.dk 2 Royal Holloway, United Kingdom; e-mail: Niki.Panteli@rhul.ac.uk Abstract Remote work provides an alternative method of working for organisations, which in turn became a norm during the Covid-19 pandemic. In this, paper, we study adaptation practices introduced by both individuals and organisations as a way for managing the enforced remote work. The study draws upon 33 interviews collected over a year during different phases of the Covid 19 pandemic. We apply adaptation theory lenses to examine the adaptation process over time and new digital working practices. In our study, we extend technological practices by including organisational and behavioral practices. We approach adaptation as a way of coping with a radical change or dynamic situation and building resilience. Based on the data analysis, we expend the adaptation theory in relation to different forms of adaptation to new remote work practices (e.g. at technological, organisational, and behavioural level). DOI https://doi.org/10.18690/978-961-286-485-9.44 ISBN 978-961-286-485-9 Keywords: remote work, adaptation theory, covid-19, digital work, knowledge work 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 630 1 Introduction Remote work has long been recognised as alternative work arrangements for organisations (Staples, Hulland & Higins, 1999), which in turn became a norm during the Covid-19 pandemic. National and regional lockdowns and travel restrictions caused by the spread of Covid-19 have triggered an astonishing and forced transition into remote work among knowledge workers and professionals, which are likely to secure an avenue for the future of work and lead to a permanent transformation of the workplace. Organisations which had no digital capabilities, have struggled to adapt to the dire set of locked down circumstances. As a result of the pandemic, remote work has become essential among both employees and organisations (Waizenegger et al., 2020). Organisations regardless of size and sector have transitioned their operations to allow remote working, also referred as “lockeddown digital work” (Richter, 2020), meaning employees of different professional backgrounds are now working exclusively through digital technologies (Leonardi, 2020). Even before the pandemic, part of their digital transformation, organizations have deployed social-collaborative platforms (e.g. enterprise social media) to streamline knowledge processes (in particular communication and collaboration) and support more efficiencient ways of working. Beyond efficiency such platforms were also deployed to support more transparent forms of knowledge work, innovation, retention of employees and their knowledge (Kirchner & Razmerita, 2019). Such social platforms facilitate formal and informal communication, and the articulation of personal into collective knowledge in a synergistic approach (Razmerita et al., 2014). Remote work has been defined as a flexible work arrangement where workers have no personal contact with coworkers, but they are able to communicate using technology (Wang, Liu, Qian, & Parker, 2020). Remote work doesn’t always have to specifically be at home. Concurrently, there is an essential need to analyse and understand the effects of the Covid-19 pandemic. In particular, in this paper, we study adaptation practices introduced by both individuals and organisations as a way for managing the enforced remote work and the perceived effects (e.g. on their productivity, work-life balance). Further, in this paper we seek to assess the Covid19 pandemic effects on remote working attitudes according to different professional backgrounds and possible implications for the changing nature of work. We aim to L. Razmerita, A. Peroznejad,N. Pantelli & D. Kärreman: Adapting to the Enforced Remote Work in the Covid 19 Pandemic 631 address the following research question: How individual knowledge workers and organisations are adapting to enforced remote work? Our study findings suggest that on one hand such transition advanced the digitalisation transformation and the associated individual digital work practices, on the other hand it shapes not just the workspace landscape but also the role and meaning of the organisation as an entity. In what follows, we present a brief review of the extant literature on telework and virtual work pre-Covid-19, and then we compare this to the Covid-19 related remote work arrangement. We then introduce the concept of adaptability as the theoretical lens of the study before we present the methodological approach and findings of our study. 2 Remote Work 2.1 Remote Work in the Pre-Covid-19 work Context Researchers have been studying remote work, including home-work, telework and virtual work arrangements for a period of more than 20 years (among the more recent ones Makarius and Larson, 2017; Raghuram et al. 2019). Literature on remote work has focused on the opportunities that this form of work provides for flexible working and achieving work-life balance (Felstead, 2002). A distinct feature is that this form of work has been presented as a choice driven by the organisation in its efforts to reduce overheads associated with office facilities, or a choice driven by individuals due to their preference for flexible working. Furthermore, it allowed organisations to hire across borders, to attract talents that are difficult to find locally or to offer family-friendly employment contracts to those who do not want to relocate. For this, remote work has been defined as work that is ‘technologically feasible, flexible and autonomous, desirable and perhaps even inevitable, family- and community-friendly’ (Bryant, 2000: 22). Remote work or teleworking is most suitable and beneficial for employees who mainly perform knowledge-based tasks with limited face to face contact (Rupietta and Beckmann, 2017). A study on 273 knowledge workers from different professional backgrounds including: engineers, accountants, sales & marketing found that they perform better in virtual work, so long as their role doesn’t require social collaboration (Golden and Gajendran, 2018). On one hand working from 632 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE home increases employee autonomy, on the other hand it lowers the firm’s ability to monitor their employees. This all too familiar, all-encompassing scenario describes a typical principal-agent dilemma, wherein employees have incentive to abuse the power afforded to them through their autonomy, by reducing their individual work effort thus resulting in shirking behaviour (Rupietta and Beckmann, 2017). Makarius and Larson (2017) suggest four key competences which lead to successful remote working and performance outcomes which improve effectiveness and satisfaction such as: establishing behavioural guidelines, developing trust, coordinating information, using media. Setting boundaries through behavioural guidelines is almost akin to a code of conduct policy style which sets boundaries for employees in virtual work. Coordinating information in order to have at disposal to be able to accomplish tasks to best possible and most accurate standard. Finally using media for communication putting it to best use such as via phone, email or now with the many conferencing applications currently at our disposal (Makarius and Larson, 2017). 2.2 Remote Work in the Covid-19 context Regardless of the aforementioned literature, existing studies do not provide a thorough investigation of the enforced work from home as emerged due to Covid19 locked-down (Waizenegger et al, 2020, Richter, 2020). Indeed, there are some distinct differences between the pre-Covid-19 and the Covid-19 remote work arrangement noted to the fact that although remote work is not new (e.g. Sayah, 2013), the Covid-19 context is. As a result of the pandemic, the switch to remote work took place suddenly with many organisations, traditionally collocated, being illprepared under the circumstances. Henceforth, many employees felt increasing pressure to ‘make digital work, work’ (Richter, 2020) which have led to a change of mindset but also to misconceptions or potential negative associations. Among these are: 1. digital work is more stressful and tiring, 2. adaptation and appropriation to digital work technology, 3. online (digital conferences) versus physical meetings, 4. autonomy and visibility. L. Razmerita, A. Peroznejad,N. Pantelli & D. Kärreman: Adapting to the Enforced Remote Work in the Covid 19 Pandemic 633 Recent study on remote work identified the main benefits and challenges for remote work during Covid 19. On one hand among the identified benefits are: it frees knowledge workers from office distraction and commuting, it helps concentration on individual tasks, and it allows knowledge workers to have flexibility in their schedule due to increased work autonomy. On the other hand, the overall use and wide range of available ICT it creates an “always on” culture. Furthermore individuals working remotely may feel alienated, isolated or worried (Waizenegger et al., 2020). Further, remote work has brought some additional stress and impact on well-being of employees bringing imbalances to work and home dichotomy especially for women (Amis and Greenwood, 2020). Another study by Dubey and Tripathi’s (2020) aimed at analysing the sentiments and emotions of workers towards working from home during the Covid-19 pandemic. Their study revealed that more than 73% of people had positive sentiments towards working from home whilst 27% people had a negative perception towards working from home experience. Furthermore, over 60% of the people responded with emotions of trust, anticipation and joy for work-from-home culture while a handful replied with fear, sadness, anger and disgust. Their obtained results show that experiences of homeworking had a positive perception, globally. 3 Theoretical Lens of Adaptation Adaptation is a concept that has been used in organisational and management studies in different ways to signify a response to a change situation. Within organisation studies, adaptation has been seen in terms of fidelity and extensiveness. The former implies practices that may be modified through localisation or reinvention (Ansari 2010). Extensiveness takes account of the degree of change and transformation of a given practice and this may vary from symbolic to substantive. Adaptive behaviour has been identified as a prerequisite for effective job performance and career development (Griffin & Hesketh, 2003; Cullen, et al, 2014). This body of literature has focused on individuals and their ability to adapt in changing situations. Park and Park (2019) have studied the antecedents of individual adaptive behaviour and found factors ranging from individual personality, skills and motivation, to job characteristics including the degree of autonomy and task interdependency to group and organisational characteristics entailing the support gained and learning environment, Further, work by (Makarius & Larson, 2017) focused on successful individual adaptation to virtual work. The study emphasized the need 634 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE to focus on individual cognition in virtual work and they propose the concept of virtual intelligence associated with behaviours and skills for the individual to adapt successfully to virtual work. Studies have also examined adaptation practices both across organisations and within organisations. Ansari et al (2014) studied how a multinational organisation has managed the adaptation processes within the corporate and subsidiary levels. They argued that adaptation is an engineered practice that aims to vary from one location to another and therefore accommodating diversity in the local settings, increasing acceptance in this way. The literature also makes reference to team adaptation with its significance being linked to team performance (Woolley, 2009). Klein and Pierce (2001) defined adaptive teams as “teams that are able to make the necessary modifications in order to meet new challenges” (p. 4). The authors recognised that adaptation is a complex process, dependent on a number of dimensions which are specific to the team at hand. Further, adaptation theory has been used to examine adaptation practices within virtual teams (Thomas and Bostrom, 2010 a,b), notably switching, expanding, merging, modifying and creating new practices during the adaptation process. In a different study, the authors made reference to technology adaptation as a process that “involves the acquisition and usage of new ICTs or new features, and the modified usage of existing features in ICTs” (Thomas and Bostrom, 2008, p. 47). In their study on technology adaptation, Tyre and Orlikowski (1994) made reference to the temporal dimension of the adaptation process arguing that the process is not always linear nor incremental and continuous, but rather highly discontinuous with instances of bursts and stops. In this study, we extend adaptation theory applied previously in studies on virtual work by including organisational and behavioural practices in addition to technological practices. Adaptation within our study is defined as the acquisition of new practices, at both individual and organisational level, as a way for building resilience and coping with a changing and dynamic situation caused by the pandemic. Successful adaptation is a way of coping with the changing and dynamic situation over time. L. Razmerita, A. Peroznejad,N. Pantelli & D. Kärreman: Adapting to the Enforced Remote Work in the Covid 19 Pandemic 4 635 Research design The study has been designed as a qualitative, longitudinal study in order to explore the remote work experiences and practices during the different pandemic phases. It applies an abductive interpretivist approach that help theorizing the remote work phenomenon (Alvesson and Kärreman 2007; Van Maanen, Sørensen, and Mitchell 2007). The study is based on a series of semi-structured interviews with white collar professionals distributed over three phases across different sectors and organisations in hard-hit countries with severe lockdown such as the UK and not so hard-hit countries with less severe lockdowns (Sweden, Germany). In total 33 interviews were collected over a three-phase period. The first phase (P1) included 10 interviews and took place not long after the start of the intial lockdown (March-April 2020); the second phase (P2) included 14 interviews that took place between December 2020 to February 2021. In the third phase, which took place at the beginning of March 2021, we have re-interviewed 9 of the 10 interviewees from the first phase, in order to understand how their work from home practices and their attitudes have changed. Further insights from the authors’ experiences have been integrated. The latter phases of interviews gave us the opportunity to expand on interviewees’ remote work experiences following a period of adaptation for both individual employees and their employer organisations. In particular, we have expanded on aspects related to experience, learnings and adaptation to new remote work practices. The interview guideline consisted of questions on the experience with remote work, how they have been managed, expectations, support in organising remote work but also preferences related to remote work, experience with work from home (WFH) prior to the pandemic, motivations and limitations. The interviews were conducted via telephone or video call, due to the pandemic circumstances, as well as being an international sample of interviewees. The interviews were structured in a 30-to-60minute interview arranged with each participant. Interviews were recorded and the audio files transcribed. Our analytical approach was based on thematic analysis and was based on the core dimensions of adaptation theory in the enforced remote work context, notably technological, organisational and behavioural adaptation. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 636 5 Findings Most of the respondents had no prior experience of (paid) working from home, as part of their current or previous jobs up to this point. All seemed to be coping well with most the stresses coming from the situational side of the Covid-19 pandemic and lockdown regulations rather than the actual working from home. They generally agreed that the benefits outweigh the negatives and as of now their bigger concerns were regarding the effects of the Covid-19 pandemic on their respective businesses. Not surprisingly all interviewees shared the opinion that there was a general lack of preparation from themselves and their respective employers in the first phase (P1). Several of the interviewees noted that a strong sense of organisational culture and camaraderie was lacking during the abrupt transition to enforced remote work. The authors engaged in several rounds of data analysis and discussion of coding in relation with remote work experiences in a transparent, iterative way. We tried to identify more surprising or unexpected findings in relation with extant literature, during the second and third phase of data collection that could expand both remote work and the adaptation theory. We have agreed to focus on the digital knowledge work adaptation practices at different phases of the crisis. Findings show that adaptation practices have been introduced by both individual employees and their respective organisations. Interviews emphasized the importance of self-management, setting goals and milestones “I’m finding motivation by setting regular short-term goals for myself, such as weekly milestones, communicating frequently with colleagues and reflecting on how successful we have been in these challenging times as a collective outfit.”(P2) Routine was found to ultimately be beneficial from P2 onwards: “I've just been splitting up my day so that I wake up and have my breakfast as usual, then go through my emails and then I'll just work on through however long it takes me to get through the work once I've done it then I'll do lighter duties.” Finding in turn that “this has helped me take a much more structured approach to my life which I never really had before the pandemic.” Resilience is another element that has been discovered during the process “For me personally, it has shown how resilient and flexible I can be in terms of learning new things quickly, so I've learned a lot a lot of new skills in a short time span.”(P2) Interviewees also spoke candidly of the importance of the digital technologies deployed in P2 “getting used to interface technology such as zoom has been a big part of the process and getting used to the lack of normal human interaction has been challenging.” Those with young children, particurlarly L. Razmerita, A. Peroznejad,N. Pantelli & D. Kärreman: Adapting to the Enforced Remote Work in the Covid 19 Pandemic 637 mothers, seemed to have extra hurdles “adapting to work from home where I’m also a mother has been difficult to juggle at times but now I just plan to do most of my work during the hours when the kids are in school.”(P2) which also reflects on the intrusive nature of work in the family/home setting. From the perspectives gained, at the individual level, motivation in the 1st phase simply came from job security “meaning that if the work is not done then I lose the job, which is only fair and is to be expected as the same rule applies to any normal form of working.” which can become perpetuate by: “the comfort of home, as it makes me feel more productive as the setting and planning of the day is in my control so I can arrange it to fit me best.”(P1) Yet noticeably, distractions didn't appear as anything too dissimilar from the traditional office “I haven’t got too many distractions at home and feel they sort of even themselves out with the office anyway because you may have electronic devices and so on at home but it’s a lot quieter and more peaceful as opposed to a buzzing and noisy office which can be very distracting in my line of work.”(P2). Individual adaptation does include behavioural adaptations, but also work environment adaptation such as: the adaptation of private space and general lifestyle adaptation. One respondent would switch on the TV to simulate the background noise present in any busy office.“Whilst the TV can be a distraction for some, I actually enjoy having it on in the background, mostly just for some background noise which I feel replicates the background noise of an office somewhat and this makes me more productive because I prefer not to work in silence.”(P1). With it “mainly just having been sort of limiting myself and being very strict”(P2) as remote workers became familiar with “out of sight, out of mind”(P1) mentalities. Many identified; a lack of trust, feelings of being an outsider and lack of social support. Some respondents had “a tight nit group”(P2) so had been spurring each other on and helping each other out as much as possible. This camaraderie seemed to really help, providing harmony and unity thus increasing the overall performance of the team. Whilst at the organisation level, such adaptation practices include providing the necessary education and continued support to help members adapt to remote work. The organisation “understands the importance of the pandemic and is investing for the future and not just looking for a quick fix” by “investing £100,000 in a new telecoms system during the pandemic, to make life easier for the staff working from home”(P2) such organisational 638 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE adaptation takes place through various layers which include management support, if assistance is required, as well as elements that pair with technology adaptation. For example, contact lines were made accessible for urgent assistance or adoption of new collaborative technology to support communication: “The contact lines are open, and we have been made aware of this, so we can contact superiors or colleagues at any time if assistance is required. We have also created WhatsApp groups between different departments in order to communicate easily with other colleagues, this has been a great addition both for technical and morale support and is an addition I imagine will remain once we return to normal.”(P1) However, employees were missing “the social interaction of having people around and working directly with colleagues… part of the organisation has been doing monitoring just as a precaution to measure if they want more funding for various departments to take home more members of staff as our business books continue to grow”(P2). The second and third round of interviews were much more favourable to partial remote working schedules in the future compared to varying degrees of preference in the first round with less scepticism around it as exampled here "I’m very much of the mindset that whatever I do from here on out, it must be majority remote. I have become very accustomed to it.”(P3). Overall, out of the 33 interviews, all the respondents had successfully adapted to digital technology, despite some inital difficulties. What the data indicates is that regardless of preferability, sentiments and attitudes towards remote work have not impacted knowledge workers' percieved efficiency. A great majority of respondents (18 out of 24) have actually had a positive association towards remote work despite the certain inherent difficulties to adapt to this new way of working. Although it is worthwhile noting that the negative sentiments were more pronounced, sentiments such as “I’m still mostly against it. I feel it’s not good for me or my mental health.. Collaborating with people is the big one. Working from home you can’t work on problems together and learn from each other. If I have a question, in the office there is always someone around that can answer, discuss, and look at the computer together to work it out together which I find better for learning.”(P3) particurlarly stand out, even if fewer instances of such negative sentiments occurred. Employees have to find digital ways to learn to replace traditional knowledge sharing and transfer which take place in a traditional organization. Those thriving the most, over time, had set schedules, stayed active, took responsibility and accountability for their time and learning, finances and health through daily planning and routine setting. L. Razmerita, A. Peroznejad,N. Pantelli & D. Kärreman: Adapting to the Enforced Remote Work in the Covid 19 Pandemic 6 639 Discussion and Conclusions Adaptation is important in any organisational change (Ansari, 2010). This study was driven by an interest to investigate the enforced adaptation to remote work and thus to contribute to research on knowledge work, changing nature of work, and new digital ways of organising through technology. Remote working has led to greater employee autonomy over how, when & where they work and how knowledge work is organised. This has inadvertently further blurred the boundaries between personal and working lives. Adaption has proved to be a critical factor in determining the success of enforced remote work for both individuals & organisations. Individual adaptation refers to new work practices (communication & collaboration via digital technologies), new routines, spatial adaptation, life-style adaptation, new-skill development & self-management. This study's findings present different levels of adaptation that took place during the Covid-19 pandemic: the first order adaptation takes place as a way to cope with the sudden changes due to the enforced lockdowns (e.g. learning new technologies, new collaboration tools) and the second order adaptation that involves more profound transformations at both individual and organisational levels. We identify a variety of factors that are intrinsic to individual experiences, those developed by individuals during the different phases of the Covid-19 pandemic, including work environment adaptation as well as management support and organisational adaptation. The study indicates the feasibility and challenges of long-term remote work on a mass scale. Most of the respondents were able to succesfully adapt to the use of technology and have a positive sentiment towards remote work. This is in line with previous findings by Dubey and Tripathi (2020). However, the majority of respondents expressed a desire to go back to the office st some stage and find a hybrid mix between work from home and office work in the future. Remote work undoubtedly has benefits and challenges for both employer and employee; certain factors were found to moderate the effectiveness of remote work. These variables are twofold: at the individual level, an ability to work autonomously as well as an ability to self-manage through the adaptation processes. Increased autonomy led to employees being socially isolated, less connected with their colleagues and their organisations. 640 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Whilst at the organisational level we find that the degree of digitalisation and type of work practices prior to the crisis could predict remote working success. Several barriers also emerged in accordance with remote work. On the individual level we found that employees with lower levels of trust found remote work to be more challenging due to limited contact with colleagues & supervisors, lack of knowledge exchange opportunities and social isolation. For individuals who had experienced remote work prior to the Covid-19 crisis, adaptations came easier. Whislt at the organisational level we observed that many firms lacked the proper tools and training systems thus requiring more time for adequate adaptation. Organizations also initiate new forms of distant management which consist of regular formal or informal meetings, updates by email, prerecorded videocasts or podcasts. Findings have shown that adaptation happened over time and it was on a continuum basis. As organisations were trying to respond to the needs of their remote employees, whilst individuals were learning to cope with changes to new technologies and a new work setting where they often had to negotiate their work space in a shared household. Previous studies have pointed to the affordances and challenges of team collaboration (e.g. Waizenegger et al, 2020), opinions on potential effects of digital work (Leonardi, 2020) and digital work during the first phase of locked-down (e.g., Richter, 2020), while our study has investigated work processes adaptation based on a longitudinal study, over three critical periods of the Covid 19 crisis. In conclusion, we examine work adaptation practices in the Covid-19 work context over three time periods and gained better insights of this enforced type of remote work. Our study contributes to the knowledge work literature by applying and extending adaptation theory; we do so by identifying technological, orgainsational and behavioural dimensions of adaptation in the enforced remote work context. A limitation of our study is that this did not sufficiently examined the organisational view; this should be in the agenda of future research. Further research is also needed to understand how increased use of remote work will impact organisational learning practices, organisational policies and cultures, but also how this experience may impact individuals' employment choices. L. Razmerita, A. Peroznejad,N. Pantelli & D. Kärreman: Adapting to the Enforced Remote Work in the Covid 19 Pandemic 641 References Alvesson, M., & Kärreman, D. (2007). Constructing mystery: Empirical matters in theory development. Academy of Management Review, 32(4), 1265–1281. https://doi.org/10.5465/AMR.2007.26586822 Amis, J., & Greenwood, R. (2020). Organisational Change in a (Post‐) Pandemic World: Rediscovering Interests and Values. Journal Of Management Studies, 58(2), 582-586. https://doi.org/10.1111/joms.12663 Ansari, S., Fiss, P. C., & Zajac, E. J. (2010). Made to fit: How practices vary as they diffuse. Academy of Management Journal, 31, 67–92. Ansari, S., Reinecke, J., & Spaan, A. (2014). How are practices made to vary? Managing practice adaptation in a multinational corporation. Organisation Studies, 35(9), 1313-1341. Bryant, S. (2000), ‘At Home on the Electronic Frontier: Work, Gender and the Information Highway’, New Technology, Work and Employment 15, 1, 19–33. Cullen, K. L., Edwards, B. D., Casper, W. C., & Gue, K. R. (2014). Employees’ adaptability and perceptions of change-related uncertainty: Implications for perceived organisational support, job satisfaction, and performance. Journal of Business and Psychology, 29(2), 269-280. Dubey, A. and Tripathi, S., 2020. Analysing the sentiments towards work-from-home experience during COVID-19 Pandemic. Journal of Innovation Management, 8(1). Felstead, A., Jewson, N., Phizacklea, A., & Walters, S. (2002). Opportunities to work at home in the context of work‐life balance. Human resource management journal, 12(1), 54-76. Griffin, B., & Hesketh, B. (2003). Adaptable behaviours for successful work and career adjustment. Australian Journal of psychology, 55(2), 65-73. Golden, T. D. (2009). Applying technology to work: toward a better understanding of telework. Organisation Management Journal, 6(4), 241–250. https://doi.org/10.1057/omj.2009.33 Kirchner, K., & Razmerita, L. (2019). Managing the Digital Knowledge Work with the Social Media Business Value Compass. In 52nd Hawaii International Conference on System Sciences (pp. 6438–6447). Klein, G., and L. G. Pierce. 2001. “Adaptive Teams.”Proceedings of the Sixth ICCRTS Collaboration in the Information Age Track 4: C2 Decision Making and Cognitive Analysis. Leonardi, P. M. (2020). COVID-19 and the New Technologies of Organising: Digital Exhaust, Digital Footprints, and Artificial Intelligence in the Wake of Remote Work. Journal of Management Studies. https://doi.org/10.1111/joms.12648 Makarius, E. E., & Larson, B. Z. (2017). Changing the perspective of virtual work: Building virtual intelligence at the individual level. Academy of Management Perspectives, 3(2), 159–178. https://doi.org/10.5465/amp.2014.0120 Park, S., & Park, S. (2019). Employee adaptive performance and its antecedents: review and synthesis. Human Resource Development Review, 18(3), 294-324. Raghuram, S., Hill, N. S., Gibbs, J. L., & Maruping, L. M. (2019). Virtual work: Bridging research clusters. Academy of Management Annals, 13(1), 308–341. https://doi.org/10.5465/annals.2017.0020 Razmerita, L., Kirchner, K., & Nabeth, T. (2014). Social Media in Organizations: Leveraging Personal and Collective Knowledge Processes. Journal of Organizational Computing and Electronic Commerce, 24(1), 74–93. https://doi.org/10.1080/10919392.2014.866504 Richter, A. (2020). Locked-down digital work. International Journal of Information Management, 55. https://doi.org/10.1016/j.ijinfomgt.2020.102157 Rupietta, K. and Beckmann, M., 2017. Working from Home. Schmalenbach Business Review, 70(1), pp.25-55. Thomas, D., & Bostrom, R. (2008). Building Trust and Cooperation through Technology Adaptation in Virtual Teams: Empirical Field Evidence. Information Systems Management, 25(1), 45-56. https://doi.org/10.1080/10580530701777149 Thomas, D., & Bostrom, R. (2010). Vital Signs for Virtual Teams: An Empirically Developed Trigger Model for Technology Adaptation Interventions. MIS Quarterly, 34(1), 115. 642 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE https://doi.org/10.2307/20721417 Tyre, M. J., & Orlikowski, W. J. (1994). Windows of opportunity: Temporal patterns of technological adaptation in organisations. Organisation science, 5(1), 98-118. Sayah, S. (2013). Managing work-life boundaries with information and communication technologies. New Technology, Work and Employment, 28(3): 179–196. Staples, D., Hulland, J., & Higgins, C. (1999). A Self-Efficacy Theory Explanation for the Management of Remote Workers in Virtual Organisations. Organisation Science, 10(6), 758-776. https://doi.org/10.1287/orsc.10.6.758 Van Maanen, J., Sørensen, J. B., & Mitchell, T. R. (2007). The interplay between theory and method. Academy of Management Review, 32(4), 1145–1154. https://doi.org/10.5465/AMR.2007.26586080 Waizenegger L., McKenna B., Cai W. & Bendz T. (2020): An affordance perspective of team collaboration and enforced working from home during COVID-19, European Journal of Information Systems, DOI: 10.1080/0960085X.2020.1800417 Wang, B., Liu, Y., Qian, J., & Parker, S. (2020). Achieving Effective Remote Working During the COVID‐19 Pandemic: A Work Design Perspective. Applied Psychology, 70(1), 16-59. https://doi.org/10.1111/apps.12290 Woolley, A. (2009). Putting first things first: Outcome and process focus in knowledge work teams. Journal Of Organisational Behavior, 30(3), 427-452. https://doi.org/10.1002/job.578 EXPLORING THE SUSTAINABILITY OF SWISS ONLINE SHOPS: PRELIMINARY EVIDENCE FROM A CLUSTERING APPROACH THOMAS WOZNIAK, GUANG LU, DOMINIK GEORGI, ANJA JANOSCHKA & ANTONIA STEIGERWALD Lucerne School of Business, Institute of Communication and Marketing, Lucerne, Switzerland; e-mail: thomas.wozniak@hslu.ch, guang.lu@hslu.ch, dominik.georgi@hslu.ch, anja.janoschka@hslu.ch, antonia.steigerwald@hslu.ch Abstract This paper proposes a framework for assessing the sustainability of online retailers. By adhering to the logic of the value chain, the framework captures all steps from procurement to shipping of products and handling product returns that typically occur in e-commerce. The framework is then applied to explore the sustainability of 227 Swiss online shops through a clustering approach. Core elements of the framework are dummified and condensed to 20 features using an autoencoderbased neural network. K-means clustering is used to identify three sustainability clusters that are visualised in the latent space. One-way ANOVA and chi-square analyses of the three-cluster solution indicate that the identified clusters are distinct across most elements of the proposed framework. These preliminary results hold a variety of future research avenues. DOI https://doi.org/10.18690/978-961-286-485-9.45 ISBN 978-961-286-485-9 Keywords: e-commerce, online shops, sustainability, clustering, unsupervised machine learning 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 644 1 Introduction Global e-commerce sales have continually grown over the past years and account for an increasing share of total retail sales. In 2019, emarketer predicted that global e-commerce sales would grow by 19 percent and account for 16 percent of total retail sales in 2020 (Lipsman, 2019). The recent COVID-19 pandemic has further increased the shift from offline to online retailing, especially due to social distancing requirements and lockdowns put in place to prevent spreading of the corona virus. For individual countries, e-commerce sales were thus predicted to grow more than 20 percent in 2020 (Cramer-Flood, 2020). It is expected that the accelerated trend towards online retailing will remain during the recovery from the COVID-19 pandemic (UNCTAD, 2021a). E-commerce has environmental consequences (Fichter, 2003). Growth in ecommerce sales translates to, e.g., more intense use of ICT and logistics affecting the use of energy, material resources, and land, and the emission of greenhouse gas (Fichter, 2003). In light of climate change (Steffen et al., 2018) and even continents aiming to become climate-neutral (European Commission, 2020), analyzing the sustainability of e-commerce becomes more relevant than ever before. This paper develops a framework for assessing the sustainability of online retailers (section 2.3), based on the concept of the value chain specifically in e-commerce (section 2.1) and considering extant research on sustainability in e-commerce (section 2.2). The framework serves as basis for developing a survey instrument for collecting empirical data from 227 online retailers in Switzerland (section 3.1). Using an autoencoder-based neural network, the data is condensed to 20 features for subsequent clustering (section 3.2.1). K-means clustering identifies three clusters of online shops which are visualized in the latent space (sections 3.2.2 and 3.2.3). The statistical analyses of the clusters indicate that they are distinct across most elements of the proposed framework (section 4). These preliminary results provide fertile ground for further and future research (section 5). Overall, this paper contributes to a better understanding of sustainability in e-commerce specifically by proposing an assessment framework, applying it to a unique dataset, and identifying three clusters of online shops according to their sustainability as assessed by our framework. T. Wozniak, G. Lu, D. Georgi, A. Janoschka & A. Steigerwald Exploring the Sustainability of Swiss Online Shops: Preliminary Evidence from a Clustering Approach 2 Conceptual background and framework development 2.1 The e-commerce value chain 645 The concept of the value chain, developed by (Porter, 1985), is widely used by academia and practice alike. Following a linear logic, the value chain entails five subsequent “generic categories of primary activities […] involved in the physical creation and delivery of the product to the customers” (Ricciotti, 2020, p. 193), namely inbound logistics, operations, outbound logistics, marketing and sales, and service (Porter, 1985). These sequential primary activities are sustained by four support activities such as procurement, technology development, human resource management, and firm infrastructure (Porter, 1985; Ricciotti, 2020). Several scholars have adapted the generic value chain concept to more specific contexts (Ricciotti, 2020). Some have departed from its sequential and linear logic and embraced a network logic to better reflect that firms are part of stakeholder networks that compete with each other, resulting in the concept of the value network (Ricciotti, 2020). While such network logic may more closely represent today’s competitive environment, the simplicity of the value chain has not lost its appeal. In the (online) retailing value chain, the most important players are manufacturers of products, institutional retailers, and consumers (Reinartz, Wiegand, & Imschloss, 2019). Such retailers may be traditional stationary retailers who also sell their products via online channels as part of multichannel strategies or so-called pure plays who sell online only (Reinartz et al., 2019). Manufacturers have also started running their own online operations aiming to engage directly with end customers, thereby circumventing retailers (Reinartz et al., 2019). In this paper, we focus on the value chain from the perspective of the online seller of products. This can include any type of online retailer as well as manufacturers maintaining direct-to-consumer (D2C) online operations. For selling products online, retailers and manufacturers need to run a website with an online shop.1 Products sold online are typically stored in a warehouse. Once ordered, they are packaged, and delivered to the customer. The customer receives the product, keeps it, or may decide to return it. Some online sellers may choose to sell via downloadable apps or social media platforms such as Facebook or Instagram only. However, it can be assumed that most online sellers run a web-based online shop to reach the largest number of potential customers. 1 646 2.2 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Sustainability in e-commerce Research on the sustainability in e-commerce has addressed a wide array of aspects. This includes comparing the environmental impact of brick-and-mortar retail channels with online channels (Bertram & Chi, 2018; Pålsson, Pettersson, & Winslott Hiselius, 2017; P. Van Loon, McKinnon, Deketele, & Dewaele, 2014; Weber et al., 2009), sustainability in e-commerce packaging (Escursell, Llorach, & Roncero, 2020), sustainability of e-commerce logistics (Mangiaracina, Marchet, Perotti, & Tumino, 2015), lifecycle analysis of different fulfilment channel types (Patricia Van Loon, Deketele, Dewaele, McKinnon, & Rutherford, 2015), ecommerce customers’ last-mile delivery preferences based on the sustainability impact (Ignat & Chankov, 2020), and product returns’ effect on business, society, and the environment (Frei, Jack, & Brown, 2020). While these contributions are diverse in the topics they address and the methods applied, they have one important denominator in common: they address or can be related to specific segments or phases of the e-commerce value chain. This underlines the suitability of the value chain concept as a frame of reference for analyzing sustainability in e-commerce. 2.3 A framework for assessing the sustainability of online retailers Adhering to the logic of the value chain and considering extant literature, we identified six core elements of the e-commerce value chain that need to be considered when assessing the sustainability of online shops: 1) products, 2) online shop operations, 3) intralogistics and storage, 4) packaging, 5) delivery, and 6) product returns. Some of these elements may involve the cooperation with other companies (e.g. suppliers or fulfilment/logistics service providers). We thus included 7) cooperation with partners as a further core element. In our framework (see Figure 1), this element is depicted in parallel to the six linear elements since it can relate to any of them. To emphasize the goal of this framework, namely to guide assessing online retailers’ sustainability, we nest the core framework within the society and the environment. The link between online retailers and the society is established through interactions with their stakeholders which are part of the society. Such stakeholders can include partners of the company (e.g. suppliers), employees, and customers, but also consumer and trade organizations, and entities such as states with their regulatory requirements. Communication plays a major role for such interactions (Lim & T. Wozniak, G. Lu, D. Georgi, A. Janoschka & A. Steigerwald Exploring the Sustainability of Swiss Online Shops: Preliminary Evidence from a Clustering Approach 647 Greenwood, 2017). We thus include communication with stakeholders as further element in our framework. Figure 1: E-commerce sustainability assessment framework nested in society and environment Nesting organizations and their processes and/or business models within external environments in the sense of context is not new. Prominent and well-known examples are the St. Gallen Management Model (Rüegg-Stürm & Grand, 2019) and the environment of the business model canvas (Osterwalder & Pigneur, 2010). Our approach is distinct from these examples in two ways: First, we purposely focus on society and environment, thereby simplifying the manifold and complex interactions between many types of stakeholders. Second, we nest our framework within society which is in turn nested within the environment. This is in line with that paradigm of sustainability which proposes the economy depends on the society and both depend on the environment, in that order (e.g. Griggs, 2013). 