{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T04:18:26Z","timestamp":1748405906944,"version":"3.41.0"},"publisher-location":"Cham","reference-count":50,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319187136"},{"type":"electronic","value":"9783319187143"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18714-3_6","type":"book-chapter","created":{"date-parts":[[2015,4,30]],"date-time":"2015-04-30T09:21:44Z","timestamp":1430385704000},"page":"87-103","source":"Crossref","is-referenced-by-count":3,"title":["Designing a Report Recommendation Assistant: A First Design Cycle"],"prefix":"10.1007","author":[{"given":"Martin","family":"Kretzer","sequence":"first","affiliation":[]},{"given":"Maximilian","family":"Kleinedler","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Theilemann","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"M\u00e4dche","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Maas, J.B., Fenema, P.C., Soeters, J.: Information System Infusion: The Role of Control and Empowerment. In: ICIS Proceedings (2012)"},{"key":"6_CR2","unstructured":"Gy\u00f6ry, A., Cleven, A., Uebernickel, F., Brenner, W.: Exploring the Shadows: IT Governance Approaches to User-Driven Innovation. In: ECIS Proceedings (2012)"},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1057\/ejis.2011.8","volume":"20","author":"R. Baskerville","year":"2011","unstructured":"Baskerville, R.: Individual IS as a Research Arena. Europ. J. Inf. Sys.\u00a020, 251\u2013254 (2011)","journal-title":"Europ. J. Inf. Sys."},{"key":"6_CR4","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1145\/1461928.1461960","volume":"52","author":"S. Behrens","year":"2009","unstructured":"Behrens, S.: Shadow Systems: The Good, the Bad, the Ugly. Com. ACM\u00a052, 124\u2013129 (2009)","journal-title":"Com. ACM"},{"issue":"4","key":"6_CR5","doi-asserted-by":"publisher","first-page":"748","DOI":"10.1287\/isre.1100.0318","volume":"21","author":"D. Tilson","year":"2010","unstructured":"Tilson, D., Lyytinen, K., S\u00f8rensen, C.: Digital Infrastructures: The missing IS Research Agenda. Information Systems Research\u00a021(4), 748\u2013759 (2010)","journal-title":"Information Systems Research"},{"key":"6_CR6","series-title":"Uncovering the Opportunities","doi-asserted-by":"crossref","DOI":"10.15358\/9783800648153","volume-title":"Big Data@Work: Dispelling the Myths","author":"T.H. Davenport","year":"2014","unstructured":"Davenport, T.H.: Big Data@Work: Dispelling the Myths. Uncovering the Opportunities. HBS Publishing, Boston (2014)"},{"key":"6_CR7","unstructured":"Kretzer, M., Ga\u00df, O., M\u00e4dche, A.: Design Principles for Diffusion of Reports and Innovative Use of Business Intelligence Platforms. In: WI Proceedings (2015)"},{"issue":"1","key":"6_CR8","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1108\/01443570910925352","volume":"29","author":"E. Bernardes","year":"2009","unstructured":"Bernardes, E., Hanna, M.A.: Theoretical Review of Flexibility, Agility and Responsiveness in the Operations Management Literature. Int. J. Op. Prod. Mgmt.\u00a029(1), 30\u201353 (2009)","journal-title":"Int. J. Op. Prod. Mgmt."},{"issue":"3","key":"6_CR9","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1287\/isre.1120.0456","volume":"24","author":"X. Li","year":"2013","unstructured":"Li, X., Hsieh, J.J.P.