Gregory Dawson - Academia.edu (original) (raw)
Papers by Gregory Dawson
Archives of Environmental Contamination and Toxicology, 1995
Recently, there have been discussions of the relative merits of passage of fishes around hydroele... more Recently, there have been discussions of the relative merits of passage of fishes around hydroelectric dams on three rivers (Au Sable, Manistee, and Muskegon) in Michigan. A hazard assessment was conducted to determine the potential for adverse effects on bald eagles that could consume such fishes from above and below dams on the three primary rivers. The hazard assessments were verified by comparing the reproductive productivities of eagles nesting in areas where they ate primarily fish from either above or below dams on the three primary rivers, as well as on two additional rivers in Michigan, the Menominee and Thunder Bay. Concentrations of organochlorine insecticides (OCI), polychlorinated biphenyls (total PCBs), 2,3,7,8-tetrachlorodibenzo-p-dioxin equivalents (TCDD-EQ), and total mercury (Hg) were measured in composite samples of fishes from above and below hydroelectric dams on the Manistee and Muskegon Rivers, which flow into Lake Michigan, and the Au Sable River, which flows into Lake
Proceedings of the 50th Hawaii International Conference on System Sciences (2017), 2017
Scholars and practitioners often assume that the public sector mirrors the private sector and tha... more Scholars and practitioners often assume that the public sector mirrors the private sector and that it is possible to merely port strategies between domains. However, we highlight the substantial differences between the domains and explore how IT-enabled innovation shapes and is shaped within state government. Analyzing state-level IT governance data using crisp-set Qualitative Comparative Analysis, we uncover that low state attainment is a catalyst for IT-enabled innovation. We uncover and differentiate several types of innovations and also find that successful innovation requires the collaboration of the legislature, governor and CIO.
Proceedings of the Annual Hawaii International Conference on System Sciences, 2020
Many organisations jumped on the bandwagon and implemented conversational agents (CAs) as a new c... more Many organisations jumped on the bandwagon and implemented conversational agents (CAs) as a new communication channel. Customers benefit from shorter resolution times, ubiquitous availability, and consistent and compliant responses. However, despite the hype around CAs and the various benefits for customers, we know little about the effects of external facing CAs on the human workforce. This is crucial to better manage the possible changes in the work organisation. Adopting a critical realist stance and using the lens of technology affordances we explore a) why users increasingly actualize CA affordances and b) the first and secondhand effects of affordance actualisation on customers and human employees. We conducted semi-structured interviews with 18 experts in the field and introduce the term affordance effects pairs describing the relationships between the first and secondhand effects. We further explain which generative mechanisms lead to an increasing actualization of affordances and the associated effects.
Journal of the Association for Information Systems, 2019
In the context of IS consulting, this study applies the principles of engaged scholarship to exam... more In the context of IS consulting, this study applies the principles of engaged scholarship to examine the perennial problem of constraining opportunism. Using constructs proposed by the theory of relationship constraints, this paper examines the relative effectiveness of different constraint mechanisms on information systems (IS) consultants in China, Saudi Arabia, and the United States, for projects with different levels of information asymmetry, tacit knowledge, and explicit knowledge. While we found support in all of these countries for the salience of these dimensions, there are important distinctions in the effectiveness of different constraints among the countries. Generally, consulting clients in the United States believe that social constraints are more effective, while those in China and Saudi Arabia favor legal constraints. Our research suggests that these findings are a result of differences in legal systems and the foundations of social norm formation. Our findings highlight the importance of tacit knowledge and information asymmetry (over explicit knowledge), and we provide a conceptual model for an IS-interventionist approach to reducing opportunism.
Economic Analysis and Policy, 2019
Both citizens and public servants have both voluntary and mandatory interactions with government ... more Both citizens and public servants have both voluntary and mandatory interactions with government through technology and these interactions range from unstructured to highly structured based on the technology or business processes implemented. Using data on the 50 U.S. states, we develop taxonomies of IT-enabled innovation along two dimensions-volitional vs non-volitional and structured vs unstructured-for both internal (employee-facing) and external (citizen-facing) investments. Using configurational analysis, we link portfolios of IT-enabled innovation investments to internal and external performance outcomes and find that a broad-based approach to IT-enabled innovation leads to the best outcomes while lack of investment hinders performance. We also find that for internal-focused innovation, unstructured innovations-whether volitional or non-volitional-tend to lead to better outcomes than structured innovations, while for external-focused innovation the most successful innovations noted were structured or volitional or both. As such, our findings highlight the differences between employeeand citizen-facing IT-enabled innovation, helping to guide policy makers and future researchers.