3 Methodology 3.1 Development of survey instrument, data collection, and sample The framework developed in section 2.3 served as foundation for developing the survey instrument. For each of the framework’s core elements, survey questions and items were designed to adequately address the specific nature of each core element. Further survey questions addressed communication and marketing, the assessment of customer needs, strategic priorities, and questions determining the size and nature 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 648 of the online shop (e.g. product categories and annual order volume). The final survey instrument was reviewed and pre-tested by experienced researchers, market research professionals, and e-commerce practitioners. The online survey targeted online shops specifically operating in Switzerland and was administered from March to July 2020. Switzerland ranks first in the UNCTAD B2C E-commerce Index 2020, reflecting high scores in all four dimensions of the index, namely Internet penetration, banking coverage, secure server density, and postal reliability (UNCTAD, 2021b). An invitation to the online survey was sent to a large number of Swiss online shops. In addition, the link to the survey was distributed in social media and specific newsletters to reach out to the target group. The final sample consisted of n=227 completed online surveys. In our sample, the most frequent product categories were fashion and food (27% each), houseware (21%), cosmetics and sporting goods (16% each), and toys (13%). In terms of business relationships, the majority stated to serve B2C customers (81%), which was the primary target group of the survey; 51% stated to serve B2B customers; 25% stated to follow a D2C model. Our sample included online shops with different annual order volumes: 32% reported less than 1,000 orders, 36% 1,000 to 9,999 orders, and 32% 10,000 and more orders in 2019. 3.2 3.2.1 Three-step clustering approach Data preparation From the overall survey instrument, we have selected a total of 10 questions to adequately cover all elements of our core framework, i.e. from products to returns, and cooperation with partners. The dummification of the relevant variables lead to a dataset containing 227 online shops and 150 features having only categorical values of “0” or “1”. An autoencoder-based neural network has been used to perform the dimension reduction on the dataset obtained from the previous step. This is beneficial to reducing the noises underlying the original data, which is helpful for the clustering. Compared to the conventional linear dimension reduction techniques using e.g. Principal Component Analysis (PCA), autoencoder-based neural networks are T. Wozniak, G. Lu, D. Georgi, A. Janoschka & A. Steigerwald Exploring the Sustainability of Swiss Online Shops: Preliminary Evidence from a Clustering Approach 649 claimed to be more powerful as they can capture nonlinear correlations between features and perform nonlinear transformations to the data (Alkhayrat, Aljnidi, & Aljoumaa, 2020). Figure 2 displays the structure of the stacked autoencoder. To train this autoencoder, 20,000 epochs have been run, with a batch size 32, a validation split 0.1, and a shuffle variable being set as “true”. Independent upon the size of the hidden layer, both the train and validation loss curves are getting flat after an epoch of approximately 10,000. At the end of the training process, the train loss and the validation loss are the smallest for a hidden layer size of 20, i.e. 0.1472 and 0.1450, respectively. Therefore, the original 150 features have been “condensed” into 20 new features in the latent space for further clustering analyses. Figure 2: Structure of the stacked autoencoder. The input layers and the output layers are symmetric. n represents the number of neural nodes in the middle layer, which is varied using 10, 20, or 30 3.2.2 Clustering method The conventional, unsupervised clustering method K-Means has been utilized to group the online shops that potentially have similar features. The elbow method has been used to determine the optimal number of clusters. Basically, the elbow method calculates the sum of squared distance between neighboring points (online shops) in the determined latent space. From Figure 3a, a clear “elbow” can be seen when the number of clusters equals 3. To verify the chosen number of clusters, a silhouette analysis has been performed for a cluster size of 2, 3, 4, 5, and 6. Correspondingly, the silhouette coefficients obtained are 0.289, 0.211, 0.159, 0.151, and 0.148. A cluster size of 4, 5, or 6 is relatively not good as it leads to a below-average silhouette 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 650 coefficient. In the end, the size of clusters is determined as 3. The online shops are grouped into three clusters (C1, C2, and C3) using the K-Means algorithm. Figures 3a and b: Elbow method for determining the optimal number of clusters (a; left) and silhouette analysis for verifying the three-cluster solution (b; right) 3.2.3 Cluster visualization To visualize the determined clusters of online shops on two-dimensional diagrams, both PCA and t-distributed stochastic neighbor embedding (t-SNE) methods are used. PCA is a deterministic, linear dimensionality reduction technique, which keeps the global structure of data by preserving their variance. Here, the first, second, and third principal components represent 78.4% of the variance in the original data, which is quite good. In comparison, t-SNE is a non-deterministic, non-linear dimensionality reduction technique, which is stronger at capturing local structures within the data and preserves distances between data points instead of their variances. In Figure 4, both the PCA and the t-SNE diagrams exhibit clear boundaries between clusters that can be distinguished mainly using the first principal component. T. Wozniak, G. Lu, D. Georgi, A. Janoschka & A. Steigerwald Exploring the Sustainability of Swiss Online Shops: Preliminary Evidence from a Clustering Approach 651 Figures 4a and b: PCA 2D plots (a; top) vs. t-SNE 2D plots (b; bottom) 4 Results In the survey instrument, we used five items on a 5-point scale to measure sustainability related to the element products. Similarly, five 5-point-scale items were used to assess the elements online shop operations, three items for intralogistics and storage, six items for product returns, and seven items for cooperation with partners. One-way ANOVA was performed to detect statistically significant differences between the clusters. Table 1 details the results for two exemplary items per framework element, highlighting distinct characteristics of each cluster. Table 1: ANOVA summary table for two exemplary items for each of the following elements: products PROD, online shop operations OSO, intralogistics and storage ILS, product returns PR, and cooperation with partners CP PROD C1 C2 C3 F M M M p SD SD SD Element of framework / Survey item df Environmental aspects (e.g. resource conservation … 2, 223 6.1 3.57 3.43 4.16 during manufacture) are just as important as product .003 1.23 1.28 1.17 costs. Social aspects (e.g. fair working conditions during 2, 223 4.1 4.03 4.06 4.54 manufacture) are just as important as product costs. .018 1.16 1.11 0.91 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE CP PR ILS OSO 652 We use IT solutions that leave the smallest possible carbon footprint (manufacture, operations, disposal). We use IT solutions that have minimal power requirements (incl. power for cooling). Our warehouse is operated in a resource-friendly manner (e.g. low power consumption). We optimize transport capacities ecologically (e.g. to branches or distribution center). Returns are passed on to specialized retailers. 2, 188 Returns are destroyed. 2, 203 When choosing possible partners, we consider environmental aspects (e.g. resource conservation, avoidance of carbon emissions). When choosing possible partners, we consider social aspects (e.g. fair working conditions). 2, 220 2, 186 2, 210 2, 209 2, 194 2, 216 2.5 .081 6.7 .002 8.9 .000 12.4 .000 9.5 .000 3.2 .042 7.5 .001 2.95 1.33 2.85 1.35 3.62 1.07 3.37 1.18 2.12 1.27 2.11 1.30 3.18 1.21 2.81 1.32 2.78 1.40 3.76 1.19 3.39 1.28 1.49 1.06 2.13 1.36 2.87 1.36 3.37 1.54 3.67 1.34 4.45 0.91 4.36 0.99 1.22 0.80 1.59 1.02 3.74 1.35 6.5 3.62 3.43 4.27 .002 1.28 1.45 1.24 For the element packaging, we developed lists of specific characteristics of the packaging and the packaging system as multiple-answer checkox-type quesions (e.g. if the packaging material is free of plastic or if the size of boxes is optimized to suit individual consignments). For the element delivery, we developed a similar list for a variety of respective options (e.g. carbon-neutral shipping or bundling of partial deliveries). Figures 5 and 6 detail how the respective characteristics and options vary across the clusters. Cross tabulation and chi-square analyses revealed that most of the characteristics of the packaging systems are unequally distributed across the clusters at p<.001 (***), p<.01 (**), or p<.05 level (*; see Figure 5a). Characteristics of the packing material (see Figure 5b) and the filler material (see Figure 5c) are unequally distributed across the clusters at p<.001 (***) or p<.01 (**) level. Taken together, these results suggest that the identified clusters are quite distinct with regards to the packaging core element of our framework. Out of the seven delivery options displayed in Figure 6, three are unequally distributed across the clusters at p<.001 (***), p<.01 (**), or p<.05 level (*), namely consolidated shipping, use of locally adapted logistics solutions, and delivery to third-party collection points. T. Wozniak, G. Lu, D. Georgi, A. Janoschka & A. Steigerwald Exploring the Sustainability of Swiss Online Shops: Preliminary Evidence from a Clustering Approach 653 Figures 5a, b, and c: Packaging system (a; left), packaging material (b; upper right), and filler material characteristics (c; lower right) – percentages by cluster Figure 6: Delivery options offered to customers – percentages by cluster 5 Conclusion and outlook Our clustering results indicate that online shops can be grouped into three clusters regarding their sustainability. With regard to many aspects of our proposed framework, the clusters are distinct from each other. Among them, cluster 3 has the most distinct characteristics and thus appears to comprise online shops that are most sustainable according to the criteria covered by our survey instrument. Further analysis of the present dataset needs to test to which extent the identified clusters also vary by structural properties of the online shops such as product categories, order volume, or for example D2C model. Future research should also investigate 654 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE the use of communication channels, possible differences between pure-play and omnichannel strategies, and potential latent drivers of sustainability engagement such as the values of the organizations behind the online shops. Acknowledgements The authors are grateful to Swiss Post for making possible this preliminary in-depth analysis of the original survey data. Detailed descriptive results of the survey are available at www.swisspost.ch/digital-commerce-studies. References Alkhayrat, M., Aljnidi, M., & Aljoumaa, K. (2020). A comparative dimensionality reduction study in telecom customer segmentation using deep learning and PCA. Journal of Big Data, 7(1). https://doi.org/10.1186/s40537-020-0286-0 Bertram, R. F., & Chi, T. (2018). A study of companies’ business responses to fashion e-commerce’s environmental impact. International Journal of Fashion Design, Technology and Education, 11(2), 254–264. https://doi.org/10.1080/17543266.2017.1406541 Cramer-Flood, E. (2020). Global Ecommerce 2020. Retrieved from https://www.emarketer.com/content/global-ecommerce-2020 Escursell, S., Llorach, P., & Roncero, M. B. (2020). Sustainability in e-commerce packaging: A review. Journal of Cleaner Production, 280. https://doi.org/10.1016/j.jclepro.2020.124314 European Commission. (2020). 2050 long-term strategy. Retrieved October 19, 2020, from https://ec.europa.eu/clima/policies/strategies/2050_en Fichter, K. (2003). E-Commerce: Sorting Out the Environmental Cosequences. Journal of Industrial Ecology, 6(2), 25–41. https://doi.org/10.1162/108819802763471762 Frei, R., Jack, L., & Brown, S. (2020). Product returns: a growing problem for business, society and environment. International Journal of Operations & Production Management. https://doi.org/10.1108/IJOPM-02-2020-0083 Griggs, D. (2013). Sustainable developmnet goals for people and planet. Nature, 495, 305–307. https://doi.org/10.1038/495305a Ignat, B., & Chankov, S. (2020). Do e-commerce customers change their preferred last-mile delivery based on its sustainability impact? International Journal of Logistics Management, 31(3), 521– 548. https://doi.org/10.1108/IJLM-11-2019-0305 Lim, J. S., & Greenwood, C. A. (2017). Communicating corporate social responsibility (CSR): Stakeholder responsiveness and engagement strategy to achieve CSR goals. Public Relations Review, 43(4), 768–776. https://doi.org/10.1016/j.pubrev.2017.06.007 Lipsman, A. (2019). Global Ecommerce 2019. Retrieved October 13, 2020, from https://www.emarketer.com/content/global-ecommerce-2019 Mangiaracina, R., Marchet, G., Perotti, S., & Tumino, A. (2015). A review of the environmental implications of B2C e-commerce: a logistics perspective. International Journal of Physical Distribution and Logistics Management, 45(6), 565–591. https://doi.org/10.1108/IJPDLM06-2014-0133 Osterwalder, A., & Pigneur, Y. (2010). Business Model Generation: A Handbook for Visionaries, Game Changers, and Challengers. Hoboken, NJ: John Wiley & Sons. Pålsson, H., Pettersson, F., & Winslott Hiselius, L. (2017). Energy consumption in e-commerce versus conventional trade channels - Insights into packaging, the last mile, unsold products and product returns. Journal of Cleaner Production, 164, 765–778. T. Wozniak, G. Lu, D. Georgi, A. Janoschka & A. Steigerwald Exploring the Sustainability of Swiss Online Shops: Preliminary Evidence from a Clustering Approach 655 https://doi.org/10.1016/j.jclepro.2017.06.242 Porter, M. E. (1985). The Competitive Advantage: Creating and Sustaining Superior Performance. New York: Free Press. Reinartz, W., Wiegand, N., & Imschloss, M. (2019). The impact of digital transformation on the retailing value chain. International Journal of Research in Marketing, 36(3), 350–366. https://doi.org/10.1016/j.ijresmar.2018.12.002 Ricciotti, F. (2020). From value chain to value network: a systematic literature review. Management Review Quarterly, 70(2), 191–212. https://doi.org/10.1007/s11301-019-00164-7 Rüegg-Stürm, J., & Grand, S. (2019). Managing in a Complex World. Bern: Haupt. Steffen, W., Rockström, J., Richardson, K., Lenton, T. M., Folke, C., Liverman, D., … Schellnhuber, H. J. (2018). Trajectories of the Earth System in the Anthropocene. Proceedings of the National Academy of Sciences of the United States of America, 115(33), 8252–8259. https://doi.org/10.1073/pnas.1810141115 UNCTAD. (2021a). COVID-19 and e-commerce: a global review. UNCTAD. (2021b). The UNCTAD B2C E-commerce Index 2020. Van Loon, P., McKinnon, A. C., Deketele, L., & Dewaele, J. (2014). The growth of online retailing: A review of its carbon impacts. Carbon Management, 5(3), 285–292. https://doi.org/10.1080/17583004.2014.982395 Van Loon, Patricia, Deketele, L., Dewaele, J., McKinnon, A., & Rutherford, C. (2015). A comparative analysis of carbon emissions from online retailing of fast moving consumer goods. Journal of Cleaner Production, 106(2015), 478–486. https://doi.org/10.1016/j.jclepro.2014.06.060 Weber, C. L., Hendrickson, C. T., Matthews, H. S., Nagengast, A., Nealer, R., & Jaramillo, P. (2009). Life cycle comparison of traditional retail and e-commerce logistics for electronic products: A case study of buy.com. 2009 IEEE International Symposium on Sustainable Systems and Technology, ISSST ’09 in Cooperation with 2009 IEEE International Symposium on Technology and Society, ISTAS. https://doi.org/10.1109/ISSST.2009.5156681 656 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE SOCIAL ROBOTS FOR REDUCING MATHEMATICS HIATUSES IN PRIMARY EDUCATION, AN EXPLORATORY FIELD STUDY MATTHIJS SMAKMAN,1 KOEN SMIT,1 ELINE LAN,2 THOMAS FERMIN,2 JOB VAN LAGEN,2 JULIA MAAS,2 DAVID VAN VLIET2 & SAM LEEWIS1 1 HU University of Applied Sciences Utrecht, Institute for ICT, Digital Ethics, the Netherlands; e-mail: name.surname@hu.nl 2 HU University of Applied Sciences Utrecht, Institute for ICT, the Netherlands; e-mail: name.surname@student.hu.nl Abstract Since the outbreak of COVID-19 schools have gone into lockdown and teachers have had to teach pupils online from home. When pupils go back to school, standard, contemporary learning methods do not seem to be enough to reduce incurred hiatuses. Social robots are slowly becoming an integral component of our society and have great potential as educational technology. This study explores how social robots in classrooms can contribute to reducing mathematics-related hiatuses in Dutch primary education (pupils from four till twelve years old). A social robot as a tutor is evaluated by means of a field study with children (n = 43) to compare a class working with the robot, to a class working without the robot. Multiple factors on learning effect are taken into account by using a survey. Our results demonstrate that a robot can take the role of a tutor and practice with pupils. The results are of interest to researchers in the field of human-robot interaction as well as to educational institutes who wish to understand the implications of adopting robots in education. DOI https://doi.org/10.18690/978-961-286-485-9.46 ISBN 978-961-286-485-9 Keywords: social robotics, educational robots, hiatuses, learning effect 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 658 1 Introduction Hiatuses have always been a reoccurring phenomenon within (primary) education and could have a negative impact on learning performance in the longer term (Luyten, Staman, & Vissch, 2013). Finding solutions to reduce hiatuses have always been an important subject in education, but has now become even more relevant due to the impact of the COVID-19 pandemic on schools (Rothan & Byrareddy, 2020). Many pupils are falling behind on their education because they are not able to physically attend school, which causes governments to take action and provide extra funds for reducing hiatuses (Ministerie van Algemene Zaken, 2020c). In addition, eight percent of the Dutch pupils in regular primary education in 2018/2019 were already suffering from hiatuses (“Leerlingen in (speciaal) basisonderwijs; migratieachtergrond, woonregio,” 2020; Nederlandse Jeugdinstituut, 2019). One of the reasons for these hiatuses is the increasing shortage of teachers the Netherlands is currently facing (Cultuur en Wetenschap van Onderwijs, 2019). School leaders sending classes home, due to the absence of a teacher, possibly leading to performance loss, which also causes learning delays, is becoming a more regular phenomenon (Cultuur en Wetenschap van Onderwijs, 2019). A learning delay can have many adverse consequences, such as underperformance or inequality of opportunity (van Onderwijs, 2020). COVID-19 has created large hiatuses in primary education (Keultjes, 2020; van der Heyden, 2020) and contemporary learning methods do not seem to be enough to reduce these hiatuses, therefore, new learning material must be developed. The Dutch government is currently investing 244 million euros for primary education into creating and developing extra learning materials to reduce COVID-19 related hiatuses (AVS, 2020; Ministerie van Algemene Zaken, 2020b). One of these solutions could be the use of social robots. They have been shown to be able to increase cognitive and affective outcomes and have achieved outcomes similar to those of human tutoring on restricted tasks (Belpaeme, Kennedy, Ramachandran, Scassellati, & Tanaka, 2018). One of the main benefits of social robots is their physical presence, which traditional learning technologies lack (Belpaeme et al., 2018). M. Smakman, K. Smit, E. Lan, T. Fermin, J. van Lagen, J. Maas, D. van Vliet & S. Leewis: Social Robots for Reducing Mathematics Hiatuses in Primary Education, an Exploratory Field Study 659 For this study, the focus will be on exploring the use of a social robot for teaching mathematics to pupils in Dutch primary education. This study aims to answer the following research question: 'can social robots be used for reducing mathematics hiatuses in primary education?' By answering this question, we aim to provide insights into a potential new learning tool for primacy education for reducing hiatuses for mathematics, which is, especially now, an urgent social issue. This paper is structured as follows. First, the background and related work will focus on hiatus factors and social robots as two main concepts. This is followed by a description of the utilized research methods. Next, the paper details how the data was collected. Then, the methods and techniques for data analysis are presented. Based on the data collection and analysis, the results of this study are presented. This is followed by the conclusions drawn from these results. Lastly, the limitations are discussed, and future research directions are described. 2 Background and Related Work To explore the effect of social robots on reducing hiatuses, the definition of the term ‘hiatus’ must be established. A hiatus is a subjective concept. It is defined as the disadvantage in a particular learning area that a person has, compared to ‘the average pupil’ with the same age and the same level of education (Bannink, 2021). In the next section, we will detail the concept of hiatuses, as well as the concept of a social robot. 2.1 Hiatus factors Many factors influence the forming of a hiatus in education. Research shows that the most recurring factors are autonomy (Meusen-Beekman, Joosten-ten Brinke, & Boshuizen, 2001; Ryan & Deci, 2000b; Sierens, Vansteenkiste, Goossens, Soenens, & Dochy, 2009), motivation (Lak, 2017; Ryan & Deci, 2000a), learning environment (Meusen-Beekman et al., 2001; Weiser & Riggio, 2010) and causality (Miller, Ferguson, & Byrne, 2000; U.S. Department of Education Office of Special Education Programs, 2003). Autonomy refers to the experience of choice and psychological freedom with respect to one’s study activities (Sierens et al., 2009). It involves being self-organizing and having a sense of choice over one’s study behaviour (Sierens et al., 2009). Sub-factors here are self-regulation (Ryan & Deci, 2000b), self-effectiveness (Meusen-Beekman 660 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE et al., 2001) and basic needs (Meusen-Beekman et al., 2001). Competence, as an aspect of self-regulation and effectiveness, involves the experience of efficacy while completing a learning task (Meusen-Beekman et al., 2001). The need for relatedness, also an aspect of self-regulation and effectiveness, concerns feeling connected to others, like teachers or fellow pupils (Sierens et al., 2009). Home-tuition in The Netherlands was compulsory because of the COVID-19 pandemic (Ministerie van Algemene Zaken, 2020a). The feeling of being connected with others was reduced by studying at home (Odekerken-Schröder, Mele, Russo-Spena, Mahr, & Ruggiero, 2020). Through home tuition, the pupil will not be with others all day, but there will be online moments with others and, predominantly, offline moments without others (“Didactiek,” 2020). Motivation is an individual's drive or reason to achieve an action or performance, it can drive the person to a (desired) behavioural form (Karels, 2020). Motivation consists of a relationship between various factors, and can be divided into intrinsic and extrinsic motivation, including the biological (innate) and culture-dependent (learned) characteristics (Ryan & Deci, 2000a). In addition, the environment can play a role and several elements influence motivation. Descriptive studies have shown that some pupils enjoy mathematics, seek out mathematical problem situations, and excel in them (Middleton, 1995). Whereas others (‘math anxious’ students) have a fear of mathematics and avoid engaging in mathematical problem situations. In addition, although the utility and importance of mathematics are at least acknowledged by the majority of students even if not understood fully, this knowledge is not sufficient enough to motivate them to continue taking mathematics courses (Middleton, 1995). Learning environment refers to the diverse physical locations, context, and cultures in which pupils learn (Education Reform, 2013). Since pupils may learn in a wide variety of settings, such as outside-of-school locations and outdoor environments, the term is often used as a more accurate or preferred alternative to a ‘classroom’ (Education Reform, 2013). The ‘classroom’ concept has more limited and traditional (Education Reform, 2013). Due to the COVID-19 pandemic, pupils have a disadvantage in social mobility (Cullinane & Montacute, 2020). The closing of schools has caused unpredicted challenges for everyone involved in the education domain (Cullinane & Montacute, 2020). These challenges mostly encompass (Cullinane & Montacute, 2020): 1) not being able to access additional support, 2) not M. Smakman, K. Smit, E. Lan, T. Fermin, J. van Lagen, J. Maas, D. van Vliet & S. Leewis: Social Robots for Reducing Mathematics Hiatuses in Primary Education, an Exploratory Field Study 661 having access to certain information online (due to the poor and rich gap), 3) widening the attainment gap due to extended lockdown(s), and 4) working in cramped housing conditions. Causality is the demonstration of how one variable influences other variables in education. In this research, causality will refer to present disorders in the pupils. These disorders can be learning disorders such as Dyslexia or behavioural disorders such as Attention Deficit Hyperactivity Disorder (ADHD) or Oppositional Defiant Disorder (ODD). The presence of a disorder can have a possible negative impact on the learning ability of the pupils, which can lead to the pupil scoring worse than expected (de Meyer, 2019; Driessen, 1990; U.S. Department of Education Office of Special Education Programs, 2003). 2.2 Social robots A social robot is an embodied object with a certain degree of autonomous behaviour that is specifically designed to socially interact with humans (Darling, 2012). The key elements for a social robot are the physical embodiment, social understanding and school behaviour, and interaction and communication with humans (Hameed, Tan, Thomsen, & Duan, 2016). There are different kinds of social robots, such as Pepper (humanoid and programmable robot) (SoftBank Robotics, 2021b), PARO (therapeutic robot) (Parorobots, 2014) and ROBEAR (nursing care robot) (Wilkinson, 2015). For this study, the focus will be on the NAO robot. The NAO robot is a humanoid and programmable robot with rounded features and is bipedal totalling 58 cm in height (SoftBank Robotics, 2021a). The NAO robot is the most often used robot in research related to social robots in education (Belpaeme et al., 2018). Broadly speaking, there are three types of robots in education. These include 1) using a robot to learn pupils programming skills, 2) the robot being an object of learning as a means to understand what a robot is, and 3) a robot as a learning partner/social robot (for example, an assistant teacher or a fellow pupil). The use of social robots has recently been explored in the educational domain and attention from researchers and practitioners is increasing (Kennedy, Baxter, & Belpaeme, 2014; Konijn & Hoorn, 2020). Robots can take the form of, for example, a tutor, learning buddy or teacher. Social robots have proved to have a positive effect 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 662 on pupils (Kennedy et al., 2014; Kory-Westlund & Breazeal, 2019). Furthermore, the potential advantages of social robots in education are a reduction in costs and time because teachers and pupils are assisted better in class (Pachidis et al., 2019). However, there are different factors regarding the positive effect on reducing hiatuses within the field of mathematics, such as emotional stability and openness (de Meyer, 2019; Driessen, 1990; Streur, 2016). Social robots have the potential to make positive contributions to a range of humancentred activities in education (Belpaeme et al., 2013; Broadbent, Stafford, & MacDonald, 2009; Dautenhahn & Werry, 2004; Tapus, Mataric, & Scassellati, 2007). Research shows that one-on-one tutoring can lead to significant learning improvements (Moriguchi, Kanda, Ishiguro, Shimada, & Itakura, 2011). Furthermore, several studies found a positive learning effect on different areas of expertise such as learning words (Baxter, Ashurst, Read, Kennedy, & Belpaeme, 2017; Moriguchi et al., 2011; Mubin, Stevens, Shahid, Mahmud, & Dong, 2013), science or technology (Mubin et al., 2013), motor task training (Baxter et al., 2017), weight-loss programs (Baxter et al., 2017), and reducing puzzle-solving time (Baxter et al., 2017). These studies indicate that robots take advantage of, and amplify, the human-likeness to anthropomorphize inanimate objects (human-like, not alive objects). 3 Research methods The goal of this study is to explore to what extent a social robot can contribute to reducing mathematics hiatuses in primary education. To do so, we will use a mixedmethod approach, consisting of both quantitative and qualitative methods. This mix provides the opportunity to achieve method and data triangulation (Webster, 2007). In the next sub-sections, we will first describe the field experiment, followed by the quantitative and qualitative research methods. 3.1 Field Experiment Six Dutch primary schools were invited to participate in this study. One primary school positively responded. The field experiment comprises three phases; 1) the Bareka pre-test, 2) pupils using the robot for a set time, and 3) the Bareka post-test. Two of those phases include a standardized test referred to as Bareka, which is a M. Smakman, K. Smit, E. Lan, T. Fermin, J. van Lagen, J. Maas, D. van Vliet & S. Leewis: Social Robots for Reducing Mathematics Hiatuses in Primary Education, an Exploratory Field Study 663 learning method for indicating a child’s level of mathematics proficiency. The Bareka method is divided into exercises, ranging from addition and subtraction to multiplying, deviations and fractions, graphs and percentages, content, weight, decimal numbers, number concept, length, perimeter, and area. The Bareka learning method was translated to the robotics platform Robotsindeklas, used by the NAO robot. This existing platform is used for teaching pupils and students with social robots such as the NAO robot and the Alpha Mini robot (Interactive Robotics, 2021). By using this existing platform, we created a Bareka learning application for the experiment. To ensure that the NAO’s content was compatible with the teaching material of the school, two experienced primary school teachers reviewed the application. The teaching material consisted out of a short explanation for each subject accompanied by practice exercises. The experiment consisted of a control- and an experimental group, wherein the experimental group was provided with a social robot as a supplement to the regular teaching methods. 3.2 Quantitative research methods Two classes were included in the field experiment, ranging from pupils aged ten to twelve years old. The experimental group (n = 20) was taught by a social robot in addition to the teachings of their teacher. The control group (n = 23) was taught solely by their teacher, using standard teaching methods. The social robot was used from Monday until Friday for 10 minutes per group of pupils (maximum of four pupils per group). The experiment lasted about five weeks (from the 18th of November, 2020 till the 18th of December, 2020). The teacher in the experimental group, was 36 years of age, and had thirteen years of educational working experience. The teacher in the control group was 52 years of age and had 31 years of educational working experience. To gain insight into the actual development of the pupils, a knowledge test was conducted before and after the experiment. The first Bareka test took place at the primary school under the supervision of the teachers. The second Bareka test took place digitally due to COVID-19 restrictions (home-tuition). The Bareka results range from one to four, where one is insufficient and four is very good. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 664 To gain insight into the impact of the social robot on the factors that influence the forming of a hiatus in education, we used a validated questionnaire (“Autonomietool,” 2019; “Motivatietool,” 2019). The questionnaire was utilized in the context of the field experiment, by using an experimental design that occurs in a natural setting (in class/school) (Allen, 2017). The questionnaire was sent in December 2020, during the experiment, to both the control and the experiment group. The questionnaire measured two factors related to hiatuses: 1) autonomy and 2) motivation. We excluded other hiatuses factors because including all other factors would result in a too long and complex questionnaire for children. This would potentially have resulted in missing data or a lack of valid data. However, we included the motivation factor because it is an overarching factor of the other factors. Factors such as causality and learning environment were excluded from this survey because details of these factors were indirectly required to answer the research question and are subject to future research. Motivation is split up into the sub-factors 1) intrinsic motivation, 2) identified motivation, 3) extrinsic motivation, and 4) amotivation. The questionnaires were constructed using Leerling2020 (“Autonomietool,” 2019; “Motivatietool,” 2019) and were combined into one survey of 24 questions, eight questions about autonomy (“Autonomietool,” 2019) and sixteen about motivation (“Motivatietool,” 2019). 3.3 Qualitative research methods Semi-Structured Interviews Two semi-structured interviews were conducted with teachers during the field experiment. A semi-structured approach is well suited for the exploration of the perceptions and opinions of respondents, and enable probing for more information and clarification of answers (Barriball, 1994). The interviews were conducted to elicitate information about the pupils and teachers and their knowledge regarding Bareka and the way mathematics is taught. In the interviews, the measuring instrument (knowledge test) was discussed as well as the usage of the social robot. This was required to create the learning applications for the robot and to establish its role in the classroom. M. Smakman, K. Smit, E. Lan, T. Fermin, J. van Lagen, J. Maas, D. van Vliet & S. Leewis: Social Robots for Reducing Mathematics Hiatuses in Primary Education, an Exploratory Field Study 665 Focus group sessions Because of COVID-19 restrictions during this study, it was not possible to physically observe the pupils while they were using the NAO robot. As an alternative, focus groups were set up, which enable discussion among pupils for a more holistic view regarding the use of the NAO and its learning materials. The focus group sessions were guided by the teachers. A focus group was conducted with both groups at the end of the experiment. In each group, five focus groups were conducted. The focus groups consisted of four to six pupils who were around the same level of proficiency in mathematics. This number was chosen because it is the ideal group size (Kitzinger, 1995) and because of the total number of participants. During the focus group sessions, students were asked what the concept of motivation is and what motivates them, using the same focus group protocol. 4 Data analysis The collected data was analysed using SPSS 27 and ATLAS.ti. SPSS was utilized for the analysis of quantitative data, while ATLAS.ti was utilized for the analysis of qualitative data. 4.1 Bareka pre-test, post-test and questionnaire analysis To determine the difference between the performance of the control- and experimental group the data from the results of the Bareka test were analysed. A one-way analysis of variance (one-way ANOVA) was used to determine whether there were any statistically significant differences between the average of the two groups (control- and experimental group). Using the Bareka data, the Hedges’ g factor can be calculated in order to determine what the effect was of the progress of the pupils, taking into account the relatively small sample size (Hedges, 1981). The Hedges’ g factor was calculated by using the sample size, average progress per group and the standard deviation of the progress measured. The value of the Hedges’ g is related to the Cohens’ d and can be used to determine the effect size (Becker, 2000). The effect size of around .20 is considered 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 666 a small effect, .50 a medium effect, and .80 a large effect (Becker, 2000; Cohen, 1992). A Cronbach’s analysis was conducted on each questionnaire factor to measure the reliability per item. A Cronbach’s alpha with a value of .7 is an adequate level of inter-item reliability (Field, 2017). 4.2 ATLAS.ti After the interviews had been conducted, they were first transcribed and put in ATLAS.ti. In ATLAS.ti, two coding rounds of thematic coding were conducted by two research team members to reduce bias. Based on the hiatus factors that were defined earlier, themes were chosen to use for thematic analysis. This method is focusing on identifying patterned meaning across a dataset (Braun & Clarke, 2021). For example, a code could be controlled teaching, which focuses on extrinsic motivation. 5 Results The results of the field experiment (Bareka tests), questionnaire, and focus groups are presented in this section. 5.1 Bareka pre and post-tests The results of Bareka were determined by the one-way ANOVA test. There was a statistically significant difference between the begin average (F (1, 24.872) = 23.292 p < .001) and end average (F (1, 21.668) = 18.840 p < .001) of the groups. The contrast test revealed that group A had a significant mean difference compared to group B in the Begin Average, t (24.872) = -4.826, p <.001 and it revealed that the experimental group had a significant mean difference compared to the control group in the End Average, t(21.668) = -4.340, p <.001, see table 1. Table 1: Contrast test results Contrast Begin average End average 1 1 Value of contrast -.4472 -.4010 SE t df Sig .09265 .09240 -4.826 -4.340 24.872 21.668 <.001 <.001 M. Smakman, K. Smit, E. Lan, T. Fermin, J. van Lagen, J. Maas, D. van Vliet & S. Leewis: Social Robots for Reducing Mathematics Hiatuses in Primary Education, an Exploratory Field Study 667 To determine the effect size, the Hedges’ g was calculated. The calculated Hedges’ g for the experimental group is 0.440 and for the control group is 0.6524. This means that there is a small positive effect in the experimental group and a medium positive effect in the control group, see table 2. Table 2: Hedges' g results Group Exp.-Begin Exp.-End Control-Begin Control-End 5.2 n 18 18 23 23 Mean 2,673444 2,835778 3,120609 3,236800 SD 0,353707 0,367611 0,193880 0,153894 Hedges’ g 0,4400 0,6524 Questionnaire A Cronbach’s analysis was conducted on the Autonomy subscale of the survey. It was found that the subscale’s alpha level did not have an adequate level of inter-item reliability (Cronbach’s α = .54). However, further analysis revealed that by removing the item, “My tutor always tells me what to do during class”, the alpha could be raised (Cronbach’s α = .64). Furthermore, the intrinsic motivation (Cronbach’s α = .85), identified motivation (Cronbach’s α = .78), extrinsic motivation (Cronbach’s α = .70) and amotivation (Cronbach’s α = .73) subscales of the survey had all an adequate level of inter-item reliability. Table 3 shows the descriptive statics of each subscale, where the item “My tutor always tells me what to do during class” is removed. This ensured that the survey was more reliable. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 668 Table 3: Questionnaire descriptive statics Factor Autonomy Intrinsic motivation Identified motivation Extrinsic motivation Amotivation 5.3 Group Experimental Control Experimental Control Experimental Control Experimental Control Experimental Control n 20 23 19 21 20 22 20 21 20 22 Mean 3.875 3.859 3.421 3.381 3.825 3.886 2.813 2.869 1.625 1.636 SD .414 .399 1.093 1.048 .770 .763 .996 1.005 .763 .727 SEM .092 .083 .251 .229 .172 .163 .223 .219 .171 .155 Δ Mean .016 .040 -.061 -.056 -.011 Semi-structured interviews The interview method that was used is thematic analysis. There were themes generated that were focused on the hiatus factors. Example codes are shown in table 4. The results are based on the transcripts which are available upon request due to space limitations. Table 4: Examples of coding results Transcript “I work from my own agenda, because it has to be done.” Code Controlled teaching Theme Extrinsic motivation “If children are very strong in mathematics and they have their own initiative and they want to do things, you can let them go more easily. And then I stimulate that.” Autonomysupporting teaching Intrinsic motivation, autonomy The interviews mainly revealed that the teacher in the control group was in a more advanced phase of mathematics than the teacher in the experimental group. The pupils from the experimental group have a learning delay that takes more time to catch up to compared to the control group, according to the teachers. The experimental group worked with the NAO robot. The value of the robot, in this context, would be to improve attention and motivation in the pupils, while the delivery and assessment are done by the human teacher. M. Smakman, K. Smit, E. Lan, T. Fermin, J. van Lagen, J. Maas, D. van Vliet & S. Leewis: Social Robots for Reducing Mathematics Hiatuses in Primary Education, an Exploratory Field Study 5.4 669 Focus group sessions The focus group sessions revealed that the children’s interest in subjects differed. Mathematics, English and physical exercises were the most frequently mentioned subjects of interest. Also, the children agreed that playing games were fun (with or without the use of the social robot). The team deliberately not asked about the robot, which was only mentioned once. No link was made by the pupils between motivation and a social robot that can help them deal with learning disadvantages/hiatuses. 6 Discussion and Conclusion This paper aims to answer the following research question: 'can social robots be used for reducing mathematics hiatuses in primary education?' The ANOVA identified a statistically significant difference between the begin- and end average of the groups (p <.001). The contrast test revealed that there was a significant difference between the beginand end average of the experiment group, compared to the control group. However, the value contrast is higher in the begin average (= -.4472) compared to the end average (= -.4010). In addition, the calculated Hedges’ g for the experimental group is 0.440 and for the control group is 0.6524. This means that there is a small positive effect for the experimental group and a medium positive effect for the control group. It may be concluded that the robot had a small effect on the average of the Bareka results. However, the control group showed a larger positive effect (medium >.5 versus small <.5) compared to the experimental group. Though, it cannot be concluded that this difference is caused by the social robot, as the effect of the social robot cannot be isolated to attribute to the learning performance of the pupils in this study. The interview and focus groups have shown that pupils in the experiment group had more difficulty with mathematics, which can also be seen in Bareka's average results. This study has several limitations that should be discussed. firstly, this exploratory study consisted out of a limited number of participating children (n = 43). More participants are preferable and will result in increased reliability and generalizability in future research. Secondly, the teachers did not have previous experience with the use of social robots, and had limited time to practice with the robot before the experiment. This resulted in the teacher and pupils experimenting with the robot during the first lessons and having difficulty using the robot and application, which 670 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE affected the actual time to improve the learning effect using the robot. Lastly, while we argue that both groups are sufficient to determine a (potential) effect using the research methods presented, we discovered moderating variables that make it hard to isolate the effect of the social robot in this study setup, such as 1) the difference in intrinsic motivation regarding mathematics between both groups, 2) differences in mathematics progression and learning delays between both groups, 3) didactic styles and level of experience between both teachers, and 4) differences in diagnosis per pupil per group. Overall, we conclude that a social robot can be used for reducing mathematic hiatuses, however, we could not conclude that a social robot is as effective as a human tutor. Furthermore, the high work pressure in primary education might have a negative effect on the use of social robots in primary education. Therefore, future research might focus on creating a plug and play social robot which allows teachers with limited robot experience to also experiment with this potentially promising technology. Acknowledgements We want to thank Bas Hazelet and Julia Frölich for supporting us setting up the experiment, the teachers that provided the information and the pupils that participated in the experiment. References Allen, M. (2017). Field Experiments. In The SAGE Encyclopedia of Communication Research Methods. 