Forthcoming papers have been accepted for publication at the Communications of the Association for Information Systems and are listed below in order of acceptance date. Copies of unedited manuscripts can be obtained by contacting the corresponding authors listed below.
Note that the decision to provide a copy rests with the authors, not with the Communications of the Association for Information Systems.
The manuscripts listed here will undergo copyediting, typesetting, and review of the resulting proofs before they are published in their final form. During the production process errors may be discovered, which could affect the content. All legal disclaimers that apply to the Communications of the Association for Information Systems pertain. For a definitive version of the works listed here, please check for their appearance online at http://aisel.aisnet.org/cais/.
Understanding the Why, What, and How of Theories in IS Research
Mueller, Benjamin (email@example.com); Urbach, Nils
Theory’s pivotal importance has been emphasized in the information systems (IS) discipline since its inception. As in many fields of science, IS scholars’ ability to understand and contribute to theory is an important qualification in research practice. This requires solid foundations for why we engage with theory, what theory is for us, and how we work with theory. We synthesize and reflect on the debates on theories and theorizing in the IS field. Our key contribution is to inform (new) authors of the prevailing state-of-the-art and to help identify opportunities in theorizing to put theory to work. While only a first step, we hope that our synthesis of the status quo advances our discipline’s current efforts towards enhancing theorizing and addressing the increasing demand for theoretical contributions and that it critically reflects on the status quo to help us move beyond it.
The World IT Project: History, Trials, Tribulations, Lessons, and Recommendations
Palvia, Prashant (firstname.lastname@example.org); Jacks, Tim F.; Ghosh, Jaideep; Licker, Paul; Romm-Livermore, Celia; Serenko, Alexander; Turan, Aykut H.
The World IT Project, the largest study of its kind in the IS field, was conceived more than a decade ago. This ambitious mega project with an enormous global scale was formally launched in 2013 and is expected to be completed by 2017, with major publications appearing through 2019. The project was in response to the pervasive bias in IS research towards American and Western views. What is glaringly lacking in IS research is a global view that tries to understand the major IS issues in the world in the context of unique cultural, economic, political, religious, and societal environments. The World IT Project captures the organizational, technological, and individual issues of IT employees across the world and relates them to cultural and organizational factors. This first major article provides the objectives and history of the project, its general framework, important decision points, and recommendations for future researchers based on lessons learned from a massive global project. Ultimately, we hope to provide a world view of IT issues that will be relevant to stakeholders at the firm, national, and international levels. We also invite scholars to send their recommendations for the analysis and writing of papers using our vast database.
Delivering Disruption in an Emergent Access Economy: A Case Study of an E-Hailing Platform
Tan, Felix Ter Chian (email@example.com); Tan, Barney; Lu, Anthony; Land, Lesley
The growing adoption of platforms such as Uber and Airbnb has contributed to the emergence of an access economy, disrupting a number of incumbent industries in the process. In this study, we examine goCatch, one of Australia’s largest e-hailing and ride-sharing multi-sided platforms. From our investigations, we find that the technology affordances of multi-sided digital platforms can help to deliver new commercial services and offerings to consumers of the platform, enabling new forms of consumption, and subsequently disrupting the incumbent industry. The findings from our study provide the empirical premise for a model illustrating the role of technology in enabling consumer recognition, consumer engagement and consumer transposition in the context of e-hailing. For theory, we build on extant literature to identify the forms of motivational affordances leveraged in disruptive platforms and technologies. For practice, we conceptualise the function of technology-enabled gamification as an emergent strategy that can be used to induce consumers to change their behaviours, develop their technical skills and drive innovation that plays a central role in enabling digital disruption. This study also clarifies the relationship between technology affordances and value creation against the backdrop of the emergent access economy.