-A., Rai, A.: Motivational Differences Across Post-Acceptance Information Usage Behaviors: An Investigation in the Business Intelligence Systems Context. Information Systems Research\u00a024(3), 659\u2013682 (2013)","journal-title":"Information Systems Research"},{"issue":"3","key":"6_CR10","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1287\/isre.1060.0096","volume":"17","author":"A. Burton-Jones","year":"2006","unstructured":"Burton-Jones, A., Straub, D.W.: Reconceptualizing System Usage: An Approach and Empirical Test. Information Systems Research\u00a017(3), 228\u2013246 (2006)","journal-title":"Information Systems Research"},{"issue":"2","key":"6_CR11","doi-asserted-by":"publisher","first-page":"202","DOI":"10.5465\/AMR.2010.48463331","volume":"35","author":"M. Farjoun","year":"2010","unstructured":"Farjoun, M.: Beyond Dualism: Stability and Change as a Duality. Academy of Management Review\u00a035(2), 202\u2013225 (2010)","journal-title":"Academy of Management Review"},{"key":"6_CR12","unstructured":"Zittrain, J.L.: The Future of the Internet and How to Stop It, New Haven (2008)"},{"key":"6_CR13","volume-title":"Diffusion of Innovations","author":"E. Rogers","year":"2010","unstructured":"Rogers, E.: Diffusion of Innovations. Simon and Schuster, New York (2010)"},{"key":"6_CR14","unstructured":"Bhattacherjee, A.: Social Science Research: Principles, Methods, and Practices (2012)"},{"issue":"1","key":"6_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1287\/orsc.3.1.1","volume":"3","author":"P. Attewell","year":"1992","unstructured":"Attewell, P.: Technology Diffusion and Organizational Learning. Org. Sc.\u00a03(1), 1\u201319 (1992)","journal-title":"Org. Sc."},{"issue":"7","key":"6_CR16","first-page":"386","volume":"8","author":"T. Dinev","year":"2007","unstructured":"Dinev, T., Hu, Q.: The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies. J. AIS\u00a08(7), 386\u2013408 (2007)","journal-title":"J. AIS"},{"issue":"3","key":"6_CR17","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1046\/j.1365-2575.2003.00141.x","volume":"13","author":"E. Mustonen-Ollila","year":"2003","unstructured":"Mustonen-Ollila, E., Lyytinen, K.: Why Organizations adopt IS Process Innovations: A Longitudinal Study using Diffusion of Innovation Theory. Inf. Sys. J.\u00a013(3), 275\u2013297 (2003)","journal-title":"Inf. Sys. J."},{"issue":"2","key":"6_CR18","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MC.2010.35","volume":"43","author":"M. Siponen","year":"2010","unstructured":"Siponen, M., Pahnila, S., Mahmood, M.: Compliance with Information Security Policies: An Empirical Investigation. IEEE Computer\u00a043(2), 64\u201371 (2010)","journal-title":"IEEE Computer"},{"issue":"2","key":"6_CR19","doi-asserted-by":"crossref","first-page":"337","DOI":"10.25300\/MISQ\/2013\/37.2.01","volume":"37","author":"S. Gregor","year":"2013","unstructured":"Gregor, S., Hevner, A.R.: Positioning and Presenting Design Science Research for Maximum Impact. MIS Quarterly\u00a037(2), 337\u2013355 (2013)","journal-title":"MIS Quarterly"},{"issue":"6","key":"6_CR20","first-page":"395","volume":"13","author":"W. Kuechler","year":"2012","unstructured":"Kuechler, W., Vaishnavi, V.: A Framework for Theory Development in DSR: Multiple Perspectives. J. AIS\u00a013(6), 395\u2013423 (2012)","journal-title":"J. AIS"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Gill, T.G.: Reflections on Reshaping the Rugged Fitness Landscape. Int. J. Emerging Transdiscipline, 165-196 (2008)","DOI":"10.28945\/445"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Carlsson, S.A.: DSR in IS: A Critical Realist Approach. In: Hevner, A., Chatterjee, S. (eds.) Design Research in IS, pp. 209\u2013233. Springer (2010)","DOI":"10.1007\/978-1-4419-5653-8_15"},{"key":"6_CR23","unstructured":"Goes, P.B.: Design Science Research in Top IS Journals. MIS Quarterly 38(1), ii-viii (2014)"},{"issue":"1","key":"6_CR24","doi-asserted-by":"publisher","first-page":"17","DOI":"10.2753\/MIS0742-1222280102","volume":"28","author":"J. Nunamaker","year":"2011","unstructured":"Nunamaker, J., Derrick, D., Elkins, A., Burgoon, J., Patton, M.: Embodies Conversational Agent-Based Kiosk for Automated Interviewing. J. Mgmt. Inf. Sys.\u00a028(1), 17\u201348 (2011)","journal-title":"J. Mgmt. Inf. Sys."},{"key":"6_CR25","unstructured":"Hevner, A.R.: A Three Cycle View of DSR. Scand. J. Inf. Sys.