2455 Teller Road, Thousand Oaks California 91320: SAGE Publications, Inc. https://doi.org/10.4135/9781483381411.n200 Autonomietool. (2019). Leerling 2020. AVS. (2020, May). 244 miljoen om leerachterstanden coronacrisis in te halen. Algemene Vereniging Schoolleiders. Bannink, F. P. (2021). Wat is een leerachterstand? Retrieved March 31, 2021, from https://advancedrt.nl/leerachterstand-2/ Barriball, L. (1994). Collecting data using a semi-structured interview: a discussion paper. Journal of Advanced Nursing (Vol. 19). Baxter, P., Ashurst, E., Read, R., Kennedy, J., & Belpaeme, T. (2017, May). Robot education peers in a situated primary school study: Personalisation promotes child learning. PLOS ONE. Becker, L. A. (2000). Effect Size (ES). Belpaeme, T., Baxter, P. E., Read, R., Wood, R., Cuayáhuitl, H., Kiefer, B., … Humbert, R. (2013). Multimodal child-robot interaction: building social bonds. Journal of Human-Robot Interaction, 1(2), 33–53. https://doi.org/10.5898/JHRI.1.2.Belpaeme Belpaeme, T., Kennedy, J., Ramachandran, A., Scassellati, B., & Tanaka, F. (2018). Social robots for education: A review. Sci. Robot., 3(21), eaat5954. https://doi.org/10.1126/scirobotics.aat5954 M. Smakman, K. Smit, E. Lan, T. Fermin, J. van Lagen, J. Maas, D. van Vliet & S. Leewis: Social Robots for Reducing Mathematics Hiatuses in Primary Education, an Exploratory Field Study 671 Braun, V., & Clarke, V. (2021). Thematic analysis. Retrieved March 31, 2021, from https://www.psych.auckland.ac.nz/en/about/thematic-analysis.html Broadbent, E., Stafford, R., & MacDonald, B. (2009). Acceptance of Healthcare Robots for the Older Population: Review and Future Directions. Int J of Soc Robotics, 1(4), 319. https://doi.org/10.1007/s12369-009-0030-6 Cohen, J. (1992). A power primer. Psychological Bulletin, 112(1), 155–159. https://doi.org/10.1037/0033-2909.112.1.155 Cullinane, C., & Montacute, R. (2020). COVID-19 and Social Mobility Impact Brief #1: School Shutdown, 11. Cultuur en Wetenschap van Onderwijs. (2019, April). Oplopend lerarentekort bedreiging voor gelijke kansen in het onderwijs - De Staat van het Onderwijs - Inspectie van het onderwijs. Darling, K. (2012, September). Extending Legal Protection to Social Robots. IEEE Spectrum: Technology, Engineering, and Science News. Dautenhahn, K., & Werry, I. (2004). Towards interactive robots in autism therapy: Background, motivation and challenges. Pragmatics & Cognition, 12(1), 1–35. https://doi.org/10.1075/pc.12.1.03dau de Meyer, B. (2019). Hoe zit ik in elkaar? Persoonlijkheid, temperament en rekenen bij kinderen met en zonder dyscalculatie., 66. Didactiek. (2020, September). Les Op Afstand. Driessen, G. W. J. M. (1990). De onderwijspositie van allochtone leerlingen: de rol van sociaaleconomische en etnisch-culturele factoren, met speciale aandacht voor het onderwijs in eigen taal en cultuur. Nijmegen : Instituut voor Toegepaste Sociale Wetenschappen. Education Reform. (2013). Learning Environment. Retrieved March 31, 2021, from https://www.edglossary.org/learning-environment/#:~:text=Learning environment refers to the,cultures in which students learn. Field, A. (2017). Discovering statistics using IBM SPSS statistics (5th editio). Thousand Oaks, CA: SAGE Publications. Hameed, I. A., Tan, Z.-H., Thomsen, N. B., & Duan, X. (2016). User Acceptance of Social Robots, pp. 274-27, 7. Hedges, L. V. (1981). Distribution Theory for Glass’s Estimator of Effect size and Related Estimators. Journal of Educational Statistics, 6(2), 107–128. https://doi.org/10.3102/10769986006002107 Interactive Robotics. (2021). Educatieve robots voor het primair onderwijs. Retrieved March 31, 2021, from https://www.interactive-robotics.com/onderwijs/primair-onderwijs/ Karels, M. (2020, March). Motivatie - intrinsieke en extrinsieke motivatie. Kennedy, J., Baxter, P., & Belpaeme, T. (2014). Using Social Robots in Child Education, 3. Keultjes, H. (2020, October). Kabinet trekt 38 miljoen uit voor ‘herfstscholen’ tegen coronaleerachterstand. AD.Nl. Kitzinger, J. (1995). Qualitative Research: Introducing focus groups. BMJ, 311(7000), 299–302. https://doi.org/10.1136/bmj.311.7000.299 Konijn, E. A., & Hoorn, J. F. (2020). Robot tutor and pupils’ educational ability: Teaching the times tables. Computers \& Education, 157, 103970. https://doi.org/10.1016/j.compedu.2020.103970 Kory-Westlund, J. M., & Breazeal, C. (2019). Exploring the Effects of a Social Robot’s Speech Entrainment and Backstory on Young Children’s Emotion, Rapport, Relationship, and Learning. Front. Robot. AI, 6. https://doi.org/10.3389/frobt.2019.00054 Lak, E. (2017). Intrinsieke motivatie van kinderen in het speciaal basisonderwijs. Leerlingen in (speciaal) basisonderwijs; migratieachtergrond, woonregio. (2020, May). Statline. Luyten, H., Staman, L., & Vissch, A. (2013). Leerachterstanden van vertraagde leerlingen op normaalvorderende leeftijdgenoten. Pedagogische Studiën, 45–57. Meusen-Beekman, K., Joosten-ten Brinke, D., & Boshuizen, E. (2001). De retentie van zelfregulatie, motivatie en self-efficacy in het voortgezet onderwijs na formatieve assessments in het basisonderwijs. Pedagogische Studiën, 136–153. 672 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Middleton, J. A. (1995). A Study of Intrinsic Motivation in the Mathematics Classroom: A Personal Constructs Approach. Journal for Research in Mathematics Education, 26(3), 254. https://doi.org/10.2307/749130 Miller, A., Ferguson, E., & Byrne, I. (2000). Pupils’ causal attributions for difficult classroom behaviour. British Journal of Educational Psychology, 70(1), 85–96. https://doi.org/10.1348/000709900157985 Ministerie van Algemene Zaken. (2020a, March). Aanvullende maatregelen onderwijs, horeca, sport. Ministerie van Algemene Zaken. (2020b, May). Extra geld onderwijs door coronacrisis - Financiering onderwijs - Rijksoverheid.nl. Ministerie van Algemene Zaken. (2020c, May). Vermijd drukte, houd 1,5 meter afstand - Nieuwsbericht - Rijksoverheid.nl. Moriguchi, Y., Kanda, T., Ishiguro, H., Shimada, Y., & Itakura, S. (2011). Can young children learn words from a robot? IS, 12(1), 107–118. https://doi.org/10.1075/is.12.1.04mor Motivatietool. (2019). Leerling 2020. Mubin, O., Stevens, C. J., Shahid, S., Mahmud, A. Al, & Dong, J.-J. (2013). A review of the applicability of robots in education. Technology for Education and Learning 2013, 1(9). https://doi.org/10.2316/Journal.209.2013.1.209-0015 Nederlandse Jeugdinstituut. (2019, May). Cijfers over Onderwijsachterstanden. Odekerken-Schröder, G., Mele, C., Russo-Spena, T., Mahr, D., & Ruggiero, A. (2020). Mitigating loneliness with companion robots in the COVID-19 pandemic and beyond: an integrative framework and research agenda. Journal of Service Management, 31(6), 1149–1162. https://doi.org/10.1108/JOSM-05-2020-0148 Pachidis, T., Vrochidou, E., Kaburlasos, V. G., Kostova, S., Bonković, M., & Papić, V. (2019). Social Robotics in Education: State-of-the-Art and Directions. In N. A. Aspragathos, P. N. Koustoumpardis, & V. C. Moulianitis (Eds.), Advances in Service and Industrial Robotics (pp. 689–700). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-03000232-9_72 Parorobots. (2014). PARO Therapeutic Robot. Retrieved March 31, 2021, from http://www.parorobots.com/ Rothan, H. A., & Byrareddy, S. N. (2020). The epidemiology and pathogenesis of coronavirus disease (COVID-19) outbreak. Journal of Autoimmunity, 109, 102433. https://doi.org/10.1016/j.jaut.2020.102433 Ryan, R. M., & Deci, E. L. (2000a). Intrinsic and Extrinsic Motivations: Classic Definitions and New Directions. Contemporary Educational Psychology, 25(1), 54–67. https://doi.org/10.1006/ceps.1999.1020 Ryan, R. M., & Deci, E. L. (2000b). Self-Determination Theory and the Facilitation of Intrinsic Motivation, Social Development, and Well-Being. American Psychologist, 11. Sierens, E., Vansteenkiste, M., Goossens, L., Soenens, B., & Dochy, F. (2009). The synergistic relationship of perceived autonomy support and structure in the prediction of self-regulated learning. British Journal of Educational Psychology, 79(1), 57–68. https://doi.org/10.1348/000709908X304398 SoftBank Robotics. (2021a). NAO the humanoid and programmable robot. Retrieved March 31, 2021, from https://www.softbankrobotics.com/emea/en/nao SoftBank Robotics. (2021b). Pepper the humanoid and programmable robot. Retrieved March 31, 2021, from https://www.softbankrobotics.com/emea/en/pepper Streur, M. (2016, September). Een model hoe BIS en BAS chronisch pijngedrag beïnvloeden. Psychfysio Opleidingen. Tapus, A., Mataric, M. J., & Scassellati, B. (2007). Socially assistive robotics [Grand Challenges of Robotics]. IEEE Robotics Automation Magazine, 14(1), 35–42. https://doi.org/10.1109/MRA.2007.339605 U.S. Department of Education Office of Special Education Programs. (2003). Identifying and Treating Attention Deficit Hyperactivity Disorder: A Resource for School and Home. Retrieved March 31, 2021, from M. Smakman, K. Smit, E. Lan, T. Fermin, J. van Lagen, J. Maas, D. van Vliet & S. Leewis: Social Robots for Reducing Mathematics Hiatuses in Primary Education, an Exploratory Field Study 673 http://www.ldonline.org/article/Identifying_and_Treating_Attention_Deficit_Hyperactivity _Disorder%3A_A_Resource_for_School_and_Home van der Heyden, W. (2020, November). Vooral kinderen van laagopgeleide ouders hebben leerachterstand door corona. RTL Nieuws. van Onderwijs, C. en W. (2020, November). Onderwijs tijdens COVID-19: scholen en instellingen hebben zorgen over de continuïteit van het onderwijs en over leerachterstanden van leerlingen en studenten - Nieuwsbericht - Inspectie van het onderwijs. Webster, M. (2007). Research Methods. Journal of Business, 5(3), 8. Weiser, D. A., & Riggio, H. R. (2010). Family background and academic achievement: does self-efficacy mediate outcomes? Soc Psychol Educ, 13(3), 367–383. https://doi.org/10.1007/s11218-0109115-1 Wilkinson, J. (2015). The strong robot with the gentle touch. 674 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE ARTIFICIAL INTELLIGENCE VALUE ALIGNMENT PRINCIPLES: THE STATE OF ART REVIEW FROM INFORMATION SYSTEMS RESEARCH SHENGNAN HAN1 & SHAHROKH NIKOU2 1 Stockholm University, Department of Computer and Systems Sciences; e-mail: shengnan@dsv.su.se 2 Åbo Akademi University & Stockholm University; e-mail: shahrokh.nikou@abo.fi Abstract Information and communication technologies (ICTs) must be designed and used for humane ends. The rapid adoption of Artificial Intelligence (AI) has raised the critical question of whether we can ensure AI's alignment with human values to guide its design and use. We perform a selective literature review with the specific search terms of the papers published in the top information systems (basket of 8 journals and 5 AI journals in IS) from 2000-2020 to answer this question. The findings indicate that IS research has contributed insufficiently to a deeper understanding of human values and AI value alignment principles. Moreover, the mainstream IS research on AI is mostly dominated from its technical and managerial aspects. Thus, the future research agendas are proposed accordingly. The paper provides some food for thoughts in studying human values and AI alignment within the context of IS research. DOI https://doi.org/10.18690/978-961-286-485-9.47 ISBN 978-961-286-485-9 Keywords: artificial intelligence, alignment principles, human values, information systems research, literature review 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 676 1 Introduction Berente et al. (2019) define AI as machines performing cognitive functions that we typically associate with humans, including perceiving, reasoning, learning, and interacting with others. They emphasize that “AI is not confined to one or a few applications, but rather is a pervasive economic, societal, and organizational phenomenon” (p. 1). To achieve what Walsham (2012) has argued that we must direct ICT at humane ends, AI should be aimed at making this a better world by using its highly optimized mechanistic functions and super intelligence to serve human needs, satisfy human desires and to maximize the realization of human values (e.g., Yudkowsky, 2011). This is also proposed as the AI value alignment principles (Russell, 2019) or as Sutrop (2020) put forward designing AI that conforms to human values is called ‘value alignment’. One fundamental and critical question is raised and intensively debated: how can we ensure AI alignment with human values through AI operations from design to use? Yamposkiy (2017) argued that, because of the unresolved disagreements in the disciplines of philosophy and axiology regarding the nature and content of human values, the question of how to align these values in AI development and use, is also moot. The IS community has not yet paid sufficient attention to this AI phenomenon and has contributed insufficiently to a deeper understanding of human values in general (Carman and Rosman, 2020, Lyytinen et al., 2020). In this paper, we first analyze the AI phenomenon as it is discussed in the top IS research outlets (basket of 8 journals and 5 AI journals in IS). It should be noted that the AI value alignment and its connection to ethical concerns is not included in the search because, while significant, this topic is not the paper’s focus. Upon the results from the literature review, we propose the future research agendas. 2 AI Value Alignment Principles Russell (2019) has proposed the three AI value alignment principles for creating a safe and beneficial AI. (1) A principle of altruism: the AI’s only objective is to maximize the realization of human values. Here, human values are defined as what “we” would “prefer our life to be like”. (2) A law of humility: AI as the digital agents is initially not certain of what human values are. But AI agents, in support of advanced machine learning capabilities, may learn those values and preferences by observing “our” behaviors. (3) To achieve the value alignments between AI and S. Han & S. Nikou: Artificial Intelligence Value Alignment Principles: The State of Art Review from Information Systems Research 677 humans, we, in this process, must learn to be better persons, or, perhaps, simpler. The aim should be ensuring that AI agents can learn the essential value-goods such as safety, healthcare, food and shelter, and meaningful work from “us”. AI agents must be explicably programmed to make such values primary where and when needed. We acknowledge that advanced technical solutions are not sufficient for fulfilling the AI value alignment principles (e.g. Christian, 2020). Therefore, the multiple aspects of human values should be fully explored in AI design and use. 3 Research Method We followed Lowry et al. (2004) recommendation to select the journals and articles. We searched Web of Science, INFORM, EBSCO, and Google Scholar. We separately also searched the basket of 8 IS journals and the top 5 AI journals in IS. As inclusion criteria, an article had to be original study and published in that top IS journal between 2000-2020 and written in English. Moreover, to be included in the review, articles had to match exact the search terms used during the publication search. As we used specific search terms (such as artificial intelligence AND human value*, or AI AND human value*), the initial database search retrieved 327 articles. In the next step, we excluded all duplicated and articles that did not adhere to our search criteria (n = 302 in total). The most frequent reason for excluding an article was that, although drawing to some extend on AI, the article did not primarily use AI in the context of human value or focused mainly on ethical issues. This final dataset is composed of 25 AI articles1, which were downloaded in full text and reviewed by authors. After reviewing the 25 articles, it has become clear that none of the articles, although appeared to be relevant, discussed or approached “AI and human value” like our current approach. Nonetheless, the review results are briefly presented in the next section. 4 IS Research on “AI and Human Values” The IS community has provided limited exploration of human values and of the possible AI alignment with those human values. Most of the reviewed articles limit their contributions towards AI technical problems (e.g., Li et al., 2009; Wong et al., 2020), and very few have implicitly discussed AI’s impacts on humans, organizations, 1 Due to page limitation, we cannot include a full list of all authors’ information in the reference list. 678 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE and society in general. For example, Ransbotham et al. (2016, p. 1) argued that while IT provides many advantages to humans, their organizations, and to society in general, also have the potential to create new vulnerabilities such as online harassment, incivility, a merely algorithmic ethics, and bias towards minorities. In another study, Aleksander (2017) argued that, as robots and other machines operate in an algorithmic way and not in a truly cognitive and conscious human way, AI can present serious threats to humanity if the algorithms are not aligned with broader sets of values than those of pragmatic efficiency. Elkins et al. (2013) demonstrated that using artificial technology and integrating AI into advanced expert systems inadvertently imposes threats even to human experts and inhibits users from adopting the technology. Nonetheless, Aleksander (2004) argued that as AI technology develops more and more, it has greater potential for overcoming some of the unforeseen difficulties as humans pursue some very ambitious projects. Glezer (2003, p. 65) argued that using AI for automation of tasks is problematic, for the software agents often interfere with the human ability to specify the amount of control they would like to have over the agent’s behavior. Nicolescu et al. (2018) investigated the emerging meanings of “value” associated with the Internet of Things (IoT) and argued that the multiple meanings of “value” are invariably articulated at the juncture of three domains: social, economic, and technical. Huysman (2020) asserted that we should create societal awareness about the rise of low quality of work due to AI rather than focusing merely on the effect of AI on job losses. Grønsund and Aanestad (2020, p. 14) argued that while research on algorithmic and intelligent technologies has generated insights about their potential to replace human work; however, the emergent configurations by which humans and algorithmic interplay emerge has not been investigated. In summary, the current AI research in IS field is restricted to technical developments and design issues. AI design and its alignment with human values are not yet being fully considered. 5 Discussion and Future Research Agendas The study results clearly demonstrate that IS research has not yet sufficiently contributed to a deeper understanding of human values and AI value alignment and how to achieve the AI value alignment principles. Thus, we propose the following three research foci. First, we need to understand what are human values from different philosophical and ontological schools of thoughts within IS. Ågerfalk (2020) argues that IS research can contribute significantly to advance AI S. Han & S. Nikou: Artificial Intelligence Value Alignment Principles: The State of Art Review from Information Systems Research 679 development and use. We need to focus on the three key components, contextualization, communication, and practice to complete the inquires of AI phenomenon. AI phenomenon is much more complex with great uncertainties. We can explore this complexity from various school of thoughts with the aim of producing more comprehensive understanding of what are the human values and add IS perspectives to this multidisciplinary theme. Second, we need to understand what are the critical human values within the contexts of AI design and use. Human values are deeply rooted in cultural and social traditions. Gabriel (2020) points out that human preferences that are always embedded in a range of human values, may not be sufficient, though necessary, to give instructions to an AI agent for achieving desired outcomes. Our “immediate” preferences may differ largely than what we prefer in the longer time. AI systems are kind of IS artefacts (Chatterjee et al., 2017; Lee et al., 2015). The study of the critical human values can be conducted in the context of AI as an information artefact, AI as a technology artefact and AI as a social artefact. As well we need to study the interactions among the three artefacts components to reach the conclusion, i.e., what are the critical human values should be aligned with AI design. Third, we need to prioritize the critical human values in AI design and use for different user groups in various cultural, social, and personal contexts. To keep a positive reciprocal relationship of human/AI, we need to become a better person and use AI in a positive and ethical way. This is also what the AI alignment principles have proposed. Since the AI may learn from us (a law of humitity), we need to behave well and generate more positive values that benefit AI design. Thus, future studies can investigate the effects of the prioritized human values on the users’ behaviors towards AI systems within a specific context. 6 Conclusions We briefly address current IS research on human values and AI in this paper, as well as some perspectives on the importance of achieving AI value alignment principles. We also suggest three research directions that IS researchers can pursue, but they are tentative and might be naïve in their current state of development. We believe that the paper provides some food for thought about the significance of studying human values in AI design and application in IS research. 680 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE References Ågerfalk, P. J. (2020). Artificial intelligence as digital agency. European Journal of Information Systems, 29 (1), 1-8. Aleksander, I. (2004). Advances in intelligent information technology: re-branding or progress towards conscious machines? Journal of Information Technology, 19 (1), 21-27. Aleksander, I. (2017). Partners of humans: a realistic assessment of the role of robots in the foreseeable future. Journal of Information Technology, 32 (1), 1-9. Berente, N., Gu, B., Recker, J., and Santhanam, R. (2019). Managing AI. Call for Papers, MIS Quarterly, 1-5. Carman, M., and Rosman, B. (2020). Applying a principle of explicability to AI research in Africa: should we do it? Ethics and Information Technology. Available at: https://doi.org/10.1007/s10676-020-09534-2. Chatterjee, S., Xiao, X., Elbanna, A., and Sarker, S. (2017). The Information Systems Artifact: A Conceptualization Based on General Systems Theory. Paper presented at the Hawaii International Conference on System Sciences. Christian, B (2020). The alignment problem: machine learning and human values, W. W. Norton & Company, New York. Elkins, A. C., Dunbar, N. E., Adame, B., and Nunamaker, J. F. (2013). Are users threatened by credibility assessment systems? Journal of Management Information Systems, 29 (4), 249-262. Gabriel, I. (2020). Artificial Intelligence, Values, and Alignment. Minds and Machines, https://doi.org/10.1007/s11023-020-09539-2. Glezer, C. (2003). A conceptual model of an interorganizational intelligent meeting-scheduler (IIMS). The Journal of Strategic Information Systems, 12 (1), 47-70. Grønsund, T., & Aanestad, M. (2020). Augmenting the algorithm: Emerging human-in-the-loop work configurations. The Journal of Strategic Information Systems, 29(2), 101614. Huysman, M. (2020). Information systems research on artificial intelligence and work: A commentary on “Robo-Apocalypse cancelled? Reframing the automation and future of work debate”. Journal of Information Technology, 0268396220926511. Lee, A., Thomas, M., and Baskerville, R. L. (2015). Going back to basics in design science: from the information technology artifact to the information systems artifact. Information Systems Journal, 25, 5-21. Li, X., Chen, H., Zhang, Z., Li, J., and Nunamaker, J. F. (2009). Managing knowledge in light of its evolution process: An empirical study on citation network-based patent classification. Journal of Management Information Systems, 26 (1), 129-154. Lowry, P., Romans, D., and Curtis, A. (2004). Global Journal Prestige and Supporting Disciplines: A Scientometric Study of Information Systems Journals. Journal of the Association for Information Systems 5(2), 29-77. Lyytinen, K., Nickerson, J. V., and King, J. L. (2020). Metahuman systems= humans+ machines that learn. Journal of Information Technology. Available at: https://doi.org/10.1177/0268396220915917. Nicolescu, R., Huth, M., Radanliev, P., and De Roure, D. (2018). Mapping the values of IoT. Journal of Information Technology, 33 (4), 345-360. Ransbotham, S., Fichman, R. G., Gopal, R., and Gupta, A. (2016). Special section introduction— ubiquitous IT and digital vulnerabilities. Information Systems Research, 27 (4), 834-847. Russell, S. (2019). Human compatible: Artificial intelligence and the problem of control. Penguin. Sutrop, M. (2020). Challenges of Aligning Artificial Intelligence with Human Values. Acta Baltica Historiae et Philosophiae Scientiarum, 8(2). Walsham, G. (2012). Are we making a better world with ICTs? Reflections on a future agenda for the IS field. Journal of Information Technology, 27(2), 87-93. Wong, N., Ray, P., Stephens, G., and Lewis, L. (2012). Artificial immune systems for the detection of credit card fraud: an architecture, prototype and preliminary results. Information Systems Journal, 22(1), 53-76. S. Han & S. Nikou: Artificial Intelligence Value Alignment Principles: The State of Art Review from Information Systems Research 681 Yampolskiy, R. V. (2017). AI Is the Future of Cybersecurity, for Better and for Worse. Harvard Business Review. Yudkowsky, E. (2011). Complex Value Systems are Required to Realize Valuable Futures. The Singularity Institute, San Francisco, CA. http://intelligence.org/files/ComplexValues.pdf. 682 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE THE IMPACT OF COMPUTER-MEDIATED DELAYED FEEDBACK ON DEVELOPING ORAL PRESENTATION SKILLS: AN EXPERIMENTAL STUDY IN VIRTUAL REALITY BO SICHTERMAN, MARIECKE SCHIPPER, MAX VERSTAPPEN, PHILIPPINE WAISVISZ & STAN VAN GINKEL Utrecht University of Applied Sciences, Utrecht, The Netherlands; e-mail: bo.sichterman@hu.nl, mariecke.schipper@hu.nl, verstappen.m.a@gmail.com, philippine.waisvisz@hu.nl, stan.vanginkel@hu.nl Abstract Previous studies emphasize that feedback is essential for acquiring presentation skills. However, it remains unknown whether computer-mediated delayed feedback, provided in Virtual Reality (VR) without the intervention of the teacher, impacts students’ public speaking skills. Recent technological developments allowed to convert quantitative information from VR-systems into qualitative feedback messages that directly relate to the standards for high-quality feedback. This experimental field study, therefore, focuses on the impact of automated, qualitative feedback messages in a VR-system on students’ presentation skills development (n = 60). The effects are compared with a validated condition in which the delayed VR-feedback is delivered by an expert. Mixed methods, including validated rubrics and self-evaluation tests, are used for data collection. This study aims to refine educational design principles concerning effective feedback in presentation curricula. Furthermore, the results should provide insights about supporting feedback processes while releasing the pressure on resources such as time and staffing. DOI https://doi.org/10.18690/978-961-286-485-9.48 ISBN 978-961-286-485-9 Keywords: feedback, oral presentation skills, virtual reality, experimental study design, higher education 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 684 1 Introduction Presenting is considered as a crucial competence for higher-educated professionals (Van Ginkel, Gulikers, Biemans, & Mulder, 2015). It is a prerequisite for effective communication and successful performance within professional practice (De Grez, Valcke & Roozen, 2019). However, young professionals often fail to show effective presentation behaviors in these environments (Van Ginkel et al., 2019). Research on public speaking defines oral presentation competence as “a combination of knowledge, skills and attitudes needed to speak in public in order to inform, self-express, relate and to persuade” (De Grez, 2009, p.5). Developments in this competence are related to seven educational design principles (Van Ginkel et al., 2015), including three principles focused on formative assessment strategies (i.e. expert feedback, peer feedback and self-assessment) (Van Ginkel, Gulikers, Biemans & Mulder, 2017a). While feedback is crucial for students’ learning (Hatti & Timperley, 2007), research has shown that innovative technologies as VR are valuable for delivering feedback within oral presentation learning tasks. Specifically, VR offers the opportunity to practice oral presentations within a virtual learning environment that imitates a presentation environment (Merchant Goetz, Cifuentes, KeeneyKennicutt & Davis, 2014). Additionally, VR provides automated feedback on, for example, non-verbal communication aspects (e.g. eye contact and use of voice) both during (i.e. computer-mediated immediate feedback) as well as after (i.e. computer-mediated delayed feedback) presentation practice (Belboukhaddaoui & Van Ginkel, 2019; Van Ginkel et al., 2019; Van Ginkel, Ruiz, Mononen, Karaman, De Keijzer & Sitthiworachart, 2020). Studies have shown that a VR-based oral presentation task with computer-mediated delayed feedback is as effective for students’ development of presentation competencies as traditional face-to-face approaches (Van Ginkel et al., 2019). Nevertheless, the delayed feedback of the VR-system was reflected in quantitative data feedback reports and, consequently, interpreted by an expert. However, nowadays, technological developments allow the conversion of quantitative information into qualitative feedback messages that directly relate to the standards for high-quality feedback (Van Ginkel, Gulikers, Biemans & Mulder, 2017b). Therefore, this study aims to investigate the impact of computer-mediated delayed feedback with qualitative feedback messages – interpreted without the intervention B. Sichterman, M. Schipper, M. Verstappen, P. Waisvisz & S. van Ginkel: The Impact of Computer-Mediated Delayed Feedback on Developing Oral Presentation Skills: an Experimental Study in Virtual Reality 685 of an expert - on students' presentation skills. It is hypothesized that the effect of computer-mediated delayed feedback with qualitative feedback messages on students' presentation skills is equal to feedback delivered by an expert. Results of this study provide insights about optimizing feedback processes supported by AItechnologies while releasing the pressure on resources such as time and staffing, as mentioned by the UN (Adubra, Da Silva, Dhungana, Mohan, Saltsman, & Van Ginkel, 2019). Moreover, findings of this research could further refine existing educational design principles concerning effective feedback within oral presentation learning trajectories. 2 Theoretical Framework Over the past decades, VR received much attention within the educational context. From a scientific perspective, several studies demonstrated the impact of this technology on students’ learning (Merchant et al., 2014). Moreover, from a logistical perspective, the implementation of VR has potentials in supporting teachers with instructions and providing feedback. Therefore, it has been suggested that VR might be beneficial in overcoming educational issues as teacher shortages and the increasing number of students in higher education worldwide (Adubra et al., 2019; Parmigiani, Van Ginkel, Saltsman, & Dhunga, 2020). Previous research has shown the effectiveness of VR-based presentation tasks including automated feedback on students’ development of oral presentation competencies (Belboukhaddaoui & Van Ginkel, 2019; Boetje & Van Ginkel, 2020; Van Ginkel et al., 2019; Van Ginkel et al., 2020). Additionally, students highly appreciated the automated feedback and perceived the VR environment as motivating (Van Ginkel et al., 2019). The present aimed experimental study contributes to the scientific literature in this field for several reasons. In summary, it can be stated that: 1. While previous experimental field studies focused on VR-based tasks for developing presentation skills and guaranteed ecological validity, several scientific discussions point to intervening factors in presentation modules (such as instructions or feedback from other sources) that negatively impact the internal validity (Van Ginkel et al., 2019). Therefore, an experimental 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 686 study that focuses on the effect of computer-mediated delayed feedback with qualitative feedback messages, conducted in a controlled lab-setting, is needed to critically evaluate the value of this type of feedback. 2. While previous studies on VR and presentation skills focused on comparing the computer-mediated feedback condition with a situation in which students receive expert feedback (Van Ginkel et al., 2019), VR-research focusing on the impact of computer-mediated delayed feedback on presentation skills - without the support of the expert - is lacking hitherto. Therefore, this experimental study tests the impact of computer-mediated delayed feedback on presentation skills solely provided by the VR-system. 3. Although previous studies focused on the impact of VR-technologies for developing presentation competencies, knowledge, skills and attitudes towards presenting were taken into account (Van Ginkel et al., 2019). However, as addressed earlier in other VR-studies (Boetje & Van Ginkel, 2020), other factors might impact the learning outcomes as well. Therefore, in this study, students’ perceptions towards the adopted VR-technology and feedback modalities are included, since these factors could serve as crucial intermediate variables according to the current literature (Merchant et al., 2014). 4. Although previous studies on VR and presentation skills mainly discussed the impact of the learning environment on learning outcomes, student characteristics are scarcely integrated in these studies. However, as reported in VR-studies (e.g. Merchant et al., 2014; Van Ginkel et al., 2019), students’ perceptions of VR differ depending on their preferred learning activities. In order to test the generalizability of the impact of VR on varying cohorts of students with regard to their presentation skills development, it is suggested to incorporate the following student characteristics in this experimental study: (1) students’ traits (such as gender, age, and educational level) and (2) experienced versus non-experienced students regarding presenting in VR. 3 Method In the last semester of the school year 2020-2021, students (n=60) of a Dutch University of Applied Sciences will be recruited for the experiment. Participants will be informed about the intention of the study and have to confirm their informed consent. Additionally, the Netherlands Code of Conduct for Scientific Practice is adopted to ensure research integrity (Van Ginkel et al. 2019). B. Sichterman, M. Schipper, M. Verstappen, P. Waisvisz & S. van Ginkel: The Impact of Computer-Mediated Delayed Feedback on Developing Oral Presentation Skills: an Experimental Study in Virtual Reality 687 The participants in this study will be randomly assigned to either the experimental condition or the control condition. The experimental condition (n=30) consists of a VR-based oral presentation learning task including computer-mediated delayed feedback with qualitative feedback messages. In this condition, students used a VRheadset to practice a five-minute presentation on a self-selected topic to a virtual audience consisting of virtual students in a virtual classroom. After the presentation practice, students will receive automated feedback with qualitative feedback messages - delivered by the VR-system - on non-verbal communication aspects including eye contact and use of voice (i.e. pace, volume and frequency). This feedback will be interpreted by the students without the intervention of an expert. The control condition (n=30) involves a similar VR-based learning task that consists of oral presentation practice within a similar VR classroom environment and computer-mediated delayed feedback. However, feedback on the VR-registered non-verbal communication aspects will be delivered by an expert. The present study involves an experimental post-test design. Firstly, participants in both conditions will receive a brief introduction about the experiment, the presentation task and how to use the VR set-up. Secondly, participants will practice their presentation within one of the two conditions in the VR environment. Finally, as a final session, students in both conditions present their presentation in front of a small audience – comparable to the audience within the VR classroom environment - within a face-to-face setting. During this final presentation, students’ presentation performance will be assessed by adopting a validated rubric (Van Ginkel, Laurentzen, Mulder, Mononen, Kyttä, & Kortelainen, 2017). Additionally, students have to complete additional questionnaires to assess students’ sensitivity towards the feedback source and perceptions towards the (1) development of presentation skills, (2) VR environment and use of VR and (3) the value of computer-mediated feedback. 688 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE For data analysis, MANCOVA will be carried out to determine potential differences in impact, between the experimental condition and the control condition, on students’ presentation skills and perceptions towards the VR-technology, value of feedback and sensitivity towards the feedback source. Further, students’ traits are adopted as co-variates in this experiment. Acknowledgements (optional) We would like to thank our colleagues Richard van Tilborg and Melanie van Halteren (CoVince Adventurous Learning) for their valuable collaboration on the VR-technology. References Adubra, E., Da Silva, I., Dhungana, B., Mohan, N., Saltsman, G., & Van Ginkel, S. (2019). Exploring the use of Artificial Intelligence to support teachers and teacher development. UNESCO International Task Force on Teachers, 1(19), 1-16. Belboukhaddaoui, I. & Van Ginkel, S. (2019). Fostering oral presentation skills by the timing of feedback: an exploratory study in virtual reality. Research on Education and Media, 11(1), 2531. doi: 10.2478/rem-2019-0005. Boetje, J. & Van Ginkel, S. (2020). The added benefit of an extra practice session in virtual reality on the development of presentation skills: A randomized control trial. Journal of Computer Assisted Learning, 1-12. doi: 10.1111/jcal.12484. De Grez, L. (2009). Optimizing the instructional environment to learn presentation skills (Dissertation). Universiteit Gent. De Grez, L., Valcke, M., & Roozen, I. (2009). The impact of an innovative instructional intervention on the acquisition of oral presentation skills in higher education. Computers & Education, 53(1), 112–120. Hattie, J., & Timperley, H. (2007). The power of feedback. Review of Educational Research, 77(1), 81– 112. Merchant, Z., Goetz, E. T., Cifuentes, L., Keeney-Kennicutt, W., & Davis, T. J. (2014). Effectiveness of virtual reality-based instruction on students' learning outcomes in K-12 and higher education: A meta-analysis. Computers & Education, 70, 29–40. Parmigiani, D., Van Ginkel, S., Saltsman, G., & Dhungana, B. (2020). Innovation in Teacher Education. Italian Journal of Educational Technology. doi: 10.17471/2499-4324/1187 Van Ginkel, S., Ruiz, D., Mononen, A., Karaman, C, De Keijzer, A., & Sitthiworachart, J. (2020). The impact of computer-mediated immediate feedback on developing oral presentation skills: an exploratory study in virtual reality. Journal of Computer Assisted Learning, 412-422. doi: 10.1111/jcal.12424. Van Ginkel, S., Gulikers, J., Biemans, H., Noroozi, O., Roozen, M., Bos, T., Van Tilborg, R., Van Halteren, M., & Mulder, M. (2019). Fostering oral presentation competence through a virtual reality-based task for delivering feedback. Computers & Education, 134, 78-97. https://doi.org/10.1016/j.compedu.2019.02.006. Van Ginkel, S., Gulikers, J., Biemans, H., & Mulder, M. (2017a). The impact of the feedback source on developing oral presentation competence. Studies in Higher Education, 42(9), 1671-1685. doi:10.1080/03075079.2015.1117064. B. Sichterman, M. Schipper, M. Verstappen, P. Waisvisz & S. van Ginkel: The Impact of Computer-Mediated Delayed Feedback on Developing Oral Presentation Skills: an Experimental Study in Virtual Reality 689 Van Ginkel, S., Gulikers, J., Biemans, H., & Mulder, M. (2017b). Fostering oral presentation performance: does the quality of feedback differ when provided by the teacher, peers or peers guided by tutor? Assessment and Evaluation in Higher Education, 42(6), 953-966. doi: 10.1080/02602938.2016.1212984. Van Ginkel, S., Gulikers, J., Biemans, H., & Mulder, M. (2015). Towards a set of design principles for developing oral presentation competence: A synthesis of research in higher education. Educational Research Review, 14, 62-80. doi:10.1016/j.edurev.2015.02.002. Van Ginkel, S., Laurentzen, R., Mulder, M., Mononen, A., Kyttä, J., & Kortelainen, M. J. (2017). Assessing oral presentation performance: designing a rubric and testing its validity with an expert group. Journal of Applied Research in Higher Education, 9(3), 474-486 690 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE DESIGNING DATA GOVERNANCE MECHANISMS FOR DATA MARKETPLACE META-PLATFORMS ANTRAGAMA EWA ABBAS Delft University of Technology, Faculty of Technology, Policy and Management, Delft, The Netherlands; e-mail: a.e.abbas@tudelft.nl Abstract Data Marketplace Meta-platforms (DMMPs) federate the fragmented set of data marketplaces and are expected to become a pivotal instrument to realize a single European Data Market in 2030. However, one critical hindrance to foster the adoption of business data sharing via DMMPs is data providers' risk of losing control over data. Generally, the literature on interorganizational data sharing has highlighted that data governance mechanisms can help data providers to retain control over their data. Nevertheless, data governance mechanisms in the DMMP context are yet to be explored. Therefore, this research aims to design data governance mechanisms for business data sharing in DMMPs by employing the Design Science Research (DSR) approach. This study contributes to the literature by identifying root causes and consequences of losing control over data and defining prescriptive knowledge regarding design requirements, design principles, and a framework for designing data governance mechanisms within the novel setting of metaplatforms. DOI https://doi.org/10.18690/978-961-286-485-9.49 ISBN 978-961-286-485-9 Keywords: data governance, data sharing, data exchange, data markets, data marketplaces, federated platform, platform federation, meta-platforms, design science research (DSR) 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 692 1 Introduction Data marketplaces are increasingly recognized as a pivotal instrument for accomplishing the EU vision to create a single European Data Market in 2030 (European Commission, 2020). A data marketplace is a multi-sided platform that matches data providers and data buyers; that facilitates data sharing and transactions via features provided by data marketplace owners and third-party providers (TPPs) (Fruhwirth, Rachinger, & Prlja, 2020; Koutroumpis, Leiponen, & Thomas, 2020; Spiekermann, 2019). Data marketplaces' core aim is to facilitate business data sharing among companies (Agahari, 2020). Thereby, business data become a trading commodity. Nevertheless, considerable heterogeneity of data marketplace initiatives exists and causes fragmentation. The fragmentation causes multiple aspects of data marketplaces (e.g., business models, governance arrangements, and technical standards) to diverge uncontrollably, leading to a decrease of trust in data marketplaces as a whole (TRUSTS, 2019). For potential data buyers, for instance, the fragmentation triggers difficulties in data discovery processes. Data buyers also suffer from vendor lock-in (i.e., unable to switch to other data marketplace providers due to high switching costs). In general, the fragmentation has slowed down the platforms' commercialization due to a lack of users (i.e., data providers and buyers) (Basaure, Vesselkov, & Töyli, 2020). Nascimbeni (2020) refers to meta-platforms as a promising solution to tackle fragmentation. A meta-platform is a platform of platforms that coordinates and integrates different platforms' resources and solutions. (Billhardt et al., 2020; Burkhardt, Frey, Hiller, Neff, & Lasi, 2019; Savković, Schweigkofler, Savković, Riedl, & Matt, 2020). Meta-platforms are centralized efforts to organize collective actions by enforcing common policies, standards, and infrastructures (Chia, Keogh, Leorke, & Nicoll, 2020; Floetgen et al., 2021). Meta-platforms functionalities include one-stop-shop via standardized portals, information dissemination & aggregation, and the establishment of shared