Match!

Conflicts and complements between eastern cultures and agile methods: an empirical investigation

Published on Dec 19, 2017in European Journal of Information Systems2.603
· DOI :10.1057/S41303-016-0023-0
Balasubramaniam Ramesh31
Estimated H-index: 31
(University of Cambridge),
Lan Cao16
Estimated H-index: 16
(ODU: Old Dominion University)
+ 2 AuthorsTabitha L. James15
Estimated H-index: 15
Sources
Abstract
Agile methods have been widely adopted around the world – particularly in the Eastern world, where cultural scripts differ from that of the West from where agile methods originated. However, there is a lack of understanding of the interplay between the basic tenets of agile methods and the Eastern cultures. This understanding is crucial for the effective use of the methods in these cultures. To examine how Eastern cultural phenomena interplay with agile methods, we followed an emic approach in a multisite case study. We examined the adaptation of agile practices in organizations in China, India, and South Korea. We developed a framework describing how Eastern cultural scripts often express the collectivist response to cultural theoretical concepts and how the cultural response interacts in complementary and conflicting ways with agile methods. To explore how conflicts are mitigated, we examined the ways organizations develop ambidextrous practices.
Figures & Tables
  • References (126)
  • Citations (7)
📖 Papers frequently viewed together
2 Citations
3 Citations
78% of Scinapse members use related papers. After signing in, all features are FREE.
References126
Newest
#1Yu-Wei Chang (China Jiliang University)H-Index: 5
#2Ping-Yu Hsu (NCU: National Central University)H-Index: 15
Last. Chung-Chih Tsai (NCU: National Central University)H-Index: 1
view all 4 authors...
In today’s knowledge-based economy, most of the knowledge-sharing studies have investigated the effects of cultural values at the national level. However, individual beliefs and behaviors might also be influenced and modified by individual cultural values. To understand the effects of cultural values, cultural effects at both the individual and country levels should be considered. This study is to investigate the integrative effects of the individual’s and country’s cultural values on knowledge ...
15 CitationsSource
#1Carol Hsu (NTU: National Taiwan University)H-Index: 10
#2Yu-Tzu Keats Lin (NKNU: National Kaohsiung Normal University)H-Index: 1
Last. Tawei Wang (U.H.: University of Hawaii at Manoa)H-Index: 11
view all 3 authors...
This paper studies the adoption and diffusion of a cross-cultural Interorganizational Information System (IOS), which is used to streamline the processing of financial transactions between European investment fund companies and Taiwanese banks. Drawing from institutional and organizational legitimacy theory, we argue that the adoption and implementation of technological innovation is contingent upon its alignment with three institutional pillars in different countries and the deployment of legit...
16 CitationsSource
This paper examines how culture affects requirements and their prioritization. We analyze the requirements of a mobile service, which were collected from Helsinki, Hong Kong, and Las Vegas. We argue that the current prioritization techniques for requirements do not sufficiently account for the cultural effects, nor does the literature offer information on ways of prioritizing such requirements according to users’ values. We see this as problematic because the literature suggests that culture sho...
15 CitationsSource
#1M. N. Ravishankar (Lboro: Loughborough University)H-Index: 5
#1M.N. Ravishankar (Lboro: Loughborough University)H-Index: 8
In Information Systems (IS) research on cross-cultural issues, cultural categories are typically introduced as analytical labels that explain why and how organizational groups in different parts of the world act and think differently. However, broad cultural categories can also be discursively mobilized by organizational members as strategic adaptive resources. Drawing on an ethnographic study of offshoring frame disputes (OFD) in an Indian subsidiary unit of a large Western information technolo...
9 CitationsSource
#1Hartmut Hoehle (UA: University of Arkansas)H-Index: 13
#2Xiaojun Zhang (HKUST: Hong Kong University of Science and Technology)H-Index: 9
Last. Viswanath Venkatesh (UA: University of Arkansas)H-Index: 58
view all 3 authors...
As most mobile applications are tailored for worldwide consumption, it is a significant challenge to develop applications that satisfy individuals with various cultural backgrounds. To address this issue, we drew on a recently developed conceptualization and associated instrument of mobile application usability to develop a model examining the impact of mobile social media application usability on continued intention to use. Drawing on Hofstede’s five cultural values, we incorporated espoused cu...
42 CitationsSource
#1Zhongyun Zhou (Tongji University)H-Index: 11
#2Xiao-Ling Jin (SHU: Shanghai University)H-Index: 13
Last. Douglas R. Vogel (HIT: Harbin Institute of Technology)H-Index: 5
view all 4 authors...
In this study we examine the contingent effects of two cultural values, indulgence and individualism, on the relationships between perceived benefits (utilitarian value, hedonic value, and relational capital), affective commitment, and continuance intention in social virtual worlds. We test our theoretical model in multi-group analyses using SmartPLS 2.0, based on a sample of 414 Second Life users from the U.S.A., Great Britain, and numerous other countries. By comparing the high- vs the low-ind...
31 CitationsSource
#1Merrill WarkentinH-Index: 27
Last. Patrick Y K Chau (MSU: Mississippi State University)H-Index: 1
view all 3 authors...
Information systems (IS) and IS research have been transformed by the globalization of organizations, of IT processes, and of perspectives on IT phenomena. China and other Eastern cultures are contributing the Oriental traditions to the Occidental lenses of analysis, while also providing interesting contrasts to the historical experiences in the Western world. The significance of cultural issues is increasingly evident in the MIS academic discipline. We see that cultural plays a role in the desi...
