Concentration, Competence, Confidence, and Capture: An Experimental Study of Age, Interruption-based Technostress, and Task Performance
Stefan Tams, Jason B Thatcher, Varun Grover
The proliferation of information and communication technologies such as instant messenger has created ever more workplace interruptions that cause employee stress and productivity losses across the world. This growth in interruptions has paralleled another trend: the graying of the workforce, signifying that the labor force is aging rapidly. Insights from theories of stress and cognitive aging suggest that older people may be particularly vulnerable to the negative consequences of interruptions. Hence, this study examines whether, how, and why technology-mediated interruptions impact stress and task performance differently for older compared to younger adults. The study develops a mediated moderation model explaining why older people may be more susceptible to the negative impacts of technology-mediated interruptions than younger ones, in terms of greater mental workload, more stress, and lower performance. The model hypothesizes that age acts as a moderator of the interruption-stress relationship due to age-related differences in inhibitory effectiveness, computer experience, computer self-efficacy, and attentional capture. We refer to these age-related differences as Concentration, Competence, Confidence, and Capture, respectively, or the 4 C's. We tested our model through a laboratory experiment with a 2 x 2 x 2 mixed-model design, manipulating the frequency with which interruptions appear on the screen and their salience (e.g., reddish colors). We found that age acts as a moderator of the interruption-stress link due to differences in concentration, competence, and confidence, but not capture. Thus, this study contributes to IS research by elucidating explicitly the role of age in IS phenomena, especially interruption-based technostress.
Is More Information Better? An Economic Analysis of Group Buying Platforms
Group buying, as a new form of e-commerce, has experienced fast development over the past few years. Group buying serves as a new promotion channel for local small to medium-sized companies, as well as providing customers with the opportunity to experience new products and services at deep discounts. We examine merchants' pricing strategies and consumers' purchase decisions when different types of information is available through a group buying platform. Consumers purchasing deals from group buying platforms face a high level of quality uncertainty, due to their lack of experience and information about the merchants on group buying platforms. The lack of face-to-face communication before redeeming the deals also intensifies the uncertainty between the transacting parties. Group buying platforms intend to alleviate such uncertainty by designing a rich user interface that contains various types of information about the merchants or the deals. We model the interactions between merchants and consumers under three cases with simple, moderate or complex information environment. We show that improving from simple information to moderate information is beneficial to merchants, but further improvement from moderate to complex information leads to a more intriguing effect on merchants' discount strategy. In particular, merchants with very high or very low quality have to offer higher discount under complex information than under moderate information, and therefore, are worse off when more information is provided. Our analysis shows that providing more information can hurt merchants under certain conditions, and we offer implications to merchants as well the group buying platforms on their information strategies.
Pricing in C2C Sharing Platforms
Barrie Nault, Peter Angerer, Daniel Provin, Zimmermann Steffen
Sharing platforms such as Zilok.com enable the sharing of durable goods among consumers, and seek to maximize profits by charging transaction-based platform fees. We develop a model where consumers that are heterogeneous in their need to use a durable good decide whether to purchase and share (i.e., be a lender) or borrow (i.e., be a borrower), and a monopoly sharing platform decides on the platform fees. We find first that consumers with a greater need to use a durable good purchase and share, and that consumers with a lesser need borrow. Second, sharing platforms maximize profits only if the supply of a durable good matches demand: that is, the market must clear for platform fees to be profit maximizing. Third, the market-clearing condition requires that lender and borrower fees are classic strategic complements. Fourth, to maintain the market-clearing condition, sharing platforms have to increase their lender fee or decrease their borrower fee in response to increases in the sharing price, increases in usage capacity, and decreases in the purchase price of a durable good, and vice versa. These findings indicate that commonly applied one-sided pricing models in sharing platforms can be improved.
Don't even think about it! The effects of anti-neutralization, informational, and normative communication on information security compliance
Jordan Barlow, Merrill Warkentin, Dustin Ormond, Alan R. Dennis
Organizations use security education, training, and awareness (SETA) programs to counter internal security threats and promote compliance with information security policies. Yet, employees often use neutralization techniques to rationalize noncompliant behavior. We investigated three theory-based communication approaches that can be incorporated into SETA programs to help increase compliance behavior: (1) informational communication designed to explain why policies are important; (2) normative communication designed to explain that other employees would not violate policies; and (3) anti-neutralization communication designed to inhibit rationalization. We conducted a repeated measures factorial design survey using a survey panel of full-time working adults provided by Qualtrics. Participants received a SETA communication with a combination of one to three persuasion statements (informational influence, normative influence statement, and/or an anti-neutralization), followed by a scenario description that asked for their intentions to comply with the security policy. We found that both informational (weakly) and anti-neutralization communication (strongly) decreased violation intentions, but that normative communication had no effect. In scenarios where neutralizations were explicitly suggested to participants, anti-neutralization communication was the only approach that worked. Our findings suggest that we need more research on SETA techniques that include anti-neutralization communication to understand how it influences behavior beyond informational and normative communication.
