https://www.aes-journal.com/index.php/ais-tes/issue/feed AIS Transactions on Enterprise Systems 2025-09-09T07:15:30+00:00 Jasmin Fattah-Weil jasmin.fattah-weil@wi.uni-potsdam.de Open Journal Systems <p>The objective of the online journal 'AIS Transaction on Enterprise Systems' (AIS-TES) is to connect researchers, practitioners and students in the field of enterprise systems to one innovative community and promote and encourage knowledge exchange. Scientists from all over the world can publish their articles and stay in dialogue with colleagues and industry. It also aims at discovering and defining new directions of research and topics. AIS Transaction on Enterprise Systems is an international open access online journal with an issue appearing every six months. Contributions addressing any topic regarding enterprise systems are welcome. AIS Transaction on Enterprise Systems publishes original papers, case studies and reviews. Submitted articles must not have been previously published or currently submitted for journal publication elsewhere. This journal is released in association with the <span id="ctl00_PageContent_lblProductName"><a href="https://aisnet.org/page/AISSIGs#collapseSixteen">SIG Enterprise-level Information Systems (SIG ENTSYS)</a> </span>of the <a href="https://aisnet.org/" target="_blank" rel="noopener">Association for Information Systems</a></p> https://www.aes-journal.com/index.php/ais-tes/article/view/32 Beyond Phishing: Detecting MFA Fatigue and Adversary-in-the-Middle at Scale 2025-09-09T07:15:30+00:00 Jessica Davis academic1hjq2z@tempmail.org <p>This study proposes a defender-centric strategy to detect and contain two fast-rising attack patterns—MFA fatigue and Adversary-in-the-Middle (AiTM)—without relying on expensive tooling. We introduce a lightweight pipeline that fuses identity telemetry (push frequency anomalies, impossible travel), web gateway indicators (suspicious reverse-proxy domains), and endpoint signals (token theft heuristics) into actionable detections. Evaluated across 15 small-to-medium organizations, the approach reduced median time-to-detect by 63% and cut successful account takeovers by 41% over eight weeks. We document failure modes (e.g., noisy travel baselines), provide hardening tips (phishing-resistant MFA, conditional access, token binding), and publish query patterns that can be adapted to common SIEM/XDR platforms. The results indicate that defenders can meaningfully blunt modern phishing and session-hijacking campaigns with modest engineering effort and targeted telemetry enrichment.</p> Copyright (c) https://www.aes-journal.com/index.php/ais-tes/article/view/31 Beyond Phishing: Detecting MFA Fatigue and Adversary-in-the-Middle at Scale 2025-09-09T04:38:12+00:00 Brian Scott scholard1d7ch@yahoo.com <p>This study proposes a defender-centric strategy to detect and contain two fast-rising attack patterns—MFA fatigue and Adversary-in-the-Middle (AiTM)—without relying on expensive tooling. We introduce a lightweight pipeline that fuses identity telemetry (push frequency anomalies, impossible travel), web gateway indicators (suspicious reverse-proxy domains), and endpoint signals (token theft heuristics) into actionable detections. Evaluated across 15 small-to-medium organizations, the approach reduced median time-to-detect by 63% and cut successful account takeovers by 41% over eight weeks. We document failure modes (e.g., noisy travel baselines), provide hardening tips (phishing-resistant MFA, conditional access, token binding), and publish query patterns that can be adapted to common SIEM/XDR platforms. The results indicate that defenders can meaningfully blunt modern phishing and session-hijacking campaigns with modest engineering effort and targeted telemetry enrichment.</p> Copyright (c) https://www.aes-journal.com/index.php/ais-tes/article/view/30 Beyond Phishing: Detecting MFA Fatigue and Adversary-in-the-Middle at Scale 2025-09-05T14:42:44+00:00 Susan Hall author0g3ck9@hotmail.com <p>This study proposes a defender-centric strategy to detect and contain two fast-rising attack patterns—MFA fatigue and Adversary-in-the-Middle (AiTM)—without relying on expensive tooling. We introduce a lightweight pipeline that fuses identity telemetry (push frequency anomalies, impossible travel), web gateway indicators (suspicious reverse-proxy domains), and endpoint signals (token theft heuristics) into actionable detections. Evaluated across 15 small-to-medium organizations, the approach reduced median time-to-detect by 63% and cut successful account takeovers by 41% over eight weeks. We document failure modes (e.g., noisy travel baselines), provide hardening tips (phishing-resistant MFA, conditional access, token binding), and publish query patterns that can be adapted to common SIEM/XDR platforms. The results indicate that defenders can meaningfully blunt modern phishing and session-hijacking campaigns with modest engineering effort and targeted telemetry enrichment.