{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T07:24:05Z","timestamp":1770967445398,"version":"3.50.1"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,4,29]],"date-time":"2022-04-29T00:00:00Z","timestamp":1651190400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,4,29]],"date-time":"2022-04-29T00:00:00Z","timestamp":1651190400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100008349","name":"Universit\u00e4t Duisburg-Essen","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100008349","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2023,6]]},"abstract":"<jats:title>Abstract\n<\/jats:title><jats:p>Today\u2019s companies rely heavily on in-company information technology standards (ICITS) to reduce costs, ensure flexibility, and facilitate the planning, implementation, and operation of IT systems. Steering and managing ICITS has proven to be challenging, revealing the need for efficient governance mechanisms. But even though prior research demonstrates the challenges of ICITS, viable advice on how to implement ICITS is scarce. In this paper, we develop an organizational design theory for the management of ICITS based on the framework of organizational control theory. We conducted a critical case study to identify basic goals, constitutive elements, and fundamental mechanisms of a working ICITS management. The resulting design goals and principles were then evaluated and further refined in the light of additional expert interviews. With our work, we wish to extend the body of theoretical knowledge on the management of ICITS and help practitioners master the various challenges occurring in this domain.<\/jats:p>","DOI":"10.1007\/s10796-022-10277-2","type":"journal-article","created":{"date-parts":[[2022,4,29]],"date-time":"2022-04-29T06:04:55Z","timestamp":1651212295000},"page":"1161-1178","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Managing In-Company IT Standardization: A Design Theory"],"prefix":"10.1007","volume":"25","author":[{"given":"Frederik","family":"Ahlemann","sequence":"first","affiliation":[]},{"given":"Sven","family":"Dittes","sequence":"additional","affiliation":[]},{"given":"Tim","family":"Fillbrunn","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Rehring","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5295-8101","authenticated-orcid":false,"given":"Stefan","family":"Reining","sequence":"additional","affiliation":[]},{"given":"Nils","family":"Urbach","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,29]]},"reference":[{"issue":"3","key":"10277_CR1","doi-asserted-by":"publisher","first-page":"835","DOI":"10.25300\/MISQ\/2013\/37.3.08","volume":"37","author":"DK Allen","year":"2013","unstructured":"Allen, D. K., Brown, A., Karanasios, S., & Norman, A. (2013). How should technology-mediated organizational change be explained? A comparison of the contributions of critical realism and activity theory. MIS Quarterly, 37(3), 835\u2013854.","journal-title":"MIS Quarterly"},{"issue":"3","key":"10277_CR2","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1080\/07421222.2002.11045695","volume":"18","author":"HP Andres","year":"2002","unstructured":"Andres, H. P., & Zmud, R. W. (2002). A contingency approach to software project coordination. Journal of Management Information Systems, 18(3), 41\u201370. https:\/\/doi.org\/10.1080\/07421222.2002.11045695","journal-title":"Journal of Management Information Systems"},{"issue":"Special Issue","key":"10277_CR3","doi-asserted-by":"publisher","first-page":"413","DOI":"10.2307\/25148767","volume":"30","author":"J Backhouse","year":"2006","unstructured":"Backhouse, J., Hsu, C. W., & Silva, L. (2006). Circuits of power in creating de jure standards: Shaping an international information systems security standard. MIS Quarterly, 30(Special Issue), 413\u2013438.","journal-title":"MIS Quarterly"},{"key":"10277_CR4","volume-title":"The Functions of the Executive","author":"CI Barnard","year":"1968","unstructured":"Barnard, C. I. (1968). The Functions of the Executive. Harvard University Press."