Impact of the Information Technology Unit on Information Technology-Embedded Product Innovation
Monideepa Tarafdar, Huseyin Tanriverdi
Organizations increasingly embed IT into physical products to develop new product innovations. However, there is wide variance in the outcomes of the IT-embedded product (ITEP) innovation process. In this paper, we posit that the IT unit's involvement in the ITEP innovation process could positively influence the outcomes. ITEP innovations become part of complex ecosystems in which they interact with their developers, customers, and other ITEPs. These developments suggest new roles for IT units of organizations. Yet, there is dearth of theory explaining how the IT unit of a firm could contribute to the firm's development of ITEP innovations in ways to create customer value and improve firm performance. This paper seeks to address this gap. ITEP innovations present new challenges for organizations. This paper builds on complexity science to articulate the challenges and explain how the IT unit can increase an organization's capacity to cope with them. First, the paper adopts Wheeler's (2002) net-enabled business innovation model to structure the key stages of innovation that an organization goes through in developing new ITEPs. Second, the paper articulates IT-specific uncertainties and challenges entailed in each of the four stages. Third, the paper develops hypotheses explaining how the IT unit could increase the effectiveness of each stage by helping to address these uncertainties and challenges. Finally, the paper empirically tests and finds support for the hypotheses in a sample of 165 firms. The paper contributes to the literature on IT-enabled business innovations by developing and validating a new theoretical explanation of how IT units increase the effectiveness of the ITEP innovation process.
Revisiting the Impact of System Use on Task Performance: An Exploitative-Explorative System Use Framework
Heshan Sun, Ryan Wright, Jason Thatcher
How information systems (IS) impact task performance has attracted a significant amount of attention from information systems researchers and generated high interest among practitioners. A commonly accepted view is that the potential of information systems must be realized through system use. Nevertheless, existing findings regarding the impact of system use on task performance are not yet conclusive. We attributed this to the various conceptualizations of system use and the unclear mechanisms through which system use influences task performance. Thus, this research attempts to create a better understanding of how system use influences task performance. To this end, we developed an exploitative-explorative system use framework in order to reconcile the various conceptualizations of system use and to depict how both exploitative and explorative system use influences task performance through impacting task innovation, management control, and task productivity. We created an instantiation of the framework using USAGE (exploitative system use) and adaptive system use (ASU, explorative system use). We conducted two empirical studies involving two different populations and using two different technologies. The first study consisted of 212 experienced users of MS Office, whereas the second study employed 372 new users of a video-editing tool. Our findings offer insight into how exploitative system use and explorative system use independently and jointly influence task performance constructs and also have implications for research and practices.
When Institutional Logics Meet Information and Communication Technologies: Examining Hybrid Information Practices in Ghanaian Agriculture
Mira Slavova, Stan Karanasios
In this paper, we describe how changes in the availability of information artifacts - in particular, Information and Communication Technologies (ICTs) ñ among smallholder farmers in Ghana, led to a process of hybridization of information practices, and how this process could be linked to underlying institutional change. We use the notions of institutional carriers and activity systems to study the evolution of the prevailing 'small holder' institutional logic of Ghanaian agriculture toward an incoming 'value-chain' institutional logic concerned with linking farmers to output markets, improving the knowledge base in agriculture, and increasing its information intensity. We draw on a mixed-methods approach, including in-depth qualitative interviews, focus groups, observations, and detailed secondary quantitative data. We cultivate activity theory as a practice-based lens for structuring enquiry into institutional change. We find that information artifacts served to link the activities of farmers that were embedded in the smallholder logic with those of agricultural-development actors that promoted the value-chain logic. Hybridization occurred through the use of artifacts with different interaction modalities. In terms of conceptualizing change, our findings suggest that hybridization of the two logics may be an intermediary point in the long transition from the smallholder toward the value-chain logic.
How Social Media-Enabled Communication Awareness Enhances Project Team Performance
Oliver Krancher, Jens Dibbern, Paul Meyer
Project teams increasingly rely on computer-mediated communication. In this paper, we propose that communication within these teams benefits from a communication-awareness feature that summarizes communication at one common place. We argue that such a feature pays out specifically during action episodes, when team members engage in task work. We conducted two studies of 51 and 35 project teams to examine how the amount of communication during action episodes relates to team performance under low versus high communication awareness. In both studies, we technologically designed communication awareness as the availability of a feed, known from social media platforms, that displays all team-internal, computer-mediated communication. The results show that the communication-awareness feature makes communication during action episodes more beneficial, both in term of effectiveness and efficiency. Zooming into the temporal patterns of communication during action episodes further reveals that high-performing teams in the high-communication-awareness condition stick out by early and steady communication. Implications for current and future research on team communication and awareness support are discussed.
Evidence-Based Information Systems: A New Perspective and a Roadmap for Research Informed Practice
David W. Warnwright, Briony J. Oates, Helen M. Edwards, Sue Childs
Despite the increasing sophistication and quality of published work, the development of a cumulative body of knowledge and an evidence-base for Information Systems (IS) research still represents a major challenge. IS research is still predominantly undertaken by IS researchers for other IS researchers and not utilized to its full extent by IS practitioners or policy makers. We focus on this problem and express the need for a new evidence-based research perspective. It is argued that it is time to refocus the efforts of IS academics (and practitioners) to develop a new evidence-base for IS research whereby it can more routinely inform, develop, improve and support IS practice. We contribute to this debate by defining evidence-based practice (EBP), its relevance to IS, and the need to develop an evidence-based approach. We look in particular at its brief history, and its subsequent evolution, development and widespread acceptance in Medicine; making reference to recent arguments and critiques of EBP in other disciplines such as software engineering and management. We espouse the need to develop a similar evidence-based movement and infrastructure within the IS research and practitioner communities and then put forward a possible roadmap for the development of Evidence-Based Information Systems (EBIS) that comprises 9 key initiatives. We conclude our argument by stating that the current extent, severity and impact of IS failures are unacceptable, emphasizing the need for a new perspective for IS research that encourages and incorporates EBP as a guiding principle to inform better IS practice.
