Document Type

Article

Publication Date

3-2016

Publisher

Elsevier B.V.

Abstract

We appreciate the careful and thoughtful commentary on Schermann et al. (2016) by Lacity and Khan (2016). Their commentary caused us to reflect on some of the underlying assumptions guiding our research. In the spirit of Lacity and Khan (2016), we do not attempt to defend our research and ‘win’ the conversation. Instead, we build on their insights to contribute to this potentially fruitful conversation among IS scholars started by Lacity and Khan (2016). We are grateful for the invitation from the Journal of Strategic Information Systems (JSIS) to do this.

Comments

NOTICE: this is the author’s version of a work that was accepted for publication in The Journal of Strategic Information Systems. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in The Journal of Strategic Information Systems, [VOL 25, ISSUE 1, (2016)]
DOI: 10.1016/j.jsis.2016.02.003

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.