Communications of the Association for Information Systems, 2007
Ever since Odysseus, King of Ithaca, left to fight in the Trojan War and entrusted his friend, Me... more Ever since Odysseus, King of Ithaca, left to fight in the Trojan War and entrusted his friend, Mentor, to care for and educate his son, academic mentors have guided, educated, trained, and encouraged protégés in their academic development. As with Mentor and his protégé, mentoring relationships evolve over time in a predictable pattern and certain behaviors are necessary to initiate and sustain a mutually beneficial mentoring relationship. There are numerous parallels between successful mentoring behaviors in the academic and business world, and this paper seeks to leverage those similarities to provide advice for academic mentors and their protégés. This paper describes the stages of a mentoring relationship, discusses behaviors that underlie each stage and presents a series of best practices that future academic mentors and protégés should seek to emulate. While specific activities vary by stage of the mentoring evolution, mentors and protégés should create successful relationships, be respectful of time expectations and demands, ensure that necessary advisement occurs, and be open to an increasingly deep and personal relationship. By understanding and applying these behaviors, academic mentors and protégés can learn from and extend the mentoring legacy of Gary Dickson.
Journal of Management Information Systems, 2016
Communications of the ACM, and others. He has also written widely for the practitioner press in v... more Communications of the ACM, and others. He has also written widely for the practitioner press in venues such as the Brookings Institution and InformationWeek.
2015 48th Hawaii International Conference on System Sciences, 2015
Using a configurational crisp set Qualitative Comparative Analysis (csQCA) approach, we find that... more Using a configurational crisp set Qualitative Comparative Analysis (csQCA) approach, we find that effective public sector IT governance is structured differently than in the private sector. While states adopt a variety of IT governance structures, it is unmistakable that centralized yields better organizational outcomes than decentralized. As such, this paper makes a case for additional research in public sector governance in order to understand and explain these differences.
Opportunism is present in professional services and, as a result, organizations adopt mechanisms ... more Opportunism is present in professional services and, as a result, organizations adopt mechanisms to constrain it. Despite the work on constraining opportunistic consultants, researchers have generally ignored the potential impact of national culture on the efficacy of constraint mechanisms. Using the theory of relationship constraints (TRC), this study examines the effectiveness of different constraint mechanisms for information systems (IS) consultants in the United States and China based on different levels of information asymmetry, tacit and explicit knowledge. While we found support in both cultures for the salience of these dimensions, we also found important distinctions for the effectiveness of different constraints between the cultures. Legal constraints are more effective in China while social constraints are more effective in the United States. While TRC is relevant in both cultures, national culture moderates the effectiveness of various constraint mechanisms and highlights the need for additional study.
Journal of Management Information Systems, 2010
School of Business at arizona State university in Tempe, arizona. he received his Ph.D. in MIS fr... more School of Business at arizona State university in Tempe, arizona. he received his Ph.D. in MIS from the Terry college of Business at the university of Georgia in 2008. Before becoming an academic, he spent 25 years in information systems and management consulting and was a partner at Pricewaterhousecoopers. he has consulted with over 1,000 clients during his career, including those in the public and private sector as well as not-for-profits. his research interest focuses on the intersection of information systems consultants and their clients and how to improve this important relationship. richarD T. waTSon is the J. rex Fuqua Distinguished chair for Internet Strategy in the Terry college of Business at the university of Georgia. he has published in leading journals in several fields and written books on data management and electronic commerce. his current research focuses primarily on energy informatics and information systems leadership. he has given invited seminars in more than 30 countries for companies and universities. he is a visiting professor at the university of agder, Norway, a consulting editor to John Wiley & Sons, research director for the advanced Practices council of the Society for Information Management, international coordinator for the addis ababa university Ph.D. in IS program, and co-leader of the Global Text Project. he has been president of the aIS, a conference co-chair of IcIS, and a senior editor of MIS Quarterly.