services (Floetgen et al., 2021; Hoffmann, Rupp, & Sander, 2020). Meta-platforms enable the increase of demand-side users (e.g., data providers and data sellers) to discover data, avoid switching costs and demonstrate legal compliance (Basaure et al., 2020). A. Ewa Abbas: Designing Data Governance Mechanisms for Data Marketplace Meta-platforms 693 However, a critical hindrance to foster the adoption of business data sharing via data marketplaces is data providers' risk of losing control over data (Richter & Slowinski, 2019; Spiekermann, 2019). Losing control over data triggers many consequences for data providers. For instance, competitors may benefit from their data in unanticipated ways (Gelhaar & Otto, 2020; Richter & Slowinski, 2019). Moreover, it also brings privacy risks (Schomakers, Lidynia, & Ziefle, 2020) and triggers data providers' reputational damage. In our exact context, i.e., Data Marketplace MetaPlatforms (DMMPs), we argue that data providers also possess the same risk. DMMPs inherit unresolved data control problems in data marketplaces. Even more, the nature of DMMPs where data flows from a data marketplaces to others (and vice versa) may increase the risk. The literature on inter-organizational data sharing has highlighted that data governance can potentially help data providers to retain control over their data (van den Broek & van Veenstra, 2015). We define data governance as the activities of exercising control (i.e., defining what, who, and how) over data ownership, access, and data usage decisions to minimize the risks associated with data sharing (De Prieëlle, De Reuver, & Rezaei, 2020; Lis & Otto, 2020; Nokkala, Salmela, & Toivonen, 2019). Examples of data governance mechanisms are defining data ownership and access, formal contract selling, user consent, or data stewards. These mechanisms are beneficial to overcome the barrier of losing control over data (Günther, Rezazade Mehrizi, Huysman, & Feldberg, 2017; Lee, Zhu, & Jeffery, 2017; Suver, Thorogood, Doerr, Wilbanks, & Knoppers, 2020). Nevertheless, data governance mechanisms in the DMMP context are yet to be explored. Based on the previous elaboration, the objective of this study is to design data governance mechanisms for business data sharing via DMMPs to reduce data providers' risk of losing control over data. 2 Research Design This study will employ the Design Science Research (DSR) approach. The DSR aims to develop innovative Information System (IS) artifacts to solve real-world problems (Hevner, 2007). The DSR approach is appropriate because it allows the creation of innovative artifacts (i.e., data governance mechanisms) that could reduce data providers' risk of losing control over data. The creation of artifacts and also it implementations can lead to knowledge creation. Based on the study of Peffers, Tuunanen, and Niehaves (2018) that defines DSR genres, we position our DSR study under the classification of the Design Science Research 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 694 Methodology (DSRM). The DSRM is a well-adopted methodology in DSR. The DSRM focuses on artifact development, and its evaluation is outcome-oriented and practical. It should aim for generalizability and reasoned arguments on why the designed artifacts could work (Peffers et al., 2018). Building from the DSRM (Peffers, Tuunanen, Rothenberger, & Chatterjee, 2007), we will explain the relationship between research phases, questions, and instruments. The research will be conducted within five phases (see Figure ). Research Objective: Designing data governance mechanisms for business data sharing in Data Marketplace Meta-platforms (DMMPs) to reduce data providers risk of losing control over data Research Phase Research Question Research Instrument Phase 1: Identify problem and motivation RQ1: What are the root causes and consequences of losing control over data in DMMPs? Semi-structured interviews Phase 2: Define objectives of a solution RQ2: What are the requirements for data governance mechanisms in DMMPs that reduce the risk of losing control over data? Case study analysis Phase 3: Design and development RQ3: What data governance mechanisms can reduce the risk of losing control over data in DMMPs? Design Phase 4: Demonstration RQ4: How can data governance mechanisms be implemented that operationalize the set of identified requirements? Case study demonstration Phase 5: Evaluation RQ5: To what extent does the implementation of data governance mechanisms reduce the risk of losing control over data in DMMPs? Experimental research Figure 1: Research design We will begin the research by identifying the root causes and consequences of losing control over data in the context of DMMPs. These factors will be the foundation when defining requirements in the later stage. We will conduct an exploratory study to answer the RQ1. An exploratory study is suitable because not much is known about this phenomenon (Sekaran & Bougie, 2016). Our exploratory study will employ the qualitative approach using semi-structured interviews as a primary data collecting method. Semi-structured interviews will be guided by the preliminary literature review result we conducted in the introduction section. Next, the second A. Ewa Abbas: Designing Data Governance Mechanisms for Data Marketplace Meta-platforms 695 phase of our DSR study defines requirements for designing data governance mechanisms in DMMPs. Requirements here refer to the detailed descriptions of what users want from the designed solution (Dym, Little, & Orwin, 2014). We will use a single case study to derive data governance requirements. We will select the TRUSTS project1 since that project aims to develop a DMMP. We will use several procedures, such as interviews, document analysis, and observation, to collect the data. We are aware that it will be challenging to come up with one final design. Therefore, we will create business data sharing scenarios via DMMPs to scope our research. Once we have defined the requirements, we will answer the RQ3 by designing the artifacts. We will produce two major artifact types in this phase, namely 1) design principles and 2) a framework. First, we will construct design principles, which refer to "core principles and concepts to guide design" (Vaishnavi et al., 2004, p. 16). Design principles inform the designers to develop instances from artifacts that belong to a similar class (Gregor, Kruse, & Seidel, 2020). Second, we will develop a framework to design data governance mechanisms. The framework here can be described as "real or conceptual guides to serve as support…" (Vaishnavi et al., 2004, p. 16). DMMPs owners can use the framework to develop data governance mechanisms. The design principles will be used as input to create this framework. The framework includes the guideline to decide and select which mechanisms will be appropriate; to operationalize the mechanisms in a specific context. In phase 4, we will apply the designed framework to build data governance mechanisms. Phase 4 will be beneficial to demonstrate data governance mechanisms in practices. We will use a case study (i.e., the TRUSTS project) to operationalize our solution. We will follow the frameworks from Phase 3 to develop an instantiation. In the final phase, we will evaluate whether demonstrable data governance mechanisms can achieve the goal or not. We will evaluate our data governance mechanisms using a summative evaluation. The summative evaluation aims to test whether our designed artifact creates the desired impact or not. Summative evaluation is often conducted after the artifact has been developed (i.e., ex-post evaluation) (Sonnenberg & Vom Brocke, 2012; Venable, Pries-Heje, & Baskerville, 1 https://www.trusts-data.eu/ accessed on March 02, 2021 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 696 2016). We will conduct an experiment to test our designed artifacts (e.g., quasiexperiments). 3 Theoretical framework The section below discusses relevant theories that will be used to develop data governance mechanisms. Data governance theory – data governance can help organizations to retain control over their data (van den Broek & van Veenstra, 2015). Data governance mechanisms such as defining data ownership and access, RACI chart, formal contract selling, user consent, governance mode, and data stewards can be used as instruments to retain control over data (Günther et al., 2017; Lee et al., 2017; Suver et al., 2020). We will build upon these works and will explore which mechanisms are appropriate for our novel settings. Platform control theory − platform control can be described as platform owner's attempts to influence complementors (e.g., application developers) to behave according to the platform's objectives (Goldbach, Benlian, & Buxmann, 2018; Tiwana, 2013). There are two categories of platform control mechanisms: a) formal and b) informal control. The formal control can be further subdivided into input, behavior, and output control. In contrast, informal control can be subcategorized into self- and clan control. Previous studies show how platform controls affect digital platforms. For example, Goldbach et al. (2018) discover that enforcing selfcontrol to third-party developers positively influences the quality of the application and their continuance intention to participate in an ecosystem. In addition, Zheng, Xu, and Lin (2019) reveal that formal control (e.g., seller reputation) and social control (e.g., number of fans and members), in the context of the crowdsourcing platform, are decreasing the likelihood of opportunistic behavior by the seller. Coordination theory − coordination is the act of managing dependencies amongst activities to accomplish a goal. The coordination consists of four components: the goals, activities, actors, and dependencies. The common coordination processes associated with those components include: a) defining goals, b) plotting goals to activities, c) defining actors and assigning them to relevant activities, and d) managing dependencies (Malone & Crowston, 1990, 1994). Though studies that draw the A. Ewa Abbas: Designing Data Governance Mechanisms for Data Marketplace Meta-platforms 697 connection between coordination and control are limited (Ko, Lee, Keil, & Xia, 2019), some researchers have started investigating this matter. For example, in the project management context, Remus, Wiener, Mähring, Saunders, and Cram (2015) inform that control-focus on coordination can be achieved by "empowerment, guidance, facilitation, and trust" (p. 5). Ko et al. (2019) explore the different impacts of formal control (i.e., outcome and process control) on coordination and explain how coordination mediates these formal controls. The coordination theory will be beneficial to complement the previous platform control theory. For instance, if we want to employ the clan control that requires interactions between complementors, we need to define what appropriate activities should be proposed, which dependencies may occur, and how to assemble those dependencies. Accountability theory − Vance, Lowry, and Eggett (2015) have synthesized the definition of accountability: "a process in which a person has a potential obligation to explain his/her actions to another party who has the right to pass judgment on those actions and to administer potential positive or negative consequences in response to them" (p. 347). Accountability theory suggests numerous mechanisms that increase accountability perceptions. These are: a) identifiability, b) expectation of evaluation, c) awareness of monitoring, and d) social presence. Various studies have revealed the relationship between accountability and control. For example, accountability theory can be used to increase accountability perception, and in consequence, decrease the attention to violate the data access policy (Vance, Lowry, & Eggett, 2013; Vance et al., 2015). Yaokumah, Walker, and Kumah (2019) explain how Security Education, Training, and Awareness programs (SETA) can improve employee security behavior, mediated by employee accountability. A study conducted by Y. Zheng, Huang, Lee, and Bao (2017) shows that extra-role behaviors (derived from social control and accountability theory) positively influence such bright internet policy adaptions. In general, individuals with a high accountability perception are more likely to develop cognitive awareness. Accordingly, it will lead to the conformity of expected actions, pro-social behaviors, and decrease risk behaviors (Zhang, Wei, & Zeng, 2020). 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 698 The summary of the context, relevant theories, and DSR can be seen in Figure 2. It describes the idea of having kernel and provides justificatory knowledge for prescriptive knowledge (Kuechler & Vaishnavi, 2008). We will use multiple theories to gather justificatory knowledge. Finally, we will also use those theories to derive criteria on the utility of the artifact (Niehaves & Ortbach, 2016). Data Governance Theory Platform Control Theory Coordination Theory Factors Formal Informal Dependency types Coordination mechanisms Identifiability Accountability theory Data governance Lead to Control over data Mechanisms Expectation of evaluation Awareness of monitoring Platform control mechanisms Lead to Coordination components Lead to Accountability factors Lead to Behave according to platform s objectives Facilitate control Intention to comply to policy Effect (E) Cause (C) Kernel theories Social presence Informs  Inter-organizational data sharing  Data marketplace meta-platforms Data governance mechanisms Corresponds to Control over data Is intended to achieve Context Ends (E) Means (M) Prescriptive knowledge Figure 2: The role of theories in the DSR study 4 Preliminary results A Systematic Literature Review (SLR) study for business data sharing via data marketplace has been conducted. This study is currently under review at an international conference. This study helps to set the stage and position our proposed research in data marketplace literature. Therefore, we will use it as an input for the literature section. After reviewing numerous articles, we found no comprehensive overview of data marketplace research available in the literature. Consequently, we have no clear understanding of what is known about data marketplaces, and we are unable to spot neglected research topics that may contribute to advancing data marketplaces towards commercialization. This study provides an overview of the state of the art of data marketplace research. We employ the SLR approach and structure our analysis using the Service-Technology-Organization-Finance (STOF) model. We studied 135 articles from the Scopus database and found that the extant A. Ewa Abbas: Designing Data Governance Mechanisms for Data Marketplace Meta-platforms 699 data marketplace literature is primarily dominated by technical research, such as discussions about computational pricing and architecture. To move past the first stage of the platform's lifecycle, i.e., platform design, to the second stage, i.e., platform adoption, we call for empirical research in non-technological areas, such as value networks and organizational arrangement. The findings, therefore, in line with our goal (i.e., contribute to a non-technical topic and incorporate empirical data) because the proposed research will design data governance mechanisms that likely discuss the interaction between actors and required arrangements in DMMPs. Moreover, we conducted an initial workshop with TRUSTS internal participants on 22 October 2020 to explore potential value creations and perceived adoption barriers of DMMPs. In total, 15 participants from different organizations attended the workshop. The former objective is relevant to this study because it strengthens the argument we elaborate in the introduction section, i.e., related to the benefit of DMMPs towards resolving the fragmentation. The latter objective is also beneficial to give additional insights for exploring the root causes and impacts of losing control over data. On the one hand, potential value creations of DMMPs include 1) traffic forwarding and commissioned brokerage services, 2) the increase of dataset/data source numbers within the federation, 3) gradual harmonization of technology stack through coordination and common standards, and 5) provision of nondifferentiating capabilities (e.g., billing) as shared services. On the other hand, perceived adoption barriers of DMMPs include 1) unclear and unproven value propositions, 2) unclear and unproven network-effects and added value from smallsize and domain-specific data marketplaces, 3) unexplored economics of various data marketplace setups with a federation (e.g., revenue sharing mechanisms), 4) increased complexity and cost for technology integration, and 5) fear of losing data marketplaces' Unique Selling Proposition (USP). In addition, we also developed a business model taxonomy for data marketplaces. The developed taxonomy is relevant because we need to know what kind of data marketplaces a DMMP platform will federate or interoperable with. The study is also beneficial in the literature review section of the dissertation. In this study, we argued that data marketplaces are vastly different so that a taxonomy can be used to classify data marketplaces. Existing data government arrangements that the DMMP federates or interoperable with may be incompatible. For instance, a data marketplace may focus on automotive data while the other focuses on healthcare 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 700 data. The degree of sensitivity of these data types are different, and in consequence, it may impact the definition of data access right. We employed a DSR approach and a standard taxonomy development method by Nickerson, Varshney, and Muntermann (2013) to develop the taxonomy. Four meta-dimensions, 17 business model dimensions, and 59 business model characteristics have been identified in the final taxonomy. 5 Future development and expected contributions The future development of this research is to execute the plan provided in section 2. These are: 1) identifying root causes and impacts of losing control over data, 2) identifying requirements for data governance mechanisms, 3) creating a framework for designing data governance mechanisms, 4) demonstrating data governance mechanisms, and 5) evaluating the usefulness of the developed mechanisms. This study contributes to science by identifying root causes and impacts of losing control over data in DMMPs, thus serving as a basis for designing solutions. We also contribute to defining prescriptive knowledge regarding: a) design requirements, b) design principles, and c) a framework for designing data governance mechanisms in DMMPs. Societally, DMMPs' owners may benefit from this research by applying data governance mechanisms to reduce data providers' risk of losing control over data. Data providers will feel safe and trust the ecosystem because of their positive perception. Consequently, data providers' adoption of DMMPs may increase, potentially leading to more value generation through business data sharing and use. Acknowledgments The research leading to these results has received funding from the European Union's Horizon 2020 Research and Innovation Programme, under Grant Agreement no 871481 – Trusted Secure Data Sharing Space (TRUSTS), from the H2020-ICT-2018-20/H2020-ICT2019-2 Call. In addition, I would like to thank my supervisors, Dr. Mark de Reuver and Dr. Anneke Zuiderwijk, for their continued support and encouragement to finish this PhD research proposal. A. Ewa Abbas: Designing Data Governance Mechanisms for Data Marketplace Meta-platforms 701 References Agahari, W. (2020). Platformization of data sharing: Multi-party computation (MPC) as control mechanism and its effect on firms' participation in data sharing via data marketplaces. Paper presented at the 33rd Bled eCONFERENCE. Basaure, A., Vesselkov, A., & Töyli, J. (2020). Internet of things (IoT) platform competition: Consumer switching versus provider multihoming. Technovation, 90, 102101. Billhardt, H., Santos, J.-A., Fernández, A., Moreno-Rebato, M., Ossowski, S., & Rodríguez-García, J. A. (2020). Legal Implications of Novel Taxi Assignment Strategies. In (pp. 361-372): Springer International Publishing. Burkhardt, D., Frey, P., Hiller, S., Neff, A., & Lasi, H. (2019). Distributed Ledger Enabled Internet of Things Platforms: Symbiosis Evaluation. In (pp. 77-118): Springer International Publishing. Chia, A., Keogh, B., Leorke, D., & Nicoll, B. (2020). Platformisation in game development. Internet Policy Review, 9(4), 1-28. De Prieëlle, F., De Reuver, M., & Rezaei, J. (2020). The Role of Ecosystem Data Governance in Adoption of Data Platforms by Internet-of-Things Data Providers: Case of Dutch Horticulture Industry. IEEE Transactions on Engineering Management. Dym, C. L., Little, P., & Orwin, E. J. (2014). Engineering design: a project-based introduction. European Commission. (2020). Work stream on Data [Press release]. Retrieved from https://ec.europa.eu/newsroom/dae/document.cfm?doc_id=68354 Floetgen, R. J., Strauss, J., Weking, J., Hein, A., Urmetzer, F., Böhm, M., & Krcmar, H. (2021). Introducing platform ecosystem resilience: leveraging mobility platforms and their ecosystems for the new normal during COVID-19. European Journal of Information Systems, 1-18. doi:10.1080/0960085x.2021.1884009 Fruhwirth, M., Rachinger, M., & Prlja, E. (2020). Discovering Business Models of Data Marketplaces. Paper presented at the Proceedings of the 53rd Hawaii International Conference on System Sciences. Gelhaar, J., & Otto, B. (2020). Challenges in the Emergence of Data Ecosystems. Paper presented at the PACIS. Goldbach, T., Benlian, A., & Buxmann, P. (2018). Differential effects of formal and self-control in mobile platform ecosystems: Multi-method findings on third-party developers’ continuance intentions and application quality. Information & Management, 55(3), 271-284. Gregor, S., Kruse, L. C., & Seidel, S. (2020). The Anatomy of a Design Principle. Journal of the Association for Information Systems. Günther, W. A., Rezazade Mehrizi, M. H., Huysman, M., & Feldberg, F. (2017). Debating big data: A literature review on realizing value from big data. The Journal of Strategic Information Systems, 26(3), 191-209. doi:10.1016/j.jsis.2017.07.003 Hevner, A. R. (2007). A three cycle view of design science research. Scandinavian journal of information systems, 19(2), 4. Hoffmann, E., Rupp, J., & Sander, K. (2020). What Do Users Expect from Climate Adaptation Services? Developing an Information Platform Based on User Surveys. In (pp. 105-134): Springer International Publishing. Ko, D.-G., Lee, G., Keil, M., & Xia, W. (2019). Project Control, Coordination, and Performance in Complex Information Systems Outsourcing. Journal of Computer Information Systems, 1-11. doi:10.1080/08874417.2019.1606687 Koutroumpis, P., Leiponen, A., & Thomas, L. D. W. (2020). Markets for data. Industrial and Corporate Change, 29(3), 645-660. doi:10.1093/icc/dtaa002 Kuechler, B., & Vaishnavi, V. (2008). On theory development in design science research: anatomy of a research project. European Journal of Information Systems, 17(5), 489-504. Lee, S. U., Zhu, L., & Jeffery, R. (2017). Data governance for platform ecosystems: Critical factors and the state of practice. arXiv preprint arXiv:1705.03509. Lis, D., & Otto, B. (2020). Data Governance in Data Ecosystems–Insights from Organizations. 702 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Malone, T. W., & Crowston, K. (1990, 1990). What is coordination theory and how can it help design cooperative work systems? Paper presented at the Proceedings of the 1990 ACM Conference on Computer-Supported Cooperative Work, CSCW 1990, Los Angeles. Malone, T. W., & Crowston, K. (1994). The interdisciplinary study of coordination. ACM Computing Surveys, 26(1), 87-119. doi:10.1145/174666.174668 Nascimbeni, F. (2020). Open Educational Resources in Italy. In (pp. 49-62): Springer Singapore. Nickerson, R. C., Varshney, U., & Muntermann, J. (2013). A method for taxonomy development and its application in information systems. European Journal of Information Systems, 22(3), 336359. doi:10.1057/ejis.2012.26 Niehaves, B., & Ortbach, K. (2016). The inner and the outer model in explanatory design theory: the case of designing electronic feedback systems. European Journal of Information Systems, 25(4), 303-316. doi:10.1057/ejis.2016.3 Nokkala, T., Salmela, H., & Toivonen, J. (2019). Data Governance in Digital Platforms. Paper presented at the AMCIS. Peffers, K., Tuunanen, T., & Niehaves, B. (2018). Design science research genres: introduction to the special issue on exemplars and criteria for applicable design science research. In: Taylor & Francis. Peffers, K., Tuunanen, T., Rothenberger, M. A., & Chatterjee, S. (2007). A design science research methodology for information systems research. Journal of management information systems, 24(3), 45-77. Remus, U., Wiener, M., Mähring, M., Saunders, C., & Cram, W. A. (2015). Why do you control? The concept of control purpose and its implications for IS project control research. Richter, H., & Slowinski, P. R. (2019). The Data Sharing Economy: On the Emergence of New Intermediaries. IIC - International Review of Intellectual Property and Competition Law, 50(1), 4-29. doi:10.1007/s40319-018-00777-7 Savković, B. V., Schweigkofler, A., Savković, O., Riedl, M., & Matt, D. T. (2020). Validation Methodology for a Citizen-centric Smart-City Platform. Paper presented at the ISPIM Conference Proceedings. Schomakers, E.-M., Lidynia, C., & Ziefle, M. (2020). All of me? Users’ preferences for privacypreserving data markets and the importance of anonymity. Electronic Markets, 1-17. Sekaran, U., & Bougie, R. (2016). Research methods for business: A skill building approach: John Wiley & Sons. Sonnenberg, C., & Vom Brocke, J. (2012). Evaluations in the science of the artificial–reconsidering the build-evaluate pattern in design science research. Paper presented at the International Conference on Design Science Research in Information Systems. Spiekermann, M. (2019). Data Marketplaces: Trends and Monetisation of Data Goods. Intereconomics, 54(4), 208-216. doi:10.1007/s10272-019-0826-z Suver, C., Thorogood, A., Doerr, M., Wilbanks, J., & Knoppers, B. (2020). Bringing Code to Data: Do Not Forget Governance. Journal of Medical Internet Research, 22(7), e18087. doi:10.2196/18087 Tiwana, A. (2013). Platform ecosystems: Aligning architecture, governance, and strategy: Newnes. TRUSTS. (2019). Trusted Secure Data Sharing Space. In. European Union: European Union's Horizon 2020 (No. 871481). Vaishnavi, V., Kuechler, W., & Petter, S. (2004). Design science research in information systems. Retrieved from http://www.desrist.org/design-research-in-information-systems/ van den Broek, T., & van Veenstra, A. F. (2015). Modes of governance in inter-organizational data collaborations. Vance, A., Lowry, P. B., & Eggett, D. (2013). Using accountability to reduce access policy violations in information systems. Journal of management information systems, 29(4), 263-290. Vance, A., Lowry, P. B., & Eggett, D. L. (2015). Increasing accountability through the user interface design artifacts: A new approach to addressing the problem of access-policy violations. MIS quarterly, 39(2), 345-366. A. Ewa Abbas: Designing Data Governance Mechanisms for Data Marketplace Meta-platforms 703 Venable, J., Pries-Heje, J., & Baskerville, R. (2016). FEDS: a framework for evaluation in design science research. European Journal of Information Systems, 25(1), 77-89. Yaokumah, W., Walker, D., & Kumah, P. (2019). SETA and Security Behavior - Mediating Role of Employee Relations, Monitoring, and Accountability. Journal of Global Information Management, 27, 102-121. doi:10.4018/JGIM.2019040106 Zhang, M., Wei, X., & Zeng, D. D. (2020). A matter of reevaluation: Incentivizing users to contribute reviews in online platforms. Decision Support Systems, 128, 113158. doi:10.1016/j.dss.2019.113158 Zheng, H., Xu, B., & Lin, Z. (2019). Seller's creditworthiness in the online service market: A study from the control perspective. Decision Support Systems, 127, 113118. doi:10.1016/j.dss.2019.113118 704 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE MONITORING REMOTE SERVICE PLATFORMS USING ARTIFICIAL INTELLIGENCE-BASED DISTRIBUTED INTRUSION DETECTION THORSTEN WEBER1 & RÜDIGER BUCHKREMER2 1 UCAM Universidad Católica San Antonio de Murcia, Spain; e-mail: thorsten.weber@fom-net.de 2 Institute for IT Management and Digitization, FOM University of Applied Sciences, Düsseldorf, Germany; e-mail: ruediger.buchkremer@fom-net.de Abstract Due to their flexibility, remote support platforms are ideal for contributing to companies' digital strategy. Simultaneously, this flexibility of use cases makes it difficult to reliably detect attacks on the network infrastructure. This paper presents a proposal for the detection of fraud patterns on remote service platforms through artificial intelligence. A blockchainbased approach will be used to adapt these attack signatures to the specific use cases of remote service platform users. By employing a blockchain-based attack signature selection mechanism, remote service platform users will be able to adjust the attack signatures flexibly and in a tamper-proof manner. DOI https://doi.org/10.18690/978-961-286-485-9.50 ISBN 978-961-286-485-9 Keywords: network security, intrusion detection system, remote service platform, artificial intelligence, blockchain 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 706 1 Introduction Effective plant reliability is of utmost importance for manufacturing and other industrial pursuits. Due to industrial plants' high-profile nature, unplanned downtime events can easily result in extraordinary costs (Christer & Waller, 1984). The causes of such breakdowns are numerous, and troubleshooting is typically performed by engineers or experienced technicians (Hiltunen et al., 2008). To ensure the lowest possible downtime, a company must have suitable service technicians as soon as possible on-site and available. Due to a plant's complexity, deploying an emergency service for troubleshooting can quickly turn into a planning problems (Vossing, 2017); digitization may improve the planning process's accuracy. Remote service platforms (RSPs) are digital solutions that help companies better plan service deployment in plants. Companies can implement RSPs to train and educate workers remotely on new machines, plants, or systems. Analog monitoring processes, such as maintenance, quality assurance, and auditing, can be performed remotely, as well (Werner & Bechini, 2019). Moreover, RSPs allow remote guidance of workers and transmission of instructions. Service technicians and engineers can use RSPs to transmit real-time advice to on-site workers and repair problems from a distance without traveling. This results in less downtime and thus to a faster restart of production after an incident. This digitization of analog processes causes additional economic side-effects on companies. On the one hand is the direct saving of travel costs (e.g., costs for cars, flights, trains, cabs, and hotel accommodation). On the other hand, companies can redeploy their service technicians much more quickly. Service technicians must no longer "waste" time traveling and can be deployed more frequently in the same time frame. Last, saving on travel impacts a company's carbon dioxide (CO2) footprint and can be a competitive advantage. In summary, RSPs offer many benefits to companies. They can ensure that a service technician can quickly get to where they are needed, even if that technician might not be able or allowed to travel. T. Weber & R. Buchkremer: Monitoring Remote Service Platforms Using Artificial Intelligence-Based Distributed Intrusion Detection 1.1 707 RSP Architecture Figure illustrates a generic approach for an RSP. The architecture typically consists of three main components (Yin et al., 2006). On the one hand, it is an individual exchange and management platform to which both the service technician and the customer have access via the Hypertext Transfer Protocol Secure (HTTPS). The platform management server enables two or more participants to communicate and exchange data with each other. The management functionalities refer to access control and user management. On the other hand, a client-side application allows users to connect to the central platform management server. Typically, these are desktop, browser, or smartphone/tablet/smart glasses applications. In a basic configuration of the communications infrastructure, two or more participants communicate via peer-topeer (P2P)networks (Ripeanu, 2001), using the Web Real-Time Communication Protocol (Johnston et al., 2013). If a P2P connection is not feasible for technical reasons, participants switch to alternate settings (Mahy et al., 2010). Figure 1: Typical RSP components in a nutshell. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 708 1.2 RSP Security An essential prerequisite for the successful implementation of RSPs is, in addition to pure functionality, confidence in the security settings of the platform's network (i.e., confidence in its security goals: confidentiality, integrity, and availability [CIA]) (Can & Sahingoz, 2015). Security assets are often critical for selecting software packages (Academy et al., 2007) and is often assumed to be naturally given (Sahay & Gupta, 2003) by a software provider. Basis security measures of RSPs can be achieved by applying state-of-the-art security protocols, such as HTTPS or other authentication mechanisms (Kiraz, 2016). However, this basic security is not always appropriate, and advanced security mechanisms are needed. For example, the primary security mechanisms do not include protection against network-based attacks and do not allow monitoring whether a system has been exploited or tampered (Brown & Heikki, 2005; Jatti & Kishor Sontif, 2019; Liao et al., 2013). Some authors recommend implementing network intrusion detection systems (NIDSs) as the first choice for detecting network-based attacks (Debar et al., 2000; El-Bakry & Mastorakis, 2008). The idea of intrusion detection systems (IDSs) was described in 1987 by Denning (Denning, 1987). Henceforth, the topics of IDSs were well researched by the scientific community (Khraisat et al., 2019). Today, there is a specialization trend in those systems, such as for wireless sensor networks (Can & Sahingoz, 2015), the Internet of Things (Zarpelão et al., 2017), smart grids (Jow et al., 2017), and cloud computing (Chiba et al., 2016). Specialization has the advantage that systems' unique characteristics can be considered. It is conceivable that an IDS designed for Internet of Things applications could have significantly higher requirements in terms of power consumption than, for example, an IDS developed for cloud systems. On the other hand, many RSPs require security measures. Unauthorized platform access, attacks on communication infrastructure, and unauthorized use of premium services are only a few potential threat scenarios that could reduce confidence in RSPs. For these reasons, it is logical and consequent to develop an IDS tailored to RSPs. T. Weber & R. Buchkremer: Monitoring Remote Service Platforms Using Artificial Intelligence-Based Distributed Intrusion Detection 2 709 Problem Definition In general, the implementation of an IDS for RSPs requires attention to three main aspects. These are the mathematical requirements, the challenges for tailoring an IDS for RSPs, and the possibility of customizing and notarizing the selected configuration on the customer's part. 2.1 Mathematical Boundaries A significant problem encountered by IDSs is the so-called base rate fallacy (Axelsson, 2000), a statistical error that may occur when determining conditional probabilities. This problem can be easily explained by applying Bayes' theorem. Pr(𝐴|𝐵 ) = Pr(𝐵|𝐴) Pr(𝐴) Pr(𝐵 |𝐴) Pr(𝐴) + Pr(𝐵 |¬𝐴) Pr(¬𝐴) Assuming that 1% (Pr(¬A)) of traffic constitutes "bad traffic," such as a synchronize message flood (SYN flood), while 99% (Pr(A)) constitutes a valid connection. The IDE detection rate is 90% (Pr(B|¬A)), and the false alarm rate is 10% (Pr(B|A)). Research question: What is the conditional probability that a connection marked by the IDS as an SYN flood is valid? What is the conditional probability that traffic is valid under the condition that the IDS triggers an alarm? Using the values mentioned above in Bayes' theorem yields the following: 0.10 ⋅ 0.99 ≈ 92% 10 ⋅ 0.99 + 0.90 ⋅ 0.01 Thus, if an alarm triggers the IDS, the probability is around 92% that it is a false alarm, which is an extremely high value. Ultimately, a high value can result in employees ignoring the alarm, leading to current attacks being ignored. 710 2.2 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Tailoring Intrusion Detection to RSPs According to (Liao et al., 2013), IDSs are divided into signature-based, anomalybased, and specification-based systems. Signature-based and specification-based systems belong to the knowledge-based systems, while anomaly-based systems belong to the behavior-based systems. Anomaly-based IDSs detect typical user behavior and network connections; if the behavior deviates from this pattern, anomaly-based IDSs react accordingly. Currently, there exists a trend towards specialization when developing an IDS. Research gap: a scientific approach that handles specific requirements of an IDS in the environment of RSPs is missing. The challenge for defining an IDS for RSP is the broadness of the RSP use cases, such as remote training (Masoni et al., 2017), remote audits (Teeter et al., 2010), and remote assembly (Elvezio et al., 2017). One challenge for an IDS is the ability to be adapted as flexibly as possible to existing and future RSP use cases and at the same time meet all users' data protection requirements. To be more precise, two artificial intelligence (AI) methods are needed. In the first step, the network traffic must be classified correctly. Using AI, received network traffic must be classified based on its properties. E.g., being HTTPS, ping, or another kind of traffic. clustering algorithms can do so (Liu et al., 2008; Münz et al., 2007). There are two approaches in principle: Supervised and Unsupervised Learning Algorithms (Sathya & Abraham, 2013). Even though their differences have been analyzed in the past, in the use case of RSPs, a priori, it is not clear which method can be used most reliably to classify the network traffic in the use cases of RSPs. In the next step, the classified network traffic must then be analyzed and predicted whether the examined network traffic is a possible attack. The prediction of an attack can be made in various ways, for example, by analyzing the transmitted packet information using text analysis algorithms (Min et al., 2018; Stone, 2007) or using regression (Altwaijry & Algarny, 2012; Wang, 2005). Again, a priori, it is not clear which method is best suited for predicting possible attacks on RSPs. It might also be the case that a hybrid solution might be most promising. T. Weber & R. Buchkremer: Monitoring Remote Service Platforms Using Artificial Intelligence-Based Distributed Intrusion Detection 2.3 711 Customization of IDSs Typically, IDSs are configured utilizing policies (Bace & Mell, 2001). Based on the example presented in Figure , the IDS would raise an alert containing the alert message "IP Package detected" if an IP packet from any source IP and Port would be sent to any destination IP and Port. Figure 2: IDS Policy Example for Snort ("Snort 2.1 Intrusion Detect.," 2004) Therefore, IDS policies can determine attack patterns and read off allowed network activities. This knowledge can serve as beneficial information for an attacker to plan an attack. Securing and configuring IDS policies are therefore crucial in terms of securing infrastructures. Consequently, RSP customers are interested in confining these policies independently and need a monitoring option for selected policies and attack signatures. As such, RSP customers also need a guarantee (notarized confirmation) that the RSP provider has indeed implemented the established IDS policy and attack signatures. 2.4 Resulting Research Questions The central question to be answered by this dissertation project is as follows: "Is it possible to develop a privacy-compliant and customizable artificial intelligence (AI)-based attack 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 712 detection system for remote service platforms with the highest possible detection rate and lowest possible false-positive rate, optimization of data exchange, and an intuitive visualization and reaction to detected attacks?" Further research questions (RQ) that this project includes are the following: 1. 2. 3. 4. What are legal requirements for RSP's IDS? What relevant intrusion detection system approaches already exist? How can client-side applications be used to detect intrusions on RSPs? How long does the learning phase of an AI-based IDS guarantee the greatest possible likelihood of attack detection? 5. How should a neural network be adjusted to distinguish between different application areas within the RSP? 6. How should the IDS react upon attack? 3 Methodology The purpose of this chapter is to clearly outline what (implementation) is being done to solve each research question and how (means) it is being done. Moreover, this chapter addresses how the data is collected and what data can be accessed to answer the research questions. RQs 1 and 2 serve as the basis for this dissertation, as they establish the research scope. Both research questions will be addressed via qualitative research or, to be more precise, by systematically reviewing the literature. RQ1 clarifies the legal framework in which this dissertation must operate to develop a legally secure and data- protection-compliant IDS for RSPs. The approach for solving RQs 1 and 2 is literature research, as described by vom Brocke et al. (Vom Brocke et al., 2009). RQ 3 concerns the architecture of the software to be developed within the scope of this dissertation. The central task of the IDS is to detect attacks by examining deviations from normal behavior (Umer et al., 2017). Therefore, the IDS must receive status information of all entities being monitored. To guarantee error-free monitoring, this dissertation additionally must develop an architecture that monitors all entities reliably. Hence, RQ3 will be investigated through both qualitative and quantitative methods. A qualitative literature review must identify which IDS T. Weber & R. Buchkremer: Monitoring Remote Service Platforms Using Artificial Intelligence-Based Distributed Intrusion Detection 713 architectural approaches already exist and which approaches should be considered when analyzing this research question. On the other hand, quantitative experiments must collect and evaluate network load data and create attack signatures. An RSP typically has several connected devices, such as laptops, servers, smartphones, and smart glasses (Kao et al., 2014). By evaluating the network traffic, it is possible to check which approaches to architecture and communication with the IDS prove to be the most reliable in practice. Since there are no reliable values for RQs 4 and 5, they must be investigated in an explorative study (Shields & Rangarjan, 2013). Therefore, a neural network will be created and trained over several periods in an attack-free test network. The attack vectors to be defined for this purpose will subsequently investigate whether the trained network recognizes attacks and how many it recognizes. Qualitative methods must be used to determine which training times are realistically achievable for actual companies (i.e., interviews with various stakeholders). The final research question is highly individual, and it might not be possible to answer it in general terms. Instead, this dissertation aims to develop a set of recommendations based on a comprehensible presentation of various automated attack reactions. This is intended to present to users the possibilities of reacting to an attack and the consequences of these reactions. 4 Expected Results On the one hand, this dissertation's expected results are a data protection compliant intrusion detection system that includes a set of attack signatures that are continuously improved by utilizing artificial intelligence. On the other hand, this dissertation expects to deliver a procedure allowing for the customer of the RSP to monitor the selected attack signatures and adjust them independently, if necessary. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 714 4.1 Continuously Attack Signature Generation and Evaluation To successfully detect an attack, the IDS must distinguish between "regular" and "attack" behaviors. Creating a continuous attack signature through log files utilization on both the client and server is, therefore, one expected outcome. Although through this dissertation, a substantial amount of actual RSP data will be available, this data will be (according to current knowledge) "attack-free." Another expected result of this dissertation is the creation of "attack" data and RSP-tailored attack signatures through penetration tests. 