16 CitationsSource
#1Carol Xiaojuan Ou (Tilburg University)H-Index: 18
#2Paul A. Pavlou (TU: Temple University)H-Index: 47
Last. Robert M. Davison (CityU: City University of Hong Kong)H-Index: 37
view all 3 authors...
The concept of guanxi (i.e., a close and pervasive interpersonal relationship) has received little attention in the literature on online marketplaces, perhaps due to their impersonal nature. However, we propose that computer-mediated communication (CMC) technologies can mimic traditional interactive face-to-face communications, thus enabling a form of guanxi in online marketplaces. Extending the literature on traditional guanxi, we herein introduce the concept of swift guanxi, conceptualized as ...
169 CitationsSource
#1Aakanksha Gaur (ESSEC Business School)H-Index: 2
#2David E. Avison (University of Southampton)H-Index: 30
Last. Julien Malaurent (ESSEC Business School)H-Index: 6
view all 3 authors...
This case study examines the process by which a startup in the resource-constrained environment of India was able to develop an innovative mobile payment solution using resource bricolage, recombining elements at hand. We illustrate how the startup, facing internal resource constraints and operating in an infrastructure and regulatory constrained environment, developed a mobile payment solution especially for the consumers at the Bottom of the Pyramid (BoP). Examples of Jugaad innovation, whereb...
1 Citations
Knowledge sourcing strategy (KSS) is regarded as a key determinant of successful Knowledge Management (KM). However, prior research on how KSSs can improve firm performance has produced inconsistent results. This may be due to inadequate consideration of complementary and substitutable relationships in KSSs. Whereas previous studies have assessed the impact of individual KSS on firm performance, in practice firms adopt several different KSSs simultaneously. Drawing on the Knowledge-based View (K...
13 CitationsSource
Cited By7
Newest
#1Viswanath Venkatesh (UA: University of Arkansas)H-Index: 58
#2James Y. L. Thong (HKUST: Hong Kong University of Science and Technology)H-Index: 37
Last. Kai Spohrer (UMA: University of Mannheim)H-Index: 6
view all 5 authors...
1 CitationsSource
#1Chengqi Guo (JMU: James Madison University)H-Index: 5
#1Chengqi Guo (JMU: James Madison University)H-Index: 1
Last. Jung P. Shim (GSU: Georgia State University)H-Index: 22
view all 5 authors...
Abstract Cross-cultural studies in Information Systems (IS) have experienced an overreliance on Hofstede’s theory, which has impeded researchers from exploring alternative theoretical lenses. We examine the moderating effects of Schwartz’s Polar Dimensions on users’ perception of Social Network Service, highlighting cultural issues associated with IS privacy, trust, and social capital. We found that the effect of perceived reputation is more powerful in American culture than Chinese culture, tho...
Source
#1Tawfeeq Alsanoosy (RMIT: RMIT University)H-Index: 2
#2Maria Spichkova (RMIT: RMIT University)H-Index: 5
Last. James Harland (RMIT: RMIT University)H-Index: 19
view all 3 authors...
Requirements engineering (RE) involves the critical activities required to capture customers’ requirements/needs accurately. RE is a communication-intensive activity. As culture plays a major role in the way individuals communicate and perform a task, RE activities might be strongly influenced by individuals’ cultures. However, there are very few published works on this issue. The goal of this study is to explore the influence of national culture on RE activities as reported in existing studies....
1 CitationsSource
#1Tawfeeq Alsanoosy (RMIT: RMIT University)H-Index: 2
#2Maria Spichkova (RMIT: RMIT University)H-Index: 15
Last. James Harland (RMIT: RMIT University)H-Index: 19
view all 3 authors...
Abstract Requirements Engineering (RE) activities are inherently collaborative, requiring software stakeholders to have intensive communication to identify users’ requirements. As the stakeholders’ culture might heavily impact on the way how they collaborate and communicate, RE might be significantly influenced by their cultural background. To analyse stakeholders’ culture, we use one of the most adopt and comprehensive cultural studies in software engineering: Hofstede’s cultural model. Hofsted...
1 CitationsSource
Abstract To facilitate innovative software development, more and more software development teams (SDTs) turn to agile methods. Such agile methods develop both extensive and efficient software responses to a client’s requirement change. However, the antecedents of successful agile software development are poorly understood. The authors goal is to propose a model of how power asymmetry and paradoxical leadership interact and affect agility in SDTs, which in turn affect their capacity to innovate. ...
Source
#1Fred Niederman (SLU: Saint Louis University)H-Index: 22
#2Thomas Lechler (Stevens Institute of Technology)H-Index: 14
Last. Yvan Petit (UQAM: Université du Québec à Montréal)H-Index: 4
view all 3 authors...
This article is intended to serve as an introduction to this special issue on agile practices. In doing so, we briefly survey a number of key issues that are emerging in the application of agile practices to software development (SWD) and, similarly, examine recent work on extending knowledge about these practices to other task domains. We note that the extant literature on agile practices has been criticized for lacking a theoretical basis and comment on various ways that a theory orientation c...
3 CitationsSource
#1Ali Alper Yayla (Binghamton University)H-Index: 9
#2Yu LeiH-Index: 2
Purpose The purpose of this paper is to examine challenges multinational companies face during the diffusion of their information security policies. Parent companies use these policies as their discourse for legitimization of their practices in subsidiaries, which leads to value conflicts in subsidiaries. The authors postulate that, when properly crafted, information security policies can also be used to reduce the very conflicts they are creating. Design/methodology/approach The proposed framew...
1 CitationsSource