Agency theory has long been a stalwart of IS research and is one of the most commonly used lenses... more Agency theory has long been a stalwart of IS research and is one of the most commonly used lenses to study the relationship between a principal and an agent. The Theory of Relationship Constraints (TRC) has recently been recommended as an information-oriented alternative to agency theory. TRC suggests that three attributes (ie, the level of information asymmetry, levels of tacit and explicit knowledge) affect the perceived efficacy of a relationship constraint. As the first empirical test of TRC, this study uses ...
How do IS leader effectiveness and IS organizational maturity impact IS unit effectiveness? Drawi... more How do IS leader effectiveness and IS organizational maturity impact IS unit effectiveness? Drawing on existing CIO capabilities literature, IS organizational maturity literature and IS effectiveness literature, this paper proposes to gather and analyze survey data to compare the capabilities of the CIO with the IS unit's organizational maturity to empirically determine which more influences IS effectiveness. The role of CIO in creating IS unit organizational maturity will also be tested.
Agricultural and Forest Entomology, 2008
... Varietal susceptibility of potatoes to wireworm herbivory. Scott N. Johnson,; Eric A. Anderso... more ... Varietal susceptibility of potatoes to wireworm herbivory. Scott N. Johnson,; Eric A. Anderson,; Gregory Dawson,; D. Wynne Griffiths. ... Sinden, SL, Deahl, KH & Aulenbach, B. (1974) Glycoalkaloids as a component of potato flavour. American Potato Journal, 51, 298. ...
IAOP annually conducts an independent assessment of the capabilities of outsourcing service provi... more IAOP annually conducts an independent assessment of the capabilities of outsourcing service providers and advisors, and based on this assessment, publishes The Global Outsourcing 100 and The World's Best Outsourcing Advisors and various sub-lists. ... Companies apply for inclusion on the list by completing an online application. Applications are then judged by an independent panel of experienced outsourcing buyers on four critical characteristics: size and growth; customer references; organizational competencies; and management capabilities. For complete ...
Archives of Environmental Contamination and Toxicology, 1995
Recently, there have been discussions of the relative merits of passage of fishes around hydroele... more Recently, there have been discussions of the relative merits of passage of fishes around hydroelectric dams on three rivers (Au Sable, Manistee, and Muskegon) in Michigan. A hazard assessment was conducted to determine the potential for adverse effects on bald eagles that could consume such fishes from above and below dams on the three primary rivers. The hazard assessments were verified by comparing the reproductive productivities of eagles nesting in areas where they ate primarily fish from either above or below dams on the three primary rivers, as well as on two additional rivers in Michigan, the Menominee and Thunder Bay. Concentrations of organochlorine insecticides (OCI), polychlorinated biphenyls (total PCBs), 2,3,7,8-tetrachlorodibenzo-p-dioxin equivalents (TCDD-EQ), and total mercury (Hg) were measured in composite samples of fishes from above and below hydroelectric dams on the Manistee and Muskegon Rivers, which flow into Lake Michigan, and the Au Sable River, which flows into Lake
Proceedings of the 50th Hawaii International Conference on System Sciences (2017), 2017
Scholars and practitioners often assume that the public sector mirrors the private sector and tha... more Scholars and practitioners often assume that the public sector mirrors the private sector and that it is possible to merely port strategies between domains. However, we highlight the substantial differences between the domains and explore how IT-enabled innovation shapes and is shaped within state government. Analyzing state-level IT governance data using crisp-set Qualitative Comparative Analysis, we uncover that low state attainment is a catalyst for IT-enabled innovation. We uncover and differentiate several types of innovations and also find that successful innovation requires the collaboration of the legislature, governor and CIO.