‘Unblackboxing’ Decision Makers’ Interpretations of IS Certifications in the Context of Cloud Service Certifications
Jens Lansing, Alexander Benlian, Ali Sunyaev
IS literature has predominantly taken a black box perspective on IS certifications and studied the diverse set of their outcomes, such as signaling superior quality and increased customer trust. As a result, there is little understanding about the structure of certifications and its role in decision makers' evaluations of certifications to achieve these outcomes. However, idiosyncrasies of novel IT services such as cloud services create a need to 'unblackbox' certifications and theorize about their constituting structural building blocks and structural elements, and to examine the key features that might lead to a more favorable evaluation of a certification by decision makers. To advance theory building on certifications, this article develops an empirically grounded typology of certifications' key structural building blocks and structural elements, and examines how they interpret substantive features within these elements. Using evidence from 20 interviews with decision makers of a wide range of industries in the context of cloud service certifications, we find that a decision maker's aggregate evaluation of a certification is a function of their interpretations of its features guided by cognitive interpretive schemas along six key structural elements contrasted with the decision makers' expectations regarding the certification's outcomes. This study contributes by conceptualizing certifications' necessary and sufficient elements, constructing a nascent theory on decision makers' evaluations of certifications, and illuminating the dynamics between certifications’ structural elements and outcomes as a co-evolutionary process. We discuss implications for the certification literature and give managerial advice regarding the factors to consider when designing and evaluating certifications.
Theorizing the Multilevel Effects of Interruptions and the Role of Communication Technology
Shamel Addas, Alian Pinsonneault
Our understanding of how interrupting the work of an individual affects group outcomes and the role of communication technologies (CT) in shaping these effects is limited. Drawing upon coordination theory and the literatures on computer-mediated communication and interruptions, this paper develops a multilevel theory of work interruptions. It suggests that interruptions that target individuals can also affect other group members through various ripple effects and a cross-level direct effect. We also discuss how the usage of five CT capabilities during interruption episodes can moderate the impact of interruptions at the individual and group levels. Our theoretical model draws attention to the importance of examining the individual-to-group processes to better understand the impact of interruptions in group environments. Additionally, by accounting for the role of the use of CT capabilities during interruption episodes, our work contributes to both the interruptions literature, which dedicates scant attention to the interrupting media, and to IS research on media use and media effects.
Editorial: Data-Driven Meets Theory-Driven Research in the Era of Big Data: Opportunities and Challenges for Information Systems Research
Wolfgang Maass, Jeffrey Parsons, Sandeep Purao, Veda C. Storey, Carson Woo
The era of big data provides many opportunities for conducting impactful research from both data-driven and theory-driven perspectives. However, data-driven and theory-driven research have progressed somewhat independently. In this paper, we develop a framework that articulates important differences between these two perspectives and proposes a role for information systems research at their intersection. The framework presents a set of pathways that combine the data-driven and theory-driven perspectives. From these pathways, we derive a set of challenges, and show how they can be addressed by research in information systems. By doing so, we identify an important role that information systems research can play in advancing both data-driven and theory-driven research in the era of big data.
Designing Social Nudges for Enterprise Recommendation Agents: An Investigation in the Business Intelligence Systems Context
Martin Kretzer, Alexander Maedche
According to behavioral economists, a "nudge" is an attempt to steer individuals toward making desirable choices without affecting their range of choices. We draw on this concept. We design and examine nudges that exploit social influence's effects to control individuals' choices. Although recommendation agent research provides numerous insights into extending information systems and assisting end-consumers, it lacks insights into extending enterprise information systems to assist organizations' internal employees. We address this gap by demonstrating how enterprise recommendation agents (ERAs) and social nudges can be used to tackle a common challenge that enterprise information systems face. That is, we are using an ERA to facilitate information (i.e., reports) retrieval in a business intelligence system. In addition, we are using social nudges to steer users toward reusing specific recommended reports rather than choosing between recommended reports randomly. To test the effects of the ERA and the four social nudges, we conduct a within-subjects lab experiment with 187 participants. We also conduct gaze analysis ('eye tracking') to examine the impact of participants' elaboration. The results of our logistic mixed-effects model show that the ERA and the proposed social nudges steer individuals toward certain choices. Specifically, the ERA steers users toward reusing certain reports. These theoretical findings also have high practical relevance and applicability: In an enterprise setting, the ERA allows employees to reuse existing resources (such as existing reports) more effectively across their organizations because employees can easier find the reports they actually need. This in turn prevents the development of duplicate reports.