Analyzing Crisis Response through Actor-Network Theory: The Case of Kathmandu Living Labs
Thapa, Devinder (firstname.lastname@example.org); Budhathoki, Nama; Munkvold, Bjørn Erik
Crisis response is the most critical stage in crisis management where actors make important decisions on mitigating the effects of the crisis. However, the decision-making in such situations is a complex sociotechnical phenomenon. The literature specifies crisis response to include the four steps of observation, interpretation, choice and dissemination, and suggests a sociotechnical approach for analyzing these. However, theoretical guidelines for conducting a sociotechnical analysis of the complexity involved in the crisis response activities are still lacking. To contribute to this knowledge gap, this paper presents an interpretive case study of the role of the Kathmandu Living Labs (KLL) in the response to the Nepal earthquake in 2015. We analyze the case using Actor-Network Theory (ANT), exploring how a social entrepreneur from KLL enrolled different technical and human actors and mobilized them in the crisis response. ANT unfolds the temporal and interdependent role of digital volunteers, local communities and technologies in responding to the crisis, dealing with the challenges of clustering, filtering and verifying large volumes of data in an urgent and evolving crisis situation. The paper demonstrates the usefulness of ANT’s translation process in understanding the complex sociotechnical process of crisis response in disaster events.
Collaboration in Agile Software Development: Concept and Dimensions
Batra, Dinesh (email@example.com); Xia, Weidong; Zhang, Mingyu
One of the four values listed in the Agile Manifesto emphasizes customer collaboration over contract negotiation; yet, what constitutes customer collaboration and how to assess it has not been explained in the literature. There is limited research on the nature and dimensions of collaboration in the context of agile software development. Based on a grounded theory methodology using interview data collected from five software development outsourcing vendors in China, this study explores the nature and key underlying dimensions of collaboration in agile software development. Five major dimensions of collaboration emerged from our analysis: mutual benefits, engagement, coordination, communication, and knowledge sharing. Each of these dimensions is in turn composed of key sub-dimensions that provide a comprehensive view of collaboration. By revealing the underlying nature and key dimensions, we provide a conceptual basis for operationalizing collaboration that can be employed in future quantitative studies on agility and other project outcomes. Our study results suggest that collaboration in agile software development is multifaceted and mutual occurring in both directions between the customer and the vendor; rather than single-dimensional as indicated by the term “customer” collaboration used in the Agile Manifesto.
A Guide to Text Analysis with Latent Semantic Analysis in R with Annotated Code Studying Online Reviews and the Stack Exchange Community
Gefen, David (firstname.lastname@example.org); Endicott, James E.; Fresneda, Jorge E.; Miller, Jake; Larsen, Kai R.
The objective of this guide is to introduce researchers in the behavioral sciences, and MIS in particular, to text analysis as done with Latent Semantic Analysis (LSA). The guide contains hands-on annotated code samples in R that walk the reader through a typical process of acquiring relevant texts; creating a semantic space out of them; and then projecting words, phrase, or documents onto that semantic space to calculate their lexical similarities. R is an open source, popular programming language with extensive statistical libraries. The guide introduces LSA as a concept, discusses the process of preparing the data, and its potential as well as limitations. The guide proceeds to demonstrate this process through a sequence of annotated code examples, starting with a study of online reviews that extracts lexical insight about trust. That R code applied singular value decomposition (SVD). The guide next demonstrates a realistically large data analysis of Stack Exchange, a popular Q&A site for programmers. That R code applies an alternative sparse SVD method. All the code and data are available on github.com.
A Taxonomy of Information System Projects’ Knowledge Sharing Mechanisms
Fteimi, Nora (email@example.com); Cai, Jianxiao; Basten, Dirk
Despite its criticality to the success of information system (IS) projects, knowledge sharing among IS projects is generally ineffective compared to knowledge sharing within IS projects. Although several mechanisms for knowledge sharing exist in the literature, it is difficult to determine which mechanism should be used in a specific context. An attempt to concisely and comprehensively classify these mechanisms remains lacking. Based on a literature review, we extracted information from 33 studies and identified twelve mechanisms for knowledge sharing among IS projects. Then, we derived a taxonomy for these mechanisms, which extends previous research by both adapting existing mechanisms and complementing the set of dimensions used for their classification. The results help to systematically structure the fields of knowledge management and IS projects. Both research and practice can use this taxonomy to better understand knowledge in this domain and effectively adopt mechanisms for a particular application.