4.2 IDS Management via Blockchain Besides, the goal is to develop a procedure that allows the customer of the RSP to monitor the selected attack signatures and adjust them independently, if necessary. A possible solution for this is the definition of the attack signature via blockchain. Blockchain can be used to establish a notarized definition of the selected attack signatures on the one hand and, on the other, be able to adjust the attack signature without the intervention of the platform operator. 5 Future Development At the core of this dissertation, new attack patterns are created to detect attacks on RSPs. In particular, the data from the mobile devices that are part of the RSP will be used for this purpose. Generally, it can be assumed that client devices are mostly connected end-to-end encrypted—both with the management server and with each other for communication. However, encrypted data packets can be examined for attack patterns to only a restricted level (Sherry et al., 2015). The data in the data packets can be analyzed for malicious content to only a limited extent. In the first step, a cloud infrastructure must be set up with which it is possible to simulate attacks on an RSP. The infrastructure must decrypt the devices' end-to-end encryption and forward the decrypted data packets to an IDS. Thus, the infrastructure must allow for the decryption of the network traffic, which must be analyzed. The decryption of encrypted network traffic can typically be achieved using a reverse proxy (Radivilova et al., 2018). In the second step, the newly built infrastructure must detect and T. Weber & R. Buchkremer: Monitoring Remote Service Platforms Using Artificial Intelligence-Based Distributed Intrusion Detection 715 classify new attack signatures. By performing targeted penetration tests, predefined attack patterns can be generated. Based on the performed penetration tests, the data packets analyzed by the IDS can then be stored as a new attack signature. For example, suppose a penetration test is used to conduct a brute force attack for guessing management server login data. In this case, these data packets can be uniquely recognized by the IDS and stored as a new attack signature. Later, an AI will be trained to improve the generated attack signatures continuously. Once it is possible to generate targeted attack signatures and improve them via AI, the cloud infrastructure will be connected to a blockchain. With the help of the blockchain, it should then be possible to select and monitor the various generated attack signatures in a tamper-proof manner. The result will be an IDS that specializes in RSPs, can detect attacks, and can be configured and monitored independently of the RSP operator via blockchain. References Academy, R. M., Studies, E., Software, E. R. P., Software, R. P., & Man-, C. M. (2007). Criteria for the selection of ERP software. Informatica Economica, XI(2), 63–66. Altwaijry, H., & Algarny, S. (2012). Bayesian based intrusion detection system. Journal of King Saud University - Computer and Information Sciences. https://doi.org/10.1016/j.jksuci.2011.10.001 Axelsson, S. (2000). The Base-Rate Fallacy and the Difficulty of Intrusion Detection. ACM Transactions on Information and System Security. https://doi.org/10.1145/357830.357849 Bace, R., & Mell, P. (2001). NIST special publication on intrusion detection systems. In Nist Special Publication. Brown, C. V., & Heikki, T. (2005). Information systems management handbook (8th ed.). Can, O., & Sahingoz, O. K. (2015). A survey of intrusion detection systems in wireless sensor networks. 6th International Conference on Modeling, Simulation, and Applied Optimization, ICMSAO 2015 - Dedicated to the Memory of Late Ibrahim El-Sadek. https://doi.org/10.1109/ICMSAO.2015.7152200 Chiba, Z., Abghour, N., Moussaid, K., El Omri, A., & Rida, M. (2016). A Cooperative and Hybrid Network Intrusion Detection Framework in Cloud Computing Based on Snort and Optimized Back Propagation Neural Network. Procedia Computer Science, 83, 1200–1206. https://doi.org/10.1016/j.procs.2016.04.249 Christer, A. H., & Waller, W. M. (1984). Reducing production downtime using delay-time analysis. Journal of the Operational Research Society. https://doi.org/10.1057/jors.1984.103 Debar, H., Dacier, M., & Wespi, A. (2000). Revised taxonomy for intrusion-detection systems. Annales Des Telecommunications/Annals of Telecommunications. https://doi.org/10.1007/BF02994844 Denning, D. E. (1987). An Intrusion-Detection Model. IEEE Transactions on Software Engineering. https://doi.org/10.1109/TSE.1987.232894 El-Bakry, H. M., & Mastorakis, N. (2008). A real-time intrusion detection algorithm for network security. WSEAS Transactions on Communications, 7(12), 1222–1228. 716 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Elvezio, C., Sukan, M., Oda, O., Feiner, S., & Tversky, B. (2017). Remote collaboration in AR and VR using virtual replicas. ACM SIGGRAPH 2017 VR Village, SIGGRAPH 2017. https://doi.org/10.1145/3089269.3089281 Hiltunen, P., Bligh, R., Klett, C., Missalla, M., & Schmidt, H. W. (2008). How to achieve high availability with large calciners and avoid unforseen downtime. TMS Light Metals. Jatti, S. A. V., & Kishor Sontif, V. J. K. (2019). Intrusion detection systems. International Journal of Recent Technology and Engineering. https://doi.org/10.35940/ijrte.B1540.0982S1119 Johnston, A., Yoakum, J., & Singh, K. (2013). Taking on webRTC in an enterprise. IEEE Communications Magazine. https://doi.org/10.1109/MCOM.2013.6495760 Jow, J., Yang, X., & Han, W. (2017). A survey of intrusion detection systems in smart grid. International Journal of Sensor Networks. https://doi.org/10.1504/IJSNET.2017.083410 Khraisat, A., Gondal, I., Vamplew, P., & Kamruzzaman, J. (2019). Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity, 2(1). https://doi.org/10.1186/s42400-019-0038-7 Kiraz, M. S. (2016). A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-016-0385-0 Liao, H. J., Richard Lin, C. H., Lin, Y. C., & Tung, K. Y. (2013). Intrusion detection system: A comprehensive review. In Journal of Network and Computer Applications. https://doi.org/10.1016/j.jnca.2012.09.004 Liu, Y., Li, W., & Li, Y. (2008). Network Traffic Classification Using K-means Clustering. https://doi.org/10.1109/imsccs.2007.52 Mahy, R., Matthews, P., Alcatel-Lucent, & Rosenberg, J. (2010). Traversal Using Relays around NAT (TURN): Relay Extensions to Session Traversal Utilities for NAT (STUN). In Internet Engineering Task Force (IETF). Masoni, R., Ferrise, F., Bordegoni, M., Gattullo, M., Uva, A. E., Fiorentino, M., Carrabba, E., & Di Donato, M. (2017). Supporting Remote Maintenance in Industry 4.0 through Augmented Reality. Procedia Manufacturing. https://doi.org/10.1016/j.promfg.2017.07.257 Min, E., Long, J., Liu, Q., Cui, J., & Chen, W. (2018). TR-IDS: Anomaly-Based Intrusion Detection through Text-Convolutional Neural Network and Random Forest. Security and Communication Networks. https://doi.org/10.1155/2018/4943509 Münz, G., Li, S., & Carle, G. (2007). Traffic Anomaly Detection Using K-Means Clustering. GI/ITG Workshop MMBnet. Radivilova, T., Kirichenko, L., Ageyev, D., Tawalbeh, M., & Bulakh, V. (2018). Decrypting SSL/TLS traffic for hidden threats detection. Proceedings of 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies, DESSERT 2018. https://doi.org/10.1109/DESSERT.2018.8409116 Ripeanu, M. (2001). Peer-to-peer architecture case study: Gnutella network. Proceedings - 1st International Conference on Peer-to-Peer Computing, P2P 2001. https://doi.org/10.1109/P2P.2001.990433 Sahay, B. S., & Gupta, A. K. (2003). Development of software selection criteria for supply chain solutions. Industrial Management and Data Systems. https://doi.org/10.1108/02635570310463429 Sathya, R., & Abraham, A. (2013). Comparison of Supervised and Unsupervised Learning Algorithms for Pattern Classification. International Journal of Advanced Research in Artificial Intelligence. https://doi.org/10.14569/ijarai.2013.020206 Sherry, J., Lan, C., Popa, R. A., & Ratnasamy, S. (2015). BlindBox: Deep Packet Inspection over Encrypted Traffic. Computer Communication Review. https://doi.org/10.1145/2785956.2787502 Shields, P., & Rangarjan, N. (2013). A Playbook for Research Methods: Integrating Conceptual Frameworks and Project Management. New Forums Press. Snort 2.1 Intrusion Detection. (2004). In Snort 2.1 Intrusion Detection. https://doi.org/10.1016/b978-1-931836-04-3.x5000-0 T. Weber & R. Buchkremer: Monitoring Remote Service Platforms Using Artificial Intelligence-Based Distributed Intrusion Detection Stone, 717 A. (2007). Natural-language processing for intrusion detection. Computer. https://doi.org/10.1109/MC.2007.437 Teeter, R. A., Alles, M. G., & Vasarhelyi, M. A. (2010). The remote audit. Journal of Emerging Technologies in Accounting. https://doi.org/10.2308/jeta.2010.7.1.73 Vossing, M. (2017). Towards managing complexity and uncertainty in field service technician planning. Proceedings - 2017 IEEE 19th Conference on Business Informatics, CBI 2017. https://doi.org/10.1109/CBI.2017.50 Wang, Y. (2005). A multinomial logistic regression modeling approach for anomaly intrusion detection. Computers and Security. https://doi.org/10.1016/j.cose.2005.05.003 Werner, M., & Bechini, G. (2019). Customer technical support: OEM collaboration in a digitalized world. Society of Petroleum Engineers - Abu Dhabi International Petroleum Exhibition and Conference 2018, ADIPEC 2018. https://doi.org/10.2118/192623-ms Yin, Y., Zhou, Z., Chen, Y., Liu, Q., & Long, Y. (2006). Realization of a web-based remote service platform. Proceedings - 2006 10th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2006. https://doi.org/10.1109/CSCWD.2006.253079 Zarpelão, B. B., Miani, R. S., Kawakani, C. T., & de Alvarenga, S. C. (2017). A survey of intrusion detection in Internet of Things. In Journal of Network and Computer Applications. https://doi.org/10.1016/j.jnca.2017.02.009 718 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE SENSORY-MARKETING-EVALUATION OF ECOMMERCE WEBSITES WITH ARTIFICIAL INTELLIGENCE KEVIN HAMACHER1 & RÜDIGER BUCHKREMER2 1 UCAM Universidad Católica San Antonio de Murcia, Spain; e-mail: khamacher@alu.ucam.edu 2 Institute of IT Management and Digitization, FOM University of Applied Sciences, Düsseldorf, Germany; e-mail: ruediger.buchkremer@fom.de Abstract Multisensory consumer engagement on e-commerce websites is technically limited to visual, acoustic, and written elements. Consumers communicate, buy, and share products and services via digital environments in which sensory information is limited. To improve consumers' online sensory experience, media types and the content need to be quantitatively assessed and adapted. This project aims to develop a quantitative model, an Online Sensory Marketing Index (OSMI), which assesses ecommerce websites in multisensory communication quality. The OSMI will be supported by an automatic procedure that is based on artificial intelligence. Content of texts, images, and videos is evaluated by natural language processing (NLP), natural language generation (NLG) as well as automatic machine learning (AutoML) procedures. Multiple e-commerce websites from various industries are examined. DOI https://doi.org/10.18690/978-961-286-485-9.51 ISBN 978-961-286-485-9 Keywords: online sensory marketing, online consumer experience, artificial intelligence methods, assessment methodology, online sensory marketing index (OSMI) 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 720 1 Introduction In the past three decades, researchers have reported that all five human senses have an immense significance towards consumers' purchasing decisions, and many organizations modify their marketing activities accordingly. 'Sensory marketing' is becoming increasingly important in research and practice and is underpinned by the progressive debate in the scientific literature during the last decade (Bleier, Harmeling, & Palmatier, 2019; Krishna, 2012; Peck & Childers, 2008). It is partly due to the increasing number of exchangeable products and an information overload for consumers. Besides, the increasing intensity of competition makes it more difficult for suppliers to attract consumers' attention. Consumer and buyer behavior have also changed dramatically in recent years because today, consumers strive for individualization and personalization. Sensory information about products and services can influence people's attitudes, purchasing intentions, and consumption (Petit, Cheok, Spence, Velasco, & Karunanayaka, 2015). All perceptible stimuli of a product, e. g., a new dress or car, offer valuable information about the product's perceived quality and can have a significant influence on the purchasing decision process (Elder & Krishna, 2010; Krishna, Cian, & Sokolova, 2016). After all, (advertising) messages always have a more substantial effect if they affect the consumer through more than one sense (Krishna, 2012). As a result of consumer and buyer behavior changes, sensory marketing has increasingly become part of the scientific discourse. Krishna defines sensory marketing as "marketing that engages the consumers' senses and affects their perception, judgment and behavior" (Krishna, 2012). Impressions about seeing, hearing, feeling, tasting, and smelling are decoded in the human brain (Barsalou, 2008). People can react and possibly buy a product or a service. A sensory approach's advantages are obvious: an increase in attention for the product and/or the brand, a resulting higher memorability value, and ultimately faster recognition, combined with the possibility of differentiation from the relevant competition (Krishna, 2012). The question arises as to which e-commerce strategy should be implemented for sales via the Internet. - The fundamental problem with marketing goods digitally is that some human stimuli cannot be directly addressed or only to a minimal extent because direct contact with the consumer is not apparent. This limitation applies K. Hamacher & R. Buchkremer: Sensory-Marketing-Evaluation of E-Commerce Websites with Artificial Intelligence 721 especially to haptics when consumers cannot feel the quality of clothing, for example, as they are used to in terms of weight or material properties (Klatzky, Lederman, & Matula, 1993). Nevertheless, current statistics confirm that the ecommerce channel is on a growth course, particularly in the US, Asia, and Northern Europe (Pappas, Kourouthanassis, Giannakos, & Lekakos, 2017). Furthermore, forecasts for the coming financial year point to even more significant growth of up to $4.93 trillion in 2021, which will be more than double compared with the 2017 year's expenses of $2.3 trillion, driven by about ¼ of the world's population already shopping online (Adam, Alhassan, & Afriyie, 2020; OECD, 2020). 2 Problem definition 2.1 Problem Definition Sensory marketing is currently at a tipping point because the challenge lies in transferring the digital world's address. This leads to a complex environment in which e-commerce business constantly demands new communication and style to be resistant to future challenges (Bleier idr., 2019). To enable such a tremendous change, it is required to design a new understanding of sensory marketing in terms of digitization. The literature offers various ways to acknowledge changes and presents some hints towards them. Nevertheless, acknowledging research in sensory marketing of the last two decades leads to the assumption that an overarching viewpoint needs to be taken in a digitally changing world. However, current research does not provide a holistic and measurable view of how an e-commerce website needs to look like from a sensory perspective. The main problem is that current sensory marketing models do not quantitatively incorporate digitization trends and sensory aspects of communication. There is no generic guidance on how to design an e-commerce website in an appropriate way regarding sensory marketing that allows the evaluation of the sensory communication quality. The question arises of how sensory elements can be measured on a website. Sensory elements can be accommodated in pictures, texts, and videos and a collection with manual methods is possible and practicable. In recent years, however, artificial intelligence (Ekbia, 2010) has developed to such an extent that automatic acquisition and identification of sensory elements should be possible. The methods of choice for our project are "natural language processing" (Buchkremer idr., 2019) and 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 722 "automatic machine learning" (Braka, Buchkremer, & Ebener, 2020) for the acquisition and analysis of text, images, sounds, and videos (Kacprzyk & Zadrozny, 2010; Truong idr., 2019). Thus, online sensory marketing research is still in its infancy, and a deeper analysis must be carried to fill this gap. Thus, the research project will pick up on the need described above and create an automated assessment framework named Online Sensory Marketing Index (OSMI). The following paragraph highlights the scientific objectives and related research questions. 2.2 Scientific Objectives The related problem scope frames the research area and presents questions that the project will answer. It furthermore details aspects where the OSMI delivers specific answers to the solution. The OSMI is based on two interdisciplinary models. First of all, the Web Quality Index (WQI) can be considered as an assessment measure for websites in general (Fernández-Cavia, Rovira, Díaz-Luque, & Cavaller, 2014). Secondly, the model developed by Hultén (Hultén, 2011) serves as a framework to describe sensory elements in marketing. The digitization trends have no long history, and thus, no generic (online) sensory evaluation model has yet been developed. For this reason, research is based on the problem of the extent to which compensation can be achieved by combining two or even more sensory stimuli and how this affects consumers and their purchasing behavior keeping in mind that direct sensory consumer appeal on e-commerce websites is limited to visuality and acoustics (Bleier idr., 2019; Petit, Velasco, & Spence, 2019; Yazdanparast & Spears, 2013). An evaluation framework would provide the following benefits to the body of knowledge in online sensory marketing design:  Pattern search for best practice success factors: initially, an evaluation framework allows to assess existing data. Various dimensions of the OSMI can be evaluated regarding patterns that different e-commerce websites provide. Therefore, presenting guidelines for further implementation of other e-commerce websites is a prerequisite. K. Hamacher & R. Buchkremer: Sensory-Marketing-Evaluation of E-Commerce Websites with Artificial Intelligence   723 Sales increase: an OSMI-based optimization of e-commerce websites leads to a better consumer approach, a viable generic argument of using the framework for business purposes. Cost savings: A practical and validated online sensory consumer experience could, among other things, reduce the cost to retain the customer. The most significant disadvantage of the digital customer journey is that customers are not directly able to inspect the product and have to wait a particular time for it, under uncertainty of the accuracy of the shown representation (Hong & Pavlou, 2014). A sensory consumer approach could remedy this. For instance, a virtual touch becomes a crucial aspect in online shopping and will be examined in more detail later (Brasel & Gips, 2015). This research project aims to create an automatic assessment framework for sensory communication quality that answers the problem mentioned above. To reach this goal, the following research questions (RQ) are addressed as the underlying structure that guides the overall research process: RQ1: To what extent can industry-specific taxonomies be determined based on OSMI measurements? Based on the current status, OSMI evaluations of e-commerce websites need to be acquired manually. The question arises whether it is feasible to encode the whole website automatically into a keyword catalog/taxonomy related to sensory stimuli. RQ2: To what extent is the automated extraction and identification of OSMI elements possible through artificial intelligence? The automated examination of e-commerce websites includes additional components beyond the pure text, such as the image material's quality and the acoustic elements. For this reason, the OSMI needs to be expanded to all media types to be evaluated by artificial intelligence. RQ3: To what extent is it feasible to quantitatively determine and compare industry-specific OSMI scores? 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 724 Building upon RQ1 and RQ2, the next step is to generate an automatically running OSMI framework, which is, in the first instance, able to crawl websites for sensory keywords. Using, e.g., the keyword catalog, a comparison is made to determine whether the automatic assessment result is identical or even better compared to the index from the manual analysis. RQ4: How can guiding principles for the determination and application of OSMI indices be generated? Finally, the last research question relates to OSMI recommendations that can be derived predominantly from quantitative research to make the OSMI most useful for practitioners. 3 Methodology We plan to use qualitative and quantitative research methods to specify the final OSMI evaluation framework. Qualitative research is used to develop a set of hypotheses that are tested with a quantitative study. The initial qualitative research uses qualitative content analysis (Hsieh & Shannon, 2005) as the foundation of an exploratory study to develop indicators for each framework's parameter. A qualitative approach is chosen for the exploratory study (Petit idr., 2019). Sensory marketing trends have been researched in terms of digitization to existing frameworks. Within this research scope, it is considered a success factor to include existing sensory marketing insights and assessment tools from scientific disciplines in general into consideration. It is planned to derive the OSMI from analyzing existing literature related to online consumer experience and sensory marketing trends. The chosen research method furthermore concentrates on the reduction of data by paraphrasing and categorizing. Analogous to the study by Fernandez-Cavia et al. (2014) (Fernández-Cavia idr., 2014), the evaluation model makes use of indicators that apply different scales: The scale 0-1 in case a specific characteristic is present or completely absent. The 0-2 or 0-3 scale, on the other hand, in the case of a more specific assessment basis, which allows more factual statements to be made about the quality of the characteristic, e.g., Weak (0); Standard (1); Good (2); Excellent (3). The combined index across all senses can be seen as a general evaluation of the sensory quality of the analyzed e-commerce website. The closer the OSMI value is to 1, the more successful the website communicates concerning K. Hamacher & R. Buchkremer: Sensory-Marketing-Evaluation of E-Commerce Websites with Artificial Intelligence 725 sensory marketing theoretically by excluding possible sensory overloading effects. A score close to 0, on the other hand, suggests that the website does not contain sensory elements and does not meet the indicators for successful sensory consumer demands that are necessary and relevant for an e-commerce website. The general advantage of the method chosen here is that these indicators allow comparisons to be made between the websites analyzed, and those can be identified that have received a positive rating and can be compared with one another based on individual indicators. In this way, examples of good and less good sensory designs can be identified. An analysis of the improvement potential is easily possible by the specific details to be used fundamentally for pointing out sensory optimizations. According to this, the research methods of the research can be classified as follows: At the early stage of research, it is planned to conduct expert interviews with marketing leaders to obtain opinions and suggestions for improvement on the status quo of the OSMI. Besides, a taxonomy for the five human senses (classification scheme) must be built manually about qualitative research. In this, a keyword catalog is created, which bundles related sensory terms per sense. The associated goal is to visualize patterns for various branches and relationships of sensory information represented in texts used on these e-commerce platforms to point out best-in-class sensory communication quality. In a second step, the manually based keyword catalog will be developed within the framework of an automated tool, enabling to crawl off the e-commerce websites according to the compiled terms, and a score is automatically generated. At this research project level, the Online Sensory Marketing Index will be combined with Artificial Intelligence (AI). The aim of this idea is that the OSMI becomes an automatically running system to check and evaluate an e-commerce website in terms of sensory communication quality. AI has to evaluate e-commerce websites fully automatically, including presenting an overview of rankings for each examined parameter. Based on rankings, further recommendations are possible and should also be automatically displayed by the OSMI and its use of AI. In detail, it is planned to make use of natural language processing (NLP) as a text mining method (Manning, Bauer, Finkel, & Bethard, 2014). It is not intended to use a cluster analysis as an approach since the dimensions investigated have already been determined with the five human senses. With the use of NLP, it will be possible to be focused on keyword extraction on the one hand but also spoken language in audio or video 726 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE elements, the so-called speech processing, on the other hand. Further, it is under consideration to extend the new OSMI framework towards sentiment analysis to extract meanings of sensory formulated texts automatically (Collobert idr., 2011). This information extraction technique should also include metaphors, which usually require learned interpretation patterns. To complement the new OSMI approach, the automated assessment tool will also be extended to analyze other relatively objective website components and sensory indicators like, for instance, 3D-elements, background colors, or the resolution of product or mood pictures in general via automated machine learning using Cloud AutoML. This allows generating a grammatical score to be recorded with a “complication index” based on the text length. In this context, the weighting of individual keywords and their positioning within texts or web pages is to be examined, which could then be taken into account in automatic indexing. Finally, the automated AI OSMI framework is to be compared quantitatively with the analogously determined values employing a field test of approximately 80 to 100 e-commerce websites of mainly global brands. Implementation will be done in collaboration with companies from various industries to determine the OSMI in a feasible way. K. Hamacher & R. Buchkremer: Sensory-Marketing-Evaluation of E-Commerce Websites with Artificial Intelligence 727 Figure 1: Research Process As depicted above, the research process is vertically divided into four phases, four research questions, and a plan for writing papers. It starts from the problem definition and qualitative content analysis over the exploratory research towards the quantitative analysis and summing up with the research results. The size of each box represents the scope of investigation of the respective phase of the research. Starting with the first phase, the research process initially needs to be framed within guiding hypotheses as a foundation. The problem definition phase is mainly intended to show, based on current scientific literature, that no model exists that is capable of generating qualitative assessments of the sensory consumer appeal on e-commerce websites. As mentioned above, also expert interviews are to take place at this point to critically review the current OSMI approach and to get further improvement. The second phase, the qualitative content analysis, follows this and examines the current scientific literature concerning the topicality of the sensory indicators. It will also be examined whether additional sensory indicators could supplement the OSMI approach. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 728 The exploratory research, the third phase, will then deal with the new OSMI approach based on artificial intelligence. Therefore, as mentioned above, NLP methods, including keyword extraction, and AutoML will be examined. This phase's results will be published within a paper to document the current status of the research. With the previously developed automated evaluation model, a quantitative analysis can then be aimed at the fourth and last phases. In this section, the automated evaluation of numerous practical examples with the manual evaluation of sensory communication quality will be compared. Finally, we will critically examine the effectiveness of the new OSMI approach to give practitioners advice. 4 Preliminary/Expected results Within the experimental quantitative phase, we expect that some sensory communication aspects can be evaluated via machine-based methods in principle. We recently conducted an extensive test in a big data project with 40 students to support our assumption. Here, students had to independently analyze different senses on given, international e-commerce platforms with big data methods. After crawling text and images using various methods, they could intensively evaluate data and assess the quality of sensory communication. For this purpose, texts were evaluated using word embedding technologies on the one hand (Horn, Erhardt, Di Stefano, Bosten, & Buchkremer, 2020), (Hussain idr., 2020), and elements of images were recognized using object recognition via a Google cloud framework on the other. Interesting results can already be seen, for example, in the fact that concerning examined e-commerce websites for wines, tendencies are recognizable to the effect that the taste and associations of red wines are often related to images with chocolate - white wines, on the other hand, relates to pictures of lemons. We already presented this first investigation's approach in a technical article published at the INTED 2021 conference (Hamacher & Buchkremer, 2021). 5 Future development Some researchers present ongoing developments towards digitizing of senses - see also Spence, Obrist, Velasco, & Ranasinghe for an overview (Spence, Obrist, Velasco, & Ranasinghe, 2017). Knowledge from the field of sensory marketing can often be transferred to the digital space. Thus, e-commerce consumer experience, as K. Hamacher & R. Buchkremer: Sensory-Marketing-Evaluation of E-Commerce Websites with Artificial Intelligence 729 a particular field of online consumer experience, has enormous potential to be enriched with sensory communication aspects. For instance, a good mood can compensate frustration caused by a lack of haptics (Yazdanparast & Spears, 2013). An appealing design of the online shop, positive product descriptions or ratings, chats with friendly consultants, plenty of humor, and/or stimulating images can attract people with a high need for touch to online shopping (Roggeveen, Grewal, Townsend, & Krishnan, 2015; San-martín, González-benito, Martos-partal, & Sanmartín, 2017; Yazdanparast & Spears, 2013). For this and other reasons, the intersection of these two dimensions is extensive. Assessment frameworks for the two dimensions only exist to a minimal extent. Some key performance indicators in online consumer experience are known, for example, a bounce rate or a click rate, but there is a lack of qualitative metrics, especially in terms of online sensory communication quality. An overall assessment framework for offline and online communication elements is missing in sensory marketing but very important due to the findings described in this paper. Going along with this argument, artificial intelligence is the key to fill existing technology knowledge gaps. Accordingly, AI will have a crucial role in designing online sensory consumer experiences in the future. For the time being, it is evident that sensory marketing, in particular, does not have extensive research contacts with AI. Therefore, the overall goal is to connect these dimensions more closely and thus close the mentioned knowledge gap. References A. Krishna, “An integrative review of sensory marketing: Engaging the senses to affect perception, judgment and behavior,” J. Consum. Psychol., vol. 22, no. 3, pp. 332–351, 2012. J. Peck and T. L. Childers, “Sensory factors and consumer behavior,” Handb. Consum. Psychol., pp. 193–219, 2008. A. Bleier, C. M. Harmeling, and R. W. Palmatier, “Creating effective online customer experiences,” J. Mark., vol. 83, no. 2, pp. 98–119, 2019. O. Petit, A. D. Cheok, C. Spence, C. Velasco, and K. T. Karunanayaka, “Sensory marketing in light of new technologies,” Proc. 12th Int. Conf. Adv. Comput. Entertain. Technol. - ACE ’15, pp. 1– 4, 2015. R. S. Elder and A. Krishna, “The Effects of Advertising Copy on Sensory Thoughts and Perceived Taste,” J. Consum. Res., vol. 36, no. 5, pp. 748–756, 2010. A. Krishna, L. Cian, and T. Sokolova, “The power of sensory marketing in advertising,” Curr. Opin. Psychol., vol. 10, pp. 142–147, 2016. L. W. Barsalou, “Grounded Cognition,” Annu. Rev. Psychol., vol. 59, no. 1, pp. 617–645, 2008. R. L. Klatzky, S. J. Lederman, and D. E. Matula, “Haptic Exploration in the Presence of Vision,” J. Exp. Psychol. Hum. Percept. Perform., vol. 19, no. 4, pp. 726–743, 1993. 730 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE I. O. Pappas, P. E. Kourouthanassis, M. N. Giannakos, and G. Lekakos, “The interplay of online shopping motivations and experiential factors on personalized e-commerce: A complexity theory approach,” Telemat. Informatics, vol. 34, no. 5, pp. 730–742, 2017. I. O. Adam, M. D. Alhassan, and Y. Afriyie, “What drives global B2C E-commerce? An analysis of the effect of ICT access, human resource development and regulatory environment,” Technol. Anal. Strateg. Manag., vol. 0, no. 0, pp. 1–16, 2020. OECD, “E-commerce in the time of COVID-19,” no. October, pp. 1–10, 2020, [Online]. Available: http://www.oecd.org/coronavirus/policy-responses/e-commerce-in-the-time-of-covid-193a2b78e8/#biblio-d1e705. H. R. Ekbia, “Fifty years of research in artificial intelligence,” Annu. Rev. Inf. Sci. Technol., vol. 44, no. 1, pp. 201–242, 2010. R. Buchkremer et al., “The Application of Artificial Intelligence Technologies as a Substitute for Reading and to Support and Enhance the Authoring of Scientific Review Articles,” IEEE Access, vol. 7, pp. 65263–65276, 2019, doi: 10.1109/ACCESS.2019.2917719. D. Braka, R. Buchkremer, and S. Ebener, “Informationsextraktion und kartografische Visualisierung von Haushaltsplänen mit AutoML-Methoden,” R. Buchkremer, T. Heupel, and O. Koch, Eds. Wiesbaden: Springer Fachmedien Wiesbaden, 2020, pp. 107–128. J. Kacprzyk and S. Zadrozny, “Computing with words is an implementable paradigm: Fuzzy queries, linguistic data summaries, and natural-language generation,” IEEE Trans. Fuzzy Syst., vol. 18, no. 3, pp. 461–472, Jun. 2010. A. Truong, A. Walters, J. Goodsitt, K. Hines, C. B. Bruss, and R. Farivar, “Towards Automated Machine Learning: Evaluation and Comparison of AutoML Approaches and Tools,” Aug. 2019. J. Fernández-Cavia, C. Rovira, P. Díaz-Luque, and V. Cavaller, “Web quality index (WQI) for official tourist destination websites. proposal for an assessment system,” Tour. Manag. Perspect., vol. 9, pp. 5–13, 2014. B. Hultén, “Sensory marketing: the multi‐sensory brand‐experience concept,” Eur. Bus. Rev., vol. 23, no. 3, pp. 256–273, May 2011. A. Yazdanparast and N. Spears, “Can Consumers Forgo the Need to Touch Products? An Investigation of Nonhaptic Situational Factors in an Online Context,” Psychol. Mark., vol. 30, no. 1, pp. 46– 61, 2013. O. Petit, C. Velasco, and C. Spence, “Digital Sensory Marketing: Integrating New Technologies Into Multisensory Online Experience,” J. Interact. Mark., vol. 45, pp. 42–61, 2019, doi: 10.1016/j.intmar.2018.07.004. Y. Hong and P. A. Pavlou, “Product fit uncertainty in online markets: Nature, effects, and antecedents,” Inf. Syst. Res., vol. 25, no. 2, pp. 328–344, 2014. S. A. Brasel and J. Gips, “Interface Psychology: Touchscreens Change Attribute Importance, Decision Criteria, and Behavior in Online Choice,” Cyberpsychology, Behav. Soc. Netw., vol. 18, no. 9, pp. 534–538, 2015. H. F. Hsieh and S. E. Shannon, “Three approaches to qualitative content analysis,” Qual. Health Res., vol. 15, no. 9, pp. 1277–1288, 2005. C. D. Manning, J. Bauer, J. Finkel, and S. J. Bethard, “The Stanford CoreNLP natural language processing toolkit,” Aclweb.Org, pp. 55–60, 2014. R. Collobert, J. Weston, L. Bottou, M. Karlen, K. Kavukcuoglu, and P. Kuksa, “Natural Language Processing (Almost) from Scratch,” J. Mach. Learn. Res., no. 12, pp. 2493–2537, 2011. N. Horn, M. S. Erhardt, M. Di Stefano, F. Bosten, and R. Buchkremer, “Vergleichende Analyse der Word-Embedding-Verfahren Word2Vec und GloVe am Beispiel von Kundenbewertungen eines Online-Versandhändlers,” in Künstliche Intelligenz in Wirtschaft & Gesellschaft, 2020, pp. 559–581. A. Hussain et al., “Artificial intelligence-enabled analysis of UK and US public attitudes on Facebook and Twitter towards COVID-19 vaccinations (Preprint),” J. Med. Internet Res., Dec. 2020, doi: 10.2196/26627. K. Hamacher & R. Buchkremer: Sensory-Marketing-Evaluation of E-Commerce Websites with Artificial Intelligence 731 K. Hamacher and R. Buchkremer, “MEDIATION OF ONLINE SENSORY MARKETING THROUGH ONLINE COLLABORATION SOFTWARE,” in 15th annual International Technology, Education and Development Conference, Mar. 2021, pp. 1387–1396, doi: 10.21125/inted.2021.0320. C. Spence, M. Obrist, C. Velasco, and N. Ranasinghe, “Digitizing the chemical senses: Possibilities & pitfalls,” Int. J. Hum. Comput. Stud., vol. 107, pp. 62–74, 2017. A. L. Roggeveen, D. Grewal, C. Townsend, and R. Krishnan, “The Impact of Dynamic Presentation Format on Consumer Preferences for Hedonic Products and Services,” J. Mark., vol. 79, no. 6, pp. 34–49, 2015. S. San-martín, Ó. González-benito, M. Martos-partal, and S. San-martín, “To what extent does need for touch affect online perceived quality ?,” Int. J. Retail Distrib. Manag., vol. 45, no. 9, pp. 950–968, 2017. 732 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE KNOWLEDGE-BASED PLANNING AND CONTROLLING WITH METHODS OF ARTIFICIAL INTELLIGENCE TO INCREASE EFFICIENCY IN IT PROJECTS SASCHA BRÜGGEN1 & ALEXANDER HOLLAND2 1 UCAM Universidad Católica San Antonio de Murcia, Av. de los Jerónimos, Guadalupe de Maciascoque, Murcia, Spain; e-mail: sascha.brueggen@outlook.com 2 FOM University of Applied Sciences, Herkulesstraße 32, 45127 Essen, Germany; e-mail: alexander.holland@fom.de Abstract Because the success of IT projects in companies is increasingly becoming a competitive factor, this paper aims to analyze how knowledge-based tasks in an IT project can be supported with the help of artificial intelligence methods to carry out the IT project more efficiently. To answer the research question, a qualitative method in form of expert interviews will be used on the one hand and a discrete event simulation on the other hand to achieve quantitative results. In the simulation, it is intended to create a model without the use of AI elements. Under the same conditions, a project will be developed to support the knowledge-based tasks in the second step. The different constellations of the model can be adapted depending on the focus and the question. These models will be operationalized with parameters and will be compared under different constellations to measure the efficiency quantitatively. The findings of this study allow a statement whether it makes sense to support specific tasks in an IT project with the help of AI methods. DOI https://doi.org/10.18690/978-961-286-485-9.52 ISBN 978-961-286-485-9 Keywords: project management, knowledge management, efficiency, controlling, planning, simulation 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 734 1 Introduction The ability to recognize and conduct transformations in the organization is one of the most important for companies nowadays. Knowing about the requests from their markets with their participants and the need to offer the right products to the right place, at the right time, and quality is essential for the survival of a company. 1.1 IT Project management The pressure on IT departments to implement projects that contribute to the company's success remains high to reach their goals in the dimensions of time, quality, and effort. For the question what project management is about Reich describes it “as an area in which action is paramount and in which tasks, budgets, people and schedules must be managed and controlled to achieve expected results” (Reich, B.H., Gemino, A, Sauer, C., 2008a). Nevertheless, the achievement of the project objectives is not an end in itself. A research study in 2019 from Capgemini Germany figure out that only 15% of the interviewed companies will decrease their IT budget comparing the previous year. 50% of them will an increased budget, and nearly 35% will have the same budget level as last year. The main target of the IT budget with 72% will be the digitization of the processes and increasing the organization's efficiency (Dumslaff & Heimann, 2018). The main issue for these companies is that there are no sufficient human resources working in the IT and project departments to manage the upcoming demands. Also, the need to handle the knowledge of the employees is an increasingly severe topic where companies are fully aware of this circumstance. With these challenges, it is becoming increasingly challenging to achieve the stated goals of IT projects. This result is supported by The Standish Group International from 2015, which shows that only 6% of all grand projects were completed as planned, and only 11% of all large projects were completed as planned (The Standish Group International, Inc, 2015). 1.2 Knowledge management An essential part of planning and conducting project management is the part of knowledge management (KM). That is also valuable to examine as already Gemino, Lee and Reich mentioned (Reich, B.H., Gemino, A, Sauer, C., 2008a) (Gemino et al., 2007) (Lee & Lee, 2000). As Wang et al. point out, projects are knowledge- S. Brüggen & A. Holland: Knowledge-Based Planning and Controlling with Methods of Artificial Intelligence to Increase Efficiency in IT Projects 735 intensive, but IT projects in a particular way (Wang, E., Lin, C., Jiang, J.J., Klein, G., 2007). This could be justified because IT projects often aim to develop new software, which is an imaginary product. On the other hand, the number of IT trends with knowledge-intensive skills and competence requirements is growing rapidly. Independent from the type of IT project or selected procedure model, often there are the following parameters given to hit the project goals. Lech uses the knowledge taxonomy of project knowledge to describe the parameters of resources, time, and cost to reach the target of a specific project, schedules, milestones, and other artifacts (Lech, 2014). In projects, all forms of knowledge are used in many places, and someone in projects must be aware of it. Hanisch also refers to the need that managing knowledge in projects is one of the most important tasks of a project manager, and the necessity to focus research in the field of project-based companies is growing (Hanisch et al., 2009). Nevertheless, the project manager is responsible for many tasks, but two components must be distinguished in terms of knowledge management. Lech mentions that there are two types of knowledge that a project manager must have at his disposal. The one is the generic project management knowledge available in the PM body of knowledge guides also PM process models, and the other one is the product-related project management knowledge. This includes best practices for performing the projects involving implementing a specific system or topic (Lech, 2014). Judging by these facts, it should also be in the project manager's interest to manage knowledge as efficiently as possible in the projects. 2 Problem definition The meaning of knowledge management is mentioned as a success factor in a large number of documentations. In general, there are some descriptions of how knowledge management is part of projects. One of them is the definition of Reich, Gemino and Sauer: “Knowledge management in the context of a project is the application of principles and processes designed to make relevant knowledge available to the project team. Effective knowledge management facilitates the creation and integration of knowledge, minimizes knowledge losses, and fills knowledge gaps throughout the duration of the project” (Reich, B.H., Gemino, A, Sauer, C., 2008b). Lech refers that identifying knowledge, mapping, and sourcing that does not take place in a structured manner (Lech, 2014). Gasik developed a 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 736 model of project knowledge, which includes different views on knowledge within a project. He linked the micro-knowledge, which means the needed knowledge to perform one task, with the macro-knowledge view, which includes a complete knowledge possessed by a given person to increase efficiency (Gasik, 2011). The issue regarding knowledge or rather the management of knowledge in projects is well-known, and there are many frameworks and modeling, e.g., from Gasik or the examinations from Lech. However, a quantitative simulation of a project management approach is still missing to prove that knowledge-based components with the support of artificial intelligence can run projects more efficiently. This paper investigates to what extent the use of selected artificial intelligence or available services in knowledge-based tasks within an IT project leads to increased efficiency. The classic project management dimensions such as time, costs, and quality serve as variables, although other dimensions can also be used, e.g., quantity according to the functionalities in a software project. 