A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence to Inspire New Directions in Behavioral and Organizational Security Research
Robert Willison, Paul Benjamin Lowry, Raymond Paternoster
This research-perspective article reviews and contributes to the literature that explains how to deter internal computer abuse (ICA), which is criminal computer behavior committed by organizational insiders. ICA accounts for a large portion of insider trading, fraud, embezzlement, the selling of trade secrets, customer privacy violations, and other criminal behaviors, all of which are highly damaging to organizations. Although ICA represents a momentous threat for organizations, and despite numerous calls to examine this behavior, the academic response has been lukewarm. However, a few security researchers have examined ICAís influence in an organizational context and the potential means of deterring it. However, the results of the studies have been mixed, leading to a debate on the applicability of deterrence theory (DT) to ICA. We argue that more compelling opportunities will arise in DT research if security researchers more deeply study its assumptions and more carefully recontextualize it. The purpose of this article is to advance a deterrence research agenda that is grounded in the pivotal criminological deterrence literature. Drawing on the distinction between absolute and restrictive deterrence and aligning them with rational choice theory (RCT), this paper shows how deterrence can be used to mitigate the participation in and frequency of ICA. We thus propose that future research on the deterrent effects of ICA should be anchored in a more general RCT, rather than in examinations of deterrence as an isolated construct. We then explain how adopting RCT with DT opens up new avenues of research. Consequently, we propose three areas for future research, which cover not only the implications for the study of ICA deterrence, but also the potential motivations for this type of offence and the skills required to undertake them.
'Computing' Requirements for Open Source Software: A Distributed Cognitive Approach
Xuan Xiao, Aron Lindberg, Sean Hansen, Kalle Lyytinen
Most requirements engineering (RE) research has been conducted in the context of structured and agile software development. Software, however, is increasingly developed in open source software (OSS) forms which have several unique characteristics. In this study, we approach OSS RE as a sociotechnical, distributed cognitive process where distributed actors 'compute' requirements ñ i.e., transform requirements-related knowledge into forms that foster a shared understanding of what the software is going to do and how it can be implemented. Such computation takes place through social sharing of knowledge and the use of heterogeneous artifacts. To illustrate the value of this approach, we conduct a case study of a popular OSS project, Rubinius - a runtime environment for the Ruby programming language - and identify ways in which cognitive workload associated with RE becomes distributed socially, structurally, and temporally across actors and artifacts. We generalize our observations into an analytic framework of OSS RE, which delineates three stages of requirements computation: excavation, instantiation, and testing-in-the-wild. We show how the distributed, dynamic, and heterogeneous computational structure underlying OSS development builds an effective mechanism for managing requirements. Our study contributes to sorely needed theorizing of appropriate RE processes within highly-distributed environments as it identifies and articulates several novel mechanisms that undergird cognitive processes associated with distributed forms of RE.
Sleight of Hand: Identifying Concealed Information by Monitoring Mouse-Cursor Movements
Jeffrey Jenkins, Jeff Proudfoot, Joe Valacich, G. Mark Grimes, Jay Nunamaker
Organizational members who conceal information about adverse behaviors, such as insider threat or noncompliance activities, present a substantial risk to that organization. Yet the task of identifying who is concealing information is extremely difficult, expensive, error-prone, and time-consuming. We propose a unique methodology for identifying concealed information: measuring people's mouse-cursor movements in online screening questionnaires. We present a specialized screening questionnaire based on the concealed information test. We then theoretically explain how mouse-cursor movements captured during this test differ between people concealing information and truth tellers. We empirically evaluate our hypotheses using an experiment during which people conceal information about a questionable act. While people completed the screening questionnaire, we simultaneously collected mouse-cursor movements and electrodermal activity the primary sensor used for polygraph examinations as an additional validation of our methodology. We found that mouse-cursor movements can significantly differentiate between people concealing information and people telling the truth. Mouse-cursor movements also can differentiate between people concealing information and truth tellers on a broader set of comparisons relative to electrodermal activity. Both mouse-cursor movements and electrodermal activity have the potential to identify concealed information, yet mouse-cursor movements yielded significantly fewer false positives. Our results demonstrate that analyzing mouse-cursor movements has promise for identifying concealed information. This methodology can be automated and deployed online for mass screening of individuals in a natural setting without the need for human facilitators, who can introduce bias into the results. Our approach further demonstrates that mouse-cursor movements can provide insight into the cognitive state of computer users.
An Activity Theory Approach to Modeling Dispatch-Mediated Emergency Response
Rohit Valecha, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya
Emergency response involves multiple local, state and federal communities of responders. These communities are supported by emergency dispatch agencies that share digital traces of task-critical information. However, the communities of responders are often an informal network of people, and lack structured mechanisms of information sharing. To standardize the exchange of task-critical information in communities of responders we develop a conceptual modeling grammar. We base the grammar on an Activity Theory perspective, and ground it in an analysis of emergency dispatch incident reports. The paper contributes to research in dispatch-mediated emergency response literature by (1) developing a framework of elements and relationships to support critical information flow within emergency communities of responders, (2) developing a conceptual modeling grammar for modeling emergency tasks in dispatch-mediated emergency response, and (3) implementing a prototype system to demonstrate the utility of the conceptual modeling grammar.