\u00a019(2), art. 4 (2007)"},{"issue":"8","key":"6_CR26","first-page":"637","volume":"10","author":"J.M. Day","year":"2009","unstructured":"Day, J.M., Junglas, I., Silva, L.: Information Flow Impediments in Disaster Relief Supply Chain. J. AIS\u00a010(8), 637\u2013660 (2009)","journal-title":"J. AIS"},{"issue":"2","key":"6_CR27","first-page":"43","volume":"6","author":"J.G. Walls","year":"2004","unstructured":"Walls, J.G., Widmeyer, G.R., El Sawy, O.A.: Assessing IS Design Theory in Perspective. JITTA\u00a06(2), 43\u201358 (2004)","journal-title":"JITTA"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Myers, D.M.: Qualitative Research in Business & Management. Sage Publications (2009)","DOI":"10.4135\/9781036208417"},{"issue":"1","key":"6_CR29","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1287\/orsc.1060.0225","volume":"18","author":"L. Lapointe","year":"2007","unstructured":"Lapointe, L., Rivard, S.: A Triple Take on Information Systems Implementation. Organization Science\u00a018(1), 89\u2013107 (2007)","journal-title":"Organization Science"},{"key":"6_CR30","unstructured":"Unger, C., Kemper, H.-G., Russland, A.: Business Intelligence Center Concepts. In: AMCIS Proceedings (2008)"},{"issue":"3","key":"6_CR31","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1287\/isre.1120.0449","volume":"24","author":"P.V. Singh","year":"2013","unstructured":"Singh, P.V., Phelps, C.: Networks, Social Influence, and the Choice Among Competing Innovations. Information Systems Research\u00a024(3), 539\u2013560 (2013)","journal-title":"Information Systems Research"},{"issue":"1","key":"6_CR32","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1177\/0049124193022001006","volume":"22","author":"P. Marsden","year":"1993","unstructured":"Marsden, P., Friedkin, N.: Network Studies of Social Influence. Social Methods Research\u00a022(1), 127\u2013151 (1993)","journal-title":"Social Methods Research"},{"issue":"8","key":"6_CR33","doi-asserted-by":"publisher","first-page":"1219","DOI":"10.1287\/mnsc.1100.1183","volume":"56","author":"C. Angst","year":"2010","unstructured":"Angst, C., Agarwal, R., Sambamurthy, V., Kelly, K.: Social Contagion and Information Technology Diffusion. Management Science\u00a056(8), 1219\u20131241 (2010)","journal-title":"Management Science"},{"issue":"2","key":"6_CR34","doi-asserted-by":"crossref","first-page":"329","DOI":"10.25300\/MISQ\/2014\/38.2.01","volume":"38","author":"R.G. Fichman","year":"2014","unstructured":"Fichman, R.G., Dos Santos, B.L., Zheng, Z.E.: Digital Innovation as a Fundamental and Powerful Concept in the IS Curriculm. MIS Quarterly\u00a038(2), 329\u2013354 (2014)","journal-title":"MIS Quarterly"},{"issue":"1","key":"6_CR35","doi-asserted-by":"publisher","first-page":"105","DOI":"10.2307\/249441","volume":"15","author":"M.S. Silver","year":"1991","unstructured":"Silver, M.S.: Decisional Guidance for Computer-Based Decision Support. MIS Quarterly\u00a015(1), 105\u2013122 (1991)","journal-title":"MIS Quarterly"},{"key":"6_CR36","doi-asserted-by":"crossref","unstructured":"Dhaliwal, J.S., Benbasat, I.: The Use and Effects of Knowledge-based System Explanations. Information Systems Research 7(3) (1996)","DOI":"10.1287\/isre.7.3.342"},{"issue":"4","key":"6_CR37","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1287\/isre.11.4.386.11874","volume":"11","author":"M. Limayem","year":"2000","unstructured":"Limayem, M., DeSanctis, G.: Providing Decisional Guidance for Multicriteria Decision Making in Groups. Information Systems Research\u00a011(4), 386\u2013401 (2000)","journal-title":"Information Systems Research"},{"issue":"4","key":"6_CR38","doi-asserted-by":"crossref","first-page":"859","DOI":"10.2307\/41409964","volume":"35","author":"T. Zhang","year":"2011","unstructured":"Zhang, T., Agarwal, R., Lucas, H.C.: The Value of IT-Enabled Retailer Learning. MIS