Options
Trang, Simon Thanh-Nam
Loading...
Preferred name
Trang, Simon Thanh-Nam
Official Name
Trang, Simon Thanh-Nam
Alternative Name
Trang, Simon Thanh Nam
Trang, Simon T. N.
Trang, Simon T.-N.
Trang, S. T. N.
Trang, S. T.-N.
Trang, S.
Trang, Simon
Main Affiliation
Now showing 1 - 10 of 11
2020Journal Article [["dc.bibliographiccitation.firstpage","388"],["dc.bibliographiccitation.journal","Journal of the Association for Information Systems"],["dc.bibliographiccitation.lastpage","427"],["dc.contributor.author","Mandrella, Markus"],["dc.contributor.author","Trang, Simon"],["dc.contributor.author","Kolbe, Lutz M."],["dc.date.accessioned","2021-04-14T08:27:45Z"],["dc.date.available","2021-04-14T08:27:45Z"],["dc.date.issued","2020"],["dc.identifier.doi","10.17705/1jais.00606"],["dc.identifier.eissn","1536-9323"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/82392"],["dc.notes.intern","DOI Import GROB-399"],["dc.relation.eissn","1536-9323"],["dc.title","\"Synthesizing and Integrating Research on IT-Based Value Cocreation: A Meta-Analysis \""],["dc.type","journal_article"],["dc.type.internalPublication","yes"],["dspace.entity.type","Publication"]]Details DOI2016Journal Article [["dc.bibliographiccitation.firstpage","109"],["dc.bibliographiccitation.journal","Journal of Cleaner Production"],["dc.bibliographiccitation.lastpage","120"],["dc.bibliographiccitation.volume","110"],["dc.contributor.author","Zander, Sebastian"],["dc.contributor.author","Trang, Simon"],["dc.contributor.author","Kolbe, Lutz M."],["dc.date.accessioned","2018-08-21T11:28:56Z"],["dc.date.available","2018-08-21T11:28:56Z"],["dc.date.issued","2016"],["dc.description.abstract","Network-based collaboration has been identified as an important form of multi-organizational governance in advancing environmental sustainability, as it enables organizations to take full advantage of by-products and reusable materials while minimizing waste in the supply chain. Although previous research has identified various forms, dimensions, and architectures of networks addressing the reduction of environmental impacts, less is known about their emergence. Existing studies on networks in the context of sustainability benefit surprisingly little from the substantial literature on interorganizational collaboration, alliances, or networks. Therefore, this study explores drivers of network governance by combining explorative case studies with prior theorizing and drawing on various theoretical paradigms. Case studies have been conducted in the German wood industry, where the efficient utilization of by-products and the reuse of renewable raw material are essential and thus network-based collaboration is highly beneficial. The study identifies four major factors that seem to significantly affect the formation of interorganizational networks and further reveals contextual factors that are related to the effectiveness of network-based collaboration. Our results contribute to calls for integrating traditional network research into the field of networks that address environmental issues. The findings yield implications both for practice and policymakers as well as for future research on networks and sustainability."],["dc.identifier.doi","10.1016/j.jclepro.2015.03.010"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/15460"],["dc.language.iso","en"],["dc.notes.status","final"],["dc.relation.eissn","0959-6526"],["dc.title","Drivers of network governance: a multitheoretic perspective with insights from case studies in the German wood industry"],["dc.type","journal_article"],["dc.type.internalPublication","unknown"],["dspace.entity.type","Publication"]]Details DOI2016Journal Article [["dc.bibliographiccitation.firstpage","121"],["dc.bibliographiccitation.journal","Journal of Cleaner Production"],["dc.bibliographiccitation.lastpage","131"],["dc.bibliographiccitation.volume","110"],["dc.contributor.author","Trang, Simon Thanh-Nam"],["dc.contributor.author","Zander, Sebastian"],["dc.contributor.author","de Visser, Bastiaan"],["dc.contributor.author","Kolbe, Lutz M."],["dc.date.accessioned","2018-11-07T10:21:25Z"],["dc.date.available","2018-11-07T10:21:25Z"],["dc.date.issued","2016"],["dc.description.abstract","The utilization of Internet-enabled information systems promises to create significant advantages in terms of inter-organizational information sharing and operational efficiency. The low diffusion of e-business within the wood industry, despite the prospective benefits, is puzzling. This study sets out to investigate factors of e-business adoption to derive recommendations for improving e-business diffusion in the wood industry. Drawing on the technology organization environment framework, this paper develops a factor-based research model and differentiates between two stages of e-business diffusion: initial adoption and long-term routihization. An empirical study was carried out, collecting complete data from 204 organizations in the German wood industry. Next