Proceedings of the Annual Hawaii International Conference on System Sciences, 2020
Many organisations jumped on the bandwagon and implemented conversational agents (CAs) as a new c... more Many organisations jumped on the bandwagon and implemented conversational agents (CAs) as a new communication channel. Customers benefit from shorter resolution times, ubiquitous availability, and consistent and compliant responses. However, despite the hype around CAs and the various benefits for customers, we know little about the effects of external facing CAs on the human workforce. This is crucial to better manage the possible changes in the work organisation. Adopting a critical realist stance and using the lens of technology affordances we explore a) why users increasingly actualize CA affordances and b) the first and secondhand effects of affordance actualisation on customers and human employees. We conducted semi-structured interviews with 18 experts in the field and introduce the term affordance effects pairs describing the relationships between the first and secondhand effects. We further explain which generative mechanisms lead to an increasing actualization of affordances and the associated effects.
Journal of the Association for Information Systems, 2019
In the context of IS consulting, this study applies the principles of engaged scholarship to exam... more In the context of IS consulting, this study applies the principles of engaged scholarship to examine the perennial problem of constraining opportunism. Using constructs proposed by the theory of relationship constraints, this paper examines the relative effectiveness of different constraint mechanisms on information systems (IS) consultants in China, Saudi Arabia, and the United States, for projects with different levels of information asymmetry, tacit knowledge, and explicit knowledge. While we found support in all of these countries for the salience of these dimensions, there are important distinctions in the effectiveness of different constraints among the countries. Generally, consulting clients in the United States believe that social constraints are more effective, while those in China and Saudi Arabia favor legal constraints. Our research suggests that these findings are a result of differences in legal systems and the foundations of social norm formation. Our findings highlight the importance of tacit knowledge and information asymmetry (over explicit knowledge), and we provide a conceptual model for an IS-interventionist approach to reducing opportunism.
Economic Analysis and Policy, 2019
Both citizens and public servants have both voluntary and mandatory interactions with government ... more Both citizens and public servants have both voluntary and mandatory interactions with government through technology and these interactions range from unstructured to highly structured based on the technology or business processes implemented. Using data on the 50 U.S. states, we develop taxonomies of IT-enabled innovation along two dimensions-volitional vs non-volitional and structured vs unstructured-for both internal (employee-facing) and external (citizen-facing) investments. Using configurational analysis, we link portfolios of IT-enabled innovation investments to internal and external performance outcomes and find that a broad-based approach to IT-enabled innovation leads to the best outcomes while lack of investment hinders performance. We also find that for internal-focused innovation, unstructured innovations-whether volitional or non-volitional-tend to lead to better outcomes than structured innovations, while for external-focused innovation the most successful innovations noted were structured or volitional or both. As such, our findings highlight the differences between employeeand citizen-facing IT-enabled innovation, helping to guide policy makers and future researchers.
Communications of the Association for Information Systems, 2007
Ever since Odysseus, King of Ithaca, left to fight in the Trojan War and entrusted his friend, Me... more Ever since Odysseus, King of Ithaca, left to fight in the Trojan War and entrusted his friend, Mentor, to care for and educate his son, academic mentors have guided, educated, trained, and encouraged protégés in their academic development. As with Mentor and his protégé, mentoring relationships evolve over time in a predictable pattern and certain behaviors are necessary to initiate and sustain a mutually beneficial mentoring relationship. There are numerous parallels between successful mentoring behaviors in the academic and business world, and this paper seeks to leverage those similarities to provide advice for academic mentors and their protégés. This paper describes the stages of a mentoring relationship, discusses behaviors that underlie each stage and presents a series of best practices that future academic mentors and protégés should seek to emulate. While specific activities vary by stage of the mentoring evolution, mentors and protégés should create successful relationships, be respectful of time expectations and demands, ensure that necessary advisement occurs, and be open to an increasingly deep and personal relationship. By understanding and applying these behaviors, academic mentors and protégés can learn from and extend the mentoring legacy of Gary Dickson.
Journal of Management Information Systems, 2016
Communications of the ACM, and others. He has also written widely for the practitioner press in v... more Communications of the ACM, and others. He has also written widely for the practitioner press in venues such as the Brookings Institution and InformationWeek.
2015 48th Hawaii International Conference on System Sciences, 2015
Using a configurational crisp set Qualitative Comparative Analysis (csQCA) approach, we find that... more Using a configurational crisp set Qualitative Comparative Analysis (csQCA) approach, we find that effective public sector IT governance is structured differently than in the private sector. While states adopt a variety of IT governance structures, it is unmistakable that centralized yields better organizational outcomes than decentralized. As such, this paper makes a case for additional research in public sector governance in order to understand and explain these differences.