Never, Never Together Again: How Post-Purchase Affect Drives Consumer Outcomes within the Context of Online Consumer Support Communities
Eun Hee Park, Ghiyoung Im, Veda C. Storey, Richard L. Baskerville
Online support communities are popular for consumers of information technology products who might need help identifying or resolving a problem. Information technology products, in general, have their own needs and requirements. Prior research has focused on the intermediate benefits of online support communities to companies, such as knowledge contribution and community participation. This study, in contrast, investigates the less explored issue of value creation by online support communities with respect to consumer post-purchase outcomes. To do so, an affect (emotional) process model is developed to understand how customers' post-purchase outcomes of information technology products are influenced through cognitive and affective processes after a product failure. Special attention is paid to the roles of affect during the recovery process. An empirical assessment of the model uses two online support communities, with a netnography methodology employed for data collection. The results suggest that consumers' post-purchase outcomes are influenced by affect and regulation, not just cognition. Key influences emerge as the consumers' own problem appraisals and affective experiences, the consumers' social group, and regulation provided by company technicians and/or community experts.
A Multi-Appeal Model of Persuasion for Online Petition Success: A Linguistic Cue-Based Approach
Yan Chen, Shuyuan Deng, Dong-Heon Kwak, Ahmed El Noshokaty, Jiao Wu
Online petitions have become a powerful tool for the public to use to affect society. Despite the increasing popularity of these petitions, it remains unclear how the public consumes and interprets their content and how this public consumption and interpretation help the creators of online petitions achieve their goals. This study investigates how linguistic factors in the texts of online petitions influence their success. Specifically, drawing upon the dual-process theory of persuasion and the moral persuasion literature, this study examines cognitive, emotional, and moral linguistic factors in the texts of petitions and identifies their role in the success of online petitions. The results, which are based on an analysis of 45,377 petitions from Change.org, show that petitions containing positive emotions and enlightening information are more likely to succeed. Contrary to popular belief, petitions containing heavy cognitive reasoning and emphasizing moral judgment are less likely to succeed. This study exemplifies use of an analytical approach to examining crowd-sourced content involving online political phenomena related to policy making, governance, political campaigns, and large societal causes.
Appraisal of Email Use as a Source of Workplace Stress: A Person-Environment Fit Approach
Jean-Francois Stich, Monideepa Tarafdar, Patrick Stacey, Sir Cary Cooper
The paper develops and tests theory that explains under what conditions the extent of email use is appraised as a stressor. Integrating concepts from information acquisition and person environment fit theories, we theorize that individuals appraise their extent of email use as stressful based on the mismatch between their current and desired extents of email use. We define such match as email fit and mismatch as email misfit. We develop a conceptual framework and hypotheses that associates email misfit with the individual’s experience of three key workplace stressors – work relationship stressor, job control stressor and job conditions stressor. We test our hypotheses by applying quadratic polynomial regressions and surface-response analysis, to survey data obtained from 118 working individuals. The paper makes three theoretical contributions. Firstly, in reporting a theoretical and empirical construction of email fit and misfit and their relationship to workplace stressors, it shows that, email misfit is appraised as stress-creating. That is, both too much and too little email compared to what the individual desires, are associated with stressors. In doing so and secondly, it shows that IT use (in this case, email) is appraised as stressful both when it exceeds (i.e., associated with overload) and fails to meet (i.e., associated with underload), the user’s expectation and preference. Thirdly, it suggests the person environment approach as a theoretically novel way to conceptualize the cognitive appraisal and judgement associated with information under - and over – acquisition, and shows workplace stressors as potentially new effects associated with them.
Cross-Level Moderation of Team Cohesion in Individuals’ Utilitarian and Hedonic Information Processing: Evidence in the Context of Team-Based Gamified Training
Dong-Heon Kwak, Xiao Ma, Greta Polites, Mark Srite, Ross T. Hightower, William Dave Haseman
Today firms use teams extensively to accomplish organizational objectives. In addition, gamification has recently received much attention as a means of persuading employees and customers to engage in desired behaviors. Despite the importance of teams and the growing interest in gamification as a persuasion tool, past researchers have paid little attention to team-based gamification from a multilevel perspective. Based on motivational consistency theories, we propose that at the team level, team performance has a positive effect on team cohesion. Drawing upon the elaboration likelihood model (ELM), we further propose two cross-level effects in the context of team-based gamified training: first, that team cohesion will positively moderate the relationship between utilitarian perceptions (i.e., perceived quality of learning) and attitude; and second, that team cohesion will negatively moderate the relationship between hedonic perceptions (i.e., perceived enjoyment of learning) and attitude. We tested our research model using an enterprise resource planning (ERP) simulation game involving 232 participants in 78 teams. The results of Ordinary Least Squares and Hierarchical Linear Modeling analysis support our hypotheses. This study makes three substantive contributions to the team literature and to the ELM in the context of team-based gamified training. First, it theorizes and empirically tests the effect of team performance on team cohesion at the team level. Second, it extends the ELM by examining the cross-level moderation of team cohesion in human information processing. Third, it demonstrates that the utilitarian and hedonic aspects of information technology do not influence user attitudes equally.