},{"issue":"5","key":"10277_CR5","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1097\/00005110-198005000-00005","volume":"10","author":"ML Bell","year":"1980","unstructured":"Bell, M. L. (1980). Management by objectives. Journal of Nursing Administration, 10(5), 19\u201326.","journal-title":"Journal of Nursing Administration"},{"key":"10277_CR6","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1146\/annurev.so.12.080186.000435","volume":"12","author":"BJ Biddle","year":"1986","unstructured":"Biddle, B. J. (1986). Recent development in role theory. Annual Review of Sociology, 12, 67\u201392.","journal-title":"Annual Review of Sociology"},{"issue":"2","key":"10277_CR7","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/301688.301691","volume":"6","author":"GB Bird","year":"1998","unstructured":"Bird, G. B. (1998). The business benefit of standards. StandardView, 6(2), 76\u201380. https:\/\/doi.org\/10.1145\/301688.301691","journal-title":"StandardView"},{"issue":"3","key":"10277_CR8","doi-asserted-by":"publisher","first-page":"163","DOI":"10.2753\/MIS0742-1222230307","volume":"23","author":"WF Boh","year":"2006","unstructured":"Boh, W. F., & Yellin, D. (2006). Using enterprise architecture standards in managing information technology. Journal of Management Information Systems, 23(3), 163\u2013207. https:\/\/doi.org\/10.2753\/MIS0742-1222230307","journal-title":"Journal of Management Information Systems"},{"issue":"4","key":"10277_CR9","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1287\/orsc.1040.0084","volume":"15","author":"LB Cardinal","year":"2004","unstructured":"Cardinal, L. B., Sitkin, S. B., & Long, C. P. (2004). Balancing and rebalancing in the creation and evolution of organizational control. Organization Science, 15(4), 411\u2013431. https:\/\/doi.org\/10.1287\/orsc.1040.0084","journal-title":"Organization Science"},{"key":"10277_CR10","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/s10796-017-9759-x","volume":"21","author":"B Choi","year":"2019","unstructured":"Choi, B., Raghu, T. S., Vinz\u00e9, A., & Dooley, K. J. (2019). Effectiveness of standards consortia: Social network perspectives. Information Systems Frontiers, 21, 405\u2013416. https:\/\/doi.org\/10.1007\/s10796-017-9759-x","journal-title":"Information Systems Frontiers"},{"key":"10277_CR11","unstructured":"Chua, C., Storey, V., & Chen, L. (2014). Central IT or Shadow IT? Factors Shaping Users\u2019 Decision to Go Rogue With IT. ICIS 2014 Proceedings, 1\u201314. https:\/\/aisel.aisnet.org\/icis2014\/proceedings\/ISGovernance\/2. Accessed 18 Apr\u00a02022."},{"issue":"2","key":"10277_CR12","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/0361-3682(82)90015-0","volume":"7","author":"F Collins","year":"1982","unstructured":"Collins, F. (1982). Managerial accounting systems and organizational control: A role perspective. Accounting, Organizations and Society, 7(2), 107\u2013122. https:\/\/doi.org\/10.1016\/0361-3682(82)90015-0","journal-title":"Accounting, Organizations and Society"},{"key":"10277_CR13","unstructured":"Curran, C. (2010, May 6). CIO Dashboard\u202f\u00bb Governance, Analytics and Standards. http:\/\/www.ciodashboard.com\/it-strategy\/analytics-governance-standards\/. Accessed 18 Apr 2022."},{"issue":"1","key":"10277_CR14","doi-asserted-by":"publisher","first-page":"62","DOI":"10.4018\/jitsr.2006010104","volume":"4","author":"HJ de De Vries","year":"2006","unstructured":"de De Vries, H. J., Slob, F. J. C., & Zuid-Holland, V. G. (2006). Best Practice in company standardization. International Journal of IT Standards and Standardization Research (IJITSR), 4(1), 62\u201385. https:\/\/doi.org\/10.4018\/jitsr.2006010104","journal-title":"International Journal of IT Standards and Standardization Research (IJITSR)"},{"key":"10277_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3042-5","volume-title":"Standardization: A Business Approach to the Role of National Standardization Organizations","author":"HJ De Vries","year":"1999","unstructured":"De Vries, H. J. (1999). Standardization: A Business Approach to the Role of National Standardization Organizations. Kluwer Academic Publishers."},{"issue":"4","key":"10277_CR16","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1365\/s35764-014-0440-6","volume":"6","author":"S Dittes","year":"2014","unstructured":"Dittes, S., Urbach, N., & Ahlemann, F. (2014). IT-Standardisierung\u2014Vom Lippenbekenntnis zu nachhaltigem Nutzen. Wirtschaftsinformatik & Management, 6(4), 29\u201339. https:\/\/doi.org\/10.1365\/s35764-014-0440-6","journal-title":"Wirtschaftsinformatik & Management"},{"key":"10277_CR17","unstructured":"Dittes, S., Urbach, N., Ahlemann, F., Smolnik, S., & M\u00fcller, T. (2015). Why don\u2019t you stick to them? Understanding factors influencing and counter-measures to combat deviant behavior towards organizational IT standards. Proceedings of the 12th International Conference on Wirtschaftsinformatik (WI), Osnabr\u00fcck, Germany, 615\u2013629."