3 Methodology To ensure that both quantitative and qualitative questions are answered, two types of methods will be planned. For the questions of qualitative nature, the methodology of expert interviews is planned. The research project first provides for selecting relevant experts, e.g., CIOs., CEOs, heads of Project management, and high-level decision-makers. The interviews will be analyzed the answers by qualitative data analysis (QDA), according to Mayring. The interviews will be conducted as semistructured interviews in order to be able to respond spontaneously to the development of the interview. To maintain a high degree of objectivity, reliability, and validity, each role is interviewed twice with different interviewees to obtain possible differences within a role. The results will use in the following discussion to underline similarities and deviations and try to explain these. To answer quantitative questions, it will create and conduct a discrete event simulation model to evaluate the effects of using AI methods in IT projects' knowledge-based components. Adler, Mandelbaum, Nguyen, and Schwerer also used simulation to study processes. To identify weak points, bottlenecks, and performance losses, this methodology is preferable because the rapid modifiability S. Brüggen & A. Holland: Knowledge-Based Planning and Controlling with Methods of Artificial Intelligence to Increase Efficiency in IT Projects 737 of the simulation model allows new results and insights (Adler et al., 1995). Bassil also used a discrete simulation to evaluate software development life cycles, a software methodology for designing, building, and maintaining information and industrial systems (Bassil, 2012). This work shows that this type of simulation can investigate complex processes and make new findings visible. MATLAB® Release 2020a software, a comprehensive numerical mathematics software package, is used to create and run the discrete simulation. The strengths lie in vector and matrix calculations, whereby the software is divided into an introductory module and numerous extension packages. Furthermore, in comparison to other simulation programs, MATLAB® offers the advantages of automated evaluation of larger data sets at high speed, the possibility of efficient multiple evaluations of the same data sets with programmed analysis routines, and integrated, flexibly applicable graphics and statistics functions. A particular position of the extensions takes Simulink, which provides a graphical interface for modeling and simulation of systems using signal flow graphs. Besides, the extension StateFlow is to be mentioned. It is a tool for modeling event-driven reactive systems with a finite number of states (Angermann et al., 2021). The simulation structure represents the work breakdown structure of an IT project, which includes the classic phases of initialization, definition, planning, controlling, and finalization. Each of these phases, in turn, includes defined tasks that are primarily planned and carried out sequentially. Possible dependencies between the tasks are taken into account in the same way as possible returns to previous tasks if these are necessary. The individual tasks are provided with the classic parameters of project management quality, costs, and time (duration) and assigned corresponding values. After simulating the reference model, three values are calculated for each parameter, reflecting the project's total value. This model with the values mentioned above serves as a reference model with which all of the following models can be measured and compared, which is illustrated in figure 1. 738 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Figure 1: Reference model vs. AI supported KM model Source: own illustration In the second step, the same model structure is used to identify the tasks related to knowledge management outlined in red in figure 1. Every task related to knowledge management is examined to determine which artificial intelligence methods are suitable for performing this task more efficiently. Once a method has been found, the values of the parameters in quality, costs, and time (duration) also change. Objectively it can only be said that the use of AI in knowledge-based tasks leads to either "no improvement", "medium improvement," or "great improvement" in the individual parameters. However, these three categories cannot be compared quantitatively. To make this possible, predefined ranges are defined in the three categories, and the values are determined using random variables. This procedure is carried out with all knowledge-based tasks. For tasks with no relation to knowledge management, the parameters quality, costs, and time (duration) remain identical to the reference model. With the comparison between the reference model and the new knowledge management-optimized model, a sufficient number of simulations runs with statistical methods can now be used to investigate the extent to which efficiency can be increased using AI methods for knowledge-based tasks within IT projects, which is shown as an example in figure 2. S. Brüggen & A. Holland: Knowledge-Based Planning and Controlling with Methods of Artificial Intelligence to Increase Efficiency in IT Projects 739 Figure 2: Simulation result Source: own illustration With a combination of the results by expert interviews and simulation will the research question be answered. 4 Preliminary/Expected results The expectations in terms of answering the research question are divided into two forms of methods. On the one hand, results are obtained from expert interviews and quantitative content analysis. According to Kuckartz, the quality of the information depends on selecting the interview participants, who take part in the expert interviews, and whose answers are subsequently evaluated (Kuckartz, 2018). A basic breakdown of experts can be divided into three areas. On the one hand, there are those experts who have the technical know-how. Secondly, the experts have process knowledge, which goes hand in hand with informal or hidden knowledge. The third group of experts consists of interpretive knowledge, which has ideas, ideologies, and explanatory patterns (Kruse et al., 2015). To conduct an open-ended study on the one hand and to validate the results, on the other hand, at least two experts of the same role are interviewed from each role. This constellation should ensure the quality of the statements. In the case of significant deviations within the same role, 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 740 an attempt is made to find explanatory approaches, which represents a gain in knowledge. The expected results of the simulation essentially depend on the identification of the knowledge-based tasks in the IT project, which can be supported with AI methods. With the classic parameters of quality, cost, and time (duration), the cost parameter is probably the only negative evaluation parameter since AI methods will cause an initial effort in the company before they are used. Therefore, the simulation remains to be seen whether AI methods can form a significant added value. On the other hand, the effort could be reduced to a certain extent through cost degression. 5 Future development Future research fields concerning the current topic can be, on the one hand, the change management process in the planning and implementation of IT projects. In particular, the skills of project managers about artificial intelligence methods would be worth mentioning. Likewise, the training and development of project staff should also be investigated in more detail. Here, there is the possibility of searching for and finding suitable candidates within the own company or relying on externally purchased specialists. However, the introduction and ongoing operation of AI methods for IT projects are not enough. After the processes around project planning and project execution with AI methods have been implemented in knowledge management-relevant areas, it is essential to set oneself apart from the competition by safeguarding innovations in this area and secure the technological lead for as long as possible. The standardization of these processes should then be made as efficient as possible before they are commoditized, and the optimization of IT projects begins anew with new innovative approaches in this area (Moore, 2002). References Adler, Paul S. u. a. (From Project to Process Management: An Empirically-Based Framework for Analyzing Product Development Time, 1995): From Project to Process Management: An Empirically-Based Framework for Analyzing Product Development Time, in: Management Science 41 (1995), 3, 458–484, https://doi.org/10.1287/mnsc.41.3.458 Angermann, Anne u. a. (MATLAB - Simulink - Stateflow, 2021): MATLAB - Simulink - Stateflow: Grundlagen, Toolboxen, Beispiele, 10. Auflage, Berlin/Boston: De Gruyter Oldenbourg, 2021 Bassil, Youssef (A Simulation Model for the Waterfall Software Development Life Cycle, 2012): A Simulation Model for the Waterfall Software Development Life Cycle, 2012 S. Brüggen & A. Holland: Knowledge-Based Planning and Controlling with Methods of Artificial Intelligence to Increase Efficiency in IT Projects 741 Dumslaff, Uwe/Heimann, Thomas (IT-Trends 2018, 2018): IT-Trends 2018 (2018), https://www.capgemini.com/de-de/wp-content/uploads/sites/5/2018/02/it-trends-studie2018.pdf Gasik, Stanislaw (A Model of Project Knowledge Management, 2011): A Model of Project Knowledge Management, in: Project Management Journal 42 (2011), 3, 23–44 Gemino, Andrew/Reich, Blaize Horner/Sauer, Chris (A Temporal Model of Information Technology Project Performance, 2007): A Temporal Model of Information Technology Project Performance, in: Journal of Management Information Systems 24 (2007), 3, 9–44, https://doi.org/10.2753/MIS0742-1222240301 Hanisch, Bastian u. a. (Knowledge management in project environments, 2009): Knowledge management in project environments, in: J of Knowledge Management 13 (2009), 4, 148–160, https://doi.org/10.1108/13673270910971897 Kruse, Jan u. a. (Qualitative Interviewforschung, 2015): Qualitative Interviewforschung: Ein integrativer Ansatz, 2., überarbeitete und ergänzte Auflage, Weinheim/Basel: Beltz Juventa, 2015 Kuckartz, Udo (Qualitative Inhaltsanalyse. Methoden, Praxis, Computerunterstützung, 2018): Qualitative Inhaltsanalyse. Methoden, Praxis, Computerunterstützung, 4. Auflage, Weinheim/Basel: Beltz Juventa, 2018 Lech, Przemyslaw (Managing knowledge in IT projects: a framework for enterprise system implementation, 2014): Managing knowledge in IT projects: a framework for enterprise system implementation, in: Journal of Knowledge Management 18 (2014), 3, 551–573 Lee, Zoonky/Lee, Jinyoul (An ERP implementation case study from a knowledge transfer perspective, 2000): An ERP implementation case study from a knowledge transfer perspective, in: Journal of Information Technology 15 (2000), 4, 281–288, https://doi.org/10.1080/02683960010009060 Moore, Geoffrey A. (Living on the fault line, 2002): Living on the fault line: Managing for shareholder value in any economy, Rev. ed., New York, NY: HarperBusiness, 2002 Reich, B.H., Gemino, A, Sauer, C. (Modelling the knowledge perspective of IT projects, 2008): Modelling the knowledge perspective of IT projects, in: Project Management Journal 2008, 39, 4–14 The Standish Group International, Inc (CHAOS REPORT 2015, 2015): CHAOS REPORT 2015 (2015), https://www.standishgroup.com/sample_research_files/CHAOSReport2015Final.pdf Wang, E., Lin, C., Jiang, J.J., Klein, G. (Improving enterprise resource planning (ERP) fit to organizational process through knowledge transfer, 2007): Improving enterprise resource planning (ERP) fit to organizational process through knowledge transfer, in: International Journal of Information Management 2007 (2007), 27 742 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE TRANSFORMATION OF THE BPMN BUSINESS PROCESS MODEL INTO SMART CONTRACTS FOR THE HYPERLEDGER FABRIC ENVIRONMENT JANKO HRIBERŠEK University of Maribor, Faculty of organizational sciences, Kranj, Slovenia; e-mail: jhribersek@gmail.com Abstract Transformation of BPMN business process model will be a very important topic in the future of the Hyperledger Fabric blockchain environment. Machine transformation can increase the quality of transformation and thus reduce errors. The research paper first describes BPMN and the Hyperledger Fabric environment, what smart contracts are and why they are so important. In the second part, the raw transformation model is described, where the inputs for the transformations are BPMN and the metadata file, and the result is a smart contract written in Java that can be imported into the Hyperledger Fabric environment. DOI https://doi.org/10.18690/978-961-286-485-9.53 ISBN 978-961-286-485-9 Keywords: BPMN, transformation, blockchain, hyperledger 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 744 1 Introduction Blockchain technology is revolutionizing the creation of scalable information systems and diverse applications by incorporating increasingly popular artificial intelligence, cloud computing, and large databases (Lu, 2019). The possibilities of using blockchain technology are being explored by various industries, so it is expected to spread to all sectors of industry. The proposal addresses the problem of machine conversion of a business process model into an executable language with Hyperledger Fabric smart contracts for blocks with permissions, where the model is written in the standard notation for BPMN 2.0 modelling. Solving this problem would significantly reduce the time required to convert a business process into a smart contract. This would reduce conversion costs, increase the security of business processes, and reduce the number of errors when converting to executable code. The adoption of blockchain technology would increase the traceability of the process. There would be no need to create an additional audit trail because records in the blockchain are never deleted. They are only added, and, in this way, it is always possible to revisit all stored values in the blockchain. There are few entries in the literature on this transformation (López-Pintado et al., 2018), and a similar experiment from 2019 (Lopez-Pintado et al., 2019) is related to BPMN and the Ethereum environment. Therefore, in the following problem, we analyzed the properties of BPMN and the blockchain environment with a focus on Hyperledger Fabric. 2 Problem definition 2.1 Business Process Modelling and Notation (BPMN) The Object Management Group (OMG, 2013) has developed a standard Business Process Model and Notation (BPMN). The main goal of BPMN is to provide a record that is easily understood by all business users, from the business analysts who create the initial process designs to the technical developers responsible for implementing the technology that will implement those processes to the business people who will manage and monitor those processes. BPMN creates a standardized bridge for the gap between business process design and implementation. Another goal of BPMN is to ensure that eXtensible Markup Language (XML) languages designed for business process execution, such as WSBPEL (Web Services Business J. Hriberšek: Transformation of the BPMN Business Process Model into Smart Contracts for the Hyperledger Fabric Environment 745 Process Execution Language), can be visualized with a business-oriented data set. BPMN provides an easy way to share process information with other companies, users, process contractors, customers, and suppliers. BPMN is widely used to graphically represent business process artifacts such as start, end, flow, activity, event, and transition. The model, written in BPMN syntax, formally represents a graph with nodes and links. The BPMN syntax also allows the definition of conditions for the transition from one node to another. Any markup language can be used to write it. The Object Management Group used the scalable XML markup language (OMG, 2013) in its development. The markup language itself has no execution capability, so BPMN is used as the top, contextual layer for automated mapping into an executable language. The middle layer of mapping is called Business Process Execution Language (BPEL) and at the time of its creation supported Service Oriented Architecture (SOA) or even more explicitly Web-based Services (WEB service) via the Web Service Description Language (WSDL). The lowest layer is an executable language that can communicate with a WEB service usually this is bytecode translated into Java. The process of orchestrating a business process—that is, transforming BPMN to executable (Java) code is only partially automated, time-consuming, and the risk of errors is high. 2.2 Blockchain technology In the near future, blockchain technology will become a powerful tool for use in Industry 4.0 as it integrates and brings together architecture, technology, devices, and other related things to deliver high-quality products and services (Lu, 2019). Blockchain will also be important in the upcoming Industry 5.0. It is a new production model based on the interaction between people and machines. It emphasizes the standard of living, creativity and high quality of customized products. (Rada, 2018) Blockchain technology became interesting with the release of the first cryptocurrency, Bitcoin. The electronic payment system is based on cryptological evidence rather than trust and allows two willing parties to transact directly without the involvement of a trusted third party (Nakamoto, 2008). From the cryptocurrency environment, blockchain technology has leapt to a higher level with the advent of the Ethereum platform, which allows for decentralized application replication. The 746 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE novelty of the Ethereum platform was the smart contracts implemented in the Solidity and Vyper languages. The further development of blockchain technology is moving towards private blockchain environments, where users are authenticated when they integrate into the blockchain environment (private environment or permissioned environment). The immutability and transparency of blockchain technology reduces human error and the need for manual intervention in database conflict situations. Blockchain can help streamline business processes by eliminating the duplication of data management activities (Tuan et al., 2018). Despite its popularity, blockchain technology still faces fundamental problems in managing transactions that are somewhat like those of traditional databases. Sharma et al. (2019) cite the Hyperledger Fabric blockchain platform as an example where parallel transaction processing can be compared to concurrency control mechanisms in traditional databases (Sharma et al., 2019). In a permissioned environment, a smart contract plays an important role. The Hyperledger Fabric platform is one of the representatives of the latest generation of blockchain environments, which aims to upgrade cross-industry technologies. In this cross-industry environment, smart contracts supported by Hyperledger Fabric play an important role. In addition, the Hyperledger Fabric platform contains many advanced functionalities. It is possible to run distributed applications written in general standard programming languages without depending on the internal cryptocurrency. In previous blockchain platforms, smart contracts were written in specific languages. The flexibility is enabled in Hyperledger Fabric with the blockchain design itself and does not consume resources or reduce hardware performance (Androulaki et al., 2018). Information solutions based on blockchain technology have been introduced in quite different sectors over the last five years. Solutions have been released in electricity marketing (Knirsch et al., 2019; Silva et al., 2019), finance (Duong-Trung et al., 2019; G. S. Group, 2016; Kabra et al., 2020; Nguyen et al., 2020; Wang et al., 2019), computing (Elghaish et al., 2020), law (Truong et al., 2019), food production and processing (Kumar et al., 2020), manufacturing (Sund et al., 2020), transportation (Naerland et al., 2017), and healthcare (Niu et al., 2020; Tanwar et al., 2020). J. Hriberšek: Transformation of the BPMN Business Process Model into Smart Contracts for the Hyperledger Fabric Environment 2.3 747 Smart contracts in the Hyperledger Fabric environment A smart contract is a business logic that operates on a chain of blocks. They can be as simple as updating data or as complex as implementing built-in contract terms. There are two different types of smart contracts (Hyperledger Architecture, Volume II, Smart Contacts, n.d.):   With built-in smart contracts the business logic of network certifiers is established before the network goes live. On-chain smart contracts introduce the business logic as a transaction that is added to the blockchain and executed each time the transaction is invoked. With on-chain smart contracts, the execution code of the business logic becomes part of the ledger. The implementation of smart contracts in the Hyperledger Fabric environment is divided into three segments:    The input contains the contract code, the transaction request, the possible dependency of the transaction, and the current state of the general ledger. The contract interpreter contains the current state of the general ledger and the program code of the smart contract. Outputs are generated only if the request was correct and confirmed. The output contains the new status and the side effects of the executed smart contract. The smart contract layer is responsible for processing transaction requests and determining whether transactions are valid according to the specified business logic (Hyperledger Architecture, Volume II, Smart Contacts, n.d.). It validates each request by ensuring compliance with the policy and contract for a given transaction. Invalid requests are rejected and may be excluded from the block depending on the framework. Transactions are considered either not yet begun or not yet completed. The transaction cannot be completed in parts. This ensures the integrity of transactions. Smart contracts can determine the dependencies between multiple transactions that need to be executed individually. These dependencies can be implicit or explicit. 748 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE With implicit reference, it is usually impossible to determine the order of transactions. Bitcoin solves this by repeatedly attempting to use the transaction, which results in transactions being executed one at a time until their preconditions are met. Such behaviour requires a transaction transfer component (pool, mempool) to take care of uselessly expiring transactions. With an explicit reference, the user specifies the transaction identifier. 2.1.1 Communication of a smart contract with other architectural layers The smart contract layer works closely with the consensus layer. Specifically, the smart contract layer receives a proposal from the consent layer. This proposal specifies which contract to execute, the details of the transaction, including the identity and credentials of the entity requesting the execution of the contract, and any transaction dependencies. The smart contract layer uses the current general ledger balance and the entry from the consent layer to confirm the transaction. During transaction processing, the smart contract layer uses the identity service layer to authenticate and authorize the entity requesting the smart contract execution. This ensures two things: The entity is known on the blockchain network and the entity has sufficient access to execute the smart contract. Identity can be provided through a variety of methods: simple identities, ledger-managed identities and credentials, anonymous credentials, or managed identity services from a third-party certificate authority. After processing the transaction, the smart contract layer returns the transaction acceptance status (transaction accepted or rejected). If the transaction is accepted, the smart-contract layer also returns the regularity certificate, delta state, and any optional ordering instructions required for transaction dependency compliance. Delta states include sets of changes and any side effects that should occur once the partners have successfully completed the transaction. J. Hriberšek: Transformation of the BPMN Business Process Model into Smart Contracts for the Hyperledger Fabric Environment 2.1.2 749 Integrity and availability of smart contracts To ensure the integrity and availability of the blockchain network and the smart contract layer, enterprise blockchain networks must control access to certain resources. Since smart contracts are programs, they are exposed to malicious attacks, coding errors, and poor design. Disrupting the execution of program code in any of these areas can compromise the integrity or availability of the blockchain system. Hyperledger recommends the following four security precautions for use with a smart contract layer to ensure integrity and availability:  Denial of Service Protection   Sandboxing Resource Management / Flow Control and Application Lifecycle Management (ALM) In the design phase of this predisposition, we found two recent studies on the successful transformation of BPMN to Ethereum (Lopez-Pintado et al., 2019; López-Pintado et al., 2018), and none on the transformation of Hyperledger Fabric, which is a more technology-aware technology. 3 Methodology To conduct the research, we will use:    Study the relevant literature on BPMN and Hyperledger Fabric. Software engineering, which will include problem definition, programming and testing using the white box method. Verification and validation of the developed solution on selected cases of business processes. Verification (checking conformance to specification) will be performed after each activity that results in a test artifact and validation will be performed with key stakeholders of a given business process. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 750 In the context of software engineering, a core and language for software engineering methods called Essence is used, which was developed by the Object Management Group (Object Management Group, 2018). It is the result of the SEMAT initiative (Software Engineering Methods and Techniques), which states on its website (Http://Semat.Org, n.d.) that Essence can be used by researchers to define a problem that needs to be understood and explored as part of an effort to develop a general theory of software engineering (cit. " Researchers can use Essence as a definition of the problem they want to understand and explore in their efforts to develop a General Theory of Software Engineering."). The current version of the Essence core and language is 1.2, with beginnings dating back to 2012 (Jacobson et al., 2012). Ivar Jacobson et. al. (Jacobson et al., 2019) state that software complexity is not the only reason for the "software crisis". They believe that developing solutions is not only about programming, but also about planning activities, managing a group of stakeholders, and effective communication and cooperation (p. 18). Ian Sommerville in the preface of the publication talks about Essence as a metamethod because the universality of the concepts involved allows it to be used in a broader range of domains than current methods, and Grady Booch says that he and his friends Ivar Jacobson and Jim Rumbaugh have tried to help developers with UML (Universal Modelling Language), in which some things are set right, others wrong, and that Essence is considered a set of basic software engineering abstractions. Jacobson et al. (2019) freely admit that software engineering is still in the process of developing a suitable theory that encompasses both descriptive and predictive aspects. Essence is seen as an important descriptive theory, while Tarpit (Johnson & Ekstedt, 2016) is ascribed the role of predictive theory. The core of Essence otherwise includes:    Alphas - descriptions of things we manage, develop, and use in the process of development, maintenance, and support. Alphas can have subalphas, Activity Spaces - representations of important things that need to be done in the process of developing, maintaining, and supporting software solutions; and Competencies - a representation of the key skills required for all activities. J. Hriberšek: Transformation of the BPMN Business Process Model into Smart Contracts for the Hyperledger Fabric Environment 751 In the current state of research (dissertations) are:    Alpha - business process models in BPMN, transformation rules, smart contracts in the chosen programming language (probably Java and/or Javascript), a set of metadata about the business processes under study, Activity spaces - detailed acquaintance with Hyperledger Fabric, contexts of business process models, variants of developed program code and whitebox testing, and Competences - explicit and implicit knowledge of programming languages BPMN, Hyperledger Fabric, Java and Javascript. The Essence language specification includes:   Headings - formal names of language elements, Descriptions - an informal description of a language element,   Generalizations - a structure of classes and parent classes, Attributes - a list of attributes with their data types,   Associations - a list of links that the language element has, Invariants - informal verbal descriptions of correctly formed rules and Object Constraint Language (OCL) terms, Additional Operations - descriptions of additional operations for correctly formed rules, and Semantics - a detailed description of the elements in natural language.   Language specifications with Essence cannot be defined well enough at the current stage of research, but they will be developed at a later stage. 4 Expected results The primary research question of the dissertation proposal is: How can the business process model described in BPMN with certain metadata be automatically and formally converted into the execution code of smart contracts in the Hyperledger Fabric blockchain environment? 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 752 In line with the research question, the objectives are:  investigate BPMN and Hyperledger Fabric.  in the case of a business process, define the steps and procedures for transforming BPMN into smart contracts. test the sequence of steps and procedures for the transformation of several other standard business processes. identify the minimum set of metadata relevant for the transformation.    develop software that formally correctly performs the transformation from BPMN to Hyperledger Fabric smart contracts with permitted access. The achieved goals of the research will enable the understanding of the process of language conversion for data specification into a Turing universal machine. The developed approach and application will be useful in:   the basic research of business informatics practice for business management, specifically for enhancing business performance. The transformation of the business process model from BPMN to a smart contract will be presented and tested in detail. A minimal set of metadata is identified to define the details in the Hyperledger Fabric environment. 5 Future development At this point, development is still in the first stage. Further development will include the following development steps:   development of a software module for the identification of individual BPMN building blocks (event, activity, gateway, sequence flow) development of a transformation library for individual basic BPMN building blocks. J. Hriberšek: Transformation of the BPMN Business Process Model into Smart Contracts for the Hyperledger Fabric Environment   753 development of a solution that prepares a transcription of the BPMN model from the XML format into an intermediate format arranged in the order of implementation of the individual activities captured in the BPMN. a transformation program that will create software in Java from a list of sequential activities and using a metadata file. References Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., De Caro, A., Enyeart, D., Ferris, C., Laventman, G., Manevich, Y., Muralidharan, S., Murthy, C., Nguyen, B., Sethi, M., Singh, G., Smith, K., Sorniotti, A., Stathakopoulou, C., Vukolić, M., … Yellick, J. (2018). Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. 1–15. https://doi.org/10.1145/3190508.3190538 Duong-Trung, N., Ha, X. S., Phan, T. T., Trieu, P. N., Nguyen, Q. N., Pham, D., Huynh, T. T., & Le, H. T. (2019). Multi-sessions mechanism for decentralized cash on delivery system. International Journal of Advanced Computer Science and Applications, 10(9), 553–560. https://doi.org/10.14569/ijacsa.2019.0100973 Elghaish, F., Abrishami, S., & Hosseini, M. R. (2020). Integrated project delivery with blockchain: An automated financial system. Automation in Construction, 114(November 2019), 103182. https://doi.org/10.1016/j.autcon.2020.103182 G. S. Group. (2016). Blockchain: The New Technology of Trust. https://www.goldmansachs.com/insights/pages/blockchain/ http://semat.org. (n.d.). Retrieved September 10, 2020, from http://semat.org Hyperledger Architecture, Volume II, Smart Contacts. (n.d.). Retrieved January 6, 2019, from https://www.hyperledger.org/wpcontent/uploads/2017/08/Hyperledger_Arch_WG_Paper_1_Consensus.pdf Jacobson, I., Lawson, H. “Bud,” Ng, P.-W., McMahon, P. E., & Goedicke, M. (2019). The Essentials of Modern Software Engineering: Free the Practices from the Method Prisons! In The Essentials of Modern Software Engineering: Free the Practices from the Method Prisons! Association for Computing Machinery. https://doi.org/10.1145/3277669 Jacobson, I., Ng, P. W., McMahon, P. E., Spence, I., & Lidman, S. (2012). The essence of software engineering: The SEMAT kernel. Queue, 10(10), 40–51. https://doi.org/10.1145/2381996.2389616 Johnson, P., & Ekstedt, M. (2016). The Tarpit - A general theory of software engineering. Information and Software Technology, 70, 181–203. https://doi.org/10.1016/j.infsof.2015.06.001 Kabra, N., Bhattacharya, P., Tanwar, S., & Tyagi, S. (2020). MudraChain: Blockchain-based framework for automated cheque clearance in financial institutions. Future Generation Computer Systems, 102, 574–587. https://doi.org/10.1016/j.future.2019.08.035 Knirsch, F., Unterweger, A., & Engel, D. (2019). Implementing a blockchain from scratch: why, how, and what we learned. Eurasip Journal on Information Security, 2019(1). https://doi.org/10.1186/s13635-019-0085-3 Kumar, A., Liu, R., & Shan, Z. (2020). Is Blockchain a Silver Bullet for Supply Chain Management? Technical Challenges and Research Opportunities. Decision Sciences, 51(1), 8–37. https://doi.org/10.1111/deci.12396 Lopez-Pintado, O., Dumas, M., Garcia-Banuelos, L., & Weber, I. (2019). Interpreted execution of business process models on blockchain. Proceedings - 2019 IEEE 23rd International 754 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Enterprise Distributed Object Computing Conference, EDOC 2019, 206–215. https://doi.org/10.1109/EDOC.2019.00033 López-Pintado, O., García-Bañuelos, L., Dumas, M., Weber, I., & Ponomarev, A. (2018). Caterpillar: A business process execution engine on the Ethereum blockchain. Software - Practice and Experience, 00, 1–45. https://doi.org/10.1002/spe.2702 Lu, Y. (2019). The blockchain: State-of-the-art and research challenges. Journal of Industrial Information Integration, 15(January), 80–90. https://doi.org/10.1016/j.jii.2019.04.002 Naerland, K., Müller-Bloch, C., Beck, R., & Palmund, S. (2017). Blockchain to Rule the Waves Nascent Design Principles for Reducing Risk and Uncertainty in Decentralized Environments. Icis, 1–16. https://www.researchgate.net/profile/Christoph_Mueller Bloch/publication/319990622_Blockchain_to_Rule_the_Waves__Nascent_Design_Principles_for_Reducing_Risk_and_Uncertainty_in_Decentralized_Envir onments/links/59c8df97aca272c71bcdc61f/Blockchain-to-Rule-t Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Journal for General Philosophy of Science, 39(1), 53–67. https://doi.org/10.1007/s10838-008-9062-0 Nguyen, B. M., Dao, T. C., & Do, B. L. (2020). Towards a blockchain-based certificate authentication system in Vietnam. PeerJ Computer Science, 2020(3). https://doi.org/10.7717/peerj-cs.266 Niu, S., Chen, L., Wang, J., & Yu, F. (2020). Electronic Health Record Sharing Scheme with Searchable Attribute-Based Encryption on Blockchain. IEEE Access, 8, 7195–7204. https://doi.org/10.1109/ACCESS.2019.2959044 Object Management Group. (2018). Kernel and Language for Software Engineering Methods (Essence). 2007 4th IEEE International Workshop on Visualizing Software for Understanding and Analysis, Versión 1.2, 300. https://www.omg.org/spec/Essence/1.2 OMG. (2013). Object Management Group, Business process modeling notation (BPMN) version 2.0.2. Object Management Group, December, 134. https://doi.org/10.1007/978-3-642-33155-8 Rada, M. (2018). INDUSTRY 5.0 definition – Michael Rada – Medium. https://medium.com/@michael.rada/industry-5-0-definition-6a2f9922dc48 Sharma, A., Agrawal, D., Schuhknecht, F. M., & Dittrich, J. (2019). Blurring the lines between blockchains and database systems: The case of hyperledger fabric. Proceedings of the ACM SIGMOD International Conference on Management of Data, 105–122. https://doi.org/10.1145/3299869.3319883 Silva, F. C., Ahmed, M. A., Martínez, J. M., & Kim, Y. C. (2019). Design and implementation of a blockchain-based energy trading platform for electric vehicles in smart campus parking lots. Energies, 12(24). https://doi.org/10.3390/en12244814 Sund, T., Lööf, C., Nadjm-Tehrani, S., & Asplund, M. (2020). Blockchain-based event processing in supply chains—A case study at IKEA. Robotics and Computer-Integrated Manufacturing, 65(March), 101971. https://doi.org/10.1016/j.rcim.2020.101971 Tanwar, S., Parekh, K., & Evans, R. (2020). Blockchain-based electronic healthcare record system for healthcare 4.0 applications. Journal of Information Security and Applications, 50. https://doi.org/10.1016/j.jisa.2019.102407 Truong, N. B., Sun, K., Member, S., Lee, G. M., & Member, S. (2019). GDPR-Compliant Personal Data Management : A Blockchain-Based Solution. 15(March), 1–13. Tuan, T., Dinh, A., Liu, R., Zhang, M., Chen, G., Dinh, T. T. A., Liu, R., Zhang, M., Chen, G., Ooi, B. C., & Wang, J. (2018). Untangling blockchain: A data processing view of blockchain systems. IEEE Transactions on Knowledge and Data Engineering, 30(7), 1366–1385. https://doi.org/10.1109/TKDE.2017.2781227 Wang, H., Guo, C., & Cheng, S. (2019). LoC — A new financial loan management system based on smart contracts. Future Generation Computer Systems, 100, 648–655. https://doi.org/10.1016/j.future.2019.05.040 KNOWLEDGE RISKS IN DIGITAL SUPPLY CHAINS PROPOSAL OF A DISSERTATION PROJECT AT THE SCHOOL OF BUSINESS, ECONOMICS AND SOCIAL SCIENCES UNIVERSITY OF GRAZ JOHANNES P. ZEIRINGER University of Graz, BANDAS-Center, Universitätsstraße 15 F3, 8010 Graz, Austria; e-mail: johannes.zeiringer@uni-graz.at, Abstract The digital transformation changes the way how organizations exchange data in supply chains (SC). Data traditionally shared, is enriched by detailed data sets captured by sensors in the production itself. Advanced data analytic approaches make it possible to extract knowledge from such data sets and thus increase the risk that competitive knowledge unintentionally spills over. From a knowledge management perspective, little attention is paid to such knowledge risks arising from data-centric collaborations. Hence, this proposed PhD project aims at investigating this, by using the overall method of Design Science Research. The project focuses on digital SC, as data-centric collaborations play a central role within them. To contribute to knowledge research, a framework is being sought. The elaborated framework should allow an assessment of knowledge risks and support the selection of suitable measures and it should contribute on how to support the management of knowledge risks in digital SC. DOI https://doi.org/10.18690/978-961-286-485-9.54 ISBN 978-961-286-485-9 Keywords: knowledge risks, knowledge protection, digital supply chain, datacentric collaboration 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 756 1 Introduction The digital transformation offers many new opportunities to improve the operation of supply chains (SC) (Vial, 2019). This has led to innovations and changes in different industry sectors and equally affects knowledge management (KM) and supply chain management (SCM) (Schniederjans et al., 2019). Digitalization means the use of digital technologies to change or improve a business model and provide new revenue and value-producing opportunities (Mäkiö et al., 2018). It is not only penetrating SCM increasingly but also, more and more firms are inter-organizational connected and share data along the SC (Kazantsev et al., 2018), (North et al., 2019). From the perspective of knowledge protection, this increasing exchange of comprehensive data sets needs closer attention, because it is a possible gateway to new knowledge risks (Ilvonen et al., 2018), (Durst & Zieba, 2019). Digitalization enhances the number of connected devices intensely. Implementation of advanced digital technologies (IoT, blockchain, predictive analytics, etc.) determine the digital SC. This results in each partner generating much more data which is shared with collaborators. Also, due to autonomous systems and affordable sensors, the amount of data which is being generated and shared has exploded in the past decade (Spanaki et al., 2018), (Brettel et al., 2014). Sensors in industrial ecosystems control and monitor processes of industrial production and, as part of it, generate and share data continuously (Chen et al., 2016). As a result digital SC emerge, which does not aim at the difference of physical or digital goods or services, but rather how processes within the SC are innovated and changed by modern technologies (Büyüközkan & Göçer, 2018). A digital SC includes a comprehensive exchange of data and is a multi-layered production network that can be flexibly and quickly optimized and (re)composed (Zeiringer J. P. & Thalmann S., 2020). Knowledge is a key asset within organizations and a source of an organizations competitive advantage (Grant, 1996; Nonaka, 1994). With digital transformation going on, also knowledge management needs to be reopened as new issues arise. Sharing knowledge outside the company, in data-centric collaborations such as alliances, networks, joint ventures or SC partnerships, companies must take protective measures when transferring knowledge across companies, as knowledge risks arise (Krogh, 2012), (Durst & Zieba, 2017). As knowledge is mobile, it is difficult to protect. Especially in collaborations, different people have access to J. P. Zeiringer: Knowledge Risks in Digital Supply Chains 757 valuable knowledge (Elliott et al., 2019). It is important that no unintentional outflow of knowledge should take place. Knowledge protection therefore concentrates on (1) preventing knowledge spill-over, (2) reducing the visibility of knowledge and (3) unwanted knowledge spill-over (Manhart & Thalmann, 2015). Through the intensive exchange of data in inter-organizational collaborations and especially knowledge-intensive collaborations, companies need to find a suitable trade-off between the benefits and risks of collaborations. Research on this tradeoff is rare and more research on inter-organizational knowledge transfer, respectively knowledge protection is urgently needed (Hernandez et al., 2015), (Loebbecke et al., 2016), (Manhart & Thalmann, 2015). As collaboration involves the exchange of data, knowledge risks emerge, especially in data-centric collaborations. Unless these risks are eliminated or managed, they leave a company fragile. Nevertheless, data is a key asset to partners in SC and a source to support SC activities. The goal of data-centric collaborations is to minimize the manual intervention in production processes in order to improve safety, efficiency and sustainability of production through automation (Vyatkin, 2013). With modern data science approaches comprehensive data sets collected from industrial ecosystems, can be continuously analysed to gain useful knowledge for industrial automation (Chen et al., 2016). Hence, SC processes can be optimized, and quality improvements achieved (Kaiser et al., 2020). 