It Takes a Village: Understanding the Collective Security Efficacy of Employee Groups
Allen C. Johnston, Paul M. Di Gangi, Jack Howard, Jame Worrell
An organization’s ability to successfully manage information security incidents is determined by the actions of its employees, as well as the actions of various groups of employees within its organizational boundary. To date, information security research has primarily focused on individual-level phenomena, not yet exploring group-level phenomena such as how employee groups recognize and respond to security incidents in a way that is consistent with the organization’s security goals and objectives. The current study addresses this gap, thereby answering the call for group-level security research perspectives. The present study explores how employee groups formulate their collective security efficacy, which influences how group members recognize and respond to information security incidents. Using a case study of a large healthcare research organization (HRO), we analyze two security incidents, a malware attack and a physical security breach, to identify a unique set of ecological and social properties of employee groups that are salient to their collective security efficacy.
Privacy in the Sharing Economy
Timm Teubner, Michael Christoph Flath
Contemporary C2C platforms, such as Airbnb, have exhibited considerable growth in recent years and are projected to continue doing so in the future. These novel consumer-to-consumer marketplaces have started to obliterate the boundaries between private and economic spheres. Marketing personal resources online is inherently associated with the disclosure of personal and sometimes intimate information. This raises unprecedented questions of privacy. Yet, there is so far little research on the role of privacy considerations in the sharing economy literature. Leveraging the theoretical perspective of privacy calculus, we address this gap by investigating how privacy concerns and economic prospects shape a potential provider’s intentions to share via different communication channels. We relate privacy concerns back to the provider’s perceptions of the audience. We evaluate our research model by means of a scenario-based online survey, providing broad support for our reasoning.
Sublating Tensions in the IT Project Risk Management Literature: A Model of the Relative Performance of Intuition and Deliberate Analysis for Risk Assessment
Mohammad Moeini, Suzanne Rivard
The information technology (IT) project risk management literature comprises two dominant but diverging bodies of knowledge: the normative and the experiential. We conducted a three-step dialectical review of this literature with the aim of creating a bridging body of knowledge. In the first step, delineation, we synthesize the overarching variance and process explanations in each body of knowledge and motivate the examination of their divergences. In the second step, contrastation, we perform a dialectical interrogation of these bodies to articulate their key assumption-level tensions. We elaborate on the most prominent tension between the two bodies, namely, the relative performance of intuition and deliberate analysis for project risk assessment. In the third step, sublation, we propose a theoretical model that resolves this tension. Anchored in both bodies of knowledge and drawing from managerial decision-making research, the model proposes that the relative performance of intuition depends on characteristics of the IT project manager (project-specific expertise), the project (risks’ temporal complexity and risks’ structural complexity), and the project’s organizational environment (e.g., stakeholders’ involvement in risk management, methods-using pressures). Moreover, the model posits that project-specific expertise moderates all the other effects. Building on the bridging knowledge insights from this model, we discuss how researchers can design interventions to increase project managers’ use of deliberate analysis when it is expected to outperform intuition or to encourage reliance on intuition when it is likely to outperform deliberate analysis.
An Economic Analysis of Consumer Learning on Entertainment Shopping Websites
Jin Li, Zhiling Guo, Geoffrey Tso
Online entertainment shopping, normally supported by the pay-to-bid auction mechanism, represents an innovative business model in e-commerce. Because the unique selling mechanism combines features of shopping and online auction, consumers expect both monetary return and entertainment value from their participation. We propose a dynamic structural model to analyze consumer behaviors on entertainment shopping websites. The model captures a consumer’s learning process both from her own participation experiences and from the observational learning of historical auction information. We estimate the model using a large data set from an online entertainment shopping website. Results show that consumers’ initial participation incentives mainly come from a significant overestimation of the entertainment value and an obvious underestimation of the auction competition. Both types of learning contribute to a general decreasing participation trend among consumers over time. Our model provides both a theoretical explanation and empirical evidences of the consumer churn issue. It further identifies two groups of consumers with different risk characteristics: One group is risk-averse and quits the website before effective learning takes place, while the other group exhibits risk-seeking behavior and overly commits to the auction games. Based on the estimated parameters of the model, we perform counterfactual analyses to evaluate the effects of policy changes on consumers’ participation behaviors. We discuss several important design implications and recommend strategies for building a sustainable business model in the entertainment shopping industry.
Measuring and Controlling Social Desirability Bias: Applications in Information Systems Research
Dong-Heon Kwak, Philipp Holtkamp, Sung S. Kim
Despite the potential risks that social desirability (SD) bias poses to the validity of information systems (IS) research, little is known about the extent of such bias. This study examines the extent of SD bias in the IS domain and compares alternative techniques for measuring it. Our findings suggest that despite the popularity of the Marlowe-Crowne scale in IS research, the Impression Management scale functions better in assessing the extent of SD bias. We also found that under certain circumstances, SD bias can threaten the validity of IS research. This study contributes to the IS literature by showing the difference in SD bias across IS contexts and suggesting an effective way to test for the presence of SD bias.