An Experimental Investigation of the Individual and Joint Effects of Financial and Non-Financial Incentives on Knowledge Sharing Using Enterprise Social Media
Kettles, Degan (firstname.lastname@example.org); St. Louis, Robert D.;Steinbart, Paul John
Many organizations implement Enterprise Social Media (ESM) in an effort to capture and store valuable knowledge possessed by employees. Unfortunately, more often than not, employees do not make a large number of knowledge contributions. Using agency theory and contingency theory as foundations, this paper examines managerial interventions that can improve knowledge contribution rates in ESM. Specifically, we investigate the individual and joint effects of paying people to share knowledge, providing social cues, and the presence of supporting and policing moderators on knowledge sharing. We further examine how two contingency factors, the nature of an employee’s compensation scheme (variable or fixed) for their primary work task, and the employee’s belief about the importance of sharing knowledge, affect the relative efficacy of the aforementioned managerial interventions. Although we find evidence that being paid to share knowledge and believing that knowledge sharing is inherently important both increase the amount of knowledge shared, our most important results concern the existence of significant interaction effects. For persons that are paid a fixed salary, we find that there is a surprisingly large, positive synergistic effect between being paid to share knowledge and believing that knowledge sharing is important; but that this synergistic effect is almost completely nullified by the introduction of a policing moderator. We discuss the implications of these findings for both practice and research.
Information Systems: A House Divided?
Stewart, Alex (email@example.com); Cotton, John L.; Adya, Monica
Is IS a singular field consisting of behavioral (BIS) and technical (TIS) focus? Or is IS really two fields, split between these orientations? Current opinion emphasizes BIS and reinforces the notion that research is practiced in disconnected silos, as opposed to a relatively continuous web. Such silos do disservice to the diversity of scholarly interests, skew productivity expectations in favor of small subsets of journals that often exclude technical and decision science oriented journals, and run the risk of creating self-perpetuating journal groupings. Silos disadvantage IS researchers by making the field narrower in comparison to other business disciplines and contradict the nature of IS pedagogy that equally reflects technology and management. In this study, we apply social network and cross-citation analyses to a sample of 98 IS journals to examine the cohesiveness of IS and to understand the extent to which boundary-spanning journals maintain scholarly connections between the approaches. We distinguish between weak and strong ties among journals and find that a field consisting of both BIS and TIS journals is highly cohesive in terms of weaker ties, and that many boundary-spanning journals are quite balanced in their citations to and from each orientation. We do not, however, find that IS is uniformly cohesive. Despite this, an implication is that IS scholars with different interests can parse out distinct subsets of journals that are central to their interests. We demonstrate this with an examination of the most central journals for three examples of IS scholars: those with a strongly behavioral approach, with sociotechnical interests, and with specialized interests, such as medical informatics. The most central journals for these three interests are distinct subsets of the IS field.
Relevant Research Areas in IT Service Management: An Examination of Academic and Practitioner Literatures
Marrone, Mauricio (firstname.lastname@example.org);Hammerle, Mara
Practitioners and academics alike highlight a perceived lack of relevant Information Systems (IS) research, indicating that it may currently be of limited use and value to practitioners. Further, research provides examples of positive links between management practices prevalent in the media and their influence on societal views. This paper seeks to increase relevance of future academic research for practitioners by identifying sources of misalignment between practitioner and academic literatures on the topic of Information Technology Service Management (ITSM) and by developing a possible research agenda to address these misalignments. We do so by employing an entity annotator and keyword analysis to compare the main topics evident in academic and practitioner literatures on ITSM and focus on those salient in practitioner literature. Our results suggest that the topics of framework co-implementation, regulations, ITSM tools and gamification as well as cloud computing all present fertile grounds for relevant research within ITSM and IS more broadly. Our paper thus offers a unique way for academics to understand how they can best assist practitioners while increasing the relevance of academic research.
Multi-Disciplinary Green IT Archival Analysis: A Pathway for Future Studies
Sedera, Darshana (email@example.com); Lokuge, Sachithra; Tushi, Bonny; Tan, Felix
With the growth of information technology (IT), there is a growing global concern on the environmental impact of such technologies. As such, research on Green IT is considered as a vibrant theme amongst academics in several research disciplines. While the disparate knowledge within each discipline is gaining substantial momentum, a consolidated multi-disciplinary view of the salient findings of each research disciplines is required for Green IT research to reach its full potential. This paper provides a review of 390 papers published on Green IT between 2007−2015 in three disciplines: Computer Science, Information Systems and Management. The prevailing literature demonstrates the value of this consolidated approach for advancing our understanding on this complex global issue of environmental sustainability. The paper provides an overarching theoretical perspective to consolidate multi-disciplinary findings and then to encourage the information systems researchers to develop an effective cumulative tradition of research.