</p> Copyright (c) https://www.aes-journal.com/index.php/ais-tes/article/view/29 The Relationship of Computer Aptitude, Positive Affect, and Openness Personality Traits on Learning Enterprise Systems 2024-03-27T15:24:33+00:00 Mary Sumner mary.b.sumner-1@ou.edu <p>Enterprise Resource Planning (ERP) systems are complex enterprise information systems. They are the backbone for running most enterprises and support integrated business processes across the supply chain, including sales and distribution, materials management, financial accounting, and managerial accounting processes.&nbsp; The need for individuals who can learn to use these systems successfully is a recurring challenge and is a talent acquisition priority for organizations. This research seeks to explore the relationships between computer aptitude, Positive Affect, and the Openness personality trait in the successful learning of ERP systems. Structural equation modeling was used to test the research hypotheses. The results revealed that users’ cognitive aptitude for computing and Positive Affect were positively related to their ERP system learning performance. Furthermore, users’ Openness personality trait was positively related to their Positive Affect.</p> Copyright (c) https://www.aes-journal.com/index.php/ais-tes/article/view/28 Success Factors in Efficient Mergers & Acquisitions Activities: 2023-01-17T10:04:47+00:00 Markus Böhm markus.boehm@haw-landshut.de Sebastian Floerecke sebastian.floerecke@uni-passau.de Alexander Herzfeldt aherzfeldt@gmx.de Dominik Knoblich dominik.knoblich@gmail.com <div><span lang="EN-US">In 2021, the global mergers &amp; acquisitions (M&amp;A) market remained strong, with transaction volumes reaching $5.9 trillion and an increasing number of large deals. Despite the strategic impact and the high priority of every transaction, many of them fail to deliver the anticipated value due to inferior implementation, both from a post-merger IT integration (IT PMI) and an IT carve-out perspective. This paper explains how one of the world’s largest engineering companies (TURBO) has developed IT M&amp;A capabilities to ensure both efficient post-merger IT-PMI and IT-carve-out projects. Their key to success relies on two principles, (1) standardization of the IT integration and respectively IT separation (carve-out) process, and (2) standardization of the enterprise architecture. By establishing these principles, TURBO managed to reduce both time and costs of its IT integration and IT carve-out projects by on average 40 %. Based on this case study, the paper synthesizes four success factors that can inform managers of M&amp;A active organizations to successfully build IT-PMI and IT-carve-out capabilities.</span></div> 2023-06-25T00:00:00+00:00 Copyright (c) 2023 Markus Böhm, Sebastian Floerecke, Alexander Herzfeldt, Dominik Knoblich https://www.aes-journal.com/index.php/ais-tes/article/view/26 On the Journey to AI Maturity 2022-02-27T17:10:03+00:00 <p>Artificial Intelligence (AI) has recently become pivotal in day-to-day business. However, surveys show that underlying, systemic issues – aside from AI-related aspects – hinder its enterprise-wide adoption. In this study, we aim to understand the role of this new breed of providers on the path to AI maturity and enterprise-wide adoption. We collect secondary data (i.e., surveys) from 154 white papers published by companies implementing AI solutions and apply descriptive and thematic analysis to understand the current challenges and opportunities of AI implementation. The thematic analysis involves topic modelling using natural language-processing algorithms. Our results demonstrate that, despite AI service providers addressing – at least in part – the major challenges faced by clients, there is still a gap between the skills demanded by end-users, and skills possessed by and focused on AI service providers.