PLS-Based Model Selection: The Role of Alternative Explanations in Information Systems Research
Pratyush Nidhi Sharma, Marko Sarstedt, Galit Shmueli, Kevin H. Kim, Kai Oliver Thiele
Exploring theoretically plausible alternative models for explaining the phenomenon under study is a crucial step in advancing scientific knowledge. This paper advocates model selection in MIS studies that use partial least squares path modeling (PLS) and suggests the use of model selection criteria derived from Information Theory for this purpose. These criteria allow researchers to compare alternative models and select a parsimonious yet well-fitting model. However, as our review of prior MIS research practice shows, their use—while common in the econometrics field and in factor-based SEM—has not found its way into studies using PLS. Using a Monte Carlo study, we compare the performance of several model selection criteria in selecting the best model from a set of competing models under different model set-ups and various conditions of sample size, effect size, and loading patterns. Our results suggest that appropriate model selection cannot be achieved by relying on the PLS criteria (i.e., R2, Adjusted R2, GoF, and Q2), as is the current practice in academic research. Instead, model selection criteria, in particular the Bayesian information criterion (BIC) and the Geweke-Meese criterion (GM), should be used due to their high model selection accuracy and ease of use. To support researchers in the adoption of these criteria, we introduce a five-step procedure that delineates the roles of model selection and statistical inference, and discuss misconceptions that may arise in their use.
Designing Process Guidance Systems
Stefan Morana, Julia Kroenung, Alexander Maedche, Silvia Schacht
Process knowledge is a vital prerequisite for employees to execute organizational processes successfully in the course of their daily work. However, the lack of process knowledge, especially of novice users, and the need for support pose a challenge to employers. Inspired by research on spatial knowledge and navigation, we conceptualize three process knowledge types addressing the needs of employees during their process execution. On the basis of these process knowledge types, we derive three theoretically grounded design principles for process guidance systems to support employees’ process execution. We instantiate the design principles and evaluate the resulting artifacts in a laboratory experiment and in a subsequent field study. The results demonstrate the positive effects of process guidance systems on users’ process knowledge and process execution performance. Our study contributes to research and practice by proposing a new conceptualization of process knowledge and a nascent design theory for process guidance systems that builds on theories of spatial knowledge and navigation, as well as decision support research.
On the Optimal Fixed-Up-To Pricing for Information Services
Shinyi Wu, Paul Pavlou
Fixed-Up-To (FUT) pricing allows consumers to purchase a fixed usage amount of an information service for a certain fixed price chosen from a menu of plans. In this study, we first derive an optimal analytical solution for FUT menu pricing without imposing the strong single-crossing assumption. Second, we illustrate the analytical solution by leveraging mixed integer nonlinear programming to derive an optimal FUT pricing scheme for information services. Third, we investigate when, and by how much, FUT pricing improves upon the commonly-used “flat rate” pricing. Our numerical results show that FUT pricing improves the service provider’s profits while enhancing social welfare when consumers face different maximum consumption level bounds. Notably, in terms of optimal pricing, our numerical results show that the consumers’ maximum consumption level bounds are more important than their utility functions. Most importantly, our results show that FUT pricing performs better than flat rate pricing under incomplete information. Finally, we empirically show that it is not necessary to treat over limit rates as a decision variable in terms of optimal FUT pricing since both FUT pricing and three-part tariffs are reasonable approximations of non-linear pricing in terms of both firm profits and social welfare. Theoretical and practical implications for the design of optimal FUT pricing toward enhancing firm profits, consumer surplus, and social welfare are discussed.
Effects of Symbol Sets and Needs Gratifications on Audience Engagement: Contextualizing Police Social Media Communication
Jennifer Xu, Jane Fedorowicz, Christine B. Williams
We propose a research model based on Media Synchronicity Theory (MST) and examine how the use of different symbol sets (e.g., images and text) is related to audience engagement on social media. We include Uses and Gratifications Theory (UGT) in the model to identify task characteristics that are relevant to message recipients in the specific context of community policing. Based on our analyses of Facebook posts by five police departments we find first that, consistent with MST, posts conveying information garner more responses when accompanied by more natural symbol sets, and more textual content is preferred to less, but responses differ depending on the type of engagement: intimacy (likes), interaction (comments), or influence (shares). Second, posts intended for meaning convergence gratify the audience’s socialization and assistance needs and are positively related to intimacy and interaction. Finally, the fit between symbol sets and task characteristics impacts different dimensions of audience engagement. These findings provide empirical support for relying on MST when studying social media and for integrating with UGT to capture contextual task characteristics. We conclude the paper with a discussion of the implications of its findings for theory and offer recommendations for practice.
Deconstructing Information Sharing
Paul Beynon-Davies, Yingli Wang
Information sharing between actors, working in different institutions, is proposed by much literature to improve aspects of both intra and inter-institutional performance. However, it is unclear from the literature what exactly information sharing is and why it is important to institutional performance. This paper seeks to deconstruct the concept of information sharing, particularly within aspects of the supply chain. We shall argue that the central problem with the concept of information sharing is that it relies on a notion of information as stuff that can be manipulated, transmitted, and used relatively unproblematically between organizations. We wish to question conventional notions of this construct by examining and analyzing a case of information sharing, applicable within an international supply chain as well as several problems experienced with such sharing. Through deconstructing this case we demonstrate how certain perceived problems in information sharing are better conceptualized as breakdowns in the inter-institutional scaffolding of data structures.