},{"issue":"6","key":"10277_CR18","doi-asserted-by":"publisher","first-page":"836","DOI":"10.1109\/32.824413","volume":"25","author":"W Emmerich","year":"1999","unstructured":"Emmerich, W., Finkelstein, A., Montangero, C., Antonelli, S., Armitage, S., & Stevens, R. (1999). Managing standards compliance. IEEE Transactions on Software Engineering, 25(6), 836\u2013851. https:\/\/doi.org\/10.1109\/32.824413","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"2","key":"10277_CR19","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/0361-3682(83)90023-5","volume":"8","author":"EG Flamholtz","year":"1983","unstructured":"Flamholtz, E. G. (1983). Accounting, budgeting and control systems in their organizational context: Theoretical and empirical perspectives. Accounting, Organizations and Society, 8(2), 153\u2013169.","journal-title":"Accounting, Organizations and Society"},{"issue":"1","key":"10277_CR20","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/0361-3682(85)90030-3","volume":"10","author":"EG Flamholtz","year":"1985","unstructured":"Flamholtz, E. G., Das, T. K., & Tsui, A. S. (1985). Toward an integrative framework of organizational control. Accounting, Organizations and Society, 10(1), 35\u201350. https:\/\/doi.org\/10.1016\/0361-3682(85)90030-3","journal-title":"Accounting, Organizations and Society"},{"key":"10277_CR21","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1007\/s10796-014-9542-1","volume":"18","author":"R Foorthuis","year":"2016","unstructured":"Foorthuis, R., van Steenbergen, M., Brinkkemper, S., & Bruls, W. A. G. (2016). A theory building study of enterprise architecture practices and benefits. Information Systems Frontiers, 18, 541\u2013564. https:\/\/doi.org\/10.1007\/s10796-014-9542-1","journal-title":"Information Systems Frontiers"},{"issue":"12","key":"10277_CR22","doi-asserted-by":"publisher","first-page":"1827","DOI":"10.1287\/mnsc.41.12.1827","volume":"41","author":"DL Goodhue","year":"1995","unstructured":"Goodhue, D. L. (1995). Understanding User Evaluations of Information Systems. Management Science, 41(12), 1827\u20131844.","journal-title":"Management Science"},{"issue":"5","key":"10277_CR23","first-page":"313","volume":"8","author":"S Gregor","year":"2007","unstructured":"Gregor, S., & Jones, D. (2007). The anatomy of a design theory. Journal of the Association for Information Systems, 8(5), 313\u2013335.","journal-title":"Journal of the Association for Information Systems"},{"issue":"3\u20134","key":"10277_CR24","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1023\/A:1012637309336","volume":"10","author":"O Hanseth","year":"2001","unstructured":"Hanseth, O., & Braa, K. (2001). Hunting for the treasure at the end of the rainbow: Standardizing corporate IT infrastructure. Computer Supported Cooperative Work (CSCW), 10(3\u20134), 261\u2013292. https:\/\/doi.org\/10.1023\/A:1012637309336","journal-title":"Computer Supported Cooperative Work (CSCW)"},{"issue":"2","key":"10277_CR25","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1057\/ejis.2009.6","volume":"18","author":"T Herath","year":"2009","unstructured":"Herath, T., & Rao, H. R. (2009). Protection motivation and deterrence: A framework for security policy compliance in organisations. European Journal of Information Systems, 18(2), 106\u2013125. https:\/\/doi.org\/10.1057\/ejis.2009.6","journal-title":"European Journal of Information Systems"},{"key":"10277_CR26","unstructured":"Hesser, W., & Inklaar, A. (1998). An Introduction to Standards and Standardization (2nd ed.). Beuth."