Contemporary Issues of Open Data in Information Systems Research: Considerations and Recommendations
Link, Georg J.P. (firstname.lastname@example.org); Lumbard, Kevin; Conboy, Kieran; Feldman, Michael; Feller, Joseph; George, Jordana; Germonprez, Matt; Goggins Sean; Jeske, Debora; Kiely, Gaye; Schuster, Kristen ; Willis, Matt
Researchers, governments, and funding agencies are calling on research disciplines to embrace open data - data that is publicly accessible and usable beyond the original authors. The premise is that research efforts can draw and generate several benefits from open data, as such data might provide further insight, enabling the replication and extension of current knowledge in different contexts. These potential benefits, coupled with a global push towards open data policies, brings open data into the agenda of research disciplines – including Information Systems (IS). This paper responds to these developments as follows. We outline themes in the ongoing discussion around open data in the IS discipline. The themes fall into two clusters: (1) The motivation for open data includes themes of mandated sharing, benefits to the research process, extending the life of research data, and career impact; (2) The implementation of open data includes themes of governance, socio-technical system, standards, data quality, and ethical considerations. In this paper, we outline the findings from a pre-ICIS 2016 workshop on the topic of open data. The workshop discussion confirmed themes and identified issues that require attention in terms of the approaches that are currently utilized by IS researchers. The IS discipline offers a unique knowledge base, tools, and methods that can advance open data across disciplines. Based on our findings, we provide suggestions on how IS researchers can drive the open data conversation. Further, we provide advice for the adoption and establishment of procedures and guidelines for the archival, evaluation, and use of open data.
How Can Universities Best Encourage Women to Major in Information Systems?
Anderson, Lisa (email@example.com); Edberg, Dana; Reed, Adam; Simkin, Mark G.; Stiver, Debra
Despite both government and industry initiatives, the under-representation of women in information systems (IS) continues. Can academia help right this imbalance by helping fill the pipeline for technically-qualified female employees? This paper analyzes the results of four experimental interventions based on empirical studies and prior surveys designed to address this issue. We conducted these interventions as projects in an introductory undergraduate IS class in a public university in the western U.S. Sadly, none of them were effective in encouraging more female students to consider majoring in IS.
Literature Reviews in IS Research: What Can Be Learnt from the Past and Other Fields?
Schryen, Guido (firstname.lastname@example.org); Benlian, Alexander; Rowe, Frantz; Gregor, Shirley; Larsen, Kai; Petter, Stacie; Paré, Guy; Wagner, Gerit; Haag, Steffi; Yasasin, Emrah
Literature reviews (LRs) are recognized for their increasing impact in the information systems literature. Methodologists have drawn attention to the question of how we can leverage the value of LRs to preserve and generate knowledge. The panelists who participated in the discussion of “Standalone Literature Reviews in IS Research: What Can Be Learnt from the Past and Other Fields?” at ICIS 2016 in Dublin acknowledged this significant issue and debated a) what the IS field can learn from other fields and where IS-specific challenges occur, b) how the IS field should move forward to foster the genre of LRs, and c) what best practices are to train doctoral IS students in publishing LRs. This article reports the key takeaways of this panel discussion. Guidance for IS scholars is provided on how to conduct LRs that contribute to the cumulative knowledge development within and across the IS field to best prepare the next generation of IS scholars.
A Conceptual Model for User-System Collaboration: Enhancing Usability of Complex Information Systems
Xu, Jennifer (email@example.com); Topi, Heikki
Complex information systems (e.g., Enterprise Resource Planning and Supply Chain Management systems) are used around the world by a wide variety of organizations. However, poor usability caused by system complexity continues to frustrate users and damage the reputation of these systems. This study intends to address usability issues with complex information systems from the human-computer collaboration perspective by modeling user-system interaction as a joint activity between the system and its users. We propose a conceptual model for user-system collaboration, elaborate on the components in the model and the relationships between the components, derive the required capabilities for collaborative information systems, and establish conceptual relationships between system collaborative behaviors and usability. We use empirical evidence gathered from a qualitative field study on ERP systems to illustrate the model and the possible impact of system collaborativeness (i.e., the presence or absence of collaborative capabilities) on usability. Our research objective is to provide a strong conceptual foundation for modeling user-system collaboration and to encourage designers to employ the collaboration metaphor during system design, thus helping them develop future complex information systems with better usability.