Quarterly\u00a035(4), 859\u2013881 (2011)","journal-title":"MIS Quarterly"},{"key":"6_CR39","unstructured":"SAP. SAP BusinessObject BI Clients (2013), http:\/\/tinyurl.com\/lmvaj7o"},{"issue":"3","key":"6_CR40","doi-asserted-by":"crossref","first-page":"729","DOI":"10.25300\/MISQ\/2014\/38.3.05","volume":"38","author":"S.A. Brown","year":"2014","unstructured":"Brown, S.A., Venkatesh, V., Goyal, S.: Expectation Confirmation in Information Systems Research. MIS Quarterly\u00a038(3), 729\u2013756 (2014)","journal-title":"MIS Quarterly"},{"issue":"3","key":"6_CR41","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"F.D. Davis","year":"1989","unstructured":"Davis, F.D.: Perceived Usefulness, Perceived Ease of Use, and User Acceptance of IT. MIS Quarterly\u00a013(3), 319\u2013340 (1989)","journal-title":"MIS Quarterly"},{"key":"6_CR42","unstructured":"Microsoft: Contoso Retail Store Business Intelligence Dataset (January 01, 2015), http:\/\/microsoft.com\/en-us\/download\/confirmation.aspx?id=18279"},{"key":"6_CR43","doi-asserted-by":"crossref","unstructured":"SAP: SAP BusinessObjects Analysis, edition for Microsoft Office (January 27, 2015), http:\/\/scn.sap.com\/community\/businessobjects-analysis-ms-office","DOI":"10.1007\/978-1-4842-1383-4_4"},{"key":"6_CR44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-03563-1","volume-title":"Marketingmanagement","author":"C. Homburg","year":"2014","unstructured":"Homburg, C.: Marketingmanagement, 5th edn. Springer, Gabler (2014)","edition":"5"},{"issue":"4","key":"6_CR45","doi-asserted-by":"crossref","first-page":"805","DOI":"10.2307\/25148755","volume":"30","author":"A. Bhattacherjee","year":"2006","unstructured":"Bhattacherjee, A., Sanford, C.: Influence Processes for Information Technology Acceptance. MIS Quarterly\u00a030(4), 805\u2013825 (2006)","journal-title":"MIS Quarterly"},{"key":"6_CR46","first-page":"90","volume":"6","author":"M. Silver","year":"2006","unstructured":"Silver, M.: Decisional Guidance: Broadening the Scope. Advances in Management Information Systems\u00a06, 90\u2013119 (2006)","journal-title":"Advances in Management Information Systems"},{"issue":"4","key":"6_CR47","doi-asserted-by":"publisher","first-page":"497","DOI":"10.2307\/249487","volume":"23","author":"S. Gregor","year":"1999","unstructured":"Gregor, S., Benbasat, I.: Explanations from Intelligent Systems: Theoretical Foundations and Implications for Practice. MIS Quarterly\u00a023(4), 497\u2013530 (1999)","journal-title":"MIS Quarterly"},{"key":"6_CR48","unstructured":"Csikszentmihalyi, M.: Flow: The Psychology of Optimal Experience, New York, NY (1990)"},{"key":"6_CR49","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.chb.2014.07.048","volume":"40","author":"J. Hamari","year":"2014","unstructured":"Hamari, J., Koivisto, J.: Measuring Flow in Gamification: Dispositional Flow Scale-2. Computers in Human Behavior\u00a040, 133\u2013143 (2014)","journal-title":"Computers in Human Behavior"},{"issue":"6","key":"6_CR50","doi-asserted-by":"publisher","first-page":"2306","DOI":"10.1016\/j.chb.2012.06.039","volume":"28","author":"K. Procci","year":"2012","unstructured":"Procci, K., Singer, A.R., Levy, K.R., Bowers, C.: Measuring the Flow Experience of Gamers. Computers in Human Behavior\u00a028(6), 2306\u20132312 (2012)","journal-title":"Computers in Human Behavior"}],"container-title":["Lecture Notes in Computer Science","New Horizons in Design Science: Broadening the Research Agenda"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18714-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T18:34:29Z","timestamp":1748370869000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-18714-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319187136","9783319187143"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18714-3_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}