},{"issue":"3","key":"10277_CR27","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1108\/02635570310465670","volume":"103","author":"M Jun","year":"2003","unstructured":"Jun, M., & Cai, S. (2003). Key obstacles to EDI success: From the US small manufacturing companies\u2019 perspective. Industrial Management & Data Systems, 103(3), 192\u2013203. https:\/\/doi.org\/10.1108\/02635570310465670","journal-title":"Industrial Management & Data Systems"},{"issue":"1","key":"10277_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1287\/orsc.7.1.1","volume":"7","author":"LJ Kirsch","year":"1996","unstructured":"Kirsch, L. J. (1996). The management of complex tasks in organizations: Controlling the systems development process. Organization Science, 7(1), 1\u201321.","journal-title":"Organization Science"},{"issue":"4","key":"10277_CR29","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1287\/isre.1040.0036","volume":"15","author":"LJ Kirsch","year":"2004","unstructured":"Kirsch, L. J. (2004). Deploying common systems globally: The dynamics of control. Information Systems Research, 15(4), 374\u2013395. https:\/\/doi.org\/10.1287\/isre.1040.0036","journal-title":"Information Systems Research"},{"issue":"1","key":"10277_CR30","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1108\/09544780010287177","volume":"12","author":"Y Kondo","year":"2000","unstructured":"Kondo, Y. (2000). Innovation versus standardization. The TQM Magazine, 12(1), 6\u201310. https:\/\/doi.org\/10.1108\/09544780010287177","journal-title":"The TQM Magazine"},{"issue":"2","key":"10277_CR31","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1287\/isre.1120.0427","volume":"24","author":"H Liang","year":"2012","unstructured":"Liang, H., Xue, Y., & Wu, L. (2012). Ensuring employees\u2019 IT compliance: Carrot or stick? Information Systems Research, 24(2), 279\u2013294. https:\/\/doi.org\/10.1287\/isre.1120.0427","journal-title":"Information Systems Research"},{"key":"10277_CR32","doi-asserted-by":"crossref","unstructured":"M\u00fcller, T., Dittes, S., Ahlemann, F., Urbach, N., & Smolnik, S. (2015, January). Because Everybody is Different: Towards Understanding the Acceptance of Organizational IT Standards. Proceedings of the 48th Hawaii International Conference on System Sciences.","DOI":"10.1109\/HICSS.2015.487"},{"issue":"1","key":"10277_CR33","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1108\/14637151011017930","volume":"16","author":"B M\u00fcnstermann","year":"2010","unstructured":"M\u00fcnstermann, B., Eckhardt, A., & Weitzel, T. (2010). The performance impact of business process standardization: An empirical evaluation of the recruitment process. Business Process Management Journal, 16(1), 29\u201356. https:\/\/doi.org\/10.1108\/14637151011017930","journal-title":"Business Process Management Journal"},{"key":"10277_CR34","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/s10796-009-9154-3","volume":"11","author":"EWT Ngai","year":"2009","unstructured":"Ngai, E. W. T., Poon, J. K. L., Suk, F. F. C., & Ng, C. C. (2009). Design of an RFID-based Healthcare Management System using an Information System Design Theory. Information Systems Frontiers, 11, 405\u2013417. https:\/\/doi.org\/10.1007\/s10796-009-9154-3","journal-title":"Information Systems Frontiers"},{"issue":"2","key":"10277_CR35","doi-asserted-by":"publisher","first-page":"173","DOI":"10.2307\/255753","volume":"21","author":"WG Ouchi","year":"1978","unstructured":"Ouchi, W. G. (1978). The transmission of control through organizational hierarchy. Academy of Management Journal, 21(2), 173\u2013192. https:\/\/doi.org\/10.2307\/255753","journal-title":"Academy of Management Journal"},{"issue":"9","key":"10277_CR36","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1287\/mnsc.25.9.833","volume":"25","author":"WG Ouchi","year":"1979","unstructured":"Ouchi, W. G. (1979). A conceptual framework for the design of organizational control mechanisms. Management Science, 25(9), 833\u2013848.","journal-title":"Management Science"},{"issue":"1","key":"10277_CR37","doi-asserted-by":"publisher","first-page":"129","DOI":"10.2307\/2392231","volume":"25","author":"WG Ouchi","year":"1980","unstructured":"Ouchi, W. G. (1980). Markets, bureaucracies, and clans. Administrative Science Quarterly, 25(1), 129\u2013141.","journal-title":"Administrative Science Quarterly"},{"issue":"2","key":"10277_CR38","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1287\/orsc.1090.0422","volume":"20","author":"P Puranam","year":"2009","unstructured":"Puranam, P., Singh, H., & Chaudhuri, S. (2009). Integrating acquired capabilities: When structural integration is (un)necessary. Organization Science, 20(2), 313\u2013328. https:\/\/doi.org\/10.1287\/orsc.1090.0422","journal-title":"Organization Science"},{"issue":"4","key":"10277_CR39","doi-asserted-by":"publisher","first-page":"865","DOI":"10.25300\/MISQ\/2015\/39.4.6","volume":"39","author":"A Rai","year":"2015","unstructured":"Rai, A., Arikan, I., Pye, J., & Tiwana, A. (2015). Fit and misfit of plural sourcing strategies and IT-enabled process integration capabilities: Consequences of firm performance in the US electric utility Industry. Mis Quarterly, 39(4), 865\u2013885.","journal-title":"Mis Quarterly"},{"key":"10277_CR40","unstructured":"Rogers, E. M. (1983). Diffusion of Innovations (3rd ed.). The Free Press."