to classical structural equation modeling, the so-called importance performance analysis technique was first adopted to the context of information systems diffusion research. This method allows for the identification of factors that not only have a high influence on e-business diffusion but also demonstrate significant potential for improvement. The results of this study provide important insights into both research and practice. First, the knowledge on causes of low IS diffusion in the wood industry is enhanced by differentiating technological, organizational, and environmental factors and two stages of e-business diffusion. This study reveals that routinization lags behind initial adoption in the wood industry. Second, the value of importance-performance analysis technique for research on IS diffusion is demonstrated. The results suggest that future studies should apply this method to enhance data interpretation. Lastly, decision makers in the wood industry can make use of the empirical results to design effective action plans to promote e-business diffusion. (c) 2015 Elsevier Ltd. All rights reserved."],["dc.description.sponsorship","German Research Foundation (DFG) [GRK 1703/1]"],["dc.identifier.doi","10.1016/j.jclepro.2015.05.051"],["dc.identifier.isi","000368203100012"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/42085"],["dc.language.iso","en"],["dc.notes.status","zu prüfen"],["dc.notes.submitter","Najko"],["dc.publisher","Elsevier Sci Ltd"],["dc.relation.eissn","0959-6526"],["dc.relation.issn","1879-1786"],["dc.relation.issn","0959-6526"],["dc.title","Towards an importance-performance analysis of factors affecting e-business diffusion in the wood industry"],["dc.type","journal_article"],["dc.type.internalPublication","yes"],["dc.type.peerReviewed","yes"],["dc.type.status","published"],["dspace.entity.type","Publication"]]Details DOI WOS2021Journal Article [["dc.bibliographiccitation.firstpage","1"],["dc.bibliographiccitation.journal","European Journal of Information Systems"],["dc.bibliographiccitation.lastpage","22"],["dc.contributor.author","Trang, Simon"],["dc.contributor.author","Mandrella, Markus"],["dc.contributor.author","Marrone, Mauricio"],["dc.contributor.author","Kolbe, Lutz M."],["dc.date.accessioned","2021-04-14T08:30:13Z"],["dc.date.available","2021-04-14T08:30:13Z"],["dc.date.issued","2021"],["dc.identifier.doi","10.1080/0960085X.2020.1869914"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/83149"],["dc.language.iso","en"],["dc.notes.intern","DOI Import GROB-399"],["dc.relation.eissn","1476-9344"],["dc.relation.issn","0960-085X"],["dc.title","Co-creating business value through IT-business operational alignment in inter-organisational relationships: empirical evidence from regional networks"],["dc.type","journal_article"],["dc.type.internalPublication","yes"],["dspace.entity.type","Publication"]]Details DOI2015Journal Article [["dc.bibliographiccitation.firstpage","31"],["dc.bibliographiccitation.issue","1"],["dc.bibliographiccitation.journal","Journal of the Association for Information Systems"],["dc.bibliographiccitation.lastpage","48"],["dc.bibliographiccitation.volume","7"],["dc.contributor.author","Trang, Simon"],["dc.contributor.author","Zander, Sebastian"],["dc.contributor.author","Kolbe, Lutz M."],["dc.date.accessioned","2018-08-21T11:21:59Z"],["dc.date.available","2018-08-21T11:21:59Z"],["dc.date.issued","2015"],["dc.description.abstract","Since the importance of collaboration across organizational boundaries for firms’ competitive success continues to grow dramatically, research on inter-organizational relationships has become prominent in business and information systems (IS) research. Particularly inter-organizational networks have been widely recognized by both academics and practitioners as an important form of multi-organizational governance. Those networks rely heavily on integrated information systems in order to generate value from co-creation, co-development, and co-innovation. Therefore, the integration of IS across partnering organizations has become the backbone of collaboration in inter-organizational networks. Despite the efforts invested in the field of IT governance arrangements, research still lacks empirical evidence on the relationship between governance choices and different internal and external network factors and their influence on governance effectiveness. Thus, this study sets out to expand the understanding of how network organizations can effectively develop and manage IS integration in order to co-create value. It contributes with a characterization of IT network governance arrangements along the dimension from highly centralized to highly decentralized IT related decision making in networks. Moreover, by drawing on contingency theory this paper develops a theoretical model proposing effective governance arrangements according to six contingency variables. A multiple case study methodology is applied in order to validate the