Abstract
As new technologies and software applications are supplanting traditional electronic data interchange (EDI) applications, new fraud concerns due to the ubiquitous connectivity of the Internet have increased the interest in EDI controls. Traditional outcome (or process)-oriented views of (formal) control should be supplemented by knowledge management considerations, and user knowledge of contents control and its importance should be enhanced in order to maximize performance. This research addresses the indirect effect of EDI control usage levels on EDI performance through knowledge enhancement. EDI controls were categorized as internal and third-party in order to highlight their internal and external aspects in inter-organizational systems. Knowledge of controls has two parts: knowledge of control content and an understanding of control importance. The research model was empirically tested using a structural equation modeling approach with data collected from Korean companies that have adopted EDI. The results indicate that knowledge plays an important role in mediating the effect of controls on performance. That is, EDI adopters can achieve operational and competitive benefits from high levels of knowledge in relation to control content and its importance.
Similar content being viewed by others
References
Albrecht CC, Dean DL, Hansen JV (2005) Marketplace and technology standards for B2B e-commerce: progress, challenges, and the state of the art. Inf Manag 42:865–875
Anderson J, Gerbing D (1988) Structural equation modeling in practice: a review and recommended two-step approach. Psychol Bull 103(3):411–423
Attewell P (1992) Technology diffusion and organizational learning: the case of business computing. Organ Sci 3(1):1–19
Banerjee S, Golhar DY (1994) Electronic data interchange: characteristics of users and nonusers. Inf Manag 26:65–74
Baskerville R (1988) Designing information systems security. Wiley, Chichester, UK
Benesko G, Teplitzky P (1994) Security and controls for EDI. Inf Syst Secur Summer:15–19
Benesko G, Teplitzky P (1995) EDI integrity controls. Inf Syst Secur Winter:21–25
Blumstein A, Cohen J, Nagin D (1978) Deterrence and incapacitation: estimating the effects of criminal sanctions on crime rates. National Academy of Sciences, Washington, DC
Chan S, Govindan M, Picard JY, Leschiutta E (1993) EDI for managers and auditors. Electronic Data Interchange Council of Canada, Toronto, ON
Chircu A, Kaufman RJ (2000) Reintermediation strategies in business-to-business electronic commerce. Int J Electron Commerce 4(4):7–42
Chwelos P, Benbasat I, Dexter AS (2001) Research report: empirical test of an EDI adoption model. Inf Syst Res 12(3):304–321
Computer Security Institute (CSI) (2008) CSI/FBI computer crime and security survey. CMP Media LLC. http://www.gocsi.com/forms/csi_survey.jhtml
Crook CW, Kumar RL (1998) Electronic data interchange: a multi-industry investigation using grounded theory. Inf Manag 34:75–89
Davenport TH, Klahr P (1998) Managing customer support knowledge. Calif Manag Rev 40(3):195–208
Dhillon G, Backhouse J (1996) Risks in the use of information technology within organizations. Int J Inf Manag 16(1):65–74
Dodgson M (1994) Organizational learning: a review of some literatures. Organ Stud 14(3):375–394
Down A (2002) Integrating EDI systems across and beyond your enterprise. IBM White Papers, Somers, NY (available at www-3,ibm.com/software/integration/wdi/library/whitepapers/edi_v1c.pdf)
Emmelhainz MA (1990) Electronic data interchange: a total management guide. Multiscience Press, Inc, Van Nostrand Reinhold, New York
Frank J, Shamir B, Briggs W (1991) Security-related behavior of PC users in organizations. Inf Manag 21:127–135
Guha S, Grover V, Kettinger WJ, Teng JTC (1997) Business process change and organizational performance: exploring an antecedent model. J Manag Inf Syst 14(1):119–154
Hamel G, Prahalad CK (1994) Competing for the future. Harv Bus Rev 72(4):122–132
Hammer M (1990) Reengineering work: don’t automate, obliterate. Harv Bus Rev July–August:104–112
Harrington SJ (1996) The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions. MIS Q 20(September):257–278
Hart P, Saunders C (1997) Power and trust: critical factors in the adoption and use of electronic data interchange. Organ Sci 8(1):23–42
Hedrick A (2001) Reports of EDI’s death were premature. AMR Research, Sunday, July 01 (available at www.amrresearch.com/Content/view.asp?pmillid=13446&docid=577)
ISACA (1990) EDI control guide. Information Systems Audit Control Association, EDI Council of Australia, Sydney Chapter
Jamieson R (1994) EDI: an audit approach. The EDP Auditors Foundation, Inc., Rolling Meadows, IL
Jaworski BJ (1988) Toward a theory of marketing control: environmental context, control types, and consequences. J Mark 52(July):23–39
Joreskog KG, Sörbom D (1989) LISREL 7: a guide to the program and applications, 2nd edn. SPSS Inc., Chicago, IL
Joseph GW, Blanton JE (1992) Computer infectors: prevention, detection, and recovery. Inf Manag 23:205–216
Kanakamedala K, King J, Ramsdell G (2003) The truth about XML. McKinsey Q 3:9–13