2 Problem definition Traditionally, data for order management and logistics management are exchanged in clearly specified and controllable ways (Min et al., 2019). Regarding digitalization, not only increasingly more data is being exchanged, but this exchange of data is becoming more important for the core operations areas of companies. Modern data analytics methods make it possible and affordable to analyse such data sets and to extract knowledge about these sensitive areas of operation (Schniederjans et al., 2019), (Birkel & Hartmann, 2019). Besides possible benefits of the increased sharing of comprehensive data sets, also risks of losing competitive advantage could arise. Therefore, the risk of losing competitive knowledge through data-centric collaborations in SC is needed to be researched. Furthermore, organizations should 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 758 carefully balance their activities to promote and control knowledge sharing, to protect their competitive knowledge (Ilvonen et al., 2018). Referring to KM, inter-organizational knowledge sharing has a strategic dimension and requires a careful balancing of knowledge sharing and protection as otherwise a loss of competitive knowledge could arise (Loebbecke et al., 2016). Due to, among other things, digitalization, organizational and national boundaries become more blurred and knowledge can be diffused much easier. Openness and interorganizational collaboration build the foundation of rich, contextualized and sustainable knowledge sharing activities among networked partners within and beyond organizational boundaries (Ilvonen et al., 2018). Referring to knowledge sharing, corporations increasingly rely on the know-how and expertise of external organizations in order to innovate, to remain competitive and to improve performance within the SC (Zacharia et al., 2019). So far, research focuses mainly on knowledge sharing and protection between persons (representing organizations) in the form of implicit and explicit knowledge exchange (Loebbecke et al., 2016). Little is known about knowledge risks arising from knowledge discovery of huge and comprehensive data sets shared in the course of their digital SC (Ilvonen et al., 2018), (North et al., 2019). In addition, there are efforts to research data and information security, but knowledge protection received little attention so far (Manhart & Thalmann, 2015). Based on the following observations within this proposal and the current state of research, the research question (RQ) below results: How to support the management of knowledge risks in digital SC? 3 Methodology This project makes use of a mixed methods approach. Design science research (DSR) is used as the overall method (Hevner et al., 2004). In the field of IS, the relevance of research is often directly related to the development of IT artefacts (Peffers et al., 2007). DSR is characterized by behavioural and design science. The basic principle in DSR is that knowledge about a real existing problem is gained through the design and evaluation of a solution (Hevner et al., 2004). The result of the research is not only a design-oriented solution, but also a scientific contribution J. P. Zeiringer: Knowledge Risks in Digital Supply Chains 759 in the form of frameworks or models (March & Smith, 1995). In order to ensure this contribution to theory, all phases of design science must be rigorously carried out. This requires that both the design proposals and the cause-effect relationships must be empirically evaluated (Iivari, 1991). The research approach will be iterative, with each iteration having elements of (1) identifying and answering problem formulations from the relevant use case, (2) designing artefacts supporting decision making, and (3) elements of rigor, with behavioural theory, and support from IS to KM, SCM, and decision support systems research (A. R. Hevner, 2007). Referring to the stated research problem, the development of a framework, elaborated based on DSR, would be most suitable. 760 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Figure 1: DSR timeline J. P. Zeiringer: Knowledge Risks in Digital Supply Chains 761 Figure 1 shows which area the planned papers are assigned to and what their direct and indirect interaction is. The consecutive research papers are listed in the following. 3.1 Paper 1: Structured Literature Review At first, a structured literature review by Webster and Watson (Webster & Watson, 2002) has been conducted (see chapter 4). In order to elaborate the state of the art in the research field, this is a common process in the information systems (IS) area (Webster & Watson, 2002). Furthermore, a literature review helps to identify the possible research gap. The RQ was regarding which kind of knowledge risks arise from data-centric collaborations and what suitable countermeasures are, see (Zeiringer J. P. & Thalmann S., 2020). The literature review is located at the rigor area within the DSR and an important knowledge base at the beginning of the dissertation project (A. R. Hevner, 2007). 3.2 Paper 2: Interview Study on Knowledge Risk Identification For this work an interview study by (Patton, 2005) has been conducted (see chapter 4), which is part of the relevance cycle of the DSR (A. R. Hevner, 2007). It is planned to show a detailed requirement analysis for helping to develop the framework. The interview study tried, based on the literature review, to identify different approaches on how to handle knowledge risks in digital SC. Data-centric collaborations were focused, and the balancing of knowledge sharing and protection. There were two staged interviews held with 15 Experts and the elaborated paper has been submitted by now. Based on the literature review, the risks were theoretically elaborated and analysed; with the interview study, the risks should become more tangible and comprehensible in organizational context. The RQ will be, which knowledge risks arise from datacentric collaborations and which current protection mechanisms are available in order to protect knowledge. Also, it will be shown, if there are already strategies on how to balance sharing and protection and if there are security action plans for what to do after an incident (Thalmann & Ilvonnen, 2020). 762 3.3 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Paper 3: Technical and Organizational Countermeasures First possible frameworks for technical and organizational countermeasures were deduced from literature and synthesized in a rigor paper. Insights from the first literature review and the interview study were used to develop actionable countermeasures. Also, it is helpful to gather and use theoretical sources to gain creative ideas for the design cycle (A. R. Hevner, 2007). The RQ is about the possible prevention of unwanted knowledge incidents with help of technical and organizational countermeasures. It also tries to identify measurements that are suitable and easy actionable. The method was the structured literature review, according to (Vom Brocke et al., 2015). 3.4 Paper 4: Questionnaire Survey on Knowledge Risks Based on the research paper on technical and organizational countermeasures and indirectly the case study, which were carried out in the previous steps, questions for the interviews and online survey can be clearly formulated and the interview study and survey can thus be carried out in a standardised form. The aim of the questionnaire study is to get more details on the problems to be investigated, regarding the identification of them and current protection mechanisms. The target group are experts: SC managers, risk managers or managing directors. After developing first countermeasures, the survey will cover the field of relevance within the DSR again (A. R. Hevner, 2007). The RQ will focus on how organizations are currently deal with arising knowledge risks, if knowledge risks in digital SC represent a barrier to digitalization and to what extent training can help identify knowledge risks in data-centric collaborations. Also, there will be a focus on how to support employees in recognizing knowledge risks in data sets. Together with the insights of the reviews and the interview study, a first requirement analysis will be conducted. In order to construct a framework, it is necessary to focus on the design cycle after the case study (A. R. Hevner, 2007). It is important to note first intermediated findings and develop a first design concept for needed requirements. This will be processed in an internal working paper and helps to set focus on the fifth paper. The RQ will be to define first requirements for an effective knowledge protection management framework in digital SC. The method will be J. P. Zeiringer: Knowledge Risks in Digital Supply Chains 763 user-centred design, according to (Chadia Abras et al., 2004). This will happen simultaneously to the questionnaire study and be a preparation before going into paper 5. 3.5 Paper 5: Framework for Balancing Knowledge Sharing and Knowledge Protection Based on the findings by then, a framework for balancing knowledge sharing and knowledge protection will be developed. Within this design part of the project, all requirements gathered so far will be processed for this paper (A. R. Hevner, 2007). The main focus will be on the extent to which technical and organizational measures can be used to manage knowledge risks in digital SC. The RQ will be on which technical or organizational measures can be used to manage knowledge sharing and protection in digital SC and how should a framework be designed to be successfully implemented. The method will be the user-centred design again, according to (Chadia Abras et al., 2004). 3.6 Paper 6: Evaluation of Framework Finally, the evaluation of the framework will be conducted which, referring to the DSR, is assigned to the relevance circle again (A. R. Hevner, 2007). In DSR, it is important to test the developed artefact in the field, to see if it is appropriate. The results will show, if the artefact is suitable or another iteration is needed (A. R. Hevner, 2007). The evaluation should be executed by an evaluation study which is based directly on the developed framework and the help of the insights gained from the experts. The possible RQ and will potentially be, if the developed framework increases the decision quality of managing knowledge risks within digital SC. The method will be a two staged interview study followed by an (online) survey, according to (Bortz & Döring, 2006). 4 Preliminary/Expected results As a first step, the state of the art had to be raised. Therefore, a literature review according to (Webster & Watson, 2002) was conducted and processed in a prime paper, see (Zeiringer J. P. & Thalmann S., 2020). In the paper, knowledge risks in data-centric collaborations as part of digital SC were dealt with. Traditional SC risk 764 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE management was used to identify causes of risks, risks themselves and potential countermeasures, which were then adapted to digital SC. One of the main insights of this review was that there is little research regarding the field of knowledge risks in data-centric collaborations, which indicated that there is a demand for further research on this main aspect of digital transformation. Furthermore, data-centric collaboration itself is not adequately dealt with so far, as there is still a focus on traditional risks and hardly on intangible risks. It was discovered that there is need for a knowledge risk management and that future research should investigate which kind of measures are meaningful to balance knowledge sharing and protection in data-centric collaborations (Zeiringer J. P. & Thalmann S., 2020). In addition, research shows that the resulting uncertainty creates a barrier to digitalization (North et al., 2019). The Interview study showed that organizations use different approaches in datacentric collaborations to encounter knowledge risks. It is shown that all three approaches lead to different perspectives of sharing and protection of knowledge within the digital SC. The approaches can be viewed as steps of development, each as one step further in building awareness on knowledge risks and to balance knowledge sharing and protection more holistic. Furthermore, it is shown that minimizing risk can stifle innovation and there is a need for more research [being reviewed]. The second literature review deduced possible actions from literature, to show what is available and what is still missing in order to tackle knowledge risks in data-centric collaborations. In order to build on this and contribute to knowledge research, a framework will be sought after this. The elaborated framework should allow an assessment of knowledge risks and support the selection of suitable measures in practice. It should support the responsible person in the sense of decision support but should not automate the decision (Alter, 2004). With regard to DSR, several cycles of design, evaluation in practice and theoretical reflection should provide a solution to the problem rather than just explore it. Possible developed artefacts could be, e.g., selection lists, visualizations, algorithms or practices. Risks resulting from data exchange can be managed by organizational, technical and/or legal measures. The proposed research project uses this subdivision as a starting point and investigates the simultaneous management of knowledge sharing and knowledge protection in digital SC. J. P. Zeiringer: Knowledge Risks in Digital Supply Chains 765 Regarding the theory of knowledge sharing, new categories of knowledge risks that emerge from the growing need to share larger and more comprehensive data sets from which competitive knowledge can be discovered, should be identified and investigated. Also, the data-centric perspective will provide new insights to knowledge sharing theory as well as knowledge risk management. An appropriate strategy to manage knowledge risks, taking data-centric collaborations into account, will be sought (Zeiringer J. P. & Thalmann S., 2020). The expected contribution should be a framework on how to support the management of knowledge risks in digital SC. 5 Future development The whole project will be split into seven papers. The first paper was a literature review, which has already been accepted to the conference Wirtschaftsinformatik 2020 (Zeiringer J. P. & Thalmann S., 2020). The second paper was an interview study (Patton, 2005). Slightly delayed, the third paper, a literature research about technical countermeasures by (Vom Brocke et al., 2015), was written and is submitted in the begin of 2021. At the same time, the planned survey will be conducted and processed in a fourth paper by mid-2021. The elaboration on a working paper starts in Spring 2021, which will help to define design requirements. The final framework is planned to be processed in a paper by spring 2022. Finally, the evaluation of the framework starts in 2022 and ends in June 2022, by submitting the sixth paper. References Alter, S. (2004). A work system view of DSS in its fourth decade. Decision Support Systems, 38(3), 319–327. https://doi.org/10.1016/j.dss.2003.04.001 Birkel, H. S., & Hartmann, E. (2019). Impact of IoT challenges and risks for SCM. Supply Chain Management: An International Journal, 24(1), 39–61. https://doi.org/10.1108/SCM-03-20180142 Bortz, J., & Döring, N. (2006). Forschungsmethoden und Evaluation. Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-33306-7 Brettel, M., Friederichsen, N., Keller, M., & Rosenberg, M. (2014). How Virtualization, Decentralization and Network Building Change the Manufacturing Landscape: An Industry 4.0 Perspective. International Journal of Mechanical, Aerospace, Industrial, Mechatronic and Manufacturing Engineering(8), 37–44. 766 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Büyüközkan, G., & Göçer, F. (2018). Digital Supply Chain: Literature review and a proposed framework for future research. Computers in Industry, 97, 157–177. https://doi.org/10.1016/j.compind.2018.02.010 Chadia Abras, Diane Maloney-krichmar, & Jenny Preece (2004). User-Centered Design. In In Bainbridge, W. Encyclopedia of Human-Computer Interaction. Thousand Oaks: Sage Publications. Publications. Chen, Y., Lee, G. M., Shu, L., & Crespi, N. (2016). Industrial Internet of Things-Based Collaborative Sensing Intelligence: Framework and Research Challenges. Sensors (Basel, Switzerland), 16(2), 215. https://doi.org/10.3390/s16020215 Durst, S., & Zieba, M. (2017). Knowledge risks - towards a taxonomy. International Journal of Business Environment, 9(1), Article 84705, 51. https://doi.org/10.1504/IJBE.2017.084705 Durst, S., & Zieba, M. (2019). Mapping knowledge risks: towards a better understanding of knowledge management. Knowledge Management Research & Practice, 17(1), 1–13. https://doi.org/10.1080/14778238.2018.1538603 Elliott, K., Patacconi, A., Swierzbinski, J., & Williams, J. (2019). Knowledge Protection in Firms: A Conceptual Framework and Evidence from HP Labs. European Management Review, 16(1), 179–193. https://doi.org/10.1111/emre.12336 Grant, R. M. (1996). Toward a knowledge-based theory of the firm. Strategic Management Journal, 17(S2), 109–122. https://doi.org/10.1002/smj.4250171110 Hernandez, E., Sanders, W. G., & Tuschke, A. (2015). Network Defense: Pruning, Grafting, and Closing to Prevent Leakage of Strategic Knowledge to Rivals. Academy of Management Journal, 58(4), 1233–1260. https://doi.org/10.5465/amj.2012.0773 Hevner, March, Park, & Ram (2004). Design Science in Information Systems Research. MIS Quarterly, 28(1), 75. https://doi.org/10.2307/25148625 Hevner, A. R. (2007). A Three Cycle View of Design Science Research. Scandinavian Journal of Information Systems, 87–92. Iivari, J. (1991). A paradigmatic analysis of contemporary schools of IS development. European Journal of Information Systems, 1(4), 249–272. https://doi.org/10.1057/ejis.1991.47 Ilvonen, I., Thalmann, S [Stefan], Manhart, M., & Sillaber, C. (2018). Reconciling digital transformation and knowledge protection: a research agenda. Knowledge Management Research & Practice, 16(2), 235–244. https://doi.org/10.1080/14778238.2018.1445427 Kaiser, R., Thalmann, S [Stefan], & Pammer-Schindler, V. (2020). An Investigation of Knowledge Protection Practices in Inter-organisational Collaboration. Protecting Specialised Engineering Knowledge with a Practice Based on Grey-box Modelling. VINE. Advance online publication. https://doi.org/10.1108/VJIKMS-11-2019-0180 Kazantsev, N., Pishchulov, G., Mehandjiev, N., Sampaio, P., & Zolkiewski, J. (2018). Formation of Demand-Driven Collaborations between Suppliers in Industry 4.0 Production Networks. 20th International Working Seminar on Production Economics. Krogh, G. von (2012). How does social software change knowledge management? Toward a strategic research agenda. The Journal of Strategic Information Systems, 21(2), 154–164. https://doi.org/10.1016/j.jsis.2012.04.003 Loebbecke, C., van Fenema, P. C., & Powell, P. (2016). Managing inter-organizational knowledge sharing. The Journal of Strategic Information Systems, 25(1), 4–14. https://doi.org/10.1016/j.jsis.2015.12.002 Mäkiö, J., Miroliubov, A., & Zhgun, V. (2018). Digitalization – quo vadis? SHS Web of Conferences, 44, 56. https://doi.org/10.1051/shsconf/20184400056 Manhart, M., & Thalmann, S [Stefan] (2015). Protecting organizational knowledge: a structured literature review. Journal of Knowledge Management, 19(2), 190–211. https://doi.org/10.1108/JKM-05-2014-0198 March, S. T., & Smith, G. F. (1995). Design and natural science research on information technology. Decision Support Systems, 15(4), 251–266. https://doi.org/10.1016/0167-9236(94)00041-2 Min, S., Zacharia, Z. G., & Smith, C. D. (2019). Defining Supply Chain Management: In the Past, Present, and Future. Journal of Business Logistics, 40(1), 44–55. J. P. Zeiringer: Knowledge Risks in Digital Supply Chains 767 https://doi.org/10.1111/jbl.12201 Nonaka, I. (1994). A Dynamic Theory of Organizational Knowledge Creation. Organization Science, 5(1), 14–37. https://doi.org/10.1287/orsc.5.1.14 North, K., Carvalho, A. de, Braccini, A., Durst, S., Carvalho, J., Gräslund, K., & Thalmann, S [S.] (2019). Information and knowledge risks in supply chain interactions of SMEs: Proceedings of the 10th International Conference on Practical Knowledge Management, Potsdam, Germany. Lecture notes on Informatics. Patton, M. Q. (2005). Qualitative Research. In B. Everitt & D. C. Howell (Eds.), Encyclopedia of statistics in behavioral science. Wiley. https://doi.org/10.1002/0470013192.bsa514 Peffers, K., Tuunanen, T., Rothenberger, M. A., & Chatterjee, S. (2007). A Design Science Research Methodology for Information Systems Research. Journal of Management Information Systems, 24(3), 45–77. https://doi.org/10.2753/MIS0742-1222240302 Schniederjans, D. G., Curado, C., & Khalajhedayati, M. (2019). Supply chain digitisation trends: An integration of knowledge management. International Journal of Production Economics, 107439. https://doi.org/10.1016/j.ijpe.2019.07.012 Spanaki, K., Gürgüç, Z., Adams, R., & Mulligan, C. (2018). Data supply chain (DSC): research synthesis and future directions. International Journal of Production Research, 56(13), 4447–4466. https://doi.org/10.1080/00207543.2017.1399222 Thalmann, S [S.], & Ilvonnen, I. (2020). Why should we investigate knowledge risks incidents? Lessons from four cases. Proceedings of 53rd Hawaii International Conference on System Sciences. Vial, G. (2019). Understanding digital transformation: A review and a research agenda. The Journal of Strategic Information Systems, 28(2), 118–144. https://doi.org/10.1016/j.jsis.2019.01.003 Vom Brocke, J., Simons, A., Riemer, K., Niehaves, B., Plattfaut, R., & Cleven, A. (2015). Standing on the Shoulders of Giants: Challenges and Recommendations of Literature Search in Information Systems Research. Communications of the Association for Information Systems, 37. https://doi.org/10.17705/1CAIS.03709 Vyatkin, V. (2013). Software Engineering in Industrial Automation: State-of-the-Art Review. IEEE Transactions on Industrial Informatics, 9(3), 1234–1249. https://doi.org/10.1109/TII.2013.2258165 Webster, J., & Watson, R. (2002). Analyzing the Past to Prepare for the Future: Writing a Literature Review. MIS Quarterly, 26. https://doi.org/10.2307/4132319 Zacharia, Z., Plasch, M., Mohan, U., & Gerschberger, M. (2019). The emerging role of coopetition within inter-firm relationships. The International Journal of Logistics Management, 30(2), 414– 437. https://doi.org/10.1108/IJLM-02-2018-0021 Zeiringer J. P., & Thalmann S. (2020). Knowledge Risks in Digital Supply Chains: A Literature Review. In: Proceedings of Wirtschaftsinformatik 2020 (WI 2020). 768 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE CONCEPTUAL MODEL FOR SMES' DATA MATURITY ASSESSMENT BLAŽ GAŠPERLIN University of Maribor, Faculty of Organizational Sciences, 4000 Kranj, Slovenia, e-mail: blaz.gasperlin1@um.si Abstract Digital transformation has brought about a rapid shift towards a completely digital enterprise, generating a huge amount of data. Most small and medium-sized enterprises (SMEs) have data stored in different places, formats, and systems, or are unaware that it exists (Dark Data). While digital technologies are at the root of rapid data growth within and outside organizations, sharing and exchanging data between organizations presents an additional challenge. We argue that one of the barriers to the successful digital transformation of SMEs is data immaturity. The concept of data maturity has been addressed from different aspects (data quality, governance,...), in specific domains (supply chain management, manufacturing companies,...) and from the perspective of the Capability Maturity Model. However, there has been no study that has addressed a comprehensive assessment of data maturity for the SME sector as a multi-criteria problem. In this research, we propose to combine the ideas of maturity models and multicriteria decision modeling by using a design science research approach. The developed model will help SMEs assess their data maturity level and help them understand what aspects of data maturity they need to advance, what steps they need to take, and how to evaluate their progress. DOI https://doi.org/10.18690/978-961-286-485-9.55 ISBN 978-961-286-485-9 Keywords: digital transformation, data, SMEs, data maturity, model 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 770 1 Introduction Digital transformation has caused the widespread creation of digital products and services and initiated the transformation from traditional business towards the completely digital one. Digital transformation refers to changes in the way companies operate and create value (new business models, products, and services) and the way they communicate, using digital technologies (Morakanyane et al., 2017; Vial, 2019). To digitally transform, companies need to respond and adapt to these changes by creating an appropriate organizational climate (open communication, experimentation, and agility), investing in digital capabilities, developing employees, and engaging in effective knowledge management supported by informed and timely decision-making (Kljajić Borštnar & Pucihar, 2021). One of the important elements of digital transformation is data (Mitra et al., 2019), which is becoming an important strategic resource in the organization. The amount of data collected and generated is rapidly increasing within and outside organizations. Data can be a competitive advantage, if managed properly. On the other hand, data and data management technologies, when not managed properly, present high costs. With no identified added value in the end, data can end up being a frustration for the organization (Ahlstrom, 2019; Sharma, 2020). The ability to utilize internal and external data to its fullest potential affects the ability to digitally transform as a whole (Kotsev et al., 2020). »Data-driven« is so intertwined with digital transformation, that some authors use the term data-driven digital transformation (Capgemini, 2018), or even data-driven transformation (Someh & Wixom, 2017). In our thesis paper, we understand that data is an essential part of the digitalization process, which results in digital transformation. Further, we define a data-driven organization as an organization that collects, generates, stores, manages, uses, and controls its data in a comprehensive manner, to support its daily operations and decision-making. Such organizations can be referred to as data mature organizations. We derive our proposition from the idea, that data maturity is crucial to achieve broader goals of digital transformation. B. Gašperlin: Conceptual Model for SMEs' Data Maturity Assessment 2 771 Previous literature Research on data-driven transformation is growing, however, we have noticed a lack of literature that is more oriented towards data maturity of organizations, with a particular focus on data maturity models in relation to SMEs. The previous literature is mainly oriented on data-driven business model innovation (Cheah & Wang, 2017; Marcinkowski & Gawin, 2020), data analytics and its capabilities (Carvalho et al., 2019; Dremel et al., 2017; O’Donovan et al., 2016), and guidelines or directions, how to become a data-driven organization (Anderson, 2015; Berntsson Svensson & Taghavianfar, 2020). The data maturity models, observed in the literature are either focused on a specific area of data maturity, too generic or focused on large organizations. Nevertheless, most elements of the available models can be also applied to small and medium-sized enterprises, to provide them the starting point for data maturity assessment. (Sen et al., 2006) focused on the maturity of the data warehousing process and the identification of the influencing factors following the Capability-Maturity Model (CMM), which could help characterize the corresponding maturity levels. They found that the most prevalent factors were data architecture, supported by online analytical processing (OLAP), business analytics and its alignment with business strategy, data quality, organizational readiness and resources (human, financial and technical), change management, and data warehouse size. Change management relates to changes and adaptations of data mechanisms and technologies, and OLAP refers to the analytical tool that enables analysts to gain meaningful information and insights from a vast and diverse variety of data, stored in databases (Moon et al., 2007). The results also showed that analytical culture is one of the most important factors to consider when assessing data warehouse maturity. (Rivera et al., 2017) developed the data governance maturity model for micro-sized organizations and validated it on the case of a financial organization. The results showed that organizational culture, data processing and analysis, data integration, and interoperability are the main issues in micro-sized organizations, that should be given more emphasis to achieve greater data governance maturity. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 772 (Sternkopf & Mueller, 2018) developed a model to help organizations assess their level of data literacy based on 3 main dimensions - data culture, data ethics and security, and level of data manipulation (retrieval, verification, analysis, visualization, evaluation, and its interpretation). Others, (Loshin, 2011) proposed the maturity model for assessing data quality. The proposed model assesses data quality based on eight dimensions (data expectations, measures, the level of established data policies, standards and procedures, applied data governance mechanisms, the level of technology and tools, data auditing, and reporting). Data expectations indicate, how much the organization emphasizes the importance of data quality. Similarly, (Al-Sai et al., 2020) developed a classification framework for the factors that organizations can consider when implementing Big Data analytics. 3 Problem definition Data has been an important driver of change since expert systems in decision making (Mandinach et al., 2006; Power, 2008; Provost & Fawcett, 2013), but less attention has been paid to the role of data in assessing data maturity. Every organization, including small and medium-sized enterprises (SMEs), needs quality data and needs to know, how to manage it comprehensively, if they want to be competitive in the market. Most SMEs have their data scattered in different information systems and thus have a structure with a low level of interoperability, a low level of data governance applied, and a lack of good auditing and traceability of the data they collect and generate internally or externally. Even though the organizations began to exploit the use of data more effectively in their digital transformation process, small and medium-sized enterprises (SMEs) are lagging behind. This is evident from the data provided by (Eurostat, 2021), which shows that more than half of SMEs do not use data analytics to analyze the data they collect and further extract the value that the data they collect could provide. This shows that most SMEs are not aware of the important role of data, nor do they have a defined approach to data management and governance that would address this issue in a systematic and comprehensive manner. It is important for SMEs to first identify what data they collect and generate, what quality of data they have, and for what purpose they are currently using it. To help them do this, various digital maturity models and tools have been developed. In addition, data maturity frameworks and models have been developed to help companies analyze the current B. Gašperlin: Conceptual Model for SMEs' Data Maturity Assessment 773 state of the data they collect and generate, assess the level of their data usage and management, and serve as a guide for implementing the necessary steps towards becoming a data-driven organization and towards digital transformation in general. We start from the proposition that it is possible to assess the data maturity of SMEs. This will help them to 1) better understand what to do with the data they have and collect and what steps to take to make better use of the data, and 2) to later assess their progress. This dissertation will focus specifically on small and medium-sized enterprises and their assessment of data maturity. It will discuss the role of data as a key driver of change in digital transformation and as a foundation for quality-based data-driven decision-making. The previous literature (Rivera et al., 2017; Sen et al., 2006; Sternkopf & Mueller, 2018) proposed a few data maturity models or frameworks, focusing on a specific area of data maturity (such as data warehouse maturity) or single aspects (data quality, data governance, data stewardship, etc.). None of the data maturity models examined, address the needs of SMEs. SMEs usually lack resources (financial, human, time, skills), so they need a comprehensive, systematic, and easy-to-use tool to help them assess the state of data and understand further steps towards data maturity. We need to consider that the problem of data maturity is multi-faceted. In order to assess the data maturity of an organization, we need to consider several criteria and address the problem by using multi-criteria decision modeling. The multi-criteria models are used to evaluate the alternatives (in this case, individual SMEs) (Mardani et al., 2015) and help us to set the proper criteria (in our case, criteria for data maturity assessment). The aim of this paper is to develop a multi-criteria data maturity assessment model for small and medium-sized enterprises, to evaluate different levels of data maturity, and help SMEs to achieve a more systematic and comprehensive data management and governance, which will contribute to further digital transformation of SMEs. Based on the identified data maturity level, the proposed model will highlight the gaps in the areas they need to invest more, to raise their data maturity level, and start implementing the necessary steps to realize this issue. The results of the work will contribute to the modeling of decision knowledge in the field of data maturity 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 774 assessment and will be useful for creating policies and strategies in the field of data science. 4 Methodology We will use a design science research (DSR) approach (Hevner et al., 2004), within which we will develop an IT artifact - a multi-criteria data maturity model. Design science research relates to the iterative sequence of expert activities, to produce an innovative product (artifact). The artifacts can be constructs, methods, instantiations, or models. The evaluation of the artifact provides feedback and a better understanding of the problem, which allows us to improve the quality and the design of the artifact (Hevner et al., 2004, p. 78). First, we will conduct a literature review with a focus on a data-driven digital transformation field, data maturity, data-driven decision making, data-driven organization, data governance models, and related fields. From the selected literature, we will in addition review the references in the reference list and selected those relevant for our research. In the next step, we will conduct interviews with selected small and medium-sized enterprises, to identify the actual problems the SMEs have in practice and are related to the data maturity problem. This will give us a deeper insight into what they have already achieved in the data maturity field and how they currently address this issue and feedback to our existing knowledge and literature. In doing so, we will follow the three main cycles rooted in the DSR research, represented by the rigor, relevance, and design cycle (Figure 1). Based on the reviewed literature and conducted interviews, we will define the criteria needed for data maturity assessment, design data maturity levels, and develop a multi-criteria data maturity model (the design cycle), using DEX methodology and the gathered insights from the interviews. DEX (Bohanec et al., 2013) is a qualitative multiattribute decision-making method, implemented in freely available software for multi-attribute decision making, DEXi (Bohanec, 2021). B. Gašperlin: Conceptual Model for SMEs' Data Maturity Assessment 775 Figure 1: Methodology process - adapted from (Hevner, 2007) The model will be validated on the real cases of SMEs. After the model validation, we will re-design the model, if needed, and extract the findings. Based on the current observation from the literature and the identification of a real (business) problem in practice, we will try to answer the following research questions: RQ1: “What are the criteria that will allow us to assess the level of data maturity in SMEs?” and RQ2: “Is it possible to develop a sensitive multi-criteria model, that will well enough separate data maturity levels?”. 5 Preliminary/Expected results and future development Future development in our research will focus on criteria identification, which will help us to develop the multi-criteria model to assess data maturity. We expect that the developed and validated model will be used in practice in the real environment and will thus represent a contribution to science and the real business environment. In addition, we expect that it will be possible to transfer the developed model to other businesses (not only to small and medium-sized enterprises) and to include the use of the questionnaire, which could increase the usability of the developed model for a larger number of organizations. In our next steps, we will validate the identified criteria from the literature with interviews in selected small and medium-sized enterprises. We expect that the findings from the interviews will contribute to a better understanding of the problem. 776 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Acknowledgements The research is financially supported by the program for Young researchers, no. 54752-058621. References Ahlstrom, R. (2019). The Role Of Data In The Age Of Digital Transformation. https://www.forbes.com/sites/forbestechcouncil/2019/01/17/the-role-of-data-in-the-ageof-digital-transformation/?sh=68bad9994509 Al-Sai, Z. A., Abdullah, R., & Heikal Husin, M. (2020). Critical Success Factors for Big Data: A Systematic Literature Review. IEEE Access, 8, 118940–118956. https://doi.org/10.1109/ACCESS.2020.3005461 Anderson, C. (2015). Creating a Data-Driven Organization: Practical Advice from the Trenches. In T. McGovern (Ed.), O’Reily (First). O’Reilly Media, Inc. https://books.google.si/books?hl=en&lr=&id=MVpDCgAAQBAJ&oi=fnd&pg=PR2&dq =datadriven+organization&ots=Ij157j1YCV&sig=mdFzH1I90XUzGdBvtgH7SWhAFG0&redir_ esc=y#v=onepage&q=data-driven organization&f=false Berntsson Svensson, R., & Taghavianfar, M. (2020). Toward Becoming a Data-Driven Organization: Challenges and Benefits. In F. Dalpiaz, J. Zdravkovic, & P. Loucopoulos (Eds.), Research Challenges in Information Science (pp. 3–19). Springer International Publishing. https://doi.org/10.1007/978-3-030-50316-1_1 Bohanec, M. (2021). DEXi: A Program for Multi-Attribute Decision Making. https://kt.ijs.si/MarkoBohanec/dexi.html Bohanec, M., Martin, Ž., Vladislav, R., Ivan, B., & Blaž, Z. (2013). DEX Methodology: Three Decades of Qualitative Multi-Attribute Modeling. Informatica, 37(1), 49–54. https://www.researchgate.net/publication/280805251_DEX_Methodology_Three_Decades _of_Qualitative_Multi-Attribute_Modeling Capgemini. (2018). Data-driven digital transformation. https://www.capgemini.com/cn-zh/wpcontent/uploads/sites/12/2018/06/Data-driven-digital-transformation-8.pdf Carvalho, J. V., Rocha, Á., Vasconcelos, J., & Abreu, A. (2019). A health data analytics maturity model for hospitals information systems. International Journal of Information Management, 46, 278– 285. https://doi.org/10.1016/j.ijinfomgt.2018.07.001 Cheah, S., & Wang, S. (2017). Big data-driven business model innovation by traditional industries in the Chinese economy. Journal of Chinese Economic and Foreign Trade Studies, 10(3), 229– 251. https://doi.org/10.1108/JCEFTS-05-2017-0013 Dremel, C., Overhage, S., Schlauderer, S., & Wulf, J. (2017). Towards a Capability Model for Big Data Analytics. 13th International Conference on Wirtschaftsinformatik (WI 2017), 1141–1155. https://www.researchgate.net/publication/311510196_Towards_a_Capability_Model_for_B ig_Data_Analytics Eurostat. (2021). Big data analysis. http://appsso.eurostat.ec.europa.eu/nui/submitViewTableAction.do Hevner, A. R. (2007). A Three Cycle View of Design Science Research. Scandinavian Journal of Information Systems, 19(2), 1–6. https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1017&context=sjis Hevner, A. R., March, S. T., Park, J., & Ram, S. (2004). Design Science in Information Systems Research. MIS Quarterly, 28(1), 75–105. https://doi.org/10.2307/25148625 Kljajić Borštnar, M., & Pucihar, A. (2021). Multi-Attribute Assessment of Digital Maturity of SMEs. In Electronics (Vol. 10, Issue 8). https://doi.org/10.3390/electronics10080885 B. Gašperlin: Conceptual Model for SMEs' Data Maturity Assessment 777 Kotsev, A., Minghini, M., Tomas, R., Cetl, V., & Lutz, M. (2020). From Spatial Data Infrastructures to Data Spaces—A Technological Perspective on the Evolution of European SDIs. In ISPRS International Journal of Geo-Information (Vol. 9, Issue 3). https://doi.org/10.3390/ijgi9030176 Loshin, D. (2011). Data quality maturity. In J. Niles & D. Bevans (Eds.), The Practitioner’s Guide to Data Quality Improvement (pp. 44–51). Morgan Kaufman - Elsevier. https://books.google.si/books?hl=en&lr=&id=B3zd4GCAWeYC&oi=fnd&pg=PR3&dq=i nfo:qMsybD7zSZUJ:scholar.google.com&ots=0SVyX2ZfGX&sig=Hux9Ymbl0emIu8MJTC qmY3CiheU&redir_esc=y#v=onepage&q&f=false Mandinach, E. B., Honey, M., & Light, D. (2006, April 9). A Theoretical Framework for Data-Driven Decision Making. http://www.cct.edc.org/sites/cct.edc.org/files/publications/DataFrame_AERA06.pdf Marcinkowski, B., & Gawin, B. (2020). Data-driven business model development-insights from the facility management industry. Journal of Facilities Management, 1–21. https://doi.org/10.1108/JFM-08-2020-0051 Mardani, A., Jusoh, A., Nor, K., Khalifah, Z., Zakwan, N., & Valipour, A. (2015). Multiple criteria decision-making techniques and their applications-a review of the literature from 2000 to 2014 Multiple criteria decision-making techniques and their applications-a review of the literature from 2000 to 2014. Economic Research-Ekonomska Istraživanja, 28(1), 516–571. https://doi.org/10.1080/1331677X.2015.1075139 Mitra, A., Gaur, S. S., & Giacosa, E. (2019). Combining organizational change management and organizational ambidexterity using data transformation. Management Decision, 57(8), 2069– 2091. https://doi.org/10.1108/MD-07-2018-0841 Moon, S. W., Kim, J. S., & Kwon, K. N. (2007). Effectiveness of OLAP-based cost data management in construction cost estimate. Automation in Construction, 16(3), 336–344. https://doi.org/10.1016/j.autcon.2006.07.008 Morakanyane, R., Grace, A., & O’Reilly, P. (2017). Conceptualizing Digital Transformation in Business Organizations: A Systematic Review of Literature. 