theoretical relationships, and the data supports the basic structure of the research model. Our findings suggest that network size, network structure centralization, functional diversity, network trust, IT infusion, and IT competence are important factors for the understanding of effective IT governance arrangements in inter-organizational networks. The paper offers insights into the causal mechanisms behind the theoretical relationships and is a first step towards a more differentiated perspective on contingent governance structures in inter-organizational networks."],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/15459"],["dc.language.iso","en"],["dc.notes.status","final"],["dc.title","The Contingent Role of Centrality in IT Network Governance: An Empirical Examination"],["dc.type","journal_article"],["dc.type.internalPublication","unknown"],["dspace.entity.type","Publication"]]Details2019Journal Article [["dc.bibliographiccitation.firstpage","1265"],["dc.bibliographiccitation.issue","6"],["dc.bibliographiccitation.journal","Information Systems Frontiers"],["dc.bibliographiccitation.lastpage","1284"],["dc.bibliographiccitation.volume","21"],["dc.contributor.author","Trang, Simon"],["dc.contributor.author","Brendel, Benedikt"],["dc.date.accessioned","2020-12-10T14:11:37Z"],["dc.date.available","2020-12-10T14:11:37Z"],["dc.date.issued","2019"],["dc.identifier.doi","10.1007/s10796-019-09956-4"],["dc.identifier.eissn","1572-9419"],["dc.identifier.issn","1387-3326"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/71138"],["dc.language.iso","en"],["dc.notes.intern","DOI Import GROB-354"],["dc.title","A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research"],["dc.type","journal_article"],["dc.type.internalPublication","yes"],["dspace.entity.type","Publication"]]Details DOI2020Journal Article Research Paper [["dc.bibliographiccitation.firstpage","415"],["dc.bibliographiccitation.issue","4"],["dc.bibliographiccitation.journal","European Journal of Information Systems"],["dc.bibliographiccitation.lastpage","428"],["dc.bibliographiccitation.volume","29"],["dc.contributor.author","Trang, Simon"],["dc.contributor.author","Trenz, Manuel"],["dc.contributor.author","Weiger, Welf H."],["dc.contributor.author","Tarafdar, Monideepa"],["dc.contributor.author","Cheung, Christy M.K."],["dc.date.accessioned","2021-04-14T08:24:19Z"],["dc.date.available","2021-04-14T08:24:19Z"],["dc.date.issued","2020"],["dc.identifier.doi","10.1080/0960085X.2020.1784046"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/81242"],["dc.language.iso","en"],["dc.notes.intern","DOI Import GROB-399"],["dc.relation.eissn","1476-9344"],["dc.relation.issn","0960-085X"],["dc.relation.orgunit","Professur für Interorganisationale Informationssysteme"],["dc.title","One app to trace them all? Examining app specifications for mass acceptance of contact-tracing apps"],["dc.type","journal_article"],["dc.type.internalPublication","yes"],["dc.type.subtype","original_ja"],["dspace.entity.type","Publication"]]Details DOI2016Book Chapter [["dc.bibliographiccitation.firstpage","163"],["dc.bibliographiccitation.lastpage","178"],["dc.contributor.author","Hildebrandt, Björn"],["dc.contributor.author","Busse, Sebastian"],["dc.contributor.author","Trang, Simon"],["dc.contributor.author","Kolbe, Lutz M."],["dc.contributor.editor","Fornahl, Dirk"],["dc.contributor.editor","Hülsmann, Michael"],["dc.date.accessioned","2018-08-26T15:47:03Z"],["dc.date.available","2018-08-26T15:47:03Z"],["dc.date.issued","2016"],["dc.description.abstract","In order to promote the market-introduction phase of electric mobility, car manufacturers will have to face the residual value risk of electric cars for consumers, particularly concerning the battery. An increasingly common trend to minimize uncertainties for the consumer, is the separate leasing of the battery. In this paper we examine degradation in lithium-ion batteries from a lessor’s perspective. We suppose that battery life can be influenced directly by the user. In the case of a lease contract, the battery always remains the property of the lessor. In this respect, there are no direct incentives for the user to increase battery life by expending additional effort. Therefore, we discuss the idea of a dynamic leasing concept as an opportunity for car manufacturers to encourage consumers to adopt a gentle treatment of the battery in order to extend battery lifetime and thus the residual value. Therefore, we examine the effects of different charging strategies on a battery’s residual value to verify whether there is potential for a deeper investigation of a dynamic battery leasing approach. In order to quantify the extent of user influence on battery life, lifetime simulations are performed for different charging scenarios. For our calculations we use a degradation model as a function of the depth of discharge. Furthermore, realistic driving patterns are taken into account to estimate the quantity of energy processed