Kaefer F, Bendoly E (2004) Measuring the impact of organizational constraints on the success of business-to-business e-commerce efforts: a transactional focus. Inf Manag 41:529–541
Kuan KKY, Chau PYK (2001) A perception-based model for EDI adoption in small businesses using a technology-organization-environment framework. Inf Manag 38:507–521
Lawrence CM (1988) Usage of concurrent EDP audit tools. EDP Audit J 3(Fall):49–54
Lee S, Han I (2000) Fuzzy cognitive map for the design of EDI controls. Inf Manag 37:37–50
Lee KC, Lee S (2007) Causal knowledge-based design of EDI controls: an explorative study. Comput Hum Behav 23(1):628–663
Lee S, Ahn H (2009) Structural equation model for EDI controls: controls design perspective. Expert Syst Appl 36(2) (Part 1):1731–1749
Lee S, Han I, Kym H (1998) The impact of EDI controls on EDI implementation. Int J Electron Commerce 2(4):71–98
Liang H, Xue Y, Byrd TA, Rainer RK (2004) Electronic data interchange usage in China’s healthcare organizations: the case of Beijing’s hospitals. Int J Inf Manag 24:507–522
Marcella JA, Chan S (1993) EDI security, control, and audit. Artech House Inc., Norwood, MA
McGowan MK, Madey GR (1998) The influence of organization structure and organizational learning factors on the extent of EDI implementation in U.S. firms. Inf Resour Manag J 11(3):17–27
Mehrtens J, Cragg PB, Mills AM (2001) A model of Internet adoption by SMEs. Inf Manag 39:65–176
Mount I (2003) Why EDI won’t die. Business 2.0 Magazine, August 1 (available at www.business2.com/b2/subscribers/articles/0,17863,515887-1,00.html)
Nakayama M (2003) An assessment of EDI use and other channel communications on trading behavior and trading partner knowledge. Inf Manag 40:563–580
Ngai EWT, Wat FKT (2002) A literature review and classification of electronic commerce research. Inf Manag 39:415–429
Nonaka I, Takeuchi H (1995) The knowledge-creating company: how Japanese companies create the dynamics of innovation. Oxford University Press, New York
Parker DB (1994) A guide to selecting and implementing security controls. Inf Syst Secur Summer:75–86
Pearson FS, Weiner NA (1985) Criminology: toward an integration of criminological theories. J Crim Law Criminol 76(1):116–150
Ramamurthy K, Premkumar G (1995) Determinants and outcomes of electronic data interchange diffusion. IEEE Trans Eng Manag 42(4):332–351
Ring PS, Van de Ven AH (1994) Developmental processes of cooperative interorganizational relationships. Acad Manag Rev 19(1):90–118
Rogers EM (1983) Diffusion of innovations. The Free Press, New York
Romm CT, Pliskin N, Rifkin WD (1996) Diffusion of E-mail: an organizational learning perspective. Inf Manag 31:37–46
Ropponen J, Lyytinen K (1997) Can software risk management improve system development: an exploratory study. Eur J Inf Syst 6:41–50
Sánchez AM, Pérez MP (2005) EDI and moderating effect of interorganizational cooperation in the supply chain. J Organ Comput Electron Commerce 15(2):83–104
Senn AJ (1998) Expanding the reach of electronic commerce: the Internet EDI alternative. Inf Syst Manag Summer:7–15
Sia SK, Neo BS (1997) Reengineering effectiveness and the redesign of organization control: a case study of the inland revenue authority of Singapore. J Manag Inf Syst 14(1):69–92
Smith AD (2005) Accountability in EDI systems to prevent employee fraud. Inf Syst Manag 22(2):30–38
Soliman KS, Janz BD (2004) An exploratory study to identify the critical factors affecting the decision to establish Internet-based interorganizational information systems. Inf Manag 41:697–706
Son JY, Narasimhan S, Riggins FJ (2005) Effects of relational factors and channel climate on EDI usage in the customer–supplier relationship. J Manag Inf Syst 22(1):321–353
Teo HH, Wei KK, Benbasat I (2003) Predicting intention to adopt interorganizational linkages: an institutional perspective. MIS Q 27(1):19–49
Ulfelder S (2004) B2B exchange survivors. Computerworld (available at www.computerworld.com/managementtopics/ebusiness/story/0,10801,89568,00.html), February 2, 12:00 PM ET
Venkatraman N, Ramanujam V (1987) Planning system success: a conceptualization and an operational model. Manag Sci 33(6):687–705
Weber R (1999) Information systems control and audit. Prentice Hall Inc, Upper Saddle River
Wiig KM (1997) Knowledge management, where did it come from and where will it go. Expert Syst Appl 13(1):1–14
Witte CL, Grunhagen M, Clarke RL (2003) The Integration of EDI and the Internet. Inf Syst Manag 20(4):58–65
Zviran M, Haga WJ (1999) Password security: an empirical study. J Manag Inf Syst 15(4):161–185
Acknowledgment
This research was supported by WCU (World Class University) program through the National Research Foundation of Korea funded by the Ministry of Education, Science and Technology (Grant No. R31-2008-000-10062-0).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lee, S., Lee, K.C. The relationship among formal EDI controls, knowledge of EDI controls, and EDI performance. Inf Technol Manag 11, 43–59 (2010). https://doi.org/10.1007/s10799-010-0065-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10799-010-0065-2