30TH BLED ECONFERENCE: DIGITAL TRANSFORMATION – FROM CONNECTING THINGS TO TRANSFORMING OUR LIVES, 427–444. https://doi.org/10.18690/978-961-286-043-1.30 O’Donovan, P., Bruton, K., & O’Sullivan, D. T. J. (2016). IAMM: A Maturity Model for Measuring Industrial Analytics Capabilities in Large-scale Manufacturing Facilities. International Journal of Prognostics and Health Management, 1–11. https://cora.ucc.ie/bitstream/handle/10468/5396/4005.pdf?sequence=3&isAllowed=y Power, D. J. (2008). Understanding data-driven decision support systems. Information Systems Management, 25(2), 149–154. https://doi.org/10.1080/10580530801941124 Provost, F., & Fawcett, T. (2013). Data Science and its Relationship to Big Data and Data-Driven Decision Making. Big Data, 1(1), 51–59. https://doi.org/10.1089/big.2013.1508 Rivera, S., Loarte, N., Raymundo, C., & Dominguez, F. (2017). Data Governance Maturity Model for Micro Financial Organizations in Peru. Proceedings of the 19th International Conference on Enterprise Information Systems (ICEIS 2017), 203–214. https://doi.org/10.5220/0006149202030214 Sen, A., Sinha, A. P., & Ramamurthy, K. R. (2006). Data Warehousing Process Maturity: An Exploratory Study of Factors Influencing User Perceptions. IEEE Transactions on Engineering Management, 53(3), 440–455. https://doi.org/10.1109/TEM.2006.877460 Sharma, S. (2020, December 3). Data Is Essential To Digital Transformation. https://www.forbes.com/sites/forbestechcouncil/2020/12/03/data-is-essential-to-digitaltransformation/?sh=527b1afa26c9 Someh, I. A., & Wixom, B. H. (2017, August 17). Data-Driven Transformation at Microsoft. https://cisr.mit.edu/publication/2017_0801_DataDrivenTransformation_SomehWixom#fn _2 778 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Sternkopf, H., & Mueller, R. M. (2018). Doing Good with Data: Development of a Maturity Model for Data Literacy in Non-governmental Organizations. Proceedings of the 51st Hawaii International Conference on System Sciences, 5045–5054. https://core.ac.uk/download/pdf/143481465.pdf Vial, G. (2019). Understanding digital transformation: A review and a research agenda. The Journal of Strategic Information Systems, 28(2), 118–144. https://doi.org/10.1016/j.jsis.2019.01.003 IMPACT ASSESMENT OF OPEN GOVERNMENT DATA ALJAŽ FERENCEK University of Maribor, Faculty of Organizational Sciences, Kranj, Slovenia; e-mail: aljaz.ferencek1@student.um.si Abstract Public sector organizations produce and process increasing amounts of data and the number of research and initiatives on open data is also increasing. Defining the true value of OGD is challenging without knowing how it impacts society and its economy. While the analysis of the economic benefits of open data is one way to describe the effect of government openness, the impact of open data is measured also in social and political context. Feedback mechanisms that are currently used are mostly surveys, while the number of OGD use cases is increasing. This paper proposes a preliminary model for research on assessing impact areas of OGD in an automated manner by using text mining techniques on existing use cases. DOI https://doi.org/10.18690/978-961-286-485-9.56 ISBN 978-961-286-485-9 Keywords: open government data, impact assessment, open data, text mining, impact areas 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 780 1 Introduction Open Government Data (OGD) is one of the sources of open data published by the public sector in form of databases, with the aim of promoting transparency, accountability, and creating added value (Open Government Data, n.d.). Public sector organizations produce and process increasing amounts of data, and the number of research and initiatives on open data is also increasing (Attard et al., 2016; Attard et al., 2015; Safarov et al., 2017; Ubaldi, 2013; Yan & Weber, 2018). By making their databases accessible, public institutions are becoming more attractive for political participation of citizens (Ruijer & Martinius, 2017), the creation of companies and innovative services focused on citizens is encouraged (Pereira et al., 2016), and the long-term goal is to ensure overall transparency of government information (Jaeger & Bertot, 2010). As Ubaldi (2013) points out, one of the elements for creating added value of OGD is high-impact data for the public. Currently, there are many open data policies at different levels of government, while very few systematic and structured studies have been conducted on their actual impact (Roa et al., 2019; Ruijer & Martinius, 2017; Zuiderwijk & Janssen, 2014). Many other authors (Afful-Dadzie E. & Afful-Dadzie A., 2017; Crusoe et al., 2019; Safarov et al., 2017; Wilson & Cong, 2020) also recognize the problem of measuring the impact of open data, and the reasons for that are mostly in the availability and low quality of data, costs and legal barriers and in users. Although not much attention has been paid to the impact of open data in the past, many useful solutions have emerged in recent years. As stated by Kalampokis et al. (2013), companies use open data and methods of business intelligence which help them survive in the global economy, open data helps designers to make better policies and academics to analyze data for hypotheses testing, understanding of patterns and predictions. For this reason, we recognized an opportunity to identify areas of open government data impacts from the actual use cases of open government data through text mining, and thus enable governments to create targeted and better-quality data sets. The use of text mining is quite common in the literature, but not for the purpose of identifying impact areas of OGD. Common applications of text mining are topic modeling using Latent Dirichlet Allocation (LDA) which can be used to identify areas of OGD (Afful-Dadzie, E. and Afful-Dadzie A., 2017), to identify opportunities and design market strategies for the private sector (Gottfried et al., 2021) and to analyze relationship between citizens and government (Bagozi et al., A. Ferencek: Impact Assesment of Open Government Data 781 2021). Classification and clustering algorithms, regression models and feature selection were used to predict taxpayer groups (Cha, 2020), to formulate an environmental management strategy (Kang et al., 2021), to classify government expenditure records (De Oliviera, 2021) or to make analysis of open data judgments (Metsker, 2019). For this research, knowledge extraction would be made by using Natural Language Processing (NLP). Knowledge extraction or knowledge discovery is extraction of previously unknown, and potentially useful information from data (Frawley et al., 1992). NLP models can use, for example, part-of-speech tagging, chunking and parsing to describe syntactic information or use word-sense disambiguation, semantic role labeling or named entity extraction for gaining semantic information (Collobert et al., 2011). Statistical technique used behind NLP is Probabilistic Latent Semantic Analysis (PLSA), the purpose of which is to identify or distinguish contexts of words without a need to recourse to a dictionary or thesaurus (Hofmann, 2001). In other words, we can use NLP to reveal similarities of topics by grouping together words of a common context. The use of this method for identifying the impacts of OGD could not be detected in the literature, while the use of the method for various purposes is quite common. Among other things, NLP is used to develop smart linked open government data (Sinif and Bounabat, 2019), to develop methods for classifying government documents (Peña et al., 2018; Song et al., 2019), or to predict the emergence of civic activism and protests (Kallus, 2014). As there is not much research with the chosen methodology for the selected purpose in the literature, the same is true for research on measuring the impact of OGD. Quantifying the economic impact of open data is relatively complex, as the most important benefits are indirect (Huyer and van Knippenberg, 2020). Although the analysis of the economic benefits of open data is a good way to describe the effect of government openness, the impact of open data is not connected to economic field only, as public sector openness brings other benefits to society by increasing government or institutional responsiveness (Keserű and James Kin-sing, 2015). As Keserű & James Kin-sing (2015) further point out, evidence of the social and political impact of OGD is extremely rare. Further, Carrara et al. (2015) found out that the majority of studies conducted on the impact of OGD are preliminary assessments, which are given on the basis of classical mechanisms for obtaining feedback - surveys. According to the guidelines of the Organisation for Economic Co-operation and Development (OECD), member states of the European Union (EU) are required to submit annual surveys to review the state of open data policies 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 782 (OECD, 2018). While surveys can provide important feedback, governments face constraints on staffing and funding in the regular collection, maintenance, and exchange of data as they meet other priorities in their work (Zuiderwijk & Janssen, 2014). On the other hand, Young & Verhulst (2016) report that case studies of individual initiatives can help to better understand the impact of open data, which we see as an opportunity to relieve public sector employees and use existing use cases to identify effects in an automated manner. 2 Problem definition The problem we are solving in this research is therefore the identification of impact areas of OGD with the help of use cases, which would be compared with the existing impact areas, defined in the OECD surveys. The outcome of this research will be validated in cooperation with Ministry of Public Administration of the Republic of Slovenia who also provided us with their surveys. Current impact areas, identified by OECD are policy, impact, portals and data quality. These are intertwined with the identified impacts from the literature, which are mainly grouped into three categories - operational and technical, social and political, and economic (Janssen et al., 2012; Zuiderwijk et al., 2018). Problem debated in this paper is also recognized in the literature, as many authors cite monitoring of the feedback and assessment of the actual impact of OGD for further research (Attard et al., 2015; Johnson, 2016; Lourenço, 2016; Ruijer & Martinius, 2017; Wilson & Cong, 2020, Zuiderwijk et al., 2018, Zuiderwijk & Janssen, 2014). Research questions that we aim to address are the following:   Can we use text mining methods on open data use cases to determine an objective assessment of OGD impact by automatic extraction of semantic structure? Can we use the proposed methodology to validate impact areas defined by OECD? This section of the paper can best be summed up by Janssen et al. (2012, p. 260) “The main challenge is that open data has no value in itself; it only becomes valuable when used". A. Ferencek: Impact Assesment of Open Government Data 3 783 Methodology The methodological approach for this research fits under the Design Science Research (DSR) approach, where an IT artefact, rooted in real-world problem is designed (Hevner et al., 2004). For understanding of the data, several authors (Azevedo & Santos, 2008; Bosnjak et al., 2009; Nadali et al., 2011; Schafer et al., 2018) recommend the use of CRISP-DM methodology. CRISP-DM aims, as described by Wirth & Hipp (2000), to make larger data mining projects reliable, faster and cost efficient. This is achieved by following six phases: Business Understanding, Data Understanding, Data Preparation, Modelling, Evaluation and Deployment, nevertheless, the phases are usually intertwined and not linear (Bohanec et al., 2017). Following CRISP-DM methodology, we will first start by analyzing OGD impact ecosystem, evaluation surveys and use cases from European Data portal (Data Europa EU, n. d.). By analyzing nearly 1000 use cases, we should be able to get a better understanding of the research area and the data. Since data understanding is the second phase of CRISP-DM we will then start by preprocessing the data. As preprocessing of the data is one of the first and most critical phases in data mining (Xiang-Wei & Yian-Fang, 2012), we suspect it will take the most effort. Next, modelling of the data will be made using text mining techniques, among which we will use NLP with its basic components such as word tokenization, stop words removal, part of speech tagging and stemming/lemmatization (Collobert et al., 2011). Finally, evaluation of impact areas with the help of Ministry of Public Administration will be made and a model for indexing, analyzing and searching heterogeneous document collections in order to extract knowledge from textual contents through NLP will be presented. A brief idea of the preliminary model is displayed in Figure 1 where keyword extraction from case studies is first made on the right side of the figure. Keywords from the documents are then grouped together and formed into collections or impact areas. Groups of variables are also created in order to better distinguish between groups of keywords and collections. Administration dashboard is the central entity, where inputs (input documents for impact assessment analysis) are uploaded and then classified based on similarity of specific impact area or impact area variables. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 784 Figure 1: Preliminary schema of semantic structure for artefact development. 4 Expected results Through our research, we aim to assess impact areas of OGD in an automated manner through use case analysis. We aim to cross-validate impact areas by comparing them with OECD surveys and further develop a model that will help governments with classification of impact areas based on provided inputs. Based on research gaps we defined in this paper, we believe that assessing impact areas of OGD is important and will play an important role when benefits of open data initiatives are evaluated and summarized. Results of our research will contribute to better understanding of the actual impact of OGD and will help governments to prepare beneficial and focused datasets for providing even more value for citizens based on DSR’s practical aspect of this research. By understanding the actual impact of OGD, more focused approach for opening the data and feedback mechanisms will be introduced from the governments. By designing a model for OGD impact assesment with the proposed methodology that hasn’t been yet used for the addressed problem, we are filling up research gaps from the literature and that is essential for further academic research and for advancing knowledge in the field of open data. A. Ferencek: Impact Assesment of Open Government Data 785 References Afful-Dadzie, E., & Afful-Dadzie, A. (2017). Liberation of public data: Exploring central themes in open government data and freedom of information research. International Journal of Information Management, 37(6), 664–672. doi:10.1016/j.ijinfomgt.2017.05.009 Attard, J., Orlandi, F., Scerri, S., & Auer, S. (2015). A systematic review of open government data initiatives. Government Information Quarterly, 32(4), 399–418. https://doi.org/10.1016/j.giq.2015.07.006 Attard, J., Orlandi, F., & Auer, S. (2016). Value Creation on Open Government Data. 2016 49th Hawaii International Conference on System Sciences (HICSS). doi:10.1109/hicss.2016.326 Azevedo, A., & Santos, M. (2008). KDD, SEMMA and CRISP-DM: a parallel overview. IADIS European Conf. Data Mining. Bagozzi, B. E., Berliner, D., & Almquist, Z. W. (2019). When does open government shut? Predicting government responses to citizen information requests. Regulation & Governance. doi:10.1111/rego.12282 Bohanec, M., Robnik-Šikonja, M., & Kljajić Borštnar, M. (2017). Decision-making framework with double-loop learning through interpretable black-box machine learning models. Industrial Management & Data Systems, 117(7), in print (July, 2017b), http://dx.doi.org/10.1108/IMDS-09-2016-0409 Bosnjak, Z., Grljevic, O., & Bosnjak, S. (2009). CRISP-DM as a framework for discovering knowledge in small and medium sized enterprises' data. 2009 5th International Symposium on Applied Computational Intelligence and Informatics, 509-514. doi: 10.1109/SACI.2009.5136302 Carrara, W., Chan, W. S., Fischer, S., & van Steenbergen, E. (2015). Creating value through Open Data. European Commission. https://doi.org/10.2759/328101 Cha, T. (2020). Open Government Data for Machine Learning Tax Recommendation. The 21st Annual International Conference on Digital Government Research. Collobert, R., Weston, J., Bottou, L., Karlen, M., Kavukcuoglu, K. & Kuksa, P. (2011). Natural Language Processing (Almost) from Scratch. Journal of Machine Learning. Crusoe, J., Simonofski, A., Clarinval, A., & Gebka, E. (2019). The Impact of Impediments on Open Government Data Use: Insights from Users. 2019 13th International Conference on Research Challenges in Information Science (RCIS). doi:10.1109/rcis.2019.8877055 De Oliviera Almeida, G., Revoredo, K., Cappelli, C. & Maciel, C. (2021). Method for Improvement of Transparency: Use of Text Mining Techniques for Reclassification of Governmental Expenditures Records in Brazil. International Journal of Business Intelligence and Data Mining, 1, 1. https://doi.org/10.1504/IJBIDM.2021.112989 Frawley, W. J., Piatetsky-Shapiro, G., & Matheus, C. J. (1992). Knowledge Discovery in Databases: An Overview. AI Magazine, 13(3), 57. https://doi.org/10.1609/aimag.v13i3.1011 Gottfried A, Hartmann C & Yates D. (2021). Mining Open Government Data for Business Intelligence Using Data Visualization: A Two-Industry Case Study. Journal of Theoretical and Applied Electronic Commerce Research, 16(4):1042-1065. https://doi.org/10.3390/jtaer16040059 Hevner, A., March, S., Park, J., & Ram, S. (2004). Design Science in Information Systems Research. MIS Quarterly, 28(1), 75-105. doi:10.2307/25148625 Hofmann, T. (2001). Unsupervised Learning by Probabilistic Latent Semantic Analysis. Machine Learning 42, 177–196. https://doi.org/10.1023/A:1007617005950 Huyer, E., & van Knippenberg, L., (2020) The Economic Impact of Open Data: Opportunities for value creation in Europe, Capgemini Invent. European, Data Portal. Doi:10.2830/63132. Janssen, M., Charalabidis, Y., & Zuiderwijk, A. (2012). Benefits, adoption barriers and myths of open data and open government. Information Systems Management, 29(4), 258–268. Jaeger, P. T., & Bertot, J. C. (2010). Transparency and technological change: Ensuring equal and sustained public access to government information. Government Information Quarterly, 27(4), 371–376. doi:10.1016/j.giq.2010.05.003 786 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Johnson, P. A. (2016). Reflecting on the success of open data: How municipal government evaluates their open data programs. International Journal of E-Planning Research, 5(3), 1-12. Kalampokis, E., Tambouris, E., & Tarabanis, K. (2013). Linked Open Government Data Analytics. Electronic Government, 99–110. doi:10.1007/978-3-642-40358-3_9 Kallus, N. (2014). Predicting crowd behavior with big public data. Proceedings of the 23rd International Conference on World Wide Web - WWW ’14 Companion. doi:10.1145/2567948.2579233 Kang, A., Ren, L., Hua, C., Song, H., Dong, M., Fang, Z. & Zhu, M. (2021). Environmental management strategy in response to COVID-19 in China: Based on text mining of government open information. Science of The Total Environment, Vol. 769. https://doi.org/10.1016/j.scitotenv.2021.145158. Keserű, J. & James Kin-sing C. (2015). The Social Impact of Open Data.” Sunlight Foundation. http://www.opendataresearch.org/dl/symposium2015/odrs2015-paper20.pdf Lourenço, R. P. (2016). Evidence of an Open Government Data Portal Impact on the Public Sphere. International Journal of Electronic Government Research, 12(3), 21–36. doi:10.4018/ijegr.2016070102 Metsker O., Trofimov E., Sikorsky S. & Kovalchuk S. (2019) Text and Data Mining Techniques in Judgment Open Data Analysis for Administrative Practice Control. Communications in Computer and Information Science, Vol 947. https://doi.org/10.1007/978-3-030-13283-5_13 Nadali, A., Kakhky, E. N., & Nosratabadi, H. E. (2011). Evaluating the success level of data mining projects based on CRISP-DM methodology by a Fuzzy expert system. 2011 3rd International Conference on Electronics Computer Technology. doi:10.1109/icectech.2011.5942073 Open Government Data. (b. d.). https://www.oecd.org/gov/digital-government/open-governmentdata.htm OECD (27. 9. 2018). Open Government Data Report. https://www.oecd.org/gov/open-governmentdata-report-9789264305847-en.htm Peña, P., Aznar, R., Montañés, R. & Hoyo, R. (2018). Open Data for Public Administration: Exploitation and semantic organization of institutional web content. Sociedad Española para el Procesamiento del Lenguaje Natural, 61: 155-158. doi:10.26342/2018-61-21 Pereira, G. V., Macadar, M. A., Luciano, E. M., & Testa, M. G. (2016). Delivering public value through open government data initiatives in a Smart City context. Information Systems Frontiers, 19(2), 213–229. doi:10.1007/s10796-016-9673-7 Roa, H. N., Loza-Aguirre, E., & Flores, P. (2019). A Survey on the Problems Affecting the Development of Open Government Data Initiatives. 2019 Sixth International Conference on eDemocracy & eGovernment (ICEDEG). https://doi.org/10.1109/icedeg.2019.8734452 Ruijer, E. H. J. M., & Martinius, E. (2017). Researching the democratic impact of open government data: A systematic literature review. Information Polity, 22(4), 233–250. doi:10.3233/ip-170413 Safarov, I., Meijer, A., & Grimmelikhuijsen, S. (2017). Utilization of open government data: A systematic literature review of types, conditions, effects and users. Information Polity, 22(1), 1–24. https://doi.org/10.3233/ip-160012 Schafer, F., Zeiselmair, C., Becker, J., & Otten, H. (2018). Synthesizing CRISP-DM and Quality Management: A Data Mining Approach for Production Processes. 2018 IEEE International Conference on Technology Management, Operations and Decisions (ICTMOD). doi:10.1109/itmc.2018.8691266 Sinif, L., & Bounabat, B. (2019). A general framework of smart Open Linked Government Data. Proceedings of the 2019 2nd International Conference on Geoinformatics and Data Analysis - ICGDA 2019. doi:10.1145/3318236.3318243 Song, Y., Li, Z., He, J., Li, Z., Fang, X., & Chen, D. (2019). Employing Auto-Annotated Data for Government Document Classification. Proceedings of the 2019 3rd International Conference on Innovation in Artificial Intelligence - ICIAI 2019. doi:10.1145/3319921.3319970 Ubaldi, B. (2013), "Open Government Data: Towards Empirical Analysis of Open Government Data Initiatives", OECD Working Papers on Public Governance, No. 22, OECD Publishing, Paris, https://doi.org/10.1787/5k46bj4f03s7-en. A. Ferencek: Impact Assesment of Open Government Data 787 Data Europa EU. (n. d.). Use Cases. Retrieved May 4, 2021, from https://data.europa.eu/en/impactstudies/use-cases Wilson, B., & Cong, C. (2020). Beyond the Supply Side: Use and Impact of Municipal Open Data in the U.S. Telematics and Informatics, 101526. doi:10.1016/j.tele.2020.101526 Wirth, R. & Hipp, J. (2000). CRISP-DM: Towards a standard process model for data mining. In: Proceedings of the 4th international conference on the practical applications of knowledge discovery and data mining, pg: 29 – 39. Xiang-wei, L., & Yian-fang, Q. (2012). A Data Preprocessing Algorithm for Classification Model Based On Rough Sets. Physics Procedia, 25, 2025–2029. doi:10.1016/j.phpro.2012.03.345 Yan, A., & Weber, N. (2018). Mining Open Government Data Used in Scientific Research. Lecture Notes in Computer Science, 303–313. doi:10.1007/978-3-319-78105-1_34 Young, A. & Verhulst, S. (2016). The Global Impact of Open Data: Key Findings from Detailed Case Studies Around the World. O'Reilly Media. Zuiderwijk, A. & Janssen, M. (2014). Open data policies, their implementation and impact: A framework for comparison. Government Information Quarterly, 31(1), 17–29. doi:10.1016/j.giq.2013.04.003 Zuiderwijk, A., Shinde, R., & Janssen, M. (2018). Investigating the attainment of open government data objectives: Is there a mismatch between objectives and results?. International Review of Administrative Sciences, 85(4), 645-672. 788 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE DEVELOPMENT OF PREDICTION MODEL FOR SUPPORT IN DECISION-MAKING PROCESS IN FOOTBALL ACADEMIES – LITERATURE REVIEW ROK VRBAN Unvieristy of Maribor, Faculty of Organizational Sciences, 4000 Kranj, Slovenia, e-mail: rok.vrban@student.um.si Abstract Talent development process in football is considered as a process of providing the optimal environment for identifying and realising the maximum ability of young athletes. A multidimensional approach to analysing factors that influence junior to senior transition can produce much better support for coaches and management to distinguish elite and non-elite players. With development of digital technologies and artificial intelligence, more clubs are able to perform detailed analysis of their youth development programme. In this paper, we focus on identfying good practices in connecting digital technologies with talent development process in sports. Based on established methods and techniques used by experts in a field of data mining within sports, we want to select an appropriate methodology and approach in discovering knowledge from the data for the doctoral dissertation. Literature review presents a first step in a hollistic process of identifying key attributes in junior to senior transition. The findings suggest that the comprehensive approach towards analysing data in sports, results in better identification of skills and attributes of young athletes. Consequently, data mining in sports is becoming more and more important in assessing important characteristics on every level within talent development process. DOI https://doi.org/10.18690/978-961-286-485-9.57 ISBN 978-961-286-485-9 Keywords: talent development, data mining, digital technologies, literature review 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 790 1 Introduction European football market size has doubled over the past decades. Many private investors from Asia, Middle East and Russia have joined the European football landscape in that period. This inflow of funding raised transfer activity and many clubs started searching for better options on market rather than in their own youth academy. Financial capabilities allow big clubs to invest money in the more developed players, while clubs with limited financial abilities need to go through the entire junior-to-senior transition (JST) process in order to transition them to the first squad or sell them. As most of the clubs depend on selling players, they must adapt to current trends and development of new technologies. Among these are comprehensive statistical analysis, which, combined with use of sophisticated technology and artificial intelligence, create a new understanding of the development process and evaluation of the players. Measuring performance of individuals during training sessions and league games has increased in recent years together with technological improvements. Artificial intelligence and modern statistical approaches in discovering knowledge in data (data mining) have brought new ways of understanding key factors in measuring performance, skill, attributes, talent development and other important aspects, which play an important role in the world of football. Most of the small and medium sized European football clubs evaluate their youth prospects solely qualitatively or by using basic statistical methods, which turn out to be insufficient in accurate monitoring of talents’ professional development. Moreover, the collected data has small impact on decision-making process as coaches and managers have limited or no professional support from data analysts. Consequently, the data present a burden rather than the advantage for the club. 2 Methodology The central question of the research project is: Which athlete’s attributes play a key role in successful transition from youth to professional football player? In order to answer the central question, the purpose of the study is to create a model, which will help us recognize importance of factors in youth development in football. By creating a model, which will be based on quantitative research of sub-elite and elite youth academies across various European football clubs, we want to encourage R. Vrban: Development of Prediction Model for Support in Decision-Making Process in Football Academies – Literature Review 791 sport clubs around Europe to start using advanced data methods and modern technological equipment to improve their youth academies and to understand the value behind the work they put in raising youth to become professionals. First step is literature review where we will overview the topic, compare different views of authors about the existing problem and examine the gap in the research. Articles in the literature review will be obtained through various online databases, such as Web of Science (WoS) and other bibliographic databases, mainly connected to sports, talent development and digital technology. The key words used for literature review included “talent development in sports”, “talent development and artificial intelligence” and “data mining in sports”. The data for the research will mostly be collected through interaction with high profile subjects within management of the clubs and the players of the observed club and through different research methods. We plan on using a mixed method of design science research (DSR) and multiple case study (MCS). The main methodological approach will be DSR, while we intend on using MCS for collecting and analysing the data for model development. Quantitative data will be collected through observation and measurement tests of pre-defined mental, physical, tactical and technical skills. The data will also include other attributes and characteristics of each individual. Qualitative data will be collected through interaction with managers and coaches within youth academy and by interviewing observed players (semi-structured interviews). While some data are publicly available, the rest is to be collected in agreement with the selected clubs and individuals who are willing to provide their personal opinions on requested topics. The proposed duration of collecting the data is a year and a half. Each of the selected clubs will be evaluated once every 6 months in a span of a week. Clubs will be selected according to groups and sub-groups classified by the ECA evaluation system. Proposed sample involves up to 3 football clubs in each division (i.e. max. 12 clubs). Each club will be requested to assign their youth teams (between 13 – 17 years old) for the tests. Tests will be performed by coaches and training specialists according to instructions given by the researchers. Altogether the sample should involve between 600 - 1000 talents. The data will be analysed with modern statistical methods and tools. Model will be based on data mining process and evaluated through CRISP-DM process model. Anticipated methods include algorithms such as KNN, AdaBoost, Naïve Bayes and Random forest. 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 792 3 Existing literature As football is the most popular and played sport in the world with estimated 3,5 Billion fans all around the world, much research has been done in the academic and non-academic field. With more and more technology involved in sports, many other professions, traditionally less connected to football, find their common points of research with football. A lot of research has been done connecting football and medicine (such as Hawkings et al., 2001, Krustrup & Krustrup, 2018, Kramer, 2010) or football and tracking systems (e.g. Link et al., 2016, Schütz et al., 2019). With development of football related topics, clubs learn and implement new business models to their youth academies. On the other hand, it is important to understand the perspectives of youth players themselves. Chamorro et al. (2016) suggest, that youth football players, who are not only interested in becoming professionals but also give importance to education and private life, appear to be more resourceful to cope with the transition to professional football. According to Franck (2018, p.55) JST is very complex and therefore, she suggests the following: “I recommend that future research should continue combining quantitative methods with in-depth interviews in a mixed-methods approach when exploring the JST. This type of approach provides detailed pictures of different pathways and life experiences. In the future, research exploring how social agents in the environment perceive their roles in assisting JST athletes could also be beneficial.« Beside athletic predispositions, it is also crucial for youth to compete on high level before moving to senior level. Hollings (2013) claims, that there is a higher probability for youth athletes, who have already competed on high level, to become elite senior players. Lorenzo et al. (2009) came to the same conclusion in basketball. Interviewed youth players pointed out tougher demand and seriousness when they train with the senior team. They required more mental and physical effort. In order to train more, they had to sacrifice their leisure time and consequently they wasted more time for studying. The transition from amateur to professional can differ from sport to sport. One of the most prominent researchers in the youth development process in sports, Stambulova (2010), presents a 5-step career planning strategy as a guideline for each individual to estimate different spheres in his/her current life and structure the future by thinking forward and adjusting priorities to the wished result. Bennie & O’Connor (2006) claim, that transition from youth to senior stage is also influenced by other forces, such as psychological, social, economic and political forces. This claim is consistent with the prediction, that development of youth players is not only R. Vrban: Development of Prediction Model for Support in Decision-Making Process in Football Academies – Literature Review 793 connected to one’s motivation and existing sportive components, but also challenges and problems of a daily life. Another important factor in the youth development process are talent’s parents. They are important for young athletes, but can often be too pushy (Stambulova et al., 2009). To check intensiveness of pushing young talents by their parents, coaches or other authorities, authors many times rely on the push pull anti-push anti-pull model. Ekstrőm & Sundqvist (2009) use the model to investigate the reasons of continuing or dropping out of the sport at Swedish youth hockey players in transition. In order to understand why and how much an athlete improves, we must create a continuous process of measuring and evaluating individual’s physical, tactical and technical attributes. Growing sport industry has become more demanding and consequently, professional sport teams hardly compete on an international level without a full support of advanced technology. Yokesh & Kumar (2015) state, that technology changes the way we see sports. It influences what we play and how we play it. It improves ways to predict and treat injuries. De Koning (2010) agrees with that by claiming, that technological improvements could be the key to future world records. Author based his claims on comparing world record times in 1500-m speed skating for men and development of technology. Cortsen & Rascher (2018) focus on technology and data within football. They claim that data inside sport have much higher value than many would think and are much more difficult to use effectively. The problem is not just technical but lack of financial and human resources as well. They also argue the ownership of the data, which is crucial for profitability. Yet, profitability is only possible if the quality of the data is sufficient and if the owner knows how to commercialize it properly. Rein & Memmert (2016) agree with these claims and add that big amount of data may pose a problem if the club does not have a sufficient organizational structure and knowledge behind using modern technology. Machine learning process in football can be valuable, but it must be in collaboration with sport scientists as the process of understanding big data within tactical and technical progress is extremely complex. With implementation of machine learning process Musa et. al. (2020) present multiple performance-related parameters in beach football and sepak takraw. Key performance indicators that define performance were found in beach football, while results from analysis of sepak takraw turned out inconclusive. However, it was demonstrated in the findings, that a number of performance indicators are essential in distinguishing between losing and winning. It was also concluded, that anthropometric indexes (such as standing and sitting 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE 794 height, leg length, skinfold measurements and other) have an impact in performance of sepak takraw. Deep statistical analysis of the team and individuals performing in team sports have also shown correlation between behavioural characteristics and overall result of the team. Excellent players, who are hated in the dressing room, who are prone to injuries or homesick, are less likely to bring out the best in their colleagues (Tunaru & Viney, 2010). Another important characteristic of a successful talent development is motivation. Forsman et. al. (2016) identify motivation as one of the key reasons of successful talent development among football players in Finland. Motivation does not only help a player maximize his abilities, furthermore, it helps the team boost their confidence and rises morality. Authors also recognized agility, passing and centering skills as most important ones in becoming elite player. Pappalardo et. al. (2019) show that elite players do not always play excellence, they just achieve it more often than the other players. Murr et al. (2018) add, that elite players perform significantly better in dribbling tests and ball control, while shooting ability had little impact on future development success. Authors have also found significant positive correlation between motivation and future performance, which confirms Forsman et. al. assumptions. Players with higher self-determination were more likely to get selected to a higher performance level compared to the players with lower self-determination. The results are supported by Kelly et. al. (2020) analysis, which identified higher potentials had significantly better technical skills such as lob pass ability, possession reliability, pass completion and average total touches. Another important factor in talent identification at early age is relative age effect (RAE). Doncaster et. al. (2020) demonstrate a persistent bias toward selecting individuals born earlier in year in male football and basketball. 4 Conclusion Based on this paper, the findings regarding talent development process and data analysis show significant correlation. This study systematically analysed literature review within connections between sports, talent development and use of data. It is suggested that an appropriate use of data can determine and identify future abilities and skills of young athletes. Moreover, it is required for professional sport teams to use modern machine learning processes in order to compete on a top level. However, it is important to understand the value of the ownership of the data. Furthermore, data need to be addressed professionally, as too much data might bring more confusion rather than positive effect if treated wrongly. Conclusions regarding R. Vrban: Development of Prediction Model for Support in Decision-Making Process in Football Academies – Literature Review 795 the importance of social factors show that parents, coaches and management of the club have an important role in talent development. Another important feature in JST is personality. Studies have shown that individuals with professional approach and teamwork mindset are more likely to influence positive on the other individuals within the squad. They are also more likely to advance faster in development process as they spend more leisure time for individual practice. Future research is required to explore other attributes and factors which play an important role in elite and subelite player assessment. Additionally, data driven decision-making in football is still relatively young process, which offers many opportunities to research and explore. References Bennie A., O’Connor D. (2006). Athletic transition: An investigation of elite track and field participation in the post-high school years. Change: Transformations in Education. Volume 9.1, November 2006. https://www.researchgate.net/publication/277786513_Athletic_transition_An_investigation _of_elite_track_and_field_participation_in_the_post-high_school_years. Accessed: 05/04/2020 Chamorro J. L., Torregrosa M., Oliva Sánchez D., Calvo Garciá T., León B. (2016). Future Achievements, Passion and Motivation in the Transition from Junior-to-Senior Sport in Spanish Young Elite Soccer Players. Cambridge University Press: 20 October 2016. https://www.ncbi.nlm.nih.gov/pubmed/27762186 Accessed: 10/04/2020. De Koning J. J. (2010). World Records: How Much Athlete? How Much Technology? International Journal of Sports Physiology and Performance, 2010, 5, 262-267. https://www.researchgate.net/publication/45167594_World_Records_How_Much_Athlete _How_Much_Technology Accessed: 07/01/2021 Doncaster G., Medina D., Drobnic F., Gomez-Diaz, A. J., Unnithan, V. (2020). Appreciating Factors Beyond the Physical in Talent Identification and Development: Insights From the FC Barcelona Sporting Model. Front. Sports Act. Living 2:91. Ekström, C., & Sundqvist, C. (2009). Karriärövergången från nybörjarstadiet till utvecklingsstadiet inom ishockey utifrån spelare, tränare och föräldrars perspektiv. (C-uppsats i psykologi inriktning idrott, 61-90p) Högskolan i Halmstad: Sektionen för Hälsa och Samhälle. https://www.diva-portal.org/smash/get/diva2:292741/FULLTEXT01.pdf. Accessed: 26/03/2020 Forsman H., Blomqvist M., Davids K., Liukkonen J., Konttinen N. (2016). Identifying technical, physiological, tactical and psychological characteristics that contribute to career progression in soccer. International Journal of Sports Science & Coaching 2016, Vol. 11(4) 505–513 Franck A. (2018). THE JUNIOR-TO-SENIOR TRANSITION IN SWEDISH ATHLETES. A longitudinal study. Linnaeus University Dissertations Nr 305/2018. https://www.divaportal.org/smash/get/diva2:1168706/FULLTEXT01.pdf Accessed: 10/04/2020 Hawkings R.D., Hulse M. A., Wilkinson C., Hodson A., Gibson M. (2001). The association football medical research programme: an audit of injuries in professional football. https://bjsm.bmj.com/content/35/1/43.short Accessed: 27/03/2020 796 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE Hollings, S.C. (2013). The Transition from Elite Junior Track-and-Field Athlete to Successful Senior Athlete: Implications for Athletics High Performance Programmes. https://core.ac.uk/download/pdf/56364504.pdf Accessed: 06/04/2020 Kelly, A., Wilson M. R., Jackson, D.T., Williams, C. A. (2020). Technical testing and match analysis statistics as part of the talent development process in an English football academy, International Journal of Performance Analysis in Sport, 20:6, 1035-1051. Kramer E.B. (2010). Football emergency medicine. Emergency medicine in football is now regarded as a sub-speciality of emergency medicine. CME: Your SA Journal of CPD (Vol. 28, Issue 5). Krustrup P., Krustrup B.R. (2010). Football is medicine: it is time for patients to play! British Journal of Sports Medicine 2018;52:1412-1414. https://bjsm.bmj.com/content/52/22/1412. Accessed: 30/03/2020 Link D., Lang S., Seidenschwarz P. (2016). Real Time Quantification of Dangerousity in Football Using Spatiotemporal Tracking Data. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5201291/. Accessed: 25/03/2020 Lorenzo, A., Borrás, P. J., Sánchez, J. M., Jiménez, S., Sampedro, J. (2009). CAREER TRANSITION FROM JUNIOR TO SENIOR IN BASKETBALL PLAYERSRevista de Psicología del Deporte, vol. 18, núm. 3, 2009, pp. 309-312. https://www.researchgate.net/publication/237030588_Career_transition_from_junior_to_se nior_in_basketball_players. Accessed: 25/03/2020 Murr, D., Feichtinger, P., Larkin P., O'Connor D., Höner, O. (2018). Psychological talent predictors in youth soccer: A systematic review of the prognostic relevance of psychomotor, perceptualcognitive and personality-related factors. https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0205337. Accessed: 07/05/2021 Musa, R. M., Majeed A. P. P. A., Kosni N. A., Abdullah M. R. (2020). Machine Learning in Team Sports Performance Analysis and Talent Identification in Beach Soccer & Sepak-takraw. SPRINGER BRIEFS IN APPLIED SCIENCES AND TECHNOLOGY. Pappalardo, L., Cintia P., Ferragina, P., Massucco, E., Pedreschi, D., Giannotti, F. (2019). PlayeRank: data-driven performance evaluation and player ranking in soccer via a machine learning approach. https://arxiv.org/pdf/1802.04987.pdf. Accessed: 07/05/2021 Rein R., Memmert, D. (2016). Big data and tactical analysis in elite soccer: future challenges and opportunities for sports science. SpringerPlus (2016) 5:1410 Schütz N.S., Pedersen B.B., Rerup B. (2019). VALUE CREATION THROUGH DATA TRACKING TECHNOLOGIES IN THE FOOTBALL INDUSTRY OBSTACLES DYSFUNCTIONAL EFFECTS. MCIS 2019 Proceedings. 35. https://pure.au.dk/portal/files/173292768/VALUE_CREATION_THROUGH_DATA_T RACKING_TECHNOLOGIES_IN_THE_FOOTBALL.pdf. Accessed: 06/04/2020 Stambulova N. (2010). Counseling Athletes in Career Transitions: The Five-Step Career Planning Strategy. https://www.researchgate.net/publication/232844112_Counseling_Athletes_in_Career_Tra nsitions_The_Five-Step_Career_Planning_Strategy Accessed: 06/04/2020 Stambulova N., Alfermann D., Statler T., Côté J. (2009). ISSP Position Stand: Career Development and Transitions of Athletes. IJSEP, 2009, 7, 395-412. https://www.issponline.org/images/isspdata/position_stands/Career_Development_and_T ransitions_of_Athletes.pdf Accessed: 07/04/2020 Tunaru R. S., Viney H. P. (2010). Valuations of Soccer Players from Statistical Performance Data. Journal of Quantitative Analysis in Sports. Volume 6, Issue 2, Article 10. Yokesh T.P., Kumar S. (2015). VARIOUS SPORTS TECHNOLOGIES ARE USED IN DEVELOPING THE SPORTS PERFORMANCE. ISSN 2231-3265 International Journal of Health, Physical Education and Computer Science in Sports Volume No.29, No.2 pp 5-7 https://www.researchgate.net/publication/339642888_Various_Sports_Technologies_are_u sed_in_Developing_the_Sports_Performance. Accessed: 07/01/2021 34TH BLED ECONFERENCE DIGITAL SUPPORT FROM CRISIS TO PROGRESSIVE CHANGE ANDREJA PUCIHAR (ET AL.) 34th Program Committee Chair, Bled eConference, Professor, University of Maribor, Faculty of Organizational Sciences, Kranj, Slovenia, e-mail: andreja.pucihar@um.si Abstract Bled eConference, organized by University of Maribor, Keywords: digital support, crisis, progressive change Faculty of Organizational Sciences, has been shaping electronic interaction since 1988. In 2021, Bled eConference was held online for the 2nd time due to the Covid-19 pandemic. The role of digital technologies has never been more important than during the pandemic, allowing people to interact, collaborate and find new opportunities and ways to overcome challenges. The theme of the 34th conference is "Digital Support from Crisis to Progressive Change". Society is beginning to envision what the post-crisis world will look like and is calling for different economic models for the well-being and sustainable development of society. Digital technologies play an important role in achieving these goals. We address the opportunities and challenges of digital transformation and provide guidance for organizations. Topics of the conference proceedings include Digital Transformation, Digital Business, Business Models, Data Science, Digital Health, Digital Wellness, Digital Ethics, Digital Education, Sustainable Cities and Digital Consumers. https://doi.org/10.18690/978-961-286-485-9 DOI 978-961-286-485-9 ISBN