A Meta-Design Theory for Tailorable Decision Support
Shah Jahan Miah, John Gammack, Judy McKay
Despite years of Decision Support Systems (DSS) research, DSS artefacts are frequently criticized for lacking practitioner relevance, and for neglecting configurability and contextual dynamism. Tailoring in end-user contexts can produce relevant emergent DSS artefacts, but design theory for this is lacking. Design Science Research (DSR) has important implications for improving DSS uptake, but generally this has not been promoted in the form of meta-designs with design principles applicable to other DSS developments. This paper describes a meta-design theory for tailorable DSS, generated through action design research studies in different primary industries. Design knowledge from a DSS developed in an agricultural domain was distilled and generalized into a design theory comprising: 1) a general solution concept (meta-design) and 2) five hypothesized design principles. These were then instantiated via a second development in which the meta-design and design principles were applied in a different domain (forestry) to produce a successful DSS, thus testing the meta-design and validating the design principles. In addition to contributing to DSR and illustrating innovation in tailorable technology the paper demonstrates the utility of action design research to support theory development in DSS design.
The Role of Morality in Digital Piracy: Understanding the Deterrent and Motivational Effects of Moral Reasoning in Different Piracy Contexts
Kar Yan Tam, Yue Katherine Feng, Samuel Kwan
Digital piracy has been a chronic issue in intellectual property protection. With the prevalence of online technologies, digital piracy has become even more rampant as digital resources can now be accessed and disseminated easily through the Internet. While the antecedents of piracy behaviors have been studied for years, previous studies often focus on a specific type of behavior or pirated content and the findings are far from conclusive. They do not paint a coherent picture of the impacts of antecedents. In this study, we focus on the role of morality by revealing the different levels of moral reasoning that can both deter and motivate users’ piracy intention. Furthermore, we differentiate between two types of piracy behaviors (unauthorized copying/downloading vs. unauthorized sharing) and two categories of digital products (application software vs. music/movies) so that the differential impacts of the various antecedents can be assessed and articulated more clearly. Models are empirically evaluated in the four piracy contexts using a sample of 3,426 survey participants from a sizable IT-literate society. The findings indicate the conflicting roles of morality in piracy intention and demonstrate its differential impacts across the two types of piracy behaviors yet can be generalized across the two categories of digital products. Our study sheds new light on end-users’ considerations in accessing and disseminating unauthorized digital content. It also informs the design of copyright protection policies and sanction measures with different levels of specificity.
Beyond Information: The Role of Territory in Privacy Management Behavior in Social Networking Sites
Shuai-Fu Lin, Deb Armstrong
This study draws on communication privacy management theory to explore aspects of social networking sites (SNSs) that may influence individual privacy management behaviors and conceptualizes two behaviors for managing privacy in SNSs: private disclosure (for managing information privacy) and territory coordination (for managing territory privacy). Evidence from two studies of SNS members indicates that perceptions of trespassing over agreed upon virtual boundaries within SNSs affects risk beliefs regarding information privacy and territory privacy differently. These distinct privacy risk beliefs, in turn, influence two privacy management behaviors. Theoretically, this study demonstrates that a more complete conceptualization of individual privacy management in SNSs should consider both information privacy and territory privacy; and that territory coordination is a more significant indicator of privacy management behaviors in SNSs than private disclosure. From a practical standpoint, this study provides guidance to SNS platform organizations on how to reduce individuals’ privacy risk beliefs, encourage users to share private information, and potentially build larger online communities.
Understanding Ambidexterity: Managing Contradictory Tensions between Exploration and Exploitation in the Evolution of Digital Infrastructure
Ramiro Montealegre, Kishen Iyengar, Jeffrey Sweeney
Prior research on the evolution of digital infrastructure has paid considerable attention to effective strategies for resolving contradictory tensions, yet what we still do not understand is the role of higher-level organizational capabilities that help balance the contradictory tensions that emerge during this evolution. In addressing this gap, two related questions guided our investigation: 1) how do organizations experience and resolve contradictory tensions throughout the evolution of digital infrastructure? and 2) what can we learn about the organizational capabilities that drive strategic actions in resolving these contradictory tensions? We approach these questions using an in-depth case study at RE/MAX LLC, a global real estate franchise. Based on our findings, we propose a theoretical model of digital infrastructure ambidexterity. The model recognizes three pairs of capabilities (identifying and germinating, expanding and legitimizing, as well as augmenting and implanting) and two supporting factors (leadership and structure) that are key to resolving contradictory tensions during this evolution. This study responds to a recent research call for dynamic process perspectives at multiple levels of analysis. The implications of this model for research and practice are discussed and observations for future research are offered.
Designing for ICT-Enabled Openness in Bureaucratic Organizations: Problematizing, Shifting and Augmenting Boundary Work
Isam Faik, Mark Thompson, Geoff Walsham
There is a growing focus on achieving ‘openness’ in the design and transformation of organizations, in which the enabling role of ICTs is considered increasingly central. However, bureaucratic organizations with rigid structures continue to face significant challenges in moving towards more open forms of organizing. In this paper, we contribute to our understanding of these challenges by building on existing conceptualizations of openness as a form of boundary work that transforms by challenging both internal and external organizational boundaries. In particular, we draw on a performative view derived from actor-network theory to analyze a case study of ICT-based administrative reforms in a judicial system. Building on our case analysis, we develop a typology of the various roles that ICTs can play in both enabling and constraining ongoing boundary work within the context of their implementation. We thus present a view of ICT-enabled open organizing as a process where ICTs contribute to problematizing, shifting, and augmenting ongoing boundary work. This view highlights the inherently equivocal nature of the role of ICTs in transformations towards higher levels of openness.