},{"key":"10277_CR41","unstructured":"Russo, N. L., Hightower, R., & Pearson, J. M. (1996). The Failure of Methodologies to Meet the Needs of Current Development Environments. Proceedings of the British Computer Society\u2019s Annual Conference on Information System Methodologies, 387\u2013393."},{"key":"10277_CR42","unstructured":"Scantlebury, S., Thiel, W., Datel, A., & Kimmel, S. (2004). From IT Complexity to Commonality: Making Your Business More Nimble (Opportunities for Action in Information Technology). Boston Consulting Group."},{"key":"10277_CR43","volume-title":"Coordinating Technology: Studies in the International Standardization of Telecommunications","author":"SK Schmidt","year":"1998","unstructured":"Schmidt, S. K., & Werle, R. (1998). Coordinating Technology: Studies in the International Standardization of Telecommunications. MIT Press."},{"issue":"1","key":"10277_CR44","doi-asserted-by":"publisher","first-page":"155","DOI":"10.2307\/254780","volume":"17","author":"YK Shetty","year":"1974","unstructured":"Shetty, Y. K., & Carlisle, H. M. (1974). Organizational correlates of a management by objectives program. The Academy of Management Journal, 17(1), 155\u2013160. https:\/\/doi.org\/10.2307\/254780","journal-title":"The Academy of Management Journal"},{"key":"10277_CR45","doi-asserted-by":"crossref","unstructured":"Silic, M. (2015). Emerging from the Shadows: Survey Evidence of Shadow IT Use from Blissfully Ignorant Employees (SSRN Scholarly Paper ID 2633000). Social Science Research Network. https:\/\/papers.ssrn.com\/abstract=2633000. Accessed 18 Apr 2022.","DOI":"10.2139\/ssrn.2633000"},{"key":"10277_CR46","unstructured":"Thiel, W., Datel, A., Scantlebury, S., & Kimmel, S. (2004, May). From IT Complexity to Commonality. Bcg.Perspectives. https:\/\/www.bcgperspectives.com\/content\/articles\/information_technology_it_organization_from_it_complexity_to_commonality\/.\u00a0Accessed 18 Apr 2022."},{"issue":"2","key":"10277_CR47","doi-asserted-by":"publisher","first-page":"87","DOI":"10.2753\/MIS0742-1222270203","volume":"27","author":"A Tiwana","year":"2010","unstructured":"Tiwana, A. (2010). Systems development ambidexterity: Explaining the complementary and substitutive roles of formal and informal controls. Journal of Management Information Systems, 27(2), 87\u2013126. https:\/\/doi.org\/10.2753\/MIS0742-1222270203","journal-title":"Journal of Management Information Systems"},{"issue":"2","key":"10277_CR48","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1287\/isre.1080.0206","volume":"21","author":"A Tiwana","year":"2010","unstructured":"Tiwana, A., & Konsynski, B. (2010). Complementarities between organizational IT architecture and governance structure. Information Systems Research, 21(2), 288\u2013304. https:\/\/doi.org\/10.1287\/isre.1080.0206","journal-title":"Information Systems Research"},{"issue":"1","key":"10277_CR49","doi-asserted-by":"publisher","first-page":"197","DOI":"10.5465\/AMR.2006.19379631","volume":"31","author":"KL Turner","year":"2006","unstructured":"Turner, K. L., & Makhija, M. V. (2006). The role of organizational controls in managing knowledge. Academy of Management Review, 31(1), 197\u2013217. https:\/\/doi.org\/10.5465\/AMR.2006.19379631","journal-title":"Academy of Management Review"},{"key":"10277_CR50","doi-asserted-by":"crossref","unstructured":"van Wessel, R. (2010). Toward corporate IT standardization management: Frameworks and solutions. Information Science Reference.","DOI":"10.4018\/978-1-61520-759-6"},{"key":"10277_CR51","doi-asserted-by":"publisher","unstructured":"van Wessel, R., Ribbers, P., & Vries, H. de. (2005). On the effects of IS company standards on business process performance. The 4th Conference on Standardization and Innovation in Information Technology, 2005., 254\u2013267. https:\/\/doi.org\/10.1109\/SIIT.2005.1563813.","DOI":"10.1109\/SIIT.2005.1563813"},{"issue":"4","key":"10277_CR52","doi-asserted-by":"publisher","first-page":"263","DOI":"10.2753\/MIS0742-1222290410","volume":"29","author":"A Vance","year":"2013","unstructured":"Vance, A., Lowry, P. B., & Eggett, D. (2013). Using