Opportunism is present in professional services and, as a result, organizations adopt mechanisms ... more Opportunism is present in professional services and, as a result, organizations adopt mechanisms to constrain it. Despite the work on constraining opportunistic consultants, researchers have generally ignored the potential impact of national culture on the efficacy of constraint mechanisms. Using the theory of relationship constraints (TRC), this study examines the effectiveness of different constraint mechanisms for information systems (IS) consultants in the United States and China based on different levels of information asymmetry, tacit and explicit knowledge. While we found support in both cultures for the salience of these dimensions, we also found important distinctions for the effectiveness of different constraints between the cultures. Legal constraints are more effective in China while social constraints are more effective in the United States. While TRC is relevant in both cultures, national culture moderates the effectiveness of various constraint mechanisms and highlights the need for additional study.
Journal of Management Information Systems, 2010
School of Business at arizona State university in Tempe, arizona. he received his Ph.D. in MIS fr... more School of Business at arizona State university in Tempe, arizona. he received his Ph.D. in MIS from the Terry college of Business at the university of Georgia in 2008. Before becoming an academic, he spent 25 years in information systems and management consulting and was a partner at Pricewaterhousecoopers. he has consulted with over 1,000 clients during his career, including those in the public and private sector as well as not-for-profits. his research interest focuses on the intersection of information systems consultants and their clients and how to improve this important relationship. richarD T. waTSon is the J. rex Fuqua Distinguished chair for Internet Strategy in the Terry college of Business at the university of Georgia. he has published in leading journals in several fields and written books on data management and electronic commerce. his current research focuses primarily on energy informatics and information systems leadership. he has given invited seminars in more than 30 countries for companies and universities. he is a visiting professor at the university of agder, Norway, a consulting editor to John Wiley & Sons, research director for the advanced Practices council of the Society for Information Management, international coordinator for the addis ababa university Ph.D. in IS program, and co-leader of the Global Text Project. he has been president of the aIS, a conference co-chair of IcIS, and a senior editor of MIS Quarterly.
Agency theory has long been a stalwart of IS research and is one of the most commonly used lenses... more Agency theory has long been a stalwart of IS research and is one of the most commonly used lenses to study the relationship between a principal and an agent. The Theory of Relationship Constraints (TRC) has recently been recommended as an information-oriented alternative to agency theory. TRC suggests that three attributes (ie, the level of information asymmetry, levels of tacit and explicit knowledge) affect the perceived efficacy of a relationship constraint. As the first empirical test of TRC, this study uses ...
How do IS leader effectiveness and IS organizational maturity impact IS unit effectiveness? Drawi... more How do IS leader effectiveness and IS organizational maturity impact IS unit effectiveness? Drawing on existing CIO capabilities literature, IS organizational maturity literature and IS effectiveness literature, this paper proposes to gather and analyze survey data to compare the capabilities of the CIO with the IS unit's organizational maturity to empirically determine which more influences IS effectiveness. The role of CIO in creating IS unit organizational maturity will also be tested.
Agricultural and Forest Entomology, 2008
... Varietal susceptibility of potatoes to wireworm herbivory. Scott N. Johnson,; Eric A. Anderso... more ... Varietal susceptibility of potatoes to wireworm herbivory. Scott N. Johnson,; Eric A. Anderson,; Gregory Dawson,; D. Wynne Griffiths. ... Sinden, SL, Deahl, KH & Aulenbach, B. (1974) Glycoalkaloids as a component of potato flavour. American Potato Journal, 51, 298. ...
IAOP annually conducts an independent assessment of the capabilities of outsourcing service provi... more IAOP annually conducts an independent assessment of the capabilities of outsourcing service providers and advisors, and based on this assessment, publishes The Global Outsourcing 100 and The World's Best Outsourcing Advisors and various sub-lists. ... Companies apply for inclusion on the list by completing an online application. Applications are then judged by an independent panel of experienced outsourcing buyers on four critical characteristics: size and growth; customer references; organizational competencies; and management capabilities. For complete ...