as a function of use mode."],["dc.identifier.doi","10.1007/978-3-319-24229-3_10"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/15557"],["dc.language.iso","en"],["dc.notes.status","final"],["dc.publisher","Springer"],["dc.publisher.place","Cham"],["dc.relation.crisseries","Lecture Notes in Mobility"],["dc.relation.isbn","978-3-319-24229-3"],["dc.relation.isbn","978-3-319-24227-9"],["dc.relation.ispartof","Markets and Policy Measures in the Evolution of Electric Mobility"],["dc.relation.ispartofseries","Lecture Notes in Mobility"],["dc.relation.orgunit","Poliklinik für Präventive Zahnmedizin, Parodontologie und Kariologie"],["dc.title","Valuing Battery Degradation from a Battery Lessor’s Perspective"],["dc.type","book_chapter"],["dc.type.internalPublication","unknown"],["dspace.entity.type","Publication"]]Details DOI2021Journal Article [["dc.bibliographiccitation.firstpage","106644"],["dc.bibliographiccitation.journal","Computers in Human Behavior"],["dc.bibliographiccitation.volume","116"],["dc.contributor.author","Trang, Simon"],["dc.contributor.author","Weiger, Welf H."],["dc.date.accessioned","2021-04-14T08:29:02Z"],["dc.date.available","2021-04-14T08:29:02Z"],["dc.date.issued","2021"],["dc.identifier.doi","10.1016/j.chb.2020.106644"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/82777"],["dc.language.iso","en"],["dc.notes.intern","DOI Import GROB-399"],["dc.relation.issn","0747-5632"],["dc.title","The perils of gamification: Does engaging with gamified services increase users’ willingness to disclose personal information?"],["dc.type","journal_article"],["dc.type.internalPublication","yes"],["dspace.entity.type","Publication"]]Details DOI2021Journal Article [["dc.bibliographiccitation.journal","Electronic Markets"],["dc.contributor.author","Masuch, Kristin"],["dc.contributor.author","Greve, Maike"],["dc.contributor.author","Trang, Simon"],["dc.date.accessioned","2021-12-01T09:23:22Z"],["dc.date.available","2021-12-01T09:23:22Z"],["dc.date.issued","2021"],["dc.description.abstract","Abstract Innovative IT-enabled health services promise tremendous benefits for customers and service providers alike. Simultaneously, health services by nature process sensitive customer information, and data breaches have become an everyday phenomenon. The challenge that health service providers face is to find effective recovery strategies after data breaches to retain customer trust and loyalty. We theorize and investigate how two widely applied recovery actions (namely apology and compensation) affect customer reactions after a data breach in the specific context of fitness trackers. Drawing on expectation confirmation theory, we argue that the recovery actions derived from practice, apology, and compensation address the assimilation-contrast model’s tolerance range and, thus, always lead to satisfaction with the recovery strategy, which positively influences customers’ behavior. We employ an experimental investigation and collect data from fitness tracker users during a running event. In the end, we found substantial support for our research model. Health service providers should determine specific customer expectations and align their data breach recovery strategies accordingly."],["dc.description.abstract","Abstract Innovative IT-enabled health services promise tremendous benefits for customers and service providers alike. Simultaneously, health services by nature process sensitive customer information, and data breaches have become an everyday phenomenon. The challenge that health service providers face is to find effective recovery strategies after data breaches to retain customer trust and loyalty. We theorize and investigate how two widely applied recovery actions (namely apology and compensation) affect customer reactions after a data breach in the specific context of fitness trackers. Drawing on expectation confirmation theory, we argue that the recovery actions derived from practice, apology, and compensation address the assimilation-contrast model’s tolerance range and, thus, always lead to satisfaction with the recovery strategy, which positively influences customers’ behavior. We employ an experimental investigation and collect data from fitness tracker users during a running event. In the end, we found substantial support for our research model. Health service providers should determine specific customer expectations and align their data breach recovery strategies accordingly."],["dc.identifier.doi","10.1007/s12525-021-00490-3"],["dc.identifier.pii","490"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/94633"],["dc.language.iso","en"],["dc.notes.intern","DOI-Import GROB-478"],["dc.relation.eissn","1422-8890"],["dc.relation.issn","1019-6781"],["dc.title","What to do after a data breach? Examining apology and compensation as response strategies for health service providers"],["dc.type","journal_article"],["dc.type.internalPublication","yes"],["dspace.entity.type","Publication"]]Details DOI