accountability to reduce access policy violations in information systems. Journal of Management Information Systems, 29(4), 263\u2013290. https:\/\/doi.org\/10.2753\/MIS0742-1222290410","journal-title":"Journal of Management Information Systems"},{"issue":"2","key":"10277_CR53","doi-asserted-by":"publisher","first-page":"345","DOI":"10.25300\/MISQ\/2015\/39.2.04","volume":"39","author":"A Vance","year":"2015","unstructured":"Vance, A., Lowry, P. B., & Eggett, D. (2015). Increasing accountability through user-interface design artifacts: A new approach to addressing the problem of access-policy violations. MIS Quarterly, 39(2), 345\u2013366.","journal-title":"MIS Quarterly"},{"key":"10277_CR54","doi-asserted-by":"publisher","unstructured":"Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186.\u00a0https:\/\/doi.org\/10.1287\/mnsc.46.2.186.11926.\u00a0Accessed 18 Apr 2022.","DOI":"10.1287\/mnsc.46.2.186.11926"},{"issue":"2","key":"10277_CR55","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1177\/1059601117725191","volume":"43","author":"RM Verburg","year":"2018","unstructured":"Verburg, R. M., Nienaber, A.-M., Searle, R. H., Weibel, A., Den Hartog, D. N., & Rupp, D. E. (2018). The role of organizational control systems in employees\u2019 organizational trust and performance outcomes. Group & Organization Management, 43(2), 179\u2013206. https:\/\/doi.org\/10.1177\/1059601117725191","journal-title":"Group & Organization Management"},{"issue":"1","key":"10277_CR56","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1287\/isre.3.1.36","volume":"3","author":"JG Walls","year":"1992","unstructured":"Walls, J. G., Widmeyer, G. R., & El Sawy, O. A. (1992). Building an information system design theory for vigilant EIS. Information Systems Research, 3(1), 36\u201359. https:\/\/doi.org\/10.1287\/isre.3.1.36","journal-title":"Information Systems Research"},{"key":"10277_CR57","unstructured":"Weitzel, T. (2003). A Network ROI. Proceedings of the 2003 MISQ Academic Workshop on ICT Standardization (Pre-ICIS Workshop), Seattle (WA), 62\u201379."},{"issue":"3","key":"10277_CR58","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1023\/A:1010690908200","volume":"24","author":"C Weston","year":"2001","unstructured":"Weston, C., Gandell, T., Beauchamp, J., McAlpine, L., Wiseman, C., & Beauchamp, C. (2001). Analyzing interview data: The development and evolution of a coding system. Qualitative Sociology, 24(3), 381\u2013400.","journal-title":"Qualitative Sociology"},{"key":"10277_CR59","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s10796-008-9063-x","volume":"10","author":"K W\u00fcllenweber","year":"2008","unstructured":"W\u00fcllenweber, K., Beimborn, D., Weitzel, T., & K\u00f6nig, W. (2008). The impact of process standardization on business process outsourcing success. Information Systems Frontiers, 10, 211\u2013224. https:\/\/doi.org\/10.1007\/s10796-008-9063-x","journal-title":"Information Systems Frontiers"},{"key":"10277_CR60","doi-asserted-by":"crossref","unstructured":"Zhu, H., & Fu, L. (2009). Quality of Data Standards: Empirical Findings from XBRL (SSRN Scholarly Paper ID 1556678). Social Science Research Network. https:\/\/papers.ssrn.com\/abstract=1556678.\u00a0Accessed 18 Apr 2022.","DOI":"10.2139\/ssrn.1556678"},{"issue":"3","key":"10277_CR61","doi-asserted-by":"publisher","first-page":"313","DOI":"10.2307\/249668","volume":"22","author":"I Zigurs","year":"1998","unstructured":"Zigurs, I., & Buckland, B. K. (1998). A theory of task\/technology fit and group support systems effectiveness. MIS Quarterly, 22(3), 313\u2013334.","journal-title":"MIS Quarterly"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-022-10277-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10796-022-10277-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-022-10277-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,6]],"date-time":"2023-06-06T03:34:57Z","timestamp":1686022497000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10796-022-10277-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,29]]},"references-count":61,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["10277"],"URL":"https:\/\/doi.org\/10.1007\/s10796-022-10277-2","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,29]]},"assertion":[{"value":"4 April 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 April 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}