An Empirical Assessment of the CIO Role Expectations Instrument Using PLS Path Modelling
Al-Taie, Moyassar (firstname.lastname@example.org); Lane, Michael; Cater-Steel, Aileen
The validation of Information Systems research instruments has not been given the attention that it deserves. Based on data obtained from 174 Australian CIOs this study uses component-based structural equation modelling (PLS/SEM) to investigate the psychometric properties and possible modelling of the highly-regarded CIO role expectations instrument developed by Smaltz, Sambamurthy and Agarwal. Results show that the CIO role expectations instrument exhibits solid validity and reliability indices despite some minor weaknesses. The results also demonstrate the possibility to model the constructs of this instrument in different null and hierarchical models, and provide further empirical support for the validity of this instrument to measure the CIO role in different countries and different types of industries beyond the USA healthcare sector in which it was developed. The results provide support for CIO role theory on two central issues: CIOs are fulfilling a configuration of roles not just one specific role; and the CIO roles can be grouped into two major categories: supply (operational) side roles and demand (business) side roles.
Personal Health Record Systems as Boundary Objects
George, Joey F. (email@example.com); Kohnke, Emily
Personal health record systems are widely available and regarded as a key element of the push for electronic health records and the meaningful use of technology in medicine. However, the adoption and use of these systems has been much lower than anticipated. While there has been research into the reasons for this lack of adoption, there have not been satisfactory answers. We undertook a qualitative research study within a medical clinic setting to investigate these issues. We focus on identifying how the unique user groups who interact with these personal health record systems view their use and impact. We specifically examined three different perspectives on these systems; physician, patient, and medical staff (e.g., nurses, receptionists). We find that personal health record systems are functioning as boundary objects which reflect significantly different meanings to the various user groups who interact with them. Our results show that the patients largely view these systems as non-essential adjuncts to their current care routine, physicians see the systems as tools, and medical staff view them as an additional task or chore with questionable effectiveness. This new conceptualization of these systems as boundary objects has significant implications for their design and use.
Stuck in the Middle: Reflections from the AMCIS Mid-Career Workshop
Petter, Stacie (firstname.lastname@example.org); Richardson, Sandra; Randolph, Adriane
Studies often show that mid-career faculty are some of the unhappiest people within academia. Many mid-career faculty have tenure, have more freedom to pursue different types of projects, and have many options ahead. Yet, mid-career faculty members are also dealing with the personal politics that arose during the tenure process, trying to figure out what to do with the newfound freedom, and finding one’s way among the many options in an academic career path. As a junior faculty member, there is often a singular goal: obtaining tenure. As a mid-career faculty member, it’s not just about becoming a “full” professor, but rather figuring out what to do once you have reached this milestone and feeling full in one’s overall career path. This article discusses the challenges associated with being a mid-career faculty member based on research and insights discussed in the Mid-Career Workshop offered at the Americas Conference on Information Systems. We offer examples of how to support mid-career faculty through workshops and mentoring relationships. We also provide insights on how individuals at different career stages can support and understand the challenges among mid-career faculty in information systems.
Understanding Information Privacy Assimilation in IT Organizations using Multi-Site Case Studies
Attili, V S Prakash (PrakashV_S@infosys.com); Mathew, Saji K; Sugumaran, Vijayan
This study develops a framework for understanding the mechanisms of information privacy assimilation in Information Technology (IT) organizations. Following neo-institutional theory, we develop a broad conceptual model and further build a detailed theory by following a multi-site multi-case study covering 18 organizations. This study treats information privacy as a distinct dimension separate from information security. As in the case of information security, senior management support emerged as a mediator between the external influences of coercive, mimetic, and normative forces and information privacy assimilation. Privacy capability emerged as a distinct construct that has a moderating effect on the influence of coercive forces on privacy assimilation. Similarly, cultural acceptability also was posited to moderate the effect of external forces of privacy assimilation. Our study has resulted in a theoretical model that could be empirically tested. The findings would enable senior managers identify and respond to institutional pressures by focusing on appropriate factors within the organization.
