Executive compensation and strategic risk- taking in IT

Ling Xue, Gautam Ray, Xia Zhao

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This study examines how the risk-taking incentive of top executives drives the strategic risk-taking in corporate IT implementation. We use the risk incentive provided in executive compensation to capture top executives' risk-taking incentive, and develop measures of aggressive IT implementation to capture strategic risk-taking in IT implementation. Our analysis provides empirical evidence that the risk incentive of executive compensation drives aggressive IT implementation. We also consider how firm diversification may influence the relationship between the risk incentive of top executives and aggressive IT implementation. Our finding indicates that the relationship between the risk incentive of top executives and aggressive IT implementation is stronger in focal firms' primary industries than in their secondary industries, which suggests that diversification supports IT risk taking by providing riskseeking executives more opportunities in the areas that are less familiar to them.

Original languageEnglish (US)
Title of host publicationInternational Conference on Information Systems (ICIS 2013)
Subtitle of host publicationReshaping Society Through Information Systems Design
Pages1542-1557
Number of pages16
StatePublished - Dec 1 2013
EventInternational Conference on Information Systems, ICIS 2013 - Milan, Italy
Duration: Dec 15 2013Dec 18 2013

Publication series

NameInternational Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design
Volume2

Other

OtherInternational Conference on Information Systems, ICIS 2013
Country/TerritoryItaly
CityMilan
Period12/15/1312/18/13

Keywords

  • Diversification
  • Executive compensation
  • Information technology
  • Managerial incentives
  • Risk taking

Fingerprint

Dive into the research topics of 'Executive compensation and strategic risk- taking in IT'. Together they form a unique fingerprint.

Cite this