</p> 2023-01-19T00:00:00+00:00 Copyright (c) 2023 Chuanwen Dong, Akanksha Saxena, Markus Bick, Andrea Sabia https://www.aes-journal.com/index.php/ais-tes/article/view/23 Studying Digital Initiatives: Applying Established Perspectives to Emerging Digital Phenomena 2021-06-18T14:56:18+00:00 Kazem Haki kazem.haki@unisg.ch Stephan Aier stephan.aier@unisg.ch Robert Winter robert.winter@unisg.ch <p>The information systems (IS) discipline is witnessing a shift in topical areas due to an ever-growing pervasiveness of digital technologies. Digitalization is rapidly transforming the fabric and organizing logics of firms and has introduced new business practices and opportunities. To catch up with the digitalization wave, IS scholars have been exposing the IS literature to a plethora of brand-new phenomena and theories. While such a considerable topical shift toward fashionable topics is necessary to maintain the dynamics of the IS discipline, it may compromise the cumulative nature of knowledge development. In this paper, we afford a reflexive discussion on the use of existing established theories and research approaches in studying emerging digital phenomena. To this end, we demonstrate the use of stakeholder theory and a two-dimensional research approach, as exemplars of existing established research perspectives, to the topic of digital platforms, as one of the digital phenomena that has recently drawn the attention of IS scholars. &nbsp;</p> Copyright (c) https://www.aes-journal.com/index.php/ais-tes/article/view/20 Design of a Neuronal Training Modeling Language 2021-03-05T10:59:33+00:00 Marcus Grum mgrum@lswi.de Werner Hiessl werner.hiessl@assecosol.com Karl Maresch karl.maresch@salesbeat.io Norbert Gronau ngronau@lswi.de <p>As the complexity of learning task requirements, computer infrastructures and knowledge acquisition for artificial neuronal networks (ANN) is increasing, the communication about ANN is challenging. An efficient, transparent and failure-free design of learning tasks by models is not supported by any tool at all. For this purpose, particular the consideration of data, information, and knowledge on the base of an integration with knowledge-intensive business process models and a process-oriented knowledge management are attractive. With the aim of making the design of learning tasks expressible by models, this paper proposes a graphical modeling language called Neuronal Training Modeling Language (NTML), which allows the repetitive use of learning designs. An example ANN project of AI-based dynamic GUI adaption exemplifies its use as a first demonstration.</p> 2021-03-25T00:00:00+00:00 Copyright (c) 2021 Marcus Grum, Werner Hiessl, Karl Maresch, Norbert Gronau https://www.aes-journal.com/index.php/ais-tes/article/view/19 Embedding Robotic Process Automation into Process Management 2020-04-30T22:51:40+00:00 Vikram Sethi vikram.sethi@wright.edu Anand Jeyaraj anand.jeyaraj@wright.edu Kevin Duffy kevin.duffy@wright.edu Berkwood Farmer berkwood.farmer@wright.edu <div><span lang="EN-US">XYZ Company routinely faced penalties imposed by the United States Internal Revenue Service (IRS) for non-compliance in depositing federal withholding taxes related to the managed benefits plans for its clients. Since the rules for depositing the federal taxes were complex and differed between the benefits plans, it was common for XYZ Company to accrue penalties imposed by the IRS. Desiring to eliminate penalties by complying 100% with the IRS guidelines, XYZ Company considered various solutions. Finally, XYZ Company implemented a Robotic Process Automation (RPA) solution using the open source tool—<em>taskt</em>—to achieve 100% compliance in depositing federal withholding taxes and eliminate penalties. Discussion of solution improvements, reflection and next steps, technical challenges, lessons learned, and design science retrospective is provided.</span></div> 2020-07-28T00:00:00+00:00 Copyright (c) 2020 Vikram Sethi, Anand Jeyaraj, Kevin Duffy, Berkwood Farmer https://www.aes-journal.com/index.php/ais-tes/article/view/17 An approach to model forgetting 2019-11-12T08:54:39+00:00 Jennifer Haase jhaase@lswi.de Christof Thim cthim@lswi.de <div class="page" title="Page 1"> <div class="layoutArea"> <div class="column"> <p>This paper aims to investigate the possibility to include aspects of forgetting into business process modeling. To date, there is no possibility to model forgotten or to-be- forgotten elements beyond the mere deletion. On a first attempt, we focus on the individual level and model knowledge transformation within a single person. Using the Knowledge Model Description Language, we propose ways to include different forms of forgetting into the realm of modeling tools. Using data from an experimental setting within an assembly line production environment, the usability of those new modeling tools is tested. So far, the applicability of modeling features for forgetting on the individual level is mostly restricted to a research context. However, clear requirements to transfer the tools onto the team- and organizational level are set out.</p> </div> </div> </div> 2020-06-03T00:00:00+00:00 Copyright (c) 2020 AIS Transactions on Enterprise Systems