Systematic Review of Gamification Research in IS Education: A Multi-Method Approach
Osatuyi, Babajide (email@example.com); Osatuyi, Temidayo; de la Rosa, Ramiro
Gamification is described as the use of game mechanics and game dynamics in non-gaming environments and contexts. Gamification is increasingly gaining attention among system designers across various industries especially in education, due to the benefits associated with its implementation. The adoption of gamification in information systems (IS) education is promising for engaging and motivating students to complete their degree programs. Call for research in this area is particularly on the increase in the IS field. Accordingly, it is imperative to organize the aggregation of research in this area as well as use common terminologies to promote progressive research practice in the field. The research presented in this paper uses a multi-method approach to conduct a systematic review of existing research on gamification in IS education to identify common terminologies, identify trends in topics studied and highlight areas understudied, thus presenting opportunities for future research. The multi-method approach combines classical systematic review method and social network analysis to present additional depth of the knowledge structure of researchers involved in the gamification of IS education. This review also highlights possible interventions that can improve student retention in IS education through the design of effective gamified courses.
The Relationship between Information Systems (IS) Assets, Organizational Capabilities and IS-Enabled Absorptive Capacity in U.S. State Information Technology Departments
Liu, Yi (firstname.lastname@example.org); Armstrong, Deborah J.; Riemenschneider, Cindy
Despite the recognition that information is a strategic asset for any state government, there is a relative dearth of research on the deployment and use of information systems in the U.S. state government context. Information systems are central for state agencies’ efforts to develop optimal responses to demands from their internal and external constituents. The authors examine how an organization’s specific IS asset combines with prior knowledge to influence organizational capabilities, and the connections between organizational capabilities and the IS-enabled absorptive capacity of U.S. state IT departments from the perspective of IS employees. This study may help researchers and practitioners understand the role of IS assets in forming IS-enabled absorptive capacity within government organizations. Survey data was collected from 417 government IS employees representing 21 different states. The findings indicate that the role of an IS asset depends on the type of asset. Inside-out IS assets (ERP) moderate the relationship between prior knowledge and organizational capabilities while outside-in IS assets (CRM) directly affect organizational capabilities. In addition, organizational capabilities can directly affect IS-enabled absorptive capacity in IT departments. This research increases our understanding of the influence of different IS assets on IS-enabled absorptive capacity in state government IT departments. Limitations and directions for future research are also provided.
Short-term and long-term effects of fear appeals in improving compliance with password guidelines
Mwagwabi, Florence (email@example.com); McGill, Tanya; Dixon, Mike
Passwords are the most widely used method of authentication on the Internet, but users find compliance with password guidelines difficult and little is known about the long-term effects of attempts to improve compliance. The aim of this paper is to extend the work of fear appeals use in the IS security domain, to investigate longer term effects, identifying that effects may be relatively short lived. We conducted a longitudinal experimental study to examine long and short-term effects of fear appeals. Using a model based on protection motivation theory (Rogers, 1983), we find that compliance is predicted by fear of threat, perceived password effectiveness and password self-efficacy. We also find that neither perceived vulnerability to a security attack nor perceived severity of an attack influences on compliance. Providing persuasive communication improves compliance with password guidelines, resulting in significantly stronger passwords, but the effects on compliance intentions are only short-term. This study extends our understanding of the factors that influence compliance with password guidelines and how we can modify them to improve compliance. We raise interesting questions about the role of fear in different IS security contexts. This study highlights the need for more research on the long-term impact of persuasive communication.
Ranking Factors by Importance in Factorial Survey Analysis
Otondo, Robert F. (firstname.lastname@example.org); Crossler, Robert E.; Warkentin, Merrill
Factorial survey analysis is a statistical technique that has long been used in a variety of decision-oriented organizational and information systems (IS) research. A useful statistical outcome of factorial survey analysis is a collection of standardized regression coefficients that facilitate the ranking of survey factors by importance. However, such rankings may be invalid because of the failure to account for two related issues: unequal factor (i.e., dimension) manipulation effect sizes and the inherent multilevel structure of factorial survey data. We address these concomitant issues by demonstrating the ranking problem in simulated datasets, explaining underlying statistical causes, then justifying the use of remediating statistical methods. In particular, we focus on coding proportional to effect, a technique in which corresponding dimension-level dummy (0, 1) variables are consolidated into a single re-calibrated independent variable that is regressed on the dependent variable. The resulting standardized coefficients are then used for factor ranking. We assess the advantages, disadvantages, and limitations of remediation techniques and offer suggestions for future information systems research.
System Interaction Theory: Describing Interactions between Work Systems
Alter, Steven (email@example.com)
Interactions between systems are a necessity, a source of opportunity, and a source of difficulty and complication in building, implementing, and maintaining IT-reliant systems in organizations. This paper presents system interaction theory (SINT), a theory for analysis that covers almost all intentional and unintentional interactions between work systems that may be sociotechnical or totally automated. SINT is a broadly applicable theory that encompasses interactions between the types of systems that are central to the IS discipline. To minimize redundancy, this paper summarizes SINT immediately after introducing the research question, thereby providing a context for the many distinctions and references that follow. A discussion of SINT’s domain and scope explains why SINT views interacting entities as work systems rather than as tasks, components, or software modules. The literature review positions SINT in relation to topics under headings ranging from general systems theory and computer science to human computer interaction and organization science. Topics within SINT include relevant characteristics of systems and system interactions, purposes and/or causes of system interactions, system interaction patterns, direct effects of system interactions, responses to direct effects, and outcomes related to system interactions. A variety of potential contributions to theory, practice, and research are discussed.
Investigating the Relationship Between Business Analysts’ Competencies and IS Requirements Elicitation: A Thematic Analysis Approach
Babar, Abdul (Abdul.firstname.lastname@example.org); Bunker, Deborah; Gill, Asif
Poor requirements elicitation (RE) has consistently been reported as one of the major reasons for information system (IS) project failures. In the last two decades, RE research and practice have focused predominantly on the development of tools and techniques for business analysts (BAs) to use and improve RE, however, very little focus has been directed on the importance of the competencies of the BAs involved in RE. This research investigated the relationship between the BAs’ competencies and RE through an exploratory study. A thematic network analysis approach, along with the four-stage qualitative data analysis process, was applied to discover four business view and six system view themes, and their relationships to BAs’ competencies. The results of this study indicate that the performance of the BAs, from three categories of competencies, in terms of the selection of stakeholders’ viewpoints and the collection of requirements from those viewpoints was equivalent, however senior BAs focused more on high level requirements than the low level technical requirements of the system. The results suggest that the competencies of the BAs play a significant role in RE, and clearly defined competencies of BAs can help organizations to identify the right BA for the right job.
Exploring Foundations for Using Simulations in IS Research
Spagnoletti, Paolo (email@example.com); Za, Stefano; Winter, Robert ; Mettler, Tobias
Simulation has been adopted in many disciplines as a means for understanding the behavior of a system by imitating it through an artificial object that exhibits a nearly identical behavior. Although simulation approaches have been widely adopted for theory building in disciplines such as engineering, computer science, management, and social sciences, their potential in the IS field is often overlooked. The aim of this paper is to understand how different simulation approaches are used in IS research, thereby providing insights and methodological recommendations for future studies. A literature review of simulation studies published in top-tier IS journals leads to the definition of three classes of simulations, namely the self-organizing, the elementary, and the situated. A set of stylized facts is identified for characterizing the ways in which the premise, the inference, and the contribution are presented in IS simulation studies. As a result, this study provides guidance to future simulation researchers in designing and presenting findings.
Identifying Issues for the Bright ICT Initiative: A World-Wide Delphi Study of IS Journal Editors and Scholars
Lee, Jungwoo (firstname.lastname@example.org); Fedorowicz, Jane
Information and communication technologies (ICT) are changing the horizon of modern business. As ICT becomes an integral part of daily living, there are also increasing opportunities for the technology to both help and hinder fundamental social problems throughout the world. In response to these growing and urgent societal needs, the Association for Information Systems approved the Bright ICT Initiative to extend IS research beyond a focus on business to take on the broader challenges of an ICT-enabled Bright Society. A Delphi study was recently conducted to provide guidance on where Bright ICT-minded researchers might focus to produce their greatest impact. This paper reports on the findings of this Delphi study conducted to determine research needs in IS research related to this broader topic. The Delphi panel consisted of 182 globally distributed IS journal editors who participated in a three-round consensus-building process via the Internet. The results of this study provide a framework of eleven research priority areas and specific research topics for those engaged in future-oriented, socially-conscious IS research.
Revisiting Sprague’s Framework for Developing Decision Support Systems
Watson, Hugh J (email@example.com)
Ralph H. Sprague, Jr. was a leader in the MIS field and helped develop the conceptual foundation for decision support systems (DSS). This paper pays homage to Sprague and his DSS contributions. It takes a personal perspective based on the author’s years of working with Ralph. The history of DSS and its evolution are explored. Sprague’s DSS development framework, with its dialog, data, and models (DDM) paradigm and characteristics, is presented and discussed. At its core, the development framework remains valid in today’s world of business intelligence and big data analytics. A contemporary reference architecture for business intelligence and analytics (BI/A) is presented and discussed in the context of Sprague’s DSS development framework. The practice of decision support continues to evolve and can be described by a maturity model, with DSS, enterprise data warehousing, real-time data warehousing, big data analytics, and the emerging cognitive, as successive generations. A DSS perspective is used to describe and provide examples of what the forthcoming cognitive generation will bring.
Individual Determinants of IT Occupational Outcomes
ElMasri, Mazen (firstname.lastname@example.org); Al-Yafi, Karim; Addas, Shamel; Tarhini, Ali
Extant research in information systems relies heavily on career anchor theory (CAS) as a lens to examine occupational choices and outcomes in information technology. Yet, the empirical results are inconclusive and the power of the theory in predicting IT occupations is rather weak. With the growing demand for IT professionals, it becomes imperative to examine other factors that can predict the IT occupational outcomes. In this paper, we draw on social cognitive career theory (SCCT) and examine self-efficacy as a complementary factor to career anchors in predicting whether seekers end up with technical, business, or managerial occupations in IT. Specifically, we propose and test a model that combines variables from both CAS and SCCT theories. Multiple discriminant analysis was used to measure the extent to which variables from both theories discriminates between the IT occupations. The results show that our model predicts occupations with an accuracy rate of 82.2% (compared to 75.2% of the original CAS model). Our results also show that individuals who hold a professional role that matches their profile are more satisfied than those who do not. Lastly, we discovered that, from individuals who hold a position that does not match their profile, business-IT professionals are most satisfied.
Fujisawa Sustainable Smart Town: Panasonic’s challenge towards building a sustainable society
Sakurai, Mihoko (email@example.com); Kokuryo, Jiro
Urban utility equipment and electronic goods manufacturers are experiencing profound challenges in this age of rapid technological change. Panasonic, Japan’s leading electronics company, also recognized the limits of its traditional product manufacturing orientation and decided to enter IT-intensive town management in view of these challenges. It advanced a new strategy for the creation of sustainable communities which would encourage the involvement of both stakeholders and local residents. The stress being on sustainability, the strategy has adopted a long-term perspective, i.e., a 100-year time frame. Significantly, it must provide values which foster community-based sustainability while also adopting a business model which ensures the economic viability of both construction of the town and its ongoing service management. As information systems play a big part in the provision of services within the new town, the strategy requires the linking of information with technology and social aspects, quite unlike traditional manufacturing, which is solely based on technology concerns. As part of its new strategy, Panasonic defined five prominent service areas, i.e. energy, security, mobility, wellness and community. These areas were thought to expand and generate new value and services throughout the time frame.
Winning Awards or Winning Citations: A Retrospective Look at the Consistency Between Evaluative Metrics
Dutchak, Iaroslava (firstname.lastname@example.org); Tseng, Shih-Lun; Grover, Varun
The appropriate evaluation of Information Systems research articles is fundamental to the viability of our institutions and review processes. In the short run, the highest value is assessed through research awards, while in the longer term assessment of research value could be based on how the research community sees and draws from a published research article. In this study, we examine the consistency of two metrics for assessment of research value, one based on the best current and anticipated assessment to the field’s knowledge, and the other based on the actual use of the research in future work. The high end of former is done through research awards and the latter – by citations to the work. In this study, we focus on a premier journal, MIS Quarterly, and find that rarely are “papers of the year” the ones cited the most. We offer possible explanations for this discrepancy based on an assessment of originality and utility of articles, as well as patterns of their citations.